JP7426475B2 - 分散化されたデータ認証 - Google Patents
分散化されたデータ認証 Download PDFInfo
- Publication number
- JP7426475B2 JP7426475B2 JP2022508466A JP2022508466A JP7426475B2 JP 7426475 B2 JP7426475 B2 JP 7426475B2 JP 2022508466 A JP2022508466 A JP 2022508466A JP 2022508466 A JP2022508466 A JP 2022508466A JP 7426475 B2 JP7426475 B2 JP 7426475B2
- Authority
- JP
- Japan
- Prior art keywords
- data item
- key
- authentication
- request
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 37
- 230000004044 response Effects 0.000 claims description 30
- 238000010200 validation analysis Methods 0.000 claims description 30
- 238000012795 verification Methods 0.000 claims description 26
- 238000012790 confirmation Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 32
- 238000013459 approach Methods 0.000 description 9
- 230000008569 process Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 235000014510 cooky Nutrition 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 3
- 238000009877 rendering Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Description
本願は、2019年8月29日に出願され、「分散化されたデータ認証」と題された米国特許出願第16/555,638号の優先権及び利益を主張する。
Claims (13)
- プロセッサ及びメモリを含むコンピューティングデバイスと、
前記メモリに記憶された機械可読命令と、を含み、前記機械可読命令は、前記プロセッサによって実行されると、前記コンピューティングデバイスに少なくとも、
データ項目のIDキーを生成することと、
前記データ項目の認証の要求を、セキュリティ又は信頼性を評価するために実行されるセキュリティサービスに送信することであって、前記要求は、前記IDキー及び前記データ項目を含む、ことと、
前記セキュリティサービスから前記データ項目が確認されたことを示す単数又は複数のアサーションを含む確認済みクレームを受信することと、
身分証明書を生成することであって、前記身分証明書は、前記データ項目の前記IDキー及び前記確認済みクレームを含み、前記IDキーは前記身分証明書に関連づけられた個人又はエンティティを一意に識別することと、
前記身分証明書を分散型台帳に保管することと、を行わせる、システム。 - 前記機械可読命令は、前記コンピューティングデバイスによって実行されると、更に、
前記コンピューティングデバイスに少なくとも、
前記データ項目の要求を受信することと、
前記要求への応答を送信することであって、前記応答は前記データ項目及び前記IDキーを含む、ことと、
を行わせる、請求項1に記載のシステム。 - 前記IDキーは第2のIDキーであり、
前記身分証明書は第2の身分証明書であり、
前記データ項目の認証の前記要求は、認証の第2の要求であり、
前記機械可読命令は、更に、前記コンピューティングデバイスに少なくとも、
前記機械可読命令のオペレータの前記IDの認証の要求を認証サービスに送信することと、
前記認証サービスから第1のIDキー及び確認済みクレームを受信することと、
第1の身分証明書を作成することであって、前記第1の身分証明書は、前記第1のIDキー及び前記確認済みクレームを含む、ことと、
前記第1の身分証明書を分散型台帳に記憶することと、を行わせ、
前記データ項目の認証の前記第2の要求は、前記第1の身分証明書が前記分散型台帳に記憶されるのに続いて送信される、請求項1又は2に記載のシステム。 - 前記機械可読命令は、前記プロセッサによって実行されると、更に、前記コンピューティングデバイスに少なくとも、
前記データ項目に一意に関連付けられた非対称キー対を生成することを行わせ、
前記身分証明書は、前記非対称キー対の公開キーを更に含む、請求項1乃至3のいずれか1項に記載のシステム。 - 前記機械可読命令は、前記プロセッサによって実行されると、更に、前記コンピューティングデバイスに少なくとも、
前記公開キーで暗号化された暗号化トークンを含む確認要求を受信することと、
暗号化されていないトークンを生成するために、前記非対称キー対の秘密キーを使用して前記暗号化されたトークンを復号化することと、
前記秘密キーを使用して、前記暗号化されていないトークンの暗号化署名を作成することと、
前記暗号化されていないトークン及び前記暗号化署名を含む確認応答を提供することと、を行わせる、請求項4に記載のシステム。 - 前記データ項目がネットワークアドレスである、請求項1乃至5のいずれか1項に記載のシステム。
- 前記データ項目がファイルである、請求項1乃至5のいずれか1項に記載のシステム。
- コンピュータにより行われる、
データ項目の認証要求を受信することであって、前記認証要求は、IDキー及び前記データ項目を含む、ことと、
前記データ項目が少なくとも一つの確認規則に準拠していることを決定する、前記確認規則は、データ項目が安全であるというアサーションを行うための要件を含み、前記データ項目が前記要件を満たすか否かにより前記決定をすることと、
前記データ項目の確認済みクレームを生成することであって、前記確認済みクレームは、前記IDキーが前記データ項目に関連付けられており、前記データ項目が前記少なくとも一つの確認規則に準拠していることを示す、ことと、
前記データ項目の認証の前記要求への応答として前記確認済みクレームを提供することと、
前記IDキー及び前記確認済みクレームを含む身分証明書を作成することと、
前記身分証明書を分散型台帳に登録することと、を含む、方法。 - 前記IDキーは第2のIDキーであり、
前記少なくとも一つの確認規則は、前記データ項目が認証されたエンティティから発信されていることを示し、
前記認証要求は、前記認証されたエンティティに関連付けられた第1のIDキーを更に含み、
前記データ項目が前記少なくとも一つの確認規則に準拠していることを決定することは、前記認証要求が前記認証されたエンティティから発信されていることを、少なくとも部分的に前記第1のIDキーに基づいて確認することを更に含み、
