FR2835129A1 - TWO-FACTOR AUTHENTICATION PROCESS WITH SINGLE-USE EPHEMERIC PASSWORD - Google Patents
TWO-FACTOR AUTHENTICATION PROCESS WITH SINGLE-USE EPHEMERIC PASSWORD Download PDFInfo
- Publication number
- FR2835129A1 FR2835129A1 FR0200818A FR0200818A FR2835129A1 FR 2835129 A1 FR2835129 A1 FR 2835129A1 FR 0200818 A FR0200818 A FR 0200818A FR 0200818 A FR0200818 A FR 0200818A FR 2835129 A1 FR2835129 A1 FR 2835129A1
- Authority
- FR
- France
- Prior art keywords
- user
- information system
- password
- computer terminal
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
L'invention concerne un procédé d'authentification d'un utilisateur auprès d'un système d'information ¡ lorsque l'utilisateur demande un accès au système d'information, celui-ci élabore un message codé contenant un mot de passe à usage unique et à durée de validité limitée qu'il émet à destination d'un terminal informatique récepteur de l'utilisateur; puis l'utilisateur, à l'aide d'un moyen d'entrée de données, introduit un code personnel secret dans le terminal informatique récepteur et soumet un support de données personnel à un moyen de lecture qui déchiffre une clé privée attribuée à l'utilisateur, afin que ce terminal informatique soit autoriser à décoder le message codé et à en extraire le mot de passe; enfin l'utilisateur envoie, par un terminal informatique émetteur, le mot de passe à destination du système d'information qui autorise l'accès de l'utilisateur.The invention relates to a method of authenticating a user with an information system ¡when the user requests access to the information system, the latter generates an encoded message containing a one-time password. and with a limited period of validity that it sends to a receiving computer terminal of the user; then the user, using a data entry means, enters a secret personal code into the receiving computer terminal and submits a personal data medium to a reading means which decrypts a private key assigned to the user. user, so that this computer terminal is authorized to decode the encoded message and to extract the password therefrom; finally, the user sends, via a transmitting computer terminal, the password to the information system which authorizes the user's access.
Description
duplication des articles et découvrir l'existence de marchés parallèles.duplication of articles and discover the existence of parallel markets.
PROCEDE D'AUTHENTIFICATION A DEUX FACTEURS AVEC MOT DE TWO FACTOR AUTHENTICATION METHOD WITH WORD
PASSE EPHEMERE A USAGE UNIQUESINGLE USE EPHEMER PASS
La présente invention concerne des perfection- The present invention relates to improvements
nements apportés aux procédés dauthentification, auprès d'un système dinformation, d'un utilisateur disposant d' au moins un terminal informatique récepteur qui est relié audit système d' information par une liaison télophonique et qui comprend un moyen d'affichage de données (tel qu'un écran), un moyen d'entrée de données (tel qu'un clavier) et un moyen de lecture d'un support de information provided to the authentication methods, with an information system, of a user having at least one receiving computer terminal which is connected to said information system by a telephone link and which comprises a means of displaying data (such as a screen), a data input means (such as a keyboard) and a means of reading a storage medium.
donnces (tel qu'une carte à puce).data (such as a smart card).
De nombreux systèmes d' information (base de données, service bancaire, service comptable, réseau privé Many information systems (database, banking service, accounting service, private network
d'entreprise,...) demandent aux utilisateurs de s'authen- ...) ask users to authenticate themselves
tifier à l' aide d'une donnée secrète (nom d'utilisateur, mot de passe,... ) couramment dénommée "code PIN": Personal Identification Number. L'accès au système d' information nest conditionné que par la connaissance et l' usage de la donnée secrète. I1 s'agit d'une authentification à un seul facteur: ce type d'authentification n'offre qu'une garantie limitée quant à l'identité réelle de la personne requérant l'accès au système d'information et ne peut tify using secret data (username, password, etc.) commonly known as a "PIN code": Personal Identification Number. Access to the information system is only conditioned by the knowledge and use of the secret data. This is a single factor authentication: this type of authentication offers only a limited guarantee as to the real identity of the person requesting access to the information system and cannot
suffire pour certaines applications sensibles. sufficient for certain sensitive applications.
L' invention a essentiellement pour objet de proposer un procédé perfectionné d'authentification d'un The main object of the invention is to propose an improved method for authenticating a
utilisateur auprès d'un système d'information. user with an information system.
