Movatterモバイル変換


[0]ホーム

URL:


US20030115452A1 - One time password entry to access multiple network sites - Google Patents

One time password entry to access multiple network sites
Download PDF

Info

Publication number
US20030115452A1
US20030115452A1US09/739,114US73911400AUS2003115452A1US 20030115452 A1US20030115452 A1US 20030115452A1US 73911400 AUS73911400 AUS 73911400AUS 2003115452 A1US2003115452 A1US 2003115452A1
Authority
US
United States
Prior art keywords
key
symmetric crypto
crypto
encrypted
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/739,114
Inventor
Ravi Sandhu
Colin deSa
Karuna Ganesan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tricipher Inc
Original Assignee
SingleSignOn net Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SingleSignOn net IncfiledCriticalSingleSignOn net Inc
Priority to US09/739,114priorityCriticalpatent/US20030115452A1/en
Assigned to SINGLESIGNON.NET INC.reassignmentSINGLESIGNON.NET INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DESA, COLIN, GANESAN, KARUNA, SANDHU, RAVI
Priority to PCT/US2001/048095prioritypatent/WO2002051049A1/en
Publication of US20030115452A1publicationCriticalpatent/US20030115452A1/en
Priority to US10/849,818prioritypatent/US7055032B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system for accessing multiple different network stations without entry of a password includes first, second and third network stations. The first network station represents a network entity and transmits a request for authentication of a user seeking access. The user has an associated password, identifier and asymmetric crypto-key, including a first private key portion obtainable with the password, a second private key portion and a public key portion. A second network station represents the user and has a user identifier, a combination symmetric crypto-key corresponding to a first symmetric crypto-key and a second symmetric crypto-key, and the first private key portion encrypted with the first symmetric crypto-key stored thereat. In response to the authentication request, this station (i) transmits the stored user identifier MAC'd with the stored combination symmetric key, and (ii) transmits the transmitted authentication request encrypted with the stored combination symmetric crypto-key. A third network station represents a sponsor and has the user identifier, the combination symmetric crypto-key, the first symmetric crypto-key, and the second private key portion stored thereat. This station (i) retrieves the stored combination symmetric crypto-key by matching the transmitted user identifier with the stored user identifier, (ii) verifies the MAC with the retrieved combination symmetric crypto-key to verify the identity of the user, (iii) decrypts the transmitted encrypted authentication request with the retrieved combination symmetric key to recover the authentication request, (iv) encrypts the recovered authentication request with the stored second private key portion and (v) transmits the encrypted authentication request and the first symmetric crypto-key, both encrypted with the retrieved combination symmetric crypto-key. The second network station (i) decrypts the transmitted encrypted authentication request and first symmetric crypto-key with its stored combination symmetric crypto-key to recover the encrypted authentication request and the first symmetric crypto-key, (ii) decrypts the stored encrypted first private key portion with the recovered first symmetric crypto-key to recover the first private key portion, and (iii) transmits the recovered encrypted authentication request further encrypted with the recovered first private key portion. The first station decrypts the transmitted further encrypted authentication request with the user public key to thereby authenticate the user.

Description

Claims (17)

