HK1209930A1 - Method and system for secure authentication and information sharing and analysis - Google Patents
Method and system for secure authentication and information sharing and analysisInfo
- Publication number
- HK1209930A1 HK1209930A1 HK15110446.2A HK15110446A HK1209930A1 HK 1209930 A1 HK1209930 A1 HK 1209930A1 HK 15110446 A HK15110446 A HK 15110446A HK 1209930 A1 HK1209930 A1 HK 1209930A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- analysis
- information sharing
- secure authentication
- authentication
- secure
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Information Transfer Between Computers (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261675610P | 2012-07-25 | 2012-07-25 | |
US201261675939P | 2012-07-26 | 2012-07-26 | |
PCT/US2013/052035 WO2014018743A2 (en) | 2012-07-25 | 2013-07-25 | Method and system for secure authentication and information sharing and analysis |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1209930A1 true HK1209930A1 (en) | 2016-04-29 |
Family
ID=52997780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK15110446.2A HK1209930A1 (en) | 2012-07-25 | 2015-10-23 | Method and system for secure authentication and information sharing and analysis |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2878095A4 (en) |
HK (1) | HK1209930A1 (en) |
-
2013
- 2013-07-25 EP EP13822881.2A patent/EP2878095A4/en not_active Withdrawn
-
2015
- 2015-10-23 HK HK15110446.2A patent/HK1209930A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP2878095A4 (en) | 2016-03-09 |
EP2878095A2 (en) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL254163B (en) | Authentication method and system | |
GB201319502D0 (en) | System and method for sharing investigation result data | |
HK1181571A1 (en) | Method and system for authenticating identity information | |
HK1206158A1 (en) | Method and system for providing beacon information | |
EP2912493A4 (en) | System and method for well data analysis | |
EP2745496A4 (en) | Method, system, and apparatus for sharing application information | |
EP2828814A4 (en) | System and method for data and identity verification and authentication | |
EP2858003A4 (en) | Authentication system and authentication method | |
EP2795420A4 (en) | Method and system for sharing object information | |
EP2830351A4 (en) | Method and device for receiving system information | |
EP2923278A4 (en) | Method and system for recommending target object information | |
EP2835952A4 (en) | Information sharing method and device | |
SG11201500765QA (en) | Vehicle information processing system and method | |
HK1208546A1 (en) | Method and system for verifying an access request | |
GB2502773B (en) | Method and system for secure user identification | |
EP2869526A4 (en) | Security information interaction system, device and method | |
EP2917845A4 (en) | Method and system for sharing content | |
EP2893724A4 (en) | Method and system for acquiring location information | |
EP2789148A4 (en) | Systems and methods for authentication | |
EP2707992A4 (en) | System and method for web-based security authentication | |
PL2852945T3 (en) | Passenger information system and method | |
EP2852093A4 (en) | Method, system, and device for sharing documents | |
EP2938116A4 (en) | Method and system for processing configuration information | |
GB2501002B (en) | System and method for providing security on demand | |
EP2827540A4 (en) | Method, device, and system for authentication |