BR112014024484A8 - interação com serviço confiável - Google Patents
interação com serviço confiável Download PDFInfo
- Publication number
- BR112014024484A8 BR112014024484A8 BR112014024484A BR112014024484A BR112014024484A8 BR 112014024484 A8 BR112014024484 A8 BR 112014024484A8 BR 112014024484 A BR112014024484 A BR 112014024484A BR 112014024484 A BR112014024484 A BR 112014024484A BR 112014024484 A8 BR112014024484 A8 BR 112014024484A8
- Authority
- BR
- Brazil
- Prior art keywords
- remote service
- secure
- secure communication
- establish
- service interaction
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Development Economics (AREA)
- Economics (AREA)
- User Interface Of Digital Computer (AREA)
- Stored Programmes (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
interação de serviço confiável a presente invenção compreende em uma realização um controlador lógico configurado para receber, a partir de um aplicativo em execução em um complexo de execução não confiável do dispositivo eletrônico, um pedido para uma sessão de comunicação segura com um serviço remoto, verificar a credencial de segurança recebida do serviço remoto, estabelecer um seguro conexão de comunicação entre o controlador de seguro eo serviço remoto, estabelecer uma interface segura, coletar uma ou mais credenciais de autenticação de um usuário por meio da interface de usuário segura, encaminhar uma ou mais credenciais de autenticação para o serviço remoto, e realizar uma sessão de comunicação segura com o serviço remoto. outras formas de realização podem ser descritas.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2012/033907 WO2013158075A1 (en) | 2012-04-17 | 2012-04-17 | Trusted service interaction |
Publications (3)
Publication Number | Publication Date |
---|---|
BR112014024484A2 BR112014024484A2 (pt) | 2017-06-20 |
BR112014024484A8 true BR112014024484A8 (pt) | 2019-07-30 |
BR112014024484B1 BR112014024484B1 (pt) | 2021-04-06 |
Family
ID=49383850
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112014024484-7A BR112014024484B1 (pt) | 2012-04-17 | 2012-04-17 | Controlador para um dispositivo eletrônico e dispositivo eletrônico para interação com serviço confiável |
BR122018077460-6A BR122018077460B1 (pt) | 2012-04-17 | 2012-04-17 | Interação com serviço confiável |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR122018077460-6A BR122018077460B1 (pt) | 2012-04-17 | 2012-04-17 | Interação com serviço confiável |
Country Status (7)
Country | Link |
---|---|
US (2) | US9306934B2 (pt) |
EP (2) | EP3471043B1 (pt) |
JP (1) | JP5989894B2 (pt) |
KR (2) | KR102062480B1 (pt) |
CN (2) | CN104205144A (pt) |
BR (2) | BR112014024484B1 (pt) |
WO (1) | WO2013158075A1 (pt) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8671454B2 (en) | 2010-11-04 | 2014-03-11 | Verifone, Inc. | System for secure web-prompt processing on point of sale devices |
KR102062480B1 (ko) | 2012-04-17 | 2020-01-03 | 인텔 코포레이션 | 신뢰성 있는 서비스 상호작용 |
US20150161579A1 (en) * | 2013-12-11 | 2015-06-11 | Verifone, Inc. | Point of sale system |
CN107534652B (zh) * | 2015-01-26 | 2021-04-20 | 移动熨斗公司 | 对基于云的服务的安全访问方法、系统和计算机可读介质 |
US10114464B2 (en) | 2015-06-30 | 2018-10-30 | Stmicroelectronics S.R.L. | Device and method for determination of angular position in three-dimensional space, and corresponding electronic apparatus |
US10248791B2 (en) * | 2015-07-20 | 2019-04-02 | Intel Corporation | Technologies for secure hardware and software attestation for trusted I/O |
CA2993105C (en) * | 2015-07-21 | 2023-01-31 | 10353744 Canada Ltd. | Electronic certificate receiving method and device |
WO2017012045A1 (zh) * | 2015-07-21 | 2017-01-26 | 深圳市银信网银科技有限公司 | 电子凭证的收证方法、装置和系统 |
JP6274678B2 (ja) * | 2016-08-10 | 2018-02-07 | インテル・コーポレーション | 信用できるサービスインタラクション |
SG11202010334XA (en) * | 2018-04-24 | 2020-11-27 | Visa Int Service Ass | Efficient and secure authentication system |
CN110032414B (zh) * | 2019-03-06 | 2023-06-06 | 联想企业解决方案(新加坡)有限公司 | 远程控制台模式下安全的用户认证的装置和方法 |
