[go: up one dir, main page]

TR200903929A2 - An authentication system - Google Patents

An authentication system

Info

Publication number
TR200903929A2
TR200903929A2 TR2009/03929A TR200903929A TR200903929A2 TR 200903929 A2 TR200903929 A2 TR 200903929A2 TR 2009/03929 A TR2009/03929 A TR 2009/03929A TR 200903929 A TR200903929 A TR 200903929A TR 200903929 A2 TR200903929 A2 TR 200903929A2
Authority
TR
Turkey
Prior art keywords
users
authentication system
environments
screens
administrator
Prior art date
Application number
TR2009/03929A
Other languages
Turkish (tr)
Inventor
Gürel Hakan
Original Assignee
Gürel Hakan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gürel Hakan filed Critical Gürel Hakan
Priority to TR2009/03929A priority Critical patent/TR200903929A2/en
Priority to PCT/IB2010/052271 priority patent/WO2010134053A1/en
Publication of TR200903929A2 publication Critical patent/TR200903929A2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Bu buluş, sadece ortam yürütücüsüne bağlı ekranların bulunduğu ortamlarda yer alan kullanıcıların giriş yapabileceği bir kimlik doğrulama sistemi (1) ile ilgilidir. Sistem sayesinde yöneticinin (H) belirlediği ve ekranlara (3) sahip ortamlarda, yöneticinin (H) kullanıcılarına sunmak istediği hizmetlerden sadece ekranın (3) bulunduğu ortamda yer alan kullanıcılar (G) faydalanmaktadır.The present invention relates to an authentication system (1) in which only users in the environments where there are screens connected to the media player can access. Thanks to the system, only the users (G) in the environment where the screen (3) is located can benefit from the services that the manager (H) wants to provide to the users in the environments determined by the administrator (H) and having screens (3).

TR2009/03929A 2009-05-21 2009-05-21 An authentication system TR200903929A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TR2009/03929A TR200903929A2 (en) 2009-05-21 2009-05-21 An authentication system
PCT/IB2010/052271 WO2010134053A1 (en) 2009-05-21 2010-05-21 An authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TR2009/03929A TR200903929A2 (en) 2009-05-21 2009-05-21 An authentication system

Publications (1)

Publication Number Publication Date
TR200903929A2 true TR200903929A2 (en) 2010-12-21

Family

ID=42357427

Family Applications (1)

Application Number Title Priority Date Filing Date
TR2009/03929A TR200903929A2 (en) 2009-05-21 2009-05-21 An authentication system

Country Status (2)

Country Link
TR (1) TR200903929A2 (en)
WO (1) WO2010134053A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI115355B (en) * 2000-06-22 2005-04-15 Icl Invia Oyj Arrangements for identification and verification of a user in a protected system
US20060146770A1 (en) 2005-01-04 2006-07-06 Ziv Geva Digital media player device
US7627341B2 (en) 2005-01-31 2009-12-01 Microsoft Corporation User authentication via a mobile telephone
ES2664947T3 (en) * 2005-10-24 2018-04-24 Dormakaba Schweiz Ag Lock lock and lock control procedure
US20070150603A1 (en) 2005-12-22 2007-06-28 Catalog. Com, Inc. System and method for cross-domain social networking

Also Published As

Publication number Publication date
WO2010134053A1 (en) 2010-11-25

Similar Documents

Publication Publication Date Title
WO2012103321A3 (en) Audio-based application architecture
EP2519018A3 (en) A television system
TR200708644A1 (en) Virtual airbag system.
EP2757555A4 (en) SOUND TRANSMITTING MATERIAL, ACOUSTIC CONTROL SURFACE STRUCTURE USING THE SAME AND HAVING APPLICATIONS INCLUDING CONSTRUCTION, MICROPHONE COVER, PROTECTIVE GRID, SOUND TRANSMITTING SCREEN AND SPEAKER
FI20095731A7 (en) Authentication
EA200970112A1 (en) DOCUMENT PROVIDED BY IDENTIFICATION AND VERIFICATION DATA
SG162823A1 (en) Application security in an interactive media environment statement of related application
TR200903929A2 (en) An authentication system
Hahn et al. Do local national managers improve multinationals’ performance?—Evidence from Korean firm-level data
MY154224A (en) A delegation system
Gritzalis et al. IS 2009–PC Co-chairs’ Message
Wass et al. Torsion pendulum testing of the LISA Pathfinder Gravitational Reference Sensor
Manqele et al. Selection and provisioning of services in a cloud using recommender systems approach for SMME
Zhang et al. Sound amplification by jittering wavepackets in subsonic turbulent jets
Tereshchenko Student in the Mobile World
Zhang et al. Generalized threshold secret sharing scheme among weighted participants of special access right.
Marshall Letter, Fred F. Marshall to Dearest [Henriette]
Reddy Detection of Location Falsification Attacks in GPS driven Cloud-assisted Cognitive Radio Networks
Long Order on Motion to Reconsider and Vacate Order Denying MFSJ (O'Brien _Conza)
Kazumasa A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
Pham Modernization and the destruction of culture in Vietnam: The case of women street vendors
Sahni et al. On the Hohenberg-Kohn and Levy-Lieb Constrained Search Proofs of Density Functional Theory
孫博 et al. Towards Automatically Detecting Promotional Attacks in Mobile App Store
TR200805831U (en) Rail plate system for computer cases
Bangar et al. Legal Powers Vested by State Legislatures to Local Boards of Health and Their Perception/Misperception