SG11201908931TA - Cryptographic key management based on identity information - Google Patents
Cryptographic key management based on identity informationInfo
- Publication number
- SG11201908931TA SG11201908931TA SG11201908931TA SG11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA SG 11201908931T A SG11201908931T A SG 11201908931TA
- Authority
- SG
- Singapore
- Prior art keywords
- identity information
- international
- user
- building
- memory
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
Abstract
5 6 RESET IDENTITY CRYPTOGRAPHIC CHIP RECEIVE AUTHORIZATION KEY INPUT REQUEST ONE-TIME PRCGRAMMABLE MEMORY? CALL AUTHORIZATION KEY INPUT FUNCTION END ,-214 FIG. 2 W O 20 19/ 1203 21 (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (43) International Publication Date 27 June 2019 (27.06.2019) WIPO I PCT 11111111111110111111111111111101111101011101111111111111111111111101111111011110111111 (10) International Publication Number WO 2019/120321 A2 (51) International Patent Classification: Not classified (21) International Application Number: PCT/CN2019/080366 (22) International Filing Date: 29 March 2019 (29.03.2019) (25) Filing Language: English (26) Publication Language: English (71) Applicant: ALIBABA GROUP HOLDING LIMITED [—/CN]; Fourth Floor, One Capital Place, P.O. Box 847, George Town, Grand Cayman (KY). (72) Inventors: FENG, Zhiyuan; Alibaba Group Legal Depart- ment 5/F, Building 3, No. 969 West Wen Yi Road, Yu Hang District, Hangzhou, Zhejiang 311121 (CN). LI, Yanpeng; Alibaba Group Legal Department 5/F, Building 3, No. 969 West Wen Yi Road, Yu Hang District, Hangzhou, Zhejiang 311121 (CN). CHENG, Long; Alibaba Group Legal De- partment 5/F, Building 3, No. 969 West Wen Yi Road, Yu Hang District, Hangzhou, Zhejiang 311121 (CN). (74) Agent: BEIJING BESTIPR INTELLECTUAL PROP- ERTY LAW CORPORATION; Room 409, Tower B, Ka Wah Building, No. 9 Shangdi 3rd Street, Haidian District, Beijing 100085 (CN). (81) Designated States (unless otherwise indicated, for every kind of national protection available): AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BG, BH, BN, BR, BW, BY, BZ, CA, CH, CL, CN, CO, CR, CU, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, GB, GD, GE, GH, GM, GT, HN, HR, HU, ID, IL, IN, IR, IS, JO, JP, KE, KG, KH, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LU, LY, MA, MD, ME, MG, MK, MN, MW, MX, MY, MZ, NA, NG, NI, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SK, SL, SM, ST, SV, SY, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, US, UZ, VC, VN, ZA, ZM, ZW. (84) Designated States (unless otherwise indicated, for every kind of regional protection available): ARIPO (BW, GH, GM, KE, LR, LS, MW, MZ, NA, RW, SD, SL, ST, SZ, TZ, UG, ZM, ZW), Eurasian (AM, AZ, BY, KG, KZ, RU, TJ, TM), European (AL, AT, BE, BG, CH, CY, CZ, DE, DK, EE, ES, FI, FR, GB, GR, HR, HU, 1E, IS, IT, LT, LU, LV, MC, MK, MT, NL, NO, PL, PT, RO, RS, SE, SI, SK, SM, TR), OAPI (BF, BJ, CF, CG, CI, CM, GA, GN, GQ, GW, KM, ML, MR, NE, SN, TD, TG). (54) Title: CRYPTOGRAPHIC KEY MANAGEMENT BASED ON IDENTITY INFORMATION (57) : Disclosed herein are methods, systems, and apparatus, including com- puter programs encoded on computer storage media, for managing cryptographic keys based on user identity information. One of the methods includes receiving a request to store identity information and a user key pair to a memory on a chip, the request being digitally signed with a digital signature, the identity information uniquely identifying the user, and the user key pair being assigned to the user; determining that the digital signature is authentic based on a public key pre-stored in the memory; encrypting the identity information and the user key pair; and storing the identity information and the user key pair to the memory. [Continued on next page] WO 2019/120321 A2 I Illi I 01111I 011101011111111M0 1 0 111 0 HOIMENDIED II IMINHOHE Published: upon request of the applicant, before the expiration of the time limit referred to in Article 21(2)(a) without international search report and to be republished upon receipt of that report (Rule 48.2(g))