前記確認済みクレームの生成は、前記認証要求が前記認証済みエンティティから発信されているとの確認に応答して発生する、請求項8に記載の方法。 - 少なくとも部分的に前記第1のIDキーに基づいて、前記認証要求が前記認証されたエンティティから発信されていることを確認することは、
前記第1のIDキーに関連付けられた身分証明書を取得することであって、前記身分証明書には、それぞれの非対称キー対の公開暗号化キーが含まれている、ことと、
暗号化されたトークンを作成するために、前記公開暗号化キーを使用してトークンを暗号化することと、
前記認証要求を送信した発信元エンティティに前記暗号化されたトークンを送信することと、
前記それぞれの非対称キー対の秘密キーで作成された前記トークン及びデジタル署名を受信することと、
前記公開暗号化キーを使用して前記デジタル署名を確認することと、を更に含む、請求項9に記載の方法。 - 前記少なくとも一つの確認規則は、前記データ項目が指定されたセキュリティポリシーに準拠していることを示し、
前記データ項目が前記少なくとも一つの確認規則に準拠していることを決定することは、前記データ項目のセキュリティ分析を実行することを更に含む、請求項8乃至10のいずれか1項に記載の方法。 - 前記データ項目がネットワークアドレスである、請求項8乃至11のいずれか1項に記載の方法。
- 前記データ項目がファイルである、請求項8乃至11のいずれか1項に記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/555,638 | 2019-08-29 | ||
US16/555,638 US11165579B2 (en) | 2019-08-29 | 2019-08-29 | Decentralized data authentication |
PCT/US2020/046652 WO2021041075A1 (en) | 2019-08-29 | 2020-08-17 | Decentralized data authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2022545627A JP2022545627A (ja) | 2022-10-28 |
JP7426475B2 true JP7426475B2 (ja) | 2024-02-01 |
Family
ID=74680496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2022508466A Active JP7426475B2 (ja) | 2019-08-29 | 2020-08-17 | 分散化されたデータ認証 |
Country Status (6)
Country | Link |
---|---|
US (3) | US11165579B2 (ja) |
EP (1) | EP4022473A4 (ja) |
JP (1) | JP7426475B2 (ja) |
KR (1) | KR20220067536A (ja) |
CN (1) | CN114586315A (ja) |
WO (1) | WO2021041075A1 (ja) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3903518A1 (en) * | 2018-12-28 | 2021-11-03 | Apple Inc. | Providing verified claims of user identity |
US11165579B2 (en) * | 2019-08-29 | 2021-11-02 | American Express Travel Related Services Company, Inc. | Decentralized data authentication |
US11522858B2 (en) * | 2019-09-13 | 2022-12-06 | Microsoft Technology Licensing, Llc | Event based transfer of did delegated authority |
US11640475B1 (en) * | 2019-11-26 | 2023-05-02 | Gobeep, Inc. | Systems and processes for providing secure client controlled and managed exchange of data between parties |
US20210314293A1 (en) * | 2020-04-02 | 2021-10-07 | Hewlett Packard Enterprise Development Lp | Method and system for using tunnel extensible authentication protocol (teap) for self-sovereign identity based authentication |
IL274840B2 (en) * | 2020-05-21 | 2024-07-01 | Google Llc | Device and application integrity verification |
US11218481B2 (en) * | 2020-06-04 | 2022-01-04 | Verizon Patent And Licensing Inc. | Personal identity system |
KR102470713B1 (ko) | 2021-04-29 | 2022-11-25 | (주)소프트제국 | 블록체인 did 기반 증명서 유통 서비스 제공 방법 및 장치 |
US11714894B2 (en) * | 2021-12-10 | 2023-08-01 | Fmr Llc | Authenticating client applications using an identity fabric blockchain |
US11411954B1 (en) * | 2021-12-27 | 2022-08-09 | Coretech LT, UAB | Access control policy for proxy services |
US20230237245A1 (en) * | 2022-01-21 | 2023-07-27 | Docusign, Inc. | Identification of document access by a message scanning system |
WO2023218488A1 (en) * | 2022-05-12 | 2023-11-16 | Rimon Technology, Inc | Revocable personal linked data (r_pld): encryption protocol for shared consensus over attributes and keys in lattice-based encryption, supporting direct and indirect revocation and delegated roles |
