GB2504747B - Two or three factor authentication method and apparatus - Google Patents

Two or three factor authentication method and apparatus

Info

Publication number
GB2504747B
GB2504747B GB201214202A GB201214202A GB2504747B GB 2504747 B GB2504747 B GB 2504747B GB 201214202 A GB201214202 A GB 201214202A GB 201214202 A GB201214202 A GB 201214202A GB 2504747 B GB2504747 B GB 2504747B
Authority
GB
United Kingdom
Prior art keywords
authentication method
factor authentication
factor
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
GB201214202A
Other versions
GB2504747A (en
GB201214202D0 (en
Inventor
Steven Jonathan Brittan
Radouane Oudrhiri
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
AUTH Ltd V
Original Assignee
AUTH Ltd V
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AUTH Ltd V filed Critical AUTH Ltd V
Priority to GB201214202A priority Critical patent/GB2504747B/en
Publication of GB201214202D0 publication Critical patent/GB201214202D0/en
Priority to US14/420,363 priority patent/US20150295717A1/en
Priority to EP13762202.3A priority patent/EP2883183B1/en
Priority to PCT/GB2013/052123 priority patent/WO2014023969A1/en
Publication of GB2504747A publication Critical patent/GB2504747A/en
Application granted granted Critical
Publication of GB2504747B publication Critical patent/GB2504747B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
GB201214202A 2012-08-08 2012-08-08 Two or three factor authentication method and apparatus Expired - Fee Related GB2504747B (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB201214202A GB2504747B (en) 2012-08-08 2012-08-08 Two or three factor authentication method and apparatus
US14/420,363 US20150295717A1 (en) 2012-08-08 2013-08-08 Authentication method and system
EP13762202.3A EP2883183B1 (en) 2012-08-08 2013-08-08 Authentication method and system
PCT/GB2013/052123 WO2014023969A1 (en) 2012-08-08 2013-08-08 Authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB201214202A GB2504747B (en) 2012-08-08 2012-08-08 Two or three factor authentication method and apparatus

Publications (3)

Publication Number Publication Date
GB201214202D0 GB201214202D0 (en) 2012-09-19
GB2504747A GB2504747A (en) 2014-02-12
GB2504747B true GB2504747B (en) 2014-07-09

Family

ID=46935131

Family Applications (1)

Application Number Title Priority Date Filing Date
GB201214202A Expired - Fee Related GB2504747B (en) 2012-08-08 2012-08-08 Two or three factor authentication method and apparatus

Country Status (1)

Country Link
GB (1) GB2504747B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11531739B1 (en) * 2020-06-30 2022-12-20 United Services Automobile Association (Usaa) Authenticating user identity based on data stored in different locations

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030028493A1 (en) * 2001-08-03 2003-02-06 Nec Corporation Personal information management system, personal information management method, and information processing server
US6959394B1 (en) * 2000-09-29 2005-10-25 Intel Corporation Splitting knowledge of a password
GB2488310A (en) * 2011-02-02 2012-08-29 Winfrasoft Corp A method and system for authenticating a computer user by using an array of elements

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6959394B1 (en) * 2000-09-29 2005-10-25 Intel Corporation Splitting knowledge of a password
US20030028493A1 (en) * 2001-08-03 2003-02-06 Nec Corporation Personal information management system, personal information management method, and information processing server
GB2488310A (en) * 2011-02-02 2012-08-29 Winfrasoft Corp A method and system for authenticating a computer user by using an array of elements

Also Published As

Publication number Publication date
GB2504747A (en) 2014-02-12
GB201214202D0 (en) 2012-09-19

Similar Documents

Publication Publication Date Title
GB2517606B (en) User authentication method and apparatus
EP2820527A4 (en) Apparatus and associated methods
EP2892026A4 (en) Authentication device and authentication method
GB201215481D0 (en) Apparatus and method
GB201205986D0 (en) Apparatus and method
GB201220323D0 (en) Apparatus and method
HK1206134A1 (en) Authentication apparatus and method
GB2505533B (en) Security method and apparatus
EP2880774A4 (en) Method and apparatus
GB201217618D0 (en) Apparatus and method
EP2873267A4 (en) Methods and apparatus for authentication
GB201212090D0 (en) Method and apparatus
GB201212045D0 (en) Apparatus and method
GB201210361D0 (en) Apparatus and method
GB201217613D0 (en) Security method and apparatus
EP2839527A4 (en) Apparatus and method
GB201210929D0 (en) Apparatus and method
GB2504747B (en) Two or three factor authentication method and apparatus
GB201215752D0 (en) Apparatus and method
GB201211205D0 (en) Apparatus and method
GB201204726D0 (en) Method and apparatus
GB201204727D0 (en) Method and apparatus
EP2813119A4 (en) Method and apparatus
GB201220799D0 (en) Apparatus and method
GB201220774D0 (en) Apparatus and method

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20140522 AND 20140528

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20220808