摘要:
This invention discloses a clock synchronized dynamic password security label validity real-time authentication system and method thereof, which comprises, the electronic label module, the user authentication terminal module, and the authentication service module. The electronic label module is used for generating the dynamic password data and displaying. The user authentication terminal module captures the dynamic password data generated by the electronic label module and the image data of the ID number of the electronic label module. After the analyzing processing, the text data is obtained, and then is sent to the authentication service module through the Internet. After receiving the text data, the authentication service module obtains the result of whether the first dynamic password data generating algorithm of the electronic label module is consistent with the second dynamic password data generating algorithm of the authentication service module. The result is returned to the user authentication terminal module.
摘要:
A server includes a key generator and an authenticator. The key generator is configured to receive a request for a first key from a worker device, to create the first key that is associated with a worker, and to transmit the first key to the worker device. The authenticator is in communication with the key generator, the authenticator is configured to receive a second key and identification details from a customer device, to transmit the identification details to the worker device, to receive acknowledgment of the identification details from the worker device, and to authenticate the second key and the identification details with the customer device.
摘要:
Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token may be generated, associated with the user profile, and communicated to the second device. Access to the user profile provided to the destination device may be terminated upon an expiration of the expiring token.
摘要:
A method of providing a new enhanced public key by a secure communications terminal for securing system communications, the secure communications terminal having a processor operably connected to a memory and a communications interface, the method comprising: generating, by the processor, a first portion for verifying a client account; generating, by the processor, a second portion for authenticating a public key server; generating, by the processor, an asymmetric public key and a corresponding asymmetric private key; combining, by the processor, the first portion, the second portion and the asymmetric public key to form the new enhanced public key; normalizing, by the processor, the enhanced public key based on a size of the asymmetric public key.
摘要:
Realized is a low-cost provision system capable of providing a provision item or a provision system that requires a smaller number of operation steps to be made by a user. A server includes a first receiving unit receiving transaction information transmitted by a communication terminal requesting a provision device having a provision item stored thereon to make a transaction of the provision item, a second receiving unit receiving a communication result including authentication information input to the communication terminal before the communication, the communication result being generated by a communication between the provision device and the communication terminal, and a transmission unit transmitting an instruction to execute the transaction to the provision device based on the transaction information or the communication result.
摘要:
The present invention prevents a maintenance tool for carrying out maintenance work of an electronic control unit (ECU) from being abused by a third person. In an authentication system according to the present invention, an authentication apparatus authenticates an operator of an operation terminal (equivalent to the maintenance tool), and the operation terminal forwards an authentication code generated by the authentication apparatus to the ECU. By using the authentication code, the ECU determines whether or not to permit the operation terminal to carry out a maintenance operation.
摘要:
A first cryptographic device is authenticated by a second cryptographic device. The second cryptographic device stores an alternative version of a secret value associated with the first cryptographic device as a countermeasure to compromise of the secret value. In conjunction with a protocol carried out between the first cryptographic device and the second cryptographic device, the second cryptographic device determines the secret value based at least in part on the alternative version of the secret value, and utilizes the determined secret value to authenticate the first cryptographic device. The alternative version of the secret value may comprise a randomly-skewed version of the secret value. For example, the secret value may comprise a key or other parameter of the first cryptographic device and the alternative version of the secret value may comprise a randomly-skewed version of the key or other parameter.
摘要:
The invention provides an easy to use credential management mechanism for multi-factor out-of-band multi-channel authentication process to protect a large number of documents without the need to remember all the document passwords. When opened, the secure document application generates a multi-dimensional code. The user scans the multi-dimensional code and validates the secure document application and triggers an out-of-band outbound mechanism. The portable mobile device invoices the authentication server to get authenticated. The authentication server authenticates the user based on shared secret key and is automatically allowed access to the secure document. The process of the invention includes an authentication server, a secure document application to generate an authentication vehicle or an embodiment (i.e. multi-dimensional bar code) and handle incoming requests, secret keys and a portable communication device with a smartphone application.
摘要:
A network authentication system and method is described for authenticating multiple profile accesses from a single remote device. A device remote from a web server, yet connected to the web server via, for example, the Internet, can allow multiple users to register their profiles within the device. The profiles are registered using a pre-existing user ID and password corresponding to, for example, the user's financial accounts. Multiple profiles and, specifically, the indicia of those profiles, can appear on the display of the remote device allowing each user the ability to select their own registered profile. Access to a profile is granted when the user enters their private PIN. Once the PIN is entered, the private information such as financial account information will be securely forwarded from the web server to the remote device.
摘要:
The given invention refers to ways of information protection from unsanctioned use. Method of creating of a safe environment for protecting information from unsanctioned use is characterized by encrypting information with a cryptographic processor and a closed cryptographic key, stored in the use's device, by forming and sending the data package, containing single-use authentication code of the user, to the aiding person's server, decrypting data package at the aiding person's server, and checking at the server of the single-use authentication code and test code, and, in case of positive result of verification server sends to the user a data package, single-use code of user authentication, received during decrypting the user's data package, after which the user's device forms a new data package, characterized by a new single-use code of user authentication, also data package consists of encrypted and non-encrypted parts, and the non-encrypted part contains a verification code, made with an ability to check the data package integrity and user identifier,