EP1393527A1 - Method for authentication between a portable telecommunication object and a public access terminal - Google Patents
Method for authentication between a portable telecommunication object and a public access terminalInfo
- Publication number
- EP1393527A1 EP1393527A1 EP02745474A EP02745474A EP1393527A1 EP 1393527 A1 EP1393527 A1 EP 1393527A1 EP 02745474 A EP02745474 A EP 02745474A EP 02745474 A EP02745474 A EP 02745474A EP 1393527 A1 EP1393527 A1 EP 1393527A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- key
- wireless communication
- portable object
- ksession
- portable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
Definitions
- the present invention relates to an authentication method between a portable telecommunication object and a public access terminal. It also relates to a portable telecommunication object, a public access point and an authentication server, intended for the implementation of said method.
- the invention finds a particularly advantageous application in the field of security of telecommunication services, and more particularly in that of securing connections when users equipped with a portable telecommunication object, such as a mobile phone, an assistant.
- a portable telecommunication object such as a mobile phone, an assistant.
- PDA Personal
- laptop etc., seek to access private resources via public access terminals.
- public access terminals include telecommunication means on a telecommunication network which allow users to benefit, for example, from broadband access to their mobile portal from their portable telecommunication object.
- This broadband access is made possible, on the one hand, thanks to the capacities of the access network, preferably of ADSL type (from 512 to 1024 kbits), and, on the other hand, thanks to the capacities of communication links without wire (700 kbits), whether it is a short-distance radio link, such as that known as Bluetooth, or an infrared link.
- the throughput capacities of the two elements constituted by the access network and the wireless link are similar, which guarantees a high flow of information all along the communication chain.
- the portable telecommunication object and the public access point must be equipped with respective wireless communication means.
- the access of a user to his mobile portal can be envisaged in the following way: 1.
- the user connects to a public access point with his mobile phone via a Bluetooth link for example.
- the terminal and the mobile phone authenticate each other, the mobile phone being identified by his MSISDN number (Mobile Subscriber ISDN Number), and, optionally, the user of the mobile phone himself is authenticated.
- MSISDN number Mobile Subscriber ISDN Number
- a URL server allows the public base station to retrieve the URL of the user's mobile portal.
- the connection is secured by mutual authentication between the terminal and the server and by encryption and / or authentication of messages using an appropriate protocol such as the protocol known as SSL v3.
- the public access point thus connects to the portal transparently by transmitting a signed token, such as the MSISDN number or another identifier, certifying the identity of the mobile phone.
- a signed token such as the MSISDN number or another identifier
- the use of the SSL v3 protocol allows the public access point and the mobile portal to authenticate each other and, possibly, to ensure the confidentiality and / or integrity of the information exchanged.
- the terminal therefore behaves like a trusted third party vis-à-vis the portal by guaranteeing the authentication of the mobile phone. If user authentication is carried out via the mobile phone, the latter then acts as a trusted third party vis-à-vis the terminal and the portal.
- the mobile phone and if necessary its user, is identified with the portal.
- the public access point then acts as a relay between the different users and their portal: it transmits the requests to the portal and returns the results to the users.
- Bluetooth security is designed to respond to private use where the various devices with the Bluetooth interface and capable of communicating with each other are in limited number and can authenticate each other thanks to the secret they share in common. This secret is the key element of security.
- Bluetooth security is not applicable to the context of the invention because it assumes a private environment, while the authentication sought here between a public access point and at least one mobile phone must take place in a public environment. Indeed, the simple sharing of the same secret is not enough to guarantee authentication by the terminal of the different mobile phones taken individually, because it is necessary that each mobile phone has its own secret, and that each public terminal has knowledge of this secret.
- the technical problem to be solved by the object of the present invention is to propose an authentication method between, on the one hand, a portable telecommunication object assigned a unique identifier and comprising first means of wireless communication. , and, on the other hand, a public access point comprising second wireless communication means, able to cooperate with said first means, and telecommunication means on a telecommunication network, which method would allow communication to be established secure wireless between the portable telecommunication object and the public access point so as to ensure, on the one hand, mutual authentication between the portable object and the terminal, and, on the other hand, encryption of the communications.
