Gaurav et al. - Google Patents
Bilateral Authentication ProtocolGaurav et al.
View PDF- Document ID
- 17864051881990570697
- Author
- Gaurav K
- Kumar A
- Gautam A
External Links
Snippet
Internet become standard as sale channel and used for e-business transaction. However many obstacles regarding security issue comes as far as business on web is concern. Business must find a way to perform more secure authentication of employee then before …
- 230000002146 bilateral 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8271781B2 (en) | System and method for authentication of a hardware token | |
| CA2341784C (en) | Method to deploy a pki transaction in a web browser | |
| US8943311B2 (en) | System and methods for online authentication | |
| US7409543B1 (en) | Method and apparatus for using a third party authentication server | |
| US8689290B2 (en) | System and method for securing a credential via user and server verification | |
| CN110990827A (en) | Identity information verification method, server and storage medium | |
| US20020031225A1 (en) | User selection and authentication process over secure and nonsecure channels | |
| US20090293111A1 (en) | Third party system for biometric authentication | |
| US20080148046A1 (en) | Real-Time Checking of Online Digital Certificates | |
| US20130219481A1 (en) | Cyberspace Trusted Identity (CTI) Module | |
| WO2007094165A1 (en) | Id system and program, and id method | |
| KR20050083594A (en) | Biometric private key infrastructure | |
| JP2007522540A (en) | User authentication methods and related architectures based on the use of biometric identification technology | |
| CA2573101A1 (en) | System and method for implementing digital signature using one time private keys | |
| JP2008538146A (en) | Architecture for privacy protection of biometric templates | |
| KR20060032888A (en) | Identity information management device through internet and service providing method using same | |
| US20030037239A1 (en) | Method and apparatus to mutually authentication software modules | |
| EP2530618B1 (en) | Sign-On system with distributed access | |
| JP4303952B2 (en) | Multiple authentication system, computer program, and multiple authentication method | |
| Fourar-Laidi | A smart card based framework for securing e-business transactions in distributed systems | |
| Gaurav et al. | Bilateral Authentication Protocol | |
| US8621231B2 (en) | Method and server for accessing an electronic safe via a plurality of entities | |
| JP2006074487A (en) | Authentication management method and authentication management system | |
| KR20010003569A (en) | Apparatus for generating digital signature based on private-key/public-key | |
| Fourar | A Remote Authentication Model Using Smart Cards |