Secure computation environment
    22.
    发明授权

    公开(公告)号:US12229272B2

    公开(公告)日:2025-02-18

    申请号:US17650544

    申请日:2022-02-10

    Inventor: Ambuj Kumar

    Abstract: A container corresponding to executable code may be received. In response to receiving the container, a container manager resident in a memory of a computation environment may be executed to verify the container. The container manager may be verified by a boot loader of the computation environment. Permissions of the container to access the resources of a computation environment may be determined after the verification of the container by the container manager. Access to one or more resources of the computation environment may be provided by transferring control to the one or more resources from the container manager to the container based on the permissions of the container for the resources of the computation environment.

    Location aware cryptography
    27.
    发明授权

    公开(公告)号:US11082224B2

    公开(公告)日:2021-08-03

    申请号:US16445708

    申请日:2019-06-19

    Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.

    Location aware cryptography
    28.
    发明授权

    公开(公告)号:US10341106B2

    公开(公告)日:2019-07-02

    申请号:US15900722

    申请日:2018-02-20

    Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.

    CRYPTOGRAPHIC SECURITY FOR MOBILE PAYMENTS
    30.
    发明申请
    CRYPTOGRAPHIC SECURITY FOR MOBILE PAYMENTS 审中-公开
    移动支付的汇款安全

    公开(公告)号:US20170011394A1

    公开(公告)日:2017-01-12

    申请号:US15203722

    申请日:2016-07-06

    Abstract: A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key.

    Abstract translation: 可以接收存储在移动设备处的基本密钥。 可以生成基于基本密钥的第一动态密钥。 可以接收对应于与移动设备相关联的第一事务的第一交易数据。 此外,可以基于第一动态密钥和对应于第一事务的第一事务数据的组合来更新第一动态密钥以生成第二动态密钥。 可以基于第二动态密钥来请求与移动设备相关联的第二事务的认证。

Patent Agency Ranking