WO2013073780A1 - Procédé et serveur pour fournir une fonction de connexion automatique - Google Patents
Procédé et serveur pour fournir une fonction de connexion automatique Download PDFInfo
- Publication number
- WO2013073780A1 WO2013073780A1 PCT/KR2012/008691 KR2012008691W WO2013073780A1 WO 2013073780 A1 WO2013073780 A1 WO 2013073780A1 KR 2012008691 W KR2012008691 W KR 2012008691W WO 2013073780 A1 WO2013073780 A1 WO 2013073780A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- terminal
- token
- server
- automatic login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the present invention relates to an authentication technique for preventing an account from being stolen by an automatic login function.
- the present invention the step of generating an authentication token in response to a request from the terminal and providing it to the terminal; Receiving a request for changing authentication information available for user authentication from the terminal or another terminal; Expiring the authentication token issued to each terminal through the account of the terminal user; And generating and providing a new authentication token for the user terminal authenticated through the changed authentication information.
- the token generation unit for generating an authentication token for the user account authenticated as a party user through the authentication information received from the terminal;
- an authentication control unit configured to transmit the authentication token generated from the token generation unit to the terminal, and to expire the authentication token provided to each terminal in association with the user account when a request for changing the authentication information is received.
- the authentication data generated for automatic login is invalidated, thereby reducing the risk of account theft when the terminal is lost and greatly improving the stability.
- FIG. 1 is a diagram illustrating an authentication system for providing an automatic login function according to an embodiment of the present invention.
- FIG. 2 is a flowchart illustrating an automatic login execution method provided according to an embodiment of the present invention.
- FIG. 3 is a flowchart illustrating an authentication method provided according to an embodiment of the present invention.
- FIG. 4 is a block diagram illustrating an authentication system for providing an automatic login function according to an embodiment of the present invention.
- FIG. 5 is a flowchart illustrating an authentication method provided according to an embodiment of the present invention.
- the user who has an automatic login function is expired by expiring authentication data provided to each terminal in response to the user account. Its main feature is to help keep your account secure.
- the 'authentication' is to access the account created by the user of the terminal in order to use the service provided to the terminal via the Internet to access the service server and create an account for service use
- the requested authentication information for example, ID and password information
- the service server means to confirm that the user is a party user who can receive the service and access to his account.
- issuance or “issuance” of the token indicates that the token generated by the server is provided to the terminal.
- FIG. 1 is a diagram illustrating an authentication system for providing an automatic login function according to an embodiment of the present invention.
- an authentication system providing an automatic login function is connected to a terminal 10 through a network N to perform a server for performing authentication processing on the terminal 10 ( 20).
- the terminal 10 is provided with at least one application capable of executing an automatic login function, and the application is described in this specification as an example of a game application for providing a game service, but the present invention is not limited thereto. Browsers can also be included in the application in a broad sense.
- the server 20 may provide a page of the corresponding web site through a browser of the terminal 10 connected through the network N.
- the server provides a web page for the process of creating an account, and stores and manages various information such as account information related to the user account, user's unique information, and service usage history provided through the account. It is also possible to provide a purchase and payment function for various usage rights or items to be paid.
- the server 20 generates separate authentication data using the unique information related to the account that can be used as authentication to increase the convenience of the terminal user to input the authentication information each time the service is used, and the generated authentication data terminal Since the authentication data is provided to the terminal 10 by providing the terminal 10, an automatic login function is provided so that the user can automatically access his / her account even without inputting the authentication information.
- Such a server 20 has the same configuration as a conventional web server or web server.
- the software includes a program module implemented in any language such as C, C ++, Java, Visual Basic, Visual C and performing various functions.
- the server 20 is generally connected to an unspecified number of clients (including terminals) and / or other servers through an open computer network such as the Internet, and receives and acts on a task request from a client or other web server. It may mean a computer system which derives and provides a result and computer software (server program) installed therefor.
- the server 20 is a series of application programs that operate on the server and various databases (DB: Database, hereinafter referred to as "DB"), which are built in the inside or outside depending on the case. It is to be understood as a broad concept, including a). Accordingly, the server classifies membership information and various kinds of information and data on sports games according to sports game types and stores and manages them in a DB. Such a DB may be implemented inside or outside the server.
- DB Database
- the server 20 uses a server program that is variously provided according to operating systems such as DOS, Windows, Linux, UNIX, Macintosh, and the like for general server hardware.
- server program that is variously provided according to operating systems such as DOS, Windows, Linux, UNIX, Macintosh, and the like for general server hardware.
- Website Internet Information Server (IIS), and CERN, NCSA, and APPACH, which are used in a UNIX environment, may be used.
- the terminal 10 connected to the server 20 through the network N is generally a personal PC, but all terminals capable of connecting to the server 20 and the server-client communication by connecting to the wired / wireless network N may be used. It is possible to apply a broad concept including all communication computing devices such as smart phones, notebook computers, mobile communication terminals, personal digital assistants (PDAs), game machines, and the like.
- PDAs personal digital assistants
- the network N may be a network connecting the server 20 and the terminal 10 to a closed network such as a local area network (LAN) or a wide area network (WAN), but may be a network such as the Internet. It is preferred to be open.
- the Internet has many services in the TCP / IP protocol and its upper layers: HyperText Transfer Protocol (HTTP), Telnet, File Transfer Protocol (FTP), Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), and SNMP (The global open computer network architecture that provides the Simple Network Management Protocol (NFS), Network File Service (NFS), and Network Information Service (NIS).
- the terminal 10 is a mobile communication terminal or a smartphone
- the network N may include a mobile communication network.
- FIG. 2 is a flowchart illustrating an automatic login execution method provided according to an embodiment of the present invention.
- authentication information of a user input from the terminal is transmitted to the server through a network. (S10)
- the server reads the received authentication information to determine whether the party user of the user account corresponding to the received authentication information is correct, and if confirmed as the party user, notifies the terminal that the user account has been accessed according to the authentication procedure.
- the server when a request for executing the automatic login function is received from the terminal, the server generates authentication data for automatic login using various information related to the user account, and transmits the generated authentication data for automatic login to the terminal.
- the generated automatic login authentication data is stored separately in association with the user account.
- the terminal stores the received authentication data for automatic login.
- the terminal requests the user authentication by transmitting the stored authentication data for automatic login to the server.
- the server may compare the automatic login authentication data stored separately with the automatic login authentication data received from the terminal to determine whether they match, and if not match, notify the terminal that it is confirmed that the user is a party user according to the authentication. . (S40)
- the automatic login authentication data is preferably an authentication token generated in the form of a token.
- the authentication token is applied as the authentication data for automatic login, but is not limited thereto.
- the authentication method provided according to an embodiment of the present invention for enhancing security in the authentication process through the automatic login method provided as described above is as follows.
- FIG. 3 is a flowchart illustrating an authentication method provided according to an embodiment of the present invention.
- the server 20 in the first terminal 10a or the second terminal 10b When the first terminal 10a and the second terminal 10b receive and store the authentication data for automatic login associated with the same user account, respectively, the server 20 in the first terminal 10a or the second terminal 10b. ) Is sent to the server 20, and the authentication data for automatic login stored respectively is connected to the same user account after the authentication process.
- the first terminal 10a transmits the authentication token stored in the first terminal 10a to the server 20 to request authentication.
- the server 20 compares the received authentication token with the authentication tokens of the first terminal 10a stored in the server and determines whether the server 20 is matched, and if it is determined that the server 20 is connected to the corresponding user account according to the authentication confirmation. Notify
- the second terminal 10b receives the request for changing the authentication information for the account to the server 20.
- the authentication information may correspond to the password associated with the access of the account as described above, and the user's unique information for confirmation of the user holding the account, for example, contact information such as payment information, mobile phone, email, etc. Information and the like.
