GB0600699D0 - Secure transactions - Google Patents

Secure transactions

Info

Publication number
GB0600699D0
GB0600699D0 GBGB0600699.3A GB0600699A GB0600699D0 GB 0600699 D0 GB0600699 D0 GB 0600699D0 GB 0600699 A GB0600699 A GB 0600699A GB 0600699 D0 GB0600699 D0 GB 0600699D0
Authority
GB
United Kingdom
Prior art keywords
secure transactions
transactions
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GBGB0600699.3A
Other versions
GB2434724A (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DEEPNET TECHNOLOGIES Ltd
Original Assignee
DEEPNET TECHNOLOGIES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DEEPNET TECHNOLOGIES Ltd filed Critical DEEPNET TECHNOLOGIES Ltd
Priority to GB0600699A priority Critical patent/GB2434724A/en
Publication of GB0600699D0 publication Critical patent/GB0600699D0/en
Publication of GB2434724A publication Critical patent/GB2434724A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • H04L9/3223
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
GB0600699A 2006-01-13 2006-01-13 Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters Withdrawn GB2434724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0600699A GB2434724A (en) 2006-01-13 2006-01-13 Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0600699A GB2434724A (en) 2006-01-13 2006-01-13 Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters

Publications (2)

Publication Number Publication Date
GB0600699D0 true GB0600699D0 (en) 2006-02-22
GB2434724A GB2434724A (en) 2007-08-01

Family

ID=35998013

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0600699A Withdrawn GB2434724A (en) 2006-01-13 2006-01-13 Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters

Country Status (1)

Country Link
GB (1) GB2434724A (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7849329B2 (en) 2004-09-01 2010-12-07 Microsoft Corporation Licensing the use of a particular feature of software
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8165078B2 (en) * 2008-11-19 2012-04-24 Coupons.Com Incorporated System and method for controlling use of a network resource
US9047450B2 (en) 2009-06-19 2015-06-02 Deviceauthority, Inc. Identification of embedded system devices
US9047458B2 (en) 2009-06-19 2015-06-02 Deviceauthority, Inc. Network access protection
US8316421B2 (en) 2009-10-19 2012-11-20 Uniloc Luxembourg S.A. System and method for device authentication with built-in tolerance
GB2484268A (en) 2010-09-16 2012-04-11 Uniloc Usa Inc Psychographic profiling of users of computing devices
GB2491101B (en) * 2011-04-15 2013-07-10 Bluecava Inc Detection of spoofing of remote client system information
AU2011101296B4 (en) 2011-09-15 2012-06-28 Uniloc Usa, Inc. Hardware identification through cookies
CN103023642B (en) * 2012-11-22 2016-02-24 中兴通讯股份有限公司 A kind of mobile terminal and digital certificate functionality implementation method thereof
AU2013100802B4 (en) 2013-04-11 2013-11-14 Uniloc Luxembourg S.A. Device authentication using inter-person message metadata
US8695068B1 (en) 2013-04-25 2014-04-08 Uniloc Luxembourg, S.A. Device authentication using display device irregularity
AU2015219267A1 (en) * 2014-02-18 2016-09-22 Secureauth Corporation Fingerprint based authentication for single sign on
US9378345B2 (en) 2014-04-29 2016-06-28 Bank Of America Corporation Authentication using device ID
CN105763521B (en) * 2014-12-18 2019-09-20 阿里巴巴集团控股有限公司 A kind of device authentication method and device
GB2543780B (en) * 2015-10-27 2020-01-22 Trustonic Ltd Cryptographic program diversification
CN107908948B (en) * 2017-11-01 2019-11-19 中国移动通信集团江苏有限公司 A kind of Android APP device-fingerprint generation method applied to security risk control
US10965453B2 (en) 2018-09-14 2021-03-30 Beijing Jingdong Shangke Information Technology Co., Ltd. System and method for authenticated encryption based on device fingerprint
IT201800010856A1 (en) * 2018-12-06 2020-06-06 Mbda italia spa Method and IT system for remote management of Self-Encrypting Disks (SEDs) via client / server topology
US11962698B2 (en) 2020-03-17 2024-04-16 Arris Enterprises Llc Token node locking with fingerprints authenticated by digital certificates

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU5084500A (en) * 1999-05-21 2000-12-12 International Business Machines Corporation Method and apparatus for initializing secure communications among, and for exclusively pairing wireless devices
TWI231132B (en) * 2002-03-26 2005-04-11 Culture Com Technology Macau Ltd System and method for secure electronic commerce trading
US20040254890A1 (en) * 2002-05-24 2004-12-16 Sancho Enrique David System method and apparatus for preventing fraudulent transactions

Also Published As

Publication number Publication date
GB2434724A (en) 2007-08-01

Similar Documents

Publication Publication Date Title
HRP20170963T1 (en) Modified saccharides
GB0600699D0 (en) Secure transactions
AP3361A (en) Secure financial transactions
GB2441793B (en) Secure transaction system
EP2070037A4 (en) Location based credit
DE602007002700D1 (en) Interventionsfreies frac-system
EP2078282A4 (en) E-couponing
EP2033216A4 (en) Electroadhesion
DE602007008085D1 (en) Dihydropyrazolopyrimidinonderivate
DE602007014031D1 (en) Luftreifensatz
DE602007002070D1 (en) 2-pyrazincarboxamidderivate
DE602007003855D1 (en) Isothermer reaktor
EP1983992A4 (en) 2-imino-benzimidazoles
DE602007001601D1 (en) Glasuntersuchung
HK1109502A1 (en) Battary can
DE602007006989D1 (en) Spiropiperidinderivate
AP2008004724A0 (en) Substituted1-yl)-azolin-2-aryl-1-hetaryl-ethane
DE602007011622D1 (en) Penem-prodrugs
EP2084019A4 (en) Paintscraper
EP2024567A4 (en) Earthen-wallpaper
EP2007388A4 (en) Opiopathies
DK1989111T3 (en) Satellitluftbremseapparat
EP1974618A4 (en) Innerwear
DE502007001126D1 (en) Eiten
AU3514P (en) ARCBENT Arctotis fastuosa

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)