SG10202101692RA - Methods and systems for pki-based authentication - Google Patents

Methods and systems for pki-based authentication

Info

Publication number
SG10202101692RA
SG10202101692RA SG10202101692RA SG10202101692RA SG10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA SG 10202101692R A SG10202101692R A SG 10202101692RA
Authority
SG
Singapore
Prior art keywords
pki
systems
methods
based authentication
authentication
Prior art date
Application number
SG10202101692RA
Inventor
Minghua Xu
Jose Trevino
Ying Hao
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG10202101692RA publication Critical patent/SG10202101692RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)
SG10202101692RA 2015-11-13 2016-10-19 Methods and systems for pki-based authentication SG10202101692RA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/941,364 US9832024B2 (en) 2015-11-13 2015-11-13 Methods and systems for PKI-based authentication

Publications (1)

Publication Number Publication Date
SG10202101692RA true SG10202101692RA (en) 2021-04-29

Family

ID=58691535

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10202101692RA SG10202101692RA (en) 2015-11-13 2016-10-19 Methods and systems for pki-based authentication

Country Status (7)

Country Link
US (4) US9832024B2 (en)
EP (2) EP3375135B1 (en)
CN (1) CN108432180B (en)
AU (1) AU2016351458A1 (en)
HK (1) HK1256235A1 (en)
SG (1) SG10202101692RA (en)
WO (1) WO2017083071A1 (en)