What is claimed is:
1. A system for accessing multiple different network stations without entry of a password, comprising:
a first network station representing a network entity and configured to transmit a request for authentication of a user seeking access, the user having an associated password, an associated user identifier, and an associated asymmetric crypto-key, including a first private key portion obtainable with the password, a second private key portion and a public key portion;
a second network station representing the user, and having the user identifier, a combination symmetric crypto-key corresponding to a first symmetric crypto-key and a second symmetric crypto-key, and the obtained first private key portion encrypted with the first symmetric crypto-key stored thereat, and configured to (i) transmit the stored user identifier MAC'd with the stored combination symmetric crypto-key responsive to the transmitted authentication request, and (ii) transmit the transmitted authentication request encrypted with the stored combination symmetric crypto-key; and
a third network station, representing a sponsor, having the user identifier, the combination symmetric crypto-key, the first symmetric crypto-key, and the second private key portion stored thereat, and configured to (i) retrieve the stored combination symmetric crypto-key by matching the transmitted user identifier with the stored user identifier, (ii) verify the MAC with the retrieved combination symmetric crypto-key to verify identity of the user, (iii) decrypt the transmitted encrypted authentication request with the retrieved combination symmetric crypto-key to recover the authentication request, (iv) encrypt the recovered authentication request with the stored second private key portion and (v) transmit the encrypted authentication request and the first symmetric crypto-key, both encrypted with the retrieved combination symmetric crypto-key;
wherein the second network station is further configured to (i) decrypt the transmitted encrypted authentication request and first symmetric crypto-key, with the stored combination symmetric crypto-key to recover the encrypted authentication request and the first symmetric crypto-key, (ii) decrypt the stored encrypted first private key portion with the recovered first symmetric crypto-key to recover the first private key portion, (iii) to transmit the recovered encrypted authentication request further encrypted with the recovered first private key portion;
wherein the first station is further configured to decrypt the transmitted further encrypted authentication request with the public key to thereby authenticate the user.
2. A system according toclaim 1, wherein the authentication request is a hash message.
3. A system according toclaim 1, wherein the second network station is further configured to receive the password as a user input and obtain the first private key portion with the input password, prior to transmission of the authorization request by the first station.
4. A system according toclaim 1, wherein the combination symmetric crypto-key corresponds to the first symmetric crypto-key XOR'd with the second symmetric crypto-key.
5. A system according toclaim 1, wherein the second network station is further configured to automatically respond to the authentication request without the user inputting the password.
6. A system according toclaim 1, wherein the first symmetric crypto-key is a first random number having a length of 192 bits and the second symmetric crypto-key is a second random number, different than the first random number, having a length of 192 bits.
7. A system according toclaim 1, wherein the third station has a time value, representing a time period for authenticating the user, stored thereat, and is further configured to retrieve the stored time value prior to encrypting the recovered authentication request and to only encrypt the recovered authentication request if the present time is within the time period represented by the time value.
8. A system according toclaim 1, wherein the second network station is further configured to generate the first symmetric crypto-key, and transmit the first symmetric crypto-key encrypted with the obtained first private key portion to the third network station;
the third station is further configured to decrypt the transmitted encrypted first symmetric crypto-key with the second private key portion to recover the first symmetric crypto-key and thereby authenticate the user, to store the decrypted first symmetric crypto-key, to generate the second symmetric crypto-key, to combine the first and the second symmetric crypto-key to form the combination symmetric crypto-key, to store the combination symmetric crypto-key, to transmit the second symmetric crypto-key encrypted with the first symmetric crypto-key to the second network station, and to destroy the second symmetric crypto-key; and
the second network station is further configured to decrypt the transmitted encrypted second symmetric crypto-key with the first symmetric crypto-key to recover the second symmetric crypto-key and thereby authenticate the sponsor, to combine the recovered second symmetric crypto-key with the first symmetric crypto-key to form the combination symmetric crypto-key, to store the combination symmetric crypto-key, to encrypt the first private key portion with the first symmetric crypto-key, to store the encrypted first private key portion, and to destroy the first symmetric crypto-key and the unencrypted first private key portion.
9. A system for accessing multiple different network stations, comprising:
a first station representing a user having a password, an identifier, and an asymmetric crypto-key, including a first private key portion, a second private key portion and a public key portion, and configured to transmit a log-in request including the user identifier; and
a second station representing a sponsor and configured to transmit a challenge responsive to the transmitted log-in request;
wherein the first station is further configured (i) to process the user password to obtain the first private key portion, (ii) to encrypt a first symmetric crypto-key and the transmitted challenge with the obtained first private key portion to form a first encrypted message, and (iii) to transmit the first encrypted message;
wherein the second station is further configured (i) to decrypt the transmitted first encrypted message with the second private key portion to recover the challenge and the first symmetric crypto-key, thereby authenticating the user, (ii) to combine the recovered first symmetric crypto-key with a second symmetric crypto-key to form a combined symmetric crypto-key, (iii) to store the combined symmetric crypto-key, (iv) to encrypt the second symmetric crypto-key and a time value with the first symmetric crypto-key to form a second encrypted message, and (v) to transmit the second encrypted message;
wherein the first station is further configured (i) to decrypt the transmitted second encrypted message with the first symmetric crypto-key to recover the second symmetric crypto-key and the time value, thereby authenticating the sponsor, (ii) to combine the recovered second symmetric crypto-key with the first symmetric crypto-key to form the combined symmetric crypto-key, (iii) to encrypt the first private key portion with the first symmetric crypto-key, (iv) to destroy the first symmetric crypto-key and the obtained first private key portion, (v) to encrypt a request for user authentication from another network entity with the combined symmetric crypto-key to form a third encrypted message and (vi) to transmit the user identifier, MAC'd with the combined symmetric crypto-key, and the third encrypted message;
wherein the second station is further configured (i) to match the transmitted user identifier with the previously transmitted user identifier to retrieve the combined symmetric crypto-key, (ii) verify the MAC with the retrieved combined symmetric crypto-key to verify identity of the user, (iii) to decrypt the third encrypted message with the combined symmetric crypto-key to recover the request for user authentication, (iv) to encrypt the request for user authentication with the second private key portion to form a fourth encrypted message, (v) to encrypt the first symmetric crypto-key and the fourth encrypted message with the combined symmetric crypto-key to form a fifth encrypted message and (vi) to transmit the fifth encrypted message;
wherein the first network station is further configured (i) to decrypt the transmitted fifth encrypted message with the combined symmetric crypto-key to recover the transmitted first symmetric crypto-key and the transmitted fourth encrypted message, and thereby verify an identity of the sponsor, (ii) to decrypt the encrypted first private key portion with the recovered first symmetric crypto-key, (iii) to further encrypt the recovered fourth encrypted message with the decrypted first private key portion to form an authentication message, (iv) to transmit the authentication message to the other network entity to authenticate the user.
10. A method for accessing multiple different network stations without entry of a password associated with a user also having an associated identifier and an associated asymmetric crypto-key, including a first private key portion obtainable with the password, a second private key portion and a public key portion, comprising:
receiving a request for authentication of the user;
retrieving from a first memory, without entry of the user password, the user identifier, a combination symmetric crypto-key corresponding to a first symmetric crypto-key and a second symmetric crypto-key, and the first private key portion encrypted with the first symmetric crypto-key;
encrypting the transmitted authentication request with the retrieved combination symmetric crypto-key;
transmitting the retrieved user identifier MAC'd with the retrieved combination symmetric crypto-key, and the received authentication request encrypted with the retrieved combination symmetric crypto-key;
matching the transmitted user identifier with a user identifier stored in a second memory, different than the first memory, to retrieve the combination symmetric crypto-key from the second memory;
verifying the MAC with the retrieved combination symmetric crypto-key to verify identity of the user;
decrypting the transmitted encrypted authentication request with the combination symmetric crypto-key to recover the authorization request;
retrieving the second private key portion and the first symmetric crypto-key from the second memory;
encrypting the recovered authorization request with the retrieved second private key portion to form an authentication message;
transmitting the authentication message and the retrieved first symmetric crypto-key, both encrypted with the combination symmetric crypto-key;
decrypting the transmitted encrypted authentication message and first symmetric crypto-key, with the combination symmetric crypto-key retrieved from the first memory to recover the authentication message and the first symmetric crypto-key;
decrypting the retrieved encrypted first private key portion with the recovered first symmetric crypto-key;
encrypting the recovered authentication message with the decrypted first private key portion to complete the authentication message;
transmitting the completed authentication message; and
decrypting the transmitted completed authentication message with the user public key to thereby authenticate the user.
11. A method according toclaim 10, wherein the authentication request is a hash message.
12. A method according toclaim 10, further comprising:
processing the user password to obtain the first private key portion, prior to receipt of the authentication request.
13. A method according toclaim 10, further comprising:
XOR'ing the first symmetric crypto-key with the second symmetric crypto-key to generate the combination symmetric crypto-key. A method according toclaim 10, wherein the first symmetric crypto-key is a first random number having a length of 192 bits and the second symmetric crypto-key is a second random number, different than the first random number, having a length of 192 bits.
14. A method according toclaim 10, further comprising:
retrieving a time value, representing a time period for authenticating the user, from the second memory; and
only encrypting the recovered authentication request if the present time is within the time period represented by the retrieved time value.
16. A method according toclaim 10, further comprising:
generating the first symmetric crypto-key;
transmitting the first symmetric crypto-key encrypted with the obtained first private key portion;
decrypting the transmitted encrypted first symmetric crypto-key with the second private key portion to recover the first symmetric crypto-key and thereby authenticate the user;
storing the decrypted first symmetric crypto-key in the second memory;
generating the second symmetric crypto-key;
combining the first and the second symmetric crypto-keys to form the combination symmetric crypto-key;
storing the combination symmetric crypto-key in the second memory;
transmitting the second symmetric crypto-key encrypted with the first symmetric crypto-key;
destroying the second symmetric crypto-key;
decrypting the transmitted encrypted second symmetric crypto-key with the first symmetric crypto-key to recover the second symmetric crypto-key and thereby authenticate the sponsor;
combining the recovered second symmetric crypto-key with the first symmetric crypto-key to form the combination symmetric crypto-key;
storing the combination symmetric crypto-key in the first memory;
encrypting the first private key portion with the first symmetric crypto-key;
storing the encrypted first private key portion in the first memory; and
destroying the first symmetric crypto-key used to encrypt the first private key portion and the unencrypted first private key portion.
17. A method for accessing multiple different network stations by a user having a user identifier, a user password and an asymmetric crypto-key, including a first private key portion, a second private key portion and a public key portion;
transmitting a log-in request including the user identifier;
transmitting a challenge of a sponsor responsive to the transmitted log-in request;
processing the user password to obtain the first private key portion;
encrypting a first symmetric crypto-key and the transmitted challenge with the obtained first private key portion to form a first encrypted message;
transmitting the first encrypted message;
decrypting the transmitted first encrypted message with the second private key portion to recover the challenge and the first symmetric crypto-key, and thereby authenticate the user to the sponsor;
combining the recovered first symmetric crypto-key with a second symmetric crypto-key to form a combined symmetric crypto-key;
storing the combined symmetric crypto-key in a first memory;
encrypting the second symmetric crypto-key with the first symmetric crypto-key to form a second encrypted message;
transmitting the second encrypted message;
decrypting the transmitted second encrypted message with the first symmetric crypto-key to recover the second symmetric crypto-key, and thereby authenticate the sponsor to the user;
combining the recovered second symmetric crypto-key with the first symmetric crypto-key to form the combined symmetric crypto-key;
storing the combined symmetric crypto-key in a second memory, different than the first memory;
encrypting the first private key portion with the first symmetric crypto-key;
destroying the first symmetric crypto-key used to encrypt the first private key portion and the obtained first private key portion;
encrypting a request for authentication of the user with the combined symmetric crypto-key to form a third encrypted message;
transmitting the user identifier, MAC'd with the combined symmetric crypto-key, and the third encrypted message;
matching the transmitted user identifier with the previously transmitted user identifier to retrieve the combined symmetric crypto-key from the second memory;
verifying the transmitted MAC with the retrieved combined symmetric crypto-key to verify an identity of the user;
decrypting the third encrypted message with the combined symmetric crypto-key to recover the request for user authentication;
encrypting the request for user authentication with the second private key portion to form a fourth encrypted message;
encrypting the first symmetric crypto-key and the fourth encrypted message with the combined symmetric crypto-key stored in the first memory to form a fifth encrypted message;
transmitting the fifth encrypted message;
decrypting the transmitted fifth encrypted message with the combined symmetric crypto-key stored in the second memory to recover the transmitted first symmetric crypto-key and the transmitted fourth encrypted message, and thereby verify an identity of the sponsor;
decrypting the encrypted first private key portion with the recovered first symmetric crypto-key;
further encrypting the recovered fourth encrypted message with the decrypted first private key portion to form an authentication message;
transmitting the authentication message to the other network entity to authenticate the user.
18. A method for accessing multiple different network stations without entry of a password associated with a user having an associated first symmetric crypto-key, an associated second symmetric crypto-key and an associated asymmetric crypto-key, including a first private key portion, a second private key portion and a public key portion, comprising:
encrypting the first private key portion with the first symmetric crypto-key;
transmitting a request, of a network station, for authentication of the user, encrypted with the second symmetric crypto-key to a sponsor;
decrypting the transmitted encrypted authentication request with the second symmetric crypto-key to recover the authentication request;
encrypting the recovered authentication request with the second private key portion to form an authentication message;
transmitting the authentication message and the first symmetric crypto-key, both encrypted with the second symmetric crypto-key to the user;
decrypting both the transmitted encrypted authentication message and the transmitted encrypted first symmetric crypto-key with the second symmetric crypto-key to recover the authentication message and the first symmetric crypto-key;
decrypting the first private key portion with the recovered first symmetric crypto-key;
transmitting the authentication message encrypted the recovered first symmetric crypto-key to the network station; and
decrypting the transmitted encrypted authentication message with the public key portion to recover the authentication request and thereby authenticate the user to the network station.
US09/739,1142000-12-192000-12-19One time password entry to access multiple network sitesAbandonedUS20030115452A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US09/739,114US20030115452A1 (en)2000-12-192000-12-19One time password entry to access multiple network sites
PCT/US2001/048095WO2002051049A1 (en)2000-12-192001-12-18One time password entry to access multiple network sites
US10/849,818US7055032B2 (en)2000-12-192004-05-21One time password entry to access multiple network sites

