SICHERE VISUELLE TRANSAKTIONEN FÜR MOBILE VORRICHTUNGEN

    公开(公告)号:DE102019106098A1

    公开(公告)日:2019-10-17

    申请号:DE102019106098

    申请日:2019-03-11

    Applicant: INTEL CORP

    Abstract: In einer Ausführungsform umfasst eine Einrichtung eine Anzeigeschnittstelle zum Kommunizieren mit einer Anzeigevorrichtung und einen Prozessor. Der Prozessor dient zu Folgendem: Identifizieren einer mobilen Transaktion in Zusammenhang mit einem Benutzer, wobei die mobile Transaktion eine potentielle Transaktion umfasst, die unter Verwendung einer mobilen Vorrichtung des Benutzers abzuschließen ist; Zugreifen auf Transaktionsdaten in Zusammenhang mit der mobilen Transaktion; Verschlüsseln der Transaktionsdaten basierend auf einem Verschlüsselungsschlüssel in Zusammenhang mit dem Benutzer; Erzeugen eines visuellen Codes in Zusammenhang mit den verschlüsselten Transaktionsdaten, wobei der visuelle Code visuell codierte Daten umfasst, und wobei der visuelle Code in einer geschützten Ausführungsumgebung des Prozessors erzeugt wird; Herstellen eines geschützten Datenpfads zwischen dem Prozessor und der Anzeigevorrichtung über die Anzeigeschnittstelle; und Übertragen des visuellen Codes zu der Anzeigevorrichtung über den geschützten Datenpfad, wobei der visuelle Code auf der Anzeigevorrichtung anzuzeigen ist.

    ERSTELLUNG VON DROHNEN BEZOGENEN INHALTS UNTER VERWENDUNG VON SCHWARMBESTÄTIGUNG

    公开(公告)号:DE112016004350T5

    公开(公告)日:2018-05-30

    申请号:DE112016004350

    申请日:2016-09-26

    Applicant: INTEL CORP

    Abstract: Verschiedene Ausführungsformen sind im Allgemeinen auf das Bereitstellen von Informationserfassung durch mehrere Drohnen, die in einem Schwarm arbeiten können, gerichtet, während Rechte und/oder Werte, die dem Inhalt zugewiesen werden, der durch jede Drohne oder durch Teilmengen von Drohnen erstellt wird, bewahrt werden. Im Allgemeinen gewährleistet die vorliegende Offenbarung, dass Drohnen, die an Inhaltserfassung teilnehmen, ihre Authentizität bestätigen können, um Vertrauen zwischen den Drohnen in dem Schwarm herzustellen.

    Protected device management
    23.
    发明专利

    公开(公告)号:AU2010340222B2

    公开(公告)日:2014-07-03

    申请号:AU2010340222

    申请日:2010-11-29

    Applicant: INTEL CORP

    Abstract: A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.

    Method and apparatus for controlling a lifecycle of an electronic contract

    公开(公告)号:GB2388688A

    公开(公告)日:2003-11-19

    申请号:GB0319371

    申请日:2002-01-31

    Applicant: INTEL CORP

    Abstract: Managing the lifecycle of an electronic contract representing a relationship between at least two parties sharing a business process includes exchanging public keys for each of the parties, negotiating the electronic contact, digitally signing and verifying the electronic contract, issuing role certificates to participants of the shared business process, the role certificates defining authorization of participants to perform at least a part of the shared business process and for using the public keys, registering, by the participants, to receive the electronic contract, distributing the electronic contract to the participants, and performing the shared business process by the participants. Updating the shared business process may be accomplished by modifying the electronic contract and redistributing the electronic contract to the participants. Terminating the electronic contract may be accomplished by modifying the electronic contract to halt authorization of the shared business process and redistributing the electronic contract to the parties.

    Method of enforcing authorization in shared processes using electronic contracts

    公开(公告)号:AU2002242083A1

    公开(公告)日:2002-09-04

    申请号:AU2002242083

    申请日:2002-01-31

    Applicant: INTEL CORP

    Abstract: Enforcing authorization in a shared process between at least two parties by identifying a sender of a message requesting an action as part of the shared process, determining the party of the sender, associating the sender's party with a business relationship between the sender's party and the receiver's party as defined by an electronic contract (without relying on a trusted third party to provide a common rooted key hierarchy), identifying terms and conditions of the electronic contract corresponding to the shared process, and verifying that the requested action corresponds to the terms and conditions and is allowable for the shared process by the sender. The electronic contract includes a first section to specify at least one party, other than the at least two parties, that represents a namespace corresponding to a domain of cryptographic keys, a second section to associate the at least two parties liable under the electronic contract with a public key of a cryptographic key pair from the domain for each of the at least two parties (without relying on a trusted third party to provide a common rooted key hierarchy), a third section to provide at least one of mapping of role names and sub-processes of the shared process, and a fourth section to allow each of the at least two parties to digitally sign at least a portion of the electronic contract with a private key of the cryptographic key pair for each of the at least two parties.

    VIRALLY DISTRIBUTABLE TRUSTED MESSAGING
    28.
    发明公开

    公开(公告)号:EP3186918A4

    公开(公告)日:2018-02-21

    申请号:EP15836733

    申请日:2015-06-08

    Applicant: INTEL CORP

    Abstract: Technologies for utilizing trusted messaging include a local computing device including a message client and a local trusted message module established in a trusted execution environment. The local trusted message module performs attestation of a remote computing device based on communication with a corresponding remote trusted message module established in a trusted execution environment of the remote computing device. The local trusted message module further exchanges, with the remote trusted message module, cryptographic keys in response to successful attestation of the remote computing device. The message client forwards outgoing messages to the local trusted message module and receives incoming messages from the local trusted message module. To securely transmit an outgoing message to the remote computing device, the local trusted message module receives the outgoing message from the message client, encrypts the outgoing message, and cryptographically signs the outgoing message, prior to transmittal to the remote trusted message module of the remote computing device. To securely receive an incoming message from the remote computing device, the local trusted message module receives the incoming message from the remote trusted message module of the remote computing device, decrypts the incoming message, and verifies a cryptographic signature of the incoming message, based on the exchanged cryptographic keys and prior to transmittal of the incoming message to the message client.

Patent Agency Ranking