SG11202105844TA - Time based risk management mechanisms - Google Patents

Time based risk management mechanisms

Info

Publication number
SG11202105844TA
SG11202105844TA SG11202105844TA SG11202105844TA SG11202105844TA SG 11202105844T A SG11202105844T A SG 11202105844TA SG 11202105844T A SG11202105844T A SG 11202105844TA SG 11202105844T A SG11202105844T A SG 11202105844TA SG 11202105844T A SG11202105844T A SG 11202105844TA
Authority
SG
Singapore
Prior art keywords
time based
risk management
management mechanisms
based risk
mechanisms
Prior art date
Application number
SG11202105844TA
Inventor
Yuexi Chen
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11202105844TA publication Critical patent/SG11202105844TA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • G06F21/725Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits operating on a secure reference time value
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/04Generating or distributing clock signals or signals derived directly therefrom
    • G06F1/12Synchronisation of different clock signals provided by a plurality of clock generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp
SG11202105844TA 2018-12-03 2018-12-03 Time based risk management mechanisms SG11202105844TA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2018/063572 WO2020117186A1 (en) 2018-12-03 2018-12-03 Time based risk management mechanisms

Publications (1)

Publication Number Publication Date
SG11202105844TA true SG11202105844TA (en) 2021-07-29

Family

ID=70975038

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202105844TA SG11202105844TA (en) 2018-12-03 2018-12-03 Time based risk management mechanisms

Country Status (5)

Country Link
US (1) US20220027917A1 (en)
EP (1) EP3891927A4 (en)
CN (1) CN113169871B (en)
SG (1) SG11202105844TA (en)
WO (1) WO2020117186A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711847B (en) * 2018-12-26 2020-05-15 巽腾(广东)科技有限公司 Near field information authentication method and device, electronic equipment and computer storage medium
US11615392B2 (en) * 2020-05-01 2023-03-28 Capital One Services, Llc Systems and methods for using information from wearable devices

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7899753B1 (en) * 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US8820637B1 (en) * 2005-02-26 2014-09-02 James A. Roskind Time-varying security code for enabling authorizations and other uses of financial accounts
US7926096B2 (en) * 2005-08-31 2011-04-12 Gemalto Sa Enforcing time-based transaction policies on devices lacking independent clocks
WO2008050512A1 (en) * 2006-09-29 2008-05-02 Nec Corporation Start control device, method, and program
US8726347B2 (en) * 2007-04-27 2014-05-13 International Business Machines Corporation Authentication based on previous authentications
US20120253745A1 (en) * 2011-03-28 2012-10-04 Infosys Technologies Limited System and method for testing performance of mobile application server
US9405892B2 (en) * 2013-11-26 2016-08-02 At&T Intellectual Property I, L.P. Preventing spoofing attacks for bone conduction applications
US9483765B2 (en) * 2013-12-09 2016-11-01 Mastercard International Incorporated Systems and methods for monitoring payment transactions for fraud using social media
CN104753881B (en) * 2013-12-30 2019-03-26 格尔软件股份有限公司 A kind of WebService safety certification access control method based on software digital certificate and timestamp
EP2980743A1 (en) * 2014-08-01 2016-02-03 Gemalto SA Control method for controlling an integrated circuit card
SG11201705489TA (en) * 2015-02-17 2017-08-30 Visa Int Service Ass Token and cryptogram using transaction specific information
US9948673B2 (en) * 2016-05-26 2018-04-17 Visa International Service Association Reliable timestamp credential
CN107231380B (en) * 2017-08-01 2020-07-14 陆宝华 Anti-attack identity authentication method and system and anti-attack automobile system

Also Published As

Publication number Publication date
CN113169871A (en) 2021-07-23
EP3891927A4 (en) 2021-11-24
EP3891927A1 (en) 2021-10-13
WO2020117186A1 (en) 2020-06-11
US20220027917A1 (en) 2022-01-27
CN113169871B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
SG11202010075XA (en) Multi-uav management
ZAA201801355S (en) Case
ZAA201801144S (en) Case
CA185383S (en) Casque
SG11202107072VA (en) Blockchain management system
CA185382S (en) Casque
SG11202009192PA (en) Nano-satellite
DK3773537T3 (en) Stat3-hæmmere
CA184991S (en) Uroflowmeter
CA184994S (en) Uroflowmeter
SG11202105844TA (en) Time based risk management mechanisms
GB201903783D0 (en) Device management
GB201807046D0 (en) Combination
GB201820607D0 (en) CitationWatch
AU201817245S (en) MC-Roller
AU201817247S (en) MC-Roller
AU201817248S (en) MC-Roller
GB201819630D0 (en) Globeye
GB201814831D0 (en) HobbyBox
GB201811573D0 (en) Flyingsaucerbelsam
GB201807887D0 (en) Combination
GB201804516D0 (en) Bug-z bear
GB201803525D0 (en) Combination
GB201803451D0 (en) Combination