Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 22117. Отображено 200.
08-10-2018 дата публикации

СИСТЕМЫ И СПОСОБЫ ДЛЯ ФУНКЦИОНАЛЬНО СОВМЕСТИМОЙ ОБРАБОТКИ СЕТЕВЫХ МАРКЕРОВ

Номер: RU2669081C2

Изобретение относится к способам, системе и серверам для обработки транзакций. Технический результат заключается в обеспечении безопасности транзакций. В способе принимают сообщение с запросом на авторизацию, содержащее платежный маркер, содержащий идентификатор эмитента платежного маркера, заменяющий идентификатор реального эмитента для эмитента и являющийся статическим для эмитента, идентифицируют индикатор режима предъявления маркера в сообщении с запросом на авторизацию, указывающий режим предъявления платежного маркера, проверяют достоверность того, что платежный маркер ассоциирован с режимом предъявления маркера, при этом подтверждают, что режим предъявления, указанный индикатором режима предъявления маркера, совпадает с ранее сохраненным режимом предъявления, ассоциированным с платежным маркером, аутентифицируют транзакцию, основываясь на режиме предъявления маркера, определяют идентификатор реального счета, ассоциированный с платежным маркером, формируют модифицированное сообщение ...

Подробнее
10-02-2017 дата публикации

СПОСОБ, СЕРВЕР И СИСТЕМА ДЛЯ ИДЕНТИФИКАЦИИ ЧЕЛОВЕКА

Номер: RU2610419C2
Принадлежит: ОНЕЙ БАНК (FR)

Изобретение относится к области информационной безопасности в телекоммуникациях. Технический результат заключается в надежной идентификации владельца телекоммуникационного оборудования. Способ, в котором сервер получает запрос на идентификацию от терминала, отправляет идентификационный код терминалу посредством первой сети передачи данных; терминал передает идентификационный код телекоммуникационному оборудованию; сервер получает от телекоммуникационного оборудования идентификационный код вместе с уникальным идентификатором, генерирует одноразовый идентификационный маркер и отправляет его телекоммуникационному оборудованию посредством второй сети передачи данных; телекоммуникационное оборудование возвращает одноразовый идентификационный маркер серверу посредством второй сети передачи данных; одновременно терминал принимает личный код доступа, вводимый человеком; сервер получает личный код доступа от терминала посредством первой сети передачи данных; идентификация человека реализуется сервером ...

Подробнее
10-04-2015 дата публикации

ОБРАБОТКА ПЕРЕКЛЮЧЕНИЯ ШИФРОВАНИЯ

Номер: RU2547621C2

Изобретение относится к системе и способу обработки транзакций. Технический результат заключается в повышении безопасности финансовых транзакций. Способ содержит этапы, на которых принимают на серверном компьютере из терминала конверт, связанный с транзакцией, причем конверт включает в себя незашифрованные подробные данные транзакции, метку, извлеченную из ключа, связанного с терминалом, и идентификатор счета, и, по меньшей мере, первую часть подробных данных транзакции, конвертируют метку в идентификатор счета, верифицируют то, что идентификатор счета связан с действительным счетом и проводят проверку транзакции, причем проверка гарантирует то, что конверт не был модифицирован между терминалом и серверным компьютером. 2 н. и 18 з.п. ф-лы, 12 ил.

Подробнее
17-05-2021 дата публикации

СИСТЕМЫ И СПОСОБЫ ПЕРСОНАЛЬНОЙ ИДЕНТИФИКАЦИИ И ВЕРИФИКАЦИИ

Номер: RU2747947C2

Изобретение относится к области вычислительной техники для персональной идентификации и верификации. Технический результат заключается в повышении безопасности выполнения транзакций. Изобретение также позволяет включать дополнительные модули для мониторинга всех транзакций и выявления тех, которые потенциально связаны с незаконной деятельностью, а также для включения критериев, определенных центральным руководящим органом или пользователями CBEM для регулирования или ограничения транзакций. В результате настоящее изобретение обеспечивает практическое решение проблем, связанных с «знай своего клиента», борьбой с отмыванием денег и кражей криптовалюты при сохранении конфиденциальности пользователя. Более того, настоящее изобретение может быть принято или изменено центральными банками или другими финансовыми учреждениями для выпуска своих собственных цифровых валют, которые регулируются центральным руководящим органом и поддерживаются платежной системой с распределенной бухгалтерской книгой ...

Подробнее
10-08-2009 дата публикации

АУТЕНТИФИКАЦИЯ НА ОСНОВЕ ВЫЗОВА, НЕ ТРЕБУЮЩАЯ ЗНАНИЯ СЕКРЕТНЫХ АУТЕНТИФИКАЦИОННЫХ ДАННЫХ

Номер: RU2363985C2

Изобретение относится к аутентификации. Техническим результатом является увеличение безопасности. Способ содержит этапы, на которых генерируют аутентифицирующим компьютерным объектом секретные ключевые данные, которые не известны дополнительному аутентифицирующему, аутентифицируемому или дополнительному аутентифицируемому компьютерным объектам; передают секретные ключевые данные дополнительному аутентифицирующему компьютерному объекту, шифруют секретные ключевые данные, известные дополнительным аутентифицирующему и аутентифицируемому компьютерным объектам, передают зашифрованные секретные ключевые данные в качестве вызова аутентифицирующему компьютерному объекту, аутентифицируемому компьютерному объекту, дополнительному аутентифицируемому компьютерному объекту; расшифровывают зашифрованные секретные ключевые данные, используя секретные данные, передают секретные ключевые данные в качестве ответа аутентифицируемому компьютерному объекту, передают ответ аутентифицирующему компьютерному объекту ...

Подробнее
29-09-2017 дата публикации

ЗАЩИТА ДАННЫХ С ПЕРЕВОДОМ

Номер: RU2631983C2

Изобретение относится к области шифрования данных. Технический результат - обеспечивают механизм для передачи и маршрутизации зашифрованного идентификатора/номера счета через сеть обработки без необходимости обновления существующей инфраструктуры маршрутизации для обработки зашифрованных значений, что улучшает безопасность идентификатора/номера счета, так как идентификатор/номер счета может оставаться зашифрованным, пока сообщение запроса авторизации проходит через узлы сети при обработке. Способ защиты данных, ассоциированных с транзакцией, содержащий этапы, на которых: принимают посредством устройства доступа личный идентификационный номер (PIN) и уязвимые данные, включающие в себя идентификатор счета; шифруют посредством устройства доступа PIN, при этом шифрование PIN использует первый вариант ключа шифрования, основанный на исходном ключе; шифруют посредством устройства доступа уязвимые данные, включающие в себя идентификатор счета, при этом зашифрованный идентификатор счета имеет тот ...

Подробнее
05-03-2021 дата публикации

ПЛАТФОРМА "ФУНКЦИЯ-КАК-УСЛУГА" (FaaS) В БЛОКЧЕЙН СЕТЯХ

Номер: RU2744322C2

Изобретение относится к способу, считываемому компьютером носителю данных и системе для предоставления платформы "функция-как-услуга" (FaaS) в блокчейн сети. Технический результат заключается в автоматическом выполнении узлом блокчейн сети транзакции, использующей смарт-контракт. В способе принимают из смарт-контракта и посредством первого приложения функции, содержащего первый контроллер функции, выполняемый в блокчейн сети, вызов первой функции, содержащий данные для выполнения первой функции, выполняемой посредством кода в первом приложении функции, содержащем множество версий первой функции, первый контроллер функции маршрутизирует вызов первой функции в соответствующую версию первой функции, при этом первое приложение функции хранится в блокчейн сети, первый контроллер функции имеет уникальный адрес в блокчейн сети, и каждая из версий первой функции имеет соответствующий уникальный адрес в блокчейн сети; посредством первого контроллера функции передают данные вызова первой функции ...

Подробнее
19-10-2020 дата публикации

Номер: RU2019111902A3
Автор:
Принадлежит:

Подробнее
20-08-2020 дата публикации

Номер: RU2018142270A3
Автор:
Принадлежит:

Подробнее
25-06-2019 дата публикации

Номер: RU2017134723A3
Автор:
Принадлежит:

Подробнее
10-12-2020 дата публикации

Номер: RU2019117956A3
Автор:
Принадлежит:

Подробнее
10-12-2020 дата публикации

Номер: RU2019117939A3
Автор:
Принадлежит:

Подробнее
06-11-2018 дата публикации

Номер: RU2016146744A3
Автор:
Принадлежит:

Подробнее
18-03-2021 дата публикации

Номер: RU2019117368A3
Автор:
Принадлежит:

Подробнее
11-11-2019 дата публикации

Номер: RU2018117501A3
Автор:
Принадлежит:

Подробнее
02-12-2019 дата публикации

СХЕМА ДОМЕННЫХ ИМЕН ДЛЯ ПЕРЕКРЕСТНЫХ ЦЕПОЧЕЧНЫХ ВЗАИМОДЕЙСТВИЙ В СИСТЕМАХ ЦЕПОЧЕК БЛОКОВ

Номер: RU2707938C1

Изобретение относится к области сетей цепочек блоков. Технический результат заключается в улучшении безопасности для перекрестной цепочечной связи на основе унифицированного доменного имени. Способ включает: получение, посредством клиентского узла первого экземпляра цепочки блоков, доменного имени цепочки блоков второго, другого экземпляра цепочки блоков, при этом доменное имя цепочки блоков представляет собой уникальный идентификатор второго экземпляра цепочки блоков в унифицированной сети цепочек блоков, доменное имя цепочки блоков уникально соответствует идентификатору цепочки для второго экземпляра цепочки блоков; идентификацию идентификатора цепочки для второго экземпляра цепочки блоков на основе доменного имени цепочки блоков для второго экземпляра цепочки блоков, при этом идентификатор цепочки для второго экземпляра цепочки блоков указывает конфигурацию сети цепочек блоков для второго экземпляра цепочки блоков; осуществление доступа, посредством клиентского узла, ко второму экземпляру ...

Подробнее
20-12-2008 дата публикации

ИЗОЛИРОВАННОЕ ВЫЧИСЛИТЕЛЬНОЕ ОКРУЖЕНИЕ, ПРИВЯЗАННОЕ К ЦЕНТРАЛЬНОМУ ПРОЦЕССОРУ И МАТЕРИНСКОЙ ПЛАТЕ

Номер: RU2007122339A
Принадлежит:

... 1. Компьютер, выполненный с возможностью исполнения программного кода в изолированном вычислительном окружении, содержащийизолированное вычислительное окружение для исполнения программного кода, защищенную память, доступную только упомянутому программному коду и недоступную второму программному коду, исполняемому другим окружением исполнения;логическую схему для предписания процессору осуществлять исполнение из защищенной памяти; итаймер для хронирования событий, который присоединен к логической схеме, при этом упомянутый программный код активируется в качестве реакции на сигнал от таймера.2. Компьютер по п.1, в котором упомянутое другое окружение исполнения содержит одно из операционной системы, базовой системы ввода/вывода (BIOS) и ядра.3. Компьютер по п.1, в котором упомянутый программный код выполняет мониторинг состояния компьютера.4. Компьютер по п.3, дополнительно содержащий процессор, и состояние компьютера является одним из состояния ресурса, используемого операционной системой ...

Подробнее
20-02-2010 дата публикации

КОМПЬЮТЕР, РАЗМЕЩАЮЩИЙ МНОЖЕСТВО ЗАЩИЩЕННЫХ СРЕД ВЫПОЛНЕНИЯ

Номер: RU2008133312A
Принадлежит:

... 1. Компьютер, приспособленный для использования, включающего в себя режимы работы с ограниченным функционированием, содержащий: ! процессор; ! первую защищенную среду выполнения, связанную с процессором возможностью передачи сигналов и функционирующую так, чтобы наблюдать и принудительно применять соответствие с текущей политикой; и ! вторую защищенную среду выполнения, связанную с первой защищенной средой выполнения с возможностью передачи сигналов и функционирующую так, чтобы наблюдать и принудительно применять соответствие с текущей политикой, и связанную с первой защищенной средой выполнения возможностью передачи сигналов, при этом вторая защищенная среда выполнения совершенствует оценку соответствия с текущей политикой и отправляет сигнал, включающий в себя оценку, первой защищенной среде выполнения. ! 2. Компьютер по п.1, в котором сигнал дополнительно содержит значение, соответствующее значению измерения, связанному с одним из состояний подписки и состояний платы за использование ...

Подробнее
10-05-2015 дата публикации

СПОСОБ И СИСТЕМА ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ИСПОЛЬЗОВАНИЯ (ВАРИАНТЫ)

Номер: RU2013149120A
Принадлежит:

... 1. Способ защиты информации от несанкционированного использования, характеризующийся формированием с помощью процессора и закрытого криптографического ключа, хранящегося в устройстве пользователя, зашифрованного пакета данных, включающего одноразовый код аутентификации пользователя, отправкой зашифрованного пакета данных на сервер обслуживающего лица, расшифровыванием пакета данных на сервере обслуживающего лица и проверкой на сервере одноразового кода аутентификации пользователя, отличающийся тем, что расшифровывание пакета данных на сервере обслуживающего лица осуществляют с помощью криптографического ключа, сопряженного с закрытым криптографическим ключом устройства пользователя и хранящимся на сервере обслуживающего лица, при этом в случае положительного результата проверки направляют пользователю зашифрованный с помощью процессора сервера и криптографического ключа пакет данных с ответной информацией, включающей одноразовый код аутентификации пользователя, а в случае отрицательного ...

Подробнее
16-03-2020 дата публикации

СИСТЕМА И СПОСОБ ЗАЩИТЫ ИНФОРМАЦИИ

Номер: RU2716740C1

Изобретение относится к вычислительной технике. Технический результат заключается в повышении безопасности финансовой транзакции. Способ защиты информации содержит этапы, на которых удостоверяют сумму t транзакции для транзакции с помощью схемы обязательств, чтобы получить значение T удостоверения транзакции, причем схема обязательств содержит, по меньшей мере, коэффициент r_t маскирования транзакции, шифруют комбинацию коэффициента r_t маскирования транзакции и сумму t транзакции с помощью общедоступного ключа PK_B получателя транзакции и передают значение T удостоверения транзакции и зашифрованную комбинацию в узел-получатель, ассоциированный с получателем, для верификации транзакции узлом-получателем. 6 н. и 17 з.п. ф-лы, 7 ил.

Подробнее
05-03-2020 дата публикации

МОСТ МЕЖДУ АУТЕНТИФИКАЦИЕЙ И АВТОРИЗАЦИЕЙ С ИСПОЛЬЗОВАНИЕМ РАСШИРЕННЫХ СООБЩЕНИЙ

Номер: RU2716042C1

Изобретение относится к системе и способу электронной связи и к устройству декодирования. Технический результат заключается в обеспечении аутентификации транзакции. Система содержит один или более процессоров третьей стороны, выполненных с возможностью создавать предварительное число аутентификации транзакции (Pre-ATN) путем объединения некоторого числа со специальным значением кодирования (SEV), причем SEV представляет собой однозначное целое число; шифровать Pre-ATN с использованием сохраняющего формат шифрования (FPE) для генерирования зашифрованного числа аутентификации транзакции (ATN); и отправлять зашифрованное ATN на сервер управления доступом (ACS), чтобы использовать зашифрованное ATN для генерирования проверочного кода аутентификации держателя карты (CAVV) или кода аутентификации владельца счета (AAV). 3 н. и 13 з.п. ф-лы, 4 ил.

Подробнее
15-05-2020 дата публикации

ОБНОВЛЕНИЯ СМАРТ-КОНТРАКТОВ НА ОСНОВЕ ЦЕПОЧЕК БЛОКОВ С ИСПОЛЬЗОВАНИЕМ ДЕЦЕНТРАЛИЗОВАННОГО РЕШЕНИЯ

Номер: RU2721100C1

Изобретение относится к способу, машиночитаемому носителю данных и системе для управления обновлениями смарт-контрактов. Технический результат заключается в автоматизации управления обновлениями смарт-контрактов. В способе принимают от пользователя в системе управления обновлениями контрактов запрос на обновление, указывающий изменение в положениях первого смарт-контракта, причем данное изменение в положениях представляет собой предложенное обновление первого смарт-контракта; в качестве реакции на выполнение другого, второго, смарт-контракта в сети цепочек блоков определяют посредством системы управления обновлениями контрактов, удовлетворяются ли условия для обновления первого смарт-контракта включением в него упомянутого изменения в положениях, причем второй смарт-контракт задает эти условия; и по определению системой управления обновлениями контрактов того, что упомянутые условия удовлетворяются, обновляют посредством системы управления обновлениями контрактов первый смарт-контракт и ...

Подробнее
20-11-2009 дата публикации

СПОСОБ И УСТРОЙСТВО ДЛЯ УСТАНОВЛЕНИЯ БЕЗОПАСНОЙ АССОЦИАЦИИ

Номер: RU2008118495A
Принадлежит:

... 1. Способ установления безопасной связи между узлом услуги и клиентом для доставки информации из узла услуги клиенту, где клиент и функция формирования ключа совместно используют базовую секретную информацию, при этом способ содержит: ! передачу запроса на формирование и инициализацию ключа услуги из узла услуги в функцию формирования ключа, упомянутый запрос содержит идентификаторы узла услуги и клиента; ! формирование ключа услуги в функции формирования ключа с использованием идентификатора узла услуги, базовой секретной информации и дополнительной информации, и передачу ключа услуги в узел услуги совместно с упомянутой дополнительной информацией; ! инициализацию сеанса связи с упомянутым клиентом в узле услуги, причем инициализация включает в себя направление упомянутой дополнительной информации и упомянутого идентификатора узла услуги из узла услуги клиенту; ! формирование упомянутого ключа услуги с использованием принятой дополнительной информации, идентификатора узла услуги и базовой ...

Подробнее
20-01-2012 дата публикации

ОСНОВАННАЯ НА ОБЛАКЕ ПРИВЯЗКА ПЕРЕНОСИМЫХ КОМПОНЕНТОВ

Номер: RU2010129044A
Принадлежит:

... 1. Один или более машиночитаемых носителей, содержащих машиноисполняемые инструкции, которые, когда выполняются одним или более процессорами в мобильном вычислительном устройстве, выполняют действия, включающие в себя: ! запрос из переносимого компонента, физически подключенного к мобильному вычислительному устройству, но съемного с мобильного вычислительного устройства, криптографически защищенного идентификатора [302], привязанного к переносимому компоненту, идентифицирующего переносимый компонент, и недешифруемого мобильным вычислительным устройством, но дешифруемого удаленным вычислительным устройством, способным связываться с мобильным вычислительным устройством с помощью сети связи мобильных устройств; ! прием криптографически защищенного идентификатора из переносимого компонента [304]; !передачу криптографически защищенного идентификатора удаленному вычислительному устройству по сети связи мобильных устройств, чтобы запрашивать разрешение на использование защищенного мультимедийного ...

Подробнее
10-04-2013 дата публикации

СПОСОБ АУТЕНТИФИКАЦИИ ПОЛЬЗОВАТЕЛЬСКОГО ТЕРМИНАЛА В СЕРВЕРЕ ИНТЕРФЕЙСА, А ТАКЖЕ СЕРВЕР ИНТЕРФЕЙСА И ПОЛЬЗОВАТЕЛЬСКИЙ ТЕРМИНАЛ ДЛЯ ЕГО ОСУЩЕСТВЛЕНИЯ

Номер: RU2011139308A
Принадлежит:

... 1. Способ аутентификации пользовательского терминала в сервере интерфейса, содержащий этапы, на которых:принимают информацию запроса аутентификации от сервера обеспечения услуг доступа к приложениям для запрашивания сервера интерфейса выполнить аутентификацию пользовательского терминала, который принимает услугу доступа к приложениям, предоставляемую сервером обеспечения услуг доступа к приложениям;выполняют аутентификацию пользовательского терминала согласно информации запроса аутентификации, используя способ аутентификации, выбранный сервером интерфейса или пользователем пользовательского терминала; ипередают информацию ответа на запрос аутентификации, включающую в себя результат аутентификации при выполнении упомянутого способа аутентификации, на сервер обеспечения услуг доступа к приложениям,причем сервер интерфейса обеспечивает интерфейс с сетью для сервера обеспечения услуг доступа к приложениям, ипричем информацию запроса аутентификации принимают так, что она проходит через пользовательский ...

Подробнее
20-07-2014 дата публикации

УСТАНОВЛЕНИЕ ПОДЛИННОСТИ ОПЕРАЦИЙ С ИСПОЛЬЗОВАНИЕМ СЕТИ

Номер: RU2013100948A
Принадлежит:

... 1. Способ, содержащийвыполнение процесса установления подлинности для потребителя, причем потребитель использует портативное устройство потребителя для проведения операции,выполнение процесса установления подлинности для портативного устройства потребителя, причем выполнение процесса установления подлинности для портативного устройства потребителя содержит проверку идентификационной метки или динамического проверочного значения, связанного с портативным устройством потребителя, ивыполнение анализа степени риска после того, как выполнено установление подлинности потребителя и установление подлинности портативного устройства потребителя, причем анализ степени риска определяет, действительно ли операция подлежит санкционированию.2. Способ по п.1, дополнительно содержащий уведомление потребителя о том, что операция совершается.3. Способ по п.1, в котором идентификационная метка представляет собой идентификационную метку магнитной полосы.4. Способ по п.1, в котором портативное устройство потребителя ...

Подробнее
20-12-2014 дата публикации

СПОСОБ ВЫПОЛНЕНИЯ ФИНАНСОВОЙ ТРАНЗАКЦИИ ЧЕРЕЗ НЕЗАЩИЩЕННУЮ ИНФРАСТРУКТУРУ СВЯЗИ ОБЩЕГО ПОЛЬЗОВАНИЯ И УСТРОЙСТВО ДЛЯ ЭТОГО

Номер: RU2013126419A
Принадлежит:

... 1. Способ выполнения финансовой транзакции через незащищенную инфраструктуру связи общего пользования, содержащий этапы, на которых:собирают данные, относящиеся к указанному типу финансовой транзакции;создают маркер транзакции, включающий в себя собранные данные и/или данные, полученные из собранных данных;шифруют маркер транзакции;создают сообщение протокола финансовой транзакции, включающее в себя зашифрованный маркер транзакции, который зависит от выбранного канала передачи, по которому сообщение должно быть передано; ипередают сообщение протокола финансовой транзакции с помощью выбранного канала передачи и посредством незащищенной инфраструктуры связи общего пользования адресату, где сообщение протокола финансовой транзакции будет дополнительно обрабатываться.2. Способ по п.1, в котором этап сбора данных, относящихся к указанному типу транзакции, включает в себя подэтап, на котором собирают данные аутентификации, которые после этого шифруются, и маркер транзакции, созданный после этого ...

Подробнее
10-09-2015 дата публикации

СПОСОБ, СЕРВЕР И СИСТЕМА ДЛЯ ИДЕНТИФИКАЦИИ ЧЕЛОВЕКА

Номер: RU2014103321A
Принадлежит:

... 1. Способ для идентификации человека, при котором серверу идентификации заранее известно, что человек является владельцем телекоммуникационного оборудования, имеющего уникальный идентификатор, и известно, что человек имеет личный код доступа, при этом способ содержит:- получение (51) сервером запроса на идентификацию от терминала посредством первой сети передачи данных;- отправку (53) сервером идентификационного кода терминалу посредством первой сети передачи данных;- передачу (57) идентификационного кода от терминала телекоммуникационному оборудованию;- получение (59) сервером от телекоммуникационного оборудования посредством второй сети передачи данных идентификационного кода вместе с уникальным идентификатором;- генерацию (61) сервером одноразового идентификационного маркера и отправку (63) его телекоммуникационному оборудованию посредством второй сети передачи данных; и возврат (64) одноразового идентификационного маркера серверу телекоммуникационным оборудованием посредством второй ...

Подробнее
20-05-2014 дата публикации

СИСТЕМА И СПОСОБ НАДЕЖНОЙ ПРОВЕРКИ ДОСТОВЕРНОСТИ ТРАНЗАКЦИЙ

Номер: RU2012139268A
Принадлежит:

... 1. Серверный компьютер, содержащий:процессор; исчитываемый компьютером носитель, связанный с процессором, причем считываемый компьютером носитель включает в себя код, исполняемый процессором, для реализации способа, содержащего:прием первого сообщения запроса авторизации, содержащего первое значение верификации;определение, является ли достоверным первое значение верификации;создание второго сообщения запроса авторизации, содержащего второе значение верификации; иотправку второго сообщения запроса авторизации на компьютер эмитента.2. Серверный компьютер по п. 1, в котором первым значением верификации является динамическое значение верификации.3. Серверный компьютер по п. 1, в котором вторым значением верификации является статическое значение верификации.4. Серверный компьютер по п. 1, дополнительно содержащий:отправку индикатора достоверности во втором сообщении запроса авторизации на серверный компьютер, причем индикатор достоверности указывает, является ли достоверным первое значение ...

Подробнее
28-10-2021 дата публикации

ЦЕПОЧКИ БЛОКОВ С УДОСТОВЕРЕНИЕМ ПОСРЕДСТВОМ СООБЩЕНИЙ

Номер: RU2020114756A
Принадлежит:

Подробнее
28-06-2001 дата публикации

VERFAHREN UND EINRICHTUNG ZUR DATENVERSCHLÜSSELUNG UND- ÜBERTRAGUNG

Номер: DE0069231840D1
Принадлежит: ENCO TONE LTD, ENCO-TONE, LTD.

Подробнее
07-02-2019 дата публикации

SYSTEM ZUM AUSTAUSCHEN VON ENERGIE

Номер: DE102017117598A1
Принадлежит:

Die Anmeldung betrifft ein System (100, 200, 300, 500) zum Austauschen von elektrischer Energie, umfassend mindestens eine erste Austauschvorrichtung (102, 202, 302, 502.1, 502.2), zumindest eingerichtet zum Abgeben von elektrischer Energie in Form eines Energiestroms (130, 230, 330) an mindestens eine zweite, mit der ersten Austauschvorrichtung (102, 202, 302, 502.1, 502.2) verbindbare, Austauschvorrichtung (104, 204, 304, 504.1, 504.2) während eines Austauschvorgangs, mindestens ein erstes, der ersten Austauschvorrichtung (102, 202, 302, 502.1, 502.2) zugeordnetes, Peer-to-Peer-Modul (110, 210, 310), eingerichtet zum Kommunizieren mit mindestens einer Peer-to-Peer-Anwendung (124, 224, 324, 424) mindestens eines Peer-to-Peer-Netzwerks (122, 222, 322, 522), wobei das erste Peer-to-Peer-Modul (110, 210, 310) zumindest zum Empfangen eines Tokenstroms (128, 228, 328) während des Austauschvorgangs eingerichtet ist, wobei die Aussendung des Tokenstroms (128, 228, 328) von der zweiten Austauschvorrichtung ...

Подробнее
02-04-2009 дата публикации

Data transmitter authentication and protection method for encoding machine, involves closing number of keys from information of source and associated code numbers, where information of keys is not sufficient to encrypt other source data

Номер: DE102007046102A1
Принадлежит:

The method involves generating and transmitting unencrypted source data e.g. text, or definite portions of the data concerning encrypted code data by a cryptographic technique. The source data is transferred into a source number or a source number sequence. The source number is transferred by an independent session key in the code number. A number of regular keys are closed from information of the source number and associated code number. The keys are not identified by the information of the source and code data, where information of the keys is not sufficient to encrypt other source data.

Подробнее
13-09-2007 дата публикации

VERFAHREN ZUR AUTOMATISCHEN BETRUGSKONTROLLE IN EINEM ELEKTRONISCHEN TRANSAKTIONSSYSTEM

Номер: DE602004007954D1
Принадлежит: FRANCE TELECOM

Подробнее
12-05-2011 дата публикации

Verfahren zur sicheren Interaktion mit einem Sicherheitselement

Номер: DE102009052389A1
Принадлежит:

In einem Verfahren zur gesicherten Interaktion mit einem Sicherheitsmodul (200), welches in ein Endgerät (100) integriert ist, über eine Eingabeeinrichtung (180) des Endgeräts (100) wird die Eingabeeinrichtung (180) durch eine Sicherheitsapplikation (180), welche in einem vertrauenswürdigen Bereich (130) des Endgeräts (100) ausführbar ist, reserviert. Anschließend werden erste Authentisierungsdaten (PIN 1) über die reservierte Eingabeeinrichtung (180) eingegeben. Die Sicherheitsapplikation (150) leitet aus den ersten Authentisierungsdaten (PIN 1) mittels in dem vertrauenswürdigen Bereich (130) gespeicherter Geheimdaten (144) zweite Authentisierungsdaten (PIN 2) ab. Diese (PIN 2) werden anschließend durch die Sicherheitsapplikation (150) verschlüsselt und an das Sicherheitsmodul (200) und/oder an einen Server übertragen. In dem Sicherheitsmodul (200) und/oder dem Server werden die empfangenen, verschlüsselten zweiten Authentisierungsdaten (PIN 3) schließlich entschlüsselt.

Подробнее
18-05-2006 дата публикации

Verfahren und Vorrichtung zum kryptographischen Datenschutz

Номер: DE0060027119D1
Автор: WANG XIN, WANG, XIN

Подробнее
31-03-2005 дата публикации

TRANSAKTIONSZERTIFIZIERUNG

Номер: DE0060109061D1

Подробнее
16-07-2020 дата публикации

Blockchain-basierte Automatisierungsarchitektur für Cybersicherheit

Номер: DE102020100863A1
Принадлежит:

Um eine vertrauenswürdige, sichere und unveränderliche Aufzeichnung von Transaktionen in einer Prozessanlage bereitzustellen, werden Techniken zur Verwendung eines Distributed Ledgers in Prozessleitsystemen beschrieben. Das Distributed Ledger kann von Knoten verwaltet werden, die Transaktionen empfangen, die von Feldgeräten, Steuerungen, Bedienerarbeitsplätze oder anderen in der Prozessanlage arbeitenden Geräten gesendet werden. Die Transaktionen können Prozessanlagendaten wie Prozessparameterdaten, Produktparameterdaten, Konfigurationsdaten, Benutzerinteraktionsdaten, Verwaltungsdaten, Inbetriebnahmedaten, Anlagennetzwerkdaten und Produktverfolgungsdaten umfassen. Die Distributed Ledger können auch zum Ausführen von Smart Contracts verwendet werden, damit Maschinen wie Feldgeräte ohne menschliches Eingreifen selbstständig Transaktionen ausführen können. Auf diese Weise können aufgezeichnete Prozessparameterwerte und Produktparameterwerte abgerufen werden, um die Qualität der Produkte zu ...

Подробнее
22-05-2003 дата публикации

Computersystem und Verfahren zum Schutz von Software

Номер: DE0069720972D1
Принадлежит: SIEMENS AG

Подробнее
07-12-2011 дата публикации

Improvements relating to multifunction authentication systems

Номер: GB0002480945A
Принадлежит:

A method of generating a personal authenticated transaction ticket with a registered-user redemption functionality is described. The method is implemented using a remote transaction information device and a central authentication server. The method comprises receiving data at the remote transaction information device from a user, the data including i. a symbol key comprising at least one symbol selected from a plurality of symbols, and ii. personal information identifying the user, the personal information including at least the user name, digitising and encrypting the symbol key and the personal information, transmitting the encrypted data to the central server, receiving a unique transaction number associated with the symbol key and personal information, and providing the unique transaction munber to the user as part of the transaction ticket, the unique transaction number confirming the registration of the user and the authentication of the transaction ticket with the central server.

Подробнее
28-04-2004 дата публикации

Content delivery service providing apparatus and content delivery service terminal unit

Номер: GB0000406756D0
Автор:
Принадлежит:

Подробнее
20-06-2012 дата публикации

Anonymous authentication

Номер: GB0201208068D0
Автор:
Принадлежит:

Подробнее
29-01-2014 дата публикации

Combining key control information in common cryptographic architecture services

Номер: GB0201322085D0
Автор:
Принадлежит:

Подробнее
16-09-2015 дата публикации

Access control

Номер: GB0201513629D0
Автор:
Принадлежит:

Подробнее
18-01-2017 дата публикации

Digital watermarking without significant information loss in anonymized datasets

Номер: GB0201620402D0
Автор:
Принадлежит:

Подробнее
09-08-2017 дата публикации

Computer-implemented system and method

Номер: GB0201710283D0
Автор:
Принадлежит:

Подробнее
27-10-2021 дата публикации

Digital Signatures

Номер: GB0002594312A
Принадлежит:

The application acknowledges prior art which is efficient but in which a private key generation threshold is lower than a signature generation threshold, making the signature untrustworthy. Prior art with equivalent thresholds but lower efficiency is also acknowledged. The invention has holders of shares creates signature components dependent upon the message (MDC) and components independent of the message (MIC). Each shareholder makes these available to a coordinator which creates the complete signature from the components. The invention may use ECDSA (elliptic curve digital signature algorithm), may involve ephemeral keys and may involve various instances of polynomials.

Подробнее
14-08-2013 дата публикации

Improvements relating to unpredictable number generation

Номер: GB0201311838D0
Автор:
Принадлежит:

Подробнее
14-06-2006 дата публикации

Portable data storage device with encryption system

Номер: GB0002421098A
Принадлежит:

A portable data storage system has a non-volatile memory 3 for storing user data, an interface section 7 for receiving and transmitting data to a host, and a master control unit 1 for transferring data to and from the non-volatile memory 3. The portable data storage device further includes an integrated circuit 13 for generating a public/private key pair. The portable data storage device is arranged to transmit at least one of the keys out of the device. In different embodiments, the host can verify that the data is receives is correct, and the device can verify that the host has received the correct data. In a particular embodiment the generated key is transmitted in a form encrypted using a secret key which is permanently stored in the portable storage device, the portable storage device further being arranged to verify a digital signature generated by the host using the generated key and data requested by the host. In a second embodiment the portable storage device is arranged to generate ...

Подробнее
03-05-2006 дата публикации

Validation of on-line identities

Номер: GB0002419791A
Принадлежит:

An identification method and server for validation of online identities. The invention uses public keys and identities to provide secure access to personal identity information. The invention is adapted to receive identifiers and public keys, generate public keys associated with the identifiers, output first and second public keys and validate a second public key with respect to a first identifier using a third identifier such that personal identification information associated with the first identifier is output if the public key is valid. The invention allows the participants in an online discussion to be more easily identified. A particular embodiment is the protection of children who are participating in online activities such as chat-rooms. When a participant's identity is validated, they may have "points" awarded to a corresponding account. The accumulation of these points may allow prizes to be claimed subsequently. It is envisaged that this will encourage the use of the identity ...

Подробнее
10-05-2006 дата публикации

Secure email communication using a central server

Номер: GB0002420061A
Принадлежит:

Creating a secure data connection between a first computer, associated with a first user, and a central server, encrypting the message using a first digital certificate stored on the first computer and transmitting the encrypted message to the central server and associated post-box for storage in a data area associated with a second user, whereby the second user is able to access the central server via a secure data connection from a second computer, to download the message from the data area. Before a user is able to send or receive a first message, he must verify his identity by registering with the server via an email sent to his unique email address. The email includes a hyperlink which leads to a data input form.

Подробнее
27-01-2010 дата публикации

Electronic signature security system

Номер: GB0002436487B
Принадлежит: TOPAZ SYSTEMS INC, TOPAZ SYSTEMS, INC

Подробнее
13-10-2004 дата публикации

Electronic document distribution and authentication using hashes which themselves are hashed to create superhashes

Номер: GB0002400463A
Принадлежит:

Distributing and authenticating documents from a plurality of parties to a recipient data processing apparatus. The system comprises a plurality of document distribution devices each being operable to generate an original hash value from the content of a file containing a document to be distributed. A recipient data processing apparatus is operable to receive the original hash values from each of the plurality of document distribution devices. The recipient data processing apparatus is operable to generate an original super hash value from the plurality of the original hash values received, and to distribute the original super hash value to each of the document distribution devices. The system can provide an increased assurance that documents to be distributed have not been tampered with during, or after, communication. The improvement is provided in part by only submitting a hash value of the document to be distributed. By forming the super hash value, all parties, which are distributing ...

Подробнее
08-12-2004 дата публикации

Improvements in and relating to data communication

Номер: GB0000424496D0
Автор:
Принадлежит:

Подробнее
21-03-2007 дата публикации

PASSWORD ERROR CORRECTION AND CONFIDENTIAL INFORMATION ACCESS SYSTEM

Номер: GB0000702320D0
Принадлежит:

Подробнее
21-11-2018 дата публикации

System and method for controlling asset-related actions via a blockchain

Номер: GB0002562621A
Принадлежит:

According to one perspective, the invention provides a technical arrangement to calculate, register and/or apportion costs and/or generate income in proportion to the current ownership of an asset. One or more embodiments also comprise a novel technique for generating cryptographic sub-keys. Thus, one benefit provided by the invention is that it allows the secure distribution of costs and income for an asset registered and maintained on the Blockchain. In turn, this increases the capability of such assets to meet the real-world needs of various entities such as the asset itself and investing parties. In one embodiment the invention provides a computer-implemented system for controlling a transfer made via a blockchain in respect of an asset, the system comprising an asset having a plurality of private cryptographic keys, each private key being associated with an owner of the asset; a registry comprising a plurality of public cryptographic keys wherein each public key corresponds to a private ...

Подробнее
11-03-2009 дата публикации

Improvements relating to multifunction authentication systems

Номер: GB0000901589D0
Автор:
Принадлежит:

Подробнее
01-12-1982 дата публикации

Method and apparatus for securing data transmissions

Номер: GB0002099195A
Автор: Atalla, Martin M
Принадлежит:

The invention obviates the need for transmitting user-identification information (PIN) from the station utilized by the user to enter his PIN and initiate a transaction, to the station that processes the transaction, as shown in Figure 1A. In another embodiment, the key and RN (rather than PIN) are pre-stored at station 55, the key and RN for the next transaction being encrypted together with the data at station 53 to update the store at station 55 after decrypting in accordance with the key pre-stored from the message sent in the previous transaction. ...

Подробнее
15-09-2021 дата публикации

Blockchain transaction double spend proof

Номер: GB0002592980A
Принадлежит:

A method of testing whether or not a blockchain transaction is a double-spend attempt, the method performed by a first party 103a, by: generating a blockchain transaction 152j, having an input for unlocking an output of a previous blockchain transaction 152i; generating a signature based on the first transaction and one or more time indicators, each indicator indicating when the first transaction was generated/transmitted; and transmitting to a second party 103b the first transaction, the signature and the indicators, wherein the transaction is transmitted via an off-chain communication channel. Also, a method of determining whether to accept a blockchain transaction from a first party, performed by a second party, by: receiving a first transaction from the first party via an off-chain communication channel, the transaction comprising an input for unlocking an output of a previous transaction; determining whether the first party has transmitted a signature based on the transaction and time ...

Подробнее
19-11-1997 дата публикации

Method for controlling access to electronically provided services and system for implementing such method

Номер: GB0009719874D0
Автор:
Принадлежит:

Подробнее
02-02-2022 дата публикации

Computer-implemented control system and method

Номер: GB0002597592A
Автор: BRENDAN LEE [AU]
Принадлежит:

A blockchain implemented method comprises processing and/or generating a blockchain transaction (MTx) having one or more token-related outputs (T-UTXO), each of which represents a respective token (T) issued by a Token issuer (TI) and specifies a) at least one of the operation, status and data that determines the configuration of a device in a system, and b) a quantity of token-related cryptocurrency (TRC) associated with the respective token (T). The operation, status and data that determines the configuration and/or status of the device may be determined from instructions on the output of a respective token’s blockchain transaction. Devices may be tracked and/or managed using one or more blockchain transactions in which token-related outputs, representing tokens, function to determine the status of an asset.

Подробнее
19-01-2022 дата публикации

A method for creating a hierarchical threshold signature digital asset wallet

Номер: GB0002597123A
Автор: CHIU HUNG HUNG [HK]
Принадлежит:

A computer implemented method and system for creating a hierarchical threshold digital asset wallet using a hierarchical distributed key generator (DKG) and a signature protocol enables multiple users of different ranks in an enterprise to collaboratively sign blockchain transactions. The method comprises: generating a public key (secret key) by a user on a user device 102 and a digital asset wallet service platform 101 using a hierarchical threshold key generation protocol; securing and controlling a portion of shares by the user and the digital asset wallet service platform 101 in one or more of m disjoint subsets; sending a transaction signing request by the user through a wallet service API [201, fig. 2] to the digital asset wallet service platform 101; determining whether the transaction signing request adheres to a predefined access policy; creating a signature of a signed transaction using the hierarchical threshold signature protocol; and uploading the signed transaction to a blockchain ...

Подробнее
31-10-2018 дата публикации

Blockchain implemented counting system and method for use in secure voting and distribution

Номер: GB0201814873D0
Автор:
Принадлежит:

Подробнее
14-08-2019 дата публикации

Delivery reservation apparatus and method

Номер: GB0201909589D0
Автор:
Принадлежит:

Подробнее
09-09-2020 дата публикации

Blockchain tokens

Номер: GB0202011753D0
Автор:
Принадлежит:

Подробнее
10-07-2019 дата публикации

Knowledge proof

Номер: GB0201907393D0
Автор:
Принадлежит:

Подробнее
25-07-2018 дата публикации

Method and apparatus for access control

Номер: GB0201809225D0
Автор:
Принадлежит:

Подробнее
30-10-2019 дата публикации

Allocation of a digital asset using blockchain transactions

Номер: GB0201913386D0
Автор:
Принадлежит:

Подробнее
05-02-2020 дата публикации

Peer-to-peer cryptocurrency and crypto asset trading platform

Номер: GB0002576081A
Автор: CHI HO LAM, Chi Ho Lam
Принадлежит:

Threshold signature cryptocurrency wallets are created and shared between buyers and sellers and a mediator for trading cryptocurrencies. Wallets comprise a threshold signature cryptocurrency wallet for the seller’s cryptocurrency and a threshold signature cryptocurrency wallet for the buyer’s cryptocurrency. A threshold private key, corresponding to each of the threshold signature cryptocurrency wallets is divided into n shares based on (t, n) -threshold signature scheme. Masked shares, corresponding to the threshold private key for each of the threshold signature cryptocurrency wallets, are shared by the set of parties and the mediator. All masked shares corresponding to the threshold private keys by the set of parties and the mediator are validated. A withdrawal cryptocurrency transaction is signed jointly by the set of parties, when the correct amount of cryptocurrency is transferred into the threshold wallets for exchange within a predetermined time period; or a withdraw deposit transaction ...

Подробнее
09-05-2018 дата публикации

System and method for data processing using tokens

Номер: GB0201804834D0
Автор:
Принадлежит:

Подробнее
23-03-2022 дата публикации

Commensal token system

Номер: GB0002598945A
Принадлежит:

The invention comprises validating a token transaction, wherein the validating entity has access to said tokens’ original mint and/or setup transaction information. The original token mint transaction involved generating an initial amount of the tokens and may comprise cryptographic data (e.g. a cryptographic key, or a knowledge proof). The method comprises: obtaining a target token transaction comprising one or more token inputs and token outputs; and validating the target token transaction, by verifying that each token input comprises the minting data and/or references a respective token output of either the token mint transaction or a previously validated token transaction that can be traced back to the token mint transaction. Alternatively, a token transaction may be validated by verifying that each token references a token output stored in a token snapshot comprising a set of unspent transaction outputs UTXOs. On condition that the target token transaction is valid, it may be transmitted ...

Подробнее
26-04-2023 дата публикации

Electronic wallet allowing virtual currency expiration date

Номер: GB0002612270A
Принадлежит:

A computer-implemented system and method uses a processor of a device of an expiring virtual currency (EVC) wallet user. An EVC transaction is retrieved that is associated with a blockchain and addressed to an address associated with the EVC wallet. The EVC transaction comprises an expiration date for the EVCs, as part of virtual currency user rules (VCURs). If the expiration date of the EVCs has passed, the method automatically, and without user intervention, transfers the EVCs to a transferee designated in the VCURs.

Подробнее
31-10-2016 дата публикации

SECURE TRANSMISSION OF PAYMENT CREDENTIALS

Номер: AP0201609481D0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
08-03-2004 дата публикации

Method for transmitting and storing value and value store electric power meter using the same.

Номер: AP0000001256A
Принадлежит:

A value store electric power meter is provided. The server of an electric power supplier, an electric power seller, or an electric power reseller transfers value through an electric power line through a built-in electric power modem, stores value received through the electric power modem inside the value store electric power meter in a value store module, reduces a value according to the amount of electric power consumption, omits processes of visually reading a meter, calculating the amount of use, printing and mailing a bill, settling up, and paying an uncollected amount and arrears. Accordingly, it is possible to save electric power supplying costs, to reduce the electric power rate by a user, and maximizing the profit of the electric power supplier. The electric power meter is used for 1C card payment type gas and water meters in which the 1C card having credit value is transferred and stored in an off-line state. Accordingly, the electric power value and the added value measurement ...

Подробнее
30-06-2015 дата публикации

Method for carrying out transactions

Номер: AP2015008513A0
Автор: GIESEN HEINZ
Принадлежит:

Подробнее
31-10-2016 дата публикации

SECURE TRANSMISSION OF PAYMENT CREDENTIALS

Номер: AP2016009481A0
Автор: HUXHAM HORATIO NELSON
Принадлежит:

Подробнее
06-06-2002 дата публикации

Secure packet radio network.

Номер: AP0000001076A
Принадлежит:

A packet radio network comprises at least one work operatorstation and a number of user stations. The user stations transmit message data to one another, either directly or via intermediate stations. When stations are first activated, they transmit key request messages to the network operator station. Other, authenticated stations in the network will not communicate with the new station, but will pass the key request message to the network operator station. The network operator station transmits the necessary keys back to the new station via the other stations to permit the new station to operate. Each user station transmits key probe signals from time to time which advise other stations of its public key.

Подробнее
30-09-1999 дата публикации

Secure packet radio network

Номер: AP0009901625A0
Автор:
Принадлежит:

Подробнее
31-12-2000 дата публикации

Method for transmitting and storing value and value store electric power meter using the same

Номер: AP2000001975A0
Автор:
Принадлежит:

Подробнее
28-02-2014 дата публикации

Mobile device with secure element

Номер: AP2014007426A0
Автор: KANNAPPAN SASIKUMAR
Принадлежит:

Подробнее
31-10-2010 дата публикации

System and method for mobile phone resident digital signing and encryption/decryption of sms.

Номер: AP2010005394A0
Автор: SETHI MOHIT KUMAR
Принадлежит:

Подробнее
31-08-2013 дата публикации

Systems and methods for activation and deactivation of appliances

Номер: AP2013007091A0
Автор: RICKET DOUGLAS J
Принадлежит:

Подробнее
20-06-2006 дата публикации

Method for transmitting and storing value and value store electric power meter using the same.

Номер: OA0000012679A
Автор: HO TAK SEUNG
Принадлежит:

Подробнее
31-08-2013 дата публикации

Systems and methods for activation and deactivation of appliances

Номер: AP0201307091A0
Автор: RICKET DOUGLAS J
Принадлежит:

Подробнее
05-01-2012 дата публикации

Privacy-sensitive sample analysis

Номер: US20120005098A1
Принадлежит: International Business Machines Corp

Processes are described for provision of privacy-sensitive sample analysis results to a sample provider. The sample provider generates a cryptographic commitment encoding a secret value, r, and a sample identifier, s, associated with a sample container. The sample provider provides the commitment to an analysis provider in association with the sample container containing a sample for analysis. The analysis provider analyzes the sample to obtain a set of analysis results corresponding to the sample identifier, s, and generates a cryptographic pre-credential, σ′, corresponding to the sample identifier, s. The pre-credential, σ′, encodes the set of analysis results and the commitment. Completion of the pre-credential, σ′, requires knowledge of the secret value, r, in the commitment. In response to cryptographic proof of knowledge by the sample provider of at least the secret value, r, in the commitment encoded in the pre-credential, σ′, corresponding to the sample identifier, s, the analysis provider supplies the pre-credential, σ′, to the sample provider. The sample provider then completes the pre-credential, σ′ using the secret value, r, to obtain a cryptographic credential, σ, encoding the set of analysis results.

Подробнее
09-02-2012 дата публикации

Secure and verifiable data handling

Номер: US20120036366A1
Принадлежит: Microsoft Corp

The described implementations relate to secure and verifiable data handling. One implementation can receive a request to upload information, wherein the information includes a referencing element and at least one blob of referenced data. This implementation can also receive a chunk of an individual blob. The chunk can include multiple blocks. Individual blocks can be hashed. Upon receipt of an indication that all chunks have been uploaded, this implementation can create an overall hash of the information from the block hashes rather than from the information.

Подробнее
08-03-2012 дата публикации

Method of Providing Transactions Employing Advertising Based Verification

Номер: US20120060036A1
Принадлежит: Imation Corp

A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.

Подробнее
12-04-2012 дата публикации

Privacy-Preserving Metering

Номер: US20120089494A1
Принадлежит: Microsoft Corp

Privacy protecting metering is described such as for electricity, gas or water metering, metering use of cloud computing resources, traffic congestion charging and other metering applications. In examples, fine grained user consumption data is kept private and not disclosed to a provider of a resource consumed by the user. In examples, a bill generator receives certified meter readings and a certified pricing policy and generates a bill which omits fine grained user consumption data. For example, the bill generator generates a zero knowledge proof that the bill is correct and sends that proof to a provider together with the bill. In examples a provider is able to check that the bill is correct using the zero knowledge proof without finding out the user's private consumption data. In an embodiment the pricing policy is stored as signed rows of a table to enable efficient generation of the zero knowledge proof.

Подробнее
24-05-2012 дата публикации

Transaction verification on rfid enabled payment and transaction instruments

Номер: US20120130905A1
Автор: Ersin Uzun, Gene Tsudik
Принадлежит: UNIVERSITY OF CALIFORNIA

A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Подробнее
28-06-2012 дата публикации

Object Processing Employing Movement

Номер: US20120163666A1
Принадлежит: Individual

Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.

Подробнее
05-07-2012 дата публикации

Biometric authentication of mobile financial transactions by trusted service managers

Номер: US20120173434A1
Принадлежит: eBay Inc

A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS.

Подробнее
19-07-2012 дата публикации

Receiver non-repudiation via a secure device

Номер: US20120183145A1
Принадлежит: Apple Inc

Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.

Подробнее
19-07-2012 дата публикации

Protecting Codes, Keys and User Credentials with Identity and Patterns

Номер: US20120185698A1
Автор: Michael Stephen Fiske
Принадлежит: Individual

Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art. In an embodiment, the invariant is at least partially generated (e.g., derived) a transformation between the biometric templates or prints. In an embodiment, the invariant is a cryptography key. In an embodiment, the transformation(s) help perform an authentication of the user and are executed by digital computer program instructions. In an embodiment, pattern transformation(s) are represented with colors, geometry or frequencies.

Подробнее
26-07-2012 дата публикации

Secure transaction facilitator

Номер: US20120191977A1
Принадлежит: MERQUERY FINANCIAL SYSTEMS LLC

A method, system, and devices are provided in which modified digital signatures are used to provide a dynamically generated number suitable for use in transactions requiring validation. The method uses symmetric key encryption to encode a message comprising authorization information and may use compression algorithms to provide a truncated message digest such that the dynamic number may be processed by existing credit card or other authorization systems. In part, this method is an improvement over other validation methods as decryption, which requires greater computing power, is not required. The method may be performed through the use of various devices. For example, credit cards may utilize the method to dispose the dynamic number in a magnetic strip or to transmit the dynamic number via radio transmitter. Smart cards, smart phones, or USB devices, optionally may be utilized to perform the inventive method.

Подробнее
02-08-2012 дата публикации

Digital works having usage rights and method for creating the same

Номер: US20120198563A1
Принадлежит: Contentguard Holdings Inc

Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party.

Подробнее
02-08-2012 дата публикации

Digital works having usage rights and method for creating the same

Номер: US20120198567A1
Принадлежит: Contentguard Holdings Inc

Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party.

Подробнее
23-08-2012 дата публикации

Authentication and data integrity protection of a token

Номер: US20120213368A1
Автор: Rainer Falk
Принадлежит: SIEMENS AG

In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, the related response is calculated after receiving a challenge message which has not yet been transferred. A cryptographic key is derived from the response, which is used to determine a cryptographic check sum of data. The cryptographic check sum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.

Подробнее
13-09-2012 дата публикации

Distribution of Credentials

Номер: US20120233465A1
Принадлежит: International Business Machines Corp

The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key.

Подробнее
20-09-2012 дата публикации

Virtual account based new digital cash protocols

Номер: US20120239580A1

Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.

Подробнее
20-09-2012 дата публикации

Creation of user digital certificate for portable consumer payment device

Номер: US20120239934A1
Автор: Terence V. Trench
Принадлежит: Individual

A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him and stored at a user-specific memory in a remote certificate library without having the chip card modified.

Подробнее
25-10-2012 дата публикации

Multi-Factor Authentication Using A Smartcard

Номер: US20120272307A1
Автор: Mark Buer
Принадлежит: Broadcom Corp

Methods and systems are provided for non-cryptographic capabilities of a token such as a smartcard to be used as an additional authentication factor when multi-factor authentication is required. Smartcards are configured to generate a transaction code each time a transaction is attempted by the smartcard. The transaction code is dynamic, changing with each transaction, and therefore is used as a one-time password. When a user attempts to access a service or application requiring at least two authentication factors, a secure processor is used to read transaction code from the smartcard. The secure processor establishes a secure communication with the remote computer hosting the service or application. The transaction code can then be encrypted prior to transmission over the public Internet, providing an additional layer of security.

Подробнее
06-12-2012 дата публикации

Method for protecting application and method for executing application using the same

Номер: US20120311720A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

An application protection method and an application execution method using the same are provided. The application protection method generates a key needed to execute the application which is provided to a user terminal using information on the user terminal, information on the application, and a part of text; and transmits the generated key to the user terminal. Therefore, the application is executed on the device which has a legal right for the application, thereby preventing the illegal use of the application.

Подробнее
13-12-2012 дата публикации

System and method for utilizing content in accordance with usage rights

Номер: US20120317660A1
Принадлежит: Contentguard Holdings Inc

Apparatus, method, and media for utilizing content. An exemplary method comprises storing a description structure comprising one or more usage rights, storing content associated with the one or more usage rights, receiving a request for the content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to at least one of the one or more usage rights, determining whether the computing device is an authorized device, and utilizing the content in accordance with the at least one of the one or more usage rights based at least in part on a determination that the utilization corresponds to the at least one of the one or more usage rights and a determination that the computing device is an authorized device.

Подробнее
03-01-2013 дата публикации

Payment system and method of ic card and a multi-application ic card as well as a payment terminal

Номер: US20130001304A1

A payment system and method of IC card and a multi-application IC card as well as payment terminal are proposed in the present invention. The terminal and the IC card perform off-line data authentication using an asymmetric key algorithm during an off-line transaction, and if the transaction is not approved in manner of off-line, the terminal and the IC card performs an on-line transaction via a host. Therefore, the payment system and method of IC card and the multi-application IC card as well as payment terminal disclosed in the present invention can be used both in machinery without on-line transaction environment and in standard merchant machinery with on-line transaction environment.

Подробнее
03-01-2013 дата публикации

Near-field communication based payment methods

Номер: US20130006872A1
Принадлежит: Individual

A method of performing a payment transaction is provided. Transaction information is received from a payee, which has been provided to the payee by a payor using near-field communications and includes a payment amount and payee account information. A transaction authentication request is sent to the payor, and, after a transaction authentication is received from the payor, the payment amount is sent to the payee. After the payment has been completed, a payment confirmation is sent to the payor. A method for processing a payment transaction using a generated remittance key is also provided. The remittance key, which includes an encrypted alphanumeric key having a payment amount and payment provider account information for a payor, is generated and transmitted to a payee who, in turn, transmits the remittance key to a remittance agent. The remittance agent transmits the remittance key and a payment request to a payment provider who processes the request and transmits a payment to the payee.

Подробнее
03-01-2013 дата публикации

Non-transferable anonymous digital receipts

Номер: US20130007461A1
Принадлежит: International Business Machines Corp

A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent and received between a first party and a verifying party, the method comprising the steps of receiving a proof message from the first party, the proof message being derived from at least a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party and an electronic receipt that has been issued by electronically signing a request message with a second public key, determining whether or not the proof message was derived from the second public key.

Подробнее
10-01-2013 дата публикации

Secure nfc payment transactions

Номер: US20130012125A1
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
10-01-2013 дата публикации

Secure near field communication transactions with authentication

Номер: US20130012126A1
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
17-01-2013 дата публикации

Methods and systems for tracking electronic commerce transactions

Номер: US20130018721A1
Принадлежит: LinkShare Corp

Systems and methods are disclosed for tracking user access to an advertisement and user transactions with an electronic commerce computer associated with the advertisement. In accordance with one aspect of the disclosed technology, a transaction tracking computer associates an identifier with each access (e.g., click) of an advertisement. Transactions that occur at the electronic commerce computer that are related to the advertisement will be reported to the transaction tracking server together with the identifier. In one embodiment, if the reported transaction is a duplicate of a previously reported transaction, then the reported transaction is determined to be invalid. In one embodiment, if the reported transaction occurs more than a predetermined amount of time after the time the identifier was initially generated, then the reported transaction will also be determined to be invalid.

Подробнее
07-02-2013 дата публикации

Near field communication slot based secure element with authentication prior to transaction

Номер: US20130035035A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
07-02-2013 дата публикации

Secure device based nfc payment transactions

Номер: US20130035036A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
07-02-2013 дата публикации

Mobile transactions using a generic nfc smart sticker with authentication

Номер: US20130035968A1
Автор: Michelle Fisher
Принадлежит: Blaze Mobile Inc

A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server.

Подробнее
14-03-2013 дата публикации

Secure data parser method and system

Номер: US20130064364A1
Принадлежит: Security First Corp

A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.

Подробнее
28-03-2013 дата публикации

Electronic wallet using allocation of funds

Номер: US20130080333A1
Принадлежит: Amazon Technologies Inc

A user may instruct a host to transmit an allocation of electronic money to the user's mobile electronic device from a user's payment account managed by the host. The allocation may include credentials, authentication key(s), a signature, a limited amount of funds, and/or other types of payment information. The allocation may be limited to the amount of funds that, when exhausted or expired, prevents further payments using the mobile electronic device. The user may reload the mobile electronic device with electronic money by reconnecting to the host via the secure channel. The user may spend the allocation using the electronic device with use of minimal or no user-based security measures (e.g., passwords, biometrics, etc.), thereby making it quick and easy to make payments with the electronic money.

Подробнее
25-04-2013 дата публикации

Authentication

Номер: US20130103591A1
Автор: Scott WHEELER
Принадлежит: Vodafone IP Licensing Ltd

The user's SIM 20 is adapted to store a seed for generating an authentication code which is usable to authenticate a transaction. The mobile telecommunications device 1 has a processor including means operable to obtain the seed from the SIM, to calculate the authentication code and to generate a transaction message for enabling the transaction with the entity, the transaction message including the authentication code.

Подробнее
25-04-2013 дата публикации

Multiple Table Tokenization

Номер: US20130103685A1
Принадлежит: Protegrity Corp

Data is tokenized using multiple token tables. An initialization vector is generated based on a first data portion and a first set of token tables. The initialization vector can be generated by querying a first token table with the first data portion. A second data portion is tokenized based on the initialization vector and a second set of token tables. The second data portion can be modified with the initialization vector, and a second token table can be queried with the modified second data portion to form a tokenized second data portion. The first set and second set of token tables can be generated based on a received tokenization key, or can be previously generated. The first portion of the input data and the tokenized second data portion of the input data can be concatenated to form tokenized data.

Подробнее
25-04-2013 дата публикации

Point of sale (pos) personal identification number (pin) security

Номер: US20130103948A1
Автор: Attaullah Baig
Принадлежит: Individual

A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into a PIN pad, the processor puts the PIN into a PIN block; puts additional random data into the PIN block; and encrypts the entire PIN block using asymmetric cryptography with a public key derived from the injected key residing in the PIN pad processor. The corresponding private key may be held securely and secretly by an acquirer processor for decrypting the PIN block to retrieve the PIN. The encrypted random data defends the PIN against dictionary attacks. Time stamp data and constant data encrypted with the PIN block enables a defense of the PIN against replay attacks and tampering. The method may also include accepting the PIN from a mobile phone in communication with the processor.

Подробнее
25-04-2013 дата публикации

Authentication system

Номер: US20130104209A1
Автор: Gopal Nandakumar
Принадлежит: Individual

A system and method whereby the identity of a person, entity, device or the like attempting to gain access to a secured resource may be securely authenticated includes a means for receiving from a requester purporting to be an authorized user of a secured resource a request for access by an unauthorized user (such as, for example, a retail store, a service station, an on-line service provider or merchandiser, a healthcare provider, a medical insurer, an information consumer or the like) to the secured resource; a means for generating and communicating to the purported authorized user a challenge string adapted to provide a basis for authenticating the identity of the requester; a means for receiving a response string corresponding to the challenge string; and a means for evaluating the response string to authenticate the identity of the requester.

Подробнее
09-05-2013 дата публикации

Demand based encryption and key generation and distribution systems and methods

Номер: US20130114812A1
Автор: Arvind Gidwani
Принадлежит: Individual

Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.

Подробнее
23-05-2013 дата публикации

Digital certification method and apparatus

Номер: US20130132726A1
Принадлежит: Avoco Secure Ltd

A method for recording a document with authenticity certification information. The method includes receiving an indication from a user regarding their intention to accept and/or receive a proposed set of documentary content elements and presenting a visual display of the documentary content elements. The method further includes presenting and detecting an actuatable acknowledgment mechanism and receiving and transmitting account information to an account provider. The method also includes generating a digital certificate and key pairs from one or more items associated the account information.

Подробнее
27-06-2013 дата публикации

Constraining a login to a subset of access rights

Номер: US20130167205A1
Принадлежит: Microsoft Corp

This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID, general password, and one or more desired constraints. The constrained password is used in place of the general password to gain access rights that are a subset of the access rights that would be granted if the general password were used instead.

Подробнее
04-07-2013 дата публикации

Method and system for machine identification

Номер: US20130173789A1
Принадлежит: Computer Associates Think Inc

A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.

Подробнее
01-08-2013 дата публикации

Trusted service manager (tsm) architectures and methods

Номер: US20130198086A1
Автор: Upendra Mardikar
Принадлежит: eBay Inc

A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.

Подробнее
29-08-2013 дата публикации

Method of performing a financial transaction via unsecured public telecommunication infrastructure and an apparatus for same

Номер: US20130226815A1
Принадлежит: Smart Hub Pte Ltd

A method of performing a financial transaction via unsecured public telecommunication infrastructure comprising collecting data relating to a specified financial transaction type; building a transaction token including collected data and/or data derived from the collected data; encrypting the transaction token; creating a financial transaction protocol message incorporating the encrypted transaction token as dependent on a selected transport channel through which the message is to be conveyed; and conveying the financial transaction protocol message using the selected transport channel and by way of the unsecured public telecommunication infrastructure to a destination where the financial transaction protocol message will be further processed is disclosed.

Подробнее
29-08-2013 дата публикации

Method for synchronous encryption between a client and a licensing agent

Номер: US20130227282A1
Принадлежит: Individual

A licensing system is disclosed for performing synchronous encryption with a client over an IP-compliant network. In disclosed embodiments, the system includes a licensing agent configured to pass a data structure unencrypted in an initial communication between the licensing agent/client pair and pass a first key to said client responsive to an initial communication. The licensing agent then receives the data structure from the client having designated fields encrypted according to the first key. The licensing agent then sends a second key to the client for use in subsequent communications.

Подробнее
19-09-2013 дата публикации

Transactional security over a network

Номер: US20130246282A1
Автор: Richard F. Carrott
Принадлежит: Richard F. Carrott

A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant.

Подробнее
10-10-2013 дата публикации

Hack-Deterring System for Storing Sensitive Data Records

Номер: US20130268752A1
Автор: Oren Levy, Ronen MORECKI
Принадлежит: Tactus Mobile Ltd

A mobile communication system comprising a multiplicity of mobile devices, and a server communicating with the mobile devices via a communication network, and a central database which is in data communication with the server and which is operative for storing sensitive data encrypted using at least one key, at least a portion of which is provided, only on certain occasions, by an individual one of the mobile devices and is not retained between the occasions by the central database.

Подробнее
24-10-2013 дата публикации

Method for transmitting and receiving a multimedia content

Номер: US20130279696A1
Принадлежит: Viaccess SAS

A method for transmitting and receiving multimedia content having cryptoperiods scrambled by a control word includes a sender using an operating key and an encryption algorithm in a first virtual mother card to encrypt the control word to obtain a cryptogram, using a syntax constructor also in the first virtual mother card to generate an ECM that incorporates the cryptogram, and transmitting it to a terminal. The terminal receives the ECM and using a syntax analyzer contained in a first virtual daughter card associated with the mother card and uses it to locate a position of the cryptogram CW*t in the ECM. Using an operating key of a decryption algorithm in the daughter card, it then decrypts the cryptogram. Then, using the decrypted control word, it proceeds to descramble the cryptoperiod. Meanwhile, the sender occasionally changes the virtual mother card into a different virtual mother card.

Подробнее
21-11-2013 дата публикации

System and method for preventing unauthorized access to information

Номер: US20130311784A1
Автор: Micheal Bleahen
Принадлежит: Individual

An authentication system protects a hardware cryptographic chip from being commanded to decrypt or sign data by someone other than the legitimate owner(s) of the certificate residing on the chip. Openness of present cryptographic hardware systems are limited by imposing a condition that the cryptographic chip will only perform critical cryptographic tasks if the task is accompanied by a signature which only the legitimate owner can provide.

Подробнее
05-12-2013 дата публикации

Server system, method for executing server system, and external memory

Номер: US20130325929A1
Принадлежит: IZE Co Ltd

A system includes an application server connected to a web server and a client terminal via a network, the terminal being connected to an external memory, the application server includes an interface for a provider of a service, a contents database, an attribute database, an ID receiving part for receiving the ID sent from the client terminal connected to the external memory, an authentication part, an attribute information reading part, a display contents generation part and a display contents sending part, the external memory is stored with a program for sending the read ID to the application server from the client terminal and displaying the received display contents on a screen of the client terminal.

Подробнее
12-12-2013 дата публикации

Visualization of Trust in an Address Bar

Номер: US20130332740A1
Принадлежит: Microsoft Corp

Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate during a negotiation of a secure session between a local device and a remote device. The certificate includes security information about a site maintained at the remote device. The security information is displayed to a user of the browsing software in a meaningful fashion to allow the user to make a trust determination about the site. Displaying the security information may include presenting a certificate summary that includes the most relevant information about the certificate, such as the name of the owner of the site and the name of the certificating authority of the certificate.

Подробнее
06-03-2014 дата публикации

System and method for secure provisioning of an information handling system

Номер: US20140068250A1
Принадлежит: Individual

Systems and methods for reducing problems and disadvantages associated with provisioning of information handling systems, including without limitation those associated with bare metal provisioning of information handling systems, are disclosed. A system may include a processor, and a memory and an access controller each communicatively coupled to the processor. The access controller may store an enterprise public key associated with an enterprise private key and a platform private key associated with the system. The access controller may be configured to: (i) authenticate communications received from a provisioning server communicatively coupled to the access controller based at least on an enterprise public certificate associated with the provisioning server and (ii) establish an asymmetrically cryptographic communications channel between the access controller and the provisioning server based at least on a platform public key associated with the platform private key, the platform private key, the enterprise public key, and the enterprise private key.

Подробнее
06-01-2022 дата публикации

Authentication to Authorization Bridge Using Enriched Messages

Номер: US20220005030A1
Принадлежит: CardinalCommerce Corp

A system of electronic communication is disclosed. The system may: create a Pre-Authentication Transaction Number (Pre-ATN) by combining a number with a Special Encode Value (SEV), wherein the SEV is a single digit integer value; encrypt the Pre-ATN using a Format Preserving Encryption (FPE) to generate an encrypted Authentication Transaction Number (ATN); and send the encrypted ATN to an access control server (ACS) to use the encrypted ATN to generate a cardholder Authentication Verification Value (CAVV) or an Accountholder Authentication Value (AAV).

Подробнее
04-01-2018 дата публикации

SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS

Номер: US20180004957A1
Принадлежит:

A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device. 1. A method for device authentication comprising:receiving, by processing hardware of a first device, a message from a second device to authenticate the first device;retrieving, by the processing hardware, a secret value from secure storage hardware operatively coupled to the processing hardware;deriving, by the processing hardware, a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key; andsending the validator to the second device.2. A method as in claim 1 , wherein the validator is exchanged between the first device and the second device as part of a challenge-response protocol.3. A method as in claim 2 , wherein the first device comprises a printer cartridge and the second device comprises a printer.4. A method as in claim 1 , wherein the path through the key tree identifies a plurality of ...

Подробнее
13-01-2022 дата публикации

MULTI-FACTOR AUTHENTICATION AT POINT OF SALE FOR MULTI-INGREDIENT PRODUCT TRACKING, TRACING, AND AUTHENTICATION

Номер: US20220012681A1
Принадлежит:

Some aspects of the present application relate to systems and methods for leveraging blockchain technology to enable multi-ingredient product tracking, tracing, and authentication. In some aspects, the systems and methods may be used for supply chain management of a multi-ingredient product, including products that are formed using one or more raw ingredients which have undergone change. In some aspects, the systems and methods provide actors present in the supply chain the ability to provide information and data pertaining to their role (e.g., the processes they follow, the material they buy, etc.) in the supply chain and store that information and data into one or more blocks of a blockchain. 1. A method for creating genealogy data structures for tracing a final product back to its source ingredients , the method comprising ,receiving first data associated with a first actor in a supply chain, wherein the first data includes information indicating a first ingredient of the ingredients and one or more processes executed by the first actor with respect to the first ingredient;recording at least a portion of the first data to a block of a blockchain; and identifying a genealogy data structure corresponding to the final product, the genealogy data structure comprising one or more blocks of the blockchain storing data corresponding to the final product, the data corresponding to the final product including at least the portion of the first data; and', 'transmitting second data recorded to the one or more blocks of the blockchain corresponding to the genealogy data structure., 'in response to a request to access genealogy data corresponding to the final product2. The method of claim 1 , wherein recording at least the portion of the first data includes creating a new block on the blockchain.3. The method of claim 2 , further comprising:compiling information recorded to one or more previously created blocks of the blockchain associated with the final product;aggregating ...

Подробнее
13-01-2022 дата публикации

Security hierarchy on a digital transaction processing unit (dtpu)

Номер: US20220012720A1
Автор: Robert Wilson
Принадлежит: XARD GROUP PTY LTD

A Digital Transaction Processing Unit (DTPU) operable to host one or more transaction applications for digitally transacting with a Digital Transaction Device (DTD), the DTPU including a security hierarchy for hosting the one or more transaction applications, wherein the security hierarchy is configured to host at least one transaction application for transacting in contact digital transactions.

Подробнее
07-01-2021 дата публикации

METHOD AND SYSTEM PROVIDING INTEROPERABILITY BETWEEN BLOCKCHAIN ECOSYSTEMS

Номер: US20210004774A1
Автор: RAMGOPAL Vivekanand
Принадлежит: TATA CONSULTANCY SERVICES LIMITED

This disclosure relates generally to a system and method to interoperability between two or more independent ecosystems. Wherein the first ecosystem comprises a blockchain platform. The system identifies a smart contract of the blockchain platform, a set of protocols of the second ecosystem, and a format of a message of the second ecosystem. The identified smart contract, the identified set of protocols, the identified format of the message and a meta-data driven service orchestration for the transaction are analyzed by the system. Further, the system invokes at least one application programming interface (API) based on the analysis of the smart contract of the first ecosystem, the set of protocols and the format of the message of the second ecosystem, and the metadata driven service orchestration for the transaction. Finally, the system is enabled to transmit the at least one transaction between the first ecosystem and the second ecosystem. 1. A method to provide interoperability between two or more independent ecosystems , the method comprising one or more steps of:transmitting at least one transaction from a first ecosystem to a second ecosystem, wherein the first ecosystem comprises a blockchain platform;identifying a smart contract of the blockchain platform for interoperability with the second ecosystem;identifying a set of protocols of the second ecosystem to connect with the second ecosystem;identifying a format of a message of the second ecosystem to transmit to the second ecosystem;analyzing the identified smart contract, the identified set of protocols, the identified format and a meta data driven service orchestration for the transaction;invoking at least one application programming interface (API) based on the analysis of smart contract of the first ecosystem, the set of protocols and formats of the second ecosystem, and the metadata driven service orchestration for the transaction; andcompleting the at least one transaction between the first ecosystem ...

Подробнее
07-01-2021 дата публикации

TRANSACTION SYSTEM AND TRANSACTION METHOD

Номер: US20210004788A1
Автор: Kim Min Soo
Принадлежит:

A transaction system comprises: a terminal device for transmitting, to a server, a remittance request signal for remitting cryptocurrency stored in an electronic wallet; and a transaction server for receiving the remittance request signal from the terminal device, requesting verification of transaction from a blockchain network in order to determine whether the remittance request signal is valid, and remitting the cryptocurrency to an electronic wallet of another terminal device when the remittance request signal is valid as a result of the verification of transaction. 1. A transaction system comprising:a terminal device transmitting, to a server, a remittance request signal for remitting cryptocurrency kept in an electronic wallet; anda transaction server receiving the remittance request signal from the terminal device, requesting transaction verification to a blockchain network in order to determine whether the remittance request signal is available, and remitting the cryptocurrency to an electronic wallet of another terminal device when the remittance request signal is available according to a transaction verification result.2. The transaction system of claim 1 , further comprising:another terminal device receiving the cryptocurrency,wherein each of the terminal device and the another terminal device stores the electronic wallet and the transaction server remits the cryptocurrency from the electronic wallet of the terminal device to the electronic wallet of the another terminal device when the remittance request signal is available.3. The transaction system of claim 2 , wherein the electronic wallet of the terminal device stores information on a balance of the cryptocurrency held by a user of the terminal device and the electronic wallet of the another terminal device stores information on the balance of the cryptocurrency held by the user of the another terminal device.4. The transaction system of claim 2 , wherein the transaction server stores each of the same ...

Подробнее
07-01-2021 дата публикации

DISTRIBUTED SMART WALLET COMMUNICATIONS PLATFORM

Номер: US20210004792A1
Принадлежит:

A system and method for digital smart wallet communications that operates by managing separately-owned, private blockchains to reduce processing times, eliminate proof of work burdens, and retain blockchain immutable security while allowing protection of confidential information contained on each blockchain. The system and method may further comprise auditability of blockchains, and may be operated on an integrated communications platform that allows seamless interoperability of communication devices across multiple modes of communication, and automates digital smart wallet transactions. 1. A system for digital smart wallet transactions , comprising: receive a transaction request from a transaction router;', 'complete a transaction corresponding to the transaction request with a second immutable ledger manager;', 'record the transaction on the first immutable ledger; and', 'send a notification of recordation of the transaction on the first immutable ledger to the transaction router;, 'a first immutable ledger manager, comprising a first immutable ledger and a first plurality of programming instructions stored in a memory of, and operating on a processor of, a first computing device, wherein the plurality of programming instructions, when operating on the processor, cause the first computing device to receive the transaction request from the transaction router;', 'complete the transaction corresponding to the transaction request with the first immutable ledger manager;', 'record the transaction on the second immutable ledger; and', 'send a notification of recordation of the transaction on the second immutable ledger to the transaction router; and, 'the second immutable ledger manager, comprising a second immutable ledger and a second plurality of programming instructions stored in a memory of, and operating on a processor of, a second computing device, wherein the plurality of programming instructions, when operating on the processor, cause the second computing ...

Подробнее
07-01-2021 дата публикации

Mobile-OTP Based Authorisation of Transactions

Номер: US20210004793A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

Embodiments of the present disclosure relate to methods and systems for authenticating and authorizing mobile-One Time Password (m-OTP) based transactions. A cardholder (101) can generate the m-OTP in an issuer mobile application (301) and enter in a checkout page for completing the transaction. Once the m-OTP is entered, a merchant system (104) generates a transaction message comprising the m-OTP and a unique identifier indicating that the transaction message comprises the m-OTP. Is submitted to a directory server (106) which sends the transaction message to an issuer system (107) for authentication and authorization. The issuer system (107) generates a response message comprising a result of authentication and authorization of the transaction message. The directory server (106) routes the response message to the merchant system (104) via the acquirer system (105).

Подробнее
07-01-2021 дата публикации

METHOD AND SYSTEM FOR AUTHORIZATION USING A PUBLIC LEDGER AND ENCRYPTION KEYS

Номер: US20210004799A1
Принадлежит: MasterCard International Incorporated

A method for conveying a data message using a public ledger includes: generating, by a generation module of a processing server, a data message, wherein the data message comprises one or more data values; electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with the generated data message to a first computing system; receiving, by a receiving device of the processing server, a data signal superimposed with an encrypted message from the first computing system, wherein the encrypted message is generated via application of one or more encryption algorithms to the generated data message using at least one encryption key; appending, by the generation module of the processing server, an identification value to the encrypted message; and submitting, by the transmitting device of the processing server, the appended encrypted message to a public ledger associated with a second computing system. 1. A method for securely conveying a transaction message , comprising:applying, by a first computing system, one or more encryption algorithms to a data message using at least one encryption key to generate an encrypted message;transmitting, by the first computing system, the at least one encryption key to a third computing system different from a processing server, wherein the third computing system acts as a node in a blockchain network;receiving, by a receiving device of the processing server from the first computing system, a data signal superimposed with the encrypted message, wherein the processing server does not receive the at least one encryption key;appending, by the processing server, an identification value to the encrypted message;submitting, by the transmitting device of the processing server, the appended encrypted message to a second computing system, wherein the second computing system is a node in the blockchain network;adding, by the second computing system acting as a node in the blockchain network, the ...

Подробнее
04-01-2018 дата публикации

ELECTRONIC TRANSACTION RISK ASSESSMENT BASED ON DIGITAL IDENTIFIER TRUST EVALUATION

Номер: US20180005235A1
Автор: THORNE JAY WILLIAM
Принадлежит:

For a comprehensive view of the parties involved in a transaction, a transaction risk assessment system can collect and persist digital credentials of entities' involved in a requested electronic transaction. With the entity credentials, the transaction risk assessment system performs an on-demand risk analysis of the requested electronic transaction based, at least in part, on previously collected historical transaction data of the entities involved in the electronic transaction. The risk assessment system searches the historical transaction data for information about the entities involved in the requested transaction and evaluates discovered information. The transaction risk assessment system can quantify trustworthiness of each entity involved in the requested transaction based on the evaluation of the discovered information. The transaction risk assessment system can then quantify risk of executing the transaction at least using the quantified trustworthiness of the involved entities. 1. A method comprising: [ determining, from historical transaction data, one or more historical transactions that indicate the entity;', 'determining a trust value for the entity based, at least in part, on data for the historical transactions that indicate the entity;, 'after successful authentication of the entity with identity information of the requested electronic transaction,'}, 'assigning the trust value to the entity;, 'for each of a plurality of entities identified as participating in a requested electronic transaction,'}determining a risk value for the requested electronic transaction based, at least in part, on the trust values assigned to the plurality of entities; andcommunicating the risk value for the requested electronic transaction for determination of whether to execute the requested electronic transaction.2. The method of further comprising determining a set of one or more rules claim 1 , wherein determining the risk value is also based claim 1 , at least in part ...

Подробнее
04-01-2018 дата публикации

SECURE AUTHENTICATION SYSTEM AND METHOD

Номер: US20180005238A1
Принадлежит:

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response. 1112.-. (canceled)113. A method comprising:receiving, a Purchase Authentication Page by a computer from a control server over a communications network, the Purchase Authentication Page having a user response posting field to receive a response from a user to authenticate the user; andproviding, a returned Purchase Authentication Page by the computer to the control server over the communications network, the returned Purchase Authentication Page having a user response disposed in the user response posting field and a secure datum received from a verification token associated with the computer, wherein the control server thereaftercompares at least a portion of the received user response to a stored user response to make a first determination of whether a match exists,compares the received secure datum to a stored secure datum to make a second determination of whether a match exists, andgenerates a Payer Authentication Response message based on at least the first and second determinations.114. The method of claim 113 , wherein the secure datum was received by the verification token from a validation entity after the validation entity validates information received from the verification token.115. The method of wherein the secure datum is generated based on an identity of a merchant with which the user conducts a transaction claim 113 , and a date or time of the transaction.116. The method of wherein the secure datum is generated based on an identifier associated with the verification token or an IP address of the computer.117. The ...

Подробнее
02-01-2020 дата публикации

BLOCKCHAIN-IMPLEMENTED METHOD FOR CONTROL AND DISTRIBUTION OF DIGITAL CONTENT

Номер: US20200005254A1
Принадлежит:

The disclosure relates to a blockchain-implemented system and method of controlling the transmission and/or distribution of digital content. In an illustrative embodiment, the blockchain is the Bitcoin blockchain. The first user () is associated with a deposit quantity of cryptocurrency at a common address (), wherein to spend from the common address requires signatures of both a first private key of the first user () and a second private key of the second user (). The system () comprises a first node () and a second node (). The first node () is associated with a first user () comprising a first processing device configured to: (A) send, over a communications network (), a request to the second node () to provide an episode of digital content from a series of digital content; (B) determine a payment transaction () to transfer from a common address () a payment quantity of cryptocurrency to the second user (), wherein the payment quantity of cryptocurrency is based on a quantity of episodes of digital content in the series of digital content requested by the first user (); and (C) sign, with the first private key (V), the payment transaction () and subsequently send the payment transaction () to the second node (). The second node () is associated with the second user () comprising a second processing device configured to: (I) receive, over the communications network (), the request from the first node () to provide the episode of digital content and the payment transaction (), signed with the first private key; (II) verify the payment transaction, comprising verifying that the payment transaction includes the payment quantity of cryptocurrency to the second user (), and based on the result of verifying the second processing device is further configured to: (III) provide access, over the communications network (), to the episode of digital content (i) to be available to the first node (); and (IV) co-sign, with the second private key of the second user (), the ...

Подробнее
02-01-2020 дата публикации

Systems and Methods for Implementing Blockchain-Based Content Engagement Platforms Utilizing Media Wallets

Номер: US20200005284A1
Автор: Vijayan Madhu
Принадлежит:

Systems and methods are described for implementing blockchain-based content engagement platforms. In several embodiments, the content engagement platform includes a registry service which enables verified content creators to mint Non-Fungible Tokens (NFTs). In many embodiments, media wallet applications enable users to securely store NFTs and/or other tokens on their devices. In a number of embodiments, the media wallet applications collect data concerning media consumed by users and aggregate the media consumption data in a permissioned analytics blockchain. The manner in which the media consumption data is stored can enable users to control permission to access their personal data. In one embodiment, a media wallet is provided that can securely store NFTs, display a user interface through which user instructions concerning data access permissions are received, and cause media consumption data to be written to at least one immutable ledger in conjunction with a set of data access permissions. 1. A user device , comprising:a processor;a network interface;memory containing a media wallet application; securely store non-fungible tokens (NFTs), where each NFT is associated with a programmatically defined smart contract written to at least one immutable ledger;', 'display a user interface through which user instructions concerning data access permissions are received; and', 'cause media consumption data to be written to the at least one immutable ledger in conjunction with a set of data access permissions determined in accordance with user instructions concerning data access permission received via the user interface., 'wherein the processor is capable of being configured by the media wallet application to2. The user device of claim 1 , wherein the at least one immutable ledger comprises:an NFT blockchain to which the smart contracts for each NFT are written; anda permissioned analytics blockchain to which media consumption data is written.3. The user device of claim 1 ...

Подробнее
02-01-2020 дата публикации

System and Method for Processing Payments in Fiat Currency Using Blockchain and Tethered Tokens

Номер: US20200005290A1
Принадлежит: Individual

A method of processing a payment including receiving a payment lookup request, identifying a user network account on a blockchain network, sending a payment authorization request to and receiving authorization from a user, transferring ownership of an in-network token responsive to the authorization, sending a debit request to a user financial account, receiving a debit response from the user financial account, sending a credit request to a receiver financial account, and receiving a credit response from the receiver financial account.

Подробнее
13-01-2022 дата публикации

Blockchain-based anonymous transfers zero-knowledge proofs

Номер: US20220014502A1
Принадлежит: Toposware Inc

Disclosed is a mechanism for performing an anonymous transfer using a blockchain. A sender's device generates a commitment based on a serial number of a zero-knowledge token and a value of the zero-knowledge token. Moreover, the sender's device generates a range proof and a balance proof for the commitment. The range proof verifies that the value of the zero-knowledge token is within a preset range. The balance proof verifies that the value of a set of input tokens is greater than or equal to the value of the zero-knowledge token. The sender's device sends a conversion request to the blockchain network. The conversion request consumes the set of input tokens and generates the zero-knowledge token. The conversion request includes the generated commitment, the generated range proof, and the generated balance proof.

Подробнее
03-01-2019 дата публикации

ACCREDITED CERTIFICATE ISSUANCE SYSTEM BASED ON BLOCK CHAIN AND ACCREDITED CERTIFICATE ISSUANCE METHOD BASED ON BLOCK CHAIN USING SAME, AND ACCREDITED CERTIFICATE AUTHENTICATION SYSTEM BASED ON BLOCK CHAIN AND ACCREDITED CERTIFICATE AUTHENTICATION METHOD BASED ON BLOCK CHAIN USING SAME

Номер: US20190005470A1
Принадлежит:

The present invention relates to an accredited certificate issuance system based on a block chain and an accredited certificate issuance method based on block chain using the same, and an accredited certificate authentication system based on a block chain and an accredited certificate authentication method based on a block chain using the same, which disenable a leak of a personal key for accredited certification by autonomously generating, storing and managing the personal key for accredited certification by means of a random number generator mounted in a terminal in which it is impossible to install a function or an additional program for physically accessing and reading the inside of a system; enable a public key for accredited certification, which requires maintenance, to be stored and managed in a block chain of electronic wallets mounted in block chain retention servers via a peer-to-peer (P2P) network-based distribution database, not in a server operated by an accredited certificate authority (CA), and thus incur almost no costs for maintenance by, if hacking occurs, preventing occurrence of costs for establishing an accredited certificate issuance system having an advanced security system interworking therewith so as to maximally prevent hacking, and costs for operating and maintaining the established accredited certificate issuance system; and can perform an accredited certification process even if ActiveX is not established. 1. A system for issuing a public certificate based on a blockchain , comprising:an information security device instructing its encryption engine to create a public key for the public certificate based on a private key for the public certificate stored and managed in a memory and transmit the created public key in response to a request for transmission of the public key, wherein the private key is acquired based on a random value generated from a random number generator and stored in the memory and then provided to a user;a user device ...

Подробнее
03-01-2019 дата публикации

TRANSACTION AUTHENTICATION USING NETWORK

Номер: US20190005494A1
Принадлежит:

Systems and method for improved consumer and portable consumer device authentication are disclosed. Such systems and methods may include using dynamic verification values, challenge questions, and consumer notification as ways to prevent fraudulent transactions from being conducted. 129.-. (canceled)30. A method comprising:receiving, by a server computer from an access device is a point of sale terminal, an authorization request message generated by the access device for a transaction between a merchant and a consumer, the authorization request message including first dynamic data generated by a portable consumer device used by the consumer after the portable consumer device interacts with the access device at the merchant, wherein the access device is a point of sale terminal, and wherein the authorization request message further includes an account number associated with the portable consumer device and a transaction amount for the transaction;authenticating, by the server computer, the portable consumer device by using the first dynamic data received in the authorization request message, wherein the first dynamic data is different for each transaction and is generated from one or more of transaction-specific data and/or consumer-specific data, wherein the portable consumer device is authenticated when the first dynamic data matches second dynamic data generated by the server computer, wherein the first dynamic data and the second dynamic data are generated from one or more of a counter, a terminal ID, a time of day, a current date, a purchase amount, and/or random numbers; and retrieving, by the server computer, a challenge message from a database, wherein the challenge message is dynamic, and wherein the challenge message is a challenge question and comprises information about a previous transaction conducted by the consumer,', 'sending, by the server computer, the challenge message to the access device, wherein the challenge message is sent based on a set of ...

Подробнее
03-01-2019 дата публикации

System and Method of Peer-to-Peer Electronic Exchange of Intellectual Property

Номер: US20190005595A1
Принадлежит: Individual

A system includes a cryptographic blockchain network (CBN) including a set of processing nodes. The processing nodes each include one or more processors configured to: receive identification information from one or more sellers associated with intellectual property (IP), receive identification information associated with the one or more sellers, verify the identification information associated with the IP and the identification information associated with the one or more sellers by referencing an intellectual property database, and convert the IP into a Smart IP Contract, wherein the Smart IP Contract performs one or more functions to carry out a sale of the IP on the CBN.

Подробнее
05-01-2017 дата публикации

System and Method to Authenticate Electronics Using Electronic-Metrics

Номер: US20170006028A1
Принадлежит:

A system for authenticating a first entity. The system comprises a storage component for storing a trained electronic-metric factor, a sensor for receiving an electronic-metric input from the first entity, an analysis component associated with a second entity for determining a first relationship between the trained electronic-metric factor and any electronic-metric input, and an authentication component for authenticating the first entity responsive to the first relationship. 1. A system for authenticating a first entity , the system comprising:a storage component for storing a trained electronic-metric factor;a sensor for receiving an electronic-metric input from the first entity;an analysis component for determining a first relationship between the trained electronic-metric factor and any electronic-metric input; andan authentication component for authenticating the first entity responsive to the first relationship.2. The system of wherein the system is disposed within a second entity and the electronic-metric is transmitted from the first entity to the second entity through a human body or a medium in close proximity to the first and second entities.3. The system of wherein a successful authentication executes an action claim 1 , controls a device claim 1 , or executes a financial transaction.4. The system of wherein the analysis component comprises a Hidden Markov Model (HMM).5. The system of wherein the electronic-metric input from the first entity comprises an emission spectrum of the first entity.6. The system of wherein the analysis component analyzes one or more of amplitude as a function of frequency and spectral content as a function of frequency in determining the first relationship.7. The system of the storage component further storing at least one of a trained biometric factor claim 1 , a trained behavioral-metric factor claim 1 , and a trained knowledge-metric factor claim 1 , the analysis component for determining a second relationship between the ...

Подробнее
05-01-2017 дата публикации

Electronic Authentication Systems

Номер: US20170006048A1
Принадлежит:

Methods and devices are provided for use in detecting relay attacks between devices in a communications network. One method includes sending first data by a first device to a second device, and receiving, by the first device, a communication from the second device where the communication comprises second data generated at the second device and a time parameter related to the generation of the second data. The method also includes measuring a total transmission time at the first device between sending the first data and receiving the communication, and determining a further time parameter related to the generation of the second data based at least in part on the measured total transmission time. The method then further includes determining the presence of a relay attack between the first and second devices in dependence on a comparison of the time parameter and the further time parameter. 1. A computer-implemented method of detecting relay attacks between first and second devices in a communications network , the method comprising:sending first data, by the first device, to the second device;receiving, by the first device, a communication from the second device, the communication comprising second data generated at the second device and a time parameter related to the generation of the second data;measuring a total transmission time at the first device between sending the first data and receiving the communication;determining a further time parameter related to the generation of the second data, based at least in part on the measured total transmission time; anddetermining the presence of a relay attack between the first and second devices in dependence on a comparison of the time parameter and the further time parameter.2. The method of claim 1 , wherein determining the presence of the relay attack includes comparing claim 1 , by the first device claim 1 , the time parameter and the further time parameter claim 1 , and determining if a difference between the time ...

Подробнее
01-01-2015 дата публикации

Secure execution and update of application module code

Номер: US20150007262A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

A dynamic root of trust can be injected in an application module on a client device using a backend server and can be continuously monitored to ensure authenticity, integrity and confidentiality at load time, run time and update time of the application module. The dynamic root of trust can be updated directly from the backend server and can be used to establish a time bound trust chain for the other software modules loaded and executed as part of the application module.

Подробнее
04-01-2018 дата публикации

TOKEN AND CRYPTOGRAM USING TRANSACTION SPECIFIC INFORMATION

Номер: US20180006821A1
Автор: KINAGI Veerish
Принадлежит:

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication device. The token and the cryptogram may be used in a transaction. 1. A method comprising:receiving access device data by a mobile communication device from an access device;generating, by the mobile communication device, a token request including the access device data and communication device data;sending, by the mobile communication device, the token request to a server computer, wherein the server computer thereafter determines a token and generates a cryptogram, the cryptogram generated using the access device data and the communication device data;receiving, by the mobile communication device, the token and the cryptogram; andproviding, by the mobile communication device, the token and the cryptogram to the access device, wherein the access device forwards the cryptogram and the token to the server computer, which verifies the cryptogram and processes the token.2. The method of , wherein the access device data comprises location information of the access device , and wherein the communication device data comprises location information of the communication device. The method of , wherein the cryptogram is generated using token specific information , the token specific information including when the token was requested.4. The method of claim 1 , wherein the access device data was present in a two-dimensional code displayed on the access device.5. The method of claim 1 , wherein the access device data comprises a resource provider ID and a transaction initiate timestamp.6. A communication device comprising;a processor, anda computer readable medium, the computer readable medium ...

Подробнее
07-01-2021 дата публикации

Techniques For Secure Channel Communications

Номер: US20210006396A1
Принадлежит:

A method for conducting a transaction is disclosed. A processor in a thin client may receive transaction data from a portable device of a first portable device type. The processor may determine that the portable device is the first portable device type. The processor may apply an encryption protocol associated with a second portable device type to the transaction data to create encrypted data. The processor may transmit the encrypted data to a remote computer, wherein the remote computer utilizes the encryption protocol to decrypt the transaction data, and thereafter process the transaction data to conduct the transaction. 1. A computer-implemented method for conducting a transaction , comprising:receiving, by a thin client from a portable device of a first portable device type, transaction data;determining, by the thin client, that the portable device is the first portable device type;applying, by the thin client, an encryption protocol associated with a second portable device type to the transaction data to create encrypted data; andtransmitting, by the thin client to a remote computer, the encrypted data, wherein the remote computer utilizes the encryption protocol to decrypt the transaction data, and thereafter processes the transaction data to conduct the transaction.2. The computer-implemented method of claim 1 , wherein the encryption protocol is applied based at least in part on determining that the portable device is the first portable device type.3. The computer-implemented method of claim 1 , wherein the transaction data is received from remote computer.4. The computer-implemented method of claim 1 , wherein the thin client is operated by a resource provider.5. The computer-implemented method of claim 1 , wherein the remote computer provides access device transaction functionality as a service.6. The computer-implemented method of claim 1 , further comprising establishing a secure channel between the thin client and the remote computer claim 1 , wherein ...

Подробнее
07-01-2021 дата публикации

Multi-address population based on single address

Номер: US20210006398A1
Автор: Bobby Christopher Lee
Принадлежит: Ballet Global Inc, Crypto Mint Inc

A physical card (in some cases without any on-board source of power or computing capabilities) is configured to maintain access information for digital bearer assets. The physical card may include disposed thereon a single address operable to receive digital bearer assets in one or more transactions on a decentralized computing platform, like a blockchain-based decentralized computing platform. Other decentralized computing platforms utilize different address generation protocols, thus preventing use of a single address on those other platforms. A set of addresses is generated, each address corresponding to a given decentralized computing platform. Each address is based on a same underlying key-pair, and a primary address is selected from the set for a given card. The remaining addresses in the set are stored, without storage of the public key or private key, and returned in a response to a request for additional addresses of the currency card.

Подробнее
07-01-2021 дата публикации

SYSTEMS AND METHODS FOR ACCESSING AND CONTROLLING MEDIA STORED REMOTELY

Номер: US20210006404A1
Принадлежит: KIK Interactive Inc.

In some embodiments, an apparatus includes a server that stores a set of media files. The server is configured to send an authentication code to a first communication device in response to a request from the first communication device to access the set of media files such that the first communication device can present the authentication code to a user. The server is configured to associate an identifier of a second communication device with the first communication device such that a user of the second communication device can authorize access to the set of media files from the first communication device by sending the authentication code to the server using the second communication device. 1. A non-transitory processor-readable medium storing code to be executed by a processor of a server , the code comprising code representing instructions to:send a signal representing an authentication code to a first communication device such that the authentication code is presented by the first communication device, the first communication device associated with a user;receive a signal representing the authentication code from a second communication device associated with the user, the authentication code not being associated with a user account; andsend a signal to cause content to be presented to the user via the first communication device in response to receiving the signal representing the authentication code from the second communication device such that the content is presented without receiving any signal from the first communication device or the second communication device containing an indication of the user account.2. The non-transitory processor-readable medium of claim 1 , the code further comprising code representing instructions to:receive a request for the data from the second communication device; andtransfer the data to the first communication device based on the association and the request for the data.3. The non-transitory processor-readable medium of claim ...

Подробнее
07-01-2021 дата публикации

METHOD FOR PROVIDING VIRTUAL ASSET SERVICE BASED ON DECENTRALIZED IDENTIFIER AND VIRTUAL ASSET SERVICE PROVIDING SERVER USING THEM

Номер: US20210006410A1
Автор: Song Joo Han, Uhr Joon Sun
Принадлежит:

A method for providing a virtual asset service based on a DID (decentralized identifier) is provided. The method includes steps of: a service providing server (a) if VADs (virtual asset addresses) are registered as a whitelist and if virtual asset transmission is requested, (a1) transmitting the virtual asset from a sender's VAD to a first VAD, (a2) if the first VAD is not registered, allowing a sender's device to request for registration of receiver's KYC, transmit or register a receiver's signature to the service providing server or in a data hub, and (3) transmit a receiver's DID to the service providing server; and (b) (i) acquiring a receiver's public key and a second VAD, or acquiring the signature from the data hub (ii) verifying the signature and the first VAD, and (iii) if the first and the second VADs are identical, registering the first VAD and transmitting the virtual asset. 1. A method for providing a virtual asset service based on a DID (decentralized identifier) , comprising steps of:(a) on condition that virtual asset addresses of users have been registered and managed as a whitelist according to authentication results of KYC (know your customer) information corresponding to the users, if a request for transmission of a virtual asset is acquired from a sender's device owned by a sender who is determined as having an intention to transmit the virtual asset, wherein the request for the transmission of the virtual asset includes a first receiver's virtual asset address corresponding to a receiver who is to receive the virtual asset, and wherein a sender's virtual asset address has already been registered in the whitelist, a virtual asset service providing server performing or supporting another device to perform (a1) a process of determining whether the first receiver's virtual asset address is registered in the whitelist, (a2) if the first receiver's virtual asset address is determined as registered in the whitelist, a process of transmitting the ...

Подробнее
04-01-2018 дата публикации

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT

Номер: US20180007018A1
Принадлежит:

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information. 113.-. (canceled)14. A method comprising:receiving, by a processing device at a digital rights management control computer, digital content from a server;generating, by the processing device, a second key configured to decrypt the received digital content from the server;determining, by the processing device, based on the decrypted digital content whether the received digital content is complete; andperforming, by the processing device, an incomplete content action if the digital content is not complete.15. The method of claim 14 , wherein the incomplete content action comprises requesting the server send the digital content.16. The method of claim 14 , wherein the incomplete content action comprises providing an error indication.17. The method of claim 14 , further comprising receiving claim 14 , at the processing device claim 14 , a first encrypted unique digital content key.18. The method of claim 14 , further comprising receiving claim 14 , at the processing device claim 14 , a second encrypted unique digital content key.19. The method of claim 18 , further comprising decrypting the second encrypted ...

Подробнее
03-01-2019 дата публикации

System and method for implementing hacker traffic barriers

Номер: US20190007398A1
Принадлежит: PayPal Inc

Aspects of the present disclosure involve a system and method for implementing hacker traffic barriers. The current disclosure presents a system and method that provides securely associates a primary trusted device with a user, authorizes web browser authentication, and provides both intrinsic and explicit checks for authorizing access to an account.

Подробнее
03-01-2019 дата публикации

User Behavior Profile in a Blockchain

Номер: US20190007424A1
Принадлежит:

A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain. 1. A computer-implementable method for generating a cyber behavior profile , comprising:monitoring electronically-observable user behavior;converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior, the electronic information representing the electronically-observable user behavior comprising respective user behavior elements;generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior;storing information relating to the user behavior profile in a behavior blockchain;determining whether a user behavior is suspectgenerating a user behavior block representing the suspect user behavior; and,appending the user behavior block to the behavior blockchain, the user behavior block comprising a known good user behavior representation when the user behavior is not suspect and a suspect user behavior representation when the user behavior is suspect.2. The method of claim 1 , wherein:the electronic information representing the user interactions comprise a user behavior element; and further comprisingstoring information relating to the user behavior element in a user behavior block of the behavior blockchain.3. The method of claim 1 , wherein:the user behavior profile is based upon at least one of an identification factor and a user behavior factor.4. The method of claim ...

Подробнее
20-01-2022 дата публикации

Decisional Architectures in Blockchain Environments

Номер: US20220020001A1
Автор: Snow Paul
Принадлежит: Inveniam Capital Partners, Inc.

Digital or “smart” contracts execute in a blockchain environment. Any entity (whether public or private) may specify a digital contract via a table identifier in a blockchain. Because there may be many digital contracts offered as virtual services, the table identifier uniquely identifies a particular decision table and/or the digital contract offered by a virtual machine, vendor or supplier. The blockchain is thus not burdened with the programming code that is required to execute the decision table and/or the digital contract. The blockchain need only include or specify the table identifier (and perhaps one or more contractual parameters), thus greatly simplifying the blockchain and reducing its size (in bytes) and processing requirements. 1. A method performed by a server outsourcing a cloud-based contractual service , the method comprising:receiving, by the server, a contract identifier specified by a blockchain associated with a digital contract;receiving, by the server, a contractual parameter specified by the blockchain associated with the digital contract;identifying, by the server, a subcontractor's Internet protocol address by querying an electronic database that associates the contract identifier specified by the blockchain to the subcontractor's Internet protocol address;identifying, by the server, a table identifier by querying the electronic database that also associates the contract identifier specified by the blockchain to the table identifier;sending, by the server, a service request specifying the table identifier to the subcontractor's Internet protocol address and requesting the cloud-based contractual service based on the contractual parameter specified by the blockchain and a decision table referenced by the table identifier; andgenerating, by the server, a data record in a blockchain data layer describing the service request sent to the subcontractor's Internet protocol address requesting the cloud-based contractual service based on the ...

Подробнее
20-01-2022 дата публикации

SYSTEMS AND METHODS FOR PERFORMING TRANSACTIONS WITH CONTACTLESS CARDS

Номер: US20220020012A1
Принадлежит:

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. 145.-. (canceled)46. A method for transmitting data by a contactless card having a processor and a memory , the memory containing a card key , the method comprising:generating a cryptogram;encrypting the cryptogram using the card key;transmitting the encrypted cryptogram; andtransmitting a tap password, wherein the tap password comprises a plurality of taps of the contactless card on a receiving device.47. The method of claim 46 , further comprising claim 46 , prior to the transmission of the tap password claim 46 , receiving a request for the tap password from an application comprising instructions for execution on the receiving device.48. The method of claim 46 , wherein the plurality of taps comprises a sequence of taps.49. The method of claim 46 , wherein the plurality of taps comprises a two short taps and one long tap.50. The method of claim 49 , wherein each of the two short taps last less than one second.51. The method of claim 49 , wherein the long tap lasts more than one second.52. The method of claim 49 , wherein the two short taps and the one long tap may occur in any order.53. The method of claim 46 , wherein the tap password specifies an order for the plurality of taps.54. A data transmission system comprising:a contactless card comprising:a processor; anda memory, the memory of the contactless card containing a card key, generate a cryptogram,', 'encrypt the cryptogram,', 'transmit the encrypted cryptogram, and', ' ...

Подробнее
20-01-2022 дата публикации

Transaction mode-based electronic contract preservation system

Номер: US20220020014A1
Автор: Bai Jie
Принадлежит:

This application discloses a transaction-based electronic contract deposit system, including an electronic contract platform and a blockchain deposit platform, the blockchain deposit platform including a plurality of deposit nodes that provide deposit services for the electronic contract platform. In this way, the following problem may be resolved: regarding an existing manner of storing an electronic contract in a centralized way, during a subsequent process of invoking electronic contract data, the stored electronic contract data becomes untrustworthy because the contract data is at a risk of being easily tampered with and forged. 1. A transaction-based electronic contract deposit system , comprising an electronic contract platform and a blockchain deposit platform , the blockchain deposit platform comprising a plurality of deposit nodes that provide deposit services for the electronic contract platform , whereinthe electronic contract platform is configured to perform:a deposit information generating step: preprocessing an electronic contract, to obtain deposit information;a data processing step: encrypting and discretizing the deposit information, to generate a corresponding data tree;a transaction constructing step: constructing a deposit transaction, wherein an initiator of the deposit transaction is a user, a receiver is the electronic contract platform, and the deposit transaction is commonly signed by a private key of the user and a private key of the electronic contract platform; anda data sending step: sending the deposit information, the data tree, and the deposit transaction to the blockchain deposit platform; andthe deposit node is configured to perform:a verifying step: verifying legitimacy, integrity, and validity of the received deposit information, data tree, and deposit transaction by using a public key of the user and a public key of the electronic contract platform;a data block generating step: generating a data block based on the deposit ...

Подробнее
20-01-2022 дата публикации

Smart Contract-Based Electronic Contract Forensics Method and System

Номер: US20220020019A1
Автор: Bai Jie
Принадлежит:

This application provides a smart contract-based electronic contract forensic method: when a user wants to perform forensic on an electronic contract in a blockchain digital deposit platform, initiating, by an existing electronic contract platform, a forensic request for the electronic contract; obtaining, by the blockchain digital deposit platform, the forensic request and querying deposit information; if a deciding result is that deposit information corresponding to the electronic contract is stored in the blockchain digital deposit platform, deciding whether there is a deposit transaction in the blockchain digital deposit platform; after the deposit transaction is queried in the blockchain digital deposit platform, initiating a forensic transaction to the smart contract in the blockchain digital deposit platform; verifying the forensic transaction, and executing the smart contract, to generate a forensic token; generating an execution result based on the forensic token; obtaining a digest of the deposit transaction based on the execution result; decrypting the digest, to obtain a storage index table; downloading transaction data of the deposit transaction according to a data index; decrypting the transaction data; and verifying validity, legitimacy, and integrity of the decrypted transaction data. 1. A smart contract-based electronic contract forensic method , comprising:initiating a forensic transaction to a blockchain digital deposit platform based on a forensic request for an electronic contract;verifying the forensic transaction, and executing a smart contract, to generate a forensic token;generating an execution result based on the forensic token;obtaining a digest of a deposit transaction based on the execution result;decrypting the digest, to generate a storage index table;downloading corresponding pieces of distributed stored data according to the storage index table, and splicing the pieces of data to obtain transaction data;decrypting the transaction ...

Подробнее
27-01-2022 дата публикации

COMPUTER IMPLEMENTED SYSTEMS AND METHODS FOR STORING, RETRIEVING AND COMMUNICATION DATA VIA A PEER-TO-PEER NETWORK

Номер: US20220027491A1
Принадлежит:

The invention provides a system for searching a blockchain (e.g. Bitcoin) for data/content stored in one or more blockchain transactions, and accessing that data/content. It may be used in conjunction with a protocol for searching the blockchain. An embodiment of the invention can be arranged to enable a user to search for, access, view, write and/or retrieve a portion of data provided in at least one blockchain transaction (Tx), and also arranged to identify the at least one transaction (Tx) based on a transaction index (TX) comprising a transaction ID and a public key associated with the transaction (Tx). The system may comprise a search facility which is either provided within the blockchain search system; or arranged to interface and/or communicate with the blockchain search system. It may also comprise at least one cryptocurrency wallet. 1. A computer-implemented system arranged to enable a user to search for , access , view , write and/or retrieve a portion of data provided in at least one blockchain transaction (Tx) , wherein:{'sub': 'index', 'the system is arranged to identify the at least one blockchain transaction (Tx) based on a transaction index (TX) comprising a transaction ID and a public key associated with the at least one blockchain transaction (Tx).'}2. A system according to claim 1 , wherein the system comprises a search facility which is:provided within the system; orarranged to interface and/or communicate with the system.3. A system according to claim 1 , and further comprising:at least one cryptocurrency wallet.4. A system according to claim 3 , wherein:the at least one cryptocurrency wallet is arranged to generate, store and/or process hierarchical deterministic keys.5. A system according to claim 3 , wherein the at least one cryptocurrency wallet is arranged to store at least one cryptographic key and/or at least one token in a Trusted Execution Environment.6. A system according to claim 1 , and further comprising:a decompression component ...

Подробнее
27-01-2022 дата публикации

Inter Wallet Transactions

Номер: US20220027895A1
Принадлежит: VISA INTERNATIONAL SERVICE ASSOCIATION

The present disclosure relates to methods and a system for performing inter wallet transactions. The present disclosure provides methods and a system for enabling inter wallet transactions. The system provides an application for enabling inter wallet transactions. A plurality of wallets is registered with the application and a plurality of users associated with one or more of the plurality of wallets is also registered with the application. An intermediate account is created in the application for each user. When a first user associated with a first wallet among the plurality of wallets initiates a transaction to be made to a second user associated with a second wallet among the plurality of wallets, the application debits an amount to the intermediate account in the application and transfers the amount to the second user associated with the second wallet. Therefore, seamless transactions can be made between any wallets registered with the system.

Подробнее
27-01-2022 дата публикации

Method, Apparatuses and System for Authorizing a Third Party

Номер: US20220027922A1
Автор: Palaksha Vijaykumar
Принадлежит:

A method for authorizing a third party includes performing, at a first entity, obtaining a biometric feature of the third party, obtaining a secret value and combining the biometric feature and the secret value so as to obtain a combined secret value. The method further includes performing, at an access controller, receiving the secret value, receiving the combined secret value and processing the combined secret value using the secret value so as to obtain a decoded biometric feature. The method further includes obtaining a biometric feature to be verified, comparing the decoded biometric feature with the biometric feature to be verified so as to obtain a comparison result, and authorizing the third party based on the comparison result. 1. A method for authorizing a third party , the method comprising: obtaining a biometric feature of the third party;', 'obtaining a secret value;', 'combining the biometric feature and the secret value so as to obtain a combined secret value;, 'performing, at a first entity receiving the secret value; and', 'receiving the combined secret value;', 'processing the combined secret value using the secret value so as to obtain a decoded biometric feature;, 'performing, at an access controller obtaining a biometric feature to be verified;', 'comparing the decoded biometric feature with the biometric feature to be verified so as to obtain a comparison result; and', 'authorizing the third party based on the comparison result., 'the method further comprising2. The method of claim 1 , wherein the comparing the decoded biometric feature with the biometric feature is executed at the access controller.3. The method of claim 1 , wherein in a case where the comparison result indicates a match between the biometric feature and the decoded biometric feature claim 1 , the third party is authorized by the access controller claim 1 , and/or wherein in a case where the comparison result indicates a mismatch between the biometric feature and the decoded ...

Подробнее
27-01-2022 дата публикации

METHOD AND APPARATUS FOR AGREEMENT OF BLOCK IN BLOCKCHAIN NETWORK

Номер: US20220027970A1
Принадлежит:

An agreement method of a block in a blockchain network by a chair node includes: receiving, from a plurality of congress nodes in a congress, information on an exceptional situation which occurred during agreement processes of a block; transmitting an empty block agreement start message including information on the exceptional situation and verification data for the exceptional situation to the plurality of congress nodes; generating a candidate empty block which does not include a transaction when receiving a delegate request message from at least two congress nodes among the plurality of congress nodes and transmitting the candidate empty block to committee nodes; and generating a final empty block when the candidate empty block is verified by the committee nodes and transmitting the final empty block to all nodes in the blockchain network is provided. 1. An agreement method of a block in a blockchain network by a chair node , the agreement method comprising:receiving, from a plurality of congress nodes in a congress, information on an exceptional situation which occurred during agreement processes of a block;transmitting an empty block agreement start message including information on the exceptional situation and verification data for the exceptional situation to the plurality of congress nodes;generating a candidate empty block which does not include a transaction when receiving a delegate request message from at least two congress nodes among the plurality of congress nodes and transmitting the candidate empty block to committee nodes; andgenerating a final empty block when the candidate empty block is verified by the committee nodes and transmitting the final empty block to all nodes in the blockchain network.2. The agreement method of claim 1 ,wherein the receiving, from a plurality of congress nodes in a congress, information on an exceptional situation which occurred during agreement processes of a block comprisesreceiving, from the congress node, ...

Подробнее
12-01-2017 дата публикации

CRYPTOGRAPHIC SECURITY FOR MOBILE PAYMENTS

Номер: US20170011394A1
Принадлежит:

A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key. 1. A method comprising:receiving a base key that is stored at a mobile device;generating a first dynamic key based on the base key;receiving first transaction data corresponding to a first transaction associated with the mobile device;updating, by a processing device of the mobile device, the first dynamic key to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction; andrequesting authentication of a second transaction associated with the mobile device based on the second dynamic key.2. The method of claim 1 , wherein the requesting of the authentication of the second transaction based on the second dynamic key comprises:generating a cryptogram based on the second dynamic key and second transaction data corresponding to the second transaction associated with the mobile device; andtransmitting the cryptogram to a payment processor for authentication of the second transaction.3. The method of claim 1 , wherein the generating of the first dynamic key based on the base key comprises:receiving an encrypted ephemeral key from a remote entity corresponding to a payment processor associated with the authentication of the second transaction; anddecrypting the encrypted ephemeral key based on the base key that is stored at the mobile device, wherein the generating of the first dynamic key is further based on the ephemeral key.4. ...

Подробнее
12-01-2017 дата публикации

Sound-Directed or Behavior-Directed Method and System for Authenticating a User and Executing a Transaction

Номер: US20170011406A1
Принадлежит:

A method for executing a transaction. A first processing device senses a sound, an action, or a behavior from a source and receives identification information from the source, which may be related to or a portion of the sound, action or behavior. The first processing device processes one or more of the sound, the action, and the behavior and the identification information to identify the transaction and to identify the source. Executing the transaction if the source is an authorized source. 1. A method for executing a transaction , comprising: receiving a first sound, a first action, or a first behavior from a source;', 'processing one or more of the first sound, the first action, and the first behavior to identify the transaction; and, 'at a first processing deviceexecuting the transaction on the first processing device or a second processing device.2. The method of wherein the first processing device comprises a computer claim 1 , a wearable claim 1 , a mobile device claim 1 , a portable device claim 1 , a smart phone claim 1 , a smart wallet claim 1 , a smart card claim 1 , a watch claim 1 , a jewelry item claim 1 , a key chain claim 1 , an accessory claim 1 , an e-book reader; a music player claim 1 , or an electronic device having computer-processing or instruction-processing capabilities.3. The method of further comprising:processing one or more of the first sound, the first action, and the first behavior to identify the source;after identifying the source, determining whether the source is authorized; andexecuting the transaction if the source is an authorized source.4. The method of wherein the step of determining whether the source is an authorized source comprises one or more of comparing the first sound to a predetermined trained sound claim 3 , comparing the first action to a predetermined trained action claim 3 , and comparing the first behavior to a predetermined behavior claim 3 , and determining the source is an authorized source responsive to the ...

Подробнее
27-01-2022 дата публикации

CONSENSUS LAYER ARCHITECTURE FOR MAINTAINING SECURITY WITH REDUCED PROCESSING POWER DEPENDENCY IN UNTRUSTED DECENTRALIZED COMPUTING PLATFORMS

Номер: US20220029811A1
Принадлежит:

Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs. 1. A non-transitory computer-readable medium storing instructions that when executed by a processor cause the processor to: [ a proof-of-space based on a prior block of the blockchain data structure; and', 'a proof-of-time based on a prior block of the blockchain data structure; and, 'verification information comprising, 'a data payload associated with the verification information via a first signature., 'store, on a memory device, a new block of a blockchain data structure resulting from consensus by a decentralized set of computing nodes, the new block comprising2. The non-transitory computer-readable medium of claim 1 , wherein the blockchain data structure is represented by a directed acyclic graph.3. The non-transitory computer-readable medium of claim 1 , wherein the verification information comprises the proof-of-space based at least in part on a prior proof-of-time of the prior block of the blockchain data structure.4. The non-transitory computer-readable medium of claim 1 , wherein the verification ...

Подробнее
27-01-2022 дата публикации

COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR STORING DATA ON A BLOCKCHAIN

Номер: US20220029817A1
Принадлежит:

A method of storing data on a blockchain, such as the Bitcoin blockchain, is disclosed. The method comprises generating a plurality of blockchain transactions, wherein a plurality of the blockchain transactions each store therein a respective part (, ) of first data to be stored on the blockchain and second data () indicating that the parts of the first data are related to each other. 1. A method of storing data on a blockchain , the method comprising generating a plurality of blockchain transactions , wherein a plurality of said blockchain transactions each store therein a respective part of first data to be stored on the blockchain and second data indicating that said parts of said first data are related to each other.2. A method according to claim 1 , wherein a respective digital signature is applied to said parts of said first data.3. A method according to claim 2 , wherein at least some of said parts of said first data are each digitally signed by means of a single private key of a public-private key pair of a cryptography system.4. A method according to claim 2 , wherein at least some of said parts of said first data are each digitally signed by means of a respective private key of a public-private key pair of a cryptography system claim 2 , and private keys of said respective public-private key pairs are related to each other.5. A method according to claim 2 , wherein at least one of said digital signature is based on a cryptography system having a public-private key pair claim 2 , wherein a private key of the public-private key pair is based on a plurality of prime numbers and a corresponding public key is based on a product of a plurality of said prime numbers.6. A method according to claim 5 , wherein at least one said digital signature is a Rabin signature.7. A method according to wherein the second data includes data relating to recombination of said first data.8. A method according to wherein the first ...

Подробнее
10-01-2019 дата публикации

Blockchain analytics

Номер: US20190012249A1
Принадлежит: Microsoft Technology Licensing LLC

A blockchain analytics system facilitates determination of parameters of blockchain objects for analytics. Examples of parameters of the blockchain object may include an identity of a participant, a role of a participant, a type of the blockchain object and the like. The system may store parameters of blockchain objects in the data repository. The system may use the determined parameters to generate a machine learning blockchain analytics model. The system may generate visualizations, detect patterns and/or for detecting anomalies based on the machine learning blockchain analytics model.

Подробнее
10-01-2019 дата публикации

SYSTEMS AND METHODS FOR PROVIDING AN ARCHITECTURE FOR AN INTERNET-BASED MARKETPLACE

Номер: US20190012660A1
Автор: Masters Robert
Принадлежит:

Systems, methods, and computer-readable storage media providing a systems architecture for creating and distributing asset-backed tokens are disclosed. In embodiments, a server receives a request that identifies a value of assets of a first entity that are offered to back a value of tokens distributed via an Internet-based market platform. The server creates an offering and establishes a smart contract corresponding to the offering, and the offering is presented, via an Internet-based market platform, to market participants who may purchase a portion of the asset-backed tokens to participate in the offering. The server creates cryptowallets for receiving payments of cryptocurrency from the market participants for purchases of the asset-backed tokens, and records information identifying quantities tokens purchased by each of the market participants. The server provides funds received from the purchases to the first entity. 1. A method for creating and distributing asset-backed tokens , the method comprising:receiving, by a server, a request from a first entity to establish an offering, wherein the request identifies assets of the first entity having a value offered to back a value of a first quantity of tokens in connection with the offering;in response to a validation of the request, executing, by the server, a smart contract corresponding to the offering, wherein the smart contract is executed on a first blockchain;creating, by the server, one or more cryptowallets corresponding to the smart contract;receiving, by the server, a plurality of participation requests, each participation request of the plurality of participation requests corresponding to a market participant of a plurality of market participants and identifying a quantity of cryptocurrency that represents a corresponding market participants participation in the offering;storing, by the server, the quantity of cryptocurrency identified in each participation request of the plurality of participation ...

Подробнее
14-01-2021 дата публикации

Service Machine

Номер: US20210012330A1
Автор: Luzio Robert
Принадлежит:

This document describes a system and method for activating a service machine. The system and method enables a previous customer of goods or services to provide evidence of a previous purchase and be granted access to use the service machine based on the previous purchase. A network based system is described where verification may be performed remotely. Stand-alone mechanisms are also presented where verification can be performed through more direct interactions with the service machine. 1. A service machine comprising:a payment interface operable to receive payment for a service;a network module operable to receive a proof of previous purchase signal;whereby said service is provided at least when said network module receives said proof of previous purchase signal.2. The service machine of claim 1 , further comprising user instructions to activate said service machine.3. The service machine of claim 1 , further comprising software to authenticate said proof of previous purchase signal.4. The service machine of claim 1 , wherein said proof of previous purchase signal is created in response to a telephone call.5. The service machine of claim 1 , wherein said proof of previous purchase signal is created in response to communication from a mobile application.6. The service machine of claim 1 , further comprising an input operable to receive an activation signal from a remote.7. The service machine of claim 1 , further comprising a keypad operable to receive a sequence of characters claim 1 , the possession of said sequence of characters suggesting a previous purchase.8. The service machine of claim 1 , further comprising an optical sensor operable to detect a pattern claim 1 , the possession of said pattern suggesting a previous purchase.9. The service machine of claim 1 , wherein said service is vehicular air and water.10. The service machine of claim 1 , wherein said service is electric vehicle charging.11. The service machine of claim 1 , further comprising a timer to ...

Подробнее
14-01-2021 дата публикации

METHODS FOR BUILDING ASSETS BLOCKCHAIN FOR ASSET BACKED DIGITIZATION AND SECURITIZATION OF REAL ESTATE PROSPECTIVE EARNINGS ASSETS

Номер: US20210012335A1
Принадлежит:

A method for using blockchain technology to ensure the authenticity of real estate prospective earnings assets includes packing the assets to form a digital asset package that meets certain conditions. The asset package, also referred to as an asset-backed security, may be exchanged based on the up-to-date condition of the asset package. The methods ensure the authenticity of transactions so that the data cannot be tampered with. The methods can open the door of financing from public offering markets to small and medium-sized enterprises and help these enterprises to use asset-backed securitization to solve their financing issues. The methods can also be used to create the assets for digitization and upload on the blockchain. Credit verification of assets may include various steps and the verification data may be stored in blocks and put on the blockchain. The methods can also support an ongoing flow of dynamic information about the asset. 1. A method for building an asset blockchain for asset backed digitization and securitization of real estate prospective earnings assets , comprising:electronically collecting data related to one or more real estate prospective earnings assets;digitizing the data;verifying the data;placing the data of the real estate prospective earnings assets onto the asset blockchain; andelectronically packaging selected ones of the real estate prospective earning assets into an asset package for issuance.2. The method of claim 1 , wherein the step of electronically collecting data related to the asset is performed by a customized computing device programmed for collection of data specific to the real estate prospective earnings asset.3. The method of claim 1 , wherein the real estate prospective earnings asset is a housing loan asset.4. The method of claim 3 , wherein the data includes one or more of lender identity claim 3 , real estate information verification claim 3 , purchase invoice verification claim 3 , insurance verification claim 3 , ...

Подробнее
14-01-2021 дата публикации

SHARED BLOCKCHAIN DATA STORAGE

Номер: US20210012336A1
Автор: Zhuo Haizhen
Принадлежит: Advanced New Technologies Co., Ltd.

A method includes sending, by a consensus node of a blockchain network, current state information and one or more transactions associated with a current block of a blockchain to one or more shared storage nodes of the blockchain network, wherein the consensus node stores block header associated with every block of the blockchain and the current state information, the one or more shared storage nodes store block body and historic state information associated with every block of the blockchain, and wherein the historic state information is stored as key-value pairs (KVPs) of a historic state tree with values being account states of accounts associated with the blockchain network and keys being hash values of the corresponding account states; verifying that the one or more transactions are stored by the one or more shared storage nodes; and receiving a notification of a transaction associated with the consensus node. 1. A computer-implemented method for communicating shared blockchain data , the method comprising:receiving, by a consensus node of a blockchain network, a request to execute a first transaction within the blockchain network;processing the first transaction within a first block of the blockchain network;storing, by the consensus node of the blockchain network, a block header and current state information associated with the first block of the blockchain network;sending, by the consensus node of the blockchain network, the current state information and the first transaction associated with the first block of the blockchain network to one or more shared storage nodes of the blockchain network, wherein the current state information and the first transaction is stored within the one or more shared storage nodes as historic state information, and wherein the historic state information is stored as key-value pairs (KVPs) of a historic state tree with values being account states of accounts associated with the blockchain network and keys being hash values of the ...

Подробнее
14-01-2021 дата публикации

BLOCKCHAIN TRANSACTION RECONCILIATION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Номер: US20210012338A1
Принадлежит: Advanced New Technologies Co., Ltd.

A blockchain transaction record that is selected from a blockchain account book associated with a blockchain and satisfies a specified condition is obtained by a blockchain member. The blockchain transaction record is compared with an off-chain transaction record maintained by the blockchain member to obtain a comparison value indicating whether the off-chain transaction record is consistent with the blockchain transaction record. If the comparison value indicates that the off-chain transaction record is inconsistent with the blockchain transaction record, the off-chain transaction record is modified based on the blockchain transaction record to make the off-chain transaction record consistent with the blockchain transaction record. 1. A computer-implemented method , comprising:obtaining, by a blockchain member, a blockchain transaction record that is selected from a blockchain account book associated with a blockchain and satisfies a specified condition;comparing, by the blockchain member, the blockchain transaction record with an off-chain transaction record maintained by the blockchain member to obtain a comparison value indicating whether the off-chain transaction record is consistent with the blockchain transaction record; and 'modifying, by the blockchain member, the off-chain transaction record based on the blockchain transaction record to make the off-chain transaction record consistent with the blockchain transaction record.', 'if the comparison value indicates that the off-chain transaction record is inconsistent with the blockchain transaction record2. The computer-implemented method of claim 1 , wherein the blockchain account book includes a plurality of blockchain transaction records that record information associated with asset transfer operations occurring on the blockchain.3. The computer-implemented method of claim 1 , wherein the blockchain includes a reconciliation service provider that provides a transaction record query service for the ...

Подробнее
14-01-2021 дата публикации

Method and device for trading on an electronic trading platform

Номер: US20210012421A1
Принадлежит: ROBERT BOSCH GMBH

A method for trading on an electronic trading platform. The method includes the following features: trade orders of subscribers of the trading platform are given, a decentralized transaction database of the trading platform is managed that includes an order book, balances of accounts of the subscribers, and a zero-knowledge proof of a present state of the transaction database. On the basis of trade orders of the subscribers, starting from the current state, the transaction database is brought into a new state by a multiparty calculation.

Подробнее
09-01-2020 дата публикации

CONTROLLING VOLATILITY VIA BLOCKCHAIN

Номер: US20200012731A1
Принадлежит:

An example operation may include one or more of receiving cryptocurrency information of a cryptocurrency mined via a blockchain, determining a volatility of the cryptocurrency based on the received cryptocurrency information, in response to the determined volatility being greater than a predetermined threshold, stopping inclusion of transaction data within data blocks for storage on the blockchain, and generating one or more transaction-free data blocks, and storing the one or more transaction-free data blocks within a hash-linked chain of transaction data blocks previously stored on the blockchain. 1. A computing system comprising:a network interface configured to receive cryptocurrency information of a cryptocurrency mined via a blockchain;a processor configured to determine a volatility of the cryptocurrency based on the received cryptocurrency information, and, when the volatility is determined to be greater than a predetermined threshold, stop inclusion of transaction data within data blocks for storage on the blockchain and generate one or more transaction-free data blocks; anda storage configured to store the one or more transaction-free data blocks within a hash-linked chain of transaction data blocks previously stored on the blockchain.2. The computing system of claim 1 , wherein each generated transaction-free data block comprises a hash of block content of a previous data block on the blockchain and an empty transaction storage area.3. The computing system of claim 1 , wherein the processor is further configured to mine for new tokens of the cryptocurrency and store mined information within a transaction-free data block from among the one or more transaction-free data blocks.4. The computing system of claim 3 , wherein the mined information comprises solution information of a computational puzzle and a block reward.5. The computing system of claim 1 , wherein the processor is configured to stop the inclusion of transaction data and the generate ...

Подробнее
09-01-2020 дата публикации

APPARATUS AND METHOD FOR PROVIDING TRANSACTION SECURITY AND/OR ACCOUNT SECURITY

Номер: US20200013046A1
Автор: Joao Raymond Anthony
Принадлежит:

An apparatus, including a database which stores information regarding accounts, and information regarding whether or not each account can be utilized to effectuate payment for a total cost of a transaction; a computer; a distributed ledger and Blockchain technology system; and a receiver. The receiver receives one or more transaction authorization requests regarding the transaction. The computer determines whether an account identified in an authorization request can be utilized to effectuate payment of the total cost. If the account is not allowed to effectuate payment for the total cost, the computer disallows the transaction if the account is presented to effectuate payment for the total cost. If the computer determines that the account is not presented to effectuate payment for the total cost, then the distributed ledger and Blockchain technology system processes each authorization request and determines if the transaction is authorized or unauthorized. 1. An apparatus , comprising:a database, wherein the database stores information regarding one or more accounts, one or more cryptocurrencies, or one or more cryptocurrency accounts, associated with an account holder, wherein the database stores information regarding whether or not each of the one or more accounts, each of the one or more cryptocurrencies, or each of the one or more cryptocurrency accounts, can be utilized to effectuate payment for a total cost of a transaction;a central processing computer;a distributed ledger and Blockchain technology system; anda receiver;wherein the receiver receives one or more transaction authorization requests regarding the transaction, and further wherein the central processing computer determines whether an account, a cryptocurrency, or a cryptocurrency account, identified in a single authorization request of the one or more authorization requests can be utilized to effectuate payment of the total cost of the transaction, wherein, if the account, the cryptocurrency, or ...

Подробнее
09-01-2020 дата публикации

BLOCKCHAIN-BASED SECURE PAYMENT SYSTEM

Номер: US20200013048A1
Автор: LOVE Dana
Принадлежит:

Methods and systems for securely conducting a transaction requiring approval via a personal device of a purchaser is provided. In some embodiments, under control of a payment application executing on the personal device of a purchaser, the method establishes secure connection to a payment terminal of a seller. The method receives via the secure connection transaction information generated by a point-of-sale system. The method prompts the purchaser to approve the transaction. Upon approval, the method sends via the secure connection with the payment terminal an indication of the approved transaction to a digital payment guardian system. Under control of the digital payment guardian system, the method adds the approved transaction to a distributed ledger upon receiving the approved transaction. The method settles the approved transaction and provides notification of the settlement to the point-of-sale system so that the point-of-sale system can close the transaction. 1. A method performed by one or more computing systems for securely conducting a transaction to help prevent fraudulent transactions , the method comprising: receiving via the secure connection transaction information generated by a point-of-sale system;', 'prompting the purchaser to approve the transaction;', 'upon approval, sending via the secure connection with the payment terminal an indication of the approved transaction to a digital payment system; and, 'under control of a payment application executing on a personal device of a purchaser, establishing a secure connection to a payment terminal of a seller;'} settling the approved transaction; and', 'providing notification of settlement to the point-of-sale system., 'under control of the digital payment system, upon receiving the approved transaction, adding the approved transaction to a distributed ledger;'}2. The method of wherein the settling of the transaction includes transferring a payment token to a purchaser wallet of the purchaser.3. The ...

Подробнее
09-01-2020 дата публикации

Coin-Basis application designed to calculate the basis of crypto currency

Номер: US20200013049A1
Принадлежит:

The coin-basis engine is used to determine crypto currency basis functions as a real time calculator and index for real-time basis determination and value tracking for any crypto currency. The coin-basis engine analyzes blockchain transactions for a heterogenous mix of blockchain based or digital crypto-currencies, market events, currency exchanges and related property/trade transactions to determine taxable basis and taxable gains of crypto currency tokens. 1 1. a first date of purchase of said crypto currency token,', '2. a first purchase amount,', '3. a first currency of purchase,', '4. a first acquisition type, and', '5. optionally, a first exchange rate of said first currency,, 'A. obtaining a first transaction information of said crypto currency token 1. a second date of purchase of said crypto currency token,', '2. a second purchase amount,', '3. a second currency of purchase,', '4. a second acquisition type, and', '5. optionally, a second exchange rate of said second currency,, 'B. obtaining a second transaction information of said crypto currency tokenC. performing a first calculation to determine a first basis cost utilizing said first transaction information,D. performing a second calculation to determine a second basis cost utilizing said second transaction information, andE. determining a final basis cost by performing a subtraction between said first basis cost and said second basis cost, and 1. obtaining a second transaction information,', '2. obtaining a second transaction information,', '3. performing said first calculation, and', '4. performing said second calculation., 'F. utilizing a coin-basis engine, gateway routers, and crypto currency token ledger in. A method to determine the basis cost of at least one crypto currency token comprising: This application claims the benefit of U.S. provisional application No. 62/645,286 filed on Mar. 20, 2018. The provisional application is incorporated by reference herein.Not applicable.Not applicable.This ...

Подробнее