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2019/080366 WO2019120321A2 (en) | 2019-03-29 | 2019-03-29 | Cryptographic key management based on identity information |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| SG11201908931TA true SG11201908931TA (en) | 2019-10-30 |
Family
ID=66992479
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| SG11201908931T SG11201908931TA (en) | 2019-03-29 | 2019-03-29 | Cryptographic key management based on identity information |
Country Status (10)
| Country | Link |
|---|---|
| US (3) | US11088831B2 (en) |
| EP (1) | EP3610607B1 (en) |
| JP (1) | JP6921222B2 (en) |
| KR (1) | KR102381153B1 (en) |
| CN (2) | CN111034120B (en) |
| AU (1) | AU2019204723C1 (en) |
| CA (1) | CA3058240C (en) |
| SG (1) | SG11201908931TA (en) |
| TW (1) | TWI724683B (en) |
| WO (1) | WO2019120321A2 (en) |
Families Citing this family (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3861676B1 (en) * | 2019-10-21 | 2025-08-06 | Google LLC | Verifiable consent for privacy protection |
| CN111711521B (en) * | 2020-06-19 | 2023-05-05 | 广东小蛐科技有限公司 | Method and system for resetting private key of blockchain account |
| CN111970126A (en) * | 2020-08-31 | 2020-11-20 | 北京书生网络技术有限公司 | Key management method and device |
| WO2022086680A1 (en) * | 2020-10-23 | 2022-04-28 | Visa International Service Association | Privacy-preserving identity data exchange |
| KR20220055635A (en) | 2020-10-27 | 2022-05-04 | (주)네오와인 | Secret key management device and method using DMA channel transmission |
| CN112241523B (en) * | 2020-11-05 | 2024-08-09 | 中国航空工业集团公司西安航空计算技术研究所 | Method for authenticating startup identity of embedded computer |
| CN112508138B (en) * | 2020-11-18 | 2024-03-26 | 北京融讯科创技术有限公司 | Single board server management method, device, equipment and computer readable storage medium |
| CN112507302B (en) * | 2020-12-10 | 2024-04-19 | 支付宝(杭州)信息技术有限公司 | Calling party identity authentication method and device based on execution of cryptographic module |
| CN112822021B (en) * | 2020-12-30 | 2022-10-21 | 中国农业银行股份有限公司 | Key management method and related device |
| CN112989370B (en) * | 2021-02-09 | 2023-06-30 | 腾讯科技(深圳)有限公司 | Key filling method, system, device, equipment and storage medium |
| CN113067704B (en) * | 2021-03-29 | 2022-08-30 | 安徽慧可科技有限公司 | Data right determining method, system and equipment based on block chain |
| CN113726509B (en) * | 2021-08-30 | 2023-05-02 | 北京天融信网络安全技术有限公司 | Key destroying method, cipher machine and terminal equipment |
| CN114154443B (en) * | 2021-12-03 | 2025-07-15 | 展讯通信(上海)有限公司 | Chip authorization and verification method, device and electronic device |
| US20230379142A1 (en) * | 2022-05-17 | 2023-11-23 | Samsung Electronics Co., Ltd. | Authentication mechanism for computational storage download program |
| TWI823673B (en) * | 2022-11-11 | 2023-11-21 | 國立雲林科技大學 | A password encryption management system |
| CN116506184A (en) * | 2023-04-28 | 2023-07-28 | 中国银行股份有限公司 | Data encryption method, data verification method and related devices |
Family Cites Families (114)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE19629856A1 (en) | 1996-07-24 | 1998-01-29 | Ibm | Method and system for the secure transmission and storage of protectable information |
