Patents Assigned to KEYPASCO AB
-
Patent number: 9838205Abstract: In a network authentication method, a client device stores a reference first private key portion obtained by encrypting a first private key portion of a private key. The private key and a public key cooperatively constitute an a symmetric key pair. After receipt of a second private key portion of the private key, the client device generates a digital signature for transaction data using a current key which combines the second private key portion and a current key portion obtained by decrypting the reference first private key portion. A verification server verifies, based on the public key, whether a received digital signature is signed with the private key, and obtains the transaction data when verification result is affirmative.Type: GrantFiled: November 6, 2015Date of Patent: December 5, 2017Assignee: KEYPASCO ABInventor: Magnus Lundström
-
Patent number: 9680841Abstract: In a network authentication method, upon receipt of correct user login data from a user terminal, a content-provider server transmits a verification request to a verification server via a communication network. After receiving hardware identification data and positioning information, which are associated with the user terminal and a portable personal electronic device carried by a user, the verification server transmits a verification reply indicating successful authentication of the identity of the user when the hardware identification data is successfully verified while the positioning information indicates that the portable personal electronic device is in close proximity to the user terminal.Type: GrantFiled: February 24, 2014Date of Patent: June 13, 2017Assignee: KEYPASCO ABInventor: Per Skygebjerg
-
Patent number: 9667626Abstract: A method is to be implemented using a network authentication device and a user end for authenticating the user end. The network authentication device stores hardware information associated with unique identification codes of hardware components of the user end. In the method, the user end executes a terminal program for scanning the hardware components to obtain the identification codes, for establishing a hardware list according to the identification codes, and for automatically sending to the network authentication device verification data associated with the hardware list without user operation. The network authentication device verifies identity of the user end based on the verification data and the hardware information.Type: GrantFiled: October 13, 2015Date of Patent: May 30, 2017Assignee: KEYPASCO ABInventor: Maw-Tsong Lin
-
Patent number: 9231925Abstract: In a network authentication method, a client device stores a certificate reference mapped uniquely to a certificate, which is assigned to an end user, and a reference private key obtained by encrypting a private key with a PIN code determined by the end user. The client device generates a digital signature for transaction data associated with the certification reference using a current key that is obtained by decrypting the reference private key with a user input code obtained through an input operation. A verification server verifies, based on a public key of a stored certificate, whether a received digital signature is signed with the private key, and obtains from the digital signature the transaction data when verification result is affirmative.Type: GrantFiled: September 16, 2014Date of Patent: January 5, 2016Assignee: KEYPASCO ABInventor: Magnus Lundström
-
Patent number: 9124571Abstract: In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted web address signed with an asymmetrical private key and downloaded from a downloading unit. The user terminal transmits hardware scan data associated therewith to the identity verification server upon determining, based on the encrypted web address and an asymmetrical public key from the downloading unit, that the identity verification server is currently valid to perform identity verification. The identity verification server verifies the identity of the user terminal based on relationship between the hardware scan data and pre-stored reference hardware scan data.Type: GrantFiled: February 24, 2014Date of Patent: September 1, 2015Assignee: KEYPASCO ABInventors: Maw-Tsong Lin, Per Skygebjerg
-
Publication number: 20150242602Abstract: In a network authentication method, upon receipt of correct user login data from a user terminal, a content-provider server transmits a verification request to a verification server via a communication network. After receiving hardware identification data and positioning information, which are associated with the user terminal and a portable personal electronic device carried by a user, the verification server transmits a verification reply indicating successful authentication of the identity of the user when the hardware identification data is successfully verified while the positioning information indicates that the portable personal electronic device is in close proximity to the user terminal.Type: ApplicationFiled: February 24, 2014Publication date: August 27, 2015Applicant: KEYPASCO ABInventor: Per SKYGEBJERG
-
Publication number: 20150244695Abstract: In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted web address signed with an asymmetrical private key and downloaded from a downloading unit. The user terminal transmits hardware scan data associated therewith to the identity verification server upon determining, based on the encrypted web address and an asymmetrical public key from the downloading unit, that the identity verification server is currently valid to perform identity verification. The identity verification server verifies the identity of the user terminal based on relationship between the hardware scan data and pre-stored reference hardware scan data.Type: ApplicationFiled: February 24, 2014Publication date: August 27, 2015Applicant: KEYPASCO ABInventors: Maw-Tsong LIN, Per SKYGEBJERG
-
Publication number: 20110185181Abstract: A network authentication method is to be implemented using a network authentication device and a user end for authenticating the user end. The network authentication method includes the steps of: configuring the network authentication device to store hardware information associated with unique identification codes of hardware components of the user end; when it is intended to verify identity of the user end, configuring the user end to execute a terminal program stored therein for scanning the hardware components thereof to obtain the identification codes of the hardware components, for establishing a hardware list according to the identification codes thus obtained, and for sending to the network authentication device verification data that is associated with the hardware list; and configuring the network authentication device to verify identity of the user end based on relationship between the verification data received from the user end and the hardware information stored therein.Type: ApplicationFiled: January 24, 2011Publication date: July 28, 2011Applicant: KEYPASCO ABInventor: Maw-Tsong Lin