GB2504745B - Authentication system and method - Google Patents
Authentication system and methodInfo
- Publication number
- GB2504745B GB2504745B GB1214200.6A GB201214200A GB2504745B GB 2504745 B GB2504745 B GB 2504745B GB 201214200 A GB201214200 A GB 201214200A GB 2504745 B GB2504745 B GB 2504745B
- Authority
- GB
- United Kingdom
- Prior art keywords
- authentication system
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1214200.6A GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
| EP13762202.3A EP2883183B1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
| PCT/GB2013/052123 WO2014023969A1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
| US14/420,363 US20150295717A1 (en) | 2012-08-08 | 2013-08-08 | Authentication method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1214200.6A GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB201214200D0 GB201214200D0 (en) | 2012-09-19 |
| GB2504745A GB2504745A (en) | 2014-02-12 |
| GB2504745B true GB2504745B (en) | 2014-07-23 |
Family
ID=46935129
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1214200.6A Active GB2504745B (en) | 2012-08-08 | 2012-08-08 | Authentication system and method |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2504745B (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2433147A (en) * | 2005-12-01 | 2007-06-13 | Jonathan Geoffrey Milt Craymer | A method for verifying a person's identity or entitlement using one-time transaction codes |
| US20080141362A1 (en) * | 2006-12-06 | 2008-06-12 | Torres Robert J | Method and apparatus of providing pattern based user password access |
| US20100281526A1 (en) * | 2009-05-04 | 2010-11-04 | Serugudi Venkata Raghavan | Methods and Devices for Pattern-Based User Authentication |
| US20120137352A1 (en) * | 2010-11-30 | 2012-05-31 | Platez Pty Ltd. | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
| GB2488310A (en) * | 2011-02-02 | 2012-08-29 | Winfrasoft Corp | A method and system for authenticating a computer user by using an array of elements |
-
2012
- 2012-08-08 GB GB1214200.6A patent/GB2504745B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2433147A (en) * | 2005-12-01 | 2007-06-13 | Jonathan Geoffrey Milt Craymer | A method for verifying a person's identity or entitlement using one-time transaction codes |
| US20080141362A1 (en) * | 2006-12-06 | 2008-06-12 | Torres Robert J | Method and apparatus of providing pattern based user password access |
| US20100281526A1 (en) * | 2009-05-04 | 2010-11-04 | Serugudi Venkata Raghavan | Methods and Devices for Pattern-Based User Authentication |
| US20120137352A1 (en) * | 2010-11-30 | 2012-05-31 | Platez Pty Ltd. | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
| GB2488310A (en) * | 2011-02-02 | 2012-08-29 | Winfrasoft Corp | A method and system for authenticating a computer user by using an array of elements |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2504745A (en) | 2014-02-12 |
| GB201214200D0 (en) | 2012-09-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IL254163B (en) | Authentication method and system | |
| GB2529503B8 (en) | Voice authentication system and method | |
| IL234215B (en) | Cryptographic method and system | |
| SG11201504186UA (en) | System and method for voice authentication | |
| SG11201502550YA (en) | Connection system and method | |
| GB2502773B (en) | Method and system for secure user identification | |
| SG2013054499A (en) | Verifying system and method thereof | |
| GB201219235D0 (en) | System and method for the authentication of communications | |
| EP2692166A4 (en) | Authentication method and system | |
| GB201219800D0 (en) | System and method | |
| SG11201502665YA (en) | Authentication apparatus and method | |
| SG11201405782PA (en) | System and method for verified compliance implementation | |
| SG11201500746YA (en) | System and method for geothentication | |
| EP2790100A4 (en) | Version construction system and method | |
| ZA201408352B (en) | Micro-resource-pooling system and corresponding method thereof | |
| GB2495567B (en) | Method and system for user authentication | |
| EP2924913A4 (en) | Authentication method, device and system | |
| GB2501002B (en) | System and method for providing security on demand | |
| EP2827540A4 (en) | Method, device, and system for authentication | |
| EP2800494A4 (en) | Fastening system and method | |
| ZA201309582B (en) | Authentication system and method therefor | |
| GB2519034B (en) | Authentication method and authentication program | |
| SG11201404624UA (en) | Communication method and communication system | |
| GB201304602D0 (en) | Behaviometric signature authentication system and method | |
| GB201214511D0 (en) | Method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 732E | Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977) |
Free format text: REGISTERED BETWEEN 20140522 AND 20140528 |