| JPH10247906A (en) | 1997-03-03 | 1998-09-14 | Toshiba Corp | Device with processing function, information processing system, authentication method, authentication / encryption method, and authentication / decryption method |
| JP3597704B2 (en) | 1998-06-19 | 2004-12-08 | 株式会社日立製作所 | IC card and recording medium |
| EP1175749B1 (en) * | 1999-04-22 | 2005-07-06 | Veridicom, Inc. | High security biometric authentication using a public key/private key encryption pairs |
| US8325994B2 (en) * | 1999-04-30 | 2012-12-04 | Davida George I | System and method for authenticated and privacy preserving biometric identification systems |
| JP2001319164A (en) | 2000-05-10 | 2001-11-16 | Nec Saitama Ltd | Rental system, rental method and recording medium having rental program recorded thereon |
| FR2819074B1 (en) | 2000-12-29 | 2003-02-21 | Dominique Bertrand | TERMINAL FOR DISPLAY, RETURN, INPUT AND DATA PROCESSING, CONFIGURABLE BY ITS USERS |
| JP2002271320A (en) | 2001-03-13 | 2002-09-20 | Sony Corp | Information processing equipment and method therefor and recording medium thereof |
| WO2002103496A2 (en) * | 2001-06-18 | 2002-12-27 | Daon Holdings Limited | An electronic data vault providing biometrically protected electronic signatures |
| JP4834263B2 (en) | 2001-09-28 | 2011-12-14 | シャープ株式会社 | Card authentication system, information recording card, and card authentication method |
| US7146009B2 (en) * | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
| JP4660053B2 (en) | 2002-05-20 | 2011-03-30 | ソニー株式会社 | Human feature verification device |
| EP3547599A1 (en) * | 2002-08-06 | 2019-10-02 | Apple Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
| JP2004104539A (en) | 2002-09-11 | 2004-04-02 | Renesas Technology Corp | Memory card |
| US20050027991A1 (en) | 2003-06-23 | 2005-02-03 | Difonzo Joseph | System and method for digital rights management |
| CN100363855C (en) | 2003-07-04 | 2008-01-23 | 诺基亚有限公司 | Key storage management method, device and system |
| US20060149962A1 (en) | 2003-07-11 | 2006-07-06 | Ingrian Networks, Inc. | Network attached encryption |
| US8842887B2 (en) | 2004-06-14 | 2014-09-23 | Rodney Beatson | Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device |
| JP4423478B2 (en) | 2004-09-07 | 2010-03-03 | 株式会社国際電気通信基礎技術研究所 | Vibration presentation device |
| JP2006079181A (en) | 2004-09-07 | 2006-03-23 | Sony Corp | Organism collation device |
| US20060059372A1 (en) | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardware |
| JP4516399B2 (en) | 2004-10-08 | 2010-08-04 | フェリカネットワークス株式会社 | Information processing apparatus and method, and program |
| JP4326443B2 (en) | 2004-10-08 | 2009-09-09 | フェリカネットワークス株式会社 | Information processing apparatus, information processing method, and program |
| CN102609640B (en) | 2004-10-25 | 2015-07-15 | 安全第一公司 | Secure data parser method and system |
| JP2006221566A (en) | 2005-02-14 | 2006-08-24 | Dainippon Printing Co Ltd | Nursing care service support system using network |
| GB2424557A (en) | 2005-03-24 | 2006-09-27 | Sony Uk Ltd | FPGA with hardware decryptor for configuration programme which adds second key to itself before re-encrypting and overwriting itself in memory when run |
| US8972743B2 (en) | 2005-05-16 | 2015-03-03 | Hewlett-Packard Development Company, L.P. | Computer security system and method |
| JP4936238B2 (en) | 2005-06-13 | 2012-05-23 | 株式会社トプスシステムズ | Security management device |
| JP2007018301A (en) | 2005-07-08 | 2007-01-25 | Matsushita Electric Ind Co Ltd | Usage condition processing device |
| US8615663B2 (en) | 2006-04-17 | 2013-12-24 | Broadcom Corporation | System and method for secure remote biometric authentication |
| GB2438452B (en) * | 2006-05-24 | 2010-12-15 | Nokia Corp | Portable telecommunications apparatus |
