SG11202107301TA - Method, system, and computer program product for network bound proxy re-encryption and pin translation - Google Patents
Method, system, and computer program product for network bound proxy re-encryption and pin translationInfo
- Publication number
- SG11202107301TA SG11202107301TA SG11202107301TA SG11202107301TA SG11202107301TA SG 11202107301T A SG11202107301T A SG 11202107301TA SG 11202107301T A SG11202107301T A SG 11202107301TA SG 11202107301T A SG11202107301T A SG 11202107301TA SG 11202107301T A SG11202107301T A SG 11202107301TA
- Authority
- SG
- Singapore
- Prior art keywords
- encryption
- computer program
- program product
- network bound
- pin translation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
- G06Q20/027—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1091—Use of an encrypted form of the PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962790163P | 2019-01-09 | 2019-01-09 | |
US201962929344P | 2019-11-01 | 2019-11-01 | |
PCT/US2020/012891 WO2020146602A1 (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202107301TA true SG11202107301TA (en) | 2021-08-30 |
Family
ID=71521820
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202107299VA SG11202107299VA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
SG11202107301TA SG11202107301TA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202107299VA SG11202107299VA (en) | 2019-01-09 | 2020-01-09 | Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Country Status (5)
Country | Link |
---|---|
US (5) | US11736295B2 (en) |
EP (3) | EP3908923B1 (en) |
CN (3) | CN113316765B (en) |
SG (2) | SG11202107299VA (en) |
WO (2) | WO2020146602A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210365932A1 (en) * | 2020-05-19 | 2021-11-25 | Mastercard International Incorporated | System and method for trusted offline payment tokens |
CN116868540A (en) | 2021-02-12 | 2023-10-10 | 维萨国际服务协会 | Privacy preserving identity data exchange based on hybrid encryption |
CN113595971B (en) * | 2021-06-02 | 2022-05-17 | 云南财经大学 | Block chain-based distributed data security sharing method, system and computer readable medium |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5781632A (en) * | 1995-02-08 | 1998-07-14 | Odom; Gregory Glen | Method and apparatus for secured transmission of confidential data over an unsecured network |
AUPO441796A0 (en) * | 1996-12-30 | 1997-01-23 | Commonwealth Bank Of Australia | Transaction key generation system |
US6760711B1 (en) | 1999-01-11 | 2004-07-06 | Microsoft Corporation | Merchant owned, ISP-hosted online stores with secure data store |
US20100161494A1 (en) | 2008-12-24 | 2010-06-24 | Intuit Inc. | Technique for performing financial transactions over a network |
EP2704354B1 (en) | 2011-04-27 | 2021-04-07 | Kabushiki Kaisha Toshiba | Re-encryption key generator, re-encryption apparatus, and program |
CN109919586B (en) * | 2011-10-12 | 2023-05-02 | 万事达移动交易方案公司 | Multi-layer secure mobile transaction enabled platform |
US8819428B2 (en) * | 2011-10-21 | 2014-08-26 | Ebay Inc. | Point of sale (POS) personal identification number (PIN) security |
CN104094302B (en) * | 2012-01-05 | 2018-12-14 | 维萨国际服务协会 | Data protection is carried out with conversion |
US9344275B2 (en) * | 2012-05-08 | 2016-05-17 | Arm Technologies Israel Ltd. | System, device, and method of secure entry and handling of passwords |
US20150271153A1 (en) | 2012-07-10 | 2015-09-24 | Kurt Ryan Rohloff | Information management using proxy re-encryption |
JP5395938B1 (en) | 2012-09-25 | 2014-01-22 | 株式会社東芝 | Cooperation service providing system and server device |
KR102119895B1 (en) * | 2013-07-15 | 2020-06-17 | 비자 인터네셔널 서비스 어소시에이션 | Secure remote payment transaction processing |
AU2015204913B2 (en) * | 2014-01-07 | 2020-06-04 | Visa International Service Association | Encrypted payment transactions |
WO2017035265A1 (en) * | 2015-08-24 | 2017-03-02 | Sequent Software, Inc. | System and method for a self-calculating token vault |
CN105281915B (en) * | 2015-11-04 | 2018-11-20 | 博宏信息技术有限公司 | A kind of method that code keyboard generates ciphertext |
WO2017173460A1 (en) * | 2016-04-01 | 2017-10-05 | Sionic Mobile Corporation | Methods and systems for secure transaction processing |
GB2549118B (en) * | 2016-04-05 | 2020-12-16 | Samsung Electronics Co Ltd | Electronic payment system using identity-based public key cryptography |
US10574440B2 (en) | 2016-05-06 | 2020-02-25 | ZeroDB, Inc. | High-performance access management and data protection for distributed messaging applications |
US10581603B2 (en) * | 2016-05-06 | 2020-03-03 | ZeroDB, Inc. | Method and system for secure delegated access to encrypted data in big data computing clusters |
GB2551775A (en) * | 2016-06-30 | 2018-01-03 | Ipco 2012 Ltd | Communications device, point of sale device, payment device and methods |
US11195173B2 (en) * | 2016-07-15 | 2021-12-07 | Cardinalcommerce Corporation | Authentication to authorization bridge using enriched messages |
WO2018096559A1 (en) | 2016-11-22 | 2018-05-31 | Ezetap Mobile Solutions Pvt. Ltd. | System and method for translation and authentication of secure pin and sensitive data |
WO2018208787A1 (en) | 2017-05-08 | 2018-11-15 | ZeroDB, Inc. | High-performance access management and data protection for distributed messaging applications |
US10650365B2 (en) * | 2017-06-02 | 2020-05-12 | Visa International Service Association | Automated point of sale system |
CN108830587A (en) | 2018-04-28 | 2018-11-16 | 广东工业大学 | A kind of NFC method of mobile payment based on no certificate signature |
-
2020
- 2020-01-09 SG SG11202107299VA patent/SG11202107299VA/en unknown
- 2020-01-09 EP EP20738978.4A patent/EP3908923B1/en active Active
- 2020-01-09 SG SG11202107301TA patent/SG11202107301TA/en unknown
- 2020-01-09 US US17/421,608 patent/US11736295B2/en active Active
- 2020-01-09 CN CN202080008563.9A patent/CN113316765B/en active Active
- 2020-01-09 EP EP20738187.2A patent/EP3909003B1/en active Active
- 2020-01-09 US US17/421,587 patent/US11488152B2/en active Active
- 2020-01-09 CN CN202080008427.XA patent/CN113316798B/en active Active
- 2020-01-09 WO PCT/US2020/012891 patent/WO2020146602A1/en unknown
- 2020-01-09 EP EP23164932.8A patent/EP4220385A1/en active Pending
- 2020-01-09 CN CN202211272620.1A patent/CN115660680A/en active Pending
- 2020-01-09 WO PCT/US2020/012896 patent/WO2020146605A1/en unknown
-
2022
- 2022-04-29 US US17/732,989 patent/US11757644B2/en active Active
-
2023
- 2023-05-19 US US18/320,491 patent/US20230299962A1/en active Pending
- 2023-06-22 US US18/212,779 patent/US20230353366A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US11488152B2 (en) | 2022-11-01 |
SG11202107299VA (en) | 2021-08-30 |
EP3908923B1 (en) | 2023-04-19 |
WO2020146602A1 (en) | 2020-07-16 |
EP3909003A1 (en) | 2021-11-17 |
CN113316798B (en) | 2024-05-10 |
US11757644B2 (en) | 2023-09-12 |
CN113316765B (en) | 2022-11-04 |
US11736295B2 (en) | 2023-08-22 |
EP3909003A4 (en) | 2022-03-02 |
CN115660680A (en) | 2023-01-31 |
EP3909003B1 (en) | 2023-05-03 |
US20220044233A1 (en) | 2022-02-10 |
US20230299962A1 (en) | 2023-09-21 |
US20230353366A1 (en) | 2023-11-02 |
CN113316798A (en) | 2021-08-27 |
EP3908923A4 (en) | 2022-03-02 |
CN113316765A (en) | 2021-08-27 |
EP4220385A1 (en) | 2023-08-02 |
EP3908923A1 (en) | 2021-11-17 |
WO2020146605A1 (en) | 2020-07-16 |
US20220045997A1 (en) | 2022-02-10 |
US20220270088A1 (en) | 2022-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4083806A4 (en) | Application linkage method, computer program, and application linkage system | |
SG11202107301TA (en) | Method, system, and computer program product for network bound proxy re-encryption and pin translation | |
SG11202103094WA (en) | Apparatus, method and computer program for connection management | |
EP3358806A4 (en) | Method, device and server for service migration during software upgrade under nfv architecture | |
EP3592017A4 (en) | Credential information processing method and apparatus for network connection, and application (app) | |
EP3610384A4 (en) | Apparatus, method and computer program product for trust management | |
EP3820396A4 (en) | System method and computer program product, for computer aided surgery | |
EP3756317C0 (en) | Method, device and computer program product for interfacing communication networks | |
EP3610226A4 (en) | System, method, and computer program product for machine-learning-based traffic prediction | |
SG10201906364SA (en) | Service brokering system and related service requirement matching sub-system, computer program product, and service requirement matching method | |
EP4014474A4 (en) | Apparatus, method, and computer program | |
EP3930302A4 (en) | Data transmission system, data transmission method and computer program | |
GB201916012D0 (en) | Apparatus, method, and computer program | |
SG10202012156PA (en) | Method, system, and computer program product for preventing transmission of malicious data | |
EP4044322A4 (en) | Estimation device, estimation method, and computer program | |
EP3437303A4 (en) | Method, apparatus and computer program product for data distribution | |
EP4042775A4 (en) | Apparatus, method, and computer program | |
EP4057933A4 (en) | System, method and computer program product for improved mini-surgery use cases | |
EP4035044A4 (en) | System, method, and computer program product for secure key management | |
EP4030532A4 (en) | Estimation device, estimation method, and computer program | |
EP3979387A4 (en) | Estimation device, estimation method, and computer program | |
EP3925274A4 (en) | Apparatus, method and computer program for communication using configured grants | |
SG11202108249XA (en) | Apparatus, methods, and computer programs for network slice selection | |
EP3763069A4 (en) | Method, apparatus and computer program | |
EP3707610A4 (en) | Method, apparatuses, computer programs and computer program products for data storage |