EP3123452A1 - Security method - Google Patents
Security methodInfo
- Publication number
- EP3123452A1 EP3123452A1 EP15712306.8A EP15712306A EP3123452A1 EP 3123452 A1 EP3123452 A1 EP 3123452A1 EP 15712306 A EP15712306 A EP 15712306A EP 3123452 A1 EP3123452 A1 EP 3123452A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security feature
- dynamic
- static
- feature
- factor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 230000003068 static effect Effects 0.000 claims abstract description 55
- 238000004590 computer program Methods 0.000 claims abstract description 16
- 230000008859 change Effects 0.000 claims description 48
- 238000003860 storage Methods 0.000 claims description 23
- 239000000126 substance Substances 0.000 claims description 21
- 239000000463 material Substances 0.000 claims description 13
- 239000000203 mixture Substances 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 6
- 238000004904 shortening Methods 0.000 claims description 3
- 210000001124 body fluid Anatomy 0.000 claims description 2
- 239000010839 body fluid Substances 0.000 claims description 2
- 238000006073 displacement reaction Methods 0.000 claims description 2
- 238000004018 waxing Methods 0.000 claims description 2
- 230000001143 conditioned effect Effects 0.000 claims 1
- 239000013589 supplement Substances 0.000 claims 1
- 230000001960 triggered effect Effects 0.000 description 5
- 230000004913 activation Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 3
- QVGXLLKOCUKJST-UHFFFAOYSA-N atomic oxygen Chemical compound [O] QVGXLLKOCUKJST-UHFFFAOYSA-N 0.000 description 3
- 229910052760 oxygen Inorganic materials 0.000 description 3
- 239000001301 oxygen Substances 0.000 description 3
- 230000001681 protective effect Effects 0.000 description 3
- 239000002966 varnish Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 206010011376 Crepitations Diseases 0.000 description 1
- 208000037656 Respiratory Sounds Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004040 coloring Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- -1 device Substances 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000010410 layer Substances 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 239000000049 pigment Substances 0.000 description 1
- 239000011253 protective coating Substances 0.000 description 1
- 239000011241 protective layer Substances 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 230000009469 supplementation Effects 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/35—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a handwritten signature
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/50—Maintenance of biometric data or enrolment thereof
- G06V40/53—Measures to keep reference information secret, e.g. cancellable biometrics
Definitions
- the present invention relates to a method and an authentication device for the authentication and / or identification of persons, objects,
- Security features in which, for example, a PIN number, a biometric (e.g., fingerprint), a code, or a password is associated with a particular user.
- a biometric e.g., fingerprint
- a code e.g., a password
- access restrictions to certain user groups are the rule and require extensive security measures to secure the associated sensitive data of the participants.
- authentication methods are based on a previous registration, in which the identity of a user is deposited by entering user data before the first access of the application. In the prior art are different
- Authentication methods distinguished, the factors the knowledge (e.g.
- Password e.g., an access card
- personal characteristics of the user e.g., fingerprint, signature
- the structures e.g. the height, width or depth, as well as the shape of the elements used to encode information.
- the codes contained therein may also contain further information, for example conventional codes such as bar codes or QR codes.
- the structure albeit two-dimensional, is predetermined and does not change. A change in structure would inevitably entail deletion or alteration of the information encoded therein, and would be undesirable. Thus, even these 3-D structures can be easily bypassed by an attacker.
- topographical structures in the form of crackles are used as a security feature.
- EP 0 996 928 B1 an authentication method is described in which a combined code consisting of a unique random part and a non-random part is used. This code may be encrypted or decrypted as needed. The random part of the code can be matched to a local or central database. In the query, for example, it can be determined whether a code has already been read. However, here too the random part and the non-random part of the code (eg manufacturer information) are static; the code itself does not change dynamically.
- US 4,998,279 A describes a static code (PIN) consisting of a dynamic variable (eg a date or time). However, there is no conversion, recalculation or activation of the static security feature by a dynamic, unpredictable factor. Presentation of the invention:
- the inventive method is based on the basic idea that a static security element in a changing, dynamic security element
- a static security feature refers to a security feature that can be associated with a particular person, object, service system or computer program and that does not itself change.
- a dynamic security feature indicates a
- the static security feature is thus changed so that at least the changed parts of it can not be readily assigned to a specific person, an object, a service system or a computer program.
