JP5844471B2 - インターネットベースのアプリケーションへのアクセスを制御する方法 - Google Patents
インターネットベースのアプリケーションへのアクセスを制御する方法 Download PDFInfo
- Publication number
- JP5844471B2 JP5844471B2 JP2014530619A JP2014530619A JP5844471B2 JP 5844471 B2 JP5844471 B2 JP 5844471B2 JP 2014530619 A JP2014530619 A JP 2014530619A JP 2014530619 A JP2014530619 A JP 2014530619A JP 5844471 B2 JP5844471 B2 JP 5844471B2
- Authority
- JP
- Japan
- Prior art keywords
- internet
- access
- application
- user
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/082—Access security using revocation of authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/084—Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/37—Managing security policies for mobile devices or for controlling mobile applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2011004430 | 2011-09-19 | ||
| MYPI2011004430A MY183320A (en) | 2011-09-19 | 2011-09-19 | Method of controlling access to an internet-based application |
| PCT/MY2012/000024 WO2013043035A1 (en) | 2011-09-19 | 2012-02-16 | Method of controlling access to an internet-based application |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2014528129A JP2014528129A (ja) | 2014-10-23 |
| JP2014528129A5 JP2014528129A5 (enExample) | 2015-09-03 |
| JP5844471B2 true JP5844471B2 (ja) | 2016-01-20 |
Family
ID=47914647
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2014530619A Active JP5844471B2 (ja) | 2011-09-19 | 2012-02-16 | インターネットベースのアプリケーションへのアクセスを制御する方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US9628460B2 (enExample) |
| JP (1) | JP5844471B2 (enExample) |
| AU (1) | AU2012310295B2 (enExample) |
| MY (1) | MY183320A (enExample) |
| SG (1) | SG192619A1 (enExample) |
| WO (1) | WO2013043035A1 (enExample) |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9680763B2 (en) | 2012-02-14 | 2017-06-13 | Airwatch, Llc | Controlling distribution of resources in a network |
| US10404615B2 (en) | 2012-02-14 | 2019-09-03 | Airwatch, Llc | Controlling distribution of resources on a network |
| US9712508B2 (en) * | 2013-03-13 | 2017-07-18 | Intel Corporation | One-touch device personalization |
| US20140280955A1 (en) | 2013-03-14 | 2014-09-18 | Sky Socket, Llc | Controlling Electronically Communicated Resources |
| US9401915B2 (en) * | 2013-03-15 | 2016-07-26 | Airwatch Llc | Secondary device as key for authorizing access to resources |
| US10051468B2 (en) * | 2013-05-24 | 2018-08-14 | Prashant G. Paima | Process for authenticating an identity of a user |
| EP2819370B1 (en) * | 2013-06-24 | 2018-09-19 | Telefonica Digital España, S.L.U. | A computer implemented method to prevent attacks against user authentication and computer programs products thereof |
| FR3013475B1 (fr) * | 2013-11-19 | 2017-05-19 | Oberthur Technologies | Procede et dispositifs d'authentification pour acceder a un compte utilisateur d'un service sur un reseau de donnees |
| US9584964B2 (en) | 2014-12-22 | 2017-02-28 | Airwatch Llc | Enforcement of proximity based policies |
| US10275823B2 (en) | 2015-06-15 | 2019-04-30 | Adidas Ag | Systems and techniques for computer-enabled geo-targeted product reservation for secure and authenticated online reservations |
| US10560427B2 (en) * | 2015-09-29 | 2020-02-11 | Verisign, Inc. | Domain name operation verification code generation and/or verification |
| EP3360063A1 (en) | 2015-10-07 | 2018-08-15 | Smith & Nephew, Inc | Systems and methods for applying reduced pressure therapy |
| US10511570B2 (en) | 2016-08-30 | 2019-12-17 | Verisign, Inc. | Systems, devices, and methods for locality-based domain name registry operation verification |
| US20240297880A1 (en) * | 2018-12-04 | 2024-09-05 | Journey.ai | Providing access control and identity verification for communications when initiating a communication to an entity to be verified |
| US11637827B2 (en) * | 2018-12-04 | 2023-04-25 | Journey.ai | Providing access control and identity verification for communications when receiving a communication at an entity to be verified |
| US12021866B2 (en) * | 2018-12-04 | 2024-06-25 | Journey.ai | Providing access control and identity verification for communications when initiating a communication to an entity to be verified |
| US12457105B2 (en) * | 2021-10-28 | 2025-10-28 | Google Llc | Using co-located secondary devices to protect against cookie theft |
| WO2025155458A1 (en) * | 2024-01-18 | 2025-07-24 | Cisco Technology, Inc. | Systems and methods for android localhost listener to origin bind request to stop attacker-in-the-middle (aitm) attacks |
| CN117749536B (zh) * | 2024-02-21 | 2024-04-19 | 湖南华博信息技术有限公司 | 一种零信任统一身份认证系统及构建方法 |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7685037B2 (en) * | 2001-03-26 | 2010-03-23 | 3MFuture Ltd. | Transaction authorisation system |
| US7359885B2 (en) * | 2003-08-21 | 2008-04-15 | International Business Machines Corporation | System and method for device-based access privilege to an account |
| WO2007050932A2 (en) | 2005-10-27 | 2007-05-03 | Rba International, Inc. | Systems and methods for user interface access control |
| ES2517865T3 (es) | 2006-03-08 | 2014-11-04 | Monitise Limited | Métodos, aparatos y software para usar un testigo para calcular contraseña limitada en tiempo en teléfono celular |
| US8374634B2 (en) * | 2007-03-16 | 2013-02-12 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
| US8756657B2 (en) * | 2009-09-29 | 2014-06-17 | Ebay Inc. | Mobile or user device authentication and tracking |
| US20110219427A1 (en) * | 2010-03-04 | 2011-09-08 | RSSBus, Inc. | Smart Device User Authentication |
-
2011
- 2011-09-19 MY MYPI2011004430A patent/MY183320A/en unknown
-
2012
- 2012-02-16 WO PCT/MY2012/000024 patent/WO2013043035A1/en not_active Ceased
- 2012-02-16 AU AU2012310295A patent/AU2012310295B2/en not_active Ceased
- 2012-02-16 JP JP2014530619A patent/JP5844471B2/ja active Active
- 2012-02-16 US US14/345,878 patent/US9628460B2/en active Active
- 2012-02-16 SG SG2013059340A patent/SG192619A1/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| US9628460B2 (en) | 2017-04-18 |
| WO2013043035A1 (en) | 2013-03-28 |
| SG192619A1 (en) | 2013-09-30 |
| US20140230038A1 (en) | 2014-08-14 |
| JP2014528129A (ja) | 2014-10-23 |
| AU2012310295A1 (en) | 2013-05-16 |
| MY183320A (en) | 2021-02-18 |
| AU2012310295B2 (en) | 2016-02-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5844471B2 (ja) | インターネットベースのアプリケーションへのアクセスを制御する方法 | |
| EP3997597B1 (en) | System and method for identifying a browser instance in a browser session with a server | |
| US11172361B2 (en) | System and method of notifying mobile devices to complete transactions | |
| CA2968051C (en) | Systems and methods for authentication using multiple devices | |
| US8862097B2 (en) | Secure transaction authentication | |
| US9628282B2 (en) | Universal anonymous cross-site authentication | |
| KR101482564B1 (ko) | 신뢰성있는 인증 및 로그온을 위한 방법 및 장치 | |
| CA3035817A1 (en) | System and method for decentralized authentication using a distributed transaction-based state machine | |
| US11070980B1 (en) | Secondary device authentication proxied from authenticated primary device | |
| US20110239281A1 (en) | Method and apparatus for authentication of services | |
| TWI632798B (zh) | 伺服器、行動終端機、網路實名認證系統及方法 | |
| CN104767740A (zh) | 用于来自用户平台的可信认证和接入的方法 | |
| KR101212509B1 (ko) | 서비스 제어시스템 및 그 방법 | |
| US20240022428A1 (en) | Method for multi-party authentication using distributed identities | |
| Huseynov et al. | Context-aware multifactor authentication survey | |
| KR20140043071A (ko) | 접속 시도 기기 인증 시스템 및 방법 | |
| KR101619928B1 (ko) | 이동단말기의 원격제어시스템 | |
| EP2940618A1 (en) | Method, system, user equipment and program for authenticating a user | |
| Braun et al. | A trusted UI for the mobile web | |
| Lach | Using mobile devices for user authentication | |
| Hammoudeh et al. | Enhancing Security Using E-Authentication System | |
| HK1235203B (zh) | 服务器、移动终端、网络实名认证系统及方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20141203 |
|
| A871 | Explanation of circumstances concerning accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A871 Effective date: 20141203 |
|
| A975 | Report on accelerated examination |
Free format text: JAPANESE INTERMEDIATE CODE: A971005 Effective date: 20141219 |
|
| A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20150316 |
|
| A601 | Written request for extension of time |
Free format text: JAPANESE INTERMEDIATE CODE: A601 Effective date: 20150616 |
|
| A524 | Written submission of copy of amendment under article 19 pct |
Free format text: JAPANESE INTERMEDIATE CODE: A524 Effective date: 20150716 |
|
| TRDD | Decision of grant or rejection written | ||
| A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20151019 |
|
| A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20151118 |
|
| R150 | Certificate of patent or registration of utility model |
Ref document number: 5844471 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
| R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |