SG10201810442RA - Secure identity verification - Google Patents
Secure identity verificationInfo
- Publication number
- SG10201810442RA SG10201810442RA SG10201810442RA SG10201810442RA SG10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA SG 10201810442R A SG10201810442R A SG 10201810442RA
- Authority
- SG
- Singapore
- Prior art keywords
- key
- user
- preset
- identity verification
- verification
- Prior art date
Links
- 238000012795 verification Methods 0.000 title abstract 5
- 238000000034 method Methods 0.000 abstract 2
- 238000013507 mapping Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
Abstract
SECURE IDENTITY VERIFICATION Embodiments of the present application relate to a method, apparatus, and system for verifying an identity of a user. The method includes receiving a preset key that is associated with a key carrier that is a physical object, storing the preset key in a database storing mappings between a plurality of preset keys and a plurality of users, receiving a verification key in connection with an identity verification of a user, retrieving the preset key associated with the user from the database, determining whether the verification key matches the preset key associated with the user, and causing a determination of whether the key carrier is authentic. (Fig. 1A)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410242475.1A CN105450400B (en) | 2014-06-03 | 2014-06-03 | Identity verification method, client, server and system |
US14/727,755 US11410212B2 (en) | 2014-06-03 | 2015-06-01 | Secure identity verification |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201810442RA true SG10201810442RA (en) | 2018-12-28 |
Family
ID=54702264
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201609228PA SG11201609228PA (en) | 2014-06-03 | 2015-06-02 | Secure identity verification |
SG10201810442RA SG10201810442RA (en) | 2014-06-03 | 2015-06-02 | Secure identity verification |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201609228PA SG11201609228PA (en) | 2014-06-03 | 2015-06-02 | Secure identity verification |
Country Status (8)
Country | Link |
---|---|
US (1) | US11410212B2 (en) |
JP (1) | JP6484254B2 (en) |
KR (1) | KR102076473B1 (en) |
CN (1) | CN105450400B (en) |
HK (1) | HK1221345A1 (en) |
SG (2) | SG11201609228PA (en) |
TW (1) | TWI696133B (en) |
WO (1) | WO2015187627A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10181055B2 (en) | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
US11190936B2 (en) | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
US10778417B2 (en) | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
KR102054711B1 (en) * | 2016-01-04 | 2019-12-11 | 클레브엑스 엘엘씨 | Data security system using encryption |
CZ308885B6 (en) * | 2019-09-26 | 2021-08-04 | Univerzita Tomáše Bati ve Zlíně | Identity and license verification system for working with highly sensitive data |
US10827353B1 (en) * | 2019-11-26 | 2020-11-03 | CUSEUM, Inc. | System and method for seamless admission to a venue |
TWI751553B (en) * | 2020-05-11 | 2022-01-01 | 財金資訊股份有限公司 | Method and system for paying digital currency |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633979B1 (en) | 1999-06-25 | 2003-10-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and arrangements for secure linking of entity authentication and ciphering key generation |
FI111763B (en) * | 1999-11-04 | 2003-09-15 | Sonera Oyj | Property control procedures and systems |
JP2001216395A (en) | 2000-02-03 | 2001-08-10 | Michimasa Hatana | Authentication system using possessed paper money and application of the system |
EP1261904A2 (en) * | 2000-02-28 | 2002-12-04 | Edentity Limited | Information processing system and method |
US20020049636A1 (en) | 2000-04-11 | 2002-04-25 | Griffin Carter H. | System and method for generating and transmitting data keys to facilitate delivery, pick-up and other commercial transactions |
US6987853B2 (en) * | 2000-11-29 | 2006-01-17 | Bodacion Technologies, Llc | Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess |
US7711122B2 (en) * | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
IES20020190A2 (en) * | 2002-03-13 | 2003-09-17 | Daon Ltd | a biometric authentication system and method |
US7333611B1 (en) | 2002-09-27 | 2008-02-19 | Northwestern University | Ultra-secure, ultra-efficient cryptographic system |
US20050033651A1 (en) * | 2003-08-06 | 2005-02-10 | Aleksander Kogan | Method and apparatus for on-line payment of a transaction in cash |
US8533791B2 (en) * | 2004-07-15 | 2013-09-10 | Anakam, Inc. | System and method for second factor authentication services |
GB0504573D0 (en) * | 2005-03-04 | 2005-04-13 | Firstondemand Ltd | Traceability and authentication of security papers |
JP2007257491A (en) * | 2006-03-24 | 2007-10-04 | Sony Ericsson Mobilecommunications Japan Inc | Counterfeit bill detection system and portable communication terminal |
US20130227286A1 (en) | 2006-04-25 | 2013-08-29 | Andre Jacques Brisson | Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud |
CA2648780C (en) | 2006-04-25 | 2013-07-16 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
GB0622164D0 (en) * | 2006-11-07 | 2006-12-20 | Claricom Ltd | Verification method |
CN101075985A (en) * | 2007-02-08 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Instant telecommunication system, server and instant telecommunication method when safety access |
CN101163014A (en) * | 2007-11-30 | 2008-04-16 | 中国电信股份有限公司 | Dynamic password identification authenticating system and method |
EP2101276A1 (en) | 2008-03-10 | 2009-09-16 | Aceinc Pty. Limited | Data access and user identity verification |
US8438385B2 (en) * | 2008-03-13 | 2013-05-07 | Fujitsu Limited | Method and apparatus for identity verification |
KR20090104638A (en) | 2008-03-31 | 2009-10-06 | 한국전자통신연구원 | User terminal with identity selector and method for identity authentication using identity selector of the same |
US8438382B2 (en) * | 2008-08-06 | 2013-05-07 | Symantec Corporation | Credential management system and method |
US9118666B2 (en) * | 2010-06-30 | 2015-08-25 | Google Inc. | Computing device integrity verification |
US8582829B2 (en) | 2010-11-03 | 2013-11-12 | Gary S. Shuster | Online identity verification |
JP2012113540A (en) | 2010-11-25 | 2012-06-14 | Masatomi Takaesu | Web system and web server |
CN102271042B (en) * | 2011-08-25 | 2013-10-09 | 北京神州绿盟信息安全科技股份有限公司 | Certificate authorization method, system, universal serial bus (USB) Key equipment and server |
US20140082095A1 (en) * | 2012-09-17 | 2014-03-20 | Helen Y. Balinsky | Workflow monitoring |
US9172698B1 (en) | 2012-10-12 | 2015-10-27 | Ut-Battelle, Llc | System and method for key generation in security tokens |
US20140304183A1 (en) | 2013-04-05 | 2014-10-09 | Verif-Y, Inc. | Verification System |
CN104144419B (en) * | 2014-01-24 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
WO2015118519A1 (en) * | 2014-02-04 | 2015-08-13 | Koren Moshe | System for authenticating items |
-
2014
- 2014-06-03 CN CN201410242475.1A patent/CN105450400B/en active Active
- 2014-09-25 TW TW103133256A patent/TWI696133B/en active
-
2015
- 2015-06-01 US US14/727,755 patent/US11410212B2/en active Active
- 2015-06-02 SG SG11201609228PA patent/SG11201609228PA/en unknown
- 2015-06-02 KR KR1020167030751A patent/KR102076473B1/en active IP Right Grant
- 2015-06-02 SG SG10201810442RA patent/SG10201810442RA/en unknown
- 2015-06-02 WO PCT/US2015/033681 patent/WO2015187627A1/en active Application Filing
- 2015-06-02 JP JP2016566210A patent/JP6484254B2/en active Active
-
2016
- 2016-08-02 HK HK16109185.8A patent/HK1221345A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
JP2017526023A (en) | 2017-09-07 |
WO2015187627A1 (en) | 2015-12-10 |
TWI696133B (en) | 2020-06-11 |
SG11201609228PA (en) | 2016-12-29 |
TW201546729A (en) | 2015-12-16 |
KR102076473B1 (en) | 2020-05-19 |
US20150348027A1 (en) | 2015-12-03 |
KR20160140919A (en) | 2016-12-07 |
HK1221345A1 (en) | 2017-05-26 |
CN105450400B (en) | 2019-12-13 |
US11410212B2 (en) | 2022-08-09 |
CN105450400A (en) | 2016-03-30 |
JP6484254B2 (en) | 2019-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201810442RA (en) | Secure identity verification | |
AU2019268183A1 (en) | Fingerprint based authentication for single sign on | |
MX354574B (en) | User authentication method and apparatus based on audio and video data. | |
PH12019500896A1 (en) | Settlement method, entrance control method, and apparatus | |
MX2019012571A (en) | Systems and methods for device verification and authentication. | |
SG10201810422SA (en) | Dual channel identity authentication | |
SG10201907025VA (en) | Method and system for verifying identities | |
SG11201811458SA (en) | Object allocation method and device | |
GB2533492A (en) | Utilizing voice biometrics | |
GB2579976A8 (en) | Identity verification using biometric data and non-invertible functions via blockchain | |
MY177409A (en) | Method and system for verifying an account operation | |
GB2552435A (en) | Screen-analysis based device security | |
MX2017007292A (en) | Remote programming for access control system with virtual card data. | |
MX345061B (en) | Method, one or more computer-readable non-transitory storage media and a device, in particular relating to computing resources and/or mobile-device-based trust computing. | |
MX356939B (en) | Method and system for generating an advanced storage key in a mobile device without secure elements. | |
MX361793B (en) | Method and system for secure authentication of user and mobile device without secure elements. | |
GB2538927A (en) | Methods and apparatus to identify media using hash keys | |
GB2529991A (en) | Utilizing voice biometrics | |
PH12016501866A1 (en) | Systems and methods for identity validation and verification | |
IN2014MU00771A (en) | ||
SG2013042429A (en) | Method for receiving an electronic receipt of an electronic payment transaction into a mobile device | |
GB2509278A (en) | Network user identification and authentication | |
SG10201903580QA (en) | Method and device for verifying a trusted terminal | |
PH12019501975A1 (en) | Method and apparatus for user authentication based on a feature information | |
PH12016502164A1 (en) | System and method for facilitating electronic transaction |