SG10202101692RA - Methods and systems for pki-based authentication - Google Patents
Methods and systems for pki-based authenticationInfo
- Publication number
- SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA
- Authority
- SG
- Singapore
- Prior art keywords
- pki
- systems
- methods
- based authentication
- authentication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/941,364 US9832024B2 (en) | 2015-11-13 | 2015-11-13 | Methods and systems for PKI-based authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10202101692RA true SG10202101692RA (en) | 2021-04-29 |
Family
ID=58691535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10202101692RA SG10202101692RA (en) | 2015-11-13 | 2016-10-19 | Methods and systems for pki-based authentication |
Country Status (7)
Country | Link |
---|---|
US (4) | US9832024B2 (en) |
EP (2) | EP3375135B1 (en) |
CN (1) | CN108432180B (en) |
AU (1) | AU2016351458A1 (en) |
HK (1) | HK1256235A1 (en) |
SG (1) | SG10202101692RA (en) |
WO (1) | WO2017083071A1 (en) |
Families Citing this family (141)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11250423B2 (en) * | 2012-05-04 | 2022-02-15 | Institutional Cash Distributors Technology, Llc | Encapsulated security tokens for electronic transactions |
US10489852B2 (en) * | 2013-07-02 | 2019-11-26 | Yodlee, Inc. | Financial account authentication |
CN104767613B (en) * | 2014-01-02 | 2018-02-13 | 腾讯科技(深圳)有限公司 | Signature verification method, apparatus and system |
US10277616B2 (en) * | 2014-09-25 | 2019-04-30 | Vigilant Ip Holdings Llc | Secure digital traffic analysis |
US20180314564A1 (en) * | 2015-05-27 | 2018-11-01 | Sampath Kumar Chilukuri | Communication in a federated computing environment |
US9832024B2 (en) | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
US10432403B2 (en) * | 2015-11-25 | 2019-10-01 | Fenwal, Inc. | Secure communication between infusion pump and server |
US10833843B1 (en) | 2015-12-03 | 2020-11-10 | United Services Automobile Association (USAA0 | Managing blockchain access |
US10419401B2 (en) * | 2016-01-08 | 2019-09-17 | Capital One Services, Llc | Methods and systems for securing data in the public cloud |
US10103885B2 (en) * | 2016-01-20 | 2018-10-16 | Mastercard International Incorporated | Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography |
US10007826B2 (en) * | 2016-03-07 | 2018-06-26 | ShoCard, Inc. | Transferring data files using a series of visual codes |
KR20170118431A (en) * | 2016-04-15 | 2017-10-25 | 삼성전자주식회사 | Electronic device and payment method using the same |
US10644875B2 (en) | 2016-04-28 | 2020-05-05 | International Business Machines Corporation | Pre-authorization of public key infrastructure |
MX2018013617A (en) * | 2016-05-13 | 2019-04-25 | Nchain Holdings Ltd | A method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger. |
US10291604B2 (en) | 2016-06-03 | 2019-05-14 | Docusign, Inc. | Universal access to document transaction platform |
US11295316B2 (en) * | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11593797B2 (en) * | 2016-06-12 | 2023-02-28 | Apple Inc. | Authentication using a secure circuit |
US10425465B1 (en) * | 2016-07-29 | 2019-09-24 | Google Llc | Hybrid cloud API management |
US10621314B2 (en) * | 2016-08-01 | 2020-04-14 | Palantir Technologies Inc. | Secure deployment of a software package |
US10523632B2 (en) | 2016-09-19 | 2019-12-31 | Verisign, Inc. | GTLD domain name registries RDAP architecture |
US10798093B2 (en) * | 2016-09-19 | 2020-10-06 | Verisign, Inc. | GTLD domain name registries RDAP architecture |
US10547457B1 (en) * | 2016-10-21 | 2020-01-28 | Wells Fargo Bank N.A. | Systems and methods for notary agent for public key infrastructure names |
US10762495B2 (en) * | 2016-12-30 | 2020-09-01 | Square, Inc. | Third-party access to secure hardware |