- the server 20 updates and stores the received new password in the password data of the previously stored account, and notifies the terminal that the password change processing is completed.
- the server 20 may be connected to the server 20 in the same manner as the authentication token provided to the second terminal 10b before changing the password.
- the stored authentication token expires so that it is no longer valid, and a new authentication token is generated and provided to the second terminal 10b.
- the server 20 expires at least one or more authentication tokens provided to each terminal in association with the account before the request for changing the password is received from the second terminal 10b.
- the first terminal 10a when the first terminal 10a is lost, a user who acquires the lost first terminal 10a may access an account of a legitimate owner of the first terminal through an automatic login function of the first terminal 10a. You may want to log in and use your account maliciously. In this case, when the legitimate owner of the first terminal 10a accesses the server 20 through the second terminal 10b and changes authentication information before being maliciously abused, the first terminal 10a automatically changes the authentication information. Since the authentication token stored for login becomes invalid, the malicious user who has lost the first terminal 10a cannot access the account of the legitimate owner of the first terminal 10a.
- the legitimate owner may access the server 20 through the second terminal 10b. Since you can no longer steal the account after you change the authentication information by accessing, you can prevent continued account theft.
- the legitimate owner of the first terminal 10a accessing the server 20 through the second terminal 10b may detect that his account has been stolen, change the authentication information again, and issue a previously issued certificate. You can mitigate further damage by expiring the authentication token again or by reporting the account theft to the server administrator.
- FIG. 4 is a block diagram illustrating an authentication system for providing an automatic login function according to an embodiment of the present invention.
- the terminal 10 performing the automatic login function according to an embodiment of the present invention is received from the authentication request unit 110 and the server 20 requesting authentication to the server for automatic login.
- the authentication token storage unit 120 stores the authentication token.
- the authentication requesting unit 110 accesses the server 20 through a browser of the terminal 10, an execution command of an automatic login function is input by a user on a web page provided by the server 20.
- the server 20 generates a request command for requesting issuance of an authentication token.
- a control unit (not shown) of the terminal 10 controls the request command generated from the authentication requesting unit 110 to be transmitted to the server 20, and reads the data received from the server 20 to authenticate the token. If the authentication token storage unit 120 to be stored.
- the authentication request unit 110 may be installed in the terminal 10 and operate together in each application requiring authentication in order to receive a service. For example, when a game application is installed in a terminal, when the application is first executed and connected to a server providing a game service, the authentication requesting unit 110 automatically authenticates or executes an automatic login function according to a user's selection. You can request a token.
- the authentication requesting unit 110 may request an authentication token for each application executed for the first time, and the authentication token storage unit 120 receives the authentication token received for each application. Can be saved.
- the server 20 for providing an automatic login function the token generator 210 for generating an authentication token for a user account authenticated as a party user, the generated authentication And an authentication control unit 230 that controls the token to be transmitted to the terminal 10 and expires all authentication tokens provided to each terminal 10 when a request for changing the authentication information for the account is received from the terminal 10. do.
- the authentication token provided to the terminal 10 when the authentication token provided to the terminal 10 is received from the terminal 10, it is determined whether the authentication token stored in the server 20 matches with the received authentication token and whether the authentication token is authenticated. It includes an authentication request processing unit 220 for notification, and generated from the user database 250 and the token generation unit 210, which stores the account-related information for each account, the user-related information holding each account, the terminal ( The authentication token provided in 10) includes a token storage unit 240 that is stored in association with each account.
- the authentication control unit 230 instructs the token generation unit 210 to generate an authentication token when an execution command of the automatic login function is received from the terminal 10 or when authentication information related to the corresponding account is changed.
- the token generator 210 generates an authentication token by using identification information of the terminal 10, account information of the user, and identification information of a service to be provided by the server 20 through authentication.
- the token generator 210 of the first terminal The authentication token is generated by collecting the identification information, the PPP which is the account information of the user, and the identification information of the SSS, which is a game service to be provided.
- the token generator 210 identifies the second terminal. It generates the authentication token by collecting the user's account information, PPP, and identification information of the SSS, the game service to be provided.
- the token generation unit 210 may generate different authentication tokens provided to each terminal when accessing the same account from various terminals 10.
- an A game application, a B game application, and a C game application can be used with an account having an ID of PPP.
- each of the A, B, and C game applications may be requested to issue an authentication token when the game application is first executed and connected to the server 20.
- the token generating unit 210 may be an authentication token for authentication of the A game application.
- An authentication token for authentication of a game application and an authentication token for authentication of a C game application may be generated respectively.
- the token generator 210 may generate different authentication tokens by generating authentication tokens including identification information of each game application.
- the token generation unit 210 may generate authentication tokens having different values according to a service to be used, according to a terminal to be accessed for the same account, and the token storage unit 240 may At least one authentication token generated for each account in association with the user database 250 is stored.
- the token generator 210 may generate an authentication token including the time information at the time of receiving the command of generating the authentication token or the time of generation of the authentication token in the above information, and collect each piece of identification information and time information. Generates a series of data codes using, and transforms the generated data code through a hash function to encrypt.
- the token generator 210 may enhance the security of the authentication token by mixing the data code with a randomly generated random code and modifying it through a hash function.
- the generated authentication token is provided to the first terminal, and the first terminal stores the received authentication token, and stored when the user A accesses a service server that provides an SSS game through the first terminal.
- the authentication request is made by sending the to the service server.
- the authentication request processor 220 checks a checksum of an authentication token issued from the token generator 210, that is, generated and provided to the terminal, so that authentication is performed.
- the authentication request processing unit 220 compares the received authentication token and a checksum value of the authentication token stored in the server 10 and determines that authentication is performed if the same is the same.
- Checksum is a value used to check the accuracy of data and is one of error detection methods.
- the checksum sends all the data sent before the end of the input data or sends the sum of all the data inputted at the end of the input data separately or at the end of the transmission data in order to check whether the data has been properly input or transmitted when the data is input or transmitted.
- the sum of the sums is sent separately, and the receiver of the data can check whether there is an error by summing the received values in turn and then comparing the received sum values with each other.
- the authentication request processing unit 220 may calculate a checksum value for the data code before being encrypted with the token in the token generator 210 or calculate a checksum value for the data code constituting the encrypted authentication token.
- the calculated value may be stored together with the token storage unit.
- the authentication request processor 220 calculates a checksum value for the authentication token received from the terminal 10, and checksum of the corresponding authentication token stored in the token storage unit 240. Compare with the value to see if it matches. As a result, if the checksum value calculated from the authentication token received from the terminal 10 and the checksum value stored in the token storage unit 240 match, the authentication token received from the terminal 10 is determined to be valid and the authentication is confirmed. Notify the terminal 10 that it is.
- the authentication request processing unit 220 is derived from the token as long as the data forming the token is not changed as the token generated by the token generating unit 210 of the server is stored in the server 20 and the terminal 10, respectively. The same value is used to perform authentication processing.
- the authentication control unit 230 when receiving a request for changing the authentication information for the corresponding account from the terminal 10 is linked to the account and is no longer valid for all authentication tokens stored in the token storage unit 240 Expire.
- the method of expiring the authentication token in the authentication control unit 230 is to change state information for all authentication tokens stored in the token storage unit 240 differently than before.
- all authentication tokens include status information. For example, when "OK” and "DEL" indicate the status of the authentication token, the authentication controller 230 is in the "OK” status information. You can expire the authentication token by changing the "DEL" status.
- the authentication request processing unit 220 in the process of requesting the authentication token stored in the token storage unit 240 for comparison with the authentication token received from the terminal 10, the status information of the corresponding authentication token is "DEL" If it is confirmed that it can be treated as an authentication failure.
- the authentication request processing unit 220 calculates a checksum value for the authentication token received from the terminal 10 and calculates a checksum value for the authentication token stored in the token storage unit 240. If the state information of the authentication token stored in step 240 is changed from "OK" to "DEL", the checksum value calculated accordingly is also different.
- FIG. 5 is a flowchart illustrating an authentication method provided according to an embodiment of the present invention.
- an authentication token is generated according to a request from the terminal, and the generated authentication token is transmitted to the terminal.
- the step of expiring the authentication token may operate by changing state information of the authentication token issued to each terminal.
- a new authentication token is generated for the user terminal authenticated through the changed authentication information and provided to the corresponding terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
La présente invention se rapporte à un procédé d'authentification adapté pour empêcher le vol d'un compte quand une fonction de connexion automatique est utilisée. Le serveur adapté pour fournir une fonction de connexion automatique selon la présente invention comprend un module de création de jeton d'authentification qui est utilisé afin de créer un jeton authentification pour un compte d'utilisateur authentifié en tant qu'un utilisateur autorisé, via des données d'authentification reçues d'un terminal. Le serveur comprend d'autre part un contrôleur d'authentification qui est utilisé : afin de permettre au jeton authentification qui a été créé dans le module de création de jeton d'authentification d'être transmis au terminal ; et afin de faire en sorte que le jeton authentification qui a été transmis au terminal expire, en interagissant avec le compte de l'utilisateur quand une demande de changement des données d'authentification est reçue. Selon la présente invention, le risque de vol de compte peut être minimisé même si un terminal est perdu dans un état où une fonction de connexion automatique a été exécutée.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020110120668A KR20130055116A (ko) | 2011-11-18 | 2011-11-18 | 자동 로그인 기능을 제공하는 방법 및 서버 |
| KR10-2011-0120668 | 2011-11-18 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013073780A1 true WO2013073780A1 (fr) | 2013-05-23 |
Family
ID=48429808
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2012/008691 Ceased WO2013073780A1 (fr) | 2011-11-18 | 2012-10-23 | Procédé et serveur pour fournir une fonction de connexion automatique |
Country Status (2)
| Country | Link |
|---|---|
| KR (1) | KR20130055116A (fr) |
| WO (1) | WO2013073780A1 (fr) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20170052589A (ko) * | 2014-09-10 | 2017-05-12 | 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 | 서버 인증에 계정 정보를 맵핑하는 기법 |
| CN112822222A (zh) * | 2018-06-25 | 2021-05-18 | 创新先进技术有限公司 | 登录验证方法、自动登录的验证方法、服务端及客户端 |
| CN115733663A (zh) * | 2020-04-29 | 2023-03-03 | 华为技术有限公司 | 登录方法、装置、电子设备和存储介质 |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111783067B (zh) * | 2016-05-09 | 2023-09-08 | 创新先进技术有限公司 | 多网站间的自动登录方法及装置 |
| KR102903925B1 (ko) * | 2021-04-01 | 2025-12-23 | 삼성에스디에스 주식회사 | 사용자 인증 정보 처리 방법 및 장치 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20080105863A (ko) * | 2007-06-01 | 2008-12-04 | 삼성전자주식회사 | 웹 기반 서비스를 통한 기기 제어 장치 및 방법 |
| KR20100002480A (ko) * | 2008-06-30 | 2010-01-07 | 엔에이치엔(주) | 도용된 계정을 차단하는 시스템 및 방법 |
-
2011
- 2011-11-18 KR KR1020110120668A patent/KR20130055116A/ko not_active Ceased
-
2012
- 2012-10-23 WO PCT/KR2012/008691 patent/WO2013073780A1/fr not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20080105863A (ko) * | 2007-06-01 | 2008-12-04 | 삼성전자주식회사 | 웹 기반 서비스를 통한 기기 제어 장치 및 방법 |
| KR20100002480A (ko) * | 2008-06-30 | 2010-01-07 | 엔에이치엔(주) | 도용된 계정을 차단하는 시스템 및 방법 |
Non-Patent Citations (1)
| Title |
|---|
| P. HUNT: "OAuth 2.0 Threat Model and Security Considerations draft-lodderstedt-oauth-security-01", 15 September 2011 (2011-09-15), XP015074873, Retrieved from the Internet <URL:http://cabernet.levkowetz.com/pdf/draft-lodderstedt-oauth-security-01.pdf> * |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20170052589A (ko) * | 2014-09-10 | 2017-05-12 | 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 | 서버 인증에 계정 정보를 맵핑하는 기법 |
| KR102354138B1 (ko) | 2014-09-10 | 2022-01-20 | 마이크로소프트 테크놀로지 라이센싱, 엘엘씨 | 서버 인증에 계정 정보를 맵핑하는 기법 |
| CN112822222A (zh) * | 2018-06-25 | 2021-05-18 | 创新先进技术有限公司 | 登录验证方法、自动登录的验证方法、服务端及客户端 |
| CN112822222B (zh) * | 2018-06-25 | 2023-04-25 | 蚂蚁金服(杭州)网络技术有限公司 | 登录验证方法、自动登录的验证方法、服务端及客户端 |
| CN115733663A (zh) * | 2020-04-29 | 2023-03-03 | 华为技术有限公司 | 登录方法、装置、电子设备和存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20130055116A (ko) | 2013-05-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN100544361C (zh) | 用于管理会话标识符的方法和设备 | |
| US8220032B2 (en) | Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith | |
| EP3258374B1 (fr) | Systèmes et procédés permettant de détecter et de réagir à une activité malveillante dans des réseaux informatiques | |
| CN101227468B (zh) | 用于认证用户到网络的方法、设备和系统 | |
| KR100920871B1 (ko) | 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한방법 및 시스템 | |
| CN113672897B (zh) | 数据通信方法、装置、电子设备及存储介质 | |
| US20100197293A1 (en) | Remote computer access authentication using a mobile device | |
| US20080134314A1 (en) | Automated security privilege setting for remote system users | |
| KR101451359B1 (ko) | 사용자 계정 회복 | |
| WO2007094369A1 (fr) | Système d'authentification distribuée et méthode d'authentification distribuée | |
| WO2017057899A1 (fr) | Système d'authentification intégré pour authentification grâce à des nombres aléatoires à usage unique | |
| WO2013176491A1 (fr) | Procédé d'authentification d'utilisateur de service web | |
| US20210234850A1 (en) | System and method for accessing encrypted data remotely | |
| JP4698751B2 (ja) | アクセス制御システム、認証サーバシステムおよびアクセス制御プログラム | |
| WO2014042336A1 (fr) | Procédé d'authentification téléphonique dans des transactions de commerce électronique et support d'enregistrement lisible par ordinateur ayant un programme enregistré sur celui-ci pour une authentification téléphonique dans des transactions de commerce électronique | |
| JP2016521029A (ja) | セキュリティ管理サーバおよびホームネットワークを備えるネットワークシステム、およびそのネットワークシステムにデバイスを含めるための方法 | |
| WO2018026109A1 (fr) | Procédé, serveur et support d'enregistrement lisible par ordinateur pour décider d'une permission d'accès à un portail au moyen d'un réseau | |
| WO2013073780A1 (fr) | Procédé et serveur pour fournir une fonction de connexion automatique | |
| US9967248B1 (en) | System for authenticating and processing service requests | |
| WO2014061897A1 (fr) | Procédé pour mettre en œuvre un service de confirmation de connexion et d'autorisation au moyen d'un terminal d'utilisateur mobile | |
| WO2010068057A1 (fr) | Appareil de gestion de données d'identité et procédé correspondant | |
| CN116248351A (zh) | 一种资源访问方法、装置、电子设备及存储介质 | |
| KR102465744B1 (ko) | 로그인 세션 전달을 이용한 기기인증 방법 | |
| WO2012128478A2 (fr) | Système et procédé d'authentification sur base d'une image | |
| CN101145916A (zh) | 网路安全认证系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12849708 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 100914 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12849708 Country of ref document: EP Kind code of ref document: A1 |