SG10201408159TA - Authentication method - Google Patents

Authentication method

Info

Publication number
SG10201408159TA
SG10201408159TA SG10201408159TA SG10201408159TA SG10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA SG 10201408159T A SG10201408159T A SG 10201408159TA
Authority
SG
Singapore
Prior art keywords
authentication method
authentication
Prior art date
Application number
SG10201408159TA
Inventor
Kian Hwa Goh
Chun Wei Shaun Tan
Original Assignee
Vertical Software Asia Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vertical Software Asia Pte Ltd filed Critical Vertical Software Asia Pte Ltd
Priority to SG10201408159TA priority Critical patent/SG10201408159TA/en
Priority to US15/533,559 priority patent/US20170351866A1/en
Priority to JP2017530086A priority patent/JP6737532B2/en
Priority to PCT/SG2015/050434 priority patent/WO2016089303A1/en
Priority to CN201580075414.3A priority patent/CN107209817A/en
Publication of SG10201408159TA publication Critical patent/SG10201408159TA/en
Priority to PH12017501052A priority patent/PH12017501052A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
SG10201408159TA 2014-12-06 2014-12-06 Authentication method SG10201408159TA (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
SG10201408159TA SG10201408159TA (en) 2014-12-06 2014-12-06 Authentication method
US15/533,559 US20170351866A1 (en) 2014-12-06 2015-04-11 Authentication method
JP2017530086A JP6737532B2 (en) 2014-12-06 2015-11-04 Authentication method
PCT/SG2015/050434 WO2016089303A1 (en) 2014-12-06 2015-11-04 Authentication method
CN201580075414.3A CN107209817A (en) 2014-12-06 2015-11-04 Verification method
PH12017501052A PH12017501052A1 (en) 2014-12-06 2017-06-06 Authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201408159TA SG10201408159TA (en) 2014-12-06 2014-12-06 Authentication method

Publications (1)

Publication Number Publication Date
SG10201408159TA true SG10201408159TA (en) 2016-07-28

Family

ID=56092098

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201408159TA SG10201408159TA (en) 2014-12-06 2014-12-06 Authentication method

Country Status (6)

Country Link
US (1) US20170351866A1 (en)
JP (1) JP6737532B2 (en)
CN (1) CN107209817A (en)
PH (1) PH12017501052A1 (en)
SG (1) SG10201408159TA (en)
WO (1) WO2016089303A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10776512B2 (en) 2017-03-17 2020-09-15 Mend VIP, Inc. Process for collecting electronic protected health information without a login
US20210224419A1 (en) 2017-03-17 2021-07-22 Mend VIP, Inc. System and method for transferring data, scheduling appointments, and conducting conferences
JP7159571B2 (en) * 2018-03-06 2022-10-25 株式会社リコー Terminal equipment, programs and information processing systems
CN109687973A (en) * 2018-12-26 2019-04-26 法信公证云(厦门)科技有限公司 A kind of the novel of legal documents is sent to method and device
EP3846413B1 (en) * 2020-01-03 2022-09-21 Withings Method and apparatus for installing a network-connectable device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7159116B2 (en) * 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
JP2001229323A (en) * 2000-02-17 2001-08-24 Shachihata Inc Document processing system
JP2002099720A (en) * 2000-09-22 2002-04-05 Tokio Marine & Fire Insurance Co Ltd Ticket issuing terminal, reception server, method for issuing bill and recording medium
US20020099720A1 (en) * 2001-01-23 2002-07-25 Pradeep Bansal Directory search using additional information and resources
US20040215574A1 (en) * 2003-04-25 2004-10-28 First Data Corporation Systems and methods for verifying identities in transactions
JP2005122293A (en) * 2003-10-14 2005-05-12 Fumitaka Murayama Documentation management system
US7245279B2 (en) * 2003-12-04 2007-07-17 Xiao-Ping Wang Linear led array
US7287689B2 (en) * 2003-12-09 2007-10-30 First Data Corporation Systems and methods for assessing the risk of a financial transaction using authenticating marks
JP5166177B2 (en) * 2008-09-05 2013-03-21 キヤノン電子株式会社 Authentication processing apparatus, authentication processing method, management server apparatus, and control method of management server apparatus
US8189846B2 (en) * 2008-09-05 2012-05-29 Apple Inc. Vented in-the-ear headphone
US8677132B1 (en) * 2012-01-06 2014-03-18 Narus, Inc. Document security
CN104885082B (en) * 2013-04-27 2018-04-10 东莞宇龙通信科技有限公司 The hiding guard method of terminal and data message

Also Published As

Publication number Publication date
JP6737532B2 (en) 2020-08-12
US20170351866A1 (en) 2017-12-07
CN107209817A (en) 2017-09-26
WO2016089303A1 (en) 2016-06-09
PH12017501052A1 (en) 2018-03-05
JP2017538223A (en) 2017-12-21

Similar Documents

Publication Publication Date Title
GB201406151D0 (en) Method
GB201409558D0 (en) Method
GB201406155D0 (en) Method
GB201408119D0 (en) Method
EP3099004A4 (en) Authentication method
GB201413240D0 (en) Method
GB2525464B (en) Authentication method
GB201403470D0 (en) Method
GB2525930B (en) Method of authentication
GB201410022D0 (en) Method
SG10201408159TA (en) Authentication method
GB201410101D0 (en) Method
GB201412802D0 (en) Method
GB201411500D0 (en) Method
GB201409128D0 (en) Method
GB201412736D0 (en) Method
GB201412226D0 (en) Method
GB201409234D0 (en) Method
GB201409101D0 (en) Method
GB201413612D0 (en) Method
GB201408649D0 (en) Method
GB201407165D0 (en) An authentication method
GB201419894D0 (en) Method
GB201409648D0 (en) Authentication
GB201412356D0 (en) Method