会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Security engine for a secure operating environment
    • 安全引擎,用于安全的操作环境
    • US09424421B2
    • 2016-08-23
    • US14269999
    • 2014-05-05
    • Visa International Service Association
    • Selim AissiTaeho KgilGyan Prakash
    • G06F21/00G06F21/53G06F21/57G06F21/60
    • G06F21/604G06F21/53G06F21/57G06F21/6218G06F2221/2113
    • The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    • 本发明涉及用于实现用于在计算设备(例如,移动电话)上执行应用的安全操作环境的技术。 在安全的操作环境中,可以为受信任的环境提供专用的计算资源来管理应用程序的处理和数据的安全性和完整性。 应用可以被提供有各种安全服务和/或功能以满足应用所要求的不同级别的安全性。 安全操作环境可以包括枚举和/或确定安全操作环境和计算设备(例如计算设备的硬件,软件和/或固件)的安全能力的安全引擎。 安全引擎可以通过从由安全操作环境和计算设备支持的安全功能中进行选择来提供应用所期望的安全服务。
    • 13. 发明申请
    • USING STEGANOGRAPHY TO PERFORM PAYMENT TRANSACTIONS THROUGH INSECURE CHANNELS
    • 使用STEGANOGRAPHY通过渠道进行付款交易
    • US20150006390A1
    • 2015-01-01
    • US14312258
    • 2014-06-23
    • Visa International Service Association
    • Selim AissiTaeho KgilAjit GaddamRobert Rutherford
    • G06Q20/40H04N19/80H04N19/46
    • Steganographic techniques are used to embed financial information or authentication information within an image, audio, or video file using a quantization table and/or other filter. The file is then transmitted over an insecure network, such as a GSM cell phone network, and a server extracts the information from the image, audio, or video using the same quantization table and/or filter. Multiple sets of information, such as telephone numbers and/or payment account numbers, are extracted from the same image by those entities possessing the appropriate keys. The filters and tables used to embed financial information can be updated periodically or according to events. A video of images, some with embedded information, some with ‘dummy’ data, can be used to hide information over insecure networks for payment transactions.
    • 隐写技术用于使用量化表和/或其他过滤器将财务信息或认证信息嵌入到图像,音频或视频文件中。 该文件然后通过诸如GSM蜂窝电话网络的不安全网络传输,并且服务器使用相同的量化表和/或过滤器从图像,音频或视频中提取信息。 通过拥有适当键的实体,从相同的图像中提取多组信息,如电话号码和/或支付帐号。 用于嵌入财务信息的过滤器和表可以定期更新或根据事件更新。 图像的视频,一些具有嵌入信息,一些具有“虚拟”数据的视频可以用于隐藏不安全网络上的用于支付交易的信息。
    • 16. 发明授权
    • Device communication based on device trustworthiness
    • 基于设备可信赖的设备通信
    • US09386045B2
    • 2016-07-05
    • US14134959
    • 2013-12-19
    • Visa International Service Association
    • Taeho KgilSelim Aissi
    • H04L29/06
    • H04L63/205
    • Techniques for assessing the trustworthiness of a target device that a user device is attempting to communicate with are described. A user device may request one or more trustworthiness attributes of a target device before exchanging data with the target device. The user device may receive the one or more trustworthiness attributes of the target device, and determine, based on the received one or more trustworthiness attributes of the target device, a set of one or more security policies to enforce on a communication channel used for exchanging data between the user device and the target device. A communication channel between the user device and the target device can then be established according to the set of one or more security policies.
    • 描述用于评估用户设备尝试与之通信的目标设备的可信度的技术。 在与目标设备交换数据之前,用户设备可以请求目标设备的一个或多个可信属性。 用户设备可以接收目标设备的一个或多个可信任属性,并且基于所接收到的目标设备的一个或多个可信属性来确定要在用于交换的通信信道上强制执行的一个或多个安全策略的集合 用户设备和目标设备之间的数据。 然后可以根据一个或多个安全策略的集合来建立用户设备和目标设备之间的通信信道。