会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明专利
    • Method and system for private and secured financial transaction
    • 私人和安全财务交易的方法和系统
    • JP2006073022A
    • 2006-03-16
    • JP2005266859
    • 2005-09-14
    • Authernative Incオーサーネイティブ インコーポレイテッド
    • MIZRAH LEN L
    • G06F21/20G07D9/00G06Q20/04G06Q20/10G06Q20/38G06Q20/40G06Q20/42G06Q40/00G07F19/00
    • G06Q40/02G06Q20/04G06Q20/10G06Q20/108G06Q20/3823G06Q20/40G06Q20/425G06Q40/00G06Q40/025
    • PROBLEM TO BE SOLVED: To provide a method and a system for private and secured financial transactions. SOLUTION: The method comprises privacy and security layer architecture embedded into a financial institution and "clock control" identifying, authorizing and accounting (AAA) method. The method and the system keep an enhanced security to prevent fraud in comparison with a general method, and a financial account holder can execute financial transactions for purchasing, selling and drawing, as well as depositing financial transactions without disclosing private personal information to the transaction counterparts. Prior to the financial transactions the financial account holder initiates an authentication session with financial institution back office by accessing its central processing unit (CPU) and a database (DB) installed in the back office of the financial institutions, which are assigned to an embedded privacy and security layer (EPSL) architecture having automated "clock controlled" AAA sessions. COPYRIGHT: (C)2006,JPO&NCIPI
    • 要解决的问题:提供私人和担保金融交易的方法和系统。 解决方案:该方法包括嵌入金融机构的隐私和安全层架构,以及“时钟控制”识别,授权和计费(AAA)方法。 与一般方法相比,该方法和系统保持增强的安全性以防止欺诈,并且金融账户持有人可以执行用于购买,销售和绘制的金融交易以及存入金融交易,而不向交易对方披露私人个人信息 。 在金融交易之前,金融账户持有人通过访问其中央处理单元(CPU)和安装在金融机构后台的数据库(DB),分配到嵌入式隐私权,启动与金融机构后台的认证会话 和具有自动“时钟控制”AAA会话的安全层(EPSL)架构。 版权所有(C)2006,JPO&NCIPI
    • 2. 发明申请
    • AUTHENTICATION SYSTEM AND METHOD BASED UPON RANDOM PARTIAL DIGITIZED PATH RECOGNITION
    • 基于随机部分数字路径识别的认证系统和方法
    • WO2006031212A1
    • 2006-03-23
    • PCT/US2004/029321
    • 2004-09-09
    • AUTHERNATIVE, INC.MIZRAH, Len, L.
    • MIZRAH, Len, L.
    • H04L9/00
    • H04L63/083G06F21/36G06F21/83
    • An authentication server (1030) provides a clue to a client (1010) indicating a random partial subset of a full pattern that characterizes a full digitized path on a frame of reference, and the client enters a data to fulfill an authentication factor suggested by the clue. The full pattern consists of an ordered set of data fields, which store parameters that specify the full digitized path on a reference grid for recognition. The server presents an instance of a graphical representation of the frame of reference, including an array of random indicators at data field coordinates in the frame of reference (3050). The server accepts indicators from the array of indicators at data field coordinates in the frame of reference. The server accepts indicators from the array of indicators corresponding to coordinates along said digitized path identified by the random partial subset as input data to fulfill the authentication factor.
    • 认证服务器(1030)为客户端(1010)提供一条线索,该客户端(1010)指示在参考帧上表征完整数字化路径的完整模式的随机部分子集,并且客户端输入数据以满足由 线索。 完整模式由一组有序数据字段组成,它们存储指定参考网格上的完整数字化路径进行识别的参数。 服务器呈现参考帧的图形表示的实例,包括参考帧(3050)中的数据字段坐标处的随机指示符阵列。 服务器在参考框架的数据字段坐标处接收来自指示符数组的指示符。 服务器接收来自对应于由随机部分子集识别的所述数字化路径的坐标的指示符阵列中的指示符作为输入数据,以满足认证因素。
    • 3. 发明申请
    • SYSTEM AND METHOD FOR MUTUALLY AUTHENTICATED CRYPTOGRAPHIC KEY EXCHANGE USING MATRICES
    • 使用矩阵的MUTULEY AUTHENATED CRYPTOGRAPHIC KEY EXCHANGE的系统和方法
    • WO2012092072A3
    • 2014-04-10
    • PCT/US2011066532
    • 2011-12-21
    • AUTHERNATIVE INCBARTON EDWARD MMIZRAH LEN L
    • BARTON EDWARD MMIZRAH LEN L
    • H04K1/00
    • H04L9/0844
    • Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without revealing said key to any third party who may have access to all of the transmissions between them. The two parties use a shared secret to produce a common matrix M. The common matrix M, is multiplied by a random matrix K on the sending side, and a different random matrix N on the receiving side. The matrix product KM is sent from the sending side to the receiving side, and the matrix product MN is sent from the receiving side to the sending side. Both sides produce the common matrix product KMN, and use it for producing a symmetric key for encrypted communications, after mutually authenticating one another over an insecure network.
