BR112015023183B1 - Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente - Google Patents

Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente Download PDF

Info

Publication number
BR112015023183B1
BR112015023183B1 BR112015023183-7A BR112015023183A BR112015023183B1 BR 112015023183 B1 BR112015023183 B1 BR 112015023183B1 BR 112015023183 A BR112015023183 A BR 112015023183A BR 112015023183 B1 BR112015023183 B1 BR 112015023183B1
Authority
BR
Brazil
Prior art keywords
hash
authentication
authentication hash
server
user
Prior art date
Application number
BR112015023183-7A
Other languages
English (en)
Portuguese (pt)
Other versions
BR112015023183A2 (pt
BR112015023183A8 (pt
Inventor
Omer BERKMAN
Marcel M.M. Yung
Original Assignee
Google Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google Llc filed Critical Google Llc
Publication of BR112015023183A2 publication Critical patent/BR112015023183A2/pt
Publication of BR112015023183A8 publication Critical patent/BR112015023183A8/pt
Publication of BR112015023183B1 publication Critical patent/BR112015023183B1/pt

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • User Interface Of Digital Computer (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
BR112015023183-7A 2013-03-15 2014-03-07 Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente BR112015023183B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/844,619 2013-03-15
US13/844,619 US8949960B2 (en) 2013-03-15 2013-03-15 Privacy preserving knowledge and factor possession tests for persistent authentication
PCT/US2014/022075 WO2014150064A1 (en) 2013-03-15 2014-03-07 Privacy preserving knowledge/factor possession tests for persistent authentication

Publications (3)

Publication Number Publication Date
BR112015023183A2 BR112015023183A2 (pt) 2017-07-18
BR112015023183A8 BR112015023183A8 (pt) 2018-01-02
BR112015023183B1 true BR112015023183B1 (pt) 2022-04-05

Family

ID=51535030

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112015023183-7A BR112015023183B1 (pt) 2013-03-15 2014-03-07 Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente

Country Status (8)

Country Link
US (1) US8949960B2 (enExample)
EP (1) EP2973162B1 (enExample)
JP (2) JP6352381B2 (enExample)
KR (1) KR102257943B1 (enExample)
CN (1) CN105210071B (enExample)
AU (1) AU2014237590B2 (enExample)
BR (1) BR112015023183B1 (enExample)
WO (1) WO2014150064A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10541815B2 (en) * 2014-03-16 2020-01-21 Haventec Pty Ltd Persistent authentication system incorporating one time pass codes
CN105337928B (zh) * 2014-06-24 2019-09-13 阿里巴巴集团控股有限公司 用户身份识别方法、安全保护问题生成方法及装置
US10742647B2 (en) * 2015-10-28 2020-08-11 Qomplx, Inc. Contextual and risk-based multi-factor authentication
US11570209B2 (en) 2015-10-28 2023-01-31 Qomplx, Inc. Detecting and mitigating attacks using forged authentication objects within a domain
US12224992B2 (en) 2015-10-28 2025-02-11 Qomplx Llc AI-driven defensive cybersecurity strategy analysis and recommendation system
US20220014555A1 (en) 2015-10-28 2022-01-13 Qomplx, Inc. Distributed automated planning and execution platform for designing and running complex processes
US12500870B2 (en) 2015-10-28 2025-12-16 Qomplx Llc Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing
CN107070871B (zh) * 2017-01-12 2020-04-24 阿里巴巴集团控股有限公司 一种身份验证的方法及装置
US20240146734A1 (en) * 2017-06-24 2024-05-02 Crowdstrike, Inc. Large language model-based authentication
EP3982592A4 (en) * 2019-06-05 2022-07-13 Sony Group Corporation IDENTITY VERIFICATION PROGRAM, IDENTITY VERIFICATION PROCESS, USER TERMINAL AND USER AUTHENTICATION PROGRAM
JP7597027B2 (ja) * 2019-06-05 2024-12-10 ソニーグループ株式会社 情報処理装置、及び情報処理方法
CN112487485B (zh) * 2020-05-09 2022-12-27 支付宝(杭州)信息技术有限公司 基于零知识证明的个人数据处理方法、装置及电子设备
US20250039196A1 (en) 2023-07-27 2025-01-30 Qomplx Llc System and method for track and trace user and entity behavior analysis
US12309132B1 (en) * 2024-07-12 2025-05-20 Cortwo Corp. Continuous universal trust architecture and method

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6760752B1 (en) 1999-06-28 2004-07-06 Zix Corporation Secure transmission system
US20060085647A1 (en) * 2000-03-24 2006-04-20 Neff C A Detecting compromised ballots
US7228417B2 (en) 2002-02-26 2007-06-05 America Online, Inc. Simple secure login with multiple-authentication providers
US7725730B2 (en) 2002-08-09 2010-05-25 Emc Corporation Cryptographic methods and apparatus for secure authentication
KR101020913B1 (ko) * 2003-07-28 2011-03-09 소니 주식회사 데이터 송신 장치, 데이터 사용 인정 방법, 데이터 수신 장치 및 방법, 및 기록 매체
US7461399B2 (en) * 2004-07-30 2008-12-02 Rsa Security Inc. PIN recovery in a smart card
US20070162961A1 (en) 2005-02-25 2007-07-12 Kelvin Tarrance Identification authentication methods and systems
JP4697583B2 (ja) 2005-03-02 2011-06-08 琢晃 伊藤 個人情報の漏洩を回避した個人認証システム
US7694138B2 (en) * 2005-10-21 2010-04-06 Avaya Inc. Secure authentication with voiced responses from a telecommunications terminal
US7739733B2 (en) 2005-11-02 2010-06-15 Emc Corporation Storing digital secrets in a vault
CA2648780C (en) 2006-04-25 2013-07-16 Stephen Laurence Boren Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
EP2122900A4 (en) * 2007-01-22 2014-07-23 Spyrus Inc PORTABLE DATA ENCRYPTION DEVICE WITH CONFIGURABLE SAFETY FUNCTIONS AND METHOD FOR FILING ENCRYPTION
JP4917453B2 (ja) * 2007-02-22 2012-04-18 Kddi株式会社 閾値秘密分散装置、閾値秘密分散方法、秘密情報復元方法およびプログラム
CN101145911B (zh) 2007-10-30 2010-05-19 江汉大学 具有私密保护及口令找回功能的身份认证方法
US8156333B2 (en) * 2008-05-29 2012-04-10 Red Hat, Inc. Username based authentication security
EP2329423B1 (en) * 2008-09-26 2018-07-18 Koninklijke Philips N.V. Authenticating a device and a user
US8527758B2 (en) * 2009-12-09 2013-09-03 Ebay Inc. Systems and methods for facilitating user identity verification over a network
US8842827B2 (en) * 2010-07-16 2014-09-23 Intryca, Inc. Mobile phone aided operations system and method
JP4820928B1 (ja) 2011-07-08 2011-11-24 株式会社野村総合研究所 認証システムおよび認証方法

Also Published As

Publication number Publication date
KR20150132467A (ko) 2015-11-25
US20140282942A1 (en) 2014-09-18
EP2973162A4 (en) 2016-09-07
WO2014150064A1 (en) 2014-09-25
CN105210071B (zh) 2018-06-01
EP2973162A1 (en) 2016-01-20
CN105210071A (zh) 2015-12-30
JP6352381B2 (ja) 2018-07-04
US8949960B2 (en) 2015-02-03
AU2014237590B2 (en) 2019-02-28
EP2973162B1 (en) 2018-06-06
KR102257943B1 (ko) 2021-05-28
AU2014237590A1 (en) 2015-09-10
JP2017073789A (ja) 2017-04-13
JP6494584B2 (ja) 2019-04-03
BR112015023183A2 (pt) 2017-07-18
BR112015023183A8 (pt) 2018-01-02
JP2016512931A (ja) 2016-05-09

Similar Documents

Publication Publication Date Title
BR112015023183B1 (pt) Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente
US11233637B2 (en) System and method for validating an entity
US11271926B2 (en) System and method for temporary password management
US12126631B2 (en) Detecting compromised credentials in a credential stuffing attack
US20240121089A1 (en) Protecting data using controlled corruption in computer networks
ES2871062T3 (es) Sistema y método para la gestión de datos basada en cadena de bloques
US9286466B2 (en) Registration and authentication of computing devices using a digital skeleton key
US20190036914A1 (en) System and method for temporary password management
US10050795B2 (en) Robust restoration of passphrases from partial information
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
CN116318617B (zh) 基于rfid和区块链的医疗救援物资慈善捐助方法
Kissell Take control of your passwords
Syahreen et al. A Systematic Review on Multi-Factor Authentication Framework.
Nakouri et al. A new biometric-based security framework for cloud storage
McCarney Password managers: Comparative evaluation, design, implementation and empirical analysis
Breit et al. Exploration of the security and usability of the fido2 authentication protocol
Maqbali Strengthening Password-Based Authentication
Fernando et al. An Automated Solution for Secure Password Management
Mannan et al. The usable security of passwords based on digital objects: From design and analysis to user study
Pilania et al. ENCRYPTO: A Reliable and Efficient Mobile App for Password Management
Robin et al. NoPass—A Novel Passwordless Multi-authentication-Based Approach for Secure Login
Wueppelmann PGP Auth: Using Public Key Encryption for Authentication on the Web
Bonneau et al. Passwords and the Evolution of Imperfect Authentication Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology.
Hayata DEVELOPING A SECURE AND USABLE USER-COGNITIVE AUTHENTICATION SCHEME _ A Thesis Presented

Legal Events

Date Code Title Description
B25D Requested change of name of applicant approved

Owner name: GOOGLE LLC (US)

B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 07/03/2014, OBSERVADAS AS CONDICOES LEGAIS.