SG11201703304TA - Method and device for verifying a trusted terminal - Google Patents
Method and device for verifying a trusted terminalInfo
- Publication number
- SG11201703304TA SG11201703304TA SG11201703304TA SG11201703304TA SG11201703304TA SG 11201703304T A SG11201703304T A SG 11201703304TA SG 11201703304T A SG11201703304T A SG 11201703304TA SG 11201703304T A SG11201703304T A SG 11201703304TA SG 11201703304T A SG11201703304T A SG 11201703304TA
- Authority
- SG
- Singapore
- Prior art keywords
- verifying
- trusted terminal
- trusted
- terminal
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410579074.5A CN105592014B (zh) | 2014-10-24 | 2014-10-24 | 一种可信终端验证方法、装置 |
PCT/CN2015/091694 WO2016062204A1 (zh) | 2014-10-24 | 2015-10-10 | 一种可信终端验证方法、装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11201703304TA true SG11201703304TA (en) | 2017-06-29 |
Family
ID=55760284
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201703304TA SG11201703304TA (en) | 2014-10-24 | 2015-10-10 | Method and device for verifying a trusted terminal |
SG10201903580QA SG10201903580QA (en) | 2014-10-24 | 2015-10-10 | Method and device for verifying a trusted terminal |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201903580QA SG10201903580QA (en) | 2014-10-24 | 2015-10-10 | Method and device for verifying a trusted terminal |
Country Status (7)
Country | Link |
---|---|
US (1) | US10673851B2 (de) |
EP (1) | EP3211825B1 (de) |
JP (1) | JP6715242B2 (de) |
KR (1) | KR102167602B1 (de) |
CN (2) | CN109951436B (de) |
SG (2) | SG11201703304TA (de) |
WO (1) | WO2016062204A1 (de) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951436B (zh) * | 2014-10-24 | 2021-04-27 | 创新先进技术有限公司 | 一种可信终端验证方法、装置 |
CN107645482B (zh) * | 2016-07-22 | 2020-08-07 | 创新先进技术有限公司 | 一种针对业务操作的风险控制方法及装置 |
CN107689936B (zh) * | 2016-08-03 | 2021-07-06 | 阿里巴巴集团控股有限公司 | 登录账户的安全性验证系统、方法及装置 |
CN108243145B (zh) * | 2016-12-23 | 2019-04-26 | 中科星图股份有限公司 | 一种多源身份认证方法 |
CN106790129A (zh) * | 2016-12-27 | 2017-05-31 | 中国银联股份有限公司 | 一种身份认证的方法及装置 |
CN109801092B (zh) * | 2017-11-16 | 2023-09-08 | 腾讯科技(武汉)有限公司 | 资源安全管理方法、装置、计算机设备和存储介质 |
US10652342B2 (en) | 2018-05-08 | 2020-05-12 | Daon Holdings Limited | Methods and systems for identifying a client computer system |
CN110011992B (zh) * | 2019-03-25 | 2022-07-26 | 联想(北京)有限公司 | 系统登录方法及电子设备 |
CN110264210B (zh) * | 2019-05-06 | 2023-08-08 | 创新先进技术有限公司 | 账号正确性的检测方法和装置 |
CN110365657A (zh) * | 2019-06-21 | 2019-10-22 | 北京奇艺世纪科技有限公司 | 远程协助方法、装置及可读存储介质 |
US11030299B1 (en) | 2020-01-27 | 2021-06-08 | Capital One Services, Llc | Systems and methods for password managers |
CN111311285A (zh) * | 2020-02-21 | 2020-06-19 | 深圳壹账通智能科技有限公司 | 一种防止用户非法登录的方法、装置、设备和存储介质 |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7174454B2 (en) * | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
US7376838B2 (en) * | 2003-07-17 | 2008-05-20 | Jp Morgan Chase Bank | Method for controlled and audited access to privileged accounts on computer systems |
CN101073219A (zh) * | 2003-09-12 | 2007-11-14 | Rsa安全公司 | 用于基于风险的验证的系统和方法 |
US7784089B2 (en) * | 2004-10-29 | 2010-08-24 | Qualcomm Incorporated | System and method for providing a multi-credential authentication protocol |
JP3878975B1 (ja) * | 2006-07-18 | 2007-02-07 | クオリティ株式会社 | 管理サーバおよび管理プログラム |
JP2008059222A (ja) | 2006-08-30 | 2008-03-13 | Matsushita Electric Ind Co Ltd | サービス提供システム |
JP4708379B2 (ja) | 2007-03-28 | 2011-06-22 | パナソニック株式会社 | コンテンツ利用システム |
US8495716B1 (en) * | 2007-12-31 | 2013-07-23 | Symantec Corporation | Systems and methods for facilitating online authentication from untrusted computing devices |
US7979899B2 (en) | 2008-06-02 | 2011-07-12 | Microsoft Corporation | Trusted device-specific authentication |
US8793758B2 (en) * | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US8707407B2 (en) * | 2009-02-04 | 2014-04-22 | Microsoft Corporation | Account hijacking counter-measures |
CN101674183B (zh) * | 2009-03-19 | 2013-05-08 | 庞己人 | 一种通过通讯电话传送帐户密码登录帐户的系统及方法 |
US20100268557A1 (en) * | 2009-04-17 | 2010-10-21 | Patrick Faith | Enrollment server |
US8352218B2 (en) * | 2009-07-08 | 2013-01-08 | Graphisoft | Active building information modeling apparatus and method |
US9619664B2 (en) * | 2009-11-17 | 2017-04-11 | International Business Machines Corporation | Systems and methods for handling electronic messages |
CN102158465B (zh) * | 2010-02-11 | 2013-10-16 | 上海博泰悦臻网络技术服务有限公司 | 车载设备、车载系统及车载登录方法 |
US20120209735A1 (en) * | 2010-10-20 | 2012-08-16 | Peruvemba Subramanian | Federated third-party authentication apparatuses, methods and systems |
US8955078B2 (en) * | 2011-06-30 | 2015-02-10 | Cable Television Laboratories, Inc. | Zero sign-on authentication |
CN102325026A (zh) * | 2011-07-14 | 2012-01-18 | 易讯天空计算机技术(深圳)有限公司 | 账号密码安全加密系统 |
US8627438B1 (en) * | 2011-09-08 | 2014-01-07 | Amazon Technologies, Inc. | Passwordless strong authentication using trusted devices |
US9183415B2 (en) * | 2011-12-01 | 2015-11-10 | Microsoft Technology Licensing, Llc | Regulating access using information regarding a host machine of a portable storage drive |
CN102413146B (zh) * | 2011-12-23 | 2014-02-19 | 杭州数盾信息技术有限公司 | 基于动态码的客户端授权登录方法 |
CN104067591B (zh) * | 2012-01-17 | 2017-11-24 | 伊帕莱夫股份公司 | 用于全球实时远程通信的设备、系统及方法 |
CN102595213B (zh) * | 2012-02-22 | 2014-10-29 | 深圳创维-Rgb电子有限公司 | 可信电视终端安全认证方法和系统 |
US9529993B2 (en) * | 2012-03-02 | 2016-12-27 | International Business Machines Corporation | Policy-driven approach to managing privileged/shared identity in an enterprise |
US8863243B1 (en) * | 2012-04-11 | 2014-10-14 | Google Inc. | Location-based access control for portable electronic device |
US9497623B2 (en) * | 2012-05-25 | 2016-11-15 | Nokia Technologies Oy | Method and apparatus for guest access sharing |
CN103581108B (zh) * | 2012-07-19 | 2017-05-03 | 阿里巴巴集团控股有限公司 | 一种登录验证方法、客户端、服务器及系统 |
CN103577978A (zh) * | 2012-07-20 | 2014-02-12 | 苏州工业园区讯贝智能系统有限公司 | 一种应用二维码提供电子交易的方法 |
US8856894B1 (en) * | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
CN103001826B (zh) * | 2012-11-29 | 2015-09-30 | 北京奇虎科技有限公司 | 用于监测用户登录的设备和方法 |
US8959583B2 (en) * | 2013-02-05 | 2015-02-17 | Ca, Inc. | Access to vaulted credentials using login computer and mobile computing device |
EP3661159A1 (de) * | 2013-07-08 | 2020-06-03 | SSH Communications Security Oyj | Vertrauensbeziehungen in einem rechnergestützten system |
US9319419B2 (en) * | 2013-09-26 | 2016-04-19 | Wave Systems Corp. | Device identification scoring |
CN103532797B (zh) * | 2013-11-06 | 2017-07-04 | 网之易信息技术(北京)有限公司 | 一种用户登录异常监测方法和装置 |
