GB2504745B - Authentication system and method - Google Patents
Authentication system and methodInfo
- Publication number
- GB2504745B GB2504745B GB1214200.6A GB201214200A GB2504745B GB 2504745 B GB2504745 B GB 2504745B GB 201214200 A GB201214200 A GB 201214200A GB 2504745 B GB2504745 B GB 2504745B
- Authority
- GB
- United Kingdom
- Prior art keywords
- authentication system
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1214200.6A GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
US14/420,363 US20150295717A1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
EP13762202.3A EP2883183B1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
PCT/GB2013/052123 WO2014023969A1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1214200.6A GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201214200D0 GB201214200D0 (en) | 2012-09-19 |
GB2504745A GB2504745A (en) | 2014-02-12 |
GB2504745B true GB2504745B (en) | 2014-07-23 |
Family
ID=46935129
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1214200.6A Active GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2504745B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2433147A (en) * | 2005-12-01 | 2007-06-13 | Jonathan Geoffrey Milt Craymer | A method for verifying a person's identity or entitlement using one-time transaction codes |
US20080141362A1 (en) * | 2006-12-06 | 2008-06-12 | Torres Robert J | Method and apparatus of providing pattern based user password access |
US20100281526A1 (en) * | 2009-05-04 | 2010-11-04 | Serugudi Venkata Raghavan | Methods and Devices for Pattern-Based User Authentication |
US20120137352A1 (en) * | 2010-11-30 | 2012-05-31 | Platez Pty Ltd. | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
GB2488310A (en) * | 2011-02-02 | 2012-08-29 | Winfrasoft Corp | A method and system for authenticating a computer user by using an array of elements |
-
2012
- 2012-08-08 GB GB1214200.6A patent/GB2504745B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2433147A (en) * | 2005-12-01 | 2007-06-13 | Jonathan Geoffrey Milt Craymer | A method for verifying a person's identity or entitlement using one-time transaction codes |
US20080141362A1 (en) * | 2006-12-06 | 2008-06-12 | Torres Robert J | Method and apparatus of providing pattern based user password access |
US20100281526A1 (en) * | 2009-05-04 | 2010-11-04 | Serugudi Venkata Raghavan | Methods and Devices for Pattern-Based User Authentication |
US20120137352A1 (en) * | 2010-11-30 | 2012-05-31 | Platez Pty Ltd. | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
GB2488310A (en) * | 2011-02-02 | 2012-08-29 | Winfrasoft Corp | A method and system for authenticating a computer user by using an array of elements |
Also Published As
Publication number | Publication date |
---|---|
GB2504745A (en) | 2014-02-12 |
GB201214200D0 (en) | 2012-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL254163B (en) | Authentication method and system | |
EP2858003A4 (en) | Authentication system and authentication method | |
GB2529503B8 (en) | Voice authentication system and method | |
IL234215B (en) | Cryptographic method and system | |
SG11201504186UA (en) | System and method for voice authentication | |
EP2892026A4 (en) | Authentication device and authentication method | |
EP2761311A4 (en) | Authentication systems and methods | |
SG2013054499A (en) | Verifying system and method thereof | |
EP2897009A4 (en) | Production-sequence-optimizing method and production-sequence-optimizing system | |
SG11201502550YA (en) | Connection system and method | |
GB201219235D0 (en) | System and method for the authentication of communications | |
EP2789148A4 (en) | Systems and methods for authentication | |
HK1206134A1 (en) | Authentication apparatus and method | |
EP2692166A4 (en) | Authentication method and system | |
GB201219800D0 (en) | System and method | |
EP2828615A4 (en) | Lasergrammetry system and methods | |
EP3086504A4 (en) | Authentication system and authentication method | |
HK1209514A1 (en) | Micro-resource-pooling system and corresponding method thereof | |
SG11201500746YA (en) | System and method for geothentication | |
HK1184867A1 (en) | Method and system for user authentication | |
EP3086252A4 (en) | Authentication system and authentication method | |
EP2860709A4 (en) | Large-bundle creation system and large-bundle creation method | |
EP2790100A4 (en) | Version construction system and method | |
ZA201309582B (en) | Authentication system and method therefor | |
GB2519034B (en) | Authentication method and authentication program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20140522 AND 20140528 |