Generation and verification of temporary authentication values for secure transmissions

A temporary authentication and secure transmission technology, applied in the field of secure transmission, can solve problems such as theft

Pending Publication Date: 2022-07-08
NO COMMON PAYMENT AB
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if this data is provided to the service provider system in clear text, there is a risk that the hacker will record the provided data and subsequently use it for his own purposes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation and verification of temporary authentication values for secure transmissions
  • Generation and verification of temporary authentication values for secure transmissions
  • Generation and verification of temporary authentication values for secure transmissions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will now be described more fully hereinafter. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Throughout the specification, the same reference numbers refer to the same elements or method steps.

[0037]As previously mentioned, some existing solutions for secure transmission of authentication data may not be secure enough, or may be complex and / or expensive to implement. The general purpose of the embodiments described herein is to allow for a more secure transfer of information that prevents or at least complicates unauthorized use of an account by restricting access to the account to unauthorized entities, processes, and / or individuals.

[0038] To address this probl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides, inter alia, a method of generating a temporary authentication value for secure transmission to a service provider system having one or several computer servers. The method begins with receiving first identification data and receiving security data associated with the first identification data. Thereafter, a hash function is applied to the first identification data and the security data to generate a temporary authentication value. The generated temporary authentication value is divided into a first portion and a second portion. The method thereafter includes sending only a second portion of the divided temporary authentication value to the service provider system for verification.

Description

technical field [0001] The present disclosure generally relates to the field of secure transmission. [0002] More specifically, the embodiments described herein relate to methods, terminals and computer programs for generating temporary authentication values ​​for use, for example, in secure transmission with a service provider system. Background technique [0003] When a user wants to access an account with limited availability, such as, for example, a bank account or a user account, the user typically must perform an authentication process. Access to the account is usually handled by the service provider system, which may additionally be the system that provides the account. The authentication process verifies that the user is who the user claims to be and that the user is authorized to access the account. A user can be a physical or non-physical individual, such as a service account in a computer network. [0004] Typically, the authentication process begins with the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCG06F21/31H04L9/085H04L9/3242H04L9/3226H04L2209/56G06F2221/2151G06F2221/2137H04L63/083H04W12/068H04L9/3236H04L63/0428H04L63/1475H04L63/0838
Inventor F·卡勒马尔姆
Owner NO COMMON PAYMENT AB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products