AUTHENTICATION OF A CLIENT DEVICE BASED ON ENTROPY FROM A SERVER OR OTHER DEVICE
    2.
    发明公开
    AUTHENTICATION OF A CLIENT DEVICE BASED ON ENTROPY FROM A SERVER OR OTHER DEVICE 审中-公开
    基于来自服务器或其他设备的熵的客户端设备的认证

    公开(公告)号:EP3284236A2

    公开(公告)日:2018-02-21

    申请号:EP16713717.3

    申请日:2016-03-24

    IPC分类号: H04L29/06

    摘要: Methods and systems for authenticating a client device using entropy provided by a server and/or a device paired with the client device are described herein. The system may generate static entropy and time-limited entropy based on data from the server and/or the paired device. The static and time-limited entropy may be used to authenticate the client device (application or a user of the client device) in addition to authentication credentials or entropy such as a PIN or password provided by the user. The time-limited entropy may have an expiration time. If the time-limited entropy is expired, the system may request the user to perform a hard authentication with the server, such as by providing a username, password, and/or optionally a two-factor authentication code, among other information.

    SHARED SECRET VAULT FOR APPLICATIONS WITH SINGLE SIGN ON

    公开(公告)号:EP3702946A1

    公开(公告)日:2020-09-02

    申请号:EP20171406.0

    申请日:2015-12-30

    摘要: Some aspects of the disclosure generally relate to providing single sign on features in mobile applications in a secure environment using a shared vault. An application may prompt a user to provide user entropy such as a passcode (e.g. a password and/or PIN). The application may use the user entropy to decrypt a user-entropy-encrypted vault key. Once the vault key is decrypted, the application may decrypt a vault database of the shared vault. The shared vault may store shared secrets, such as server credentials, and an unlock key. The application may store the unlock key, generate an unlock-key-encrypted vault key, and cause the shared vault to store the unlock-key-encrypted vault key, thereby "unlocking" the vault. The application may then use the unlock key to decrypt the vault database without prompting the user to provide user entropy again.