SG10202101692RA - Methods and systems for pki-based authentication - Google Patents
Methods and systems for pki-based authenticationInfo
- Publication number
- SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA
- Authority
- SG
- Singapore
- Prior art keywords
- pki
- systems
- methods
- based authentication
- authentication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/941,364 US9832024B2 (en) | 2015-11-13 | 2015-11-13 | Methods and systems for PKI-based authentication |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| SG10202101692RA true SG10202101692RA (en) | 2021-04-29 |
Family
ID=58691535
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SG10202101692RA SG10202101692RA (en) | 2015-11-13 | 2016-10-19 | Methods and systems for pki-based authentication |
Country Status (7)
| Country | Link |
|---|---|
| US (4) | US9832024B2 (en) |
| EP (2) | EP3913854B1 (en) |
| CN (1) | CN108432180B (en) |
| AU (1) | AU2016351458A1 (en) |
| HK (1) | HK1256235A1 (en) |
| SG (1) | SG10202101692RA (en) |
| WO (1) | WO2017083071A1 (en) |
Families Citing this family (162)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11334884B2 (en) * | 2012-05-04 | 2022-05-17 | Institutional Cash Distributors Technology, Llc | Encapsulated security tokens for electronic transactions |
| US10489852B2 (en) * | 2013-07-02 | 2019-11-26 | Yodlee, Inc. | Financial account authentication |
| CN104767613B (en) | 2014-01-02 | 2018-02-13 | 腾讯科技(深圳)有限公司 | Signature verification method, apparatus and system |
| US10277616B2 (en) * | 2014-09-25 | 2019-04-30 | Vigilant Ip Holdings Llc | Secure digital traffic analysis |
| US20180314564A1 (en) * | 2015-05-27 | 2018-11-01 | Sampath Kumar Chilukuri | Communication in a federated computing environment |
| US9832024B2 (en) | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
| US10432403B2 (en) * | 2015-11-25 | 2019-10-01 | Fenwal, Inc. | Secure communication between infusion pump and server |
| US10833843B1 (en) | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
| US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
| US10103885B2 (en) * | 2016-01-20 | 2018-10-16 | Mastercard International Incorporated | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography |
| US10007826B2 (en) * | 2016-03-07 | 2018-06-26 | ShoCard, Inc. | Transferring data files using a series of visual codes |
| KR20170118431A (en) * | 2016-04-15 | 2017-10-25 | 삼성전자주식회사 | Electronic device and payment method using the same |
| US10644875B2 (en) | 2016-04-28 | 2020-05-05 | International Business Machines Corporation | Pre-authorization of public key infrastructure |
| WO2017195160A1 (en) | 2016-05-13 | 2017-11-16 | nChain Holdings Limited | A method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger |
| US10291604B2 (en) | 2016-06-03 | 2019-05-14 | Docusign, Inc. | Universal access to document transaction platform |
| US11295316B2 (en) * | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
| US11593797B2 (en) * | 2016-06-12 | 2023-02-28 | Apple Inc. | Authentication using a secure circuit |
| US10425465B1 (en) * | 2016-07-29 | 2019-09-24 | Google Llc | Hybrid cloud API management |
| US10621314B2 (en) | 2016-08-01 | 2020-04-14 | Palantir Technologies Inc. | Secure deployment of a software package |
| US10798093B2 (en) * | 2016-09-19 | 2020-10-06 | Verisign, Inc. | GTLD domain name registries RDAP architecture |
| US10523632B2 (en) | 2016-09-19 | 2019-12-31 | Verisign, Inc. | GTLD domain name registries RDAP architecture |
| US10547457B1 (en) * | 2016-10-21 | 2020-01-28 | Wells Fargo Bank N.A. | Systems and methods for notary agent for public key infrastructure names |