A cette fin, il est proposé un procédé tel que mentionné au préambule qui, selon l'invention, se caractérise en que, lorsqu'un utilisateur émet un message de demande d'accès depuis un terminal informatique émetteur vers le système d'information, ce dernier élabore un message codé contenant un mot de passe à usage unique et à durée de validité limitée (éphémère) et émet ledit message codé à destination d'un terminal informatique récepteur utilisable par l'utilisateur, puis l'utilisateur, à l' aide de son moyen d'entrée de données, introduit un code personnel secret (code PIN) dans ledit terminal informatique récepteur et soumet un support de données personnel au moyen de lecture qui déchiffre une clé privée attribuée à l'utilisateur, afin que ledit terminal informatique récepteur soit autorisé à décoder le susdit message codé et à en extraire le susdit mot de passe, et enfin l'utilisateur envoie, par le terminal informatique émetteur, le mot de passe à destination du système d' information qui autorise l'accès de To this end, a method is proposed as mentioned in the preamble which, according to the invention, is characterized in that, when a user transmits an access request message from a transmitting computer terminal to the information system, the latter develops a coded message containing a password for single use and with a limited validity period (ephemeral) and sends said coded message to a receiving computer terminal usable by the user, then the user, at the using its data entry means, enter a secret personal code (PIN code) into said receiving computer terminal and submit a personal data medium by means of reading which deciphers a private key assigned to the user, so that said terminal receiving computer is authorized to decode the above coded message and to extract the above password, and finally the user sends, by the sending computer terminal, the password to the information system that authorizes access to
l'utilisateur.the user.
Ainsi, conformément à l'invention, l'authentifi- Thus, in accordance with the invention, the authentifi-
cation s'appuie sur un second facteur qui consiste en la possession d'un moyen personnel d'authentification (carte à puce, appareil électronique, fichier informatique,...): l'accès de l 'utilisateur au système d' information est conditionné par l'utilisation conjointe de la susdite donnée secrète ou code personnel secret ("code PIN") et du cation is based on a second factor which consists of having a personal means of authentication (smart card, electronic device, computer file, etc.): user access to the information system is conditioned by the joint use of the aforementioned secret given or secret personal code ("PIN code") and the
moyen personnel dauthentification.personal means of authentication.
La mise en _uvre du procédé conforme à l' invention s'appuie sur trois acteurs: - au moins une base de données publiques contenant 1' ensemble des certificats des utilisateurs, le système s'appuyant sur une infrastructure à clés publiques; - l'utilisateur équipé d'au moins un terminal informatique récepteur agencé pour décoder un message codé incident; - et le système d' information auquel l'utilisateur The implementation of the process according to the invention relies on three actors: - at least one public database containing all of the user certificates, the system relying on an infrastructure with public keys; - the user equipped with at least one receiving computer terminal arranged to decode an incident coded message; - and the information system to which the user
souhaite avoir accès.wish to have access.
Le terminal informatique émetteur et le terminal informatique récepteur peuvent être constitués sous forme d'un seul et même terminal informatique approprié pour assurer les deux fonctions, ou bien être constitués sous forme d'appareils distincts (par exemple un ordinateur de type PC et un télophone mobile équipé de façon approprice) The transmitting computer terminal and the receiving computer terminal can be constituted in the form of a single computer terminal suitable for performing the two functions, or else they can be constituted in the form of separate devices (for example a PC type computer and a telephone set mobile appropriately equipped)
qui sont à la disposition de l'utilisateur. which are available to the user.
De façon plus spécifique, le procédé peut mettre en _uvre les étapes qui suivent: More specifically, the method can implement the following steps:
- une autorité de certification attribue, à l'utilisa- - a certification authority assigns to the user
teur, une clé publique Kc et une clé privée kc, - l'autorité de certification établit une correspondance biunivoque entre la clé publique Kc de l'utilisateur et l'utilisateur, - le système d'information établit une correspondance biunivoque entre l'utilisateur et une donnée d'appel (par exemple un numéro téléphonique, une adresse URL, ) à l' aide de laquelle l'utilisateur peut, par un terminal informatique émetteur, appeler le système d' information par la liaison téléphonique, - à la suite d'un appel provenant d'un terminal informatique émetteur de l'utilisateur, le système d'information génère le susdit mot de passe à usage unique et à durée de vie limitée et demande à l'autorité de certification la clé publique Kc de l'utilisateur enfermée dans un certificat signé de la clé publique de l'autorité de certification, - le système d' information constitue le susdit message codé avec le mot de passe à usage unique et à durce de vie limitée enfermé dans un certificat signé de la clé publique de l'utilisateur, - et c'est ce message codé qui est envoyé à un terminal tor, a public key Kc and a private key kc, - the certification authority establishes a one-to-one correspondence between the public key Kc of the user and the user, - the information system establishes a one-to-one correspondence between the user and call data (for example a telephone number, a URL address,) using which the user can, by a transmitting computer terminal, call the information system by telephone link, - following of a call from a computer terminal sending the user, the information system generates the aforementioned password for single use and with a limited lifespan and requests from the certification authority the public key Kc of the user enclosed in a certificate signed by the public key of the certification authority, - the information system constitutes the aforesaid message coded with the password for single use and with limited lifespan enclosed d in a certificate signed by the user's public key, - and it is this coded message which is sent to a terminal
informatique récepteur utilisable par l'utilisateur. receiver computer usable by the user.
