BR112015023183B1 - Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente - Google Patents
Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente Download PDFInfo
- Publication number
- BR112015023183B1 BR112015023183B1 BR112015023183-7A BR112015023183A BR112015023183B1 BR 112015023183 B1 BR112015023183 B1 BR 112015023183B1 BR 112015023183 A BR112015023183 A BR 112015023183A BR 112015023183 B1 BR112015023183 B1 BR 112015023183B1
- Authority
- BR
- Brazil
- Prior art keywords
- hash
- authentication
- authentication hash
- server
- user
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/844,619 | 2013-03-15 | ||
| US13/844,619 US8949960B2 (en) | 2013-03-15 | 2013-03-15 | Privacy preserving knowledge and factor possession tests for persistent authentication |
| PCT/US2014/022075 WO2014150064A1 (en) | 2013-03-15 | 2014-03-07 | Privacy preserving knowledge/factor possession tests for persistent authentication |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| BR112015023183A2 BR112015023183A2 (pt) | 2017-07-18 |
| BR112015023183A8 BR112015023183A8 (pt) | 2018-01-02 |
| BR112015023183B1 true BR112015023183B1 (pt) | 2022-04-05 |
Family
ID=51535030
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR112015023183-7A BR112015023183B1 (pt) | 2013-03-15 | 2014-03-07 | Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8949960B2 (enExample) |
| EP (1) | EP2973162B1 (enExample) |
| JP (2) | JP6352381B2 (enExample) |
| KR (1) | KR102257943B1 (enExample) |
| CN (1) | CN105210071B (enExample) |
| AU (1) | AU2014237590B2 (enExample) |
| BR (1) | BR112015023183B1 (enExample) |
| WO (1) | WO2014150064A1 (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10541815B2 (en) * | 2014-03-16 | 2020-01-21 | Haventec Pty Ltd | Persistent authentication system incorporating one time pass codes |
| CN105337928B (zh) * | 2014-06-24 | 2019-09-13 | 阿里巴巴集团控股有限公司 | 用户身份识别方法、安全保护问题生成方法及装置 |
| US10742647B2 (en) * | 2015-10-28 | 2020-08-11 | Qomplx, Inc. | Contextual and risk-based multi-factor authentication |
| US11570209B2 (en) | 2015-10-28 | 2023-01-31 | Qomplx, Inc. | Detecting and mitigating attacks using forged authentication objects within a domain |
| US12224992B2 (en) | 2015-10-28 | 2025-02-11 | Qomplx Llc | AI-driven defensive cybersecurity strategy analysis and recommendation system |
| US20220014555A1 (en) | 2015-10-28 | 2022-01-13 | Qomplx, Inc. | Distributed automated planning and execution platform for designing and running complex processes |
| US12500870B2 (en) | 2015-10-28 | 2025-12-16 | Qomplx Llc | Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing |
| CN107070871B (zh) * | 2017-01-12 | 2020-04-24 | 阿里巴巴集团控股有限公司 | 一种身份验证的方法及装置 |
| US20240146734A1 (en) * | 2017-06-24 | 2024-05-02 | Crowdstrike, Inc. | Large language model-based authentication |
| EP3982592A4 (en) * | 2019-06-05 | 2022-07-13 | Sony Group Corporation | IDENTITY VERIFICATION PROGRAM, IDENTITY VERIFICATION PROCESS, USER TERMINAL AND USER AUTHENTICATION PROGRAM |
| JP7597027B2 (ja) * | 2019-06-05 | 2024-12-10 | ソニーグループ株式会社 | 情報処理装置、及び情報処理方法 |
| CN112487485B (zh) * | 2020-05-09 | 2022-12-27 | 支付宝(杭州)信息技术有限公司 | 基于零知识证明的个人数据处理方法、装置及电子设备 |
| US20250039196A1 (en) | 2023-07-27 | 2025-01-30 | Qomplx Llc | System and method for track and trace user and entity behavior analysis |
| US12309132B1 (en) * | 2024-07-12 | 2025-05-20 | Cortwo Corp. | Continuous universal trust architecture and method |
Family Cites Families (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6760752B1 (en) | 1999-06-28 | 2004-07-06 | Zix Corporation | Secure transmission system |
| US20060085647A1 (en) * | 2000-03-24 | 2006-04-20 | Neff C A | Detecting compromised ballots |
| US7228417B2 (en) | 2002-02-26 | 2007-06-05 | America Online, Inc. | Simple secure login with multiple-authentication providers |
| US7725730B2 (en) | 2002-08-09 | 2010-05-25 | Emc Corporation | Cryptographic methods and apparatus for secure authentication |
| KR101020913B1 (ko) * | 2003-07-28 | 2011-03-09 | 소니 주식회사 | 데이터 송신 장치, 데이터 사용 인정 방법, 데이터 수신 장치 및 방법, 및 기록 매체 |
| US7461399B2 (en) * | 2004-07-30 | 2008-12-02 | Rsa Security Inc. | PIN recovery in a smart card |
| US20070162961A1 (en) | 2005-02-25 | 2007-07-12 | Kelvin Tarrance | Identification authentication methods and systems |
| JP4697583B2 (ja) | 2005-03-02 | 2011-06-08 | 琢晃 伊藤 | 個人情報の漏洩を回避した個人認証システム |
| US7694138B2 (en) * | 2005-10-21 | 2010-04-06 | Avaya Inc. | Secure authentication with voiced responses from a telecommunications terminal |
| US7739733B2 (en) | 2005-11-02 | 2010-06-15 | Emc Corporation | Storing digital secrets in a vault |
| CA2648780C (en) | 2006-04-25 | 2013-07-16 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
| EP2122900A4 (en) * | 2007-01-22 | 2014-07-23 | Spyrus Inc | PORTABLE DATA ENCRYPTION DEVICE WITH CONFIGURABLE SAFETY FUNCTIONS AND METHOD FOR FILING ENCRYPTION |
| JP4917453B2 (ja) * | 2007-02-22 | 2012-04-18 | Kddi株式会社 | 閾値秘密分散装置、閾値秘密分散方法、秘密情報復元方法およびプログラム |
| CN101145911B (zh) | 2007-10-30 | 2010-05-19 | 江汉大学 | 具有私密保护及口令找回功能的身份认证方法 |
| US8156333B2 (en) * | 2008-05-29 | 2012-04-10 | Red Hat, Inc. | Username based authentication security |
| EP2329423B1 (en) * | 2008-09-26 | 2018-07-18 | Koninklijke Philips N.V. | Authenticating a device and a user |
| US8527758B2 (en) * | 2009-12-09 | 2013-09-03 | Ebay Inc. | Systems and methods for facilitating user identity verification over a network |
| US8842827B2 (en) * | 2010-07-16 | 2014-09-23 | Intryca, Inc. | Mobile phone aided operations system and method |
| JP4820928B1 (ja) | 2011-07-08 | 2011-11-24 | 株式会社野村総合研究所 | 認証システムおよび認証方法 |
-
2013
- 2013-03-15 US US13/844,619 patent/US8949960B2/en active Active
-
2014
- 2014-03-07 AU AU2014237590A patent/AU2014237590B2/en active Active
- 2014-03-07 CN CN201480027980.2A patent/CN105210071B/zh active Active
- 2014-03-07 KR KR1020157029514A patent/KR102257943B1/ko active Active
- 2014-03-07 EP EP14769429.3A patent/EP2973162B1/en active Active
- 2014-03-07 WO PCT/US2014/022075 patent/WO2014150064A1/en not_active Ceased
- 2014-03-07 JP JP2016500901A patent/JP6352381B2/ja active Active
- 2014-03-07 BR BR112015023183-7A patent/BR112015023183B1/pt active IP Right Grant
-
2016
- 2016-10-28 JP JP2016211833A patent/JP6494584B2/ja active Active
Also Published As
| Publication number | Publication date |
|---|---|
| KR20150132467A (ko) | 2015-11-25 |
| US20140282942A1 (en) | 2014-09-18 |
| EP2973162A4 (en) | 2016-09-07 |
| WO2014150064A1 (en) | 2014-09-25 |
| CN105210071B (zh) | 2018-06-01 |
| EP2973162A1 (en) | 2016-01-20 |
| CN105210071A (zh) | 2015-12-30 |
| JP6352381B2 (ja) | 2018-07-04 |
| US8949960B2 (en) | 2015-02-03 |
| AU2014237590B2 (en) | 2019-02-28 |
| EP2973162B1 (en) | 2018-06-06 |
| KR102257943B1 (ko) | 2021-05-28 |
| AU2014237590A1 (en) | 2015-09-10 |
| JP2017073789A (ja) | 2017-04-13 |
| JP6494584B2 (ja) | 2019-04-03 |
| BR112015023183A2 (pt) | 2017-07-18 |
| BR112015023183A8 (pt) | 2018-01-02 |
| JP2016512931A (ja) | 2016-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| BR112015023183B1 (pt) | Dispositivo, mídia de armazenamento legível por computador e servidor para testes de posse de fator/conhecimento de preservação de privacidade para autenticação persistente | |
| US11233637B2 (en) | System and method for validating an entity | |
| US11271926B2 (en) | System and method for temporary password management | |
| US12126631B2 (en) | Detecting compromised credentials in a credential stuffing attack | |
| US20240121089A1 (en) | Protecting data using controlled corruption in computer networks | |
| ES2871062T3 (es) | Sistema y método para la gestión de datos basada en cadena de bloques | |
| US9286466B2 (en) | Registration and authentication of computing devices using a digital skeleton key | |
| US20190036914A1 (en) | System and method for temporary password management | |
| US10050795B2 (en) | Robust restoration of passphrases from partial information | |
| Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
| CN116318617B (zh) | 基于rfid和区块链的医疗救援物资慈善捐助方法 | |
| Kissell | Take control of your passwords | |
| Syahreen et al. | A Systematic Review on Multi-Factor Authentication Framework. | |
| Nakouri et al. | A new biometric-based security framework for cloud storage | |
| McCarney | Password managers: Comparative evaluation, design, implementation and empirical analysis | |
| Breit et al. | Exploration of the security and usability of the fido2 authentication protocol | |
| Maqbali | Strengthening Password-Based Authentication | |
| Fernando et al. | An Automated Solution for Secure Password Management | |
| Mannan et al. | The usable security of passwords based on digital objects: From design and analysis to user study | |
| Pilania et al. | ENCRYPTO: A Reliable and Efficient Mobile App for Password Management | |
| Robin et al. | NoPass—A Novel Passwordless Multi-authentication-Based Approach for Secure Login | |
| Wueppelmann | PGP Auth: Using Public Key Encryption for Authentication on the Web | |
| Bonneau et al. | Passwords and the Evolution of Imperfect Authentication Theory on passwords has lagged practice, where large providers use back-end smarts to survive with imperfect technology. | |
| Hayata | DEVELOPING A SECURE AND USABLE USER-COGNITIVE AUTHENTICATION SCHEME _ A Thesis Presented |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B25D | Requested change of name of applicant approved |
Owner name: GOOGLE LLC (US) |
|
| B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
| B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
| B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
| B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 07/03/2014, OBSERVADAS AS CONDICOES LEGAIS. |