Device provisioning service
    2.
    发明授权

    公开(公告)号:US10833863B2

    公开(公告)日:2020-11-10

    申请号:US15201129

    申请日:2016-07-01

    Abstract: A computing device is provisioned to be remotely managed by a current owner. The device has an initial cryptographic basis of trust, and an owner identifier that facilitates establishment of communication with the current owner of the device. The ownership may change one or more times while the device may remain inoperative. Later, the device receives a transfer-of-ownership indication, which it verifies against the initial basis of trust to establish a new current owner. The device may then communicate with a device management service of the new current owner based on the transfer-of-ownership indication.

    ENCRYPTED DATA INSPECTION IN A NETWORK ENVIRONMENT
    4.
    发明申请
    ENCRYPTED DATA INSPECTION IN A NETWORK ENVIRONMENT 有权
    网络环境中的加密数据检查

    公开(公告)号:US20160173288A1

    公开(公告)日:2016-06-16

    申请号:US14929476

    申请日:2015-11-02

    Abstract: Technologies are provided in example embodiments for analyzing an encrypted network flow. The technologies include monitoring the encrypted network flow between a first node and a second node, the network flow initiated from the first node; duplicating the encrypted network flow to form a copy of the encrypted network flow; decrypting the copy of the encrypted network flow using a shared secret, the shared secret associated with the first node and the second node; and scanning the network flow copy for targeted data.

    Abstract translation: 在用于分析加密网络流的示例实施例中提供了技术。 所述技术包括监视第一节点和第二节点之间的加密网络流,所述网络流从所述第一节点发起; 复制加密网络流以形成加密网络流的副本; 使用共享密钥解密加密网络流的副本,与第一节点和第二节点相关联的共享秘密; 并扫描目标数据的网络流拷贝。

    PAYMENT SYSTEM
    6.
    发明申请
    PAYMENT SYSTEM 审中-公开

    公开(公告)号:US20180005211A1

    公开(公告)日:2018-01-04

    申请号:US15201414

    申请日:2016-07-02

    CPC classification number: G06Q20/206 G06Q20/204 G06Q20/34 G06Q20/363

    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to couple to a terminal, verify an account with an account institution using Direct Anonymous Attestation (DAA), and request an action related to the account using DAA. In an example, the DAA is accomplished using enhanced privacy identification (EPID). The account institution can be a banking institution, and the requested action can be to add an electronic representation of monetary funds to the account. In another example, the device is a payment card, the terminal is a point of sale terminal, and the requested action is related to a sale of goods or services.

    Payment system
    7.
    发明授权

    公开(公告)号:US10482446B2

    公开(公告)日:2019-11-19

    申请号:US15201414

    申请日:2016-07-02

    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to couple to a terminal, verify an account with an account institution using Direct Anonymous Attestation (DAA), and request an action related to the account using DAA. In an example, the DAA is accomplished using enhanced privacy identification (EPID). The account institution can be a banking institution, and the requested action can be to add an electronic representation of monetary funds to the account. In another example, the device is a payment card, the terminal is a point of sale terminal, and the requested action is related to a sale of goods or services.

    Encrypted data inspection in a network environment
    9.
    发明授权
    Encrypted data inspection in a network environment 有权
    在网络环境中加密数据检查

    公开(公告)号:US09176838B2

    公开(公告)日:2015-11-03

    申请号:US13656406

    申请日:2012-10-19

    Abstract: Technologies are provided in example embodiments for analyzing an encrypted network flow. The technologies include monitoring the encrypted network flow between a first node and a second node, the network flow initiated from the first node; duplicating the encrypted network flow to form a copy of the encrypted network flow; decrypting the copy of the encrypted network flow using a shared secret, the shared secret associated with the first node and the second node; and scanning the network flow copy for targeted data.

    Abstract translation: 在用于分析加密网络流的示例实施例中提供了技术。 所述技术包括监视第一节点和第二节点之间的加密网络流,所述网络流从所述第一节点发起; 复制加密网络流以形成加密网络流的副本; 使用共享密钥解密加密网络流的副本,与第一节点和第二节点相关联的共享秘密; 并扫描目标数据的网络流拷贝。

Patent Agency Ranking