Patents

User Authentication
Security of internet users
Prevent attacks against authorization systems
EP2860935A1
GO TO PATENT
User Authentication
Security of internet users
Prevent attacks against authorization systems
EP2860934A1
GO TO PATENT
User Authentication
Security of internet users
Prevent attacks against authorization systems
EP2819371A1
GO TO PATENT
User Authentication
Improve security in authentication/authorization systems
US20160156598A1
GO TO PATENT
User Authentication
Securing operations in authentication and authorization systems using biometric information
US9860248B2
GO TO PATENT
User Authentication
Security of internet users
Prevent attacks against authorization systems
US9832192B2
GO TO PATENT
User Authentication
Security of internet users
Prevent attacks against authorization systems
US20140380431
GO TO PATENT
User Authentication
Method, system and application for improved authentication for mobile device users
EP3484116A1
GO TO PATENT
Document integrity and authenticity
Certifying documents with integrity and authenticity guarantees and computer programmes thereof
EP3379440A1
GO TO PATENT
Document integrity and authenticity
Method and system for detecting malicious programmes integrated into an electronic document
EP3557466A1
GO TO PATENT
Document integrity and authenticity
Watermark embedding and extracting method for protecting documents
EP3477578A1
GO TO PATENT
Security of wireless networks
A method and a system for encrypting wireless communications including authentication
EP3435589A1
GO TO PATENT


EP2860935A1
User Authentication, Security of internet users
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification, through the use of a second server, to preferably mitigate Card Not Present attacks. The computer programmes implement the method.
GO TO PATENTEP2860934A1
User Authentication, Security of internet users
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification, through the use of a second server, to preferably mitigate Man in the Browser threats. The computer programmes implement the method.
GO TO PATENTEP2819371A1
User Authentication, Security of internet users
A computer implemented method to prevent attacks against authorization systems and computer programmes products thereof.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server.
GO TO PATENTUS20160156598A1
User Authentication
A computer implemented method and computer programme products to improve security in authentication/authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and a defining a secure channel for certificate exchange for authentication. The computer programmes implement the method.
GO TO PATENTUS9860248B2
User Authentication
Computer implemented method, communications system and computer programmes products for securing operations in authentication and authorization systems using biometric information.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available, establishing a dual channel verification through the use of a second server and reinforcing an authentication factor mechanism by including a biometric identity verification of biometric information of the user.
GO TO PATENTUS9832192B2
User Authentication, Security of internet users
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server. The computer programmes implement the method.
GO TO PATENTUS20140380431
User Authentication, Security of internet users
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server. The computer programmes implement the method.
GO TO PATENTEP3484116A1
User Authentication
Method, system and application for improved authentication for mobile device users.
Present invention provides a method, system and application for providing authentication of a mobile device user, based on the measurement of electromagnetic fields modified by a pre-established movement of a specific magnetic token associated to the user. This univocal process will be able to obtain new authentication factors, including something that the user owns (i.e., the token), something that the user knows (i.e., the interaction between the token and the device), and somewhere that the user is (i.e., where the interaction takes place).
GO TO PATENTEP3379440A1
Document integrity and authenticity
A computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programmes thereof.
The method comprising: receiving, by a second computer (20), a document (Do) to be certified, identifying it with metadata and computing a first cryptographic function (ho); sending, by the second computer (20), the first cryptographic function (ho) to a third computer (30) hold within a distributed ledger; receiving, by the second computer (20), a message digest (hro) corresponding to an identifier of having stored the first cryptographic function (ho) in the third computer (30); computing, by the second computer (20), a key (K), said computed key (K) being decoded into a watermark, which is applied to the document (Do) providing a modified document (Dw); sending, by the second computer (20), the modified document (Dw) to the first computer system (10); computing, by the second computer (20), a second cryptographic function (hw), and sending it and the modified document (Dw) to the third computer (30); the second computer (20) receiving a message digest (hrw) corresponding to an identifier of having stored the (hw) and (Dw).
GO TO PATENTEP3557466A1
Document integrity and authenticity
Method and system for detecting malicious programmes integrated into an electronic document.
The present invention relates to the detection of malicious software in electronic documents and comprises: detecting an executable code in the electronic document provided to a client module; extracting information from the electronic document comprising the executable code and metadata of the electronic document; creating a binary vector associated with the electronic document; comparing, in a classifier module (200), the binary vector with one or more groups of vectors previously classified and stored in a database (400); classifying the vector in one of the groups, where each group has associated therewith a verdict about the presence of malicious software; and determining that the document contains malicious software depending on the verdict associated with the group in which its associated vector has been classified.
GO TO PATENTEP3477578A1
Document integrity and authenticity
Watermark embedding and extracting method for protecting documents.
A method for watermarking documents comprising:
identifying and locating spaces in a received original document (10) by a location analysis (110) module which distinguishes between intra-word spaces and inter-word spaces;
minimizing an error probability of interference between intra-word spaces and inter-word spaces in the watermarked document (20) by an optimization module (111);
encoding (113) the message (30) into codewords and encoding (114) the codewords into the watermark;
Embedding the watermark to generate (115) the watermarked document (20) by modifying the intra-word spaces and inter-word spaces of the original document (10).
GO TO PATENTEP3435589A1
Security of wireless networks
A method and a system for encrypting wireless communications including authentication.
The method comprises a) setting configuration parameters for a wireless connection; b) receiving, by a networking device (20), a request for the wireless connection to said communications network from a computing device (10); c) receiving, by the computing device (10), biometric credential information from the user (1); d) generating, by both devices (10, 20) a temporary passcode taking into account biometric information of the user (1), a random string and a temporal factor; e) sending, by the computing device (10), to the networking device (20), a device address thereof and an encrypted data packet containing a given text, said data packet being encrypted with an encryption key corresponding to the temporary passcode generated by the computing device (10); f) checking, by the networking device (20), whether the received device address of the computing device (10) is stored in a register; and g) establishing the wireless connection if all the parameters match.
GO TO PATENTEP2860935A1
User Authentication
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification, through the use of a second server, to preferably mitigate Card Not Present attacks. The computer programmes implement the method.
GO TO PATENTEP2860934A1
User Authentication
A computer implemented method and computer programme products to prevent attacks against authorization systems.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification, through the use of a second server, to preferably mitigate Man in the Browser threats. The computer programmes implement the method.
GO TO PATENTEP2819371A1
User Authentication
A computer implemented method to prevent attacks against authorization systems and computer programmes products thereof.
The computer implemented method comprising controlling the access to different resources and actions defined for a user by a first server, reducing the exposure time at which such operations are available and establishing a dual channel verification through the use of a second server.
GO TO PATENT