[go: up one dir, main page]

Gaurav et al. - Google Patents

Bilateral Authentication Protocol

Gaurav et al.

View PDF
Document ID
17864051881990570697
Author
Gaurav K
Kumar A
Gautam A

External Links

Snippet

Internet become standard as sale channel and used for e-business transaction. However many obstacles regarding security issue comes as far as business on web is concern. Business must find a way to perform more secure authentication of employee then before …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Similar Documents

Publication Publication Date Title
US8271781B2 (en) System and method for authentication of a hardware token
CA2341784C (en) Method to deploy a pki transaction in a web browser
US8943311B2 (en) System and methods for online authentication
US7409543B1 (en) Method and apparatus for using a third party authentication server
US8689290B2 (en) System and method for securing a credential via user and server verification
CN110990827A (en) Identity information verification method, server and storage medium
US20020031225A1 (en) User selection and authentication process over secure and nonsecure channels
US20090293111A1 (en) Third party system for biometric authentication
US20080148046A1 (en) Real-Time Checking of Online Digital Certificates
US20130219481A1 (en) Cyberspace Trusted Identity (CTI) Module
WO2007094165A1 (en) Id system and program, and id method
KR20050083594A (en) Biometric private key infrastructure
JP2007522540A (en) User authentication methods and related architectures based on the use of biometric identification technology
CA2573101A1 (en) System and method for implementing digital signature using one time private keys
JP2008538146A (en) Architecture for privacy protection of biometric templates
KR20060032888A (en) Identity information management device through internet and service providing method using same
US20030037239A1 (en) Method and apparatus to mutually authentication software modules
EP2530618B1 (en) Sign-On system with distributed access
JP4303952B2 (en) Multiple authentication system, computer program, and multiple authentication method
Fourar-Laidi A smart card based framework for securing e-business transactions in distributed systems
Gaurav et al. Bilateral Authentication Protocol
US8621231B2 (en) Method and server for accessing an electronic safe via a plurality of entities
JP2006074487A (en) Authentication management method and authentication management system
KR20010003569A (en) Apparatus for generating digital signature based on private-key/public-key
Fourar A Remote Authentication Model Using Smart Cards