Movatterモバイル変換


[0]ホーム

URL:


US20160156598A1 - A computer implemented method to improve security in authentication/authorization systems and computer programs products thereof - Google Patents

A computer implemented method to improve security in authentication/authorization systems and computer programs products thereof
Download PDF

Info

Publication number
US20160156598A1
US20160156598A1US14/900,453US201414900453AUS2016156598A1US 20160156598 A1US20160156598 A1US 20160156598A1US 201414900453 AUS201414900453 AUS 201414900453AUS 2016156598 A1US2016156598 A1US 2016156598A1
Authority
US
United States
Prior art keywords
server
user
otp
sending
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/900,453
Inventor
Jose Maria ALONSO CEBRIAN
David BARROSO BERRUETA
Jose Maria PALAZON ROMERO
Antonio GUZMAN SACRISTAN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonica Digital Espana SL
Original Assignee
Telefonica Digital Espana SL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP13382237.9Aexternal-prioritypatent/EP2819370B1/en
Priority claimed from EP13382398.9Aexternal-prioritypatent/EP2860935B1/en
Priority claimed from EP13382397.1Aexternal-prioritypatent/EP2860934B1/en
Application filed by Telefonica Digital Espana SLfiledCriticalTelefonica Digital Espana SL
Publication of US20160156598A1publicationCriticalpatent/US20160156598A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A computer implemented method and computer program products to improve security in authentication/authorization systems
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and a defining a secure channel for certificate exchange for authentication.
The computer programs implement the method.

Description

Claims (16)

16. A computer implemented method to improve security in authentication/authorization systems, the method comprising:
receiving, by a first server, from a user via a first dedicated program, a request to be logged into a service of said first server; and
authenticating, by said first server, credentials information of said user in order to authorize said service login request, said credentials information comprising information validating the identity of the user in the first server,
the method comprising:
receiving, by a second server, from a second dedicated program installed in a computing device of said user, configuration information that the user has established for the operations provided by the first server;
requesting, by the user, once the service login request being authorized by the first server, to perform an operation in the first server;
receiving, by the second server, from the first server, a request about an operation status associated to what said user has established about said requested operation in order to assist the first server in authorizing or rejecting the requested operation; and
verifying, by the second server, said operation status previously established by the user for said requested operation, and in case said operation status being established as valid by the user, the second server generating an extra authentication factor mechanism for reinforcing authorization of said requested operation, wherein said extra authentication factor mechanism includes a public/private key encryption process or the use of a public/private key for generating a digital signature.
18. The computer implemented method ofclaim 16, wherein said operation been reinforced with the use of said extra authentication factor mechanism including a public/private key for generating a digital signature by means of performing following actions:
generating and sending, by the second server to the second dedicated program, a one-time password (OTP) that the user is going to use for setting up the extra authentication factor mechanism;
recovering, by the second dedicated program, a private key of the user in order to digitally sign the received OTP, said recovering been performed after the user having decided to sign the received OTP within the second dedicated program and having stored said private key in a software or a hardware mechanism of the computing device; and
sending, by the second dedicated program, the digitally signed OTP to the second server and the digital signature employed, the latter verifying integrity of the received digitally signed OTP with the OTP that the second server generated, and integrity of the private key that was used to perform said signing of the OTP with an stored user public key that the second server had.
20. The computer implemented method ofclaim 16, wherein said requested operation been reinforced with the use of said extra authentication factor mechanism including a public/private key encryption process by means of performing, after having sent, by the second server, the result of said operation status to the first server including an OTP used by the user for setting up the extra authentication factor mechanism, the following actions:
requesting, by the first server to the user through an interface, said OTP used by the user for setting up the extra authentication factor mechanism;
encrypting, by the second server, the OTP with a public key of the user and sending the encrypted OTP to the second dedicated program, said public key been previously stored in the second server by the user;
recovering, by the second dedicated program, a private key of the user and using the private key of the user to decrypt the received encrypted OTP, said recovering been performed after the user having stored the private key in a software or a hardware mechanism of the computing device;
sending, by the second dedicated program, the decrypted OTP to the user, the latter sending the decrypted OTP via said interface; and
checking, by the first server, if the OTP received from the user and the OTP received from second server matches.
21. The computer implemented method ofclaim 16, wherein said requested operation been reinforced with the use of said extra authentication factor mechanism including a public/private key encryption process performed by to the first server by means of performing, after the second server having sent the result of said operation status to the first server, the following actions:
generating, by the first server, an OTP that the user is going to use for setting up the extra authentication factor mechanism;
encrypting, by the first server, the generated OTP with a public key of the user and further sending the encrypted OTP to the second server, said public key been previously stored in the first server by the user;
requesting, by the first server to the user through an interface, the OTP;
sending, by the second server, the encrypted OTP to the second dedicated program installed in the computing device of the user;
recovering, by the second dedicated program, a private key of the user and using the private key of the user to decrypt the received encrypted OTP, said recovering been performed after the user having stored the private key in a software or a hardware mechanism of the computing device;
sending, by the second dedicated program, the decrypted OTP to the user, the latter sending the decrypted OTP via said interface; and
checking, by the first server, if the OTP received from the user and its own generated OTP matches.
23. The computer implemented method ofclaim 16, wherein said requested operation been reinforced with the use of said extra authentication factor mechanism including a public/private key for generating a digital signature executed by to the first server by means of performing, after the second server having sent the result of said operation status to the first server, the following actions:
generating, by the first server, an OTP that the user is going to use for setting up the extra authentication factor mechanism and sending the generated OTP to the second server;
requesting, by the first server to the user through an interface, the OTP;
sending, by the second server, the OTP to the second dedicated program;
recovering, by the second dedicated program, a private key of the user in order to digitally sign the received OTP, said recovering been performed after the user having decided to sign the received OTP within the second dedicated program and having stored said private key in a software or a hardware mechanism of the computing device;
sending, by the second dedicated program, the digitally signed OTP and the digital signature employed for the signing to the second server, the latter forwarding them to the first server;
sending, by the second dedicated program, the digitally signed OTP to the user, the latter sending the digitally signed OTP via said interface; and
checking, by the first server, if the digitally signed OTP received from the user and the digitally signed OTP received from the second server matches.
30. The computer program product ofclaim 29, further including computer program code instructions that when executed in a computer implement the following:
generating and sending, by the second server to the second dedicated program, a one-time password (OTP) that the user is going to use for setting up the extra authentication factor mechanism;
recovering, by the second dedicated program, a private key of the user in order to digitally sign the received OTP, said recovering been performed after the user having decided to sign the received OTP within the second dedicated program and having stored said private key in a software or a hardware mechanism of the computing device; and
sending, by the second dedicated program, the digitally signed OTP to the second server and the digital signature employed, the latter verifying integrity of the received digitally signed OTP with the OTP that the second server generated, and integrity of the private key that was used to perform said signing of the OTP with an stored user public key that the second server had.
US14/900,4532013-06-242014-06-23A computer implemented method to improve security in authentication/authorization systems and computer programs products thereofAbandonedUS20160156598A1 (en)

Applications Claiming Priority (9)

Application NumberPriority DateFiling DateTitle
EP13382237.92013-06-24
EP13382237.9AEP2819370B1 (en)2013-06-242013-06-24A computer implemented method to prevent attacks against user authentication and computer programs products thereof
EP13382398.9AEP2860935B1 (en)2013-10-092013-10-09A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
EP13382396.32013-10-09
EP13382397.12013-10-09
EP13382396.3AEP2819371B1 (en)2013-06-242013-10-09A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
EP13382397.1AEP2860934B1 (en)2013-10-092013-10-09A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
EP13382398.92013-10-09
PCT/EP2014/063188WO2014206945A1 (en)2013-06-242014-06-23A computer implemented method to improve security in authentication/authorization systems and computer programs products thereof

