[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2019066640A1 - Method for secured offline transfer of documents via dynamic two-dimensional barcode - Google Patents

Method for secured offline transfer of documents via dynamic two-dimensional barcode Download PDF

Info

Publication number
WO2019066640A1
WO2019066640A1 PCT/MY2018/050061 MY2018050061W WO2019066640A1 WO 2019066640 A1 WO2019066640 A1 WO 2019066640A1 MY 2018050061 W MY2018050061 W MY 2018050061W WO 2019066640 A1 WO2019066640 A1 WO 2019066640A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile device
signed
timestamp
barcode
data
Prior art date
Application number
PCT/MY2018/050061
Other languages
French (fr)
Inventor
Han Liang CHONG
Original Assignee
Datasonic Smart Solutions Sdn Bhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Datasonic Smart Solutions Sdn Bhd filed Critical Datasonic Smart Solutions Sdn Bhd
Publication of WO2019066640A1 publication Critical patent/WO2019066640A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Definitions

  • the invention relates to a document transfer method. More particularly, the invention relates to a secured offline document transfer via dynamic two-dimensional barcode.
  • Two-dimensional (2D) barcodes comes in the shape of squares or rectangles that contain many small and individual dots.
  • a single 2D barcode can hold a significant amount of information and may remain legible even when printed at a small size or etched onto a product.
  • 2D barcodes are widely used in the industries of manufacturing, warehousing, logistics and healthcare for data transmitting purpose.
  • it is a risk to share documents such as sensitive client and patient information where the encrypted information is not secured and can be decode by anyone with a barcode scanner. Therefore, it is crucial to provide a secure yet accessible document sharing method which can be applied widely in any industries.
  • the main objective of the invention is to provide a method for secure transmission of data between two mobile devices via at least one 2D barcode comprising the steps of encrypting a timestamp using a sender private key to form a signed timestamp by a first mobile device, converting a signed data block and the signed timestamp into at least one 2D barcode by the first mobile device; wherein the signed data block includes a data and a sender public key pre-signed by a first private key, displaying the 2D barcode by the first mobile device on a display unit for a second mobile device to scan and retrieve the 2D barcode, retrieving the signed data block and the signed timestamp by decoding the 2D barcode by the second mobile device, decoding the signed data block using a first public key to retrieve and verify the data and the sender public key by the second mobile device, decoding the signed timestamp using the verified sender public key to retrieve and verify the timestamp by the second mobile device and authenticating the validity of the data by determining if the current time falls within range
  • the data block is pre-signed by the steps of generating an asymmetric key pair which includes the sender private key and the sender public key by the first mobile device, transmitting the sender public key to a trusted party server by the first mobile data, encrypting the data and the sender public key using the first private key to form the signed data block by the trusted party server and transmitting the signed data block to the first mobile device by the trusted party server.
  • the timestamp is a preset range of time for determining the validity of data.
  • the mobile device further comprises means for establishing communication link with the trusted party server and the second mobile device.
  • the mobile device further comprises built in mobile application or third party mobile application for facilitating the communication between the trusted party server and the mobile devices.
  • Figure 1 is a flowchart illustrating the method for offline document transfer via
  • Figure 2 is a diagram illustrating the enrolment of new sending mobile device.
  • the invention provides a computer-implemented method and system to transfer any confidential data from one mobile device into multiple mobile devices via a 2D barcode as the method limits the validity period of the transferred confidential data such that the cloning of the confidential data is prevented.
  • the 2D barcode is preferably an Aztec Code, QR code, AR code, NexCode or any combination thereof.
  • the confidential data includes social security number, credit card number, driver's license number, bank account number, protected health information or any combination thereof.
  • the transferring of the confidential data is further protected by integrity validation and non-repudiation through signature verification between the sending and receiving devices.
