JP2010518493A - ネットワークへのアクセスを動的に制御するための方法及びシステム - Google Patents

ネットワークへのアクセスを動的に制御するための方法及びシステム Download PDF

Info

Publication number
JP2010518493A
JP2010518493A JP2009548475A JP2009548475A JP2010518493A JP 2010518493 A JP2010518493 A JP 2010518493A JP 2009548475 A JP2009548475 A JP 2009548475A JP 2009548475 A JP2009548475 A JP 2009548475A JP 2010518493 A JP2010518493 A JP 2010518493A
Authority
JP
Japan
Prior art keywords
information
location
requester
network
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2009548475A
Other languages
English (en)
Japanese (ja)
Other versions
JP2010518493A5 (enExample
Inventor
コリン コンスタブル、
Original Assignee
クレディ スイス セキュリティーズ (ユーエスエイ) エルエルシー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by クレディ スイス セキュリティーズ (ユーエスエイ) エルエルシー filed Critical クレディ スイス セキュリティーズ (ユーエスエイ) エルエルシー
Publication of JP2010518493A publication Critical patent/JP2010518493A/ja
Publication of JP2010518493A5 publication Critical patent/JP2010518493A5/ja
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computer And Data Communications (AREA)
JP2009548475A 2007-02-01 2008-02-01 ネットワークへのアクセスを動的に制御するための方法及びシステム Pending JP2010518493A (ja)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US89927607P 2007-02-01 2007-02-01
PCT/US2008/052836 WO2008095178A2 (en) 2007-02-01 2008-02-01 Method and system for dynamically controlling access to a network

Publications (2)

Publication Number Publication Date
JP2010518493A true JP2010518493A (ja) 2010-05-27
JP2010518493A5 JP2010518493A5 (enExample) 2011-03-17

Family

ID=39674815

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2009548475A Pending JP2010518493A (ja) 2007-02-01 2008-02-01 ネットワークへのアクセスを動的に制御するための方法及びシステム

Country Status (6)

Country Link
US (1) US20080189776A1 (enExample)
EP (1) EP2118770A4 (enExample)
JP (1) JP2010518493A (enExample)
CN (1) CN101657807A (enExample)
CA (1) CA2713419A1 (enExample)
WO (1) WO2008095178A2 (enExample)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200012772A1 (en) * 2018-07-03 2020-01-09 Tinoq Inc. Systems and methods for matching identity and readily accessible personal identifier information based on transaction timestamp

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027608A1 (en) * 2003-07-29 2005-02-03 Andreas Wiesmuller System and method for providing commercial services over a wireless communication network
US8296562B2 (en) * 2004-07-15 2012-10-23 Anakam, Inc. Out of band system and method for authentication
US20100100967A1 (en) * 2004-07-15 2010-04-22 Douglas James E Secure collaborative environment
US8533791B2 (en) * 2004-07-15 2013-09-10 Anakam, Inc. System and method for second factor authentication services
US8528078B2 (en) * 2004-07-15 2013-09-03 Anakam, Inc. System and method for blocking unauthorized network log in using stolen password
US7676834B2 (en) * 2004-07-15 2010-03-09 Anakam L.L.C. System and method for blocking unauthorized network log in using stolen password
WO2006019451A1 (en) 2004-07-15 2006-02-23 Anakam L.L.C. System and method for blocking unauthorized network log in using stolen password
US9033225B2 (en) 2005-04-26 2015-05-19 Guy Hefetz Method and system for authenticating internet users
US10645072B2 (en) 2005-04-26 2020-05-05 Spriv Llc Method and system for validating transactions
US11308477B2 (en) * 2005-04-26 2022-04-19 Spriv Llc Method of reducing fraud in on-line transactions
US9727867B2 (en) 2005-04-26 2017-08-08 Guy Hefetz Method for detecting misuse of identity in electronic transactions
US10521786B2 (en) * 2005-04-26 2019-12-31 Spriv Llc Method of reducing fraud in on-line transactions
US12086803B2 (en) 2005-08-25 2024-09-10 Spriv Llc Method for authenticating internet users
US12393941B2 (en) 2005-08-25 2025-08-19 Spriv Llc Method for authenticating internet users
US11818287B2 (en) 2017-10-19 2023-11-14 Spriv Llc Method and system for monitoring and validating electronic transactions
US7979475B2 (en) * 2006-04-26 2011-07-12 Robert Mack Coherent data identification method and apparatus for database table development
US8533821B2 (en) 2007-05-25 2013-09-10 International Business Machines Corporation Detecting and defending against man-in-the-middle attacks
US11354667B2 (en) 2007-05-29 2022-06-07 Spriv Llc Method for internet user authentication
EP2151085A4 (en) * 2007-05-29 2013-03-20 Guy S Heffez METHOD AND SYSTEM FOR AUTHENTICATING THE INTERNET USER IDENTITY
US9306812B2 (en) * 2007-07-05 2016-04-05 Rpx Clearinghouse Llc System and method for providing network application performance management in a network
JP4569649B2 (ja) * 2008-03-19 2010-10-27 ソニー株式会社 情報処理装置、情報再生装置、情報処理方法、情報再生方法、情報処理システムおよびプログラム
US8683544B2 (en) * 2008-05-14 2014-03-25 Bridgewater Systems Corp. System and method for providing access to a network using flexible session rights
US8566961B2 (en) * 2008-08-08 2013-10-22 Absolute Software Corporation Approaches for a location aware client
AU2009279431B2 (en) * 2008-08-08 2014-04-10 Absolute Software Corporation Secure computing environment using a client heartbeat to address theft and unauthorized access
US8556991B2 (en) * 2008-08-08 2013-10-15 Absolute Software Corporation Approaches for ensuring data security
JP4650547B2 (ja) * 2008-09-30 2011-03-16 ソニー株式会社 情報処理装置、プログラム、および情報処理システム
US12034863B2 (en) 2009-01-21 2024-07-09 Spriv Llc Methods of authenticating the identity of a computer
US20100269162A1 (en) * 2009-04-15 2010-10-21 Jose Bravo Website authentication
KR101541305B1 (ko) * 2009-05-21 2015-08-03 삼성전자주식회사 정보 보호를 위한 이동 단말 및 상기 이동 단말에서 수행되는 정보 보호 방법
US8312157B2 (en) * 2009-07-16 2012-11-13 Palo Alto Research Center Incorporated Implicit authentication
US8621654B2 (en) * 2009-09-15 2013-12-31 Symantec Corporation Using metadata in security tokens to prevent coordinated gaming in a reputation system
US8683609B2 (en) 2009-12-04 2014-03-25 International Business Machines Corporation Mobile phone and IP address correlation service
US12309311B2 (en) 2010-03-28 2025-05-20 Spriv Llc Method and system for validating electronic transactions
US11792314B2 (en) 2010-03-28 2023-10-17 Spriv Llc Methods for acquiring an internet user's consent to be located and for authenticating the location information
KR101212509B1 (ko) * 2010-05-31 2012-12-18 주식회사 씽크풀 서비스 제어시스템 및 그 방법
US8904511B1 (en) 2010-08-23 2014-12-02 Amazon Technologies, Inc. Virtual firewalls for multi-tenant distributed services
GB2483515B (en) 2010-09-13 2018-01-24 Barclays Bank Plc Online user authentication
US20120137340A1 (en) * 2010-11-29 2012-05-31 Palo Alto Research Center Incorporated Implicit authentication
US11978052B2 (en) 2011-03-28 2024-05-07 Spriv Llc Method for validating electronic transactions