Families Citing this family (141)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11250423B2 (en) * 2012-05-04 2022-02-15 Institutional Cash Distributors Technology, Llc Encapsulated security tokens for electronic transactions
US10489852B2 (en) * 2013-07-02 2019-11-26 Yodlee, Inc. Financial account authentication
CN104767613B (en) * 2014-01-02 2018-02-13 腾讯科技(深圳)有限公司 Signature verification method, apparatus and system
US10277616B2 (en) * 2014-09-25 2019-04-30 Vigilant Ip Holdings Llc Secure digital traffic analysis
US20180314564A1 (en) * 2015-05-27 2018-11-01 Sampath Kumar Chilukuri Communication in a federated computing environment
US9832024B2 (en) 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication
US10432403B2 (en) * 2015-11-25 2019-10-01 Fenwal, Inc. Secure communication between infusion pump and server
US10833843B1 (en) 2015-12-03 2020-11-10 United Services Automobile Association (USAA0 Managing blockchain access
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US10103885B2 (en) * 2016-01-20 2018-10-16 Mastercard International Incorporated Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
US10007826B2 (en) * 2016-03-07 2018-06-26 ShoCard, Inc. Transferring data files using a series of visual codes
KR20170118431A (en) * 2016-04-15 2017-10-25 삼성전자주식회사 Electronic device and payment method using the same
US10644875B2 (en) 2016-04-28 2020-05-05 International Business Machines Corporation Pre-authorization of public key infrastructure
MX2018013617A (en) * 2016-05-13 2019-04-25 Nchain Holdings Ltd A method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger.
US10291604B2 (en) 2016-06-03 2019-05-14 Docusign, Inc. Universal access to document transaction platform
US11295316B2 (en) * 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11593797B2 (en) * 2016-06-12 2023-02-28 Apple Inc. Authentication using a secure circuit
US10425465B1 (en) * 2016-07-29 2019-09-24 Google Llc Hybrid cloud API management
US10621314B2 (en) * 2016-08-01 2020-04-14 Palantir Technologies Inc. Secure deployment of a software package
US10523632B2 (en) 2016-09-19 2019-12-31 Verisign, Inc. GTLD domain name registries RDAP architecture
US10798093B2 (en) * 2016-09-19 2020-10-06 Verisign, Inc. GTLD domain name registries RDAP architecture
US10547457B1 (en) * 2016-10-21 2020-01-28 Wells Fargo Bank N.A. Systems and methods for notary agent for public key infrastructure names
US10762495B2 (en) * 2016-12-30 2020-09-01 Square, Inc. Third-party access to secure hardware
US10783517B2 (en) 2016-12-30 2020-09-22 Square, Inc. Third-party access to secure hardware
US10699003B2 (en) * 2017-01-23 2020-06-30 Hysolate Ltd. Virtual air-gapped endpoint, and methods thereof
US11153322B2 (en) * 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for seamlessly launching applications in appropriate virtual machines
US11150936B2 (en) 2017-01-23 2021-10-19 Hysolate Ltd. Techniques for binding user identities to appropriate virtual machines with single sign-on
US11010352B2 (en) * 2017-01-23 2021-05-18 Hysolate Ltd. Unified file system on air-gapped endpoints
USRE49968E1 (en) 2017-02-06 2024-05-14 Ping Identity Corporation Electronic identification verification methods and systems with storage of certification records to a side chain
US10498541B2 (en) 2017-02-06 2019-12-03 ShocCard, Inc. Electronic identification verification methods and systems
US10742638B1 (en) * 2017-04-27 2020-08-11 EMC IP Holding Company LLC Stateless principal authentication and authorization in a distributed network
US10158626B1 (en) * 2017-06-16 2018-12-18 International Business Machines Corporation Token-based access control
US10581909B2 (en) * 2017-06-26 2020-03-03 Oath Inc. Systems and methods for electronic signing of electronic content requests
US10819696B2 (en) * 2017-07-13 2020-10-27 Microsoft Technology Licensing, Llc Key attestation statement generation providing device anonymity
US10476879B2 (en) * 2017-07-26 2019-11-12 International Business Machines Corporation Blockchain authentication via hard/soft token verification
US11487868B2 (en) * 2017-08-01 2022-11-01 Pc Matic, Inc. System, method, and apparatus for computer security
US11681568B1 (en) 2017-08-02 2023-06-20 Styra, Inc. Method and apparatus to reduce the window for policy violations with minimal consistency assumptions
US10990702B1 (en) 2017-08-02 2021-04-27 Styra, Inc. Method and apparatus for authorizing API calls
JP6904183B2 (en) * 2017-09-12 2021-07-14 富士通株式会社 Information processing equipment, programs and information processing methods
US10862883B1 (en) * 2017-10-09 2020-12-08 Amazon Technologies, Inc. Custom authorization of network connected devices using signed credentials
WO2019102239A1 (en) * 2017-11-22 2019-05-31 Vilmos Andras Method for ensuring secure and authorized communications between a first device and a second device
US10567156B2 (en) 2017-11-30 2020-02-18 Bank Of America Corporation Blockchain-based unexpected data detection
WO2019113552A1 (en) 2017-12-08 2019-06-13 ShoCard, Inc. Methods and systems for recovering data using dynamic passwords
US10698664B2 (en) * 2017-12-21 2020-06-30 Fujitsu Limited API mashup generation
US11223480B2 (en) * 2018-01-02 2022-01-11 Cyberark Software Ltd. Detecting compromised cloud-identity access information
CN107919956B (en) * 2018-01-04 2020-09-22 重庆邮电大学 End-to-end safety guarantee method in cloud environment facing to Internet of things
US11038923B2 (en) * 2018-02-16 2021-06-15 Nokia Technologies Oy Security management in communication systems with security-based architecture using application layer security
US10999272B2 (en) * 2018-03-30 2021-05-04 Lendingclub Corporation Authenticating and authorizing users with JWT and tokenization
US11316693B2 (en) * 2018-04-13 2022-04-26 Microsoft Technology Licensing, Llc Trusted platform module-based prepaid access token for commercial IoT online services
