WO2012078118A1 - Device for controlled safe access to applications and data by two-factor authentication - Google Patents
Device for controlled safe access to applications and data by two-factor authentication Download PDFInfo
- Publication number
- WO2012078118A1 WO2012078118A1 PCT/SK2011/050022 SK2011050022W WO2012078118A1 WO 2012078118 A1 WO2012078118 A1 WO 2012078118A1 SK 2011050022 W SK2011050022 W SK 2011050022W WO 2012078118 A1 WO2012078118 A1 WO 2012078118A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user interface
- control
- controlled
- clock
- decoder
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Definitions
- the invention involves a device for controlled safe access to applications and data by two-factor authentication over a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
- a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
- the invention consisting of a mutually autonomously control user interface remote from the controlled user interface, internal control clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding elements.
- the invention is based on the idea that the control user interface is reverse connected through the encoder controller and integrator, whereas internal control clock is connected to the integrator through control clock encoder and the autonomous remote controlled user interface is reverse connected through differentiator element, input decoder, impulse signal filter and the output decoder.
- the output decoder is connected directly and through decoder with timer clock and the input decoder is connected through the reference clock encoder with the internal clock of the controlled device, whereas the display of the control user interface and the display of the controlled user interface show the same two-factor authentication of the control subject consisting of identification of the control subject registered with the administrator controlling the user interface and a temporary password generated by the control user interface.
- the password generated by the control user interface contains encoded information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol) and/or at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
- the device for remote controlled safe access to application and data by two-factor authentication under the invention is based on software with the same flow sheet representing the flow of the control information in universal electronic devices.
- the device under the invention enables simple control of access by another person, e.g. child, client, subordinate employee, etc., to the computer from a superior remote mobile phone or another computer or personal digital assistant (PDA) etc. within the set time period.
- PDA personal digital assistant
- electronic banking such a device enables the user - client to have safe access with the help of a generator of temporary passwords that the user acquires visually, e.g. through his/her mobile phone.
- the device under invention also enables increased protection of the workstation against unauthorized access in case of absence of the user in his/her workplace - such as during business trip, holiday or sick leave.
- the device At each access attempt, he device is capable of verifying the presence of the authorized user at the workplace in the attendance system and if the authorized user is present in workplace, standard authentication will be used. In case of his/her absence, the device requires additional authentication through special one-off password from the mobile phone of the authorized person.
- fig.1 shows an example of the electrical diagram or flow chart of the control information within the software of the control user interface
- fig. 2 shows an example of the application of the electrical diagram or flow chart of the control information within the software of the controlled user interface.
- the device consists of mutually autonomous remote control user interface 11, consisting of a display unit with keypad, such as that of mobile phone and/or computer and/or personal digital assistant (PDA) from the controlled user interface 12, consisting of a display unit with keyboard of e.g. computer, control internal clock 4J_, internal clock of the 42 controlled device, impulse signal filter encoders 2J_, 7, decoder 8 and decoding elements 9, 10.
- Control user interface 11 is reversely connected through controller 2 encoder and integrator 3 whereas the control internal clock 4.1. is connected to the integrator 3 through control clock encoder l
- Autonomous remote controlled user interface 1.2 is reversely connected through derivator 5, input decoder 9, impulse signal filter 11. and output decoder 10.
- Output decoder 10 is further connected directly and through decoder 8 to timer clock 6 and input decoder 9 is connected through comparative clock encoder 7 to internal clock 42 of the controlled device, whereas the display units of the control user interface 11 and the controlled user interface 12 contain the same two-factor authentication of the control subject consisting of a hidden identification of the control subject registered with the system administrator of the control user interface 11. and hidden password generated by the control user interface 1.1 with temporary - such as one hour validity, or with validity for the particular day in the calendar year.
- the password generated by the control user interface 11. contains additional encoded information on the time when the password was generated and on maximum allowed duration of the operation (Session Initiation Protocol).
- the device may consist of software with the same flow chart of the control information in standard universal electronic devices, such as mobile phone and/or computer, and/or personal digital assistant (PDA).
- standard universal electronic devices such as mobile phone and/or computer, and/or personal digital assistant (PDA).
- PDA personal digital assistant
- System login is enabled through control user interface 11. and controlled user interface 12, e.g. through standard Windows Winlogon module, whereas the functionality of this module is extended or modified by implementation of software that enables authentication (so called Credential Provider) through login fields shown on the display units - rectangular areas, at least one of which is designated for user identification and another for password or time and password and the third field is represented by active initiation button that enables the initiation of the subsequent action of the device.
- Credential Provider software that enables authentication
- the third field is represented by active initiation button that enables the initiation of the subsequent action of the device.
- the user shall use the corresponding field - rectangular surfaces - to enter his/her identification, the desired duration of the operation of the controlled device, such as in minutes in maximum hour duration and using the initiation button the user shall initiate further action of the device, such as the mobile phone or computer etc. After this an electric signal is transmitted from the control user interface 11 through controller of the encoder 2 to signal integrator 3, with - -
- Controller of the encoder 2 fulfils a standard hash function, i.e. transforming the information (from/duration) entered by the user into a code and the control clock encoder 2A_ simultaneously fulfils another hash function, i.e. transforms the current time from the control internal clock 4J_ with fixed time range of device operation, i.e. for a period of 1 to 15 minutes, etc., into a code.
- Integrator s subsequently joins both data into single data and this information is presented in the rectangular field of hidden display in the control user interface 1.1. This password and user identification are subsequently announced, i.e.
- derivator 5 which separates the integrated controlled device time data from the password and this data is subsequently compared to the preset range of the current time of the internal clock 42 of this device, through comparator clock encoder 7 in the input decoding element 9. If the information is incompatible, the decoding element merely indicates this fact in the display unit of the controlled user interface 12 and no further action is enabled on the controlled device. Otherwise the derivator 5 connects the split signals through impulse signal filter 11.
- output decoding element 10 uses decoder 8 to compare and assess the preset user data with the data from the timer clock 6. If the data is compatible, the operation of the controlled device is enabled for a period set by the control device and if not, after expiration of the set time of operation of the controlled device, no further operation of the device will be enabled, and this shall be indicated in the display unit of the controlled user interface 12 and no further operation will be allowed on the controlled device without repeated use of new temporary password from the controlled user interface 11. of the controlled device.
- the device for remote controlled safe access to applications and data by two- factor authentication is designed to enable for fast and comfortable control of the controlled devices in households, in public Internet service facilities, in electronic banking, corporate computer networks, standard electronically protected security devices and in TV sets with remote control.
Abstract
The device consists of autonomous remote control user interface (1.1) separate from the controlled user interface (1.2),control internal clock (4.1), internal clock (4.2) of the controlled device, impulse signal filter (11), encoders (2.1), (7), decoder (8) and decoding element (9), (10). Control user interface (1.1) is reversely connected through controller (2.2) encoder and integrator (3), whereas the internal control clock is connected (4.1) to the integrator (3) through control clock encoder (2.1). Autonomous remote controlled user interface (1.2) is reversely connected through derivation element (5), input decoder (9), impulse signal filter (11) and output decoder (10), which is connected directly and through decoder (8) to the timer clock (6) and input decoder (9) is connected through comparative clock encoder (7) to internal clock (4.2) of the controlled device, whereas the display units of the control user interface (1.1) and the controlled user interface (1.2) contain the same two- factor authentication of the control subject consisting of the identification of the control subject registered with the administrator of the control user interface (1.1) and the password generated by the control user interface (1.1) with temporary validity.
Description
DEVICE FOR CONTROLLED SAFE ACCESS TO APPLICATIONS AND DATA BY TWO-FACTOR AUTHENTICATION
FIELD OF THE INVENTION
The invention involves a device for controlled safe access to applications and data by two-factor authentication over a mutually autonomous remote control and controlled user interface in the form of mainly mobile phone and/or computer, and/or personal digital assistant (PDA), etc.
BACKGROUND OF THE INVENTION
Nowadays the children have no major problems using computers and the Internet and due to their possible addiction to this technology, the parents are often worried, since in their absence they are not able to verify how much time their children spend with the computer. There is no technical device and/or software available specifically for such a purpose. There are only a few known general software tools that enable the control of access to computer, featuring computer time restriction settings that enable the parents to control child's activities. These time limits are static, preset and cannot adjust to changing conditions. If the child has more leisure time or needs to study more, the time limit is fixed and the parents are left with the requirement to reset the computer access schedule - rendering the method very impractical and uncomfortable.
Also there are more and more banks that offer remote administration of their client's account on a standard basis - whereas the most common authentication method is based on passwords that the users may keep with them at all times to enable access to their account practically from anywhere, however, there are several drawbacks associated with this authentication method. The greatest threat is represented by so-called weak passwords. The users often choose passwords that are easy to remember but also easy to guess. Therefore most of these systems require the passwords to meet certain specific parameters, such as length, number of numerals, etc. or a combination of several passwords, such as identification number, PIN and a password. However, if the password is too complex, the users often put it down on paper, rendering the confidentiality of the password ineffective.
Within organizations, continuously greater value is assigned to intellectual property - proprietary as well as acquired from external sources - such as from customers. With respect to the information safety in a typical organization, the greatest risk is represented by the personnel, especially the management. Statistics show that up to about 80% of confidential information is disclosed by the organization's own management - mainly thanks to the fact that management requires wide access to corporate information located in the manager's workstations connected to the corporate network. Therefore one of the most frequent requirements in relation to extensive corporate networks is the protection of individual workstations against unauthorized access not only by other users but also by system administrators. Large corporate networks require password protection of workstations to prevent unauthorized access during absence of the authorized users at workplace: during business trips, holidays or during sick leave. Also in this case - similar to the Internet banking environment - the greatest threat comes from so-called weak passwords and complex passwords are usually marked down by the users, thus rendering the password protection ineffective.
THE BASIS OF THE INVENTION
The drawbacks are substantially eliminated by a device that enables remote controlled safe access to applications and data by two-factor authentication, the invention consisting of a mutually autonomously control user interface remote from the controlled user interface, internal control clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding elements. The invention is based on the idea that the control user interface is reverse connected through the encoder controller and integrator, whereas internal control clock is connected to the integrator through control clock encoder and the autonomous remote controlled user interface is reverse connected through differentiator element, input decoder, impulse signal filter and the output decoder. At the same time the output decoder is connected directly and through decoder with timer clock and the input decoder is connected through the reference clock encoder with the internal clock of the controlled device, whereas the display of the control user interface and the display of the controlled user interface show the same two-factor authentication of the control subject consisting of identification of the control subject registered with the administrator controlling the user interface and a temporary password generated by the control user interface.
In this respect it is beneficial if the password generated by the control user interface contains encoded information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol) and/or at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
It is also beneficial if the device for remote controlled safe access to application and data by two-factor authentication under the invention is based on software with the same flow sheet representing the flow of the control information in universal electronic devices.
The device under the invention enables simple control of access by another person, e.g. child, client, subordinate employee, etc., to the computer from a superior remote mobile phone or another computer or personal digital assistant (PDA) etc. within the set time period. In electronic banking such a device enables the user - client to have safe access with the help of a generator of temporary passwords that the user acquires visually, e.g. through his/her mobile phone. The device under invention also enables increased protection of the workstation against unauthorized access in case of absence of the user in his/her workplace - such as during business trip, holiday or sick leave. At each access attempt, he device is capable of verifying the presence of the authorized user at the workplace in the attendance system and if the authorized user is present in workplace, standard authentication will be used. In case of his/her absence, the device requires additional authentication through special one-off password from the mobile phone of the authorized person.
BRIEF DESCRIPTION OF THE DRAWINGS
A specific example of the application of the invention is depicted in the attached drawings, where fig.1 shows an example of the electrical diagram or flow chart of the control information within the software of the control user interface and fig. 2 shows an example of the application of the electrical diagram or flow chart of the control information within the software of the controlled user interface.
DETAILED DESCRIPTION
An example of the application of the device for remote controlled safe access to applications and data by two-factor authentication under the invention is shown in figs 1 and
- -
2. The device consists of mutually autonomous remote control user interface 11, consisting of a display unit with keypad, such as that of mobile phone and/or computer and/or personal digital assistant (PDA) from the controlled user interface 12, consisting of a display unit with keyboard of e.g. computer, control internal clock 4J_, internal clock of the 42 controlled device, impulse signal filter encoders 2J_, 7, decoder 8 and decoding elements 9, 10. Control user interface 11 is reversely connected through controller 2 encoder and integrator 3 whereas the control internal clock 4.1. is connected to the integrator 3 through control clock encoder l Autonomous remote controlled user interface 1.2 is reversely connected through derivator 5, input decoder 9, impulse signal filter 11. and output decoder 10. Output decoder 10 is further connected directly and through decoder 8 to timer clock 6 and input decoder 9 is connected through comparative clock encoder 7 to internal clock 42 of the controlled device, whereas the display units of the control user interface 11 and the controlled user interface 12 contain the same two-factor authentication of the control subject consisting of a hidden identification of the control subject registered with the system administrator of the control user interface 11. and hidden password generated by the control user interface 1.1 with temporary - such as one hour validity, or with validity for the particular day in the calendar year. The password generated by the control user interface 11. contains additional encoded information on the time when the password was generated and on maximum allowed duration of the operation (Session Initiation Protocol).
Alternatively the device may consist of software with the same flow chart of the control information in standard universal electronic devices, such as mobile phone and/or computer, and/or personal digital assistant (PDA).
System login is enabled through control user interface 11. and controlled user interface 12, e.g. through standard Windows Winlogon module, whereas the functionality of this module is extended or modified by implementation of software that enables authentication (so called Credential Provider) through login fields shown on the display units - rectangular areas, at least one of which is designated for user identification and another for password or time and password and the third field is represented by active initiation button that enables the initiation of the subsequent action of the device. Using the standard known method through hidden keyboard on hidden display in the control user interface 11. the user shall use the corresponding field - rectangular surfaces - to enter his/her identification, the desired duration of the operation of the controlled device, such as in minutes in maximum hour duration and using the initiation button the user shall initiate further action of the device, such as the mobile phone or computer etc. After this an electric signal is transmitted from the control user interface 11 through controller of the encoder 2 to signal integrator 3, with
- -
permanently connected control internal clock 4J_ of the device through control clock encoder 2.1. Controller of the encoder 2 fulfils a standard hash function, i.e. transforming the information (from/duration) entered by the user into a code and the control clock encoder 2A_ simultaneously fulfils another hash function, i.e. transforms the current time from the control internal clock 4J_ with fixed time range of device operation, i.e. for a period of 1 to 15 minutes, etc., into a code. Integrator s subsequently joins both data into single data and this information is presented in the rectangular field of hidden display in the control user interface 1.1. This password and user identification are subsequently announced, i.e. by telephone or by text (SMS) message, or by fax or by electronic means to the user of the controlled device, to be entered in a standard way by the user through hidden keyboard and within the set time limit in the hidden display of the controlled user interface 1.2. After this an electrical signal is transmitted in the controlled device from the controlled user interface 1.2 into derivator 5, which separates the integrated controlled device time data from the password and this data is subsequently compared to the preset range of the current time of the internal clock 42 of this device, through comparator clock encoder 7 in the input decoding element 9. If the information is incompatible, the decoding element merely indicates this fact in the display unit of the controlled user interface 12 and no further action is enabled on the controlled device. Otherwise the derivator 5 connects the split signals through impulse signal filter 11. into output decoding element 10, which uses decoder 8 to compare and assess the preset user data with the data from the timer clock 6. If the data is compatible, the operation of the controlled device is enabled for a period set by the control device and if not, after expiration of the set time of operation of the controlled device, no further operation of the device will be enabled, and this shall be indicated in the display unit of the controlled user interface 12 and no further operation will be allowed on the controlled device without repeated use of new temporary password from the controlled user interface 11. of the controlled device.
The described and depicted applications are not the only possible solutions under the invention, as the device can be made up by all possible combinations arising from the protection claims.
INDUSTRIAL APPLICABILITY
The device for remote controlled safe access to applications and data by two- factor authentication is designed to enable for fast and comfortable control of the controlled devices in households, in public Internet service facilities, in electronic
banking, corporate computer networks, standard electronically protected security devices and in TV sets with remote control.
Claims
1. Device for remote controlled safe access to applications and data by two-factor authentication, consisting of autonomous remote control user interface and autonomous controlled user interface, control internal clock, internal clock of the controlled device, impulse signal filter, encoders, decoder and decoding element, whereas the control user interface (1.1) is reversely connected through controller (2.2) of the encoder and integrator (3) whereas the control internal clock (4.1) is connected to the integrator (3) through control clock encoder (2.1) and autonomous remote controlled user interface^ .2) is reversely connected through derivation element (5), input decoder (9), impulse signal filter (11) and output decoder (10), which is connected directly and through decoder (8) to the timer clock (6) and input decoder (9) is connected through comparative clock encoder (7) to internal clock (4.2) of the controlled device, whereas the display units of the control user interface (1.1) and the controlled user interface (1.2) contain the same two-factor authentication of the control subject consisting of the identification of the control subject registered with the administrator of the control user interface (1.1) and the password generated by the control user interface (1.1) with temporary validity.
2. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 , whereas the password generated by the control user interface (1.1) includes encoded additional information on the current time of password generation and maximum duration of the operation (Session Initiation Protocol).
3. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 , whereas at least one universal electronic device is at least one mobile phone and/or computer and/or personal digital assistant (PDA).
4. Device for remote controlled safe access to applications and data by two-factor authentication as per paragraph 1 through 3, consist of software with the same flow chart of the control information in standard universal electronic devices.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SKPUV50094-2010 | 2010-12-08 | ||
SK50094-2010U SK5919Y1 (en) | 2010-12-08 | 2010-12-08 | Device for secure control access to applications and data by two-factor authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012078118A1 true WO2012078118A1 (en) | 2012-06-14 |
Family
ID=44141142
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SK2011/050022 WO2012078118A1 (en) | 2010-12-08 | 2011-12-06 | Device for controlled safe access to applications and data by two-factor authentication |
Country Status (2)
Country | Link |
---|---|
SK (1) | SK5919Y1 (en) |
WO (1) | WO2012078118A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1950681A1 (en) * | 2005-10-13 | 2008-07-30 | NTT DoCoMo, Inc. | Mobile terminal, access control management device, and access control management method |
US20080256641A1 (en) * | 2007-04-13 | 2008-10-16 | Qualcomm Incorporated | Mobile unit parental control |
WO2010103110A2 (en) * | 2009-03-13 | 2010-09-16 | Metaboli | System and method for controlling the use of applications on a computer |
-
2010
- 2010-12-08 SK SK50094-2010U patent/SK5919Y1/en unknown
-
2011
- 2011-12-06 WO PCT/SK2011/050022 patent/WO2012078118A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1950681A1 (en) * | 2005-10-13 | 2008-07-30 | NTT DoCoMo, Inc. | Mobile terminal, access control management device, and access control management method |
US20080256641A1 (en) * | 2007-04-13 | 2008-10-16 | Qualcomm Incorporated | Mobile unit parental control |
WO2010103110A2 (en) * | 2009-03-13 | 2010-09-16 | Metaboli | System and method for controlling the use of applications on a computer |
Also Published As
Publication number | Publication date |
---|---|
SK5919Y1 (en) | 2011-11-04 |
SK500942010U1 (en) | 2011-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dasgupta et al. | Multi-factor authentication: more secure approach towards authenticating individuals | |
US10489759B2 (en) | System and method for mobile peer authentication and asset control | |
EP2817915B1 (en) | Industrial automation and control device user access | |
CN104969231A (en) | Security challenge assisted password proxy | |
Mukhopadhyay et al. | An Anti-Phishing mechanism for single sign-on based on QR-code | |
GB2379040A (en) | Controlling user access to a remote service by sending a one-time password to a portable device after normal login | |
Abdurrahman et al. | A new mobile-based multi-factor authentication scheme using pre-shared number, GPS location and time stamp | |
EP4211864A2 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
Hof | User-centric IT security-how to design usable security mechanisms | |
CN102065131A (en) | Single-point logging way and logging authentication | |
US20170201513A1 (en) | Authentication stick | |
Hof | Towards enhanced usability of it security mechanisms-how to design usable it security mechanisms using the example of email encryption | |
CN103379108A (en) | Flexible and safe concentrated identity authentication method | |
WO2012078118A1 (en) | Device for controlled safe access to applications and data by two-factor authentication | |
KR20210065923A (en) | Device authentication method by login session passing | |
Cisco | Cisco Teams with Security Dynamics | |
Jones | The identity metasystem: A user-centric, inclusive web authentication solution | |
Lupu | Securing Web Accounts by Graphical Password and Voice Notification | |
Goldberg | What does “MFA” mean? | |
TWI772768B (en) | Dynamic password system and method for obtaining dynamic password | |
Rama et al. | Web based security analysis of OPASS authentication schemes using mobile application | |
CN105554014B (en) | A kind of login method and the first electronic equipment of wireless network | |
Pulko et al. | USER AUTHENTICATION IN INFORMATION SYSTEMS | |
CN104811440B (en) | A kind of network account setting and authentication method based on Double-puzzle | |
Tas et al. | A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11811435 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11811435 Country of ref document: EP Kind code of ref document: A1 |