Là, comme indiqué plus haut, il peut être décodé par mise en _uvre combinée de la donnée secrète (code PIN) de l'utilisateur et du second moyen d'authentification contenant la clé privée kc de l'utilisateur qui permet d'ouvrir le certificat renfermant le mot de passe. There, as indicated above, it can be decoded by the combined implementation of the secret data (PIN code) of the user and the second authentication means containing the user's private key kc which makes it possible to open the certificate containing the password.
Grâce au processus de communication, à l'utilisa- Thanks to the communication process, the use
teur, du mot de passe sous couvert d'un certificat signé par l'autorité de certification, ledit mot de passe ne peut pas être décrypté s'il est intercepté frauduleuse of the password under cover of a certificate signed by the certification authority, said password cannot be decrypted if it is fraudulently intercepted
ment.is lying.
C'est lorsqu'il est retransmis, par l'utilisateur, vers le système d' information pour être autorisé à l'accès à celui-ci que le mot de passe peut être intercepté. Mais le mot de passe n'est qu'à usage unique: ayant déjà été utilisé par l'utilisateur, il ne sera plus reconnu une seconde fois par le système d' information. En outre, même si l'utilisateur ne l'a pas employé aussitôt après sa réception, le mot de passe est éphémère (durée de vie limitée, par exemple pour 10 minutes) de sorte que, même It is when it is retransmitted by the user to the information system to be authorized for access to it that the password can be intercepted. However, the password is for single use only: having already been used by the user, it will no longer be recognized a second time by the information system. In addition, even if the user did not use it immediately after receipt, the password is ephemeral (limited lifetime, for example for 10 minutes) so that, even
s'il finit par être identifié dans le terminal infor- if it ends up being identified in the computer terminal
matique de l'utilisateur, sa durée de vie sera expirée. user, its lifetime will have expired.
Une application préférée du procédé de l' invention concerne le cas o au moins le terminal informatique récepteur détenu par l'utilisateur est un téléphone mobile A preferred application of the method of the invention relates to the case where at least the receiving computer terminal owned by the user is a mobile telephone.
équipé d'une carte SIM (SIMToolkit) fournie avec une bi- equipped with a SIM card (SIMToolkit) supplied with a bi-
clé RSA et une application permettant, après saisie d'un code secret, de déchiffrer un message SMS requ, puis de l'afficher. Dans le cadre de la mise en _uvre du procédé de l'invention, le message codé élaboré par le système d'information à destination de l'utilisateur (message constitué du mot de passe éphémère à usage unique) est un message SMS et la bi-clé RSA présente dans la carte SIM du télophone mobile détenu par l'utilisateur est certifice RSA key and an application allowing, after entering a secret code, to decrypt an SMS request message, then to display it. In the context of the implementation of the method of the invention, the coded message developed by the information system intended for the user (message consisting of the ephemeral password for single use) is an SMS message and the bi key RSA present in the SIM card of the mobile telephone held by the user is certifice
par l'autorité de certification.by the certification authority.
Grâce à la mise en _uvre de clés asymétriques (c 'est-à-dire d'un couple clé publique/clé privée), le processus d'authentification ne nécessite pas, à la différence d'un système à clés symétriques, de relation privilogiée entre le système d' information et lutilisateur, mais repose entièrement sur l'autorité de certification. Ainsi, le mot de passe (ou jeton d'authentifi Thanks to the implementation of asymmetric keys (that is to say of a public key / private key pair), the authentication process does not require, unlike a symmetric key system, a relationship privileged between the information system and the user, but is entirely based on the certification authority. Thus, the password (or token of authentifi
cation) chiffré avec la clé publique de l'utilisateur est. cation) encrypted with the user's public key is.
seul, envoyé sous forme de message SMS pour être traité par l application SIMToolkit. Le jeton d' authentification ainsi obtenu peut être utilisé pour avoir accès à tout type de service via un canal queleonque: site Internet, alone, sent as an SMS message to be processed by the SIMToolkit application. The authentication token thus obtained can be used to access any type of service via any channel: website,
accès nomade (PPP), messagerie électronique,.... nomadic access (PPP), electronic messaging, ....
