DE20014381U1 - Authentication device - Google Patents
Authentication deviceInfo
- Publication number
- DE20014381U1 DE20014381U1 DE20014381U DE20014381U DE20014381U1 DE 20014381 U1 DE20014381 U1 DE 20014381U1 DE 20014381 U DE20014381 U DE 20014381U DE 20014381 U DE20014381 U DE 20014381U DE 20014381 U1 DE20014381 U1 DE 20014381U1
- Authority
- DE
- Germany
- Prior art keywords
- user
- access
- pin
- access code
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000013475 authorization Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 2
- 238000000034 method Methods 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/313—User authentication using a call-back technique via a telephone network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
- G06Q20/3255—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4093—Monitoring of device authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Description
BESCHREIBUNGDESCRIPTION
Vorrichtung zur LegitimationsprüfungDevice for legitimacy verification
1 Einsatzgebiet1 Area of application
Es handelt sich um eine neuartige Legitimationsvorrichtung zum Beispiel für die Gewährung des Zugangs zu gesicherten Einrichtungen, welche einen erhöhten Sicherheitsstandard erfordern. Durch die Vorrichtung zur Prüfung der Zugangsberechtigung sollen ausschließlich hochsensible Bereiche innerhalb eines Systems geschützt werden.It is a new type of authentication device, for example for granting access to secured facilities that require a higher security standard. The device for checking access authorization is intended to protect only highly sensitive areas within a system.
2 Derzeitiger Stand der Technik:2 Current state of the art:
Bisherige Legitimationsvorrichtungen basieren auf dem PIN / TAN - Verfahren oder auf sogenannten Smartcards. Diese Vorrichtungen konnten sich in der Vergangenheit durchsetzen, jedoch besitzen beide Legitimatiovorrichtungen technische Unzulänglichkeiten.Previous identification devices are based on the PIN/TAN procedure or on so-called smart cards. These devices have been successful in the past, but both identification devices have technical deficiencies.
PIN ist eine persönliche Identifikationsnummer, welche dem Benutzer eines Systems dauerhaft zugewiesen wird. Die Übermittlung der Nummer erfolgt in der Regel in schriftlich fixierter Form. Diese dauerhafte Form der Zugangsberechtigung birgt einige Risiken. Es besteht die Möglichkeit, dass durch die Versendung der PIN oder durch fahrlässiges Verhalten seitens des Benutzers die PIN - Nummer einer dritten Person zugänglich wird. Erfolgt nicht sogleich eine Sperrung dieser PIN ist ein Missbrauch nicht vermeidbar. Weiterhin erhöht sich mit dem dauerhaften Bestehen der PIN das Risiko ihrer Entschlüsselung.PIN is a personal identification number that is permanently assigned to the user of a system. The number is usually transmitted in written form. This permanent form of access authorization involves some risks. It is possible that the PIN number may become accessible to a third party if the PIN is sent or if the user is negligent. If this PIN is not blocked immediately, misuse cannot be avoided. Furthermore, the permanent existence of the PIN increases the risk of it being decrypted.
TAN ist eine von vielen persönlichen Transaktionsnummern, welche jeweils nur für eine Transaktion benutzt werden kann. Die Gültigkeit einer TAN reicht von ihrer Erstellung bis zu ihrer Anwendung durch den Benutzer, das heißt der Zeitraum ihrer Gültigkeit hängt von ihrem Einsatz durch den Benutzer ab. TANs werden ebenso wie PINs in schriftlich fixierter Form auf dem Postweg versendet. Auch hier kann die TAN bei der Versendung oder durch fahrlässiges Verhalten seitens des Benutzers in die Hände Dritter gelangen. TANs sind zwar nicht dauerhaft gültig, jedoch sind sie auf Seiten des Dienstanbieters hinterlegt. Dadurch ist ein Missbrauch durch Mitarbeiter möglich.TAN is one of many personal transaction numbers that can only be used for one transaction. The validity of a TAN ranges from its creation to its application by the user, i.e. the period of its validity depends on its use by the user. TANs, like PINs, are sent by post in written form. Here too, the TAN can fall into the hands of third parties during dispatch or through negligent behavior on the part of the user. TANs are not valid permanently, but they are stored on the service provider's website. This means that employees can misuse them.
Smartcard ist ein technisches Gerät, welches zeitgleich zum Server in festgelegten Zeitintervallen dieselben Zugangscodes generiert. Die Smartcard wiederum ist über einen PIN zugriffsgeschützt. Allerdings.erfordern SrnartQards. einen.hohenSmartcard is a technical device that generates the same access codes at the same time as the server at set time intervals. The smartcard, in turn, is protected against access by a PIN. However, smartcards require a high level of
Verwaltungsaufwand, insbesondere bei der Erstausgabe von zum Teil mehrerer Tausend Smartcards oder bei der Sperrung von Zugriffsrechten. Benutzer von Smartcards müssen diese stets mit sich führen, um sich in das jeweilige System einloggen zu können. Ein Benutzer von mehreren Systemen muss somit zahlreiche Smartcards mit sich führen und sich damit für jede Smartcard die entsprechende PIN merken.Administrative effort, especially when issuing several thousand smart cards for the first time or when blocking access rights. Smart card users must always carry them with them in order to be able to log into the respective system. A user of several systems must therefore carry numerous smart cards and remember the corresponding PIN for each smart card.
3 Funktion der Vorrichtung3 Function of the device
Hier handelt es sich um eine Vorrichtung zur Prüfung der Zugangsberechtigung zu sensiblen Bereichen mittels Erzeugung eines ausschließlich temporären Zugangscodes und dessen Übermittlung an ein personalisiertes Medium.This is a device for checking access authorization to sensitive areas by generating an exclusively temporary access code and transmitting it to a personalized medium.
Der Kern der Vorrichtung basiert auf Java, einer speziell für das Internet entwickelten objektorientierten Programmiersprache, auf Short Message Service (SMS), einem Versandprotokoll für Kurzmitteilungen über Mobiltelefone, sowie auf dem PIN-Schutz (Personal Idenfrfikations Nummer) bei Mobiltelefonen.The core of the device is based on Java, an object-oriented programming language developed specifically for the Internet, on Short Message Service (SMS), a protocol for sending short messages via mobile phones, and on PIN (Personal Identification Number) protection on mobile phones.
Das Neuartige der Vorrichtung besteht darin, dass ein ausschließlich temporärer Schlüssel auf das Mobiltelefon des Benutzers übertragen wird. Der übermittelte Schlüssel berechtigt den Empfänger in sensiblen Bereichen einer Internetapplikation arbeiten zu können.The novelty of the device is that an exclusively temporary key is transmitted to the user's mobile phone. The transmitted key authorizes the recipient to work in sensitive areas of an Internet application.
Beim Einloggen des Benutzers in den allgemein zugänglichen Bereich des Sicherheitsbereichs mittels Loginname und Passwort wird ein temporäres Javaobjekf erzeugt, wobei der Konstruktor" des Objekts den Zugangscode auf „NULL" und den Parameter zur Zugangskontrolle für diese Vorrichtung geschützte Bereiche auf „FALSE" setzt. Die vom Konstruktor gebildeten Datenelemente werden im Objekt gekapselt™ und sind damit nur über Methoden des Objekts ansprechbar. Diese Kapselung stellt einen sicheren Schutz vor unberechtigtem Datenzugriff dar, da die Datenelemente nicht direkt veränderbar bzw. auslesbar sind.When the user logs into the publicly accessible area of the security area using a login name and password, a temporary Java object is created, whereby the object's constructor sets the access code to "NULL" and the access control parameter for the areas protected by this device to "FALSE". The data elements created by the constructor are encapsulated in the object and can therefore only be accessed using the object's methods. This encapsulation provides secure protection against unauthorized data access, since the data elements cannot be changed or read directly.