EP3742373A1 (en) * | 2019-05-23 | 2020-11-25 | Worldline | Secured payment on devices enabled to browse the web |
US11750585B2 (en) | 2019-09-30 | 2023-09-05 | Acumera, Inc. | Secure ephemeral access to insecure devices |
US11677731B2 (en) | 2020-04-29 | 2023-06-13 | Wells Fargo Bank, N.A. | Adaptive authentication |
Family Cites Families (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5572647A (en) * | 1994-11-04 | 1996-11-05 | International Business Machines Corporation | Visibility seeking scroll bars and other control constructs |
US6088451A (en) | 1996-06-28 | 2000-07-11 | Mci Communications Corporation | Security system and method for network element access |
US6182225B1 (en) * | 1997-02-03 | 2001-01-30 | Canon Kabushiki Kaisha | Network data base control device and method thereof |
US6301661B1 (en) * | 1997-02-12 | 2001-10-09 | Verizon Labortories Inc. | Enhanced security for applications employing downloadable executable content |
US7545525B2 (en) * | 1997-05-21 | 2009-06-09 | Minolta Co., Ltd. | Input-output apparatus selecting method for network system |
US6118451A (en) * | 1998-06-09 | 2000-09-12 | Agilent Technologies | Apparatus and method for controlling dialog box display and system interactivity in a computer-based system |
US6330007B1 (en) * | 1998-12-18 | 2001-12-11 | Ncr Corporation | Graphical user interface (GUI) prototyping and specification tool |
US6369836B1 (en) * | 1998-12-23 | 2002-04-09 | Triconex | Cause effect diagram program |
JP3327877B2 (ja) * | 1999-04-14 | 2002-09-24 | キヤノン株式会社 | 情報提供方法、情報提供システム、端末装置および情報提供プログラムを格納した記憶媒体 |
GB9922665D0 (en) | 1999-09-25 | 1999-11-24 | Hewlett Packard Co | A method of enforcing trusted functionality in a full function platform |
US8380630B2 (en) * | 2000-07-06 | 2013-02-19 | David Paul Felsher | Information record infrastructure, system and method |
US6986040B1 (en) * | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
US20020066039A1 (en) * | 2000-11-30 | 2002-05-30 | Dent Paul W. | Anti-spoofing password protection |
US6720954B2 (en) * | 2001-03-14 | 2004-04-13 | International Business Machines Corporation | Method to aid in sizing graphical user interface touch controls |
US20030014368A1 (en) * | 2001-07-09 | 2003-01-16 | Travelers Express Inc. | Systems, methods and apparatus for secure printing of negotiable instruments |
JP2003122640A (ja) | 2001-10-11 | 2003-04-25 | Fujitsu Frontech Ltd | 秘密情報保護システム |
AUPR966001A0 (en) * | 2001-12-20 | 2002-01-24 | Canon Information Systems Research Australia Pty Ltd | A microprocessor card defining a custom user interface |
US7370111B2 (en) * | 2002-03-27 | 2008-05-06 | Intel Corporation | System, protocol and related methods for providing secure manageability |
US7500262B1 (en) * | 2002-04-29 | 2009-03-03 | Aol Llc | Implementing single sign-on across a heterogeneous collection of client/server and web-based applications |
US7669229B2 (en) * | 2002-11-13 | 2010-02-23 | Intel Corporation | Network protecting authentication proxy |
US7783891B2 (en) * | 2004-02-25 | 2010-08-24 | Microsoft Corporation | System and method facilitating secure credential management |
US7424736B2 (en) * | 2004-03-10 | 2008-09-09 | Combrio, Inc. | Method for establishing directed circuits between parties with limited mutual trust |
US8200794B1 (en) * | 2004-06-30 | 2012-06-12 | Kaseya International Limited | Primitive functions for use in remote computer management |
DE102004062203B4 (de) * | 2004-12-23 | 2007-03-08 | Infineon Technologies Ag | Datenverarbeitungseinrichtung, Telekommunikations-Endgerät und Verfahren zur Datenverarbeitung mittels einer Datenverarbeitungseinrichtung |
US8185945B1 (en) * | 2005-03-02 | 2012-05-22 | Crimson Corporation | Systems and methods for selectively requesting certificates during initiation of secure communication sessions |
