SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS

Systems, devices, methods, and computer readable media are provided in various embodiments having regard to authentication using secure tokens, in accordance with various embodiments. An individual's personal information is encapsulated into transformed digitally signed tokens, which can then b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: SHAIKH, Mohammad Abuzar, POURTABATABAIE, Arya, ORTIZ, Edison U, WILKINSON, Sarah Rachel Waigh Yean, SALTER, Margaret Inez, VINTILA, Iustina-Miruna
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator SHAIKH, Mohammad Abuzar
POURTABATABAIE, Arya
ORTIZ, Edison U
WILKINSON, Sarah Rachel Waigh Yean
SALTER, Margaret Inez
VINTILA, Iustina-Miruna
description Systems, devices, methods, and computer readable media are provided in various embodiments having regard to authentication using secure tokens, in accordance with various embodiments. An individual's personal information is encapsulated into transformed digitally signed tokens, which can then be stored in a secure data storage (e.g., a "personal information bank"). The digitally signed tokens can include blended characteristics of the individual (e.g., 2D/3D facial representation, speech patterns) that are combined with digital signatures obtained from cryptographic keys (e.g., private keys) associated with corroborating trusted entities (e.g., a government, a bank) or organizations of which the individual purports to be a member of (e.g., a dog-walking service).
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2024283654A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2024283654A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2024283654A13</originalsourceid><addsrcrecordid>eNrjZDAJjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIdnUODXJVCPH3dvXzjHJ1UXAOcnVx9QvxdPQJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGJkYWxmamJo6GxsSpAgB3aih_</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS</title><source>esp@cenet</source><creator>SHAIKH, Mohammad Abuzar ; POURTABATABAIE, Arya ; ORTIZ, Edison U ; WILKINSON, Sarah Rachel Waigh Yean ; SALTER, Margaret Inez ; VINTILA, Iustina-Miruna</creator><creatorcontrib>SHAIKH, Mohammad Abuzar ; POURTABATABAIE, Arya ; ORTIZ, Edison U ; WILKINSON, Sarah Rachel Waigh Yean ; SALTER, Margaret Inez ; VINTILA, Iustina-Miruna</creatorcontrib><description>Systems, devices, methods, and computer readable media are provided in various embodiments having regard to authentication using secure tokens, in accordance with various embodiments. An individual's personal information is encapsulated into transformed digitally signed tokens, which can then be stored in a secure data storage (e.g., a "personal information bank"). The digitally signed tokens can include blended characteristics of the individual (e.g., 2D/3D facial representation, speech patterns) that are combined with digital signatures obtained from cryptographic keys (e.g., private keys) associated with corroborating trusted entities (e.g., a government, a bank) or organizations of which the individual purports to be a member of (e.g., a dog-walking service).</description><language>eng</language><subject>ACOUSTICS ; CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; MUSICAL INSTRUMENTS ; PHYSICS ; SPEECH ANALYSIS OR SYNTHESIS ; SPEECH OR AUDIO CODING OR DECODING ; SPEECH OR VOICE PROCESSING ; SPEECH RECOGNITION ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240822&amp;DB=EPODOC&amp;CC=US&amp;NR=2024283654A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25555,76308</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240822&amp;DB=EPODOC&amp;CC=US&amp;NR=2024283654A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>SHAIKH, Mohammad Abuzar</creatorcontrib><creatorcontrib>POURTABATABAIE, Arya</creatorcontrib><creatorcontrib>ORTIZ, Edison U</creatorcontrib><creatorcontrib>WILKINSON, Sarah Rachel Waigh Yean</creatorcontrib><creatorcontrib>SALTER, Margaret Inez</creatorcontrib><creatorcontrib>VINTILA, Iustina-Miruna</creatorcontrib><title>SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS</title><description>Systems, devices, methods, and computer readable media are provided in various embodiments having regard to authentication using secure tokens, in accordance with various embodiments. An individual's personal information is encapsulated into transformed digitally signed tokens, which can then be stored in a secure data storage (e.g., a "personal information bank"). The digitally signed tokens can include blended characteristics of the individual (e.g., 2D/3D facial representation, speech patterns) that are combined with digital signatures obtained from cryptographic keys (e.g., private keys) associated with corroborating trusted entities (e.g., a government, a bank) or organizations of which the individual purports to be a member of (e.g., a dog-walking service).</description><subject>ACOUSTICS</subject><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>MUSICAL INSTRUMENTS</subject><subject>PHYSICS</subject><subject>SPEECH ANALYSIS OR SYNTHESIS</subject><subject>SPEECH OR AUDIO CODING OR DECODING</subject><subject>SPEECH OR VOICE PROCESSING</subject><subject>SPEECH RECOGNITION</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAJjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1IIdnUODXJVCPH3dvXzjHJ1UXAOcnVx9QvxdPQJ5mFgTUvMKU7lhdLcDMpuriHOHrqpBfnxqcUFicmpeakl8aHBRgZGJkYWxmamJo6GxsSpAgB3aih_</recordid><startdate>20240822</startdate><enddate>20240822</enddate><creator>SHAIKH, Mohammad Abuzar</creator><creator>POURTABATABAIE, Arya</creator><creator>ORTIZ, Edison U</creator><creator>WILKINSON, Sarah Rachel Waigh Yean</creator><creator>SALTER, Margaret Inez</creator><creator>VINTILA, Iustina-Miruna</creator><scope>EVB</scope></search><sort><creationdate>20240822</creationdate><title>SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS</title><author>SHAIKH, Mohammad Abuzar ; POURTABATABAIE, Arya ; ORTIZ, Edison U ; WILKINSON, Sarah Rachel Waigh Yean ; SALTER, Margaret Inez ; VINTILA, Iustina-Miruna</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2024283654A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ACOUSTICS</topic><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>MUSICAL INSTRUMENTS</topic><topic>PHYSICS</topic><topic>SPEECH ANALYSIS OR SYNTHESIS</topic><topic>SPEECH OR AUDIO CODING OR DECODING</topic><topic>SPEECH OR VOICE PROCESSING</topic><topic>SPEECH RECOGNITION</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>SHAIKH, Mohammad Abuzar</creatorcontrib><creatorcontrib>POURTABATABAIE, Arya</creatorcontrib><creatorcontrib>ORTIZ, Edison U</creatorcontrib><creatorcontrib>WILKINSON, Sarah Rachel Waigh Yean</creatorcontrib><creatorcontrib>SALTER, Margaret Inez</creatorcontrib><creatorcontrib>VINTILA, Iustina-Miruna</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>SHAIKH, Mohammad Abuzar</au><au>POURTABATABAIE, Arya</au><au>ORTIZ, Edison U</au><au>WILKINSON, Sarah Rachel Waigh Yean</au><au>SALTER, Margaret Inez</au><au>VINTILA, Iustina-Miruna</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS</title><date>2024-08-22</date><risdate>2024</risdate><abstract>Systems, devices, methods, and computer readable media are provided in various embodiments having regard to authentication using secure tokens, in accordance with various embodiments. An individual's personal information is encapsulated into transformed digitally signed tokens, which can then be stored in a secure data storage (e.g., a "personal information bank"). The digitally signed tokens can include blended characteristics of the individual (e.g., 2D/3D facial representation, speech patterns) that are combined with digital signatures obtained from cryptographic keys (e.g., private keys) associated with corroborating trusted entities (e.g., a government, a bank) or organizations of which the individual purports to be a member of (e.g., a dog-walking service).</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2024283654A1
source esp@cenet
subjects ACOUSTICS
CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
MUSICAL INSTRUMENTS
PHYSICS
SPEECH ANALYSIS OR SYNTHESIS
SPEECH OR AUDIO CODING OR DECODING
SPEECH OR VOICE PROCESSING
SPEECH RECOGNITION
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title SYSTEMS AND METHODS FOR SECURE TOKENIZED CREDENTIALS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T21%3A31%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=SHAIKH,%20Mohammad%20Abuzar&rft.date=2024-08-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2024283654A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true