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US09/739,114US20030115452A1 (en)2000-12-192000-12-19One time password entry to access multiple network sites

Related Child Applications (2)

Application NumberTitlePriority DateFiling Date
US09/739,260ContinuationUS6970562B2 (en)2000-12-192000-12-19System and method for crypto-key generation and use in cryptosystem
US10/849,818ContinuationUS7055032B2 (en)2000-12-192004-05-21One time password entry to access multiple network sites

Publications (1)

Publication NumberPublication Date
US20030115452A1true US20030115452A1 (en)2003-06-19

Family

ID=24970879

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US09/739,114AbandonedUS20030115452A1 (en)2000-12-192000-12-19One time password entry to access multiple network sites
US10/849,818Expired - LifetimeUS7055032B2 (en)2000-12-192004-05-21One time password entry to access multiple network sites

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US10/849,818Expired - LifetimeUS7055032B2 (en)2000-12-192004-05-21One time password entry to access multiple network sites

Country Status (2)

CountryLink
US (2)US20030115452A1 (en)
WO (1)WO2002051049A1 (en)

Cited By (45)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030084296A1 (en)*2001-01-112003-05-01Masaki KyojimaAccess privilege authentication of client computer for services provided by sever computer
US20050081041A1 (en)*2003-10-102005-04-14Jing-Jang HwangPartition and recovery of a verifiable digital secret
US20050160264A1 (en)*2004-01-212005-07-21Reid KuhnTrusted authentication credential exchange methods and apparatuses
US20050246769A1 (en)*2002-08-142005-11-03Laboratories For Information TechnologyMethod of generating an authentication
US20060242415A1 (en)*2005-04-222006-10-26Citrix Systems, Inc.System and method for key recovery
US20070016484A1 (en)*2005-07-122007-01-18Waters Timothy MMethod for facilitating authorized online communication
US20070033642A1 (en)*2003-07-312007-02-08Tricipher, Inc.Protecting one-time-passwords against man-in-the-middle attacks
US20070033393A1 (en)*2005-05-312007-02-08Tricipher, Inc.Secure login using single factor split key asymmetric cryptography and an augmenting factor
US20070067618A1 (en)*2005-01-182007-03-22Tricipher, Inc.Asymmetric crypto-graphy with rolling key security
US20080235511A1 (en)*2006-12-212008-09-25Bce Inc.Device authentication and secure channel management for peer-to-peer initiated communications
US20080320575A1 (en)*2002-07-022008-12-25Gelb Elizabeth ASystem and method for data capture and reporting
US20090222669A1 (en)*2005-08-232009-09-03Tea Vui HuangMethod for controlling the location information for authentication of a mobile station
US20090222658A1 (en)*2005-02-142009-09-03Ravinderpal Singh SandhuRoaming utilizing an asymmetric key pair
US20090271853A1 (en)*2002-03-252009-10-29Bank One, Delaware, National AssociationSystems and methods for time variable financial authentication
US7660419B1 (en)*2004-08-132010-02-09Texas Instruments IncorporatedSystem and method for security association between communication devices within a wireless personal and local area network
US20100202609A1 (en)*2005-02-142010-08-12Ravinderpal Singh SandhuSecuring multifactor split key asymmetric crypto keys
US20120198228A1 (en)*2010-12-202012-08-02Jon OberheideSystem and method for digital user authentication
US8892873B1 (en)*2012-06-072014-11-18Amazon Technologies, Inc.Verification of user communication addresses
US9053310B2 (en)2013-08-082015-06-09Duo Security, Inc.System and method for verifying status of an authentication device through a biometric profile
US9092302B2 (en)2013-09-102015-07-28Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US9121401B2 (en)2012-03-202015-09-01Aperia Technologies, Inc.Passive pressure regulation mechanism
US9338156B2 (en)2013-02-222016-05-10Duo Security, Inc.System and method for integrating two-factor authentication in a device
US9361451B2 (en)2011-10-072016-06-07Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US9443073B2 (en)2013-08-082016-09-13Duo Security, Inc.System and method for verifying status of an authentication device
US9467463B2 (en)2011-09-022016-10-11Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US9491175B2 (en)2013-02-222016-11-08Duo Security, Inc.System and method for proxying federated authentication protocols
US9524388B2 (en)2011-10-072016-12-20Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US9532222B2 (en)2010-03-032016-12-27Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US9544143B2 (en)2010-03-032017-01-10Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US9608814B2 (en)2013-09-102017-03-28Duo Security, Inc.System and method for centralized key distribution
US9607156B2 (en)2013-02-222017-03-28Duo Security, Inc.System and method for patching a device through exploitation
US9762590B2 (en)2014-04-172017-09-12Duo Security, Inc.System and method for an integrity focused authentication service
US9774579B2 (en)2015-07-272017-09-26Duo Security, Inc.Method for key rotation
US9825765B2 (en)2015-03-312017-11-21Duo Security, Inc.Method for distributed trust authentication
US9979719B2 (en)2015-01-062018-05-22Duo Security, Inc.System and method for converting one-time passcodes to app-based authentication
CN109150510A (en)*2018-08-152019-01-04飞天诚信科技股份有限公司A kind of method and apparatus obtaining symmetric key
US20190130068A1 (en)*2017-10-272019-05-02Welch Allyn, Inc.Secure Patient Data in Medical Environments
US10333903B1 (en)*2015-06-162019-06-25Amazon Technologies, Inc.Provisioning network keys to devices to allow them to provide their identity
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
US10547444B2 (en)*2015-02-172020-01-28Visa International Service AssociationCloud encryption key broker apparatuses, methods and systems
CN112069092A (en)*2013-08-192020-12-11Visa欧洲有限公司Method for realizing data access and equipment for realizing data access by requester
US11251970B2 (en)*2016-10-182022-02-15Cybernetica AsComposite digital signatures
CN114900300A (en)*2022-06-202022-08-12中国联合网络通信集团有限公司Cloud service temporary login key authentication method, device, equipment and storage medium
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
US12089034B2 (en)*2016-05-302024-09-10Telecom Italia S.P.A.Protection of privacy in wireless telecommunication networks

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2821225B1 (en)*2001-02-202005-02-04Mobileway REMOTE ELECTRONIC PAYMENT SYSTEM
US7412720B1 (en)*2001-11-022008-08-12Bea Systems, Inc.Delegated authentication using a generic application-layer network protocol
US7543333B2 (en)*2002-04-082009-06-02Microsoft CorporationEnhanced computer intrusion detection methods and systems
US9602275B2 (en)*2003-10-282017-03-21Intel CorporationServer pool kerberos authentication scheme
US8025567B2 (en)*2004-05-072011-09-27Gamelogic Inc.Method and apparatus for conducting a game of chance
US20060082056A1 (en)*2004-05-072006-04-20Kane Steven NMethod and apparatus for conducting a game tournament
US20060095785A1 (en)*2004-10-292006-05-04Electronic Data Systems CorporationSystem, method, and computer program product for user password reset
US20060159269A1 (en)*2005-01-202006-07-20Matsushita Electric Industrial Co., Ltd.Cryptographic system for resource starved CE device secure upgrade and re-configuration
KR100843072B1 (en)*2005-02-032008-07-03삼성전자주식회사 Wireless network system and communication method using same
US20080260157A1 (en)*2005-07-292008-10-23Matsushita Electric Industrial Co., Ltd.Recording Apparatus and Recording Medium
US7690026B2 (en)*2005-08-222010-03-30Microsoft CorporationDistributed single sign-on service
US8959596B2 (en)*2006-06-152015-02-17Microsoft Technology Licensing, LlcOne-time password validation in a multi-entity environment
US8832822B2 (en)*2007-01-192014-09-09Kryptiq CorporationSmart identifiers
US7926095B1 (en)2007-05-042011-04-12Avaya Inc.Efficient authentication system for primary and secondary servers
US8094812B1 (en)*2007-09-282012-01-10Juniper Networks, Inc.Updating stored passwords
US8397077B2 (en)*2007-12-072013-03-12Pistolstar, Inc.Client side authentication redirection
EP2248296A4 (en)*2008-02-212017-06-21Alcatel LucentOne-pass authentication mechanism and system for heterogeneous networks
US20100077450A1 (en)*2008-09-242010-03-25Microsoft CorporationProviding simplified internet access
US8151333B2 (en)2008-11-242012-04-03Microsoft CorporationDistributed single sign on technologies including privacy protection and proactive updating
WO2011044351A2 (en)*2009-10-072011-04-14The Ohio State UniversityWireless security protocol
US8549314B2 (en)2010-04-292013-10-01King Saud UniversityPassword generation methods and systems
US20130108045A1 (en)2011-10-272013-05-02Architecture Technology, Inc.Methods, networks and nodes for dynamically establishing encrypted communications
WO2014045173A1 (en)*2012-09-182014-03-27Koninklijke Philips N.V.Controlling access to clinical data analyzed by remote computing resources
US9954843B2 (en)*2013-02-282018-04-24Microsoft Technology Licensing, LlcWeb ticket based upon a symmetric key usable for user authentication
US9536067B1 (en)2014-01-012017-01-03Bryant Christopher LeePassword submission without additional user input
WO2018236351A1 (en)2017-06-202018-12-27Hewlett-Packard Development Company, L.P. SYMMETRICAL ENCRYPTION OF A SECRET KEY PHRASE KEY MASTER
CN110869194B (en)2017-07-102022-07-15惠普发展公司,有限责任合伙企业Nested sections in object models for additive manufacturing
EP3644572B1 (en)*2018-10-272022-03-23Zertificon Solutions GmbHSecure communication of payload data
US11722464B2 (en)*2019-02-282023-08-08Vmware, Inc.Symmetric account authentication

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5398285A (en)*1993-12-301995-03-14Motorola, Inc.Method for generating a password using public key cryptography
US5557678A (en)*1994-07-181996-09-17Bell Atlantic Network Services, Inc.System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
US5737419A (en)*1994-11-091998-04-07Bell Atlantic Network Services, Inc.Computer system for securing communications using split private key asymmetric cryptography
US6948070B1 (en)*1995-02-132005-09-20Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US6226383B1 (en)*1996-04-172001-05-01Integrity Sciences, Inc.Cryptographic methods for remote authentication
US6178409B1 (en)*1996-06-172001-01-23Verifone, Inc.System, method and article of manufacture for multiple-entry point virtual point of sale architecture
US6072876A (en)1996-07-262000-06-06Nippon Telegraph And Telephone CorporationMethod and system for depositing private key used in RSA cryptosystem
US6005939A (en)*1996-12-061999-12-21International Business Machines CorporationMethod and apparatus for storing an internet user's identity and access rights to world wide web resources
US6094721A (en)1997-10-312000-07-25International Business Machines CorporationMethod and apparatus for password based authentication in a distributed system
CA2255285C (en)*1998-12-042009-10-13Certicom Corp.Enhanced subscriber authentication protocol
US6542993B1 (en)*1999-03-122003-04-01Lucent Technologies Inc.Security management system and method
US6704873B1 (en)*1999-07-302004-03-09Accenture LlpSecure gateway interconnection in an e-commerce based environment
CN1249972C (en)*2000-06-052006-04-05凤凰技术有限公司System, methods, and software for remote password authentication using multiple servers