US20060248082A1 (en) * | 2005-04-29 | 2006-11-02 | Amit Raikar | Method and an apparatus for securely communicating between a management server and a managed node associated with a dynamic provisioning system |
US8028329B2 (en) * | 2005-06-13 | 2011-09-27 | Iamsecureonline, Inc. | Proxy authentication network |
US20090293111A1 (en) * | 2005-11-29 | 2009-11-26 | Lai Yau S | Third party system for biometric authentication |
US20070124358A1 (en) * | 2005-11-29 | 2007-05-31 | Emblaze Ltd. | Method and system for installing an application on a wireless mobile device when initiated from a PC |
US7673135B2 (en) * | 2005-12-08 | 2010-03-02 | Microsoft Corporation | Request authentication token |
CN100530343C (zh) * | 2006-03-15 | 2009-08-19 | 深圳迈瑞生物医疗电子股份有限公司 | 多屏合成显示装置及方法 |
US7987168B2 (en) * | 2006-04-08 | 2011-07-26 | James Walter Haddock | Method for managing information |
US7873915B2 (en) * | 2006-06-16 | 2011-01-18 | Microsoft Corporation | Suppressing dialog boxes |
US8413229B2 (en) * | 2006-08-21 | 2013-04-02 | Citrix Systems, Inc. | Method and appliance for authenticating, by an appliance, a client to access a virtual private network connection, based on an attribute of a client-side certificate |
CN101169812A (zh) * | 2006-10-25 | 2008-04-30 | 知网生物识别科技股份有限公司 | 视窗操作系统的多因子认证系统与登录方法 |
JP2008123017A (ja) * | 2006-11-08 | 2008-05-29 | Fuji Xerox Co Ltd | 印刷システム、印刷管理装置およびプログラム |
US8218165B2 (en) * | 2007-03-26 | 2012-07-10 | Ricoh Company, Ltd. | Interruption management method for an image forming apparatus |
US20080263672A1 (en) | 2007-04-18 | 2008-10-23 | Hewlett-Packard Development Company L.P. | Protecting sensitive data intended for a remote application |
US20080263644A1 (en) * | 2007-04-23 | 2008-10-23 | Doron Grinstein | Federated authorization for distributed computing |
US20090007250A1 (en) * | 2007-06-27 | 2009-01-01 | Microsoft Corporation | Client authentication distributor |
US8510553B2 (en) | 2007-06-29 | 2013-08-13 | Intel Corporation | Secure credential management |
US8257171B2 (en) * | 2007-08-28 | 2012-09-04 | Wms Gaming, Inc. | Secure mode control in wagering game systems |
US20090119762A1 (en) * | 2007-11-06 | 2009-05-07 | Cisco Technology, Inc. | WLAN Access Integration with Physical Access Control System |
KR20090047041A (ko) * | 2007-11-07 | 2009-05-12 | 김진우 | 키보드 보안 모듈과 연동되는 가상키보드를 이용한 키보드해킹 방지 방법 |
US8726184B2 (en) * | 2007-11-29 | 2014-05-13 | Red Hat, Inc. | Systems, apparatus and methods for a messaging system |
US8321662B2 (en) * | 2008-05-08 | 2012-11-27 | International Business Machines Corporation | Certificate renewal using secure handshake |
JP4774078B2 (ja) * | 2008-05-12 | 2011-09-14 | シャープ株式会社 | 情報処理装置 |
US8769640B2 (en) * | 2008-05-29 | 2014-07-01 | Microsoft Corporation | Remote publishing and server administration |
US8214890B2 (en) * | 2008-08-27 | 2012-07-03 | Microsoft Corporation | Login authentication using a trusted device |
US9158905B2 (en) * | 2008-09-28 | 2015-10-13 | Feitian Technologies Co., Ltd. | Method for computer startup protection and system thereof |
US10270602B2 (en) * | 2008-10-01 | 2019-04-23 | International Business Machines Corporation | Verifying and enforcing certificate use |
US8429650B2 (en) * | 2008-11-14 | 2013-04-23 | Oracle International Corporation | System and method of security management for a virtual environment |
US8413210B2 (en) * | 2008-12-09 | 2013-04-02 | Microsoft Corporation | Credential sharing between multiple client applications |
EP2392114B1 (en) * | 2009-01-30 | 2021-01-20 | British Telecommunications public limited company | Secure web-based service provision |
KR101101190B1 (ko) * | 2009-02-18 | 2012-01-03 | 주식회사 올앳 | 보안 통신 시스템, 방법, 및 상기 방법을 실행시키기 위한 컴퓨터 프로그램을 기록한 매체 |
US8281233B2 (en) * | 2009-06-15 | 2012-10-02 | Microsoft Corporation | Architecture to expose internal business data on a website |
US8701029B2 (en) * | 2009-06-24 | 2014-04-15 | Red Hat Israel, Ltd. | Presenting a modal dialog box using an invisible panel underneath |