Un autre exemple d'application préférée ' de l 'invention concerne les téléphones mobiles qui seront équipés des futures cartes WIM pour des connexions à un site WAP (Wireless Application Protocol): c'est alors la carte WIM qui renferme la clé privoe de l'utilisateur et qui permet de décoder le mot de passe recu par lutilisateur. Another example of a preferred application of the invention relates to mobile telephones which will be equipped with future WIM cards for connections to a WAP site (Wireless Application Protocol): it is then the WIM card which contains the private key of the user and which allows to decode the password received by the user.
Claims (3)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0200818A FR2835129B1 (en) | 2002-01-23 | 2002-01-23 | TWO FACTOR AUTHENTICATION METHOD WITH SINGLE USE EPHEMERAL PASSWORD |
PCT/FR2003/000189 WO2003063411A1 (en) | 2002-01-23 | 2003-01-21 | Two-factor authentication method with a one-time password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0200818A FR2835129B1 (en) | 2002-01-23 | 2002-01-23 | TWO FACTOR AUTHENTICATION METHOD WITH SINGLE USE EPHEMERAL PASSWORD |
Publications (2)
Publication Number | Publication Date |
---|---|
FR2835129A1 true FR2835129A1 (en) | 2003-07-25 |
FR2835129B1 FR2835129B1 (en) | 2004-11-26 |
Family
ID=27589567
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR0200818A Expired - Fee Related FR2835129B1 (en) | 2002-01-23 | 2002-01-23 | TWO FACTOR AUTHENTICATION METHOD WITH SINGLE USE EPHEMERAL PASSWORD |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR2835129B1 (en) |
WO (1) | WO2003063411A1 (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7114080B2 (en) * | 2000-12-14 | 2006-09-26 | Matsushita Electric Industrial Co., Ltd. | Architecture for secure remote access and transmission using a generalized password scheme with biometric features |
US8752125B2 (en) | 2004-10-20 | 2014-06-10 | Salt Group Pty Ltd | Authentication method |
US7840993B2 (en) | 2005-05-04 | 2010-11-23 | Tricipher, Inc. | Protecting one-time-passwords against man-in-the-middle attacks |
DK2057819T3 (en) | 2006-08-31 | 2011-12-19 | Encap As | Method of synchronizing between a server and a mobile device |
US7979054B2 (en) * | 2006-10-19 | 2011-07-12 | Qualcomm Incorporated | System and method for authenticating remote server access |
EP1919157A1 (en) * | 2006-11-06 | 2008-05-07 | Axalto SA | Authentication based on a single message |
DE102007006116A1 (en) * | 2007-02-02 | 2008-08-14 | Vodafone Holding Gmbh | Data exchanging method for mobile network, involves encoding data by using activation code in data processing system, sending encoded data subscriber identity module card, and decoding data by subscriber identity module card using code |
EP2056565A1 (en) | 2007-10-29 | 2009-05-06 | Axalto | Method of authenticating a user accessing a remote server from a computer |
CA2720398C (en) | 2008-04-02 | 2016-08-16 | Twilio Inc. | System and method for processing telephony sessions |
US8837465B2 (en) | 2008-04-02 | 2014-09-16 | Twilio, Inc. | System and method for processing telephony sessions |
ITFI20100167A1 (en) * | 2010-07-30 | 2012-01-31 | Silvano Antonelli | "METHOD OF IDENTIFICATION OF A USER THROUGH PASSWORDS" |
EP2610826A1 (en) * | 2011-12-29 | 2013-07-03 | Gemalto SA | Method of establishing an OTA session |
US8737962B2 (en) | 2012-07-24 | 2014-05-27 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US9226217B2 (en) | 2014-04-17 | 2015-12-29 | Twilio, Inc. | System and method for enabling multi-modal communication |
US9485169B2 (en) | 2014-07-23 | 2016-11-01 | Nexmo Inc. | Systems and methods for adaptive routing |
US10356567B2 (en) | 2014-11-24 | 2019-07-16 | Nexmo, Inc. | Multi-channel communication system |
WO2016153758A1 (en) | 2015-03-24 | 2016-09-29 | Nexmo, Inc. | Multi-channel communication system |
US10476782B2 (en) | 2015-08-03 | 2019-11-12 | Nexmo, Inc. | Systems and methods for adaptive routing |
US10693644B2 (en) | 2017-06-23 | 2020-06-23 | International Business Machines Corporation | Single-input multifactor authentication |
EP3705235A1 (en) * | 2019-03-04 | 2020-09-09 | Hilti Aktiengesellschaft | Method of personalising an object |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NL1007409C1 (en) * | 1997-10-31 | 1997-11-18 | Nederland Ptt | Authentication system for electronic transactions |
EP0881559A1 (en) * | 1997-05-28 | 1998-12-02 | Siemens Aktiengesellschaft | Computer system for protecting software and a method for protecting software |
