WO2001095545A3 - Systems, methods and software for remote password authentication using multiple servers - Google Patents
Systems, methods and software for remote password authentication using multiple servers Download PDFInfo
- Publication number
- WO2001095545A3 WO2001095545A3 PCT/US2001/017979 US0117979W WO0195545A3 WO 2001095545 A3 WO2001095545 A3 WO 2001095545A3 US 0117979 W US0117979 W US 0117979W WO 0195545 A3 WO0195545 A3 WO 0195545A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- client
- server
- user
- password
- servers
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002502962A JP4833489B2 (en) | 2000-06-05 | 2001-05-31 | System, method and software for remote password authentication using multiple servers |
AU6816101A AU6816101A (en) | 2000-06-05 | 2001-05-31 | Systems, methods and software for remote password authentication using multiple servers |
KR1020027016620A KR100769482B1 (en) | 2000-06-05 | 2001-05-31 | Systems, methods and software for remote password authentication using multiple servers |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US20925800P | 2000-06-05 | 2000-06-05 | |
US60/209,258 | 2000-06-05 | ||
US21583500P | 2000-07-03 | 2000-07-03 | |
US60/215,835 | 2000-07-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001095545A2 WO2001095545A2 (en) | 2001-12-13 |
WO2001095545A3 true WO2001095545A3 (en) | 2002-07-04 |
Family
ID=26903984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/017979 WO2001095545A2 (en) | 2000-06-05 | 2001-05-31 | Systems, methods and software for remote password authentication using multiple servers |
Country Status (7)
Country | Link |
---|---|
US (1) | US7139917B2 (en) |
JP (1) | JP4833489B2 (en) |
KR (1) | KR100769482B1 (en) |
CN (1) | CN1249972C (en) |
AU (1) | AU6816101A (en) |
TW (1) | TWI233739B (en) |
WO (1) | WO2001095545A2 (en) |
Families Citing this family (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10181953B1 (en) | 2013-09-16 | 2019-01-15 | Amazon Technologies, Inc. | Trusted data verification |
US7596223B1 (en) * | 2000-09-12 | 2009-09-29 | Apple Inc. | User control of a secure wireless computer network |
US6959394B1 (en) * | 2000-09-29 | 2005-10-25 | Intel Corporation | Splitting knowledge of a password |
US20030115452A1 (en) * | 2000-12-19 | 2003-06-19 | Ravi Sandhu | One time password entry to access multiple network sites |
US7197765B2 (en) * | 2000-12-29 | 2007-03-27 | Intel Corporation | Method for securely using a single password for multiple purposes |
US7590859B2 (en) * | 2001-08-24 | 2009-09-15 | Secure Computing Corporation | System and method for accomplishing two-factor user authentication using the internet |
US20030084171A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystems, Inc., A Delaware Corporation | User access control to distributed resources on a data communications network |
US20030084302A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystems, Inc., A Delaware Corporation | Portability and privacy with data communications network browsing |
US20030084172A1 (en) * | 2001-10-29 | 2003-05-01 | Sun Microsystem, Inc., A Delaware Corporation | Identification and privacy in the World Wide Web |
US7085840B2 (en) * | 2001-10-29 | 2006-08-01 | Sun Microsystems, Inc. | Enhanced quality of identification in a data communications network |
US7275260B2 (en) | 2001-10-29 | 2007-09-25 | Sun Microsystems, Inc. | Enhanced privacy protection in identification in a data communications network |
US7610390B2 (en) * | 2001-12-04 | 2009-10-27 | Sun Microsystems, Inc. | Distributed network identity |
FR2834153B1 (en) * | 2001-12-21 | 2004-04-23 | France Telecom | CRYPTOGRAPHIC PROCESS ALLOWING TO DISTRIBUTE THE LOAD AMONG SEVERAL ENTITIES AND DEVICES FOR IMPLEMENTING THIS PROCESS |
US7325065B1 (en) * | 2001-12-21 | 2008-01-29 | Aol Llc, A Delaware Limited Liability Company | Identifying unauthorized communication systems using a system-specific identifier |
US7571239B2 (en) * | 2002-01-08 | 2009-08-04 | Avaya Inc. | Credential management and network querying |
KR100398161B1 (en) * | 2002-02-26 | 2003-09-26 | 한국정보보호진흥원 | Password-based protocol secure against server's dictionary attack |
KR100450953B1 (en) * | 2002-03-05 | 2004-10-02 | 삼성전자주식회사 | User authentication method using password |
US7120797B2 (en) * | 2002-04-24 | 2006-10-10 | Microsoft Corporation | Methods for authenticating potential members invited to join a group |
US6718536B2 (en) * | 2002-06-21 | 2004-04-06 | Atmel Corporation | Computer-implemented method for fast generation and testing of probable prime numbers for cryptographic applications |
KR100458254B1 (en) * | 2002-07-26 | 2004-11-26 | 학교법인 성균관대학 | Methode for the password-based key exchange protocol using password-hardening protocol |
