CA2983550A1 - Devices and methods for client device authentication - Google Patents
Devices and methods for client device authentication Download PDFInfo
- Publication number
- CA2983550A1 CA2983550A1 CA2983550A CA2983550A CA2983550A1 CA 2983550 A1 CA2983550 A1 CA 2983550A1 CA 2983550 A CA2983550 A CA 2983550A CA 2983550 A CA2983550 A CA 2983550A CA 2983550 A1 CA2983550 A1 CA 2983550A1
- Authority
- CA
- Canada
- Prior art keywords
- key
- cryptographic hash
- passphrase
- client
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP16306445.4 | 2016-11-04 | ||
| EP16306445.4A EP3319289A1 (en) | 2016-11-04 | 2016-11-04 | Devices and methods for client device authentication |
| EP17305661.5A EP3413508A1 (en) | 2017-06-06 | 2017-06-06 | Devices and methods for client device authentication |
| EP17305661.5 | 2017-06-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CA2983550A1 true CA2983550A1 (en) | 2018-05-04 |
Family
ID=61767981
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CA2983550A Abandoned CA2983550A1 (en) | 2016-11-04 | 2017-10-24 | Devices and methods for client device authentication |
Country Status (10)
| Country | Link |
|---|---|
| US (2) | US10708058B2 (enExample) |
| EP (1) | EP3319295B1 (enExample) |
| JP (1) | JP2018110378A (enExample) |
| KR (1) | KR20180050233A (enExample) |
| CN (1) | CN108023731A (enExample) |
| BR (1) | BR102017023626A2 (enExample) |
| CA (1) | CA2983550A1 (enExample) |
| MX (1) | MX378609B (enExample) |
| MY (1) | MY181840A (enExample) |
| RU (1) | RU2739732C2 (enExample) |
Families Citing this family (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10262164B2 (en) | 2016-01-15 | 2019-04-16 | Blockchain Asics Llc | Cryptographic ASIC including circuitry-encoded transformation function |
| US10372943B1 (en) | 2018-03-20 | 2019-08-06 | Blockchain Asics Llc | Cryptographic ASIC with combined transformation and one-way functions |
| US10256974B1 (en) | 2018-04-25 | 2019-04-09 | Blockchain Asics Llc | Cryptographic ASIC for key hierarchy enforcement |
| CN109257630B (zh) * | 2018-11-14 | 2020-12-11 | 苏州科达科技股份有限公司 | 视频点播中的数据传输系统、方法、装置及存储介质 |
| CN109451493B (zh) * | 2018-11-30 | 2022-03-18 | 锐捷网络股份有限公司 | 基于wpa的密钥配置方法及装置 |
| US11496457B2 (en) | 2019-06-10 | 2022-11-08 | Microsoft Technology Licensing, Llc | Partial pattern recognition in a stream of symbols |
| US11736472B2 (en) | 2019-06-10 | 2023-08-22 | Microsoft Technology Licensing, Llc | Authentication with well-distributed random noise symbols |
| US11514149B2 (en) * | 2019-06-10 | 2022-11-29 | Microsoft Technology Licensing, Llc | Pattern matching for authentication with random noise symbols and pattern recognition |
| US12155646B2 (en) | 2019-06-10 | 2024-11-26 | Microsoft Technology Licensing, Llc | Authentication with random noise symbols and pattern recognition |
| US11394551B2 (en) | 2019-07-17 | 2022-07-19 | Microsoft Technology Licensing, Llc | Secure authentication using puncturing |
| US11812257B2 (en) | 2020-03-04 | 2023-11-07 | Qualcomm Incorporated | Multi-link wireless communication security |
| CN111985772B (zh) * | 2020-07-15 | 2024-02-20 | 惠州市德赛西威智能交通技术研究院有限公司 | 一种评价标准协议的鲁棒性与完整度实现方法 |
