BR102018015221B8 - Método para compartilhamento seguro de informações e sistema relacionado - Google Patents
Método para compartilhamento seguro de informações e sistema relacionadoInfo
- Publication number
- BR102018015221B8 BR102018015221B8 BR102018015221A BR102018015221A BR102018015221B8 BR 102018015221 B8 BR102018015221 B8 BR 102018015221B8 BR 102018015221 A BR102018015221 A BR 102018015221A BR 102018015221 A BR102018015221 A BR 102018015221A BR 102018015221 B8 BR102018015221 B8 BR 102018015221B8
- Authority
- BR
- Brazil
- Prior art keywords
- key
- data representation
- complete
- complete data
- sensitive data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/207—Tax processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
São descritos sistemas e métodos associados que envolvem um dispositivo confiável e um dispositivo não confiável onde os dados sensíveis ou chaves são compartilhados entre esses dispositivos. Um método revelado inclui armazenar uma chave em uma memória segura em um primeiro dispositivo, receber dados sensíveis através de uma interface de usuário em um segundo dispositivo, gerar um conjunto de instruções de encriptação de caixa branca com base na chave usando um gerador de encriptação de caixa branca no primeiro dispositivo, gerar uma representação de dados completa do conjunto de instruções de encriptação de caixa branca usando um processador seguro no primeiro dispositivo, transmitir a representação de dados completa a partir do primeiro dispositivo ao segundo dispositivo, e encriptar os dados sensíveis usando a representação de dados completa no segundo dispositivo. A representação de dados completa não é Turing-completa e não é executável em relação ao segundo dispositivo.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/843,264 | 2017-12-15 | ||
US15/843,264 US10140612B1 (en) | 2017-12-15 | 2017-12-15 | POS system with white box encryption key sharing |
Publications (3)
Publication Number | Publication Date |
---|---|
BR102018015221A2 BR102018015221A2 (pt) | 2019-02-12 |
BR102018015221B1 BR102018015221B1 (pt) | 2019-12-24 |
BR102018015221B8 true BR102018015221B8 (pt) | 2022-06-28 |
Family
ID=64315478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR102018015221A BR102018015221B8 (pt) | 2017-12-15 | 2018-07-25 | Método para compartilhamento seguro de informações e sistema relacionado |
Country Status (5)
Country | Link |
---|---|
US (3) | US10140612B1 (pt) |
EP (1) | EP3499444A1 (pt) |
AU (2) | AU2018200866A1 (pt) |
BR (1) | BR102018015221B8 (pt) |
CA (1) | CA2993748C (pt) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10546302B2 (en) | 2016-06-30 | 2020-01-28 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10715536B2 (en) | 2017-12-29 | 2020-07-14 | Square, Inc. | Logical validation of devices against fraud and tampering |
US10693662B2 (en) * | 2018-02-22 | 2020-06-23 | Idlogiq Inc. | Methods for secure serialization of supply chain product units |
US10833849B2 (en) | 2018-03-21 | 2020-11-10 | Clover Network, Inc. | Unified secure device provisioning |
US11362824B2 (en) * | 2018-05-25 | 2022-06-14 | Intertrust Technologies Corporation | Content management systems and methods using proxy reencryption |
US11206130B2 (en) * | 2018-07-31 | 2021-12-21 | Nxp B.V. | Customizing cryptographic keys between multiple hosts |
US11507958B1 (en) | 2018-09-26 | 2022-11-22 | Block, Inc. | Trust-based security for transaction payments |
US11494762B1 (en) * | 2018-09-26 | 2022-11-08 | Block, Inc. | Device driver for contactless payments |
US11429753B2 (en) * | 2018-09-27 | 2022-08-30 | Citrix Systems, Inc. | Encryption of keyboard data to avoid being read by endpoint-hosted keylogger applications |
CN109688584B (zh) * | 2018-12-27 | 2022-04-08 | 绍兴心越科技有限公司 | 适用于资源受限网络节点的数据安全存储系统及方法 |
US11212090B1 (en) * | 2019-02-27 | 2021-12-28 | Wells Fargo Bank, N.A. | Derived unique random key per transaction |
TR201905756A2 (tr) * | 2019-04-18 | 2019-05-21 | Kartek Kart Ve Bilisim Teknolojileri Ticaret Anonim Sirketi | Yazılım tabanlı POSlara (SoftPOS) PIN girişi, saklanışı ve iletimi için yazılımsal güvenlik sistemi ve yöntemi. |
US10726681B1 (en) * | 2019-07-26 | 2020-07-28 | Clover Network, Inc. | Advanced hardware system for self service checkout kiosk |
JP7383949B2 (ja) * | 2019-09-20 | 2023-11-21 | 富士電機株式会社 | 情報処理装置及びプログラム |
CN110602138B (zh) * | 2019-09-26 | 2021-06-11 | 腾讯科技(深圳)有限公司 | 区块链网络的数据处理方法、装置、电子设备及存储介质 |
US20230370251A1 (en) * | 2020-10-16 | 2023-11-16 | Nippon Telegraph And Telephone Corporation | Secure computation system, secure computation apparatus, secure computation method, and program |
FR3144464A1 (fr) * | 2022-12-22 | 2024-06-28 | Banks And Acquirers International Holding | Procédé de sécurisation de la transmission de données, et système correspondant. |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2825495B1 (fr) * | 2001-05-31 | 2003-09-26 | Schlumberger Systems & Service | Terminal electronique de paiement, carte a puce adaptee a un tel terminal et procede de chargement d'une cle secrete dans un tel terminal |
CA2354470A1 (en) | 2001-07-30 | 2003-01-30 | Cloakware Corporation | Active content for secure digital media |
US7900041B2 (en) | 2003-07-22 | 2011-03-01 | Irdeto Canada Corporation | Software conditional access system |
US7769165B2 (en) | 2005-10-14 | 2010-08-03 | Microsoft Corporation | Semi-public white-box cipher |
US7757953B2 (en) * | 2006-01-13 | 2010-07-20 | Magtek, Inc. | Secure magnetic stripe reader |
KR101545631B1 (ko) | 2007-09-13 | 2015-08-26 | 이르데토 비.브이. | 콘텐트의 암호화 프로세싱 |
WO2010053885A1 (en) | 2008-11-05 | 2010-05-14 | Mustang Microsystems, Inc. | Method and apparatus for generating and updating security codes |
EP2362573A1 (en) * | 2010-02-19 | 2011-08-31 | Irdeto B.V. | Device and method for establishing secure trust key |
RU2620712C2 (ru) | 2012-01-09 | 2017-05-29 | Конинклейке Филипс Н.В. | Устройство виртуальной машины, имеющее управляемую ключом обфускацию, и способ |
US20140324708A1 (en) * | 2012-06-12 | 2014-10-30 | Square, Inc. | Raw sensor input encryption for passcode entry security |
AU2014357343B2 (en) | 2013-12-02 | 2017-10-19 | Mastercard International Incorporated | Method and system for secure tranmission of remote notification service messages to mobile devices without secure elements |
KR20150090438A (ko) | 2014-01-29 | 2015-08-06 | 한국전자통신연구원 | 화이트박스 암호 장치 및 그 방법 |
US9654279B2 (en) | 2014-03-20 | 2017-05-16 | Nxp B.V. | Security module for secure function execution on untrusted platform |
EP3195521B1 (en) | 2014-08-29 | 2020-03-04 | Visa International Service Association | Methods for secure cryptogram generation |
SG10201405852QA (en) | 2014-09-18 | 2016-04-28 | Huawei Internat Pte Ltd | Encryption function and decryption function generating method, encryption and decryption method and related apparatuses |
US9774443B2 (en) | 2015-03-04 | 2017-09-26 | Apple Inc. | Computing key-schedules of the AES for use in white boxes |
US10171234B2 (en) | 2015-12-16 | 2019-01-01 | Nxp B.V. | Wide encoding of intermediate values within a white-box implementation |
US10223511B2 (en) * | 2016-03-30 | 2019-03-05 | Nxp B.V. | Watermarking input and output of a white-box implementation |
JP6877889B2 (ja) * | 2016-04-08 | 2021-05-26 | ソニーグループ株式会社 | 暗号化装置、暗号化方法、復号化装置、及び復号化方法 |
KR101933649B1 (ko) | 2016-05-27 | 2018-12-28 | 삼성에스디에스 주식회사 | 화이트박스 암호 알고리즘을 이용한 공개키 암호화를 위한 장치 및 방법 |
US10546119B2 (en) * | 2016-11-14 | 2020-01-28 | Mastercard International Incorporated | Methods for securely storing sensitive data on mobile device |
US10615980B2 (en) * | 2017-02-02 | 2020-04-07 | Mastercard International Incorporated | Methods and systems for securely storing sensitive data on smart cards |
EP3665566A4 (en) * | 2017-08-08 | 2021-04-21 | Crypto4A Technologies Inc. | SECURE MACHINE-EXECUTED CODE DEPLOYMENT AND EXECUTION PROCESS AND SYSTEM |
-
2017
- 2017-12-15 US US15/843,264 patent/US10140612B1/en active Active
-
2018
- 2018-01-30 CA CA2993748A patent/CA2993748C/en active Active
- 2018-02-06 AU AU2018200866A patent/AU2018200866A1/en not_active Abandoned
- 2018-07-25 BR BR102018015221A patent/BR102018015221B8/pt active IP Right Grant
- 2018-10-24 US US16/169,351 patent/US10909532B2/en active Active
- 2018-12-13 EP EP18212437.0A patent/EP3499444A1/en not_active Withdrawn
-
2019
- 2019-11-27 AU AU2019271965A patent/AU2019271965B2/en active Active
-
2020
- 2020-10-23 US US17/079,252 patent/US11615411B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CA2993748A1 (en) | 2019-06-15 |
US20190188703A1 (en) | 2019-06-20 |
US10140612B1 (en) | 2018-11-27 |
US10909532B2 (en) | 2021-02-02 |
EP3499444A1 (en) | 2019-06-19 |
US20210056546A1 (en) | 2021-02-25 |
AU2019271965B2 (en) | 2021-04-29 |
US11615411B2 (en) | 2023-03-28 |
CA2993748C (en) | 2024-02-13 |
AU2019271965A1 (en) | 2019-12-19 |
AU2018200866A1 (en) | 2019-07-04 |
BR102018015221B1 (pt) | 2019-12-24 |
BR102018015221A2 (pt) | 2019-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR102018015221B8 (pt) | Método para compartilhamento seguro de informações e sistema relacionado | |
EP4407492A3 (en) | Systems and methods for computing with private healthcare data | |
BR112018016810A2 (pt) | método e sistema implementado por computador para criptografia de dados em um dispositivo eletrônico, dispositivo eletrônico e programa de computador | |
BR112019003520A2 (pt) | comunicação segura de tráfego de rede | |
RU2014147315A (ru) | Использование аутентифицированных манифестов для обеспечения внешней сертификации многопроцессорных платформ | |
PH12019550116A1 (en) | Addressing a trusted execution environment using encryption key | |
US20140348326A1 (en) | Decrypting Data | |
BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
BR112017014632A2 (pt) | ?método implementado por computador, e, sistema de computador? | |
WO2017062128A3 (en) | Technologies for end-to-end biometric-based authentication and platform locality assertion | |
BR112015019378A2 (pt) | serviço de segurança de dados | |
BRPI0711042A8 (pt) | Sistema, método para possibilitar um emissor de direitos criar dados de autenticação relacionados à um objeto e/ou criptografar o objeto usando uma chave diversificada e dispositivo | |
BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
PH12019550119A1 (en) | Addressing a trusted execution environment using signing key | |
BR112016024453A8 (pt) | método implementado por computador para gerenciar conjunto de dados, sistema de computação e meio de armazenamento legível por computador físico | |
BR112018011353A2 (pt) | método e sistema para provisão e armazenamento de chave criptografada distribuída via criptografia de curva elíptica | |
BR112016005604A8 (pt) | segurança de gabarito biométrico e geração de chave | |
WO2015134760A3 (en) | Secure hardware for cross-device trusted applications | |
BR112018073935A2 (pt) | método, dispositivo de usuário, e, computador de autorização. | |
BR112018071634A2 (pt) | utilização de região isolada de segurança baseada em hardware para impedir pirataria e fraude em dispositivos eletrônicos | |
MX356293B (es) | Sistemas y métodos con seguridad de programa de criptografía y resistencia a uso indebido. | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
MY181115A (en) | Format preservation based masking system and method | |
NZ701459A (en) | Systems and methods for secure processing with embedded cryptographic unit | |
BR112019007567A2 (pt) | instrução de mensagem de cifra com autenticação |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B03B | Publication of an application: publication anticipated [chapter 3.2 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 25/07/2018, OBSERVADAS AS CONDICOES LEGAIS. |
|
B25D | Requested change of name of applicant approved |
Owner name: CLOVER NETWORK, LLC (US) |