CA2576489A1 - System and method for validating a user of an account using a wireless device - Google Patents
System and method for validating a user of an account using a wireless device Download PDFInfo
- Publication number
- CA2576489A1 CA2576489A1 CA002576489A CA2576489A CA2576489A1 CA 2576489 A1 CA2576489 A1 CA 2576489A1 CA 002576489 A CA002576489 A CA 002576489A CA 2576489 A CA2576489 A CA 2576489A CA 2576489 A1 CA2576489 A1 CA 2576489A1
- Authority
- CA
- Canada
- Prior art keywords
- user
- authentication
- restricted resource
- network
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Abstract
The invention provides a system and method of authenticating a user to a network. For the method, it comprises: when the user at the device initiates a request for the restricted resource, the network receives the request and automatically initiates an authentication step relating to the user prior to providing the device access to the restricted resource, the authentication step including requesting a user account and a password;
processing an input stream from the device from the user in response to the authentication step, the input stream comprising account data and a password; comparing the input stream against account data associated with the restricted resource; if the input stream matches the account data, providing the device with access to the restricted resource; and when the user at the device initiates a request for a non-restricted resource, providing the device with access to the non-restricted resource automatically.
processing an input stream from the device from the user in response to the authentication step, the input stream comprising account data and a password; comparing the input stream against account data associated with the restricted resource; if the input stream matches the account data, providing the device with access to the restricted resource; and when the user at the device initiates a request for a non-restricted resource, providing the device with access to the non-restricted resource automatically.
Claims (18)
1. A method for authenticating a user of a wireless device to a restricted resource provided through a network in wireless communication with said device, said method comprising:
when said user at said device initiates a request for said restricted resource, said network receives said request and automatically initiates an authentication step relating to said user prior to providing said device access to said restricted resource, said authentication step comprising requesting a user account and a password;
processing an input stream from said device from said user in response to said authentication step, said input stream comprising account data and a password;
comparing said input stream against account data associated with said restricted resource;
if said input stream matches said account data, providing said device with access to said restricted resource; and when said user at said device initiates a request for a non-restricted resource, providing said device with access to said non-restricted resource automatically.
when said user at said device initiates a request for said restricted resource, said network receives said request and automatically initiates an authentication step relating to said user prior to providing said device access to said restricted resource, said authentication step comprising requesting a user account and a password;
processing an input stream from said device from said user in response to said authentication step, said input stream comprising account data and a password;
comparing said input stream against account data associated with said restricted resource;
if said input stream matches said account data, providing said device with access to said restricted resource; and when said user at said device initiates a request for a non-restricted resource, providing said device with access to said non-restricted resource automatically.
2. The method as claimed in claim 1, wherein said authentication step comprises using a two-factor authentication technique to authenticate said user;
said device is associated with a network account in said network; and said non-restricted resource relates to a resource provided in said network.
said device is associated with a network account in said network; and said non-restricted resource relates to a resource provided in said network.
3. The method as claimed in claim 2, wherein said two-factor authentication technique utilizes a validation code provided from said user through said device.
4. The method as claimed in claim 3, wherein said validation code is provided as part of said password.
5. The method as claimed in claim 3 or claim 4, further comprising requesting a validation code from said user through said device relating to said two-factor authentication technique when said input stream is not authenticated after a set number of authentication attempts.
6. The method as claimed in any one of claims 3 to 5, wherein said validation code periodically changes in a pattern known by said network; and changes in said code are provided to said user.
7. The method as claimed in any one of claims 1 to 6, wherein said access is time limited.
8. The method as claimed in any one of claims 1 to 7, wherein status information for said authentication attempt is provided to said wireless device to allow said device to provide status information to said user.
