SG11201908931TA - Cryptographic key management based on identity information - Google Patents
Cryptographic key management based on identity informationInfo
- Publication number
- SG11201908931TA SG11201908931TA SG11201908931TA SG11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA
- Authority
- SG
- Singapore
- Prior art keywords
- identity information
- international
- user
- building
- memory
- Prior art date
Links
- 238000013475 authorization Methods 0.000 abstract 2
- 238000000034 method Methods 0.000 abstract 2
- 238000004590 computer program Methods 0.000 abstract 1
- 238000012905 input function Methods 0.000 abstract 1
- 230000008520 organization Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/080366 WO2019120321A2 (en) | 2019-03-29 | 2019-03-29 | Cryptographic key management based on identity information |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201908931TA true SG11201908931TA (en) | 2019-10-30 |
Family
ID=66992479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201908931T SG11201908931TA (en) | 2019-03-29 | 2019-03-29 | Cryptographic key management based on identity information |
Country Status (10)
Country | Link |
---|---|
US (3) | US11088831B2 (zh) |
EP (1) | EP3610607B1 (zh) |
JP (1) | JP6921222B2 (zh) |
KR (1) | KR102381153B1 (zh) |
CN (2) | CN114553439B (zh) |
AU (1) | AU2019204723C1 (zh) |
CA (1) | CA3058240C (zh) |
SG (1) | SG11201908931TA (zh) |
TW (1) | TWI724683B (zh) |
WO (1) | WO2019120321A2 (zh) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3861676A1 (en) * | 2019-10-21 | 2021-08-11 | Google LLC | Verifiable consent for privacy protection |
CN111711521B (zh) * | 2020-06-19 | 2023-05-05 | 广东小蛐科技有限公司 | 一种区块链账号私钥重置方法及系统 |
CN111970126A (zh) * | 2020-08-31 | 2020-11-20 | 北京书生网络技术有限公司 | 密钥管理方法及装置 |
KR20220055635A (ko) | 2020-10-27 | 2022-05-04 | (주)네오와인 | Dma 채널 전송을 이용한 비밀키 관리 장치 및 방법 |
CN112241523B (zh) * | 2020-11-05 | 2024-08-09 | 中国航空工业集团公司西安航空计算技术研究所 | 一种嵌入式计算机开机身份认证方法 |
CN112508138B (zh) * | 2020-11-18 | 2024-03-26 | 北京融讯科创技术有限公司 | 单板服务器管理方法、装置、设备及计算机可读存储介质 |
CN112507302B (zh) * | 2020-12-10 | 2024-04-19 | 支付宝(杭州)信息技术有限公司 | 基于密码模块执行的调用方身份鉴别方法及装置 |
CN112822021B (zh) * | 2020-12-30 | 2022-10-21 | 中国农业银行股份有限公司 | 一种密钥管理方法和相关装置 |
CN112989370B (zh) * | 2021-02-09 | 2023-06-30 | 腾讯科技(深圳)有限公司 | 密钥灌装方法、系统、装置、设备以及存储介质 |
CN113067704B (zh) * | 2021-03-29 | 2022-08-30 | 安徽慧可科技有限公司 | 一种基于区块链的数据确权方法、系统和设备 |
CN113726509B (zh) * | 2021-08-30 | 2023-05-02 | 北京天融信网络安全技术有限公司 | 密钥销毁方法、密码机及终端设备 |
CN114154443A (zh) * | 2021-12-03 | 2022-03-08 | 展讯通信(上海)有限公司 | 芯片授权和验证方法、装置和电子设备 |
TWI823673B (zh) * | 2022-11-11 | 2023-11-21 | 國立雲林科技大學 | 一種密碼加密管理系統 |
Family Cites Families (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19629856A1 (de) | 1996-07-24 | 1998-01-29 | Ibm | Verfahren und System zum sicheren Übertragen und Speichern von schützbaren Informationen |
JPH10247906A (ja) | 1997-03-03 | 1998-09-14 | Toshiba Corp | 処理機能付きデバイス装置、情報処理システム、認証方法、認証・暗号化方法及び認証・復号方法 |
JP3597704B2 (ja) | 1998-06-19 | 2004-12-08 | 株式会社日立製作所 | Icカードおよび記録媒体 |
EP1175749B1 (en) * | 1999-04-22 | 2005-07-06 | Veridicom, Inc. | High security biometric authentication using a public key/private key encryption pairs |
