WO2010107298A3 - Method of generating a proxy certificate - Google Patents
Method of generating a proxy certificate Download PDFInfo
- Publication number
- WO2010107298A3 WO2010107298A3 PCT/MY2010/000028 MY2010000028W WO2010107298A3 WO 2010107298 A3 WO2010107298 A3 WO 2010107298A3 MY 2010000028 W MY2010000028 W MY 2010000028W WO 2010107298 A3 WO2010107298 A3 WO 2010107298A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- generating
- proxy certificate
- secure
- web
- web portal
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
This invention method for generating proxy certificate on web portal is a means of secure and reliable access to a web portal. This system will prevent identity fraud over the web and is a secure means of accessing personal information online.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP10753743A EP2409455A2 (en) | 2009-03-16 | 2010-03-04 | Method of generating a proxy certificate |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI20091055 | 2009-03-16 | ||
| MYPI20091055 MY150173A (en) | 2009-03-16 | 2009-03-16 | Method of generating a proxy certificate |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2010107298A2 WO2010107298A2 (en) | 2010-09-23 |
| WO2010107298A3 true WO2010107298A3 (en) | 2010-12-02 |
Family
ID=42740157
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/MY2010/000028 WO2010107298A2 (en) | 2009-03-16 | 2010-03-04 | Method of generating a proxy certificate |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP2409455A2 (en) |
| MY (1) | MY150173A (en) |
| WO (1) | WO2010107298A2 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9055056B2 (en) | 2013-08-14 | 2015-06-09 | Red Hat, Inc. | Managing digital content entitlements |
| US10033720B2 (en) * | 2014-05-28 | 2018-07-24 | Futurewei Technologies, Inc. | Method and system for creating a certificate to authenticate a user identity |
| KR20200034020A (en) | 2018-09-12 | 2020-03-31 | 삼성전자주식회사 | Electronic apparatus and control method thereof |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005003934A1 (en) * | 2003-07-01 | 2005-01-13 | International Business Machines Corporation | Method and system for a single-sign-on access to a computer grid |
| US20050216733A1 (en) * | 2004-03-25 | 2005-09-29 | International Business Machines Corporation | Grid mutual authorization through proxy certificate generation |
| US20080126794A1 (en) * | 2006-11-28 | 2008-05-29 | Jianxin Wang | Transparent proxy of encrypted sessions |
-
2009
- 2009-03-16 MY MYPI20091055 patent/MY150173A/en unknown
-
2010
- 2010-03-04 WO PCT/MY2010/000028 patent/WO2010107298A2/en active Application Filing
- 2010-03-04 EP EP10753743A patent/EP2409455A2/en not_active Withdrawn
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005003934A1 (en) * | 2003-07-01 | 2005-01-13 | International Business Machines Corporation | Method and system for a single-sign-on access to a computer grid |
| US20050216733A1 (en) * | 2004-03-25 | 2005-09-29 | International Business Machines Corporation | Grid mutual authorization through proxy certificate generation |
| US20080126794A1 (en) * | 2006-11-28 | 2008-05-29 | Jianxin Wang | Transparent proxy of encrypted sessions |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2010107298A2 (en) | 2010-09-23 |
| EP2409455A2 (en) | 2012-01-25 |
| MY150173A (en) | 2013-12-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1997066A4 (en) | Method and system for providing online authentication utilizing biometric data | |
| MX2015008418A (en) | System and method for secure login, and apparatus for same. | |
| EP2086162A4 (en) | System, device, method and program for authenticating communication partner by means of electronic certificate including personal information | |
| WO2013045743A3 (en) | Payment system | |
| EP2888834A4 (en) | Method for producing dynamic data structures for authentication and/or password identification | |
| EP2410691A4 (en) | Method for authenticating identity and generating share key | |
| WO2012166944A3 (en) | Systems and methods for registration, validation, and monitoring of users over multiple websites | |
| EP2795553A4 (en) | METHOD FOR AUTHENTICATING E-COMMERCE TRANSACTIONS ON MOBILE DEVICES USING BIOMETRIC DATA | |
| WO2008095011A3 (en) | Methods and systems for authentication of a user | |
| WO2010093636A3 (en) | Devices, systems and methods for secure verification of user identity | |
| BR112012024132A8 (en) | COMPUTER READABLE METHODS, SYSTEMS AND MEDIA FOR TRACKING REDEEMED ELECTRONIC CERTIFICATES AND CONSUMER DATA ASSOCIATED WITH A MOBILE DEVICE | |
| EP2828814A4 (en) | System and method for data and identity verification and authentication | |
| WO2013040713A3 (en) | System and method for user authentication | |
| MX2012004070A (en) | Electronic transaction security system and method. | |
| EP2420971A4 (en) | Biometric information registration device, biometric information registration method, computer program for registering biometric information, biometric authentication device, biometric authentication method, and computer program for biometric authentication | |
| WO2011154218A3 (en) | Access control for electrical charging stations | |
| EP2016701A4 (en) | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks | |
| RS20120254A1 (en) | System and method for high security biometric access control | |
| WO2010100262A3 (en) | A system and method for providing security in browser-based access to smart cards | |
| BRPI0818029A2 (en) | Contactless biometric authentication system and authentication method | |
| ZA201301790B (en) | A method of authenticating a device and encrypting data transmitted between the device and a server | |
| WO2013035089A3 (en) | System and method for enhanced interaction between an iframe or a web page and an embedded iframe from a different domain | |
| GB2472169A (en) | System and method for providing a system management command | |
| WO2011031988A3 (en) | Secure communication of payment information to merchants using a verification token | |
| WO2010123240A3 (en) | Method for integrating online and offline virtual money with an electronic gift certificate, and system for same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10753743 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| REEP | Request for entry into the european phase |
Ref document number: 2010753743 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010753743 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 7989/DELNP/2011 Country of ref document: IN |