| US10762495B2 (en) * | 2016-12-30 | 2020-09-01 | Square, Inc. | Third-party access to secure hardware |
| US10783517B2 (en) | 2016-12-30 | 2020-09-22 | Square, Inc. | Third-party access to secure hardware |
| US11010352B2 (en) * | 2017-01-23 | 2021-05-18 | Hysolate Ltd. | Unified file system on air-gapped endpoints |
| US11153322B2 (en) * | 2017-01-23 | 2021-10-19 | Hysolate Ltd. | Techniques for seamlessly launching applications in appropriate virtual machines |
| US10699003B2 (en) * | 2017-01-23 | 2020-06-30 | Hysolate Ltd. | Virtual air-gapped endpoint, and methods thereof |
| US11150936B2 (en) | 2017-01-23 | 2021-10-19 | Hysolate Ltd. | Techniques for binding user identities to appropriate virtual machines with single sign-on |
| US10498541B2 (en) | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
| USRE49968E1 (en) | 2017-02-06 | 2024-05-14 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
| US10742638B1 (en) * | 2017-04-27 | 2020-08-11 | EMC IP Holding Company LLC | Stateless principal authentication and authorization in a distributed network |
| US10158626B1 (en) * | 2017-06-16 | 2018-12-18 | International Business Machines Corporation | Token-based access control |
| US10581909B2 (en) | 2017-06-26 | 2020-03-03 | Oath Inc. | Systems and methods for electronic signing of electronic content requests |
| US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
| US10476879B2 (en) * | 2017-07-26 | 2019-11-12 | International Business Machines Corporation | Blockchain authentication via hard/soft token verification |
| US11487868B2 (en) * | 2017-08-01 | 2022-11-01 | Pc Matic, Inc. | System, method, and apparatus for computer security |
| US11681568B1 (en) | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
| US11023292B1 (en) | 2017-08-02 | 2021-06-01 | Styra, Inc. | Method and apparatus for using a single storage structure to authorize APIs |
| JP6904183B2 (en) * | 2017-09-12 | 2021-07-14 | 富士通株式会社 | Information processing equipment, programs and information processing methods |
| US10862883B1 (en) * | 2017-10-09 | 2020-12-08 | Amazon Technologies, Inc. | Custom authorization of network connected devices using signed credentials |
| WO2019102239A1 (en) * | 2017-11-22 | 2019-05-31 | Vilmos Andras | Method for ensuring secure and authorized communications between a first device and a second device |
| US10567156B2 (en) | 2017-11-30 | 2020-02-18 | Bank Of America Corporation | Blockchain-based unexpected data detection |
| WO2019113552A1 (en) | 2017-12-08 | 2019-06-13 | ShoCard, Inc. | Methods and systems for recovering data using dynamic passwords |
| US10698664B2 (en) * | 2017-12-21 | 2020-06-30 | Fujitsu Limited | API mashup generation |
| US11223480B2 (en) * | 2018-01-02 | 2022-01-11 | Cyberark Software Ltd. | Detecting compromised cloud-identity access information |
| CN107919956B (en) * | 2018-01-04 | 2020-09-22 | 重庆邮电大学 | An end-to-end security assurance method for IoT cloud environment |
| US11038923B2 (en) * | 2018-02-16 | 2021-06-15 | Nokia Technologies Oy | Security management in communication systems with security-based architecture using application layer security |
| US10999272B2 (en) * | 2018-03-30 | 2021-05-04 | Lendingclub Corporation | Authenticating and authorizing users with JWT and tokenization |
| US11316693B2 (en) * | 2018-04-13 | 2022-04-26 | Microsoft Technology Licensing, Llc | Trusted platform module-based prepaid access token for commercial IoT online services |
| EP3794799A4 (en) * | 2018-05-12 | 2022-01-12 | Nokia Technologies Oy | SECURITY MANAGEMENT FOR NETWORK FUNCTION MESSAGING IN A COMMUNICATION SYSTEM |
| US10721621B2 (en) * | 2018-05-23 | 2020-07-21 | Cisco Technology, Inc. | Updating policy for a video flow during transitions |
