SG10201408159TA - Authentication method - Google Patents
Authentication methodInfo
- Publication number
- SG10201408159TA SG10201408159TA SG10201408159TA SG10201408159TA SG10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA
- Authority
- SG
- Singapore
- Prior art keywords
- authentication method
- authentication
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201408159TA SG10201408159TA (en) | 2014-12-06 | 2014-12-06 | Authentication method |
US15/533,559 US20170351866A1 (en) | 2014-12-06 | 2015-04-11 | Authentication method |
JP2017530086A JP6737532B2 (en) | 2014-12-06 | 2015-11-04 | Authentication method |
PCT/SG2015/050434 WO2016089303A1 (en) | 2014-12-06 | 2015-11-04 | Authentication method |
CN201580075414.3A CN107209817A (en) | 2014-12-06 | 2015-11-04 | Verification method |
PH12017501052A PH12017501052A1 (en) | 2014-12-06 | 2017-06-06 | Authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201408159TA SG10201408159TA (en) | 2014-12-06 | 2014-12-06 | Authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201408159TA true SG10201408159TA (en) | 2016-07-28 |
Family
ID=56092098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201408159TA SG10201408159TA (en) | 2014-12-06 | 2014-12-06 | Authentication method |
Country Status (6)
Country | Link |
---|---|
US (1) | US20170351866A1 (en) |
JP (1) | JP6737532B2 (en) |
CN (1) | CN107209817A (en) |
PH (1) | PH12017501052A1 (en) |
SG (1) | SG10201408159TA (en) |
WO (1) | WO2016089303A1 (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10776512B2 (en) | 2017-03-17 | 2020-09-15 | Mend VIP, Inc. | Process for collecting electronic protected health information without a login |
US20210224419A1 (en) | 2017-03-17 | 2021-07-22 | Mend VIP, Inc. | System and method for transferring data, scheduling appointments, and conducting conferences |
JP7159571B2 (en) * | 2018-03-06 | 2022-10-25 | 株式会社リコー | Terminal equipment, programs and information processing systems |
CN109687973A (en) * | 2018-12-26 | 2019-04-26 | 法信公证云(厦门)科技有限公司 | A kind of the novel of legal documents is sent to method and device |
EP3846413B1 (en) * | 2020-01-03 | 2022-09-21 | Withings | Method and apparatus for installing a network-connectable device |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7159116B2 (en) * | 1999-12-07 | 2007-01-02 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
JP2001229323A (en) * | 2000-02-17 | 2001-08-24 | Shachihata Inc | Document processing system |
JP2002099720A (en) * | 2000-09-22 | 2002-04-05 | Tokio Marine & Fire Insurance Co Ltd | Ticket issuing terminal, reception server, method for issuing bill and recording medium |
US20020099720A1 (en) * | 2001-01-23 | 2002-07-25 | Pradeep Bansal | Directory search using additional information and resources |
US20040215574A1 (en) * | 2003-04-25 | 2004-10-28 | First Data Corporation | Systems and methods for verifying identities in transactions |
JP2005122293A (en) * | 2003-10-14 | 2005-05-12 | Fumitaka Murayama | Documentation management system |
US7245279B2 (en) * | 2003-12-04 | 2007-07-17 | Xiao-Ping Wang | Linear led array |
US7287689B2 (en) * | 2003-12-09 | 2007-10-30 | First Data Corporation | Systems and methods for assessing the risk of a financial transaction using authenticating marks |
JP5166177B2 (en) * | 2008-09-05 | 2013-03-21 | キヤノン電子株式会社 | Authentication processing apparatus, authentication processing method, management server apparatus, and control method of management server apparatus |
US8189846B2 (en) * | 2008-09-05 | 2012-05-29 | Apple Inc. | Vented in-the-ear headphone |
US8677132B1 (en) * | 2012-01-06 | 2014-03-18 | Narus, Inc. | Document security |
CN104885082B (en) * | 2013-04-27 | 2018-04-10 | 东莞宇龙通信科技有限公司 | The hiding guard method of terminal and data message |
-
2014
- 2014-12-06 SG SG10201408159TA patent/SG10201408159TA/en unknown
-
2015
- 2015-04-11 US US15/533,559 patent/US20170351866A1/en not_active Abandoned
- 2015-11-04 JP JP2017530086A patent/JP6737532B2/en active Active
- 2015-11-04 WO PCT/SG2015/050434 patent/WO2016089303A1/en active Application Filing
- 2015-11-04 CN CN201580075414.3A patent/CN107209817A/en active Pending
-
2017
- 2017-06-06 PH PH12017501052A patent/PH12017501052A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
JP6737532B2 (en) | 2020-08-12 |
US20170351866A1 (en) | 2017-12-07 |
CN107209817A (en) | 2017-09-26 |
WO2016089303A1 (en) | 2016-06-09 |
PH12017501052A1 (en) | 2018-03-05 |
JP2017538223A (en) | 2017-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB201406151D0 (en) | Method | |
GB201409558D0 (en) | Method | |
GB201406155D0 (en) | Method | |
GB201408119D0 (en) | Method | |
EP3099004A4 (en) | Authentication method | |
GB201413240D0 (en) | Method | |
GB2525464B (en) | Authentication method | |
GB201403470D0 (en) | Method | |
GB2525930B (en) | Method of authentication | |
GB201410022D0 (en) | Method | |
SG10201408159TA (en) | Authentication method | |
GB201410101D0 (en) | Method | |
GB201412802D0 (en) | Method | |
GB201411500D0 (en) | Method | |
GB201409128D0 (en) | Method | |
GB201412736D0 (en) | Method | |
GB201412226D0 (en) | Method | |
GB201409234D0 (en) | Method | |
GB201409101D0 (en) | Method | |
GB201413612D0 (en) | Method | |
GB201408649D0 (en) | Method | |
GB201407165D0 (en) | An authentication method | |
GB201419894D0 (en) | Method | |
GB201409648D0 (en) | Authentication | |
GB201412356D0 (en) | Method |