ATE527615T1 - System und verfahren zum verhindern von identitätsdiebstahl durch verwendung einer sicheren datenverarbeitungseinrichtung - Google Patents

System und verfahren zum verhindern von identitätsdiebstahl durch verwendung einer sicheren datenverarbeitungseinrichtung

Info

Publication number
ATE527615T1
ATE527615T1 AT04798821T AT04798821T ATE527615T1 AT E527615 T1 ATE527615 T1 AT E527615T1 AT 04798821 T AT04798821 T AT 04798821T AT 04798821 T AT04798821 T AT 04798821T AT E527615 T1 ATE527615 T1 AT E527615T1
Authority
AT
Austria
Prior art keywords
computer
user
connection
network
secure
Prior art date
Application number
AT04798821T
Other languages
English (en)
Inventor
Asad Mahboob Ali
Hongqian Karen Lu
Original Assignee
Gemalto Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto Sa filed Critical Gemalto Sa
Application granted granted Critical
Publication of ATE527615T1 publication Critical patent/ATE527615T1/de

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
AT04798821T 2003-11-13 2004-11-10 System und verfahren zum verhindern von identitätsdiebstahl durch verwendung einer sicheren datenverarbeitungseinrichtung ATE527615T1 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US52002203P 2003-11-13 2003-11-13
US10/750,430 US7392534B2 (en) 2003-09-29 2003-12-31 System and method for preventing identity theft using a secure computing device
PCT/IB2004/003681 WO2005048087A1 (en) 2003-11-13 2004-11-10 System and method for preventing identity theft using a secure computing device.

Publications (1)

Publication Number Publication Date
ATE527615T1 true ATE527615T1 (de) 2011-10-15

Family

ID=34594985

Family Applications (1)

Application Number Title Priority Date Filing Date
AT04798821T ATE527615T1 (de) 2003-11-13 2004-11-10 System und verfahren zum verhindern von identitätsdiebstahl durch verwendung einer sicheren datenverarbeitungseinrichtung

Country Status (6)

Country Link
US (1) US7392534B2 (de)
EP (1) EP1716468B1 (de)
JP (1) JP4949032B2 (de)
AT (1) ATE527615T1 (de)
ES (1) ES2378298T3 (de)
WO (1) WO2005048087A1 (de)

