[go: up one dir, main page]

SG10202101692RA - Methods and systems for pki-based authentication - Google Patents

Methods and systems for pki-based authentication

Info

Publication number
SG10202101692RA
SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA
Authority
SG
Singapore
Prior art keywords
pki
systems
methods
based authentication
authentication
Prior art date
Application number
SG10202101692RA
Inventor
Minghua Xu
Jose Trevino
Ying Hao
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG10202101692RA publication Critical patent/SG10202101692RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)
SG10202101692RA 2015-11-13 2016-10-19 Methods and systems for pki-based authentication SG10202101692RA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/941,364 US9832024B2 (en) 2015-11-13 2015-11-13 Methods and systems for PKI-based authentication

Publications (1)

Publication Number Publication Date
SG10202101692RA true SG10202101692RA (en) 2021-04-29

Family

ID=58691535

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10202101692RA SG10202101692RA (en) 2015-11-13 2016-10-19 Methods and systems for pki-based authentication

Country Status (7)

Country Link
US (4) US9832024B2 (en)
EP (2) EP3913854B1 (en)
CN (1) CN108432180B (en)
AU (1) AU2016351458A1 (en)
HK (1) HK1256235A1 (en)
SG (1) SG10202101692RA (en)
WO (1) WO2017083071A1 (en)

Families Citing this family (162)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11334884B2 (en) * 2012-05-04 2022-05-17 Institutional Cash Distributors Technology, Llc Encapsulated security tokens for electronic transactions
US10489852B2 (en) * 2013-07-02 2019-11-26 Yodlee, Inc. Financial account authentication
CN104767613B (en) 2014-01-02 2018-02-13 腾讯科技(深圳)有限公司 Signature verification method, apparatus and system
US10277616B2 (en) * 2014-09-25 2019-04-30 Vigilant Ip Holdings Llc Secure digital traffic analysis
US20180314564A1 (en) * 2015-05-27 2018-11-01 Sampath Kumar Chilukuri Communication in a federated computing environment
US9832024B2 (en) 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication
US10432403B2 (en) * 2015-11-25 2019-10-01 Fenwal, Inc. Secure communication between infusion pump and server
US10833843B1 (en) 2015-12-03 2020-11-10 United Services Automobile Association (USAA0 Managing blockchain access
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US10103885B2 (en) * 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
US10007826B2 (en) * 2016-03-07 2018-06-26 ShoCard, Inc. Transferring data files using a series of visual codes
KR20170118431A (en) * 2016-04-15 2017-10-25 삼성전자주식회사 Electronic device and payment method using the same
US10644875B2 (en) 2016-04-28 2020-05-05 International Business Machines Corporation Pre-authorization of public key infrastructure
WO2017195160A1 (en) 2016-05-13 2017-11-16 nChain Holdings Limited A method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger
US10291604B2 (en) 2016-06-03 2019-05-14 Docusign, Inc. Universal access to document transaction platform
US11295316B2 (en) * 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11593797B2 (en) * 2016-06-12 2023-02-28 Apple Inc. Authentication using a secure circuit
US10425465B1 (en) * 2016-07-29 2019-09-24 Google Llc Hybrid cloud API management
US10621314B2 (en) 2016-08-01 2020-04-14 Palantir Technologies Inc. Secure deployment of a software package
US10798093B2 (en) * 2016-09-19 2020-10-06 Verisign, Inc. GTLD domain name registries RDAP architecture
US10523632B2 (en) 2016-09-19 2019-12-31 Verisign, Inc. GTLD domain name registries RDAP architecture
US10547457B1 (en) * 2016-10-21 2020-01-28 Wells Fargo Bank N.A. Systems and methods for notary agent for public key infrastructure names
US10762495B2 (en) * 2016-12-30 2020-09-01 Square, Inc. Third-party access to secure hardware
US10783517B2 (en) 2016-12-30 2020-09-22 Square, Inc. Third-party access to secure hardware
US11010352B2 (en) * 2017-01-23 2021-05-18 Hysolate Ltd. Unified file system on air-gapped endpoints
US11153322B2 (en) * 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for seamlessly launching applications in appropriate virtual machines
US10699003B2 (en) * 2017-01-23 2020-06-30 Hysolate Ltd. Virtual air-gapped endpoint, and methods thereof
US11150936B2 (en) 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for binding user identities to appropriate virtual machines with single sign-on
US10498541B2 (en) 2017-02-06 2019-12-03 ShocCard, Inc. Electronic identification verification methods and systems
USRE49968E1 (en) 2017-02-06 2024-05-14 Ping Identity Corporation Electronic identification verification methods and systems with storage of certification records to a side chain
US10742638B1 (en) * 2017-04-27 2020-08-11 EMC IP Holding Company LLC Stateless principal authentication and authorization in a distributed network
US10158626B1 (en) * 2017-06-16 2018-12-18 International Business Machines Corporation Token-based access control
US10581909B2 (en) 2017-06-26 2020-03-03 Oath Inc. Systems and methods for electronic signing of electronic content requests
US10819696B2 (en) * 2017-07-13 2020-10-27 Microsoft Technology Licensing, Llc Key attestation statement generation providing device anonymity
US10476879B2 (en) * 2017-07-26 2019-11-12 International Business Machines Corporation Blockchain authentication via hard/soft token verification
US11487868B2 (en) * 2017-08-01 2022-11-01 Pc Matic, Inc. System, method, and apparatus for computer security
US11681568B1 (en) 2017-08-02 2023-06-20 Styra, Inc. Method and apparatus to reduce the window for policy violations with minimal consistency assumptions
US11023292B1 (en) 2017-08-02 2021-06-01 Styra, Inc. Method and apparatus for using a single storage structure to authorize APIs
JP6904183B2 (en) * 2017-09-12 2021-07-14 富士通株式会社 Information processing equipment, programs and information processing methods
US10862883B1 (en) * 2017-10-09 2020-12-08 Amazon Technologies, Inc. Custom authorization of network connected devices using signed credentials
WO2019102239A1 (en) * 2017-11-22 2019-05-31 Vilmos Andras Method for ensuring secure and authorized communications between a first device and a second device
US10567156B2 (en) 2017-11-30 2020-02-18 Bank Of America Corporation Blockchain-based unexpected data detection
WO2019113552A1 (en) 2017-12-08 2019-06-13 ShoCard, Inc. Methods and systems for recovering data using dynamic passwords
US10698664B2 (en) * 2017-12-21 2020-06-30 Fujitsu Limited API mashup generation
US11223480B2 (en) * 2018-01-02 2022-01-11 Cyberark Software Ltd. Detecting compromised cloud-identity access information
CN107919956B (en) * 2018-01-04 2020-09-22 重庆邮电大学 An end-to-end security assurance method for IoT cloud environment
US11038923B2 (en) * 2018-02-16 2021-06-15 Nokia Technologies Oy Security management in communication systems with security-based architecture using application layer security
US10999272B2 (en) * 2018-03-30 2021-05-04 Lendingclub Corporation Authenticating and authorizing users with JWT and tokenization
US11316693B2 (en) * 2018-04-13 2022-04-26 Microsoft Technology Licensing, Llc Trusted platform module-based prepaid access token for commercial IoT online services
EP3794799A4 (en) * 2018-05-12 2022-01-12 Nokia Technologies Oy SECURITY MANAGEMENT FOR NETWORK FUNCTION MESSAGING IN A COMMUNICATION SYSTEM
US10721621B2 (en) * 2018-05-23 2020-07-21 Cisco Technology, Inc. Updating policy for a video flow during transitions
US11632360B1 (en) 2018-07-24 2023-04-18 Pure Storage, Inc. Remote access to a storage device
US11444779B2 (en) 2018-08-02 2022-09-13 Paypal, Inc. Techniques for securing application programming interface requests using multi-party digital signatures
US11853463B1 (en) 2018-08-23 2023-12-26 Styra, Inc. Leveraging standard protocols to interface unmodified applications and services
US10719373B1 (en) * 2018-08-23 2020-07-21 Styra, Inc. Validating policies and data in API authorization system
US11080410B1 (en) 2018-08-24 2021-08-03 Styra, Inc. Partial policy evaluation
JP7228977B2 (en) * 2018-08-30 2023-02-27 キヤノン株式会社 Information processing device, authorization system and verification method
US10491404B1 (en) * 2018-09-12 2019-11-26 Hotpyp, Inc. Systems and methods for cryptographic key generation and authentication
WO2020053481A1 (en) * 2018-09-13 2020-03-19 Nokia Technologies Oy Network function authentication using a digitally signed service request in a communication system
US10965453B2 (en) * 2018-09-14 2021-03-30 Beijing Jingdong Shangke Information Technology Co., Ltd. System and method for authenticated encryption based on device fingerprint
US11475435B2 (en) * 2018-09-19 2022-10-18 Jpmorgan Chase Bank, N.A. Method and system for generating digital wallet accounts
US11184162B1 (en) * 2018-09-28 2021-11-23 NortonLifeLock Inc. Privacy preserving secure task automation
AU2019236667B2 (en) * 2018-09-28 2023-10-05 Infosys Limited System and method for decentralized identity management, authentication and authorization of applications
US10877825B2 (en) * 2018-10-04 2020-12-29 Oracle International Corporation System for offline object based storage and mocking of rest responses
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
US10979227B2 (en) 2018-10-17 2021-04-13 Ping Identity Corporation Blockchain ID connect
US11082221B2 (en) 2018-10-17 2021-08-03 Ping Identity Corporation Methods and systems for creating and recovering accounts using dynamic passwords
US11140169B1 (en) * 2018-10-31 2021-10-05 Workday, Inc. Cloud platform access system
US11921884B2 (en) 2018-11-28 2024-03-05 Visa International Service Association Techniques for preventing collusion using simultaneous key release
US10936191B1 (en) 2018-12-05 2021-03-02 Pure Storage, Inc. Access control for a computing system
US10938558B2 (en) * 2018-12-17 2021-03-02 Zebra Technologies Corporation Authentication for connecting a barcode reader to a client computing device
US10938254B2 (en) * 2018-12-18 2021-03-02 Dell Products, L.P. Secure wireless charging
US20200210257A1 (en) * 2018-12-28 2020-07-02 Salesforce.Com, Inc. Deduplication of Application Program Interface Calls
CN109450649A (en) * 2018-12-28 2019-03-08 北京金山安全软件有限公司 Gateway verification method and device based on application program interface and electronic equipment
US11165575B2 (en) * 2019-01-02 2021-11-02 Citrix Systems, Inc. Tracking tainted connection agents
US11394712B2 (en) * 2019-01-18 2022-07-19 Anchor Labs, Inc. Secure account access
EP3895464B1 (en) * 2019-01-29 2025-08-27 Schneider Electric USA, Inc. Security context distribution service
US10666431B1 (en) * 2019-03-11 2020-05-26 Capital One Services, Llc Systems and methods for enhancing web security
CA3133066A1 (en) * 2019-03-12 2020-09-17 Telefonaktiebolaget Lm Ericsson (Publ) Method and nodes for handling system information
US11387983B2 (en) * 2019-03-25 2022-07-12 Micron Technology, Inc. Secure medical apparatus communication
US11233650B2 (en) 2019-03-25 2022-01-25 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone
US11316841B2 (en) * 2019-03-25 2022-04-26 Micron Technology, Inc. Secure communication between an intermediary device and a network
US11361660B2 (en) * 2019-03-25 2022-06-14 Micron Technology, Inc. Verifying identity of an emergency vehicle during operation
US11323275B2 (en) 2019-03-25 2022-05-03 Micron Technology, Inc. Verification of identity using a secret key
US11128474B2 (en) * 2019-03-25 2021-09-21 Micron Technology, Inc. Secure device communication
US11456880B2 (en) * 2019-03-25 2022-09-27 Micron Technology, Inc. Cryptographically secure mechanism for remotely controlling an autonomous vehicle
KR102136960B1 (en) 2019-03-27 2020-07-23 알리바바 그룹 홀딩 리미티드 How to retrieve public data for blockchain networks using a highly available trusted execution environment
WO2019120325A2 (en) 2019-03-29 2019-06-27 Alibaba Group Holding Limited Retrieving access data for blockchain networks using highly available trusted execution environments
WO2019179542A2 (en) 2019-03-27 2019-09-26 Alibaba Group Holding Limited Improving integrity of communications between blockchain networks and external data sources
US11475108B2 (en) * 2019-04-25 2022-10-18 Stanton Kee Nethery Secure hardware backdoor for digital devices
EP3970335A1 (en) 2019-05-14 2022-03-23 Vilmos, András Method for implementing client side credential control to authorize access to a protected device
GB201907395D0 (en) * 2019-05-24 2019-07-10 Nchain Holdings Ltd Knowledge proof
GB201907392D0 (en) 2019-05-24 2019-07-10 Nchain Holdings Ltd Proof-of-work
CN110149212B (en) * 2019-05-31 2022-05-27 杭州安恒信息技术股份有限公司 Database security reinforcement method and device and electronic equipment
US11956279B2 (en) * 2019-06-12 2024-04-09 Jfrog Ltd Cyber-security in heterogeneous networks
US11190514B2 (en) * 2019-06-17 2021-11-30 Microsoft Technology Licensing, Llc Client-server security enhancement using information accessed from access tokens
WO2019179535A2 (en) * 2019-07-02 2019-09-26 Alibaba Group Holding Limited System and method for verifying verifiable claims
CN111164594B (en) * 2019-07-02 2023-08-25 创新先进技术有限公司 System and method for mapping decentralized identities to real entities
CN114222991B (en) * 2019-07-05 2025-08-26 维萨国际服务协会 Systems, methods, and computer program products for third-party authorization
US11140165B2 (en) * 2019-07-22 2021-10-05 Bank Of America Corporation System for selective mapping of distributed resources across network edge framework for authorized user access
WO2021019738A1 (en) * 2019-07-31 2021-02-04 日本電気株式会社 Data delivering device and method, data requesting device and method, data delivering system, and computer readable medium
EP3987713A1 (en) * 2019-08-13 2022-04-27 Google LLC Protecting the integrity of communications from client devices
US11122054B2 (en) 2019-08-27 2021-09-14 Bank Of America Corporation Security tool
CN110543773A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Method and device for signing blockchain private key of users of knowledge quiz platform
US11159312B2 (en) * 2019-08-30 2021-10-26 Henry Verheyen Secure data exchange network
EP4009587B1 (en) * 2019-09-03 2025-12-24 Google LLC Systems and methods for authenticated control of content delivery
US11126752B2 (en) * 2019-09-04 2021-09-21 Fresenius Medical Care Holdings, Inc. Authentication of medical device computing systems by using metadata signature
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device
KR102678262B1 (en) 2019-09-24 2024-06-24 매직 랩스, 인크. Non-archival tools for building distributed computer applications
WO2021063484A1 (en) * 2019-09-30 2021-04-08 Huawei Technologies Co., Ltd. Systems and methods for attestation
CN110661813A (en) * 2019-10-11 2020-01-07 浪潮软件股份有限公司 CMSP-based identity authentication implementation method for RESTful service of object storage
US11159407B2 (en) 2019-10-15 2021-10-26 At&T Intellectual Property I, L.P. Detection of unauthorized cryptomining
CN110958226A (en) * 2019-11-14 2020-04-03 广州江南科友科技股份有限公司 Password equipment access control method based on TLS
US11640475B1 (en) * 2019-11-26 2023-05-02 Gobeep, Inc. Systems and processes for providing secure client controlled and managed exchange of data between parties
CN111010385A (en) * 2019-12-09 2020-04-14 山东浪潮商用系统有限公司 RESTful-based secure interaction method
CN111162899A (en) * 2020-01-13 2020-05-15 成都安联云防保安服务有限公司 Encryption transmission method for potential safety risk data
JP7343035B2 (en) * 2020-02-27 2023-09-12 日本電気株式会社 Data distribution device and method, data request device and method, data distribution system, and program
US11757635B2 (en) * 2020-03-13 2023-09-12 Mavenir Networks, Inc. Client authentication and access token ownership validation
US11463258B2 (en) * 2020-03-13 2022-10-04 Ebay Inc. Secure token refresh
US11349644B1 (en) * 2020-04-29 2022-05-31 Wells Fargo Bank, N.A. Database exclusion (DBX) for multi party access (MPA) to sensitive personal information (SPI)
KR20250012204A (en) * 2020-05-05 2025-01-24 알렉스 블래이트 Endpoints and Protocols for Reliable Digital Manufacturing
US11562080B2 (en) 2020-05-08 2023-01-24 International Business Machines Corporation Secure ingress and egress of data fields through legacy computer systems