| US11632360B1 (en) | 2018-07-24 | 2023-04-18 | Pure Storage, Inc. | Remote access to a storage device |
| US11444779B2 (en) | 2018-08-02 | 2022-09-13 | Paypal, Inc. | Techniques for securing application programming interface requests using multi-party digital signatures |
| US11853463B1 (en) | 2018-08-23 | 2023-12-26 | Styra, Inc. | Leveraging standard protocols to interface unmodified applications and services |
| US10719373B1 (en) * | 2018-08-23 | 2020-07-21 | Styra, Inc. | Validating policies and data in API authorization system |
| US11080410B1 (en) | 2018-08-24 | 2021-08-03 | Styra, Inc. | Partial policy evaluation |
| JP7228977B2 (en) * | 2018-08-30 | 2023-02-27 | キヤノン株式会社 | Information processing device, authorization system and verification method |
| US10491404B1 (en) * | 2018-09-12 | 2019-11-26 | Hotpyp, Inc. | Systems and methods for cryptographic key generation and authentication |
| WO2020053481A1 (en) * | 2018-09-13 | 2020-03-19 | Nokia Technologies Oy | Network function authentication using a digitally signed service request in a communication system |
| US10965453B2 (en) * | 2018-09-14 | 2021-03-30 | Beijing Jingdong Shangke Information Technology Co., Ltd. | System and method for authenticated encryption based on device fingerprint |
| US11475435B2 (en) * | 2018-09-19 | 2022-10-18 | Jpmorgan Chase Bank, N.A. | Method and system for generating digital wallet accounts |
| US11184162B1 (en) * | 2018-09-28 | 2021-11-23 | NortonLifeLock Inc. | Privacy preserving secure task automation |
| AU2019236667B2 (en) * | 2018-09-28 | 2023-10-05 | Infosys Limited | System and method for decentralized identity management, authentication and authorization of applications |
| US10877825B2 (en) * | 2018-10-04 | 2020-12-29 | Oracle International Corporation | System for offline object based storage and mocking of rest responses |
| CN109150910A (en) * | 2018-10-11 | 2019-01-04 | 平安科技(深圳)有限公司 | Log in token generation and verification method, device and storage medium |
| US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
| US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
| US11140169B1 (en) * | 2018-10-31 | 2021-10-05 | Workday, Inc. | Cloud platform access system |
| US11921884B2 (en) | 2018-11-28 | 2024-03-05 | Visa International Service Association | Techniques for preventing collusion using simultaneous key release |
| US10936191B1 (en) | 2018-12-05 | 2021-03-02 | Pure Storage, Inc. | Access control for a computing system |
| US10938558B2 (en) * | 2018-12-17 | 2021-03-02 | Zebra Technologies Corporation | Authentication for connecting a barcode reader to a client computing device |
| US10938254B2 (en) * | 2018-12-18 | 2021-03-02 | Dell Products, L.P. | Secure wireless charging |
| US20200210257A1 (en) * | 2018-12-28 | 2020-07-02 | Salesforce.Com, Inc. | Deduplication of Application Program Interface Calls |
| CN109450649A (en) * | 2018-12-28 | 2019-03-08 | 北京金山安全软件有限公司 | Gateway verification method and device based on application program interface and electronic equipment |
| US11165575B2 (en) * | 2019-01-02 | 2021-11-02 | Citrix Systems, Inc. | Tracking tainted connection agents |
| US11394712B2 (en) * | 2019-01-18 | 2022-07-19 | Anchor Labs, Inc. | Secure account access |
| EP3895464B1 (en) * | 2019-01-29 | 2025-08-27 | Schneider Electric USA, Inc. | Security context distribution service |
| US10666431B1 (en) * | 2019-03-11 | 2020-05-26 | Capital One Services, Llc | Systems and methods for enhancing web security |
| CA3133066A1 (en) * | 2019-03-12 | 2020-09-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for handling system information |
| US11387983B2 (en) * | 2019-03-25 | 2022-07-12 | Micron Technology, Inc. | Secure medical apparatus communication |
