GB2582326B - A method of mutual authentication - Google Patents
A method of mutual authentication Download PDFInfo
- Publication number
- GB2582326B GB2582326B GB1903736.5A GB201903736A GB2582326B GB 2582326 B GB2582326 B GB 2582326B GB 201903736 A GB201903736 A GB 201903736A GB 2582326 B GB2582326 B GB 2582326B
- Authority
- GB
- United Kingdom
- Prior art keywords
- mutual authentication
- authentication
- mutual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1903736.5A GB2582326B (en) | 2019-03-19 | 2019-03-19 | A method of mutual authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1903736.5A GB2582326B (en) | 2019-03-19 | 2019-03-19 | A method of mutual authentication |
Publications (3)
Publication Number | Publication Date |
---|---|
GB201903736D0 GB201903736D0 (en) | 2019-05-01 |
GB2582326A GB2582326A (en) | 2020-09-23 |
GB2582326B true GB2582326B (en) | 2023-05-31 |
Family
ID=66381109
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB1903736.5A Active GB2582326B (en) | 2019-03-19 | 2019-03-19 | A method of mutual authentication |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2582326B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1914657A2 (en) * | 2006-10-19 | 2008-04-23 | Fuji Xerox Co., Ltd. | Authentication system, authentication-service-providing device, authentication-service-providing method, and program |
US20080120711A1 (en) * | 2006-11-16 | 2008-05-22 | Steven Dispensa | Multi factor authentication |
WO2009031159A2 (en) * | 2007-06-20 | 2009-03-12 | Mchek India Payment Systems Pvt. Ltd. | A method and system for secure authentication |
WO2010140876A1 (en) * | 2009-06-01 | 2010-12-09 | Bemobile Sdn. Bhd. | Method, system and secure server for multi-factor transaction authentication |
WO2011133988A2 (en) * | 2010-04-23 | 2011-10-27 | Thandisizwe Ezwenilethu Pama | Identity verification system using network initiated ussd |
WO2012004640A1 (en) * | 2010-07-08 | 2012-01-12 | Entersect Technologies (Pty) Ltd. | Transaction authentication |
WO2013013262A1 (en) * | 2011-07-25 | 2013-01-31 | Emue Holdings Pty Ltd | Action verification methods and systems |
US20150149777A1 (en) * | 2013-11-22 | 2015-05-28 | Electronics And Telecommunications Research Institute | Mobile terminal, terminal and authentication method using security cookie |
-
2019
- 2019-03-19 GB GB1903736.5A patent/GB2582326B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1914657A2 (en) * | 2006-10-19 | 2008-04-23 | Fuji Xerox Co., Ltd. | Authentication system, authentication-service-providing device, authentication-service-providing method, and program |
US20080120711A1 (en) * | 2006-11-16 | 2008-05-22 | Steven Dispensa | Multi factor authentication |
WO2009031159A2 (en) * | 2007-06-20 | 2009-03-12 | Mchek India Payment Systems Pvt. Ltd. | A method and system for secure authentication |
WO2010140876A1 (en) * | 2009-06-01 | 2010-12-09 | Bemobile Sdn. Bhd. | Method, system and secure server for multi-factor transaction authentication |
WO2011133988A2 (en) * | 2010-04-23 | 2011-10-27 | Thandisizwe Ezwenilethu Pama | Identity verification system using network initiated ussd |
WO2012004640A1 (en) * | 2010-07-08 | 2012-01-12 | Entersect Technologies (Pty) Ltd. | Transaction authentication |
WO2013013262A1 (en) * | 2011-07-25 | 2013-01-31 | Emue Holdings Pty Ltd | Action verification methods and systems |
US20150149777A1 (en) * | 2013-11-22 | 2015-05-28 | Electronics And Telecommunications Research Institute | Mobile terminal, terminal and authentication method using security cookie |
Also Published As
Publication number | Publication date |
---|---|
GB201903736D0 (en) | 2019-05-01 |
GB2582326A (en) | 2020-09-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3751001C0 (en) | Ergothioneine production method | |
GB201804627D0 (en) | A method of communicating | |
GB201915444D0 (en) | Method of using a blockchain | |
PL3576958T3 (en) | Method of forming a security document | |
GB201805954D0 (en) | A method | |
GB201715584D0 (en) | Method of controlling a well | |
PL3942107T3 (en) | Production method | |
GB2582169B (en) | Authentication method | |
GB201902908D0 (en) | Method of using a blockchain | |
GB201912953D0 (en) | Manufacture of a security device | |
PL3522053T3 (en) | Method for authenticating a face | |
EP3392790A4 (en) | Method for authentication via a combination of biometric parameters | |
GB201813722D0 (en) | A method | |
EP3642759A4 (en) | A method of enrollling a fingerprint | |
GB2559745B (en) | A forming method | |
EP4051508C0 (en) | Method of forming a security device | |
GB2582326B (en) | A method of mutual authentication | |
SG10202000757YA (en) | Confirming method | |
EP4066894A4 (en) | Brown adipocyte production method | |
PT3738487T (en) | Method of recognizing a type of coffee | |
HUE061432T2 (en) | Method for producing a security feature | |
GB201813730D0 (en) | A method | |
GB201809530D0 (en) | A method | |
GB201808039D0 (en) | A method | |
EP3579993C0 (en) | Method for forming a shaped part and shaped part |