- the solution to the technical problem consists, according to the present invention, in that said method comprises the following operations: - allocation to said portable telecommunication object of a wireless communication key,
- the determination of a cryptographic key, here the session key, carried out by both the portable object and the public access terminal from the key of the portable object suitable for the wireless communication service ensures mutual authentication of the portable object and of the terminal, as well as it allows the confidentiality of information by encryption of the exchanges.
- the invention provides two possible embodiments.
- a first mode the wireless communication key of the portable object is determined by the authentication server from the unique identifier of the portable object and from a master key using a diversification mechanism.
- a second mode the wireless communication key of the portable object is determined by the authentication server from the unique identifier of the portable object by consulting a storage table.
- the means for the portable object to acquire the session key two possibilities are offered by the invention, namely, either the acquisition of the session key by the portable object is carried out by calculation by the object portable of said session key from said first message and the wireless communication key, ie the acquisition of the session key by the portable object is carried out by transmission by the public access terminal to the portable object a first signed message containing said session key encrypted with the wireless communication key of the portable object, and decryption by the portable object.
- the unit of calculation of the session key is constituted by the authentication server, or else the session key calculation unit is constituted by the public access terminal.
- the terminal only serves as a relay to the telecommunications network, the services being consulted by the user on his own portable object.
- the public access terminal has the particularity that it has a user interface comprising a display screen, the consultation of the services then being carried out on the screen of the terminal itself.
- the relay type terminal is also included in the terminal with screen. In this case, of course, only one user has access to the terminal screen, the others then having to use their portable object, this within the limits of the capacity of the terminal to enter into communication with different portable objects.
- the authentication method according to the invention is supplemented by the fact that it comprises an operation of authenticating a user by entering a secret specific to said user and comparing the secret entered with a secret of reference.
- said secret is a personal code entered by the user, this code possibly being of the type known by the PIN code used in particular for securing electronic payment cards.
- said secret is a biometric fingerprint entered by the user, such as a fingerprint.
- the authentication proper is carried out by comparison with the reference secret, either by the portable telecommunication object or by the public access terminal.
- Two cases are to be considered: a) The user enters his secret on his portable object. b) The user enters his secret on the terminal, which certifies the physical presence of the user near the terminal. In this case, the terminal must have input equipment (fingerprint sensor, touch screen, ). The secret entered is sent encrypted to the portable object. An anti-replay mechanism, by using a random variable, a shared counter, a time element, ensures that the message transmitted is not an old message.
- the invention further recommends displaying on the terminal all of the portable objects detected and compelling the user to select the one he uses, so as to that the secret is not sent to all connected portable objects.
- the user recognizes his mobile, for example, by his Bluetooth address, his serial number or any other information that differentiates him from other portable objects.
- the terminal checks beforehand that no portable object detected by the terminal has the same identifier.
- the reference secret is stored in the portable object, or equipment attached to the portable object, such as an additional card, for example a SIM card.
- Verification of the secret seized The verification is carried out on the portable object which compares the secret entered with the reference secret. If the verification is positive, the portable object sends a confirmation message to the public access point. This message is signed by means of a cryptographic mechanism with public key - digital signature - or by means of a secret key mechanism - a method of authentication of messages, such as a MAC (Message Authentication Code) thus allowing the terminal to verify the authenticity and the non-replay of this message.
- the portable object therefore presents itself as a trusted item of equipment with respect to the terminal. It is he who certifies that the user is indeed the owner of the portable object.
- user authentication takes place as follows:
- Two cases are to be considered: a) The user enters his secret on the portable object. In this case, the secret entered is sent encrypted to the public access point. An anti-replay mechanism, by using a random variable, a shared counter, a time element, ensures that the message transmitted is not an old message. b) The user enters his secret on the terminal, which certifies the physical presence of the user near the terminal.
- the reference secret signed if necessary by an entity recognized by the terminal, is stored in the portable object and sent encrypted to the terminal.
- the invention recommends compelling the user to select the portable object that he uses so as to avoid that all connected portable objects have to systematically send the reference secret to the terminal.
- the reference secret is stored in the authentication server and retrieved by the terminal from the unique identifier of the portable object. 3. Verification of the secret seized.
- the public access point compares the secret entered and the reference secret to authenticate the user. It can also, optionally, ensure that the user is the owner of the portable object by consulting the authentication server.
