ZA200503866B - Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like - Google Patents
Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like Download PDFInfo
- Publication number
- ZA200503866B ZA200503866B ZA200503866A ZA200503866A ZA200503866B ZA 200503866 B ZA200503866 B ZA 200503866B ZA 200503866 A ZA200503866 A ZA 200503866A ZA 200503866 A ZA200503866 A ZA 200503866A ZA 200503866 B ZA200503866 B ZA 200503866B
- Authority
- ZA
- South Africa
- Prior art keywords
- send
- attestation
- item
- application
- send item
- Prior art date
Links
- 230000003993 interaction Effects 0.000 title claims description 16
- 238000000034 method Methods 0.000 claims description 48
- 230000000694 effects Effects 0.000 claims description 15
- 238000010276 construction Methods 0.000 claims description 8
- 238000012544 monitoring process Methods 0.000 claims description 7
- 238000004806 packaging method and process Methods 0.000 claims 3
- 230000002452 interceptive effect Effects 0.000 description 22
- 238000004891 communication Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 5
- 238000004883 computer application Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000005055 memory storage Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012015 optical character recognition Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Mathematical Physics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/868,116 US20050278253A1 (en) | 2004-06-15 | 2004-06-15 | Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200503866B true ZA200503866B (en) | 2007-01-31 |
Family
ID=34981922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA200503866A ZA200503866B (en) | 2004-06-15 | 2005-05-13 | Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like |
Country Status (14)
Country | Link |
---|---|
US (1) | US20050278253A1 (pt) |
EP (1) | EP1607826B1 (pt) |
JP (1) | JP4718903B2 (pt) |
KR (1) | KR101122924B1 (pt) |
CN (1) | CN1713197B (pt) |
AU (1) | AU2005201956B2 (pt) |
BR (1) | BRPI0501800A (pt) |
CA (1) | CA2506155C (pt) |
HK (1) | HK1086902A1 (pt) |
MX (1) | MXPA05005250A (pt) |
MY (1) | MY144418A (pt) |
RU (1) | RU2372648C2 (pt) |
TW (1) | TWI372550B (pt) |
ZA (1) | ZA200503866B (pt) |
Families Citing this family (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7505946B2 (en) * | 2004-03-31 | 2009-03-17 | Microsoft Corporation | High performance content alteration architecture and techniques |
US8572381B1 (en) * | 2006-02-06 | 2013-10-29 | Cisco Technology, Inc. | Challenge protected user queries |
NZ545529A (en) * | 2006-02-24 | 2008-11-28 | Ammas Com Ltd | Improvements in or relating to a promotional system |
US7751397B2 (en) * | 2006-05-05 | 2010-07-06 | Broadcom Corporation | Switching network employing a user challenge mechanism to counter denial of service attacks |
JP5296707B2 (ja) * | 2007-01-23 | 2013-09-25 | カーネギー メロン ユニバーシティ | コンピュータシステムへのアクセスを制御し媒体ファイルに注釈を付ける方法及び装置 |
US8510814B2 (en) * | 2007-01-31 | 2013-08-13 | Binary Monkeys, Inc. | Method and apparatus for network authentication of human interaction and user identity |
EP2201737A2 (en) * | 2007-10-20 | 2010-06-30 | Penango, Inc. | Methods and systems for indicating trustworthiness of secure communications |
US20090113328A1 (en) * | 2007-10-30 | 2009-04-30 | Penango, Inc. | Multidimensional Multistate User Interface Element |
US9595008B1 (en) | 2007-11-19 | 2017-03-14 | Timothy P. Heikell | Systems, methods, apparatus for evaluating status of computing device user |
EP2098971A1 (en) * | 2008-03-04 | 2009-09-09 | Nagravision S.A. | Method for compensating a viewer of a broadcast programme for his presence during part of said broadcast programme |
US8433916B2 (en) * | 2008-09-30 | 2013-04-30 | Microsoft Corporation | Active hip |
EP2200199A1 (en) | 2008-12-19 | 2010-06-23 | Nagravision S.A. | A method for documenting viewing activity of a viewer of a broadcast program content |
US9087196B2 (en) * | 2010-12-24 | 2015-07-21 | Intel Corporation | Secure application attestation using dynamic measurement kernels |
EP2676220A4 (en) * | 2011-02-17 | 2018-01-03 | Taasera, Inc. | System and method for application attestation |
CN102737019B (zh) * | 2011-03-31 | 2016-08-24 | 阿里巴巴集团控股有限公司 | 机器行为确定方法、网页浏览器及网页服务器 |
US9887983B2 (en) * | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9396320B2 (en) | 2013-03-22 | 2016-07-19 | Nok Nok Labs, Inc. | System and method for non-intrusive, privacy-preserving authentication |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US9961077B2 (en) | 2013-05-30 | 2018-05-01 | Nok Nok Labs, Inc. | System and method for biometric authentication with device attestation |
US9577999B1 (en) | 2014-05-02 | 2017-02-21 | Nok Nok Labs, Inc. | Enhanced security for registration of authentication devices |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
US9413533B1 (en) | 2014-05-02 | 2016-08-09 | Nok Nok Labs, Inc. | System and method for authorizing a new authenticator |
US9875347B2 (en) | 2014-07-31 | 2018-01-23 | Nok Nok Labs, Inc. | System and method for performing authentication using data analytics |
US10148630B2 (en) | 2014-07-31 | 2018-12-04 | Nok Nok Labs, Inc. | System and method for implementing a hosted authentication service |
US9455979B2 (en) | 2014-07-31 | 2016-09-27 | Nok Nok Labs, Inc. | System and method for establishing trust using secure transmission protocols |
US9749131B2 (en) | 2014-07-31 | 2017-08-29 | Nok Nok Labs, Inc. | System and method for implementing a one-time-password using asymmetric cryptography |
US9736154B2 (en) | 2014-09-16 | 2017-08-15 | Nok Nok Labs, Inc. | System and method for integrating an authentication service within a network architecture |
US10135801B2 (en) * | 2015-09-09 | 2018-11-20 | Oath Inc. | On-line account recovery |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10237070B2 (en) | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US10091195B2 (en) | 2016-12-31 | 2018-10-02 | Nok Nok Labs, Inc. | System and method for bootstrapping a user binding |
US10819696B2 (en) * | 2017-07-13 | 2020-10-27 | Microsoft Technology Licensing, Llc | Key attestation statement generation providing device anonymity |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US12041039B2 (en) | 2019-02-28 | 2024-07-16 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
CN118427808A (zh) * | 2019-08-13 | 2024-08-02 | 谷歌有限责任公司 | 用可信代码证明令牌改善数据完整性的方法、系统和介质 |
AU2020260456B2 (en) | 2020-02-06 | 2021-12-23 | Google, Llc | Verifying display of third party content at a client device |
EP3887981B1 (en) * | 2020-02-06 | 2022-04-06 | Google LLC | Verifying user interactions on a content platform |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4805222A (en) * | 1985-12-23 | 1989-02-14 | International Bioaccess Systems Corporation | Method and apparatus for verifying an individual's identity |
US5745591A (en) * | 1995-12-29 | 1998-04-28 | Feldman; Stephen E. | System and method for verifying the identity of a person |
GB2319704B (en) * | 1996-11-15 | 2001-07-04 | Desktop Guardian Ltd | Data encryption technique |
US6292897B1 (en) * | 1997-11-03 | 2001-09-18 | International Business Machines Corporation | Undeniable certificates for digital signature verification |
US6195698B1 (en) * | 1998-04-13 | 2001-02-27 | Compaq Computer Corporation | Method for selectively restricting access to computer systems |
EP1055989A1 (en) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | System for digitally signing a document |
FI19992197A (fi) * | 1999-10-12 | 2001-04-30 | Sonera Oyj | Varmenteiden jakelu |
WO2003050799A1 (en) * | 2001-12-12 | 2003-06-19 | International Business Machines Corporation | Method and system for non-intrusive speaker verification using behavior models |
JP4496608B2 (ja) * | 2000-04-04 | 2010-07-07 | ソニー株式会社 | 情報処理システム |
US6732101B1 (en) * | 2000-06-15 | 2004-05-04 | Zix Corporation | Secure message forwarding system detecting user's preferences including security preferences |
JP2002032142A (ja) * | 2000-07-13 | 2002-01-31 | Hitachi Ltd | マウスを用いた本人認証方式 |
GB2382419B (en) * | 2001-11-22 | 2005-12-14 | Hewlett Packard Co | Apparatus and method for creating a trusted environment |
US7231657B2 (en) * | 2002-02-14 | 2007-06-12 | American Management Systems, Inc. | User authentication system and methods thereof |
WO2003069491A1 (fr) * | 2002-02-15 | 2003-08-21 | Science Park Corporation | Procede d'authentification faisant appel a une caracteristique d'entree d'unite d'entree d'ordinateur, son programme et support enregistre de programme associe |
US8046832B2 (en) | 2002-06-26 | 2011-10-25 | Microsoft Corporation | Spam detector with challenges |
US7139916B2 (en) * | 2002-06-28 | 2006-11-21 | Ebay, Inc. | Method and system for monitoring user interaction with a computer |
JP2004102352A (ja) * | 2002-09-04 | 2004-04-02 | Ntt Docomo Inc | 電子メールシステム、及び、電子メール送受信方法 |
US7010565B2 (en) * | 2002-09-30 | 2006-03-07 | Sampson Scott E | Communication management using a token action log |
US7149801B2 (en) * | 2002-11-08 | 2006-12-12 | Microsoft Corporation | Memory bound functions for spam deterrence and the like |
-
2004
- 2004-06-15 US US10/868,116 patent/US20050278253A1/en not_active Abandoned
-
2005
- 2005-04-11 KR KR1020050030008A patent/KR101122924B1/ko active IP Right Grant
- 2005-04-15 TW TW094112102A patent/TWI372550B/zh active
- 2005-04-27 RU RU2005112779/02A patent/RU2372648C2/ru active
- 2005-05-02 CA CA2506155A patent/CA2506155C/en not_active Expired - Fee Related
- 2005-05-09 AU AU2005201956A patent/AU2005201956B2/en not_active Ceased
- 2005-05-10 BR BR0501800-5A patent/BRPI0501800A/pt not_active Application Discontinuation
- 2005-05-13 CN CN2005100714125A patent/CN1713197B/zh not_active Expired - Fee Related
- 2005-05-13 ZA ZA200503866A patent/ZA200503866B/en unknown
- 2005-05-16 MY MYPI20052198A patent/MY144418A/en unknown
- 2005-05-16 MX MXPA05005250A patent/MXPA05005250A/es active IP Right Grant
- 2005-06-01 JP JP2005161388A patent/JP4718903B2/ja active Active
- 2005-06-02 EP EP05104770A patent/EP1607826B1/en not_active Not-in-force
-
2006
- 2006-06-13 HK HK06106741.3A patent/HK1086902A1/xx not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
TWI372550B (en) | 2012-09-11 |
CN1713197B (zh) | 2013-05-29 |
EP1607826A3 (en) | 2010-07-28 |
MXPA05005250A (es) | 2005-12-19 |
BRPI0501800A (pt) | 2006-01-24 |
KR101122924B1 (ko) | 2012-03-21 |
HK1086902A1 (en) | 2006-09-29 |
CA2506155C (en) | 2014-02-04 |
JP4718903B2 (ja) | 2011-07-06 |
EP1607826A2 (en) | 2005-12-21 |
US20050278253A1 (en) | 2005-12-15 |
KR20060045583A (ko) | 2006-05-17 |
TW200620948A (en) | 2006-06-16 |
MY144418A (en) | 2011-09-15 |
EP1607826B1 (en) | 2012-12-12 |
CA2506155A1 (en) | 2005-12-15 |
RU2372648C2 (ru) | 2009-11-10 |
AU2005201956A1 (en) | 2006-01-05 |
JP2006005921A (ja) | 2006-01-05 |
CN1713197A (zh) | 2005-12-28 |
AU2005201956B2 (en) | 2010-07-01 |
RU2005112779A (ru) | 2006-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2506155C (en) | Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like | |
US8185740B2 (en) | Consumer computer health validation | |
JP4219561B2 (ja) | 信頼できる計算プラットフォームのためのスマートカード・ユーザインターフェイス | |
EP2043019B1 (en) | Software publisher trust extension application | |
JP5185820B2 (ja) | 安全なマシンカウント | |
US7194623B1 (en) | Data event logging in computing platform | |
US7747531B2 (en) | Method and system for delivery of secure software license information | |
US7742992B2 (en) | Delivery of a secure software license for a software product and a toolset for creating the software product | |
US7337324B2 (en) | System and method for non-interactive human answerable challenges | |
TW313642B (en) | A uniform mechanism for using signed content | |
US8370899B2 (en) | Disposable browser for commercial banking | |
US8533801B2 (en) | System and method for binding a subscription-based computing system to an internet service | |
US7730318B2 (en) | Integration of high-assurance features into an application through application factoring | |
WO2000073904A1 (en) | Data integrity monitoring in trusted computing entity | |
WO2004059428A2 (en) | Environment integrity assured transactions | |
US8250475B2 (en) | Managing icon integrity | |
WO2007016869A2 (en) | Systems and methods of enhanced e-commerce,virus detection and antiphishing | |
JP2004046590A (ja) | 契約書保管装置、システム及びその方法 | |
US20060010319A1 (en) | Method of communicating between applications which is intended to secure access to application data | |
Park et al. | Anti-spam approaches: analyses and comparisons | |
JP2006178560A (ja) | メールウィルスへの感染を防止するためのプログラム |