SG10201903114RA - Methods and systems for facilitating microservices for cryptographic operations - Google Patents
Methods and systems for facilitating microservices for cryptographic operationsInfo
- Publication number
- SG10201903114RA SG10201903114RA SG10201903114RA SG10201903114RA SG10201903114RA SG 10201903114R A SG10201903114R A SG 10201903114RA SG 10201903114R A SG10201903114R A SG 10201903114RA SG 10201903114R A SG10201903114R A SG 10201903114RA SG 10201903114R A SG10201903114R A SG 10201903114RA
- Authority
- SG
- Singapore
- Prior art keywords
- microservices
- facilitating
- systems
- methods
- cryptographic operations
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201903114RA SG10201903114RA (en) | 2019-04-08 | 2019-04-08 | Methods and systems for facilitating microservices for cryptographic operations |
US16/842,283 US11544677B2 (en) | 2019-04-08 | 2020-04-07 | Methods and systems for facilitating microservices for cryptographic operations |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201903114RA SG10201903114RA (en) | 2019-04-08 | 2019-04-08 | Methods and systems for facilitating microservices for cryptographic operations |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201903114RA true SG10201903114RA (en) | 2020-11-27 |
Family
ID=72663510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201903114RA SG10201903114RA (en) | 2019-04-08 | 2019-04-08 | Methods and systems for facilitating microservices for cryptographic operations |
Country Status (2)
Country | Link |
---|---|
US (1) | US11544677B2 (en) |
SG (1) | SG10201903114RA (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10956591B1 (en) * | 2020-01-27 | 2021-03-23 | Capital One Services, Llc | High performance tokenization platform for sensitive data |
WO2022170421A1 (en) * | 2021-02-09 | 2022-08-18 | Mastercard Technologies Canada ULC | Devices, methods, and computer-readable media for deploying modular network architecture |
US11816219B2 (en) * | 2021-06-01 | 2023-11-14 | Cisco Technology, Inc. | Binding a trust anchor and an ASIC |
US11893550B2 (en) | 2021-06-02 | 2024-02-06 | Thales Dis Cpl Usa, Inc. | System and method for hosting and remotely provisioning a payment HSM by way of out-of-band management |
CN113379418B (en) * | 2021-06-21 | 2024-04-05 | 上海盛付通电子支付服务有限公司 | Information verification method, device, medium and program product based on security plug-in |
US11917064B2 (en) * | 2021-12-03 | 2024-02-27 | ForgeRock, Inc. | Token transformation filter for the service mesh |
EP4224341A1 (en) * | 2022-02-07 | 2023-08-09 | nCipher Security Limited | A device and a method for performing a cryptographic algorithm |
US11856105B1 (en) * | 2022-05-22 | 2023-12-26 | Uab 360 It | Secure multi-factor authentication system including identity verification of an authorized user |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080178010A1 (en) * | 2007-01-18 | 2008-07-24 | Vaterlaus Robert K | Cryptographic web service |
GB2471282B (en) * | 2009-06-22 | 2015-02-18 | Barclays Bank Plc | Method and system for provision of cryptographic services |
US20150134953A1 (en) * | 2013-11-08 | 2015-05-14 | Motorola Solutions, Inc | Method and apparatus for offering cloud-based hsm services |
US20160149877A1 (en) * | 2014-06-05 | 2016-05-26 | Cavium, Inc. | Systems and methods for cloud-based web service security management basedon hardware security module |
SG10201805967SA (en) * | 2018-07-11 | 2020-02-27 | Mastercard International Inc | Methods and systems for encrypting data for a web application |
US20220191693A1 (en) * | 2020-12-11 | 2022-06-16 | International Business Machines Corporation | Remote management of hardware security modules |
-
2019
- 2019-04-08 SG SG10201903114RA patent/SG10201903114RA/en unknown
-
2020
- 2020-04-07 US US16/842,283 patent/US11544677B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US11544677B2 (en) | 2023-01-03 |
US20200320489A1 (en) | 2020-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201912230SA (en) | Methods and Systems For Blockchain-Implemented Event-Lock Encryption | |
IL284748A (en) | Anti-cyberbullying systems and methods | |
ZA201902470B (en) | System and method for information protection | |
SG10201903114RA (en) | Methods and systems for facilitating microservices for cryptographic operations | |
EP3745951A4 (en) | Devices, systems, and methods for tumor visualization and removal | |
ZA201902471B (en) | System and method for information protection | |
PL3748901T3 (en) | System and method for information protection | |
ZA201902472B (en) | System and method for information protection | |
SG11201912231VA (en) | Systems and methods for blockchain-dependent operation sets | |
EP3858064A4 (en) | System and methods for enabling dl-edt | |
ZA201902459B (en) | System and method for information protection | |
SG10201900198SA (en) | Methods and systems for cryptographic keys exchange | |
IL280219A (en) | Injection systems, injection tools and methods for same | |
EP3791570A4 (en) | Systems and methods for cross-redaction | |
IL284516A (en) | Systems and methods for modulating rna | |
EP3794764A4 (en) | A cryptographic system and method | |
EP3909220C0 (en) | System and method for secure detokenization | |
EP3718040A4 (en) | Systems and methods for improved data encryption | |
GB202016092D0 (en) | Systems and methods for features engineering | |
EP3721580A4 (en) | System and method for cryptographic choice mechanisms | |
GB201813390D0 (en) | Systems and methods for muulti-factor authentication | |
PL3554044T3 (en) | System and method for secure appliance operation | |
EP3659144A4 (en) | Systems and methods for targeted genome editing | |
GB2590239B (en) | Secure operations on encrypted data | |
EP4018618A4 (en) | Systems and processes for vaultless tokenization and encryption |