CN113630251B (en) * 2020-05-08 2024-09-06 瞻博网络公司 Network traffic monitoring or storage using signed uniform resource locators
EP3917103A1 (en) * 2020-05-29 2021-12-01 Siemens Aktiengesellschaft Method, system, transmitter and receiver for authenticating a transmitter
US11405197B2 (en) * 2020-06-08 2022-08-02 Google Llc Security token expiration using signing key rotation
CN113810173B (en) * 2020-06-12 2024-06-14 华为技术有限公司 A method for verifying application information, a message processing method and a device
CN111786798A (en) * 2020-07-08 2020-10-16 浪潮云信息技术股份公司 Rest interface authentication implementation method applied to JavaWeb
GB202013340D0 (en) * 2020-08-26 2020-10-07 Mastercard International Inc Data management and encryption in a distributed computing system
EP3982615B1 (en) * 2020-10-12 2024-09-11 Nokia Technologies Oy Authorization in communication networks
EP4280546B1 (en) * 2020-10-26 2025-04-30 Google LLC Multi-recipient secure communication
US11246032B1 (en) * 2020-10-29 2022-02-08 Motional Ad Llc Device provisioning and authentication
CN112311531B (en) * 2020-11-05 2023-05-30 重庆邮电大学 Controllable front-end and back-end secure communication method
US11750397B2 (en) * 2021-01-04 2023-09-05 International Business Machines Corporation Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization
US12499501B2 (en) * 2021-01-29 2025-12-16 Techjutsu Properties Inc. System and method for caller verification
US12309268B2 (en) 2021-02-24 2025-05-20 Cisco Technology, Inc. Indicating network-based consent contracts using packet-level data
US12021754B2 (en) 2021-02-24 2024-06-25 Cisco Technology, Inc. Enforcing consent contracts to manage network traffic
US12301729B2 (en) 2021-02-24 2025-05-13 Cisco Technology, Inc. Centralized consent vendors for managing network-based consent contracts
US12184661B2 (en) * 2021-02-24 2024-12-31 Cisco Technology, Inc. Creating network-based consent contracts
CN113378095B (en) * 2021-06-30 2023-08-04 抖音视界有限公司 Dynamic loading method, device, equipment and storage medium of signature algorithm
CN113709109B (en) * 2021-07-27 2024-02-27 云南昆钢电子信息科技有限公司 Safety system and method based on cloud and edge data exchange
US12316645B2 (en) * 2021-07-29 2025-05-27 The Toronto-Dominion Bank System and methods for secure processing of real-time resource transfers
US11968182B2 (en) * 2021-07-29 2024-04-23 Automation Anywhere, Inc. Authentication of software robots with gateway proxy for access to cloud-based services
US20230177477A1 (en) * 2021-12-03 2023-06-08 Adp, Inc. Smartpay allocation as a service
CN114386107A (en) * 2021-12-17 2022-04-22 浪潮云信息技术股份公司 MuSig 2-based multiple data signature acceleration method and system
CN113938328A (en) * 2021-12-18 2022-01-14 中建电子商务有限责任公司 Interface label checking method and system
CN114679275B (en) * 2022-01-06 2024-04-12 成都农村商业银行股份有限公司 Digital signature verification method, platform and system
JP2023104089A (en) * 2022-01-17 2023-07-28 株式会社日立製作所 Computer system and key exchange method
US11977620B2 (en) * 2022-01-19 2024-05-07 VMware LLC Attestation of application identity for inter-app communications
US12494900B2 (en) * 2022-02-01 2025-12-09 Juniper Networks, Inc. Public key infrastructure based session authentication
US12225111B2 (en) * 2022-03-08 2025-02-11 SanDisk Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
CN114553416A (en) * 2022-03-18 2022-05-27 北京友普信息技术有限公司 Data encryption processing method for signature verification of application program interface
US11882057B2 (en) 2022-03-28 2024-01-23 Bank Of America Corporation Pluggable cloud security system
CN117318961A (en) * 2022-06-17 2023-12-29 中兴通讯股份有限公司 Communication protection methods, systems, electronic equipment and storage media
CN115242382B (en) * 2022-07-04 2025-06-13 观澜网络(杭州)有限公司 A data encryption and decryption method, system and storage medium for a multi-tenant model
US12261826B2 (en) 2022-07-05 2025-03-25 Cisco Technology, Inc. Systems and methods for redirecting service and API calls for containerized applications
US11818276B1 (en) * 2022-10-07 2023-11-14 Uab 360 It Optimized header information to enable access control
CN115913755A (en) * 2022-12-07 2023-04-04 重庆紫光华山智安科技有限公司 Data encryption transmission method, device, equipment and medium
CN120303900A (en) * 2022-12-19 2025-07-11 维萨国际服务协会 Method and system for improving computer network security
JP2024149245A (en) * 2023-04-07 2024-10-18 オムロン株式会社 Authentication relay server
US20240406260A1 (en) * 2023-05-31 2024-12-05 T-Mobile Usa, Inc. Synchronization of data in an asynchronous environment
CN116865980A (en) * 2023-09-05 2023-10-10 杭州比智科技有限公司 Method and system for realizing tamper resistance by adding signature based on SHA-256 Hash algorithm interface
CN119276639B (en) * 2024-12-09 2025-04-29 深圳市永达电子信息股份有限公司 Firewall protection method, system, device and storage medium based on enhanced content analysis and mutual authentication

