Abstract:
THE PRESENT INVENTION RELATES TO A SYSTEM (100) AND METHOD FOR PERFORMING SECURE DESTRUCTION OF TEMPORARY FILES. THE PRESENT SYSTEM (100) AND METHOD INCLUDES CREATING A MAIN COMPARTMENT (104) AND A TEMPORARY COMPARTMENT (110) FOR PROVIDING A FIRST VIRTUAL COMPUTING ENVIRONMENT AND A SECOND VIRTUAL COMPUTING ENVIRONMENT TO HOST AT LEAST ONE OPERATING SYSTEM (102, 108) AND A PLURALITY OF APPLICATIONS (106, 112). MOREOVER, THE PRESENT SYSTEM (100) AND METHOD INSTRUCTS AN INSTALLATION TO THE TEMPORARY COMPARTMENT (112) FROM ONE OF THE PLURALITY OF APPLICATIONS (106) IN THE MAIN COMPARTMENT (104). FURTHER, THE PRESENT SYSTEM (100) AND METHOD DESTROYS A PLURALITY OF TEMPORARY FILES (114) GENERATED BY ONE OF THE PLURALITY OF APPLICATIONS (112) OF THE TEMPORARY COMPARTMENT FOR VIEWING A GRANTED AUTHORIZATION PROCESS. FURTHERMORE, THE PRESENT SYSTEM (100) AND METHOD INCLUDES COMMUNICATING FROM THE MAIN COMPARTMENT (104) TO THE TEMPORARY COMPARTMENT (110) FOR PROVIDING AN INSTRUCTION PATH TO PERFORM A SET OF FUNCTIONAL OPERATIONS TO CREATE AND DESTROY THE MAIN COMPARTMENT (104) OR THE TEMPORARY COMPARTMENT (110) USING A COMMUNICATION LINK. THE MOSI ILLUSTRATIVE DRAWING:
Abstract:
A method and system that employs physical objects as context aware in assisting face authentication thereby elevating trust level of face authentication and obviating need for additional hardware devices and computing resources that are typically associated with multimodal authentication systems. A camera (102) simultaneously captures an enrolled user's (20) face and at least one physical object pre-determined by the user (20) from his background as information binding user identity for authentication. An authentication result is computed as a combination of scores generated from face recognition and physical object(s) detection.
Abstract:
Secure transaction log is used as an audit trail mechanism as said secure logging system is a centralized system that logs all application transactions from different servers wherein it provides an authentication method for client to login to the logging system and an authorization method to verify that only registered servers are able to record and view data to or from the storage. The system comprising at least one client platform (102); at least one application platform (104) and at least one storage device (106) having capacity for storing information. The at least one client platform (102) further comprising at least one user token (102a) for identifying user credentials; and at least one physical machine (102c) for processing client transaction while the at least one application platform (104) further comprising log information which at least comprises a set of data containing user credentials, server identity, IP address, server distinguish name and timestamp; and at least one secure transaction web service (104a, 104b) for validating client transaction and processing log data. To enable secure transaction log for server logging, the general methodology of the present invention comprising steps of obtaining user credentials to authenticate client for server logging (202); logging into server for transaction log (204); and enabling viewing of logging information of authorized users to record and view information to or from at least one storage. Further, storage information is protected and secured by using hash function (716) wherein hash function is used for authorization of user (718) to ensure that only validated user is able to log in or retrieve log information to and from said storage.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate (156) to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate (156) issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate (156) resides in a web server (22) and the issuance of the proxy digital certificate (156) may be applied on any web based application through a public network such as the Internet.