WO2001080525A1 (en) * | 2000-04-14 | 2001-10-25 | Sun Microsystems, Inc. | Network access security |
WO2001092999A2 (en) * | 2000-05-26 | 2001-12-06 | Citrix Systems, Inc. | Secure exchange of an authentication token |
-
2002
- 2002-01-23 FR FR0200818A patent/FR2835129B1/en not_active Expired - Fee Related
-
2003
- 2003-01-21 WO PCT/FR2003/000189 patent/WO2003063411A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0881559A1 (en) * | 1997-05-28 | 1998-12-02 | Siemens Aktiengesellschaft | Computer system for protecting software and a method for protecting software |
NL1007409C1 (en) * | 1997-10-31 | 1997-11-18 | Nederland Ptt | Authentication system for electronic transactions |
WO2001080525A1 (en) * | 2000-04-14 | 2001-10-25 | Sun Microsystems, Inc. | Network access security |
WO2001092999A2 (en) * | 2000-05-26 | 2001-12-06 | Citrix Systems, Inc. | Secure exchange of an authentication token |
Non-Patent Citations (2)
Title |
---|
OMURA J K: "NOVEL APPLICATIONS OF CRYPTOGRAPHY IN DIGITAL COMMUNICATIONS", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER. PISCATAWAY, N.J, US, vol. 28, no. 5, 1 May 1990 (1990-05-01), pages 21 - 29, XP000132493, ISSN: 0163-6804 * |
ROTRAUT LAUN: "ASYMMETRIC USER AUTHENTICATION", COMPUTERS & SECURITY. INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, ELSEVIER SCIENCE PUBLISHERS. AMSTERDAM, NL, vol. 11, no. 2, 1 April 1992 (1992-04-01), pages 173 - 183, XP000245841, ISSN: 0167-4048 * |
Also Published As
Publication number | Publication date |
---|---|
FR2835129B1 (en) | 2004-11-26 |
WO2003063411A1 (en) | 2003-07-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11546756B2 (en) | System and method for dynamic multifactor authentication | |
FR2835129A1 (en) | TWO-FACTOR AUTHENTICATION PROCESS WITH SINGLE-USE EPHEMERIC PASSWORD | |
KR100912976B1 (en) | Security system | |
KR101637863B1 (en) | Security system and method for transmitting a password | |
US8386795B2 (en) | Information security device of Universal Serial Bus Human Interface Device class and data transmission method for same | |
KR100547855B1 (en) | Secure communication system and method of a composite mobile communication terminal having a local area communication device | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
EP1872507A2 (en) | Method and device for accessing a sim card housed in a mobile terminal | |
JP2009500696A (en) | Transaction facilitation and authentication | |
IL138109A (en) | Method and devices for digitally signing files by means of a hand-held device | |
JP2006318489A (en) | Method and device for confirming authentication of id of service user | |
JP2005513955A (en) | Electronic signature method | |
US20070180507A1 (en) | Information security device of universal serial bus human interface device class and data transmission method for same | |
CN106921639A (en) | Mobile digital certificate application method and device | |
US20120089830A1 (en) | Method and device for digitally attesting the authenticity of binding interactions | |
KR20170042137A (en) | A authentication server and method thereof | |
JPH11252068A (en) | Data communication system, constitution device and recording medium | |
FR2769446A1 (en) | Identification and authentication system for users of data network | |
FR2831362A1 (en) | Method for carrying out a secure transaction, especially downloading of software, between a mobile phone equipped with a SIM card and an application server, whereby hash encryption is used to ensure the transaction is secure | |
EP2215800A1 (en) | Method of authenticating a user accessing a remote server from a computer | |
Kumar et al. | An Architectural Design for Secure Mobile Remote Macro-Payments. | |
KR101936941B1 (en) | Electronic approval system, method, and program using biometric authentication | |
EA010659B1 (en) | Network information protection method and storage medium | |
KR20030042789A (en) | A trust model for an authentication of a roaming user | |
FR2850772A1 (en) | Electronic transaction securing device for use in electronic commerce, has analyzing unit to retransmit intercepted signals to processing unit without modification if they are not in order of passage in secured mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
TP | Transmission of property | ||
TP | Transmission of property | ||
CD | Change of name or company name | ||
ST | Notification of lapse |
Effective date: 20130930 |