US20120089481A1 (en) * | 2009-11-24 | 2012-04-12 | Chain Reaction Ecommerce, Inc. | Securing sensitive information with a trusted proxy frame |
US20110202843A1 (en) * | 2010-02-15 | 2011-08-18 | Robert Paul Morris | Methods, systems, and computer program products for delaying presentation of an update to a user interface |
WO2011091313A1 (en) * | 2010-01-22 | 2011-07-28 | Interdigital Patent Holdings, Inc. | Method and apparatus for trusted federated identity management and data access authorization |
WO2011094869A1 (en) * | 2010-02-05 | 2011-08-11 | Lipso Systèmes Inc. | Secure authentication system and method |
US8605044B2 (en) | 2010-02-12 | 2013-12-10 | Maxim Integrated Products, Inc. | Trusted display based on display device emulation |
US8464063B2 (en) * | 2010-03-10 | 2013-06-11 | Avaya Inc. | Trusted group of a plurality of devices with single sign on, secure authentication |
US8452877B2 (en) * | 2010-04-28 | 2013-05-28 | Lenovo (Singapore) Pte. Ltd. | Establishing a remote desktop |
CA2738157C (en) * | 2010-04-29 | 2017-07-11 | Research In Motion Limited | Assignment and distribution of access credentials to mobile communication devices |
US20110319056A1 (en) * | 2010-06-29 | 2011-12-29 | Enterproid Hk Ltd | Remote access to a mobile device |
US8505083B2 (en) * | 2010-09-30 | 2013-08-06 | Microsoft Corporation | Remote resources single sign on |
US9792425B2 (en) * | 2010-11-02 | 2017-10-17 | Ca, Inc. | System and method for controlling state tokens |
US9721040B2 (en) * | 2010-12-09 | 2017-08-01 | Oracle International Corporation | Mechanism to input, search and create complex data strings within a single dialog |
US20120158431A1 (en) * | 2010-12-16 | 2012-06-21 | General Electric Company | Methods and apparatus to support diagnosis processes |
US8522358B2 (en) * | 2010-12-28 | 2013-08-27 | Verizon Patent And Licensing Inc. | Universal identity service avatar ecosystem |
US20120166466A1 (en) * | 2010-12-28 | 2012-06-28 | General Electric Company | Methods and apparatus for adaptive searching for healthcare information |
WO2012135231A2 (en) * | 2011-04-01 | 2012-10-04 | Social Communications Company | Creating virtual areas for realtime communications |
US20120297187A1 (en) * | 2011-05-17 | 2012-11-22 | Google Inc. | Trusted Mobile Device Based Security |
WO2013044046A1 (en) * | 2011-09-23 | 2013-03-28 | Barnesandnoble.Com Llc | System and method for unlocking an electronic device |
US8701199B1 (en) * | 2011-12-23 | 2014-04-15 | Emc Corporation | Establishing a trusted session from a non-web client using adaptive authentication |
US9191394B2 (en) * | 2012-02-08 | 2015-11-17 | Microsoft Technology Licensing, Llc | Protecting user credentials from a computing device |
KR101947651B1 (ko) * | 2012-03-21 | 2019-02-13 | 삼성전자주식회사 | 보안 모바일 웹 클라이언트 및 웹 서버 시스템 |
US20140317536A1 (en) * | 2012-04-05 | 2014-10-23 | Google Inc. | Browser Dialogue Box Wrapper |
JP6074026B2 (ja) * | 2012-04-16 | 2017-02-01 | インテル コーポレイション | スケーラブルでセキュアな実行 |
KR102062480B1 (ko) | 2012-04-17 | 2020-01-03 | 인텔 코포레이션 | 신뢰성 있는 서비스 상호작용 |
US9152295B2 (en) * | 2012-06-05 | 2015-10-06 | Apple Inc. | Triage tool for problem reporting in maps |
US20140007221A1 (en) * | 2012-06-29 | 2014-01-02 | Jasmeet Chhabra | Secure image authentication |
US9246894B2 (en) * | 2012-10-30 | 2016-01-26 | Microsoft Technology Licensing, Llc. | Communicating state information to legacy clients using legacy protocols |
US9245107B2 (en) * | 2012-12-21 | 2016-01-26 | Paypal, Inc. | Systems and methods for determining a strength of a created credential |
US8838138B2 (en) * | 2012-12-28 | 2014-09-16 | Intel Corporation | Context aware geofencing |
US9285964B2 (en) * | 2013-06-18 | 2016-03-15 | Google Inc. | Automatically recovering and maintaining focus |
-
2012
- 2012-04-17 KR KR1020187038093A patent/KR102062480B1/ko active IP Right Grant
- 2012-04-17 WO PCT/US2012/033907 patent/WO2013158075A1/en active Application Filing
- 2012-04-17 BR BR112014024484-7A patent/BR112014024484B1/pt active IP Right Grant
- 2012-04-17 CN CN201280071908.0A patent/CN104205144A/zh active Pending
- 2012-04-17 CN CN201811622944.7A patent/CN109684813A/zh active Pending
- 2012-04-17 US US13/977,427 patent/US9306934B2/en active Active
- 2012-04-17 EP EP18205851.1A patent/EP3471043B1/en active Active
- 2012-04-17 JP JP2015506945A patent/JP5989894B2/ja active Active
- 2012-04-17 KR KR1020147026849A patent/KR101938445B1/ko active IP Right Grant
- 2012-04-17 EP EP12874582.5A patent/EP2839422B1/en active Active
- 2012-04-17 BR BR122018077460-6A patent/BR122018077460B1/pt active IP Right Grant
-
2016
- 2016-02-24 US US15/052,134 patent/US9923886B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2839422A4 (en) | 2015-12-16 |
WO2013158075A1 (en) | 2013-10-24 |
BR112014024484B1 (pt) | 2021-04-06 |
US20160173490A1 (en) | 2016-06-16 |
US20140337960A1 (en) | 2014-11-13 |
BR122018077460B1 (pt) | 2021-07-20 |
BR112014024484A2 (pt) | 2017-06-20 |
KR102062480B1 (ko) | 2020-01-03 |
EP2839422A1 (en) | 2015-02-25 |
US9923886B2 (en) | 2018-03-20 |
US9306934B2 (en) | 2016-04-05 |
CN104205144A (zh) | 2014-12-10 |
KR101938445B1 (ko) | 2019-04-11 |
JP5989894B2 (ja) | 2016-09-07 |
KR20190006033A (ko) | 2019-01-16 |
JP2015520439A (ja) | 2015-07-16 |
KR20140127906A (ko) | 2014-11-04 |
EP3471043A1 (en) | 2019-04-17 |
CN109684813A (zh) | 2019-04-26 |
EP2839422B1 (en) | 2018-11-14 |
EP3471043B1 (en) | 2020-07-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112014024484A8 (pt) | interação com serviço confiável | |
BR112015028071A2 (pt) | sistemas e métodos para comunicação segura | |
WO2016175914A3 (en) | Transaction signing utilizing asymmetric cryptography | |
PH12016501640A1 (en) | Techniques to operate a service with machine generated authentication tokens | |
WO2015023341A3 (en) | Secure authorization systems and methods | |
SG10201901366WA (en) | Key exchange through partially trusted third party | |
WO2013151851A3 (en) | Secure authentication in a multi-party system | |
GB2507213A (en) | Authenticating a rich client from within an existing browser session | |
MX2019002625A (es) | Sistemas y metodos para autentificacion de dispositivos. | |
WO2013120026A3 (en) | Enabling secure access to a discovered location server for a mobile device | |
WO2014182727A3 (en) | Selectively performing man in the middle decryption | |
BR112017000081A2 (pt) | gerenciamento de assinatura de rede com base em ue | |
WO2012018528A3 (en) | Methods for anonymous authentication and key agreement | |
NZ629125A (en) | Credential management system | |
BR112015009472A2 (pt) | dispositivo de comunicação montado em veículo, sistema de comunicação entre veículos e método de comunicação | |
MY190913A (en) | Device and method for secure connection | |
EP2770458A3 (en) | Mobile Security Fob | |
WO2010093636A3 (en) | Devices, systems and methods for secure verification of user identity | |
MX345061B (es) | Metodo, uno o mas medios de almacenamiento no transitorios legibles por computadora y un dispositivo, que en particular se refiere a recursos de computo y/o computo confiable basado en dispositivo movil. | |
WO2014138430A3 (en) | Secure simple enrollment | |
WO2015056010A3 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
GB2523710A (en) | Multi-factor authentication and comprehensive login system for client-server networks | |
WO2012154367A3 (en) | Secure user credential control | |
WO2011123671A3 (en) | Mutual mobile authentication using a key management center | |
GB2524198A (en) | Method and device for secure network access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
B09W | Correction of the decision to grant [chapter 9.1.4 patent gazette] |
Free format text: RETIFICA-SE O DESPACHO DE DEFERIMENTO EMITIDO NARPI NO 2605 PARA CORRECAO DE ERRO MATERIAL. |
|
B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 17/04/2012, OBSERVADAS AS CONDICOES LEGAIS. |