MX2019004513A - Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave. - Google Patents
Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave.Info
- Publication number
- MX2019004513A MX2019004513A MX2019004513A MX2019004513A MX2019004513A MX 2019004513 A MX2019004513 A MX 2019004513A MX 2019004513 A MX2019004513 A MX 2019004513A MX 2019004513 A MX2019004513 A MX 2019004513A MX 2019004513 A MX2019004513 A MX 2019004513A
- Authority
- MX
- Mexico
- Prior art keywords
- key
- user
- kiosk
- information
- remote device
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/26—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for printing, stamping, franking, typing or teleprinting apparatus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
Abstract
Un sistema para almacenar información de clave para duplicar una clave incluye un quiosco que comprende un módulo de identificación de clave. Después de identificar la plantilla de clave y recortar la información de patrón para una o más claves maestras asociadas con un usuario, el quiosco recibe una solicitud de usuario para almacenar la información de clave identificada en un dispositivo remoto asociado con el usuario. Tras la verificación de la identidad del usuario, el quiosco puede encriptar la información de clave identificada, y transmitirla al dispositivo remoto para su almacenamiento. En una vista futura, tras la identificación de la identidad del usuario, un quiosco que comprende un módulo de identificación de clave y un módulo de corte de clave puede recibir y descifrar la información de clave previamente almacenada del dispositivo remoto. El quiosco puede cortar la clave para el usuario mediante el módulo de corte de clave basándose en la información de clave previamente almacenada.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562153702P | 2015-04-28 | 2015-04-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2019004513A true MX2019004513A (es) | 2019-08-14 |
Family
ID=57205010
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2016005530A MX364268B (es) | 2015-04-28 | 2016-04-27 | Sistemas y métodos para recuperación remota segura de datos para duplicación de clave. |
MX2019004513A MX2019004513A (es) | 2015-04-28 | 2016-04-27 | Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave. |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2016005530A MX364268B (es) | 2015-04-28 | 2016-04-27 | Sistemas y métodos para recuperación remota segura de datos para duplicación de clave. |
Country Status (3)
Country | Link |
---|---|
US (2) | US20160321632A1 (es) |
CA (1) | CA2928339A1 (es) |
MX (2) | MX364268B (es) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2707184C (en) | 2006-11-28 | 2013-02-12 | Key Tech, Inc. | Fully automatic key duplicating machine with automatic key model identification system |
US20130331976A1 (en) | 2010-06-03 | 2013-12-12 | Minute Key Inc. | Key duplicating system |
US9556649B1 (en) | 2010-07-15 | 2017-01-31 | The Hillman Group, Inc. | Key identification system |
US9506272B2 (en) | 2013-08-16 | 2016-11-29 | The Hillman Group, Inc. | Two-piece key assembly |
US10124420B2 (en) | 2016-02-08 | 2018-11-13 | The Hillman Group, Inc. | Key duplication machine having user-based functionality |
US10406607B2 (en) | 2016-09-13 | 2019-09-10 | The Hillman Group, Inc. | Key duplication machine having pivoting clamp |
US10737335B2 (en) | 2017-03-17 | 2020-08-11 | The Hillman Group, Inc. | Key duplication system with key blank orientation detection features |
US11227455B2 (en) * | 2018-03-18 | 2022-01-18 | Hy-Ko Products Company Llc | Distributed cloning tool assembly, system, and method for replication of vehicle access devices |
US11440107B2 (en) * | 2019-06-10 | 2022-09-13 | Ikeyless, Llc | Systems and methods for creating replacement vehicle keys |
US11640475B1 (en) * | 2019-11-26 | 2023-05-02 | Gobeep, Inc. | Systems and processes for providing secure client controlled and managed exchange of data between parties |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11599873B2 (en) * | 2010-01-08 | 2023-03-07 | Blackhawk Network, Inc. | Systems and methods for proxy card and/or wallet redemption card transactions |
US9195981B2 (en) * | 2008-10-23 | 2015-11-24 | Ims Health Incorporated | System and method for authorizing transactions via mobile devices |
US20100205448A1 (en) * | 2009-02-11 | 2010-08-12 | Tolga Tarhan | Devices, systems and methods for secure verification of user identity |
US8463431B2 (en) * | 2009-04-13 | 2013-06-11 | Utique, Inc. | Customer retention system and process in a vending unit, retail display or automated retail store |
US8589288B1 (en) * | 2010-10-01 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for electronic remittance of funds |
WO2013028901A2 (en) * | 2011-08-23 | 2013-02-28 | Visa International Service Association | Authentication process for value transfer machine |
WO2013103774A1 (en) * | 2012-01-04 | 2013-07-11 | Keyme, Inc. | Systems and methods for duplicating keys |
US20140222603A1 (en) * | 2012-06-08 | 2014-08-07 | Ronny Hay | Computer-controlled, unattended, automated checkout store outlet |
IN2013MU02212A (es) * | 2013-07-01 | 2015-06-12 | Mandar Agashe |
-
2016
- 2016-04-27 MX MX2016005530A patent/MX364268B/es active IP Right Grant
- 2016-04-27 US US15/140,091 patent/US20160321632A1/en not_active Abandoned
- 2016-04-27 MX MX2019004513A patent/MX2019004513A/es unknown
- 2016-04-28 CA CA2928339A patent/CA2928339A1/en active Pending
-
2020
- 2020-01-24 US US16/751,300 patent/US20200160304A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20160321632A1 (en) | 2016-11-03 |
US20200160304A1 (en) | 2020-05-21 |
MX364268B (es) | 2019-04-17 |
CA2928339A1 (en) | 2016-10-28 |
MX2016005530A (es) | 2017-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2016005530A (es) | Sistemas y metodos para recuperacion remota segura de datos para duplicacion de clave. | |
PH12018502196A1 (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
CO2019013817A2 (es) | Sistema y método para la identificación biométrica | |
RU2017131519A (ru) | Системы и способы безопасного обращения с биометрическими данными | |
MY190293A (en) | Airport security check system and method therefor | |
GB2571869A8 (en) | Obtaining a medical record stored on a blockchain from a wearable device | |
WO2015142410A3 (en) | Systems and methods for creating fingerprints of encryption devices | |
GB2556850A (en) | Sequentially overlaying media content | |
WO2009154968A3 (en) | Remote storage encryption system | |
WO2018075388A3 (en) | ENHANCED LOGISTIC MANAGEMENT SYSTEM | |
ATE427536T1 (de) | Verfahren und vorrichtung fur erhíhte rfid- ubertragungssicherheit | |
UA106481C2 (uk) | Спосіб і система безпечної обробки транзакції | |
WO2012058639A8 (en) | Method and system for processing transactions using a token | |
MX2020005746A (es) | Metodo y sistema para seguridad, validacion, verificacion y procedencia de datos dentro de sistemas de computadora independientes y redes digitales. | |
IL180659A0 (en) | Method for accessing information on object having tag, local server, ons proxy, program, tag creation method, device having tag writer, tag, and program for controlling device having tag writer | |
GB2530972A (en) | Encrypted purging of data from content node storage | |
BR112013019236A2 (pt) | sistema servidor para fornecer acesso seguro a um registro de dados, token de hardware para uso com um terminal de usuário em comunicação com o sistema servidor, sistema, método de fornecimento de acesso seguro a um registro de dados e produto de programa de computador | |
WO2013002833A3 (en) | Binding of cryptographic content using unique device characteristics with server heuristics | |
MX2016010086A (es) | Metodo y sistema para generar una llave de almacenamiento avanzada en un dispositivo movil sin elementos de seguridad. | |
GB201307395D0 (en) | Systems and methods for storing and verifying security information | |
SG11202100274PA (en) | Key transfer method and system based on shared security application, storage medium, and device thereof | |
WO2018064628A3 (en) | Systems, apparatuses, and methods for platform security | |
NZ715811A (en) | Method of control of persons and application to the inspection of persons | |
BR112018000325A2 (pt) | separação de módulos de software por gerenciamento de chave de criptografia controlado | |
EP2521065A3 (en) | Memory device and method for accessing the same |