会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Security engine for a secure operating environment
    • 安全引擎,用于安全的操作环境
    • US09424421B2
    • 2016-08-23
    • US14269999
    • 2014-05-05
    • Visa International Service Association
    • Selim AissiTaeho KgilGyan Prakash
    • G06F21/00G06F21/53G06F21/57G06F21/60
    • G06F21/604G06F21/53G06F21/57G06F21/6218G06F2221/2113
    • The presenting invention relates to techniques for implementing a secure operating environment for the execution of applications on a computing devices (e.g., a mobile phone). In The secure operating environment may provide a trusted environment with dedicated computing resources to manage security and integrity of processing and data for the applications. The applications may be provided with a variety of security services and/or functions to meet different levels of security demanded by an application. The secure operating environment may include a security engine that enumerates and/or determines the security capabilities of the secure operating environment and the computing device, e.g., the hardware, the software, and/or the firmware of the computing device. The security engine may provide security services desired by applications by choosing from the security capabilities that are supported by the secure operating environment and the computing device.
    • 本发明涉及用于实现用于在计算设备(例如,移动电话)上执行应用的安全操作环境的技术。 在安全的操作环境中,可以为受信任的环境提供专用的计算资源来管理应用程序的处理和数据的安全性和完整性。 应用可以被提供有各种安全服务和/或功能以满足应用所要求的不同级别的安全性。 安全操作环境可以包括枚举和/或确定安全操作环境和计算设备(例如计算设备的硬件,软件和/或固件)的安全能力的安全引擎。 安全引擎可以通过从由安全操作环境和计算设备支持的安全功能中进行选择来提供应用所期望的安全服务。
    • 9. 发明申请
    • USING STEGANOGRAPHY TO PERFORM PAYMENT TRANSACTIONS THROUGH INSECURE CHANNELS
    • 使用STEGANOGRAPHY通过渠道进行付款交易
    • US20150006390A1
    • 2015-01-01
    • US14312258
    • 2014-06-23
    • Visa International Service Association
    • Selim AissiTaeho KgilAjit GaddamRobert Rutherford
    • G06Q20/40H04N19/80H04N19/46
    • Steganographic techniques are used to embed financial information or authentication information within an image, audio, or video file using a quantization table and/or other filter. The file is then transmitted over an insecure network, such as a GSM cell phone network, and a server extracts the information from the image, audio, or video using the same quantization table and/or filter. Multiple sets of information, such as telephone numbers and/or payment account numbers, are extracted from the same image by those entities possessing the appropriate keys. The filters and tables used to embed financial information can be updated periodically or according to events. A video of images, some with embedded information, some with ‘dummy’ data, can be used to hide information over insecure networks for payment transactions.
    • 隐写技术用于使用量化表和/或其他过滤器将财务信息或认证信息嵌入到图像,音频或视频文件中。 该文件然后通过诸如GSM蜂窝电话网络的不安全网络传输,并且服务器使用相同的量化表和/或过滤器从图像,音频或视频中提取信息。 通过拥有适当键的实体,从相同的图像中提取多组信息,如电话号码和/或支付帐号。 用于嵌入财务信息的过滤器和表可以定期更新或根据事件更新。 图像的视频,一些具有嵌入信息,一些具有“虚拟”数据的视频可以用于隐藏不安全网络上的用于支付交易的信息。