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7620980B1 (en) 1999-07-21 2009-11-17 Sun Microsystems, Inc. Secure data broker
CN1653459B (en) * 2001-06-12 2010-12-15 捷讯研究有限公司 System and method for processing encoded messages exchanged with a mobile data communications device
US7243370B2 (en) 2001-06-14 2007-07-10 Microsoft Corporation Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication
US8126722B2 (en) * 2001-12-20 2012-02-28 Verizon Business Global Llc Application infrastructure platform (AIP)
GB2384404B (en) * 2002-01-18 2005-02-16 Sun Microsystems Inc Key management
US7240366B2 (en) 2002-05-17 2007-07-03 Microsoft Corporation End-to-end authentication of session initiation protocol messages using certificates
US7702636B1 (en) * 2002-07-31 2010-04-20 Cadence Design Systems, Inc. Federated system and methods and mechanisms of implementing and using such a system
US7421732B2 (en) * 2003-05-05 2008-09-02 Nokia Corporation System, apparatus, and method for providing generic internet protocol authentication
US20050154889A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol
EP2157759B1 (en) * 2004-09-07 2013-01-09 Research In Motion Limited System and method for updating message trust status
US20070180512A1 (en) * 2005-10-21 2007-08-02 Hewlett-Packard Development Company, L.P. Methods of setting up and operating a reverse channel across a firewall
US7814538B2 (en) * 2005-12-13 2010-10-12 Microsoft Corporation Two-way authentication using a combined code
CN101001144B (en) * 2006-01-13 2010-05-12 华为技术有限公司 A Method for Realizing Authentication by Entity Authentication Center
CN101136748B (en) * 2006-08-31 2012-03-07 普天信息技术研究院 Identification authentication method and system
US7886339B2 (en) * 2007-01-20 2011-02-08 International Business Machines Corporation Radius security origin check
EP2156636A2 (en) * 2007-05-16 2010-02-24 Panasonic Corporation Methods in mixed network and host-based mobility management
CN100518063C (en) * 2007-06-19 2009-07-22 北京握奇数据系统有限公司 Method and device for physical authentication
US8701180B2 (en) * 2009-12-04 2014-04-15 Sap Ag Securing communications between different network zones
US9100171B1 (en) * 2009-12-17 2015-08-04 Secure Forward, LLC Computer-implemented forum for enabling secure exchange of information
US20110173443A1 (en) * 2010-01-12 2011-07-14 Phion Ag Secure extranet server
WO2011141579A2 (en) 2010-05-14 2011-11-17 Gemalto Sa System and method for providing security for cloud computing resources using portable security devices
US8458808B2 (en) * 2011-01-07 2013-06-04 Mastercard International Incorporated Premium access to open application programming interface systems and methods
US9032204B2 (en) * 2011-01-07 2015-05-12 Mastercard International Incorporated Methods and systems for providing a signed digital certificate in real time
US9130937B1 (en) * 2011-03-07 2015-09-08 Raytheon Company Validating network communications
US9705854B2 (en) * 2012-07-09 2017-07-11 Massachusetts Institute Of Technology Cryptography and key management device and architecture
US9225675B2 (en) 2012-08-08 2015-12-29 Amazon Technologies, Inc. Data storage application programming interface
US8719280B1 (en) 2012-10-16 2014-05-06 Google Inc. Person-based information aggregation
EP2849407B1 (en) * 2013-09-17 2016-11-16 FIREGLASS Ltd. Method and system for prevention of malware infections
US9313227B2 (en) * 2013-09-17 2016-04-12 Amigon Technologies Ltd. Gateway-based audit log and method for prevention of data leakage
EP3320447A4 (en) * 2015-07-07 2019-05-22 Private Machines Inc. REMOVABLE, SHARABLE, SECURE REMOTE STORAGE SYSTEM AND METHOD THEREOF
US9832024B2 (en) 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication

Also Published As

Publication number Publication date
CN108432180B (en) 2022-02-25
US9832024B2 (en) 2017-11-28
CN108432180A (en) 2018-08-21
HK1256235A1 (en) 2019-09-20
US11088853B2 (en) 2021-08-10
US10153907B2 (en) 2018-12-11
US20210344512A1 (en) 2021-11-04
AU2016351458A1 (en) 2018-04-19
EP3913854B1 (en) 2024-03-13
US20180062858A1 (en) 2018-03-01
EP3375135A4 (en) 2018-09-19
US20190074979A1 (en) 2019-03-07
US11588649B2 (en) 2023-02-21
US20170141926A1 (en) 2017-05-18
EP3375135B1 (en) 2021-08-18
EP3375135A1 (en) 2018-09-19
EP3913854A1 (en) 2021-11-24
WO2017083071A1 (en) 2017-05-18

Similar Documents

Publication Publication Date Title
SG10202101692RA (en) Methods and systems for pki-based authentication
ZA201707978B (en) Authentication methods and systems
EP3353728A4 (en) Authentication systems and methods
GB201621453D0 (en) Systems and methods for multi-stage identity authentication
GB201602969D0 (en) Method and system for authentication
SG11201606403YA (en) Authentication system and method
HK1245941A1 (en) Authentication methods and systems
HK1254695A1 (en) Authentication methods and systems
SG11201706770UA (en) Methods, apparatus, and systems for identity authentication
PT3191997T (en) Systems and methods for hybrid hardware authentication
ZA201801964B (en) Systems and methods for product authentication
IL258926B (en) Interception-proof authentication and encryption system and method
SG10201407627SA (en) Authentication system and method
GB201621176D0 (en) Authentication systems and methods
ZA201801349B (en) Methods and systems for authentication using zero-knowledge code
GB201505332D0 (en) Authentication system
HK1258246B (en) Authentication methods and systems
GB201509031D0 (en) Authentication methods and systems
GB201509030D0 (en) Authentication methods and systems
HK1237921B (en) Authentication methods and systems
GB201618360D0 (en) Authentication method and system
HK1231988B (en) Authentication methods and systems
HK1231988A1 (en) Authentication methods and systems
GB201615363D0 (en) Authentication system