User Registration Phase Sample Clauses

User Registration Phase. Registration requires: - a Google account for the Android1 version or an Apple2 account for the iOS version in order to download the application on the online application purchase platform and benefit from updates, - The business email address of the user of the mobile device to be audited. In the event of termination of the Agreement for any of the reasons set forth in this Agreement, TEHTRIS will terminate the entire TEHTRIS Service. This phase will result in the destruction of the Data in accordance with the Article - Reversibility.
AutoNDA by SimpleDocs
User Registration Phase. The registration process is between the GWN and U is as follows: 1. U selects an identity IDU, a private key dU and then gets the public key QU = dU P according to dU. Then, U calculates the registration message MIDU = h (IDU), and sends it to GWN via a non-public channel. 2. After receiving the registration message from U, GWN calculates MU = h (MIDU dGWN) and returns it to U via a non-public channel. 3. U computes MU∗ = MU ⊕ h (IDU dU) and deletes MU.
User Registration Phase. A vehicle user needs to register from ESP for getting the recharging services. Its registration procedure is given below: 1. Initially, the user submits its identity IDu towards ESP as a registration request by using a confidential channel. 2. Next, the ESP records the user’s entry into its database and constructs a new pseudo identity NIDi, a secret key qi and also a set of shadow identities SID = {sid1, sid2, sid3,….., sidn}, which may be used if the participants lose synchronization among themselves. Thereafter, ESP submits the message {NIDi, qi, SID} towards user by utilizing a confidential channel. 3. After receiving the message from ESP, the Ui inputs its biometric factor 𝜑𝑖, password pwdi and computes 𝛾𝑖= h(𝜑𝑖) and 𝜔𝑖=h(𝛾𝑖|| pwdi). After computing 𝜔𝑖, the user stores the message {𝜔𝑖, NIDi, qi*, SID} in its mobile gadget to utilize while authenticating with the charging station.
User Registration Phase. A vehicle user needs to register itself from ESP for getting the recharging services. The registration steps are given below: 1. Initially, the user submits its identity IDu towards ESP as a registration request by using a confidential channel. 2. Next, ESP records the user’s entry into its database and constructs a new pseudo identity NIDi, a secret key qi and also a set of shadow identities SID = {sid1, sid2, sid3,….., sidn}, which may be used if the participants lose the synchronization among themselves. Thereafter, the ESP submits {NIDi, qi, SID} towards user by utilizing a confidential channel. 3. After receiving the message from ESP, the Ui inputs its biometric factor 𝜑𝑖 and password pwdi. Then it computes Gen(𝜑𝑖)→(Ri, Pi) and stores Pi into the mobile gadget. Next, the gadget computes 𝛾𝑖=h(Ri) and 𝜔𝑖=h(𝛾𝑖||pwdi). After computing 𝜔𝑖 the Ui stores {𝜔𝑖, Pi, NIDi, qi*,SID} in its mobile gadget to enable mutual authentication between Ui and CSj/ESP.
User Registration Phase. Figure 3 illustrates the user registration phase. 1) User A Server S: XXX, H(R PWA) . When a user wants to be a new legal user, she chooses her identity XXX, a random number R,and computes H(R PWA). Then Xxxxx submits XXX, H(R PWA) to the S via a secure channel. 2) Server S → User A: B. Upon receiving XXX, H(R||PWA) from Xxxxx, the S computes B = H(XXX k) H(R PWA), where k is the secret key of the server S. Then Xxxxx stores {R, B} in a secure way. {C5, C6} to S. Finally, Xxxxx computes the session key Ksession = Ta(Tk(b)) locally.
User Registration Phase. A user Ui can register to GS via a secure channel using a mobile device, say MDi with the following steps: Step URP1: Ui selects an unique identity IDi, password Pwi, and imprints personal biometric template Bi at the sensor of some specific terminal (mobile device). Next, Ui executes a “fuzzy extractor probabilistic generation function” Gen( ) [52] to generate a bio-metric secret key σi 0, 1 lb of length lb bits and a public reproduction parameter τi corresponding to the bio-metric input Bi, that is, Gen(Bi) = (σi, τi). Furthermore, Ui computes a hashed identity HID = h(IDi), selects a random secret ri Zq∗, and computes pseudo bio- metric value as PSB = h(IDi σi ri). Xx then sends the registration request HID, PSB to GS via secure channel (GS is also considered as the authentication server). Step URP2: Using a master secret key MKg and chosen temporary hashed identity THID, GS computes RPSB = h(PSB rg), PHID = h(HID MKg), and x1 = h(RPSB MKg) PHID. Next, GS sends the registration information x1, PHID, THID, RPSB to Ui via secure channel. GS then stores the Ui’s registration information PHID, THID, RPSB into its secure database. In ad- dition, the server GS is also protected by a physical locking system as in [53]. Step URP3: After receiving the information x1, PHID, THID, RPSB , Ui computes TC = h(Pwi σi IDi), x2 = ri TC, x3 = x1 h(ri Pwi σi), PHID∗ = PHID h(ri σi TC), RPSB∗ = RPSB h(σi IDi ri), and x4 = h(σi Pwi IDi ri). After successful registration, Ui saves the information (THID, PHID∗), RPSB∗, HID, x2, x3, x4, Eq(a, b), G in MDi’s memory.
User Registration Phase. In this phase, a legal user Pi needs to register with the MRS for accessing the medical services from a particular physicianserver PSk under a medical server MSj in the network. PBi in order to producethe biometric data key σi and the public parameter τi asGen(Bi) = (σi, τi). Note that σi is kept secret to Pi only. Step R3: After receiving the registration request from Pi,the MRS continues to compute RMj = h(PIDi||Xj) ⊕PRPWi and RMSj = h(MSIDj ||Xj) ⊕PRPWi, for 1 ≤j ≤ m + m*. Then the MRS stores the information{{MSIDj , RMj , RMSj|1 ≤ j ≤ m + m*},h(·), Gen(·), Rep(·), t} in a smart card, say SCPi andsends it to the patient/user Pi via a secure channel, where ‘εt’ is theerror tolerance threshold used in fuzzy extractor.
AutoNDA by SimpleDocs
User Registration Phase. In this phase, a user gets pre-registered with any of its associated authorized server Sy employing a secure channel, using Chebyshev chaotic map-based multi-server to server architecture [42]. After a successful registration the user establishes a shared password PWU with Sy, which is stored by Sy in its repository ℛ against IDU. Next, the former may establish a secure session key with any new server Sx (already authorized from and registered with Sy), by employing a login and authentication phase as described in the next section.
User Registration Phase. In this phase, a user gets registered with Sy by adopting the following steps. 1. The user Ui sends identity and password (IDU, PWU) to server Sy using a secure channel. 2. The server Sy generates a pseudonym identity PIDi against Xx, and computes h(Ky||PIDi) ⊕ (IDU|| PWU), and stores in repository against PIDi. 3. Next, it sends {PIDi, IDSy , H(), (x, TKy (x))} to the user. The Ui receives and stores PIDi safely. In this manner, the user establishes a shared password PWU with Sy, which enables the user to establish a secure session key with a unknown server Sx (already authorized with Sy), by initiating a login and authentication phase as described below.
User Registration Phase. When a user Ui wishes to register with CS, Ui selects desired identity IDi and password Pi to enter his/her IoT-enabled device such as a card reader. Then, the device collects Ui’s biometric Bi and generates a random number b to com- pute PIDi = h (IDi ǁ b), Ai = Pi ⊕ h (Bi) and Ωi = b ⊕ Ai. Next, it sends (IDi, PIDi, Ai) to CS in a secure channel. After receiving the message, CS ver- ifies the authenticity of the user’s identity IDi. If IDi is illegal, CS rejects Ui’s registration. Otherwise, CS calculates Ci = h (PIDi ǁ Ai), Di = h (PIDi ǁ x) and Ei = Di ⊕ Ai. Then, CS writes the data (Ci, Ei, h (·) ) to a smart card and delivers it to Ui through private communication. When obtains the smart card, Ui inserts it to IoT-enabled device and inputs IDi and Pi to the device again. Then, the de- vice writes Ωi to the smart card. Finally, the smart card records the informations (Ci, Ωi, Ei, h (·) ).
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!