US10783517B2 (en) | 2016-12-30 | 2020-09-22 | Square, Inc. | Third-party access to secure hardware |
US10699003B2 (en) * | 2017-01-23 | 2020-06-30 | Hysolate Ltd. | Virtual air-gapped endpoint, and methods thereof |
US11153322B2 (en) * | 2017-01-23 | 2021-10-19 | Hysolate Ltd. | Techniques for seamlessly launching applications in appropriate virtual machines |
US11150936B2 (en) | 2017-01-23 | 2021-10-19 | Hysolate Ltd. | Techniques for binding user identities to appropriate virtual machines with single sign-on |
US11010352B2 (en) * | 2017-01-23 | 2021-05-18 | Hysolate Ltd. | Unified file system on air-gapped endpoints |
USRE49968E1 (en) | 2017-02-06 | 2024-05-14 | Ping Identity Corporation | Electronic identification verification methods and systems with storage of certification records to a side chain |
US10498541B2 (en) | 2017-02-06 | 2019-12-03 | ShocCard, Inc. | Electronic identification verification methods and systems |
US10742638B1 (en) * | 2017-04-27 | 2020-08-11 | EMC IP Holding Company LLC | Stateless principal authentication and authorization in a distributed network |
US10158626B1 (en) * | 2017-06-16 | 2018-12-18 | International Business Machines Corporation | Token-based access control |
US10581909B2 (en) * | 2017-06-26 | 2020-03-03 | Oath Inc. | Systems and methods for electronic signing of electronic content requests |
US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
US10476879B2 (en) * | 2017-07-26 | 2019-11-12 | International Business Machines Corporation | Blockchain authentication via hard/soft token verification |
US11487868B2 (en) * | 2017-08-01 | 2022-11-01 | Pc Matic, Inc. | System, method, and apparatus for computer security |
US11681568B1 (en) | 2017-08-02 | 2023-06-20 | Styra, Inc. | Method and apparatus to reduce the window for policy violations with minimal consistency assumptions |
US10990702B1 (en) | 2017-08-02 | 2021-04-27 | Styra, Inc. | Method and apparatus for authorizing API calls |
JP6904183B2 (en) * | 2017-09-12 | 2021-07-14 | 富士通株式会社 | Information processing equipment, programs and information processing methods |
US10862883B1 (en) * | 2017-10-09 | 2020-12-08 | Amazon Technologies, Inc. | Custom authorization of network connected devices using signed credentials |
WO2019102239A1 (en) * | 2017-11-22 | 2019-05-31 | Vilmos Andras | Method for ensuring secure and authorized communications between a first device and a second device |
US10567156B2 (en) | 2017-11-30 | 2020-02-18 | Bank Of America Corporation | Blockchain-based unexpected data detection |
WO2019113552A1 (en) | 2017-12-08 | 2019-06-13 | ShoCard, Inc. | Methods and systems for recovering data using dynamic passwords |
US10698664B2 (en) * | 2017-12-21 | 2020-06-30 | Fujitsu Limited | API mashup generation |
US11223480B2 (en) * | 2018-01-02 | 2022-01-11 | Cyberark Software Ltd. | Detecting compromised cloud-identity access information |
CN107919956B (en) * | 2018-01-04 | 2020-09-22 | 重庆邮电大学 | End-to-end safety guarantee method in cloud environment facing to Internet of things |
US11038923B2 (en) * | 2018-02-16 | 2021-06-15 | Nokia Technologies Oy | Security management in communication systems with security-based architecture using application layer security |
US10999272B2 (en) * | 2018-03-30 | 2021-05-04 | Lendingclub Corporation | Authenticating and authorizing users with JWT and tokenization |
US11316693B2 (en) * | 2018-04-13 | 2022-04-26 | Microsoft Technology Licensing, Llc | Trusted platform module-based prepaid access token for commercial IoT online services |
US11792163B2 (en) | 2018-05-12 | 2023-10-17 | Nokia Technologies Oy | Security management for network function messaging in a communication system |
US10721621B2 (en) * | 2018-05-23 | 2020-07-21 | Cisco Technology, Inc. | Updating policy for a video flow during transitions |