US11792163B2 (en) 2018-05-12 2023-10-17 Nokia Technologies Oy Security management for network function messaging in a communication system
US10721621B2 (en) * 2018-05-23 2020-07-21 Cisco Technology, Inc. Updating policy for a video flow during transitions
US11632360B1 (en) 2018-07-24 2023-04-18 Pure Storage, Inc. Remote access to a storage device
US11444779B2 (en) 2018-08-02 2022-09-13 Paypal, Inc. Techniques for securing application programming interface requests using multi-party digital signatures
US10719373B1 (en) 2018-08-23 2020-07-21 Styra, Inc. Validating policies and data in API authorization system
US11853463B1 (en) 2018-08-23 2023-12-26 Styra, Inc. Leveraging standard protocols to interface unmodified applications and services
US11080410B1 (en) 2018-08-24 2021-08-03 Styra, Inc. Partial policy evaluation
JP7228977B2 (en) 2018-08-30 2023-02-27 キヤノン株式会社 Information processing device, authorization system and verification method
US10491404B1 (en) * 2018-09-12 2019-11-26 Hotpyp, Inc. Systems and methods for cryptographic key generation and authentication
WO2020053481A1 (en) * 2018-09-13 2020-03-19 Nokia Technologies Oy Network function authentication using a digitally signed service request in a communication system
US10965453B2 (en) * 2018-09-14 2021-03-30 Beijing Jingdong Shangke Information Technology Co., Ltd. System and method for authenticated encryption based on device fingerprint
US11475435B2 (en) * 2018-09-19 2022-10-18 Jpmorgan Chase Bank, N.A. Method and system for generating digital wallet accounts
US11171783B2 (en) * 2018-09-28 2021-11-09 Infosys Limited System and method for decentralized identity management, authentication and authorization of applications
US11184162B1 (en) * 2018-09-28 2021-11-23 NortonLifeLock Inc. Privacy preserving secure task automation
US10877825B2 (en) * 2018-10-04 2020-12-29 Oracle International Corporation System for offline object based storage and mocking of rest responses
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
US11082221B2 (en) 2018-10-17 2021-08-03 Ping Identity Corporation Methods and systems for creating and recovering accounts using dynamic passwords
US10979227B2 (en) 2018-10-17 2021-04-13 Ping Identity Corporation Blockchain ID connect
US11140169B1 (en) * 2018-10-31 2021-10-05 Workday, Inc. Cloud platform access system
US11921884B2 (en) 2018-11-28 2024-03-05 Visa International Service Association Techniques for preventing collusion using simultaneous key release
US10936191B1 (en) 2018-12-05 2021-03-02 Pure Storage, Inc. Access control for a computing system
US10938558B2 (en) * 2018-12-17 2021-03-02 Zebra Technologies Corporation Authentication for connecting a barcode reader to a client computing device
US10938254B2 (en) * 2018-12-18 2021-03-02 Dell Products, L.P. Secure wireless charging
US20200210257A1 (en) * 2018-12-28 2020-07-02 Salesforce.Com, Inc. Deduplication of Application Program Interface Calls
CN109450649A (en) * 2018-12-28 2019-03-08 北京金山安全软件有限公司 Gateway verification method and device based on application program interface and electronic equipment
US11165575B2 (en) * 2019-01-02 2021-11-02 Citrix Systems, Inc. Tracking tainted connection agents
US11394712B2 (en) * 2019-01-18 2022-07-19 Anchor Labs, Inc. Secure account access
US11888998B2 (en) * 2019-01-29 2024-01-30 Schneider Electric USA, Inc. Security context distribution service
US10666431B1 (en) * 2019-03-11 2020-05-26 Capital One Services, Llc Systems and methods for enhancing web security
EP3939355A1 (en) * 2019-03-12 2022-01-19 Telefonaktiebolaget Lm Ericsson (Publ) Method and nodes for handling system information
US11316841B2 (en) * 2019-03-25 2022-04-26 Micron Technology, Inc. Secure communication between an intermediary device and a network
US11361660B2 (en) * 2019-03-25 2022-06-14 Micron Technology, Inc. Verifying identity of an emergency vehicle during operation
US11128474B2 (en) * 2019-03-25 2021-09-21 Micron Technology, Inc. Secure device communication
US11233650B2 (en) 2019-03-25 2022-01-25 Micron Technology, Inc. Verifying identity of a vehicle entering a trust zone
US11456880B2 (en) 2019-03-25 2022-09-27 Micron Technology, Inc. Cryptographically secure mechanism for remotely controlling an autonomous vehicle
US11387983B2 (en) * 2019-03-25 2022-07-12 Micron Technology, Inc. Secure medical apparatus communication
JP6811339B2 (en) 2019-03-27 2021-01-13 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Read public data for blockchain networks using a highly available and reliable execution environment
CN115967534A (en) 2019-03-27 2023-04-14 创新先进技术有限公司 Retrieving public data of blockchain networks using trusted execution environments
EP3910907B1 (en) * 2019-03-29 2023-08-02 Advanced New Technologies Co., Ltd. Retrieving access data for blockchain networks using highly available trusted execution environments
US11475108B2 (en) * 2019-04-25 2022-10-18 Stanton Kee Nethery Secure hardware backdoor for digital devices
EP3970335A1 (en) 2019-05-14 2022-03-23 Vilmos, András Method for implementing client side credential control to authorize access to a protected device
GB201907395D0 (en) * 2019-05-24 2019-07-10 Nchain Holdings Ltd Knowledge proof
CN110149212B (en) * 2019-05-31 2022-05-27 杭州安恒信息技术股份有限公司 Database security reinforcement method and device and electronic equipment
US11190514B2 (en) * 2019-06-17 2021-11-30 Microsoft Technology Licensing, Llc Client-server security enhancement using information accessed from access tokens
EP3688633A4 (en) * 2019-07-02 2020-10-07 Alibaba Group Holding Limited System and method for verifying verifiable claims
CN111164594B (en) * 2019-07-02 2023-08-25 创新先进技术有限公司 System and method for mapping a de-centralized identity to a real entity