| US11233650B2 (en) | 2019-03-25 | 2022-01-25 | Micron Technology, Inc. | Verifying identity of a vehicle entering a trust zone |
| US11316841B2 (en) * | 2019-03-25 | 2022-04-26 | Micron Technology, Inc. | Secure communication between an intermediary device and a network |
| US11361660B2 (en) * | 2019-03-25 | 2022-06-14 | Micron Technology, Inc. | Verifying identity of an emergency vehicle during operation |
| US11323275B2 (en) | 2019-03-25 | 2022-05-03 | Micron Technology, Inc. | Verification of identity using a secret key |
| US11128474B2 (en) * | 2019-03-25 | 2021-09-21 | Micron Technology, Inc. | Secure device communication |
| US11456880B2 (en) * | 2019-03-25 | 2022-09-27 | Micron Technology, Inc. | Cryptographically secure mechanism for remotely controlling an autonomous vehicle |
| KR102136960B1 (en) | 2019-03-27 | 2020-07-23 | 알리바바 그룹 홀딩 리미티드 | How to retrieve public data for blockchain networks using a highly available trusted execution environment |
| WO2019120325A2 (en) | 2019-03-29 | 2019-06-27 | Alibaba Group Holding Limited | Retrieving access data for blockchain networks using highly available trusted execution environments |
| WO2019179542A2 (en) | 2019-03-27 | 2019-09-26 | Alibaba Group Holding Limited | Improving integrity of communications between blockchain networks and external data sources |
| US11475108B2 (en) * | 2019-04-25 | 2022-10-18 | Stanton Kee Nethery | Secure hardware backdoor for digital devices |
| EP3970335A1 (en) | 2019-05-14 | 2022-03-23 | Vilmos, András | Method for implementing client side credential control to authorize access to a protected device |
| GB201907395D0 (en) * | 2019-05-24 | 2019-07-10 | Nchain Holdings Ltd | Knowledge proof |
| GB201907392D0 (en) | 2019-05-24 | 2019-07-10 | Nchain Holdings Ltd | Proof-of-work |
| CN110149212B (en) * | 2019-05-31 | 2022-05-27 | 杭州安恒信息技术股份有限公司 | Database security reinforcement method and device and electronic equipment |
| US11956279B2 (en) * | 2019-06-12 | 2024-04-09 | Jfrog Ltd | Cyber-security in heterogeneous networks |
| US11190514B2 (en) * | 2019-06-17 | 2021-11-30 | Microsoft Technology Licensing, Llc | Client-server security enhancement using information accessed from access tokens |
| WO2019179535A2 (en) * | 2019-07-02 | 2019-09-26 | Alibaba Group Holding Limited | System and method for verifying verifiable claims |
| CN111164594B (en) * | 2019-07-02 | 2023-08-25 | 创新先进技术有限公司 | System and method for mapping decentralized identities to real entities |
| CN114222991B (en) * | 2019-07-05 | 2025-08-26 | 维萨国际服务协会 | Systems, methods, and computer program products for third-party authorization |
| US11140165B2 (en) * | 2019-07-22 | 2021-10-05 | Bank Of America Corporation | System for selective mapping of distributed resources across network edge framework for authorized user access |
| WO2021019738A1 (en) * | 2019-07-31 | 2021-02-04 | 日本電気株式会社 | Data delivering device and method, data requesting device and method, data delivering system, and computer readable medium |
| EP3987713A1 (en) * | 2019-08-13 | 2022-04-27 | Google LLC | Protecting the integrity of communications from client devices |
| US11122054B2 (en) | 2019-08-27 | 2021-09-14 | Bank Of America Corporation | Security tool |
| CN110543773A (en) * | 2019-08-29 | 2019-12-06 | 北京艾摩瑞策科技有限公司 | Method and device for signing blockchain private key of users of knowledge quiz platform |
| US11159312B2 (en) * | 2019-08-30 | 2021-10-26 | Henry Verheyen | Secure data exchange network |
| EP4009587B1 (en) * | 2019-09-03 | 2025-12-24 | Google LLC | Systems and methods for authenticated control of content delivery |
| US11126752B2 (en) * | 2019-09-04 | 2021-09-21 | Fresenius Medical Care Holdings, Inc. | Authentication of medical device computing systems by using metadata signature |
| CN110611670A (en) * | 2019-09-12 | 2019-12-24 | 贵阳叁玖互联网医疗有限公司 | API request encryption method and device |
| KR102678262B1 (en) | 2019-09-24 | 2024-06-24 | 매직 랩스, 인크. | Non-archival tools for building distributed computer applications |
| WO2021063484A1 (en) * | 2019-09-30 | 2021-04-08 | Huawei Technologies Co., Ltd. | Systems and methods for attestation |
| CN110661813A (en) * | 2019-10-11 | 2020-01-07 | 浪潮软件股份有限公司 | CMSP-based identity authentication implementation method for RESTful service of object storage |
| US11159407B2 (en) | 2019-10-15 | 2021-10-26 | At&T Intellectual Property I, L.P. | Detection of unauthorized cryptomining |
| CN110958226A (en) * | 2019-11-14 | 2020-04-03 | 广州江南科友科技股份有限公司 | Password equipment access control method based on TLS |
| US11640475B1 (en) * | 2019-11-26 | 2023-05-02 | Gobeep, Inc. | Systems and processes for providing secure client controlled and managed exchange of data between parties |
| CN111010385A (en) * | 2019-12-09 | 2020-04-14 | 山东浪潮商用系统有限公司 | RESTful-based secure interaction method |
| CN111162899A (en) * | 2020-01-13 | 2020-05-15 | 成都安联云防保安服务有限公司 | Encryption transmission method for potential safety risk data |
| JP7343035B2 (en) * | 2020-02-27 | 2023-09-12 | 日本電気株式会社 | Data distribution device and method, data request device and method, data distribution system, and program |
| US11757635B2 (en) * | 2020-03-13 | 2023-09-12 | Mavenir Networks, Inc. | Client authentication and access token ownership validation |
| US11463258B2 (en) * | 2020-03-13 | 2022-10-04 | Ebay Inc. | Secure token refresh |
| US11349644B1 (en) * | 2020-04-29 | 2022-05-31 | Wells Fargo Bank, N.A. | Database exclusion (DBX) for multi party access (MPA) to sensitive personal information (SPI) |
| KR20250012204A (en) * | 2020-05-05 | 2025-01-24 | 알렉스 블래이트 | Endpoints and Protocols for Reliable Digital Manufacturing |
| US11562080B2 (en) | 2020-05-08 | 2023-01-24 | International Business Machines Corporation | Secure ingress and egress of data fields through legacy computer systems |
| CN113630251B (en) * | 2020-05-08 | 2024-09-06 | 瞻博网络公司 | Network traffic monitoring or storage using signed uniform resource locators |
| EP3917103A1 (en) * | 2020-05-29 | 2021-12-01 | Siemens Aktiengesellschaft | Method, system, transmitter and receiver for authenticating a transmitter |
| US11405197B2 (en) * | 2020-06-08 | 2022-08-02 | Google Llc | Security token expiration using signing key rotation |
| CN113810173B (en) * | 2020-06-12 | 2024-06-14 | 华为技术有限公司 | A method for verifying application information, a message processing method and a device |
| CN111786798A (en) * | 2020-07-08 | 2020-10-16 | 浪潮云信息技术股份公司 | Rest interface authentication implementation method applied to JavaWeb |
| GB202013340D0 (en) * | 2020-08-26 | 2020-10-07 | Mastercard International Inc | Data management and encryption in a distributed computing system |
| EP3982615B1 (en) * | 2020-10-12 | 2024-09-11 | Nokia Technologies Oy | Authorization in communication networks |
| EP4280546B1 (en) * | 2020-10-26 | 2025-04-30 | Google LLC | Multi-recipient secure communication |
| US11246032B1 (en) * | 2020-10-29 | 2022-02-08 | Motional Ad Llc | Device provisioning and authentication |
| CN112311531B (en) * | 2020-11-05 | 2023-05-30 | 重庆邮电大学 | Controllable front-end and back-end secure communication method |
| US11750397B2 (en) * | 2021-01-04 | 2023-09-05 | International Business Machines Corporation | Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization |
| US12499501B2 (en) * | 2021-01-29 | 2025-12-16 | Techjutsu Properties Inc. | System and method for caller verification |