Families Citing this family (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8209753B2 (en) * 2001-06-15 2012-06-26 Activcard, Inc. Universal secure messaging for remote security tokens
US20040218762A1 (en) * 2003-04-29 2004-11-04 Eric Le Saint Universal secure messaging for cryptographic modules
US7840459B1 (en) * 2003-05-22 2010-11-23 Visa U.S.A. Inc. Method and apparatus for identity theft prevention
US20050269401A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US8307413B2 (en) * 2004-08-24 2012-11-06 Gemalto Sa Personal token and a method for controlled authentication
DE102004044454A1 (de) * 2004-09-14 2006-03-30 Giesecke & Devrient Gmbh Tragbares Gerät zur Freischaltung eines Zugangs
US9537768B2 (en) 2004-09-30 2017-01-03 Rockwell Automation Technologies, Inc. System that provides for removal of middleware in an industrial automation environment
US8160244B2 (en) * 2004-10-01 2012-04-17 Broadcom Corporation Stateless hardware security module
US20070229350A1 (en) * 2005-02-01 2007-10-04 Scalisi Joseph F Apparatus and Method for Providing Location Information on Individuals and Objects using Tracking Devices
US7598855B2 (en) 2005-02-01 2009-10-06 Location Based Technologies, Inc. Apparatus and method for locating individuals and objects using tracking devices
US7581678B2 (en) 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
JP4961798B2 (ja) * 2005-05-20 2012-06-27 株式会社日立製作所 暗号化通信方法及びシステム
US8505075B2 (en) 2005-07-14 2013-08-06 Marble Security, Inc. Enterprise device recovery
US9282081B2 (en) 2005-07-28 2016-03-08 Vaporstream Incorporated Reduced traceability electronic message system and method
US7610345B2 (en) 2005-07-28 2009-10-27 Vaporstream Incorporated Reduced traceability electronic message system and method
US20070037552A1 (en) * 2005-08-11 2007-02-15 Timothy Lee Method and system for performing two factor mutual authentication
US20070067620A1 (en) * 2005-09-06 2007-03-22 Ironkey, Inc. Systems and methods for third-party authentication
US8117255B2 (en) * 2005-09-07 2012-02-14 Sap Ag Systems and methods for smart client remote data monitoring
US7861077B1 (en) * 2005-10-07 2010-12-28 Multiple Shift Key, Inc. Secure authentication and transaction system and method
EP1798943A1 (de) * 2005-12-13 2007-06-20 Axalto SA SIM mit Nachrichten-Client
ES2303422B1 (es) * 2005-12-19 2009-06-23 Universidad De Zaragoza Sistema y procedimiento de registro y certificacion de la actividad y/o comunicacion entre terminales.
US8566608B2 (en) * 2006-02-02 2013-10-22 Strikeforce Technologies, Inc. Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser
US8434137B2 (en) * 2006-03-22 2013-04-30 Gemalto Sa Method of securely logging into remote servers
US9112897B2 (en) * 2006-03-30 2015-08-18 Advanced Network Technology Laboratories Pte Ltd. System and method for securing a network session
US8434148B2 (en) * 2006-03-30 2013-04-30 Advanced Network Technology Laboratories Pte Ltd. System and method for providing transactional security for an end-user device
WO2007148768A1 (en) * 2006-06-23 2007-12-27 Semiconductor Energy Laboratory Co., Ltd. Personal data management system and nonvolatile memory card
US20080103798A1 (en) * 2006-10-25 2008-05-01 Domenikos Steven D Identity Protection
US8359278B2 (en) 2006-10-25 2013-01-22 IndentityTruth, Inc. Identity protection
US7991158B2 (en) 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
EP2115569A1 (de) * 2007-01-26 2009-11-11 Verdasys, Inc. Versicherung von trusted-transaktionen mit gefährdeten kundenmaschinen
US20080244208A1 (en) * 2007-03-30 2008-10-02 Narendra Siva G Memory card hidden command protocol
US9111189B2 (en) * 2007-10-31 2015-08-18 Location Based Technologies, Inc. Apparatus and method for manufacturing an electronic package
US8102256B2 (en) 2008-01-06 2012-01-24 Location Based Technologies Inc. Apparatus and method for determining location and tracking coordinates of a tracking device
US8224355B2 (en) * 2007-11-06 2012-07-17 Location Based Technologies Inc. System and method for improved communication bandwidth utilization when monitoring location information
US8244468B2 (en) * 2007-11-06 2012-08-14 Location Based Technology Inc. System and method for creating and managing a personalized web interface for monitoring location information on individuals and objects using tracking devices
US9118665B2 (en) 2007-04-18 2015-08-25 Imation Corp. Authentication system and method
US8925073B2 (en) * 2007-05-18 2014-12-30 International Business Machines Corporation Method and system for preventing password theft through unauthorized keylogging
WO2009001197A2 (en) 2007-06-22 2008-12-31 Gemalto S.A. A method of preventing web browser extensions from hijacking user information
CN101119232A (zh) * 2007-08-09 2008-02-06 北京艾科网信科技有限公司 日志记录方法及其记录系统
US8712049B2 (en) * 2007-09-11 2014-04-29 International Business Machines Corporation System for implementing dynamic pseudorandom keyboard remapping
US8712050B2 (en) * 2007-09-11 2014-04-29 International Business Machines Corporation Method for implementing dynamic pseudorandom keyboard remapping
US8654974B2 (en) * 2007-10-18 2014-02-18 Location Based Technologies, Inc. Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
DE102007050836A1 (de) * 2007-10-24 2009-04-30 Giesecke & Devrient Gmbh Internet-Smart-Card
US9741027B2 (en) * 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US20090172388A1 (en) * 2007-12-31 2009-07-02 Intel Corporation Personal guard
US20090172389A1 (en) * 2007-12-31 2009-07-02 Intel Corporation Secure client/server transactions
US20090172396A1 (en) * 2007-12-31 2009-07-02 Intel Corporation Secure input
US8914901B2 (en) * 2008-01-11 2014-12-16 Microsoft Corporation Trusted storage and display
DE102008004384A1 (de) * 2008-01-15 2009-07-16 Giesecke & Devrient Gmbh Sichere Datenkommunikation
US8225404B2 (en) 2008-01-22 2012-07-17 Wontok, Inc. Trusted secure desktop
US8918865B2 (en) 2008-01-22 2014-12-23 Wontok, Inc. System and method for protecting data accessed through a network connection
US9596250B2 (en) * 2009-04-22 2017-03-14 Trusted Knight Corporation System and method for protecting against point of sale malware using memory scraping
US20100033310A1 (en) * 2008-08-08 2010-02-11 Narendra Siva G Power negotation for small rfid card
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
WO2010026591A1 (en) * 2008-09-04 2010-03-11 Walletex Microelectronics Ltd. Method and apparatus for carrying out secure electronic communication
US9928379B1 (en) * 2008-09-08 2018-03-27 Steven Miles Hoffer Methods using mediation software for rapid health care support over a secured wireless network; methods of composition; and computer program products therefor
WO2010031698A2 (de) 2008-09-22 2010-03-25 Bundesdruckerei Gmbh Verfahren zur speicherung von daten, computerprogrammprodukt, id-token und computersystem
US20100146605A1 (en) * 2008-12-04 2010-06-10 Pitney Bowes Inc. Method and system for providing secure online authentication
US20100153275A1 (en) * 2008-12-16 2010-06-17 Palo Alto Research Center Incorporated Method and apparatus for throttling access using small payments
JP4814965B2 (ja) * 2009-02-17 2011-11-16 本田技研工業株式会社 エゼクタおよびこのエゼクタを用いた燃料電池システム
WO2010099243A1 (en) * 2009-02-24 2010-09-02 Doxo, Inc. Provider relationship management system that facilitates interaction between an individual and organizations
US8231061B2 (en) * 2009-02-24 2012-07-31 Tyfone, Inc Contactless device with miniaturized antenna
US20100293090A1 (en) * 2009-05-14 2010-11-18 Domenikos Steven D Systems, methods, and apparatus for determining fraud probability scores and identity health scores
US8713325B2 (en) 2011-04-19 2014-04-29 Authentify Inc. Key management using quasi out of band authentication architecture
US8423783B2 (en) * 2009-11-27 2013-04-16 International Business Machines Corporation Secure PIN management of a user trusted device
US10535044B2 (en) * 2010-01-08 2020-01-14 Intuit Inc. Authentication of transactions in a network
US8438288B2 (en) 2010-02-17 2013-05-07 Microsoft Corporation Device-pairing by reading an address provided in device-readable form
US9767474B1 (en) 2010-03-23 2017-09-19 Amazon Technologies, Inc. Transaction tracking and incentives
US20110238476A1 (en) * 2010-03-23 2011-09-29 Michael Carr Location-based Coupons and Mobile Devices
US9652802B1 (en) 2010-03-24 2017-05-16 Consumerinfo.Com, Inc. Indirect monitoring and reporting of a user's credit data
US8595840B1 (en) 2010-06-01 2013-11-26 Trend Micro Incorporated Detection of computer network data streams from a malware and its variants
EP2426652A1 (de) * 2010-09-06 2012-03-07 Gemalto SA Vereinfachtes Verfahren zur Personalisierung von Chipkarten, und entsprechende Vorrichtung
WO2012088344A1 (en) * 2010-12-21 2012-06-28 Visa International Service Association Transaction rate processing apparatuses, methods and systems
FR2971350B1 (fr) * 2011-02-08 2015-08-21 Morpho Procede et dispositif de connexion a un service distant depuis un dispositif hote
WO2012112781A1 (en) 2011-02-18 2012-08-23 Csidentity Corporation System and methods for identifying compromised personally identifiable information on the internet
US9832183B2 (en) 2011-04-19 2017-11-28 Early Warning Services, Llc Key management using quasi out of band authentication architecture
US9965768B1 (en) 2011-05-19 2018-05-08 Amazon Technologies, Inc. Location-based mobile advertising
US8819793B2 (en) 2011-09-20 2014-08-26 Csidentity Corporation Systems and methods for secure and efficient enrollment into a federation which utilizes a biometric repository
US11030562B1 (en) 2011-10-31 2021-06-08 Consumerinfo.Com, Inc. Pre-data breach monitoring
US8812387B1 (en) 2013-03-14 2014-08-19 Csidentity Corporation System and method for identifying related credit inquiries
US9367339B2 (en) 2013-07-01 2016-06-14 Amazon Technologies, Inc. Cryptographically attested resources for hosting virtual machines
US9407654B2 (en) * 2014-03-20 2016-08-02 Microsoft Technology Licensing, Llc Providing multi-level password and phishing protection
US9942196B2 (en) 2014-05-01 2018-04-10 The Johns Hopkins University Canonical network isolator component
US10339527B1 (en) 2014-10-31 2019-07-02 Experian Information Solutions, Inc. System and architecture for electronic fraud detection
US10382961B2 (en) * 2014-12-05 2019-08-13 Ademco Inc. System and method of preventing unauthorized SIM card usage
US11151468B1 (en) 2015-07-02 2021-10-19 Experian Information Solutions, Inc. Behavior analysis using distributed representations of event data
KR102366809B1 (ko) * 2015-07-17 2022-02-23 삼성전자주식회사 애플리케이션 프로세서를 인증하기 위한 디스플레이 드라이버 집적 회로 그리고 이를 포함하는 모바일 장치
PH22016000048Y1 (en) * 2016-01-13 2016-02-05 Renato C Valencia A system for proximate and/or remote electronic transaction authorization based on user authentication and/or biometric identification
US10050957B1 (en) 2016-04-08 2018-08-14 Parallels International Gmbh Smart card redirection
US10862927B2 (en) 2017-05-15 2020-12-08 Forcepoint, LLC Dividing events into sessions during adaptive trust profile operations
US10999297B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Using expected behavior of an entity when prepopulating an adaptive trust profile
US10129269B1 (en) 2017-05-15 2018-11-13 Forcepoint, LLC Managing blockchain access to user profile information
US10915644B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Collecting data for centralized use in an adaptive trust profile event via an endpoint
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10917423B2 (en) 2017-05-15 2021-02-09 Forcepoint, LLC Intelligently differentiating between different types of states and attributes when using an adaptive trust profile
US9882918B1 (en) 2017-05-15 2018-01-30 Forcepoint, LLC User behavior profile in a blockchain
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10699028B1 (en) 2017-09-28 2020-06-30 Csidentity Corporation Identity security architecture systems and methods
US10896472B1 (en) 2017-11-14 2021-01-19 Csidentity Corporation Security and identity verification system and architecture
US11258772B2 (en) * 2018-06-19 2022-02-22 Cypress Semiconductor Corporation Secured communication from within non-volatile memory device
US11665166B2 (en) * 2018-11-09 2023-05-30 Barry Ian Dynkin Secure computing platform
US10853496B2 (en) 2019-04-26 2020-12-01 Forcepoint, LLC Adaptive trust profile behavioral fingerprint

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US7290288B2 (en) * 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
US5983273A (en) * 1997-09-16 1999-11-09 Webtv Networks, Inc. Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences
US6269395B1 (en) * 1998-12-21 2001-07-31 Nortel Networks Limited Method and system in a computer-based system for providing access to services associated with different access points
JP2001312512A (ja) * 2000-05-02 2001-11-09 Canon Inc 情報配信システム、情報端末装置、情報センター、情報配信方法及び記憶媒体
US6944766B2 (en) * 2000-05-02 2005-09-13 Canon Kabushiki Kaisha Information processing apparatus
JP3987710B2 (ja) * 2001-10-30 2007-10-10 株式会社日立製作所 認定システムおよび認証方法
US7996888B2 (en) * 2002-01-11 2011-08-09 Nokia Corporation Virtual identity apparatus and method for using same
JP2003263417A (ja) * 2002-03-11 2003-09-19 Ryutaro Yoshida 認証システム
ATE253745T1 (de) * 2002-03-18 2003-11-15 Ubs Ag Sichere benutzer- und datenauthenifizierung über ein kommunikationsnetzwerk

Also Published As

Publication number Publication date
EP1716468B1 (de) 2011-10-05
US7392534B2 (en) 2008-06-24
WO2005048087A1 (en) 2005-05-26
EP1716468A1 (de) 2006-11-02
ES2378298T3 (es) 2012-04-10
JP4949032B2 (ja) 2012-06-06
JP2007513406A (ja) 2007-05-24
US20050071282A1 (en) 2005-03-31

Similar Documents

Publication Publication Date Title
ATE527615T1 (de) System und verfahren zum verhindern von identitätsdiebstahl durch verwendung einer sicheren datenverarbeitungseinrichtung
EP1571528A3 (de) System und Verfahren zur Rechnersicherheit
Sehgal et al. A cross section of the issues and research activities related to both information security and cloud computing
WO2001084775A3 (en) System and method for managing security events on a network
WO2005086569A3 (en) System, method and apparatus for electronic authentication
DE602004012996D1 (de) Verfahren und vorrichtung zum authentifizieren von benutzern und websites
WO2001082036A3 (en) Method and system for signing and authenticating electronic documents
ATE413656T1 (de) Zuverlässiger systemzeitgeber
WO2006039364A3 (en) System and method for electronic check verification over a network
JP2011502311A (ja) ダイナミック口座番号を用いた口座取引管理
WO2006101561A3 (en) Method for signing into a mobile device over a network
EP1189128A3 (de) Sicheres System und Verfahren zum Zugriff auf Computerdateien mit Fingerabdrücken
WO2005084100A3 (en) Access control system for information services based on a hardware and software signature of a requesting device
ATE433245T1 (de) Datenübertragungs- un verwaltungsverfahren
WO2006070353A3 (en) Method and system for securely identifying computer storage devices
WO2003012595A3 (en) Registration apparatus and method, as for voting
WO2006074294A3 (en) Methods and apparatus providing security to computer systems and networks
DE60330701D1 (de) Verfahren und vorrichtung zum übertragen von vertraulichkeitseinschränkungen unterzogenen daten
IN2014MN02389A (de)
GB201107670D0 (en) Thick client and thin client integration
WO2019205389A1 (zh) 电子装置、基于区块链的身份验证方法、程序和计算机存储介质
CN105827406A (zh) 一种身份验证方法、装置和系统
EP1435557A3 (de) Begrenzter Zugriff auf Hardware durch Programme
JP6147967B2 (ja) 情報分析装置、情報分析方法、情報分析システム、情報記録装置およびプログラム
CN107808082A (zh) 电子装置、数据访问验证方法和计算机可读存储介质

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties