Abstract:
The present invention relates to a system and method for authenticating a user based on user behaviour and environmental factors. The system (100) allows the user to access to an application server by evaluating the trust value of environmental and user behaviour factors. The system (100) comprises a Client Platform (101), an Authentication Gateway (102), an Authentication Server (103), an Application Server (104), and a Trust Engine (105). (Figure 1)
Abstract:
The present invention provides a system and method for physical access control by utilizing challenge response interaction. The present invention comprising at least one Authenticator Component (102) for online registration of user?s credential or offline registration of user?s credentials; at least one User Registration Server (106) for registration of user?s credential and for generating user-specific credential; at least one Access Control Component (504) for communication with the Authenticator Component (102) during challenge response authentication; at least one Access Control Registration Server (502) for registration of Access Control Component (504) and for generating component lock-specific credential; at least one Access Control Authentication Server (700) for verification of outcome resulted from challenge response authentication between the Authentication Component (102) and Access Control Component (504); and at least one Authentication Server (108) for authentication of user to access a physical device upon receipt of confirmation from the Access Control Authentication Server (700). In the present invention, a secure physical access control is provided by issuing challenge or by questioning user who wishes to gain access to the secure passage. User is able to authenticate user?s identity through response or `answer? originating from user?s mobile device as authenticator through mutually agreed cryptographic computations. The most illustrative drawing is FIG. 1.0.
Abstract:
The present invention provides a method and system for a one time user-to-user delegation. The system comprises a delegation token generation module (112), an application server (106), an authentication server (102) and an authorization server (104). The method comprises the delegator (110) generating a delegation token and transmitting the token to a delegatee, the application server (106) verifying validity of a delegation token, the application server (106) then enquires authorization of a delegator (110) from the authorization server (104); and upon receiving authorization from the authorization server (104), the application server (106) executes a task or allows the delegatee to perform the task and removes the task entry from the delegation table (118).
Abstract:
A method for the authentication (200,300) of at least two entities and establishment of a secure communications channel between the entities is provided. The method comprises: computation (210, 310) of zero knowledge, ZK commitments by the entities based on parameters implicity derived from the authentication or explicity generated by the entities; transmission (220,320) of the commitments by the entities to one anothe, verification ( 240,340) by the entities that the commitment are correct and correctly associated with their respective entity; and conclusion of the authentication process and establishment of the secure communications channel; characterised in that at least one of the entities applies a private-key to compute its associated commitment or alternatively directed at a specific other entity, wherein the use of private-key associated with sending entity is verifiable by means of corresponding public-key in the prior possession of the receiving entity.
Abstract:
The present invention relates to a system and method for authenticating a user based on user behaviour and environmental factors. The system (100) allows the user to access to an application server by evaluating the trust value of environmental and user behaviour factors. The system (100) comprises a Client Platform (101), an Authentication Gateway (102), an Authentication Server (103), an Application Server (104), and a Trust Engine (105).