Patent classifications
H04L9/3231
DYNAMIC ENCRYPTION AND DECRYPTION METHOD AMONG LOCK CONTROL SYSTEM MODULES, MULTIPLE AUTHENTICATION LOCK CONTROL SYSTEM, LOCK CONTROL METHOD AND STRONGBOX
Dynamic encryption and decryption method among lock control system modules comprise the following steps: step 1. filling hardware ID data, an unlocking communication protocol and a mask variable into an array according to a predefined variable space, and encrypting the array based on the mask variable to obtain an encrypted array; step 2. decrypting the encrypted array based on the mask variable to obtain a decrypted array, executing data division on the decrypted array according to the predefined variable space, matching the divided data with data recorded in advance one by one, and if the divided data are consistent with the data recorded in advance, executing related operations according to the decrypted unlocking communication protocol content; otherwise, executing no operation.
DECENTRALIZED TRUST USING BLOCKCHAIN FOR TRACKING AND VALIDATION OF VOICE COMMUNICATIONS
Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.
INFORMATION MATCHING SYSTEM AND INFORMATION MATCHING METHOD
In order to provide an information matching system achieving an information matching scheme that takes a lower cost and uses secure biometric information, the information matching system includes a concealment apparatus, a decryption apparatus, and a similarity calculating apparatus. The concealment apparatus transmits, to the similarity calculating apparatus, concealed information including information concealing obtained matching information by linear conversion using random numbers. The similarity calculating apparatus calculates, from obtained one or more pieces of registration information and the concealed information received from the concealment apparatus, a concealed similarity which is a value concealing a similarity between the matching information and the registration information, and to transmit the calculated concealed similarity to the decryption apparatus. The decryption apparatus calculates the similarity between the matching information and the registration information from the concealed similarity received from the similarity calculating apparatus, using the random numbers used by the concealment apparatus.
Trusted service manager (TSM) architectures and methods
A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key.
Wearable identity device for fingerprint bound access to a cloud service
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere.
Transaction data processing method, computing device, and storage medium
A transaction data processing method includes: receiving a first transaction document from a device of a transaction initiator, the first transaction document being associated with identity labels of a plurality of transaction participants; separately performing identity authentication on the plurality of transaction participants according to the identity labels of the plurality of transaction participants, to obtain an identity authentication result. The method also includes adding the identity authentication result into the first transaction document when the identity authentication results indicates identity authentication of each of the plurality of transaction participants is successful, to generate a second transaction document carrying the identity authentication result; separately transmitting a signature request for the second transaction document to devices of the plurality of transaction participants; and generating a third transaction document according to responses returned by the devices of the plurality of transaction participants in response to the signature request.
Biometric authenticated biometric enrollment
An example method includes receiving an encrypted biometric enrollment data and user identifier data. The encrypted biometric enrollment data includes at least one biometric enrollment sample from a user encrypted using an encryption key. The encryption key is generated based on a user secret and the user identifier is associated with the user. The user identifier is matched with a stored user secret. A decryption key is generated based on the stored user secret. The encrypted biometric enrollment data is decrypted using the decryption key. The at least one biometric enrollment sample is retrieved from the decrypted biometric enrollment data. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a biometric reference template. A biometric reference template identifier uniquely identifying the biometric reference template is generated. An encryption key is generated based on the stored user secret and encrypts an enrollment confirmation message.
METHOD AND SYSTEM FOR DIGITAL ATTESTATION
Broadly speaking, embodiments of the present techniques provide methods and systems to enable a user to securely share user information with a third party. The user information is based on a user data item, but the user data item itself is kept secret and not shared with the third party. The present techniques generate a digital attestation or verifiable credential containing the user information to Receiving an attestation request for a fact be shared.
Voice Payment Method and Electronic Device
A voice payment method and an electronic device are provided. The method includes: A first electronic device receives voice information of a user, where the voice information is used to indicate a payment operation performed by the user; when a voiceprint feature of the voice information meets a preset condition, the first electronic device requests a second electronic device to authenticate the user; the second electronic device prompts the user to perform an authentication process, where the authentication process includes one or more of fingerprint authentication, facial recognition, password authentication, verification code authentication, and near field communication NFC authentication; when authentication performed by the second electronic device on the user succeeds, the second electronic device indicates to the first electronic device that authentication performed by the second electronic device on the user succeeds; and the first electronic device completes the payment operation with a payment platform.
ACCESS CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An access control apparatus (2000) acquires a request (20) for access to data stored in a first storage apparatus 30. The access control apparatus (2000) acquires privilege information (70) from a blockchain storage (40). The privilege information (70) represents access privilege pertaining to access to the first storage apparatus (30). The access control apparatus (2000) determines whether requested access is within a range of the access privilege of a target entity (10) being a subject of the request (20), by using the privilege information (70) of the target entity (10). When it is determined that the access is within the range of the access privilege of the target entity (10), the access control apparatus (2000) executes the access.