US11632360B1 (en) | 2018-07-24 | 2023-04-18 | Pure Storage, Inc. | Remote access to a storage device |
US11444779B2 (en) | 2018-08-02 | 2022-09-13 | Paypal, Inc. | Techniques for securing application programming interface requests using multi-party digital signatures |
US10719373B1 (en) | 2018-08-23 | 2020-07-21 | Styra, Inc. | Validating policies and data in API authorization system |
US11853463B1 (en) | 2018-08-23 | 2023-12-26 | Styra, Inc. | Leveraging standard protocols to interface unmodified applications and services |
US11080410B1 (en) | 2018-08-24 | 2021-08-03 | Styra, Inc. | Partial policy evaluation |
JP7228977B2 (en) | 2018-08-30 | 2023-02-27 | キヤノン株式会社 | Information processing device, authorization system and verification method |
US10491404B1 (en) * | 2018-09-12 | 2019-11-26 | Hotpyp, Inc. | Systems and methods for cryptographic key generation and authentication |
WO2020053481A1 (en) * | 2018-09-13 | 2020-03-19 | Nokia Technologies Oy | Network function authentication using a digitally signed service request in a communication system |
US10965453B2 (en) * | 2018-09-14 | 2021-03-30 | Beijing Jingdong Shangke Information Technology Co., Ltd. | System and method for authenticated encryption based on device fingerprint |
US11475435B2 (en) * | 2018-09-19 | 2022-10-18 | Jpmorgan Chase Bank, N.A. | Method and system for generating digital wallet accounts |
US11171783B2 (en) * | 2018-09-28 | 2021-11-09 | Infosys Limited | System and method for decentralized identity management, authentication and authorization of applications |
US11184162B1 (en) * | 2018-09-28 | 2021-11-23 | NortonLifeLock Inc. | Privacy preserving secure task automation |
US10877825B2 (en) * | 2018-10-04 | 2020-12-29 | Oracle International Corporation | System for offline object based storage and mocking of rest responses |
CN109150910A (en) * | 2018-10-11 | 2019-01-04 | 平安科技(深圳)有限公司 | Log in token generation and verification method, device and storage medium |
US11082221B2 (en) | 2018-10-17 | 2021-08-03 | Ping Identity Corporation | Methods and systems for creating and recovering accounts using dynamic passwords |
US10979227B2 (en) | 2018-10-17 | 2021-04-13 | Ping Identity Corporation | Blockchain ID connect |
US11140169B1 (en) * | 2018-10-31 | 2021-10-05 | Workday, Inc. | Cloud platform access system |
US11921884B2 (en) | 2018-11-28 | 2024-03-05 | Visa International Service Association | Techniques for preventing collusion using simultaneous key release |
US10936191B1 (en) | 2018-12-05 | 2021-03-02 | Pure Storage, Inc. | Access control for a computing system |
US10938558B2 (en) * | 2018-12-17 | 2021-03-02 | Zebra Technologies Corporation | Authentication for connecting a barcode reader to a client computing device |
US10938254B2 (en) * | 2018-12-18 | 2021-03-02 | Dell Products, L.P. | Secure wireless charging |
US20200210257A1 (en) * | 2018-12-28 | 2020-07-02 | Salesforce.Com, Inc. | Deduplication of Application Program Interface Calls |
CN109450649A (en) * | 2018-12-28 | 2019-03-08 | 北京金山安全软件有限公司 | Gateway verification method and device based on application program interface and electronic equipment |
US11165575B2 (en) * | 2019-01-02 | 2021-11-02 | Citrix Systems, Inc. | Tracking tainted connection agents |
US11394712B2 (en) * | 2019-01-18 | 2022-07-19 | Anchor Labs, Inc. | Secure account access |
US11888998B2 (en) * | 2019-01-29 | 2024-01-30 | Schneider Electric USA, Inc. | Security context distribution service |
US10666431B1 (en) * | 2019-03-11 | 2020-05-26 | Capital One Services, Llc | Systems and methods for enhancing web security |
EP3939355A1 (en) * | 2019-03-12 | 2022-01-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and nodes for handling system information |
US11316841B2 (en) * | 2019-03-25 | 2022-04-26 | Micron Technology, Inc. | Secure communication between an intermediary device and a network |
