DK0891611T3 - Access control system for a function in which the encryption requires several dynamic variables - Google Patents

Access control system for a function in which the encryption requires several dynamic variables

Info

Publication number
DK0891611T3
DK0891611T3 DK97915537T DK97915537T DK0891611T3 DK 0891611 T3 DK0891611 T3 DK 0891611T3 DK 97915537 T DK97915537 T DK 97915537T DK 97915537 T DK97915537 T DK 97915537T DK 0891611 T3 DK0891611 T3 DK 0891611T3
Authority
DK
Denmark
Prior art keywords
function
control system
access control
units
access
Prior art date
Application number
DK97915537T
Other languages
Danish (da)
Inventor
Yves Audebert
Original Assignee
Actividentity Europ Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/620,240 external-priority patent/US5802176A/en
Priority claimed from FR9604798A external-priority patent/FR2747815B1/en
Application filed by Actividentity Europ Sa filed Critical Actividentity Europ Sa
Application granted granted Critical
Publication of DK0891611T3 publication Critical patent/DK0891611T3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token

Abstract

A system including a first unit (2) consisting of a card capable of interacting with a second unit (3) that enables access to a function (1) only under certain conditions. Both units are designed to run software for generating passwords by encrypting a plurality of dynamic variables simultaneously but separately generated in the units. The passwords thus generated must have a predetermined relationship, e.g. identity, for access to be enabled. Encryption is performed in both units (2, 3) by public encryption algorithms using a dynamic key that is altered after each access request made using the card, depending on the number of access requests previously received.
DK97915537T 1996-03-22 1997-03-21 Access control system for a function in which the encryption requires several dynamic variables DK0891611T3 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08/620,240 US5802176A (en) 1996-03-22 1996-03-22 System for controlling access to a function, using a plurality of dynamic encryption variables
FR9604798A FR2747815B1 (en) 1996-04-17 1996-04-17 FUNCTION ACCESS CONTROL SYSTEM IN WHICH THE ENCRYPTION INVOLVES SEVERAL DYNAMIC VARIABLES

Publications (1)

Publication Number Publication Date
DK0891611T3 true DK0891611T3 (en) 2006-10-30

Family

ID=26232658

Family Applications (1)

Application Number Title Priority Date Filing Date
DK97915537T DK0891611T3 (en) 1996-03-22 1997-03-21 Access control system for a function in which the encryption requires several dynamic variables

Country Status (10)

Country Link
EP (1) EP0891611B1 (en)
JP (1) JP2000508099A (en)
AT (1) ATE332548T1 (en)
AU (1) AU2297597A (en)
CA (1) CA2249463A1 (en)
DE (1) DE69736283T2 (en)
DK (1) DK0891611T3 (en)
ES (1) ES2267138T3 (en)
TW (1) TW367683B (en)
WO (1) WO1997036264A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
FR2786049B1 (en) * 1998-11-12 2001-02-09 Jean Pierre Roland Pau Lefevre DYNAMIC KEY CRYPTOGRAPHY PROCESS
FR2793571B1 (en) 1999-05-11 2003-10-31 Gemplus Card Int COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET AND DYNAMIC KEY CRYPTOGRAPHY ALGORITHM
US7251730B2 (en) * 2001-12-21 2007-07-31 Qualcomm Incorporated Method and apparatus for simplified audio authentication
US7966497B2 (en) 2002-02-15 2011-06-21 Qualcomm Incorporated System and method for acoustic two factor authentication
US7401224B2 (en) 2002-05-15 2008-07-15 Qualcomm Incorporated System and method for managing sonic token verifiers
US9258124B2 (en) 2006-04-21 2016-02-09 Symantec Corporation Time and event based one time password
CN101803272B (en) 2007-06-26 2013-08-14 豌豆制造技术有限公司 Authentication system and method
EP2073153A1 (en) * 2007-12-18 2009-06-24 Gemplus Method of authorising communication with a portable electronic device, such as to access a memory zone, corresponding electronic device and system
WO2009130340A1 (en) * 2008-04-26 2009-10-29 Editores Asociados Sc Two-factor security system and method for access to, and operation of, telematic banking or electronic commerce services by generating a different floating code for each transaction
US8973124B2 (en) 2012-04-30 2015-03-03 General Electric Company Systems and methods for secure operation of an industrial controller
US8726372B2 (en) 2012-04-30 2014-05-13 General Electric Company Systems and methods for securing controllers
US8964973B2 (en) 2012-04-30 2015-02-24 General Electric Company Systems and methods for controlling file execution for industrial control systems
US9046886B2 (en) 2012-04-30 2015-06-02 General Electric Company System and method for logging security events for an industrial control system
US8959362B2 (en) 2012-04-30 2015-02-17 General Electric Company Systems and methods for controlling file execution for industrial control systems
US8997186B2 (en) 2013-01-24 2015-03-31 General Electric Company System and method for enhanced control system security

