SG11201809852UA - Identity verification method and system, and intelligent wearable device - Google Patents

Identity verification method and system, and intelligent wearable device

Info

Publication number
SG11201809852UA
SG11201809852UA SG11201809852UA SG11201809852UA SG11201809852UA SG 11201809852U A SG11201809852U A SG 11201809852UA SG 11201809852U A SG11201809852U A SG 11201809852UA SG 11201809852U A SG11201809852U A SG 11201809852UA SG 11201809852U A SG11201809852U A SG 11201809852UA
Authority
SG
Singapore
Prior art keywords
verification
wearable device
intelligent wearable
time password
provisioning
Prior art date
Application number
SG11201809852UA
Inventor
Xiaochen Wang
Yuanbo Sun
Fei Meng
Mian Huang
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11201809852UA publication Critical patent/SG11201809852UA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/163Wearable computers, e.g. on a belt
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

Implementations the application an method system an wearable The d obtaining and storing, by an intelligent wearable device configured with an embedded algorithm provisioning from provisioning by a 5 intelligent invoking, the wearable ice, embedded algorithm by a operating and presenting one-time password based on the provisioning data; obtaining, by a merchant device, the presented one-time password and sending the one-time password to a verification server for verification; and receiving, by the merchant device, a verification success 10 message by verification to identity rification. implementations of the present application can implement identity verification of the intelligent wearable device.
SG11201809852UA 2016-05-11 2017-04-11 Identity verification method and system, and intelligent wearable device SG11201809852UA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610308911.XA CN107370711B (en) 2016-05-11 2016-05-11 Identity verification method and system and intelligent wearable device
PCT/CN2017/079992 WO2017193747A1 (en) 2016-05-11 2017-04-11 Identity verification method and system, and intelligent wearable device

Publications (1)

Publication Number Publication Date
SG11201809852UA true SG11201809852UA (en) 2018-12-28

Family

ID=60266213

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201809852UA SG11201809852UA (en) 2016-05-11 2017-04-11 Identity verification method and system, and intelligent wearable device

Country Status (10)

Country Link
US (2) US10891364B2 (en)
EP (1) EP3457656B1 (en)
JP (1) JP6731202B2 (en)
KR (1) KR102151338B1 (en)
CN (2) CN113411317B (en)
MY (1) MY193140A (en)
PH (1) PH12018502372A1 (en)
SG (1) SG11201809852UA (en)
TW (1) TWI681313B (en)
WO (1) WO2017193747A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113411317B (en) 2016-05-11 2023-05-26 创新先进技术有限公司 Identity verification method and system and intelligent wearable device
US11190495B2 (en) * 2017-10-02 2021-11-30 Colossio, Inc. One-time-pad encryption
TWI677805B (en) * 2018-04-24 2019-11-21 大陸商物聯智慧科技(深圳)有限公司 Data encryption and decryption method and system and apparatus terminal and data encryption and decryption method thereof
WO2020162739A1 (en) 2019-02-08 2020-08-13 주식회사 센스톤 Method, program and apparatus for identifying device using virtual code based on unique value of chip
WO2020162738A1 (en) 2019-02-08 2020-08-13 주식회사 센스톤 Method, program, server, and wearable device for providing financial transaction on basis of wearable device
KR102243532B1 (en) * 2019-02-08 2021-04-22 주식회사 센스톤 Method, program and apparatus for identifying devices using virtual code based on unique value
CN113761501A (en) * 2020-06-03 2021-12-07 上海惠芽信息技术有限公司 Activation method, electronic device, and computer storage medium
CN111970670A (en) * 2020-08-18 2020-11-20 中国银行股份有限公司 APP key management method, device and system
US11799639B2 (en) 2021-01-05 2023-10-24 Bank Of America Corporation Systems and methods using distributed ledgers to correct for missing one time passwords in event processing

