JP6426189B2 - 生体認証プロトコル標準のためのシステムおよび方法 - Google Patents
生体認証プロトコル標準のためのシステムおよび方法 Download PDFInfo
- Publication number
- JP6426189B2 JP6426189B2 JP2016544529A JP2016544529A JP6426189B2 JP 6426189 B2 JP6426189 B2 JP 6426189B2 JP 2016544529 A JP2016544529 A JP 2016544529A JP 2016544529 A JP2016544529 A JP 2016544529A JP 6426189 B2 JP6426189 B2 JP 6426189B2
- Authority
- JP
- Japan
- Prior art keywords
- user
- computing device
- user computing
- trusted server
- secure communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 32
- 238000004891 communication Methods 0.000 claims description 41
- 238000001514 detection method Methods 0.000 claims description 14
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000001172 regenerating effect Effects 0.000 claims 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000012550 audit Methods 0.000 description 9
- 230000009471 action Effects 0.000 description 8
- 230000000977 initiatory effect Effects 0.000 description 8
- 230000008520 organization Effects 0.000 description 7
- 238000010276 construction Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 2
- 238000013474 audit trail Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/108—Remote banking, e.g. home banking
- G06Q20/1085—Remote banking, e.g. home banking involving automatic teller machines [ATMs]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Databases & Information Systems (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Description
https://xyz.domain.com:8443/{BOPS_Instance_Server}/?val1=<n1>&val2=<n2>&siteId=<client>&username=<username>&password=<password>&newPassword=<newpassword>
となりうる。
https://xyz.domain.com:8443/{BOPS_Instance_Server}/genesisval1=fa8e14cf7f80f885084ee0e3cb256182bb6a4e40&val2=fa8e14cf7f80f885084ee0e3cb256182bb6a4e40&newPassword=gasol
val1=<現時刻の直近5分のインターバルで遡ったSHA1合計>&val2=<現時刻の直近20分のインターバルで遡ったSHA1合計>&command=<fopenなどの低レベル動作システムのSHA1合計>&version=<コマンドのバージョン>&val3=<コマンドファイルのSHA1合計>
ならびに、セッションに関するdeviceID(デバイスID)を含む。
Bobがマネージャであれば、Bobのラベルはマネージャ(Manager)および利用者(User)である。
データの一部がマネージャであれば、階層はフラット化されていない。
データを読み取ってはならず(no read up)、“Bell−LaPadula”モデルに書き込んではならない(no write)。
UPDATE_URI=https://xyz.domain.com:8443/{BOPS_Instance_Name}/JSONUpdate
Claims (20)
- 利用者コンピューティングデバイスおよびトラステッドサーバ間のセキュア通信を提供する方法であって、前記方法は、
分散クライアントソフトウェアアプリケーションを介して、前記利用者コンピューティングデバイスおよび前記トラステッドサーバ間における初期双方向セキュア通信セッションを可能にするワンタイム証明書を提供することと、
前記トラステッドサーバによって、前記ワンタイム証明書の受信後、前記利用者コンピューティングデバイスとの初期セキュア通信セッションを確立することと、
該初期セキュア通信中に、前記トラステッドサーバによって、前記利用者コンピューティングデバイスの前記利用者と関連した識別情報であって、バイオメトリクスの機能として確認されている前記利用者の身元の表現を含み、かつ、前記利用者コンピューティングデバイスの表現をさらに含む前記識別情報を受信することと、
前記トラステッドサーバによって、前記利用者と前記利用者コンピューティングデバイスとの組合せに対して固有である置換え証明書を生成することと、
前記トラステッドサーバによって、前記利用者コンピューティングデバイスに前記置換え証明書を伝送することと、
前記トラステッドサーバで前記置換え証明書を受信するごとに、前記トラステッドサーバによって、前記利用者コンピューティングデバイスとの双方向セキュア通信セッションを確立することとを含む、方法。 - 前記トラステッドサーバによって、アクティブな監視を提供して、前記置換え証明書のなりすましを防止する侵入検知システムを用いることをさらに含む、請求項1記載の方法。
- 防止されている前記なりすましは、前記置換え証明書を再生することを含む、請求項2記載の方法。
- 前記トラステッドサーバによって前記置換え証明書を受信するごとに、前記利用者コンピューティングデバイスとの前記初期双方向セキュア通信セッションおよび前記双方向セキュア通信セッションは、一方向のセキュアな接続としてさらに確立される、請求項1記載の方法。
- 前記初期双方向セキュア通信セッションおよび前記双方向セキュア通信セッションは、双方向のセキュアソケットレイヤ接続を介して、かつ、一方向のセキュアソケットレイヤ接続を介して確保されている、請求項1記載の方法。
- 前記トラステッドサーバによって、前記利用者コンピューティングデバイス以外のコンピューティングデバイスから、前記利用者を表現する利用者識別子を受信することと、
前記置換え証明書の中に前記利用者識別子を有することとをさらに含む、請求項1記載の方法。 - 前記トラステッドサーバによって、デジタル資産へのアクセスのための1つまたは複数のルールによって規定されるロールの収集を提供することと、
前記トラステッドサーバによって、前記ロールの収集の機能として前記利用者コンピューティングデバイスによるデジタル資産へのアクセスを提供することまたは拒否することとをさらに含む、請求項1記載の方法。 - 前記トラステッドサーバによって、前記利用者コンピューティングデバイスによって1つまたは複数のデジタル資産へのアクセスを監査することを提供することをさらに含む、請求項1記載の方法。
- 前記利用者コンピューティングデバイスの前記表現にデバイスの識別子を含む、請求項1記載の方法。
- 前記トラステッドサーバによって、前記利用者コンピューティングデバイスに問い合わせて、前記利用者のバイオメトリック情報を取り込み、前記置換え証明書とともに検証されている前記利用者の身元を表現する情報をエンコードすることをさらに含む、請求項1記載の方法。
- 利用者コンピューティングデバイスおよびトラステッドサーバ間のセキュア通信を提供するシステムであって、前記システムは、
1つまたは複数の非一時的なプロセッサ読み取り可能な媒体に動作可能に結合された少なくとも1つのプロセッサを含み、
該1つまたは複数のプロセッサ読み取り可能な媒体は前記少なくとも1つのプロセッサに対して、
分散クライアントソフトウェアアプリケーションを介して、前記利用者コンピューティングデバイスおよび前記トラステッドサーバ間の初期双方向セキュア通信セッションを可能にするワンタイム証明書を提供し、
前記ワンタイム証明書を受信後、前記利用者コンピューティングデバイスと初期セキュア通信セッションを確立し、
該初期セキュア通信中に、前記利用者コンピューティングデバイスの前記利用者と関連した識別情報であって、バイオメトリクスの機能として確認されている前記利用者の身元の表現を含み、かつ、前記利用者コンピューティングデバイスの表現をさらに含む前記識別情報を受信し、
前記利用者と前記利用者コンピューティングデバイスとの組合せに対して固有の置換え証明書を生成し、
前記利用者コンピューティングデバイスに前記置換え証明書を伝送し、
前記トラステッドサーバによって前記置換え証明書を受信するごとに、前記利用者コンピューティングデバイスとの双方向セキュア通信セッションを確立することを可能にする指示を含む、システム。 - 前記1つまたは複数の非一時的なプロセッサ読み取り可能な媒体は、前記少なくとも1つのプロセッサに、アクティブな監視を提供し、前記置換え証明書のなりすましを防ぐ侵入検知システムを用いることを可能にする指示をさらに含む、請求項11記載のシステム。
- 防止されている前記なりすましは、前記置換え証明書を再生することを含む、請求項12記載のシステム。
- 前記1つまたは複数の非一時的なプロセッサ読み取り可能な媒体は、前記少なくとも1つのプロセッサに、前記置換え証明書を受信するごとに一方向のセキュアな接続を確立することを可能にする指示をさらに含む、請求項11記載のシステム。
- 前記初期双方向セキュア通信セッションおよび前記双方向セキュア通信セッションは、双方向のセキュアソケットレイヤ接続を介して、かつ、一方向のセキュアソケットレイヤ接続を介して、確保されている、請求項11記載のシステム。
- 該1つまたは複数のプロセッサ読み取り可能な媒体は前記少なくとも1つのプロセッサに対して、
前記利用者コンピューティングデバイス以外のコンピューティングデバイスから、前記利用者を表現する利用者識別子を受信し、
前記置換え証明書の中に前記利用者識別子を含むことを可能にする指示をさらに含む、請求項11記載のシステム。 - 該1つまたは複数の非一時的なプロセッサ読み取り可能な媒体は前記少なくとも1つのプロセッサに対して、
デジタル資産へのアクセスのための1つまたは複数のルールによって規定されるロールの収集を提供し、
前記ロールの収集の機能として前記利用者コンピューティングデバイスによる前記デジタル資産へのアクセスを提供または拒否することを可能にする指示をさらに含む、請求項11記載のシステム。 - 前記1つまたは複数の非一時的なプロセッサ読み取り可能な媒体は、前記少なくとも1つのプロセッサに、前記利用者コンピューティングデバイスによる1つまたは複数のデジタル資産へのアクセスの監査をさらに提供することを可能にする指示をさらに含む、請求項11記載のシステム。
- 前記利用者コンピューティングデバイスの前記表現にデバイスの識別子を含む、請求項11記載のシステム。
- 前記1つまたは複数の非一時的なプロセッサ読み取り可能な媒体は、前記少なくとも1つのプロセッサに、前記利用者コンピューティングデバイスに問い合わせて、前記利用者のバイオメトリック情報の取り込み、前記置換え証明書とともに検証されている前記利用者の身元を表現する情報をエンコードすることを可能にする指示をさらに含む、請求項11記載のシステム。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361922438P | 2013-12-31 | 2013-12-31 | |
US61/922,438 | 2013-12-31 | ||
US14/201,438 | 2014-03-07 | ||
US14/201,438 US9208492B2 (en) | 2013-05-13 | 2014-03-07 | Systems and methods for biometric authentication of transactions |
PCT/US2014/072985 WO2015147945A2 (en) | 2013-12-31 | 2014-12-31 | System and method for biometric protocol standards |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2017508194A JP2017508194A (ja) | 2017-03-23 |
JP6426189B2 true JP6426189B2 (ja) | 2018-11-21 |
Family
ID=53483232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016544529A Active JP6426189B2 (ja) | 2013-12-31 | 2014-12-31 | 生体認証プロトコル標準のためのシステムおよび方法 |
Country Status (12)
Country | Link |
---|---|
US (3) | US9380052B2 (ja) |
EP (1) | EP3090525B1 (ja) |
JP (1) | JP6426189B2 (ja) |
KR (1) | KR102217916B1 (ja) |
CN (1) | CN106063219B (ja) |
AU (2) | AU2014388268B2 (ja) |
BR (1) | BR112016015458B1 (ja) |
CA (1) | CA2935688C (ja) |
ES (1) | ES2881877T3 (ja) |
PL (1) | PL3090525T3 (ja) |
WO (1) | WO2015147945A2 (ja) |
ZA (1) | ZA201605228B (ja) |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100114768A1 (en) | 2008-10-31 | 2010-05-06 | Wachovia Corporation | Payment vehicle with on and off function |
US10867298B1 (en) | 2008-10-31 | 2020-12-15 | Wells Fargo Bank, N.A. | Payment vehicle with on and off function |
US9947004B2 (en) | 2012-06-28 | 2018-04-17 | Green Dot Corporation | Wireless client transaction systems and related methods |
US20140019322A1 (en) | 2012-07-13 | 2014-01-16 | Green Dot Corporation | Mobile banking systems and related methods |
US9838388B2 (en) | 2014-08-26 | 2017-12-05 | Veridium Ip Limited | System and method for biometric protocol standards |
EP2998896A1 (fr) * | 2014-09-17 | 2016-03-23 | Gemalto Sa | Procédé d'authentification d'un utilisateur, terminaux et système d'authentification correspondants |
US11429975B1 (en) | 2015-03-27 | 2022-08-30 | Wells Fargo Bank, N.A. | Token management system |
JP5944551B1 (ja) * | 2015-04-03 | 2016-07-05 | 株式会社三菱東京Ufj銀行 | サーバ |
US11170364B1 (en) | 2015-07-31 | 2021-11-09 | Wells Fargo Bank, N.A. | Connected payment card systems and methods |
US10430788B2 (en) | 2015-08-06 | 2019-10-01 | Green Dot Corporation | Systems and methods for fund transfers |
ES2881824T3 (es) * | 2015-08-21 | 2021-11-30 | Veridium Ip Ltd | Sistema y método para estándares de protocolos biométricos |
US11329980B2 (en) | 2015-08-21 | 2022-05-10 | Veridium Ip Limited | System and method for biometric protocol standards |
US10438209B2 (en) | 2016-02-10 | 2019-10-08 | Bank Of America Corporation | System for secure routing of data to various networks from a process data network |
US10200369B1 (en) * | 2016-02-16 | 2019-02-05 | Symantec Corporation | Systems and methods for dynamically validating remote requests within enterprise networks |
US10178105B2 (en) * | 2016-02-22 | 2019-01-08 | Bank Of America Corporation | System for providing levels of security access to a process data network |
WO2017176429A1 (en) | 2016-04-05 | 2017-10-12 | Wellaware Holdings, Inc. | Monitoring and controlling industrial equipment |
MX2018012186A (es) | 2016-04-05 | 2019-02-07 | Wellaware Holdings Inc | Dispositivo para monitorear y controlar equipo industrial. |
WO2017176428A1 (en) | 2016-04-05 | 2017-10-12 | Wellaware Holdings, Inc. | Monitoring and controlling industrial equipment |
US11170358B2 (en) * | 2016-04-29 | 2021-11-09 | International Business Machines Corporation | System, method, and recording medium for identity fraud prevention in secure transactions using multi-factor verification |
US11886611B1 (en) | 2016-07-01 | 2024-01-30 | Wells Fargo Bank, N.A. | Control tower for virtual rewards currency |
US10992679B1 (en) * | 2016-07-01 | 2021-04-27 | Wells Fargo Bank, N.A. | Access control tower |
US11935020B1 (en) | 2016-07-01 | 2024-03-19 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US11386223B1 (en) | 2016-07-01 | 2022-07-12 | Wells Fargo Bank, N.A. | Access control tower |
US11615402B1 (en) * | 2016-07-01 | 2023-03-28 | Wells Fargo Bank, N.A. | Access control tower |
US10289822B2 (en) * | 2016-07-22 | 2019-05-14 | Nec Corporation | Liveness detection for antispoof face recognition |
US10402796B2 (en) | 2016-08-29 | 2019-09-03 | Bank Of America Corporation | Application life-cycle transition record recreation system |
US20180089688A1 (en) * | 2016-09-27 | 2018-03-29 | Mastercard International Incorporated | System and methods for authenticating a user using biometric data |
US11074325B1 (en) * | 2016-11-09 | 2021-07-27 | Wells Fargo Bank, N.A. | Systems and methods for dynamic bio-behavioral authentication |
US20180145959A1 (en) * | 2016-11-22 | 2018-05-24 | Synergex Group | Method for determining access privilege using username, IP address, App ID, App Key, and biometric signature sample. |
US10911452B2 (en) | 2016-11-22 | 2021-02-02 | Synergex Group (corp.) | Systems, methods, and media for determining access privileges |
US10404691B2 (en) | 2017-03-02 | 2019-09-03 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using authentication tokens |
US10134207B2 (en) * | 2017-04-20 | 2018-11-20 | Saudi Arabian Oil Company | Securing SCADA network access from a remote terminal unit |
US11556936B1 (en) | 2017-04-25 | 2023-01-17 | Wells Fargo Bank, N.A. | System and method for card control |
DE102017111933A1 (de) * | 2017-05-31 | 2018-12-06 | Krohne Messtechnik Gmbh | Verfahren zur sicheren Kommunikation mit einem Feldmessgerät der Prozesstechnik und entsprechendes Feldmessgerät |
US11062388B1 (en) | 2017-07-06 | 2021-07-13 | Wells Fargo Bank, N.A | Data control tower |
WO2019046406A1 (en) * | 2017-08-29 | 2019-03-07 | Westerhoff David Michael | RECORDING SYSTEM IN A SECURE NETWORK |
US11715154B2 (en) | 2017-09-22 | 2023-08-01 | Green Dot Corporation | Systems and methods for managing accounts in a financial services system |
JP6884876B2 (ja) * | 2017-10-31 | 2021-06-09 | 三菱重工機械システム株式会社 | 情報中継装置、料金収受機、メディア、車載器、及び路側機 |
US11188887B1 (en) | 2017-11-20 | 2021-11-30 | Wells Fargo Bank, N.A. | Systems and methods for payment information access management |
US20190320039A1 (en) * | 2018-04-13 | 2019-10-17 | Mastercard International Incorporated | Systems and methods for use in providing digital identities |
US11057377B2 (en) * | 2018-08-26 | 2021-07-06 | Ncr Corporation | Transaction authentication |
WO2020101506A1 (en) * | 2018-11-13 | 2020-05-22 | Apple Inc. | Wireless power transfer device authentication |
US11282066B1 (en) * | 2019-01-18 | 2022-03-22 | Worldpay, Llc | Systems and methods to provide user verification in a shared user environment via a device-specific display |
US10897398B2 (en) | 2019-02-04 | 2021-01-19 | Saudi Arabian Oil Company | Embedded dynamic configuration assignment for unprotected remote terminal unit (RTU) |
US11823198B1 (en) * | 2019-02-18 | 2023-11-21 | Wells Fargo Bank, N.A. | Contextually escalated authentication by system directed customization of user supplied image |
US11288378B2 (en) | 2019-02-20 | 2022-03-29 | Saudi Arabian Oil Company | Embedded data protection and forensics for physically unsecure remote terminal unit (RTU) |
US11593467B2 (en) * | 2019-11-19 | 2023-02-28 | Red Hat, Inc. | Systems and methods for biometric authorization using a main screen and a visual indicator |
US11341830B2 (en) | 2020-08-06 | 2022-05-24 | Saudi Arabian Oil Company | Infrastructure construction digital integrated twin (ICDIT) |
US10992606B1 (en) | 2020-09-04 | 2021-04-27 | Wells Fargo Bank, N.A. | Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets |
CN114389793B (zh) * | 2020-10-16 | 2024-03-08 | 中移动信息技术有限公司 | 会话密钥验证的方法、装置、设备及计算机存储介质 |
EP4002166B1 (en) * | 2020-11-11 | 2024-06-12 | Qamcom Innovation Labs AB | Method and system for biometric authentication for large numbers of enrolled persons |
US11921832B2 (en) | 2021-01-04 | 2024-03-05 | Capital One Services, Llc | Authentication by a facial biometric |
US11546338B1 (en) | 2021-01-05 | 2023-01-03 | Wells Fargo Bank, N.A. | Digital account controls portal and protocols for federated and non-federated systems and devices |
CN113297552B (zh) * | 2021-02-05 | 2023-11-17 | 中国银联股份有限公司 | 基于生物特征id链的验证方法及其验证系统、用户终端 |
US11687053B2 (en) | 2021-03-08 | 2023-06-27 | Saudi Arabian Oil Company | Intelligent safety motor control center (ISMCC) |
US11935055B2 (en) | 2021-03-22 | 2024-03-19 | Bank Of America Corporation | Wired multi-factor authentication for ATMs using an authentication media |
US20220321347A1 (en) * | 2021-03-30 | 2022-10-06 | Andrew Mark | System, method and apparatus for transaction access and security |
US20230012424A1 (en) * | 2021-07-07 | 2023-01-12 | Bank Of America Corporation | Queue Management for Pre-staged Transactions at Ultra-Wide Enabled ATMs |
US12058249B2 (en) | 2021-07-07 | 2024-08-06 | Bank Of America Corporation | Pre-staged transactions with ultra-wideband networking and haptic feedback |
CN113347620B (zh) * | 2021-08-05 | 2021-11-12 | 深圳市深圳通有限公司 | 兼容多版本应用空发卡方法、装置、设备及存储介质 |
US20230291548A1 (en) * | 2022-03-08 | 2023-09-14 | Western Digital Technologies, Inc. | Authorization requests from a data storage device to multiple manager devices |
US12024985B2 (en) | 2022-03-24 | 2024-07-02 | Saudi Arabian Oil Company | Selective inflow control device, system, and method |
Family Cites Families (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6763459B1 (en) * | 2000-01-14 | 2004-07-13 | Hewlett-Packard Company, L.P. | Lightweight public key infrastructure employing disposable certificates |
ATE329426T1 (de) * | 2001-05-23 | 2006-06-15 | Daniel Buettiker | Verfahren und datenträger zur eintragung von benutzern einer public-key-infrastruktur und eintragungssystem |
TWI246028B (en) | 2001-06-28 | 2005-12-21 | Trek 2000 Int Ltd | A portable device having biometrics-based authentication capabilities |
CN100342294C (zh) | 2002-07-03 | 2007-10-10 | 富利科技有限公司 | 生物计量私用密钥基础结构 |
CA2820986C (en) * | 2002-08-06 | 2016-09-06 | Privaris, Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
US7069438B2 (en) * | 2002-08-19 | 2006-06-27 | Sowl Associates, Inc. | Establishing authenticated network connections |
KR100528328B1 (ko) | 2003-01-21 | 2005-11-15 | 삼성전자주식회사 | 사용자 인증 방법 및 장치 |
JP2004297292A (ja) * | 2003-03-26 | 2004-10-21 | Nec Corp | 無線端末、認証サーバ、無線認証情報管理システム、および、無線認証情報管理方法 |
US7437769B2 (en) | 2003-06-24 | 2008-10-14 | Realnetworks, Inc. | Multiple entity control of access restrictions for media playback |
KR101079238B1 (ko) * | 2003-08-11 | 2011-11-03 | 소니 주식회사 | 인증 방법, 인증 시스템 및 인증 서버 |
WO2005069823A2 (en) | 2004-01-15 | 2005-08-04 | Jun Song | Centralized transactional security audit for enterprise systems |
US7254383B2 (en) | 2004-07-30 | 2007-08-07 | At&T Knowledge Ventures, L.P. | Voice over IP based biometric authentication |
US7571485B1 (en) | 2005-03-30 | 2009-08-04 | Symantec Corporation | Use of database schema for fraud prevention and policy compliance |
US7586926B2 (en) | 2005-04-18 | 2009-09-08 | Research In Motion Limited | System and method for generic data mapping between wireless component applications and application data sources |
US8171544B2 (en) | 2005-04-20 | 2012-05-01 | Cisco Technology, Inc. | Method and system for preventing, auditing and trending unauthorized traffic in network systems |
US7536304B2 (en) | 2005-05-27 | 2009-05-19 | Porticus, Inc. | Method and system for bio-metric voice print authentication |
US20060293891A1 (en) | 2005-06-22 | 2006-12-28 | Jan Pathuel | Biometric control systems and associated methods of use |
CA2617938A1 (en) | 2005-08-03 | 2007-02-15 | Intercomputer Corporation | System and method for user identification and authentication |
US8615663B2 (en) | 2006-04-17 | 2013-12-24 | Broadcom Corporation | System and method for secure remote biometric authentication |
US20130227286A1 (en) * | 2006-04-25 | 2013-08-29 | Andre Jacques Brisson | Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud |
US8549295B2 (en) | 2006-05-31 | 2013-10-01 | Microsoft Corporation | Establishing secure, mutually authenticated communication credentials |
GB2438928A (en) | 2006-06-08 | 2007-12-12 | Brian Clarke | Biometric Remote Access Device (BRAD) |
US20100242102A1 (en) * | 2006-06-27 | 2010-09-23 | Microsoft Corporation | Biometric credential verification framework |
US8280120B2 (en) | 2006-10-02 | 2012-10-02 | Eyelock Inc. | Fraud resistant biometric financial transaction system and method |
JP4996904B2 (ja) | 2006-10-04 | 2012-08-08 | 株式会社日立製作所 | 生体認証システム、登録端末、認証端末、及び認証サーバ |
JP2008176407A (ja) | 2007-01-16 | 2008-07-31 | Toshiba Corp | 生体認証システム、装置及びプログラム |
WO2009009788A1 (en) | 2007-07-12 | 2009-01-15 | Jobmann Brian C | Identity authentication and secured access systems, components, and methods |
JP2009140231A (ja) * | 2007-12-06 | 2009-06-25 | Sony Corp | 通信システム及び通信端末装置 |
US8429650B2 (en) | 2008-11-14 | 2013-04-23 | Oracle International Corporation | System and method of security management for a virtual environment |
CN101420694A (zh) * | 2008-12-16 | 2009-04-29 | 天津工业大学 | 一种wapi-xg1接入及快速切换认证方法 |
DE102009009310A1 (de) * | 2009-02-17 | 2009-10-01 | Daimler Ag | Kommunikation und Identifizierung zwischen einem Kraftfahrzeugbenutzergerät mit Head Unit und davon entfernt gelegener Vorrichtung |
US8443202B2 (en) | 2009-08-05 | 2013-05-14 | Daon Holdings Limited | Methods and systems for authenticating users |
US20110047384A1 (en) | 2009-08-21 | 2011-02-24 | Qualcomm Incorporated | Establishing an ad hoc network using face recognition |
JP2011155348A (ja) * | 2010-01-26 | 2011-08-11 | Kddi Corp | 生体認証システム、生体認証方法およびプログラム |
WO2011112990A1 (en) * | 2010-03-11 | 2011-09-15 | Wal-Mart Stores, Inc. | System and method for transaction payments using a mobile device |
US8380177B2 (en) | 2010-04-09 | 2013-02-19 | Paydiant, Inc. | Mobile phone payment processing methods and systems |
US9208482B2 (en) | 2010-04-09 | 2015-12-08 | Paypal, Inc. | Transaction token issuing authorities |
US20120089471A1 (en) * | 2010-10-06 | 2012-04-12 | Rt7 Incorporated | System and method of capturing point-of-sale data and providing real-time advertising content |
CN103314386A (zh) | 2010-10-29 | 2013-09-18 | 爱克斯欧德斯支付系统有限公司 | 使用代币处理交易的方法和系统 |
US9064257B2 (en) | 2010-11-02 | 2015-06-23 | Homayoon Beigi | Mobile device transaction using multi-factor authentication |
BR112013016171A2 (pt) | 2010-12-23 | 2018-07-17 | Paydiant, Inc. | sistemas e métodos para processamento de atm de telefone móvel |
US20120173311A1 (en) * | 2010-12-31 | 2012-07-05 | Nautilus Hyosung Inc. | Automatic teller machine for providing service using two-dimensional barcode and method for operating automatic teller machine |
WO2012123727A1 (en) | 2011-03-11 | 2012-09-20 | Callsign, Inc | Personal identity control |
US8994499B2 (en) | 2011-03-16 | 2015-03-31 | Apple Inc. | Locking and unlocking a mobile device using facial recognition |
US9198038B2 (en) * | 2011-06-13 | 2015-11-24 | Qualcomm Incorporated | Apparatus and methods of identity management in a multi-network system |
US8752154B2 (en) | 2011-08-11 | 2014-06-10 | Bank Of America Corporation | System and method for authenticating a user |
US8473748B2 (en) | 2011-09-27 | 2013-06-25 | George P. Sampas | Mobile device-based authentication |
US9922370B2 (en) * | 2011-11-15 | 2018-03-20 | Ncr Corporation | Techniques for automated teller machine (ATM) transactions |
US20130222603A1 (en) | 2012-02-28 | 2013-08-29 | Aptina Imaging Corporation | Imaging systems for infrared and visible imaging |
EP2831810A4 (en) | 2012-03-28 | 2016-04-27 | Texas State University San Marcos | IDENTIFICATION OF PERSON USING EYE BIOMETRY |
US20130262873A1 (en) * | 2012-03-30 | 2013-10-03 | Cgi Federal Inc. | Method and system for authenticating remote users |
US8457367B1 (en) | 2012-06-26 | 2013-06-04 | Google Inc. | Facial recognition |
US9471764B2 (en) | 2012-07-19 | 2016-10-18 | Apple Inc. | Electronic device switchable to a user-interface unlocked mode based upon spoof detection and related methods |
US20140090039A1 (en) | 2012-09-24 | 2014-03-27 | Plantronics, Inc. | Secure System Access Using Mobile Biometric Devices |
US9948675B2 (en) | 2013-04-04 | 2018-04-17 | The Mitre Corporation | Identity-based internet protocol networking |
-
2014
- 2014-12-31 ES ES14887454T patent/ES2881877T3/es active Active
- 2014-12-31 EP EP14887454.8A patent/EP3090525B1/en active Active
- 2014-12-31 CN CN201480074859.5A patent/CN106063219B/zh active Active
- 2014-12-31 WO PCT/US2014/072985 patent/WO2015147945A2/en active Application Filing
- 2014-12-31 BR BR112016015458-4A patent/BR112016015458B1/pt active IP Right Grant
- 2014-12-31 US US14/587,633 patent/US9380052B2/en active Active
- 2014-12-31 AU AU2014388268A patent/AU2014388268B2/en active Active
- 2014-12-31 KR KR1020167021073A patent/KR102217916B1/ko active IP Right Grant
- 2014-12-31 CA CA2935688A patent/CA2935688C/en active Active
- 2014-12-31 JP JP2016544529A patent/JP6426189B2/ja active Active
- 2014-12-31 PL PL14887454T patent/PL3090525T3/pl unknown
-
2015
- 2015-03-04 US US14/638,787 patent/US9338161B2/en active Active
-
2016
- 2016-07-27 ZA ZA2016/05228A patent/ZA201605228B/en unknown
- 2016-09-07 US US15/258,800 patent/US11170369B2/en active Active
-
2019
- 2019-07-16 AU AU2019206006A patent/AU2019206006B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US11170369B2 (en) | 2021-11-09 |
CA2935688C (en) | 2022-03-29 |
WO2015147945A3 (en) | 2015-12-03 |
BR112016015458B1 (pt) | 2023-04-11 |
BR112016015458A8 (pt) | 2018-08-14 |
CA2935688A1 (en) | 2015-10-01 |
US20150188911A1 (en) | 2015-07-02 |
US9380052B2 (en) | 2016-06-28 |
EP3090525B1 (en) | 2021-06-16 |
US9338161B2 (en) | 2016-05-10 |
EP3090525A4 (en) | 2017-09-20 |
ZA201605228B (en) | 2017-09-27 |
US20160379211A1 (en) | 2016-12-29 |
AU2019206006A1 (en) | 2019-08-08 |
KR20160111940A (ko) | 2016-09-27 |
AU2019206006B2 (en) | 2021-07-01 |
BR112016015458A2 (ja) | 2017-08-08 |
AU2014388268A1 (en) | 2016-07-21 |
CN106063219B (zh) | 2019-10-08 |
EP3090525A2 (en) | 2016-11-09 |
KR102217916B1 (ko) | 2021-02-22 |
PL3090525T3 (pl) | 2021-11-22 |
US20150188912A1 (en) | 2015-07-02 |
JP2017508194A (ja) | 2017-03-23 |
WO2015147945A2 (en) | 2015-10-01 |
AU2014388268B2 (en) | 2019-04-18 |
CN106063219A (zh) | 2016-10-26 |
ES2881877T3 (es) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6426189B2 (ja) | 生体認証プロトコル標準のためのシステムおよび方法 | |
US8141138B2 (en) | Auditing correlated events using a secure web single sign-on login | |
US8800003B2 (en) | Trusted device-specific authentication | |
US8209394B2 (en) | Device-specific identity | |
Andress | Foundations of information security: a straightforward introduction | |
JP2017539017A (ja) | サービスとしてのアイデンティティインフラストラクチャ | |
JP2017510013A (ja) | ジャスト・イン・タイムでプロビジョニングされるアカウントによってネットワーク・セキュリティを設ける技法 | |
US20220224535A1 (en) | Dynamic authorization and access management | |
Sharma et al. | Identity and access management-a comprehensive study | |
CN116319024B (zh) | 零信任系统的访问控制方法、装置及零信任系统 | |
Gordon et al. | The Official (ISC) 2 guide to the SSCP CBK | |
CN116415217A (zh) | 基于零信任架构的即时授权系统 | |
US12101327B2 (en) | Global approach for multifactor authentication incorporating user and enterprise preferences | |
Schaffer | Ontology for authentication | |
Shanmugam | Improving Customer Experience and Reducing Customer Churn by Implementing Frictionless, Adaptive, and Risk-Based Authentication Controls for Digital Assets | |
US20220060479A1 (en) | Global Approach for Multifactor Authentication Incorporating User and Enterprise Preferences | |
Saini | Comparative analysis of top 5, 2-factor authentication solutions | |
Riti et al. | Identity and Access Management with Google Cloud Platform | |
Anand | Role of IAM in an Organization | |
Tijms et al. | Jakarta EE Foundations | |
Keil | Social Security | |
Manoj et al. | An Authentication System of web services based on Web Server Log Analysis | |
Skevoulis et al. | ATINER's Conference Paper Series COM2016-1978 | |
NATH PANDEY | Secure IDMS for Cloud Computing Environment | |
Phadke | Enhanced security for SAP NetWeaver Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20171219 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20180928 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20181016 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20181024 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6426189 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |