SG11201807995TA - Method and system for user authentication with improved security - Google Patents

Method and system for user authentication with improved security

Info

Publication number
SG11201807995TA
SG11201807995TA SG11201807995TA SG11201807995TA SG11201807995TA SG 11201807995T A SG11201807995T A SG 11201807995TA SG 11201807995T A SG11201807995T A SG 11201807995TA SG 11201807995T A SG11201807995T A SG 11201807995TA SG 11201807995T A SG11201807995T A SG 11201807995TA
Authority
SG
Singapore
Prior art keywords
authentication
international
session
user
data
Prior art date
Application number
SG11201807995TA
Other languages
English (en)
Inventor
Antony Smales
Original Assignee
Forticode Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2016901019A external-priority patent/AU2016901019A0/en
Application filed by Forticode Ltd filed Critical Forticode Ltd
Publication of SG11201807995TA publication Critical patent/SG11201807995TA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
  • Collating Specific Patterns (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Burglar Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
SG11201807995TA 2016-03-18 2017-03-17 Method and system for user authentication with improved security SG11201807995TA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2016901019A AU2016901019A0 (en) 2016-03-18 Method and system for user authentication with improved security
PCT/AU2017/050240 WO2017156590A1 (fr) 2016-03-18 2017-03-17 Procédé et système d'authentification d'utilisateur à sécurité améliorée

Publications (1)

Publication Number Publication Date
SG11201807995TA true SG11201807995TA (en) 2018-10-30

Family

ID=59850010

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201807995TA SG11201807995TA (en) 2016-03-18 2017-03-17 Method and system for user authentication with improved security

Country Status (16)

Country Link
US (2) US11017067B2 (fr)
EP (1) EP3430554A4 (fr)
JP (1) JP2019512961A (fr)
KR (1) KR20180117715A (fr)
CN (1) CN109074437A (fr)
AU (1) AU2017233545A1 (fr)
BR (1) BR112018068884A2 (fr)
CA (1) CA3017533A1 (fr)
EA (1) EA201892109A1 (fr)
HK (1) HK1258980A1 (fr)
IL (1) IL261810B2 (fr)
MA (1) MA45323A (fr)
PH (1) PH12018501983A1 (fr)
SG (1) SG11201807995TA (fr)
WO (1) WO2017156590A1 (fr)
ZA (1) ZA201806243B (fr)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2565282B (en) * 2017-08-02 2021-12-22 Vnc Automotive Ltd Remote control of a computing device
US10834170B2 (en) * 2018-03-19 2020-11-10 Citrix Systems, Inc. Cloud authenticated offline file sharing
US10693648B2 (en) * 2018-03-26 2020-06-23 Ca, Inc. System and method for dynamic grid authentication
US10999081B2 (en) * 2018-04-12 2021-05-04 Microsoft Technology Licensing, Llc Dynamic certificate management for a distributed authentication system
CN108833117B (zh) * 2018-07-25 2020-11-10 海南新软软件有限公司 一种私钥存储和读取方法、装置及硬件设备
US11134084B1 (en) * 2018-08-22 2021-09-28 Hid Global Corporation Diversified authentication and access control
US11336430B2 (en) * 2018-09-07 2022-05-17 Sap Se Blockchain-incorporating distributed authentication system
WO2020096739A1 (fr) * 2018-11-09 2020-05-14 Carrier Corporation Accès géographiquement sécurisé à un contrôleur de conteneur
CN111865870B (zh) * 2019-04-24 2022-01-11 华为技术有限公司 一种参数发送方法及装置
US12445458B1 (en) * 2019-06-28 2025-10-14 Google Llc System and method for identifying malicious hosts prior to commencement of a cyber-attack
KR102259764B1 (ko) * 2019-09-06 2021-06-02 주식회사 엘핀 멀티팩터 인증 수행 장치 및 그 동작 방법
JP2022549671A (ja) * 2019-09-25 2022-11-28 コモンウェルス サイエンティフィック アンド インダストリアル リサーチ オーガナイゼーション ブラウザアプリケーション用の暗号化サービス
US11146954B2 (en) 2019-10-08 2021-10-12 The Toronto-Dominion Bank System and method for establishing a trusted session
US11722312B2 (en) * 2020-03-09 2023-08-08 Sony Group Corporation Privacy-preserving signature
CN112615834B (zh) * 2020-12-08 2023-04-07 北京北信源软件股份有限公司 一种安全认证方法及系统
CN112579566B (zh) * 2020-12-14 2023-03-31 浪潮云信息技术股份公司 分布式id的生成方法及装置
US11539689B2 (en) * 2021-01-19 2022-12-27 Visa International Service Association System, method, and apparatus for authenticating a user device
CN113014386B (zh) * 2021-03-30 2023-06-02 宋煜 基于多方协同计算的密码系统
US12095753B2 (en) 2021-04-08 2024-09-17 Akamai Technologies, Inc. End-to-end verifiable multi-factor authentication service
GB2622177A (en) * 2021-08-10 2024-03-06 Keyless Tech Srl Authentication processing services for generating high-entropy cryptographic keys
US11507621B1 (en) * 2021-11-15 2022-11-22 The Trade Desk, Inc. Methods and systems for generating communications associated with optimization codes
US12387201B2 (en) * 2022-07-01 2025-08-12 Bank Of America Corporation Multi-factor user authentication using blockchain tokens
WO2024108281A1 (fr) * 2022-11-25 2024-05-30 Clovis Golfetto Système et procédé pour authentification unique d'utilisateur
KR20240132642A (ko) * 2023-02-27 2024-09-04 삼성전자주식회사 생체 정보를 암호화하는 전자 장치 및 그 동작 방법
EP4645140A4 (fr) 2023-02-27 2026-04-01 Samsung Electronics Co Ltd Dispositif électronique pour chiffrer des informations biométriques et son procédé de fonctionnement
US20240250834A1 (en) * 2024-03-31 2024-07-25 David Stavetski Mechanism for cryptographic digital signatures using geodetic boundaries