US11361660B2 (en) * | 2019-03-25 | 2022-06-14 | Micron Technology, Inc. | Verifying identity of an emergency vehicle during operation |
US11128474B2 (en) * | 2019-03-25 | 2021-09-21 | Micron Technology, Inc. | Secure device communication |
US11233650B2 (en) | 2019-03-25 | 2022-01-25 | Micron Technology, Inc. | Verifying identity of a vehicle entering a trust zone |
US11456880B2 (en) | 2019-03-25 | 2022-09-27 | Micron Technology, Inc. | Cryptographically secure mechanism for remotely controlling an autonomous vehicle |
US11387983B2 (en) * | 2019-03-25 | 2022-07-12 | Micron Technology, Inc. | Secure medical apparatus communication |
JP6811339B2 (en) | 2019-03-27 | 2021-01-13 | アドバンスド ニュー テクノロジーズ カンパニー リミテッド | Read public data for blockchain networks using a highly available and reliable execution environment |
CN115967534A (en) | 2019-03-27 | 2023-04-14 | 创新先进技术有限公司 | Retrieving public data of blockchain networks using trusted execution environments |
EP3910907B1 (en) * | 2019-03-29 | 2023-08-02 | Advanced New Technologies Co., Ltd. | Retrieving access data for blockchain networks using highly available trusted execution environments |
US11475108B2 (en) * | 2019-04-25 | 2022-10-18 | Stanton Kee Nethery | Secure hardware backdoor for digital devices |
EP3970335A1 (en) | 2019-05-14 | 2022-03-23 | Vilmos, András | Method for implementing client side credential control to authorize access to a protected device |
GB201907395D0 (en) * | 2019-05-24 | 2019-07-10 | Nchain Holdings Ltd | Knowledge proof |
CN110149212B (en) * | 2019-05-31 | 2022-05-27 | 杭州安恒信息技术股份有限公司 | Database security reinforcement method and device and electronic equipment |
US11190514B2 (en) * | 2019-06-17 | 2021-11-30 | Microsoft Technology Licensing, Llc | Client-server security enhancement using information accessed from access tokens |
EP3688633A4 (en) * | 2019-07-02 | 2020-10-07 | Alibaba Group Holding Limited | System and method for verifying verifiable claims |
CN111164594B (en) * | 2019-07-02 | 2023-08-25 | 创新先进技术有限公司 | System and method for mapping a de-centralized identity to a real entity |
SG11202113032SA (en) * | 2019-07-05 | 2021-12-30 | Visa Int Service Ass | System, method, and computer program product for third-party authorization |
US11140165B2 (en) * | 2019-07-22 | 2021-10-05 | Bank Of America Corporation | System for selective mapping of distributed resources across network edge framework for authorized user access |
US20220271923A1 (en) * | 2019-07-31 | 2022-08-25 | Nec Corporation | Data delivery apparatus and method, data requesting apparatus and method, data delivery system, and computer readable medium |
EP3987713A1 (en) * | 2019-08-13 | 2022-04-27 | Google LLC | Protecting the integrity of communications from client devices |
US11122054B2 (en) | 2019-08-27 | 2021-09-14 | Bank Of America Corporation | Security tool |
CN110543773A (en) * | 2019-08-29 | 2019-12-06 | 北京艾摩瑞策科技有限公司 | Method and device for signing private key of block chain of knowledge question and answer platform user |
US11126752B2 (en) * | 2019-09-04 | 2021-09-21 | Fresenius Medical Care Holdings, Inc. | Authentication of medical device computing systems by using metadata signature |
CN110611670A (en) * | 2019-09-12 | 2019-12-24 | 贵阳叁玖互联网医疗有限公司 | API request encryption method and device |
CN114788226B (en) * | 2019-09-24 | 2024-06-07 | 魔术实验室公司 | Unmanaged tool for building decentralized computer applications |
CN110661813A (en) * | 2019-10-11 | 2020-01-07 | 浪潮软件股份有限公司 | CMSP-based identity authentication implementation method for RESTful service of object storage |
US11159407B2 (en) | 2019-10-15 | 2021-10-26 | At&T Intellectual Property I, L.P. | Detection of unauthorized cryptomining |
CN110958226A (en) * | 2019-11-14 | 2020-04-03 | 广州江南科友科技股份有限公司 | Password equipment access control method based on TLS |