- the term article is to be understood as broad in the context of the present invention and includes any type of devices, systems, Media, devices and circuits.
- the static security feature is first deposited in a storage means.
- the deposit can be done in analog or digital form on any disk, for example on a database server.
- the static security feature or parts thereof are / are associated with a particular person, object, service system or computer software.
- the process according to the invention does not differ from the already known processes in the prior art up to this process step.
- the static security feature or parts thereof are converted, recalculated or activated, so that the static feature changes into a dynamic security feature.
- a dynamic factor refers to a factor or influence that constantly changes itself, such as a physical parameter.
- the changed dynamic security feature or partial areas thereof is compared with the stored in the storage means static security feature at a particular query time.
- the polling time defines the time at which, for example, an authentication request is sent to an authentication server. This may be, for example, a user query or the intended activation of a service on a service server.
- the polling time preferably defines the beginning or the end of a session, for example a session in which a user wishes to access a particular service of a service system.
- the person and / or the object and / or the service system and / or the computer software are / is then positively authenticated if the dynamic
- Security feature against the stored in the storage means static security feature by an unpredictable factor between two
- a characteristic of the change here is that it is not reproducible, that is to say the change of the static security feature into a dynamic security feature preferably takes place in a manner which is not subject to any particular rule and can not be hacked in this respect.
- the person and / or the subject matter and / or the service system and / or the computer software are / are positively authenticated if the dynamic security feature has at least partially changed from the static security feature stored in the storage means by a preferably dynamic factor between two polling instants, or in the case of an increased security requirement.
- the dynamic factor is preferably a material property, the property of a device or a physical or chemical parameter.
- a fingerprint triggered as a biometric feature is modified by the factor such that the dynamic security feature thus obtained can no longer be assigned to any particular person.
- the change can take place, for example, in that the profile of the fingerprint is recalculated, distorted or split into several individual parts. From such a
- the stored in the storage means static security feature always corresponds to the last updated security feature.
- a potential attacker will not recognize which part or state of the security feature in question in the last
- the security feature is a biometric
- a security feature preferably a fingerprint, a recorded voice profile of a human voice, the iris of an eye, an ear profile, a body fluid composition or other biometric feature that is unique to a particular individual.
- This feature can be converted into a dynamic security feature, for example, by changing the geometric profile or structure, surface, or other property that varies an internal or external factor continues to evolve in an unpredictable way.
- the security feature is a material, a device, a substance or a substance mixture or a physical or chemical property of a material, a device, a substance or a substance mixture, wherein at least one component between two
- the physical property may be, for example, the color or intensity of a substance.
- the coloring or the intensity can be effected by a dynamic factor, for example by reaction with atmospheric oxygen.
- the security feature could initially be in a protected form, for example, covered by a
- the security feature By peeling off the security film, the security feature is activated by reacting a substance with oxygen in the air, causing it to change. Preferably, the change takes place over a longer period of time, so that a dynamic state exists between several query times.
- the security feature may in another variant also be a three-dimensional structure or a three-dimensional code having regions that dynamically change due to a dynamic factor while other regions in that structure or code remain unchanged.
- the alteration of the static security feature into a dynamic security feature takes place physically, chemically, chemically, biologically, mechanically, magnetically or by behavior and that the change involves waxing, shrinking, supplementation, shortening, replacement, distortion, equalization , adding, removing, changing a physical value, converting or recalculating one or more elements or values whose properties or geometries comprise.
- a manifestation of the altered dynamic is
- Security feature stored in a central or local storage means at the last successful polling time.
- the deposited security feature with a newly transmitted security feature of the person to be authenticated, the object, the service system or the Computer program compared.
- the authentication and / or identification run / runs positive if the changed dynamic security feature and the transmitted security feature at least partially differ
- the security feature can be stored in different forms in the storage means.
- the security feature can be converted before, during or after the change into a code or digital information and as such (r) deposited in a storage means. For example, a photograph or scan of a fingerprint may be converted to digital information. This digital information can in turn be distorted, leaving a dynamic
- Safety information arises. Characteristic of this is that the change develops further and that at each polling time the security information stored in the storage means is replaced by the newly transmitted security information.
- the storage means used can be executed either centrally, locally or mobile and
- the unchanged static security features and the changed dynamic security features are stored either directly or indirectly in a central and a local database, wherein the dynamic characteristics in at least one of the databases by a dynamic factor between two query times changed and the query time with that in the other Database
- deposited dynamic security feature is compared.
- the dynamic security features are not reversible, i. not reversible. Therefore, a potential attacker can not deduce a particular person, item, service system, or computer program based on the dynamic security feature.
- Security information can be converted back to the original static security information. This "reset" creates a new initial state. By choosing the reset time, additional security is created.
- the static security feature is in an initial state, in which the security feature does not change and then by a physical, chemical or mechanical influence in a dynamic
- the invention further relates to an authentication system for retrieving at least one security feature and a central and / or local storage means, in which the at least one security feature is stored, which consists of static and
- static security feature is associated with a person, an item or a service system.
- the dynamic security feature emerges from the static security feature and is physically, chemically, biologically, mechanically, magnetically or behaviorally changeable between two polling times.
- the security feature is a material, a
- Apparatus a substance or a mixture of substances or a physical or chemical property of a material, device, substance or mixture in which at least one component changes between two sampling times, the change being a growth, a shrinking, an extension, a
- only the dynamic security feature is readable by the interrogator.
- the interrogator it may be provided that only a part of the original security feature is converted into a dynamic security feature, for example it can be provided that a protective coating conceals the dynamic security feature.
- the underlying layer activates and forms dynamic, continuously evolving structures that are separated from one another
- Read-out device are scanned.
- Security feature is coated with a protective layer, which does not allow scanning by the interrogator.
- the method according to the invention is applicable to all rigid security features which can be converted or changed according to the invention via a dynamic factor into a dynamic, continuously changing security feature.
- the decisive factor is that the change takes place in a way that is not predictable for a potential counterfeiter and in which the product differs from the original state.
- a fingerprint is shown as a conventional rigid security feature.
- the individual structure of the fingerprint can be assigned to a specific person so that they can authenticate via a fingerprint scan.
- the invention is now based on this and provides that the static fingerprint is changed by a local factor in an unpredictable manner.
- a first change provides for the appearance of the fingerprint to be split into a plurality of elements (e.g., two elements), with the two elements being translated.
- the distances b and c of the two halves of the security feature are determined by the dynamic factor.
- the image file can be used as a local dynamic factor depending on the battery state of charge of a mobile phone in which the security feature is stored.
- the distances b and c of the fingerprint change.
- the fingerprint can also be recalculated due to a locally dynamic factor, for example by
- FIG. 2 an arbitrary three-dimensional structure is shown, which may represent, for example, a three-dimensional 3-D code.
- the 3-D code may be coded in an X, Y and Z direction.
- individual positions or spatial elements of the code can encode information within a plane.
- additional information can be encoded in the depth of the elements.
- the change may be such that the structures change, at least in some areas, for example, by a displacement of a plane or a structural profile in the X, Y or Z direction.
- the entire element or at least the safety-relevant subarea would be scanned and, after successful
- Pre-authentication is transmitted to the authentication device.
- Authentication device checks whether a change compared to the last stored appearance has taken place. If there is a change and the other features match, the user is positively authenticated. The transmitted dynamic security feature is then stored as a new security feature in the storage means and serves as a reference for the next query.
- Fig. 2A shows the initial state of a 3-D code which is in a static form. In Fig. 2B, the structure of the 3-D code has partially changed. The
- FIG. 2C shows the initial state
- FIG. 2D the dynamically changed state
- FIG. 3 shows an example of a security element in which the dynamic state is generated starting from an unstructured surface.
- the interface can be activated to a dynamic security feature, for example by the surface is coated with a protective varnish, which protects the underlying surface from a change.
- a protective varnish which protects the underlying surface from a change.
- This change can be made, for example, by reaction with
- Atmospheric oxygen are effected.
- the respective development status of the dynamic pattern thus obtained is updated in the database.
- a surface is coated with a protective varnish.
- the surface continues to develop, forming cracks, cavities or grooves in the surface, for example, which continue to evolve.
- This dynamic state is shown in Fig. 3B. The change of the surface of the
- Security element can either be continuous or only when an authentication request is made.
- a scanning device the surface of the material can be read and stored in a storage means.
