LT3489849T - Įėjimo į sistemą procesų apsauga - Google Patents
Įėjimo į sistemą procesų apsaugaInfo
- Publication number
- LT3489849T LT3489849T LTEP17203075.1T LT17203075T LT3489849T LT 3489849 T LT3489849 T LT 3489849T LT 17203075 T LT17203075 T LT 17203075T LT 3489849 T LT3489849 T LT 3489849T
- Authority
- LT
- Lithuania
- Prior art keywords
- protection
- login processes
- login
- processes
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/29—Payment schemes or models characterised by micropayments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Information Transfer Between Computers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17203075.1A EP3489849B1 (en) | 2017-11-22 | 2017-11-22 | Protection of login processes |
Publications (1)
Publication Number | Publication Date |
---|---|
LT3489849T true LT3489849T (lt) | 2020-03-25 |
Family
ID=60473311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
LTEP17203075.1T LT3489849T (lt) | 2017-11-22 | 2017-11-22 | Įėjimo į sistemą procesų apsauga |
Country Status (7)
Country | Link |
---|---|
US (1) | US10911239B2 (lt) |
EP (1) | EP3489849B1 (lt) |
KR (1) | KR102246794B1 (lt) |
CN (1) | CN111937361A (lt) |
ES (1) | ES2778451T3 (lt) |
LT (1) | LT3489849T (lt) |
WO (1) | WO2019101420A1 (lt) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11956366B1 (en) | 2023-10-28 | 2024-04-09 | James Michael Siers | Computer implemented zero trust authentication method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9624127D0 (en) * | 1996-11-20 | 1997-01-08 | British Telecomm | Transaction system |
US20140380418A1 (en) * | 2013-06-19 | 2014-12-25 | Haoxu Wang | System and method for verifying the legitimacy of requests sent from clients to server |
US9787696B2 (en) * | 2015-05-19 | 2017-10-10 | Workday, Inc. | Brute force attack prevention system |
US10498717B2 (en) * | 2015-12-16 | 2019-12-03 | Capital One Services, LLC. | Browser extension for limited-use secure token payment |
CN105610938B (zh) * | 2015-12-24 | 2019-02-15 | 广州爱九游信息技术有限公司 | 登录状态同步方法和系统 |
US20170187700A1 (en) * | 2015-12-28 | 2017-06-29 | Paypal, Inc. | Pregenerated two-factor authentication tokens |
KR101978812B1 (ko) * | 2017-08-09 | 2019-05-15 | 주식회사 센스톤 | 가상카드번호 기반의 금융거래제공시스템, 가상카드번호생성장치, 가상카드번호검증장치, 가상카드번호 기반의 금융거래제공방법 및 가상카드번호 기반의 금융거래제공프로그램 |
-
2017
- 2017-11-22 ES ES17203075T patent/ES2778451T3/es active Active
- 2017-11-22 LT LTEP17203075.1T patent/LT3489849T/lt unknown
- 2017-11-22 EP EP17203075.1A patent/EP3489849B1/en active Active
-
2018
- 2018-10-10 CN CN201880082919.6A patent/CN111937361A/zh active Pending
- 2018-10-10 KR KR1020207017685A patent/KR102246794B1/ko active IP Right Grant
- 2018-10-10 US US16/765,552 patent/US10911239B2/en active Active
- 2018-10-10 WO PCT/EP2018/077585 patent/WO2019101420A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2019101420A1 (en) | 2019-05-31 |
EP3489849B1 (en) | 2020-01-01 |
KR102246794B1 (ko) | 2021-04-29 |
US10911239B2 (en) | 2021-02-02 |
KR20200085335A (ko) | 2020-07-14 |
CN111937361A (zh) | 2020-11-13 |
ES2778451T3 (es) | 2020-08-10 |
US20200313892A1 (en) | 2020-10-01 |
EP3489849A1 (en) | 2019-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL283582A (en) | ror - gamma modulators | |
GB2558826B (en) | Mitigation of anti-sandbox malware techniques | |
HK1256599A1 (zh) | ROR-γ的調節劑 | |
SG11201706729SA (en) | Derivatives of sobetirome | |
GB202009751D0 (en) | Methods of secure communication | |
IL257026A (en) | Solid state forms of eluxadoline | |
IL263050B (en) | History of Subtirum | |
IL269409A (en) | Combinations of chk1- and wee1 - inhibitors | |
PL3491879T3 (pl) | Połączenie urządzeń ubieralnych | |
IL265628A (en) | Solid state forms of valbenazine | |
HK1257800A1 (zh) | L-4-氯喹寧的治療用途 | |
ZA201706282B (en) | Solid forms of menaquinols | |
EP3378294A4 (en) | SAFETY DEVICE FOR A GRUBBER | |
EP3314509A4 (en) | Mitigation of malware | |
GB201604645D0 (en) | Testing of safety devices | |
GB2543602B (en) | Mitigation of anti-sandbox malware techniques | |
GB2550977B (en) | Monitoring of devices | |
SG10202112569PA (en) | Ultrasafe login | |
LT3489849T (lt) | Įėjimo į sistemą procesų apsauga | |
GB201512139D0 (en) | Methods of treatment | |
GB201509048D0 (en) | Method of assembly | |
GB201416282D0 (en) | Authentication of communications | |
IL261133A (en) | Titration of severnopedol | |
GB201721386D0 (en) | Chrondogy of time-wave | |
GB201719735D0 (en) | Safety surround |