| CN111866881B (zh) * | 2020-08-12 | 2024-11-26 | 腾讯科技(深圳)有限公司 | 无线局域网认证方法与无线局域网连接方法 |
| WO2022109941A1 (zh) * | 2020-11-26 | 2022-06-02 | 华为技术有限公司 | 应用于WiFi的安全认证的方法和装置 |
| CN112291773B (zh) * | 2020-12-31 | 2021-04-06 | 飞天诚信科技股份有限公司 | 一种认证器及其通信方法 |
| KR20220124939A (ko) * | 2021-03-04 | 2022-09-14 | 삼성전자주식회사 | 공유 암호 키 갱신을 수행하는 방법 및 이를 지원하는 전자 장치 |
| EP4145412B1 (en) * | 2021-05-12 | 2025-10-15 | Harman International Industries, Incorporated | Secured seamless authentication for bluetooth just works pairing |
| US12452660B2 (en) * | 2021-06-25 | 2025-10-21 | Intel Corporation | 4-way handshake optimization |
| CN113573307B (zh) * | 2021-07-28 | 2024-01-30 | 西安热工研究院有限公司 | 一种基于可扩展认证协议的快速认证方法 |
| US12069162B2 (en) * | 2021-09-10 | 2024-08-20 | Assa Abloy Ab | Fast bilateral key confirmation |
| CN113727336B (zh) * | 2021-09-13 | 2024-01-16 | 深圳市联洲国际技术有限公司 | 一种iot设备与智能网关的运行方法、终端设备及存储介质 |
| CN114173334A (zh) * | 2021-10-26 | 2022-03-11 | 新华三大数据技术有限公司 | 一种接入ap的方法、ap和存储介质 |
| CN114202829B (zh) * | 2021-10-29 | 2023-10-13 | 广东卓维网络有限公司 | 一种智能财务管理专用设备方法和装置 |
| CN115915244B (zh) * | 2022-11-23 | 2025-12-02 | 上海东土致远智能科技发展有限公司 | 接入客户端的监控方法、装置、存储介质以及电子设备 |
| FR3146776B1 (fr) * | 2023-03-17 | 2025-08-15 | Orange | Connexion multi-profils d’une station à un point d’accès d’un réseau de télécommunication sans-fil |
Family Cites Families (42)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5418854A (en) | 1992-04-28 | 1995-05-23 | Digital Equipment Corporation | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system |
| US20020090089A1 (en) | 2001-01-05 | 2002-07-11 | Steven Branigan | Methods and apparatus for secure wireless networking |
| JP3677471B2 (ja) | 2001-10-31 | 2005-08-03 | 秀典 難波 | パスワード認証方法及びパスワード認証プログラム |
| JP2003150552A (ja) | 2001-11-13 | 2003-05-23 | Namco Ltd | 入力受付装置、入力受付プログラムおよびそのプログラムが記録された記録媒体 |
| US7370350B1 (en) | 2002-06-27 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for re-authenticating computing devices |
| CN100362819C (zh) | 2003-09-30 | 2008-01-16 | 华为技术有限公司 | 一种获取接入无线局域网一次性密码的方法 |
| US8532304B2 (en) * | 2005-04-04 | 2013-09-10 | Nokia Corporation | Administration of wireless local area networks |
| JP4778793B2 (ja) | 2006-01-11 | 2011-09-21 | 東日本電信電話株式会社 | 無線lanシステム、無線アクセスポイントおよび無線端末 |
| TWI425802B (zh) * | 2006-06-19 | 2014-02-01 | Interdigital Tech Corp | 確保無線通信安全的無線發射/接收單元及方法 |
| KR20090038890A (ko) * | 2006-07-05 | 2009-04-21 | 에이저 시스템즈 인크 | 핸즈 프리 동작 환경들을 구현하기 위한 시스템들과 방법들 |
| US7793103B2 (en) * | 2006-08-15 | 2010-09-07 | Motorola, Inc. | Ad-hoc network key management |
| US20080066167A1 (en) | 2006-09-12 | 2008-03-13 | Andri Michael J | Password based access including error allowance |
| JP4881119B2 (ja) * | 2006-09-29 | 2012-02-22 | 株式会社東芝 | ユーザ認証方法、ユーザ側認証装置、および、プログラム |
| FR2937204B1 (fr) * | 2008-10-15 | 2013-08-23 | In Webo Technologies | Systeme d'authentification |
| US20100115583A1 (en) | 2008-11-03 | 2010-05-06 | International Business Machines Corporation | Method for fault-tolerant user information authentication |
| US20100145861A1 (en) * | 2008-12-08 | 2010-06-10 | Palm, Inc. | Payment transaction processing for mobile computing devices |
| US9064278B2 (en) * | 2010-12-30 | 2015-06-23 | Futurewei Technologies, Inc. | System for managing, storing and providing shared digital content to users in a user relationship defined group in a multi-platform environment |
| US9148776B1 (en) * | 2011-09-28 | 2015-09-29 | Pulse Secure, Llc | Network address preservation in mobile networks |
| US11328325B2 (en) * | 2012-03-23 | 2022-05-10 | Secureads, Inc. | Method and/or system for user authentication with targeted electronic advertising content through personal communication devices |
| JP5971038B2 (ja) * | 2012-09-03 | 2016-08-17 | 富士通株式会社 | 認証装置、認証方法、及び認証プログラム |
| GB2508606B (en) * | 2012-12-04 | 2015-06-03 | Barclays Bank Plc | Credential recovery |
| US9305150B2 (en) | 2012-12-10 | 2016-04-05 | Lookout, Inc. | Method and system for managing user login behavior on an electronic device for enhanced security |
| EP2793157A1 (en) | 2013-04-19 | 2014-10-22 | Thomson Licensing | Apparatus and method for managing passwords |
| CN103501228B (zh) * | 2013-08-01 | 2017-07-07 | 宋博韬 | 一种动态二维码令牌及动态二维码口令认证方法 |
| EP2876569A1 (en) | 2013-11-26 | 2015-05-27 | Thomson Licensing | Apparatuses and methods for password authentication |
| CN103731272B (zh) | 2014-01-06 | 2017-06-06 | 飞天诚信科技股份有限公司 | 一种身份认证方法、系统及设备 |
| JP6043738B2 (ja) * | 2014-01-30 | 2016-12-14 | 株式会社日立製作所 | 鍵管理装置および鍵管理方法 |
| EP2947591A1 (en) | 2014-05-22 | 2015-11-25 | Thomson Licensing | Authentication by Password Mistyping Correction |
| EP2955654A1 (en) | 2014-06-12 | 2015-12-16 | Thomson Licensing | Apparatus and method for password authentication |
| EP2955655A1 (en) | 2014-06-12 | 2015-12-16 | Thomson Licensing | Apparatuses and methods for password authentication |
| US9170707B1 (en) * | 2014-09-30 | 2015-10-27 | Google Inc. | Method and system for generating a smart time-lapse video clip |
| US9779401B2 (en) * | 2014-08-19 | 2017-10-03 | Qualcomm Incorporated | Network access authentication using a point-of-sale device |
| JP2016051251A (ja) * | 2014-08-29 | 2016-04-11 | キヤノンマーケティングジャパン株式会社 | 認証装置、認証システム、認証方法、およびプログラム |
| GB2531710A (en) * | 2014-10-24 | 2016-05-04 | Ibm | Keyboard neutral authentication |
| US20160127903A1 (en) * | 2014-11-05 | 2016-05-05 | Qualcomm Incorporated | Methods and systems for authentication interoperability |
| EP3067811A1 (en) | 2015-03-12 | 2016-09-14 | Thomson Licensing | Apparatus and method for password authentication |
| WO2016145454A1 (en) * | 2015-03-12 | 2016-09-15 | Wiacts, Inc. | Multi-factor user authentication |
| US10149159B1 (en) * | 2015-03-19 | 2018-12-04 | Proxidyne, Inc. | Trusted beacon system and method |
| US9697371B1 (en) * | 2015-06-30 | 2017-07-04 | Google Inc. | Remote authorization of usage of protected data in trusted execution environments |
| US9736699B1 (en) * | 2015-07-28 | 2017-08-15 | Sanjay K. Rao | Wireless Communication Streams for Devices, Vehicles and Drones |
| CN105847058A (zh) | 2016-03-31 | 2016-08-10 | 乐视控股(北京)有限公司 | 一种无线密码设置方法及装置 |
| KR102593344B1 (ko) * | 2016-07-06 | 2023-10-25 | 삼성전자주식회사 | 전자 장치, 웨어러블 장치 및 전자 장치의 화면 제어 방법 |
-
2017
- 2017-10-20 MY MYPI2017703974A patent/MY181840A/en unknown
- 2017-10-24 CA CA2983550A patent/CA2983550A1/en not_active Abandoned
- 2017-10-30 EP EP17199197.9A patent/EP3319295B1/en active Active
- 2017-10-31 US US15/798,502 patent/US10708058B2/en not_active Expired - Fee Related
- 2017-11-01 RU RU2017138066A patent/RU2739732C2/ru active
- 2017-11-01 KR KR1020170144691A patent/KR20180050233A/ko not_active Ceased
- 2017-11-01 BR BR102017023626-9A patent/BR102017023626A2/pt not_active IP Right Cessation
- 2017-11-02 JP JP2017212587A patent/JP2018110378A/ja not_active Ceased
- 2017-11-03 MX MX2017014141A patent/MX378609B/es unknown
- 2017-11-06 CN CN201711077975.4A patent/CN108023731A/zh active Pending
-
2020
- 2020-05-22 US US16/882,181 patent/US20200287720A1/en not_active Abandoned
Also Published As
| Publication number | Publication date |
|---|---|
| RU2017138066A (ru) | 2019-05-06 |
| RU2739732C2 (ru) | 2020-12-28 |
| MY181840A (en) | 2021-01-08 |
| US20200287720A1 (en) | 2020-09-10 |
| MX2017014141A (es) | 2018-10-01 |
| CN108023731A (zh) | 2018-05-11 |
| MX378609B (es) | 2025-03-10 |
| US20180131519A1 (en) | 2018-05-10 |
| KR20180050233A (ko) | 2018-05-14 |
| US10708058B2 (en) | 2020-07-07 |
| EP3319295A1 (en) | 2018-05-09 |
| RU2017138066A3 (enExample) | 2020-11-17 |
| JP2018110378A (ja) | 2018-07-12 |
| EP3319295B1 (en) | 2020-09-30 |
| BR102017023626A2 (pt) | 2018-05-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3319295B1 (en) | Devices and methods for client device authentication | |
| EP3493502B1 (en) | Supplying an iot-device with an authentication key | |
| US12052350B2 (en) | Quantum resistant secure key distribution in various protocols and technologies | |
| US8374582B2 (en) | Access method and system for cellular mobile communication network | |
| RU2722508C1 (ru) | Скрытый идентификатор подписки абонента | |
| JP6641029B2 (ja) | キー配信および認証方法およびシステム、ならびに装置 | |
| JP6732095B2 (ja) | 異種ネットワークのための統一認証 | |
| CN101371491B (zh) | 提供无线网状网络的方法和装置 | |
| CN105554747B (zh) | 无线网络连接方法、装置及系统 | |
| US11044084B2 (en) | Method for unified network and service authentication based on ID-based cryptography | |
| JP2022517658A (ja) | 電気通信ネットワークにおける端末内の移動体装置と協働するセキュアエレメントを認証する方法 | |
| WO2017185999A1 (zh) | 密钥分发、认证方法,装置及系统 | |
| EP3413508A1 (en) | Devices and methods for client device authentication | |
| KR20100103721A (ko) | 무선 통신 네트워크에서 노드들의 상호 인증을 위한 방법 및 시스템 | |
| WO2020007461A1 (en) | Authentication and key agreement between a network and a user equipment | |
| JP2011139457A (ja) | 無線通信装置とサーバとの間でデータを安全にトランザクション処理する方法及びシステム | |
| CN110087240B (zh) | 基于wpa2-psk模式的无线网络安全数据传输方法及系统 | |
| WO2020094475A1 (en) | Authentication and key agreement for a terminal device | |
| EP1933498B1 (en) | Method, system and device for negotiating about cipher key shared by ue and external equipment | |
| EP3319289A1 (en) | Devices and methods for client device authentication | |
| US9307406B2 (en) | Apparatus and method for authenticating access of a mobile station in a wireless communication system | |
| WO2021236078A1 (en) | Simplified method for onboarding and authentication of identities for network access | |
| US20240340164A1 (en) | Establishment of forward secrecy during digest authentication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FZDE | Discontinued |
Effective date: 20230425 |
|
| FZDE | Discontinued |
Effective date: 20230425 |