ATE398801T1 - Verfahren und system zum authentifizieren eines benutzers - Google Patents
Verfahren und system zum authentifizieren eines benutzersInfo
- Publication number
- ATE398801T1 ATE398801T1 AT04768538T AT04768538T ATE398801T1 AT E398801 T1 ATE398801 T1 AT E398801T1 AT 04768538 T AT04768538 T AT 04768538T AT 04768538 T AT04768538 T AT 04768538T AT E398801 T1 ATE398801 T1 AT E398801T1
- Authority
- AT
- Austria
- Prior art keywords
- authentication
- sources
- authenticating
- user
- values
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Collating Specific Patterns (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0322876.4A GB0322876D0 (en) | 2003-09-30 | 2003-09-30 | Method and system for authenticating a user |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE398801T1 true ATE398801T1 (de) | 2008-07-15 |
Family
ID=29287123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT04768538T ATE398801T1 (de) | 2003-09-30 | 2004-09-17 | Verfahren und system zum authentifizieren eines benutzers |
Country Status (7)
Country | Link |
---|---|
US (1) | US20070055871A1 (de) |
EP (1) | EP1668438B1 (de) |
AT (1) | ATE398801T1 (de) |
CA (1) | CA2538689A1 (de) |
DE (1) | DE602004014516D1 (de) |
GB (1) | GB0322876D0 (de) |
WO (1) | WO2005040998A1 (de) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102005023879B3 (de) * | 2005-05-24 | 2006-12-28 | Siemens Ag | Verfahren zur Bewertung eines Objekts in einem Kommunikationsnetzwerk |
US8225104B1 (en) * | 2005-10-06 | 2012-07-17 | Symantec Corporation | Data access security |
WO2008086299A2 (en) * | 2007-01-08 | 2008-07-17 | Skaf Mazen A | System and method for tracking and rewarding users |
JP5751029B2 (ja) * | 2011-06-03 | 2015-07-22 | 株式会社リコー | 認証装置、プログラムおよび記録媒体 |
US8850535B2 (en) * | 2011-08-05 | 2014-09-30 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
US8850536B2 (en) * | 2011-08-05 | 2014-09-30 | Safefaces LLC | Methods and systems for identity verification in a social network using ratings |
US8973102B2 (en) | 2012-06-14 | 2015-03-03 | Ebay Inc. | Systems and methods for authenticating a user and device |
US9280679B2 (en) * | 2013-12-31 | 2016-03-08 | Google Inc. | Tiered application permissions |
US9256755B2 (en) | 2013-12-31 | 2016-02-09 | Google Inc. | Notification of application permissions |
CN104811306B (zh) * | 2014-01-28 | 2019-07-19 | 西安西电捷通无线网络通信股份有限公司 | 实体鉴别方法、装置及系统 |
US10079687B2 (en) * | 2015-04-13 | 2018-09-18 | Ilantus Technologies Pvt. Ltd. | System and method for password recovery using fuzzy logic |
US10616196B1 (en) * | 2015-09-24 | 2020-04-07 | EMC IP Holding Company LLC | User authentication with multiple authentication sources and non-binary authentication decisions |
CN110392886A (zh) * | 2017-04-11 | 2019-10-29 | 惠普发展公司,有限责任合伙企业 | 用户认证 |
US12126714B2 (en) * | 2020-07-13 | 2024-10-22 | Synopsys, Inc. | Key protection using a noising and de-noising scheme |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884270A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for facilitating an employment search incorporating user-controlled anonymous communications |
US6026491A (en) * | 1997-09-30 | 2000-02-15 | Compaq Computer Corporation | Challenge/response security architecture with fuzzy recognition of long passwords |
DE60006935T2 (de) * | 1999-02-11 | 2004-11-04 | Rsa Security Inc., Bedford | Ein fuzzy engagement schema |
US6609198B1 (en) * | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
AU2001251202A1 (en) * | 2000-04-07 | 2001-10-23 | Rsa Security, Inc. | System and method for authenticating a user |
US7107535B2 (en) * | 2000-05-24 | 2006-09-12 | Clickfox, Llc | System and method for providing customized web pages |
