WO2012036683A3 - Universal authentication method - Google Patents
Universal authentication method Download PDFInfo
- Publication number
- WO2012036683A3 WO2012036683A3 PCT/US2010/049018 US2010049018W WO2012036683A3 WO 2012036683 A3 WO2012036683 A3 WO 2012036683A3 US 2010049018 W US2010049018 W US 2010049018W WO 2012036683 A3 WO2012036683 A3 WO 2012036683A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- authentication method
- systems
- universal authentication
- vcr
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Abstract
The object of the current invention is to provide the user with an authentication method that is more secure than conventional authentication methods and can be used on personal computers, PDAs, cell phones, personal digital media devices, home and car locks and security systems, televisions/VCR/DVD remote controls, credit card authentication systems, automatic teller machine authentication systems, among others.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2010/049018 WO2012036683A2 (en) | 2010-09-16 | 2010-09-16 | Universal authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2010/049018 WO2012036683A2 (en) | 2010-09-16 | 2010-09-16 | Universal authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012036683A2 WO2012036683A2 (en) | 2012-03-22 |
WO2012036683A3 true WO2012036683A3 (en) | 2014-03-27 |
Family
ID=45832150
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2010/049018 WO2012036683A2 (en) | 2010-09-16 | 2010-09-16 | Universal authentication method |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2012036683A2 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100005303A1 (en) * | 2007-12-14 | 2010-01-07 | James Ng | Universal authentication method |
US20100180328A1 (en) * | 2007-06-26 | 2010-07-15 | Marks & Clerk, Llp | Authentication system and method |
-
2010
- 2010-09-16 WO PCT/US2010/049018 patent/WO2012036683A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100180328A1 (en) * | 2007-06-26 | 2010-07-15 | Marks & Clerk, Llp | Authentication system and method |
US20100005303A1 (en) * | 2007-12-14 | 2010-01-07 | James Ng | Universal authentication method |
Also Published As
Publication number | Publication date |
---|---|
WO2012036683A2 (en) | 2012-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013055970A3 (en) | Authenticating device users | |
WO2013006116A3 (en) | Methods and arrangements for authorization and authentication interworking | |
WO2011163481A3 (en) | Television sign on for personalization in a multi-user environment | |
GB2497887A (en) | User and device authentication for media services | |
GB2506066A (en) | Zero sign-on authentication | |
WO2011091051A3 (en) | Remote variable authentication processing | |
WO2011002622A3 (en) | Secure meter access from a mobile reader | |
WO2014083436A3 (en) | Intercom system using an nfc communication device | |
WO2011150851A3 (en) | Terminal authentication method and device thereof | |
GB201011146D0 (en) | Mobile computing device | |
WO2015023341A3 (en) | Secure authorization systems and methods | |
WO2012102568A3 (en) | Smart set-top box and operating method for smart service and digital television service using single operating system | |
WO2008110878A3 (en) | Device-initiated security policy | |
WO2012068290A3 (en) | System and method for providing secure data communication permissions to trusted applications on a portable communication device | |
WO2014013342A3 (en) | Authorization of transactions | |
WO2013088258A3 (en) | Systems and methods for authenticating benefit recipients | |
MX2014015516A (en) | Systems, methods, and computer program products for securing and managing applications on secure elements. | |
WO2014093508A3 (en) | Whiteboard records accessibility | |
WO2011123671A3 (en) | Mutual mobile authentication using a key management center | |
WO2009102915A3 (en) | Systems and methods for secure handling of secure attention sequences | |
WO2012092604A3 (en) | Authentication and secure channel setup for communication handoff scenarios | |
WO2013003238A3 (en) | Privacy protected interactions with third parties | |
IN2014CN02929A (en) | ||
WO2013070220A1 (en) | Remote displaying | |
WO2011132953A3 (en) | Communication system having plural terminals and method for controlling terminal in communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10857381 Country of ref document: EP Kind code of ref document: A2 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 10857381 Country of ref document: EP Kind code of ref document: A2 |