-
公开(公告)号:US11381556B2
公开(公告)日:2022-07-05
申请号:US16446407
申请日:2019-06-19
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Lei Wang , Chao Feng Meng
IPC: H04L9/40 , G06F21/32 , G06F16/9535 , G06F16/955 , G06K19/06 , H04L67/06 , H04L67/306
Abstract: A method and an apparatus for information interaction, and a method and an apparatus for associating human biometric data with an account are disclosed. The information interaction method includes: acquiring, when an information interaction operation with a user account of an information interaction party is triggered, human biometric data of a user acting as the information interaction party; suspending the information interaction operation when determining that no matching user account exists according to the human biometric data, and uploading the human biometric data to a server by a device to establish an association relationship between the user account of the user and the human biometric data; and resuming the information interaction operation when a user account matching the human biometric data sent by the server is received, and completing the information interaction operation with the user account matching the human biometric data.
-
公开(公告)号:US11206137B2
公开(公告)日:2021-12-21
申请号:US17222619
申请日:2021-04-05
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chaofan Yu , Lei Wang , Aihui Zhou , Ning Zhang , Hongliang Tian , Junxian Xiao
Abstract: This disclosure relates to providing a high availability computing service in a distributed system. In one aspect, a method includes sending, by a computing unit of multiple computing units that are each executing a respective copy of a computing task, a certificate request to a trusted certificate generator. The request includes authentication information. The authentication information includes a code hash of the computing task. The computing unit receives a certificate report including a public key certificate in a certificate chain generated for the code hash and a private key corresponding to the public key certificate. The public key certificate and the private key form a certificate pair. The certificate chain includes multiple certificates including the public key certificate and a root certificate corresponding to the public key certificate. The computing unit is used as a TLS server. The certificate pair is set as a certificate pair of the TLS server.
-
公开(公告)号:US11127019B2
公开(公告)日:2021-09-21
申请号:US16027083
申请日:2018-07-03
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chao Xiu , Lei Wang , Chenjie Shi
IPC: G06Q20/00 , G06Q20/40 , G06F21/34 , G06Q20/32 , G06Q20/34 , H04W12/126 , H04W4/80 , G06F21/44 , H04W12/61 , H04W12/63
Abstract: The present application relates to the field of information security technologies, and in particular, to smart card security verification methods and devices. In one example method, in response to detecting processing associated with a particular service at a smart card application of an intelligent terminal, a set of data related to the particular service is obtained. A set of security parameters associated with the smart card application are identified. The obtained set of data related to the particular service is compared to the identified set of security parameters. In response to determining from the comparison that the obtained set of data related to the particular service satisfies the identified set of security parameters, the particular service to is allowed to execute. In response to determining that the obtained set of data related to the particular service does not satisfy the identified set of security parameters, the particular service is terminated.
-
公开(公告)号:US11109227B2
公开(公告)日:2021-08-31
申请号:US16193201
申请日:2018-11-16
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Yanghui Liu , Lei Wang , Ge Chen , Lingnan Shen
Abstract: The present application discloses example methods and systems. In one example method, sound wave information associated with a data transmission is monitored within a predetermined distance from the client device, where the sound wave information including predetermined security information. In response to detecting sound wave information associated with a data transmission, the sound wave information is parsed to obtain the predetermined security information included in the detected sound wave information. Pattern information is generated based on the predetermined security information and data information to be sent. The generated pattern information is then displayed so that a second device can obtain the generated pattern information.
-
25.
公开(公告)号:US11038699B2
公开(公告)日:2021-06-15
申请号:US16813524
申请日:2020-03-09
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chaofan Yu , Lei Wang , Aihui Zhou , Ning Zhang , Hongliang Tian , Junxian Xiao
Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing certifications. One of the methods includes: receiving, from a computing unit, a certificate request, wherein the computing unit comprises at least one processor and a memory communicably coupled to the at least one processor, wherein the memory stores programming instructions associated with a computing task executable by the at least one processor, and wherein the certificate request comprises a group of identifiers of a group of computing tasks and authentication information that comprises a hash value of the programming instructions; authenticating the computing unit based on the authentication information; in response to the computing unit is authenticated, determining, based on the hash value, that a computing task is included in the group of computing tasks; obtaining a certificate chain and a private key pre-generated for the group of identifiers; and sending a certificate report to the computing unit.
-
公开(公告)号:US11038673B2
公开(公告)日:2021-06-15
申请号:US17159553
申请日:2021-01-27
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chaofan Yu , Qunshan Huang , Lei Wang
Abstract: Implementations of the present specification provide a data processing method and apparatus. A method performed by a data provider includes: obtaining first encrypted data of first plaintext data, a first key used to decrypt the first encrypted data, and authorization information about the first plaintext data; sending a verification request to a data manager, the data manager including a first trusted execution environment; receiving authentication information from the data manager, and performing verification based on the authentication information; when the verification succeeds, securely transmitting the first key and the authorization information to the first trusted execution environment; and providing the first encrypted data to the data manager.
-
-
-
-
-