US8838988B2 (en) 2011-04-12 2014-09-16 International Business Machines Corporation Verification of transactional integrity
US8973108B1 (en) * 2011-05-31 2015-03-03 Amazon Technologies, Inc. Use of metadata for computing resource access
US9516696B2 (en) * 2011-11-29 2016-12-06 Lenovo (Singapore) Pte. Ltd. Context aware device disconnection
US9027076B2 (en) * 2012-03-23 2015-05-05 Lockheed Martin Corporation Method and apparatus for context aware mobile security
US8917826B2 (en) 2012-07-31 2014-12-23 International Business Machines Corporation Detecting man-in-the-middle attacks in electronic transactions using prompts
US9247432B2 (en) * 2012-10-19 2016-01-26 Airwatch Llc Systems and methods for controlling network access
US9117054B2 (en) * 2012-12-21 2015-08-25 Websense, Inc. Method and aparatus for presence based resource management
CN103902866A (zh) * 2012-12-25 2014-07-02 鸿富锦精密工业(深圳)有限公司 文件保护系统及方法
WO2014202718A1 (en) 2013-06-20 2014-12-24 Sms Passcode A/S Method and system protecting against identity theft or replication abuse
US20140380423A1 (en) * 2013-06-24 2014-12-25 Avaya Inc. System and method for dynamically awarding permissions
CN103581179A (zh) * 2013-10-25 2014-02-12 福建伊时代信息科技股份有限公司 基于位置的数据访问控制系统、服务器及方法
CN103678980A (zh) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 智能终端的安全保护方法及其装置
US8838071B1 (en) 2014-04-30 2014-09-16 Oto Technologies Llc Secure communications smartphone system
US9590984B2 (en) 2014-06-04 2017-03-07 Grandios Technologies, Llc Smartphone fingerprint pass-through system
US9391988B2 (en) 2014-06-04 2016-07-12 Grandios Technologies, Llc Community biometric authentication on a smartphone
US10050935B2 (en) * 2014-07-09 2018-08-14 Shape Security, Inc. Using individualized APIs to block automated attacks on native apps and/or purposely exposed APIs with forced user interaction
US9729506B2 (en) 2014-08-22 2017-08-08 Shape Security, Inc. Application programming interface wall
US10740447B2 (en) * 2014-09-08 2020-08-11 Tessera Advanced Technologies, Inc. Using biometric user-specific attributes
JP6371472B2 (ja) * 2014-09-08 2018-08-08 エディファイアー・エルエルシーEdifire LLC セキュアなメディアベース会議における多要素認証のための方法およびシステム
US9740841B2 (en) * 2014-09-08 2017-08-22 Tessera Advanced Technologies, Inc. Using biometric user-specific attributes
US10341384B2 (en) * 2015-07-12 2019-07-02 Avago Technologies International Sales Pte. Limited Network function virtualization security and trust system
US10708268B2 (en) * 2017-07-31 2020-07-07 Airwatch, Llc Managing voice applications within a digital workspace
US10496810B2 (en) * 2017-09-26 2019-12-03 Google Llc Methods and systems of performing preemptive generation of second factor authentication
US11303632B1 (en) * 2018-06-08 2022-04-12 Wells Fargo Bank, N.A. Two-way authentication system and method
US11134084B1 (en) * 2018-08-22 2021-09-28 Hid Global Corporation Diversified authentication and access control
FI128637B (en) * 2018-10-16 2020-09-15 Telia Co Ab Access to the service
US11743265B2 (en) * 2019-03-24 2023-08-29 Zero Networks Ltd. Method and system for delegating control in network connection access rules using multi-factor authentication (MFA)
US11012433B2 (en) * 2019-03-24 2021-05-18 Zero Networks Ltd. Method and system for modifying network connection access rules using multi-factor authentication (MFA)
US11444949B1 (en) * 2020-01-15 2022-09-13 Verizon Patent And Licensing Inc. Systems and methods for secure selection of a user profile in a shared context
US20230154298A1 (en) * 2020-04-30 2023-05-18 Eagle Eye Networks, Inc. Real time camera map for emergency video stream requisition service
US11770377B1 (en) * 2020-06-29 2023-09-26 Cyral Inc. Non-in line data monitoring and security services
US11595444B2 (en) * 2020-12-03 2023-02-28 International Business Machines Corporation Authenticity assessment of a requestor based on a communication request
US20230097446A1 (en) * 2021-09-30 2023-03-30 Johnson Controls Tyco Ip Holdings, Llp Methods and apparatuses for managing network security using video surveillance and access control system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000057341A (ja) * 1998-08-12 2000-02-25 Fujitsu Support & Service Kk 指紋による個人認証システム
JP2001175601A (ja) * 1999-12-15 2001-06-29 Business Pooto Syst:Kk アクセス権限の唯一性保証システム
JP2002055956A (ja) * 2000-08-14 2002-02-20 Toshiba Corp 本人認証装置及び記憶媒体
JP2005346183A (ja) * 2004-05-31 2005-12-15 Quality Kk ネットワーク接続制御システムおよびネットワーク接続制御プログラム