Das temporäre Javaobjekt existiert nur für die Dauer einer Session, der Arbeitsphase eines Benutzers vom Einloggen ins System bis zum Ausloggen, im RAM des Servers. Um einen sensiblen Bereich des Systems betreten zu können, muss der Benutzer eine Anfrage an das System stellen. In diesem Fall erzeugt das temporäre Javaobjekt selbständig einen temporären Zugangscode, welcher aus beispielsweise sieben, unabhängig voneinander generierten Zufallsziffern besteht. Dieser Zugangscode wird nun automatisch dem Benutzer per SMS zugesandt. Innerhalb von Sekunden nach seiner Anfrage kann der Benutzer den benötigten Zugangscode auf seinem SMS-fähigen Handy abrufen. Der übermittelte Zugangscode muss dann vom Benutzer in einer Dialogbox eingegeben werden, welche dem Javaobjekt übergeben wird. Stimmt der Zugangscode mit der Eingabe überein, wird vom Javaobjekt der Parameter zur Zugangskontrolle auf „TRUE" gesetzt. Dieser Parameter kann über eine allgemein zugängliche Methode des Objekts ausgelesen, jedoch nicht verändert werden. Der Benutzer bekommt dadurch für die restliche Zeit der Session Zugriff auf die mit der Vorrichtung geschütztenThe temporary Java object only exists in the server's RAM for the duration of a session, the user's working phase from logging into the system to logging out. In order to access a sensitive area of the system, the user must submit a request to the system. In this case, the temporary Java object automatically generates a temporary access code, which consists of, for example, seven random numbers generated independently of one another. This access code is then automatically sent to the user via SMS. Within seconds of the request, the user can retrieve the required access code on their SMS-capable mobile phone. The transmitted access code must then be entered by the user in a dialog box, which is passed on to the Java object. If the access code matches the input, the Java object sets the access control parameter to "TRUE". This parameter can be read using a generally accessible method of the object, but cannot be changed. The user is thus given access to the data protected by the device for the remainder of the session.
Bereiche. Der gesetzte Parameter ermöglicht es dem Benutzer innerhalb seiner Session beliebig zwischen geschützten und allgemein zugänglichen Bereichen ohne erneute Anforderung eines Zugangscodes zu wechseln. Bei jedem versuchten Eintritt in einen durch diese Vorrichtung geschützten Bereich wird vom System mittels einer Methode des Javaobjekts überprüft, ob der Parameter zur Zugangskontrolle den Zustand „TRUE" aufweist. Stimmt der Zugangscode mit der Eingabe nicht überein, wird der Zugangscode vom Javaobjekt gelöscht und damit eine erneute Anfrage des Benutzers notwendig.
Die Telefonnummer seines Mobiltelefons kann der Benutzer nur bei der Ersterstellung des persönlichen Benutzerprofils eingeben oder zu einem späteren Zeitpunkt innerhalb des geschützten Bereiches. Nur in dem mit dieser Vorrichtung geschützten Bereich kann eine Änderung der Telefonnummer vorgenommen werden. Sollte es zum Verlust des Handys seitens des Benutzers kommen, so kann der Benutzer nur noch per Antrag beim Dienstanbieter seine neue Handynummer für den mit der Vorrichtung geschützten Bereich einstellen lassen.Areas. The set parameter allows the user to switch freely between protected and publicly accessible areas within their session without having to request an access code again. Every time an attempt is made to enter an area protected by this device, the system uses a method of the Java object to check whether the access control parameter has the status "TRUE". If the access code does not match the input, the access code is deleted from the Java object and the user must make a new request.
The user can only enter the telephone number of his mobile phone when he first creates his personal user profile or at a later time within the protected area. The telephone number can only be changed in the area protected by this device. If the user loses the mobile phone, the user can only request that his new mobile phone number be set for the area protected by the device by contacting the service provider.
4 Vorteile gegenüber anderen Legitimationsvorrichtungen:4 advantages over other identification devices:
Der Vorteil von der beschriebenen Vorrichtung gegenüber einfachen PIN / TAN Vorrichtungen liegt darin, dass die TAN - Nummer durch einen ausschließlich temporären Zugangscode ersetzt wird. Mit diesem Wegfall eines dauerhaft vorhandenen Codes entfällt die Gefahr des Datenmissbrauchs bei Verlust oder Entwenden des Codes durch einen Dritten. Da der temporär gültige Zugangscode von zu keinem Zeitpunkt auf einem permanenten Medium gespeichert wird und nur temporär im abgekapselten Bereich des Javaobjekts existiert, ist auch dem Dienstanbieter der derzeitige Zugangscode des Benutzers nicht bekannt. Er hat keine Möglichkeit des Zugriffs darauf, so dass ein Datenzugriff durch Mitarbeiter des Dienstanbieters ebenfalls weitestgehend ausgeschlossen werden kann.The advantage of the device described compared to simple PIN/TAN devices is that the TAN number is replaced by an exclusively temporary access code. This elimination of a permanent code eliminates the risk of data misuse if the code is lost or stolen by a third party. Since the temporarily valid access code is never stored on a permanent medium and only exists temporarily in the encapsulated area of the Java object, the service provider does not know the user's current access code. They have no way of accessing it, so access to data by employees of the service provider can also be largely ruled out.