- the surface has at least partially developed further, so that this current appearance of the security element can be stored in the storage means and serve as the basis for the next authentication.
- Fig. 4 is a flowchart of an embodiment of the invention
- a dynamic feature is regenerated from a static feature and the local, dynamic factor.
- a request is started, which is triggered locally, for example via a software.
- a static factor is requested, for example a static, biometric feature.
- the static biometric feature or parts thereof are converted or changed into a local, dynamic, unpredictable security feature. This creates a new dynamic security feature.
- the new dynamic security feature is used to authenticate to one
- FIG. 5 shows a second variant of the method according to the invention.
- a new dynamic material is generated from the last dynamic material and the local, dynamic factor.
- a locally triggered request is made (eg via a software, app), whereby the existing dynamic feature is requested.
- the request is made for the current dynamic factor, which alters the last dynamic feature, creating a new dynamic security feature.
- the dynamic change only takes place with the query, ie the security feature does not have to be constantly dynamic change.
- the new dynamic security feature is then transmitted to the authentication device and, if the authentication is positive, the release is made to the service provider.
- FIG. 6 shows a third variant in which the new dynamic feature is generated from the last dynamic feature and the local dynamic factor.
- the dynamic feature is called and the state of the feature prevailing at that time is used as a new dynamic security feature.
- the dynamic change of the security feature takes place permanently in the background, whereas in the second variant (FIG. 5) the change of the dynamic security feature takes place only during the request. This change is preferably triggered by the dynamic factor.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Data Mining & Analysis (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102014004348.7A DE102014004348A1 (en) | 2014-03-27 | 2014-03-27 | security procedures |
PCT/EP2015/055623 WO2015144508A1 (en) | 2014-03-27 | 2015-03-18 | Security method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3123452A1 true EP3123452A1 (en) | 2017-02-01 |
Family
ID=52781024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP15712306.8A Withdrawn EP3123452A1 (en) | 2014-03-27 | 2015-03-18 | Security method |
Country Status (7)
Country | Link |
---|---|
US (1) | US10055912B2 (en) |
EP (1) | EP3123452A1 (en) |
CN (1) | CN106415597B (en) |
CA (1) | CA2943846C (en) |
DE (1) | DE102014004348A1 (en) |
RU (1) | RU2688258C2 (en) |
WO (1) | WO2015144508A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013191913A1 (en) * | 2012-06-20 | 2013-12-27 | Apple Inc. | Compression and obfuscation of three-dimensional coding |
WO2015124696A1 (en) * | 2014-02-20 | 2015-08-27 | Friedrich Kisters | Method and device for identifying or authenticating a person and/or an object using dynamic acoustic security information |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4998279A (en) * | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
GB2265482B (en) | 1992-03-28 | 1995-07-26 | Pektron Ltd | Improvements in data transmission |
US6442276B1 (en) * | 1997-07-21 | 2002-08-27 | Assure Systems, Inc. | Verification of authenticity of goods by use of random numbers |
CN1403941A (en) * | 2001-09-03 | 2003-03-19 | 王柏东 | A method of combining password and biometric technology for security authentication |
DE10304805A1 (en) | 2003-02-05 | 2004-08-19 | Informium Ag | Process for the production of security labels |
DE102006059865B4 (en) * | 2006-12-15 | 2021-01-07 | Bundesdruckerei Gmbh | Document with a security feature |
DE102009033221A1 (en) | 2009-07-14 | 2011-01-27 | Human Bios Gmbh | Security element for marking or identification of objects and living beings |
DE102009039190A1 (en) | 2009-08-28 | 2011-03-03 | Human Bios Gmbh | Procedure for access control or authorization of an action |
DE102010009977A1 (en) | 2010-03-03 | 2011-09-08 | Giesecke & Devrient Gmbh | Security element with aligned magnetic pigments |
US8360317B2 (en) * | 2010-06-21 | 2013-01-29 | Victor Zazzu | Apparatus and method for enhancing card security |