Cited By (88)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030084296A1 (en)*2001-01-112003-05-01Masaki KyojimaAccess privilege authentication of client computer for services provided by sever computer
US7165176B2 (en)*2001-01-112007-01-16Fuji Xerox Co., Ltd.Access privilege authentication of client computer for services provided by server computer
US9240089B2 (en)*2002-03-252016-01-19Jpmorgan Chase Bank, N.A.Systems and methods for time variable financial authentication
US20090271853A1 (en)*2002-03-252009-10-29Bank One, Delaware, National AssociationSystems and methods for time variable financial authentication
US9911117B1 (en)2002-03-252018-03-06Jpmorgan Chase Bank, N.A.Systems and methods for time variable financial authentication
US20080320575A1 (en)*2002-07-022008-12-25Gelb Elizabeth ASystem and method for data capture and reporting
US8561159B2 (en)*2002-07-022013-10-15American Express Travel Related Services Company, Inc.System and method for data capture and reporting
US7233782B2 (en)*2002-08-142007-06-19Agency For Science, Technology And ResearchMethod of generating an authentication
US20050246769A1 (en)*2002-08-142005-11-03Laboratories For Information TechnologyMethod of generating an authentication
US20070033642A1 (en)*2003-07-312007-02-08Tricipher, Inc.Protecting one-time-passwords against man-in-the-middle attacks
US20050081041A1 (en)*2003-10-102005-04-14Jing-Jang HwangPartition and recovery of a verifiable digital secret
US7596704B2 (en)2003-10-102009-09-29Jing-Jang HwangPartition and recovery of a verifiable digital secret
US20050160264A1 (en)*2004-01-212005-07-21Reid KuhnTrusted authentication credential exchange methods and apparatuses
US7660419B1 (en)*2004-08-132010-02-09Texas Instruments IncorporatedSystem and method for security association between communication devices within a wireless personal and local area network
US20070067618A1 (en)*2005-01-182007-03-22Tricipher, Inc.Asymmetric crypto-graphy with rolling key security
US8099607B2 (en)2005-01-182012-01-17Vmware, Inc.Asymmetric crypto-graphy with rolling key security
US8340287B2 (en)2005-02-142012-12-25Vmware, Inc.Securing multifactor split key asymmetric crypto keys
US8213608B2 (en)*2005-02-142012-07-03Vmware, Inc.Roaming utilizing an asymmetric key pair
US20090222658A1 (en)*2005-02-142009-09-03Ravinderpal Singh SandhuRoaming utilizing an asymmetric key pair
US20100202609A1 (en)*2005-02-142010-08-12Ravinderpal Singh SandhuSecuring multifactor split key asymmetric crypto keys
US20060242415A1 (en)*2005-04-222006-10-26Citrix Systems, Inc.System and method for key recovery
US7831833B2 (en)*2005-04-222010-11-09Citrix Systems, Inc.System and method for key recovery
US7840993B2 (en)*2005-05-042010-11-23Tricipher, Inc.Protecting one-time-passwords against man-in-the-middle attacks
WO2006130615A3 (en)*2005-05-312007-12-21Tricipher IncSecure login using single factor split key asymmetric cryptography and an augmenting factor
US20070033393A1 (en)*2005-05-312007-02-08Tricipher, Inc.Secure login using single factor split key asymmetric cryptography and an augmenting factor
US7734912B2 (en)2005-05-312010-06-08Tricipher, Inc.Secure login using single factor split key asymmetric cryptography and an augmenting factor
WO2006130616A3 (en)*2005-05-312007-12-27Tricipher IncAugmented single factor split key asymmetric cryptography-key generation and distributor
US20070016484A1 (en)*2005-07-122007-01-18Waters Timothy MMethod for facilitating authorized online communication
US20090222669A1 (en)*2005-08-232009-09-03Tea Vui HuangMethod for controlling the location information for authentication of a mobile station
US8423768B2 (en)*2005-08-232013-04-16Smarttrust AbMethod for controlling the location information for authentication of a mobile station
US9755825B2 (en)*2006-12-212017-09-05Bce Inc.Device authentication and secure channel management for peer-to-peer initiated communications
US20080235511A1 (en)*2006-12-212008-09-25Bce Inc.Device authentication and secure channel management for peer-to-peer initiated communications
US10445732B2 (en)2010-03-032019-10-15Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US10706421B2 (en)2010-03-032020-07-07Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US11172361B2 (en)2010-03-032021-11-09Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US11341475B2 (en)2010-03-032022-05-24Cisco Technology, IncSystem and method of notifying mobile devices to complete transactions after additional agent verification
US10129250B2 (en)2010-03-032018-11-13Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US9992194B2 (en)2010-03-032018-06-05Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US11832099B2 (en)2010-03-032023-11-28Cisco Technology, Inc.System and method of notifying mobile devices to complete transactions
US9544143B2 (en)2010-03-032017-01-10Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US9532222B2 (en)2010-03-032016-12-27Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US9282085B2 (en)*2010-12-202016-03-08Duo Security, Inc.System and method for digital user authentication
US20120198228A1 (en)*2010-12-202012-08-02Jon OberheideSystem and method for digital user authentication
US10348756B2 (en)2011-09-022019-07-09Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US9467463B2 (en)2011-09-022016-10-11Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US9524388B2 (en)2011-10-072016-12-20Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US9361451B2 (en)2011-10-072016-06-07Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US9121401B2 (en)2012-03-202015-09-01Aperia Technologies, Inc.Passive pressure regulation mechanism
US8892873B1 (en)*2012-06-072014-11-18Amazon Technologies, Inc.Verification of user communication addresses
US9270666B2 (en)2012-06-072016-02-23Amazon Technologies, Inc.Verification of user communication addresses
US10764286B2 (en)2013-02-222020-09-01Duo Security, Inc.System and method for proxying federated authentication protocols
US10013548B2 (en)2013-02-222018-07-03Duo Security, Inc.System and method for integrating two-factor authentication in a device
US9455988B2 (en)2013-02-222016-09-27Duo Security, Inc.System and method for verifying status of an authentication device
US10223520B2 (en)2013-02-222019-03-05Duo Security, Inc.System and method for integrating two-factor authentication in a device
US10200368B2 (en)2013-02-222019-02-05Duo Security, Inc.System and method for proxying federated authentication protocols
US11323441B2 (en)2013-02-222022-05-03Cisco Technology, Inc.System and method for proxying federated authentication protocols
US9491175B2 (en)2013-02-222016-11-08Duo Security, Inc.System and method for proxying federated authentication protocols
US9338156B2 (en)2013-02-222016-05-10Duo Security, Inc.System and method for integrating two-factor authentication in a device
US9607156B2 (en)2013-02-222017-03-28Duo Security, Inc.System and method for patching a device through exploitation
US9443073B2 (en)2013-08-082016-09-13Duo Security, Inc.System and method for verifying status of an authentication device
US9053310B2 (en)2013-08-082015-06-09Duo Security, Inc.System and method for verifying status of an authentication device through a biometric profile
US9454656B2 (en)2013-08-082016-09-27Duo Security, Inc.System and method for verifying status of an authentication device through a biometric profile
CN112069092A (en)*2013-08-192020-12-11Visa欧洲有限公司Method for realizing data access and equipment for realizing data access by requester
US9092302B2 (en)2013-09-102015-07-28Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US9996343B2 (en)2013-09-102018-06-12Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US9454365B2 (en)2013-09-102016-09-27Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US10248414B2 (en)2013-09-102019-04-02Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US9608814B2 (en)2013-09-102017-03-28Duo Security, Inc.System and method for centralized key distribution
US9762590B2 (en)2014-04-172017-09-12Duo Security, Inc.System and method for an integrity focused authentication service
US10021113B2 (en)2014-04-172018-07-10Duo Security, Inc.System and method for an integrity focused authentication service
US9979719B2 (en)2015-01-062018-05-22Duo Security, Inc.System and method for converting one-time passcodes to app-based authentication
US10547444B2 (en)*2015-02-172020-01-28Visa International Service AssociationCloud encryption key broker apparatuses, methods and systems
US10116453B2 (en)2015-03-312018-10-30Duo Security, Inc.Method for distributed trust authentication
US9825765B2 (en)2015-03-312017-11-21Duo Security, Inc.Method for distributed trust authentication
US9942048B2 (en)2015-03-312018-04-10Duo Security, Inc.Method for distributed trust authentication
US10333903B1 (en)*2015-06-162019-06-25Amazon Technologies, Inc.Provisioning network keys to devices to allow them to provide their identity
US11258769B2 (en)2015-06-162022-02-22Amazon Technologies, Inc.Provisioning network keys to devices to allow them to provide their identity
US10063531B2 (en)2015-07-272018-08-28Duo Security, Inc.Method for key rotation
US10742626B2 (en)2015-07-272020-08-11Duo Security, Inc.Method for key rotation
US9774579B2 (en)2015-07-272017-09-26Duo Security, Inc.Method for key rotation
US12089034B2 (en)*2016-05-302024-09-10Telecom Italia S.P.A.Protection of privacy in wireless telecommunication networks
US11251970B2 (en)*2016-10-182022-02-15Cybernetica AsComposite digital signatures
US20190130068A1 (en)*2017-10-272019-05-02Welch Allyn, Inc.Secure Patient Data in Medical Environments
US10614914B2 (en)*2017-10-272020-04-07Welch Allyn, Inc.Secure patient data in medical environments
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
CN109150510A (en)*2018-08-152019-01-04飞天诚信科技股份有限公司A kind of method and apparatus obtaining symmetric key
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
CN114900300A (en)*2022-06-202022-08-12中国联合网络通信集团有限公司Cloud service temporary login key authentication method, device, equipment and storage medium