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5229764A (en) * 1991-06-20 1993-07-20 Matchett Noel D Continuous biometric authentication matrix
US5555376A (en) * 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
ES2105936B1 (es) * 1994-03-21 1998-06-01 I D Tec S L Perfeccionamientos introducidos en la patente de invencion n. p-9400595/8 por: procedimiento biometrico de seguridad y autentificacion de tarjetas de identidad y de credito, visados, pasaportes y reconocimiento facial.
US5640452A (en) * 1995-04-28 1997-06-17 Trimble Navigation Limited Location-sensitive decryption of an encrypted message
US6837436B2 (en) * 1996-09-05 2005-01-04 Symbol Technologies, Inc. Consumer interactive shopping system
US6845453B2 (en) * 1998-02-13 2005-01-18 Tecsec, Inc. Multiple factor-based user identification and authentication
PT1080415T (pt) * 1998-05-21 2017-05-02 Equifax Inc Sistema e método para autenticação de utilizadores da rede
KR100382851B1 (ko) * 1999-03-31 2003-05-09 인터내셔널 비지네스 머신즈 코포레이션 분산형 데이터 처리 시스템에서 클라이언트 컴퓨터를관리하기 위한 방법 및 장치
EP2525316A3 (en) * 1999-11-30 2013-08-14 David Russell Methods, systems and apparatuses for secure interactions
US7086085B1 (en) * 2000-04-11 2006-08-01 Bruce E Brown Variable trust levels for authentication
JP2004510215A (ja) * 2000-05-19 2004-04-02 ネットスケープ コミュニケーションズ コーポレーション 適合化可能なマルチ階層認証システム
US20020165894A1 (en) * 2000-07-28 2002-11-07 Mehdi Kashani Information processing apparatus and method
JP2004506258A (ja) * 2000-08-09 2004-02-26 データワイプ マネッジメント サーヴィスィズ リミテッド 個人データを格納し且つ保護する個人データ装置及び保護システム及び方法
US7185364B2 (en) * 2001-03-21 2007-02-27 Oracle International Corporation Access system interface
US6879838B2 (en) * 2001-04-20 2005-04-12 Koninklijke Philips Electronics N.V. Distributed location based service system
US20020154777A1 (en) * 2001-04-23 2002-10-24 Candelore Brant Lindsey System and method for authenticating the location of content players
US20090168719A1 (en) * 2001-10-11 2009-07-02 Greg Mercurio Method and apparatus for adding editable information to records associated with a transceiver device
US6744753B2 (en) * 2001-11-01 2004-06-01 Nokia Corporation Local service handover
US20030115142A1 (en) * 2001-12-12 2003-06-19 Intel Corporation Identity authentication portfolio system
US6810480B1 (en) * 2002-10-21 2004-10-26 Sprint Communications Company L.P. Verification of identity and continued presence of computer users
US20040186852A1 (en) * 2002-11-01 2004-09-23 Les Rosen Internet based system of employment referencing and employment history verification for the creation of a human capital database
US7559081B2 (en) * 2003-09-18 2009-07-07 Alcatel-Lucent Usa Inc. Method and apparatus for authenticating a user at an access terminal
US7962544B2 (en) * 2004-05-25 2011-06-14 Siemens Medical Solutions Usa, Inc. Patient and device location dependent healthcare information processing system
US7107220B2 (en) * 2004-07-30 2006-09-12 Sbc Knowledge Ventures, L.P. Centralized biometric authentication
US20060265737A1 (en) * 2005-05-23 2006-11-23 Morris Robert P Methods, systems, and computer program products for providing trusted access to a communicaiton network based on location
US20070022196A1 (en) * 2005-06-29 2007-01-25 Subodh Agrawal Single token multifactor authentication system and method
US7454203B2 (en) * 2005-09-29 2008-11-18 Nextel Communications, Inc. System and method for providing wireless services to aircraft passengers
US20070173248A1 (en) * 2006-01-20 2007-07-26 Ramesh Sekhar System and method for analyzing a wireless connection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000057341A (ja) * 1998-08-12 2000-02-25 Fujitsu Support & Service Kk 指紋による個人認証システム
JP2001175601A (ja) * 1999-12-15 2001-06-29 Business Pooto Syst:Kk アクセス権限の唯一性保証システム
JP2002055956A (ja) * 2000-08-14 2002-02-20 Toshiba Corp 本人認証装置及び記憶媒体
JP2005346183A (ja) * 2004-05-31 2005-12-15 Quality Kk ネットワーク接続制御システムおよびネットワーク接続制御プログラム

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200012772A1 (en) * 2018-07-03 2020-01-09 Tinoq Inc. Systems and methods for matching identity and readily accessible personal identifier information based on transaction timestamp

Also Published As

Publication number Publication date
EP2118770A2 (en) 2009-11-18
CN101657807A (zh) 2010-02-24
EP2118770A4 (en) 2012-06-13
WO2008095178A2 (en) 2008-08-07
US20080189776A1 (en) 2008-08-07
WO2008095178A3 (en) 2008-10-23
CA2713419A1 (en) 2008-08-07

Similar Documents

Publication Publication Date Title
JP2010518493A (ja) ネットワークへのアクセスを動的に制御するための方法及びシステム
US12294650B2 (en) Dynamic authorization and access management
JP6426189B2 (ja) 生体認証プロトコル標準のためのシステムおよび方法
CN111033502B (zh) 经由区块链使用生物特征数据和不可逆函数进行身份验证
US12216791B2 (en) Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology
JP5147336B2 (ja) エレクトロニック・サービス要求を実行しようとしているユーザを認証するための方法、システム、およびプログラム
US8161525B2 (en) Method and system for architecting a secure solution
US11810130B2 (en) Security policy enforcement
Furfaro et al. Towards security as a service (secaas): On the modeling of security services for cloud computing
US11924201B1 (en) Authentication for application downloads
EP1132797A2 (en) Method for securing user identification in on-line transaction systems
US20210377258A1 (en) Attributed network enabled by search and retreival of privity data from a registry and packaging of the privity data into a digital registration certificate for attributing the data of the attributed network
CN110753944A (zh) 用于基于区块链的数据管理的系统和方法
CN102281286A (zh) 用于分布式混合企业的灵活端点顺从和强认证
US20240427868A1 (en) Systems and methods for secure digital identity verification and access to disparate data sources
Alilwit Authentication based on blockchain
US20190132312A1 (en) Universal Identity Validation System and Method
US11663325B1 (en) Mitigation of privilege escalation
Arohan et al. An introduction to context-aware security and user entity behavior analytics
Strauß The limits of control–(Governmental) identity management from a privacy perspective
Sinno et al. How biometrics can save companies from ‘fire and forget’
RU2303811C1 (ru) Способ дистанционной аутентификации пользователя и система для его осуществления
CN119337349B (zh) 交易数据的处理方法、装置和服务器
US20240333708A1 (en) Multi-factor enabled access using randomly selected digital identity authentication factors
Schaffer Ontology for authentication

Legal Events

Date Code Title Description
A521 Request for written amendment filed

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20110131

A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20110131

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20130220

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20130226

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20130522

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20130529

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20131022