| WO2008035413A1 (en) * | 2006-09-20 | 2008-03-27 | Fujitsu Limited | Information processor and information management method |
| JP4301275B2 (en) * | 2006-09-28 | 2009-07-22 | ソニー株式会社 | Electronic device and information processing method |
| US7747024B2 (en) | 2007-02-09 | 2010-06-29 | Lenovo (Singapore) Pte. Ltd. | System and method for generalized authentication |
| GB2452732A (en) | 2007-09-12 | 2009-03-18 | Seiko Epson Corp | Smart-card chip with organic conductive surface layer for detecting invasive attack |
| CN101436247B (en) | 2007-11-12 | 2012-04-11 | 中国长城计算机深圳股份有限公司 | Biological personal identification method and system based on UEFI |
| CN201126581Y (en) | 2007-11-12 | 2008-10-01 | 中国长城计算机深圳股份有限公司 | Biological personal identification apparatus based on UEFI |
| AU2009204512B2 (en) | 2008-01-07 | 2014-06-12 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
| US8438385B2 (en) | 2008-03-13 | 2013-05-07 | Fujitsu Limited | Method and apparatus for identity verification |
| WO2009139779A1 (en) | 2008-05-16 | 2009-11-19 | Hewlett-Packard Development Company, L.P. | System and method for providing a system management command |
| DE102008055076A1 (en) | 2008-12-22 | 2010-07-01 | Robert Bosch Gmbh | Device and method for protecting data, computer program, computer program product |
| WO2010132928A1 (en) * | 2009-05-18 | 2010-11-25 | Mikoh Corporation | Biometric identification method |
| EP2323308B1 (en) | 2009-11-12 | 2016-03-23 | Morpho Cards GmbH | A method of assigning a secret to a security token, a method of operating a security token, storage medium and security token |
| WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
| US9037852B2 (en) | 2011-09-02 | 2015-05-19 | Ivsc Ip Llc | System and method for independent control of for-hire vehicles |
| WO2013062528A1 (en) | 2011-10-25 | 2013-05-02 | Hewlett-Packard Development Company, L.P. | Verification record for a replaceable supply |
| CN103138927B (en) | 2011-12-01 | 2015-12-16 | 航天信息股份有限公司 | A kind of for key controlling method in the encrypted memory device of finger print identifying |
| GB2497553B (en) | 2011-12-13 | 2018-05-16 | Irisguard Inc | Improvements relating to iris cameras |
| TW201328280A (en) * | 2011-12-29 | 2013-07-01 | Chunghwa Telecom Co Ltd | Instant communication identity authentication system and method |
| WO2013134832A1 (en) | 2012-03-15 | 2013-09-19 | Mikoh Corporation | A biometric authentication system |
| CN102594843A (en) * | 2012-03-22 | 2012-07-18 | 中国农业银行股份有限公司 | Identity authentication system and method |
| US9135496B2 (en) | 2012-05-18 | 2015-09-15 | Apple Inc. | Efficient texture comparison |
| US9590959B2 (en) | 2013-02-12 | 2017-03-07 | Amazon Technologies, Inc. | Data security service |
| US20140025581A1 (en) * | 2012-07-19 | 2014-01-23 | Bank Of America Corporation | Mobile transactions using authorized tokens |
| US8832465B2 (en) | 2012-09-25 | 2014-09-09 | Apple Inc. | Security enclave processor for a system on a chip |
| US8775757B2 (en) | 2012-09-25 | 2014-07-08 | Apple Inc. | Trust zone support in system on a chip having security enclave processor |
| EP2720167A1 (en) | 2012-10-11 | 2014-04-16 | Nagravision S.A. | Method and system for smart card chip personalization |
| US10635692B2 (en) | 2012-10-30 | 2020-04-28 | Ubiq Security, Inc. | Systems and methods for tracking, reporting, submitting and completing information forms and reports |
| ES2625254T3 (en) | 2012-11-02 | 2017-07-19 | Morpho Cards Gmbh | Card with telecommunications chip |
| US20140237256A1 (en) | 2013-02-17 | 2014-08-21 | Mourad Ben Ayed | Method for securing data using a disposable private key |
| US10304044B2 (en) * | 2013-06-05 | 2019-05-28 | American Express Travel Related Services Company, Inc. | Multi-factor mobile user authentication |