SG11202113032SA (en) * 2019-07-05 2021-12-30 Visa Int Service Ass System, method, and computer program product for third-party authorization
US11140165B2 (en) * 2019-07-22 2021-10-05 Bank Of America Corporation System for selective mapping of distributed resources across network edge framework for authorized user access
US20220271923A1 (en) * 2019-07-31 2022-08-25 Nec Corporation Data delivery apparatus and method, data requesting apparatus and method, data delivery system, and computer readable medium
EP3987713A1 (en) * 2019-08-13 2022-04-27 Google LLC Protecting the integrity of communications from client devices
US11122054B2 (en) 2019-08-27 2021-09-14 Bank Of America Corporation Security tool
CN110543773A (en) * 2019-08-29 2019-12-06 北京艾摩瑞策科技有限公司 Method and device for signing private key of block chain of knowledge question and answer platform user
US11126752B2 (en) * 2019-09-04 2021-09-21 Fresenius Medical Care Holdings, Inc. Authentication of medical device computing systems by using metadata signature
CN110611670A (en) * 2019-09-12 2019-12-24 贵阳叁玖互联网医疗有限公司 API request encryption method and device
CN114788226B (en) * 2019-09-24 2024-06-07 魔术实验室公司 Unmanaged tool for building decentralized computer applications
CN110661813A (en) * 2019-10-11 2020-01-07 浪潮软件股份有限公司 CMSP-based identity authentication implementation method for RESTful service of object storage
US11159407B2 (en) 2019-10-15 2021-10-26 At&T Intellectual Property I, L.P. Detection of unauthorized cryptomining
CN110958226A (en) * 2019-11-14 2020-04-03 广州江南科友科技股份有限公司 Password equipment access control method based on TLS
US11640475B1 (en) * 2019-11-26 2023-05-02 Gobeep, Inc. Systems and processes for providing secure client controlled and managed exchange of data between parties
CN111010385A (en) * 2019-12-09 2020-04-14 山东浪潮商用系统有限公司 RESTful-based secure interaction method
CN111162899A (en) * 2020-01-13 2020-05-15 成都安联云防保安服务有限公司 Encryption transmission method for potential safety risk data
US20230066725A1 (en) * 2020-02-27 2023-03-02 Nec Corporation Data delivery apparatus and method, data requesting apparatus and method, data delivery system, and computer readable medium
US11463258B2 (en) * 2020-03-13 2022-10-04 Ebay Inc. Secure token refresh
US11349644B1 (en) * 2020-04-29 2022-05-31 Wells Fargo Bank, N.A. Database exclusion (DBX) for multi party access (MPA) to sensitive personal information (SPI)
MX2022013614A (en) * 2020-05-05 2023-01-30 Alex Blate Endpoint and protocol for trusted digital manufacturing.
US11562080B2 (en) 2020-05-08 2023-01-24 International Business Machines Corporation Secure ingress and egress of data fields through legacy computer systems
CN113630251B (en) * 2020-05-08 2024-09-06 瞻博网络公司 Network traffic monitoring or storage using signed uniform resource locators
EP3917103A1 (en) * 2020-05-29 2021-12-01 Siemens Aktiengesellschaft Method, system, transmitter and receiver for authenticating a transmitter
US11405197B2 (en) * 2020-06-08 2022-08-02 Google Llc Security token expiration using signing key rotation
CN113810173B (en) * 2020-06-12 2024-06-14 华为技术有限公司 Method for checking application information, message processing method and device
CN111786798A (en) * 2020-07-08 2020-10-16 浪潮云信息技术股份公司 Rest interface authentication implementation method applied to JavaWeb
EP3982615B1 (en) * 2020-10-12 2024-09-11 Nokia Technologies Oy Authorization in communication networks
WO2022093164A1 (en) * 2020-10-26 2022-05-05 Google Llc Multi-recipient secure communication
US11246032B1 (en) 2020-10-29 2022-02-08 Motional Ad Llc Device provisioning and authentication
CN112311531B (en) * 2020-11-05 2023-05-30 重庆邮电大学 Controllable front-end and back-end secure communication method
US20220245747A1 (en) * 2021-01-29 2022-08-04 Techjutsu Inc. System and method for caller verification
US12021754B2 (en) 2021-02-24 2024-06-25 Cisco Technology, Inc. Enforcing consent contracts to manage network traffic
US20220272102A1 (en) * 2021-02-24 2022-08-25 Cisco Technology, Inc. Creating Network-Based Consent Contracts
CN113709109B (en) * 2021-07-27 2024-02-27 云南昆钢电子信息科技有限公司 Safety system and method based on cloud and edge data exchange
US20230029815A1 (en) * 2021-07-29 2023-02-02 The Toronto-Dominion Bank System and methods for secure processing of real-time resource transfers
US20230177477A1 (en) * 2021-12-03 2023-06-08 Adp, Inc. Smartpay allocation as a service
CN113938328A (en) * 2021-12-18 2022-01-14 中建电子商务有限责任公司 Interface label checking method and system
CN114679275B (en) * 2022-01-06 2024-04-12 成都农村商业银行股份有限公司 Digital signature verification method, platform and system
US11977620B2 (en) * 2022-01-19 2024-05-07 VMware LLC Attestation of application identity for inter-app communications
US20230246819A1 (en) * 2022-02-01 2023-08-03 Juniper Networks, Inc. Public key infrastructure based session authentication
US20230291548A1 (en) * 2022-03-08 2023-09-14 Western Digital Technologies, Inc. Authorization requests from a data storage device to multiple manager devices
CN114553416A (en) * 2022-03-18 2022-05-27 北京友普信息技术有限公司 Data encryption processing method for signature verification of application program interface
US11882057B2 (en) 2022-03-28 2024-01-23 Bank Of America Corporation Pluggable cloud security system
US11818276B1 (en) * 2022-10-07 2023-11-14 Uab 360 It Optimized header information to enable access control
CN115913755A (en) * 2022-12-07 2023-04-04 重庆紫光华山智安科技有限公司 Data encryption transmission method, device, equipment and medium
WO2024136890A1 (en) * 2022-12-19 2024-06-27 Visa International Service Association Method and systems for improving computer network security
CN116865980A (en) * 2023-09-05 2023-10-10 杭州比智科技有限公司 Method and system for realizing tamper resistance by adding signature based on SHA-256 Hash algorithm interface

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7620980B1 (en) 1999-07-21 2009-11-17 Sun Microsystems, Inc. Secure data broker
US7653815B2 (en) * 2001-06-12 2010-01-26 Research In Motion Limited System and method for processing encoded messages for exchange with a mobile data communication device
US7243370B2 (en) 2001-06-14 2007-07-10 Microsoft Corporation Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication
US8126722B2 (en) * 2001-12-20 2012-02-28 Verizon Business Global Llc Application infrastructure platform (AIP)
GB2384404B (en) * 2002-01-18 2005-02-16 Sun Microsystems Inc Key management
US7240366B2 (en) 2002-05-17 2007-07-03 Microsoft Corporation End-to-end authentication of session initiation protocol messages using certificates
US7702636B1 (en) * 2002-07-31 2010-04-20 Cadence Design Systems, Inc. Federated system and methods and mechanisms of implementing and using such a system
US7421732B2 (en) * 2003-05-05 2008-09-02 Nokia Corporation System, apparatus, and method for providing generic internet protocol authentication
US20050154889A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Method and system for a flexible lightweight public-key-based mechanism for the GSS protocol
EP2157759B1 (en) * 2004-09-07 2013-01-09 Research In Motion Limited System and method for updating message trust status
US20070180512A1 (en) * 2005-10-21 2007-08-02 Hewlett-Packard Development Company, L.P. Methods of setting up and operating a reverse channel across a firewall
US7814538B2 (en) * 2005-12-13 2010-10-12 Microsoft Corporation Two-way authentication using a combined code
CN101001144B (en) * 2006-01-13 2010-05-12 华为技术有限公司 Method for implementing authentication by entity authentication centre
CN101136748B (en) * 2006-08-31 2012-03-07 普天信息技术研究院 Identification authentication method and system
US7886339B2 (en) * 2007-01-20 2011-02-08 International Business Machines Corporation Radius security origin check
JP2010527549A (en) * 2007-05-16 2010-08-12 パナソニック株式会社 Methods in mixed network-based and host-based mobility management
CN100518063C (en) * 2007-06-19 2009-07-22 北京握奇数据系统有限公司 Physical certifying method and device
US8701180B2 (en) * 2009-12-04 2014-04-15 Sap Ag Securing communications between different network zones
US9100171B1 (en) * 2009-12-17 2015-08-04 Secure Forward, LLC Computer-implemented forum for enabling secure exchange of information
US20110173443A1 (en) * 2010-01-12 2011-07-14 Phion Ag Secure extranet server
WO2011141579A2 (en) 2010-05-14 2011-11-17 Gemalto Sa System and method for providing security for cloud computing resources using portable security devices
US8458808B2 (en) * 2011-01-07 2013-06-04 Mastercard International Incorporated Premium access to open application programming interface systems and methods
US9032204B2 (en) * 2011-01-07 2015-05-12 Mastercard International Incorporated Methods and systems for providing a signed digital certificate in real time
US9130937B1 (en) * 2011-03-07 2015-09-08 Raytheon Company Validating network communications
US10728231B2 (en) * 2012-07-09 2020-07-28 Massachusetts Institute Of Technology Data security using inter-zone gate circuits
US9225675B2 (en) 2012-08-08 2015-12-29 Amazon Technologies, Inc. Data storage application programming interface
US8719280B1 (en) 2012-10-16 2014-05-06 Google Inc. Person-based information aggregation
US9313227B2 (en) * 2013-09-17 2016-04-12 Amigon Technologies Ltd. Gateway-based audit log and method for prevention of data leakage
US9306972B2 (en) * 2013-09-17 2016-04-05 Fireglass Ltd. Method and system for prevention of malware infections
US10762229B2 (en) * 2015-07-07 2020-09-01 Private Machines Inc. Secure searchable and shareable remote storage system and method
US9832024B2 (en) 2015-11-13 2017-11-28 Visa International Service Association Methods and systems for PKI-based authentication

Also Published As

Publication number Publication date
AU2016351458A1 (en) 2018-04-19
US20210344512A1 (en) 2021-11-04
WO2017083071A1 (en) 2017-05-18
US20180062858A1 (en) 2018-03-01
US20170141926A1 (en) 2017-05-18
US10153907B2 (en) 2018-12-11
US20190074979A1 (en) 2019-03-07
EP3375135A4 (en) 2018-09-19
EP3913854B1 (en) 2024-03-13
EP3375135A1 (en) 2018-09-19
EP3375135B1 (en) 2021-08-18
US11588649B2 (en) 2023-02-21
US11088853B2 (en) 2021-08-10
CN108432180A (en) 2018-08-21
EP3913854A1 (en) 2021-11-24
US9832024B2 (en) 2017-11-28
HK1256235A1 (en) 2019-09-20
CN108432180B (en) 2022-02-25

Similar Documents

Publication Publication Date Title
HK1256235A1 (en) Methods and systems for pki-based authentication
EP3353728A4 (en) Authentication systems and methods
HK1232356A1 (en) Authentication system and method
GB201602969D0 (en) Method and system for authentication
HK1258246A1 (en) Authentication methods and systems
GB201621453D0 (en) Systems and methods for multi-stage identity authentication
EP3451613C0 (en) Authentication method and system
SG11201606403YA (en) Authentication system and method
SG11201706770UA (en) Methods, apparatus, and systems for identity authentication
HK1217050A1 (en) System and method for secure authentication
PT3191997T (en) Systems and methods for hybrid hardware authentication
IL258926B (en) Interception-proof authentication and encryption system and method
ZA201801964B (en) Systems and methods for product authentication
SG10201407627SA (en) Authentication system and method
GB201621176D0 (en) Authentication systems and methods
ZA201801349B (en) Methods and systems for authentication using zero-knowledge code
GB201509031D0 (en) Authentication methods and systems
GB201509030D0 (en) Authentication methods and systems
GB201618360D0 (en) Authentication method and system
GB201615363D0 (en) Authentication system