- the terminal is therefore able to authorize access to the local resources of the recognized user or to certify the identity of the user to remote private resources, such as a mobile portal, the terminal in this case playing the role of trusted intermediary.
- the information is then either displayed on the terminal screen or transmitted to the user's portable object.
- the invention recommends not keeping the reference secret in the authentication server but in the portable object itself, if necessary in signed form.
- the signature will be that of an entity recognized by the terminal. The purpose of this provision is then to avoid the storage of physiological data of users in a database, which could pose difficulties vis-à-vis official bodies responsible for the protection of privacy.
- the reference biometric characteristics must be sent to the terminal which performs the verification.
- An alternative could be for the portable object to require the biometric characteristics entered from the terminal and to carry out the verification itself before sending the reference minutiae to the terminal.
- FIG. 1 is a diagram illustrating a method of mutual authentication between a portable object and a public access point.
- FIG. 2a is a diagram illustrating a method of authenticating a public access terminal by a portable object.
- Figures 2b and 2c are diagrams illustrating, in combination with Figure 2a, two modes of authentication of a portable object and its user by a public access point.
- FIG. 3 is a diagram describing the disconnection of a portable object from a public access point.
- Figure 1 is shown schematically an authentication method between, on the one hand, a portable telecommunication object 10 which, in the example of Figure 1, is a mobile phone, called “mobile” in the following of this description, assigned a unique identifier MSISDN, and on the other hand, a public access terminal 20 comprising telecommunication means on a telecommunication network 1.
- a portable telecommunication object 10 which, in the example of Figure 1, is a mobile phone, called “mobile” in the following of this description, assigned a unique identifier MSISDN
- public access terminal 20 comprising telecommunication means on a telecommunication network 1.
- the mobile 10 and the terminal 20 are capable of exchanging information through a wireless communication link of the Bluetooth type for example.
- the mobile and the terminal are respectively provided with first and second wireless communication means.
- the mutual authentication of the mobile 10 and of the terminal 20 is carried out by sharing a session key between the mobile and the terminal according to a method the steps of which will now be described in detail.
- the mobile 10 is assigned a wireless communication key Kme, shared with the terminal 20.
- an authentication server 30 capable of determining the key Kme of the mobile wireless communication from the unique identifier MSISDN.
- the public access terminal 20 is activated by the mobile 10 in accordance with the teaching of patent application 00 09438 in the name of the Applicant.
- the mobile 10 During the connection phase, the mobile 10 generates a first random random number and transmits to terminal 20 its identifier MSISDN as well as said first random random number through said first and second wireless communication means. This transmission can be signed by the Kme key of the mobile or by a trusted authority.
- the terminal 20 transmits the unique identifier MSISDN and the random random number to the authentication server 30 through said telecommunication means.
- a protocol such as SSL v3 allows mutual authentication between the terminal 20 and the authentication server 30.
- the authentication server 30 then proceeds to determine the key Kme of the mobile 10 from its identifier.
- the key Kme is determined from the unique identifier MSISDN and from a key- Master Kmaître stored in the authentication server 30, using a diversification mechanism.
- Another alternative for determining the key Kme of the mobile 10 is possible, consisting in consulting a storage table in which the keys Kme associated with all the mobiles subscribed with the service are recorded.
- the authentication server 30 generates a second random number random2 and calculates a session key Ksession from the key Kme of the mobile 10 and the two random numbers aleal and random2.
- the authentication server 30 returns to the public access terminal 20 the session key Ksession, the identifier MSISDN of the mobile 10 and the second random number random 2.
- An encrypted connection using the SSL v3 protocol for example, guarantees the confidentiality of information.
- Terminal 20 sends a first messi message to mobile 10 containing the two random numbers aleal and random2 signed with the session key Ksession.
- the mobile 10 then acquires the session key Ksession by calculation from the two random numbers contained in the first messi message and from its wireless communication key Kme, stored in the mobile 10 or in the SIM card.
- the calculation of the key Ksession by the mobile 10 is identical to the calculation of the same key by the authentication server 30.
- the mobile 10 then verifies the signature of the first messi message calculated by the terminal 20. At the end of this step, the public access terminal 20 is authenticated.
- this second message mess2 can be deduced from the two random numbers aleal and alea2 thanks to a function which must be known by the mobile 10 and the terminal 20. For example, it can simply be 'a message containing the two random numbers incremented by 1.
- Terminal 20 verifies the signature of the second mess2 message sent by the mobile 10. At the end of this step, the mobile 10 is authenticated.
- the authentication method of the invention has just been described by implementing a unit for calculating the session key Ksession constituted by the authentication server 30. It should however be pointed out that the said calculation unit could just as easily be constituted by the public access terminal 20 itself.
- the authentication server 30 returns to terminal 20 the MSISDN identifier of the mobile 10 accompanied by the key Kme which it has determined.
- Terminal 20 generates the second random number random 2 and calculates the key Ksession from the key Kme of the mobile 10 and the two random numbers.
- Ksession by the mobile 10 consists in transmitting by the public access terminal 20 a first signed message containing said key Ksession encrypted with the key Kme of the mobile, and decrypting the key Ksession by the mobile 10.
- FIGS. 2a, 2b, 2c describe two modes of implementation of a mutual authentication method between a public access terminal 20 and the user of a mobile 10. This authentication is carried out in two stages: the first illustrated by FIG. 2a concerns the authentication of the terminal, while the second user authentication step is represented by the two variants of FIGS. 2b and 2c. Note that this second step also allows the terminal 20 to authenticate the mobile 10.
- the step of authenticating the public access terminal 10 is carried out in a manner analogous to the diagram in FIG. 1, namely by sharing a session key Ksession between the mobile 10 and terminal 20:
- the mobile 10 sends its unique identifier MSISDN, its physical Bluetooth address BD ADDR and a first random random number to terminal 20.
- Terminal 20 transmits the MSISDN identifier of the mobile 10 and the random random number to the authentication server 30.
- the use of an SSL v3 connection allows mutual authentication between the terminal 20 and the authentication server 30.
- the authentication server 30 calculates the session key Ksession. To do this, it starts by calculating the key Kme specific to the mobile 10 from a Kmaître master key using a diversification mechanism and the MSISDN identifier. It then generates a second random number random2 and calculates the session key Ksession from the key Kme of the mobile 10 and the two random numbers.
- the authentication server 30 returns the MSISDN identifier of the mobile 10, the second random number random2 and the session key Ksession at terminal 20.
- the SSL v3 connection makes it possible to guarantee the confidentiality of the information by encryption. 5.
- Terminal 20 sends in a first message Messi 1 the two random numbers signed to mobile 10.
- the mobile 10 calculates the session key Ksession from its own key Kme and from the two random numbers. This session key allows it to verify the signature of terminal 20 and thus ensure that the terminal is a trusted terminal.
- the terminal 20 screen If the terminal 20 screen is available, the terminal displays the list of Bluetooth BD ADDR physical addresses of the mobiles present in the terminal field.
- this authentication phase allows the terminal 20 to authenticate the mobile.
- Biometric authentication on terminal 20 is carried out as described in FIG. 2b assuming that the screen of terminal 20 is available:
- Terminal 20 asks the user to enter his fingerprints using the biometric fingerprint sensor.
- the terminal 20 sends in a second first message messi 2 the minutiae and the first random random number to the mobile 10.
- the message is encrypted with the session key Ksession.
- the mobile 10 deciphers the message messi 2, checks the validity of the aleal random number and compares the minutiae entered with the reference minutiae. If the correspondence is correct, the user is considered to be authenticated by the mobile 10.
- the mobile 10 sends in a second message mess2 the reference minutiae of the user and the identifier MSISDN signed by an authority recognized by the terminal and a random number calculated from the second random number random2 at terminal 20.
- the message is encrypted with the Ksession session key.
- Terminal 20 decrypts said second message mess2, and thus authenticates mobile 10, verifies the signature of the authority, verifies the validity of the random number received and compares the minutiae entered with the reference minutiae. If the verification is correct, terminal 20 considers the user as authenticated.
- the user accesses the resources using the screen of the public access terminal 20.
- Authentication by PIN code on the mobile 10 shown in FIG. 2c allows users to connect to a terminal 20, either when the latter is unavailable, or when they do not wish to use the terminal screen.
- authentication of the user and of terminal 20 is carried out as follows:
- the user explicitly requests the connection by using, for example, a key on the mobile 10 specific to the service.
- the mobile 10 displays a form for entering the PIN code.
- the mobile 10 sends in a second message mess2 its unique identifier MSISDN, the PIN code and a random number calculated from the second random number random 2 at terminal 20.
- the message is encrypted with the session key Ksession.
- Terminal 20 decrypts the message mess2, and thus authenticates the mobile 10, and checks the validity of the random number received.
- Terminal 20 interrogates the authentication server 30 to recover, from the identifier MSISDN, the user's reference PIN code.
- the use of an SSL v3 connection allows mutual authentication between the terminal 20 and the authentication server 30 as well as encryption of the communications.
- Terminal 20 compares the PIN code entered with the reference PIN code. If the verification is correct, the user is considered as authenticated by the terminal.
- Terminal 20 returns to mobile 10 the result of authentication.
- the user can access the resources by his mobile 10.
- the disconnection can either be explicitly requested by the user, or be carried out automatically when the mobile 10 leaves the field of the public access terminal 20. In both cases, if terminal 2 is available, the updated list of Bluetooth physical addresses detected by terminal 20 is displayed on the screen.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0107631A FR2825869B1 (en) | 2001-06-08 | 2001-06-08 | AUTHENTICATION METHOD BETWEEN A PORTABLE TELECOMMUNICATION OBJECT AND A PUBLIC ACCESS TERMINAL |
FR0107631 | 2001-06-08 | ||
PCT/FR2002/001860 WO2002102018A1 (en) | 2001-06-08 | 2002-06-03 | Method for authentication between a portable telecommunication object and a public access terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1393527A1 true EP1393527A1 (en) | 2004-03-03 |
Family
ID=8864194
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02745474A Withdrawn EP1393527A1 (en) | 2001-06-08 | 2002-06-03 | Method for authentication between a portable telecommunication object and a public access terminal |
Country Status (5)
Country | Link |
---|---|
US (1) | US7793102B2 (en) |
EP (1) | EP1393527A1 (en) |
JP (1) | JP4235102B2 (en) |
FR (1) | FR2825869B1 (en) |
WO (1) | WO2002102018A1 (en) |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1408391A1 (en) * | 2002-10-11 | 2004-04-14 | Telefonaktiebolaget LM Ericsson (publ) | Method of associating authentication information of a trusted device to an identifier of a non-trusted device |
ITRM20030100A1 (en) * | 2003-03-06 | 2004-09-07 | Telecom Italia Mobile Spa | TECHNIQUE OF MULTIPLE ACCESS TO THE NETWORK BY USER TERMINAL INTERCONNECTED TO A LAN AND RELATED REFERENCE ARCHITECTURE. |
US8428261B2 (en) * | 2003-06-20 | 2013-04-23 | Symbol Technologies, Inc. | System and method for establishing authenticated wireless connection between mobile unit and host |
US7305230B2 (en) * | 2003-07-01 | 2007-12-04 | Nokia Corporation | System, apparatus, and method for providing a mobile server |
US7634482B2 (en) * | 2003-07-11 | 2009-12-15 | Global Ids Inc. | System and method for data integration using multi-dimensional, associative unique identifiers |
EP1536592B1 (en) | 2003-11-26 | 2006-08-09 | France Telecom | Authentication between a cellular mobile terminal and a short range access point |
KR20050096040A (en) * | 2004-03-29 | 2005-10-05 | 삼성전자주식회사 | Method for playbacking content using portable storage by digital rights management, and portable storage for the same |
JP3817249B2 (en) * | 2004-04-28 | 2006-09-06 | 株式会社エヌ・ティ・ティ・ドコモ | Mobile device and communication control method |
JP4707992B2 (en) * | 2004-10-22 | 2011-06-22 | 富士通株式会社 | Encrypted communication system |
US8553885B2 (en) * | 2005-01-27 | 2013-10-08 | Blackberry Limited | Wireless personal area network having authentication and associated methods |
KR100749846B1 (en) * | 2005-06-22 | 2007-08-16 | 한국전자통신연구원 | Device for realizing security function in mac of portable internet system and authentication method using the device |
KR100667181B1 (en) * | 2005-06-22 | 2007-01-12 | 한국전자통신연구원 | Method for allocating authorization key identifier for wireless portable internet system |
US20070266236A1 (en) * | 2006-05-09 | 2007-11-15 | Colditz Nathan Von | Secure network and method of operation |
US8831189B2 (en) | 2006-06-12 | 2014-09-09 | Microsoft Corporation | Device authentication techniques |
US20070294541A1 (en) * | 2006-06-16 | 2007-12-20 | Phani Bhushan Avadhanam | Methods and apparatus for encryption verification |
JP2008003976A (en) * | 2006-06-26 | 2008-01-10 | Sony Corp | Memory access control device and method, and communication device |
FR2916593B1 (en) * | 2007-05-24 | 2009-10-02 | Sagem Monetel Soc Par Actions | METHOD AND DEVICE FOR DETECTING A SUBSTITUTION TEST OF A GENUINE PART OF AN ELECTRONIC SYSTEM BY A REPLACEMENT PART |
JP4956292B2 (en) * | 2007-06-25 | 2012-06-20 | パナソニック株式会社 | Information security apparatus and counter control method |
CN101911645B (en) | 2008-01-07 | 2016-06-08 | 西门子企业通讯有限责任两合公司 | For verifying method and the end points of the key information between the end points of correspondence |
JP5354656B2 (en) * | 2009-03-06 | 2013-11-27 | Necシステムテクノロジー株式会社 | Cryptographic communication system, cryptographic communication method, transmitting apparatus and receiving apparatus |
EP2259611A1 (en) * | 2009-06-05 | 2010-12-08 | Hewlett-Packard Development Company, L.P. | Method and apparatus for associating a subscriber directory identifier to a subscriber identifier |
CN101572705B (en) * | 2009-06-08 | 2012-02-01 | 西安西电捷通无线网络通信股份有限公司 | System and method for realizing bi-directional platform authentication |
IT1404159B1 (en) * | 2010-12-30 | 2013-11-15 | Incard Sa | METHOD AND SYSTEM OF CONTROL OF A COMMUNICATION BETWEEN AN INTEGRATED CIRCUIT UNIVERSAL CARD AND AN EXTERNAL APPLICATION |
US9767807B2 (en) * | 2011-03-30 | 2017-09-19 | Ack3 Bionetics Pte Limited | Digital voice signature of transactions |
US10891599B2 (en) * | 2012-09-12 | 2021-01-12 | Microsoft Technology Licensing, Llc | Use of state objects in near field communication (NFC) transactions |
CN105721153B (en) * | 2014-09-05 | 2020-03-27 | 三星Sds株式会社 | Key exchange system and method based on authentication information |
DE102015006751A1 (en) * | 2015-05-26 | 2016-12-01 | Giesecke & Devrient Gmbh | Method for providing a personal identification code of a security module |
CN105898743B (en) * | 2015-06-17 | 2019-07-02 | 法法汽车(中国)有限公司 | A kind of method for connecting network, apparatus and system |
CN107317674B (en) * | 2016-04-27 | 2021-08-31 | 华为技术有限公司 | Key distribution and authentication method, device and system |
DE102016208512A1 (en) * | 2016-05-18 | 2017-11-23 | Bundesdruckerei Gmbh | Access control with a mobile device |
JP2018074205A (en) * | 2016-10-24 | 2018-05-10 | 富士通株式会社 | Program, information processing device, information processing system, and information processing method |
US10505738B1 (en) * | 2018-10-02 | 2019-12-10 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
FR3090254B1 (en) * | 2018-12-12 | 2022-12-16 | Idemia France | Secure access to encrypted data from a user terminal |
US20220182838A1 (en) * | 2020-12-08 | 2022-06-09 | Verizon Patent And Licensing Inc. | Systems and methods for obtaining a subscriber identity for an emergency call |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998039875A2 (en) * | 1997-03-04 | 1998-09-11 | Mannesmann Ag | Method for inserting a service key in a terminal and devices for implementing said method |
US5930804A (en) * | 1997-06-09 | 1999-07-27 | Philips Electronics North America Corporation | Web-based biometric authentication system and method |
US6246771B1 (en) * | 1997-11-26 | 2001-06-12 | V-One Corporation | Session key recovery system and method |
WO2000028762A1 (en) * | 1998-11-09 | 2000-05-18 | Nortel Networks Corporation | System and method for controlling, maintaining and sharing calls and call data between networks |
FI990601A0 (en) | 1999-03-17 | 1999-03-17 | Sonera Oy | Method and system in a telecommunications system |
US7039946B1 (en) * | 1999-10-12 | 2006-05-02 | International Business Machines Corporation | Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme |
JP3776705B2 (en) * | 2000-09-28 | 2006-05-17 | 株式会社東芝 | COMMUNICATION SYSTEM, MOBILE TERMINAL DEVICE, GATEWAY DEVICE, AND COMMUNICATION CONTROL METHOD |
JP4078802B2 (en) * | 2000-12-26 | 2008-04-23 | ソニー株式会社 | Information processing system, information processing method, information processing apparatus, information recording medium, and program recording medium |
-
2001
- 2001-06-08 FR FR0107631A patent/FR2825869B1/en not_active Expired - Fee Related
-
2002
- 2002-06-03 EP EP02745474A patent/EP1393527A1/en not_active Withdrawn
- 2002-06-03 JP JP2003504628A patent/JP4235102B2/en not_active Expired - Fee Related
- 2002-06-03 WO PCT/FR2002/001860 patent/WO2002102018A1/en active Application Filing
- 2002-06-03 US US10/480,148 patent/US7793102B2/en not_active Expired - Fee Related
Non-Patent Citations (1)
Title |
---|
See references of WO02102018A1 * |
Also Published As
Publication number | Publication date |
---|---|
US20040172536A1 (en) | 2004-09-02 |
FR2825869B1 (en) | 2003-10-03 |
FR2825869A1 (en) | 2002-12-13 |
WO2002102018A1 (en) | 2002-12-19 |
US7793102B2 (en) | 2010-09-07 |
JP2005504459A (en) | 2005-02-10 |
JP4235102B2 (en) | 2009-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002102018A1 (en) | Method for authentication between a portable telecommunication object and a public access terminal | |
EP1687953B1 (en) | Method for the authentication of applications | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
EP2820795B1 (en) | Method for verifying the identity of a user of a communication terminal and associated system | |
EP1371207B1 (en) | Portable device for securing packet traffic in a host platform | |
EP0973318A1 (en) | Process for remote paying, by means of a mobile radio telephone, the acquisition of a good and/or a service, and corresponding system and mobile radio telephone | |
WO2006056669A1 (en) | Method of securing a telecommunication terminal that is connected to terminal user identification module | |
EP2822285B1 (en) | Pairing devices through distinct networks | |
WO2009080999A2 (en) | Method of authenticating a user | |
FR2769446A1 (en) | Identification and authentication system for users of data network | |
EP2348763A2 (en) | Method for authenticating a mobile terminal to access an application server | |
WO2003046730A2 (en) | Method for making secure access to a digital resource | |
WO2009056374A1 (en) | Method of authenticating a user accessing a remote server from a computer | |
EP1400090B1 (en) | Method and device for securing communications in a computer network | |
EP1737191B1 (en) | Method for creating a user equipment split between a terminal equipment and serially connected equipments | |
WO2005079038A1 (en) | Method, terminal mobile, system and equipment for the provision of a local service which can be accessed by means of a mobile terminal | |
FR2813151A1 (en) | SECURE COMMUNICATION IN AUTOMATION EQUIPMENT | |
WO2022135952A1 (en) | Method and device for generating authentication information for a secure entity and associated identity checking method and device | |
FR3043291A1 (en) | COMMUNICATION BETWEEN TWO SECURITY ELEMENTS INSERTED IN TWO COMMUNICATING OBJECTS | |
WO2024180049A1 (en) | Method for issuing an access authorisation for an individual and verification method | |
FR3007929A1 (en) | METHOD FOR AUTHENTICATING A USER OF A MOBILE TERMINAL | |
WO2012022856A1 (en) | Method of authenticating a user of the internet network | |
WO2007101941A1 (en) | Method for secure pairing of two systems prior to setting up communication between them | |
WO2003003655A1 (en) | Method for secure radio-frequency communication | |
WO2017060624A1 (en) | Means for managing access to data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20031212 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: THORIGNE, YVES Inventor name: GUERIN, DIDIER Inventor name: MALVILLE, ERIC |
|
17Q | First examination report despatched |
Effective date: 20091009 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20120103 |