ATE398801T1 - Verfahren und system zum authentifizieren eines benutzers - Google Patents

Verfahren und system zum authentifizieren eines benutzers

Info

Publication number
ATE398801T1
ATE398801T1 AT04768538T AT04768538T ATE398801T1 AT E398801 T1 ATE398801 T1 AT E398801T1 AT 04768538 T AT04768538 T AT 04768538T AT 04768538 T AT04768538 T AT 04768538T AT E398801 T1 ATE398801 T1 AT E398801T1
Authority
AT
Austria
Prior art keywords
authentication
sources
authenticating
user
values
Prior art date
Application number
AT04768538T
Other languages
English (en)
Inventor
Robert Ghanea-Hercock
Original Assignee
British Telecomm
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecomm filed Critical British Telecomm
Application granted granted Critical
Publication of ATE398801T1 publication Critical patent/ATE398801T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
AT04768538T 2003-09-30 2004-09-17 Verfahren und system zum authentifizieren eines benutzers ATE398801T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0322876.4A GB0322876D0 (en) 2003-09-30 2003-09-30 Method and system for authenticating a user

Publications (1)

Publication Number Publication Date
ATE398801T1 true ATE398801T1 (de) 2008-07-15

Family

ID=29287123

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04768538T ATE398801T1 (de) 2003-09-30 2004-09-17 Verfahren und system zum authentifizieren eines benutzers

Country Status (7)

Country Link
US (1) US20070055871A1 (de)
EP (1) EP1668438B1 (de)
AT (1) ATE398801T1 (de)
CA (1) CA2538689A1 (de)
DE (1) DE602004014516D1 (de)
GB (1) GB0322876D0 (de)
WO (1) WO2005040998A1 (de)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102005023879B3 (de) * 2005-05-24 2006-12-28 Siemens Ag Verfahren zur Bewertung eines Objekts in einem Kommunikationsnetzwerk
US8225104B1 (en) * 2005-10-06 2012-07-17 Symantec Corporation Data access security
WO2008086299A2 (en) * 2007-01-08 2008-07-17 Skaf Mazen A System and method for tracking and rewarding users
JP5751029B2 (ja) * 2011-06-03 2015-07-22 株式会社リコー 認証装置、プログラムおよび記録媒体
US8850535B2 (en) * 2011-08-05 2014-09-30 Safefaces LLC Methods and systems for identity verification in a social network using ratings
US8850536B2 (en) * 2011-08-05 2014-09-30 Safefaces LLC Methods and systems for identity verification in a social network using ratings
US8973102B2 (en) 2012-06-14 2015-03-03 Ebay Inc. Systems and methods for authenticating a user and device
US9280679B2 (en) * 2013-12-31 2016-03-08 Google Inc. Tiered application permissions
US9256755B2 (en) 2013-12-31 2016-02-09 Google Inc. Notification of application permissions
CN104811306B (zh) * 2014-01-28 2019-07-19 西安西电捷通无线网络通信股份有限公司 实体鉴别方法、装置及系统
US10079687B2 (en) * 2015-04-13 2018-09-18 Ilantus Technologies Pvt. Ltd. System and method for password recovery using fuzzy logic
US10616196B1 (en) * 2015-09-24 2020-04-07 EMC IP Holding Company LLC User authentication with multiple authentication sources and non-binary authentication decisions
CN110392886A (zh) * 2017-04-11 2019-10-29 惠普发展公司,有限责任合伙企业 用户认证
US12126714B2 (en) * 2020-07-13 2024-10-22 Synopsys, Inc. Key protection using a noising and de-noising scheme

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884270A (en) * 1996-09-06 1999-03-16 Walker Asset Management Limited Partnership Method and system for facilitating an employment search incorporating user-controlled anonymous communications
US6026491A (en) * 1997-09-30 2000-02-15 Compaq Computer Corporation Challenge/response security architecture with fuzzy recognition of long passwords
DE60006935T2 (de) * 1999-02-11 2004-11-04 Rsa Security Inc., Bedford Ein fuzzy engagement schema
US6609198B1 (en) * 1999-08-05 2003-08-19 Sun Microsystems, Inc. Log-on service providing credential level change without loss of session continuity
AU2001251202A1 (en) * 2000-04-07 2001-10-23 Rsa Security, Inc. System and method for authenticating a user
US7107535B2 (en) * 2000-05-24 2006-09-12 Clickfox, Llc System and method for providing customized web pages
US20020049848A1 (en) * 2000-06-12 2002-04-25 Shaw-Yueh Lin Updatable digital media system and method of use thereof
EP1340149A4 (de) * 2000-10-30 2005-10-19 Raf Technology Inc Verifikations-engine zur benutzerauthentifizierung

Also Published As

Publication number Publication date
EP1668438A1 (de) 2006-06-14
EP1668438B1 (de) 2008-06-18
WO2005040998A1 (en) 2005-05-06
US20070055871A1 (en) 2007-03-08
DE602004014516D1 (de) 2008-07-31
CA2538689A1 (en) 2005-05-06
GB0322876D0 (en) 2003-10-29

Similar Documents

Publication Publication Date Title
ATE398801T1 (de) Verfahren und system zum authentifizieren eines benutzers
ATE391951T1 (de) Verfahren und vorrichtung zum authentifizieren von benutzern und websites
ATE471022T1 (de) Verfahren und vorrichtungen zur erkennung eines benutzers für suborte eines netzwerkortes
GB201015212D0 (en) Online user authentication
DE60112044D1 (de) Vorrichtung und verfahren zur beurteilung der verletzlichkeit des netzsicherheit
ATE415024T1 (de) Verfahren zur aktualisierung eines paarweisen master-schlüssels
ATE532289T1 (de) System und verfahren für computersicherheit unter verwendung mehrerer käfige
HUP0204161A2 (en) Method of controlling access to a resource in a computer system by a body of code and computer system for executing the method
ATE436054T1 (de) Systeme und verfahren zur validierung von vorlagen
DE60138116D1 (de) Beurteilung des zustandes eines gelenkes und planung einer behandlung
ATE491987T1 (de) Verfahren und vorrichtung zur erzeugung von zusammengesetzen benutzeroberflächen
ATE519170T1 (de) Automatisierter vorlagenerzeugungsalgorithmus für eine implantierbare einrichtung
ATE347706T1 (de) Verfahren und vorrichtung zur identifizierung eines authorisierten person mittels nicht vorhersagbaren einmal benutzbaren passwortern
DE50001467D1 (de) Verfahren und vorrichtung zum einbringen von informationen in einen datenstrom sowie verfahren und vorrichtung zum codieren eines audiosignals
TW200520508A (en) Authentication system
WO2017200239A3 (ko) 지문 정보를 포함하는 터치 입력에 기반한 사용자 인증 방법 및 장치
MXPA05008137A (es) Antagonistas y agonistas de 5ht7.
WO2005025128A8 (de) Verfahren zum signieren einer datenmenge in einem public-key-system sowie ein datenverarbeitungssystem zur durchführung des verfahrens
Krantz Makten over regionen: En idekritisk studie av svensk regiondebatt, 1963--1996.
DE602004012845D1 (de) Verfahren, computerprogrammprodukte und vorrichtung zur überprüfung der identität
ATE381070T1 (de) Verfahren und einrichtungen zur identitätsprüfung
Ogiela et al. Bio-inspired approaches for secret data sharing techniques
Hamdan et al. The fitting of binned data clustering to imprecise data
Kostoglou Cortical connectivity in people with Spinal Cord Injury during attempted arm and hand movements
Pollack et al. Shaping collective behavior: an exploratory design approach

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties