SG11202000396QA - Service authorization method, apparatus, and device - Google Patents
Service authorization method, apparatus, and deviceInfo
- Publication number
- SG11202000396QA SG11202000396QA SG11202000396QA SG11202000396QA SG11202000396QA SG 11202000396Q A SG11202000396Q A SG 11202000396QA SG 11202000396Q A SG11202000396Q A SG 11202000396QA SG 11202000396Q A SG11202000396Q A SG 11202000396QA SG 11202000396Q A SG11202000396Q A SG 11202000396QA
- Authority
- SG
- Singapore
- Prior art keywords
- service authorization
- authorization method
- service
- authorization
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Accounting & Taxation (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711135547.2A CN108055132B (en) | 2017-11-16 | 2017-11-16 | Method, device and equipment for service authorization |
PCT/CN2018/107569 WO2019095864A1 (en) | 2017-11-16 | 2018-09-26 | Service authorization method, apparatus and device |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202000396QA true SG11202000396QA (en) | 2020-02-27 |
Family
ID=62120265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202000396QA SG11202000396QA (en) | 2017-11-16 | 2018-09-26 | Service authorization method, apparatus, and device |
Country Status (7)
Country | Link |
---|---|
US (2) | US10892900B2 (en) |
EP (1) | EP3641218B1 (en) |
KR (1) | KR102382928B1 (en) |
CN (1) | CN108055132B (en) |
SG (1) | SG11202000396QA (en) |
TW (1) | TWI724326B (en) |
WO (1) | WO2019095864A1 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108055132B (en) * | 2017-11-16 | 2020-04-28 | 阿里巴巴集团控股有限公司 | Method, device and equipment for service authorization |
CN109033790B (en) * | 2018-06-22 | 2023-03-10 | 徐镠琪 | Intelligent military affairs two-chapter two-time authorization use method |
US11223485B2 (en) * | 2018-07-17 | 2022-01-11 | Huawei Technologies Co., Ltd. | Verifiable encryption based on trusted execution environment |
CN110020513B (en) * | 2018-11-07 | 2023-08-22 | 创新先进技术有限公司 | Signature recording method, signature verification device and storage medium |
US11733972B2 (en) | 2020-10-06 | 2023-08-22 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by providing random load data as a result of execution of a load operation that does not have permission to access a load address |
US11797673B2 (en) | 2020-08-27 | 2023-10-24 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by expeditiously initiating flushing of instructions dependent upon a load instruction that causes a need for an architectural exception |
US11868469B2 (en) * | 2020-08-27 | 2024-01-09 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by preventing all dependent instructions from consuming architectural register result produced by instruction that causes a need for an architectural exception |
US11907369B2 (en) | 2020-08-27 | 2024-02-20 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by preventing cache memory state from being affected by a missing load operation by inhibiting or canceling a fill request of the load operation if an older load generates a need for an architectural exception |
TWI749774B (en) * | 2020-09-17 | 2021-12-11 | 瑞昱半導體股份有限公司 | Verification system and verification method thereof |
US11734426B2 (en) | 2020-10-06 | 2023-08-22 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by prevents cache line data implicated by a missing load address from being filled into a data cache memory when the load address specifies a location with no valid address translation or no permission to read from the location |
US11853424B2 (en) | 2020-10-06 | 2023-12-26 | Ventana Micro Systems Inc. | Processor that mitigates side channel attacks by refraining from allocating an entry in a data TLB for a missing load address when the load address misses both in a data cache memory and in the data TLB and the load address specifies a location without a valid address translation or without permission to read from the location |