  • the system is built up by a server and a plurality of mobile devices being linked together via a communication network.
  • the server may comprises one or more heavy duty computers for processing the received data and transferring the received data to the mobile devices through the communication network, and any known devices or group of devices to provide sufficient capacity for data storing.
  • the mobile device is a personal digital assistants (PDA), smart phones, tablets, laptops, netbooks, phablets, phoblets, iPad, or any suitable means which capable of processing data, displaying data and scanning 2D barcode.
  • PDA personal digital assistants
  • the mobile devices are categorised into two types, sender mobile devices and recipient mobile devices.
  • Each sender mobile device is installed with a mobile application which is capable of encoding 2D-barcode containing sensitive information
  • each recipient mobile device is installed with a mobile application which is capable of scanning and decoding the 2D-barcode from the sender mobile device.
  • Graphical User Interface is also provided to the types of mobile devices through the application for user to trigger a mode of operation.
  • the communication network is preferably a wireless network which may include but is not limited to a Code Division Multiple Access (CDMA) network, a General Packet Radio Service (GPRS) network for use in conjunction with Global System for Mobile Communication (GSM) network, and future third-generation (3G) network like Enhanced Data rates for GSM Evolution (EDGE) and Universal Mobile Telecommunications System (UMTS).
  • CDMA Code Division Multiple Access
  • GPRS General Packet Radio Service
  • GSM Global System for Mobile Communication
  • 3G Third-generation
  • EDGE Enhanced Data rates for GSM Evolution
  • UMTS Universal Mobile Telecommunications System
  • a new sending mobile device 100 generates an asymmetric key pair, the key pair includes a sender private key and a sender public key.
  • the new sending mobile device 100 transmits the sender public key to a trusted party server for signing.
  • the trusted party server encrypts a data and the sender public key using a trusted party private key to form a signed data block.
  • the trusted party server transmits the signed data block back to the new sending mobile device 100 for the further data transferring process to be carried out.
  • the method can be split into an encoding process and a decoding process.
  • the encoding process includes the following steps.
  • a sending mobile device 100 encrypts a timestamp using a sender private key to form a signed timestamp.
  • timestamp is refer to a preset range of time for the mobile device to determine the validity of data transferred.
  • the sending mobile device 100 converts a signed data block and timestamp into at least one 2D barcode, wherein the signed data block includes a data 200 and a sender public key pre-signed by the sender private key.
  • step 203 the sending mobile device 100 displays the 2D barcode on a display unit for a receiving mobile device to scan and retrieve the 2D barcode.
  • the step 203 is where the encoding process ends and the starting of the decoding process.
  • step 204 the receiving mobile device retrieve the signed data block and the signed timestamp by decoding the 2D barcode.
  • steps 205 and 206 the receiving mobile device decodes the signed timestamp using the trusted party public key to retrieve and verify the data 200 and the sender public key.
  • step 207 the receiving mobile device decodes the signed timestamp using the verified sender public key to retrieve and verify the timestamp.
  • step 208 the receiving mobile device authenticates the validity of the data by determining if the current time falls within range of the verified timestamp.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Method for secure transmission of data (200) between two mobile devices via at least one 2D barcode comprising: a first mobile device generating (201) a signed timestamp using a sender private key; converting (202) a signed data block and the signed timestamp into at least one 2D barcode; the signed data block includes a data and a sender public key pre-signed by a first private key; displaying (203) the 2D barcode on a display unit for a second mobile device to scan and retrieve the 2D barcode; retrieving (204), by the second mobile device, the signed data block and the signed timestamp by decoding the 2D barcode; decoding (205,206) the signed data block using a first public key to retrieve and verify the data and the sender public key; decoding (207) the signed timestamp using the verified sender public key to retrieve and verify the timestamp.