Der Vorteil der Vorrichtung gegenüber Smartcards liegt darin, dass hier kein zusätzliches technisches Gerät vom Benutzer mitgeführt werden muss. Für den Zugang zu sensiblen Bereichen eines Sicherheitsbereichs benötigt der Benutzer lediglich sein Mobiltelefon. Daraus ergeben sich zweierlei Vorteile. Der Benutzer erhält durch sein PIN - geschütztes Mobiltelefon einen weiteren Schutz, muss sich jedoch keine weitere PIN - Nummer merken. Legitimationsvorrichtungen die mit Smartcards arbeiten bedeuten für den Dienstanbieter einen hohen Verwaltungsaufwand. Dieser entfällt bei der Arbeit mit dieser Vorrichtung.The advantage of this device over smart cards is that the user does not need to carry any additional technical equipment. To access sensitive areas of a security area, the user only needs their mobile phone. This has two advantages. The user receives additional protection through their PIN-protected mobile phone, but does not have to remember any additional PIN numbers. Identification devices that work with smart cards mean a lot of administrative work for the service provider. This is eliminated when working with this device.
Die Vorrichtung ist einfach bedienbar bei gleichzeitigem Schutz über mehrere Mechanismen. Um in sensible Bereiche des Systems zu gelangen, müsste ein Unbefugter Login und Passwort des Benutzers entschlüsseln, das Mobiltelefon des Benutzers entwenden und dessen PiN kennen.The device is easy to use and at the same time protects via several mechanisms. To gain access to sensitive areas of the system, an unauthorized person would have to decrypt the user's login and password, steal the user's mobile phone and know their PIN.
5 Einsatzgebiete5 Areas of application
Die beschriebene Vorrichtung kann überall dort eingesetzt werden, wo eine Zugangsberechtigung überprüft werden soll. Auf diesem Wege können alle die Systeme abgesichert werden, deren Zugang durch Eingabe eines alphanumerischen Codes ermöglicht wird. Anwendungsgebiete können somit sein: Zugang zu Sicherheitsbereichen (Türabsicherung), Geldautomaten, Kaufautomaten, Banktresore, Ausleihe wertvoller Güter, Aktionen in automatisierten Systemen.The device described can be used wherever access authorization needs to be checked. In this way, all systems that can be accessed by entering an alphanumeric code can be secured. Areas of application can therefore include: access to secure areas (door security), cash machines, vending machines, bank vaults, lending of valuable goods, actions in automated systems.
1 Siehe Abbildung ,Javaobjekt" 1 See figure "Java object"
° Der Konstruktor bildet ein Objekt und nimmt die erste Initialisierung der Datenelemente vor.° The constructor creates an object and performs the first initialization of the data elements.
m Durch das Schlüsselwort „private" bei der Datenelementdeklaration werden die Datenelemente im Objekt gekapselt, das heißt von außerhalb des Objekts nicht ansprechbar. m The keyword "private" in the data element declaration encapsulates the data elements in the object, which means they cannot be accessed from outside the object.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE20014381U DE20014381U1 (en) | 2000-08-21 | 2000-08-21 | Authentication device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE20014381U DE20014381U1 (en) | 2000-08-21 | 2000-08-21 | Authentication device |
Publications (1)
Publication Number | Publication Date |
---|---|
DE20014381U1 true DE20014381U1 (en) | 2000-11-30 |
Family
ID=7945411
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE20014381U Expired - Lifetime DE20014381U1 (en) | 2000-08-21 | 2000-08-21 | Authentication device |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE20014381U1 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1195973A1 (en) * | 2000-10-05 | 2002-04-10 | Digital Rum Ltd. | Method for registering a user into new services by sending a permanent PIN via SMS or e-mail |
WO2002052387A2 (en) * | 2000-12-22 | 2002-07-04 | Siemens Aktiengesellschaft | Computer system that can be connected to a data transmission network |
EP1233378A1 (en) * | 2001-09-21 | 2002-08-21 | Siemens Aktiengesellschaft | System for creating and using temporary authorizations and mobile telecommunication terminal therefor |
WO2002077934A2 (en) * | 2001-03-22 | 2002-10-03 | Cyberos Gesellschaft Für Sicherheitssysteme Mbh & Co. Kg | Method and device for carrying out at least one commercial transaction in return for payment |
WO2003014858A2 (en) * | 2001-08-09 | 2003-02-20 | Scott Edward James Garratt | Method to activate a vending machine |
AT411947B (en) * | 2001-04-23 | 2004-07-26 | Fischlmayr Albert | SYSTEM FOR THE SAFE IMPLEMENTATION OF TRANSACTIONS BETWEEN INFORMATION-PROCESSING EQUIPMENT |
EP1445917A2 (en) * | 2003-02-04 | 2004-08-11 | RenderSpace - Pristop Interactive d.o.o. | Identification system for admission into protected area by means of an additional password |
EP1486924A1 (en) * | 2003-06-10 | 2004-12-15 | Kagi, Inc. | Method and apparatus for verifying financial account information |
EP1498861A2 (en) * | 2003-06-24 | 2005-01-19 | LG TeleCom, Ltd. | System for providing banking services by use of mobile communication system |
WO2005062613A1 (en) * | 2003-12-18 | 2005-07-07 | Nptv | Method for accessing an interactive television session by short message (sms) |
WO2006049585A1 (en) * | 2004-11-05 | 2006-05-11 | Mobile Money International Sdn Bhd | Payment system |
EP1690164A2 (en) * | 2003-12-02 | 2006-08-16 | Broadon Communications Corp. | Delivery of license information using a short messaging system protocol in a closed content distribution system |
WO2007073352A1 (en) * | 2005-12-19 | 2007-06-28 | Veritas Mobile Solutions Pte. Ltd. | METHOD FOR SECURE TRANSMITTAL OF PINs OVER TELECOMMUNICATIONS NETWORKS |
WO2007130145A1 (en) * | 2006-04-28 | 2007-11-15 | Sony Ericsson Mobile Communications Ab | Mobile device control of mobile television broadcast signals form broadcaster |
ITAQ20090001A1 (en) * | 2009-03-19 | 2009-06-18 | Paolo Fabrizio Di | PAYMENT SYSTEM BASED ON THE USE OF SPECIALLY REALIZED ELECTRONIC DEVICES THAT ALLOW THE OPERATION OF ELECTRONIC TRANSACTIONS BETWEEN SUBJECTS THAT BELONG TO THE SAME CIRCUIT PROVIDED AND MANAGED BY A SINGLE CRE INSTITUTE |
US7588181B2 (en) | 2005-09-07 | 2009-09-15 | Ty Shipman | Method and apparatus for verifying the legitamacy of a financial instrument |
DE102009053448A1 (en) | 2009-11-17 | 2011-05-19 | Austria Card Plastikkarten Und Ausweissysteme Gmbh | Method for the secure transmission of a PIN to an end customer |
US8131649B2 (en) | 2003-02-07 | 2012-03-06 | Igware, Inc. | Static-or-dynamic and limited-or-unlimited content rights |
ITPI20110028A1 (en) * | 2011-03-28 | 2012-09-29 | Iamboo S R L | METHOD AND EQUIPMENT FOR THE STRONG AUTHENTICATION OF A USER |
WO2014127897A1 (en) * | 2013-02-22 | 2014-08-28 | Audi Ag | Motor vehicle with a driving behavior which can be modified at a later stage using an application program |
US9646142B2 (en) | 2003-02-07 | 2017-05-09 | Acer Cloud Technology Inc. | Ensuring authenticity in a closed content distribution system |
CN112541996A (en) * | 2020-10-22 | 2021-03-23 | 重庆宏火实业有限公司 | Control method based on AB gate logic |
-
2000
- 2000-08-21 DE DE20014381U patent/DE20014381U1/en not_active Expired - Lifetime
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1195973A1 (en) * | 2000-10-05 | 2002-04-10 | Digital Rum Ltd. | Method for registering a user into new services by sending a permanent PIN via SMS or e-mail |
WO2002052387A3 (en) * | 2000-12-22 | 2003-09-18 | Siemens Ag | Computer system that can be connected to a data transmission network |
WO2002052387A2 (en) * | 2000-12-22 | 2002-07-04 | Siemens Aktiengesellschaft | Computer system that can be connected to a data transmission network |
US8171073B2 (en) | 2000-12-22 | 2012-05-01 | Siemens Aktiengesellschsft | Computer system connected to a data communications network |
WO2002077934A3 (en) * | 2001-03-22 | 2003-10-16 | Cyberos Ges Fuer Sicherheitssy | Method and device for carrying out at least one commercial transaction in return for payment |
WO2002077934A2 (en) * | 2001-03-22 | 2002-10-03 | Cyberos Gesellschaft Für Sicherheitssysteme Mbh & Co. Kg | Method and device for carrying out at least one commercial transaction in return for payment |
AT411947B (en) * | 2001-04-23 | 2004-07-26 | Fischlmayr Albert | SYSTEM FOR THE SAFE IMPLEMENTATION OF TRANSACTIONS BETWEEN INFORMATION-PROCESSING EQUIPMENT |
WO2003014858A2 (en) * | 2001-08-09 | 2003-02-20 | Scott Edward James Garratt | Method to activate a vending machine |
US6850816B2 (en) | 2001-08-09 | 2005-02-01 | Scott Edward James Garratt | Method to activate a vending machine |
WO2003014858A3 (en) * | 2001-08-09 | 2003-12-11 | Scott Edward James Garratt | Method to activate a vending machine |
EP1233378A1 (en) * | 2001-09-21 | 2002-08-21 | Siemens Aktiengesellschaft | System for creating and using temporary authorizations and mobile telecommunication terminal therefor |
EP1445917A2 (en) * | 2003-02-04 | 2004-08-11 | RenderSpace - Pristop Interactive d.o.o. | Identification system for admission into protected area by means of an additional password |
EP1445917A3 (en) * | 2003-02-04 | 2004-10-06 | RenderSpace - Pristop Interactive d.o.o. | Identification system for admission into protected area by means of an additional password |
US8131649B2 (en) | 2003-02-07 | 2012-03-06 | Igware, Inc. | Static-or-dynamic and limited-or-unlimited content rights |
US9985781B2 (en) | 2003-02-07 | 2018-05-29 | Acer Cloud Technology, Inc. | Ensuring authenticity in a closed content distribution system |
US9646142B2 (en) | 2003-02-07 | 2017-05-09 | Acer Cloud Technology Inc. | Ensuring authenticity in a closed content distribution system |
US10263774B2 (en) | 2003-02-07 | 2019-04-16 | Acer Cloud Technology, Inc. | Ensuring authenticity in a closed content distribution system |
US7765153B2 (en) | 2003-06-10 | 2010-07-27 | Kagi, Inc. | Method and apparatus for verifying financial account information |
US8805738B2 (en) | 2003-06-10 | 2014-08-12 | Kagi, Inc. | Method and apparatus for verifying financial account information |
EP1486924A1 (en) * | 2003-06-10 | 2004-12-15 | Kagi, Inc. | Method and apparatus for verifying financial account information |
EP1498861A2 (en) * | 2003-06-24 | 2005-01-19 | LG TeleCom, Ltd. | System for providing banking services by use of mobile communication system |
EP1498861A3 (en) * | 2003-06-24 | 2009-09-16 | LG TeleCom, Ltd. | System for providing banking services by use of mobile communication system |
EP1690164A2 (en) * | 2003-12-02 | 2006-08-16 | Broadon Communications Corp. | Delivery of license information using a short messaging system protocol in a closed content distribution system |
EP1690164A4 (en) * | 2003-12-02 | 2010-02-24 | Broadon Comm Corp | Delivery of license information using a short messaging system protocol in a closed content distribution system |
WO2005062613A1 (en) * | 2003-12-18 | 2005-07-07 | Nptv | Method for accessing an interactive television session by short message (sms) |
WO2006049585A1 (en) * | 2004-11-05 | 2006-05-11 | Mobile Money International Sdn Bhd | Payment system |
US7588181B2 (en) | 2005-09-07 | 2009-09-15 | Ty Shipman | Method and apparatus for verifying the legitamacy of a financial instrument |
US8131617B2 (en) | 2005-09-07 | 2012-03-06 | Kagi, Inc. | Method and apparatus for verifying the legitimacy of a financial instrument |
WO2007073352A1 (en) * | 2005-12-19 | 2007-06-28 | Veritas Mobile Solutions Pte. Ltd. | METHOD FOR SECURE TRANSMITTAL OF PINs OVER TELECOMMUNICATIONS NETWORKS |
US7555288B2 (en) | 2006-04-28 | 2009-06-30 | Sony Ericsson Mobile Communications Ab | Mobile device control of mobile television broadcast signals from broadcaster |
WO2007130145A1 (en) * | 2006-04-28 | 2007-11-15 | Sony Ericsson Mobile Communications Ab | Mobile device control of mobile television broadcast signals form broadcaster |
ITAQ20090001A1 (en) * | 2009-03-19 | 2009-06-18 | Paolo Fabrizio Di | PAYMENT SYSTEM BASED ON THE USE OF SPECIALLY REALIZED ELECTRONIC DEVICES THAT ALLOW THE OPERATION OF ELECTRONIC TRANSACTIONS BETWEEN SUBJECTS THAT BELONG TO THE SAME CIRCUIT PROVIDED AND MANAGED BY A SINGLE CRE INSTITUTE |
EP2336935A1 (en) | 2009-11-17 | 2011-06-22 | Austria Card Plastikkarten und Ausweissysteme GmbH | Method for securely sending a PIN to an end customer |
DE102009053448A1 (en) | 2009-11-17 | 2011-05-19 | Austria Card Plastikkarten Und Ausweissysteme Gmbh | Method for the secure transmission of a PIN to an end customer |
ITPI20110028A1 (en) * | 2011-03-28 | 2012-09-29 | Iamboo S R L | METHOD AND EQUIPMENT FOR THE STRONG AUTHENTICATION OF A USER |
US9560061B2 (en) | 2013-02-22 | 2017-01-31 | Audi Ag | Motor vehicle with a driving behavior which can be modified at a later stage using an application program |
WO2014127897A1 (en) * | 2013-02-22 | 2014-08-28 | Audi Ag | Motor vehicle with a driving behavior which can be modified at a later stage using an application program |
CN112541996A (en) * | 2020-10-22 | 2021-03-23 | 重庆宏火实业有限公司 | Control method based on AB gate logic |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE20014381U1 (en) | Authentication device | |
EP0281058B1 (en) | Data exchange system | |
EP0875871B1 (en) | Authorization method and system in data transfer systems | |
EP1254436B1 (en) | Method for controlling the identity of users | |
DE69735166T2 (en) | METHOD AND DEVICE FOR SECURING THE REMOTE SERVICES OF THE FINANCIAL INSTITUTIONS | |
DE3044463A1 (en) | METHOD AND DEVICE FOR CODING A CARD | |
EP2528045A1 (en) | Method and service computer and system for card-less authentication | |
DE19860177A1 (en) | Chip card function releasing device comprises pocket chip card reader with checking component in chip card for verifying authentication data | |
WO2002084455A2 (en) | Method for authentication of a user on access to a software-based system by means of an access medium | |
DE69330743T2 (en) | Procedure for the certification of one unit of information by another | |
DE102007008651B4 (en) | Chip card and method for activating a chip card function | |
EP1525731B1 (en) | Identification of a user of a mobile terminal and generation of an action authorisation | |
EP1676191A1 (en) | Device and method for securing and monitoring protected data | |
DE4439593C2 (en) | Device and method for access and access control | |
EP0997853B1 (en) | Method for protecting chip cards against unlawful use in unrelated devices | |
DE102007023003A1 (en) | Mobile paying method, involves causing paying process based on transferred data record with reference data record in server computer, where data record comprises safety information with temporally limited validation | |
WO2017036455A2 (en) | Device and method for authenticating and authorizing persons | |
DE19818998B4 (en) | Method for protecting against attacks on the authentication algorithm or the secret key of a chip card | |
EP1652131B1 (en) | Method for the issuing of a portable data support | |
DE102020123755B4 (en) | Method for authentication with an optoelectronically readable code as well as function enabling device and computer program therefor | |
EP2230648A1 (en) | Single-use code mask for deriving a single-use code | |
EP1163559A1 (en) | Method for securing access to a data processing device and appropriate device | |
EP1566945A1 (en) | Age verification by a mobile communication network | |
DE102022103369A1 (en) | Procedure for creating a digital vaccination card | |
DE102022114588A1 (en) | Method and system for authenticating a person |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
R207 | Utility model specification |
Effective date: 20010104 |
|
R156 | Lapse of ip right after 3 years |
Effective date: 20040302 |