[go: up one dir, main page]

SG10201801032UA - Systems and methods for two-factor authentication - Google Patents

Systems and methods for two-factor authentication

Info

Publication number
SG10201801032UA
SG10201801032UA SG10201801032UA SG10201801032UA SG10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA SG 10201801032U A SG10201801032U A SG 10201801032UA
Authority
SG
Singapore
Prior art keywords
server
authentication factor
keystroke
authentication
systems
Prior art date
Application number
SG10201801032UA
Inventor
Ximing Liu
Deng Huijie Robert
Yingjiu Li
Original Assignee
Singapore Management Univ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Singapore Management Univ filed Critical Singapore Management Univ
Priority to SG10201801032UA priority Critical patent/SG10201801032UA/en
Priority to PCT/SG2019/050059 priority patent/WO2019156625A1/en
Publication of SG10201801032UA publication Critical patent/SG10201801032UA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

S YSTEMS A ND M ETHODS F OR T WO -F ACTOR A UTHENTICATION Techniques for allowing a first device to access a server are disclosed. According to one embodiment, the server receives a first authentication factor from the first device and authenticates the first authentication factor. The server then automatically authenticating a second authentication factor by activating recording of a keystroke timing data using the first device, which is transmitted to a second device, and recording of a keystroke typing data using the second device in response to successfully authenticating the first authentication factor. The first device is allowed access to the server in response to the server receiving a notification of a successful authentication of the second authentication factor from the second device, wherein the successful notification is generated according to a comparison between the keystroke timing data and the keystroke typing data by the second device. (FIG. 4)
SG10201801032UA 2018-02-06 2018-02-06 Systems and methods for two-factor authentication SG10201801032UA (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG10201801032UA SG10201801032UA (en) 2018-02-06 2018-02-06 Systems and methods for two-factor authentication
PCT/SG2019/050059 WO2019156625A1 (en) 2018-02-06 2019-02-01 Systems and methods for two-factor authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201801032UA SG10201801032UA (en) 2018-02-06 2018-02-06 Systems and methods for two-factor authentication

Publications (1)

Publication Number Publication Date
SG10201801032UA true SG10201801032UA (en) 2019-09-27

Family

ID=67548077

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201801032UA SG10201801032UA (en) 2018-02-06 2018-02-06 Systems and methods for two-factor authentication

Country Status (2)

Country Link
SG (1) SG10201801032UA (en)
WO (1) WO2019156625A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190386984A1 (en) * 2018-06-14 2019-12-19 Paypal, Inc. Two-factor authentication through ultrasonic audio transmissions
US12306291B2 (en) 2022-07-18 2025-05-20 Gregory M. Steinberg System and method for providing location-based positioning and navigation in GPS-denied environments

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013243771B2 (en) * 2012-04-01 2017-01-12 Payfone, Inc. Secure authentication in a multi-party system
KR101569753B1 (en) * 2013-11-05 2015-11-17 심플렉스 인터넷 주식회사 System, Method and Apparatus for Secure Login
CN106128452A (en) * 2016-07-05 2016-11-16 深圳大学 Acoustical signal detection keyboard is utilized to tap the system and method for content

Also Published As

Publication number Publication date
WO2019156625A1 (en) 2019-08-15

Similar Documents

Publication Publication Date Title
US11902289B2 (en) Methods and systems for controlling access to a protected resource
US9882913B1 (en) Delivering authorization and authentication for a user of a storage array from a cloud
US9444822B1 (en) Storage array access control from cloud-based user authorization and authentication
US9621524B2 (en) Cloud-based key management
SG10201800338TA (en) User authentication systems and methods
AU2018337040A1 (en) Systems and methods for time-based one-time password management for a medical device
US10523652B2 (en) Secure identity sharing using a wearable device
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
MX2017014141A (en) Devices and methods for client device authentication.
NZ778334A (en) Audio-based access control
PH12019501434A1 (en) System and method for blockchain-based data management
US20120272301A1 (en) Controlled user account access with automatically revocable temporary password
ATE311063T1 (en) UNITED LOGIN PROCESS
CA3034665C (en) Methods and systems for controlling access to a protected resource
US10021092B1 (en) Systems and methods for device authentication
CN104683354A (en) A dynamic password system based on identification
US10796026B2 (en) Process and detachable device for using and managing encryption keys
US9602501B1 (en) Bootstrapping user authentication
WO2019125633A1 (en) Access security system and method
US20170180986A1 (en) Multi-factor user authentication based on decoy security questions
KR20200002501A (en) Method for certificating node of public blockchain, apparatus and system for executing the method
JP2020161185A (en) Use of timing of symbol input for collation of password
WO2020131537A3 (en) Cross-device access to one-time passwords
US20150143499A1 (en) Single sign-on for disparate servers
SG10201801032UA (en) Systems and methods for two-factor authentication