DK128585A - PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION - Google Patents

PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION Download PDF

Info

Publication number
DK128585A
DK128585A DK128585A DK128585A DK128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A DK 128585 A DK128585 A DK 128585A
Authority
DK
Denmark
Prior art keywords
identification
procedure
determining
unauthorized use
unauthorized
Prior art date
Application number
DK128585A
Other languages
Danish (da)
Other versions
DK128585D0 (en
Inventor
Stefan Scheinert
Christoph Grauel
Original Assignee
Philips Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Nv filed Critical Philips Nv
Publication of DK128585D0 publication Critical patent/DK128585D0/en
Publication of DK128585A publication Critical patent/DK128585A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)
DK128585A 1984-03-24 1985-03-21 PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION DK128585A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE19843410937 DE3410937A1 (en) 1984-03-24 1984-03-24 Method for identifying the unauthorised use of an identifier

Publications (2)

Publication Number Publication Date
DK128585D0 DK128585D0 (en) 1985-03-21
DK128585A true DK128585A (en) 1985-09-25

Family

ID=6231544

Family Applications (1)

Application Number Title Priority Date Filing Date
DK128585A DK128585A (en) 1984-03-24 1985-03-21 PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION

Country Status (5)

Country Link
JP (3) JPS60236537A (en)
CA (1) CA1242501A (en)
DE (1) DE3410937A1 (en)
DK (1) DK128585A (en)
FR (1) FR2561841B1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3420874A1 (en) * 1984-06-05 1985-12-05 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt Method and arrangement for monitoring network access in telecommunications networks
DE3619566A1 (en) * 1986-06-11 1987-12-17 Omikron Systemhaus Gesellschft Method and system for data transmission
FR2614162B1 (en) * 1987-04-17 1993-12-10 Flonic Sa ANALOGUE AUTHENTICATION SYSTEM RECIPROCED BETWEEN A TERMINAL AND A TRANSMISSION LINE
ES2040786T3 (en) * 1987-08-14 1993-11-01 Siemens Aktiengesellschaft DATA TRANSMISSION PROCEDURE.
US5239294A (en) * 1989-07-12 1993-08-24 Motorola, Inc. Method and apparatus for authenication and protection of subscribers in telecommunication systems
US5091942A (en) * 1990-07-23 1992-02-25 Ericsson Ge Mobile Communications Holding, Inc. Authentication system for digital cellular communications
DE4223258C3 (en) * 1992-07-15 2001-03-15 Telefunken Microelectron Method for verifiable transmission of data
DE4317143C2 (en) * 1993-05-24 1999-02-18 Deutsche Telekom Mobil Method and device for operating a mobile radio network
DE4335161A1 (en) * 1993-10-15 1995-04-20 Joachim Linz Method and installation for authenticating connections which can be set up via a telephone network
DE4336995A1 (en) * 1993-10-29 1995-05-04 Sel Alcatel Ag Method and device for determining the assignment of a mobile radio device to device lists
DE4416598A1 (en) * 1994-05-11 1995-11-16 Deutsche Bundespost Telekom Securing telecommunication connection against unauthorised use
US5539828A (en) * 1994-05-31 1996-07-23 Intel Corporation Apparatus and method for providing secured communications
DE4445615A1 (en) * 1994-12-21 1996-06-27 Sel Alcatel Ag Confidentiality protection system for communications network
DE19523654A1 (en) * 1995-06-29 1997-01-02 Sel Alcatel Ag Fraud-proof equipment identification method
JPH10281943A (en) * 1997-04-09 1998-10-23 Honda Motor Co Ltd Vehicle diagnosis device

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH516854A (en) * 1969-11-29 1971-12-15 Ciba Geigy Ag Method and device for encrypted transmission of information
DE2536452A1 (en) * 1975-08-16 1977-02-24 Licentia Gmbh Car radio telephone subscriber search system - enables calling subscriber to dial search code to examine memory of local exchange information units
DE2635795B2 (en) * 1975-09-09 1980-08-21 Dasy Inter S.A., Genf (Schweiz) Method and device for checking the authenticity of identification cards and similar documents
US4114139A (en) * 1977-01-25 1978-09-12 International Business Machines Corporation Security controlled information exchange system
US4214230A (en) * 1978-01-19 1980-07-22 Rolf Blom Personal identification system
US4310720A (en) 1978-03-31 1982-01-12 Pitney Bowes Inc. Computer accessing system
LU79726A1 (en) * 1978-05-29 1978-11-28 Eckert R TELESCOPIC FORK
EP0018129B1 (en) * 1979-04-02 1982-11-17 Motorola, Inc. Method of providing security of data on a communication path
DE2924325B2 (en) * 1979-06-15 1981-06-11 Hermann 7742 St. Georgen Stockburger Method and device for the secret identification and evaluation of machine-readable data carriers
US4349695A (en) * 1979-06-25 1982-09-14 Datotek, Inc. Recipient and message authentication method and system
JPS5829669B2 (en) * 1979-10-22 1983-06-24 日本電信電話株式会社 Mobile communication user-only method
FR2469760A1 (en) * 1979-11-09 1981-05-22 Cii Honeywell Bull METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA
US4304990A (en) * 1979-12-11 1981-12-08 Atalla Technovations Multilevel security apparatus and method
DE3000560C2 (en) * 1980-01-09 1986-10-09 Hermann 7742 St Georgen Stockburger Method for checking the authenticity of a data carrier and device for carrying out the method
JPS5915419B2 (en) * 1980-02-01 1984-04-09 日本電信電話株式会社 Method to prevent unauthorized use of mobile devices
DE3012231C2 (en) * 1980-03-28 1987-09-10 Siemens AG, 1000 Berlin und 8000 München Mobile radio network at national level
JPS5888472U (en) * 1981-12-11 1983-06-15 株式会社日立製作所 Terminal identification code verification device
IL64675A0 (en) * 1981-12-30 1982-03-31 Greenberg Avigdor Data verification system
NL8201077A (en) * 1982-03-16 1983-10-17 Philips Nv A COMMUNICATION SYSTEM, CONTAINING A CENTRAL DATA PROCESSING DEVICE, ACCESS STATIONS AND EXTERNAL STATIONS, WHICH A CRYPTOGRAPHIC CHECK IS FORDICULARIZING AN EXTERNAL STATION, AND EXTERNAL STATIONS FOR USE IN SUCH A COMMUNITY.
EP0090771B1 (en) * 1982-03-26 1985-10-02 GRETAG Aktiengesellschaft Method and apparatus for the enciphered transmission of information
DE3212023A1 (en) * 1982-03-31 1983-10-06 Siemens Ag Active-address-related information system for the administration of mobile communication subscribers
DE3223034C2 (en) * 1982-06-19 1986-12-11 Mico Datensysteme GmbH, 7252 Weil der Stadt Procedure for the detection of counterfeit data carriers

Also Published As

Publication number Publication date
DE3410937C2 (en) 1991-08-14
JPH09154177A (en) 1997-06-10
JPS60236537A (en) 1985-11-25
DK128585D0 (en) 1985-03-21
JPH0548981B2 (en) 1993-07-23
CA1242501A (en) 1988-09-27
DE3410937A1 (en) 1985-10-03
FR2561841A1 (en) 1985-09-27
FR2561841B1 (en) 1994-04-01
JP2759732B2 (en) 1998-05-28
JPH0715429A (en) 1995-01-17

Similar Documents

Publication Publication Date Title
DK240285A (en) PROCEDURE FOR DETERMINING POLYMORPH RESTRICTIONS AND KITTIL USE IN THE PROCEDURE
DK43089D0 (en) PROCEDURE FOR THE DETECTION OF CHEMICALS
DK141992D0 (en) 2- (3-OXOCYCLOALKEN-1-YL) DERIVATIVES -AMINOBENZONITRIL
DK407486D0 (en) ORGANOSILIC COMPOUNDS AND POLYMERS THEREOF
DK128585D0 (en) PROCEDURE FOR DETERMINING THE UNAUTHORIZED USE OF AN IDENTIFICATION
DK450686A (en) PROCEDURE FOR THE MANUFACTURING OF MORTENITIES
DK173686D0 (en) HETEROCYCLIC COMPOUNDS AND PROCEDURES FOR PREPARING IT
DK533186D0 (en) COAT FOR PERCUTANEATIC FITTING AND PROCEDURE FOR USING THE COAT
DK214585D0 (en) PROCEDURE FOR THE PREPARATION OF IMIDAZORIFAMYCINES
DK543382A (en) PROCEDURE FOR MANUFACTURING CEMENT AND THE CEMENT OBTAINED THEREOF
IT1186135B (en) PROBE FOR THE IDENTIFICATION OF PRECIPITATI DI BRINA
DK431185D0 (en) SUBSTITUTED QUINAZOL INDONES AND PROCEDURES FOR PREPARING THEREOF
DK96985A (en) PROCEDURE FOR THE PREPARATION OF CROSS-BOND POLYAMINES
DK307182A (en) PROCEDURE FOR DETERMINING THE PRESENCE OF AN ATTACK
DK115685A (en) PRESPAP AND PROCEDURES FOR PREPARING THEREOF
FI811835L (en) FOLLOWING THE IDENTIFICATION OF BRITAIN
DK491983A (en) HETEROCYCLIC RELATIONS AND PROCEDURES FOR PRODUCING THE SAME
DK239385A (en) CRYSTALLINIC METALOPHOSPHOALUMINATES AND PROCEDURES FOR THE PREPARATION AND USE OF THESE
DK570082A (en) 4-CYAN-2-AZETIDINONES AND PROCEDURES FOR THE PREPARATION OF SUCH AS
DK434685A (en) PROCEDURE FOR THE PREPARATION OF HYDROXYTHIOALKNES UNKNOWN AND THE COMPOUNDS THEREOF
DK60485D0 (en) CLAMBE OF CRAMBE MARITIMA L, PROCEDURE FOR VEGETATIVE MARKING THEREOF, AND MEDIA FOR USING THE PROCEDURE
DK469785A (en) PROCEDURE FOR THE MANUFACTURE OF ALDEHYDES
DE3581234D1 (en) DEVICE FOR DETERMINING THE PRESENCE OF TONER PARTICLES.
DK270687A (en) PROCEDURE FOR DETERMINING THE DISTANCE BETWEEN NEIGHBORHOOD
NO172368C (en) PROCEDURE FOR DETERMINING THE POSITION OF AN OBJECT

Legal Events

Date Code Title Description
AHS Application shelved for other reasons than non-payment