Family Cites Families (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002269479A (en) * 2001-03-09 2002-09-20 Sony Corp Information processor, information processing method, recording medium, and program
US9258124B2 (en) * 2006-04-21 2016-02-09 Symantec Corporation Time and event based one time password
US20100138652A1 (en) * 2006-07-07 2010-06-03 Rotem Sela Content control method using certificate revocation lists
US8281375B2 (en) * 2007-01-05 2012-10-02 Ebay Inc. One time password authentication of websites
US8843757B2 (en) 2009-11-12 2014-09-23 Ca, Inc. One time PIN generation
US9832019B2 (en) * 2009-11-17 2017-11-28 Unho Choi Authentication in ubiquitous environment
US9665868B2 (en) * 2010-05-10 2017-05-30 Ca, Inc. One-time use password systems and methods
CA2807189C (en) 2010-08-04 2017-04-25 Research In Motion Limited Method and apparatus for providing continuous authentication based on dynamic personal information
TW201214188A (en) * 2010-09-21 2012-04-01 Authenex Asia Inc Authentication method for a keypro device and related keypro device
US10225264B2 (en) 2011-10-25 2019-03-05 Salesforce.Com, Inc. Automated authorization response techniques
US10225242B2 (en) 2011-10-25 2019-03-05 Salesforce.Com, Inc. Automated authorization response techniques
US10212588B2 (en) * 2011-10-25 2019-02-19 Salesforce.Com, Inc. Preemptive authorization automation
TW201414328A (en) * 2012-09-24 2014-04-01 Sage Information Systems Co Ltd System for generating one time password and generating method using for the same
TW201421390A (en) * 2012-10-19 2014-06-01 Mpayme Ltd Method and system for secure mobile payment
JP6025118B2 (en) * 2012-12-04 2016-11-16 和則 藤沢 Electronic coupon usage method and electronic coupon usage system
GB2509322A (en) 2012-12-28 2014-07-02 Securenvoy Plc Time-based two factor authentication
WO2014106031A1 (en) * 2012-12-28 2014-07-03 Vasco Data Security, Inc. Remote authentication and transaction signatures
US8904482B1 (en) * 2012-12-31 2014-12-02 Emc Corporation Techniques for securing a one-time passcode with an alteration code
US9077711B2 (en) * 2013-09-05 2015-07-07 Verizon Patent And Licensing Inc. Selective complex data entry from one time passwords for authentication
US9646150B2 (en) * 2013-10-01 2017-05-09 Kalman Csaba Toth Electronic identity and credentialing system
CN103647645B (en) * 2013-11-05 2017-04-05 北京宏基恒信科技有限责任公司 The dynamic password authentication method of many certificate servers, system and device
CN104601327B (en) * 2013-12-30 2019-01-29 腾讯科技(深圳)有限公司 A kind of safe verification method, relevant device and system
CN104753892B (en) * 2013-12-31 2020-08-21 腾讯科技(深圳)有限公司 Network resource transmission method, device and system
EP3092782B8 (en) 2014-01-03 2021-03-17 McAfee, LLC Mechanisms for conserving resources of wearable devices
CN104780044A (en) * 2014-01-15 2015-07-15 杭州晟元芯片技术有限公司 Dynamic token type smart watch based on mobile phone, Bluetooth and two-dimension code and implementation method
DE102014000644A1 (en) 2014-01-17 2015-07-23 Giesecke & Devrient Gmbh Procedure for authorizing a transaction
JP6170844B2 (en) * 2014-02-14 2017-07-26 株式会社Nttドコモ Authentication information management system
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
KR102302439B1 (en) 2014-02-21 2021-09-15 삼성전자주식회사 Electronic device
US9332008B2 (en) * 2014-03-28 2016-05-03 Netiq Corporation Time-based one time password (TOTP) for network authentication
US9826400B2 (en) 2014-04-04 2017-11-21 Qualcomm Incorporated Method and apparatus that facilitates a wearable identity manager
US9621526B2 (en) * 2014-04-10 2017-04-11 OTP Technologies, Inc. Content encryption and decryption
JP5781678B1 (en) * 2014-06-04 2015-09-24 東北インフォメーション・システムズ株式会社 Electronic data utilization system, portable terminal device, and method in electronic data utilization system
US10084601B2 (en) * 2014-06-17 2018-09-25 Sony Corporation Method, system and electronic device
US9749131B2 (en) * 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
KR20160016515A (en) * 2014-07-31 2016-02-15 삼성전자주식회사 Method and device for encrypting or decrypting contents
BR102014023229B1 (en) * 2014-09-18 2020-02-27 Samsung Eletrônica da Amazônia Ltda. METHOD FOR AUTHENTICATING TRANSACTION OF VARIOUS FACTORS USING WEARABLE DEVICES
CN104243494B (en) * 2014-10-11 2018-01-23 上海众人网络安全技术有限公司 A kind of data processing method
US10509898B2 (en) * 2015-01-21 2019-12-17 Jim Barney et al. Enhanced security authentication methods, systems and media
CN104616148A (en) * 2015-01-23 2015-05-13 恒银金融科技有限公司 Payment terminal and paying method of wearable payment terminal
KR102485830B1 (en) * 2015-02-13 2023-01-09 삼성전자주식회사 Processing for secure information
JP2016207043A (en) 2015-04-24 2016-12-08 Line株式会社 Terminal equipment, settlement server, settlement system, settlement method, and program
KR101649934B1 (en) * 2015-04-28 2016-08-31 엔에이치엔엔터테인먼트 주식회사 Simple payment system and simple payment method using the system
CN106204035A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Off-line identity identifying method, intelligent terminal and system
US10122709B2 (en) * 2015-05-12 2018-11-06 Citrix Systems, Inc. Multifactor contextual authentication and entropy from device or device input or gesture authentication
CN204791151U (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 A intelligent bracelet and intelligent bracelet payment systems for mobile terminal payment
CN105005727B (en) * 2015-07-28 2018-07-17 深圳市文鼎创数据科技有限公司 Control system based on dynamic password and USBKEY and its control method
US9860243B2 (en) * 2015-07-29 2018-01-02 International Business Machines Corporation Authenticating applications using a temporary password
CN105023182B (en) * 2015-08-12 2019-03-08 上海众人网络安全技术有限公司 A kind of purchase system and method based on Intelligent bracelet
US9916432B2 (en) * 2015-10-16 2018-03-13 Nokia Technologies Oy Storing and retrieving cryptographic keys from biometric data
CN105429660B (en) * 2015-11-12 2019-03-08 邵军利 A kind of intelligence wearable device
CN113411317B (en) 2016-05-11 2023-05-26 创新先进技术有限公司 Identity verification method and system and intelligent wearable device

Also Published As

Publication number Publication date
CN113411317B (en) 2023-05-26
KR102151338B1 (en) 2020-09-03
TW201740302A (en) 2017-11-16
WO2017193747A1 (en) 2017-11-16
US10878074B2 (en) 2020-12-29
EP3457656A4 (en) 2019-04-10
EP3457656A1 (en) 2019-03-20
JP2019521416A (en) 2019-07-25
KR20190005985A (en) 2019-01-16
EP3457656B1 (en) 2022-04-06
US20200127822A1 (en) 2020-04-23
US20190097796A1 (en) 2019-03-28
CN113411317A (en) 2021-09-17
US10891364B2 (en) 2021-01-12
PH12018502372A1 (en) 2019-03-04
CN107370711A (en) 2017-11-21
CN107370711B (en) 2021-05-11
TWI681313B (en) 2020-01-01
MY193140A (en) 2022-09-26
JP6731202B2 (en) 2020-07-29

Similar Documents

Publication Publication Date Title
SG11201809852UA (en) Identity verification method and system, and intelligent wearable device
MX2019013495A (en) System and method for biometric identification.
SG10201900029SA (en) Automated account provisioning
EP3905081A4 (en) Method and device for authenticating identity information, and server
PH12016501866B1 (en) Systems and methods for identity validation and verification
MX2017005313A (en) Transaction messaging.
SG10201907538SA (en) Cloud encryption key broker apparatuses, methods and systems
MX361806B (en) Methods and systems for recommending communications configurations.
MX2017012016A (en) User communications with a merchant through a social networking system.
PH12017501388A1 (en) Methods and systems for order processing
WO2016073411A3 (en) System and method for a renewable secure boot
MX2017008820A (en) Executing requests for services using shared location data.
CO2017007201A2 (en) System and method for processing electronic transaction requests
MX2019008232A (en) Access control system with messaging.
MY187905A (en) Method and apparatus for providing card service using electronic device
WO2016145449A3 (en) Client services for applied key management systems and processes
MX359025B (en) Control method and apparatus for display device, and intelligent pad.
GB2562923A (en) Data security system with encryption
WO2015142410A3 (en) Systems and methods for creating fingerprints of encryption devices
SG11201900367SA (en) Method and device for providing and obtaining graphic code information, and terminal
WO2018064628A3 (en) Systems, apparatuses, and methods for platform security
MX2020007773A (en) System and method for distributed, secure computing system.
MX2018015248A (en) System and method for incorporating branded creative content into messaging services.
NZ630359A (en) Methods and systems for sending bills from a biller to a payer
MX2016005295A (en) Flight notification method and setting method and device for flight.