Method and system for enhanced validation of cryptograms in cloud-based systems

    公开(公告)号:US10187384B2

    公开(公告)日:2019-01-22

    申请号:US15782339

    申请日:2017-10-12

    Abstract: A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of formatting templates, each template being associated with an account number length; receiving a selection indicating a specific primary account number; identifying a specific formatting template where the associated account number length corresponds to a length of the specific primary account number; receiving an unpredictable number from a point of sale device; generating a cryptogram based on at least the unpredictable number and one or more algorithms; generating a data string, wherein the data string includes at least the generated cryptogram, the specific primary account number, and the unpredictable number, and wherein the data string is formatted based on the identified specific formatting template; and electronically transmitting the generated data string to the point of sale device.

    SECURITY FOR MOBILE APPLICATIONS
    16.
    发明申请
    SECURITY FOR MOBILE APPLICATIONS 审中-公开
    移动应用安全

    公开(公告)号:US20150348026A1

    公开(公告)日:2015-12-03

    申请号:US14712343

    申请日:2015-05-14

    Abstract: A mobile computing device has at least one processor and at least one memory together providing a first execution environment and a second execution environment logically isolated from the first execution environment. The following approach is taken to manage data items for an application executing the first execution environment. A trust relationship is established between a trust client in the second execution environment and a remote trusted party and the trust client receives one or more data items from the remote trusted party. On executing the application in the first execution environment, the trust client provides the data items or further data items derived therefrom to the application 213. Provision of these data items may be conditional upon a user authentication process. A suitable mobile computing device is also described.

    Abstract translation: 移动计算设备具有至少一个处理器和至少一个存储器,一起提供与第一执行环境逻辑隔离的第一执行环境和第二执行环境。 采取以下方法来管理执行第一个执行环境的应用程序的数据项。 在第二执行环境中的信任客户端与远程可信方之间建立信任关系,信任客户端从远程受信任方接收一个或多个数据项。 在第一执行环境中执行应用程序时,信任客户端将数据项目或从其导出的其他数据项目提供给应用程序213.这些数据项目的提供可能取决于用户认证过程。 还描述了合适的移动计算设备。

    MONITORING IN DISTRIBUTED COMPUTING SYSTEM

    公开(公告)号:US20250007713A1

    公开(公告)日:2025-01-02

    申请号:US18761652

    申请日:2024-07-02

    Abstract: A method is described of monitoring a service performed at a computing node. The computing node is one of a plurality of computing nodes in a distributed computing system. Each computing node is adapted to perform at least one service for clients. A monitoring process is adapted to monitor a service process performing the process. In the method, the monitoring process monitors the service process on performance of the service. The monitoring service then provides monitoring information to a monitoring process for another service process. A suitable computing node for performing the service is described, as is a coordinated monitoring service for supporting multiple monitoring services.

Patent Agency Ranking