WO2006029758A1 - Tragbares gerät zur freischaltung eines zugangs - Google Patents
Tragbares gerät zur freischaltung eines zugangs Download PDFInfo
- Publication number
- WO2006029758A1 WO2006029758A1 PCT/EP2005/009670 EP2005009670W WO2006029758A1 WO 2006029758 A1 WO2006029758 A1 WO 2006029758A1 EP 2005009670 W EP2005009670 W EP 2005009670W WO 2006029758 A1 WO2006029758 A1 WO 2006029758A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- portable device
- access
- terminal
- computer network
- user
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the invention relates to a portable device for enabling access in or via a computer network. Furthermore, the invention relates to a system and a method for enabling access in or via a computer network.
- HBCI Home Banking Computer Interface
- PIN Personal Identification Number
- TAN Transaction Number
- a system for limiting access to a computer which has an authentication gateway through which the user can access the computer.
- the authentication Gateway receives one or more access codes from the user to authenticate the identity of the user.
- the authentication gateway provides the computer with one or more authenticated access codes so that the user can access the computer.
- the invention has for its object to provide a secure, comfortable and as universally available activation of access in or over a computer network.
- the inventive designed portable device for enabling access in or via a computer network to which a terminal is at least temporarily connected, are functionalities for Einbin ⁇ tion of the portable device in a communication path between the terminal and the computer network, for the authentication of a user and Provision of access data for the activation of access implemented.
- the invention has the advantage that the access data need not be known to the user, since they are each provided by the portable device. This is particularly advantageous when multiple accesses with different access data are to be unlocked. Also in this case, the user only has to be able to authenticate himself to the portable device and then has the possibility to unlock the desired access with the portable device. For this activation no manual inputs of the user are required, so that there is a Zeiter ⁇ saving. This ease of use is not at the expense of security, since the authentication of the user to the portable device, which is a prerequisite for the activation, can be made very secure.
- a further advantage of the invention is that the user can carry the portable device with him and thus can unlock access from any terminal. It is not necessary to install special software for the use of the portable device on the device. In particular, no special interface or an additional device tuned to the desired access is required. This reduces the effort and increases the flexibility of using the portable device.
- the use of the portable device results in no additional effort on the part of the provider of a service to which access is to be gained since the conventional device for the activation of access is formed by the portable device with respect to the provider. Thus, only a single access portal must be provided and maintained, which can be used equally with or without the portable device.
- the user independently of the requirements that have to be fulfilled for the activation of the access, can himself determine via the use of a suitably designed portable device which prerequisites he has for obtaining the access. must bring. As a result, his preferences and his security needs can be optimally taken into account.
- the portable device also increases system security because users are no longer tempted to write their access data, to use it multiple times for different accesses or to store it in an unsecured environment.
- the portable device may be personally associated with a user or a group of users. This leads to a further increase in the security, because for the use of the portable device both its possession and a correct authentication is required. In addition, the damage is limited in the case of a successful attack on an abusive use of the access data of a user or a user group.
- the portable device has a sensor device for detecting a biometric feature. This makes it possible to carry out the authentication of the user with respect to the portable device exclusively or additionally on the basis of the biometric feature.
- a server program is preferably implemented.
- the portable device is operable as a proxy server.
- the access data can be stored in the portable device protected against access. It is also possible that the access data can be generated with the portable device. In both cases, a high level of security can be achieved. It is particularly advantageous if autonomous measures for the activation of the access can be carried out by the portable device. As a result, a fast and reliable activation of the access can be realized.
- the portable device is configurable with regard to the access that can be unlocked thereby or the accesses that can be unlocked with it. This ensures universal usability of the portable device. Due to the configuration, the modalities for providing the access data and / or the content of the access data may be determinable. In this case, the configuration can be created by means of a manual and / or software-supported execution of at least part of the process when the access is activated. This allows a simple and comfortable creation of the configuration.
- a main field of application of the invention is in the area of the Internet, i. H.
- the computer network is preferably the Internet.
- the portable device is preferably designed as a chip card.
- a smart card meets high security standards, can be easily carried by the user and is available at low cost.
- the system according to the invention for enabling access in or via a computer network has a terminal which is at least temporarily connected to the computer network and a portable device.
