WO2012078118A1 - Device for controlled safe access to applications and data by two-factor authentication - Google Patents

Device for controlled safe access to applications and data by two-factor authentication Download PDF

Info

Publication number
WO2012078118A1
WO2012078118A1 PCT/SK2011/050022 SK2011050022W WO2012078118A1 WO 2012078118 A1 WO2012078118 A1 WO 2012078118A1 SK 2011050022 W SK2011050022 W SK 2011050022W WO 2012078118 A1 WO2012078118 A1 WO 2012078118A1
Authority
WO
WIPO (PCT)
Prior art keywords
user interface
control
controlled
clock
decoder
Prior art date
Application number
PCT/SK2011/050022
Other languages
French (fr)
Inventor
Štefan VALÍČEK
Slávka BALÁŽOVÁ
Original Assignee
Valicek Stefan
Balazova Slavka
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Valicek Stefan, Balazova Slavka filed Critical Valicek Stefan
Publication of WO2012078118A1 publication Critical patent/WO2012078118A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Definitions

  • the invention involves a device for controlled safe access to applications and data by two-factor authentication over a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
  • a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
  • the invention consisting of a mutually autonomously control user interface remote from the controlled user interface, internal control clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding elements.
  • the invention is based on the idea that the control user interface is reverse connected through the encoder controller and integrator, whereas internal control clock is connected to the integrator through control clock encoder and the autonomous remote controlled user interface is reverse connected through differentiator element, input decoder, impulse signal filter and the output decoder.
  • the output decoder is connected directly and through decoder with timer clock and the input decoder is connected through the reference clock encoder with the internal clock of the controlled device, whereas the display of the control user interface and the display of the controlled user interface show the same two-factor authentication of the control subject consisting of identification of the control subject registered with the administrator controlling the user interface and a temporary password generated by the control user interface.
  • the password generated by the control user interface contains encoded information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol) and/or at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
  • the device for remote controlled safe access to application and data by two-factor authentication under the invention is based on software with the same flow sheet representing the flow of the control information in universal electronic devices.
  • the device under the invention enables simple control of access by another person, e.g. child, client, subordinate employee, etc., to the computer from a superior remote mobile phone or another computer or personal digital assistant (PDA) etc. within the set time period.
  • PDA personal digital assistant
  • electronic banking such a device enables the user - client to have safe access with the help of a generator of temporary passwords that the user acquires visually, e.g. through his/her mobile phone.
  • the device under invention also enables increased protection of the workstation against unauthorized access in case of absence of the user in his/her workplace - such as during business trip, holiday or sick leave.
  • the device At each access attempt, he device is capable of verifying the presence of the authorized user at the workplace in the attendance system and if the authorized user is present in workplace, standard authentication will be used. In case of his/her absence, the device requires additional authentication through special one-off password from the mobile phone of the authorized person.
  • fig.1 shows an example of the electrical diagram or flow chart of the control information within the software of the control user interface
  • fig. 2 shows an example of the application of the electrical diagram or flow chart of the control information within the software of the controlled user interface.
  • the device consists of mutually autonomous remote control user interface 11, consisting of a display unit with keypad, such as that of mobile phone and/or computer and/or personal digital assistant (PDA) from the controlled user interface 12, consisting of a display unit with keyboard of e.g. computer, control internal clock 4J_, internal clock of the 42 controlled device, impulse signal filter encoders 2J_, 7, decoder 8 and decoding elements 9, 10.
  • Control user interface 11 is reversely connected through controller 2 encoder and integrator 3 whereas the control internal clock 4.1. is connected to the integrator 3 through control clock encoder l
  • Autonomous remote controlled user interface 1.2 is reversely connected through derivator 5, input decoder 9, impulse signal filter 11. and output decoder 10.
  • Output decoder 10 is further connected directly and through decoder 8 to timer clock 6 and input decoder 9 is connected through comparative clock encoder 7 to internal clock 42 of the controlled device, whereas the display units of the control user interface 11 and the controlled user interface 12 contain the same two-factor authentication of the control subject consisting of a hidden identification of the control subject registered with the system administrator of the control user interface 11. and hidden password generated by the control user interface 1.1 with temporary - such as one hour validity, or with validity for the particular day in the calendar year.
  • the password generated by the control user interface 11. contains additional encoded information on the time when the password was generated and on maximum allowed duration of the operation (Session Initiation Protocol).
  • the device may consist of software with the same flow chart of the control information in standard universal electronic devices, such as mobile phone and/or computer, and/or personal digital assistant (PDA).
  • standard universal electronic devices such as mobile phone and/or computer, and/or personal digital assistant (PDA).
  • PDA personal digital assistant
  • System login is enabled through control user interface 11. and controlled user interface 12, e.g. through standard Windows Winlogon module, whereas the functionality of this module is extended or modified by implementation of software that enables authentication (so called Credential Provider) through login fields shown on the display units - rectangular areas, at least one of which is designated for user identification and another for password or time and password and the third field is represented by active initiation button that enables the initiation of the subsequent action of the device.
  • Credential Provider software that enables authentication
  • the third field is represented by active initiation button that enables the initiation of the subsequent action of the device.
  • the user shall use the corresponding field - rectangular surfaces - to enter his/her identification, the desired duration of the operation of the controlled device, such as in minutes in maximum hour duration and using the initiation button the user shall initiate further action of the device, such as the mobile phone or computer etc. After this an electric signal is transmitted from the control user interface 11 through controller of the encoder 2 to signal integrator 3, with - -
  • Controller of the encoder 2 fulfils a standard hash function, i.e. transforming the information (from/duration) entered by the user into a code and the control clock encoder 2A_ simultaneously fulfils another hash function, i.e. transforms the current time from the control internal clock 4J_ with fixed time range of device operation, i.e. for a period of 1 to 15 minutes, etc., into a code.
  • Integrator s subsequently joins both data into single data and this information is presented in the rectangular field of hidden display in the control user interface 1.1. This password and user identification are subsequently announced, i.e.
  • derivator 5 which separates the integrated controlled device time data from the password and this data is subsequently compared to the preset range of the current time of the internal clock 42 of this device, through comparator clock encoder 7 in the input decoding element 9. If the information is incompatible, the decoding element merely indicates this fact in the display unit of the controlled user interface 12 and no further action is enabled on the controlled device. Otherwise the derivator 5 connects the split signals through impulse signal filter 11.
  • output decoding element 10 uses decoder 8 to compare and assess the preset user data with the data from the timer clock 6. If the data is compatible, the operation of the controlled device is enabled for a period set by the control device and if not, after expiration of the set time of operation of the controlled device, no further operation of the device will be enabled, and this shall be indicated in the display unit of the controlled user interface 12 and no further operation will be allowed on the controlled device without repeated use of new temporary password from the controlled user interface 11. of the controlled device.
  • the device for remote controlled safe access to applications and data by two- factor authentication is designed to enable for fast and comfortable control of the controlled devices in households, in public Internet service facilities, in electronic banking, corporate computer networks, standard electronically protected security devices and in TV sets with remote control.

Abstract

The device consists of autonomous remote control user interface (1.1) separate from the controlled user interface (1.2),control internal clock (4.1), internal clock (4.2) of the controlled device, impulse signal filter (11), encoders (2.1), (7), decoder (8) and decoding element (9), (10). Control user interface (1.1) is reversely connected through controller (2.2) encoder and integrator (3), whereas the internal control clock is connected (4.1) to the integrator (3) through control clock encoder (2.1). Autonomous remote controlled user interface (1.2) is reversely connected through derivation element (5), input decoder (9), impulse signal filter (11) and output decoder (10), which is connected directly and through decoder (8) to the timer clock (6) and input decoder (9) is connected through comparative clock encoder (7) to internal clock (4.2) of the controlled device, whereas the display units of the control user interface (1.1) and the controlled user interface (1.2) contain the same two- factor authentication of the control subject consisting of the identification of the control subject registered with the administrator of the control user interface (1.1) and the password generated by the control user interface (1.1) with temporary validity.

Description

DEVICE FOR CONTROLLED SAFE ACCESS TO APPLICATIONS AND DATA BY TWO-FACTOR AUTHENTICATION
FIELD OF THE INVENTION
The invention involves a device for controlled safe access to applications and data by two-factor authentication over a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
BACKGROUND OF THE INVENTION
Nowadays the children have no major problems using computers and the Internet and due to their possible addiction to this technology, the parents are often worried, since in their absence they are not able to verify how much time their children spend with the computer. There is no technical device and/or software available specifically for such a purpose. There are only a few known general software tools that enable the control of access to computer, featuring computer time restriction settings that enable the parents to control child's activities. These time limits are static, preset and cannot adjust to changing conditions. If the child has more leisure time or needs to study more, the time limit is fixed and the parents are left with the requirement to reset the computer access schedule - rendering the method very impractical and uncomfortable.
Also there are more and more banks that offer remote administration of their client's account on a standard basis - whereas the most common authentication method is based on passwords that the users may keep with them at all times to enable access to their account practically from anywhere, however, there are several drawbacks associated with this authentication method. The greatest threat is represented by so-called weak passwords. The users often choose passwords that are easy to remember but also easy to guess. Therefore most of these systems require the passwords to meet certain specific parameters, such as length, number of numerals, etc. or a combination of several passwords, such as identification number, PIN and a password. However, if the password is too complex, the users often put it down on paper, rendering the confidentiality of the password ineffective. Within organizations, continuously greater value is assigned to intellectual property - proprietary as well as acquired from external sources - such as from customers. With respect to the information safety in a typical organization, the greatest risk is represented by the personnel, especially the management. Statistics show that up to about 80% of confidential information is disclosed by the organization's own management - mainly thanks to the fact that management requires wide access to corporate information located in the manager's workstations connected to the corporate network. Therefore one of the most frequent requirements in relation to extensive corporate networks is the protection of individual workstations against unauthorized access not only by other users but also by system administrators. Large corporate networks require password protection of workstations to prevent unauthorized access during absence of the authorized users at workplace: during business trips, holidays or during sick leave. Also in this case - similar to the Internet banking environment - the greatest threat comes from so-called weak passwords and complex passwords are usually marked down by the users, thus rendering the password protection ineffective.
THE BASIS OF THE INVENTION
The drawbacks are substantially eliminated by a device that enables remote controlled safe access to applications and data by two-factor authentication, the invention consisting of a mutually autonomously control user interface remote from the controlled user interface, internal control clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding elements. The invention is based on the idea that the control user interface is reverse connected through the encoder controller and integrator, whereas internal control clock is connected to the integrator through control clock encoder and the autonomous remote controlled user interface is reverse connected through differentiator element, input decoder, impulse signal filter and the output decoder. At the same time the output decoder is connected directly and through decoder with timer clock and the input decoder is connected through the reference clock encoder with the internal clock of the controlled device, whereas the display of the control user interface and the display of the controlled user interface show the same two-factor authentication of the control subject consisting of identification of the control subject registered with the administrator controlling the user interface and a temporary password generated by the control user interface. In this respect it is beneficial if the password generated by the control user interface contains encoded information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol) and/or at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
It is also beneficial if the device for remote controlled safe access to application and data by two-factor authentication under the invention is based on software with the same flow sheet representing the flow of the control information in universal electronic devices.
The device under the invention enables simple control of access by another person, e.g. child, client, subordinate employee, etc., to the computer from a superior remote mobile phone or another computer or personal digital assistant (PDA) etc. within the set time period. In electronic banking such a device enables the user - client to have safe access with the help of a generator of temporary passwords that the user acquires visually, e.g. through his/her mobile phone. The device under invention also enables increased protection of the workstation against unauthorized access in case of absence of the user in his/her workplace - such as during business trip, holiday or sick leave. At each access attempt, he device is capable of verifying the presence of the authorized user at the workplace in the attendance system and if the authorized user is present in workplace, standard authentication will be used. In case of his/her absence, the device requires additional authentication through special one-off password from the mobile phone of the authorized person.
BRIEF DESCRIPTION OF THE DRAWINGS
A specific example of the application of the invention is depicted in the attached drawings, where fig.1 shows an example of the electrical diagram or flow chart of the control information within the software of the control user interface and fig. 2 shows an example of the application of the electrical diagram or flow chart of the control information within the software of the controlled user interface.
DETAILED DESCRIPTION
An example of the application of the device for remote controlled safe access to applications and data by two-factor authentication under the invention is shown in figs 1 and - -
2. The device consists of mutually autonomous remote control user interface 11, consisting of a display unit with keypad, such as that of mobile phone and/or computer and/or personal digital assistant (PDA) from the controlled user interface 12, consisting of a display unit with keyboard of e.g. computer, control internal clock 4J_, internal clock of the 42 controlled device, impulse signal filter encoders 2J_, 7, decoder 8 and decoding elements 9, 10. Control user interface 11 is reversely connected through controller 2 encoder and integrator 3 whereas the control internal clock 4.1. is connected to the integrator 3 through control clock encoder l Autonomous remote controlled user interface 1.2 is reversely connected through derivator 5, input decoder 9, impulse signal filter 11. and output decoder 10. Output decoder 10 is further connected directly and through decoder 8 to timer clock 6 and input decoder 9 is connected through comparative clock encoder 7 to internal clock 42 of the controlled device, whereas the display units of the control user interface 11 and the controlled user interface 12 contain the same two-factor authentication of the control subject consisting of a hidden identification of the control subject registered with the system administrator of the control user interface 11. and hidden password generated by the control user interface 1.1 with temporary - such as one hour validity, or with validity for the particular day in the calendar year. The password generated by the control user interface 11. contains additional encoded information on the time when the password was generated and on maximum allowed duration of the operation (Session Initiation Protocol).
Alternatively the device may consist of software with the same flow chart of the control information in standard universal electronic devices, such as mobile phone and/or computer, and/or personal digital assistant (PDA).
System login is enabled through control user interface 11. and controlled user interface 12, e.g. through standard Windows Winlogon module, whereas the functionality of this module is extended or modified by implementation of software that enables authentication (so called Credential Provider) through login fields shown on the display units - rectangular areas, at least one of which is designated for user identification and another for password or time and password and the third field is represented by active initiation button that enables the initiation of the subsequent action of the device. Using the standard known method through hidden keyboard on hidden display in the control user interface 11. the user shall use the corresponding field - rectangular surfaces - to enter his/her identification, the desired duration of the operation of the controlled device, such as in minutes in maximum hour duration and using the initiation button the user shall initiate further action of the device, such as the mobile phone or computer etc. After this an electric signal is transmitted from the control user interface 11 through controller of the encoder 2 to signal integrator 3, with - -
permanently connected control internal clock 4J_ of the device through control clock encoder 2.1. Controller of the encoder 2 fulfils a standard hash function, i.e. transforming the information (from/duration) entered by the user into a code and the control clock encoder 2A_ simultaneously fulfils another hash function, i.e. transforms the current time from the control internal clock 4J_ with fixed time range of device operation, i.e. for a period of 1 to 15 minutes, etc., into a code. Integrator s subsequently joins both data into single data and this information is presented in the rectangular field of hidden display in the control user interface 1.1. This password and user identification are subsequently announced, i.e. by telephone or by text (SMS) message, or by fax or by electronic means to the user of the controlled device, to be entered in a standard way by the user through hidden keyboard and within the set time limit in the hidden display of the controlled user interface 1.2. After this an electrical signal is transmitted in the controlled device from the controlled user interface 1.2 into derivator 5, which separates the integrated controlled device time data from the password and this data is subsequently compared to the preset range of the current time of the internal clock 42 of this device, through comparator clock encoder 7 in the input decoding element 9. If the information is incompatible, the decoding element merely indicates this fact in the display unit of the controlled user interface 12 and no further action is enabled on the controlled device. Otherwise the derivator 5 connects the split signals through impulse signal filter 11. into output decoding element 10, which uses decoder 8 to compare and assess the preset user data with the data from the timer clock 6. If the data is compatible, the operation of the controlled device is enabled for a period set by the control device and if not, after expiration of the set time of operation of the controlled device, no further operation of the device will be enabled, and this shall be indicated in the display unit of the controlled user interface 12 and no further operation will be allowed on the controlled device without repeated use of new temporary password from the controlled user interface 11. of the controlled device.
The described and depicted applications are not the only possible solutions under the invention, as the device can be made up by all possible combinations arising from the protection claims.
INDUSTRIAL APPLICABILITY
The device for remote controlled safe access to applications and data by two- factor authentication is designed to enable for fast and comfortable control of the controlled devices in households, in public Internet service facilities, in electronic banking, corporate computer networks, standard electronically protected security devices and in TV sets with remote control.

Claims

1. Device for remote controlled safe access to applications and data by two-factor authentication, consisting of autonomous remote control user interface and autonomous controlled user interface, control internal clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding element, whereas the control user interface (1.1) is reversely connected through controller (2.2) of the encoder and integrator (3) whereas the control internal clock (4.1) is connected to the integrator (3) through control clock encoder (2.1) and autonomous remote controlled user interface^ .2) is reversely connected through derivation element (5), input decoder (9), impulse signal filter (11) and output decoder (10), which is connected directly and through decoder (8) to the timer clock (6) and input decoder (9) is connected through comparative clock encoder (7) to internal clock (4.2) of the controlled device, whereas the display units of the control user interface (1.1) and the controlled user interface (1.2) contain the same two-factor authentication of the control subject consisting of the identification of the control subject registered with the administrator of the control user interface (1.1) and the password generated by the control user interface (1.1) with temporary validity.
2. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 , whereas the password generated by the control user interface (1.1) includes encoded additional information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol).
3. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 , whereas at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
4. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 through 3, consist of software with the same flow chart of the control information in standard universal electronic devices.
PCT/SK2011/050022 2010-12-08 2011-12-06 Device for controlled safe access to applications and data by two-factor authentication WO2012078118A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SKPUV50094-2010 2010-12-08
SK50094-2010U SK5919Y1 (en) 2010-12-08 2010-12-08 Device for secure control access to applications and data by two-factor authentication

Publications (1)

Publication Number Publication Date
WO2012078118A1 true WO2012078118A1 (en) 2012-06-14

Family

ID=44141142

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SK2011/050022 WO2012078118A1 (en) 2010-12-08 2011-12-06 Device for controlled safe access to applications and data by two-factor authentication

Country Status (2)

Country Link
SK (1) SK5919Y1 (en)
WO (1) WO2012078118A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1950681A1 (en) * 2005-10-13 2008-07-30 NTT DoCoMo, Inc. Mobile terminal, access control management device, and access control management method
US20080256641A1 (en) * 2007-04-13 2008-10-16 Qualcomm Incorporated Mobile unit parental control
WO2010103110A2 (en) * 2009-03-13 2010-09-16 Metaboli System and method for controlling the use of applications on a computer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1950681A1 (en) * 2005-10-13 2008-07-30 NTT DoCoMo, Inc. Mobile terminal, access control management device, and access control management method
US20080256641A1 (en) * 2007-04-13 2008-10-16 Qualcomm Incorporated Mobile unit parental control
WO2010103110A2 (en) * 2009-03-13 2010-09-16 Metaboli System and method for controlling the use of applications on a computer

Also Published As

Publication number Publication date
SK5919Y1 (en) 2011-11-04
SK500942010U1 (en) 2011-05-06

Similar Documents

Publication Publication Date Title
Dasgupta et al. Multi-factor authentication: more secure approach towards authenticating individuals
US10489759B2 (en) System and method for mobile peer authentication and asset control
EP2817915B1 (en) Industrial automation and control device user access
CN104969231A (en) Security challenge assisted password proxy
Mukhopadhyay et al. An Anti-Phishing mechanism for single sign-on based on QR-code
GB2379040A (en) Controlling user access to a remote service by sending a one-time password to a portable device after normal login
Abdurrahman et al. A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp
EP4211864A2 (en) Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data
Hof User-centric IT security-how to design usable security mechanisms
CN102065131A (en) Single-point logging way and logging authentication
US20170201513A1 (en) Authentication stick
Hof Towards enhanced usability of it security mechanisms-how to design usable it security mechanisms using the example of email encryption
CN103379108A (en) Flexible and safe concentrated identity authentication method
WO2012078118A1 (en) Device for controlled safe access to applications and data by two-factor authentication
KR20210065923A (en) Device authentication method by login session passing
Cisco Cisco Teams with Security Dynamics
Jones The identity metasystem: A user-centric, inclusive web authentication solution
Lupu Securing Web Accounts by Graphical Password and Voice Notification
Goldberg What does “MFA” mean?
TWI772768B (en) Dynamic password system and method for obtaining dynamic password
Rama et al. Web based security analysis of OPASS authentication schemes using mobile application
CN105554014B (en) A kind of login method and the first electronic equipment of wireless network
Pulko et al. USER AUTHENTICATION IN INFORMATION SYSTEMS
CN104811440B (en) A kind of network account setting and authentication method based on Double-puzzle
Tas et al. A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11811435

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11811435

Country of ref document: EP

Kind code of ref document: A1