BR112017020724A2 - método, e, dispositivo de comunicação - Google Patents
método, e, dispositivo de comunicaçãoInfo
- Publication number
- BR112017020724A2 BR112017020724A2 BR112017020724-9A BR112017020724A BR112017020724A2 BR 112017020724 A2 BR112017020724 A2 BR 112017020724A2 BR 112017020724 A BR112017020724 A BR 112017020724A BR 112017020724 A2 BR112017020724 A2 BR 112017020724A2
- Authority
- BR
- Brazil
- Prior art keywords
- cryptogram
- secondary device
- primary
- credential data
- authorization
- Prior art date
Links
- 238000004891 communication Methods 0.000 title abstract 2
- 238000000034 method Methods 0.000 title abstract 2
- 238000013475 authorization Methods 0.000 abstract 2
- 230000003993 interaction Effects 0.000 abstract 2
- 230000000694 effects Effects 0.000 abstract 1
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000012795 verification Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/18—Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/28—Pre-payment schemes, e.g. "pay before"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/308—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/321—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/065—Continuous authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/33—Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
Abstract
acentuar as técnicas de autenticação podem incluir receber dados de credencial de um dispositivo secundário através de um dispositivo primário, gerar um criptograma usando os dados de credencial do dispositivo secundário e transmitir o criptograma para um dispositivo de acesso para solicitar autorização para utilizar uma conta associada a um usuário do dispositivo primário. a autorização pode ser concedida com base na verificação do criptograma e um padrão de atividade de interação de interações entre o dispositivo primário e um conjunto de dispositivos de comunicação, incluindo o dispositivo secundário.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562146881P | 2015-04-13 | 2015-04-13 | |
US62/146881 | 2015-04-13 | ||
PCT/US2016/027344 WO2016168339A1 (en) | 2015-04-13 | 2016-04-13 | Enhanced authentication based on secondary device interactions |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112017020724A2 true BR112017020724A2 (pt) | 2018-06-26 |
Family
ID=57126826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112017020724-9A BR112017020724A2 (pt) | 2015-04-13 | 2016-04-13 | método, e, dispositivo de comunicação |
Country Status (9)
Country | Link |
---|---|
US (2) | US10601818B2 (pt) |
EP (2) | EP3284007B1 (pt) |
CN (2) | CN107533620B (pt) |
AU (1) | AU2016250092A1 (pt) |
BR (1) | BR112017020724A2 (pt) |
CA (1) | CA2977428A1 (pt) |
HK (1) | HK1245919A1 (pt) |
SG (1) | SG11201706467TA (pt) |
WO (1) | WO2016168339A1 (pt) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016134016A1 (en) * | 2015-02-17 | 2016-08-25 | Visa International Service Association | Token and cryptogram using transaction specific information |
EP3284007B1 (en) | 2015-04-13 | 2023-10-25 | Visa International Service Association | Enhanced authentication based on secondary device interactions |
US11521203B2 (en) * | 2015-07-09 | 2022-12-06 | Cryptography Research, Inc. | Generating a cryptographic key based on transaction data of mobile payments |
US10178164B2 (en) * | 2015-08-31 | 2019-01-08 | Visa International Service Association | Secure binding of software application to communication device |
US10475036B2 (en) * | 2016-01-08 | 2019-11-12 | Ca, Inc. | Restricting account use by controlled replenishment |
US10861019B2 (en) * | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
WO2018031914A1 (en) * | 2016-08-12 | 2018-02-15 | Visa International Service Association | Mirrored token vault |
US10796304B2 (en) * | 2017-06-12 | 2020-10-06 | Bank Of America Corporation | System and method of managing computing resources |
US11144627B2 (en) * | 2017-09-20 | 2021-10-12 | Qualcomm Incorporated | Peer assisted enhanced authentication |
US20190228410A1 (en) * | 2018-01-24 | 2019-07-25 | Mastercard International Incorporated | Method and system for generating and using contextual cryptograms for proximity and e-commerce payment |
US11102180B2 (en) * | 2018-01-31 | 2021-08-24 | The Toronto-Dominion Bank | Real-time authentication and authorization based on dynamically generated cryptographic data |
US20190251073A1 (en) * | 2018-02-14 | 2019-08-15 | Samsung Electronics Co., Ltd. | Method and interactive device for providing social interaction |
US11240220B2 (en) * | 2018-06-13 | 2022-02-01 | Paypal, Inc. | Systems and methods for user authentication based on multiple devices |
US11018872B2 (en) | 2018-07-17 | 2021-05-25 | Verizon Patent And Licensing Inc. | Validating and securing caller identification to prevent identity spoofing |
US10939296B2 (en) * | 2018-08-20 | 2021-03-02 | Ford Global Technologies, Llc | Vehicle smart connection |
EP3881258A4 (en) | 2018-11-14 | 2022-01-12 | Visa International Service Association | SUPPLY OF TOKENS IN THE CLOUD OF MULTIPLE TOKENS |
US11315571B2 (en) * | 2018-11-28 | 2022-04-26 | Visa International Service Association | Audible authentication |
CN113196813A (zh) * | 2018-12-12 | 2021-07-30 | 维萨国际服务协会 | 从非接触式装置发起的预配 |
JP2022059099A (ja) * | 2019-02-25 | 2022-04-13 | ソニーグループ株式会社 | 情報処理装置、情報処理方法、及び、プログラム |
US11070980B1 (en) * | 2019-03-25 | 2021-07-20 | Sprint Communications Company L.P. | Secondary device authentication proxied from authenticated primary device |
US11283781B2 (en) | 2019-04-09 | 2022-03-22 | Visa International Service Association | Proximity interaction system including secure encryption scheme |
US11711361B2 (en) * | 2019-06-04 | 2023-07-25 | Paypal, Inc. | Biometric authentication during voice data transfers |
US11140165B2 (en) * | 2019-07-22 | 2021-10-05 | Bank Of America Corporation | System for selective mapping of distributed resources across network edge framework for authorized user access |
US11868981B2 (en) * | 2019-08-02 | 2024-01-09 | Mastercard International Incorporated | System and method to support payment acceptance capability for merchants |
US11296862B2 (en) * | 2019-08-29 | 2022-04-05 | Visa International Service Association | Provisioning method and system with message conversion |
US10985921B1 (en) * | 2019-11-05 | 2021-04-20 | Capital One Services, Llc | Systems and methods for out-of-band authenticity verification of mobile applications |
US11683159B2 (en) * | 2019-11-07 | 2023-06-20 | Google Llc | Hybrid content protection architecture |
US11601279B2 (en) * | 2020-06-12 | 2023-03-07 | Capital One Services, Llc | Systems and methods for payment authentication |
US11165586B1 (en) * | 2020-10-30 | 2021-11-02 | Capital One Services, Llc | Call center web-based authentication using a contactless card |
US20230046788A1 (en) * | 2021-08-16 | 2023-02-16 | Capital One Services, Llc | Systems and methods for resetting an authentication counter |
US20230066754A1 (en) * | 2021-08-25 | 2023-03-02 | Visa International Service Association | Digital identity authentication system and method |
CN114826780B (zh) * | 2022-06-24 | 2022-09-20 | 中铱数字科技有限公司 | 一种基于区块链的多层次权限管理系统及方法 |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7095852B2 (en) | 1998-02-13 | 2006-08-22 | Tecsec, Inc. | Cryptographic key split binder for use with tagged data elements |
US6363485B1 (en) * | 1998-09-09 | 2002-03-26 | Entrust Technologies Limited | Multi-factor biometric authenticating device and method |
US7284125B2 (en) * | 2000-03-23 | 2007-10-16 | Tietech Co. Ltd. | Method and apparatus for personal identification |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7146009B2 (en) | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
US7676846B2 (en) * | 2004-02-13 | 2010-03-09 | Microsoft Corporation | Binding content to an entity |
