SG10201801032UA - Systems and methods for two-factor authentication - Google Patents
Systems and methods for two-factor authenticationInfo
- Publication number
- SG10201801032UA SG10201801032UA SG10201801032UA SG10201801032UA SG10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA
- Authority
- SG
- Singapore
- Prior art keywords
- server
- authentication factor
- keystroke
- authentication
- systems
- Prior art date
Links
- 230000003213 activating effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Social Psychology (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
S YSTEMS A ND M ETHODS F OR T WO -F ACTOR A UTHENTICATION Techniques for allowing a first device to access a server are disclosed. According to one embodiment, the server receives a first authentication factor from the first device and authenticates the first authentication factor. The server then automatically authenticating a second authentication factor by activating recording of a keystroke timing data using the first device, which is transmitted to a second device, and recording of a keystroke typing data using the second device in response to successfully authenticating the first authentication factor. The first device is allowed access to the server in response to the server receiving a notification of a successful authentication of the second authentication factor from the second device, wherein the successful notification is generated according to a comparison between the keystroke timing data and the keystroke typing data by the second device. (FIG. 4)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201801032UA SG10201801032UA (en) | 2018-02-06 | 2018-02-06 | Systems and methods for two-factor authentication |
PCT/SG2019/050059 WO2019156625A1 (en) | 2018-02-06 | 2019-02-01 | Systems and methods for two-factor authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201801032UA SG10201801032UA (en) | 2018-02-06 | 2018-02-06 | Systems and methods for two-factor authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201801032UA true SG10201801032UA (en) | 2019-09-27 |
Family
ID=67548077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201801032UA SG10201801032UA (en) | 2018-02-06 | 2018-02-06 | Systems and methods for two-factor authentication |
Country Status (2)
Country | Link |
---|---|
SG (1) | SG10201801032UA (en) |
WO (1) | WO2019156625A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190386984A1 (en) * | 2018-06-14 | 2019-12-19 | Paypal, Inc. | Two-factor authentication through ultrasonic audio transmissions |
US12306291B2 (en) | 2022-07-18 | 2025-05-20 | Gregory M. Steinberg | System and method for providing location-based positioning and navigation in GPS-denied environments |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2013243771B2 (en) * | 2012-04-01 | 2017-01-12 | Payfone, Inc. | Secure authentication in a multi-party system |
KR101569753B1 (en) * | 2013-11-05 | 2015-11-17 | 심플렉스 인터넷 주식회사 | System, Method and Apparatus for Secure Login |
CN106128452A (en) * | 2016-07-05 | 2016-11-16 | 深圳大学 | Acoustical signal detection keyboard is utilized to tap the system and method for content |
-
2018
- 2018-02-06 SG SG10201801032UA patent/SG10201801032UA/en unknown
-
2019
- 2019-02-01 WO PCT/SG2019/050059 patent/WO2019156625A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2019156625A1 (en) | 2019-08-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11902289B2 (en) | Methods and systems for controlling access to a protected resource | |
US9882913B1 (en) | Delivering authorization and authentication for a user of a storage array from a cloud | |
US9444822B1 (en) | Storage array access control from cloud-based user authorization and authentication | |
US9621524B2 (en) | Cloud-based key management | |
SG10201800338TA (en) | User authentication systems and methods | |
AU2018337040A1 (en) | Systems and methods for time-based one-time password management for a medical device | |
US10523652B2 (en) | Secure identity sharing using a wearable device | |
US9747434B1 (en) | Authenticating with an external device by providing a message having message fields arranged in a particular message field order | |
MX2017014141A (en) | Devices and methods for client device authentication. | |
NZ778334A (en) | Audio-based access control | |
PH12019501434A1 (en) | System and method for blockchain-based data management | |
US20120272301A1 (en) | Controlled user account access with automatically revocable temporary password | |
ATE311063T1 (en) | UNITED LOGIN PROCESS | |
CA3034665C (en) | Methods and systems for controlling access to a protected resource | |
US10021092B1 (en) | Systems and methods for device authentication | |
CN104683354A (en) | A dynamic password system based on identification | |
US10796026B2 (en) | Process and detachable device for using and managing encryption keys | |
US9602501B1 (en) | Bootstrapping user authentication | |
WO2019125633A1 (en) | Access security system and method | |
US20170180986A1 (en) | Multi-factor user authentication based on decoy security questions | |
KR20200002501A (en) | Method for certificating node of public blockchain, apparatus and system for executing the method | |
JP2020161185A (en) | Use of timing of symbol input for collation of password | |
WO2020131537A3 (en) | Cross-device access to one-time passwords | |
US20150143499A1 (en) | Single sign-on for disparate servers | |
SG10201801032UA (en) | Systems and methods for two-factor authentication |