Abstract:
The present invention discloses a method and system for computation and verification of authentication parameters between two entities, an originating entity and a receiving entity, which in the embodiment of interest comprises a server (100), a client interface thereof (110), a human user (120) and a trusted system (130) deemed as such by the human user. The method comprises the user (120) authenticating the server (100) by visual comparison of an authentication code in numeric, symbolic, graphical or visual-interactive form computed by the server (100) in comparison to a plurality of reference codes computed on the trusted system (130); and reciprocally the server (100) authenticating the user (120) subsequent to transcription or transfer of an authentication code, as computed and displayed on the trusted system (130), to the client interface (110) and thenceforth to the server (100),by means of comparison of the test code to a plurality of reference codes computed on the server (100). The method of computation and verification of the authentication codes as aforesaid are by means of zero knowledge (ZK) transformation of time, location or service-specific information; with measurement or determination of time or location information as independently undertaken on server (100) and trusted system (130). The most illustrative drawing: FIGURE 1
Abstract:
THE SYSTEM AND METHOD OF THE PRESENT INVENTION MANAGES STORAGE ENCRYPTION OVER NETWORK-BASED OR CLOUD BASED ELASTIC BLOCK STORE, EBS VOLUME SO AS TO PROVIDE FLEXIBILITY AND TRANSPARENCY ON THE ENCRYPTION ALGORITHM THAT CAN BE UNIVERSALLY ACCEPTABLE TO ANY PROVIDER AND USER. THE SYSTEM (100) OF THE PRESENT INVENTION MANAGES STORAGE ENCRYPTION OVER NETWORK BASED ELASTIC-BLOCK STORE, EBS VOLUME (118) WITH A USER MODE (102) AND A KERNEL MODE (104); SAID USER MODE (102) COMPRISING OF AN APPLICATION (106) AND A BLOCK DEVICE (108); SAID KERNEL MODE (104) COMPRISING OF AT AN I/O MANAGER (110) FOR RECEIVING MOUNTING INSTRUCTION AND PRESENTING DECRYPTED DATA TO REQUESTER; A CRYPTO KERNEL MODULE (112) FOR RETRIEVING ENCRYPTION KEY FROM KEY FILE; A FILE SYSTEM (116) AN EBS VOLUME (118). THE METHODOLOGY OF THE PRESENT INVENTION IS BEING INITIATED BY INITIALIZING AND CONFIGURING EBS VOLUME (202). THEREAFTER, ENCRYPTED EBS VOLUME (204) IS MOUNTED ON THE SYSTEM AND DATA IS WRITTEN ON EBS VOLUME AND SAID DATA IS FURTHER ENCRYPTED (206). THE ENCRYPTED DATA IS READ FROM EBS VOLUME AND SAID ENCRYPTED DATA WILL BE DECRYPTED TO OBTAIN DECRYPTED DATA (208). THE ENCRYPTED EBS VOLUME (210) CAN BE UNMOUNTED FROM THE SYSTEM WHEN THE VOLUMES ARE NOT REQUIRED. THE PRESENT INVENTION IS TRANSPARENT TO USER IN WHICH THE DATA THAT IS WRITTEN TO THE EBS DISK ARE ENCRYPTED TRANSPARENTLY WITH THE RANDOM GENERATION OF ENCRYPTION KEY AND STORED IN THE DISK. CONFIDENTIALITY IS ALLOWED AND REINFORCED IN THE EBS VOLUME BY ENCRYPTION OF THE DATA BEING STORED IN THE DATA STORAGE AND DECRYPTION OF THE ENCRYPTED DATA USING CORRECT SYMMETRIC KEY PROVIDED BY THE AUTHORIZED USER DURING RETRIEVAL PROCESS. THE MOST ILLUSTRATIVE DRAWING IS
Abstract:
The system and method of the present invention proposes user authentication using non reusable random generated mobile SMS key while retaining user privacy. The system of the present invention comprising at least one user (101) with user mobile phone (106); at least one web application (104); at least one authentication service provider (103); at least one authentication server (102); and at least one database (105). The at least one authentication server (102) further comprising at least one authentication interface module (201); at least one authentication verification module (202); at least one SMS key generation module (203); at least one SMS gateway (204); and at least one database interface module (205). The methodology of the present invention comprises steps of requesting user information for authentication (302); authenticating user information (304); returning authentication status to web application (310); and performing authorization by granting access to user upon successful user authenticat ion (312). Authentication of user information comprises steps of computing hash value (DK1) based on user information (402); searching database for matching hash value (DK1) (404); and generating new mobile SMS key (K2) upon locating matching record in database (406) after mobile SMS key (K1) has been authenticated in the current transaction.
Abstract:
Cryptographic interactions for authentication and authorization is mediated by means of visual inputs (via camera) and outputs (graphical display) using visual channel as out-of-band (OOB) medium for cryptographic handshaking based on strong public-key protocols. The system comprising at least one out-of-band (OOB) channel which allows machine to machine and machine to user interaction using same input and output devices; and bidirectional actions which comprises at least one or both entities computing and transmitting action parameter at remote entity. The at least one out-of-band (OOB) channel is deployed for entirety of interaction sequences in different phases of the system which allows machine to machine and machine to user interaction that adopts visual codes of cryptographic parameters. The general methodology of the present invention comprising steps of initializing interaction between entities (202); computing action through ZK integration of commitment of entity credentials on challenge (204) upon obtaining password from user (206); encoding cryptographic codeword used in computing actions (208) into machine readable visual representation to be displayed (210); decoding received barcodes from other interacting entities (214) into internal representations (212); synchronizing computation on each entity (216); determining if outcome of computation is correct (218); presenting outcome as image-based visualization if computation is correct (222, 224); and transmitting said image-based visualization with equivalent computation of other entity (228) as perceptible images on visual outputs (232). Cryptographic interactions of the present invention fully utilize visual inputs and outputs capabilities without having requirement of additional hardware tokens, and without external connectivity or TTP (trusted third party) involvement provided trusted device associated with user of interest is capable of undertaking the necessary computations
Abstract:
The present invention provides a system and method for mutually authenticating user access and registration. Specifically, the system and method uses barcode as a security token for facilitating user authentication. The barcode is used for encoding user credentials and device registration number therein. The barcode can be obtained through a visual channel.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate resides in a web server and the issuance of the proxy digital certificate may be applied on any web based application through a public network such as the Internet.