US11640475B1 (en) * | 2019-11-26 | 2023-05-02 | Gobeep, Inc. | Systems and processes for providing secure client controlled and managed exchange of data between parties |
CN111010385A (en) * | 2019-12-09 | 2020-04-14 | 山东浪潮商用系统有限公司 | RESTful-based secure interaction method |
CN111162899A (en) * | 2020-01-13 | 2020-05-15 | 成都安联云防保安服务有限公司 | Encryption transmission method for potential safety risk data |
US20230066725A1 (en) * | 2020-02-27 | 2023-03-02 | Nec Corporation | Data delivery apparatus and method, data requesting apparatus and method, data delivery system, and computer readable medium |
US11463258B2 (en) * | 2020-03-13 | 2022-10-04 | Ebay Inc. | Secure token refresh |
US11349644B1 (en) * | 2020-04-29 | 2022-05-31 | Wells Fargo Bank, N.A. | Database exclusion (DBX) for multi party access (MPA) to sensitive personal information (SPI) |
MX2022013614A (en) * | 2020-05-05 | 2023-01-30 | Alex Blate | Endpoint and protocol for trusted digital manufacturing. |
US11562080B2 (en) | 2020-05-08 | 2023-01-24 | International Business Machines Corporation | Secure ingress and egress of data fields through legacy computer systems |
CN113630251B (en) * | 2020-05-08 | 2024-09-06 | 瞻博网络公司 | Network traffic monitoring or storage using signed uniform resource locators |
EP3917103A1 (en) * | 2020-05-29 | 2021-12-01 | Siemens Aktiengesellschaft | Method, system, transmitter and receiver for authenticating a transmitter |
US11405197B2 (en) * | 2020-06-08 | 2022-08-02 | Google Llc | Security token expiration using signing key rotation |
CN113810173B (en) * | 2020-06-12 | 2024-06-14 | 华为技术有限公司 | Method for checking application information, message processing method and device |
CN111786798A (en) * | 2020-07-08 | 2020-10-16 | 浪潮云信息技术股份公司 | Rest interface authentication implementation method applied to JavaWeb |
EP3982615B1 (en) * | 2020-10-12 | 2024-09-11 | Nokia Technologies Oy | Authorization in communication networks |
WO2022093164A1 (en) * | 2020-10-26 | 2022-05-05 | Google Llc | Multi-recipient secure communication |
US11246032B1 (en) | 2020-10-29 | 2022-02-08 | Motional Ad Llc | Device provisioning and authentication |
CN112311531B (en) * | 2020-11-05 | 2023-05-30 | 重庆邮电大学 | Controllable front-end and back-end secure communication method |
US20220245747A1 (en) * | 2021-01-29 | 2022-08-04 | Techjutsu Inc. | System and method for caller verification |
US12021754B2 (en) | 2021-02-24 | 2024-06-25 | Cisco Technology, Inc. | Enforcing consent contracts to manage network traffic |
US20220272102A1 (en) * | 2021-02-24 | 2022-08-25 | Cisco Technology, Inc. | Creating Network-Based Consent Contracts |
CN113709109B (en) * | 2021-07-27 | 2024-02-27 | 云南昆钢电子信息科技有限公司 | Safety system and method based on cloud and edge data exchange |
US20230029815A1 (en) * | 2021-07-29 | 2023-02-02 | The Toronto-Dominion Bank | System and methods for secure processing of real-time resource transfers |
US20230177477A1 (en) * | 2021-12-03 | 2023-06-08 | Adp, Inc. | Smartpay allocation as a service |
CN113938328A (en) * | 2021-12-18 | 2022-01-14 | 中建电子商务有限责任公司 | Interface label checking method and system |
CN114679275B (en) * | 2022-01-06 | 2024-04-12 | 成都农村商业银行股份有限公司 | Digital signature verification method, platform and system |
US11977620B2 (en) * | 2022-01-19 | 2024-05-07 | VMware LLC | Attestation of application identity for inter-app communications |
US20230246819A1 (en) * | 2022-02-01 | 2023-08-03 | Juniper Networks, Inc. | Public key infrastructure based session authentication |
US20230291548A1 (en) * | 2022-03-08 | 2023-09-14 | Western Digital Technologies, Inc. | Authorization requests from a data storage device to multiple manager devices |
CN114553416A (en) * | 2022-03-18 | 2022-05-27 | 北京友普信息技术有限公司 | Data encryption processing method for signature verification of application program interface |
