Patent classifications
H04L2463/102
MOBILE COMMERCE AND AUTHENTICATION METHOD HAVING IMPROVED SECURITY BASED ON QUANTUM CRYPTOGRAPHY
Disclosed herein are technologies regarding a communication device and server which are capable of cryptographic communication based on quantum cryptography. A communication device for quantum cryptography authentication includes: an optical communication unit configured to receive a series of first quantum signals generated by passing through a first quantum filter of the communication device; a quantum signal generation unit configured to generate the first quantum signals by setting up the first quantum filter in a reception path for a series of second quantum signals generated and sent by a server; and a processor configured to select the setup of the first quantum filter based on a series of randomly generated first quantum states, and to control the quantum signal generation unit to generate the first quantum signals by using the first quantum filter.
Virtual code-based control system, method, and program, control device, and control signal generating means
The present invention relates to virtual code-based control system, method and program, a control device and a control signal generating means. A control method on the basis of a control signal comprising a virtual code according to an embodiment of the present invention comprises: a control signal receiving step for a control module receiving, from a control signal generating means, a control signal generated by means of combining a plurality of specific codes in accordance with a particular rule; a step for the control module extracting the plurality of specific codes comprised in the virtual code; and a command searching step for the control module searching for a storage location comprising a particular command on the basis of the plurality of specific codes.
URL-based certificate in a PKI
A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URL) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent.
VALIDATION CRYPTOGRAM FOR TRANSACTION
A method for validating an interaction is disclosed. A first interaction cryptogram can be generated by a first device using information about a first party to the interaction and a second party to the interaction. A second interaction cryptogram can be generated by a second device also using information about the first party to the interaction and the second party to the interaction. Verifying each cryptogram can validate that the interaction details have not been changed, and that both the first party and second party legitimately authorized the interaction.
Mobile account authentication service
A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as with the use of tokens. Authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requesting a password from the cardholder, verifying the password, and notifying a merchant whether the cardholder's authenticity has been verified. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages via the Internet are described. Systems for implementing the authentication service in which a cardholder uses a mobile device capable of transmitting messages through voice and messaging channels is also described.
Systems and methods for secure assisted order generation
A system described herein may provide for the verification of payment information associated with a particular user request. The payment information may be verified by a third party and provide verification information to the call center processing the order request. Some information may be provided by the call center processing through the request by receiving information regarding the particular user from a repository.
METHOD AND SYSTEM FOR ELECTRONIC DISTRIBUTION OF CONTROLLED TOKENS
A method for distributing controlled tokens to a secondary mobile device includes: storing account profiles, each including an account identifier, set of token credentials, and an associated mobile device identifier; receiving a token distribution request from a first mobile device including a first mobile device identifier, recipient mobile device identifier, specific account identifier, and account controls; identifying a specific account profile including the specific account identifier and first mobile device identifier; generating a single use identification value and reservation identifier; transmitting the single use identification value to the first mobile device; transmitting the reservation identifier to a second mobile device associated with the recipient mobile device identifier; receiving the reservation identifier and the single use identification value from the second mobile device; verifying the reservation identifier and single use identification value received from the second mobile device; and transmitting a new set of token credentials to the second mobile device.
Automatic dynamic vetting of browser extensions and web applications
A digital good offered for downloading from a first computing system to a client computing device for execution by a browser executing on the client is identified. The digital good is received at a third computing system, where source code for the received digital good includes scripting language code. The code is re-written to include tracking code to track behavior of the digital good during execution of the digital good, and the re-written digital good is executed in a browser run by the third computing system. Based on evaluation of results of executing the re-written digital good, it is automatically determined, by the third computer system, whether the digital good violates one or more predetermined conditions, and based on the determination of whether the digital good violates a predetermined conditions, it is automatically determined whether to discourage downloading the digital good to, or executing the digital good by, the client.
SYSTEMS AND METHODS FOR SECURE COMMUNICATION
In some embodiments, fast and secure communication can be achieved (e.g., in a fueling environment payment system) with systems and methods that validate an authentication request based on one or more pre-validated cryptographic keys.
WebAuthn+JSON DLT ˜the internet of value
A system capable of securely authenticating users of a web application (or similarly distributed application). This invention, WebAuthn+, along with a simple addition to the Web Bluetooth API will completely solve the web authentication problem. And most users will be able to keep the convenience of user names and simple passwords! Simple passwords will become highly secure.
The fact that no one else has proposed this simple addition to the Web Bluetooth API, argues for the uniqueness of this invention.
In addition to secure authentication, this invention will enable the creation of Cryptographically Secure Distributed Ledgers as a “Shared Source of Truth”. Users will be able to sign a distributed ledger with one touch of their mobile device. Additions to the distributed ledger will be considered a new block, a hash code will be created and signed by the user responsible for that step in the process.
A distributed ledger that is a cryptographically secure shared source of truth will make the funds transfer process simple, secure and fast. The system will reduce the funds clearing process to a few hundred milliseconds utilizing secure cryptographic processes.
The system will have no central processing requirement and will be scalable to billions of parallel transactions per second worldwide. Financial transactions will have just four participants (and no uber blockchain storage or processes): sender sender's bank recipient recipient's bank