Description

METHOD FOR SECURED OFFLINE TRANSFER OF DOCUMENTS VIA DYNAMIC TWO-DIMENSIONAL BARCODE
FIELD OF INVENTION
The invention relates to a document transfer method. More particularly, the invention relates to a secured offline document transfer via dynamic two-dimensional barcode.
BACKGROUND OF THE INVENTION
Two-dimensional (2D) barcodes comes in the shape of squares or rectangles that contain many small and individual dots. A single 2D barcode can hold a significant amount of information and may remain legible even when printed at a small size or etched onto a product. Nowadays, 2D barcodes are widely used in the industries of manufacturing, warehousing, logistics and healthcare for data transmitting purpose. However, it is a risk to share documents such as sensitive client and patient information where the encrypted information is not secured and can be decode by anyone with a barcode scanner. Therefore, it is crucial to provide a secure yet accessible document sharing method which can be applied widely in any industries.
Over the years, there are a few patented technologies related to the aforementioned document sharing method. Of interest in respect to secure information transfer via bar codes is disclosed in US9107065B2, this patent provides teachings on method for providing a document using a secure bar code includes encrypting the document to generate an encrypted document, and mixing together bits for a security credential with bits having a predetermined order. The security credential is for decrypting the encrypted documents. However, the drawback of this method could not include a time-stamp portion for preventing unauthorized reproduction of the barcode. On the other hand, another patent document US2013/0031623A1 discloses methods, systems, and computer-readable media for implementing a multi-factor authentication scheme utilizing barcodes images in computing devices, such as standard mobile devices and smartphones having no native hardware support for reading barcodes other than standard digital camera componentry for capturing digital images of real- world phenomena. However, the system could not perform authentication completely offline as it requires network connectivity' to a remote server for performing the final authentication. Subsequently, there is a need to fulfil the information security needs of confidentiality, integrity and non-repudiation without requiring network connectivity during the authentication process. This invention provides such a method.
SUMMARY OF INVENTION
The main objective of the invention is to provide a method for secure transmission of data between two mobile devices via at least one 2D barcode comprising the steps of encrypting a timestamp using a sender private key to form a signed timestamp by a first mobile device, converting a signed data block and the signed timestamp into at least one 2D barcode by the first mobile device; wherein the signed data block includes a data and a sender public key pre-signed by a first private key, displaying the 2D barcode by the first mobile device on a display unit for a second mobile device to scan and retrieve the 2D barcode, retrieving the signed data block and the signed timestamp by decoding the 2D barcode by the second mobile device, decoding the signed data block using a first public key to retrieve and verify the data and the sender public key by the second mobile device, decoding the signed timestamp using the verified sender public key to retrieve and verify the timestamp by the second mobile device and authenticating the validity of the data by determining if the current time falls within range of the verified timestamp by the second mobile device. Preferably, the data block is pre-signed by the steps of generating an asymmetric key pair which includes the sender private key and the sender public key by the first mobile device, transmitting the sender public key to a trusted party server by the first mobile data, encrypting the data and the sender public key using the first private key to form the signed data block by the trusted party server and transmitting the signed data block to the first mobile device by the trusted party server.
Preferably, the timestamp is a preset range of time for determining the validity of data.
Preferably, the mobile device further comprises means for establishing communication link with the trusted party server and the second mobile device.
Preferably, the mobile device further comprises built in mobile application or third party mobile application for facilitating the communication between the trusted party server and the mobile devices.
One skilled in the art will readily appreciate that the invention is well adapted to carry out the objects and obtain the ends and advantages mentioned, as well as those inherent therein. The embodiments described herein are not intended as limitations on the scope of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
For the purpose of facilitating an understanding of the invention, there is illustrated in the accompanying drawing the preferred embodiments from an inspection of which when considered in connection with the following description, the invention, its construction and operation and many of its advantages would be readily understood and appreciated.
Figure 1 is a flowchart illustrating the method for offline document transfer via
2D barcode.
Figure 2 is a diagram illustrating the enrolment of new sending mobile device.
DETAILED DESCRIPTION OF THE INVENTION
The invention will now be described in greater detail, by way of example, with reference to the drawings.
The invention provides a computer-implemented method and system to transfer any confidential data from one mobile device into multiple mobile devices via a 2D barcode as the method limits the validity period of the transferred confidential data such that the cloning of the confidential data is prevented. The 2D barcode is preferably an Aztec Code, QR code, AR code, NexCode or any combination thereof. Preferably, the confidential data includes social security number, credit card number, driver's license number, bank account number, protected health information or any combination thereof. The transferring of the confidential data is further protected by integrity validation and non-repudiation through signature verification between the sending and receiving devices. Preferably, the system is built up by a server and a plurality of mobile devices being linked together via a communication network. The server may comprises one or more heavy duty computers for processing the received data and transferring the received data to the mobile devices through the communication network, and any known devices or group of devices to provide sufficient capacity for data storing. Preferably, the mobile device is a personal digital assistants (PDA), smart phones, tablets, laptops, netbooks, phablets, phoblets, iPad, or any suitable means which capable of processing data, displaying data and scanning 2D barcode. Preferably, the mobile devices are categorised into two types, sender mobile devices and recipient mobile devices. Each sender mobile device is installed with a mobile application which is capable of encoding 2D-barcode containing sensitive information, whereas each recipient mobile device is installed with a mobile application which is capable of scanning and decoding the 2D-barcode from the sender mobile device. Graphical User Interface (GUI) is also provided to the types of mobile devices through the application for user to trigger a mode of operation.
The communication network is preferably a wireless network which may include but is not limited to a Code Division Multiple Access (CDMA) network, a General Packet Radio Service (GPRS) network for use in conjunction with Global System for Mobile Communication (GSM) network, and future third-generation (3G) network like Enhanced Data rates for GSM Evolution (EDGE) and Universal Mobile Telecommunications System (UMTS). It should be understood that although particular IP -based wireless networks have been described, the system could be utilized in any suitable type of wireless network.
Referring to Fig. 1, an enrolment process is illustrated. Every sender mobile devices will need to go through a one-time enrolment process to retrieve a signed data block containing verified information from a trusted party server. In step 101, a new sending mobile device 100 generates an asymmetric key pair, the key pair includes a sender private key and a sender public key. In step 102, the new sending mobile device 100 transmits the sender public key to a trusted party server for signing. In step 103, the trusted party server encrypts a data and the sender public key using a trusted party private key to form a signed data block. Lastly in step 104, the trusted party server transmits the signed data block back to the new sending mobile device 100 for the further data transferring process to be carried out.
Referring to Fig. 2, the method can be split into an encoding process and a decoding process. The encoding process includes the following steps. In step 201, a sending mobile device 100 encrypts a timestamp using a sender private key to form a signed timestamp. The term "timestamp" is refer to a preset range of time for the mobile device to determine the validity of data transferred. In step 202, the sending mobile device 100 converts a signed data block and timestamp into at least one 2D barcode, wherein the signed data block includes a data 200 and a sender public key pre-signed by the sender private key. In step 203, the sending mobile device 100 displays the 2D barcode on a display unit for a receiving mobile device to scan and retrieve the 2D barcode. The step 203 is where the encoding process ends and the starting of the decoding process. In step 204, the receiving mobile device retrieve the signed data block and the signed timestamp by decoding the 2D barcode. In steps 205 and 206, the receiving mobile device decodes the signed timestamp using the trusted party public key to retrieve and verify the data 200 and the sender public key. In step 207, the receiving mobile device decodes the signed timestamp using the verified sender public key to retrieve and verify the timestamp. Lastly in step 208, the receiving mobile device authenticates the validity of the data by determining if the current time falls within range of the verified timestamp.
The present disclosure includes as contained in the appended claims, as well as that of the foregoing description. Although this invention has been described in its preferred form with a degree of particularity, it is understood that the present disclosure of the preferred form has been made only by way of example and that numerous changes in the details of construction and the combination and arrangements of parts may be resorted to without departing from the scope of the invention.

