Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cryptomathic Ltd
Original Assignee
Cryptomathic Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/628,828external-prioritypatent/US20140089202A1/en
Application filed by Cryptomathic LtdfiledCriticalCryptomathic Ltd
Priority claimed from PCT/GB2013/052669external-prioritypatent/WO2015055972A1/en
Publication of GB201504898D0publicationCriticalpatent/GB201504898D0/en
Publication of GB2525742ApublicationCriticalpatent/GB2525742A/en
G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F21/60—Protecting data
G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
G—PHYSICS
G06—COMPUTING OR CALCULATING; COUNTING
G06F—ELECTRIC DIGITAL DATA PROCESSING
G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
G06F21/31—User authentication
G—PHYSICS
G06—COMPUTING OR CALCULATING; COUNTING
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
G06Q20/00—Payment architectures, schemes or protocols
G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
G06Q20/322—Aspects of commerce using mobile devices [M-devices]
G06Q20/3223—Realising banking transactions through M-devices
G—PHYSICS
G06—COMPUTING OR CALCULATING; COUNTING
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
G06Q20/00—Payment architectures, schemes or protocols
G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
G06Q20/326—Payment applications installed on the mobile devices
G—PHYSICS
G06—COMPUTING OR CALCULATING; COUNTING
G06F—ELECTRIC DIGITAL DATA PROCESSING
G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
JUN XU et al, "Transparent runtime randomization for security", Reliable Distributed Systems, 2003, Proceedings. 22nd International Symposium on, Piscataway, USA, IEEE, 6 October 2003, pages 260-269. XP010662101. DOI: 10.1109/RELDIS.2003.1238076. ISBN: 978-0-7695-1955-5.*
Open Mobile Alliance (OMA), "Mobile Proximity Payment Issue and Recommendations 1.0", San Diego, USA, 10 December 2006, pages 1-88. XP064017300. Retrieved from the Internet: URL: ftp/Public_documents/ARCH/ARC-MCC/2006 /, [retrieved on 2006-12-10].*
Methods and client computing devices that allow delegating user credentials from the client computing device to a server computing device in a computer network, eventually in a single connection, and obtaining secure resources from the server.