TR201817812A2 - Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem - Google Patents

Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem Download PDF

Info

Publication number
TR201817812A2
TR201817812A2 TR2018/17812A TR201817812A TR201817812A2 TR 201817812 A2 TR201817812 A2 TR 201817812A2 TR 2018/17812 A TR2018/17812 A TR 2018/17812A TR 201817812 A TR201817812 A TR 201817812A TR 201817812 A2 TR201817812 A2 TR 201817812A2
Authority
TR
Turkey
Prior art keywords
storage
digital identities
digital identification
specific digital
enables user
Prior art date
Application number
TR2018/17812A
Other languages
English (en)
Inventor
Kaan Terzi̇oğlu Muhterem
Original Assignee
Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi filed Critical Turkcell Teknoloji Arastirma Ve Gelistirme Anonim Sirketi
Priority to TR2018/17812A priority Critical patent/TR201817812A2/tr
Priority to PCT/TR2018/050944 priority patent/WO2020106238A1/en
Publication of TR201817812A2 publication Critical patent/TR201817812A2/tr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Bu buluş, telefon numarası, fatura geçmişi, konum bilgisi, ses dosyası, finans hareketleri, görüntü verileri gibi çeşitli kaynaklardan elde edilen kullanıcı bilgileri vasıtasıyla kişiye özgü dijital kimlik oluşturulmasını, oluşturulan dijital kimliklerin blok zincir yapısında ve/veya veri tabanı mimarisi üzerinde güvenli bir biçimde depolanmasını ve dijital kimliklerin üçüncü parti kullanıcılarlapaylaşılmasını sağlayan bir sistem (1) ile ilgilidir.
TR2018/17812A 2018-11-23 2018-11-23 Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem TR201817812A2 (tr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TR2018/17812A TR201817812A2 (tr) 2018-11-23 2018-11-23 Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem
PCT/TR2018/050944 WO2020106238A1 (en) 2018-11-23 2018-12-30 A system for creating and storing user specific digital identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TR2018/17812A TR201817812A2 (tr) 2018-11-23 2018-11-23 Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem

Publications (1)

Publication Number Publication Date
TR201817812A2 true TR201817812A2 (tr) 2019-02-21

Family

ID=67955702

Family Applications (1)

Application Number Title Priority Date Filing Date
TR2018/17812A TR201817812A2 (tr) 2018-11-23 2018-11-23 Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem

Country Status (2)

Country Link
TR (1) TR201817812A2 (tr)
WO (1) WO2020106238A1 (tr)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10007913B2 (en) * 2015-05-05 2018-06-26 ShoCard, Inc. Identity management service using a blockchain providing identity transactions between devices
US9992022B1 (en) * 2017-02-06 2018-06-05 Northern Trust Corporation Systems and methods for digital identity management and permission controls within distributed network nodes
US10476862B2 (en) * 2017-03-31 2019-11-12 Mastercard International Incorporated Systems and methods for providing digital identity records to verify identities of users

Also Published As

Publication number Publication date
WO2020106238A1 (en) 2020-05-28

Similar Documents

Publication Publication Date Title
US10255453B2 (en) Controlling privacy in a face recognition application
CN107465505B (zh) 一种密钥数据处理方法、装置及服务器
CN112671769B (zh) 电子合同的签署方法、装置及设备
US11310236B2 (en) Deriving confidence scores based on device sharing
Stearns Acts of journalism
US11270119B2 (en) Video privacy using machine learning
CN111737279A (zh) 基于区块链的业务处理方法、装置、设备及存储介质
WO2021000578A1 (zh) 一种块链式账本中的用户创建方法、装置及设备
Awan Forensic examination of social networking applications on smartphones
US8412955B1 (en) Framework and method for secure data management in a diversified platform
Zefferer et al. Leveraging the adoption of mobile eid and e-signature solutions in europe
CN104517068A (zh) 一种处理录音文件方法和装置
TR201817812A2 (tr) Kullaniciya özgü di̇ji̇tal ki̇mli̇k oluşturulmasini ve depolanmasini sağlayan bi̇r si̇stem
US10438003B2 (en) Secure document repository
US10685333B2 (en) Automatic inference of meeting attendance
EP3557470B1 (en) System and method for secure data handling
Lane Big Data and Anthropology: Concerns for data collection in a new research context
Shirazi et al. Cloud computing security and privacy: an empirical study
Dai et al. DASS: A web-based fine-grained data access system for smartphones
Kwon et al. CCTV cooperation authentication model using block chain
CN110659466B (zh) 改密行为的处理方法及装置
US9779255B2 (en) Split storage and communication of documents
TWI713898B (zh) 使用讀碼器的內容分檔和管理系統
Warwick Does post‐9/11 equal post‐privacy?
Kak et al. Bringing openness to identity