US7865140B2 (en) * | 2005-06-14 | 2011-01-04 | The Invention Science Fund I, Llc | Device pairing via intermediary device |
US7734911B2 (en) * | 2005-05-31 | 2010-06-08 | Tricipher, Inc. | Secure login using augmented single factor split key asymmetric cryptography |
GB2442249B (en) | 2007-02-20 | 2008-09-10 | Cryptomathic As | Authentication device and method |
CN101526985A (zh) * | 2008-03-04 | 2009-09-09 | 索尼(中国)有限公司 | 数字权限管理客户端系统及方法和数字权限管理系统 |
US9489503B2 (en) | 2009-12-21 | 2016-11-08 | Paypal, Inc. | Behavioral stochastic authentication (BSA) |
CA2738157C (en) * | 2010-04-29 | 2017-07-11 | Research In Motion Limited | Assignment and distribution of access credentials to mobile communication devices |
US20130275308A1 (en) | 2010-11-29 | 2013-10-17 | Mobay Technologies Limited | System for verifying electronic transactions |
EP2718805A1 (en) * | 2011-06-10 | 2014-04-16 | Aliphcom | Wearable device data security |
US8446275B2 (en) * | 2011-06-10 | 2013-05-21 | Aliphcom | General health and wellness management method and apparatus for a wellness application using data from a data-capable band |
US20130006650A1 (en) * | 2011-06-29 | 2013-01-03 | Mckesson Financial Holdings | Method and apparatus for migrating between devices while interacting with a healthcare application |
TWI479870B (zh) * | 2011-08-16 | 2015-04-01 | Ict Korea Co Ltd | 基於puf透過機器對機器溝通在裝置之間認證的設備與方法 |
CA3012991A1 (en) * | 2011-08-30 | 2013-03-07 | C. Doug Yeager | Systems and methods for authorizing a transaction with an unexpected cryptogram |
DE102011054842A1 (de) * | 2011-10-27 | 2013-05-02 | Wincor Nixdorf International Gmbh | Vorrichtung zur Handhabung von Wertscheinen und/oder Münzen sowie Verfahren zur Initialisierung und zum Betrieb einer solchen Vorrichtung |
US20140214673A1 (en) | 2011-12-21 | 2014-07-31 | Jim S. Baca | Method for authentication using biometric data for mobile device e-commerce transactions |
US10515359B2 (en) | 2012-04-02 | 2019-12-24 | Mastercard International Incorporated | Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements |
US8819445B2 (en) * | 2012-04-09 | 2014-08-26 | Mcafee, Inc. | Wireless token authentication |
US8855312B1 (en) * | 2012-06-29 | 2014-10-07 | Emc Corporation | Mobile trust broker |
US20140085050A1 (en) * | 2012-09-25 | 2014-03-27 | Aliphcom | Validation of biometric identification used to authenticate identity of a user of wearable sensors |
US9942750B2 (en) * | 2013-01-23 | 2018-04-10 | Qualcomm Incorporated | Providing an encrypted account credential from a first device to a second device |
US20140278839A1 (en) * | 2013-03-15 | 2014-09-18 | Joe M. Lynam | Location Based Payment System |
US20140279519A1 (en) * | 2013-03-15 | 2014-09-18 | Jumio Inc. | Method and system for obtaining and using identification information |
GB2512944A (en) | 2013-04-12 | 2014-10-15 | Mastercard International Inc | Systems and methods for outputting information on a display of a mobile device |
US9112859B2 (en) * | 2013-06-13 | 2015-08-18 | Google Technology Holdings LLC | Method and apparatus for electronic device access |
US9208335B2 (en) * | 2013-09-17 | 2015-12-08 | Auburn University | Space-time separated and jointly evolving relationship-based network access and data protection system |
US10548007B2 (en) | 2013-11-15 | 2020-01-28 | Here Global B.V. | Security operations for wireless devices |
CN104144049B (zh) * | 2014-03-11 | 2016-02-17 | 腾讯科技(深圳)有限公司 | 一种加密通信方法、系统和装置 |
EP3195521B1 (en) * | 2014-08-29 | 2020-03-04 | Visa International Service Association | Methods for secure cryptogram generation |
EP3284007B1 (en) | 2015-04-13 | 2023-10-25 | Visa International Service Association | Enhanced authentication based on secondary device interactions |
-
2016
- 2016-04-13 EP EP16780658.7A patent/EP3284007B1/en active Active
- 2016-04-13 CA CA2977428A patent/CA2977428A1/en not_active Abandoned
- 2016-04-13 CN CN201680021444.0A patent/CN107533620B/zh active Active
- 2016-04-13 EP EP23198267.9A patent/EP4271016A3/en active Pending
- 2016-04-13 WO PCT/US2016/027344 patent/WO2016168339A1/en active Application Filing
- 2016-04-13 SG SG11201706467TA patent/SG11201706467TA/en unknown
- 2016-04-13 CN CN202110693375.0A patent/CN113420281A/zh active Pending
- 2016-04-13 US US15/551,499 patent/US10601818B2/en active Active
- 2016-04-13 BR BR112017020724-9A patent/BR112017020724A2/pt not_active Application Discontinuation
- 2016-04-13 AU AU2016250092A patent/AU2016250092A1/en not_active Withdrawn
-
2018
- 2018-04-19 HK HK18105067.7A patent/HK1245919A1/zh unknown
-
2020
- 2020-02-07 US US16/785,487 patent/US11086980B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107533620A (zh) | 2018-01-02 |
EP3284007A1 (en) | 2018-02-21 |
US10601818B2 (en) | 2020-03-24 |
WO2016168339A1 (en) | 2016-10-20 |
CN107533620B (zh) | 2021-07-02 |
AU2016250092A1 (en) | 2017-08-24 |
SG11201706467TA (en) | 2017-09-28 |
US20180026973A1 (en) | 2018-01-25 |
EP3284007A4 (en) | 2018-02-21 |
CN113420281A (zh) | 2021-09-21 |
CA2977428A1 (en) | 2016-10-20 |
HK1245919A1 (zh) | 2018-08-31 |
EP3284007B1 (en) | 2023-10-25 |
US11086980B2 (en) | 2021-08-10 |
US20200177583A1 (en) | 2020-06-04 |
EP4271016A3 (en) | 2024-01-03 |
EP4271016A2 (en) | 2023-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112017020724A2 (pt) | método, e, dispositivo de comunicação | |
BR112016023842A2 (pt) | sistemas, aparelhos e métodos para autenticação melhorada | |
GB2579976A8 (en) | Identity verification using biometric data and non-invertible functions via blockchain | |
BR112018076196A2 (pt) | método, e, dispositivos de comunicação portátil e de acesso. | |
CO2018011415A2 (es) | Sistemas y métodos para proporcionar una verificación de identidad personal multifactorial basada en una cadena de bloques | |
BR112016015458A8 (pt) | Sistema e método para padrões de protocolo biométrico | |
BR112017003018A2 (pt) | fornecimento seguro de uma credencial de autenticação | |
BR112018067885A8 (pt) | Método e sistema para distribuição eletrônica de tokens controlados | |
MX2019002625A (es) | Sistemas y metodos para autentificacion de dispositivos. | |
MX2019012571A (es) | Sistemas y metodos para verificacion y autenticacion de dispositivos. | |
MX2017001090A (es) | Gestion de claves inalambrica para autenticacion. | |
BR112017002747A2 (pt) | método implementado por computador, e, sistema de computador. | |
BR112017005824A2 (pt) | método, e, dispositivo móvel. | |
BR112016014106A2 (pt) | Método para intensificar a segurança de um dispositivo de comunicação, e, dispositivo de comunicação | |
PE20170656A1 (es) | Autenticacion de la red de servicio | |
NZ740305A (en) | Enabling emergency access to secure wireless communications networks | |
BR112016021480A2 (pt) | Método e equipamento para autenticar usuário em aparelho móvel | |
BR112016012527A2 (pt) | Método e sistema para autenticação segura de usuário e dispositivo móvel sem elementos seguros | |
PH12017500552A1 (en) | Replaceable item authentication | |
PH12019500983B1 (en) | Verified and private portable identity | |
PH12016502598A1 (en) | Security control system for granting access and security control method thereof | |
BR112014019847A8 (pt) | Garantia de acesso seguro a um servidor de localização descoberta para um dispositivo móvel | |
GB2533728A (en) | Method for assigning an agent device from a first device registry to a second device registry | |
SG10201810422SA (en) | Dual channel identity authentication | |
AR101574A1 (es) | Métodos y nodos para la correspondencia del abono con la identidad de usuario del servicio |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B11B | Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements | ||
B350 | Update of information on the portal [chapter 15.35 patent gazette] |