NZ613485A - Method for authenticating first communication equipment by means of second communication equipment - Google Patents

Method for authenticating first communication equipment by means of second communication equipment

Info

Publication number
NZ613485A
NZ613485A NZ613485A NZ61348511A NZ613485A NZ 613485 A NZ613485 A NZ 613485A NZ 613485 A NZ613485 A NZ 613485A NZ 61348511 A NZ61348511 A NZ 61348511A NZ 613485 A NZ613485 A NZ 613485A
Authority
NZ
New Zealand
Prior art keywords
communication equipment
key
authenticating
encryption certificate
public key
Prior art date
Application number
NZ613485A
Other languages
English (en)
Inventor
Cédric HOZANNE
Benoît COUROUBLE
Original Assignee
Natural Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Natural Security filed Critical Natural Security
Publication of NZ613485A publication Critical patent/NZ613485A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
NZ613485A 2011-01-19 2011-12-15 Method for authenticating first communication equipment by means of second communication equipment NZ613485A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1150415A FR2970612B1 (fr) 2011-01-19 2011-01-19 Procede d'authentification d'un premier equipement de communication par un second equipement de communication
PCT/FR2011/053009 WO2012098306A1 (fr) 2011-01-19 2011-12-15 Procédé d'authentification d'un premier équipement de communication par un second équipement de communication

Publications (1)

Publication Number Publication Date
NZ613485A true NZ613485A (en) 2015-06-26

Family

ID=44144872

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ613485A NZ613485A (en) 2011-01-19 2011-12-15 Method for authenticating first communication equipment by means of second communication equipment

Country Status (11)

Country Link
US (1) US20140006290A1 (enExample)
EP (1) EP2666255B1 (enExample)
JP (1) JP2014503159A (enExample)
CN (1) CN103477585A (enExample)
AU (1) AU2011356179A1 (enExample)
BR (1) BR112013018220A2 (enExample)
CA (1) CA2825050A1 (enExample)
EA (1) EA201391054A1 (enExample)
FR (1) FR2970612B1 (enExample)
NZ (1) NZ613485A (enExample)
WO (1) WO2012098306A1 (enExample)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10277559B2 (en) * 2014-05-21 2019-04-30 Excalibur Ip, Llc Methods and systems for data traffic control and encryption
MY186315A (en) * 2014-10-03 2021-07-08 Mimos Berhad Method of zero knowledge processing on biometric data in discretised vector representation
US10103781B2 (en) 2015-02-20 2018-10-16 Visa International Service Association Contactless data exchange between mobile devices and readers involving value information not necessary to perform a transaction
WO2017004470A1 (en) 2015-06-30 2017-01-05 Visa International Service Association Mutual authentication of confidential communication
US10318720B2 (en) * 2015-07-02 2019-06-11 Gn Hearing A/S Hearing device with communication logging and related method
US9768966B2 (en) * 2015-08-07 2017-09-19 Google Inc. Peer to peer attestation
CN111615105B (zh) * 2016-07-18 2023-08-04 创新先进技术有限公司 信息提供、获取方法、装置及终端
CN107992768B (zh) * 2017-11-29 2021-11-16 努比亚技术有限公司 一种信息保护的方法、终端设备及存储介质
US12079367B2 (en) 2019-09-25 2024-09-03 Amod Ashok Dange System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator
US12028347B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock
US12072963B2 (en) * 2019-09-25 2024-08-27 Amod Ashok Dange System and method for affixing a signature using biometric authentication
US12026247B2 (en) 2019-09-25 2024-07-02 Amod Ashok Dange System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity
US20240378318A1 (en) * 2019-09-25 2024-11-14 Amod Ashok Dange System and method for managing tokenized personally identifiable information
US20240380598A1 (en) * 2019-09-25 2024-11-14 Amod Ashok Dange System and method for managing an operating system using tokenized identity

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1056447A (ja) * 1996-08-12 1998-02-24 Nippon Telegr & Teleph Corp <Ntt> 非対称ネットワークシステムによる情報暗号化提供方法
US20020116611A1 (en) * 2000-10-31 2002-08-22 Cornell Research Foundation, Inc. Secure distributed on-line certification authority
JP3724564B2 (ja) * 2001-05-30 2005-12-07 日本電気株式会社 認証システム及び認証方法並びに認証用プログラム
SE0400308L (sv) 2004-02-12 2005-06-28 Precise Biometrics Ab Portabel databärare, extern uppställning, system och förfarande för trådlös dataöverföring
US8245052B2 (en) 2006-02-22 2012-08-14 Digitalpersona, Inc. Method and apparatus for a token
US20100138652A1 (en) * 2006-07-07 2010-06-03 Rotem Sela Content control method using certificate revocation lists
US8892887B2 (en) * 2006-10-10 2014-11-18 Qualcomm Incorporated Method and apparatus for mutual authentication
JP5132222B2 (ja) * 2007-08-13 2013-01-30 株式会社東芝 クライアント装置、サーバ装置及びプログラム
US20100153722A1 (en) * 2008-12-11 2010-06-17 International Business Machines Corporation Method and system to prove identity of owner of an avatar in virtual world

Also Published As

Publication number Publication date
CA2825050A1 (fr) 2012-07-26
BR112013018220A2 (pt) 2016-11-08
CN103477585A (zh) 2013-12-25
AU2011356179A1 (en) 2013-08-15
EP2666255A1 (fr) 2013-11-27
FR2970612A1 (fr) 2012-07-20
EA201391054A1 (ru) 2013-12-30
FR2970612B1 (fr) 2013-01-04
WO2012098306A1 (fr) 2012-07-26
EP2666255B1 (fr) 2018-10-17
US20140006290A1 (en) 2014-01-02
JP2014503159A (ja) 2014-02-06

Similar Documents

Publication Publication Date Title
NZ613485A (en) Method for authenticating first communication equipment by means of second communication equipment
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
GB2572088A8 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
GB2512249A (en) Secure peer discovery and authentication using a shared secret
MX361152B (es) Aprovisionamiento de licencias de gestión de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones.
GB2498039B (en) Password recovery service
PE20170656A1 (es) Autenticacion de la red de servicio
MX366390B (es) Gestion de claves inalambrica para autenticacion.
RU2018103181A (ru) Конфиденциальные аутентификация и обеспечение
IN2014CN01532A (enExample)
GB2573666A (en) Verifying authenticity of computer readable information using the blockchain
MX2015014636A (es) Metodo de seguridad para archivos y aparatos para el mismo.
WO2012087692A3 (en) System and method for secure communications in a communication system
GB201213279D0 (en) Identity generation mechanism
IN2014KN02750A (enExample)
MX2018016420A (es) Sistema de gestion de credenciales electrónicas.
WO2015008158A3 (en) Securing method for lawful interception
WO2012154976A3 (en) System and method for web-based security authentication
WO2016144257A3 (en) Method and system for facilitating authentication
MX2009003684A (es) Metodo y aparato para autenticacion mutua.
GB2514055A (en) Bluetooth pairing system, method, and apparatus
GB2528226A (en) Method performed by at least one server for processing a data packet from a first computing device to a second computing device to permit end-to-end
WO2014151730A3 (en) Identity escrow management for minimal disclosure credentials
WO2012095741A3 (en) Methods and apparatuses for distributing keys for ptp protocol
WO2009126209A3 (en) Methods and apparatus for authentication and identity management using a public key infrastructure (pki) in an ip-based telephony environment

Legal Events

Date Code Title Description
PSEA Patent sealed
RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 15 DEC 2016 BY CPA GLOBAL

Effective date: 20151030

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 15 DEC 2017 BY DENNEMEYER + CO

Effective date: 20161129

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 15 DEC 2018 BY PAVIS GMBH

Effective date: 20171128

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 15 DEC 2019 BY PAVIS GMBH

Effective date: 20181211

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 15 DEC 2020 BY PAVIS GMBH

Effective date: 20191203

LAPS Patent lapsed