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2597538B1 (en) * 1986-04-22 1995-03-31 Soum Rene SECURITY LOCK ASSEMBLY WITH REMOTE CONTROL IN WHICH THE KEY HAS ONLY A TRANSMISSION FUNCTION AND THE RECEPTION LOCK
DE4223258C3 (en) * 1992-07-15 2001-03-15 Telefunken Microelectron Method for verifiable transmission of data
DE69327644T2 (en) * 1993-01-07 2000-09-07 Ford Motor Co Remote controlled security system
DE4430315C2 (en) * 1994-08-26 1997-10-23 Telefunken Microelectron Method for operating a locking system for lockable objects

Also Published As

Publication number Publication date
WO1997036264A1 (en) 1997-10-02
DE69736283T2 (en) 2007-06-28
EP0891611A1 (en) 1999-01-20
JP2000508099A (en) 2000-06-27
DE69736283D1 (en) 2006-08-17
TW367683B (en) 1999-08-21
ATE332548T1 (en) 2006-07-15
EP0891611B1 (en) 2006-07-05
ES2267138T3 (en) 2007-03-01
AU2297597A (en) 1997-10-17
CA2249463A1 (en) 1997-10-02

Similar Documents

Publication Publication Date Title
DK0891611T3 (en) Access control system for a function in which the encryption requires several dynamic variables
HK1023202A1 (en) Authenticating system with microcircuit card.
MX9606091A (en) Generation of cryptographic signatures using hash keys.
CA2075329A1 (en) Public key cryptosystem key management based on control vectors
DK0504364T3 (en) Distributed User Authentication Protocol
EP0711051B1 (en) Data processing system with verification of authenticity of cryptographic algorithms according to the challenge/response principle
EP0636963A3 (en) Authentication system using one-time passwords
CA2154970A1 (en) Method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information procesing apparatuses and a communication system that employs such a method
KR970064058A (en) Data Security Method and System
KR960703248A (en) DATA PROTECTION SYSTEM
ES2069553T3 (en) TERMINAL CONTROLLED BY DATA SUPPORT IN A DATA EXCHANGE SYSTEM.
DE69634880D1 (en) METHOD AND APPARATUS FOR CONTROLLED ACCESS TO ENCRYPTED DATA STORES IN A COMPUTER SYSTEM
DK0885417T3 (en) Access control - / - cryptosystem
CA2219344A1 (en) Method for granting authorized users to access a computer system
SE9503343D0 (en) Method for encrypting information
BR9808167A (en) Electronic data processing device and system
SE0003464D0 (en) A method and a system for improving logon security in network applications
EP0121853A3 (en) Data processing system having public encryption and private decryption keys
WO2023023275A3 (en) Data sharing solution
ATE218233T1 (en) ACCESS CONTROL SYSTEM TO A FUNCTION INCLUDING A CLOCK SYNCHRONIZING DEVICE
RU97108167A (en) METHOD AND DEVICE FOR SECURE IDENTIFICATION OF MOBILE USER IN COMMUNICATION NETWORK
SE9701894D0 (en) Method and devics for computer systems
KR102115828B1 (en) Paper spillage prevention method based on block chain
KR19990040393A (en) Combination encryption method using communication device and combination encryption device suitable for performing the same