CA2576489A1 - System and method for validating a user of an account using a wireless device - Google Patents

System and method for validating a user of an account using a wireless device Download PDF

Info

Publication number
CA2576489A1
CA2576489A1 CA002576489A CA2576489A CA2576489A1 CA 2576489 A1 CA2576489 A1 CA 2576489A1 CA 002576489 A CA002576489 A CA 002576489A CA 2576489 A CA2576489 A CA 2576489A CA 2576489 A1 CA2576489 A1 CA 2576489A1
Authority
CA
Canada
Prior art keywords
user
authentication
restricted resource
network
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002576489A
Other languages
French (fr)
Other versions
CA2576489C (en
Inventor
Michael Hung
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BlackBerry Ltd
Original Assignee
Research in Motion Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Research in Motion Ltd filed Critical Research in Motion Ltd
Publication of CA2576489A1 publication Critical patent/CA2576489A1/en
Application granted granted Critical
Publication of CA2576489C publication Critical patent/CA2576489C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication

Abstract

The invention provides a system and method of authenticating a user to a network. For the method, it comprises: when the user at the device initiates a request for the restricted resource, the network receives the request and automatically initiates an authentication step relating to the user prior to providing the device access to the restricted resource, the authentication step including requesting a user account and a password;
processing an input stream from the device from the user in response to the authentication step, the input stream comprising account data and a password; comparing the input stream against account data associated with the restricted resource; if the input stream matches the account data, providing the device with access to the restricted resource; and when the user at the device initiates a request for a non-restricted resource, providing the device with access to the non-restricted resource automatically.

Claims (18)

1. A method for authenticating a user of a wireless device to a restricted resource provided through a network in wireless communication with said device, said method comprising:

when said user at said device initiates a request for said restricted resource, said network receives said request and automatically initiates an authentication step relating to said user prior to providing said device access to said restricted resource, said authentication step comprising requesting a user account and a password;

processing an input stream from said device from said user in response to said authentication step, said input stream comprising account data and a password;
comparing said input stream against account data associated with said restricted resource;
if said input stream matches said account data, providing said device with access to said restricted resource; and when said user at said device initiates a request for a non-restricted resource, providing said device with access to said non-restricted resource automatically.
2. The method as claimed in claim 1, wherein said authentication step comprises using a two-factor authentication technique to authenticate said user;

said device is associated with a network account in said network; and said non-restricted resource relates to a resource provided in said network.
3. The method as claimed in claim 2, wherein said two-factor authentication technique utilizes a validation code provided from said user through said device.
4. The method as claimed in claim 3, wherein said validation code is provided as part of said password.
5. The method as claimed in claim 3 or claim 4, further comprising requesting a validation code from said user through said device relating to said two-factor authentication technique when said input stream is not authenticated after a set number of authentication attempts.
6. The method as claimed in any one of claims 3 to 5, wherein said validation code periodically changes in a pattern known by said network; and changes in said code are provided to said user.
7. The method as claimed in any one of claims 1 to 6, wherein said access is time limited.
8. The method as claimed in any one of claims 1 to 7, wherein status information for said authentication attempt is provided to said wireless device to allow said device to provide status information to said user.
9. A system for authenticating a user of a wireless device making a request to access a restricted resource provided in a network in wireless communication with said device, said system comprising:

means for providing a non-restricted resource to said device automatically when said device requests said non-restricted resource;

means for controlling access to said restricted resource and initiating an authentication process for said user when said users initiates said request for said restricted resource;
and authentication means for accessing data of accounts and passwords associated with said restricted resource, said authentication system being configured to evaluate user account and password data provided by said user in response to account data requested by said second process, wherein said means for controlling access is configured to selectively provide said device with access to said restricted resource if said user account and password data matches records in said data of accounts and passwords.
10. The system as claimed in claim 9, wherein said authentication means is configured to utilize a two-factor authentication technique to authenticate said user;

said device is associated with network account in said network; and said non-restricted resource relates to a resource provided in said network.
11. The system as claimed in claim 10, wherein said authentication means is configured to utilize a two-factor authentication technique utilizing a validation code provided from said user through said device.
12. The system as claimed in claim 11, wherein said authentication system is configured to receive said validation code as part of said password.
13. The system as claimed in claim 11 or claim 12, wherein said authentication means is further configured to request a validation code from said user through said device relating to said two-factor authentication technique when said user is not authenticated after a set number of authentication attempts.
14. The system as claimed in any one of claims 11 to 13, wherein said authentication system is configured to periodically change said validation code in a pattern known by said authentication means; and to provide said changes in said code to said user.
15. The system as claimed in any one of claims 10 to 14, wherein said authentication system is configured to time limit said access.
16. The system as claimed in any one of claims 10 to 15, wherein said authentication system is configured to provide status information for an authentication attempt to said device to allow said device to provide status information to said user.
17. A computer program product for authenticating a user of a wireless device to a restricted resource provided through a network in wireless communication with said device, said computer program product comprising a computer readable medium embodying program code means which is executable in an authentication system for implementing the method of any one of claims 1 to 9.
18. A communication network comprising at least one wireless device and the authentication system of any one of claims 10 to 16.
CA2576489A 2006-02-01 2007-01-31 System and method for validating a user of an account using a wireless device Active CA2576489C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP06101165A EP1816821B1 (en) 2006-02-01 2006-02-01 System and method for validating a user of an account using a wireless device
EP06101165.6 2006-02-01
US11/344,176 US7975287B2 (en) 2006-02-01 2006-02-01 System and method for validating a user of an account using a wireless device

Publications (2)

Publication Number Publication Date
CA2576489A1 true CA2576489A1 (en) 2007-08-01
CA2576489C CA2576489C (en) 2012-01-10

Family

ID=42732727

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2576489A Active CA2576489C (en) 2006-02-01 2007-01-31 System and method for validating a user of an account using a wireless device

Country Status (4)

Country Link
US (3) US7975287B2 (en)
EP (1) EP1816821B1 (en)
AT (1) ATE510396T1 (en)
CA (1) CA2576489C (en)

Families Citing this family (111)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070016793A1 (en) * 2005-06-30 2007-01-18 Insko Matthew J System and method to determine a proxy login
US8201214B1 (en) 2005-09-30 2012-06-12 Apple Inc. Ad-hoc user account creation
CN100571136C (en) * 2006-04-11 2009-12-16 华为技术有限公司 Individual domain network reaches the wherein communication means of equipment
KR100753944B1 (en) * 2006-06-26 2007-08-31 삼성전자주식회사 Virtual wheel-like interface structure in mobile device having wheel input unit and method of entering letters using the same
WO2008034252A2 (en) * 2006-09-20 2008-03-27 Mobivox Corp. Method and system for triggering internet applications using messages
US8095974B2 (en) * 2007-02-23 2012-01-10 At&T Intellectual Property I, L.P. Methods, systems, and products for identity verification
US20080313726A1 (en) * 2007-06-14 2008-12-18 Richard Mervyn Gardner Integrated systems for simultaneous mutual authentication of database and user
JP5144157B2 (en) * 2007-07-25 2013-02-13 京セラ株式会社 Receiver
WO2009029296A1 (en) 2007-08-31 2009-03-05 At & T Mobility Ii Llc Enhanced messaging with language translation feature
US20090063978A1 (en) * 2007-09-05 2009-03-05 Sony Corporation Network status icon in navigable toolbar
CN101809581B (en) 2007-09-24 2014-12-10 苹果公司 Embedded authentication systems in an electronic device
US11190936B2 (en) * 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10181055B2 (en) * 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
US20090177892A1 (en) * 2008-01-09 2009-07-09 Microsoft Corporation Proximity authentication
US20090193507A1 (en) * 2008-01-28 2009-07-30 Wael Ibrahim Authentication messaging service
CA2734607C (en) * 2008-01-29 2013-06-04 Research In Motion Limited System and method for addressing a unique device from a common address book
US8631237B2 (en) 2008-04-25 2014-01-14 Microsoft Corporation Simplified login for mobile devices
WO2010002382A1 (en) * 2008-06-30 2010-01-07 At&T Mobility Ii Llc Call handling treatment for voicemail systems
JP5220924B2 (en) * 2008-07-18 2013-06-26 アブソリュート ソフトウェア コーポレイション Privacy management of tracked devices
NO20084135A (en) * 2008-09-30 2009-10-12 Rosberg System As Data unit and procedure for establishing a network connection
US8590021B2 (en) 2009-01-23 2013-11-19 Microsoft Corporation Passive security enforcement
US8789160B2 (en) * 2009-03-06 2014-07-22 At&T Intellectual Property I, L.P. Function-based authorization to access electronic devices
US8656473B2 (en) * 2009-05-14 2014-02-18 Microsoft Corporation Linking web identity and access to devices
US20110018692A1 (en) * 2009-05-28 2011-01-27 Patrick Smith Methods and Systems for Validating Code from a Wireless Device
US20110078779A1 (en) * 2009-09-25 2011-03-31 Song Liu Anonymous Preservation of a Relationship and Its Application in Account System Management
US8601532B2 (en) * 2009-09-30 2013-12-03 Imation Corp. Method and system for provisioning portable desktops
US8555376B2 (en) * 2009-09-30 2013-10-08 Imation Corp. Method and system for supporting portable desktop with enhanced functionality
US8516236B2 (en) 2009-09-30 2013-08-20 Imation Corp. Portable desktop device and method of host computer system hardware recognition and configuration
US8266350B2 (en) * 2009-09-30 2012-09-11 Imation Corp. Method and system for supporting portable desktop
WO2011057409A1 (en) 2009-11-13 2011-05-19 Memory Experts International Inc. Device and method for verifying connectivity
CN105072088A (en) * 2010-01-22 2015-11-18 交互数字专利控股公司 Method and apparatus for trusted federated identity management and data access authorization
US9021562B1 (en) * 2010-02-26 2015-04-28 United Services Automobile Association Systems and methods for secure logon
US20110307831A1 (en) * 2010-06-10 2011-12-15 Microsoft Corporation User-Controlled Application Access to Resources
US9667423B2 (en) 2010-09-27 2017-05-30 Nokia Technologies Oy Method and apparatus for accelerated authentication
US8260931B2 (en) * 2010-10-02 2012-09-04 Synopsys, Inc. Secure provisioning of resources in cloud infrastructure
EP2710562A1 (en) 2011-05-02 2014-03-26 Apigy Inc. Systems and methods for controlling a locking mechanism using a portable electronic device
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US9069947B2 (en) 2011-09-29 2015-06-30 Oracle International Corporation Privileged account manager, access management
US10225264B2 (en) 2011-10-25 2019-03-05 Salesforce.Com, Inc. Automated authorization response techniques
US10225242B2 (en) 2011-10-25 2019-03-05 Salesforce.Com, Inc. Automated authorization response techniques
EP2772078B1 (en) * 2011-10-25 2018-02-21 Salesforce.Com, Inc. Two-factor authentication systems and methods
US9210150B2 (en) 2011-10-25 2015-12-08 Salesforce.Com, Inc. Two-factor authentication systems and methods
US10212588B2 (en) 2011-10-25 2019-02-19 Salesforce.Com, Inc. Preemptive authorization automation
US10504164B2 (en) * 2012-09-12 2019-12-10 Oracle International Corporation Self-service account enrollment system
US9191386B1 (en) * 2012-12-17 2015-11-17 Emc Corporation Authentication using one-time passcode and predefined swipe pattern
US8875229B2 (en) * 2012-12-21 2014-10-28 International Business Machines Corporation Quantifying risk based on relationships and applying protections based on business rules
WO2014143776A2 (en) 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Providing remote interactions with host device using a wireless device
US9237144B2 (en) * 2013-04-18 2016-01-12 Tencent Technology (Shenzhen) Company Limited Method, device and system for verifying based on verification diagram, and storage medium
US10057250B2 (en) 2013-05-14 2018-08-21 Kara Partners Llc Technologies for enhancing computer security
US10594687B2 (en) * 2013-05-14 2020-03-17 Kara Partners Llc Technologies for enhancing computer security
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9787657B2 (en) 2013-09-19 2017-10-10 Oracle International Corporation Privileged account plug-in framework—usage policies
US9432358B2 (en) * 2013-10-31 2016-08-30 Tencent Technology (Shenzhen) Company Limited System and method of authenticating user account login request messages
US9817987B2 (en) 2013-12-23 2017-11-14 Dropbox, Inc. Restricting access to content
US9602545B2 (en) 2014-01-13 2017-03-21 Oracle International Corporation Access policy management using identified roles
US10251059B2 (en) * 2014-01-21 2019-04-02 Everykey Inc. Authentication device and method
JP6127996B2 (en) * 2014-01-31 2017-05-17 株式会社Jvcケンウッド Terminal device, management device, communication system, program, communication method
US9311463B2 (en) * 2014-02-27 2016-04-12 International Business Machines Corporation Multi-level password authorization
US9348989B2 (en) * 2014-03-06 2016-05-24 International Business Machines Corporation Contemporaneous gesture and keyboard entry authentication
JP6201835B2 (en) * 2014-03-14 2017-09-27 ソニー株式会社 Information processing apparatus, information processing method, and computer program
US10043185B2 (en) 2014-05-29 2018-08-07 Apple Inc. User interface for payments
US9990129B2 (en) 2014-05-30 2018-06-05 Apple Inc. Continuity of application across devices
US9967401B2 (en) 2014-05-30 2018-05-08 Apple Inc. User interface for phone call routing among devices
US9264419B1 (en) * 2014-06-26 2016-02-16 Amazon Technologies, Inc. Two factor authentication with authentication objects
US9491155B1 (en) * 2014-08-13 2016-11-08 Amazon Technologies, Inc. Account generation based on external credentials
US10339293B2 (en) 2014-08-15 2019-07-02 Apple Inc. Authenticated device used to unlock another device
CN110351339B (en) 2014-08-21 2022-05-27 创新先进技术有限公司 Service processing method and device and server
US9560050B2 (en) * 2014-09-08 2017-01-31 At&T Intellectual Property I, L.P System and method to share a resource or a capability of a device
US9641529B2 (en) * 2014-11-10 2017-05-02 Coastal Federal Credit Union Methods, systems and computer program products for an application execution container for managing secondary application protocols
DE102015006751A1 (en) * 2015-05-26 2016-12-01 Giesecke & Devrient Gmbh Method for providing a personal identification code of a security module
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
US10621581B2 (en) 2016-06-11 2020-04-14 Apple Inc. User interface for transactions
DK201670622A1 (en) 2016-06-12 2018-02-12 Apple Inc User interfaces for transactions
US11157641B2 (en) * 2016-07-01 2021-10-26 Microsoft Technology Licensing, Llc Short-circuit data access
US20180068313A1 (en) 2016-09-06 2018-03-08 Apple Inc. User interfaces for stored-value accounts
US10496808B2 (en) 2016-10-25 2019-12-03 Apple Inc. User interface for managing access to credentials for use in an operation
US10992795B2 (en) 2017-05-16 2021-04-27 Apple Inc. Methods and interfaces for home media control
US11431836B2 (en) 2017-05-02 2022-08-30 Apple Inc. Methods and interfaces for initiating media playback
CN111343060B (en) 2017-05-16 2022-02-11 苹果公司 Method and interface for home media control
US20220279063A1 (en) 2017-05-16 2022-09-01 Apple Inc. Methods and interfaces for home media control
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
CA3071616A1 (en) 2017-08-01 2019-02-07 The Chamberlain Group, Inc. System for facilitating access to a secured area
US11032272B2 (en) * 2017-08-14 2021-06-08 Zumigo, Inc. Mobile number verification for mobile network-based authentication
KR102301599B1 (en) 2017-09-09 2021-09-10 애플 인크. Implementation of biometric authentication
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
US10674427B2 (en) * 2018-05-01 2020-06-02 GM Global Technology Operations LLC System and method to select and operate a mobile device through a telematics unit
US11507711B2 (en) 2018-05-18 2022-11-22 Dollypup Productions, Llc. Customizable virtual 3-dimensional kitchen components
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
CN109271766B (en) * 2018-10-15 2021-06-25 意盛(北京)科技有限责任公司 Identity verification method and system based on program interaction
US10623961B1 (en) * 2018-12-11 2020-04-14 Zumigo, Inc. Using a change in information associated with a mobile device network ID as a risk indicator in mobile network-based authentication
US10560845B1 (en) * 2018-12-11 2020-02-11 Zumigo, Inc. Using a change in information and cellular account attributes associated with a mobile device network ID as risk indicators in mobile network-based authentication
US11171949B2 (en) 2019-01-09 2021-11-09 EMC IP Holding Company LLC Generating authentication information utilizing linear feedback shift registers
US10951412B2 (en) 2019-01-16 2021-03-16 Rsa Security Llc Cryptographic device with administrative access interface utilizing event-based one-time passcodes
US11165571B2 (en) 2019-01-25 2021-11-02 EMC IP Holding Company LLC Transmitting authentication data over an audio channel
US11575671B2 (en) * 2019-01-30 2023-02-07 Zumigo, Inc. Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication
US11743265B2 (en) 2019-03-24 2023-08-29 Zero Networks Ltd. Method and system for delegating control in network connection access rules using multi-factor authentication (MFA)
US11012433B2 (en) * 2019-03-24 2021-05-18 Zero Networks Ltd. Method and system for modifying network connection access rules using multi-factor authentication (MFA)
KR20220027295A (en) 2019-05-31 2022-03-07 애플 인크. User interfaces for audio media control
US11010121B2 (en) 2019-05-31 2021-05-18 Apple Inc. User interfaces for audio media control
JP7344703B2 (en) * 2019-08-02 2023-09-14 キヤノン株式会社 Control device and its control method and program
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
US11392291B2 (en) 2020-09-25 2022-07-19 Apple Inc. Methods and interfaces for media control with dynamic feedback
US11651066B2 (en) 2021-01-07 2023-05-16 EMC IP Holding Company LLC Secure token-based communications between a host device and a storage system
US11847378B2 (en) 2021-06-06 2023-12-19 Apple Inc. User interfaces for audio routing
US11784956B2 (en) 2021-09-20 2023-10-10 Apple Inc. Requests to add assets to an asset account
US11477654B1 (en) * 2022-05-31 2022-10-18 Starlogik Ip Llc Access controlling network architectures and systems, having cellular network components and elements modified to host access controlling schemas designed to transform and/or facilitate cellular communication signals in accordance with novel cellular communications protocols with multi-part multi-functional address signaling, and methods for use thereof

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5768373A (en) * 1996-05-06 1998-06-16 Symantec Corporation Method for providing a secure non-reusable one-time password
JP4026944B2 (en) * 1998-08-06 2007-12-26 キヤノン株式会社 Video transmission device and control method thereof
GB2349244A (en) * 1999-04-22 2000-10-25 Visage Developments Limited Providing network access to restricted resources
US7058817B1 (en) * 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
EP1208715A1 (en) 1999-08-31 2002-05-29 TELEFONAKTIEBOLAGET L M ERICSSON (publ) Gsm security for packet data networks
US7140036B2 (en) * 2000-03-06 2006-11-21 Cardinalcommerce Corporation Centralized identity authentication for electronic communication networks
US6877095B1 (en) * 2000-03-09 2005-04-05 Microsoft Corporation Session-state manager
US6785901B1 (en) * 2000-05-19 2004-08-31 Webtv Networks, Inc. Altering locks on programming content
US7134137B2 (en) * 2000-07-10 2006-11-07 Oracle International Corporation Providing data to applications from an access system
US7080077B2 (en) * 2000-07-10 2006-07-18 Oracle International Corporation Localized access
US7600128B2 (en) * 2001-02-14 2009-10-06 5Th Fleet, Llc Two-factor computer password client device, system, and method
DE10111493B4 (en) * 2001-03-09 2005-05-25 Siemens Ag Method and device for setting up a connection between a mobile terminal and a network server via a mobile radio network and another network (Internet)
US7240339B2 (en) * 2001-04-19 2007-07-03 International Business Machines Corporation Syntax checker with real-time feedback
US7373515B2 (en) * 2001-10-09 2008-05-13 Wireless Key Identification Systems, Inc. Multi-factor authentication system
US7676829B1 (en) * 2001-10-30 2010-03-09 Microsoft Corporation Multiple credentials in a distributed system
KR20040075380A (en) * 2003-02-20 2004-08-30 삼성전자주식회사 Method for encrypting data of access VPN
US20040225880A1 (en) * 2003-05-07 2004-11-11 Authenture, Inc. Strong authentication systems built on combinations of "what user knows" authentication factors
KR100581590B1 (en) 2003-06-27 2006-05-22 주식회사 케이티 Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
WO2005107137A2 (en) * 2004-04-23 2005-11-10 Passmark Security, Inc. Method and apparatus for authenticating users using two or more factors
US7640574B1 (en) * 2004-06-02 2009-12-29 Sun Microsystems, Inc. Method and system for resource based authentication
US20060021004A1 (en) * 2004-07-21 2006-01-26 International Business Machines Corporation Method and system for externalized HTTP authentication
US20060122955A1 (en) * 2004-12-02 2006-06-08 Alex Bethlehem System and method for launching a resource in a network
US7555655B2 (en) * 2004-12-22 2009-06-30 5th Fleet, L.L.C. Apparatus, system, and method for generating and authenticating a computer password
US20070022301A1 (en) * 2005-07-19 2007-01-25 Intelligent Voice Research, Llc System and method for highly reliable multi-factor authentication
US20070033649A1 (en) * 2005-07-20 2007-02-08 Booleansoft Secure remote access technology

Also Published As

Publication number Publication date
CA2576489C (en) 2012-01-10
EP1816821B1 (en) 2011-05-18
EP1816821A1 (en) 2007-08-08
US7975287B2 (en) 2011-07-05
US20140250504A1 (en) 2014-09-04
US9125056B2 (en) 2015-09-01
ATE510396T1 (en) 2011-06-15
US20070180504A1 (en) 2007-08-02
US8683550B2 (en) 2014-03-25
US20110231914A1 (en) 2011-09-22

Similar Documents

Publication Publication Date Title
CA2576489A1 (en) System and method for validating a user of an account using a wireless device
US9032498B1 (en) Method for changing authentication for a legacy access interface
EP2875464B1 (en) Systems and methods of using a temporary private key between two devices
CN102265255B (en) Method and system for providing a federated authentication service with gradual expiration of credentials
CN108810021B (en) Query system and method for determining verification function
EP3839720B1 (en) Mobile credential revocation
US9306754B2 (en) System and method for implementing transaction signing within an authentication framework
US9172687B2 (en) Query system and method to determine authentication capabilities
US9083689B2 (en) System and method for implementing privacy classes within an authentication framework
US11709921B1 (en) Quick-logon for computing device
US10044700B2 (en) Identity attestation of a minor via a parent
WO2006118829A3 (en) Preventing fraudulent internet account access
JP7318108B2 (en) Method and system for authenticating secure credential transfer to a device
WO2014151556A1 (en) Systems and methods for using imaging to authenticate online users
US20110289567A1 (en) Service access control
CN101515932A (en) Method and system for accessing Web service safely
US8504824B1 (en) One-time rotating key for third-party authentication
US20110121943A1 (en) Biometric remote control device and methods and computer program product for operating the same
CN101986598B (en) Authentication method, server and system
US11356261B2 (en) Apparatus and methods for secure access to remote content
JP2013541908A (en) User account recovery
AU2022203673A1 (en) System of Device Authentication
KR20240023589A (en) Cross authentication method and system between online service server and client
EP2165458A1 (en) Identity assertion
CN103428191A (en) Single sign on method based on combination of CAS framework and fingerprint

Legal Events

Date Code Title Description
EEER Examination request