CA3034665A1 - Methodes et systemes permettant de controler l`acces a une ressource protegee - Google Patents

Methodes et systemes permettant de controler l`acces a une ressource protegee Download PDF

Info

Publication number
CA3034665A1
CA3034665A1 CA3034665A CA3034665A CA3034665A1 CA 3034665 A1 CA3034665 A1 CA 3034665A1 CA 3034665 A CA3034665 A CA 3034665A CA 3034665 A CA3034665 A CA 3034665A CA 3034665 A1 CA3034665 A1 CA 3034665A1
Authority
CA
Canada
Prior art keywords
client application
token
protected resource
access
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA3034665A
Other languages
English (en)
Other versions
CA3034665C (fr
Inventor
Milos Dunjic
Anthony Haituyen Nguyen
Yubing LIU
Arthur Carroll Chow
Casey Lyn Doyle
Richard John Frederick Thake
Mengfei WANG
Aaron Ashish Hudali
Gregory Albert Kliewer
Martin Albert Lozon
Yusbel Garcia Diaz
Gareth Daly
Masashi Kobayashi
Randall John Bast
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toronto Dominion Bank
Original Assignee
Toronto Dominion Bank
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toronto Dominion Bank filed Critical Toronto Dominion Bank
Priority to CA3034665A priority Critical patent/CA3034665C/fr
Publication of CA3034665A1 publication Critical patent/CA3034665A1/fr
Application granted granted Critical
Publication of CA3034665C publication Critical patent/CA3034665C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Il est décrit une méthode de règlementation de laccès à une ressource protégée. La méthode comprend ce qui suit : la réception, au moyen de linterface de communication, dune application client sexécutant sur un premier dispositif, un premier signal comprenant une demande dobtention dun jeton daccès à une ressource protégée, la demande comprenant un identificateur de client déterminant de manière unique lapplication client; un code dautorisation pour autoriser laccès de lapplication client à la ressource protégée; et une clé publique associée à lutilisateur final; et en réponse à la validation de la demande, le cryptage du code dautorisation à laide de la clé publique pour générer un premier code, et transmettre, par linterface de communication à lapplication client sur le premier dispositif, un deuxième signal comprenant à la fois un jeton daccès pour accéder à la ressource protégée et au premier code.
CA3034665A 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee Active CA3034665C (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3034665A CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA3034665A CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Publications (2)

Publication Number Publication Date
CA3034665A1 true CA3034665A1 (fr) 2020-08-22
CA3034665C CA3034665C (fr) 2024-01-02

Family

ID=72140122

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3034665A Active CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Country Status (1)

Country Link
CA (1) CA3034665C (fr)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210359989A1 (en) * 2018-06-05 2021-11-18 The Toronto-Dominion Bank Methods and systems for controlling access to a protected resource
WO2022103594A1 (fr) * 2020-11-13 2022-05-19 Microsoft Technology Licensing, Llc Signature numérique sécurisée
CN114666125A (zh) * 2022-03-21 2022-06-24 阿里云计算有限公司 资源管理方法、装置及服务器
WO2022140716A1 (fr) * 2020-12-23 2022-06-30 Citrix Systems, Inc. Authentification à l'aide d'une identité de dispositif et d'utilisateur
CN115865357A (zh) * 2022-11-03 2023-03-28 哈尔滨工程大学 一种基于定期更新的批量假名认证方法
WO2023245099A1 (fr) * 2022-06-16 2023-12-21 Grail, Llc Systèmes et procédés de gestion d'accès à une ressource

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210359989A1 (en) * 2018-06-05 2021-11-18 The Toronto-Dominion Bank Methods and systems for controlling access to a protected resource
US11811748B2 (en) * 2018-06-05 2023-11-07 The Toronto-Dominion Bank Methods and systems for controlling access to a protected resource
WO2022103594A1 (fr) * 2020-11-13 2022-05-19 Microsoft Technology Licensing, Llc Signature numérique sécurisée
US11368314B2 (en) 2020-11-13 2022-06-21 Microsoft Technology Licensing, Llc Secure digital signing
WO2022140716A1 (fr) * 2020-12-23 2022-06-30 Citrix Systems, Inc. Authentification à l'aide d'une identité de dispositif et d'utilisateur
CN114666125A (zh) * 2022-03-21 2022-06-24 阿里云计算有限公司 资源管理方法、装置及服务器
CN114666125B (zh) * 2022-03-21 2024-03-22 阿里云计算有限公司 资源管理方法、装置及服务器
WO2023245099A1 (fr) * 2022-06-16 2023-12-21 Grail, Llc Systèmes et procédés de gestion d'accès à une ressource
CN115865357A (zh) * 2022-11-03 2023-03-28 哈尔滨工程大学 一种基于定期更新的批量假名认证方法

Also Published As

Publication number Publication date
CA3034665C (fr) 2024-01-02

Similar Documents

Publication Publication Date Title
US11902289B2 (en) Methods and systems for controlling access to a protected resource
US11811748B2 (en) Methods and systems for controlling access to a protected resource
US11647023B2 (en) Out-of-band authentication to access web-service with indication of physical access to client device
US10904234B2 (en) Systems and methods of device based customer authentication and authorization
US11582219B2 (en) Methods and systems for controlling access to a protected resource
US11818272B2 (en) Methods and systems for device authentication
US11063944B2 (en) Out-of-band authentication based on secure channel to trusted execution environment on client device
US20220255931A1 (en) Domain unrestricted mobile initiated login
CA3034665C (fr) Methodes et systemes permettant de controler l`acces a une ressource protegee
US9191394B2 (en) Protecting user credentials from a computing device
US9117062B1 (en) Stateless and secure authentication
US10298561B2 (en) Providing a single session experience across multiple applications
US10356079B2 (en) System and method for a single sign on connection in a zero-knowledge vault architecture
WO2019226115A1 (fr) Procédé et appareil d'authentification d'utilisateur
Aiemworawutikul et al. Vulnerability Assessment in National Identity Services
WO2022140469A1 (fr) Ouverture de session initiée par un mobile sans restriction de domaine
JP2023506500A (ja) デジタル通信ネットワークを介した1又は複数のデータセットの提供及び取得
Binu Secure authentication framework for cloud

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824