CA3034665C - Methodes et systemes permettant de controler l`acces a une ressource protegee - Google Patents

Methodes et systemes permettant de controler l`acces a une ressource protegee Download PDF

Info

Publication number
CA3034665C
CA3034665C CA3034665A CA3034665A CA3034665C CA 3034665 C CA3034665 C CA 3034665C CA 3034665 A CA3034665 A CA 3034665A CA 3034665 A CA3034665 A CA 3034665A CA 3034665 C CA3034665 C CA 3034665C
Authority
CA
Canada
Prior art keywords
token
client application
request
code
network device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA3034665A
Other languages
English (en)
Other versions
CA3034665A1 (fr
Inventor
Milos Dunjic
Anthony Haituyen Nguyen
Yubing LIU
Arthur Carroll Chow
Casey Lyn Doyle
Richard John Frederick Thake
Mengfei WANG
Aaron Ashish Hudali
Gregory Albert Kliewer
Martin Albert Lozon
Yusbel Garcia Diaz
Gareth Daly
Masashi Kobayashi
Randall John Bast
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toronto Dominion Bank
Original Assignee
Toronto Dominion Bank
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toronto Dominion Bank filed Critical Toronto Dominion Bank
Priority to CA3034665A priority Critical patent/CA3034665C/fr
Publication of CA3034665A1 publication Critical patent/CA3034665A1/fr
Application granted granted Critical
Publication of CA3034665C publication Critical patent/CA3034665C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

Il est décrit une méthode de règlementation de laccès à une ressource protégée. La méthode comprend ce qui suit : la réception, au moyen de linterface de communication, dune application client sexécutant sur un premier dispositif, un premier signal comprenant une demande dobtention dun jeton daccès à une ressource protégée, la demande comprenant un identificateur de client déterminant de manière unique lapplication client; un code dautorisation pour autoriser laccès de lapplication client à la ressource protégée; et une clé publique associée à lutilisateur final; et, en réponse à la validation de la demande, le cryptage du code dautorisation à laide de la clé publique pour générer un premier code, et transmettre, par linterface de communication à lapplication client sur le premier dispositif, un deuxième signal comprenant à la fois un jeton daccès pour accéder à la ressource protégée et au premier code.
CA3034665A 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee Active CA3034665C (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA3034665A CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA3034665A CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Publications (2)

Publication Number Publication Date
CA3034665A1 CA3034665A1 (fr) 2020-08-22
CA3034665C true CA3034665C (fr) 2024-01-02

Family

ID=72140122

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3034665A Active CA3034665C (fr) 2019-02-22 2019-02-22 Methodes et systemes permettant de controler l`acces a une ressource protegee

Country Status (1)

Country Link
CA (1) CA3034665C (fr)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108762B2 (en) * 2018-06-05 2021-08-31 The Toronto-Dominion Bank Methods and systems for controlling access to a protected resource
US11368314B2 (en) 2020-11-13 2022-06-21 Microsoft Technology Licensing, Llc Secure digital signing
US11171964B1 (en) * 2020-12-23 2021-11-09 Citrix Systems, Inc. Authentication using device and user identity
CN114666125B (zh) * 2022-03-21 2024-03-22 阿里云计算有限公司 资源管理方法、装置及服务器
WO2023245099A1 (fr) * 2022-06-16 2023-12-21 Grail, Llc Systèmes et procédés de gestion d'accès à une ressource
CN115865357A (zh) * 2022-11-03 2023-03-28 哈尔滨工程大学 一种基于定期更新的批量假名认证方法

Also Published As

Publication number Publication date
CA3034665A1 (fr) 2020-08-22

Similar Documents

Publication Publication Date Title
US11902289B2 (en) Methods and systems for controlling access to a protected resource
US11811748B2 (en) Methods and systems for controlling access to a protected resource
US11647023B2 (en) Out-of-band authentication to access web-service with indication of physical access to client device
US10904234B2 (en) Systems and methods of device based customer authentication and authorization
US11818272B2 (en) Methods and systems for device authentication
US11063944B2 (en) Out-of-band authentication based on secure channel to trusted execution environment on client device
CA3034665C (fr) Methodes et systemes permettant de controler l`acces a une ressource protegee
US11582219B2 (en) Methods and systems for controlling access to a protected resource
US20220255931A1 (en) Domain unrestricted mobile initiated login
US9191394B2 (en) Protecting user credentials from a computing device
US9117062B1 (en) Stateless and secure authentication
US10298561B2 (en) Providing a single session experience across multiple applications
US10356079B2 (en) System and method for a single sign on connection in a zero-knowledge vault architecture
WO2019226115A1 (fr) Procédé et appareil d'authentification d'utilisateur
Aiemworawutikul et al. Vulnerability Assessment in National Identity Services
WO2022140469A1 (fr) Ouverture de session initiée par un mobile sans restriction de domaine

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824

EEER Examination request

Effective date: 20210824