KR20240014317A (ko) * | 2022-07-25 | 2024-02-01 | 주식회사 아이비씨티 | 개인서명 데이터에 대한 nft 발행을 통한 개인서명의 소유권 증명 시스템 |
US20240086917A1 (en) * | 2022-09-12 | 2024-03-14 | Discover Financial Services | Fraud mitigation using pre-authorization authentication and verification |
CN115694842B (zh) * | 2022-11-09 | 2024-02-20 | 中煤科工集团信息技术有限公司 | 工业互联网设备互信及数据交换方法、装置及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005190452A (ja) | 2003-12-01 | 2005-07-14 | Ihc:Kk | 認証システム |
CN107958371A (zh) | 2017-11-13 | 2018-04-24 | 深圳超级区块链信息技术有限公司 | 一种分布式区块链身份证 |
US10298396B1 (en) | 2015-11-10 | 2019-05-21 | Wells Fargo Bank, N.A. | Identity management service via virtual passport |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8060916B2 (en) * | 2006-11-06 | 2011-11-15 | Symantec Corporation | System and method for website authentication using a shared secret |
US8356333B2 (en) * | 2006-12-12 | 2013-01-15 | Bespoke Innovations Sarl | System and method for verifying networked sites |
CN104767740A (zh) * | 2009-09-14 | 2015-07-08 | 交互数字专利控股公司 | 用于来自用户平台的可信认证和接入的方法 |
US8090853B2 (en) * | 2009-12-01 | 2012-01-03 | International Business Machines Corporation | Data access control |
KR101115511B1 (ko) | 2010-05-04 | 2012-02-27 | 에스케이씨앤씨 주식회사 | 스마트 카드 웹서버를 이용한 인증 시스템 및 방법 |
CN102143134B (zh) * | 2010-08-05 | 2014-04-30 | 华为技术有限公司 | 分布式身份认证方法、装置与*** |
US9094388B2 (en) * | 2013-05-01 | 2015-07-28 | Dmitri Tkachev | Methods and systems for identifying, verifying, and authenticating an identity |
EP3285248B1 (en) * | 2016-08-16 | 2019-07-03 | Alcatel Lucent | Blockchain-based security threat detection method and system |
US11431509B2 (en) * | 2016-09-13 | 2022-08-30 | Queralt, Inc. | Bridging digital identity validation and verification with the FIDO authentication framework |
CA3014385A1 (en) | 2017-08-16 | 2019-02-16 | Royal Bank Of Canada | Platform for generating authenticated data objects |
US11055419B2 (en) * | 2017-12-01 | 2021-07-06 | Alan Health and Science | Decentralized data authentication system for creation of integrated lifetime health records |
CN108111528A (zh) * | 2017-12-29 | 2018-06-01 | 中链科技有限公司 | 一种基于区块链的防钓鱼方法及*** |
WO2019135745A1 (en) * | 2018-01-03 | 2019-07-11 | Baidu Usa Llc | Data authentication method, apparatus, and system |
US11641278B2 (en) * | 2018-03-27 | 2023-05-02 | Workday, Inc. | Digital credential authentication |
US20190306159A1 (en) * | 2018-03-27 | 2019-10-03 | Ca, Inc. | Time-based one-time password for device identification across different applications |
US11770261B2 (en) * | 2018-03-27 | 2023-09-26 | Workday, Inc. | Digital credentials for user device authentication |
US11522713B2 (en) * | 2018-03-27 | 2022-12-06 | Workday, Inc. | Digital credentials for secondary factor authentication |
US11792180B2 (en) * | 2018-03-27 | 2023-10-17 | Workday, Inc. | Digital credentials for visitor network access |
US11698979B2 (en) * | 2018-03-27 | 2023-07-11 | Workday, Inc. | Digital credentials for access to sensitive data |
CN110149322A (zh) * | 2019-05-06 | 2019-08-20 | 山东公链信息科技有限公司 | 一种不可逆的动态失效重验重建的区块链加密方法 |
US11165579B2 (en) * | 2019-08-29 | 2021-11-02 | American Express Travel Related Services Company, Inc. | Decentralized data authentication |
US10735398B1 (en) * | 2020-02-26 | 2020-08-04 | Bandwidth, Inc. | Rolling code authentication techniques |
-
2019
- 2019-08-29 US US16/555,638 patent/US11165579B2/en active Active
-
2020
- 2020-08-17 JP JP2022508466A patent/JP7426475B2/ja active Active
- 2020-08-17 EP EP20856284.3A patent/EP4022473A4/en active Pending
- 2020-08-17 KR KR1020227005521A patent/KR20220067536A/ko not_active Application Discontinuation
- 2020-08-17 CN CN202080061087.7A patent/CN114586315A/zh active Pending
- 2020-08-17 WO PCT/US2020/046652 patent/WO2021041075A1/en unknown
-
2021
- 2021-09-15 US US17/475,662 patent/US11757641B2/en active Active
-
2023
- 2023-08-01 US US18/363,447 patent/US20240031155A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005190452A (ja) | 2003-12-01 | 2005-07-14 | Ihc:Kk | 認証システム |
US10298396B1 (en) | 2015-11-10 | 2019-05-21 | Wells Fargo Bank, N.A. | Identity management service via virtual passport |
CN107958371A (zh) | 2017-11-13 | 2018-04-24 | 深圳超级区块链信息技术有限公司 | 一种分布式区块链身份证 |
Also Published As
Publication number | Publication date |
---|---|
KR20220067536A (ko) | 2022-05-24 |
WO2021041075A1 (en) | 2021-03-04 |
US11757641B2 (en) | 2023-09-12 |
CN114586315A (zh) | 2022-06-03 |
US11165579B2 (en) | 2021-11-02 |
EP4022473A1 (en) | 2022-07-06 |
JP2022545627A (ja) | 2022-10-28 |
EP4022473A4 (en) | 2023-08-30 |
US20220006634A1 (en) | 2022-01-06 |
US20210067340A1 (en) | 2021-03-04 |
US20240031155A1 (en) | 2024-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7426475B2 (ja) | 分散化されたデータ認証 | |
US11082240B2 (en) | Retrieving public data for blockchain networks using highly available trusted execution environments | |
US11080430B2 (en) | Integrity of communications between blockchain networks and external data sources | |
CN111164948B (zh) | 使用区块链网络管理网络安全漏洞 | |
US9998438B2 (en) | Verifying the security of a remote server | |
AU2019204708A1 (en) | Retrieving public data for blockchain networks using highly available trusted execution environments | |
US20180007021A1 (en) | Public key pinning for private networks | |
US11997210B2 (en) | Protection of online applications and webpages using a blockchain | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
Ulybyshev | Data Protection in Transit and at Rest with Leakage Detection | |
Hosseyni et al. | Formal Security Analysis of the OpenID FAPI 2.0: Accompanying a Standardization Process | |
Alam et al. | Combating Identity Attacks in Online Social Networks: A Multi-Layered Framework Using Zero-Knowledge Proof and Permissioned Blockchain | |
Dong et al. | The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20220406 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20230630 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20230925 |
|
A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20231129 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20231213 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20231227 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20240122 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 7426475 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |