[go: up one dir, main page]

SG11201706467TA - Enhanced authentication based on secondary device interactions - Google Patents

Enhanced authentication based on secondary device interactions

Info

Publication number
SG11201706467TA
SG11201706467TA SG11201706467TA SG11201706467TA SG11201706467TA SG 11201706467T A SG11201706467T A SG 11201706467TA SG 11201706467T A SG11201706467T A SG 11201706467TA SG 11201706467T A SG11201706467T A SG 11201706467TA SG 11201706467T A SG11201706467T A SG 11201706467TA
Authority
SG
Singapore
Prior art keywords
secondary device
authentication based
device interactions
enhanced authentication
enhanced
Prior art date
Application number
SG11201706467TA
Inventor
Saint Eric Le
Dominique Fedronic
Christian Aabye
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG11201706467TA publication Critical patent/SG11201706467TA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/308Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/321Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
SG11201706467TA 2015-04-13 2016-04-13 Enhanced authentication based on secondary device interactions SG11201706467TA (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562146881P 2015-04-13 2015-04-13
PCT/US2016/027344 WO2016168339A1 (en) 2015-04-13 2016-04-13 Enhanced authentication based on secondary device interactions

Publications (1)

Publication Number Publication Date
SG11201706467TA true SG11201706467TA (en) 2017-09-28

Family

ID=57126826

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201706467TA SG11201706467TA (en) 2015-04-13 2016-04-13 Enhanced authentication based on secondary device interactions

Country Status (9)

Country Link
US (2) US10601818B2 (en)
EP (2) EP4271016B1 (en)
CN (2) CN107533620B (en)
AU (1) AU2016250092A1 (en)
BR (1) BR112017020724A2 (en)
CA (1) CA2977428A1 (en)
HK (1) HK1245919A1 (en)
SG (1) SG11201706467TA (en)
WO (1) WO2016168339A1 (en)

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3129935A4 (en) * 2014-04-08 2017-11-08 Capital One Financial Corporation Systems and methods for transacting at an atm using a mobile device
CN107210918B (en) * 2015-02-17 2021-07-27 维萨国际服务协会 Apparatus and method for transaction processing using tokens and passwords based on transaction specific information
EP4271016B1 (en) 2015-04-13 2025-02-19 Visa International Service Association Enhanced authentication based on secondary device interactions
US11521203B2 (en) * 2015-07-09 2022-12-06 Cryptography Research, Inc. Generating a cryptographic key based on transaction data of mobile payments
US10178164B2 (en) * 2015-08-31 2019-01-08 Visa International Service Association Secure binding of software application to communication device
US10475036B2 (en) * 2016-01-08 2019-11-12 Ca, Inc. Restricting account use by controlled replenishment
US10861019B2 (en) * 2016-03-18 2020-12-08 Visa International Service Association Location verification during dynamic data transactions
EP3497648A4 (en) * 2016-08-12 2019-06-26 Visa International Service Association STRONG ROOM OF TOKENS IN MIRROR
US10796304B2 (en) * 2017-06-12 2020-10-06 Bank Of America Corporation System and method of managing computing resources
US11144627B2 (en) * 2017-09-20 2021-10-12 Qualcomm Incorporated Peer assisted enhanced authentication
US20190228410A1 (en) * 2018-01-24 2019-07-25 Mastercard International Incorporated Method and system for generating and using contextual cryptograms for proximity and e-commerce payment
US11102180B2 (en) * 2018-01-31 2021-08-24 The Toronto-Dominion Bank Real-time authentication and authorization based on dynamically generated cryptographic data
US20190251073A1 (en) * 2018-02-14 2019-08-15 Samsung Electronics Co., Ltd. Method and interactive device for providing social interaction
US11240220B2 (en) * 2018-06-13 2022-02-01 Paypal, Inc. Systems and methods for user authentication based on multiple devices
US11018872B2 (en) * 2018-07-17 2021-05-25 Verizon Patent And Licensing Inc. Validating and securing caller identification to prevent identity spoofing
US10939296B2 (en) * 2018-08-20 2021-03-02 Ford Global Technologies, Llc Vehicle smart connection
CN113015992B (en) 2018-11-14 2023-02-17 维萨国际服务协会 Cloud token provisioning for multiple tokens
US11315571B2 (en) * 2018-11-28 2022-04-26 Visa International Service Association Audible authentication
EP3895462B1 (en) * 2018-12-12 2024-04-03 Visa International Service Association Provisioning initiated from a contactless device
JP2022059099A (en) * 2019-02-25 2022-04-13 ソニーグループ株式会社 Information processing device, information processing method, and program
US11070980B1 (en) * 2019-03-25 2021-07-20 Sprint Communications Company L.P. Secondary device authentication proxied from authenticated primary device
US11283781B2 (en) 2019-04-09 2022-03-22 Visa International Service Association Proximity interaction system including secure encryption scheme
WO2020232336A1 (en) * 2019-05-15 2020-11-19 Traitware, Inc. System and methods for using a trusted single web portal for accessing multiple web services
US11711361B2 (en) * 2019-06-04 2023-07-25 Paypal, Inc. Biometric authentication during voice data transfers
US12381953B2 (en) * 2019-07-01 2025-08-05 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US11140165B2 (en) * 2019-07-22 2021-10-05 Bank Of America Corporation System for selective mapping of distributed resources across network edge framework for authorized user access
US11868981B2 (en) * 2019-08-02 2024-01-09 Mastercard International Incorporated System and method to support payment acceptance capability for merchants
US11296862B2 (en) * 2019-08-29 2022-04-05 Visa International Service Association Provisioning method and system with message conversion
US12380294B2 (en) 2019-11-01 2025-08-05 Raymond Anthony Joao Control, monitoring, and/or security, apparatus and method for premises, vehicles, and/or articles
US10985921B1 (en) * 2019-11-05 2021-04-20 Capital One Services, Llc Systems and methods for out-of-band authenticity verification of mobile applications
US11683159B2 (en) * 2019-11-07 2023-06-20 Google Llc Hybrid content protection architecture
US11601279B2 (en) 2020-06-12 2023-03-07 Capital One Services, Llc Systems and methods for payment authentication
US11165586B1 (en) * 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US12219066B2 (en) * 2020-12-24 2025-02-04 Samsung Electronics Co., Ltd. Electronic device for sharing id and password, method for operating thereof, and server
EP4272095A4 (en) * 2020-12-30 2024-07-03 Visa International Service Association PROVISIONING COMPLETE STORAGE APPLICATION USING A PROCUREMENT SOFTWARE DEVELOPMENT KIT (SDK)
US20220385652A1 (en) * 2021-06-01 2022-12-01 Octopus Systems Ltd. Method and system for verifying the eligibility of a user based on location
US12495042B2 (en) * 2021-08-16 2025-12-09 Capital One Services, Llc Systems and methods for resetting an authentication counter
US12206801B2 (en) * 2021-08-25 2025-01-21 Visa International Service Association Digital identity authentication system and method
US20240412874A1 (en) * 2021-10-25 2024-12-12 James Aman Measurement authenticating wellness devices
US20250009226A1 (en) * 2021-10-27 2025-01-09 Monovo, LLC Interactive monitoring system and method for dynamic monitoring of physiological health
CN114826780B (en) * 2022-06-24 2022-09-20 中铱数字科技有限公司 Block chain based multi-level authority management system and method
US12328306B2 (en) * 2023-02-07 2025-06-10 Capital One Services, Llc Systems and methods for authentication using partitioned authentication tokens
US20250015975A1 (en) * 2023-07-07 2025-01-09 Apple Inc. Sae-pk protected ap-sta mutual authentication

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7095852B2 (en) 1998-02-13 2006-08-22 Tecsec, Inc. Cryptographic key split binder for use with tagged data elements
US6363485B1 (en) * 1998-09-09 2002-03-26 Entrust Technologies Limited Multi-factor biometric authenticating device and method
WO2001071516A1 (en) * 2000-03-23 2001-09-27 Tietech Co., Ltd. Method and apparatus for personal identification
US7017189B1 (en) * 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7146009B2 (en) 2002-02-05 2006-12-05 Surety, Llc Secure electronic messaging system requiring key retrieval for deriving decryption keys
US7676846B2 (en) * 2004-02-13 2010-03-09 Microsoft Corporation Binding content to an entity
US7865140B2 (en) * 2005-06-14 2011-01-04 The Invention Science Fund I, Llc Device pairing via intermediary device
US7734911B2 (en) * 2005-05-31 2010-06-08 Tricipher, Inc. Secure login using augmented single factor split key asymmetric cryptography
GB2442249B (en) * 2007-02-20 2008-09-10 Cryptomathic As Authentication device and method
CN101526985A (en) * 2008-03-04 2009-09-09 索尼(中国)有限公司 Client system and method of digital rights management and digital rights management system
US9489503B2 (en) * 2009-12-21 2016-11-08 Paypal, Inc. Behavioral stochastic authentication (BSA)
EP2383955B1 (en) * 2010-04-29 2019-10-30 BlackBerry Limited Assignment and distribution of access credentials to mobile communication devices
WO2012073014A1 (en) 2010-11-29 2012-06-07 Mobay Technologies Limited A system for verifying electronic transactions
US8446275B2 (en) * 2011-06-10 2013-05-21 Aliphcom General health and wellness management method and apparatus for a wellness application using data from a data-capable band
CA2820092A1 (en) * 2011-06-10 2012-12-13 Aliphcom Wearable device data security
US20130006650A1 (en) 2011-06-29 2013-01-03 Mckesson Financial Holdings Method and apparatus for migrating between devices while interacting with a healthcare application
EP3206330B1 (en) 2011-08-16 2018-12-26 ICTK Holdings Co., Ltd. Apparatus and method for authentication between devices based on puf over machine-to-machine communications
CN110111087B (en) * 2011-08-30 2024-01-02 欧威环公司 System and method for authorizing transactions utilizing unpredictable passwords
DE102011054842A1 (en) * 2011-10-27 2013-05-02 Wincor Nixdorf International Gmbh Device for handling notes of value and / or coins and method for initializing and operating such a device
CN104769622A (en) 2011-12-21 2015-07-08 英特尔公司 Method for authentication using biometric data for mobile device e-commerce transactions
US10515359B2 (en) 2012-04-02 2019-12-24 Mastercard International Incorporated Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements
US8819445B2 (en) * 2012-04-09 2014-08-26 Mcafee, Inc. Wireless token authentication
US8855312B1 (en) * 2012-06-29 2014-10-07 Emc Corporation Mobile trust broker
US20140085050A1 (en) * 2012-09-25 2014-03-27 Aliphcom Validation of biometric identification used to authenticate identity of a user of wearable sensors
US9942750B2 (en) * 2013-01-23 2018-04-10 Qualcomm Incorporated Providing an encrypted account credential from a first device to a second device
US20140279519A1 (en) * 2013-03-15 2014-09-18 Jumio Inc. Method and system for obtaining and using identification information
US20140278839A1 (en) * 2013-03-15 2014-09-18 Joe M. Lynam Location Based Payment System
GB2512944A (en) * 2013-04-12 2014-10-15 Mastercard International Inc Systems and methods for outputting information on a display of a mobile device
US9112859B2 (en) * 2013-06-13 2015-08-18 Google Technology Holdings LLC Method and apparatus for electronic device access
US9208335B2 (en) * 2013-09-17 2015-12-08 Auburn University Space-time separated and jointly evolving relationship-based network access and data protection system
WO2015071707A1 (en) 2013-11-15 2015-05-21 Here Global B.V. Security operations for wireless devices
CN104144049B (en) * 2014-03-11 2016-02-17 腾讯科技(深圳)有限公司 A kind of encryption communication method, system and device
AU2015308608B2 (en) * 2014-08-29 2019-07-04 Visa International Service Association Methods for secure cryptogram generation
EP4271016B1 (en) 2015-04-13 2025-02-19 Visa International Service Association Enhanced authentication based on secondary device interactions

Also Published As

Publication number Publication date
CN107533620B (en) 2021-07-02
CN107533620A (en) 2018-01-02
US10601818B2 (en) 2020-03-24
AU2016250092A1 (en) 2017-08-24
EP3284007A4 (en) 2018-02-21
WO2016168339A1 (en) 2016-10-20
EP3284007A1 (en) 2018-02-21
BR112017020724A2 (en) 2018-06-26
EP4271016A3 (en) 2024-01-03
EP4271016B1 (en) 2025-02-19
CN113420281A (en) 2021-09-21
US11086980B2 (en) 2021-08-10
US20180026973A1 (en) 2018-01-25
CN113420281B (en) 2025-04-29
US20200177583A1 (en) 2020-06-04
EP4271016A2 (en) 2023-11-01
EP3284007B1 (en) 2023-10-25
HK1245919A1 (en) 2018-08-31
CA2977428A1 (en) 2016-10-20

Similar Documents

Publication Publication Date Title
SG11201706467TA (en) Enhanced authentication based on secondary device interactions
GB2512502B (en) Device authentication
GB2551242B (en) Authentication
GB201714990D0 (en) Screen-analysis based device security
GB2533500B (en) Security device
GB201617529D0 (en) Device
GB2541000B (en) Security Device
IL248443B (en) An osseointegrable device
GB201607763D0 (en) Device
ZA201801582B (en) Security device
GB201619472D0 (en) Device
PL3258640T3 (en) Location based authentication
ZA201704485B (en) Local authentication
GB201603680D0 (en) Device
GB201418052D0 (en) Secure authentication token
GB201612835D0 (en) Anti-barricade device
GB2517814B (en) Mobile device authentication
GB201503415D0 (en) Biometric authentication device
GB201509416D0 (en) An improved ignition device
GB2567682B (en) Authentication device
GB201616165D0 (en) Device
GB201614228D0 (en) Device
GB201613309D0 (en) Device
GB201613273D0 (en) Device
GB201608605D0 (en) Device