Claims

1. A method for secure transmission of data (200) between two mobile devices via at least one 2D barcode comprising the steps of:
encrypting (201), by a first mobile device, a timestamp using a sender private key to form a signed timestamp;
converting (202), by the first mobile device, a signed data block and the signed timestamp into at least one 2D barcode; wherein the signed data block includes a data and a sender public key pre-signed by a first private key;
displaying (203), by the first mobile device, the 2D barcode on a display unit for a second mobile device to scan and retrieve the 2D barcode;
retrieving (204), by the second mobile device, the signed data block and the signed timestamp by decoding the 2D barcode;
decoding (205,206), by the second mobile device, the signed data block using a first public key to retrieve and verify the data and the sender public key;
decoding (207), by the second mobile device, the signed timestamp using the verified sender public key to retrieve and verify the timestamp; and
authenticating (208), by the second mobile device, validity of the data by determining if the current time falls within range of the verified timestamp.
2. A method as claimed in claim 1, wherein the data block is pre-signed by the following steps of:
generating (101), by the first mobile device, an asymmetric key pair which includes the sender private key and the sender public key;
transmitting (102), by the first mobile device, the sender public key to a trusted party server;
encrypting (103), by the trusted party server, the data and the sender public key using the first private key to form the signed data block; and
transmitting (104), by the trusted party server, the signed data block to the first mobile device.
3. A method as claimed in claim 1 or claim 2, wherein the timestamp is a preset range of time for determining the validity of data.
4. A method as claimed in anyone of claims 1 to 3, wherein the mobile device further comprises means for establishing communication link with the trusted party server and the second mobile device.
5. A method as claimed in anyone of claims 1 to 4, wherein the mobile device further comprises built in mobile application or third party mobile application for facilitating the communication between the trusted party server and the mobile devices.
PCT/MY2018/050061 2017-09-29 2018-09-26 Method for secured offline transfer of documents via dynamic two-dimensional barcode WO2019066640A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI2017703693 2017-09-29
MYPI2017703693 2017-09-29

Publications (1)

Publication Number Publication Date
WO2019066640A1 true WO2019066640A1 (en) 2019-04-04

Family

ID=65901862

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2018/050061 WO2019066640A1 (en) 2017-09-29 2018-09-26 Method for secured offline transfer of documents via dynamic two-dimensional barcode

Country Status (1)

Country Link
WO (1) WO2019066640A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130126619A1 (en) * 2011-11-18 2013-05-23 Unisys Corporation Method and system for certifying contact information
US20170255805A1 (en) * 2016-03-07 2017-09-07 ShoCard, Inc. Transferring Data Files Using a Series of Visual Codes

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130126619A1 (en) * 2011-11-18 2013-05-23 Unisys Corporation Method and system for certifying contact information
US20170255805A1 (en) * 2016-03-07 2017-09-07 ShoCard, Inc. Transferring Data Files Using a Series of Visual Codes

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Certificate Authority", WIKIPEDIA, 23 September 2017 (2017-09-23), XP055586048, Retrieved from the Internet <URL:https://en.wikipedia.org/w/index.php?title=Certificate_authority&otdid=802065569#Emple> [retrieved on 20181211] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114448714A (en) * 2022-02-25 2022-05-06 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium
CN114448714B (en) * 2022-02-25 2024-02-13 百果园技术(新加坡)有限公司 Data encryption and decryption method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN105099692B (en) Security verification method and device, server and terminal
EP2961094A1 (en) System and method for generating a random number
JP2018516030A (en) ID management service using blockchain
CN105450395A (en) Information encryption and decryption processing method and system
Purnomo et al. Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN110771190A (en) Controlling access to data
US20220114596A1 (en) Method, apparatus, and system for transmitting and receiving information by using qr code
CN111161056A (en) Method, system and equipment for improving transaction security of digital assets
US10552618B2 (en) Method and apparatus for transmission of visually encoded data
US11882214B2 (en) Technique for cryptographic document protection and verification
KR102567737B1 (en) Method providing secure message service and apparatus therefor
US20140298014A1 (en) Systems and methods for establishing trusted, secure communications from a mobile device to a multi-function device
WO2020165718A1 (en) Content encryption and in-place decryption using visually encoded cyphertext
CN103813321B (en) Agreement key based data processing method and mobile phone
Murkute et al. Online banking authentication system using qr-code and mobile OTP
CN104868994A (en) Collaboration secret key management method, device and system
CN110175471B (en) File storage method and system
WO2019066640A1 (en) Method for secured offline transfer of documents via dynamic two-dimensional barcode
Song et al. Security improvement of an RFID security protocol of ISO/IEC WD 29167-6
EP3996326A1 (en) Rfid reader system with encrypted communication
CN110011808B (en) Method and system with mechanism for protecting digital signature and server
CN112560050A (en) Secure electronic certificate issuing method and device, terminal device and storage medium
EP1691502A1 (en) Information encryption transmission/reception method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18860383

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18860383

Country of ref document: EP

Kind code of ref document: A1