US7725730B2 (en) * | 2002-08-09 | 2010-05-25 | Emc Corporation | Cryptographic methods and apparatus for secure authentication |
WO2004028078A1 (en) * | 2002-09-23 | 2004-04-01 | Avner Geller | Method and system for authentication |
US7426382B2 (en) * | 2002-10-09 | 2008-09-16 | Motorola, Inc. | Contact validation and trusted contact updating in mobile wireless communications devices |
US20040073795A1 (en) * | 2002-10-10 | 2004-04-15 | Jablon David P. | Systems and methods for password-based connection |
US7840806B2 (en) * | 2002-10-16 | 2010-11-23 | Enterprise Information Management, Inc. | System and method of non-centralized zero knowledge authentication for a computer network |
US9503470B2 (en) * | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
US7480384B2 (en) * | 2003-02-10 | 2009-01-20 | International Business Machines Corporation | Method for distributing and authenticating public keys using random numbers and Diffie-Hellman public keys |
CA2422334C (en) * | 2003-03-17 | 2009-06-09 | British Telecommunications Public Limited Company | Authentication of network users |
US7836493B2 (en) | 2003-04-24 | 2010-11-16 | Attachmate Corporation | Proxy server security token authorization |
US6994249B2 (en) * | 2003-05-27 | 2006-02-07 | Cardinal Health Technologies, Llc | System and method for drug management utilizing transferable labels |
US8769680B2 (en) * | 2003-06-12 | 2014-07-01 | International Business Machines Corporation | Alert passwords for detecting password attacks on systems |
US8214884B2 (en) * | 2003-06-27 | 2012-07-03 | Attachmate Corporation | Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys |
JP3854954B2 (en) * | 2003-09-05 | 2006-12-06 | キヤノン株式会社 | Data sharing device |
US7565702B2 (en) * | 2003-11-03 | 2009-07-21 | Microsoft Corporation | Password-based key management |
US20050129244A1 (en) * | 2003-12-16 | 2005-06-16 | International Business Machines Corporation | System and method for mitigating denial of service attacks on trusted platform |
KR100744531B1 (en) * | 2003-12-26 | 2007-08-01 | 한국전자통신연구원 | System and method for managing encryption key for mobile terminal |
FR2865051B1 (en) * | 2004-01-14 | 2006-03-03 | Stg Interactive | METHOD AND SYSTEM FOR OPERATING A COMPUTER NETWORK FOR CONTENT RELEASE |
FR2865590A1 (en) * | 2004-01-23 | 2005-07-29 | France Telecom | Keys establishing method for proving e.g. authenticity of entity, involves determining adjustment parameter such that each public value is of odd row with respect to each prime factor |
US7818416B2 (en) * | 2004-02-27 | 2010-10-19 | Teamon Systems, Inc. | Communications system and method for accessing a server and preventing access blocking and minimizing network traffic |
WO2005098564A1 (en) * | 2004-04-06 | 2005-10-20 | Telecom Italia S.P.A. | Secure logging for irrefutable administration |
US20050289645A1 (en) * | 2004-06-25 | 2005-12-29 | Kyocera Mita Corporation | Image processing device and program |
US8214649B2 (en) * | 2004-06-30 | 2012-07-03 | Nokia Corporation | System and method for secure communications between at least one user device and a network entity |
WO2006003675A2 (en) * | 2004-07-12 | 2006-01-12 | Syed Ibrahim Abdul Hameed Khan | System, method of generation and use of bilaterally generated variable instant passwords |
US7373516B2 (en) | 2004-08-19 | 2008-05-13 | International Business Machines Corporation | Systems and methods of securing resources through passwords |
KR100608604B1 (en) * | 2004-09-15 | 2006-08-03 | 삼성전자주식회사 | Method and apparatus for searching right objects stored in portable storage device using object identifier |
US7784089B2 (en) * | 2004-10-29 | 2010-08-24 | Qualcomm Incorporated | System and method for providing a multi-credential authentication protocol |
WO2006069082A2 (en) * | 2004-12-20 | 2006-06-29 | Bionopoly Llc | Access keys |
MX2007009705A (en) * | 2005-02-11 | 2007-10-04 | Nokia Corp | Method and apparatus for providing bootstrapping procedures in a communication network. |
US20090158049A1 (en) * | 2005-04-06 | 2009-06-18 | Michael Stephen Fiske | Building a security access system |
US7814320B2 (en) * | 2005-07-19 | 2010-10-12 | Ntt Docomo, Inc. | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks |
US8645683B1 (en) * | 2005-08-11 | 2014-02-04 | Aaron T. Emigh | Verified navigation |
US7793335B2 (en) * | 2005-09-12 | 2010-09-07 | International Business Machines Corporation | Computer-implemented method, system, and program product for managing log-in strikes |
US7783041B2 (en) * | 2005-10-03 | 2010-08-24 | Nokia Corporation | System, method and computer program product for authenticating a data agreement between network entities |
US7984482B1 (en) * | 2005-12-16 | 2011-07-19 | Oracle America, Inc. | Global account lockout (GAL) and expiration using an ordered message service (OMS) |
