AU2000276737A1 - System and method for extensible positive client identification - Google Patents
System and method for extensible positive client identificationInfo
- Publication number
- AU2000276737A1 AU2000276737A1 AU2000276737A AU7673700A AU2000276737A1 AU 2000276737 A1 AU2000276737 A1 AU 2000276737A1 AU 2000276737 A AU2000276737 A AU 2000276737A AU 7673700 A AU7673700 A AU 7673700A AU 2000276737 A1 AU2000276737 A1 AU 2000276737A1
- Authority
- AU
- Australia
- Prior art keywords
- client identification
- positive client
- extensible
- extensible positive
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0020380 | 2000-08-21 | ||
GB0020380A GB2355322A (en) | 1999-10-05 | 2000-08-21 | System and method for positive client identification |
PCT/GB2000/003856 WO2001044902A2 (en) | 2000-08-21 | 2000-10-06 | System and method for extensible positive client identification |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2000276737A1 true AU2000276737A1 (en) | 2001-06-25 |
Family
ID=9897868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2000276737A Abandoned AU2000276737A1 (en) | 2000-08-21 | 2000-10-06 | System and method for extensible positive client identification |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2000276737A1 (en) |
WO (1) | WO2001044902A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108923910B (en) * | 2018-07-12 | 2021-06-25 | 南方电网科学研究院有限责任公司 | Mobile application APK tamper-proofing method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5636280A (en) * | 1994-10-31 | 1997-06-03 | Kelly; Tadhg | Dual key reflexive encryption security system |
-
2000
- 2000-10-06 WO PCT/GB2000/003856 patent/WO2001044902A2/en active Application Filing
- 2000-10-06 AU AU2000276737A patent/AU2000276737A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2001044902A2 (en) | 2001-06-21 |
WO2001044902A3 (en) | 2001-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB0020380D0 (en) | System and method for extensible positive client identification | |
AU2748901A (en) | Context matching system and method | |
AU6629400A (en) | Authentication system and method | |
AU2001296287A1 (en) | Method and system for airport security | |
AU2001288372A1 (en) | System and method for tele-ophthalmology | |
AU2001295072A1 (en) | Object detection system and method | |
AU5091301A (en) | Method and system for searching form features for form identification | |
AU2001245811A1 (en) | Database system and method | |
AU2002214667A1 (en) | System and method for rapid telepositioning | |
AU4818201A (en) | Method and system for secure access | |
AU3699700A (en) | Monitoring system and method | |
AU2001259815A1 (en) | Card management system and method therefore | |
AU2002211657A1 (en) | Assessment system and method | |
AU6932200A (en) | On-line registration system and method | |
AU2001255823A1 (en) | Workflow processes method and system | |
AU2001229666A1 (en) | Method and system for extensible data processing | |
AU2002213227A1 (en) | Generalizer system and method | |
AU2001281269A1 (en) | Search system and method | |
AU2002211049A1 (en) | Fingerprint identifying method and security system using the same | |
AU7374200A (en) | Knowledge database system and method | |
AU2001261193A1 (en) | Integrated security system and method | |
AU2002246957A1 (en) | Smart-caching system and method | |
AU5431400A (en) | Method and system for matching up persons | |
AU2001293710A1 (en) | System and method for operation-integrated user identification | |
AU2001236295A1 (en) | Method and system for detection |