WO2012036683A3 - Universal authentication method - Google Patents

Universal authentication method Download PDF

Info

Publication number
WO2012036683A3
WO2012036683A3 PCT/US2010/049018 US2010049018W WO2012036683A3 WO 2012036683 A3 WO2012036683 A3 WO 2012036683A3 US 2010049018 W US2010049018 W US 2010049018W WO 2012036683 A3 WO2012036683 A3 WO 2012036683A3
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
authentication method
systems
universal authentication
vcr
Prior art date
Application number
PCT/US2010/049018
Other languages
French (fr)
Other versions
WO2012036683A2 (en
Inventor
James Ng
Original Assignee
James Ng
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by James Ng filed Critical James Ng
Priority to PCT/US2010/049018 priority Critical patent/WO2012036683A2/en
Publication of WO2012036683A2 publication Critical patent/WO2012036683A2/en
Publication of WO2012036683A3 publication Critical patent/WO2012036683A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The object of the current invention is to provide the user with an authentication method that is more secure than conventional authentication methods and can be used on personal computers, PDAs, cell phones, personal digital media devices, home and car locks and security systems, televisions/VCR/DVD remote controls, credit card authentication systems, automatic teller machine authentication systems, among others.
PCT/US2010/049018 2010-09-16 2010-09-16 Universal authentication method WO2012036683A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2010/049018 WO2012036683A2 (en) 2010-09-16 2010-09-16 Universal authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2010/049018 WO2012036683A2 (en) 2010-09-16 2010-09-16 Universal authentication method

Publications (2)

Publication Number Publication Date
WO2012036683A2 WO2012036683A2 (en) 2012-03-22
WO2012036683A3 true WO2012036683A3 (en) 2014-03-27

Family

ID=45832150

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2010/049018 WO2012036683A2 (en) 2010-09-16 2010-09-16 Universal authentication method

Country Status (1)

Country Link
WO (1) WO2012036683A2 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100005303A1 (en) * 2007-12-14 2010-01-07 James Ng Universal authentication method
US20100180328A1 (en) * 2007-06-26 2010-07-15 Marks & Clerk, Llp Authentication system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100180328A1 (en) * 2007-06-26 2010-07-15 Marks & Clerk, Llp Authentication system and method
US20100005303A1 (en) * 2007-12-14 2010-01-07 James Ng Universal authentication method

Also Published As

Publication number Publication date
WO2012036683A2 (en) 2012-03-22

Similar Documents

Publication Publication Date Title
WO2013006116A3 (en) Methods and arrangements for authorization and authentication interworking
WO2011163481A3 (en) Television sign on for personalization in a multi-user environment
GB2497887A (en) User and device authentication for media services
GB2506066A (en) Zero sign-on authentication
WO2014083436A3 (en) Intercom system using an nfc communication device
MX366390B (en) Wireless key management for authentication.
WO2011002622A3 (en) Secure meter access from a mobile reader
WO2011150851A3 (en) Terminal authentication method and device thereof
GB201011146D0 (en) Mobile computing device
WO2012102568A3 (en) Smart set-top box and operating method for smart service and digital television service using single operating system
WO2008110878A3 (en) Device-initiated security policy
WO2013101894A3 (en) Secure user authentication for bluetooth enabled computer storage devices
WO2014013342A3 (en) Authorization of transactions
WO2013040713A3 (en) System and method for user authentication
WO2013088258A3 (en) Systems and methods for authenticating benefit recipients
MX355593B (en) Systems, methods, and computer program products for securing and managing applications on secure elements.
WO2014093508A3 (en) Whiteboard records accessibility
WO2011123671A3 (en) Mutual mobile authentication using a key management center
WO2012092604A3 (en) Authentication and secure channel setup for communication handoff scenarios
WO2013040048A3 (en) Active lock wallpapers
WO2011119912A3 (en) Computing device with remote contact list
US20130125212A1 (en) Remote displaying
WO2012108168A3 (en) Projector and authentication method
WO2011132953A3 (en) Communication system having plural terminals and method for controlling terminal in communication system
WO2013036011A3 (en) Method for managing profile of embedded uicc, and embedded uicc, embedded uicc-equipped terminal, provision method, and method for changing mno using same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10857381

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 10857381

Country of ref document: EP

Kind code of ref document: A2