JP5844471B2 - インターネットベースのアプリケーションへのアクセスを制御する方法 - Google Patents

インターネットベースのアプリケーションへのアクセスを制御する方法 Download PDF

Info

Publication number
JP5844471B2
JP5844471B2 JP2014530619A JP2014530619A JP5844471B2 JP 5844471 B2 JP5844471 B2 JP 5844471B2 JP 2014530619 A JP2014530619 A JP 2014530619A JP 2014530619 A JP2014530619 A JP 2014530619A JP 5844471 B2 JP5844471 B2 JP 5844471B2
Authority
JP
Japan
Prior art keywords
internet
access
application
user
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2014530619A
Other languages
English (en)
Japanese (ja)
Other versions
JP2014528129A5 (enExample
JP2014528129A (ja
Inventor
チク・ウェン・レオン
チー・フー・ラウ
ユエン・レン・コン
タウ・ウェイ・ファン
フン・シン・チョン
Original Assignee
イー−ロック・コーポレーション・エスディーエヌ・ビーエイチディー
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by イー−ロック・コーポレーション・エスディーエヌ・ビーエイチディー filed Critical イー−ロック・コーポレーション・エスディーエヌ・ビーエイチディー
Publication of JP2014528129A publication Critical patent/JP2014528129A/ja
Publication of JP2014528129A5 publication Critical patent/JP2014528129A5/ja
Application granted granted Critical
Publication of JP5844471B2 publication Critical patent/JP5844471B2/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Computer And Data Communications (AREA)
JP2014530619A 2011-09-19 2012-02-16 インターネットベースのアプリケーションへのアクセスを制御する方法 Active JP5844471B2 (ja)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
MYPI2011004430 2011-09-19
MYPI2011004430A MY183320A (en) 2011-09-19 2011-09-19 Method of controlling access to an internet-based application
PCT/MY2012/000024 WO2013043035A1 (en) 2011-09-19 2012-02-16 Method of controlling access to an internet-based application

Publications (3)

Publication Number Publication Date
JP2014528129A JP2014528129A (ja) 2014-10-23
JP2014528129A5 JP2014528129A5 (enExample) 2015-09-03
JP5844471B2 true JP5844471B2 (ja) 2016-01-20

Family

ID=47914647

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2014530619A Active JP5844471B2 (ja) 2011-09-19 2012-02-16 インターネットベースのアプリケーションへのアクセスを制御する方法

Country Status (6)

Country Link
US (1) US9628460B2 (enExample)
JP (1) JP5844471B2 (enExample)
AU (1) AU2012310295B2 (enExample)
MY (1) MY183320A (enExample)
SG (1) SG192619A1 (enExample)
WO (1) WO2013043035A1 (enExample)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9680763B2 (en) 2012-02-14 2017-06-13 Airwatch, Llc Controlling distribution of resources in a network
US10404615B2 (en) 2012-02-14 2019-09-03 Airwatch, Llc Controlling distribution of resources on a network
US9712508B2 (en) * 2013-03-13 2017-07-18 Intel Corporation One-touch device personalization
US20140280955A1 (en) 2013-03-14 2014-09-18 Sky Socket, Llc Controlling Electronically Communicated Resources
US9401915B2 (en) * 2013-03-15 2016-07-26 Airwatch Llc Secondary device as key for authorizing access to resources
US10051468B2 (en) * 2013-05-24 2018-08-14 Prashant G. Paima Process for authenticating an identity of a user
EP2819370B1 (en) * 2013-06-24 2018-09-19 Telefonica Digital España, S.L.U. A computer implemented method to prevent attacks against user authentication and computer programs products thereof
FR3013475B1 (fr) * 2013-11-19 2017-05-19 Oberthur Technologies Procede et dispositifs d'authentification pour acceder a un compte utilisateur d'un service sur un reseau de donnees
US9584964B2 (en) 2014-12-22 2017-02-28 Airwatch Llc Enforcement of proximity based policies
US10275823B2 (en) 2015-06-15 2019-04-30 Adidas Ag Systems and techniques for computer-enabled geo-targeted product reservation for secure and authenticated online reservations
US10560427B2 (en) * 2015-09-29 2020-02-11 Verisign, Inc. Domain name operation verification code generation and/or verification
EP3360063A1 (en) 2015-10-07 2018-08-15 Smith & Nephew, Inc Systems and methods for applying reduced pressure therapy
US10511570B2 (en) 2016-08-30 2019-12-17 Verisign, Inc. Systems, devices, and methods for locality-based domain name registry operation verification
US20240297880A1 (en) * 2018-12-04 2024-09-05 Journey.ai Providing access control and identity verification for communications when initiating a communication to an entity to be verified
US11637827B2 (en) * 2018-12-04 2023-04-25 Journey.ai Providing access control and identity verification for communications when receiving a communication at an entity to be verified
US12021866B2 (en) * 2018-12-04 2024-06-25 Journey.ai Providing access control and identity verification for communications when initiating a communication to an entity to be verified
US12457105B2 (en) * 2021-10-28 2025-10-28 Google Llc Using co-located secondary devices to protect against cookie theft
WO2025155458A1 (en) * 2024-01-18 2025-07-24 Cisco Technology, Inc. Systems and methods for android localhost listener to origin bind request to stop attacker-in-the-middle (aitm) attacks
CN117749536B (zh) * 2024-02-21 2024-04-19 湖南华博信息技术有限公司 一种零信任统一身份认证系统及构建方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7685037B2 (en) * 2001-03-26 2010-03-23 3MFuture Ltd. Transaction authorisation system
US7359885B2 (en) * 2003-08-21 2008-04-15 International Business Machines Corporation System and method for device-based access privilege to an account
WO2007050932A2 (en) 2005-10-27 2007-05-03 Rba International, Inc. Systems and methods for user interface access control
ES2517865T3 (es) 2006-03-08 2014-11-04 Monitise Limited Métodos, aparatos y software para usar un testigo para calcular contraseña limitada en tiempo en teléfono celular
US8374634B2 (en) * 2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location
US8756657B2 (en) * 2009-09-29 2014-06-17 Ebay Inc. Mobile or user device authentication and tracking
US20110219427A1 (en) * 2010-03-04 2011-09-08 RSSBus, Inc. Smart Device User Authentication

Also Published As

Publication number Publication date
US9628460B2 (en) 2017-04-18
WO2013043035A1 (en) 2013-03-28
SG192619A1 (en) 2013-09-30
US20140230038A1 (en) 2014-08-14
JP2014528129A (ja) 2014-10-23
AU2012310295A1 (en) 2013-05-16
MY183320A (en) 2021-02-18
AU2012310295B2 (en) 2016-02-11

Similar Documents

Publication Publication Date Title
JP5844471B2 (ja) インターネットベースのアプリケーションへのアクセスを制御する方法
EP3997597B1 (en) System and method for identifying a browser instance in a browser session with a server
US11172361B2 (en) System and method of notifying mobile devices to complete transactions
CA2968051C (en) Systems and methods for authentication using multiple devices
US8862097B2 (en) Secure transaction authentication
US9628282B2 (en) Universal anonymous cross-site authentication
KR101482564B1 (ko) 신뢰성있는 인증 및 로그온을 위한 방법 및 장치
CA3035817A1 (en) System and method for decentralized authentication using a distributed transaction-based state machine
US11070980B1 (en) Secondary device authentication proxied from authenticated primary device
US20110239281A1 (en) Method and apparatus for authentication of services
TWI632798B (zh) 伺服器、行動終端機、網路實名認證系統及方法
CN104767740A (zh) 用于来自用户平台的可信认证和接入的方法
KR101212509B1 (ko) 서비스 제어시스템 및 그 방법
US20240022428A1 (en) Method for multi-party authentication using distributed identities
Huseynov et al. Context-aware multifactor authentication survey
KR20140043071A (ko) 접속 시도 기기 인증 시스템 및 방법
KR101619928B1 (ko) 이동단말기의 원격제어시스템
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user
Braun et al. A trusted UI for the mobile web
Lach Using mobile devices for user authentication
Hammoudeh et al. Enhancing Security Using E-Authentication System
HK1235203B (zh) 服务器、移动终端、网络实名认证系统及方法

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20141203

A871 Explanation of circumstances concerning accelerated examination

Free format text: JAPANESE INTERMEDIATE CODE: A871

Effective date: 20141203

A975 Report on accelerated examination

Free format text: JAPANESE INTERMEDIATE CODE: A971005

Effective date: 20141219

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20150316

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20150616

A524 Written submission of copy of amendment under article 19 pct

Free format text: JAPANESE INTERMEDIATE CODE: A524

Effective date: 20150716

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20151019

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20151118

R150 Certificate of patent or registration of utility model

Ref document number: 5844471

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250