9. A system for authenticating a user of a wireless device making a request to access a restricted resource provided in a network in wireless communication with said device, said system comprising:
means for providing a non-restricted resource to said device automatically when said device requests said non-restricted resource;
means for controlling access to said restricted resource and initiating an authentication process for said user when said users initiates said request for said restricted resource;
and authentication means for accessing data of accounts and passwords associated with said restricted resource, said authentication system being configured to evaluate user account and password data provided by said user in response to account data requested by said second process, wherein said means for controlling access is configured to selectively provide said device with access to said restricted resource if said user account and password data matches records in said data of accounts and passwords.
means for providing a non-restricted resource to said device automatically when said device requests said non-restricted resource;
means for controlling access to said restricted resource and initiating an authentication process for said user when said users initiates said request for said restricted resource;
and authentication means for accessing data of accounts and passwords associated with said restricted resource, said authentication system being configured to evaluate user account and password data provided by said user in response to account data requested by said second process, wherein said means for controlling access is configured to selectively provide said device with access to said restricted resource if said user account and password data matches records in said data of accounts and passwords.
10. The system as claimed in claim 9, wherein said authentication means is configured to utilize a two-factor authentication technique to authenticate said user;
said device is associated with network account in said network; and said non-restricted resource relates to a resource provided in said network.
said device is associated with network account in said network; and said non-restricted resource relates to a resource provided in said network.
11. The system as claimed in claim 10, wherein said authentication means is configured to utilize a two-factor authentication technique utilizing a validation code provided from said user through said device.
12. The system as claimed in claim 11, wherein said authentication system is configured to receive said validation code as part of said password.
13. The system as claimed in claim 11 or claim 12, wherein said authentication means is further configured to request a validation code from said user through said device relating to said two-factor authentication technique when said user is not authenticated after a set number of authentication attempts.
14. The system as claimed in any one of claims 11 to 13, wherein said authentication system is configured to periodically change said validation code in a pattern known by said authentication means; and to provide said changes in said code to said user.
15. The system as claimed in any one of claims 10 to 14, wherein said authentication system is configured to time limit said access.
16. The system as claimed in any one of claims 10 to 15, wherein said authentication system is configured to provide status information for an authentication attempt to said device to allow said device to provide status information to said user.
17. A computer program product for authenticating a user of a wireless device to a restricted resource provided through a network in wireless communication with said device, said computer program product comprising a computer readable medium embodying program code means which is executable in an authentication system for implementing the method of any one of claims 1 to 9.
18. A communication network comprising at least one wireless device and the authentication system of any one of claims 10 to 16.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06101165A EP1816821B1 (en) | 2006-02-01 | 2006-02-01 | System and method for validating a user of an account using a wireless device |
EP06101165.6 | 2006-02-01 | ||
US11/344,176 US7975287B2 (en) | 2006-02-01 | 2006-02-01 | System and method for validating a user of an account using a wireless device |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2576489A1 true CA2576489A1 (en) | 2007-08-01 |
CA2576489C CA2576489C (en) | 2012-01-10 |
Family
ID=42732727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2576489A Active CA2576489C (en) | 2006-02-01 | 2007-01-31 | System and method for validating a user of an account using a wireless device |
Country Status (4)
Country | Link |
---|---|
US (3) | US7975287B2 (en) |
EP (1) | EP1816821B1 (en) |
AT (1) | ATE510396T1 (en) |
CA (1) | CA2576489C (en) |
Families Citing this family (111)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070016793A1 (en) * | 2005-06-30 | 2007-01-18 | Insko Matthew J | System and method to determine a proxy login |
US8201214B1 (en) | 2005-09-30 | 2012-06-12 | Apple Inc. | Ad-hoc user account creation |
CN100571136C (en) * | 2006-04-11 | 2009-12-16 | 华为技术有限公司 | Individual domain network reaches the wherein communication means of equipment |
KR100753944B1 (en) * | 2006-06-26 | 2007-08-31 | 삼성전자주식회사 | Virtual wheel-like interface structure in mobile device having wheel input unit and method of entering letters using the same |
WO2008034252A2 (en) * | 2006-09-20 | 2008-03-27 | Mobivox Corp. | Method and system for triggering internet applications using messages |
US8095974B2 (en) * | 2007-02-23 | 2012-01-10 | At&T Intellectual Property I, L.P. | Methods, systems, and products for identity verification |
US20080313726A1 (en) * | 2007-06-14 | 2008-12-18 | Richard Mervyn Gardner | Integrated systems for simultaneous mutual authentication of database and user |
JP5144157B2 (en) * | 2007-07-25 | 2013-02-13 | 京セラ株式会社 | Receiver |
WO2009029296A1 (en) | 2007-08-31 | 2009-03-05 | At & T Mobility Ii Llc | Enhanced messaging with language translation feature |
US20090063978A1 (en) * | 2007-09-05 | 2009-03-05 | Sony Corporation | Network status icon in navigable toolbar |
CN101809581B (en) | 2007-09-24 | 2014-12-10 | 苹果公司 | Embedded authentication systems in an electronic device |
US11190936B2 (en) * | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
US10783232B2 (en) | 2007-09-27 | 2020-09-22 | Clevx, Llc | Management system for self-encrypting managed devices with embedded wireless user authentication |
US10778417B2 (en) | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
US10181055B2 (en) * | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
US8600120B2 (en) | 2008-01-03 | 2013-12-03 | Apple Inc. | Personal computing device control using face detection and recognition |
US20090177892A1 (en) * | 2008-01-09 | 2009-07-09 | Microsoft Corporation | Proximity authentication |
US20090193507A1 (en) * | 2008-01-28 | 2009-07-30 | Wael Ibrahim | Authentication messaging service |
CA2734607C (en) * | 2008-01-29 | 2013-06-04 | Research In Motion Limited | System and method for addressing a unique device from a common address book |
US8631237B2 (en) | 2008-04-25 | 2014-01-14 | Microsoft Corporation | Simplified login for mobile devices |
WO2010002382A1 (en) * | 2008-06-30 | 2010-01-07 | At&T Mobility Ii Llc | Call handling treatment for voicemail systems |
JP5220924B2 (en) * | 2008-07-18 | 2013-06-26 | アブソリュート ソフトウェア コーポレイション | Privacy management of tracked devices |
NO20084135A (en) * | 2008-09-30 | 2009-10-12 | Rosberg System As | Data unit and procedure for establishing a network connection |
US8590021B2 (en) | 2009-01-23 | 2013-11-19 | Microsoft Corporation | Passive security enforcement |
US8789160B2 (en) * | 2009-03-06 | 2014-07-22 | At&T Intellectual Property I, L.P. | Function-based authorization to access electronic devices |
US8656473B2 (en) * | 2009-05-14 | 2014-02-18 | Microsoft Corporation | Linking web identity and access to devices |
US20110018692A1 (en) * | 2009-05-28 | 2011-01-27 | Patrick Smith | Methods and Systems for Validating Code from a Wireless Device |
US20110078779A1 (en) * | 2009-09-25 | 2011-03-31 | Song Liu | Anonymous Preservation of a Relationship and Its Application in Account System Management |
US8601532B2 (en) * | 2009-09-30 | 2013-12-03 | Imation Corp. | Method and system for provisioning portable desktops |
US8555376B2 (en) * | 2009-09-30 | 2013-10-08 | Imation Corp. | Method and system for supporting portable desktop with enhanced functionality |
US8516236B2 (en) | 2009-09-30 | 2013-08-20 | Imation Corp. | Portable desktop device and method of host computer system hardware recognition and configuration |
US8266350B2 (en) * | 2009-09-30 | 2012-09-11 | Imation Corp. | Method and system for supporting portable desktop |
WO2011057409A1 (en) | 2009-11-13 | 2011-05-19 | Memory Experts International Inc. | Device and method for verifying connectivity |
CN105072088A (en) * | 2010-01-22 | 2015-11-18 | 交互数字专利控股公司 | Method and apparatus for trusted federated identity management and data access authorization |
US9021562B1 (en) * | 2010-02-26 | 2015-04-28 | United Services Automobile Association | Systems and methods for secure logon |
US20110307831A1 (en) * | 2010-06-10 | 2011-12-15 | Microsoft Corporation | User-Controlled Application Access to Resources |
US9667423B2 (en) | 2010-09-27 | 2017-05-30 | Nokia Technologies Oy | Method and apparatus for accelerated authentication |
US8260931B2 (en) * | 2010-10-02 | 2012-09-04 | Synopsys, Inc. | Secure provisioning of resources in cloud infrastructure |
EP2710562A1 (en) | 2011-05-02 | 2014-03-26 | Apigy Inc. | Systems and methods for controlling a locking mechanism using a portable electronic device |
US9002322B2 (en) | 2011-09-29 | 2015-04-07 | Apple Inc. | Authentication with secondary approver |
US9069947B2 (en) | 2011-09-29 | 2015-06-30 | Oracle International Corporation | Privileged account manager, access management |
US10225264B2 (en) | 2011-10-25 | 2019-03-05 | Salesforce.Com, Inc. | Automated authorization response techniques |
US10225242B2 (en) | 2011-10-25 | 2019-03-05 | Salesforce.Com, Inc. | Automated authorization response techniques |
EP2772078B1 (en) * | 2011-10-25 | 2018-02-21 | Salesforce.Com, Inc. | Two-factor authentication systems and methods |
US9210150B2 (en) | 2011-10-25 | 2015-12-08 | Salesforce.Com, Inc. | Two-factor authentication systems and methods |
US10212588B2 (en) | 2011-10-25 | 2019-02-19 | Salesforce.Com, Inc. | Preemptive authorization automation |
US10504164B2 (en) * | 2012-09-12 | 2019-12-10 | Oracle International Corporation | Self-service account enrollment system |
US9191386B1 (en) * | 2012-12-17 | 2015-11-17 | Emc Corporation | Authentication using one-time passcode and predefined swipe pattern |
US8875229B2 (en) * | 2012-12-21 | 2014-10-28 | International Business Machines Corporation | Quantifying risk based on relationships and applying protections based on business rules |
WO2014143776A2 (en) | 2013-03-15 | 2014-09-18 | Bodhi Technology Ventures Llc | Providing remote interactions with host device using a wireless device |
US9237144B2 (en) * | 2013-04-18 | 2016-01-12 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for verifying based on verification diagram, and storage medium |
US10057250B2 (en) | 2013-05-14 | 2018-08-21 | Kara Partners Llc | Technologies for enhancing computer security |
US10594687B2 (en) * | 2013-05-14 | 2020-03-17 | Kara Partners Llc | Technologies for enhancing computer security |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US9787657B2 (en) | 2013-09-19 | 2017-10-10 | Oracle International Corporation | Privileged account plug-in framework—usage policies |
US9432358B2 (en) * | 2013-10-31 | 2016-08-30 | Tencent Technology (Shenzhen) Company Limited | System and method of authenticating user account login request messages |
US9817987B2 (en) | 2013-12-23 | 2017-11-14 | Dropbox, Inc. | Restricting access to content |
US9602545B2 (en) | 2014-01-13 | 2017-03-21 | Oracle International Corporation | Access policy management using identified roles |
US10251059B2 (en) * | 2014-01-21 | 2019-04-02 | Everykey Inc. | Authentication device and method |
JP6127996B2 (en) * | 2014-01-31 | 2017-05-17 | 株式会社Jvcケンウッド | Terminal device, management device, communication system, program, communication method |
US9311463B2 (en) * | 2014-02-27 | 2016-04-12 | International Business Machines Corporation | Multi-level password authorization |
US9348989B2 (en) * | 2014-03-06 | 2016-05-24 | International Business Machines Corporation | Contemporaneous gesture and keyboard entry authentication |
JP6201835B2 (en) * | 2014-03-14 | 2017-09-27 | ソニー株式会社 | Information processing apparatus, information processing method, and computer program |
US10043185B2 (en) | 2014-05-29 | 2018-08-07 | Apple Inc. | User interface for payments |
US9990129B2 (en) | 2014-05-30 | 2018-06-05 | Apple Inc. | Continuity of application across devices |
US9967401B2 (en) | 2014-05-30 | 2018-05-08 | Apple Inc. | User interface for phone call routing among devices |
US9264419B1 (en) * | 2014-06-26 | 2016-02-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
US9491155B1 (en) * | 2014-08-13 | 2016-11-08 | Amazon Technologies, Inc. | Account generation based on external credentials |
US10339293B2 (en) | 2014-08-15 | 2019-07-02 | Apple Inc. | Authenticated device used to unlock another device |
CN110351339B (en) | 2014-08-21 | 2022-05-27 | 创新先进技术有限公司 | Service processing method and device and server |
US9560050B2 (en) * | 2014-09-08 | 2017-01-31 | At&T Intellectual Property I, L.P | System and method to share a resource or a capability of a device |
US9641529B2 (en) * | 2014-11-10 | 2017-05-02 | Coastal Federal Credit Union | Methods, systems and computer program products for an application execution container for managing secondary application protocols |
DE102015006751A1 (en) * | 2015-05-26 | 2016-12-01 | Giesecke & Devrient Gmbh | Method for providing a personal identification code of a security module |
DK179186B1 (en) | 2016-05-19 | 2018-01-15 | Apple Inc | REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
DK201670622A1 (en) | 2016-06-12 | 2018-02-12 | Apple Inc | User interfaces for transactions |
US11157641B2 (en) * | 2016-07-01 | 2021-10-26 | Microsoft Technology Licensing, Llc | Short-circuit data access |
US20180068313A1 (en) | 2016-09-06 | 2018-03-08 | Apple Inc. | User interfaces for stored-value accounts |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10992795B2 (en) | 2017-05-16 | 2021-04-27 | Apple Inc. | Methods and interfaces for home media control |
US11431836B2 (en) | 2017-05-02 | 2022-08-30 | Apple Inc. | Methods and interfaces for initiating media playback |
CN111343060B (en) | 2017-05-16 | 2022-02-11 | 苹果公司 | Method and interface for home media control |
US20220279063A1 (en) | 2017-05-16 | 2022-09-01 | Apple Inc. | Methods and interfaces for home media control |
US11055942B2 (en) | 2017-08-01 | 2021-07-06 | The Chamberlain Group, Inc. | System and method for facilitating access to a secured area |
CA3071616A1 (en) | 2017-08-01 | 2019-02-07 | The Chamberlain Group, Inc. | System for facilitating access to a secured area |
US11032272B2 (en) * | 2017-08-14 | 2021-06-08 | Zumigo, Inc. | Mobile number verification for mobile network-based authentication |
KR102301599B1 (en) | 2017-09-09 | 2021-09-10 | 애플 인크. | Implementation of biometric authentication |
KR102185854B1 (en) | 2017-09-09 | 2020-12-02 | 애플 인크. | Implementation of biometric authentication |
US10674427B2 (en) * | 2018-05-01 | 2020-06-02 | GM Global Technology Operations LLC | System and method to select and operate a mobile device through a telematics unit |
US11507711B2 (en) | 2018-05-18 | 2022-11-22 | Dollypup Productions, Llc. | Customizable virtual 3-dimensional kitchen components |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
CN109271766B (en) * | 2018-10-15 | 2021-06-25 | 意盛(北京)科技有限责任公司 | Identity verification method and system based on program interaction |
US10623961B1 (en) * | 2018-12-11 | 2020-04-14 | Zumigo, Inc. | Using a change in information associated with a mobile device network ID as a risk indicator in mobile network-based authentication |
US10560845B1 (en) * | 2018-12-11 | 2020-02-11 | Zumigo, Inc. | Using a change in information and cellular account attributes associated with a mobile device network ID as risk indicators in mobile network-based authentication |
US11171949B2 (en) | 2019-01-09 | 2021-11-09 | EMC IP Holding Company LLC | Generating authentication information utilizing linear feedback shift registers |
US10951412B2 (en) | 2019-01-16 | 2021-03-16 | Rsa Security Llc | Cryptographic device with administrative access interface utilizing event-based one-time passcodes |
US11165571B2 (en) | 2019-01-25 | 2021-11-02 | EMC IP Holding Company LLC | Transmitting authentication data over an audio channel |
US11575671B2 (en) * | 2019-01-30 | 2023-02-07 | Zumigo, Inc. | Network ID device history and mobile account attributes used as a risk indicator in mobile network-based authentication |
US11743265B2 (en) | 2019-03-24 | 2023-08-29 | Zero Networks Ltd. | Method and system for delegating control in network connection access rules using multi-factor authentication (MFA) |
US11012433B2 (en) * | 2019-03-24 | 2021-05-18 | Zero Networks Ltd. | Method and system for modifying network connection access rules using multi-factor authentication (MFA) |
KR20220027295A (en) | 2019-05-31 | 2022-03-07 | 애플 인크. | User interfaces for audio media control |
US11010121B2 (en) | 2019-05-31 | 2021-05-18 | Apple Inc. | User interfaces for audio media control |
JP7344703B2 (en) * | 2019-08-02 | 2023-09-14 | キヤノン株式会社 | Control device and its control method and program |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11392291B2 (en) | 2020-09-25 | 2022-07-19 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US11651066B2 (en) | 2021-01-07 | 2023-05-16 | EMC IP Holding Company LLC | Secure token-based communications between a host device and a storage system |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11784956B2 (en) | 2021-09-20 | 2023-10-10 | Apple Inc. | Requests to add assets to an asset account |
US11477654B1 (en) * | 2022-05-31 | 2022-10-18 | Starlogik Ip Llc | Access controlling network architectures and systems, having cellular network components and elements modified to host access controlling schemas designed to transform and/or facilitate cellular communication signals in accordance with novel cellular communications protocols with multi-part multi-functional address signaling, and methods for use thereof |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5768373A (en) * | 1996-05-06 | 1998-06-16 | Symantec Corporation | Method for providing a secure non-reusable one-time password |
JP4026944B2 (en) * | 1998-08-06 | 2007-12-26 | キヤノン株式会社 | Video transmission device and control method thereof |
GB2349244A (en) * | 1999-04-22 | 2000-10-25 | Visage Developments Limited | Providing network access to restricted resources |
US7058817B1 (en) * | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
EP1208715A1 (en) | 1999-08-31 | 2002-05-29 | TELEFONAKTIEBOLAGET L M ERICSSON (publ) | Gsm security for packet data networks |
US7140036B2 (en) * | 2000-03-06 | 2006-11-21 | Cardinalcommerce Corporation | Centralized identity authentication for electronic communication networks |
US6877095B1 (en) * | 2000-03-09 | 2005-04-05 | Microsoft Corporation | Session-state manager |
US6785901B1 (en) * | 2000-05-19 | 2004-08-31 | Webtv Networks, Inc. | Altering locks on programming content |
US7134137B2 (en) * | 2000-07-10 | 2006-11-07 | Oracle International Corporation | Providing data to applications from an access system |
US7080077B2 (en) * | 2000-07-10 | 2006-07-18 | Oracle International Corporation | Localized access |
US7600128B2 (en) * | 2001-02-14 | 2009-10-06 | 5Th Fleet, Llc | Two-factor computer password client device, system, and method |
DE10111493B4 (en) * | 2001-03-09 | 2005-05-25 | Siemens Ag | Method and device for setting up a connection between a mobile terminal and a network server via a mobile radio network and another network (Internet) |
US7240339B2 (en) * | 2001-04-19 | 2007-07-03 | International Business Machines Corporation | Syntax checker with real-time feedback |
US7373515B2 (en) * | 2001-10-09 | 2008-05-13 | Wireless Key Identification Systems, Inc. | Multi-factor authentication system |
US7676829B1 (en) * | 2001-10-30 | 2010-03-09 | Microsoft Corporation | Multiple credentials in a distributed system |
KR20040075380A (en) * | 2003-02-20 | 2004-08-30 | 삼성전자주식회사 | Method for encrypting data of access VPN |
US20040225880A1 (en) * | 2003-05-07 | 2004-11-11 | Authenture, Inc. | Strong authentication systems built on combinations of "what user knows" authentication factors |
KR100581590B1 (en) | 2003-06-27 | 2006-05-22 | 주식회사 케이티 | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same |
WO2005107137A2 (en) * | 2004-04-23 | 2005-11-10 | Passmark Security, Inc. | Method and apparatus for authenticating users using two or more factors |
US7640574B1 (en) * | 2004-06-02 | 2009-12-29 | Sun Microsystems, Inc. | Method and system for resource based authentication |
US20060021004A1 (en) * | 2004-07-21 | 2006-01-26 | International Business Machines Corporation | Method and system for externalized HTTP authentication |
US20060122955A1 (en) * | 2004-12-02 | 2006-06-08 | Alex Bethlehem | System and method for launching a resource in a network |
US7555655B2 (en) * | 2004-12-22 | 2009-06-30 | 5th Fleet, L.L.C. | Apparatus, system, and method for generating and authenticating a computer password |
US20070022301A1 (en) * | 2005-07-19 | 2007-01-25 | Intelligent Voice Research, Llc | System and method for highly reliable multi-factor authentication |
US20070033649A1 (en) * | 2005-07-20 | 2007-02-08 | Booleansoft | Secure remote access technology |
-
2006
- 2006-02-01 AT AT06101165T patent/ATE510396T1/en not_active IP Right Cessation
- 2006-02-01 EP EP06101165A patent/EP1816821B1/en active Active
- 2006-02-01 US US11/344,176 patent/US7975287B2/en active Active
-
2007
- 2007-01-31 CA CA2576489A patent/CA2576489C/en active Active
-
2011
- 2011-06-03 US US13/152,662 patent/US8683550B2/en active Active
-
2014
- 2014-03-17 US US14/172,382 patent/US9125056B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
CA2576489C (en) | 2012-01-10 |
EP1816821B1 (en) | 2011-05-18 |
EP1816821A1 (en) | 2007-08-08 |
US7975287B2 (en) | 2011-07-05 |
US20140250504A1 (en) | 2014-09-04 |
US9125056B2 (en) | 2015-09-01 |
ATE510396T1 (en) | 2011-06-15 |
US20070180504A1 (en) | 2007-08-02 |
US8683550B2 (en) | 2014-03-25 |
US20110231914A1 (en) | 2011-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2576489A1 (en) | System and method for validating a user of an account using a wireless device | |
US9032498B1 (en) | Method for changing authentication for a legacy access interface | |
EP2875464B1 (en) | Systems and methods of using a temporary private key between two devices | |
CN102265255B (en) | Method and system for providing a federated authentication service with gradual expiration of credentials | |
CN108810021B (en) | Query system and method for determining verification function | |
EP3839720B1 (en) | Mobile credential revocation | |
US9306754B2 (en) | System and method for implementing transaction signing within an authentication framework | |
US9172687B2 (en) | Query system and method to determine authentication capabilities | |
US9083689B2 (en) | System and method for implementing privacy classes within an authentication framework | |
US11709921B1 (en) | Quick-logon for computing device | |
US10044700B2 (en) | Identity attestation of a minor via a parent | |
WO2006118829A3 (en) | Preventing fraudulent internet account access | |
JP7318108B2 (en) | Method and system for authenticating secure credential transfer to a device | |
WO2014151556A1 (en) | Systems and methods for using imaging to authenticate online users | |
US20110289567A1 (en) | Service access control | |
CN101515932A (en) | Method and system for accessing Web service safely | |
US8504824B1 (en) | One-time rotating key for third-party authentication | |
US20110121943A1 (en) | Biometric remote control device and methods and computer program product for operating the same | |
CN101986598B (en) | Authentication method, server and system | |
US11356261B2 (en) | Apparatus and methods for secure access to remote content | |
JP2013541908A (en) | User account recovery | |
AU2022203673A1 (en) | System of Device Authentication | |
KR20240023589A (en) | Cross authentication method and system between online service server and client | |
EP2165458A1 (en) | Identity assertion | |
CN103428191A (en) | Single sign on method based on combination of CAS framework and fingerprint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |