MX2017014141A - Dispositivos y metodos para autenticacion de dispositivos de cliente. - Google Patents

Dispositivos y metodos para autenticacion de dispositivos de cliente.

Info

Publication number
MX2017014141A
MX2017014141A MX2017014141A MX2017014141A MX2017014141A MX 2017014141 A MX2017014141 A MX 2017014141A MX 2017014141 A MX2017014141 A MX 2017014141A MX 2017014141 A MX2017014141 A MX 2017014141A MX 2017014141 A MX2017014141 A MX 2017014141A
Authority
MX
Mexico
Prior art keywords
passphrase
client
passphrases
cryptographic key
generated
Prior art date
Application number
MX2017014141A
Other languages
English (en)
Inventor
Vigouroux Jean-Ronan
Heen Olivier
Neumann Christoph
Le Scouarnec Nicolas
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP16306445.4A external-priority patent/EP3319289A1/en
Priority claimed from EP17305661.5A external-priority patent/EP3413508A1/en
Application filed by Thomson Licensing filed Critical Thomson Licensing
Publication of MX2017014141A publication Critical patent/MX2017014141A/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/047Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
    • H04W12/0471Key exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Un punto (220) de acceso recibe de un cliente (210) un primer número arbitrario (SNonce) y un primer hash criptográfico (MIC1) para el primer número arbitrario, el primer hash criptográfico calculado que utiliza una primera clave (PTK) derivada de una segunda clave (PMK), la segunda clave (PMK) introducida en el cliente (210) o derivada de una frase secreta introducida en el cliente (210), que obtiene (S318, S320) las primeras claves (las PTK) de cada entrada primaria almacenada y al menos una entrada secundaria almacenada válida en la derivación, la entrada primaria almacenada y al menos una entrada secundaria almacenada cada una siendo una de una segunda clave (PMK) y una frase secreta, verifica (S322) el hash criptográfico (MIC1) utilizando cada primera clave derivada (PTK) para encontrar una primera clave derivada que verifica el primer hash criptográfico (MIC1), que genera (S324) una tercera clave (GTK) y un segundo hash criptográfico (MIC2) utilizando la primera clave derivada que verifica el primer hash criptográfico (MIC1); y envía la tercera clave (GTK) y el segundo hash criptográfico (MIC2) al cliente (210).
MX2017014141A 2016-11-04 2017-11-03 Dispositivos y metodos para autenticacion de dispositivos de cliente. MX2017014141A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP16306445.4A EP3319289A1 (en) 2016-11-04 2016-11-04 Devices and methods for client device authentication
EP17305661.5A EP3413508A1 (en) 2017-06-06 2017-06-06 Devices and methods for client device authentication

Publications (1)

Publication Number Publication Date
MX2017014141A true MX2017014141A (es) 2018-10-01

Family

ID=61767981

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2017014141A MX2017014141A (es) 2016-11-04 2017-11-03 Dispositivos y metodos para autenticacion de dispositivos de cliente.

Country Status (10)

Country Link
US (2) US10708058B2 (es)
EP (1) EP3319295B1 (es)
JP (1) JP2018110378A (es)
KR (1) KR20180050233A (es)
CN (1) CN108023731A (es)
BR (1) BR102017023626A2 (es)
CA (1) CA2983550A1 (es)
MX (1) MX2017014141A (es)
MY (1) MY181840A (es)
RU (1) RU2739732C2 (es)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10262164B2 (en) 2016-01-15 2019-04-16 Blockchain Asics Llc Cryptographic ASIC including circuitry-encoded transformation function
US10372943B1 (en) 2018-03-20 2019-08-06 Blockchain Asics Llc Cryptographic ASIC with combined transformation and one-way functions
US10404454B1 (en) * 2018-04-25 2019-09-03 Blockchain Asics Llc Cryptographic ASIC for derivative key hierarchy
CN109257630B (zh) * 2018-11-14 2020-12-11 苏州科达科技股份有限公司 视频点播中的数据传输***、方法、装置及存储介质
CN109451493B (zh) * 2018-11-30 2022-03-18 锐捷网络股份有限公司 基于wpa的密钥配置方法及装置
US11736472B2 (en) 2019-06-10 2023-08-22 Microsoft Technology Licensing, Llc Authentication with well-distributed random noise symbols
US11496457B2 (en) 2019-06-10 2022-11-08 Microsoft Technology Licensing, Llc Partial pattern recognition in a stream of symbols
US11514149B2 (en) * 2019-06-10 2022-11-29 Microsoft Technology Licensing, Llc Pattern matching for authentication with random noise symbols and pattern recognition
US11394551B2 (en) 2019-07-17 2022-07-19 Microsoft Technology Licensing, Llc Secure authentication using puncturing
US11812257B2 (en) * 2020-03-04 2023-11-07 Qualcomm Incorporated Multi-link wireless communication security
CN111985772B (zh) * 2020-07-15 2024-02-20 惠州市德赛西威智能交通技术研究院有限公司 一种评价标准协议的鲁棒性与完整度实现方法
CN112291773B (zh) * 2020-12-31 2021-04-06 飞天诚信科技股份有限公司 一种认证器及其通信方法
KR20220124939A (ko) * 2021-03-04 2022-09-14 삼성전자주식회사 공유 암호 키 갱신을 수행하는 방법 및 이를 지원하는 전자 장치
EP4145412A1 (en) * 2021-05-12 2023-03-08 Harman International Industries, Incorporated Secured seamless authentication for bluetooth just works pairing
CN113573307B (zh) * 2021-07-28 2024-01-30 西安热工研究院有限公司 一种基于可扩展认证协议的快速认证方法
US20230078954A1 (en) * 2021-09-10 2023-03-16 Assa Abloy Ab Fast bilateral key confirmation
CN113727336B (zh) * 2021-09-13 2024-01-16 深圳市联洲国际技术有限公司 一种iot设备与智能网关的运行方法、终端设备及存储介质
CN114173334A (zh) * 2021-10-26 2022-03-11 新华三大数据技术有限公司 一种接入ap的方法、ap和存储介质
CN114202829B (zh) * 2021-10-29 2023-10-13 广东卓维网络有限公司 一种智能财务管理专用设备方法和装置

Family Cites Families (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5418854A (en) 1992-04-28 1995-05-23 Digital Equipment Corporation Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system
US20020090089A1 (en) 2001-01-05 2002-07-11 Steven Branigan Methods and apparatus for secure wireless networking
JP3677471B2 (ja) 2001-10-31 2005-08-03 秀典 難波 パスワード認証方法及びパスワード認証プログラム
JP2003150552A (ja) 2001-11-13 2003-05-23 Namco Ltd 入力受付装置、入力受付プログラムおよびそのプログラムが記録された記録媒体
US7370350B1 (en) 2002-06-27 2008-05-06 Cisco Technology, Inc. Method and apparatus for re-authenticating computing devices
CN100362819C (zh) 2003-09-30 2008-01-16 华为技术有限公司 一种获取接入无线局域网一次性密码的方法
US8532304B2 (en) * 2005-04-04 2013-09-10 Nokia Corporation Administration of wireless local area networks
JP4778793B2 (ja) 2006-01-11 2011-09-21 東日本電信電話株式会社 無線lanシステム、無線アクセスポイントおよび無線端末
JP4960446B2 (ja) * 2006-06-19 2012-06-27 インターデイジタル テクノロジー コーポレーション 初期の信号メッセージにおいて初期のユーザ識別情報のセキュリティを保護する方法および装置
WO2008005734A2 (en) * 2006-07-05 2008-01-10 Agere Systems Inc. Systems and methods for mobile data storage and acquisition
US7793103B2 (en) * 2006-08-15 2010-09-07 Motorola, Inc. Ad-hoc network key management
US20080066167A1 (en) 2006-09-12 2008-03-13 Andri Michael J Password based access including error allowance
JP4881119B2 (ja) * 2006-09-29 2012-02-22 株式会社東芝 ユーザ認証方法、ユーザ側認証装置、および、プログラム
FR2937204B1 (fr) * 2008-10-15 2013-08-23 In Webo Technologies Systeme d'authentification
US20100115583A1 (en) 2008-11-03 2010-05-06 International Business Machines Corporation Method for fault-tolerant user information authentication
US20100145861A1 (en) * 2008-12-08 2010-06-10 Palm, Inc. Payment transaction processing for mobile computing devices
US9064278B2 (en) * 2010-12-30 2015-06-23 Futurewei Technologies, Inc. System for managing, storing and providing shared digital content to users in a user relationship defined group in a multi-platform environment
US9148776B1 (en) * 2011-09-28 2015-09-29 Pulse Secure, Llc Network address preservation in mobile networks
US11328325B2 (en) * 2012-03-23 2022-05-10 Secureads, Inc. Method and/or system for user authentication with targeted electronic advertising content through personal communication devices
JP5971038B2 (ja) * 2012-09-03 2016-08-17 富士通株式会社 認証装置、認証方法、及び認証プログラム
GB2508606B (en) * 2012-12-04 2015-06-03 Barclays Bank Plc Credential recovery
US9305150B2 (en) 2012-12-10 2016-04-05 Lookout, Inc. Method and system for managing user login behavior on an electronic device for enhanced security
EP2793157A1 (en) 2013-04-19 2014-10-22 Thomson Licensing Apparatus and method for managing passwords
CN103501228B (zh) * 2013-08-01 2017-07-07 宋博韬 一种动态二维码令牌及动态二维码口令认证方法
EP2876569A1 (en) 2013-11-26 2015-05-27 Thomson Licensing Apparatuses and methods for password authentication
CN103731272B (zh) 2014-01-06 2017-06-06 飞天诚信科技股份有限公司 一种身份认证方法、***及设备
JP6043738B2 (ja) * 2014-01-30 2016-12-14 株式会社日立製作所 鍵管理装置および鍵管理方法
EP2947591A1 (en) 2014-05-22 2015-11-25 Thomson Licensing Authentication by Password Mistyping Correction
EP2955654A1 (en) 2014-06-12 2015-12-16 Thomson Licensing Apparatus and method for password authentication
EP2955655A1 (en) 2014-06-12 2015-12-16 Thomson Licensing Apparatuses and methods for password authentication
US9779307B2 (en) * 2014-07-07 2017-10-03 Google Inc. Method and system for non-causal zone search in video monitoring
US9779401B2 (en) * 2014-08-19 2017-10-03 Qualcomm Incorporated Network access authentication using a point-of-sale device
JP2016051251A (ja) * 2014-08-29 2016-04-11 キヤノンマーケティングジャパン株式会社 認証装置、認証システム、認証方法、およびプログラム
GB2531710A (en) * 2014-10-24 2016-05-04 Ibm Keyboard neutral authentication
US20160127903A1 (en) * 2014-11-05 2016-05-05 Qualcomm Incorporated Methods and systems for authentication interoperability
US20160269403A1 (en) * 2015-03-12 2016-09-15 Wiacts Inc. Multi-factor user authentication
EP3067811A1 (en) 2015-03-12 2016-09-14 Thomson Licensing Apparatus and method for password authentication
US10149159B1 (en) * 2015-03-19 2018-12-04 Proxidyne, Inc. Trusted beacon system and method
US9697371B1 (en) * 2015-06-30 2017-07-04 Google Inc. Remote authorization of usage of protected data in trusted execution environments
US9736699B1 (en) * 2015-07-28 2017-08-15 Sanjay K. Rao Wireless Communication Streams for Devices, Vehicles and Drones
CN105847058A (zh) 2016-03-31 2016-08-10 乐视控股(北京)有限公司 一种无线密码设置方法及装置
KR102593344B1 (ko) * 2016-07-06 2023-10-25 삼성전자주식회사 전자 장치, 웨어러블 장치 및 전자 장치의 화면 제어 방법

Also Published As

Publication number Publication date
CN108023731A (zh) 2018-05-11
CA2983550A1 (en) 2018-05-04
RU2017138066A3 (es) 2020-11-17
JP2018110378A (ja) 2018-07-12
KR20180050233A (ko) 2018-05-14
BR102017023626A2 (pt) 2018-05-29
EP3319295A1 (en) 2018-05-09
RU2739732C2 (ru) 2020-12-28
US10708058B2 (en) 2020-07-07
EP3319295B1 (en) 2020-09-30
MY181840A (en) 2021-01-08
US20180131519A1 (en) 2018-05-10
RU2017138066A (ru) 2019-05-06
US20200287720A1 (en) 2020-09-10

Similar Documents

Publication Publication Date Title
MX2017014141A (es) Dispositivos y metodos para autenticacion de dispositivos de cliente.
MX2019012571A (es) Sistemas y metodos para verificacion y autenticacion de dispositivos.
GB2572088A8 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
US9774579B2 (en) Method for key rotation
SG10201901366WA (en) Key exchange through partially trusted third party
JP2020528224A5 (es)
GB2573666A (en) Verifying authenticity of computer readable information using the blockchain
ZA202108153B (en) Threshold signature based medical device management
PH12018501745A1 (en) Personal device security using elliptic curve cryptography for secret sharing
RU2018103183A (ru) Взаимная аутентификация конфиденциальной связи
GB2541586A (en) Password-based authentication
WO2015134760A3 (en) Secure hardware for cross-device trusted applications
MX361152B (es) Aprovisionamiento de licencias de gestión de derechos digitales (drm) en un dispositivo cliente que utiliza un servidor de actualizaciones.
NZ744353A (en) Networked access control system
GB2565929A (en) Method, server, and communication device for updating identity-based cryptographic private keys of compromised communication devices
EP4343591A3 (en) Authentication system using secure multi-party computation
GB201221433D0 (en) A method and system of providing authentication of user access to a computer resource on a mobile device
PH12017500552A1 (en) Replaceable item authentication
PH12018550176A1 (en) Using hardware based secure isolated region to prevent piracy and cheating on electronic devices
US20160112198A1 (en) System and method of secure text generation
UA122327C2 (uk) Nado- криптографія з генераторами ключів
GB2543726A (en) Password-based generation and management of secret cryptographic keys
MX2018007696A (es) Metodo y sistema para mejorar la seguridad de una transaccion.
MX340269B (es) Determinacion de codigos criptograficos.
MX2018007332A (es) Metodo, dispositivo, servidor y sistema para autenticar a un usuario.