US8325994B2 (en) * | 1999-04-30 | 2012-12-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
JP2001319164A (ja) | 2000-05-10 | 2001-11-16 | Nec Saitama Ltd | レンタルシステムとそのレンタル方法、及び貸出プログラムを記録した記録媒体 |
FR2819074B1 (fr) | 2000-12-29 | 2003-02-21 | Dominique Bertrand | Terminal d'affichage, de restitution, de saisie et de traitement de donnees, configurable par ses utilisateurs |
JP2002271320A (ja) | 2001-03-13 | 2002-09-20 | Sony Corp | 情報処理装置及び方法、並びに記憶媒体 |
WO2002103496A2 (en) * | 2001-06-18 | 2002-12-27 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
JP4834263B2 (ja) | 2001-09-28 | 2011-12-14 | シャープ株式会社 | カード認証システム、情報記録カードおよびカード認証方法 |
US7146009B2 (en) * | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
JP4660053B2 (ja) | 2002-05-20 | 2011-03-30 | ソニー株式会社 | 人的特徴照合装置 |
AU2003258067A1 (en) * | 2002-08-06 | 2004-02-23 | Privaris, Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
JP2004104539A (ja) | 2002-09-11 | 2004-04-02 | Renesas Technology Corp | メモリカード |
US20050027991A1 (en) | 2003-06-23 | 2005-02-03 | Difonzo Joseph | System and method for digital rights management |
WO2005003938A1 (en) | 2003-07-04 | 2005-01-13 | Nokia Corporation | Key storage administration |
US20060149962A1 (en) | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
US8842887B2 (en) | 2004-06-14 | 2014-09-23 | Rodney Beatson | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device |
JP2006079181A (ja) | 2004-09-07 | 2006-03-23 | Sony Corp | 生体照合装置 |
JP4423478B2 (ja) | 2004-09-07 | 2010-03-03 | 株式会社国際電気通信基礎技術研究所 | 振動提示装置 |
US20060059372A1 (en) | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardware |
JP4326443B2 (ja) | 2004-10-08 | 2009-09-09 | フェリカネットワークス株式会社 | 情報処理装置および情報処理方法、並びにプログラム |
JP4516399B2 (ja) | 2004-10-08 | 2010-08-04 | フェリカネットワークス株式会社 | 情報処理装置および方法、並びにプログラム |
CA2584525C (en) | 2004-10-25 | 2012-09-25 | Rick L. Orsini | Secure data parser method and system |
JP2006221566A (ja) | 2005-02-14 | 2006-08-24 | Dainippon Printing Co Ltd | ネットワークを利用した介護サービス支援システム |
GB2424557A (en) | 2005-03-24 | 2006-09-27 | Sony Uk Ltd | FPGA with hardware decryptor for configuration programme which adds second key to itself before re-encrypting and overwriting itself in memory when run |
US8972743B2 (en) | 2005-05-16 | 2015-03-03 | Hewlett-Packard Development Company, L.P. | Computer security system and method |
JP4936238B2 (ja) | 2005-06-13 | 2012-05-23 | 株式会社トプスシステムズ | セキュリティ管理装置 |
JP2007018301A (ja) | 2005-07-08 | 2007-01-25 | Matsushita Electric Ind Co Ltd | 利用条件処理装置 |
US8615663B2 (en) | 2006-04-17 | 2013-12-24 | Broadcom Corporation | System and method for secure remote biometric authentication |
GB2438452B (en) * | 2006-05-24 | 2010-12-15 | Nokia Corp | Portable telecommunications apparatus |
KR101043306B1 (ko) * | 2006-09-20 | 2011-06-22 | 후지쯔 가부시끼가이샤 | 정보 처리 장치, 정보 관리 방법, 및 정보 관리 프로그램을 기억한 컴퓨터 판독 가능한 기억 매체 |
JP4301275B2 (ja) * | 2006-09-28 | 2009-07-22 | ソニー株式会社 | 電子機器、および情報処理方法 |
US7747024B2 (en) | 2007-02-09 | 2010-06-29 | Lenovo (Singapore) Pte. Ltd. | System and method for generalized authentication |
GB2452732A (en) | 2007-09-12 | 2009-03-18 | Seiko Epson Corp | Smart-card chip with organic conductive surface layer for detecting invasive attack |