Publications (1)

Publication NumberPublication Date
US20160156598A1true US20160156598A1 (en)2016-06-02

Family

ID=52141125

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/900,453AbandonedUS20160156598A1 (en)2013-06-242014-06-23A computer implemented method to improve security in authentication/authorization systems and computer programs products thereof
US14/392,140Active2034-09-22US9860248B2 (en)2013-06-242014-06-23Computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/392,140Active2034-09-22US9860248B2 (en)2013-06-242014-06-23Computer implemented method, communications system and computer programs products for securing operations in authentication and authorization systems using biometric information

Country Status (5)

CountryLink
US (2)US20160156598A1 (en)
EP (2)EP3014837B1 (en)
BR (2)BR112015032258B1 (en)
ES (2)ES2754198T3 (en)
WO (2)WO2014206945A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160218881A1 (en)*2013-09-302016-07-28Juniper Networks, Inc.Detecting and preventing man-in-the-middle attacks on an encrypted connection
US20160373430A1 (en)*2015-06-182016-12-22Airwatch LlcDistributing security codes through a restricted communications channel
US9843572B2 (en)2015-06-292017-12-12Airwatch LlcDistributing an authentication key to an application installation
US9894050B1 (en)*2014-08-112018-02-13Google LlcServer based settings for client software with asymmetric signing
US20180167372A1 (en)*2016-12-142018-06-14Microsoft Technology Licensing, LlcOffline protection of secrets
US20190141214A1 (en)*2017-11-062019-05-09Canon Kabushiki KaishaImage processing apparatus, method for controlling image processing apparatus, program storage medium, system, and method for controlling system
US20200089865A1 (en)*2018-09-142020-03-19International Business Machines CorporationAccelerator access control
US10778435B1 (en)*2015-12-302020-09-15Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
US20210297269A1 (en)*2020-03-172021-09-23Arris Enterprises LlcToken node locking with fingerprints authenticated by digital certificates
US11469903B2 (en)*2019-02-282022-10-11Microsoft Technology Licensing, LlcAutonomous signing management operations for a key distribution service
US20230318832A1 (en)*2020-10-092023-10-05Visa International Service AssociationToken failsafe system and method

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106572082A (en)*2016-10-192017-04-19凯美瑞德(苏州)信息科技股份有限公司Approval signature verifying method, mobile device, terminal device and system
US11101991B2 (en)*2017-07-172021-08-24Hrl Laboratories, LlcPractical reusable fuzzy extractor based on the learning-with-error assumption and random oracle
US12149516B2 (en)*2020-06-022024-11-19Flex Integration, LLCSystem and methods for tokenized hierarchical secured asset distribution
US11770377B1 (en)*2020-06-292023-09-26Cyral Inc.Non-in line data monitoring and security services
CN113190883A (en)*2021-04-212021-07-30莱芜职业技术学院High-safety computer anti-dismantling system
CN113411545B (en)*2021-05-122023-07-18武汉零感网御网络科技有限公司Control method of key line video monitoring equipment

Citations (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030018964A1 (en)*2001-07-192003-01-23International Business Machines CorporationObject model and framework for installation of software packages using a distributed directory
US20050010483A1 (en)*2003-07-082005-01-13Ling Marvin T.Methods and apparatus for transacting electronic commerce using account hierarchy and locking of accounts
US20060282660A1 (en)*2005-04-292006-12-14Varghese Thomas ESystem and method for fraud monitoring, detection, and tiered user authentication
US20080086767A1 (en)*2006-10-062008-04-10Rajandra Luxman KulkarniMulti-party, secure Multi-Channel Authentication
US20080177998A1 (en)*2007-01-242008-07-24Shrikant ApsangiApparatus and methods for provisioning in a download-enabled system
US20090259848A1 (en)*2004-07-152009-10-15Williams Jeffrey BOut of band system and method for authentication
US20120278197A1 (en)*2010-09-242012-11-01Thomas NguyenMethod for sale of goods and services over a network
US20120323717A1 (en)*2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US20130111543A1 (en)*2011-10-312013-05-02Jeremy Ray BrownTechniques for controlling authentication
US20130125226A1 (en)*2011-04-282013-05-16Interdigital Patent Holdings, Inc.Sso framework for multiple sso technologies
US20130178190A1 (en)*2012-01-052013-07-11International Business Machines CorporationMobile device identification for secure device access
US20130179681A1 (en)*2012-01-102013-07-11Jpmorgan Chase Bank, N.A.System And Method For Device Registration And Authentication
US20130262857A1 (en)*2012-04-012013-10-03Authentify, Inc.Secure authentication in a multi-party system
US20130312073A1 (en)*2012-05-162013-11-21Rajdeep SrivastavMethods and systems for authentication of multiple sign-in accounts
US20140013390A1 (en)*2012-07-052014-01-09Cyber-Ark Software Ltd.System and method for out-of-band application authentication
US20140020073A1 (en)*2012-07-132014-01-16Troy Jacob RondaMethods and systems for using derived credentials to authenticate a device across multiple platforms
US20140058854A1 (en)*2007-12-072014-02-27Jpmorgan Chase Bank, N.A.Mobile Fraud Prevention System and Method
US8763077B2 (en)*2011-10-072014-06-24Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US20140189809A1 (en)*2012-12-272014-07-03International Business Machines CorporationMethod and apparatus for server-side authentication and authorization for mobile clients without client-side application modification
US20140237236A1 (en)*2013-02-202014-08-21Boris KalinichenkoMobile Security Fob
US8844013B2 (en)*2011-10-042014-09-23Salesforce.Com, Inc.Providing third party authentication in an on-demand service environment
US20150046989A1 (en)*2013-08-082015-02-12Duo Security, Inc.System and method for verifying status of an authentication device
US9154303B1 (en)*2013-03-142015-10-06Microstrategy IncorporatedThird-party authorization of user credentials
US9225704B1 (en)*2013-06-132015-12-29Amazon Technologies, Inc.Unified management of third-party accounts
US9716691B2 (en)*2012-06-072017-07-25Early Warning Services, LlcEnhanced 2CHK authentication security with query transactions

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2002095553A2 (en)*2001-05-182002-11-28Imprivata Inc.Biometric authentication for remote initiation of actions and services
US20090183247A1 (en)2008-01-112009-07-1611I Networks Inc.System and method for biometric based network security
US20130036058A1 (en)*2011-08-032013-02-07American Express Travel Related Services Company, Inc.Systems and methods for securely processing transactions

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030018964A1 (en)*2001-07-192003-01-23International Business Machines CorporationObject model and framework for installation of software packages using a distributed directory
US20050010483A1 (en)*2003-07-082005-01-13Ling Marvin T.Methods and apparatus for transacting electronic commerce using account hierarchy and locking of accounts
US20090259848A1 (en)*2004-07-152009-10-15Williams Jeffrey BOut of band system and method for authentication
US20060282660A1 (en)*2005-04-292006-12-14Varghese Thomas ESystem and method for fraud monitoring, detection, and tiered user authentication
US20080086767A1 (en)*2006-10-062008-04-10Rajandra Luxman KulkarniMulti-party, secure Multi-Channel Authentication
US20080177998A1 (en)*2007-01-242008-07-24Shrikant ApsangiApparatus and methods for provisioning in a download-enabled system
US20140058854A1 (en)*2007-12-072014-02-27Jpmorgan Chase Bank, N.A.Mobile Fraud Prevention System and Method
US20120278197A1 (en)*2010-09-242012-11-01Thomas NguyenMethod for sale of goods and services over a network
US20130125226A1 (en)*2011-04-282013-05-16Interdigital Patent Holdings, Inc.Sso framework for multiple sso technologies
US20120323717A1 (en)*2011-06-162012-12-20OneID, Inc.Method and system for determining authentication levels in transactions
US8844013B2 (en)*2011-10-042014-09-23Salesforce.Com, Inc.Providing third party authentication in an on-demand service environment
US8763077B2 (en)*2011-10-072014-06-24Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US20130111543A1 (en)*2011-10-312013-05-02Jeremy Ray BrownTechniques for controlling authentication
US20130178190A1 (en)*2012-01-052013-07-11International Business Machines CorporationMobile device identification for secure device access
US20130179681A1 (en)*2012-01-102013-07-11Jpmorgan Chase Bank, N.A.System And Method For Device Registration And Authentication
US20130262857A1 (en)*2012-04-012013-10-03Authentify, Inc.Secure authentication in a multi-party system
US9641520B2 (en)*2012-04-012017-05-02Early Warning Services, LlcSecure authentication in a multi-party system
US20130312073A1 (en)*2012-05-162013-11-21Rajdeep SrivastavMethods and systems for authentication of multiple sign-in accounts
US9716691B2 (en)*2012-06-072017-07-25Early Warning Services, LlcEnhanced 2CHK authentication security with query transactions
US20140013390A1 (en)*2012-07-052014-01-09Cyber-Ark Software Ltd.System and method for out-of-band application authentication
US20140020073A1 (en)*2012-07-132014-01-16Troy Jacob RondaMethods and systems for using derived credentials to authenticate a device across multiple platforms
US20140189809A1 (en)*2012-12-272014-07-03International Business Machines CorporationMethod and apparatus for server-side authentication and authorization for mobile clients without client-side application modification
US20140237236A1 (en)*2013-02-202014-08-21Boris KalinichenkoMobile Security Fob
US9154303B1 (en)*2013-03-142015-10-06Microstrategy IncorporatedThird-party authorization of user credentials
US9225704B1 (en)*2013-06-132015-12-29Amazon Technologies, Inc.Unified management of third-party accounts
US20150046989A1 (en)*2013-08-082015-02-12Duo Security, Inc.System and method for verifying status of an authentication device

Cited By (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160218881A1 (en)*2013-09-302016-07-28Juniper Networks, Inc.Detecting and preventing man-in-the-middle attacks on an encrypted connection
US9722801B2 (en)*2013-09-302017-08-01Juniper Networks, Inc.Detecting and preventing man-in-the-middle attacks on an encrypted connection
US20170331634A1 (en)*2013-09-302017-11-16Juniper Networks, Inc.Detecting and preventing man-in-the-middle attacks on an encrypted connection
US10171250B2 (en)*2013-09-302019-01-01Juniper Networks, Inc.Detecting and preventing man-in-the-middle attacks on an encrypted connection
US9894050B1 (en)*2014-08-112018-02-13Google LlcServer based settings for client software with asymmetric signing
US10218505B1 (en)2014-08-112019-02-26Google LlcServer based settings for client software with asymmetric signing
US10129240B2 (en)2015-06-182018-11-13Airwatch LlcDistributing security codes through a restricted communications channel
US9819670B2 (en)*2015-06-182017-11-14Airwatch LlcDistributing security codes through a restricted communications channel
US20160373430A1 (en)*2015-06-182016-12-22Airwatch LlcDistributing security codes through a restricted communications channel
US9843572B2 (en)2015-06-292017-12-12Airwatch LlcDistributing an authentication key to an application installation
US10356082B2 (en)2015-06-292019-07-16Airwatch LlcDistributing an authentication key to an application installation
US11838421B2 (en)*2015-12-302023-12-05Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
US12261957B2 (en)*2015-12-302025-03-25Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
US20240080201A1 (en)*2015-12-302024-03-07Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
US10778435B1 (en)*2015-12-302020-09-15Jpmorgan Chase Bank, N.A.Systems and methods for enhanced mobile device authentication
US20180167372A1 (en)*2016-12-142018-06-14Microsoft Technology Licensing, LlcOffline protection of secrets
US10911238B2 (en)*2016-12-142021-02-02Microsoft Technology Licensing, LlcOffline protection of secrets
US10750050B2 (en)*2017-11-062020-08-18Canon Kabushiki KaishaIMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING IMAGE Processing apparatus, program storage medium, system, and method for controlling system for use in biometric authentication
US20190141214A1 (en)*2017-11-062019-05-09Canon Kabushiki KaishaImage processing apparatus, method for controlling image processing apparatus, program storage medium, system, and method for controlling system
US11663312B2 (en)*2018-09-142023-05-30International Business Machines CorporationAccelerator access control
US20230237145A1 (en)*2018-09-142023-07-27International Business Machines CorporationAccelerator access control
US20200089865A1 (en)*2018-09-142020-03-19International Business Machines CorporationAccelerator access control
US11995172B2 (en)*2018-09-142024-05-28International Business Machines CorporationAccelerator access control
US11469903B2 (en)*2019-02-282022-10-11Microsoft Technology Licensing, LlcAutonomous signing management operations for a key distribution service
US20210297269A1 (en)*2020-03-172021-09-23Arris Enterprises LlcToken node locking with fingerprints authenticated by digital certificates
US11962698B2 (en)*2020-03-172024-04-16Arris Enterprises LlcToken node locking with fingerprints authenticated by digital certificates
US20240205008A1 (en)*2020-03-172024-06-20Arris Enterprises LlcToken node locking with fingerprints authenticated by digital certificates
US20230318832A1 (en)*2020-10-092023-10-05Visa International Service AssociationToken failsafe system and method
US12316764B2 (en)*2020-10-092025-05-27Visa International Service AssociationToken failsafe system and method

Also Published As

Publication numberPublication date
BR112015032258B1 (en)2023-01-31
BR112015032325A2 (en)2017-07-25
EP3014837B1 (en)2019-08-07
EP3014836A1 (en)2016-05-04
BR112015032258A2 (en)2017-07-25
US9860248B2 (en)2018-01-02
ES2753349T3 (en)2020-04-08
WO2014206946A1 (en)2014-12-31
ES2754198T3 (en)2020-04-16
WO2014206945A1 (en)2014-12-31
US20160277395A1 (en)2016-09-22
BR112015032325B1 (en)2023-04-11
EP3014836B1 (en)2019-08-07
BR112015032258A8 (en)2022-11-08
BR112015032325A8 (en)2022-11-08
EP3014837A1 (en)2016-05-04

Similar Documents

PublicationPublication DateTitle
EP3014837B1 (en)A computer implemented method to improve security in authentication/authorization systems and computer program products thereof
US9832192B2 (en)Computer implemented method to prevent attacks against authorization systems and computer programs products thereof
US11252142B2 (en)Single sign on (SSO) using continuous authentication
US8943311B2 (en)System and methods for online authentication
US9055107B2 (en)Authentication delegation based on re-verification of cryptographic evidence
KR20120055728A (en)Method and apparatus for trusted authentication and logon
US20250016145A1 (en)End-to-end verifiable multi-factor authentication service
Ligatti et al.Coauthentication
EP2860935B1 (en)A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
EP2860934B1 (en)A computer implemented method to prevent attacks against authorization systems and computer programs products thereof
Yasin et al.Enhancing anti-phishing by a robust multi-level authentication technique (EARMAT).
Schwartz et al.Strong Authentication
Mumtaz et al.Strong authentication protocol based on Java Crypto chips
Mumtaz et al.Strong Authentication Protocol based on Java Crypto Chip as a Secure Element
HK1161007B (en)System and methods for online authentication
HK1161007A (en)System and methods for online authentication

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp