ZA200704882B - Authentication methods and systems - Google Patents
Authentication methods and systemsInfo
- Publication number
- ZA200704882B ZA200704882B ZA200704882A ZA200704882A ZA200704882B ZA 200704882 B ZA200704882 B ZA 200704882B ZA 200704882 A ZA200704882 A ZA 200704882A ZA 200704882 A ZA200704882 A ZA 200704882A ZA 200704882 B ZA200704882 B ZA 200704882B
- Authority
- ZA
- South Africa
- Prior art keywords
- systems
- authentication methods
- authentication
- methods
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3227—Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
- G06Q20/3263—Payment applications installed on the mobile devices characterised by activation or deactivation of payment capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
- G06Q20/3265—Payment applications installed on the mobile devices characterised by personalisation for use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NZ547903A NZ547903A (en) | 2006-06-14 | 2006-06-14 | A method of generating an authentication token and a method of authenticating an online transaction |
Publications (1)
Publication Number | Publication Date |
---|---|
ZA200704882B true ZA200704882B (en) | 2009-09-30 |
Family
ID=40032394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ZA200704882A ZA200704882B (en) | 2006-06-14 | 2007-06-14 | Authentication methods and systems |
Country Status (11)
Country | Link |
---|---|
US (1) | US20090300738A1 (fr) |
EP (1) | EP2027668A2 (fr) |
JP (1) | JP2009540458A (fr) |
KR (1) | KR20090025292A (fr) |
CN (1) | CN101438531A (fr) |
AP (1) | AP2009004744A0 (fr) |
AU (1) | AU2007259489A1 (fr) |
CA (1) | CA2649684A1 (fr) |
NZ (1) | NZ547903A (fr) |
WO (1) | WO2007145540A2 (fr) |
ZA (1) | ZA200704882B (fr) |
Families Citing this family (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE0300670L (sv) * | 2003-03-10 | 2004-08-17 | Smarttrust Ab | Förfarande för säker nedladdning av applikationer |
JP4837667B2 (ja) * | 2005-08-30 | 2011-12-14 | パスロジ株式会社 | サイト確認方法 |
US8533821B2 (en) | 2007-05-25 | 2013-09-10 | International Business Machines Corporation | Detecting and defending against man-in-the-middle attacks |
EP2168085A2 (fr) * | 2007-06-20 | 2010-03-31 | Mchek India Payment Systems PVT. LTD. | Procédé et système pour authentification sécurisée |
US8875259B2 (en) * | 2007-11-15 | 2014-10-28 | Salesforce.Com, Inc. | On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service |
US8782759B2 (en) * | 2008-02-11 | 2014-07-15 | International Business Machines Corporation | Identification and access control of users in a disconnected mode environment |
US8209744B2 (en) | 2008-05-16 | 2012-06-26 | Microsoft Corporation | Mobile device assisted secure computer network communication |
US10706402B2 (en) | 2008-09-22 | 2020-07-07 | Visa International Service Association | Over the air update of payment transaction data stored in secure memory |
US20100217709A1 (en) | 2008-09-22 | 2010-08-26 | Christian Aabye | Apparatus and method for preventing unauthorized access to payment application installed in contactless payment device |
US8977567B2 (en) * | 2008-09-22 | 2015-03-10 | Visa International Service Association | Recordation of electronic payment transaction information |
US9824355B2 (en) | 2008-09-22 | 2017-11-21 | Visa International Service Association | Method of performing transactions with contactless payment devices using pre-tap and two-tap operations |
US9443084B2 (en) | 2008-11-03 | 2016-09-13 | Microsoft Technology Licensing, Llc | Authentication in a network using client health enforcement framework |
NO332479B1 (no) * | 2009-03-02 | 2012-09-24 | Encap As | Fremgangsmåte og dataprogram for verifikasjon av engangspassord mellom tjener og mobil anordning med bruk av flere kanaler |
KR101069059B1 (ko) * | 2009-03-25 | 2011-09-29 | 주식회사 케이티 | 검증 코드를 이용하여 상담 검증을 수행하는 방법 |
US20100269162A1 (en) | 2009-04-15 | 2010-10-21 | Jose Bravo | Website authentication |
KR101033337B1 (ko) * | 2009-04-30 | 2011-05-09 | (주)라람인터랙티브 | 단말기 사용자의 본인확인을 강화한 보안 인증방법 |
DE102009036706C5 (de) * | 2009-08-08 | 2017-04-13 | Friedrich Kisters | Sicherheitselement mit einer elektronischen Anzeigevorrichtung zur Darstellung von sicherheitsrelevanten Informationen oder Mustern, seine Verwendung als Bestandteil einer elektronischen Telekommunikationseinrichtung sowie ein Verfahren zur Kennzeichnung, Identifikation oder Authentifikation von Gegenständen oder Lebewesen |
KR101690025B1 (ko) | 2009-11-09 | 2016-12-27 | 삼성전자주식회사 | 무선통신 단말기에서 애드혹 연결을 위한 페어링 방법 및 장치 |
US20110208599A1 (en) * | 2009-11-16 | 2011-08-25 | Zeenook, Inc. | Mobile marketing and targeted content delivery to mobile devices |
US8683609B2 (en) | 2009-12-04 | 2014-03-25 | International Business Machines Corporation | Mobile phone and IP address correlation service |
US8997196B2 (en) | 2010-06-14 | 2015-03-31 | Microsoft Corporation | Flexible end-point compliance and strong authentication for distributed hybrid enterprises |
US8560837B1 (en) * | 2010-06-30 | 2013-10-15 | Emc Corporation | Automatically estimating clock offset |
SE535575C2 (sv) * | 2010-11-24 | 2012-10-02 | Exformation Comm Ab | Metod för säker verifiering av elektroniska transaktioner |
EP2643955B1 (fr) * | 2010-11-24 | 2016-08-10 | Telefónica, S.A. | Procédés pour autoriser l'accès à un contenu protégé |
EP2678799B1 (fr) * | 2011-02-25 | 2018-04-11 | Vasco Data Security International GmbH | Procédé et appareil permettant de coder et de décoder des données transmises à un jeton d'authentification |
US8838988B2 (en) | 2011-04-12 | 2014-09-16 | International Business Machines Corporation | Verification of transactional integrity |
CN103477372A (zh) * | 2011-04-18 | 2013-12-25 | 埃戈耐克塞斯有限公司 | 数字令牌生成器、用于记录数字令牌的服务器和用于发布数字令牌的方法 |
US9792593B2 (en) | 2011-11-23 | 2017-10-17 | The Toronto-Dominion Bank | System and method for processing an online transaction request |
US9118662B2 (en) * | 2011-12-27 | 2015-08-25 | Intel Corporation | Method and system for distributed off-line logon using one-time passwords |
US20140229388A1 (en) * | 2012-04-18 | 2014-08-14 | Edgard Lobo Baptista Pereira | System and Method for Data and Identity Verification and Authentication |
US8639619B1 (en) | 2012-07-13 | 2014-01-28 | Scvngr, Inc. | Secure payment method and system |
US8917826B2 (en) | 2012-07-31 | 2014-12-23 | International Business Machines Corporation | Detecting man-in-the-middle attacks in electronic transactions using prompts |
WO2014106149A1 (fr) * | 2012-12-31 | 2014-07-03 | Safelylocked, Llc | Techniques pour valider des applications cryptographiques |
US9270649B1 (en) * | 2013-03-11 | 2016-02-23 | Emc Corporation | Secure software authenticator data transfer between processing devices |
US9130753B1 (en) * | 2013-03-14 | 2015-09-08 | Emc Corporation | Authentication using security device with electronic interface |
US8770478B2 (en) | 2013-07-11 | 2014-07-08 | Scvngr, Inc. | Payment processing with automatic no-touch mode selection |
US9148284B2 (en) * | 2014-01-14 | 2015-09-29 | Bjoern Pirrwitz | Identification and/or authentication method |
US9922318B2 (en) | 2014-01-27 | 2018-03-20 | Capital One Services, Llc | Systems and methods for providing transaction tokens for mobile devices |
US20150248676A1 (en) * | 2014-02-28 | 2015-09-03 | Sathish Vaidyanathan | Touchless signature |
CN103957104A (zh) * | 2014-04-22 | 2014-07-30 | 交通银行股份有限公司 | 动态令牌防钓鱼方法及装置 |
JP5959070B2 (ja) * | 2014-07-30 | 2016-08-02 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 情報処理装置、端末、プログラム及び方法 |
GB201419016D0 (en) * | 2014-10-24 | 2014-12-10 | Visa Europe Ltd | Transaction Messaging |
FR3028639B1 (fr) * | 2014-11-17 | 2016-12-23 | Oberthur Technologies | Procede de securisation d'un jeton de paiement |
US10218510B2 (en) | 2015-06-01 | 2019-02-26 | Branch Banking And Trust Company | Network-based device authentication system |
US9942217B2 (en) | 2015-06-03 | 2018-04-10 | At&T Intellectual Property I, L.P. | System and method for generating a service provider based secure token |
CN105243318B (zh) * | 2015-08-28 | 2020-07-31 | 小米科技有限责任公司 | 确定用户设备控制权限的方法、装置及终端设备 |
US10122719B1 (en) * | 2015-12-31 | 2018-11-06 | Wells Fargo Bank, N.A. | Wearable device-based user authentication |
DE102016213104A1 (de) * | 2016-07-18 | 2018-01-18 | bitagentur GmbH & Co. KG | Token-basiertes Authentisieren mit signierter Nachricht |
FR3074944B1 (fr) * | 2017-12-08 | 2021-07-09 | Idemia Identity & Security France | Procede de securisation d'une transaction electronique |
US11720660B2 (en) | 2019-01-28 | 2023-08-08 | EMC IP Holding Company LLC | Temporary partial authentication value provisioning for offline authentication |
US11296874B2 (en) | 2019-07-31 | 2022-04-05 | Bank Of America Corporation | Smartwatch one-time password (“OTP”) generation |
US11451558B2 (en) * | 2020-03-16 | 2022-09-20 | The Boeing Company | Information system end user location detection technique |
US11259181B2 (en) * | 2020-07-09 | 2022-02-22 | Bank Of America Corporation | Biometric generate of a one-time password (“OTP”) on a smartwatch |
US12069149B2 (en) * | 2022-04-20 | 2024-08-20 | Red Hat, Inc. | Computing resource usage control using seed and token generation |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6779112B1 (en) * | 1999-11-05 | 2004-08-17 | Microsoft Corporation | Integrated circuit devices with steganographic authentication, and steganographic authentication methods |
US20020194499A1 (en) * | 2001-06-15 | 2002-12-19 | Audebert Yves Louis Gabriel | Method, system and apparatus for a portable transaction device |
US7966497B2 (en) * | 2002-02-15 | 2011-06-21 | Qualcomm Incorporated | System and method for acoustic two factor authentication |
GB2419016A (en) * | 2004-10-08 | 2006-04-12 | Arnon Speiser | Cellular authentication token |
US20060136739A1 (en) * | 2004-12-18 | 2006-06-22 | Christian Brock | Method and apparatus for generating one-time password on hand-held mobile device |
-
2006
- 2006-06-14 NZ NZ547903A patent/NZ547903A/en unknown
-
2007
- 2007-06-14 AU AU2007259489A patent/AU2007259489A1/en not_active Abandoned
- 2007-06-14 WO PCT/NZ2007/000155 patent/WO2007145540A2/fr active Application Filing
- 2007-06-14 EP EP07808653A patent/EP2027668A2/fr not_active Withdrawn
- 2007-06-14 CA CA002649684A patent/CA2649684A1/fr not_active Abandoned
- 2007-06-14 JP JP2009515329A patent/JP2009540458A/ja active Pending
- 2007-06-14 CN CNA200780016249XA patent/CN101438531A/zh active Pending
- 2007-06-14 US US12/085,777 patent/US20090300738A1/en not_active Abandoned
- 2007-06-14 AP AP2009004744A patent/AP2009004744A0/xx unknown
- 2007-06-14 ZA ZA200704882A patent/ZA200704882B/xx unknown
- 2007-06-14 KR KR1020087031829A patent/KR20090025292A/ko not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
AU2007259489A1 (en) | 2007-12-21 |
CA2649684A1 (fr) | 2007-12-21 |
KR20090025292A (ko) | 2009-03-10 |
JP2009540458A (ja) | 2009-11-19 |
NZ547903A (en) | 2008-03-28 |
EP2027668A2 (fr) | 2009-02-25 |
WO2007145540A2 (fr) | 2007-12-21 |
CN101438531A (zh) | 2009-05-20 |
US20090300738A1 (en) | 2009-12-03 |
WO2007145540A3 (fr) | 2008-03-06 |
AP2009004744A0 (en) | 2009-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AP2009004744A0 (en) | Authentication methods and systems | |
EP2074513A4 (fr) | Systèmes et procédés de vérification et d'authentification | |
EP1988485A4 (fr) | Système d'authentification distribuée et méthode d'authentification distribuée | |
EP2098007A4 (fr) | Procédés et systèmes d'authentification de cryptage distribué | |
EP2041913A4 (fr) | Système et procédé d'authentification | |
GB2434928B (en) | Generator systems and methods | |
ZA200906118B (en) | Descenting systems and methods | |
IL183385A0 (en) | Security systems and methods | |
EP2202913A4 (fr) | Système d'authentification d'utilisateur et son procédé | |
EP2074577A4 (fr) | Systèmes et procédés de paiement | |
EP2041714A4 (fr) | Système et procédé d'authentification de consommateur | |
GB201109817D0 (en) | System and method | |
EP1898333A4 (fr) | Systeme et procede d'authentification | |
EP2095561A4 (fr) | Procédés et systèmes de chiffrement distribués | |
EP2080311A4 (fr) | Système d'authentification de dispositif sûr, et procédé | |
PT1755062T (pt) | Métodos e sistemas para autenticação segura de utilizadores | |
GB0621189D0 (en) | Secure authentication and payment system | |
EP1965539A4 (fr) | Système d authentification et dispositif d authentification | |
EP2165302A4 (fr) | Systèmes et procédés d'identification sans carte | |
EP1989657A4 (fr) | Procedes et dispositifs permettant d'etablir une authentification et de dejouer une contrefacon | |
EP2227293A4 (fr) | Système et procédé de magnarétraction | |
GB0905005D0 (en) | Advisory systems and methods | |
GB0722370D0 (en) | Authentication system and method | |
IL213321A0 (en) | Descenting systems and methods | |
GB0603581D0 (en) | System and method for user authentication |