IN2014MU00771A - - Google Patents
Info
- Publication number
- IN2014MU00771A IN2014MU00771A IN771MU2014A IN2014MU00771A IN 2014MU00771 A IN2014MU00771 A IN 2014MU00771A IN 771MU2014 A IN771MU2014 A IN 771MU2014A IN 2014MU00771 A IN2014MU00771 A IN 2014MU00771A
- Authority
- IN
- India
- Prior art keywords
- user
- verification
- authentication
- code
- ascertaining
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Method and system for user authentication are described. The method comprises receiving an authentication code from an application server (108) seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN771MU2014 IN2014MU00771A (en) | 2014-03-06 | 2014-03-06 | |
| US14/639,819 US9614847B2 (en) | 2014-03-06 | 2015-03-05 | User authentication |
| EP15157942.2A EP2916484B1 (en) | 2014-03-06 | 2015-03-06 | User Authentication using elliptic curve based OTP |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN771MU2014 IN2014MU00771A (en) | 2014-03-06 | 2014-03-06 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2014MU00771A true IN2014MU00771A (en) | 2015-09-25 |
Family
ID=52648859
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN771MU2014 IN2014MU00771A (en) | 2014-03-06 | 2014-03-06 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US9614847B2 (en) |
| EP (1) | EP2916484B1 (en) |
| IN (1) | IN2014MU00771A (en) |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2017049387A1 (en) * | 2015-09-25 | 2017-03-30 | Genetec Inc. | Secure enrolment of security device for communication with security server |
| CN106656913A (en) * | 2015-10-28 | 2017-05-10 | 珠海金山办公软件有限公司 | Method and device for generating digital verification code |
| EP3862956B1 (en) * | 2016-02-23 | 2024-01-03 | nChain Licensing AG | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
| CN107612904A (en) * | 2017-09-13 | 2018-01-19 | 浙江电力建设监理有限公司 | Identity identifying method and system for intelligent monitoring management |
| US10903997B2 (en) | 2017-10-19 | 2021-01-26 | Autnhive Corporation | Generating keys using controlled corruption in computer networks |
| WO2019077581A1 (en) * | 2017-10-19 | 2019-04-25 | Autnhive Corporation | System and method for generating and depositing keys for multi-point authentication |
| US11329817B2 (en) | 2017-10-19 | 2022-05-10 | Devi Selva Kumar Vijayanarayanan | Protecting data using controlled corruption in computer networks |
| US10505737B1 (en) * | 2018-06-04 | 2019-12-10 | Syniverse Technologies, Llc | System and method for blockchain-based consent and campaign management |
| US10915227B1 (en) * | 2019-08-07 | 2021-02-09 | Bank Of America Corporation | System for adjustment of resource allocation based on multi-channel inputs |
| US10812265B1 (en) * | 2020-04-30 | 2020-10-20 | ISARA Corporation | Using cryptographic co-processors in a supersingular isogeny-based cryptosystem |
| US10805081B1 (en) | 2020-04-30 | 2020-10-13 | ISARA Corporation | Processing batches of point evaluations in a supersingular isogeny-based cryptosystem |
| US10812264B1 (en) * | 2020-04-30 | 2020-10-20 | ISARA Corporation | Traversing a zigzag path tree topology in a supersingular isogeny-based cryptosystem |
| CN112637156B (en) * | 2020-12-14 | 2022-08-02 | 卓尔智联(武汉)研究院有限公司 | Key distribution method, device, computer equipment and storage medium |
| CN114726595B (en) * | 2022-03-24 | 2023-09-29 | 中科吉芯(昆山)信息科技有限公司 | Method for authenticating identity of man-machine by using space-time information |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1601154A1 (en) | 2004-05-28 | 2005-11-30 | Sap Ag | Client authentication using a challenge provider |
| US7624269B2 (en) * | 2004-07-09 | 2009-11-24 | Voltage Security, Inc. | Secure messaging system with derived keys |
| US9137012B2 (en) * | 2006-02-03 | 2015-09-15 | Emc Corporation | Wireless authentication methods and apparatus |
| US7571471B2 (en) * | 2006-05-05 | 2009-08-04 | Tricipher, Inc. | Secure login using a multifactor split asymmetric crypto-key with persistent key security |
| US8051297B2 (en) * | 2006-11-28 | 2011-11-01 | Diversinet Corp. | Method for binding a security element to a mobile device |
| GB0803320D0 (en) * | 2008-02-22 | 2008-04-02 | Cambridge Silicon Radio Ltd | Protecting against security attack |
| CN101626291B (en) | 2008-07-07 | 2012-08-22 | 上海众人网络安全技术有限公司 | ECC algorithm-based identity authentication system and identity authentication method |
| DE102010033232A1 (en) * | 2010-08-03 | 2012-02-09 | Siemens Aktiengesellschaft | Method and device for providing a one-time password |
| US9166778B2 (en) * | 2011-07-15 | 2015-10-20 | Alcatel Lucent | Secure group messaging |
| IN2013MU02907A (en) * | 2013-09-06 | 2015-07-03 | Tata Consultancy Services Ltd |
-
2014
- 2014-03-06 IN IN771MU2014 patent/IN2014MU00771A/en unknown
-
2015
- 2015-03-05 US US14/639,819 patent/US9614847B2/en active Active
- 2015-03-06 EP EP15157942.2A patent/EP2916484B1/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US9614847B2 (en) | 2017-04-04 |
| EP2916484B1 (en) | 2018-10-17 |
| US20150256542A1 (en) | 2015-09-10 |
| EP2916484A1 (en) | 2015-09-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2014MU00771A (en) | ||
| PH12018502087A1 (en) | Systems and methdos for providing block chain-based multifactor personal identity verification | |
| MX2016014461A (en) | Provisioning drm credentials on a client device using an update server. | |
| TW201612787A (en) | Network authentication method for secure electronic transactions | |
| MY179592A (en) | Methods for digitally signing an electronic file, and authenticating method | |
| PH12018502196A1 (en) | System and methods for validating and performing operations on homomorphically encrypted data | |
| MX2017000430A (en) | Networked access control system. | |
| MX2019012571A (en) | Systems and methods for device verification and authentication. | |
| AU2018256568A1 (en) | Systems and methods for software based encryption | |
| GB2525719A8 (en) | Method and system for providing a vulnerability management and verification service | |
| SG10201907025VA (en) | Method and system for verifying identities | |
| PH12018501983A1 (en) | Method and system for user authentication with improved security | |
| PE20170656A1 (en) | AUTHENTICATION OF THE SERVICE NETWORK | |
| SG10201903661PA (en) | A method and apparatus for identity authentication | |
| HK1259177A1 (en) | Tokenisation method and system for implementing exchanges on a blockchain | |
| MX383704B (en) | METHOD, DEVICE, SERVER AND SYSTEM FOR AUTHENTICATING A USER. | |
| MX2016001504A (en) | Method and apparatus for processing surveillance video. | |
| SG10201810422SA (en) | Dual channel identity authentication | |
| PH12018502584A1 (en) | Method and device for identity authentication | |
| WO2016126052A3 (en) | Authentication method and system | |
| GB2542512A8 (en) | Authentication methods and systems | |
| AU2017261844A1 (en) | Authenticating a user | |
| GB2550786A (en) | Automatic key management using enterprise user identity management | |
| MY184704A (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
| MY200897A (en) | Security Authentication System and Security Authentication Method for Creating Security Key by Combining Authentication Factors of Multiple Users |