- the portable device are functionalities for integrating the portable device in a communication path between the terminal and the Computer network, for the authentication of a user and for providing access data for the activation of the access implemen ⁇ ted.
- the invention further relates to a method for activating access in or via a computer network to which an end device is connected at least temporarily.
- a data connection is established between the terminal and a portable device for providing access data, the portable device being in a communication path between the terminal and the terminal
- Integrated computer network carried out by the portable device authentication of a user and causes the successful activation of Be ⁇ user from the portable device using the access data activation of the access.
- the terminal may use the same software with which it also communicates in the computer network or software stored on the portable device for communication with the portable device. In both cases, there is no need for additional software that has to be installed specifically for the communication with the portable device on the terminal.
- the authentication of the user to the portable device required in the context of the method according to the invention can be achieved by means of secret information which is entered into the terminal device and / or by means of a biometric feature of the user detected by the portable device or to others known manner done.
- the procedure for the activation of the access for the user not visible.
- the activation of the access is in particular caused by an entry made by the portable device entry of the access data in an input field or multiple input fields of an access page.
- access to data or an application can be enabled.
- FIG. 1 is a schematic block diagram of an arrangement with the access to be unlocked in the inventive manner
- FIG. 2 shows a schematic block diagram of the arrangement from FIG. 1 at the beginning of the activation method according to the invention
- FIG. 3 is a block diagram corresponding to FIG. 2 at a later time during the activation method according to the invention
- FIG. 4 shows a block diagram corresponding to FIG. 2 at an even later time during the activation method according to the invention
- FIG. 5 shows a flowchart for illustrating a possible procedure in the configuration of the portable device.
- Fig. 1 shows a schematic block diagram for an arrangement with which an access to be unlocked in the inventive manner. Shown are a terminal 1, a portable device 2, a computer 3 of a service provider and a computer network 4. With the terminal 1, which is hier ⁇ at least temporarily connected to the computer network 4, access to an application or data to be obtained, which are available via the computer 3. The computer 3 is likewise connected to the computer network 4 or is part of the computer network 4.
- the terminal 1 is, for example, a Personalcompu ⁇ ter, a telephone, a personal digital assistant, etc.
- the terminal 1 executes a browser program 5, which is optionally installed on the terminal 1 or stored in the portable device 2 and from loaded there in the terminal 1.
- the terminal 1 may comprise a keyboard and a display, which are not shown figuratively.
- the portable device 2 is personally associated with a single user or a group of users and embodied, for example, as a smart card or a token. In the portable device 2 secret access data are stored access protected. Alternatively or additionally, the terminal 1 or even the portable device 2 is able to generate access data.
- a server program 6 is executed, by means of which the portable device 2 has the function of a proxy server, via which the communication between the terminal 1 and the computer 3 is handled.
- a server program 7 is installed on the computer 3, which is operated, for example, by a bank as a service provider.
- a server program 7 is installed on the computer 3, which is operated, for example, by a bank as a service provider.
- the computer network 4 may be, in particular, the Internet.
- access to other services or information can also be enabled in the invention, and other computer networks 4 than the Internet can also be used.
- the terminal 1 and the portable device 2 are connected to one another via a first communication channel 8, so that the browser program 5 of the terminal 1 and the server program 6 of the portable device 2 can communicate with one another.
- the terminal 1 and the portable device 2 can be connected, for example, via a USB connection.
- USB stands for Universal Serial Bus. If the portable device 2 is designed as a chip card with a contact field, the connection is made by contacting the contact field by a contacting device of the terminal 1.
- there is a multiplicity of further possibilities by means of galvanic contacting or wirelessly a data connection between the terminal 1 and the portable device 2 and thereby form the first communication channel 8.
- the portable device 2 Via a second communication channel 9, the portable device 2 is connected to the computer 3. Since the physical connection to the computer network 4 is usually via the terminal 1, the second communication channel 9 runs from the portable device 2 via the terminal 1 and from there further via the computer network 4 to the computer 3. A direct connection of the portable Device 2 to the computer network 4 is also conceivable.
- the terminal 1 does not communicate directly with the computer 3 via the computer network 4, but, as dictated by the two communication channels 8 and 9, indirectly via the portable device 2, which is operated for this purpose as a proxy server.
- the data transfer takes place via the Hypertext Transfer Protocol HTTP.
- the portable device 2 is included in the communication between the terminal 1 and the computer 3 in the context of the already existing software, so that for the use of the portable device 2 on the terminal 1 no special additional software must be installed. Also on the computer 3 no additional software must be installed.
- a direct network access from the terminal 1 to the computer network 4 may continue to be possible in parallel.
- Fig. 2 shows a schematic block diagram of the arrangement of Fig. 1 at the beginning of the invention Freischal processing method. Instead of the communication channels 8 and 9, the information flow is shown during a subsection of the invention Freischal processing method. This also applies to FIGS. 3 and 4.
- the user connects his portable device 2 to the terminal 1, from which access to the Internet banking is to take place. Furthermore, the user starts the browser program 5 of the terminal 1, which is installed in a suitable configuration on the terminal 1 or is loaded by the portable device 2 and the portable device 2 responds as a proxy server. Likewise, the user starts a program that opens the second communication channel 9, via which the server program 6 of the portable device 2 with the computer network 4 and thus also with the computer 3 can connect. If a suitable usable channel is already part of the installed operating system, this measure can be omitted. In addition, the program can also serve to open or suitably configure the first communication channel 8.
- the user calls by an appropriate input to the terminal 1, an access page to the Internet banking of his bank, for example, interrogate his account balance.
- the access page is shown in Fig. 3 and designated therein by the reference numeral 12.
- the browser program 5 of the terminal 1 forwards the request to the portable device 2. This is shown in Fig. 2 by an arrow designated Dl arrow from the terminal 1 to the portable device 2.
- the other information flow between the terminal 1, the portable device 2 and the computer 3 in FIGS. 2, 3 and 4 is also represented by arrows, which respectively indicate the direction of the information flow.
- the portable device 2 transmits the browser program 5 of the terminal 1 as data D2 a stored authentication page 10 on which the user is asked, his PIN, ie his personal identification number for the portable device. 2 enter in an input field 11 ein ⁇ .
- a possible embodiment of this authentication page 10 is shown in Fig. 2.
- the PIN is required for an authentication of the user to the portable device 2, by means of which the use of the portable device 2 by unauthorized third parties is to be prevented.
- authentication by means of a biometric feature is also possible.
- the portable device 2 may be equipped with a biometric sensor, for example with a fingerprint sensor.
- the further Sequence of the activation method according to the invention is shown in Fig. 3 Darge.
- FIG. 3 shows a block representation corresponding to FIG. 2 at a later time during the activation method according to the invention.
- this is transmitted from the terminal 1 as data D3 to the portable device 2.
- the portable device 2 checks whether the received PIN is correct and thus the authentication has been successful.
- the portable device 2 calls autonomously, d. H.
- the request is shown in FIG. 3 as data D4 and is preferably performed so that this process is not brought to the attention of the user.
- the transmission of the request runs, like the entire other communication between the portable device 2 and the computer 3, via the network connection of the terminal 1.
- the terminal 1 does not affect the communication but merely serves to forward the data.
- the computer 3 transmits the access page 12 as the data D5 to the portable device 2.
- the access side 12 received by the portable device 2 is shown in FIG.
- the access side 12 has two input fields 11 into which an account number and a PIN of the user for the Internet banking are to be entered. This PIN is unrelated to the PIN for the use of the portable device 2 and usually has a different value.
- the portable device 2 fills the input fields 11 independently and in particular without the user's knowledge. For this purpose, the portable device 2 resorts to secret information stored in a secure environment of the portable device. 2 are stored. It is thus not necessary for the user to know the information required for the input fields 11. The user only has to know the information required for the authentication with respect to the portable device 2. Finally, the steps illustrated in FIG. 4 of the activation method according to the invention are carried out.
- the portable device 2 can check whether the access page and / or other pages on the computer 3 have changed and, if appropriate, refuse to enter the access data.
- the portable device 2 checks, for example based on a hash value, whether a page has changed since the last call, since the first call or since the configuration of the portable device.
- FIG. 4 shows a block representation corresponding to FIG. 2 at a later point in time during the activation method according to the invention.
- the portable device 2 sends the filled-in access page 12 back to the computer 3 as data D6. This checks the data entered in the input fields 11. If the data is correct, the computer 3 unlocks access to Internet banking. As an action in Internet banking, the computer 3 transmits to the bank a results page 13, on which the account balance of the user is displayed, as data D7 to the portable device 2. The portable device 2 then transmits the results page 13 as data D8 to the terminal device 1.
- the terminal 1 displays the received result page 13, for example in the form shown in FIG. 4, to the user.
- the user can request further information from the computer 3 by means of a corresponding input to the terminal device 1 via the portable device 2, or carry out transactions, such as transfers, for example.
- the transmission of a transaction number, short TAN to be required to authorize the transaction.
- a TAN can only be used once for a transaction and is then no longer valid.
- the portable device 2 can be designed such that it generates the respectively required TAN with the aid of a one-time password generator.
- the portable device 2 can read the TAN from a list stored in the secure environment in the portable device 2. In both cases, the TAN is in each case entered into the designated input field 11 on a page of the bank transmitted for this purpose by the computer 3 to the portable device 2.
- a prerequisite for this is that there is a legitimate use of the portable device 2, ie that an authentication of the user to the portable device 2 has been successfully carried out previously.
- a configuration is required at least once beforehand. As part of the configuration, it is determined which input fields 11 are filled with which data. This can be realized, for example, via scripts. The procedure for the configuration will be explained with reference to FIG. 5 by way of example for the access page 12. Alternatively, the configuration data, for example as a script, can also be provided by the service provider on the Internet site.
- FIG. 5 shows a flow chart for illustrating a possible procedure in the configuration of the portable device 2.
- a configuration program is executed externally or on the portable device 2.
- the configuration program is executed partly externally and partly on the portable device 2.
- the external execution can take place, for example, on a personal computer.
- the configuration of the configuration described below also requires manual input from the user. In principle, a fully automatic or fully manual configuration is possible.
- step Sl in which the access page 12 is loaded, which is to be filled automatically by the portable device 2 aus ⁇ .
- step S1 is followed by a step S2, in which the input fields 11 of the access page 12 to be filled in are selected by the user of the configuration program.
- step S3 executed, in which the data to be entered into the input fields 11 of the access page 12, the user of the configuration program.
- step S4 in which, based on an analysis of the access page 12, the selected input fields 11 and the data provided for the input fields 11, a data set z. B. in the form of one or more scripts is generated.
- the portable device 2 can automatically enter the data into the input fields 11 in future calls to the access page 12 in its function as a proxy server.
- the flow of the flowchart is finished, and the configuration of the portable device 2 for the access side 12 is completed.
- the configuration for further access pages 12 can be performed.
- this device is capable of carrying out complex authentication methods, such as challenge-response methods, public-key methods, etc., as part of the activation of the access.
- the credentials may optionally be retrieved from the portable device, such as after user input of a parent PIN or other user authentication. This option may be helpful in reconfiguring the portable device, or in case it is needed for direct access to a service - without using the portable device.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007531645A JP5049127B2 (ja) | 2004-09-14 | 2005-09-08 | アクセス有効化用の携帯装置 |
US11/662,655 US8438620B2 (en) | 2004-09-14 | 2005-09-08 | Portable device for clearing access |
CN200580038829XA CN101057203B (zh) | 2004-09-14 | 2005-09-08 | 用于激活访问的便携设备 |
EP05785243A EP1792248A1 (de) | 2004-09-14 | 2005-09-08 | Tragbares gerät zur freischaltung eines zugangs |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102004044454A DE102004044454A1 (de) | 2004-09-14 | 2004-09-14 | Tragbares Gerät zur Freischaltung eines Zugangs |
DE102004044454.4 | 2004-09-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006029758A1 true WO2006029758A1 (de) | 2006-03-23 |
Family
ID=35462110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2005/009670 WO2006029758A1 (de) | 2004-09-14 | 2005-09-08 | Tragbares gerät zur freischaltung eines zugangs |
Country Status (6)
Country | Link |
---|---|
US (1) | US8438620B2 (de) |
EP (1) | EP1792248A1 (de) |
JP (1) | JP5049127B2 (de) |
CN (1) | CN101057203B (de) |
DE (1) | DE102004044454A1 (de) |
WO (1) | WO2006029758A1 (de) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008046575A1 (de) | 2006-10-16 | 2008-04-24 | Giesecke & Devrient Gmbh | Verfahren zum ausführen einer applikation mit hilfe eines tragbaren datenträgers |
DE102007026870A1 (de) | 2007-06-11 | 2008-12-18 | Giesecke & Devrient Gmbh | Ressourcenzugriff unter Vermittlung durch ein Sicherheitsmodul |
EP2377012A2 (de) * | 2009-01-13 | 2011-10-19 | Human Interface Security Ltd. | Sicherer umgang mit identifikations-tokens |
EP2783335A1 (de) * | 2011-11-25 | 2014-10-01 | Giesecke & Devrient GmbH | Verfahren zur durchführung einer elektronischen transaktion zwischen einem mobilen endgerät und einem terminal |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002236667A (ja) * | 2001-02-09 | 2002-08-23 | Sony Corp | 認証方法、認証システム、認証装置および認証用モジュール |
EP1849119B1 (de) * | 2005-02-18 | 2019-07-10 | EMC Corporation | Derivative samen |
US20080244272A1 (en) * | 2007-04-03 | 2008-10-02 | Aten International Co., Ltd. | Hand cryptographic device |
DE102008025660A1 (de) * | 2008-05-13 | 2009-11-19 | Deutsche Telekom Ag | Vorrichtung zur mobilen Datenverarbeitung |
DE102009016532A1 (de) * | 2009-04-06 | 2010-10-07 | Giesecke & Devrient Gmbh | Verfahren zur Durchführung einer Applikation mit Hilfe eines tragbaren Datenträgers |
US8710953B2 (en) * | 2009-06-12 | 2014-04-29 | Microsoft Corporation | Automatic portable electronic device configuration |
US8443202B2 (en) | 2009-08-05 | 2013-05-14 | Daon Holdings Limited | Methods and systems for authenticating users |
US7685629B1 (en) | 2009-08-05 | 2010-03-23 | Daon Holdings Limited | Methods and systems for authenticating users |
US7865937B1 (en) | 2009-08-05 | 2011-01-04 | Daon Holdings Limited | Methods and systems for authenticating users |
US8826030B2 (en) | 2010-03-22 | 2014-09-02 | Daon Holdings Limited | Methods and systems for authenticating users |
EP2405374A1 (de) * | 2010-07-06 | 2012-01-11 | Gemalto SA | Tragbare Vorrichtung zum Zugreifen auf einen Server, entsprechendes System, entsprechender Server und entsprechendes Verfahren |
US20120023139A1 (en) * | 2010-07-22 | 2012-01-26 | Samsung Electronics Co. Ltd. | Intelligent attached storage |
JP5970547B2 (ja) * | 2011-07-14 | 2016-08-17 | ジョンソン コントロールズ テクノロジー カンパニーJohnson Controls Technology Company | ネットワークベースのコンテンツを車両内テレマティクスシステムに提供するためのシステムおよび方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002023367A1 (en) | 2000-09-14 | 2002-03-21 | Gemplus | Smart device facilitating computer network interaction |
US20030051173A1 (en) * | 2001-09-10 | 2003-03-13 | Krueger Steven J. | Computer security system |
US20030158891A1 (en) * | 2002-02-21 | 2003-08-21 | Warp 9 Inc. | Utilizing mobile devices as a communication proxy for non-connected terminals |
US20040123106A1 (en) * | 2002-08-27 | 2004-06-24 | Lexent Technologies, Inc. | Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0757336B1 (de) * | 1995-08-04 | 2000-11-22 | Belle Gate Investment B.V. | Datenaustauschlsysteme mit tragbaren Datenverarbeitungseinheiten |
WO2001003392A1 (en) * | 1999-07-01 | 2001-01-11 | Koninklijke Philips Electronics N.V. | Voice-over-ip gateway |
US7505941B2 (en) * | 1999-08-31 | 2009-03-17 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions using biometrics |
WO2001042938A1 (fr) * | 1999-12-10 | 2001-06-14 | Fujitsu Limited | Systeme d'authentification personnelle et dispositif electronique portatif a fonction d'authentification personnelle utilisant des informations physiques |
FR2805107B1 (fr) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | Procede de gestion de transmissions de donnees multimedias via un reseau de type internet, notamment de donnees telephoniques, et carte a puce pour la mise en oeuvre du procede |
FR2805108B1 (fr) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | Procede d'enregistrement d'un usager sur un serveur d'annuaire d'un reseau de type internet et/ou de localisation d'un usager sur ce reseau, et carte a puce pour la mise en oeuvre du procede |
GB2362069A (en) * | 2000-05-03 | 2001-11-07 | Motorola Inc | Optimising communication wherein a transmission procedure is determined according to information about the environment in which a mobile station is located |
US7565326B2 (en) * | 2000-05-25 | 2009-07-21 | Randle William M | Dialect independent multi-dimensional integrator using a normalized language platform and secure controlled access |
US6717801B1 (en) * | 2000-09-29 | 2004-04-06 | Hewlett-Packard Development Company, L.P. | Standardized RF module insert for a portable electronic processing device |
GB2370383A (en) * | 2000-12-22 | 2002-06-26 | Hewlett Packard Co | Access to personal computer using password stored in mobile phone |
KR100458516B1 (ko) * | 2001-12-28 | 2004-12-03 | 한국전자통신연구원 | 웹-리소스 불법 변경 감지 장치 및 그 방법 |
US8027635B2 (en) * | 2002-05-22 | 2011-09-27 | Hewlett-Packard Development Company, L.P. | Relaying third party wireless communications through a portable wireless system |
US20040123113A1 (en) * | 2002-12-18 | 2004-06-24 | Svein Mathiassen | Portable or embedded access and input devices and methods for giving access to access limited devices, apparatuses, appliances, systems or networks |
JP3989383B2 (ja) * | 2003-02-06 | 2007-10-10 | 富士通株式会社 | 情報処理装置、情報処理システム、プログラム、ゲートウェイカード、ゲートウェイ装置およびゲートウェイ制御プログラム |
US7392534B2 (en) * | 2003-09-29 | 2008-06-24 | Gemalto, Inc | System and method for preventing identity theft using a secure computing device |
US7577659B2 (en) * | 2003-10-24 | 2009-08-18 | Microsoft Corporation | Interoperable credential gathering and access modularity |
US8205793B2 (en) * | 2007-03-31 | 2012-06-26 | Dror Oved | Banking transaction processing system |
-
2004
- 2004-09-14 DE DE102004044454A patent/DE102004044454A1/de not_active Withdrawn
-
2005
- 2005-09-08 WO PCT/EP2005/009670 patent/WO2006029758A1/de active Application Filing
- 2005-09-08 EP EP05785243A patent/EP1792248A1/de not_active Ceased
- 2005-09-08 JP JP2007531645A patent/JP5049127B2/ja not_active Expired - Fee Related
- 2005-09-08 US US11/662,655 patent/US8438620B2/en active Active
- 2005-09-08 CN CN200580038829XA patent/CN101057203B/zh not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002023367A1 (en) | 2000-09-14 | 2002-03-21 | Gemplus | Smart device facilitating computer network interaction |
US20030051173A1 (en) * | 2001-09-10 | 2003-03-13 | Krueger Steven J. | Computer security system |
US20030158891A1 (en) * | 2002-02-21 | 2003-08-21 | Warp 9 Inc. | Utilizing mobile devices as a communication proxy for non-connected terminals |
US20040123106A1 (en) * | 2002-08-27 | 2004-06-24 | Lexent Technologies, Inc. | Apparatus and methods for motion and proximity enhanced remote identity broadcast with biometric authentication |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008046575A1 (de) | 2006-10-16 | 2008-04-24 | Giesecke & Devrient Gmbh | Verfahren zum ausführen einer applikation mit hilfe eines tragbaren datenträgers |
EP2393032A1 (de) | 2006-10-16 | 2011-12-07 | Giesecke & Devrient GmbH | Verfahren zum Ausführen einer Applikation mit Hilfe eines tragbaren Datenträgers |
DE102007026870A1 (de) | 2007-06-11 | 2008-12-18 | Giesecke & Devrient Gmbh | Ressourcenzugriff unter Vermittlung durch ein Sicherheitsmodul |
EP2377012A2 (de) * | 2009-01-13 | 2011-10-19 | Human Interface Security Ltd. | Sicherer umgang mit identifikations-tokens |
EP2377012A4 (de) * | 2009-01-13 | 2012-07-04 | Human Interface Security Ltd | Sicherer umgang mit identifikations-tokens |
EP2783335A1 (de) * | 2011-11-25 | 2014-10-01 | Giesecke & Devrient GmbH | Verfahren zur durchführung einer elektronischen transaktion zwischen einem mobilen endgerät und einem terminal |
Also Published As
Publication number | Publication date |
---|---|
US20080244720A1 (en) | 2008-10-02 |
US8438620B2 (en) | 2013-05-07 |
CN101057203A (zh) | 2007-10-17 |
DE102004044454A1 (de) | 2006-03-30 |
JP5049127B2 (ja) | 2012-10-17 |
EP1792248A1 (de) | 2007-06-06 |
JP2008513860A (ja) | 2008-05-01 |
CN101057203B (zh) | 2010-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE19722424C5 (de) | Verfahren zum Sichern eines Zugreifens auf ein fernab gelegenes System | |
DE102007033812B4 (de) | Verfahren und Anordnung zur Authentifizierung eines Nutzers von Einrichtungen, eines Dienstes, einer Datenbasis oder eines Datennetzes | |
DE60131534T2 (de) | Umfassender Authentifizierungsmechanismus | |
WO2006029758A1 (de) | Tragbares gerät zur freischaltung eines zugangs | |
DE60219849T2 (de) | Verfahren zum Beglaubigen eines mobilen Endgerätes und entsprechendes mobiles Endgerät | |
DE102007014885B4 (de) | Verfahren und Vorrichtung zur Steuerung eines Nutzerzugriffs auf einen in einem Datennetz bereitgestellten Dienst | |
EP1573689A1 (de) | Verfahren zum ausführen einer gesicherten elektronischen transaktion unter verwendung eines tragbaren datenträgers | |
EP2255516B1 (de) | Verfahren zur zeitweisen personalisierung einer kommunikationseinrichtung | |
EP1240631A1 (de) | Zahlungstransaktionsverfahren und zahlungstransaktionssystem | |
WO2009003605A2 (de) | Virtuelle prepaid- oder kreditkarte und verfahren und system zur bereitstellung einer solchen und zum elektronischen zahlungsverkehr | |
EP1697820B1 (de) | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm | |
EP1636763A1 (de) | Arbeitszeiterfassungssystem sowie verfahren zur arbeitszeiterfassung | |
DE60207980T2 (de) | System und Verfahren zur Benutzerauthentifizierung in einem digitalen Kommunikationssystem | |
EP1525731B1 (de) | Identifikation eines benutzers eines mobilterminals und generierung einer aktionsberechtigung | |
WO2013152986A1 (de) | Sichere generierung eines nutzerkontos in einem dienstserver | |
WO2004055744A1 (de) | Kommunikation zwischen einem bediengerät, einem anbietermodul und einem kundenmodul | |
EP2199944A2 (de) | Verfahren zur Authentifizierung einer Person gegenüber einer elektronischen Datenverarbeitungsanlage mittels eines elektronischen Schlüssels | |
EP2783320B1 (de) | Verfahren zum authentisieren einer person an einer serverinstanz | |
DE102007024144B3 (de) | Verfahren und Anordnung zur schnellen Kurzanmeldung eines Benutzers an einem Diensleistungsportal mittels einer mobilen Kommunikationseinrichtung | |
EP2456157B1 (de) | Schutz der Privatsphäre bei der Anmeldung eines Nutzers an einem gesicherten Webdienst mittels eines Mobilfunkgerätes | |
DE10138381B4 (de) | Computersystem und Verfahren zur Datenzugriffskontrolle | |
EP3657750B1 (de) | Verfahren zur authentifizierung einer datenbrille in einem datennetz | |
EP2561460A1 (de) | Verfahren zum konfigurieren einer applikation für ein endgerät | |
EP1063862A2 (de) | Verfahren und Einrichtung zum Aufbau einer Kommunikation zwischen einem Anwendergerät und einem Netz | |
EP3502971B1 (de) | Prozessorchipkarte und ein verfahren zu deren betrieb |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REEP | Request for entry into the european phase |
Ref document number: 2005785243 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005785243 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 880/KOLNP/2007 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007531645 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580038829.X Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2005785243 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11662655 Country of ref document: US |