| US12309268B2 (en) | 2021-02-24 | 2025-05-20 | Cisco Technology, Inc. | Indicating network-based consent contracts using packet-level data |
| US12021754B2 (en) | 2021-02-24 | 2024-06-25 | Cisco Technology, Inc. | Enforcing consent contracts to manage network traffic |
| US12301729B2 (en) | 2021-02-24 | 2025-05-13 | Cisco Technology, Inc. | Centralized consent vendors for managing network-based consent contracts |
| US12184661B2 (en) * | 2021-02-24 | 2024-12-31 | Cisco Technology, Inc. | Creating network-based consent contracts |
| CN113378095B (en) * | 2021-06-30 | 2023-08-04 | 抖音视界有限公司 | Dynamic loading method, device, equipment and storage medium of signature algorithm |
| CN113709109B (en) * | 2021-07-27 | 2024-02-27 | 云南昆钢电子信息科技有限公司 | Safety system and method based on cloud and edge data exchange |
| US12316645B2 (en) * | 2021-07-29 | 2025-05-27 | The Toronto-Dominion Bank | System and methods for secure processing of real-time resource transfers |
| US11968182B2 (en) * | 2021-07-29 | 2024-04-23 | Automation Anywhere, Inc. | Authentication of software robots with gateway proxy for access to cloud-based services |
| US20230177477A1 (en) * | 2021-12-03 | 2023-06-08 | Adp, Inc. | Smartpay allocation as a service |
| CN114386107A (en) * | 2021-12-17 | 2022-04-22 | 浪潮云信息技术股份公司 | MuSig 2-based multiple data signature acceleration method and system |
| CN113938328A (en) * | 2021-12-18 | 2022-01-14 | 中建电子商务有限责任公司 | Interface label checking method and system |
| CN114679275B (en) * | 2022-01-06 | 2024-04-12 | 成都农村商业银行股份有限公司 | Digital signature verification method, platform and system |
| JP2023104089A (en) * | 2022-01-17 | 2023-07-28 | 株式会社日立製作所 | Computer system and key exchange method |
| US11977620B2 (en) * | 2022-01-19 | 2024-05-07 | VMware LLC | Attestation of application identity for inter-app communications |
| US12494900B2 (en) * | 2022-02-01 | 2025-12-09 | Juniper Networks, Inc. | Public key infrastructure based session authentication |
| US12225111B2 (en) * | 2022-03-08 | 2025-02-11 | SanDisk Technologies, Inc. | Authorization requests from a data storage device to multiple manager devices |
| CN114553416A (en) * | 2022-03-18 | 2022-05-27 | 北京友普信息技术有限公司 | Data encryption processing method for signature verification of application program interface |
| US11882057B2 (en) | 2022-03-28 | 2024-01-23 | Bank Of America Corporation | Pluggable cloud security system |
| CN117318961A (en) * | 2022-06-17 | 2023-12-29 | 中兴通讯股份有限公司 | Communication protection methods, systems, electronic equipment and storage media |
| CN115242382B (en) * | 2022-07-04 | 2025-06-13 | 观澜网络(杭州)有限公司 | A data encryption and decryption method, system and storage medium for a multi-tenant model |
| US12261826B2 (en) | 2022-07-05 | 2025-03-25 | Cisco Technology, Inc. | Systems and methods for redirecting service and API calls for containerized applications |
| US11818276B1 (en) * | 2022-10-07 | 2023-11-14 | Uab 360 It | Optimized header information to enable access control |
| CN115913755A (en) * | 2022-12-07 | 2023-04-04 | 重庆紫光华山智安科技有限公司 | Data encryption transmission method, device, equipment and medium |
| CN120303900A (en) * | 2022-12-19 | 2025-07-11 | 维萨国际服务协会 | Method and system for improving computer network security |
| JP2024149245A (en) * | 2023-04-07 | 2024-10-18 | オムロン株式会社 | Authentication relay server |
| US20240406260A1 (en) * | 2023-05-31 | 2024-12-05 | T-Mobile Usa, Inc. | Synchronization of data in an asynchronous environment |
| CN116865980A (en) * | 2023-09-05 | 2023-10-10 | 杭州比智科技有限公司 | Method and system for realizing tamper resistance by adding signature based on SHA-256 Hash algorithm interface |