CN201126581Y (zh) | 2007-11-12 | 2008-10-01 | 中国长城计算机深圳股份有限公司 | 一种基于uefi的生物身份识别装置 |
CN101436247B (zh) | 2007-11-12 | 2012-04-11 | 中国长城计算机深圳股份有限公司 | 一种基于uefi的生物身份识别方法及系统 |
CA2710868A1 (en) | 2008-01-07 | 2009-07-16 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
US8438385B2 (en) | 2008-03-13 | 2013-05-07 | Fujitsu Limited | Method and apparatus for identity verification |
BRPI0822164B1 (pt) | 2008-05-16 | 2019-09-10 | Hewlett Packard Development Co | método para prover um comando de gerenciamento de sistema e dispositivo eletrônico |
DE102008055076A1 (de) * | 2008-12-22 | 2010-07-01 | Robert Bosch Gmbh | Vorrichtung und Verfahren zum Schutz von Daten, Computerprogramm, Computerprogrammprodukt |
MY159232A (en) | 2009-05-18 | 2016-12-30 | Mikoh Corp | Biometric identification method |
EP2323308B1 (en) | 2009-11-12 | 2016-03-23 | Morpho Cards GmbH | A method of assigning a secret to a security token, a method of operating a security token, storage medium and security token |
WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
US9037852B2 (en) | 2011-09-02 | 2015-05-19 | Ivsc Ip Llc | System and method for independent control of for-hire vehicles |
WO2013062528A1 (en) | 2011-10-25 | 2013-05-02 | Hewlett-Packard Development Company, L.P. | Verification record for a replaceable supply |
CN103138927B (zh) | 2011-12-01 | 2015-12-16 | 航天信息股份有限公司 | 一种用于指纹认证的加密存储设备中密钥控制方法 |
GB2497553B (en) | 2011-12-13 | 2018-05-16 | Irisguard Inc | Improvements relating to iris cameras |
TW201328280A (zh) * | 2011-12-29 | 2013-07-01 | Chunghwa Telecom Co Ltd | 即時通訊身分認證系統與方法 |
KR20140138271A (ko) | 2012-03-15 | 2014-12-03 | 미코 코포레이션 | 생체 측정 인증 시스템 |
CN102594843A (zh) * | 2012-03-22 | 2012-07-18 | 中国农业银行股份有限公司 | 一种身份认证系统和方法 |
US9135496B2 (en) | 2012-05-18 | 2015-09-15 | Apple Inc. | Efficient texture comparison |
US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
US20140025581A1 (en) * | 2012-07-19 | 2014-01-23 | Bank Of America Corporation | Mobile transactions using authorized tokens |
US8775757B2 (en) | 2012-09-25 | 2014-07-08 | Apple Inc. | Trust zone support in system on a chip having security enclave processor |
US8832465B2 (en) | 2012-09-25 | 2014-09-09 | Apple Inc. | Security enclave processor for a system on a chip |
EP2720167A1 (en) | 2012-10-11 | 2014-04-16 | Nagravision S.A. | Method and system for smart card chip personalization |
US9665638B2 (en) | 2012-10-30 | 2017-05-30 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
ES2625254T3 (es) | 2012-11-02 | 2017-07-19 | Morpho Cards Gmbh | Tarjeta con chip de telecomunicaciones |
US20140237256A1 (en) | 2013-02-17 | 2014-08-21 | Mourad Ben Ayed | Method for securing data using a disposable private key |
US10304044B2 (en) * | 2013-06-05 | 2019-05-28 | American Express Travel Related Services Company, Inc. | Multi-factor mobile user authentication |
JP6182371B2 (ja) | 2013-06-28 | 2017-08-16 | ルネサスエレクトロニクス株式会社 | 半導体集積回路を含むシステム |
US9646150B2 (en) | 2013-10-01 | 2017-05-09 | Kalman Csaba Toth | Electronic identity and credentialing system |
US10127378B2 (en) | 2014-10-01 | 2018-11-13 | Kalman Csaba Toth | Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals |
CN104580107B (zh) | 2013-10-24 | 2018-02-06 | 华为技术有限公司 | 恶意攻击检测方法及控制器 |
US9213818B2 (en) | 2014-02-24 | 2015-12-15 | Partnet, Inc. | Anonymous authentication using backup biometric information |
US10237065B2 (en) | 2014-03-31 | 2019-03-19 | Irdeto B.V. | Cryptographic chip and related methods |
CN105471575B (zh) | 2014-09-05 | 2020-11-03 | 创新先进技术有限公司 | 一种信息加密、解密方法及装置 |
CN104239815A (zh) | 2014-09-19 | 2014-12-24 | 西安凯虹电子科技有限公司 | 基于虹膜识别的电子文档加密解密装置及方法 |
US9953151B2 (en) | 2015-02-03 | 2018-04-24 | Chon Hock LEOW | System and method identifying a user to an associated device |
JP2018516026A (ja) | 2015-03-20 | 2018-06-14 | リヴェッツ・コーポレーションRivetz Corp. | ブロックチェーンを使用したデバイス整合性の自動認証 |
US9875370B2 (en) | 2015-03-26 | 2018-01-23 | Microsoft Technology Licensing, Llc | Database server and client for query processing on encrypted data |
WO2016178127A1 (en) | 2015-05-03 | 2016-11-10 | Arm Technologies Israel Ltd. | System, device, and method of managing trustworthiness of electronic devices |
CN106301767B (zh) | 2015-05-13 | 2020-01-03 | 中兴通讯股份有限公司 | 一种加密通话的处理方法、装置、终端及kmc |
US10318154B2 (en) | 2015-05-31 | 2019-06-11 | Apple Inc. | Dynamic group membership for devices |
US20160359633A1 (en) * | 2015-06-02 | 2016-12-08 | Crater Dog Technologies, LLC | System and method for publicly certifying data |
US10079677B2 (en) | 2015-06-05 | 2018-09-18 | Apple Inc. | Secure circuit for encryption key generation |
US10079880B2 (en) | 2015-06-07 | 2018-09-18 | Apple Inc. | Automatic identification of invalid participants in a secure synchronization system |
US10284376B2 (en) | 2015-06-10 | 2019-05-07 | Arris Enterprises Llc | Code signing system with machine to machine interaction |
US9942035B2 (en) | 2015-08-18 | 2018-04-10 | Intel Corporation | Platform migration of secure enclaves |
CN106487511B (zh) | 2015-08-27 | 2020-02-04 | 阿里巴巴集团控股有限公司 | 身份认证方法及装置 |
US10536271B1 (en) | 2016-01-10 | 2020-01-14 | Apple Inc. | Silicon key attestation |
CN106027475B (zh) * | 2016-01-21 | 2019-06-28 | 李明 | 一种密钥获取方法、身份证信息的传输方法及系统 |
US11734678B2 (en) * | 2016-01-25 | 2023-08-22 | Apple Inc. | Document importation into secure element |
JP2017183930A (ja) | 2016-03-29 | 2017-10-05 | 日本電気株式会社 | サーバ管理システム、サーバ装置、サーバ管理方法、及びプログラム |
CN105959287A (zh) | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | 一种基于生物特征的安全认证方法及装置 |
CN105975839B (zh) | 2016-06-12 | 2019-07-05 | 北京集创北方科技股份有限公司 | 一种生物特征识别装置和方法以及生物特征模板注册方法 |
US11593797B2 (en) | 2016-06-12 | 2023-02-28 | Apple Inc. | Authentication using a secure circuit |
US10268844B2 (en) | 2016-08-08 | 2019-04-23 | Data I/O Corporation | Embedding foundational root of trust using security algorithms |
US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
CN106790183A (zh) | 2016-12-30 | 2017-05-31 | 广州华多网络科技有限公司 | 登录凭证校验方法、装置 |
CN108345785B (zh) | 2017-01-25 | 2021-05-11 | 杨建纲 | 内建智能安全行动装置 |
KR101937216B1 (ko) * | 2017-02-01 | 2019-01-11 | 주식회사 데일리인텔리전스 | 블록체인을 인증서 발급기관으로 이용해서 인증서를 관리하는 장치 및 방법 |
CN108418677B (zh) | 2017-02-09 | 2021-01-15 | 杭州海康威视数字技术股份有限公司 | 密钥备份、恢复方法及装置 |
CN108632021A (zh) | 2017-03-15 | 2018-10-09 | 阿里巴巴集团控股有限公司 | 一种密钥加密方法、装置和系统 |
CN108667608B (zh) | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | 数据密钥的保护方法、装置和系统 |
US10541818B2 (en) | 2017-04-19 | 2020-01-21 | International Business Machines Corporation | Decentralized biometric signing of digital contracts |
CN108881000A (zh) | 2017-05-08 | 2018-11-23 | 国民技术股份有限公司 | 网关设备、第三方平台、支付系统及方法 |
CN107169762B (zh) | 2017-05-24 | 2020-02-07 | 中国银联股份有限公司 | 一种安全载体的配置方法及装置 |
CN107241317B (zh) | 2017-05-24 | 2021-01-15 | 国民认证科技(北京)有限公司 | 生物特征识别身份的方法和用户终端设备以及身份认证服务器 |
CN109150535A (zh) | 2017-06-19 | 2019-01-04 | 中国移动通信集团公司 | 一种身份认证方法、设备、计算机可读存储介质及装置 |
WO2018236420A1 (en) | 2017-06-20 | 2018-12-27 | Google Llc | Cloud hardware security modules for outsourcing cryptographic operations |
US11922363B2 (en) * | 2017-07-05 | 2024-03-05 | United Parcel Service Of America, Inc. | Counterparty physical proximity verification for digital asset transfers |
US10819528B2 (en) | 2017-07-18 | 2020-10-27 | Square, Inc. | Device security with physically unclonable functions |
US10263793B2 (en) | 2017-07-18 | 2019-04-16 | Square, Inc. | Devices with modifiable physically unclonable functions |
US10438190B2 (en) | 2017-07-18 | 2019-10-08 | Square, Inc. | Devices with on-board physically unclonable functions |
CN109525392B (zh) | 2017-09-20 | 2021-11-26 | 上海方付通商务服务有限公司 | eID贴膜卡、移动终端设备及eID认证系统 |
US10509940B2 (en) | 2017-09-28 | 2019-12-17 | Apple Inc. | Electronic device including sequential operation of light source subsets while acquiring biometric image data and related methods |
US10833877B2 (en) | 2017-10-12 | 2020-11-10 | Canon Kabushiki Kaisha | Method of authenticating authentication-target apparatus by authentication apparatus, authentication apparatus, authentication- target apparatus, and image forming apparatus |
CN108540457B (zh) | 2018-03-20 | 2021-09-17 | 深圳市文鼎创数据科技有限公司 | 一种安全设备及其生物认证控制方法和装置 |
US11641278B2 (en) | 2018-03-27 | 2023-05-02 | Workday, Inc. | Digital credential authentication |
US11700117B2 (en) | 2018-03-27 | 2023-07-11 | Workday, Inc. | System for credential storage and verification |
CN110677250B (zh) | 2018-07-02 | 2022-09-02 | 阿里巴巴集团控股有限公司 | 密钥和证书分发方法、身份信息处理方法、设备、介质 |
CN108900296B (zh) * | 2018-07-04 | 2021-11-09 | 昆明我行科技有限公司 | 一种基于生物特征识别的秘钥存储方法 |
-
2019
- 2019-03-29 WO PCT/CN2019/080366 patent/WO2019120321A2/en unknown
- 2019-03-29 SG SG11201908931T patent/SG11201908931TA/en unknown
- 2019-03-29 JP JP2019553386A patent/JP6921222B2/ja active Active
- 2019-03-29 KR KR1020197028380A patent/KR102381153B1/ko active Active
- 2019-03-29 AU AU2019204723A patent/AU2019204723C1/en active Active
- 2019-03-29 EP EP19732221.7A patent/EP3610607B1/en active Active
- 2019-03-29 CN CN202210303686.6A patent/CN114553439B/zh active Active
- 2019-03-29 CA CA3058240A patent/CA3058240C/en active Active
- 2019-03-29 CN CN201980001319.7A patent/CN111034120B/zh active Active
- 2019-09-30 US US16/588,106 patent/US11088831B2/en active Active
- 2019-12-11 TW TW108145295A patent/TWI724683B/zh active
-
2020
- 2020-07-31 US US16/945,341 patent/US11063749B2/en active Active
-
2021
- 2021-06-15 US US17/348,413 patent/US11258591B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2019120321A2 (en) | 2019-06-27 |
EP3610607A4 (en) | 2020-10-07 |
AU2019204723C1 (en) | 2021-10-28 |
US11258591B2 (en) | 2022-02-22 |
CA3058240A1 (en) | 2019-06-27 |
US11088831B2 (en) | 2021-08-10 |
TWI724683B (zh) | 2021-04-11 |
EP3610607A2 (en) | 2020-02-19 |
CN114553439A (zh) | 2022-05-27 |
CN111034120B (zh) | 2022-03-11 |
AU2019204723B2 (en) | 2021-05-06 |
KR102381153B1 (ko) | 2022-03-30 |
CN111034120A (zh) | 2020-04-17 |
US11063749B2 (en) | 2021-07-13 |
KR20200116009A (ko) | 2020-10-08 |
TW202036337A (zh) | 2020-10-01 |
JP2020528675A (ja) | 2020-09-24 |
JP6921222B2 (ja) | 2021-08-18 |
WO2019120321A3 (en) | 2020-01-30 |
AU2019204723A1 (en) | 2019-06-27 |
EP3610607B1 (en) | 2021-08-25 |
US20200366472A1 (en) | 2020-11-19 |
CN114553439B (zh) | 2023-06-30 |
US20210314150A1 (en) | 2021-10-07 |
CA3058240C (en) | 2021-12-07 |
US20200313875A1 (en) | 2020-10-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11201908931TA (en) | Cryptographic key management based on identity information | |
SG11201908982QA (en) | Managing sensitive data elements in a blockchain network | |
SG11201909948WA (en) | Product promotion using smart contracts in blockchain networks | |
SG11201909630TA (en) | Anti-replay attack authentication protocol | |
SG11201908946PA (en) | Program execution and data proof scheme using multiple key pair signatures | |
SG11201908651SA (en) | Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain | |
SG11201906830XA (en) | Verifying integrity of data stored in a consortium blockchain using a public sidechain | |
SG11201908981SA (en) | Retrieving public data for blockchain networks using highly available trusted execution environments | |
SG11201909855YA (en) | Distributed key management for trusted execution environments | |
SG11201908794UA (en) | Property management system utilizing a blockchain network | |
SG11201909013RA (en) | Authentication based on a recoverd public key | |
SG11201909861UA (en) | Transferring digital tickets based on blockchain networks | |
SG11201902778UA (en) | System and method for information protection | |
SG11201908552RA (en) | Methods and devices for testing signature verification for blockchain system | |
SG11201908983WA (en) | Retrieving access data for blockchain networks using highly available trusted execution environments | |
SG11201908554PA (en) | Methods and devices for acquiring and recording tracking information on blockchain | |
SG11201909014QA (en) | Preventing misrepresentation of input data by participants in a secure multi-party computation | |
SG11201908387SA (en) | Consensus system downtime recovery | |
SG11201903562QA (en) | Recovering encrypted transaction information in blockchain confidential transactions | |
SG11201903425PA (en) | System and method for information protection | |
SG11201908853YA (en) | System and method for ending view change protocol | |
SG11201903553VA (en) | Blockchain data protection using homomorphic encryption | |
SG11201903566XA (en) | Regulating blockchain confidential transactions | |
SG11201910095VA (en) | Cross-asset trading within blockchain networks | |
SG11201907281WA (en) | Blockchain data protection based on generic account model and homomorphic encryption |