CN105210071B - 用于持久认证的隐私保护的知识/因素拥有测试 - Google Patents
用于持久认证的隐私保护的知识/因素拥有测试 Download PDFInfo
- Publication number
- CN105210071B CN105210071B CN201480027980.2A CN201480027980A CN105210071B CN 105210071 B CN105210071 B CN 105210071B CN 201480027980 A CN201480027980 A CN 201480027980A CN 105210071 B CN105210071 B CN 105210071B
- Authority
- CN
- China
- Prior art keywords
- hash
- authentication
- server
- user
- processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- User Interface Of Digital Computer (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/844,619 | 2013-03-15 | ||
| US13/844,619 US8949960B2 (en) | 2013-03-15 | 2013-03-15 | Privacy preserving knowledge and factor possession tests for persistent authentication |
| PCT/US2014/022075 WO2014150064A1 (en) | 2013-03-15 | 2014-03-07 | Privacy preserving knowledge/factor possession tests for persistent authentication |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN105210071A CN105210071A (zh) | 2015-12-30 |
| CN105210071B true CN105210071B (zh) | 2018-06-01 |
Family
ID=51535030
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201480027980.2A Active CN105210071B (zh) | 2013-03-15 | 2014-03-07 | 用于持久认证的隐私保护的知识/因素拥有测试 |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US8949960B2 (enExample) |
| EP (1) | EP2973162B1 (enExample) |
| JP (2) | JP6352381B2 (enExample) |
| KR (1) | KR102257943B1 (enExample) |
| CN (1) | CN105210071B (enExample) |
| AU (1) | AU2014237590B2 (enExample) |
| BR (1) | BR112015023183B1 (enExample) |
| WO (1) | WO2014150064A1 (enExample) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10541815B2 (en) * | 2014-03-16 | 2020-01-21 | Haventec Pty Ltd | Persistent authentication system incorporating one time pass codes |
| CN105337928B (zh) * | 2014-06-24 | 2019-09-13 | 阿里巴巴集团控股有限公司 | 用户身份识别方法、安全保护问题生成方法及装置 |
| US10742647B2 (en) * | 2015-10-28 | 2020-08-11 | Qomplx, Inc. | Contextual and risk-based multi-factor authentication |
| US11570209B2 (en) | 2015-10-28 | 2023-01-31 | Qomplx, Inc. | Detecting and mitigating attacks using forged authentication objects within a domain |
| US12224992B2 (en) | 2015-10-28 | 2025-02-11 | Qomplx Llc | AI-driven defensive cybersecurity strategy analysis and recommendation system |
| US20220014555A1 (en) | 2015-10-28 | 2022-01-13 | Qomplx, Inc. | Distributed automated planning and execution platform for designing and running complex processes |
| US12500870B2 (en) | 2015-10-28 | 2025-12-16 | Qomplx Llc | Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing |
| CN107070871B (zh) * | 2017-01-12 | 2020-04-24 | 阿里巴巴集团控股有限公司 | 一种身份验证的方法及装置 |
| US20240146734A1 (en) * | 2017-06-24 | 2024-05-02 | Crowdstrike, Inc. | Large language model-based authentication |
| EP3982592A4 (en) * | 2019-06-05 | 2022-07-13 | Sony Group Corporation | IDENTITY VERIFICATION PROGRAM, IDENTITY VERIFICATION PROCESS, USER TERMINAL AND USER AUTHENTICATION PROGRAM |
| JP7597027B2 (ja) * | 2019-06-05 | 2024-12-10 | ソニーグループ株式会社 | 情報処理装置、及び情報処理方法 |
| CN112487485B (zh) * | 2020-05-09 | 2022-12-27 | 支付宝(杭州)信息技术有限公司 | 基于零知识证明的个人数据处理方法、装置及电子设备 |
| US20250039196A1 (en) | 2023-07-27 | 2025-01-30 | Qomplx Llc | System and method for track and trace user and entity behavior analysis |
| US12309132B1 (en) * | 2024-07-12 | 2025-05-20 | Cortwo Corp. | Continuous universal trust architecture and method |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030163737A1 (en) * | 2002-02-26 | 2003-08-28 | James Roskind | Simple secure login with multiple-authentication providers |
| US20040249817A1 (en) * | 1999-06-28 | 2004-12-09 | Zix Corporation, A Texas Corporation | Secure transmission system |
| US20060037073A1 (en) * | 2004-07-30 | 2006-02-16 | Rsa Security, Inc. | PIN recovery in a smart card |
| JP2006244095A (ja) * | 2005-03-02 | 2006-09-14 | Takaaki Ito | 個人情報の漏洩を回避した個人認証システム |
| US20070124321A1 (en) * | 2005-11-02 | 2007-05-31 | Rsa Security Inc. | Storing digital secrets in a vault |
| CN101145911A (zh) * | 2007-10-30 | 2008-03-19 | 江汉大学 | 具有私密保护及口令找回功能的身份认证方法 |
| US20080205637A1 (en) * | 2007-02-22 | 2008-08-28 | Kddi Corporation | Threshold secret sharing apparatus, threshold secret sharing scheme, secret information decryption method, and program for the same |
| US20110138176A1 (en) * | 2009-12-09 | 2011-06-09 | Ebay Inc. | Systems and methods for facilitating user identity verification over a network |
| US20130046993A1 (en) * | 2007-01-22 | 2013-02-21 | Spyrus, Inc. | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060085647A1 (en) * | 2000-03-24 | 2006-04-20 | Neff C A | Detecting compromised ballots |
| US7725730B2 (en) | 2002-08-09 | 2010-05-25 | Emc Corporation | Cryptographic methods and apparatus for secure authentication |
| KR101020913B1 (ko) * | 2003-07-28 | 2011-03-09 | 소니 주식회사 | 데이터 송신 장치, 데이터 사용 인정 방법, 데이터 수신 장치 및 방법, 및 기록 매체 |
| US20070162961A1 (en) | 2005-02-25 | 2007-07-12 | Kelvin Tarrance | Identification authentication methods and systems |
| US7694138B2 (en) * | 2005-10-21 | 2010-04-06 | Avaya Inc. | Secure authentication with voiced responses from a telecommunications terminal |
| CA2648780C (en) | 2006-04-25 | 2013-07-16 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
| US8156333B2 (en) * | 2008-05-29 | 2012-04-10 | Red Hat, Inc. | Username based authentication security |
| EP2329423B1 (en) * | 2008-09-26 | 2018-07-18 | Koninklijke Philips N.V. | Authenticating a device and a user |
| US8842827B2 (en) * | 2010-07-16 | 2014-09-23 | Intryca, Inc. | Mobile phone aided operations system and method |
| JP4820928B1 (ja) | 2011-07-08 | 2011-11-24 | 株式会社野村総合研究所 | 認証システムおよび認証方法 |
-
2013
- 2013-03-15 US US13/844,619 patent/US8949960B2/en active Active
-
2014
- 2014-03-07 AU AU2014237590A patent/AU2014237590B2/en active Active
- 2014-03-07 CN CN201480027980.2A patent/CN105210071B/zh active Active
- 2014-03-07 KR KR1020157029514A patent/KR102257943B1/ko active Active
- 2014-03-07 EP EP14769429.3A patent/EP2973162B1/en active Active
- 2014-03-07 WO PCT/US2014/022075 patent/WO2014150064A1/en not_active Ceased
- 2014-03-07 JP JP2016500901A patent/JP6352381B2/ja active Active
- 2014-03-07 BR BR112015023183-7A patent/BR112015023183B1/pt active IP Right Grant
-
2016
- 2016-10-28 JP JP2016211833A patent/JP6494584B2/ja active Active
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040249817A1 (en) * | 1999-06-28 | 2004-12-09 | Zix Corporation, A Texas Corporation | Secure transmission system |
| US20030163737A1 (en) * | 2002-02-26 | 2003-08-28 | James Roskind | Simple secure login with multiple-authentication providers |
| US20060037073A1 (en) * | 2004-07-30 | 2006-02-16 | Rsa Security, Inc. | PIN recovery in a smart card |
| JP2006244095A (ja) * | 2005-03-02 | 2006-09-14 | Takaaki Ito | 個人情報の漏洩を回避した個人認証システム |
| US20070124321A1 (en) * | 2005-11-02 | 2007-05-31 | Rsa Security Inc. | Storing digital secrets in a vault |
| US20130046993A1 (en) * | 2007-01-22 | 2013-02-21 | Spyrus, Inc. | Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption |
| US20080205637A1 (en) * | 2007-02-22 | 2008-08-28 | Kddi Corporation | Threshold secret sharing apparatus, threshold secret sharing scheme, secret information decryption method, and program for the same |
| CN101145911A (zh) * | 2007-10-30 | 2008-03-19 | 江汉大学 | 具有私密保护及口令找回功能的身份认证方法 |
| US20110138176A1 (en) * | 2009-12-09 | 2011-06-09 | Ebay Inc. | Systems and methods for facilitating user identity verification over a network |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20150132467A (ko) | 2015-11-25 |
| US20140282942A1 (en) | 2014-09-18 |
| EP2973162A4 (en) | 2016-09-07 |
| WO2014150064A1 (en) | 2014-09-25 |
| EP2973162A1 (en) | 2016-01-20 |
| CN105210071A (zh) | 2015-12-30 |
| JP6352381B2 (ja) | 2018-07-04 |
| US8949960B2 (en) | 2015-02-03 |
| BR112015023183B1 (pt) | 2022-04-05 |
| AU2014237590B2 (en) | 2019-02-28 |
| EP2973162B1 (en) | 2018-06-06 |
| KR102257943B1 (ko) | 2021-05-28 |
| AU2014237590A1 (en) | 2015-09-10 |
| JP2017073789A (ja) | 2017-04-13 |
| JP6494584B2 (ja) | 2019-04-03 |
| BR112015023183A2 (pt) | 2017-07-18 |
| BR112015023183A8 (pt) | 2018-01-02 |
| JP2016512931A (ja) | 2016-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105210071B (zh) | 用于持久认证的隐私保护的知识/因素拥有测试 | |
| US11233637B2 (en) | System and method for validating an entity | |
| US11271926B2 (en) | System and method for temporary password management | |
| US10735407B2 (en) | System and method for temporary password management | |
| US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
| US11388174B2 (en) | System and method for securing a communication channel | |
| Jarecki et al. | Two-factor authentication with end-to-end password security | |
| Li et al. | Practical threshold multi-factor authentication | |
| JP7250960B2 (ja) | ユーザのバイオメトリクスを利用したユーザ認証および署名装置、並びにその方法 | |
| US20240121098A1 (en) | Scalable Authentication System with Synthesized Signed Challenge | |
| Jung et al. | An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated epr information system | |
| Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
| Amintoosi et al. | TAMA: three-factor authentication for multi-server architecture | |
| Syahreen et al. | A Systematic Review on Multi-Factor Authentication Framework. | |
| Abdulmalik et al. | Secure two-factor mutual authentication scheme using shared image in medical healthcare environment | |
| Nakouri et al. | A new biometric-based security framework for cloud storage | |
| Algarni et al. | A lightweight and secure protocol for teleworking environment | |
| Wu et al. | A Blockchain‐Based Hierarchical Authentication Scheme for Multiserver Architecture | |
| Ghazel et al. | An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology | |
| Jubur | On the security and usability of new paradigms of Web authentication | |
| Breit et al. | Exploration of the security and usability of the fido2 authentication protocol | |
| Zhu | One‐time identity–password authenticated key agreement scheme based on biometrics | |
| Wang | Authentication with what you have: improving resilience and usability | |
| Maqbali | Strengthening Password-Based Authentication | |
| WO2025122333A1 (en) | Scalable authentication system with synthesized signed challenge |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Address after: American California Applicant after: Google limited liability company Address before: American California Applicant before: Google Inc. |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |