Patent classifications
H04L2209/42
Server device, information management method, information processing device, and information processing method
Provided is a server device including a risk value acquisition unit that acquires a risk value in a case in which a user's anonymous information leaks and a processing execution unit that associates an anonym ID for identifying the anonymous information with the anonymous information. In a case in which the risk value exceeds a predetermined threshold value, the processing execution unit executes at least any of processing of switching the anonym ID associated with the anonymous information or processing of differentiating anonym IDs associated with a plurality of pieces of division information obtained through division of the anonymous information.
Information encryption method and device
Disclosed are an information encryption method and device. A particular embodiment of the method comprises: acquiring customer information, wherein the customer information comprises an item number and a telephone number; selecting a random salt corresponding to the current date from a pre-generated random salt list, wherein the random salt list is used for storing a date and a random salt; using an irreversible encryption algorithm to encrypt the item number and the random salt corresponding to the current date so as to generate a first ciphertext; generating, based on the first ciphertext, a digital second ciphertext; and using the second ciphertext to process the telephone number so as to generate a first encrypted telephone number. This embodiment prevents private customer information from being leaked.
Method and apparatus for authenticating biometric information
A terminal, a server, and a system for authenticating biometric information and a biometric information authentication method are provided. A method, performed by a terminal, of registering biometric information includes: transmitting a registration request and biometric capability information of the terminal to a server; receiving biometric capability information of the server from the server; acquiring a user's biometric information based on the biometric capability information of the server; acquiring a pseudonymous identifier (PI) and auxiliary data (AD) based on the user's biometric information; and transmitting the PI and the AD to the server.
Safe logon
Methods, computer-readable media, software, and apparatuses are provided to assist a user and vendor in completing an online trusted transaction. Trusted vendor websites are verified and user identities are confirmed through a cyber-security safe logon credentialing system. The vendor can be confident that the user identity has been verified to be who they say they are and the user can be confident that they are using a trusted verified vendor website.
METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR AUTHENTICATION AND AUTHORIZATION OF NETWORKED DATA TRANSACTIONS
A method and apparatus for cryptographically linking separated authentication and authorization processes to support data transaction signing when group or corporate authority structures are required. The apparatus provides a secure, scalable model to represent authority in an entity context while conducting distributed ledger technology transactions. The method supports a range of cryptographic methods for separating the linked authentication and authorization processes including split key encryption, multi-party computation, multi-signature authorization, and execution of decentralized smart contract authorization logic. The method supports multiple models for authorization including organizational structures, consensus models including voting, and workflow processes.
DEVICE FOR DIRECTLY TRANSMITTING ELECTRONIC COIN DATA RECORDS TO ANOTHER DEVICE, AND PAYMENT SYSTEM
A device for directly transmitting electronic coin data records to another device includes accessing data storage, such that an electronic coin data record is stored in the data storage; an interface at least for outputting the at least one electronic coin data record to the other device; and a computing unit configured to mask the electronic coin data record in the device by applying a homomorphic encryption function to the electronic coin data record to obtain a masked electronic coin data record for registering the masked electronic coin data record at a monitoring entity; and to output the electronic coin data record using the interface. A payment system has a monitoring layer including a database in which masked electronic coin data records are stored; and a direct transaction layer including at least two devices in which the method can be carried out.
METHOD FOR ACCESSING APPLICATION AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
Disclosed is a method for accessing software applications. The method includes obtaining an application access request, the application access request carrying a user identifier and an application identifier; acquiring an encryption key, and encrypting the user identifier by the encryption key, to obtain an encrypted user identifier, the encryption key carrying first key information and second key information; generating an authorization credential corresponding to the application access request according to the encrypted user identifier and the first key information; transmitting the authorization credential to the application that is to be accessed, the application that is to be accessed generating an authorization request based on the authorization credential; receiving the authorization request returned by the application that is to be accessed; and accessing, when the authorization request satisfies a preset condition, the application that is to be accessed based on the second key information.
Methods and systems for implementing mixed protocol certificates
A system for implementing mixed protocol certificates, the system includes a subject device designed and configured to receive, from an issuing device, a first digital certificate, wherein the first digital certificate further comprises a first digital signature public and private key pair according to a first digital signature protocol and a second digital signature public key according to a second digital signature protocol, wherein the second digital signature protocol is distinct from the first digital signature protocol, to generate a second digital certificate, wherein generating the second digital certificate comprises generating a subject digital signature signing the certificate, the subject digital signature generated as a function of the second digital signature protocol and to provide the first digital certificate and the second digital certificate to a verifying device.
Method and system for prevention of lost currency in blockchain networks to missing wallets
A method for ensuring precedence for the processing of a blockchain transaction to prevent loss of cryptographic currency includes receiving a new blockchain transaction by a blockchain node in a blockchain network, confirming the new blockchain transaction including identifying a precedence transaction that was previously conducted and stored in the blockchain that involves both blockchain wallets included in the new blockchain transaction, including the new blockchain transaction in a new block that is generated, and distributing the new block to additional nodes in the blockchain network for confirmation and addition to the blockchain.
IMPLEMENTATION OF A BUTTERFLY KEY EXPANSION SCHEME
Methods, computer programs, and registration authority modules for implementing a butterfly key expansion scheme. The method includes receiving a public caterpillar signing key of a private/public caterpillar signing key pair and a first pseudorandom function from a requesting device; expanding the public caterpillar signing key into public cocoon signing keys using the first pseudorandom function; generating certificate signing requests based on the public cocoon signing keys; sending the certificate signing requests to a certificate authority module; receiving signed pseudonym certificates from the certificate authority module; and encrypting the signed pseudonym certificates to generate response packages.