Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

101 results about "Digital credential" patented technology

Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a driver's license, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket or a public transport ticket, a digital credential is a proof of qualification, competence, or clearance that is attached to a person. Also, digital credentials prove something about their owner. Both types of credentials may contain personal information such as the person's name, birthplace, birthdate, and/or biometric information such as a picture or a finger print.

Digital certificate processing method and system and supply chain financial platform

The invention discloses a digital certificate processing method, a digital certificate processing system and a supply chain financial platform. The digital certificate processing method comprises thefollowing steps: receiving a transfer request of a first supplier; According to the transfer request, transferring the digital certificate of the first supplier to at least one second supplier or coreenterprise by using a block chain; Wherein the digital certificate of the first supplier is the digital certificate of the core enterprise signed by the first supplier according to the issuing request of the core enterprise, or the digital certificate of other suppliers signed by the first supplier according to the circulation request of other suppliers except the first supplier; And receiving asigning instruction of at least one second supplier or core enterprise. According to the invention, the core enterprise signs and issues the digital certificate to the first supplier, and the first supplier transfers the digital certificate to at least one second supplier or the core enterprise by using the characteristics of decentralization and non-tampering of the block chain, so that the purpose of effectively transferring the digital certificate in the supply chain is achieved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Digital credentials method based on notarization information

This invention discloses a digital credentials method based on notarization information. A notarization program of notarization organization is led to an electric identification certification so as to provide the public credibility certification of user true identification and credentials. The binding technical of using notarization mark technology and the credibility information of user related identification is used for forming the digital credentials used by the user identification certification and guaranteeing the integrity. Compared with the currently adopted CA certification organization mode under PKI system, this invention effectively conquers the drawbacks that the nonstandard technical standard, low authority of certification and fairness caused by the current PKI system, and the low commonality caused by remarkable region and professional, and has remarkable advantages of saving large amount of cost of creating the CA certification organization. And this invention can be immediately performed. This invention can be widely applied to the business windows, such as the electronic business, the electronic government affairs, the administration, the bank, the Telecommunications, the insurance, and can be applied to the user identification certification under the system of real name of fields of each special business system, hotel, traffic, customs and so on.
Owner:刘学明 +1

Regulation-violating behaviour evidence-obtaining system and method therefor

The invention relates to a regulation-violating behaviour evidence-obtaining method, comprising the following steps: initiating operation of the regulation-violating behaviour evidence-obtaining system when vehicle regulation-violating incident occurs; selecting at least one regulation-violating item from preset multiple vehicle regulation-violating items; initiating the camera to shot the regulation-violating site; obtaining detailed location and occurrence time position messaging of the regulation-violating site; generating a corresponding digital signature according to digital evidence input by traffic police affair-handling personnel; carrying out digital signature on the positioning information of the selected regulation-violating items, regulation-violating site photos, concrete locations of the regulation-violating sites and the occurrence time; transmitting the selected regulation-violating items, regulation-violating site photos and regulation-violating positioning information to the traffic police system to serve as evidence for giving a ticket. The invention further provides a regulation-violating behaviour evidence-obtaining system; the method and the system of the invention can be used to greatly improve efficiency of the traffic police affair-handling personnel.
Owner:SHENZHEN FUTAIHONG PRECISION IND CO LTD +1

Methods of dynamically securing electronic devices and other communications through environmental and system measurements leveraging tailored trustworthy spaces

ActiveUS9721111B2Without the risk of the receiving device compromising the security of the sending systemExposure was also limitedDigital data protectionData sourceMobile security
This invention is for a system capable of securing one or more fixed or mobile computing device and connected system. Each device is configured to change its operating posture by allowing, limiting, or disallowing access to applications, application features, devices features, data, and other information based on the current Tailored Trustworthy Space (TTS) definitions and rules which provided for various situationally dependent scenarios. Multiple TTS may be defined for a given deployment, each of which specifies one or more sensors and algorithms for combining sensor data from the device, other connected devices, and / or other data sources from which the current TTS is identified. The device further achieves security by loading digital credentials through a unidirectional multidimensional physical representation process which allows for the device to obtain said credentials without the risk of compromising the credential issuing system through the data transfer process. This secure system methodology may be used to create a Mobile Secure Compartmentalized Information Facility (M-SCIF), among other applications.
Owner:INTERNET INFRASTRUCTURE SERVICES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products