Abstract:
The present invention provides a system and method for mutually authenticating user access and registration. Specifically, the system and method uses barcode as a security token for facilitating user authentication. The barcode is used for encoding user credentials and device registration number therein. The barcode can be obtained through a visual channel.
Abstract:
A system (100, 200) for authentication comprises a client application (102) of a client device for user to access, a client authentication provider (103) which controls user access and protects the client application (102) from unauthenticated access and is configured to determine (S420) whether the client device is online or offline, and a server authentication requestor (104) for performing the online user authentication. A method for authentication, the method comprising the steps of determining, whether a client application (102) of a client device is online, in response to a determination that the client device is online, authenticating user based on an authentication parameter demonstrated by the user through an online user authentication service performed by a server authentication requestor (104), in response to a determination that the client device is offline, authenticating user based on an authentication parameter demonstrated by the user through an offline local authentication service by validating against the downloaded authentication token of the user.
Abstract:
Secure transaction log is used as an audit trail mechanism as said secure logging system is a centralized system that logs all application transactions from different servers wherein it provides an authentication method for client to login to the logging system and an authorization method to verify that only registered servers are able to record and view data to or from the storage. The system comprising at least one client platform (102); at least one application platform (104) and at least one storage device (106) having capacity for storing information. The at least one client platform (102) further comprising at least one user token (102a) for identifying user credentials; and at least one physical machine (102c) for processing client transaction while the at least one application platform (104) further comprising log information which at least comprises a set of data containing user credentials, server identity, IP address, server distinguish name and timestamp; and at least one secure transaction web service (104a, 104b) for validating client transaction and processing log data. To enable secure transaction log for server logging, the general methodology of the present invention comprising steps of obtaining user credentials to authenticate client for server logging (202); logging into server for transaction log (204); and enabling viewing of logging information of authorized users to record and view information to or from at least one storage. Further, storage information is protected and secured by using hash function (716) wherein hash function is used for authorization of user (718) to ensure that only validated user is able to log in or retrieve log information to and from said storage.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate (156) to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate (156) issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate (156) resides in a web server (22) and the issuance of the proxy digital certificate (156) may be applied on any web based application through a public network such as the Internet.
Abstract:
A METHOD AND A SYSTEM COMPRISING THREE ENTITIES (110,120,130) AND A DEBIT CARD INCORPORATED WITH PKI INFRASTRUCTURE ARE DISCLOSED. THE SYSTEM TO CARRY OUT THE METHOD OF ENSURING A SECURED ONLINE TRANSACTION COMPRISES A FIRST ENTITY (110), A SECOND ENTITY (120) AND A THIRD ENTITY (130). PREFERABLY, THE ENTITIES (110,120,130) REPRESENT A USER OF THE DEBIT CARD, A MERCHANT AND A FINANCIAL INSTITUTION. THE USER MAKES AN ONLINE TRANSACTION (ONLINE PURCHASE) FROM A MERCHANT USING THE DEBIT CARD PROVIDED BY THE FINANCIAL INSTITUTION. BASED ON THE INFORMATION OF THE USER AND THE INFORMATION OF THE MERCHANT RECEIVED BY THE FINANCIAL INSTITUTION, THE USER’S ACCOUNT WILL BE DEDUCTED WITH THE PURCHASE AMOUNT WHILE THE MERCHANT’S ACCOUNT IS CREDITED. THE INFORMATION EXCHANGED BETWEEN THE ENTITIES (110,120,130) IS DIGITALLY SIGNED AND ENCRYPTED TO ENSURE CONFIDENTIALITY. A CONFIRMATION IS SENT TO THE MERCHANT WHO DIRECTS IT TO THE USER TO INFORM THE USER ON THE STATUS OF THE TRANSACTION. THE MOST ILLUSTRATIVE DRAWING:
Abstract:
This invention method for generating proxy certificate on web portal is a means of secure and reliable access to a web portal. This system will prevent identity fraud over the web and is a secure means of accessing personal information online.
Abstract:
A method and system is disclosed for the issuance of a proxy digital certificate to a grid portal in distributed computing infrastructure through data transfer across a public network. More specifically, the invention concerns a method and a system for proxy digital certificate issuance from an end entity certificate to a grid portal of a distributed or grid computing infrastructure via a web browser, where the proxy digital certificate resides in a web server and the issuance of the proxy digital certificate may be applied on any web based application through a public network such as the Internet.
Abstract:
A protection system and method is introduced to a storage device such as a USB flash drive to prevent unauthorized access of confidential information stored in the flash drive. The USB flash drive contains registered code and a security application program to verify authorized access of the user to the flash drive. The security application program connected to a server for identifying the detected USB flash drive to verify the rightful owner is accessing the flash drive.
Abstract:
The present invention relates to a system and method for authenticating a user based on user behaviour and environmental factors. The system (100) allows the user to access to an application server by evaluating the trust value of environmental and user behaviour factors. The system (100) comprises a Client Platform (101), an Authentication Gateway (102), an Authentication Server (103), an Application Server (104), and a Trust Engine (105).