Also Published As

Publication numberPublication date
US7055032B2 (en)2006-05-30
WO2002051049A1 (en)2002-06-27
WO2002051049A9 (en)2003-07-31
US20050027989A1 (en)2005-02-03

Similar Documents

PublicationPublication DateTitle
US7069435B2 (en)System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US7055032B2 (en)One time password entry to access multiple network sites
US7017041B2 (en)Secure communications network with user control of authenticated personal information provided to network entities
US8099607B2 (en)Asymmetric crypto-graphy with rolling key security
US6940980B2 (en)High security cryptosystem
US6970562B2 (en)System and method for crypto-key generation and use in cryptosystem
US8340287B2 (en)Securing multifactor split key asymmetric crypto keys
US7630493B2 (en)Multiple factor private portion of an asymmetric key
US7571471B2 (en)Secure login using a multifactor split asymmetric crypto-key with persistent key security
US7895437B2 (en)Augmented single factor split key asymmetric cryptography-key generation and distributor
US7065642B2 (en)System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions
US7149310B2 (en)Method and system for authorizing generation of asymmetric crypto-keys
US7599493B2 (en)Asymmetric key pair having a kiosk mode
US7386720B2 (en)Authentication protocol using a multi-factor asymmetric key pair
US8213608B2 (en)Roaming utilizing an asymmetric key pair
US7596697B2 (en)Technique for providing multiple levels of security
US7565527B2 (en)Technique for asymmetric crypto-key generation

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SINGLESIGNON.NET INC., VIRGINIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SANDHU, RAVI;DESA, COLIN;GANESAN, KARUNA;REEL/FRAME:011841/0740

Effective date:20010511

STCBInformation on status: application discontinuation

Free format text:EXPRESSLY ABANDONED -- DURING EXAMINATION


[8]ページ先頭

©2009-2025 Movatter.jp