-
公开(公告)号:US11792190B2
公开(公告)日:2023-10-17
申请号:US17528101
申请日:2021-11-16
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
CPC classification number: H04L63/0869 , H04L9/085
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-
2.
公开(公告)号:US11728978B2
公开(公告)日:2023-08-15
申请号:US17401064
申请日:2021-08-12
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Aihui Zhou , Qunshan Huang , Chaofan Yu , Weiwen Cai , Lei Wang
CPC classification number: H04L9/083 , H04L9/0822 , H04L9/0825 , H04L9/0861 , H04L9/3215
Abstract: Some embodiments of the present specification provide a method and an apparatus for establishing a trusted channel between a user and a trusted computing cluster. According to the method, when a user wants to establish a trusted channel with a trusted computing cluster, the user only negotiates a session key with any first trusted computing unit in the cluster to establish the trusted channel. Then, the first trusted computing unit encrypts the session key using a cluster key common to the trusted computing cluster to which the first trusted computing unit belongs, and sends the encrypted session key to a cluster manager. The cluster manager transmits the encrypted session key in the trusted computing cluster, so that other trusted computing units in the cluster obtain the session key and join the trusted channel. Thus, the user establishes a trusted channel with the entire trusted computing cluster.
-
3.
公开(公告)号:US11228450B2
公开(公告)日:2022-01-18
申请号:US17244854
申请日:2021-04-29
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chaofan Yu , Lei Wang , Aihui Zhou , Ning Zhang , Hongliang Tian , Junxian Xiao
Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing certifications. One of the methods includes: receiving, from a computing unit, a certificate request, wherein the computing unit comprises at least one processor and a memory communicably coupled to the at least one processor, wherein the memory stores programming instructions associated with a computing task executable by the at least one processor, and wherein the certificate request comprises a group of identifiers of a group of computing tasks and authentication information that comprises a hash value of the programming instructions; authenticating the computing unit based on the authentication information; in response to the computing unit is authenticated, determining, based on the hash value, that a computing task is included in the group of computing tasks; obtaining a certificate chain and a private key pre-generated for the group of identifiers; and sending a certificate report to the computing unit.
-
公开(公告)号:US11210650B2
公开(公告)日:2021-12-28
申请号:US16720400
申请日:2019-12-19
Applicant: Advanced New Technologies Co., Ltd.
Abstract: Technologies related to credit payment based on a mobile terminal embedded secure element are disclosed. In an implementation, a payment request is received from a mobile computing device associated with a user account. The payment information including a payment amount is generated based on the payment request. The payment information is then sent to the mobile computing device. A payment authorization encrypted by a private key is received based on asymmetric encryption from the mobile computing device. A public key corresponding to the private key is used to verify the payment authorization, and a transaction log is generated for collecting a payment according to the payment amount if the payment authorization is successfully verified.
-
公开(公告)号:US11196741B2
公开(公告)日:2021-12-07
申请号:US17161359
申请日:2021-01-28
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-
公开(公告)号:US11290883B2
公开(公告)日:2022-03-29
申请号:US17379451
申请日:2021-07-19
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Yanghui Liu , Lei Wang , Ge Chen , Lingnan Shen
Abstract: The present application discloses systems and methods in which sound wave information associated with a data transmission is monitored within a predetermined distance from the client device, where the sound wave information including predetermined security information. In response to detecting sound wave information associated with a data transmission, the sound wave information is parsed to obtain the predetermined security information included in the detected sound wave information. Pattern information is generated based on the predetermined security information and data information to be sent. The generated pattern information is then displayed so that a second device can obtain the generated pattern information.
-
公开(公告)号:US11238431B2
公开(公告)日:2022-02-01
申请号:US16719348
申请日:2019-12-18
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Xing Chen , Lei Wang , Yuebin Shen
Abstract: Technologies related to mobile credit payment are disclosed. In an implementation, a credit payment request is generated and sent to a user account of a credit payment application (APP) installed on a mobile computing device. A payment response message is then received from the mobile computing device. The payment response message is parsed to identify an APP public key license. A pre-stored credit authorization public key is used to verify the APP public key license and an APP public key is received from the APP public key license if the verification is successful. A payment deduction request is generated and sent to the user account of the credit payment APP. A payment authorization encrypted using asymmetric key encryption is received from the mobile computing device. The APP public key is used to decrypt the payment authorization, and a transaction log is recorded if the second response message is successfully decrypted.
-
公开(公告)号:US11176233B2
公开(公告)日:2021-11-16
申请号:US16212210
申请日:2018-12-06
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Jiayin Liu , Lei Wang
Abstract: The present disclosure discloses a method and device for identity authentication. One example method includes retrieving stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; selecting a subset of the recorded fingerprints to be used to authenticate the user; prompting the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receiving user-provided fingerprint information from the user; matching the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determining that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints.
-
9.
公开(公告)号:US20210250183A1
公开(公告)日:2021-08-12
申请号:US17244854
申请日:2021-04-29
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Chaofan Yu , Lei Wang , Aihui Zhou , Ning Zhang , Hongliang Tian , Junxian Xiao
Abstract: Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for providing certifications. One of the methods includes: receiving, from a computing unit, a certificate request, wherein the computing unit comprises at least one processor and a memory communicably coupled to the at least one processor, wherein the memory stores programming instructions associated with a computing task executable by the at least one processor, and wherein the certificate request comprises a group of identifiers of a group of computing tasks and authentication information that comprises a hash value of the programming instructions; authenticating the computing unit based on the authentication information; in response to the computing unit is authenticated, determining, based on the hash value, that a computing task is included in the group of computing tasks; obtaining a certificate chain and a private key pre-generated for the group of identifiers; and sending a certificate report to the computing unit.
-
公开(公告)号:US11256793B2
公开(公告)日:2022-02-22
申请号:US16725922
申请日:2019-12-23
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Jiayin Liu , Lei Wang
Abstract: The present disclosure discloses a method and device for identity authentication. One example method includes retrieving stored fingerprint information for a user including a plurality of recorded fingerprints for the user, each recorded fingerprint associated with a different finger of the user; selecting a subset of the recorded fingerprints to be used to authenticate the user; prompting the user to provide fingerprint information corresponding to each finger associated with a recorded fingerprint in the selected subset; in response to prompting the user, receiving user-provided fingerprint information from the user; matching the user-provided fingerprint information against the selected subset of the recorded fingerprints; and determining that an identity authentication of the user succeeds when the user-provided fingerprint information matches the selected subset of the recorded fingerprints.
-
-
-
-
-
-
-
-
-