GB201519367D0 - Authorisation system - Google Patents

Authorisation system

Info

Publication number
GB201519367D0
GB201519367D0 GBGB1519367.5A GB201519367A GB201519367D0 GB 201519367 D0 GB201519367 D0 GB 201519367D0 GB 201519367 A GB201519367 A GB 201519367A GB 201519367 D0 GB201519367 D0 GB 201519367D0
Authority
GB
United Kingdom
Prior art keywords
authorisation system
authorisation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GBGB1519367.5A
Other versions
GB2543857A (en
GB2543857B (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mgm Advantage Services Ltd
Original Assignee
Mgm Advantage Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mgm Advantage Holdings Ltd filed Critical Mgm Advantage Holdings Ltd
Priority to GB1519367.5A priority Critical patent/GB2543857B/en
Publication of GB201519367D0 publication Critical patent/GB201519367D0/en
Publication of GB2543857A publication Critical patent/GB2543857A/en
Application granted granted Critical
Publication of GB2543857B publication Critical patent/GB2543857B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
GB1519367.5A 2015-11-02 2015-11-02 Authorisation system Expired - Fee Related GB2543857B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1519367.5A GB2543857B (en) 2015-11-02 2015-11-02 Authorisation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1519367.5A GB2543857B (en) 2015-11-02 2015-11-02 Authorisation system

Publications (3)

Publication Number Publication Date
GB201519367D0 true GB201519367D0 (en) 2015-12-16
GB2543857A GB2543857A (en) 2017-05-03
GB2543857B GB2543857B (en) 2018-04-04

Family

ID=55130570

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1519367.5A Expired - Fee Related GB2543857B (en) 2015-11-02 2015-11-02 Authorisation system

Country Status (1)

Country Link
GB (1) GB2543857B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT202100025925A1 (en) * 2021-10-08 2023-04-08 Phoenix ICT ANTI DDOS METHOD AND SYSTEM FOR THE DYNAMIC MANAGEMENT OF AN ACTIVE RESOURCE

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH087709B2 (en) * 1989-05-15 1996-01-29 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Access privilege control method and system
US20050210263A1 (en) * 2001-04-25 2005-09-22 Levas Robert G Electronic form routing and data capture system and method
US7702693B1 (en) * 2003-10-30 2010-04-20 Cisco Technology, Inc. Role-based access control enforced by filesystem of an operating system
EP1626372A1 (en) * 2004-08-11 2006-02-15 Swisscom AG Access control method, access control system and devices therefor
US7617232B2 (en) * 2004-09-02 2009-11-10 Microsoft Corporation Centralized terminology and glossary development
WO2009076755A1 (en) * 2007-12-17 2009-06-25 Ramius Corporation Social networking site and system
US9152776B2 (en) * 2013-04-30 2015-10-06 Netapp, Inc. Secure access-based enumeration of a junction or mount point on a clustered server

Also Published As

Publication number Publication date
GB2543857A (en) 2017-05-03
GB2543857B (en) 2018-04-04

Similar Documents

Publication Publication Date Title
IL261001B (en) Cybersecurity system
GB201517101D0 (en) Mixed-reality system
GB201501510D0 (en) System
GB201507208D0 (en) Location system
GB2530303B (en) Fixing system
PT3073021T (en) Connection system
ZA201705600B (en) Track-module bogie-suspension system
HK1257742A1 (en) Departure control system
GB201517276D0 (en) System
HK1211785A2 (en) Engagement system
PT3379987T (en) Container-attaching system
GB201514541D0 (en) System
GB2543857B (en) Authorisation system
GB201713486D0 (en) Collision-warning system
PL3464736T3 (en) Wearing-part system
SG10201608113RA (en) Interlock System
GB201712513D0 (en) Strainer system
GB2557171B (en) Construction system
GB2544749B (en) Shuttering system
GB201617213D0 (en) Telescopic-lateral system
TWM533404U (en) Aquaponics system
GB201608349D0 (en) Construction system
GB201612966D0 (en) System
GB201608834D0 (en) ACT system
GB201516193D0 (en) Mc-mat system

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application

Owner name: MGM ADVANTAGE SERVICES LIMITED

Free format text: FORMER OWNER: MGM ADVANTAGE HOLDINGS LIMITED

732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20210610 AND 20210616

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20221102