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3053527B2 (ja) * 1993-07-30 2000-06-19 インターナショナル・ビジネス・マシーンズ・コーポレイション パスワードを有効化する方法及び装置、パスワードを生成し且つ予備的に有効化する方法及び装置、認証コードを使用して資源のアクセスを制御する方法及び装置
US9768963B2 (en) * 2005-12-09 2017-09-19 Citicorp Credit Services, Inc. (Usa) Methods and systems for secure user authentication
WO2012014231A1 (fr) * 2010-07-29 2012-02-02 Nirmal Juthani Système et procédé permettant de générer une clé de serveur sécurisée et personnalisée répondant à plusieurs facteurs à partir d'un simple mot de passe d'utilisateur
US8869255B2 (en) * 2010-11-30 2014-10-21 Forticom Group Ltd Method and system for abstracted and randomized one-time use passwords for transactional authentication
EP2885904B1 (fr) * 2012-08-03 2018-04-25 Vasco Data Security International GmbH Procede et appareil d'authentification pratique pour l'utilisateur, utilisant une application d'authentification mobile.
US9282120B2 (en) * 2013-02-01 2016-03-08 Vidder, Inc. Securing communication over a network using client integrity verification
CN104517094A (zh) * 2013-09-30 2015-04-15 阿里巴巴集团控股有限公司 一种身份验证方法和身份验证装置
US9949115B2 (en) * 2014-06-10 2018-04-17 Qualcomm Incorporated Common modulus RSA key pairs for signature generation and encryption/decryption

Also Published As

Publication number Publication date
IL261810B2 (en) 2023-06-01
EP3430554A4 (fr) 2019-09-04
EP3430554A1 (fr) 2019-01-23
WO2017156590A1 (fr) 2017-09-21
JP2019512961A (ja) 2019-05-16
ZA201806243B (en) 2019-07-31
CA3017533A1 (fr) 2017-09-21
US20210264010A1 (en) 2021-08-26
EA201892109A1 (ru) 2019-02-28
CN109074437A (zh) 2018-12-21
KR20180117715A (ko) 2018-10-29
US11017067B2 (en) 2021-05-25
PH12018501983A1 (en) 2019-07-01
IL261810A (en) 2018-10-31
AU2017233545A1 (en) 2018-10-04
BR112018068884A2 (pt) 2019-01-22
HK1258980A1 (zh) 2019-11-22
MA45323A (fr) 2019-01-23
US20190034612A1 (en) 2019-01-31

Similar Documents

Publication Publication Date Title
SG11201807995TA (en) Method and system for user authentication with improved security
SG11201905463TA (en) Abstract enclave identity
SG11201808737YA (en) Unique token authentication cryptogram
SG11201804361YA (en) Method for managing a trusted identity
SG11201900749WA (en) System and methods for authenticating a user using biometric data
SG11201803830PA (en) Method, device, server and system for authenticating a user
SG11201909630TA (en) Anti-replay attack authentication protocol
SG11201806785YA (en) Tokenisation method and system for implementing exchanges on a blockchain
SG11202000330XA (en) Concept for generating an enhanced sound field description or a modified sound field description using a multi-point sound field description
SG11201811691RA (en) Systems and methods for verifying authenticity of id photo
SG11201806709PA (en) Universal tokenisation system for blockchain-based cryptocurrencies
SG11201905462WA (en) Cross-platform enclave identity
SG11201803742YA (en) Method and system for processing of a blockchain transaction in a transaction processing network
SG11201804697PA (en) Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography
SG11201908554PA (en) Methods and devices for acquiring and recording tracking information on blockchain
SG11201809117QA (en) Operating system for blockchain iot devices
SG11201903276VA (en) Virtual reality identity verification
SG11201905458WA (en) Addressing a trusted execution environment using signing key
SG11201810431PA (en) Biometric identification and verification among iot devices and applications
SG11201908661UA (en) Providing cryptocurrency payments through a browser application programming interface
SG11201903604PA (en) Iot security service
SG11201907320YA (en) Trusted login method, server, and system
SG11201900116RA (en) Communication flow for verification and identification check
SG11201900748QA (en) Method and system for cardless atm transaction via mobile device
SG11202000267WA (en) Method and system for transaction processing with complete cryptographic auditability