SG10201810442RA - Secure identity verification - Google Patents

Secure identity verification

Info

Publication number
SG10201810442RA
SG10201810442RA SG10201810442RA SG10201810442RA SG10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA
Authority
SG
Singapore
Prior art keywords
key
user
preset
identity verification
verification
Prior art date
Application number
SG10201810442RA
Inventor
Yongdong Wei
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG10201810442RA publication Critical patent/SG10201810442RA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Abstract

SECURE IDENTITY VERIFICATION Embodiments of the present application relate to a method, apparatus, and system for verifying an identity of a user. The method includes receiving a preset key that is associated with a key carrier that is a physical object, storing the preset key in a database storing mappings between a plurality of preset keys and a plurality of users, receiving a verification key in connection with an identity verification of a user, retrieving the preset key associated with the user from the database, determining whether the verification key matches the preset key associated with the user, and causing a determination of whether the key carrier is authentic. (Fig. 1A)
SG10201810442RA 2014-06-03 2015-06-02 Secure identity verification SG10201810442RA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410242475.1A CN105450400B (en) 2014-06-03 2014-06-03 Identity verification method, client, server and system
US14/727,755 US11410212B2 (en) 2014-06-03 2015-06-01 Secure identity verification

Publications (1)

Publication Number Publication Date
SG10201810442RA true SG10201810442RA (en) 2018-12-28

Family

ID=54702264

Family Applications (2)

Application Number Title Priority Date Filing Date
SG11201609228PA SG11201609228PA (en) 2014-06-03 2015-06-02 Secure identity verification
SG10201810442RA SG10201810442RA (en) 2014-06-03 2015-06-02 Secure identity verification

Family Applications Before (1)

Application Number Title Priority Date Filing Date
SG11201609228PA SG11201609228PA (en) 2014-06-03 2015-06-02 Secure identity verification

Country Status (8)

Country Link
US (1) US11410212B2 (en)
JP (1) JP6484254B2 (en)
KR (1) KR102076473B1 (en)
CN (1) CN105450400B (en)
HK (1) HK1221345A1 (en)
SG (2) SG11201609228PA (en)
TW (1) TWI696133B (en)
WO (1) WO2015187627A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10181055B2 (en) 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US11190936B2 (en) 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
KR102054711B1 (en) * 2016-01-04 2019-12-11 클레브엑스 엘엘씨 Data security system using encryption
CZ308885B6 (en) * 2019-09-26 2021-08-04 Univerzita Tomáše Bati ve Zlíně Identity and license verification system for working with highly sensitive data
US10827353B1 (en) * 2019-11-26 2020-11-03 CUSEUM, Inc. System and method for seamless admission to a venue
TWI751553B (en) * 2020-05-11 2022-01-01 財金資訊股份有限公司 Method and system for paying digital currency

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6633979B1 (en) 1999-06-25 2003-10-14 Telefonaktiebolaget Lm Ericsson (Publ) Methods and arrangements for secure linking of entity authentication and ciphering key generation
FI111763B (en) * 1999-11-04 2003-09-15 Sonera Oyj Property control procedures and systems
JP2001216395A (en) 2000-02-03 2001-08-10 Michimasa Hatana Authentication system using possessed paper money and application of the system
EP1261904A2 (en) * 2000-02-28 2002-12-04 Edentity Limited Information processing system and method
US20020049636A1 (en) 2000-04-11 2002-04-25 Griffin Carter H. System and method for generating and transmitting data keys to facilitate delivery, pick-up and other commercial transactions
US6987853B2 (en) * 2000-11-29 2006-01-17 Bodacion Technologies, Llc Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess
US7711122B2 (en) * 2001-03-09 2010-05-04 Arcot Systems, Inc. Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
IES20020190A2 (en) * 2002-03-13 2003-09-17 Daon Ltd a biometric authentication system and method
US7333611B1 (en) 2002-09-27 2008-02-19 Northwestern University Ultra-secure, ultra-efficient cryptographic system
US20050033651A1 (en) * 2003-08-06 2005-02-10 Aleksander Kogan Method and apparatus for on-line payment of a transaction in cash
US8533791B2 (en) * 2004-07-15 2013-09-10 Anakam, Inc. System and method for second factor authentication services
GB0504573D0 (en) * 2005-03-04 2005-04-13 Firstondemand Ltd Traceability and authentication of security papers
JP2007257491A (en) * 2006-03-24 2007-10-04 Sony Ericsson Mobilecommunications Japan Inc Counterfeit bill detection system and portable communication terminal
US20130227286A1 (en) 2006-04-25 2013-08-29 Andre Jacques Brisson Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud
CA2648780C (en) 2006-04-25 2013-07-16 Stephen Laurence Boren Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
GB0622164D0 (en) * 2006-11-07 2006-12-20 Claricom Ltd Verification method
CN101075985A (en) * 2007-02-08 2007-11-21 腾讯科技(深圳)有限公司 Instant telecommunication system, server and instant telecommunication method when safety access
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
EP2101276A1 (en) 2008-03-10 2009-09-16 Aceinc Pty. Limited Data access and user identity verification
US8438385B2 (en) * 2008-03-13 2013-05-07 Fujitsu Limited Method and apparatus for identity verification
KR20090104638A (en) 2008-03-31 2009-10-06 한국전자통신연구원 User terminal with identity selector and method for identity authentication using identity selector of the same
US8438382B2 (en) * 2008-08-06 2013-05-07 Symantec Corporation Credential management system and method
US9118666B2 (en) * 2010-06-30 2015-08-25 Google Inc. Computing device integrity verification
US8582829B2 (en) 2010-11-03 2013-11-12 Gary S. Shuster Online identity verification
JP2012113540A (en) 2010-11-25 2012-06-14 Masatomi Takaesu Web system and web server
CN102271042B (en) * 2011-08-25 2013-10-09 北京神州绿盟信息安全科技股份有限公司 Certificate authorization method, system, universal serial bus (USB) Key equipment and server
US20140082095A1 (en) * 2012-09-17 2014-03-20 Helen Y. Balinsky Workflow monitoring
US9172698B1 (en) 2012-10-12 2015-10-27 Ut-Battelle, Llc System and method for key generation in security tokens
US20140304183A1 (en) 2013-04-05 2014-10-09 Verif-Y, Inc. Verification System
CN104144419B (en) * 2014-01-24 2017-05-24 腾讯科技(深圳)有限公司 Identity authentication method, device and system
WO2015118519A1 (en) * 2014-02-04 2015-08-13 Koren Moshe System for authenticating items

Also Published As

Publication number Publication date
JP2017526023A (en) 2017-09-07
WO2015187627A1 (en) 2015-12-10
TWI696133B (en) 2020-06-11
SG11201609228PA (en) 2016-12-29
TW201546729A (en) 2015-12-16
KR102076473B1 (en) 2020-05-19
US20150348027A1 (en) 2015-12-03
KR20160140919A (en) 2016-12-07
HK1221345A1 (en) 2017-05-26
CN105450400B (en) 2019-12-13
US11410212B2 (en) 2022-08-09
CN105450400A (en) 2016-03-30
JP6484254B2 (en) 2019-03-13

Similar Documents

Publication Publication Date Title
SG10201810442RA (en) Secure identity verification
AU2019268183A1 (en) Fingerprint based authentication for single sign on
MX354574B (en) User authentication method and apparatus based on audio and video data.
PH12019500896A1 (en) Settlement method, entrance control method, and apparatus
MX2019012571A (en) Systems and methods for device verification and authentication.
SG10201810422SA (en) Dual channel identity authentication
SG10201907025VA (en) Method and system for verifying identities
SG11201811458SA (en) Object allocation method and device
GB2533492A (en) Utilizing voice biometrics
GB2579976A8 (en) Identity verification using biometric data and non-invertible functions via blockchain
MY177409A (en) Method and system for verifying an account operation
GB2552435A (en) Screen-analysis based device security
MX2017007292A (en) Remote programming for access control system with virtual card data.
MX345061B (en) Method, one or more computer-readable non-transitory storage media and a device, in particular relating to computing resources and/or mobile-device-based trust computing.
MX356939B (en) Method and system for generating an advanced storage key in a mobile device without secure elements.
MX361793B (en) Method and system for secure authentication of user and mobile device without secure elements.
GB2538927A (en) Methods and apparatus to identify media using hash keys
GB2529991A (en) Utilizing voice biometrics
PH12016501866A1 (en) Systems and methods for identity validation and verification
IN2014MU00771A (en)
SG2013042429A (en) Method for receiving an electronic receipt of an electronic payment transaction into a mobile device
GB2509278A (en) Network user identification and authentication
SG10201903580QA (en) Method and device for verifying a trusted terminal
PH12019501975A1 (en) Method and apparatus for user authentication based on a feature information
PH12016502164A1 (en) System and method for facilitating electronic transaction