scispace - formally typeset
Patent

Single one-time password token with single PIN for access to multiple providers

TLDR
In this paper, a system and a method are disclosed that includes a first party with a terminal and a one-time password token, one or more second parties, each with a host application system and an authentication server, and a third party with an authentication master server.
Abstract
A system and a method are disclosed that includes a first party with a terminal and a one-time password token, one or more second parties, each with a host application system and a service provider authentication server, and a third party with a host application system and a master authentication server. The first party uses a single one-time password token with a single personal identification number (PIN) to access the one or more second parties. A third party issues the token to the first party and synchronizes token secrets and parameters with the one or more second parties. This offloads token management from the second parties and allows the second parties to directly authenticate the first party. The authentication of the first party by the second party does not involve the third party.

read more

Citations
More filters
Patent

A transaction system for business and social networking

Dan Coffing, +1 more
TL;DR: In this article, a wireless face-to-face bilateral communication method between at least two users of a service provider, each having a token device, and at least one having a user-defined profile, comprising: between a sending token device and a receiving token devices, transmitting unique electronic transaction tokens between a consenting sending party and an optionally consenting receiving party wherein said transaction tokens may be used for single use, party-approved after-contact, computer network facilitated access to each other's profile.
Patent

System and methods for online authentication

TL;DR: In this paper, a protocol for authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel.
Patent

Systems and methods for protecting data stored on removable storage devices by requiring external user authentication

TL;DR: A computer-implemented method for protecting data stored on removable storage devices may include identifying an attempt by a computing device to access encrypted data on a removable storage device and then, prior to allowing access to the encrypted data, authenticating a user of the computing device by obtaining security credentials from the user that include a time-synchronized authentication code generated by an external authentication device as mentioned in this paper.
Patent

Business pre-permissioning in delegated third party authorization

TL;DR: In this article, a method to manage access to end user-protected resources hosted in a shared pool of configurable computing resources, such as a cloud computing environment, begins by registering a particular application or service into the environment.
Patent

Method for authentication and signature of a user in an application service using a mobile telephone as a second factor in addition to and independently from a first factor

TL;DR: In this article, a method for two-factor authentication of a user in an application service running on an application server is described, where the authentication method is characterised in that the first authentication factor is a PIN authentication code known only by the user and the application service, and the second authentication factors is the mobile communication terminal of the user on which is installed a reliability application obtained from a reliable third party or certified by the same, said reliability application being capable of generating, using said PIN identification code and a secret key (Ks) shared only with the reliable third parties,
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Patent

Distributed network based electronic wallet

TL;DR: In this article, the authors present a system that includes multiple data stores for storing different types of a user's information, in which information is the primary asset and in which investments may be made in information, and the safe, secure and properly authorized transfer of information while preserving individual privacy is provided.
Patent

System and method for globally and securely accessing unified information in a computer network

TL;DR: In this paper, a client stores a first set of workspace data, and is coupled via a computer network to a global server, which stores independently modifiable copies of the portions.
Patent

System and method for using a global translator to synchronize workspace elements across a network

TL;DR: In this article, the authors use a global translator (122) to automatically synchronize multiple copies of a workspace element across different format between multiple sites in a secure network environment, independent of whether the sites are protected by site firewalls.
Patent

System and method for synchronizing electronic mail between a client site and a central site

TL;DR: In this article, a system includes an e-mail engine which uses a proper protocol to retrieve an email from a first mail store and to store the email in one or more folder structures.