| JP6182371B2 (en) | 2013-06-28 | 2017-08-16 | ルネサスエレクトロニクス株式会社 | System including semiconductor integrated circuit |
| US9646150B2 (en) | 2013-10-01 | 2017-05-09 | Kalman Csaba Toth | Electronic identity and credentialing system |
| US10127378B2 (en) | 2014-10-01 | 2018-11-13 | Kalman Csaba Toth | Systems and methods for registering and acquiring E-credentials using proof-of-existence and digital seals |
| CN104580107B (en) | 2013-10-24 | 2018-02-06 | 华为技术有限公司 | malicious attack detection method and controller |
| US9213818B2 (en) | 2014-02-24 | 2015-12-15 | Partnet, Inc. | Anonymous authentication using backup biometric information |
| EP3127273B1 (en) | 2014-03-31 | 2020-10-14 | Irdeto B.V. | Cryptographic chip and related methods |
| CN105471575B (en) | 2014-09-05 | 2020-11-03 | 创新先进技术有限公司 | Information encryption and decryption method and device |
| CN104239815A (en) | 2014-09-19 | 2014-12-24 | 西安凯虹电子科技有限公司 | Electronic document encryption and decryption method and method based on iris identification |
| US9953151B2 (en) | 2015-02-03 | 2018-04-24 | Chon Hock LEOW | System and method identifying a user to an associated device |
| AU2016235539B2 (en) | 2015-03-20 | 2019-01-24 | Rivetz Corp. | Automated attestation of device integrity using the block chain |
| US9875370B2 (en) | 2015-03-26 | 2018-01-23 | Microsoft Technology Licensing, Llc | Database server and client for query processing on encrypted data |
| US10592673B2 (en) | 2015-05-03 | 2020-03-17 | Arm Limited | System, device, and method of managing trustworthiness of electronic devices |
| CN106301767B (en) | 2015-05-13 | 2020-01-03 | 中兴通讯股份有限公司 | Encrypted call processing method, device, terminal and KMC |
| US10198182B2 (en) | 2015-05-31 | 2019-02-05 | Apple Inc. | Synchronization and verification groups among related devices |
| US20160359633A1 (en) * | 2015-06-02 | 2016-12-08 | Crater Dog Technologies, LLC | System and method for publicly certifying data |
| US10079677B2 (en) | 2015-06-05 | 2018-09-18 | Apple Inc. | Secure circuit for encryption key generation |
| US10079880B2 (en) | 2015-06-07 | 2018-09-18 | Apple Inc. | Automatic identification of invalid participants in a secure synchronization system |
| WO2016201352A1 (en) | 2015-06-10 | 2016-12-15 | Arris Enterprises Llc | Code signing system with machine to machine interaction |
| US9942035B2 (en) | 2015-08-18 | 2018-04-10 | Intel Corporation | Platform migration of secure enclaves |
| CN106487511B (en) | 2015-08-27 | 2020-02-04 | 阿里巴巴集团控股有限公司 | Identity authentication method and device |
| US10536271B1 (en) | 2016-01-10 | 2020-01-14 | Apple Inc. | Silicon key attestation |
| CN106027475B (en) * | 2016-01-21 | 2019-06-28 | 李明 | The transmission method and system of a kind of key acquisition method, ID card information |
| US11734678B2 (en) * | 2016-01-25 | 2023-08-22 | Apple Inc. | Document importation into secure element |
| JP2017183930A (en) | 2016-03-29 | 2017-10-05 | 日本電気株式会社 | Server management system, server device, server management method, and program |
| CN105959287A (en) | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | Biological feature based safety certification method and device |
| CN105975839B (en) | 2016-06-12 | 2019-07-05 | 北京集创北方科技股份有限公司 | A kind of biometric devices and method and biometric templates register method |
| US11593797B2 (en) | 2016-06-12 | 2023-02-28 | Apple Inc. | Authentication using a secure circuit |
| US10268844B2 (en) | 2016-08-08 | 2019-04-23 | Data I/O Corporation | Embedding foundational root of trust using security algorithms |
| US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
| CN106790183A (en) | 2016-12-30 | 2017-05-31 | 广州华多网络科技有限公司 | Logging on authentication method of calibration, device |
