DK0891611T3 - Access control system for a function in which the encryption requires several dynamic variables - Google Patents
Access control system for a function in which the encryption requires several dynamic variablesInfo
- Publication number
- DK0891611T3 DK0891611T3 DK97915537T DK97915537T DK0891611T3 DK 0891611 T3 DK0891611 T3 DK 0891611T3 DK 97915537 T DK97915537 T DK 97915537T DK 97915537 T DK97915537 T DK 97915537T DK 0891611 T3 DK0891611 T3 DK 0891611T3
- Authority
- DK
- Denmark
- Prior art keywords
- function
- control system
- access control
- units
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Abstract
A system including a first unit (2) consisting of a card capable of interacting with a second unit (3) that enables access to a function (1) only under certain conditions. Both units are designed to run software for generating passwords by encrypting a plurality of dynamic variables simultaneously but separately generated in the units. The passwords thus generated must have a predetermined relationship, e.g. identity, for access to be enabled. Encryption is performed in both units (2, 3) by public encryption algorithms using a dynamic key that is altered after each access request made using the card, depending on the number of access requests previously received.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/620,240 US5802176A (en) | 1996-03-22 | 1996-03-22 | System for controlling access to a function, using a plurality of dynamic encryption variables |
FR9604798A FR2747815B1 (en) | 1996-04-17 | 1996-04-17 | FUNCTION ACCESS CONTROL SYSTEM IN WHICH THE ENCRYPTION INVOLVES SEVERAL DYNAMIC VARIABLES |
Publications (1)
Publication Number | Publication Date |
---|---|
DK0891611T3 true DK0891611T3 (en) | 2006-10-30 |
Family
ID=26232658
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK97915537T DK0891611T3 (en) | 1996-03-22 | 1997-03-21 | Access control system for a function in which the encryption requires several dynamic variables |
Country Status (10)
Country | Link |
---|---|
EP (1) | EP0891611B1 (en) |
JP (1) | JP2000508099A (en) |
AT (1) | ATE332548T1 (en) |
AU (1) | AU2297597A (en) |
CA (1) | CA2249463A1 (en) |
DE (1) | DE69736283T2 (en) |
DK (1) | DK0891611T3 (en) |
ES (1) | ES2267138T3 (en) |
TW (1) | TW367683B (en) |
WO (1) | WO1997036264A1 (en) |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5937068A (en) * | 1996-03-22 | 1999-08-10 | Activcard | System and method for user authentication employing dynamic encryption variables |
FR2786049B1 (en) * | 1998-11-12 | 2001-02-09 | Jean Pierre Roland Pau Lefevre | DYNAMIC KEY CRYPTOGRAPHY PROCESS |
FR2793571B1 (en) | 1999-05-11 | 2003-10-31 | Gemplus Card Int | COUNTER-MEASUREMENT METHOD IN AN ELECTRONIC COMPONENT USING A SECRET AND DYNAMIC KEY CRYPTOGRAPHY ALGORITHM |
US7251730B2 (en) * | 2001-12-21 | 2007-07-31 | Qualcomm Incorporated | Method and apparatus for simplified audio authentication |
US7966497B2 (en) | 2002-02-15 | 2011-06-21 | Qualcomm Incorporated | System and method for acoustic two factor authentication |
US7401224B2 (en) | 2002-05-15 | 2008-07-15 | Qualcomm Incorporated | System and method for managing sonic token verifiers |
US9258124B2 (en) | 2006-04-21 | 2016-02-09 | Symantec Corporation | Time and event based one time password |
CN101803272B (en) | 2007-06-26 | 2013-08-14 | 豌豆制造技术有限公司 | Authentication system and method |
EP2073153A1 (en) * | 2007-12-18 | 2009-06-24 | Gemplus | Method of authorising communication with a portable electronic device, such as to access a memory zone, corresponding electronic device and system |
WO2009130340A1 (en) * | 2008-04-26 | 2009-10-29 | Editores Asociados Sc | Two-factor security system and method for access to, and operation of, telematic banking or electronic commerce services by generating a different floating code for each transaction |
US8973124B2 (en) | 2012-04-30 | 2015-03-03 | General Electric Company | Systems and methods for secure operation of an industrial controller |
US8726372B2 (en) | 2012-04-30 | 2014-05-13 | General Electric Company | Systems and methods for securing controllers |
US8964973B2 (en) | 2012-04-30 | 2015-02-24 | General Electric Company | Systems and methods for controlling file execution for industrial control systems |
US9046886B2 (en) | 2012-04-30 | 2015-06-02 | General Electric Company | System and method for logging security events for an industrial control system |
US8959362B2 (en) | 2012-04-30 | 2015-02-17 | General Electric Company | Systems and methods for controlling file execution for industrial control systems |
US8997186B2 (en) | 2013-01-24 | 2015-03-31 | General Electric Company | System and method for enhanced control system security |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2597538B1 (en) * | 1986-04-22 | 1995-03-31 | Soum Rene | SECURITY LOCK ASSEMBLY WITH REMOTE CONTROL IN WHICH THE KEY HAS ONLY A TRANSMISSION FUNCTION AND THE RECEPTION LOCK |
DE4223258C3 (en) * | 1992-07-15 | 2001-03-15 | Telefunken Microelectron | Method for verifiable transmission of data |
DE69327644T2 (en) * | 1993-01-07 | 2000-09-07 | Ford Motor Co | Remote controlled security system |
DE4430315C2 (en) * | 1994-08-26 | 1997-10-23 | Telefunken Microelectron | Method for operating a locking system for lockable objects |
-
1997
- 1997-03-21 DK DK97915537T patent/DK0891611T3/en active
- 1997-03-21 JP JP9534077A patent/JP2000508099A/en active Pending
- 1997-03-21 CA CA002249463A patent/CA2249463A1/en not_active Abandoned
- 1997-03-21 ES ES97915537T patent/ES2267138T3/en not_active Expired - Lifetime
- 1997-03-21 WO PCT/FR1997/000505 patent/WO1997036264A1/en active IP Right Grant
- 1997-03-21 AT AT97915537T patent/ATE332548T1/en not_active IP Right Cessation
- 1997-03-21 EP EP97915537A patent/EP0891611B1/en not_active Expired - Lifetime
- 1997-03-21 DE DE69736283T patent/DE69736283T2/en not_active Expired - Lifetime
- 1997-03-21 AU AU22975/97A patent/AU2297597A/en not_active Abandoned
- 1997-03-22 TW TW086103652A patent/TW367683B/en active
Also Published As
Publication number | Publication date |
---|---|
WO1997036264A1 (en) | 1997-10-02 |
DE69736283T2 (en) | 2007-06-28 |
EP0891611A1 (en) | 1999-01-20 |
JP2000508099A (en) | 2000-06-27 |
DE69736283D1 (en) | 2006-08-17 |
TW367683B (en) | 1999-08-21 |
ATE332548T1 (en) | 2006-07-15 |
EP0891611B1 (en) | 2006-07-05 |
ES2267138T3 (en) | 2007-03-01 |
AU2297597A (en) | 1997-10-17 |
CA2249463A1 (en) | 1997-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK0891611T3 (en) | Access control system for a function in which the encryption requires several dynamic variables | |
HK1023202A1 (en) | Authenticating system with microcircuit card. | |
MX9606091A (en) | Generation of cryptographic signatures using hash keys. | |
CA2075329A1 (en) | Public key cryptosystem key management based on control vectors | |
DK0504364T3 (en) | Distributed User Authentication Protocol | |
EP0711051B1 (en) | Data processing system with verification of authenticity of cryptographic algorithms according to the challenge/response principle | |
EP0636963A3 (en) | Authentication system using one-time passwords | |
CA2154970A1 (en) | Method for sharing secret information, generating a digital signature, and performing certification in a communication system that has a plurality of information procesing apparatuses and a communication system that employs such a method | |
KR970064058A (en) | Data Security Method and System | |
KR960703248A (en) | DATA PROTECTION SYSTEM | |
ES2069553T3 (en) | TERMINAL CONTROLLED BY DATA SUPPORT IN A DATA EXCHANGE SYSTEM. | |
DE69634880D1 (en) | METHOD AND APPARATUS FOR CONTROLLED ACCESS TO ENCRYPTED DATA STORES IN A COMPUTER SYSTEM | |
DK0885417T3 (en) | Access control - / - cryptosystem | |
CA2219344A1 (en) | Method for granting authorized users to access a computer system | |
SE9503343D0 (en) | Method for encrypting information | |
BR9808167A (en) | Electronic data processing device and system | |
SE0003464D0 (en) | A method and a system for improving logon security in network applications | |
EP0121853A3 (en) | Data processing system having public encryption and private decryption keys | |
WO2023023275A3 (en) | Data sharing solution | |
ATE218233T1 (en) | ACCESS CONTROL SYSTEM TO A FUNCTION INCLUDING A CLOCK SYNCHRONIZING DEVICE | |
RU97108167A (en) | METHOD AND DEVICE FOR SECURE IDENTIFICATION OF MOBILE USER IN COMMUNICATION NETWORK | |
SE9701894D0 (en) | Method and devics for computer systems | |
KR102115828B1 (en) | Paper spillage prevention method based on block chain | |
KR19990040393A (en) | Combination encryption method using communication device and combination encryption device suitable for performing the same |