ECSP066514A - SECURE CERTIFICATION SERVICE METHOD - Google Patents

SECURE CERTIFICATION SERVICE METHOD

Info

Publication number
ECSP066514A
ECSP066514A EC2006006514A ECSP066514A ECSP066514A EC SP066514 A ECSP066514 A EC SP066514A EC 2006006514 A EC2006006514 A EC 2006006514A EC SP066514 A ECSP066514 A EC SP066514A EC SP066514 A ECSP066514 A EC SP066514A
Authority
EC
Ecuador
Prior art keywords
service method
certification service
secure certification
secure
authentication
Prior art date
Application number
EC2006006514A
Other languages
Spanish (es)
Inventor
Jay-Yeob Hwang
Ki Ho Yang
Original Assignee
Solmaze Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Solmaze Co Ltd filed Critical Solmaze Co Ltd
Publication of ECSP066514A publication Critical patent/ECSP066514A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • User Interface Of Digital Computer (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

La presente invención se refiere a hacer segura la autenticación. De acuerdo a la presente invención, un método de servicio de acceso de seguridad incluye un paso de autenticación a través de la introducción de un texto, un paso de rastreo de ubicación de acceso, un paso de autenticación a través de la introducción de coordenadas y un paso de reporte de acceso al historial.The present invention relates to making authentication secure. According to the present invention, a security access service method includes an authentication step through the entry of a text, an access location tracking step, an authentication step through the introduction of coordinates and a step of report of access to the history.

EC2006006514A 2003-09-25 2006-04-19 SECURE CERTIFICATION SERVICE METHOD ECSP066514A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR20030066452 2003-09-25
KR20040053149 2004-07-08
KR1020040068356A KR20050030541A (en) 2003-09-25 2004-08-30 The method of safe certification service

Publications (1)

Publication Number Publication Date
ECSP066514A true ECSP066514A (en) 2006-10-10

Family

ID=37386844

Family Applications (1)

Application Number Title Priority Date Filing Date
EC2006006514A ECSP066514A (en) 2003-09-25 2006-04-19 SECURE CERTIFICATION SERVICE METHOD

Country Status (5)

Country Link
JP (1) JP4739211B2 (en)
KR (1) KR20050030541A (en)
EA (1) EA200600649A1 (en)
EC (1) ECSP066514A (en)
IL (1) IL175104A0 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4422088B2 (en) 2005-09-27 2010-02-24 Necネクサソリューションズ株式会社 Image array type authentication system
JP4925121B2 (en) * 2006-07-04 2012-04-25 独立行政法人産業技術総合研究所 PIN code input device and PIN code input method using fake pointer
JP5384177B2 (en) * 2009-04-09 2014-01-08 三菱電機ビルテクノサービス株式会社 Elevator-linked crime prevention system
JP5539415B2 (en) * 2012-01-19 2014-07-02 シャープ株式会社 Information processing apparatus and program
KR101331172B1 (en) 2012-11-23 2013-11-19 주식회사 애드웹커뮤니케이션 Method for identifying a user and apparatus therefor
KR101416541B1 (en) * 2012-12-27 2014-07-09 주식회사 로웸 Safety login system and the method and apparatus therefor
JP6817197B2 (en) 2014-05-30 2021-01-20 アセンド・パフォーマンス・マテリアルズ・オペレーションズ・リミテッド・ライアビリティ・カンパニーAscend Performance Materials Operations Llc Low phosphorus low color polyamide
KR101621002B1 (en) 2015-09-02 2016-05-13 주식회사 베이스인 네트웍스 Method for providing log in service using image array

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6243773A (en) * 1985-08-21 1987-02-25 Hitachi Ltd Password system
JPH08249284A (en) * 1995-03-10 1996-09-27 Toshiba Corp System and method for processing password
JP2001350723A (en) * 2000-06-05 2001-12-21 Asahi Bank Ltd Log-in processing system, system processing method therefor, and recording medium recorded with program therefor
JP2002229948A (en) * 2001-02-01 2002-08-16 Matsushita Electric Ind Co Ltd Authentication system and program

Also Published As

Publication number Publication date
IL175104A0 (en) 2011-08-01
JP2007520781A (en) 2007-07-26
EA200600649A1 (en) 2006-12-29
JP4739211B2 (en) 2011-08-03
KR20050030541A (en) 2005-03-30

Similar Documents

Publication Publication Date Title
MXPA06003297A (en) The method of safe certification service.
ECSP066514A (en) SECURE CERTIFICATION SERVICE METHOD
CN106203113A (en) The privacy leakage monitoring method of Android application file
ATE456213T1 (en) METHOD FOR IMPLEMENTING THE SITE SECURITY FUNCTION AND SYSTEM THEREOF
WO2003100544A3 (en) Method for authenticating a user to a service of a service provider
MXPA05007150A (en) Policy engine and methods and systems for protecting data.
ATE350872T1 (en) SECURITY AND PRIVACY IMPROVEMENTS FOR SECURITY FACILITIES
NZ533457A (en) Network user authentication system and method
ATE341891T1 (en) TRIGGERING A SERVICE PROVISION EVENT
GB2434671A (en) Global asset risk management system and methods
WO2007024759A3 (en) System and methods for secure service oriented architecture
WO2005114886A3 (en) System and method of fraud reduction
IL194741A (en) Method of providing access information to an access terminal
BRPI0401133A (en) Security system and method for cross-checking data communication networks
NO20061779L (en) Procedure for secure verification service
DE60331446D1 (en) SYSTEM AND METHOD FOR COMMUNICATION SERVICE PORTABILITY
WO2006091820A3 (en) Voip call through tester
WO2006017757A3 (en) Enhanced security using service provider authentication
SG108326A1 (en) Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
ATE309586T1 (en) METHOD AND DEVICE FOR SYMMETRIC KEY GENERATION IN A PERSONAL SECURITY DEVICE WITH LIMITED TRUST RELATIONSHIPS
BRPI0413479A (en) system and method of indicating encryption strength
WO2006125084A3 (en) Method and system for providing access rights to a communications network site
ATE385157T1 (en) METHOD AND DEVICE FOR AUTHENTICATION IN WIRELESS COMMUNICATIONS
DE60034054D1 (en) AUTHENTICATION OF A PARTNER STATION
TW200514409A (en) A system and associated methods to determine authentication priority between devices