Abstract:
The invention related to a method for generating by a first device (330) a modified one-time password (303), the first device being operated by a user, the method comprising the steps of: providing a first one-time password OTP_P (303) generated by a generator (300) implemented by the first device and using a piece of data (302) as an input; providing by the user an authentication password (304); applying (305) a post-treatment function F which uses said one-time password OTP_P (303) and said authentication password (304) as inputs in order to generate as an output a modified one-time password M_OTP having the same format as OTP_P, the function F being chosen such that OTP_P is recoverable from said modified one-time password by applying the inverse function of F and if only the same authentication password as the one used for generating M_OTP is used as an input of said inverse function.
Abstract:
The invention relates to an authentication method. The method comprises: - collecting (24), based on a predetermined authentication policy, at least one context data element; - constituting (28), based on the at least one collected context data element, a data packet; - generating (216), by using a predetermined hash type algorithm and the data packet, as input to the predetermined hash type algorithm, a hash; - sending the generated hash; - generating (220), as a hash distance generation step, a hash distance between the generated hash and a predetermined reference hash; and - authenticating (224) successfully or not (223) based on the generated hash distance, as an authentication step. The invention also relates to corresponding device and system.
Abstract:
The present invention relates to a method to manage a One Time Password key, referenced OTP key, used in an OTP algorithm in an user device having access to an unsafe storage including the steps of: -retrieving a Personal Identification Number, named PIN, of an user of the user device, -deriving a symmetric key from the PIN, -encrypting the OTP key using the derived symmetric key, -storing the encrypted OTP key in the unsafe storage. -decrypting the OTP key using the derived symmetric key, -generating a next OTP key using an incremental parameter, said method being characterized in that the start value (SV) of the incremental parameter of the OTP key generation is random (R).