    • 双方可以使用基于矩阵的密钥交换协议来建立加密密钥,用于安全通信,而无需事先分发秘密密钥或其他秘密数据,并且不向可能访问其间的所有传输的任何第三方泄露所述密钥 。 双方使用共享密钥来产生公共矩阵M.公共矩阵M乘以发送侧的随机矩阵K和接收侧的不同随机矩阵N. 矩阵产品KM从发送侧发送到接收侧,矩阵产品MN从接收侧发送到发送侧。 双方产生公共矩阵产品KMN,并通过不安全的网络相互认证,用于生成用于加密通信的对称密钥。
    • 4. 发明专利
    • System and method for in- and out-of-band multi-factor server-to-user authentication
    • AU2011200559B2
    • 2014-09-04
    • AU2011200559
    • 2011-02-10
    • AUTHERNATIVE INC
    • MIZRAH LEN L
    • H04L9/00G06F21/00
    • 101281 A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An 5 authentication session is initiated upon receiving a client identifier at the server-side resources. A current session instance of the grid is presented to the client, populated with characters. The process includes sharing between the client and the server a challenge identifying a random subset of the plurality of predefined locations in the server path, and a response including characters that match the characters in the locations on the server 10 path identified by the challenge. As a result, client is capable of verifying that the server has access to the first shared secret. Then a protocol is executed to authenticate the client to the server. {00250001.DOC) 1010 1/30 1030 . - 1020 CLIENT SUB--- SERVER SUB ---- LAN / WAN COMMUNICATION SUB-SYSTEM 1040 PRE-AUTHENTICATION SESSIONS USER ACCOUNT SET-UP: USER NAME, PASSWORD (OR ANY OTHER USER'S CREDENTIAL(S) INSTEAD OF OR IN ADDITION TO PASSWORD); AND FULL . GRAPHICAL PATH AND (IN SOME EMBODIMENTS) RESPONSE PATH - ALL SECRET PATHS WITH ENUMERATED FIELD POSITIONS ARE SELECTED ON GRID BY THE USER (PERSONALIZED SERVER'S CREDENTIALS), AND THEN SAVED T THE SERVER DATABAS AUTHENTICATION SESSION: SERVER AUTHENTICATION TO THE USER IS BASED ON RANDOM PARTIAL PATH RECOGNTION, OPEN TO PUBLIC OR SECRET CHALLENGE, AND SECRET RESPONSE PATH BUILT J WHILE THE FOLLOWING USER'S AUTHENTICATION THE SERERR IS BASEDEON USER CHAOS AUTHENTICATION FACTOR MUTUALLY AUTHENTICATED ACCESS TO PROTECTED NETWORK DESTINATION (SUCH AS URL, APPLICATION, NETWORK LINK ae.) (00195913.DOCX
    • 5. 发明专利
    • System and method for in- and out-of-band multi-factor server-to-user authentication
    • AU2011200559A1
    • 2011-08-25
    • AU2011200559
    • 2011-02-10
    • AUTHERNATIVE INC
    • MIZRAH LEN L
    • H04L9/00G06F21/00
    • 101281 A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of pre-defined locations on a frame of reference (e.g. a grid). An 5 authentication session is initiated upon receiving a client identifier at the server-side resources. A current session instance of the grid is presented to the client, populated with characters. The process includes sharing between the client and the server a challenge identifying a random subset of the plurality of predefined locations in the server path, and a response including characters that match the characters in the locations on the server 10 path identified by the challenge. As a result, client is capable of verifying that the server has access to the first shared secret. Then a protocol is executed to authenticate the client to the server. {00250001.DOC) 1010 1/30 1030 . - 1020 CLIENT SUB--- SERVER SUB ---- LAN / WAN COMMUNICATION SUB-SYSTEM SYSTEM - -- SYSTEM 1040 PRE-AUTHENTICATION SESSIONS USER ACCOUNT SET-UP: USER NAME, PASSWORD (OR ANY OTHER USER'S CREDENTIAL(S) INSTEAD OF OR IN ADDITION TO PASSWORD); AND FULL . GRAPHICAL PATH AND (IN SOME EMBODIMENTS) RESPONSE PATH - ALL SECRET PATHS WITH ENUMERATED FIELD POSITIONS ARE SELECTED ON GRID BY THE USER (PERSONALIZED SERVER'S CREDENTIALS), AND THEN SAVED T THE SERVER DATABAS AUTHENTICATION SESSION: SERVER AUTHENTICATION TO THE USER IS BASED ON RANDOM PARTIAL PATH RECOGNTION, OPEN TO PUBLIC OR SECRET CHALLENGE, AND SECRET RESPONSE PATH BUILT J WHILE THE FOLLOWING USER'S AUTHENTICATION THE SERERR IS BASEDEON USER CHAOS AUTHENTICATION FACTOR MUTUALLY AUTHENTICATED ACCESS TO PROTECTED NETWORK DESTINATION (SUCH AS URL, APPLICATION, NETWORK LINK ae.) (00195913.DOCX