SG11202009997QA - Method, system, and computer program product for authenticating a device - Google Patents
Method, system, and computer program product for authenticating a deviceInfo
- Publication number
- SG11202009997QA SG11202009997QA SG11202009997QA SG11202009997QA SG11202009997QA SG 11202009997Q A SG11202009997Q A SG 11202009997QA SG 11202009997Q A SG11202009997Q A SG 11202009997QA SG 11202009997Q A SG11202009997Q A SG 11202009997QA SG 11202009997Q A SG11202009997Q A SG 11202009997QA
- Authority
- SG
- Singapore
- Prior art keywords
- authenticating
- computer program
- program product
- product
- computer
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2018/026872 WO2019199276A1 (en) | 2018-04-10 | 2018-04-10 | Method, system, and computer program product for authenticating a device |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202009997QA true SG11202009997QA (en) | 2020-11-27 |
Family
ID=68164415
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202009997QA SG11202009997QA (en) | 2018-04-10 | 2018-04-10 | Method, system, and computer program product for authenticating a device |
Country Status (6)
Country | Link |
---|---|
US (2) | US11436313B2 (zh) |
EP (1) | EP3776177B1 (zh) |
KR (2) | KR20230062897A (zh) |
CN (1) | CN112136103B (zh) |
SG (1) | SG11202009997QA (zh) |
WO (1) | WO2019199276A1 (zh) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2019054466A (ja) * | 2017-09-15 | 2019-04-04 | 株式会社 エヌティーアイ | 通信システム、第1通信装置、第2通信装置、方法、コンピュータプログラム |
EP3776177B1 (en) * | 2018-04-10 | 2023-10-25 | Visa International Service Association | Method, system, and computer program product for authenticating a device |
US11349660B2 (en) * | 2019-09-19 | 2022-05-31 | Bose Corporation | Secure self-identification of a device |
US12052268B2 (en) * | 2019-12-30 | 2024-07-30 | Itron, Inc. | Man-in-the-middle extender defense in data communications |
US11948131B2 (en) | 2022-03-02 | 2024-04-02 | Visa International Service Association | System and method for device transaction authorization |
US20230291548A1 (en) * | 2022-03-08 | 2023-09-14 | Western Digital Technologies, Inc. | Authorization requests from a data storage device to multiple manager devices |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002089444A1 (en) | 2001-04-30 | 2002-11-07 | Activcard Ireland, Limited | Method and system for authenticating a personal security device vis-a-vis at least one remote computer system |
CN1868163B (zh) * | 2003-10-16 | 2011-01-26 | 松下电器产业株式会社 | 加密通信系统和通信装置 |
US8320638B2 (en) * | 2008-04-10 | 2012-11-27 | Pitt Alan M | Anonymous association system utilizing biometrics |
US20110055585A1 (en) * | 2008-07-25 | 2011-03-03 | Kok-Wah Lee | Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering |
EP2348446B1 (en) * | 2009-12-18 | 2015-04-15 | CompuGroup Medical AG | A computer implemented method for authenticating a user |
US9275379B2 (en) * | 2010-03-31 | 2016-03-01 | Kachyng, Inc. | Method for mutual authentication of a user and service provider |
FR2990094A1 (fr) | 2012-04-26 | 2013-11-01 | Commissariat Energie Atomique | Methode et systeme d'authentification des noeuds d'un reseau |
US8955058B2 (en) * | 2012-11-15 | 2015-02-10 | International Business Machines Corporation | Automatically generating challenge questions inferred from user history data for user authentication |
US20140237252A1 (en) * | 2012-12-31 | 2014-08-21 | Safelylocked, Llc | Techniques for validating data exchange |
US10909539B2 (en) * | 2013-10-29 | 2021-02-02 | Visa International Service Association | Enhancements to transaction processing in a secure environment using a merchant computer |
JP6254675B2 (ja) * | 2014-02-18 | 2017-12-27 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | 認証方法及び認証システム |
US9779224B2 (en) * | 2014-05-05 | 2017-10-03 | Securekey Technologies Inc. | Methods and systems for client-enhanced challenge-response authentication |
US10574633B2 (en) * | 2014-06-18 | 2020-02-25 | Visa International Service Association | Efficient methods for authenticated communication |
EP3776177B1 (en) * | 2018-04-10 | 2023-10-25 | Visa International Service Association | Method, system, and computer program product for authenticating a device |
-
2018
- 2018-04-10 EP EP18914441.3A patent/EP3776177B1/en active Active
- 2018-04-10 CN CN201880093534.XA patent/CN112136103B/zh active Active
- 2018-04-10 SG SG11202009997QA patent/SG11202009997QA/en unknown
- 2018-04-10 KR KR1020237014965A patent/KR20230062897A/ko active IP Right Grant
- 2018-04-10 WO PCT/US2018/026872 patent/WO2019199276A1/en unknown
- 2018-04-10 KR KR1020207032265A patent/KR102529750B1/ko active IP Right Grant
- 2018-04-10 US US17/046,448 patent/US11436313B2/en active Active
-
2022
- 2022-08-22 US US17/892,270 patent/US11934512B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
KR20230062897A (ko) | 2023-05-09 |
EP3776177A1 (en) | 2021-02-17 |
CN112136103B (zh) | 2024-05-14 |
US11934512B2 (en) | 2024-03-19 |
US20210150018A1 (en) | 2021-05-20 |
KR20200141078A (ko) | 2020-12-17 |
WO2019199276A1 (en) | 2019-10-17 |
EP3776177A4 (en) | 2021-03-10 |
CN112136103A (zh) | 2020-12-25 |
US11436313B2 (en) | 2022-09-06 |
KR102529750B1 (ko) | 2023-05-09 |
EP3776177B1 (en) | 2023-10-25 |
US20220405378A1 (en) | 2022-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
IL261464B (en) | Method, system and computer software product for calculating a trust score | |
EP3588872C0 (en) | METHOD, APPARATUS, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR VPN PACKET PROCESSING | |
IL253734A0 (en) | Method, network device and computer software product for secure communication between a communication device and a network device | |
PL3831158T3 (pl) | Urządzenie, sposób i program komputerowy do zarządzania połączeniami | |
GB2560542B (en) | A device, computer program and method | |
SG11202009997QA (en) | Method, system, and computer program product for authenticating a device | |
GB201713345D0 (en) | A Method, an apparatus and a computer program product for object detection | |
GB201900884D0 (en) | Apparatus, method and computer program | |
SG11201704907QA (en) | A device, system, method and computer program product for processing electronic transaction requests | |
GB201704636D0 (en) | A method and system for authenticating a device | |
ZA202000488B (en) | System and method for authenticating a transaction | |
GB201705555D0 (en) | A device, computer program and method | |
ZA202000716B (en) | Method for operating a system, system, and computer program product | |
SG10202005715QA (en) | Method, device, server and system for authenticating a user | |
EP3526648C0 (de) | Verfahren zur prüfung, vorrichtung und computerprogrammprodukt | |
IL264051A (en) | System, method and computer software product for detecting driving over the speed limit | |
SG10201607103TA (en) | Control apparatus , position verification system, computer program, and position verification method | |
GB201706763D0 (en) | A Method, an apparatus and a computer program product for object detection | |
ZA201900862B (en) | System, method and computer program for a monitoring system | |
GB201702915D0 (en) | Method, system, computer program and computer program product | |
SG11202101206VA (en) | System, method, and computer program product for partitioning mobile device transactions | |
EP4079017A4 (en) | SYSTEM, METHOD AND COMPUTER PROGRAM FOR AUTHENTICATING A DEVICE BASED ON AN APPLICATION PROFILE | |
GB201900866D0 (en) | A method, apparatus and computer program | |
GB2520635B (en) | Method and system for configuring and securing a device or apparatus, a device or apparatus, and a computer program product | |
GB201502299D0 (en) | A method, a system, an apparatus and a computer program product for image-based retrieval |