최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0051079 (2013-10-10) |
등록번호 | US-9374366 (2016-06-21) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 1 인용 특허 : 547 |
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted commitment to the client. The method can also include receiving a one-time password (OTP) from the client, and validating the OTP. The method can
A method and system for providing security against phishing attacks. The method can include receiving a login ID from a client, and providing an encrypted commitment to the client. The method can also include receiving a one-time password (OTP) from the client, and validating the OTP. The method can also include sending a commitment key, to be authenticated by the client, receiving a static password from the client and authenticating the client. Embodiments of the invention are directed to a system for providing security against phishing attacks. The system can include one or more servers configured to receive a login ID from a client, and provide an encrypted commitment to the client. The processors can be configured to receive a one-time password (OTP) from the client, validate the OTP, send a commitment key, to be authenticated by the client, receive a static password from the client and authenticate the client.
1. A method comprising: receiving, at a processor of a server, a user identification code from a client requesting a connection with the server;sending, by the processor of the server, commitment information to the client, the commitment information including hidden information without meaning to th
1. A method comprising: receiving, at a processor of a server, a user identification code from a client requesting a connection with the server;sending, by the processor of the server, commitment information to the client, the commitment information including hidden information without meaning to the client at the time of transmission, wherein the commitment information demonstrates that the server can determine a value of a dynamic credential before the server receives the dynamic credential from the client;receiving, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;sending, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server; andauthenticating the client by the server, with the dynamic credential and the static credential, wherein the static credential is received from the client in response to authentication of the server by the client using the commitment information. 2. The method of claim 1, wherein the client does not have the ability to check the validity of the commitment information until after the server receives the dynamic credential. 3. A method comprising: receiving, at a processor of a server, a user identification code from a client requesting a connection with the server;providing, by the processor of the server, commitment information that demonstrates that the server can determine a value of a dynamic credential before the client sends the dynamic credential to the server, the commitment information including hidden information without meaning to the client at the time of transmission;receiving, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;sending, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server; andreceiving, by the processor, the static credential, after the client has authenticated the server using the commitment information. 4. The method of claim 3, wherein the dynamic credential comprises a one-time password (OTP). 5. The method of claim 4, wherein the OTP is derived from a name of the server. 6. A system comprising: a memory comprising instructions; anda processor operatively coupled to the memory, the processor to execute the instructions to perform operations comprising:receiving, at the processor of a server, a user identification code from a client requesting a connection with the server;sending, by the processor of the server, commitment information to the client, the commitment information including hidden information without meaning to the client at the time of transmission, wherein the commitment information demonstrates that the server can determine a value of a dynamic credential before the server receives the dynamic credential from the client;receiving, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;sending, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server; andauthenticating the client by the server, with the dynamic credential and the static credential, wherein the static credential is received from the client in response to authentication of the server by the client using the commitment information. 7. The system of claim 6, wherein the client does not have the ability to check the validity of the commitment information until after the server receives the dynamic credential. 8. A system comprising: a memory comprising instructions; anda processor operatively coupled to the memory, the processor to execute the instructions to perform operations comprising:receiving, at the processor of a server, a user identification code from a client requesting a connection with the server;providing, by the processor of the server, commitment information that demonstrates that the server can determine a value of a dynamic credential before the client sends the dynamic credential to the server, the commitment information including hidden information without meaning to the client at the time of transmission;receiving, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;sending, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server; andreceiving, by the processor, the static credential, after the client has authenticated the server using the commitment information. 9. The system of claim 8, wherein the dynamic credential comprises a one-time password (OTP). 10. The system of claim 9, wherein the OTP is derived from a name of the server. 11. A non-transitory computer readable storage medium including instructions that, when executed by a processor of a server, cause the processor to: receive, at the processor of the server, a user identification code from a client requesting a connection with the server;send, by the processor of the server, commitment information to the client, wherein the commitment information demonstrates that the server can determine a value of a dynamic credential before the server receives the dynamic credential from the client, the commitment information including hidden information without meaning to the client at the time of transmission;receive, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;send, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server;authenticate the client by the server, with the dynamic credential and the static credential, wherein the static credential is received from the client in response to authentication of the server by the client using the commitment information. 12. The non-transitory computer readable storage medium of claim 11, wherein the client does not have the ability to check the validity of the commitment information until after the server receives the dynamic credential. 13. A non-transitory computer readable storage medium including instructions that, when executed by a processor of a server, cause the processor to: receive, at the processor of the server, a user identification code from a client requesting a connection with the server;provide commitment information that demonstrates that the server can determine a value of a dynamic credential before the client sends the dynamic credential to the server, the commitment information including hidden information without meaning to the client at the time of transmission;receive, at the processor of the server, the dynamic credential from the client and validating the dynamic credential upon successful comparison to a calculated value;send, from the server, upon the successful comparison, a commitment key to the client, the commitment key enabling the client to utilize the commitment information to authenticate the server; andreceive the static credential, after the client has authenticated the server using the commitment information. 14. The non-transitory computer readable storage medium of claim 13, wherein the dynamic credential comprises a one-time password (OTP). 15. The non-transitory computer readable storage medium of claim 14, wherein the OTP is derived from a name of the server.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.