| CN119276639B (en) * | 2024-12-09 | 2025-04-29 | 深圳市永达电子信息股份有限公司 | Firewall protection method, system, device and storage medium based on enhanced content analysis and mutual authentication |
Family Cites Families (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7620980B1 (en) | 1999-07-21 | 2009-11-17 | Sun Microsystems, Inc. | Secure data broker |
| CN1653459B (en) * | 2001-06-12 | 2010-12-15 | 捷讯研究有限公司 | System and method for processing encoded messages exchanged with a mobile data communications device |
| US7243370B2 (en) | 2001-06-14 | 2007-07-10 | Microsoft Corporation | Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication |
| US8126722B2 (en) * | 2001-12-20 | 2012-02-28 | Verizon Business Global Llc | Application infrastructure platform (AIP) |
| GB2384404B (en) * | 2002-01-18 | 2005-02-16 | Sun Microsystems Inc | Key management |
| US7240366B2 (en) | 2002-05-17 | 2007-07-03 | Microsoft Corporation | End-to-end authentication of session initiation protocol messages using certificates |
| US7702636B1 (en) * | 2002-07-31 | 2010-04-20 | Cadence Design Systems, Inc. | Federated system and methods and mechanisms of implementing and using such a system |
| US7421732B2 (en) * | 2003-05-05 | 2008-09-02 | Nokia Corporation | System, apparatus, and method for providing generic internet protocol authentication |
| US20050154889A1 (en) * | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol |
| EP2157759B1 (en) * | 2004-09-07 | 2013-01-09 | Research In Motion Limited | System and method for updating message trust status |
| US20070180512A1 (en) * | 2005-10-21 | 2007-08-02 | Hewlett-Packard Development Company, L.P. | Methods of setting up and operating a reverse channel across a firewall |
| US7814538B2 (en) * | 2005-12-13 | 2010-10-12 | Microsoft Corporation | Two-way authentication using a combined code |
| CN101001144B (en) * | 2006-01-13 | 2010-05-12 | 华为技术有限公司 | A Method for Realizing Authentication by Entity Authentication Center |
| CN101136748B (en) * | 2006-08-31 | 2012-03-07 | 普天信息技术研究院 | Identification authentication method and system |
| US7886339B2 (en) * | 2007-01-20 | 2011-02-08 | International Business Machines Corporation | Radius security origin check |
| EP2156636A2 (en) * | 2007-05-16 | 2010-02-24 | Panasonic Corporation | Methods in mixed network and host-based mobility management |
| CN100518063C (en) * | 2007-06-19 | 2009-07-22 | 北京握奇数据系统有限公司 | Method and device for physical authentication |
| US8701180B2 (en) * | 2009-12-04 | 2014-04-15 | Sap Ag | Securing communications between different network zones |
| US9100171B1 (en) * | 2009-12-17 | 2015-08-04 | Secure Forward, LLC | Computer-implemented forum for enabling secure exchange of information |
| US20110173443A1 (en) * | 2010-01-12 | 2011-07-14 | Phion Ag | Secure extranet server |
| WO2011141579A2 (en) | 2010-05-14 | 2011-11-17 | Gemalto Sa | System and method for providing security for cloud computing resources using portable security devices |
| US8458808B2 (en) * | 2011-01-07 | 2013-06-04 | Mastercard International Incorporated | Premium access to open application programming interface systems and methods |
| US9032204B2 (en) * | 2011-01-07 | 2015-05-12 | Mastercard International Incorporated | Methods and systems for providing a signed digital certificate in real time |
| US9130937B1 (en) * | 2011-03-07 | 2015-09-08 | Raytheon Company | Validating network communications |
| US9705854B2 (en) * | 2012-07-09 | 2017-07-11 | Massachusetts Institute Of Technology | Cryptography and key management device and architecture |
| US9225675B2 (en) | 2012-08-08 | 2015-12-29 | Amazon Technologies, Inc. | Data storage application programming interface |
| US8719280B1 (en) | 2012-10-16 | 2014-05-06 | Google Inc. | Person-based information aggregation |
| EP2849407B1 (en) * | 2013-09-17 | 2016-11-16 | FIREGLASS Ltd. | Method and system for prevention of malware infections |
| US9313227B2 (en) * | 2013-09-17 | 2016-04-12 | Amigon Technologies Ltd. | Gateway-based audit log and method for prevention of data leakage |
| EP3320447A4 (en) * | 2015-07-07 | 2019-05-22 | Private Machines Inc. | REMOVABLE, SHARABLE, SECURE REMOTE STORAGE SYSTEM AND METHOD THEREOF |
| US9832024B2 (en) | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
-
2015
- 2015-11-13 US US14/941,364 patent/US9832024B2/en active Active
-
2016
- 2016-10-19 SG SG10202101692RA patent/SG10202101692RA/en unknown
- 2016-10-19 HK HK18115173.7A patent/HK1256235A1/en unknown
- 2016-10-19 EP EP21186266.9A patent/EP3913854B1/en active Active
- 2016-10-19 AU AU2016351458A patent/AU2016351458A1/en not_active Withdrawn
- 2016-10-19 EP EP16864748.5A patent/EP3375135B1/en active Active
- 2016-10-19 CN CN201680066079.5A patent/CN108432180B/en active Active
- 2016-10-19 WO PCT/US2016/057744 patent/WO2017083071A1/en not_active Ceased
-
2017
- 2017-10-30 US US15/798,289 patent/US10153907B2/en active Active
-
2018
- 2018-11-06 US US16/182,176 patent/US11088853B2/en active Active
-
2021
- 2021-07-12 US US17/373,037 patent/US11588649B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| CN108432180B (en) | 2022-02-25 |
| US9832024B2 (en) | 2017-11-28 |
| CN108432180A (en) | 2018-08-21 |
| HK1256235A1 (en) | 2019-09-20 |
| US11088853B2 (en) | 2021-08-10 |
| US10153907B2 (en) | 2018-12-11 |
| US20210344512A1 (en) | 2021-11-04 |
| AU2016351458A1 (en) | 2018-04-19 |
| EP3913854B1 (en) | 2024-03-13 |
| US20180062858A1 (en) | 2018-03-01 |
| EP3375135A4 (en) | 2018-09-19 |
| US20190074979A1 (en) | 2019-03-07 |
| US11588649B2 (en) | 2023-02-21 |
| US20170141926A1 (en) | 2017-05-18 |
| EP3375135B1 (en) | 2021-08-18 |
| EP3375135A1 (en) | 2018-09-19 |
| EP3913854A1 (en) | 2021-11-24 |
| WO2017083071A1 (en) | 2017-05-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| SG10202101692RA (en) | Methods and systems for pki-based authentication | |
| ZA201707978B (en) | Authentication methods and systems | |
| EP3353728A4 (en) | Authentication systems and methods | |
| GB201621453D0 (en) | Systems and methods for multi-stage identity authentication | |
| GB201602969D0 (en) | Method and system for authentication | |
| SG11201606403YA (en) | Authentication system and method | |
| HK1245941A1 (en) | Authentication methods and systems | |
| HK1254695A1 (en) | Authentication methods and systems | |
| SG11201706770UA (en) | Methods, apparatus, and systems for identity authentication | |
| PT3191997T (en) | Systems and methods for hybrid hardware authentication | |
| ZA201801964B (en) | Systems and methods for product authentication | |
| IL258926B (en) | Interception-proof authentication and encryption system and method | |
| SG10201407627SA (en) | Authentication system and method | |
| GB201621176D0 (en) | Authentication systems and methods | |
| ZA201801349B (en) | Methods and systems for authentication using zero-knowledge code | |
| GB201505332D0 (en) | Authentication system | |
| HK1258246B (en) | Authentication methods and systems | |
| GB201509031D0 (en) | Authentication methods and systems | |
| GB201509030D0 (en) | Authentication methods and systems | |
| HK1237921B (en) | Authentication methods and systems | |
| GB201618360D0 (en) | Authentication method and system | |
| HK1231988B (en) | Authentication methods and systems | |
| HK1231988A1 (en) | Authentication methods and systems | |
| GB201615363D0 (en) | Authentication system |