CN103270539B (en) * | 2010-12-22 | 2016-12-21 | 尤尼卡技术股份有限公司 | For the certification method and apparatus of the file of light-induced variable colour system system labelling |
DE102011101711B4 (en) * | 2011-05-17 | 2022-11-10 | Deutsche Telekom Ag | Authentication Procedures |
DE102011055297B4 (en) | 2011-11-11 | 2013-08-14 | Rainer Dahlmann | Method and network system and authentication device for authentication in a network application |
US20140263624A1 (en) * | 2013-03-14 | 2014-09-18 | NagralD Security, Inc. | Radio Frequency Powered Smart, Debit, and Credit Card System Employing A Light Sensor To Enable Authorized Transactions |
-
2014
- 2014-03-27 DE DE102014004348.7A patent/DE102014004348A1/en not_active Withdrawn
-
2015
- 2015-03-18 EP EP15712306.8A patent/EP3123452A1/en not_active Withdrawn
- 2015-03-18 CN CN201580026818.3A patent/CN106415597B/en active Active
- 2015-03-18 CA CA2943846A patent/CA2943846C/en active Active
- 2015-03-18 WO PCT/EP2015/055623 patent/WO2015144508A1/en active Application Filing
- 2015-03-18 US US15/129,772 patent/US10055912B2/en active Active
- 2015-03-18 RU RU2016141952A patent/RU2688258C2/en active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013191913A1 (en) * | 2012-06-20 | 2013-12-27 | Apple Inc. | Compression and obfuscation of three-dimensional coding |
WO2015124696A1 (en) * | 2014-02-20 | 2015-08-27 | Friedrich Kisters | Method and device for identifying or authenticating a person and/or an object using dynamic acoustic security information |
Non-Patent Citations (1)
Title |
---|
See also references of WO2015144508A1 * |
Also Published As
Publication number | Publication date |
---|---|
CA2943846C (en) | 2023-03-14 |
RU2688258C2 (en) | 2019-05-21 |
DE102014004348A1 (en) | 2015-10-15 |
WO2015144508A1 (en) | 2015-10-01 |
US20170132857A1 (en) | 2017-05-11 |
US10055912B2 (en) | 2018-08-21 |
CN106415597B (en) | 2020-07-31 |
CN106415597A (en) | 2017-02-15 |
RU2016141952A3 (en) | 2018-10-01 |
CA2943846A1 (en) | 2015-10-01 |
RU2016141952A (en) | 2018-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2940620B1 (en) | Derivation of a device-specific value employing an unclonable function | |
DE102007034413B4 (en) | Method and device for authenticating a user | |
WO2011113478A1 (en) | Authentication system, method for authenticating an object, apparatus for producing an identication device, method for producing an identification device | |
EP3189465B1 (en) | Method and authentication system for registration of a random security feature | |
WO2007090437A1 (en) | Protection system, protection method and an element protected in this way | |
DE19940341A1 (en) | Data protection procedures | |
EP3123401B1 (en) | Authentication system | |
DE60223636T2 (en) | Secure identification through biometric data | |
WO2011054337A1 (en) | Method for authenticating a user on a computing unit | |
EP3497615A1 (en) | Method for handwritten electronic signature | |
WO2012113901A2 (en) | Method for publicly providing protected electronic documents | |
WO2020120001A1 (en) | Method for determining an identity of a product by detecting an optically visible and a non-visible feature, and identification system | |
DE102013203436A1 (en) | Generate a key to provide permission information | |
DE102014004347A1 (en) | Authentication method and authentication system | |
EP3062255A1 (en) | Licensing of software products | |
EP3123452A1 (en) | Security method | |
WO2017060438A1 (en) | Authentication method for article identifiers | |
DE602004012845T2 (en) | METHOD, COMPUTER PROGRAM PRODUCTS AND DEVICE FOR CHECKING THE IDENTITY | |
DE60120134T2 (en) | LOG IN | |
WO2018178087A1 (en) | Biometry-supported object binding | |
DE112021008385T5 (en) | BIOMETRIC AUTHENTICATION DEVICE, BIOMETRIC AUTHENTICATION METHOD AND BIOMETRIC AUTHENTICATION PROGRAM | |
DE102014018889A1 (en) | Method and apparatus for securely storing and accessing data | |
EP3356980B1 (en) | Method and device for authentication of an objecct or of a person by means of a modularly constructed security element | |
EP4116849A1 (en) | Computer implemented method for managing a data set comprising security-relevant information | |
DE102023114810A1 (en) | Authentication device for activating a locked device, device and method for activating a locked device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20161025 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20191118 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20220223 |