Patent classifications
H04L63/0846
Temporary shared storage
Aspects of the subject disclosure may include, for example, a method for providing temporary shared cloud-based storage, where access to the shared storage is time-limited, location-limited and anonymous. The method includes receiving a request for storage accessible to a plurality of user devices. A storage account is initiated in response to the request; a password and a time period are associated with the storage account. User devices obtain access to the storage account using only the password provided and without users' personal credentials; access is also according to location within a geographic area defined in the request. Any of the data items is available to each user device having access to the storage account. Upon expiration of the time period, the storage account is disabled and the data items are deleted. Other embodiments are disclosed.
Method and system for secure automatic login through a mobile device
A method for authorizing automatic login of a user to a reserved area of an information resource includes, at a first user device, connecting to a web server for retrieving the information resource, and sending to an authentication server an identifier of the information resource and an identifier of the user. At the authentication server, based on the identifiers of the information resource and of the user, an authorization request is sent to a second user device associated with the user, and which stores access credentials for logging in the reserved area. At the second user device, the user is notified of the authorization request, and upon confirmation of the authorization request by the user on the second user device, access credentials are made available to the web server. At the web server, automatic login to the reserved area is performed based on the access credentials.
Method and apparatus for obtaining multiple user credentials
A method for a system includes forming within an app running upon a user smart-device, an ephemeral ID having data associated with a server and anonymous data, outputting the ephemeral ID to a first receiver associated with a first computer and to a second receiver associated with a second computer system separate from the first, receiving from the first receiver an identifier and a nonce, providing the identifier and the nonce to the server, receiving from the server a token associated with the first computer system authorizing access to the first computer system but not the second computer system by the user smart-device, storing the token for facilitated authentication of the user smart-device, and providing the token to the first receiver.
Method and system for the authentication of a client terminal by a target server, by triangulation via an authentication server
A method for authenticating a client terminal by a target server. The method includes: the client terminal authenticates itself with an authentication server; the target server authenticates itself with the authentication server; the authentication server and the target server share a password for the client terminal; the authentication server transmits the password to the client terminal; the client terminal transmits the password to the target server; and the target server determines whether or not there is a correspondence between the password shared with the authentication server and the password transmitted by the client terminal, and if the correspondence between passwords exists, the client terminal is authenticated by the target server.
Device Binding Method and Device
The present disclosure discloses a device binding method and device, used to resolve the issue of the prior art in which the operation of controlling a smart device in a certain position is cumbersome. The method of embodiments of the present disclosure comprises: a user terminal sending target address information to a server, the server encrypting the target address information, generating a verification password, and sending the verification password to the user terminal; the user terminal sending, by means of a transmission device, the verification password to a device to be bound; the device sending the received verification password and a device identifier of the device to the server; and if the verification password sent by the device is the same as the verification password generated by the server, the server binding the target address information corresponding to the received verification password to the device identifier.
METHOD FOR AUTHENTICATING INTERACTIONS INDEPENDENT OF A SYSTEM TIME, DEVICE FOR CARRYING OUT THIS METHOD AND FLAME DETECTOR COMPRISING SUCH A DEVICE
The invention relates to a method and a device, in particular a flame monitor, for authenticating interactions in microcontroller- and/or FPGA-based devices or appliances independently of a system time, in particular in embedded systems, in which a cryptographic hash value (R′TOTP, RTOTP) which may also be present in truncated form is calculated in a requesting device (10) and in an authenticating device (30) on the basis of a shared secret (S) used by both devices (10, 30) and in a TOTP module (12, 32) that operates in both devices (10, 30) in accordance with the TOTP method, wherein instead of a system time (R) a predefinable item of information (R) for computing the respective hash values (R′TOTP, RTOTP) is fed to the TOTP modules (12, 32), in such a way that the predefinable item of information (R) is generated or provided by the authenticating device (30) and in response to a request from the requesting device (10) or in response to direct input to the authenticating device (30) is transmitted to the requesting device (10), where it is then fed to the TOTP module therein (12) in order to compute a hash value, and the hash value (R′TOTP) computed there is passed on to the authenticating device (30), and such that, if said hash value (R′TOTP, RTOTP) received by the authenticating device (30) is identical to the hash value (R′TOTP) computed in the authenticating device (30) using the predefined item of information (R), authentication is successful and the interaction is released, or otherwise blocked in the case of a mismatch.
OFFLINE BIDIRECTIONAL TRANSACTION AND SECURE SYSTEM
In an approach for enabling communication between offline devices to perform secure transaction, a processor sends information in an optically recognizable first code including a response type, an identity of the first device and a type of optical reader associated with the first device. A processor receives encoded information in an optically recognizable second code. A processor extracts a user identifier and the one-time password associated with the registered second device. A processor determines that a user certificate associated with the user identifier exists in a local repository. A processor validates the one-time password associated with the registered second device with the user certificate using a public certificate associated with the first device, the one-time password associated with the registered second device and the one-time password seed. A processor authenticates the user.
WHITELISTING CLIENTS ACCESSING RESOURCES VIA A SECURE WEB GATEWAY WITH TIME-BASED ONE TIME PASSWORDS FOR AUTHENTICATION
Each tenant of a secure web gateway (SWG) is issued a secret key. A user accesses a unique secret key derived from the tenant's secret key and loads the secret key into an application which generates time-based one time passwords (TOTPs). When the SWG receives a connection request from a client and cannot decrypt the network traffic, the SWG challenges the client request and indicates an authentication scheme to be used. The client obtains user credentials, constructs a response to the challenge based on the authentication scheme, and issues a connection request to the SWG which indicates the response. The SWG determines an expected response based on a locally generated TOTP and the secret key of the corresponding tenant. If the expected response matches the provided response, the SWG authenticates the user, allows the connection request, and whitelists the client for a period longer than the lifetime of the TOTP.
METHOD AND SYSTEM FOR AUTHENTICATING MOBILE SERVERS FOR PLAY OF GAMES OF CHANCE
A system for authenticating mobile servers comprises at least one mobile server configured to support games of chance; and an authentication server configured to: assign an authentication identifier to each of the at least one mobile server and at least one backup mobile server; pre-authenticate the at least one backup mobile server; and authenticate the at least one mobile server for at least one of a predetermined period of time or a predetermined geographical area.
Method and system for authenticating mobile servers for play of games of chance
In one embodiment, a method, apparatus, and system of authenticating a mobile server may have at least one mobile server configured to execute games of chance on a plurality of mobile gaming devices and an authentication server configured to: determine a location of the at least one mobile server; determine a wireless communication means to communicate with the at least one mobile server based on the location of the at least one mobile server; communicate with the at least one mobile server via the determined wireless communication means; and initiate authentication, by an authentication server, of the at least one mobile server.