| CN108345785B (en) | 2017-01-25 | 2021-05-11 | 杨建纲 | Built-in smart security mobile device |
| KR101937216B1 (en) * | 2017-02-01 | 2019-01-11 | 주식회사 데일리인텔리전스 | Apparatus and method for managing certificates using a block chain as a certificate authority |
| CN108418677B (en) | 2017-02-09 | 2021-01-15 | 杭州海康威视数字技术股份有限公司 | Key backup and recovery method and device |
| CN108632021A (en) | 2017-03-15 | 2018-10-09 | 阿里巴巴集团控股有限公司 | A kind of key encryption method, device and system |
| CN108667608B (en) | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | Method, device and system for protecting data key |
| US10541818B2 (en) | 2017-04-19 | 2020-01-21 | International Business Machines Corporation | Decentralized biometric signing of digital contracts |
| CN108881000A (en) | 2017-05-08 | 2018-11-23 | 国民技术股份有限公司 | Gateway, third-party platform, payment system and method |
| CN107241317B (en) | 2017-05-24 | 2021-01-15 | 国民认证科技(北京)有限公司 | Method for identifying identity by biological characteristics, user terminal equipment and identity authentication server |
| CN107169762B (en) | 2017-05-24 | 2020-02-07 | 中国银联股份有限公司 | Configuration method and device of security carrier |
| CN109150535A (en) | 2017-06-19 | 2019-01-04 | 中国移动通信集团公司 | A kind of identity identifying method, equipment, computer readable storage medium and device |
| WO2018236420A1 (en) | 2017-06-20 | 2018-12-27 | Google Llc | CLOUD EQUIPMENT SECURITY MODULES FOR CRYPTOGRAPHIC EXTERNALIZATION OPERATIONS |
| US11922363B2 (en) * | 2017-07-05 | 2024-03-05 | United Parcel Service Of America, Inc. | Counterparty physical proximity verification for digital asset transfers |
| US10819528B2 (en) | 2017-07-18 | 2020-10-27 | Square, Inc. | Device security with physically unclonable functions |
| US10438190B2 (en) | 2017-07-18 | 2019-10-08 | Square, Inc. | Devices with on-board physically unclonable functions |
| US10263793B2 (en) | 2017-07-18 | 2019-04-16 | Square, Inc. | Devices with modifiable physically unclonable functions |
| CN109525392B (en) | 2017-09-20 | 2021-11-26 | 上海方付通商务服务有限公司 | eID film sticking card, mobile terminal equipment and eID authentication system |
| US10509940B2 (en) | 2017-09-28 | 2019-12-17 | Apple Inc. | Electronic device including sequential operation of light source subsets while acquiring biometric image data and related methods |
| US10833877B2 (en) | 2017-10-12 | 2020-11-10 | Canon Kabushiki Kaisha | Method of authenticating authentication-target apparatus by authentication apparatus, authentication apparatus, authentication- target apparatus, and image forming apparatus |
| CN108540457B (en) | 2018-03-20 | 2021-09-17 | 深圳市文鼎创数据科技有限公司 | Safety equipment and biological authentication control method and device thereof |
| US11641278B2 (en) | 2018-03-27 | 2023-05-02 | Workday, Inc. | Digital credential authentication |
| US11700117B2 (en) | 2018-03-27 | 2023-07-11 | Workday, Inc. | System for credential storage and verification |
| CN110677250B (en) | 2018-07-02 | 2022-09-02 | 阿里巴巴集团控股有限公司 | Key and certificate distribution method, identity information processing method, device and medium |
| CN108900296B (en) * | 2018-07-04 | 2021-11-09 | 昆明我行科技有限公司 | Secret key storage method based on biological feature identification |
-
2019
- 2019-03-29 SG SG11201908931T patent/SG11201908931TA/en unknown
- 2019-03-29 CA CA3058240A patent/CA3058240C/en active Active
- 2019-03-29 JP JP2019553386A patent/JP6921222B2/en active Active
- 2019-03-29 KR KR1020197028380A patent/KR102381153B1/en active Active
- 2019-03-29 CN CN201980001319.7A patent/CN111034120B/en active Active
- 2019-03-29 CN CN202210303686.6A patent/CN114553439B/en active Active
- 2019-03-29 EP EP19732221.7A patent/EP3610607B1/en active Active
- 2019-03-29 AU AU2019204723A patent/AU2019204723C1/en active Active
- 2019-03-29 WO PCT/CN2019/080366 patent/WO2019120321A2/en not_active Ceased
- 2019-09-30 US US16/588,106 patent/US11088831B2/en active Active
- 2019-12-11 TW TW108145295A patent/TWI724683B/en active
-
2020
- 2020-07-31 US US16/945,341 patent/US11063749B2/en active Active
-
2021
- 2021-06-15 US US17/348,413 patent/US11258591B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| TWI724683B (en) | 2021-04-11 |
| CA3058240A1 (en) | 2019-06-27 |
| CN111034120B (en) | 2022-03-11 |
| AU2019204723A1 (en) | 2019-06-27 |
| KR20200116009A (en) | 2020-10-08 |
| CN114553439A (en) | 2022-05-27 |
| AU2019204723B2 (en) | 2021-05-06 |
| AU2019204723C1 (en) | 2021-10-28 |
| EP3610607A2 (en) | 2020-02-19 |
| US20210314150A1 (en) | 2021-10-07 |
| CA3058240C (en) | 2021-12-07 |
| US11063749B2 (en) | 2021-07-13 |
| US11088831B2 (en) | 2021-08-10 |
| US11258591B2 (en) | 2022-02-22 |
| JP2020528675A (en) | 2020-09-24 |
| US20200366472A1 (en) | 2020-11-19 |
| CN114553439B (en) | 2023-06-30 |
| US20200313875A1 (en) | 2020-10-01 |
| JP6921222B2 (en) | 2021-08-18 |
| KR102381153B1 (en) | 2022-03-30 |
| EP3610607A4 (en) | 2020-10-07 |
| CN111034120A (en) | 2020-04-17 |
| WO2019120321A2 (en) | 2019-06-27 |
| EP3610607B1 (en) | 2021-08-25 |
| WO2019120321A3 (en) | 2020-01-30 |
| TW202036337A (en) | 2020-10-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| SG11201908931TA (en) | Cryptographic key management based on identity information | |
| SG11201908982QA (en) | Managing sensitive data elements in a blockchain network | |
| SG11201909948WA (en) | Product promotion using smart contracts in blockchain networks | |
| SG11201909630TA (en) | Anti-replay attack authentication protocol | |
| SG11201908946PA (en) | Program execution and data proof scheme using multiple key pair signatures | |
| SG11201908651SA (en) | Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain | |
| SG11201906830XA (en) | Verifying integrity of data stored in a consortium blockchain using a public sidechain | |
| SG11201908981SA (en) | Retrieving public data for blockchain networks using highly available trusted execution environments | |
| SG11201909855YA (en) | Distributed key management for trusted execution environments | |
| SG11201909861UA (en) | Transferring digital tickets based on blockchain networks | |
| SG11201908794UA (en) | Property management system utilizing a blockchain network | |
| SG11201909013RA (en) | Authentication based on a recoverd public key | |
| SG11201908552RA (en) | Methods and devices for testing signature verification for blockchain system | |
| SG11201902778UA (en) | System and method for information protection | |
| SG11201908983WA (en) | Retrieving access data for blockchain networks using highly available trusted execution environments | |
| SG11201909014QA (en) | Preventing misrepresentation of input data by participants in a secure multi-party computation | |
| SG11201908554PA (en) | Methods and devices for acquiring and recording tracking information on blockchain | |
| SG11201908942VA (en) | Securely performing cryptographic operations | |
| SG11201908387SA (en) | Consensus system downtime recovery | |
| SG11201903562QA (en) | Recovering encrypted transaction information in blockchain confidential transactions | |
| SG11201908853YA (en) | System and method for ending view change protocol | |
| SG11201909091TA (en) | Data isolation in blockchain networks | |
| SG11201903553VA (en) | Blockchain data protection using homomorphic encryption | |
| SG11201903566XA (en) | Regulating blockchain confidential transactions | |
| SG11201910095VA (en) | Cross-asset trading within blockchain networks |