Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and devices for user authentication

A user and authentication code technology, which is applied in the direction of code identification card or credit card start-up, equipment, calculation, etc., can solve problems such as inability to establish

Inactive Publication Date: 2008-10-01
PRIVASPHERE AG
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But these assumptions usually do not hold

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and devices for user authentication
  • Method and devices for user authentication
  • Method and devices for user authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] exist figure 1 Here, reference numeral 1 designates a communication terminal configured to exchange data with a computerized server 4 via a telecommunications network 3 . Communication terminals 1 include, but are not limited to, stationary personal computers (PCs), mobile laptop computers, mobile wireless telephones and / or mobile personal digital assistants (PDAs). Each communication terminal 1 has a display 11 and data input means 12, such as a keyboard and a pointing device (eg computer mouse, trackball, etc.). The communication terminal 1 comprises a client application, preferably a browser (such as Microsoft Internet Explorer or Mozilla Firefox), in order to access a server 4 residing on a server 4 via a telecommunications network 3 through a secure session established with a secure session establishment protocol such as SSL / TLS. online application. In addition, the communication terminal 1 includes an authentication module 2, which will be referred to later fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

For authenticating a user using a communication terminal (1 ) to access a server (4) via a telecommunications network, a personal identification code is received from the user. From secure session establishment protocol messages exchanged (S1 , S2, S3) between the communication terminal (1) and the server (4), a data set is generated (S4). Based on the data set, a transaction authentication number is generated (S52) using the personal identification code. The transaction authentication number is transmitted (S54) from the communication terminal (1 ) to the server (4). In the server (4), the transaction authentication number received is verified (S20) based on the secure session establishment protocol messages exchanged with the communication terminal (1). The transaction authentication number enables session aware user authentication that protects online users against real-time man-in-the-middle attacks.

Description

technical field [0001] The present invention relates to a method and a device for authenticating a user accessing a server. In particular, the invention relates to a method, a computer program product, and a method for authenticating a user accessing a server through a telecommunications network using a communication terminal, and accessing a computerized server. Background technique [0002] Tampering attacks on login mechanisms are growing rapidly on the Internet. Institutions such as banks have introduced two-factor authentication devices, some even including high-speed and even higher-cost challenge-response mechanisms. Man-in-the-middle (MITM) attacks pose a serious threat to all online applications based on SSL / TLS, such as Internet banking. (TLS) protocol standard (Dieks, T. and C. Allen, "The TLS Protocol Version 1.0", Request for Comments 2246, January 1999) requires the use of mutual authentication based client certificates. However, outside the tight grip of co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F1/00G07F7/10
Inventor 拉尔夫·豪泽
Owner PRIVASPHERE AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products