SG11202107299VA - Method, system, and computer program product for network bound proxy re-encryption and pin translation - Google Patents
Method, system, and computer program product for network bound proxy re-encryption and pin translationInfo
- Publication number
- SG11202107299VA SG11202107299VA SG11202107299VA SG11202107299VA SG11202107299VA SG 11202107299V A SG11202107299V A SG 11202107299VA SG 11202107299V A SG11202107299V A SG 11202107299VA SG 11202107299V A SG11202107299V A SG 11202107299VA SG 11202107299V A SG11202107299V A SG 11202107299VA
- Authority
- SG
- Singapore
- Prior art keywords
- encryption
- computer program
- program product
- network bound
- pin translation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
- G06Q20/027—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1091—Use of an encrypted form of the PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962790163P | 2019-01-09 | 2019-01-09 | |
US201962929344P | 2019-11-01 | 2019-11-01 | |
PCT/US2020/012896 WO2020146605A1 (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202107299VA true SG11202107299VA (en) | 2021-08-30 |
Family
ID=71521820
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202107301TA SG11202107301TA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
SG11202107299VA SG11202107299VA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202107301TA SG11202107301TA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Country Status (5)
Country | Link |
---|---|
US (5) | US11488152B2 (en) |
EP (3) | EP4220385A1 (en) |
CN (3) | CN113316798A (en) |
SG (2) | SG11202107301TA (en) |
WO (2) | WO2020146602A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210365932A1 (en) * | 2020-05-19 | 2021-11-25 | Mastercard International Incorporated | System and method for trusted offline payment tokens |
CN116868540A (en) | 2021-02-12 | 2023-10-10 | 维萨国际服务协会 | Privacy preserving identity data exchange based on hybrid encryption |
CN113595971B (en) * | 2021-06-02 | 2022-05-17 | 云南财经大学 | Block chain-based distributed data security sharing method, system and computer readable medium |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5781632A (en) * | 1995-02-08 | 1998-07-14 | Odom; Gregory Glen | Method and apparatus for secured transmission of confidential data over an unsecured network |
AUPO441796A0 (en) * | 1996-12-30 | 1997-01-23 | Commonwealth Bank Of Australia | Transaction key generation system |
US6760711B1 (en) | 1999-01-11 | 2004-07-06 | Microsoft Corporation | Merchant owned, ISP-hosted online stores with secure data store |
US20100161494A1 (en) | 2008-12-24 | 2010-06-24 | Intuit Inc. | Technique for performing financial transactions over a network |
EP2704354B1 (en) * | 2011-04-27 | 2021-04-07 | Kabushiki Kaisha Toshiba | Re-encryption key generator, re-encryption apparatus, and program |
EP2767110A4 (en) * | 2011-10-12 | 2015-01-28 | C Sam Inc | A multi-tiered secure mobile transactions enabling platform |
US8819428B2 (en) * | 2011-10-21 | 2014-08-26 | Ebay Inc. | Point of sale (POS) personal identification number (PIN) security |
CN109508983A (en) | 2012-01-05 | 2019-03-22 | 维萨国际服务协会 | Data protection is carried out with conversion |
US9124419B2 (en) * | 2012-05-08 | 2015-09-01 | Discretix Technologies Ltd. | Method, device, and system of secure entry and handling of passwords |
US20150271153A1 (en) | 2012-07-10 | 2015-09-24 | Kurt Ryan Rohloff | Information management using proxy re-encryption |
JP5395938B1 (en) | 2012-09-25 | 2014-01-22 | 株式会社東芝 | Cooperation service providing system and server device |
SG10201800291UA (en) * | 2013-07-15 | 2018-02-27 | Visa Int Service Ass | Secure remote payment transaction processing |
AU2015204913B2 (en) | 2014-01-07 | 2020-06-04 | Visa International Service Association | Encrypted payment transactions |
WO2017035265A1 (en) * | 2015-08-24 | 2017-03-02 | Sequent Software, Inc. | System and method for a self-calculating token vault |
CN105281915B (en) | 2015-11-04 | 2018-11-20 | 博宏信息技术有限公司 | A kind of method that code keyboard generates ciphertext |
US11756032B2 (en) * | 2016-04-01 | 2023-09-12 | Sionic Mobile Corporation | Methods and systems for secure payment processing |
GB2549118B (en) | 2016-04-05 | 2020-12-16 | Samsung Electronics Co Ltd | Electronic payment system using identity-based public key cryptography |
US10574440B2 (en) | 2016-05-06 | 2020-02-25 | ZeroDB, Inc. | High-performance access management and data protection for distributed messaging applications |
US10581603B2 (en) * | 2016-05-06 | 2020-03-03 | ZeroDB, Inc. | Method and system for secure delegated access to encrypted data in big data computing clusters |
GB2551775A (en) * | 2016-06-30 | 2018-01-03 | Ipco 2012 Ltd | Communications device, point of sale device, payment device and methods |
AU2017296055A1 (en) * | 2016-07-15 | 2019-02-07 | Cardinalcommerce Corporation | Authentication to authorization bridge using enriched messages |
WO2018096559A1 (en) * | 2016-11-22 | 2018-05-31 | Ezetap Mobile Solutions Pvt. Ltd. | System and method for translation and authentication of secure pin and sensitive data |
WO2018208787A1 (en) | 2017-05-08 | 2018-11-15 | ZeroDB, Inc. | High-performance access management and data protection for distributed messaging applications |
US10650365B2 (en) * | 2017-06-02 | 2020-05-12 | Visa International Service Association | Automated point of sale system |
CN108830587A (en) | 2018-04-28 | 2018-11-16 | 广东工业大学 | A kind of NFC method of mobile payment based on no certificate signature |
-
2020
- 2020-01-09 WO PCT/US2020/012891 patent/WO2020146602A1/en unknown
- 2020-01-09 EP EP23164932.8A patent/EP4220385A1/en active Pending
- 2020-01-09 US US17/421,587 patent/US11488152B2/en active Active
- 2020-01-09 CN CN202080008427.XA patent/CN113316798A/en active Pending
- 2020-01-09 EP EP20738187.2A patent/EP3909003B1/en active Active
- 2020-01-09 EP EP20738978.4A patent/EP3908923B1/en active Active
- 2020-01-09 CN CN202080008563.9A patent/CN113316765B/en active Active
- 2020-01-09 SG SG11202107301TA patent/SG11202107301TA/en unknown
- 2020-01-09 WO PCT/US2020/012896 patent/WO2020146605A1/en unknown
- 2020-01-09 SG SG11202107299VA patent/SG11202107299VA/en unknown
- 2020-01-09 CN CN202211272620.1A patent/CN115660680A/en active Pending
- 2020-01-09 US US17/421,608 patent/US11736295B2/en active Active
-
2022
- 2022-04-29 US US17/732,989 patent/US11757644B2/en active Active
-
2023
- 2023-05-19 US US18/320,491 patent/US20230299962A1/en active Pending
- 2023-06-22 US US18/212,779 patent/US20230353366A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US11488152B2 (en) | 2022-11-01 |
US11736295B2 (en) | 2023-08-22 |
US20220044233A1 (en) | 2022-02-10 |
US20220045997A1 (en) | 2022-02-10 |
EP3908923A1 (en) | 2021-11-17 |
EP4220385A1 (en) | 2023-08-02 |
EP3909003B1 (en) | 2023-05-03 |
EP3909003A1 (en) | 2021-11-17 |
US20230299962A1 (en) | 2023-09-21 |
US20230353366A1 (en) | 2023-11-02 |
CN113316765A (en) | 2021-08-27 |
EP3909003A4 (en) | 2022-03-02 |
US20220270088A1 (en) | 2022-08-25 |
CN113316765B (en) | 2022-11-04 |
SG11202107301TA (en) | 2021-08-30 |
CN113316798A (en) | 2021-08-27 |
US11757644B2 (en) | 2023-09-12 |
WO2020146602A1 (en) | 2020-07-16 |
EP3908923B1 (en) | 2023-04-19 |
EP3908923A4 (en) | 2022-03-02 |
CN115660680A (en) | 2023-01-31 |
WO2020146605A1 (en) | 2020-07-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
PL3533177T3 (en) | Multi-blockchain network data processing method, apparatus, and server | |
SG11202107301TA (en) | Method, system, and computer program product for network bound proxy re-encryption and pin translation | |
SG11202103094WA (en) | Apparatus, method and computer program for connection management | |
EP3358806A4 (en) | Method, device and server for service migration during software upgrade under nfv architecture | |
EP3592017A4 (en) | Credential information processing method and apparatus for network connection, and application (app) | |
EP3610384A4 (en) | Apparatus, method and computer program product for trust management | |
EP3820396A4 (en) | System method and computer program product, for computer aided surgery | |
EP3610226A4 (en) | System, method, and computer program product for machine-learning-based traffic prediction | |
EP4014474A4 (en) | Apparatus, method, and computer program | |
EP3930302A4 (en) | Data transmission system, data transmission method and computer program | |
EP3567483A4 (en) | Method for processing service data, and network device | |
SG10201906364SA (en) | Service brokering system and related service requirement matching sub-system, computer program product, and service requirement matching method | |
SG10202012156PA (en) | Method, system, and computer program product for preventing transmission of malicious data | |
EP3539338A4 (en) | Method, apparatus and computer program product for transmission | |
EP3756333A4 (en) | Method, apparatus and computer program | |
GB201914309D0 (en) | Apparatus, method and computer program | |
IL261819B (en) | System, method and computer program product for data analysis | |
EP3857948A4 (en) | Method, apparatus and computer program product | |
GB201916012D0 (en) | Apparatus, method, and computer program | |
EP3928547A4 (en) | Apparatus, method, and computer program | |
EP3925274A4 (en) | Apparatus, method and computer program for communication using configured grants | |
SG11202108249XA (en) | Apparatus, methods, and computer programs for network slice selection | |
EP3763069A4 (en) | Method, apparatus and computer program | |
EP3707610A4 (en) | Method, apparatuses, computer programs and computer program products for data storage | |
EP3631740A4 (en) | System, method, and computer program product for maintaining transaction integrity over public networks |