EP4002756B1 (en) * | 2020-11-24 | 2022-11-02 | Axis AB | Systems and methods of managing a certificate associated with a component located at a remote location |
CN113868691B (en) * | 2021-12-02 | 2022-05-24 | 北京溪塔科技有限公司 | Authorized operation method and device of block chain based on cloud-native technology |
CN115603943A (en) * | 2022-09-07 | 2023-01-13 | 支付宝(杭州)信息技术有限公司(Cn) | Method and device for off-line identity authentication, storage medium and electronic equipment |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060149962A1 (en) | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
US8245052B2 (en) * | 2006-02-22 | 2012-08-14 | Digitalpersona, Inc. | Method and apparatus for a token |
CN101108125B (en) | 2007-08-02 | 2010-06-16 | 无锡微感科技有限公司 | Dynamic monitoring system of body sign |
US8510569B2 (en) * | 2009-12-16 | 2013-08-13 | Intel Corporation | Providing integrity verification and attestation in a hidden execution environment |
US20120124369A1 (en) * | 2010-11-09 | 2012-05-17 | Jose Castejon Amenedo | Secure publishing of public-key certificates |
US8806192B2 (en) * | 2011-05-04 | 2014-08-12 | Microsoft Corporation | Protected authorization for untrusted clients |
EP4322465A3 (en) * | 2011-12-15 | 2024-04-17 | Daedalus Prime LLC | Method and device for secure communications over a network using a hardware security engine |
US8856514B2 (en) * | 2012-03-12 | 2014-10-07 | International Business Machines Corporation | Renewal processing of digital certificates in an asynchronous messaging environment |
US9887983B2 (en) * | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US10064240B2 (en) * | 2013-09-12 | 2018-08-28 | The Boeing Company | Mobile communication device and method of operating thereof |
TWI615798B (en) | 2013-12-17 | 2018-02-21 | 動聯國際股份有限公司 | Health care system based on internet of things |
US10129243B2 (en) * | 2013-12-27 | 2018-11-13 | Avaya Inc. | Controlling access to traversal using relays around network address translation (TURN) servers using trusted single-use credentials |
GB201413836D0 (en) * | 2014-08-05 | 2014-09-17 | Arm Ip Ltd | Device security apparatus and methods |
US20160065374A1 (en) * | 2014-09-02 | 2016-03-03 | Apple Inc. | Method of using one device to unlock another device |
US10055964B2 (en) | 2014-09-09 | 2018-08-21 | Torvec, Inc. | Methods and apparatus for monitoring alertness of an individual utilizing a wearable device and providing notification |
CN105490997B (en) * | 2014-10-10 | 2019-05-14 | 阿里巴巴集团控股有限公司 | Safe checking method, device, terminal and server |
US20170319122A1 (en) | 2014-11-11 | 2017-11-09 | Global Stress Index Pty Ltd | A system and a method for gnerating stress level and stress resilience level information for an individual |
US20160234176A1 (en) * | 2015-02-06 | 2016-08-11 | Samsung Electronics Co., Ltd. | Electronic device and data transmission method thereof |
TWI540528B (en) | 2015-04-16 | 2016-07-01 | 神乎科技股份有限公司 | An alerting method for assisting user in performing disciplined operations in security trading |
CN104900006B (en) | 2015-04-28 | 2017-10-27 | 中国科学技术大学先进技术研究院 | A kind of intelligent personal security system and its implementation based on wearable device |
WO2016192774A1 (en) * | 2015-06-02 | 2016-12-08 | Huawei Technologies Co., Ltd. | Electronic device and method in an electronic device |
CN105530099A (en) * | 2015-12-11 | 2016-04-27 | 捷德(中国)信息科技有限公司 | Anti-fake verification method, device and system and anti-fake certificate based on IBC (Identity-Base Cryptography) |
CN105704123B (en) * | 2016-01-08 | 2017-09-15 | 腾讯科技(深圳)有限公司 | A kind of methods, devices and systems for carrying out business processing |
CN107126203A (en) | 2016-02-28 | 2017-09-05 | 南京全时陪伴健康科技有限公司 | Human health information measures display system in real time |
CN107220246B (en) | 2016-03-21 | 2020-10-16 | 创新先进技术有限公司 | Business object analysis method and device |
CN106373012A (en) | 2016-09-06 | 2017-02-01 | 网易乐得科技有限公司 | Financing product transaction control method and equipment |
CN106878280B (en) * | 2017-01-10 | 2020-07-24 | 阿里巴巴集团控股有限公司 | User authentication method and device, and method and device for acquiring user number information |
CN106850201B (en) * | 2017-02-15 | 2019-11-08 | 济南晟安信息技术有限公司 | Intelligent terminal multiple-factor authentication method, intelligent terminal, certificate server and system |
CN107092881B (en) | 2017-04-18 | 2018-01-09 | 黄海虹 | A kind of human pilot changes system and method |
CN108357497B (en) | 2017-04-18 | 2021-07-20 | 黄海虹 | Driver identity authorization system for sharing automobile |
CN107203938A (en) | 2017-05-02 | 2017-09-26 | 优品财富管理股份有限公司 | System and method is instructed in a kind of stock invester's investment based on heart rate detection |
CN108055132B (en) | 2017-11-16 | 2020-04-28 | 阿里巴巴集团控股有限公司 | Method, device and equipment for service authorization |
-
2017
- 2017-11-16 CN CN201711135547.2A patent/CN108055132B/en active Active
-
2018
- 2018-09-12 TW TW107132057A patent/TWI724326B/en active
- 2018-09-26 WO PCT/CN2018/107569 patent/WO2019095864A1/en unknown
- 2018-09-26 SG SG11202000396QA patent/SG11202000396QA/en unknown
- 2018-09-26 EP EP18878119.9A patent/EP3641218B1/en active Active
- 2018-09-26 KR KR1020207001503A patent/KR102382928B1/en active IP Right Grant
-
2020
- 2020-02-28 US US16/805,316 patent/US10892900B2/en active Active
-
2021
- 2021-01-11 US US17/145,889 patent/US11316702B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108055132A (en) | 2018-05-18 |
US11316702B2 (en) | 2022-04-26 |
WO2019095864A1 (en) | 2019-05-23 |
KR20200013057A (en) | 2020-02-05 |
US20210135882A1 (en) | 2021-05-06 |
TW201923640A (en) | 2019-06-16 |
EP3641218A4 (en) | 2020-12-02 |
TWI724326B (en) | 2021-04-11 |
EP3641218B1 (en) | 2022-03-30 |
US20200204379A1 (en) | 2020-06-25 |
CN108055132B (en) | 2020-04-28 |
KR102382928B1 (en) | 2022-04-04 |
US10892900B2 (en) | 2021-01-12 |
EP3641218A1 (en) | 2020-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202000396QA (en) | Service authorization method, apparatus, and device | |
GB201801530D0 (en) | Methods, apparatus and systems for authentication | |
GB201801526D0 (en) | Methods, apparatus and systems for authentication | |
SG11202004738TA (en) | Cross-blockchain authentication method and apparatus | |
GB201803101D0 (en) | Device, system and method | |
SG11201911378XA (en) | Service processing method, device and system | |
GB2594423B (en) | System, apparatus and method | |
HK1251740A1 (en) | Service transmission method and apparatus | |
SG10202107770WA (en) | Network authentication method and apparatus | |
SG10202101083TA (en) | Service implementation method and device | |
SG11202007191QA (en) | Service processing method, device and apparatus | |
SG11202000571RA (en) | Key management method, apparatus, and device | |
SG10202107782UA (en) | Device configuration method, apparatus and system | |
GB201608270D0 (en) | Method, system and apparatus | |
EP3474472A4 (en) | Encoding method, device, and apparatus | |
SG10202008542YA (en) | Service reservation method and apparatus | |
SG11201606214PA (en) | Intercom method, apparatus, device, and system | |
EP3515098A4 (en) | Local service authorization method and related device | |
SG11201705555YA (en) | Service request authentication method and apparatus | |
SG11202006196TA (en) | Payment method, apparatus and device | |
EP3598649A4 (en) | Encoding method, apparatus and device | |
SG11201706243WA (en) | Service implementation method, payment method and apparatus | |
GB201701753D0 (en) | System, apparatus and method | |
EP3637647A4 (en) | Encoding method, device and apparatus | |
PL3309997T3 (en) | Network monitoring apparatus, and remote encryption and remote activation method, device and system therefor |