US11882057B2 (en) | 2022-03-28 | 2024-01-23 | Bank Of America Corporation | Pluggable cloud security system |
US11818276B1 (en) * | 2022-10-07 | 2023-11-14 | Uab 360 It | Optimized header information to enable access control |
CN115913755A (en) * | 2022-12-07 | 2023-04-04 | 重庆紫光华山智安科技有限公司 | Data encryption transmission method, device, equipment and medium |
WO2024136890A1 (en) * | 2022-12-19 | 2024-06-27 | Visa International Service Association | Method and systems for improving computer network security |
CN116865980A (en) * | 2023-09-05 | 2023-10-10 | 杭州比智科技有限公司 | Method and system for realizing tamper resistance by adding signature based on SHA-256 Hash algorithm interface |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7620980B1 (en) | 1999-07-21 | 2009-11-17 | Sun Microsystems, Inc. | Secure data broker |
US7653815B2 (en) * | 2001-06-12 | 2010-01-26 | Research In Motion Limited | System and method for processing encoded messages for exchange with a mobile data communication device |
US7243370B2 (en) | 2001-06-14 | 2007-07-10 | Microsoft Corporation | Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication |
US8126722B2 (en) * | 2001-12-20 | 2012-02-28 | Verizon Business Global Llc | Application infrastructure platform (AIP) |
GB2384404B (en) * | 2002-01-18 | 2005-02-16 | Sun Microsystems Inc | Key management |
US7240366B2 (en) | 2002-05-17 | 2007-07-03 | Microsoft Corporation | End-to-end authentication of session initiation protocol messages using certificates |
US7702636B1 (en) * | 2002-07-31 | 2010-04-20 | Cadence Design Systems, Inc. | Federated system and methods and mechanisms of implementing and using such a system |
US7421732B2 (en) * | 2003-05-05 | 2008-09-02 | Nokia Corporation | System, apparatus, and method for providing generic internet protocol authentication |
US20050154889A1 (en) * | 2004-01-08 | 2005-07-14 | International Business Machines Corporation | Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol |
EP2157759B1 (en) * | 2004-09-07 | 2013-01-09 | Research In Motion Limited | System and method for updating message trust status |
US20070180512A1 (en) * | 2005-10-21 | 2007-08-02 | Hewlett-Packard Development Company, L.P. | Methods of setting up and operating a reverse channel across a firewall |
US7814538B2 (en) * | 2005-12-13 | 2010-10-12 | Microsoft Corporation | Two-way authentication using a combined code |
CN101001144B (en) * | 2006-01-13 | 2010-05-12 | 华为技术有限公司 | Method for implementing authentication by entity authentication centre |
CN101136748B (en) * | 2006-08-31 | 2012-03-07 | 普天信息技术研究院 | Identification authentication method and system |
US7886339B2 (en) * | 2007-01-20 | 2011-02-08 | International Business Machines Corporation | Radius security origin check |
JP2010527549A (en) * | 2007-05-16 | 2010-08-12 | パナソニック株式会社 | Methods in mixed network-based and host-based mobility management |
CN100518063C (en) * | 2007-06-19 | 2009-07-22 | 北京握奇数据系统有限公司 | Physical certifying method and device |
US8701180B2 (en) * | 2009-12-04 | 2014-04-15 | Sap Ag | Securing communications between different network zones |
US9100171B1 (en) * | 2009-12-17 | 2015-08-04 | Secure Forward, LLC | Computer-implemented forum for enabling secure exchange of information |
US20110173443A1 (en) * | 2010-01-12 | 2011-07-14 | Phion Ag | Secure extranet server |
WO2011141579A2 (en) | 2010-05-14 | 2011-11-17 | Gemalto Sa | System and method for providing security for cloud computing resources using portable security devices |
US8458808B2 (en) * | 2011-01-07 | 2013-06-04 | Mastercard International Incorporated | Premium access to open application programming interface systems and methods |
US9032204B2 (en) * | 2011-01-07 | 2015-05-12 | Mastercard International Incorporated | Methods and systems for providing a signed digital certificate in real time |
US9130937B1 (en) * | 2011-03-07 | 2015-09-08 | Raytheon Company | Validating network communications |
US10728231B2 (en) * | 2012-07-09 | 2020-07-28 | Massachusetts Institute Of Technology | Data security using inter-zone gate circuits |
US9225675B2 (en) | 2012-08-08 | 2015-12-29 | Amazon Technologies, Inc. | Data storage application programming interface |
US8719280B1 (en) | 2012-10-16 | 2014-05-06 | Google Inc. | Person-based information aggregation |
US9313227B2 (en) * | 2013-09-17 | 2016-04-12 | Amigon Technologies Ltd. | Gateway-based audit log and method for prevention of data leakage |
US9306972B2 (en) * | 2013-09-17 | 2016-04-05 | Fireglass Ltd. | Method and system for prevention of malware infections |
US10762229B2 (en) * | 2015-07-07 | 2020-09-01 | Private Machines Inc. | Secure searchable and shareable remote storage system and method |
US9832024B2 (en) | 2015-11-13 | 2017-11-28 | Visa International Service Association | Methods and systems for PKI-based authentication |
-
2015
- 2015-11-13 US US14/941,364 patent/US9832024B2/en active Active
-
2016
- 2016-10-19 EP EP16864748.5A patent/EP3375135B1/en active Active
- 2016-10-19 SG SG10202101692RA patent/SG10202101692RA/en unknown
- 2016-10-19 CN CN201680066079.5A patent/CN108432180B/en active Active
- 2016-10-19 AU AU2016351458A patent/AU2016351458A1/en not_active Withdrawn
- 2016-10-19 EP EP21186266.9A patent/EP3913854B1/en active Active
- 2016-10-19 WO PCT/US2016/057744 patent/WO2017083071A1/en active Application Filing
-
2017
- 2017-10-30 US US15/798,289 patent/US10153907B2/en active Active
-
2018
- 2018-11-06 US US16/182,176 patent/US11088853B2/en active Active
- 2018-11-27 HK HK18115173.7A patent/HK1256235A1/en unknown
-
2021
- 2021-07-12 US US17/373,037 patent/US11588649B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
AU2016351458A1 (en) | 2018-04-19 |
US20210344512A1 (en) | 2021-11-04 |
WO2017083071A1 (en) | 2017-05-18 |
US20180062858A1 (en) | 2018-03-01 |
US20170141926A1 (en) | 2017-05-18 |
US10153907B2 (en) | 2018-12-11 |
US20190074979A1 (en) | 2019-03-07 |
EP3375135A4 (en) | 2018-09-19 |
EP3913854B1 (en) | 2024-03-13 |
EP3375135A1 (en) | 2018-09-19 |
EP3375135B1 (en) | 2021-08-18 |
US11588649B2 (en) | 2023-02-21 |
US11088853B2 (en) | 2021-08-10 |
CN108432180A (en) | 2018-08-21 |
EP3913854A1 (en) | 2021-11-24 |
US9832024B2 (en) | 2017-11-28 |
HK1256235A1 (en) | 2019-09-20 |
CN108432180B (en) | 2022-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1256235A1 (en) | Methods and systems for pki-based authentication | |
EP3353728A4 (en) | Authentication systems and methods | |
HK1232356A1 (en) | Authentication system and method | |
GB201602969D0 (en) | Method and system for authentication | |
HK1258246A1 (en) | Authentication methods and systems | |
GB201621453D0 (en) | Systems and methods for multi-stage identity authentication | |
EP3451613C0 (en) | Authentication method and system | |
SG11201606403YA (en) | Authentication system and method | |
SG11201706770UA (en) | Methods, apparatus, and systems for identity authentication | |
HK1217050A1 (en) | System and method for secure authentication | |
PT3191997T (en) | Systems and methods for hybrid hardware authentication | |
IL258926B (en) | Interception-proof authentication and encryption system and method | |
ZA201801964B (en) | Systems and methods for product authentication | |
SG10201407627SA (en) | Authentication system and method | |
GB201621176D0 (en) | Authentication systems and methods | |
ZA201801349B (en) | Methods and systems for authentication using zero-knowledge code | |
GB201509031D0 (en) | Authentication methods and systems | |
GB201509030D0 (en) | Authentication methods and systems | |
GB201618360D0 (en) | Authentication method and system | |
GB201615363D0 (en) | Authentication system |