Abstract: The method verifies the integrity and authenticity of a page received by the browser client (10) provided in a terminal station (E) of a user client. The method uses two program modules: a signature program module (22): an application executed by the Web server (21) provided in an institution (I) and which intercepts the pages to be sent to the user client and, in case the page is configured as a page to be signed, said module performs the signature with an identifier code and includes, at the end thereof, a tag, whose content is the signature. a verification program module (12): an application executed in the environment of the user client which monitors the pages accessed by the browser client (10). Upon finding a page to be validated, it verifies the presence of the signature tag and validates whether the signature is correct, that is, whether it has really been executed by the correct server and whether the identifier code (HTML) has not been modified.
Type:
Application
Filed:
September 23, 2008
Publication date:
April 9, 2009
Applicant:
Scopus Tecnologia Ltda.
Inventors:
Wilson Vicente Ruggiero, Leon Achjian, JR., Cesar Alison Monteiro Paixao
Abstract: The method of the invention allows presenting, in a friendly and intuitive form, to a user of a protected institution, access password codes arranged in the form of a table and to be individually and only once utilized for authenticating a user upon a respective operation to access said institution. The method proposed herein is particularly adequate for the representation of passwords in a mobile device, such as cell phone, PDA, and the like, utilizing a representation practically identical to the tables of printed passwords and already utilized by many users. There are additional advantages in relation to the use of printed tables, such as the possibility of highlighting a determined password, searching a determined index, protecting the tabular token application by password, and updating the passwords, and the like.
Type:
Application
Filed:
December 10, 2007
Publication date:
February 5, 2009
Applicant:
Scopus Tecnologia Ltda.
Inventors:
Wilson Vicente Ruggiero, Ricardo Komatsu De Almeida, Leon Achjian, JR., Armin Werner Mittelsdorf
Abstract: The method of the invention allows a user to authorize and sign electronic transactions using token programs, even though the software used to effect said transactions is executed in the same terminal device that executes the token program, as it occurs in mobile telephones. A user utilizes an access application or browser to submit electronic transactions, through a terminal device, to an application of an institution, not executing them immediately, but leaving them as pending transactions. Subsequently, the user activates the token program, which consults in the pending transactions in a device in the server of the institution. The user reads the description of each transaction, approving or not the transactions, which are transmitted in or back to the application of the institution with the due authorization or signature, using a secret to be interpreted by this application. Only the transactions correctly authorized/signed are executed by the application of the institution.
Type:
Application
Filed:
June 12, 2007
Publication date:
April 10, 2008
Applicant:
SCOPUS TECNOLOGIA LTDA.
Inventors:
Wilson Vicente Ruggiero, Armin Werner Mittelsdorf, Ricardo Komatsu De Almeida, Leon Achjian