AU2011356179A1 - Method for authenticating first communication equipment by means of second communication equipment - Google Patents

Method for authenticating first communication equipment by means of second communication equipment Download PDF

Info

Publication number
AU2011356179A1
AU2011356179A1 AU2011356179A AU2011356179A AU2011356179A1 AU 2011356179 A1 AU2011356179 A1 AU 2011356179A1 AU 2011356179 A AU2011356179 A AU 2011356179A AU 2011356179 A AU2011356179 A AU 2011356179A AU 2011356179 A1 AU2011356179 A1 AU 2011356179A1
Authority
AU
Australia
Prior art keywords
challenge
key
encryption
encryption key
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2011356179A
Other languages
English (en)
Inventor
Benoit Courouble
Cedric Hozanne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NATURAL SECURITY
Original Assignee
NATURAL SECURITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NATURAL SECURITY filed Critical NATURAL SECURITY
Publication of AU2011356179A1 publication Critical patent/AU2011356179A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
AU2011356179A 2011-01-19 2011-12-15 Method for authenticating first communication equipment by means of second communication equipment Abandoned AU2011356179A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR1150415A FR2970612B1 (fr) 2011-01-19 2011-01-19 Procede d'authentification d'un premier equipement de communication par un second equipement de communication
FR1150415 2011-01-19
PCT/FR2011/053009 WO2012098306A1 (fr) 2011-01-19 2011-12-15 Procédé d'authentification d'un premier équipement de communication par un second équipement de communication

Publications (1)

Publication Number Publication Date
AU2011356179A1 true AU2011356179A1 (en) 2013-08-15

Family

ID=44144872

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2011356179A Abandoned AU2011356179A1 (en) 2011-01-19 2011-12-15 Method for authenticating first communication equipment by means of second communication equipment

Country Status (11)

Country Link
US (1) US20140006290A1 (enExample)
EP (1) EP2666255B1 (enExample)
JP (1) JP2014503159A (enExample)
CN (1) CN103477585A (enExample)
AU (1) AU2011356179A1 (enExample)
BR (1) BR112013018220A2 (enExample)
CA (1) CA2825050A1 (enExample)
EA (1) EA201391054A1 (enExample)
FR (1) FR2970612B1 (enExample)
NZ (1) NZ613485A (enExample)
WO (1) WO2012098306A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10277559B2 (en) * 2014-05-21 2019-04-30 Excalibur Ip, Llc Methods and systems for data traffic control and encryption
MY186315A (en) * 2014-10-03 2021-07-08 Mimos Berhad Method of zero knowledge processing on biometric data in discretised vector representation
US10103781B2 (en) 2015-02-20 2018-10-16 Visa International Service Association Contactless data exchange between mobile devices and readers involving value information not necessary to perform a transaction
EP3318003B1 (en) 2015-06-30 2022-03-23 Visa International Service Association Confidential authentication and provisioning
US10318720B2 (en) * 2015-07-02 2019-06-11 Gn Hearing A/S Hearing device with communication logging and related method
US9768966B2 (en) * 2015-08-07 2017-09-19 Google Inc. Peer to peer attestation
CN111615105B (zh) * 2016-07-18 2023-08-04 创新先进技术有限公司 信息提供、获取方法、装置及终端
CN107992768B (zh) * 2017-11-29 2021-11-16 努比亚技术有限公司 一种信息保护的方法、终端设备及存储介质
US12026247B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity
US12079367B2 (en) 2019-09-25 2024-09-03 Amod Ashok Dange System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator
US20240380598A1 (en) * 2019-09-25 2024-11-14 Amod Ashok Dange System and method for managing an operating system using tokenized identity
US12028347B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock
US20240378318A1 (en) * 2019-09-25 2024-11-14 Amod Ashok Dange System and method for managing tokenized personally identifiable information
US12072963B2 (en) * 2019-09-25 2024-08-27 Amod Ashok Dange System and method for affixing a signature using biometric authentication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1056447A (ja) * 1996-08-12 1998-02-24 Nippon Telegr & Teleph Corp <Ntt> 非対称ネットワークシステムによる情報暗号化提供方法
US20020116611A1 (en) * 2000-10-31 2002-08-22 Cornell Research Foundation, Inc. Secure distributed on-line certification authority
JP3724564B2 (ja) * 2001-05-30 2005-12-07 日本電気株式会社 認証システム及び認証方法並びに認証用プログラム
SE0400308L (sv) 2004-02-12 2005-06-28 Precise Biometrics Ab Portabel databärare, extern uppställning, system och förfarande för trådlös dataöverföring
US8245052B2 (en) 2006-02-22 2012-08-14 Digitalpersona, Inc. Method and apparatus for a token
US20100138652A1 (en) * 2006-07-07 2010-06-03 Rotem Sela Content control method using certificate revocation lists
US8892887B2 (en) * 2006-10-10 2014-11-18 Qualcomm Incorporated Method and apparatus for mutual authentication
JP5132222B2 (ja) * 2007-08-13 2013-01-30 株式会社東芝 クライアント装置、サーバ装置及びプログラム
US20100153722A1 (en) * 2008-12-11 2010-06-17 International Business Machines Corporation Method and system to prove identity of owner of an avatar in virtual world

Also Published As

Publication number Publication date
CA2825050A1 (fr) 2012-07-26
FR2970612B1 (fr) 2013-01-04
EP2666255A1 (fr) 2013-11-27
FR2970612A1 (fr) 2012-07-20
US20140006290A1 (en) 2014-01-02
NZ613485A (en) 2015-06-26
CN103477585A (zh) 2013-12-25
BR112013018220A2 (pt) 2016-11-08
EP2666255B1 (fr) 2018-10-17
WO2012098306A1 (fr) 2012-07-26
JP2014503159A (ja) 2014-02-06
EA201391054A1 (ru) 2013-12-30

Similar Documents

Publication Publication Date Title
US20140006290A1 (en) Method for authenticating first communication equipment by means of second communication equipment
US12125013B2 (en) Systems and method for payment transaction processing with payment application driver
US9225754B2 (en) Ad-hoc network communications
CN106878245B (zh) 图形码信息提供、获取方法、装置及终端
JP7770186B2 (ja) 非接触カードの暗号化認証のためのシステムおよび方法
CN105530241B (zh) 移动智能终端与pos终端的认证方法
CN110232568A (zh) 移动支付方法、装置、计算机设备及可读存储介质
CN109949461B (zh) 开锁方法及装置
CN102456193A (zh) 移动存储设备、基于该设备的数据处理系统和方法
JP2017537421A (ja) 支払いトークンのセキュリティを確保する方法
US20180025332A1 (en) Transaction facilitation
CN109754241B (zh) 一种硬钱包及基于硬钱包的验证方法
WO2018121377A1 (zh) 用于虚拟现实环境的交易方法、装置及系统
WO2017012176A1 (zh) 基于hce的移动支付方法及装置、移动终端
CN101944216A (zh) 双因子在线交易安全认证方法及系统
TWI786039B (zh) 線下支付方法、終端設備、後臺支付裝置及線下支付系統
CN110098925A (zh) 基于非对称密钥池对和随机数的量子通信服务站密钥协商方法和系统
WO2015168878A1 (zh) 支付方法和装置以及支付要素处理方法和装置
CN103345685A (zh) 一种移动支付的方法及系统
CN107682380B (zh) 一种交叉认证的方法及装置
CN107690789A (zh) 使用本地因子对认证设备与至少一个认证服务器的通信进行认证的方法
Su et al. A secure credit recharge scheme for mobile payment system in public transport
JP2018073279A (ja) 金融システム
CN112417424A (zh) 一种电力终端的认证方法及系统
KR20150144361A (ko) 종단 간 매체 소유 인증과 일회용 인증코드 인증을 이중 결합한 2채널 인증을 이용한 결제 처리 방법

Legal Events

Date Code Title Description
MK5 Application lapsed section 142(2)(e) - patent request and compl. specification not accepted