CA1242501A - Method of recognizing the unauthorized use of an identification - Google Patents
Method of recognizing the unauthorized use of an identificationInfo
- Publication number
- CA1242501A CA1242501A CA000477182A CA477182A CA1242501A CA 1242501 A CA1242501 A CA 1242501A CA 000477182 A CA000477182 A CA 000477182A CA 477182 A CA477182 A CA 477182A CA 1242501 A CA1242501 A CA 1242501A
- Authority
- CA
- Canada
- Prior art keywords
- subscriber station
- exchange
- identification
- variable data
- counting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
- 238000000034 method Methods 0.000 title claims description 25
- 230000005540 biological transmission Effects 0.000 claims abstract description 27
- 230000005291 magnetic effect Effects 0.000 claims description 8
- 238000001514 detection method Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 230000002730 additional effect Effects 0.000 description 1
- 210000000941 bile Anatomy 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19843410937 DE3410937A1 (de) | 1984-03-24 | 1984-03-24 | Verfahren zum erkennen der unerlaubten benutzung einer indentifizierung |
DEP3410937.4 | 1984-03-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
CA1242501A true CA1242501A (en) | 1988-09-27 |
Family
ID=6231544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA000477182A Expired CA1242501A (en) | 1984-03-24 | 1985-03-21 | Method of recognizing the unauthorized use of an identification |
Country Status (5)
Country | Link |
---|---|
JP (3) | JPS60236537A (cs) |
CA (1) | CA1242501A (cs) |
DE (1) | DE3410937A1 (cs) |
DK (1) | DK128585A (cs) |
FR (1) | FR2561841B1 (cs) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3420874A1 (de) * | 1984-06-05 | 1985-12-05 | Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt | Verfahren und anordnung zur kontrolle des netzzugangs in fernmeldenetzen |
DE3619566A1 (de) * | 1986-06-11 | 1987-12-17 | Omikron Systemhaus Gesellschft | Verfahren und system zur datenuebertragung |
FR2614162B1 (fr) * | 1987-04-17 | 1993-12-10 | Flonic Sa | Systeme d'authentification analogique reciproque entre un terminal et une ligne de transmission |
DE3878348D1 (de) * | 1987-08-14 | 1993-03-25 | Siemens Ag | Datenuebertragungsverfahren. |
US5239294A (en) * | 1989-07-12 | 1993-08-24 | Motorola, Inc. | Method and apparatus for authenication and protection of subscribers in telecommunication systems |
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
DE4223258C3 (de) * | 1992-07-15 | 2001-03-15 | Telefunken Microelectron | Verfahren zur verifizierbaren Übertragung von Daten |
DE4317143C2 (de) * | 1993-05-24 | 1999-02-18 | Deutsche Telekom Mobil | Verfahren und Einrichtung zum Betrieb eines Mobilfunknetzes |
DE4335161A1 (de) * | 1993-10-15 | 1995-04-20 | Joachim Linz | Verfahren und Anlage zur Authentisierung von über ein Telefonnetz herstellbaren Verbindungen |
DE4336995A1 (de) * | 1993-10-29 | 1995-05-04 | Sel Alcatel Ag | Verfahren und Vorrichtung zur Bestimmung der Zuordnung eines Mobilfunkgerätes zu Geräte-Listen |
DE4416598A1 (de) * | 1994-05-11 | 1995-11-16 | Deutsche Bundespost Telekom | Verfahren und Vorrichtung zur Sicherung von Telekommunikations-Verbindungen |
US5539828A (en) * | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
DE4445615A1 (de) * | 1994-12-21 | 1996-06-27 | Sel Alcatel Ag | Verfahren zur Gewährleistung der Vertraulichkeit in leitungsgebundenen Zugangsnetzen mit Punkt-zu-Mehrpunkt-Strukturen sowie Netzkomponenten und Programm-Modul hierfür |
DE19523654A1 (de) * | 1995-06-29 | 1997-01-02 | Sel Alcatel Ag | Verfahren, Schaltungsanordnung und Abfragesystem zur fälschungssicheren Geräteidentifikation |
JPH10281943A (ja) * | 1997-04-09 | 1998-10-23 | Honda Motor Co Ltd | 車両診断装置 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH516854A (de) * | 1969-11-29 | 1971-12-15 | Ciba Geigy Ag | Verfahren und Vorrichtung zur chiffrierten Übermittlung von Informationen |
DE2536452A1 (de) * | 1975-08-16 | 1977-02-24 | Licentia Gmbh | Verfahren zur teilnehmersuche in einem funkuebertragungssystem |
DE2635795B2 (de) * | 1975-09-09 | 1980-08-21 | Dasy Inter S.A., Genf (Schweiz) | Verfahren und Vorrichtung zur EchtheitskontroHe von Identifuierungskarten u.dgl. Dokumenten |
US4114139A (en) * | 1977-01-25 | 1978-09-12 | International Business Machines Corporation | Security controlled information exchange system |
US4214230A (en) * | 1978-01-19 | 1980-07-22 | Rolf Blom | Personal identification system |
US4310720A (en) | 1978-03-31 | 1982-01-12 | Pitney Bowes Inc. | Computer accessing system |
LU79726A1 (de) * | 1978-05-29 | 1978-11-28 | Eckert R | Teleskopgabel |
EP0018129B1 (en) * | 1979-04-02 | 1982-11-17 | Motorola, Inc. | Method of providing security of data on a communication path |
DE2924325B2 (de) * | 1979-06-15 | 1981-06-11 | Hermann 7742 St. Georgen Stockburger | Verfahren und Vorrichtung zur geheimen Kennzeichnung und Auswertung maschinenlesbarer Datenträger |
US4349695A (en) * | 1979-06-25 | 1982-09-14 | Datotek, Inc. | Recipient and message authentication method and system |
JPS5829669B2 (ja) * | 1979-10-22 | 1983-06-24 | 日本電信電話株式会社 | 移動体通信利用者限定方式 |
FR2469760A1 (fr) * | 1979-11-09 | 1981-05-22 | Cii Honeywell Bull | Procede et systeme d'identification de personnes demandant l'acces a certains milieux |
US4304990A (en) * | 1979-12-11 | 1981-12-08 | Atalla Technovations | Multilevel security apparatus and method |
DE3000560C2 (de) * | 1980-01-09 | 1986-10-09 | Hermann 7742 St Georgen Stockburger | Verfahren zur Echtheitsprüfung eines Datenträgers und Vorrichtung zur Durchführung des Verfahrens |
JPS5915419B2 (ja) * | 1980-02-01 | 1984-04-09 | 日本電信電話株式会社 | 移動機の不正使用防止方式 |
DE3012231C2 (de) * | 1980-03-28 | 1987-09-10 | Siemens AG, 1000 Berlin und 8000 München | Mobiles Funknetz auf Landesebene |
JPS5888472U (ja) * | 1981-12-11 | 1983-06-15 | 株式会社日立製作所 | 端末識別コ−ド照合装置 |
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
NL8201077A (nl) * | 1982-03-16 | 1983-10-17 | Philips Nv | Kommunikatiesysteem, bevattende een centrale dataverwerkende inrichting, toegangsstations en externe stations, waarbij een kryptografische kontrole is voorzien op vervalsing van een extern station, alsmede externe stations voor gebruik in zo een kommunikatiesysteem. |
DE3360917D1 (en) * | 1982-03-26 | 1985-11-07 | Gretag Ag | Method and apparatus for the enciphered transmission of information |
DE3212023A1 (de) * | 1982-03-31 | 1983-10-06 | Siemens Ag | Aktivadressenbezogenes informationssystem zur verwaltung von mobilkommunikationsteilnehmern |
DE3223034C2 (de) * | 1982-06-19 | 1986-12-11 | Mico Datensysteme GmbH, 7252 Weil der Stadt | Verfahren zur Erkennung von gefälschten Datenträgern |
-
1984
- 1984-03-24 DE DE19843410937 patent/DE3410937A1/de active Granted
-
1985
- 1985-03-21 DK DK128585A patent/DK128585A/da not_active Application Discontinuation
- 1985-03-21 CA CA000477182A patent/CA1242501A/en not_active Expired
- 1985-03-22 FR FR8504296A patent/FR2561841B1/fr not_active Expired - Lifetime
- 1985-03-25 JP JP60060508A patent/JPS60236537A/ja active Granted
-
1993
- 1993-01-28 JP JP5012468A patent/JP2759732B2/ja not_active Expired - Lifetime
-
1996
- 1996-03-27 JP JP8099331A patent/JPH09154177A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
JPS60236537A (ja) | 1985-11-25 |
DK128585D0 (da) | 1985-03-21 |
JPH0715429A (ja) | 1995-01-17 |
DE3410937C2 (cs) | 1991-08-14 |
DE3410937A1 (de) | 1985-10-03 |
JPH09154177A (ja) | 1997-06-10 |
DK128585A (da) | 1985-09-25 |
FR2561841A1 (fr) | 1985-09-27 |
FR2561841B1 (fr) | 1994-04-01 |
JP2759732B2 (ja) | 1998-05-28 |
JPH0548981B2 (cs) | 1993-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA1242501A (en) | Method of recognizing the unauthorized use of an identification | |
US3798605A (en) | Centralized verification system | |
RU2062507C1 (ru) | Способ защиты от несанкционированного использования лицом, не имеющим соответствующих полномочий, микропроцессорных карт и терминал для его осуществления | |
US6766161B2 (en) | Method and apparatus for securing communications | |
US5317636A (en) | Method and apparatus for securing credit card transactions | |
AU595426B2 (en) | Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management | |
US4601011A (en) | User authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units | |
CA1236532A (en) | Method of detecting the unauthorized use of an identification assigned to a mobile radio station in a radio transmission system | |
US4531023A (en) | Computer security system for a time shared computer accessed over telephone lines | |
US5473689A (en) | Method for authentication between two electronic devices | |
EP0852044B1 (en) | Method and apparatus for user authentication | |
US5822691A (en) | Method and system for detection of fraudulent cellular telephone use | |
CN102262793A (zh) | 门禁控制方法及门禁控制系统 | |
US20020081179A1 (en) | Smart card of a terminal, a terminal using a smart card, and an improved method for identifying a user by means of a smart card | |
US6393567B1 (en) | Method of enabling a server to authorize access to a service from portable devices having electronic microcircuits, e.g. devices of the smart card type | |
US20040039708A1 (en) | Electronic seal, IC card, authentication system using the same, and mobile device including such electronic seal | |
US5208447A (en) | Method for testing a terminal communicating with chip cards | |
CN108347730B (zh) | 一种无线通信处理方法及装置 | |
US5148007A (en) | Method for generating random number for the encoded transmission of data | |
RU97108167A (ru) | Способ и устройство для защищенной идентификации мобильного пользователя в сети связи | |
CN101588578B (zh) | 一种碰撞攻击检测方法及装置 | |
EP0403204A2 (en) | Cordless telephone systems and methods of operation | |
AU687889B2 (en) | Identity validation for mobile phone | |
JPS60128764A (ja) | 錠のロツク解除方式 | |
RU2371884C1 (ru) | Способ (варианты) и система (варианты) управления доступом к сети cdma |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MKEX | Expiry |