US9992207B2 (en) * | 2014-09-23 | 2018-06-05 | Qualcomm Incorporated | Scalable authentication process selection based upon sensor inputs |
US10425410B2 (en) * | 2014-09-30 | 2019-09-24 | Huawei Technologies Co., Ltd. | Identity authentication method and apparatus, and user equipment |
CN109951436B (zh) * | 2014-10-24 | 2021-04-27 | 创新先进技术有限公司 | 一种可信终端验证方法、装置 |
-
2014
- 2014-10-24 CN CN201811628686.3A patent/CN109951436B/zh active Active
- 2014-10-24 CN CN201410579074.5A patent/CN105592014B/zh active Active
-
2015
- 2015-10-10 SG SG11201703304TA patent/SG11201703304TA/en unknown
- 2015-10-10 SG SG10201903580QA patent/SG10201903580QA/en unknown
- 2015-10-10 JP JP2017521133A patent/JP6715242B2/ja active Active
- 2015-10-10 WO PCT/CN2015/091694 patent/WO2016062204A1/zh active Application Filing
- 2015-10-10 EP EP15851892.8A patent/EP3211825B1/de active Active
- 2015-10-10 KR KR1020177014021A patent/KR102167602B1/ko active IP Right Grant
-
2017
- 2017-04-24 US US15/495,894 patent/US10673851B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2016062204A1 (zh) | 2016-04-28 |
US20170230366A1 (en) | 2017-08-10 |
SG10201903580QA (en) | 2019-05-30 |
CN105592014A (zh) | 2016-05-18 |
JP6715242B2 (ja) | 2020-07-01 |
KR102167602B1 (ko) | 2020-10-20 |
JP2017533511A (ja) | 2017-11-09 |
EP3211825B1 (de) | 2019-11-20 |
EP3211825A4 (de) | 2017-08-30 |
EP3211825A1 (de) | 2017-08-30 |
CN109951436B (zh) | 2021-04-27 |
KR20170074959A (ko) | 2017-06-30 |
CN109951436A (zh) | 2019-06-28 |
CN105592014B (zh) | 2019-02-15 |
US10673851B2 (en) | 2020-06-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HRP20200054T1 (hr) | Uređaj i postupak za rezonantnu kriptografiju | |
EP3270300A4 (de) | Verfahren und vorrichtung zur formverifizierung | |
SG11201703304TA (en) | Method and device for verifying a trusted terminal | |
SG11201705053YA (en) | Device verification method and apparatus | |
EP3557406C0 (de) | Vorrichtung und verfahren zur ausführung von funktionen | |
HUE058340T2 (hu) | Eljárások és berendezések folytatási eljárás végrehajtására | |
EP3097709A4 (de) | Authentifizierungsvorrichtung und -verfahren | |
SG10201910372UA (en) | A hearing device and a method for operating thereof | |
SG11201609273UA (en) | Electronic device and method | |
HK1215829A1 (zh) | 種身份認證方法和設備 | |
HK1214664A1 (zh) | 密碼設定方法及其設備 | |
PL3275040T3 (pl) | Sposób i urządzenie do formowania baterii | |
EP3232322A4 (de) | Verfahren und vorrichtung zur verifizierung von software | |
HK1213042A1 (zh) | 種基於步態的定位方法和裝置 | |
HK1218794A1 (zh) | 終端設備上的信息提示方法及裝置 | |
EP3179443A4 (de) | Korrektur- und verifizierungsverfahren sowie korrektur- und verifizierungsvorrichtung | |
GB201513532D0 (en) | A method and an apparatus | |
HK1224448A1 (zh) | 種校驗方法和裝置 | |
EP3641459C0 (de) | Von einer elektronischen vorrichtung durchgeführtes verfahren, von einer deckelvorrichtung durchgeführtes verfahren und elektronische vorrichtung | |
GB2556536B (en) | Device and method for slanting a conductor casing | |
EP3185166A4 (de) | Zuverlässiges metrikverfahren und vorrichtung | |
EP3182773A4 (de) | Positionierungsverfahren und elektronische vorrichtung | |
HUE053342T2 (hu) | Eljárás és berendezés határszint meghatározáshoz | |
GB2539611B (en) | Belt-finishing device and method for operating a belt-finishing device | |
HK1221786A1 (zh) | 密碼驗證方法及裝置 |