TR200903929A2 - An authentication system - Google Patents
An authentication systemInfo
- Publication number
- TR200903929A2 TR200903929A2 TR2009/03929A TR200903929A TR200903929A2 TR 200903929 A2 TR200903929 A2 TR 200903929A2 TR 2009/03929 A TR2009/03929 A TR 2009/03929A TR 200903929 A TR200903929 A TR 200903929A TR 200903929 A2 TR200903929 A2 TR 200903929A2
- Authority
- TR
- Turkey
- Prior art keywords
- users
- authentication system
- environments
- screens
- administrator
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Bu buluş, sadece ortam yürütücüsüne bağlı ekranların bulunduğu ortamlarda yer alan kullanıcıların giriş yapabileceği bir kimlik doğrulama sistemi (1) ile ilgilidir. Sistem sayesinde yöneticinin (H) belirlediği ve ekranlara (3) sahip ortamlarda, yöneticinin (H) kullanıcılarına sunmak istediği hizmetlerden sadece ekranın (3) bulunduğu ortamda yer alan kullanıcılar (G) faydalanmaktadır.The present invention relates to an authentication system (1) in which only users in the environments where there are screens connected to the media player can access. Thanks to the system, only the users (G) in the environment where the screen (3) is located can benefit from the services that the manager (H) wants to provide to the users in the environments determined by the administrator (H) and having screens (3).
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TR2009/03929A TR200903929A2 (en) | 2009-05-21 | 2009-05-21 | An authentication system |
| PCT/IB2010/052271 WO2010134053A1 (en) | 2009-05-21 | 2010-05-21 | An authentication system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TR2009/03929A TR200903929A2 (en) | 2009-05-21 | 2009-05-21 | An authentication system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TR200903929A2 true TR200903929A2 (en) | 2010-12-21 |
Family
ID=42357427
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TR2009/03929A TR200903929A2 (en) | 2009-05-21 | 2009-05-21 | An authentication system |
Country Status (2)
| Country | Link |
|---|---|
| TR (1) | TR200903929A2 (en) |
| WO (1) | WO2010134053A1 (en) |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FI115355B (en) * | 2000-06-22 | 2005-04-15 | Icl Invia Oyj | Arrangements for identification and verification of a user in a protected system |
| US20060146770A1 (en) | 2005-01-04 | 2006-07-06 | Ziv Geva | Digital media player device |
| US7627341B2 (en) | 2005-01-31 | 2009-12-01 | Microsoft Corporation | User authentication via a mobile telephone |
| ES2664947T3 (en) * | 2005-10-24 | 2018-04-24 | Dormakaba Schweiz Ag | Lock lock and lock control procedure |
| US20070150603A1 (en) | 2005-12-22 | 2007-06-28 | Catalog. Com, Inc. | System and method for cross-domain social networking |
-
2009
- 2009-05-21 TR TR2009/03929A patent/TR200903929A2/en unknown
-
2010
- 2010-05-21 WO PCT/IB2010/052271 patent/WO2010134053A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2010134053A1 (en) | 2010-11-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2012103321A3 (en) | Audio-based application architecture | |
| EP2519018A3 (en) | A television system | |
| TR200708644A1 (en) | Virtual airbag system. | |
| EP2757555A4 (en) | SOUND TRANSMITTING MATERIAL, ACOUSTIC CONTROL SURFACE STRUCTURE USING THE SAME AND HAVING APPLICATIONS INCLUDING CONSTRUCTION, MICROPHONE COVER, PROTECTIVE GRID, SOUND TRANSMITTING SCREEN AND SPEAKER | |
| FI20095731A7 (en) | Authentication | |
| EA200970112A1 (en) | DOCUMENT PROVIDED BY IDENTIFICATION AND VERIFICATION DATA | |
| SG162823A1 (en) | Application security in an interactive media environment statement of related application | |
| TR200903929A2 (en) | An authentication system | |
| Hahn et al. | Do local national managers improve multinationals’ performance?—Evidence from Korean firm-level data | |
| MY154224A (en) | A delegation system | |
| Gritzalis et al. | IS 2009–PC Co-chairs’ Message | |
| Wass et al. | Torsion pendulum testing of the LISA Pathfinder Gravitational Reference Sensor | |
| Manqele et al. | Selection and provisioning of services in a cloud using recommender systems approach for SMME | |
| Zhang et al. | Sound amplification by jittering wavepackets in subsonic turbulent jets | |
| Tereshchenko | Student in the Mobile World | |
| Zhang et al. | Generalized threshold secret sharing scheme among weighted participants of special access right. | |
| Marshall | Letter, Fred F. Marshall to Dearest [Henriette] | |
| Reddy | Detection of Location Falsification Attacks in GPS driven Cloud-assisted Cognitive Radio Networks | |
| Long | Order on Motion to Reconsider and Vacate Order Denying MFSJ (O'Brien _Conza) | |
| Kazumasa | A Combinatorics Proliferation Model with Threshold for Malware Countermeasure | |
| Pham | Modernization and the destruction of culture in Vietnam: The case of women street vendors | |
| Sahni et al. | On the Hohenberg-Kohn and Levy-Lieb Constrained Search Proofs of Density Functional Theory | |
| 孫博 et al. | Towards Automatically Detecting Promotional Attacks in Mobile App Store | |
| TR200805831U (en) | Rail plate system for computer cases | |
| Bangar et al. | Legal Powers Vested by State Legislatures to Local Boards of Health and Their Perception/Misperception |