MX2019014392A - Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente. - Google Patents
Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente.Info
- Publication number
- MX2019014392A MX2019014392A MX2019014392A MX2019014392A MX2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A MX 2019014392 A MX2019014392 A MX 2019014392A
- Authority
- MX
- Mexico
- Prior art keywords
- authentication token
- locally
- entry
- device remotely
- modem
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4604—LAN interconnection over a backbone network, e.g. Internet, Frame Relay
- H04L12/462—LAN interconnection over a bridge based backbone
- H04L12/4625—Single bridge functionality, e.g. connection of two networks over a single bridge
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0213—Standardised network management protocols, e.g. simple network management protocol [SNMP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2869—Operational details of access network equipments
- H04L12/2898—Subscriber equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
- Telephonic Communication Services (AREA)
- Computer And Data Communications (AREA)
Abstract
Se proporciona un método para configurar remotamente un módem de manera segura utilizando un testigo de autenticación para uso con un proveedor de servicios; el método incluye recibir un testigo de autenticación encriptado desde el módem, el testigo de autenticación tiene al menos una contraseña y está encriptado de acuerdo con una clave pública, transmitir el testigo de autenticación encriptado a un servidor de autenticación, recibir un testigo de autenticación desencriptado desde el servidor de autenticación, y configurar al menos una interfaz de módem al menos en parte utilizando el testigo de autenticación.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762514442P | 2017-06-02 | 2017-06-02 | |
US201762514407P | 2017-06-02 | 2017-06-02 | |
US201762514339P | 2017-06-02 | 2017-06-02 | |
US15/943,799 US10951467B2 (en) | 2017-06-02 | 2018-04-03 | Secure enabling and disabling points of entry on a device remotely or locally |
PCT/US2018/035266 WO2018222791A1 (en) | 2017-06-02 | 2018-05-31 | Secure enabling and disabling points of entry on a device remotely or locally |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2019014392A true MX2019014392A (es) | 2020-02-10 |
Family
ID=62713099
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2019014392A MX2019014392A (es) | 2017-06-02 | 2018-05-31 | Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente. |
Country Status (5)
Country | Link |
---|---|
US (1) | US10951467B2 (es) |
EP (1) | EP3632077B1 (es) |
CA (1) | CA3063396C (es) |
MX (1) | MX2019014392A (es) |
WO (1) | WO2018222791A1 (es) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10728233B2 (en) | 2017-06-02 | 2020-07-28 | Arris Enterprises Llc | Secure key management in a high volume device deployment |
US10951467B2 (en) * | 2017-06-02 | 2021-03-16 | Arris Enterprises Llc | Secure enabling and disabling points of entry on a device remotely or locally |
AU2019356522A1 (en) * | 2018-10-08 | 2021-05-27 | Alkira Software Holdings Pty Ltd | Secure service interaction |
EP3932010A1 (en) * | 2019-02-27 | 2022-01-05 | Telefonaktiebolaget LM Ericsson (publ) | Methods and apparatuses for managing a port of a network device |
EP4128711A1 (en) * | 2020-03-27 | 2023-02-08 | ARRIS Enterprises LLC | Method and apparatus for providing secure short-lived downloadable debugging tools |
US12041088B2 (en) * | 2021-03-24 | 2024-07-16 | Corelight, Inc. | System and method for identifying authentication method of secure shell (SSH) sessions |
Family Cites Families (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5311596A (en) * | 1992-08-31 | 1994-05-10 | At&T Bell Laboratories | Continuous authentication using an in-band or out-of-band side channel |
US7290142B1 (en) * | 1999-09-28 | 2007-10-30 | Thomas Licensing | System and method for initializing a simple network management protocol (SNMP) agent |
US6912528B2 (en) * | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
US20010037468A1 (en) * | 2000-04-11 | 2001-11-01 | Gaddis M. Norton | Method and apparatus for creating unique image passwords |
US6771751B1 (en) * | 2000-10-17 | 2004-08-03 | Comdial Corporation | Systems and methods for information exchange and synchronization using DTMF over telephone communication channels |
US6952428B1 (en) * | 2001-01-26 | 2005-10-04 | 3Com Corporation | System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network |
US7266840B2 (en) * | 2001-07-12 | 2007-09-04 | Vignette Corporation | Method and system for secure, authorized e-mail based transactions |
US7769838B2 (en) * | 2001-08-23 | 2010-08-03 | The Directv Group, Inc. | Single-modem multi-user virtual private network |
US7739359B1 (en) * | 2002-09-12 | 2010-06-15 | Cisco Technology, Inc. | Methods and apparatus for secure cable modem provisioning |
US7200868B2 (en) * | 2002-09-12 | 2007-04-03 | Scientific-Atlanta, Inc. | Apparatus for encryption key management |
US20050044379A1 (en) * | 2003-08-20 | 2005-02-24 | International Business Machines Corporation | Blind exchange of keys using an open protocol |
JP3803669B2 (ja) * | 2003-11-07 | 2006-08-02 | Necアクセステクニカ株式会社 | ネットワーク接続システムおよびネットワーク接続方法 |
US20050216518A1 (en) * | 2004-03-26 | 2005-09-29 | Oracle International Corporation | Database management system with persistent, user-accessible bitmap values |
US9118644B2 (en) | 2005-09-30 | 2015-08-25 | Blackridge Technology Holdings, Inc. | Method for directing requests to trusted resources |
US7865727B2 (en) * | 2006-08-24 | 2011-01-04 | Cisco Technology, Inc. | Authentication for devices located in cable networks |
US9569587B2 (en) * | 2006-12-29 | 2017-02-14 | Kip Prod Pi Lp | Multi-services application gateway and system employing the same |
US8621540B2 (en) * | 2007-01-24 | 2013-12-31 | Time Warner Cable Enterprises Llc | Apparatus and methods for provisioning in a download-enabled system |
US8239340B2 (en) * | 2008-04-11 | 2012-08-07 | Trevor Hanson | Message conduit systems with algorithmic data stream control and methods for processing thereof |
US10459711B2 (en) * | 2008-08-12 | 2019-10-29 | Adobe Inc. | Updating applications using migration signatures |
US8228861B1 (en) * | 2008-09-12 | 2012-07-24 | Nix John A | Efficient handover of media communications in heterogeneous IP networks using handover procedure rules and media handover relays |
WO2010143906A2 (ko) * | 2009-06-10 | 2010-12-16 | 엘지전자 주식회사 | 그룹자원할당 방법에서 자원할당 비트맵 구성방법 |
US9736769B2 (en) * | 2009-10-01 | 2017-08-15 | Qualcomm Incorporated | Energy efficient quality of service aware communication over multiple air-links |
US9379756B2 (en) * | 2012-05-17 | 2016-06-28 | Liveu Ltd. | Multi-modem communication using virtual identity modules |
US9166973B2 (en) * | 2012-10-11 | 2015-10-20 | Sling Media, Inc. | System and method for controlling access to an electronic device |
US9094401B2 (en) * | 2013-02-19 | 2015-07-28 | Owl Computing Technologies, Inc. | Secure front-end interface |
US10154025B2 (en) * | 2013-03-15 | 2018-12-11 | Qualcomm Incorporated | Seamless device configuration in a communication network |
US9131531B2 (en) * | 2013-06-06 | 2015-09-08 | Broadcom Corporation | Mobile communication device with multiple wireless transceivers and methods for use therewith |
US9350550B2 (en) * | 2013-09-10 | 2016-05-24 | M2M And Iot Technologies, Llc | Power management and security for wireless modules in “machine-to-machine” communications |
US9118664B1 (en) * | 2014-02-24 | 2015-08-25 | Arris Enterprises, Inc. | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords |
EP3178281B1 (en) * | 2014-08-07 | 2020-04-29 | Intel Corporation | User equipment and methods for allocation and signaling of time resources for device to device (d2d) communication |
US9794784B2 (en) * | 2015-01-29 | 2017-10-17 | Qualcomm Incorporated | Techniques for preventing unauthorized users from controlling modem of mobile device |
US9692757B1 (en) * | 2015-05-20 | 2017-06-27 | Amazon Technologies, Inc. | Enhanced authentication for secure communications |
EP3110099B1 (en) * | 2015-06-24 | 2018-10-31 | Accenture Global Services Limited | Device authentication |
US10261782B2 (en) * | 2015-12-18 | 2019-04-16 | Amazon Technologies, Inc. | Software container registry service |
US10032032B2 (en) * | 2015-12-18 | 2018-07-24 | Amazon Technologies, Inc. | Software container registry inspection |
US10250591B2 (en) * | 2016-02-12 | 2019-04-02 | International Business Machines Corporation | Password-based authentication |
US20170329966A1 (en) * | 2016-05-13 | 2017-11-16 | Qualcomm Incorporated | Electronic device based security management |
US10523678B2 (en) * | 2016-10-25 | 2019-12-31 | Sean Dyon | System and method for architecture initiated network access control |
US10554632B2 (en) * | 2017-05-15 | 2020-02-04 | Medtronic, Inc. | Multimodal cryptographic data communications in a remote patient monitoring environment |
US10951467B2 (en) * | 2017-06-02 | 2021-03-16 | Arris Enterprises Llc | Secure enabling and disabling points of entry on a device remotely or locally |
US10728233B2 (en) * | 2017-06-02 | 2020-07-28 | Arris Enterprises Llc | Secure key management in a high volume device deployment |
-
2018
- 2018-04-03 US US15/943,799 patent/US10951467B2/en active Active
- 2018-05-31 EP EP18733744.9A patent/EP3632077B1/en active Active
- 2018-05-31 WO PCT/US2018/035266 patent/WO2018222791A1/en active Application Filing
- 2018-05-31 MX MX2019014392A patent/MX2019014392A/es unknown
- 2018-05-31 CA CA3063396A patent/CA3063396C/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20180351797A1 (en) | 2018-12-06 |
EP3632077B1 (en) | 2021-03-10 |
CA3063396A1 (en) | 2018-12-06 |
WO2018222791A1 (en) | 2018-12-06 |
US10951467B2 (en) | 2021-03-16 |
EP3632077A1 (en) | 2020-04-08 |
CA3063396C (en) | 2024-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2019014392A (es) | Activacion y desactivacion segura de puntos de entrada en un dispositivo remotamente o localmente. | |
MX2016014461A (es) | Aprovisionamiento de licencias de gestion de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones. | |
TW201612787A (en) | Network authentication method for secure electronic transactions | |
SG10201803986RA (en) | Method and system for secure transmission of remote notification service messages to mobile devices without secure elements | |
MX2019008945A (es) | Certificado de origen basado en la emision de certificados en linea. | |
ZA202108153B (en) | Threshold signature based medical device management | |
WO2016144257A3 (en) | Method and system for facilitating authentication | |
GB2496354B (en) | A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |
CN104219228A (zh) | 一种用户注册、用户识别方法及系统 | |
PH12021550562A1 (en) | Authentication of internet of things devices, including electronic locks | |
GB2498039B (en) | Password recovery service | |
GB2512249A (en) | Secure peer discovery and authentication using a shared secret | |
RU2018103181A (ru) | Конфиденциальные аутентификация и обеспечение | |
MY190913A (en) | Device and method for secure connection | |
MX2017001090A (es) | Gestion de claves inalambrica para autenticacion. | |
RU2017106105A (ru) | Способы безопасного генерирования криптограмм | |
PE20170656A1 (es) | Autenticacion de la red de servicio | |
MX2016016008A (es) | Sistema de gestion de credenciales electronicas. | |
WO2008039582A3 (en) | System and method for securing software applications | |
PH12018550176A1 (en) | Using hardware based secure isolated region to prevent piracy and cheating on electronic devices | |
MX2018007696A (es) | Metodo y sistema para mejorar la seguridad de una transaccion. | |
WO2007115982A3 (fr) | Procede de protection d'identite, dispositifs, et produit programme d'ordinateur correspondants | |
IN2014KN02750A (es) | ||
GB2598669A8 (en) | Server-based setup for connecting a device to a local area network | |
SE1750282A1 (sv) | Updating biometric data templates |