DK128585A - PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION - Google Patents
PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION Download PDFInfo
- Publication number
- DK128585A DK128585A DK128585A DK128585A DK128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A
- Authority
- DK
- Denmark
- Prior art keywords
- identification
- procedure
- determining
- unauthorized use
- unauthorized
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19843410937 DE3410937A1 (en) | 1984-03-24 | 1984-03-24 | Method for identifying the unauthorised use of an identifier |
Publications (2)
Publication Number | Publication Date |
---|---|
DK128585D0 DK128585D0 (en) | 1985-03-21 |
DK128585A true DK128585A (en) | 1985-09-25 |
Family
ID=6231544
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK128585A DK128585A (en) | 1984-03-24 | 1985-03-21 | PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION |
Country Status (5)
Country | Link |
---|---|
JP (3) | JPS60236537A (en) |
CA (1) | CA1242501A (en) |
DE (1) | DE3410937A1 (en) |
DK (1) | DK128585A (en) |
FR (1) | FR2561841B1 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3420874A1 (en) * | 1984-06-05 | 1985-12-05 | Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt | Method and arrangement for monitoring network access in telecommunications networks |
DE3619566A1 (en) * | 1986-06-11 | 1987-12-17 | Omikron Systemhaus Gesellschft | Method and system for data transmission |
FR2614162B1 (en) * | 1987-04-17 | 1993-12-10 | Flonic Sa | ANALOGUE AUTHENTICATION SYSTEM RECIPROCED BETWEEN A TERMINAL AND A TRANSMISSION LINE |
ES2040786T3 (en) * | 1987-08-14 | 1993-11-01 | Siemens Aktiengesellschaft | DATA TRANSMISSION PROCEDURE. |
US5239294A (en) * | 1989-07-12 | 1993-08-24 | Motorola, Inc. | Method and apparatus for authenication and protection of subscribers in telecommunication systems |
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
DE4223258C3 (en) * | 1992-07-15 | 2001-03-15 | Telefunken Microelectron | Method for verifiable transmission of data |
DE4317143C2 (en) * | 1993-05-24 | 1999-02-18 | Deutsche Telekom Mobil | Method and device for operating a mobile radio network |
DE4335161A1 (en) * | 1993-10-15 | 1995-04-20 | Joachim Linz | Method and installation for authenticating connections which can be set up via a telephone network |
DE4336995A1 (en) * | 1993-10-29 | 1995-05-04 | Sel Alcatel Ag | Method and device for determining the assignment of a mobile radio device to device lists |
DE4416598A1 (en) * | 1994-05-11 | 1995-11-16 | Deutsche Bundespost Telekom | Securing telecommunication connection against unauthorised use |
US5539828A (en) * | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
DE4445615A1 (en) * | 1994-12-21 | 1996-06-27 | Sel Alcatel Ag | Confidentiality protection system for communications network |
DE19523654A1 (en) * | 1995-06-29 | 1997-01-02 | Sel Alcatel Ag | Fraud-proof equipment identification method |
JPH10281943A (en) * | 1997-04-09 | 1998-10-23 | Honda Motor Co Ltd | Vehicle diagnosis device |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CH516854A (en) * | 1969-11-29 | 1971-12-15 | Ciba Geigy Ag | Method and device for encrypted transmission of information |
DE2536452A1 (en) * | 1975-08-16 | 1977-02-24 | Licentia Gmbh | Car radio telephone subscriber search system - enables calling subscriber to dial search code to examine memory of local exchange information units |
DE2635795B2 (en) * | 1975-09-09 | 1980-08-21 | Dasy Inter S.A., Genf (Schweiz) | Method and device for checking the authenticity of identification cards and similar documents |
US4114139A (en) * | 1977-01-25 | 1978-09-12 | International Business Machines Corporation | Security controlled information exchange system |
US4214230A (en) * | 1978-01-19 | 1980-07-22 | Rolf Blom | Personal identification system |
US4310720A (en) | 1978-03-31 | 1982-01-12 | Pitney Bowes Inc. | Computer accessing system |
LU79726A1 (en) * | 1978-05-29 | 1978-11-28 | Eckert R | TELESCOPIC FORK |
EP0018129B1 (en) * | 1979-04-02 | 1982-11-17 | Motorola, Inc. | Method of providing security of data on a communication path |
DE2924325B2 (en) * | 1979-06-15 | 1981-06-11 | Hermann 7742 St. Georgen Stockburger | Method and device for the secret identification and evaluation of machine-readable data carriers |
US4349695A (en) * | 1979-06-25 | 1982-09-14 | Datotek, Inc. | Recipient and message authentication method and system |
JPS5829669B2 (en) * | 1979-10-22 | 1983-06-24 | 日本電信電話株式会社 | Mobile communication user-only method |
FR2469760A1 (en) * | 1979-11-09 | 1981-05-22 | Cii Honeywell Bull | METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA |
US4304990A (en) * | 1979-12-11 | 1981-12-08 | Atalla Technovations | Multilevel security apparatus and method |
DE3000560C2 (en) * | 1980-01-09 | 1986-10-09 | Hermann 7742 St Georgen Stockburger | Method for checking the authenticity of a data carrier and device for carrying out the method |
JPS5915419B2 (en) * | 1980-02-01 | 1984-04-09 | 日本電信電話株式会社 | Method to prevent unauthorized use of mobile devices |
DE3012231C2 (en) * | 1980-03-28 | 1987-09-10 | Siemens AG, 1000 Berlin und 8000 München | Mobile radio network at national level |
JPS5888472U (en) * | 1981-12-11 | 1983-06-15 | 株式会社日立製作所 | Terminal identification code verification device |
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
NL8201077A (en) * | 1982-03-16 | 1983-10-17 | Philips Nv | A COMMUNICATION SYSTEM, CONTAINING A CENTRAL DATA PROCESSING DEVICE, ACCESS STATIONS AND EXTERNAL STATIONS, WHICH A CRYPTOGRAPHIC CHECK IS FORDICULARIZING AN EXTERNAL STATION, AND EXTERNAL STATIONS FOR USE IN SUCH A COMMUNITY. |
EP0090771B1 (en) * | 1982-03-26 | 1985-10-02 | GRETAG Aktiengesellschaft | Method and apparatus for the enciphered transmission of information |
DE3212023A1 (en) * | 1982-03-31 | 1983-10-06 | Siemens Ag | Active-address-related information system for the administration of mobile communication subscribers |
DE3223034C2 (en) * | 1982-06-19 | 1986-12-11 | Mico Datensysteme GmbH, 7252 Weil der Stadt | Procedure for the detection of counterfeit data carriers |
-
1984
- 1984-03-24 DE DE19843410937 patent/DE3410937A1/en active Granted
-
1985
- 1985-03-21 DK DK128585A patent/DK128585A/en not_active Application Discontinuation
- 1985-03-21 CA CA000477182A patent/CA1242501A/en not_active Expired
- 1985-03-22 FR FR8504296A patent/FR2561841B1/en not_active Expired - Lifetime
- 1985-03-25 JP JP60060508A patent/JPS60236537A/en active Granted
-
1993
- 1993-01-28 JP JP5012468A patent/JP2759732B2/en not_active Expired - Lifetime
-
1996
- 1996-03-27 JP JP8099331A patent/JPH09154177A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
DE3410937C2 (en) | 1991-08-14 |
JPH09154177A (en) | 1997-06-10 |
JPS60236537A (en) | 1985-11-25 |
DK128585D0 (en) | 1985-03-21 |
JPH0548981B2 (en) | 1993-07-23 |
CA1242501A (en) | 1988-09-27 |
DE3410937A1 (en) | 1985-10-03 |
FR2561841A1 (en) | 1985-09-27 |
FR2561841B1 (en) | 1994-04-01 |
JP2759732B2 (en) | 1998-05-28 |
JPH0715429A (en) | 1995-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK240285A (en) | PROCEDURE FOR DETERMINING POLYMORPH RESTRICTIONS AND KITTIL USE IN THE PROCEDURE | |
DK43089D0 (en) | PROCEDURE FOR THE DETECTION OF CHEMICALS | |
DK141992D0 (en) | 2- (3-OXOCYCLOALKEN-1-YL) DERIVATIVES -AMINOBENZONITRIL | |
DK407486D0 (en) | ORGANOSILIC COMPOUNDS AND POLYMERS THEREOF | |
DK128585D0 (en) | PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION | |
DK450686A (en) | PROCEDURE FOR THE MANUFACTURING OF MORTENITIES | |
DK173686D0 (en) | HETEROCYCLIC COMPOUNDS AND PROCEDURES FOR PREPARING IT | |
DK533186D0 (en) | COAT FOR PERCUTANEATIC FITTING AND PROCEDURE FOR USING THE COAT | |
DK214585D0 (en) | PROCEDURE FOR THE PREPARATION OF IMIDAZORIFAMYCINES | |
DK543382A (en) | PROCEDURE FOR MANUFACTURING CEMENT AND THE CEMENT OBTAINED THEREOF | |
IT1186135B (en) | PROBE FOR THE IDENTIFICATION OF PRECIPITATI DI BRINA | |
DK431185D0 (en) | SUBSTITUTED QUINAZOL INDONES AND PROCEDURES FOR PREPARING THEREOF | |
DK96985A (en) | PROCEDURE FOR THE PREPARATION OF CROSS-BOND POLYAMINES | |
DK307182A (en) | PROCEDURE FOR DETERMINING THE PRESENCE OF AN ATTACK | |
DK115685A (en) | PRESPAP AND PROCEDURES FOR PREPARING THEREOF | |
FI811835L (en) | FOLLOWING THE IDENTIFICATION OF BRITAIN | |
DK491983A (en) | HETEROCYCLIC RELATIONS AND PROCEDURES FOR PRODUCING THE SAME | |
DK239385A (en) | CRYSTALLINIC METALOPHOSPHOALUMINATES AND PROCEDURES FOR THE PREPARATION AND USE OF THESE | |
DK570082A (en) | 4-CYAN-2-AZETIDINONES AND PROCEDURES FOR THE PREPARATION OF SUCH AS | |
DK434685A (en) | PROCEDURE FOR THE PREPARATION OF HYDROXYTHIOALKNES UNKNOWN AND THE COMPOUNDS THEREOF | |
DK60485D0 (en) | CLAMBE OF CRAMBE MARITIMA L, PROCEDURE FOR VEGETATIVE MARKING THEREOF, AND MEDIA FOR USING THE PROCEDURE | |
DK469785A (en) | PROCEDURE FOR THE MANUFACTURE OF ALDEHYDES | |
DE3581234D1 (en) | DEVICE FOR DETERMINING THE PRESENCE OF TONER PARTICLES. | |
DK270687A (en) | PROCEDURE FOR DETERMINING THE DISTANCE BETWEEN NEIGHBORHOOD | |
NO172368C (en) | PROCEDURE FOR DETERMINING THE POSITION OF AN OBJECT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AHS | Application shelved for other reasons than non-payment |