Abstract:
The present invention relates to a method for authenticating a user within a communications system. The method includes a portable computing device which captures a graphical counter-token; merges the graphical counter-token and a user token to generate an image revealing a visual key within the merged tokens; and displays the image to the user on the portable device. The graphical counter-token is initially generated by a server utilising the user token and the key. A system for authenticating a user is also disclosed.
Abstract:
Techniques for controlling the provision of data to a requester (4) use a local device (10) communicating with a personal computing device (12). The personal computing device has an authorised state and an unauthorised state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device (8) to issue a token request to the requester (4). The requester(4) then uses this token to access a third party device 6 holding the data to which it seeks access. The local device may also store a login data store which is unlocked if the personal computing device is proximal to the local device (10) and is in its authorised state. The login data store can provide passwords and usernames automatically when it is unlocked. The personal computing device includes a display upon which are displayed icons indicating the type of data for which access requests are being received and in respect of which authorisations are or are not being made.
Abstract:
An authentication system is provided using one-time passwords (OTPs) for user authentication. An OTP key may be stored on a different device than the device on which the OTP is generated. In an embodiment, the system described herein enables a combined authentication system, including the two separate devices communicating over a non-contact interface, to provide advantageous security features compared to the use of a single device, such as a hardware OTP token. One device may be a personal security device and the other device may be a reader device coupled to a host device via which access is being controlled.
Abstract:
An Identification Device (10) for providing validation information comprising: a Token (11) and a Validator (20); wherein the display (17) is adapted to display, during an Operational Phase, a first security code (15), referred to as the Indicator-of- Clearance code or loC code (15), indicating the Clearance Status (46) of the Token, whereby the first security code (15) is generated by an Indicator-of- Clearance Function (23), such as a digital signature or hash function, programmed on the processor unit (21) based on the Clearance Status (46) and the Validator Clock (28).
Abstract:
Certain embodiments herein relate to authenticating access to an operating system by a user before the operating system is booted. Such authentication may be performed by processing information received from a wireless communication token via Near Field Communication (NFC), in one embodiment. The received information may be processed to determine credentials for accessing the operating system, which if validated, may be sent to a Basic Input Output System (BIOS) which may boot the operating system in response. The BIOS may also perform various other functions if authentication is successful, such as decrypting a hard disk on which an operating system is installed before booting the operating system. According to this configuration, a decryption key may be received from the wireless communication token and subsequently sent to the BIOS to enable the decryption and subsequent booting of the operating system.
Abstract:
The invention provides an improved proxy server configured to allow for increased security for users as a result of not requiring users to enter authentication and other sensitive data into an untrusted or only partially trusted terminal and also reducing the transmission of authentication or other sensitive data via untrusted or only partially trusted computer network connections. The proxy server performs this task by receiving and securely storing said authentication or other sensitive data prior to the use of the untrusted or partially trusted terminal and/or network connection, and then modifying communications between the user of the proxy server and the party the user wishes to communicate with such that the authentication or other sensitive data is received at a destination as intended by the user.
Abstract:
A trusted device, such as a wristwatch (2), is provided with authentication circuitry (26), used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry (32) monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry (38) is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry (40) is used to communicate with that target device using an authenticated identity of the user.
Abstract:
A self-authentication device and method. The self-authentication device being for the user or owner of an electronic security device, wherein the self-authentication recovery device is separate from the security device and is configured for connecting to a computing device via a first communication link for authentication processing, preferably for authentication and recovery processing.