US8495380B2 (en) | 2006-06-06 | 2013-07-23 | Red Hat, Inc. | Methods and systems for server-side key generation |
US20080126808A1 (en) * | 2006-07-05 | 2008-05-29 | Cms Products, Inc. | Encrypted dataset access by custodians |
US8527770B2 (en) * | 2006-07-20 | 2013-09-03 | Research In Motion Limited | System and method for provisioning device certificates |
US8301897B2 (en) * | 2006-08-23 | 2012-10-30 | Cisco Technology, Inc. | Challenge-based authentication protocol |
US8645706B2 (en) * | 2006-08-31 | 2014-02-04 | Red Hat, Inc. | Preventing error in an access protocol |
US8042155B1 (en) * | 2006-09-29 | 2011-10-18 | Netapp, Inc. | System and method for generating a single use password based on a challenge/response protocol |
US8245050B1 (en) * | 2006-09-29 | 2012-08-14 | Netapp, Inc. | System and method for initial key establishment using a split knowledge protocol |
US7958356B1 (en) * | 2006-09-29 | 2011-06-07 | Netapp, Inc. | System and method for establishing a shared secret among nodes of a security appliance |
CN101529844B (en) | 2006-10-26 | 2013-12-11 | 高通股份有限公司 | Method and apparatus for carrier frequency offset estimation and frame synchronization in a wireless communications system |
US8838975B2 (en) * | 2006-10-31 | 2014-09-16 | Blackberry Limited | System and method for protecting a password against brute force attacks |
US8752181B2 (en) * | 2006-11-09 | 2014-06-10 | Touchnet Information Systems, Inc. | System and method for providing identity theft security |
US9002003B2 (en) * | 2006-11-29 | 2015-04-07 | Certicom Corp. | Password protocol for data communication system |
US8611542B1 (en) | 2007-04-26 | 2013-12-17 | Netapp, Inc. | Peer to peer key synchronization |
US8824686B1 (en) | 2007-04-27 | 2014-09-02 | Netapp, Inc. | Cluster key synchronization |
US8196182B2 (en) | 2007-08-24 | 2012-06-05 | Netapp, Inc. | Distributed management of crypto module white lists |
NO327765B1 (en) * | 2007-08-29 | 2009-09-21 | Message Man As | Procedure and arrangement related to security mechanisms for message-based electronic transactions |
JP4924943B2 (en) * | 2007-09-04 | 2012-04-25 | Kddi株式会社 | Authenticated key exchange system, authenticated key exchange method and program |
US9774445B1 (en) | 2007-09-04 | 2017-09-26 | Netapp, Inc. | Host based rekeying |
CN101388813B (en) * | 2007-09-14 | 2010-12-22 | 英业达股份有限公司 | Software registration method and system for enterprise |
DE102007000589B9 (en) | 2007-10-29 | 2010-01-28 | Bundesdruckerei Gmbh | Method for protecting a chip card against unauthorized use, chip card and chip card terminal |
DE102007000587A1 (en) | 2007-10-29 | 2009-04-30 | Bundesdruckerei Gmbh | Method for activating a chip card function by means of remote verification |
KR101452708B1 (en) * | 2008-02-01 | 2014-10-21 | 삼성전자주식회사 | CE device management server, method for issuing DRM key using CE device management server, and computer readable medium |
US20090202081A1 (en) * | 2008-02-08 | 2009-08-13 | Ayman Hammad | Key delivery system and method |
DE102008000348B4 (en) | 2008-02-19 | 2011-04-07 | Compugroup Holding Ag | Method for signing a medical data object |
US8254577B2 (en) * | 2008-02-20 | 2012-08-28 | International Business Machines Corporation | Validation of encryption key |
US9479339B2 (en) * | 2008-02-29 | 2016-10-25 | Blackberry Limited | Methods and apparatus for use in obtaining a digital certificate for a mobile communication device |
US10015158B2 (en) * | 2008-02-29 | 2018-07-03 | Blackberry Limited | Methods and apparatus for use in enabling a mobile communication device with a digital certificate |
US8464058B1 (en) | 2008-04-08 | 2013-06-11 | Hewlett-Packard Development Company, L.P. | Password-based cryptographic method and apparatus |
US8140855B2 (en) * | 2008-04-11 | 2012-03-20 | Microsoft Corp. | Security-enhanced log in |
FR2931336B1 (en) * | 2008-05-19 | 2011-02-11 | Eads Secure Networks | METHODS AND DEVICES FOR TRANSMITTING AND AUTHENTICATING MESSAGES TO GUARANTEE THE AUTHENTICITY OF A SYSTEM |
US7522723B1 (en) * | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
US8504481B2 (en) * | 2008-07-22 | 2013-08-06 | New Jersey Institute Of Technology | System and method for protecting user privacy using social inference protection techniques |
US8813197B2 (en) | 2008-12-15 | 2014-08-19 | Novell, Inc. | Techniques for network process identity enablement |
DE102009000408A1 (en) | 2009-01-26 | 2010-09-16 | Bundesdruckerei Gmbh | Reader for a chip card and computer system |
DE102009000404A1 (en) | 2009-01-26 | 2010-07-29 | Bundesdruckerei Gmbh | Method for activating a chip card function, reader for a chip card and chip card |
US8272040B2 (en) * | 2009-01-29 | 2012-09-18 | International Business Machines Corporation | Preventing inadvertent lock-out during password entry dialog |
US8856879B2 (en) | 2009-05-14 | 2014-10-07 | Microsoft Corporation | Social authentication for account recovery |
US9124431B2 (en) | 2009-05-14 | 2015-09-01 | Microsoft Technology Licensing, Llc | Evidence-based dynamic scoring to limit guesses in knowledge-based authentication |
EP2285042A1 (en) * | 2009-07-07 | 2011-02-16 | Gemalto SA | Software security module using the ciphering of a hash from a password concatenated with a seed |
US8433918B2 (en) * | 2009-10-14 | 2013-04-30 | Texas Instruments Incorporated | Methods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks |
EP2336931B1 (en) * | 2009-11-18 | 2013-01-09 | STMicroelectronics (Rousset) SAS | Method for signature verification |
JP5443625B2 (en) * | 2010-03-01 | 2014-03-19 | インターデイジタル パテント ホールディングス インコーポレイテッド | Machine-to-machine gateway architecture and functionality |
US9015489B2 (en) * | 2010-04-07 | 2015-04-21 | Microsoft Technology Licensing, Llc | Securing passwords against dictionary attacks |
US8549314B2 (en) | 2010-04-29 | 2013-10-01 | King Saud University | Password generation methods and systems |
US20120137359A1 (en) * | 2010-11-29 | 2012-05-31 | Groupe Cgi Inc. | Method For Storing (Hiding) A Key In A Table And Corresponding Method For Retrieving The Key From The Table |
US9237155B1 (en) | 2010-12-06 | 2016-01-12 | Amazon Technologies, Inc. | Distributed policy enforcement with optimizing policy transformations |
US8621227B2 (en) | 2010-12-28 | 2013-12-31 | Authernative, Inc. | System and method for cryptographic key exchange using matrices |
US8656484B2 (en) | 2010-12-28 | 2014-02-18 | Authernative, Inc. | System and method for mutually authenticated cryptographic key exchange using matrices |
US8971539B2 (en) | 2010-12-30 | 2015-03-03 | Verisign, Inc. | Management of SSL certificate escrow |
US8739260B1 (en) | 2011-02-10 | 2014-05-27 | Secsign Technologies Inc. | Systems and methods for authentication via mobile communication device |
US8719952B1 (en) * | 2011-03-25 | 2014-05-06 | Secsign Technologies Inc. | Systems and methods using passwords for secure storage of private keys on mobile devices |
US8793780B2 (en) | 2011-04-11 | 2014-07-29 | Blackberry Limited | Mitigation of application-level distributed denial-of-service attacks |
US10374799B2 (en) * | 2011-04-13 | 2019-08-06 | Nokia Technologies Oy | Method and apparatus for identity based ticketing |
GB2490483B (en) * | 2011-04-26 | 2019-05-29 | Hewlett Packard Entpr Dev Lp | Digital signature method and system |
US8689304B2 (en) * | 2011-04-27 | 2014-04-01 | International Business Machines Corporation | Multiple independent authentications for enhanced security |
US8681986B2 (en) * | 2011-05-25 | 2014-03-25 | International Business Machines Corporation | Single-round password-based key exchange protocols |
US8769642B1 (en) | 2011-05-31 | 2014-07-01 | Amazon Technologies, Inc. | Techniques for delegation of access privileges |
DE102011079441A1 (en) | 2011-07-19 | 2013-01-24 | Bundesdruckerei Gmbh | Method for protecting a chip card terminal against unauthorized use |
CN102300182B (en) * | 2011-09-07 | 2013-08-14 | 飞天诚信科技股份有限公司 | Short-message-based authentication method, system and device |
US9178701B2 (en) | 2011-09-29 | 2015-11-03 | Amazon Technologies, Inc. | Parameter based key derivation |
US9197409B2 (en) | 2011-09-29 | 2015-11-24 | Amazon Technologies, Inc. | Key derivation techniques |
US9203613B2 (en) | 2011-09-29 | 2015-12-01 | Amazon Technologies, Inc. | Techniques for client constructed sessions |
US8842840B2 (en) | 2011-11-03 | 2014-09-23 | Arvind Gidwani | Demand based encryption and key generation and distribution systems and methods |
EP2634993B1 (en) * | 2012-03-01 | 2017-01-11 | Certicom Corp. | Devices and methods for connecting client devices to a network |
EP2639997B1 (en) * | 2012-03-15 | 2014-09-03 | ATS Group (IP Holdings) Limited | Method and system for secure access of a first computer to a second computer |
US9215076B1 (en) | 2012-03-27 | 2015-12-15 | Amazon Technologies, Inc. | Key generation for hierarchical data access |
US8739308B1 (en) | 2012-03-27 | 2014-05-27 | Amazon Technologies, Inc. | Source identification for unauthorized copies of content |
US8892865B1 (en) | 2012-03-27 | 2014-11-18 | Amazon Technologies, Inc. | Multiple authority key derivation |
BR112014026833A2 (en) * | 2012-04-25 | 2018-11-27 | Rowem Inc | access code equipment, access supercode generation method, access code operating system, and method for retrieving user-specific access code data |
US9703932B2 (en) * | 2012-04-30 | 2017-07-11 | Excalibur Ip, Llc | Continuous content identification of broadcast content |
US9887989B2 (en) * | 2012-06-23 | 2018-02-06 | Pomian & Corella, Llc | Protecting passwords and biometrics against back-end security breaches |
US9043388B2 (en) * | 2012-06-25 | 2015-05-26 | International Business Machines Corporation | Aggregation and queuing of communications |
US9258118B1 (en) | 2012-06-25 | 2016-02-09 | Amazon Technologies, Inc. | Decentralized verification in a distributed system |
US9660972B1 (en) * | 2012-06-25 | 2017-05-23 | Amazon Technologies, Inc. | Protection from data security threats |
WO2014019129A1 (en) * | 2012-07-31 | 2014-02-06 | Google Inc. | Automating password maintenance |
US9049011B1 (en) * | 2012-08-15 | 2015-06-02 | Washington State University | Secure key storage and distribution |
US9684898B2 (en) * | 2012-09-25 | 2017-06-20 | Google Inc. | Securing personal identification numbers for mobile payment applications by combining with random components |
US8868919B2 (en) | 2012-10-23 | 2014-10-21 | Authernative, Inc. | Authentication method of field contents based challenge and enumerated pattern of field positions based response in random partial digitized path recognition system |
US9215072B1 (en) | 2012-10-23 | 2015-12-15 | Authernative, Inc. | Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security |
US8955074B2 (en) | 2012-10-23 | 2015-02-10 | Authernative, Inc. | Authentication method of enumerated pattern of field positions based challenge and enumerated pattern of field positions based response through interaction between two credentials in random partial digitized path recognition system |
US9213812B1 (en) * | 2012-12-28 | 2015-12-15 | Allscripts Software, Llc | Systems and methods related to security credentials |
WO2014108835A2 (en) * | 2013-01-08 | 2014-07-17 | Bar-Ilan University | A method for providing security using secure computation |
JP6040780B2 (en) * | 2013-01-15 | 2016-12-07 | 富士通株式会社 | Cryptographic processing apparatus, method and program |
US8966591B2 (en) * | 2013-01-18 | 2015-02-24 | Ca, Inc. | Adaptive strike count policy |
DE102013203257A1 (en) | 2013-02-27 | 2014-08-28 | Bundesdruckerei Gmbh | Reading an attribute from an ID token |
US9032212B1 (en) * | 2013-03-15 | 2015-05-12 | Emc Corporation | Self-refreshing distributed cryptography |
US10270748B2 (en) * | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
EP2793157A1 (en) * | 2013-04-19 | 2014-10-22 | Thomson Licensing | Apparatus and method for managing passwords |
GB201310084D0 (en) | 2013-06-06 | 2013-07-17 | Mastercard International Inc | Improvements to electronic authentication systems |
US9407440B2 (en) | 2013-06-20 | 2016-08-02 | Amazon Technologies, Inc. | Multiple authority data security and access |
US9305161B1 (en) * | 2013-06-24 | 2016-04-05 | Emc Corporation | Password hardening system using password shares distributed across multiple servers |
US9521000B1 (en) | 2013-07-17 | 2016-12-13 | Amazon Technologies, Inc. | Complete forward access sessions |
US9311500B2 (en) | 2013-09-25 | 2016-04-12 | Amazon Technologies, Inc. | Data security using request-supplied keys |
US9237019B2 (en) | 2013-09-25 | 2016-01-12 | Amazon Technologies, Inc. | Resource locators with keys |
US9189617B2 (en) * | 2013-09-27 | 2015-11-17 | Intel Corporation | Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform |
US10243945B1 (en) | 2013-10-28 | 2019-03-26 | Amazon Technologies, Inc. | Managed identity federation |
DK3063919T3 (en) * | 2013-10-28 | 2017-11-06 | Sepior Aps | System and method of handling confidential data |
US9420007B1 (en) | 2013-12-04 | 2016-08-16 | Amazon Technologies, Inc. | Access control using impersonization |
US10015153B1 (en) * | 2013-12-23 | 2018-07-03 | EMC IP Holding Company LLC | Security using velocity metrics identifying authentication performance for a set of devices |
US9292711B1 (en) | 2014-01-07 | 2016-03-22 | Amazon Technologies, Inc. | Hardware secret usage limits |
US9369461B1 (en) | 2014-01-07 | 2016-06-14 | Amazon Technologies, Inc. | Passcode verification using hardware secrets |
US9374368B1 (en) | 2014-01-07 | 2016-06-21 | Amazon Technologies, Inc. | Distributed passcode verification system |
US9262642B1 (en) | 2014-01-13 | 2016-02-16 | Amazon Technologies, Inc. | Adaptive client-aware session security as a service |
US9275219B2 (en) | 2014-02-25 | 2016-03-01 | International Business Machines Corporation | Unauthorized account access lockout reduction |
US10771255B1 (en) | 2014-03-25 | 2020-09-08 | Amazon Technologies, Inc. | Authenticated storage operations |
EP2955654A1 (en) * | 2014-06-12 | 2015-12-16 | Thomson Licensing | Apparatus and method for password authentication |
US9258117B1 (en) | 2014-06-26 | 2016-02-09 | Amazon Technologies, Inc. | Mutual authentication with symmetric secrets and signatures |
US10326597B1 (en) | 2014-06-27 | 2019-06-18 | Amazon Technologies, Inc. | Dynamic response signing capability in a distributed system |
US9350545B1 (en) * | 2014-06-30 | 2016-05-24 | Emc Corporation | Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens |
US9544838B2 (en) | 2014-08-01 | 2017-01-10 | Apple Inc. | Detecting and connecting to Wi-Fi™ networks |
TWI497339B (en) * | 2014-08-15 | 2015-08-21 | Chi-Pei Wang | Computer system being capable of respectively saving account number and password for anti-spyware |
US9639687B2 (en) | 2014-11-18 | 2017-05-02 | Cloudfare, Inc. | Multiply-encrypting data requiring multiple keys for decryption |
US10333696B2 (en) | 2015-01-12 | 2019-06-25 | X-Prime, Inc. | Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency |
DE102015017061A1 (en) | 2015-01-13 | 2016-07-28 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
DE102015017060A1 (en) | 2015-01-13 | 2016-07-14 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
DE102015200313A1 (en) | 2015-01-13 | 2016-07-14 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
DE102015204828A1 (en) | 2015-03-17 | 2016-09-22 | Bundesdruckerei Gmbh | A method for generating a certificate for a security token |
DE102015207064A1 (en) | 2015-04-17 | 2016-10-20 | Bundesdruckerei Gmbh | Electronic system for generating a certificate |
US20160315927A1 (en) * | 2015-04-21 | 2016-10-27 | Zte (Usa) Inc. | Method and system for establishing and managing personal black box (pbb) in virtually-networked big-data (vnbd) environment |
US10374802B2 (en) | 2015-04-24 | 2019-08-06 | Red Hat, Inc. | Multi-factor simple password exponential key exchange (SPEKE) authentication |
DE102015207690A1 (en) | 2015-04-27 | 2016-10-27 | Bundesdruckerei Gmbh | ID token, system and method for generating an electronic signature |
DE102015209073B4 (en) | 2015-05-18 | 2019-02-07 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
KR102460096B1 (en) | 2015-05-27 | 2022-10-27 | 삼성에스디에스 주식회사 | Method and apparatus for managing encryption keys for cloud service |
US10122692B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Handshake offload |
US10122689B2 (en) | 2015-06-16 | 2018-11-06 | Amazon Technologies, Inc. | Load balancing with handshake offload |
EP3318003B1 (en) | 2015-06-30 | 2022-03-23 | Visa International Service Association | Confidential authentication and provisioning |
WO2017001972A1 (en) * | 2015-06-30 | 2017-01-05 | Raghav Bhaskar | User friendly two factor authentication |
DE102015214340A1 (en) | 2015-07-29 | 2017-02-02 | Bundesdruckerei Gmbh | Lock service for a certificate generated by an ID token |
US20170063831A1 (en) * | 2015-08-24 | 2017-03-02 | International Business Machines Corporation | Authentication of a user and of access to the user's information |
US20170091887A1 (en) * | 2015-09-24 | 2017-03-30 | Yahoo! Inc. | Method for accessing an online account after the owner's death |
US9860237B2 (en) * | 2015-10-08 | 2018-01-02 | International Business Machines Corporation | Password-based authentication in server systems |
US9565020B1 (en) | 2016-02-02 | 2017-02-07 | International Business Machines Corporation | System and method for generating a server-assisted strong password from a weak secret |
US10250591B2 (en) | 2016-02-12 | 2019-04-02 | International Business Machines Corporation | Password-based authentication |
US10476672B2 (en) | 2016-03-14 | 2019-11-12 | Callware Technologies, Inc | Fragmented encryption of a secret |
US10158651B1 (en) | 2016-04-20 | 2018-12-18 | Wells Fargo Bank, N.A. | Verifying secure transactions through distributed nodes |
DE102016208038A1 (en) | 2016-05-10 | 2017-11-16 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
DE102016208040A1 (en) | 2016-05-10 | 2017-11-16 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
US10396991B2 (en) * | 2016-06-30 | 2019-08-27 | Microsoft Technology Licensing, Llc | Controlling verification of key-value stores |
US10158616B1 (en) | 2016-07-20 | 2018-12-18 | Google Llc | Methods and systems for online access credential transition |
US10116440B1 (en) | 2016-08-09 | 2018-10-30 | Amazon Technologies, Inc. | Cryptographic key management for imported cryptographic keys |
SG10201609247YA (en) * | 2016-11-04 | 2018-06-28 | Huawei Int Pte Ltd | System and method for configuring a wireless device for wireless network access |
DE102016222170A1 (en) | 2016-11-11 | 2018-05-17 | Bundesdruckerei Gmbh | Method for reading attributes from an ID token |
WO2018098686A1 (en) * | 2016-11-30 | 2018-06-07 | 深圳前海达闼云端智能科技有限公司 | Safety verification method and device, terminal apparatus, and server |
EP3340149A1 (en) * | 2016-12-22 | 2018-06-27 | Mastercard International Incorporated | Methods and systems for validating an interaction |
US10250576B2 (en) | 2017-02-08 | 2019-04-02 | International Business Machines Corporation | Communication of messages over networks |
CN106888097B (en) * | 2017-03-30 | 2020-08-11 | 北卡科技有限公司 | Identity authentication method based on zero-knowledge proof in HCE mode |
CN107248997B (en) * | 2017-07-03 | 2020-04-14 | 暨南大学 | Authentication method based on intelligent card under multi-server environment |
US10924278B2 (en) * | 2017-07-13 | 2021-02-16 | Qwyit, Llc | Method and apparatus for authentication and encryption service employing unbreakable encryption |
SG11202003508SA (en) * | 2017-10-19 | 2020-05-28 | Autnhive Corp | System and method for generating and depositing keys for multi-point authentication |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
KR101936955B1 (en) * | 2018-06-28 | 2019-04-09 | 펜타시큐리티시스템주식회사 | The method of backing up and restoring secret information utilizing asymmetric application of Diffie-Hellman and elliptic curve Diffie-Hellman algorithm |
US11068893B2 (en) | 2018-07-20 | 2021-07-20 | Ford Global Technologies, Llc | Decentralized cloud-based authentication for vehicles and associated transactions |
US10576934B2 (en) | 2018-07-20 | 2020-03-03 | Ford Global Technologies, Llc | Decentralized cloud-based authentication for autonomous vehicles |
US10887092B2 (en) * | 2018-08-09 | 2021-01-05 | Hrl Laboratories, Llc | Anonymous allocation and majority voting in a compromised environment |
US11184162B1 (en) * | 2018-09-28 | 2021-11-23 | NortonLifeLock Inc. | Privacy preserving secure task automation |
US11089008B2 (en) | 2018-11-20 | 2021-08-10 | HCL Technologies Italy S.p.A. | System and method for facilitating pre authentication of user[s] intended to access data resources |
CN110419053B (en) * | 2018-11-27 | 2023-12-01 | 创新先进技术有限公司 | System and method for information protection |
US11616774B2 (en) * | 2019-01-17 | 2023-03-28 | Blackberry Limited | Methods and systems for detecting unauthorized access by sending a request to one or more peer contacts |
US20220103369A1 (en) * | 2019-02-05 | 2022-03-31 | Ethopass, Llc | Security system and related methods |
US11190336B2 (en) * | 2019-05-10 | 2021-11-30 | Sap Se | Privacy-preserving benchmarking with interval statistics reducing leakage |
CN111144885B (en) * | 2019-12-13 | 2023-06-06 | 杜晓楠 | Digital asset hosting method and system |
US11463467B2 (en) | 2020-01-09 | 2022-10-04 | Kyndryl, Inc. | Advanced risk evaluation for servers |
CN111277571A (en) * | 2020-01-13 | 2020-06-12 | 熊国华 | Enterprise APP login management system based on zero-knowledge proof |
US11146558B2 (en) | 2020-03-11 | 2021-10-12 | International Business Machines Corporation | Stateless multi-party authorization system in web applications |
WO2022056097A1 (en) | 2020-09-09 | 2022-03-17 | Springcoin, Inc. | Method and apparatus for third-party managed data transference and corroboration via tokenization |
US11700125B2 (en) * | 2020-10-05 | 2023-07-11 | Redcom Laboratories, Inc. | zkMFA: zero-knowledge based multi-factor authentication system |
CN112257119B (en) * | 2020-10-20 | 2022-10-28 | 河北素数信息安全有限公司 | Identity authentication method and protection method for ensuring security of encryption device |
CN113852461B (en) * | 2021-09-26 | 2024-02-02 | 深圳万兴软件有限公司 | Password recovery method and device, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5544322A (en) * | 1994-05-09 | 1996-08-06 | International Business Machines Corporation | System and method for policy-based inter-realm authentication within a distributed processing system |
US5832211A (en) * | 1995-11-13 | 1998-11-03 | International Business Machines Corporation | Propagating plain-text passwords from a main registry to a plurality of foreign registries |
GB2329096A (en) * | 1997-08-29 | 1999-03-10 | Ncipher Limited | Creating sub-keys from hashed cryptographic master key |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5535276A (en) * | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
US5557346A (en) * | 1994-08-11 | 1996-09-17 | Trusted Information Systems, Inc. | System and method for key escrow encryption |
US5717756A (en) * | 1995-10-12 | 1998-02-10 | International Business Machines Corporation | System and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys |
US6226383B1 (en) * | 1996-04-17 | 2001-05-01 | Integrity Sciences, Inc. | Cryptographic methods for remote authentication |
JP3656688B2 (en) * | 1997-03-31 | 2005-06-08 | 栄司 岡本 | Cryptographic data recovery method and key registration system |
PL338018A1 (en) * | 1997-05-28 | 2000-09-25 | Adam Lucas Young | Automatically recoverinbg and acknowledging cryptosystems |
US6272631B1 (en) * | 1997-06-30 | 2001-08-07 | Microsoft Corporation | Protected storage of core data secrets |
US6161185A (en) * | 1998-03-06 | 2000-12-12 | Mci Communications Corporation | Personal authentication system and method for multiple computer platform |
US6311276B1 (en) * | 1998-08-25 | 2001-10-30 | 3Com Corporation | Secure system for remote management and wake-up commands |
US6510513B1 (en) * | 1999-01-13 | 2003-01-21 | Microsoft Corporation | Security services and policy enforcement for electronic data |
-
2001
- 2001-05-31 KR KR1020027016620A patent/KR100769482B1/en not_active IP Right Cessation
- 2001-05-31 CN CNB018138799A patent/CN1249972C/en not_active Expired - Fee Related
- 2001-05-31 AU AU6816101A patent/AU6816101A/en active Pending
- 2001-05-31 WO PCT/US2001/017979 patent/WO2001095545A2/en active Application Filing
- 2001-05-31 JP JP2002502962A patent/JP4833489B2/en not_active Expired - Fee Related
- 2001-05-31 US US09/872,659 patent/US7139917B2/en not_active Expired - Lifetime
- 2001-06-05 TW TW090113621A patent/TWI233739B/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5544322A (en) * | 1994-05-09 | 1996-08-06 | International Business Machines Corporation | System and method for policy-based inter-realm authentication within a distributed processing system |
US5832211A (en) * | 1995-11-13 | 1998-11-03 | International Business Machines Corporation | Propagating plain-text passwords from a main registry to a plurality of foreign registries |
GB2329096A (en) * | 1997-08-29 | 1999-03-10 | Ncipher Limited | Creating sub-keys from hashed cryptographic master key |
Non-Patent Citations (2)
Title |
---|
DATABASE TDB [online] "Key manager for multiple distributed computing environment", XP002905780, Database accession no. NN9509337 * |
IBM, 1 September 1995 (1995-09-01) * |
Also Published As
Publication number | Publication date |
---|---|
AU6816101A (en) | 2001-12-17 |
CN1249972C (en) | 2006-04-05 |
WO2001095545A2 (en) | 2001-12-13 |
KR20030010667A (en) | 2003-02-05 |
KR100769482B1 (en) | 2007-10-24 |
US20020067832A1 (en) | 2002-06-06 |
JP4833489B2 (en) | 2011-12-07 |
US7139917B2 (en) | 2006-11-21 |
CN1446331A (en) | 2003-10-01 |
JP2003536320A (en) | 2003-12-02 |
TWI233739B (en) | 2005-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001095545A3 (en) | Systems, methods and software for remote password authentication using multiple servers | |
EP1958373B1 (en) | Physical secret sharing and proofs of vicinity using pufs | |
Lee et al. | A remote user authentication scheme using hash functions | |
US6732270B1 (en) | Method to authenticate a network access server to an authentication server | |
US6151676A (en) | Administration and utilization of secret fresh random numbers in a networked environment | |
US8370638B2 (en) | Derivative seeds | |
JP5058600B2 (en) | System and method for providing contactless authentication | |
US6985583B1 (en) | System and method for authentication seed distribution | |
Katz et al. | Forward secrecy in password-only key exchange protocols | |
CN102026195B (en) | One-time password (OTP) based mobile terminal identity authentication method and system | |
Parmar et al. | Generation of secure one-time password based on image authentication | |
CA2551113A1 (en) | Authentication system for networked computer applications | |
Chakrabarti et al. | Password-based authentication: Preventing dictionary attacks | |
CN105187382B (en) | Prevent from hitting the multiple-factor identity identifying method of storehouse attack | |
CN110060403A (en) | The more ticket electronic voting methods of a people and system based on block chain | |
CN109639426A (en) | Bidirectional self-authentication method based on identification password | |
EP0781427A1 (en) | Secure computer network | |
WO2001013201A3 (en) | Peer-to-peer network user authentication protocol | |
CN108616359A (en) | A kind of OTP authentication method and systems based on Quick Response Code | |
CN115865520B (en) | Authentication and access control method with privacy protection in mobile cloud service environment | |
Kadhim et al. | A new initial authentication scheme for kerberos 5 based on biometric data and virtual password | |
EP3681098A1 (en) | Authentication system with reduced attack surface | |
Aboud | Secure password authentication system using smart card | |
KR20020085734A (en) | Recoverable Password-Based Mutual Authentication and Key Exchange Protocol | |
CN108512832A (en) | A kind of safe Enhancement Method for OpenStack authentications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2002 502962 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020027016620 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027016620 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018138799 Country of ref document: CN |
|
122 | Ep: pct application non-entry in european phase |