MX2016005530A - Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave. - Google Patents

Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave.

Info

Publication number
MX2016005530A
MX2016005530A MX2016005530A MX2016005530A MX2016005530A MX 2016005530 A MX2016005530 A MX 2016005530A MX 2016005530 A MX2016005530 A MX 2016005530A MX 2016005530 A MX2016005530 A MX 2016005530A MX 2016005530 A MX2016005530 A MX 2016005530A
Authority
MX
Mexico
Prior art keywords
key
user
kiosk
information
remote device
Prior art date
Application number
MX2016005530A
Other languages
English (en)
Other versions
MX364268B (es
Inventor
Edward Will Gary
Clark Moore Robert
Original Assignee
Hillman Group Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hillman Group Inc filed Critical Hillman Group Inc
Publication of MX2016005530A publication Critical patent/MX2016005530A/es
Publication of MX364268B publication Critical patent/MX364268B/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/26Coin-freed apparatus for hiring articles; Coin-freed facilities or services for printing, stamping, franking, typing or teleprinting apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Un sistema para almacenar información de clave para duplicar una clave incluye in quiosco que comprende un módulo de identificación de clave. Después de identificar la plantilla de clave y recortar la información de patrón para una o más claves maestras asociadas con usuario, el quiosco recibe una solicitud de usuario para almacenar la información de clave identificada en un dispositivo remoto asociado con el usuario. Tras la verificación de la identidad del usuario, el quiosco puede encriptar la información de clave identificada, y transmitirla al dispositivo remoto para su almacenamiento. En una vista futura, tras la identificación de la identidad del usuario, un quiosco que comprende un módulo de identificación de clave y un módulo de corte de clave puede recibir y descifrar la información de clave previamente almacenada del dispositivo remoto. El quiosco puede cortar la clave para el usuario mediante el módulo de corte de clave basándose en la información de clave previamente almacenada.
MX2016005530A 2015-04-28 2016-04-27 Sistemas y métodos para recuperación remota segura de datos para duplicación de clave. MX364268B (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US201562153702P 2015-04-28 2015-04-28

Publications (2)

Publication Number Publication Date
MX2016005530A true MX2016005530A (es) 2017-10-26
MX364268B MX364268B (es) 2019-04-17

Family

ID=57205010

Family Applications (2)

Application Number Title Priority Date Filing Date
MX2019004513A MX2019004513A (es) 2015-04-28 2016-04-27 Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave.
MX2016005530A MX364268B (es) 2015-04-28 2016-04-27 Sistemas y métodos para recuperación remota segura de datos para duplicación de clave.

Family Applications Before (1)

Application Number Title Priority Date Filing Date
MX2019004513A MX2019004513A (es) 2015-04-28 2016-04-27 Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave.

Country Status (3)

Country Link
US (2) US20160321632A1 (es)
CA (1) CA2928339A1 (es)
MX (2) MX2019004513A (es)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008066857A2 (en) 2006-11-28 2008-06-05 Key Tech, Inc. Fully automatic key duplicating machine with automatic key model identification system
US20130331976A1 (en) 2010-06-03 2013-12-12 Minute Key Inc. Key duplicating system
US9556649B1 (en) 2010-07-15 2017-01-31 The Hillman Group, Inc. Key identification system
US9506272B2 (en) * 2013-08-16 2016-11-29 The Hillman Group, Inc. Two-piece key assembly
US10124420B2 (en) 2016-02-08 2018-11-13 The Hillman Group, Inc. Key duplication machine having user-based functionality
US10406607B2 (en) 2016-09-13 2019-09-10 The Hillman Group, Inc. Key duplication machine having pivoting clamp
US10737335B2 (en) 2017-03-17 2020-08-11 The Hillman Group, Inc. Key duplication system with key blank orientation detection features
US11227455B2 (en) * 2018-03-18 2022-01-18 Hy-Ko Products Company Llc Distributed cloning tool assembly, system, and method for replication of vehicle access devices
US11440107B2 (en) * 2019-06-10 2022-09-13 Ikeyless, Llc Systems and methods for creating replacement vehicle keys
US11640475B1 (en) * 2019-11-26 2023-05-02 Gobeep, Inc. Systems and processes for providing secure client controlled and managed exchange of data between parties

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11599873B2 (en) * 2010-01-08 2023-03-07 Blackhawk Network, Inc. Systems and methods for proxy card and/or wallet redemption card transactions
US9195981B2 (en) * 2008-10-23 2015-11-24 Ims Health Incorporated System and method for authorizing transactions via mobile devices
US20100205448A1 (en) * 2009-02-11 2010-08-12 Tolga Tarhan Devices, systems and methods for secure verification of user identity
US8463431B2 (en) * 2009-04-13 2013-06-11 Utique, Inc. Customer retention system and process in a vending unit, retail display or automated retail store
US8589288B1 (en) * 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
WO2013028901A2 (en) * 2011-08-23 2013-02-28 Visa International Service Association Authentication process for value transfer machine
US8626331B2 (en) * 2012-01-04 2014-01-07 Keyme, Inc. Systems and methods for managing key information
US20140222603A1 (en) * 2012-06-08 2014-08-07 Ronny Hay Computer-controlled, unattended, automated checkout store outlet
IN2013MU02212A (es) * 2013-07-01 2015-06-12 Mandar Agashe

Also Published As

Publication number Publication date
US20200160304A1 (en) 2020-05-21
US20160321632A1 (en) 2016-11-03
MX364268B (es) 2019-04-17
CA2928339A1 (en) 2016-10-28
MX2019004513A (es) 2019-08-14

Similar Documents

Publication Publication Date Title
MX2019004513A (es) Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave.
MX2019013495A (es) Sistema y metodo para identificación biometrica.
RU2017131519A (ru) Системы и способы безопасного обращения с биометрическими данными
MY190293A (en) Airport security check system and method therefor
GB2571869A8 (en) Obtaining a medical record stored on a blockchain from a wearable device
WO2015142410A3 (en) Systems and methods for creating fingerprints of encryption devices
SE0202147D0 (sv) A method and a system for biometric in´dentification or verification
JP2018528691A5 (es)
MY175911A (en) Method and system protecting against identity theft or replication abuse
EP4271016A3 (en) Enhanced authentication based on secondary device interactions
RU2018125244A (ru) Устройство с безопасным хранением и извлечением данных
MX2018003808A (es) Superposicion secuencial de contenido de medios.
WO2009154968A3 (en) Remote storage encryption system
ATE427536T1 (de) Verfahren und vorrichtung fur erhíhte rfid- ubertragungssicherheit
UA106481C2 (uk) Спосіб і система безпечної обробки транзакції
WO2012058639A8 (en) Method and system for processing transactions using a token
MX2020005746A (es) Metodo y sistema para seguridad, validacion, verificacion y procedencia de datos dentro de sistemas de computadora independientes y redes digitales.
IL180659A0 (en) Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer
GB2530972A (en) Encrypted purging of data from content node storage
WO2014066610A3 (en) Methods and systems for the secure exchange of information
BR112013019236A2 (pt) sistema servidor para fornecer acesso seguro a um registro de dados, token de hardware para uso com um terminal de usuário em comunicação com o sistema servidor, sistema, método de fornecimento de acesso seguro a um registro de dados e produto de programa de computador
EP4235475A3 (en) Systems and methods of database encryption in a multitenant database management system
MX2016010086A (es) Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad.
MX2015011715A (es) Sistema y metodo para proteger datos de incidentes de tren.
SG11202100274PA (en) Key transfer method and system based on shared security application, storage medium, and device thereof

Legal Events

Date Code Title Description
FG Grant or registration