US20020049848A1 (en) * | 2000-06-12 | 2002-04-25 | Shaw-Yueh Lin | Updatable digital media system and method of use thereof |
EP1340149A4 (de) * | 2000-10-30 | 2005-10-19 | Raf Technology Inc | Verifikations-engine zur benutzerauthentifizierung |
-
2003
- 2003-09-30 GB GBGB0322876.4A patent/GB0322876D0/en not_active Ceased
-
2004
- 2004-09-17 AT AT04768538T patent/ATE398801T1/de not_active IP Right Cessation
- 2004-09-17 CA CA002538689A patent/CA2538689A1/en not_active Abandoned
- 2004-09-17 WO PCT/GB2004/003992 patent/WO2005040998A1/en active IP Right Grant
- 2004-09-17 US US10/572,810 patent/US20070055871A1/en not_active Abandoned
- 2004-09-17 DE DE602004014516T patent/DE602004014516D1/de not_active Expired - Lifetime
- 2004-09-17 EP EP04768538A patent/EP1668438B1/de not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
EP1668438A1 (de) | 2006-06-14 |
EP1668438B1 (de) | 2008-06-18 |
WO2005040998A1 (en) | 2005-05-06 |
US20070055871A1 (en) | 2007-03-08 |
DE602004014516D1 (de) | 2008-07-31 |
CA2538689A1 (en) | 2005-05-06 |
GB0322876D0 (en) | 2003-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE398801T1 (de) | Verfahren und system zum authentifizieren eines benutzers | |
ATE391951T1 (de) | Verfahren und vorrichtung zum authentifizieren von benutzern und websites | |
ATE471022T1 (de) | Verfahren und vorrichtungen zur erkennung eines benutzers für suborte eines netzwerkortes | |
GB201015212D0 (en) | Online user authentication | |
DE60112044D1 (de) | Vorrichtung und verfahren zur beurteilung der verletzlichkeit des netzsicherheit | |
ATE415024T1 (de) | Verfahren zur aktualisierung eines paarweisen master-schlüssels | |
ATE532289T1 (de) | System und verfahren für computersicherheit unter verwendung mehrerer käfige | |
HUP0204161A2 (en) | Method of controlling access to a resource in a computer system by a body of code and computer system for executing the method | |
ATE436054T1 (de) | Systeme und verfahren zur validierung von vorlagen | |
DE60138116D1 (de) | Beurteilung des zustandes eines gelenkes und planung einer behandlung | |
ATE491987T1 (de) | Verfahren und vorrichtung zur erzeugung von zusammengesetzen benutzeroberflächen | |
ATE519170T1 (de) | Automatisierter vorlagenerzeugungsalgorithmus für eine implantierbare einrichtung | |
ATE347706T1 (de) | Verfahren und vorrichtung zur identifizierung eines authorisierten person mittels nicht vorhersagbaren einmal benutzbaren passwortern | |
DE50001467D1 (de) | Verfahren und vorrichtung zum einbringen von informationen in einen datenstrom sowie verfahren und vorrichtung zum codieren eines audiosignals | |
TW200520508A (en) | Authentication system | |
WO2017200239A3 (ko) | 지문 정보를 포함하는 터치 입력에 기반한 사용자 인증 방법 및 장치 | |
MXPA05008137A (es) | Antagonistas y agonistas de 5ht7. | |
WO2005025128A8 (de) | Verfahren zum signieren einer datenmenge in einem public-key-system sowie ein datenverarbeitungssystem zur durchführung des verfahrens | |
Krantz | Makten over regionen: En idekritisk studie av svensk regiondebatt, 1963--1996. | |
DE602004012845D1 (de) | Verfahren, computerprogrammprodukte und vorrichtung zur überprüfung der identität | |
ATE381070T1 (de) | Verfahren und einrichtungen zur identitätsprüfung | |
Ogiela et al. | Bio-inspired approaches for secret data sharing techniques | |
Hamdan et al. | The fitting of binned data clustering to imprecise data | |
Kostoglou | Cortical connectivity in people with Spinal Cord Injury during attempted arm and hand movements | |
Pollack et al. | Shaping collective behavior: an exploratory design approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |