EP2266292A1 - Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration - Google Patents

Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration

Info

Publication number
EP2266292A1
EP2266292A1 EP08735357A EP08735357A EP2266292A1 EP 2266292 A1 EP2266292 A1 EP 2266292A1 EP 08735357 A EP08735357 A EP 08735357A EP 08735357 A EP08735357 A EP 08735357A EP 2266292 A1 EP2266292 A1 EP 2266292A1
Authority
EP
European Patent Office
Prior art keywords
access
configuration
access control
configuration access
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP08735357A
Other languages
German (de)
English (en)
Inventor
Anton Kruk
Volker Mösker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gigaset Communications GmbH
Original Assignee
Gigaset Communications GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gigaset Communications GmbH filed Critical Gigaset Communications GmbH
Publication of EP2266292A1 publication Critical patent/EP2266292A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords

Definitions

  • the invention relates to a method for access control for a configuration access of a device according to the preamble of patent claim 1, and a device with a
  • firewall obfuscates both the local ad- dressing of devices to the Internet and also blocks many locally used "ports" to the Internet, so that an attack on the configuration accesses of devices is also made more difficult. Nevertheless, attacks on the configuration accesses are not completely ruled out even in these cases, because in many cases firewalls can lose their effectiveness due to locally installed malware, for example so-called “Trojans” or "key loggers”.
  • the object is achieved by a method according to the patent claim 1 and by a device according to the patent claim 11.
  • PINs o.a. to release the configuration access (limited in time) only if an (authorized) access is actually to be made.
  • the configuration access should only be released by the user or a person commissioned by him for a short time if necessary.
  • the object solution provides a method for access control for a configuration access of a device in which the configuration access is accessed via a first data connection and in which the configuration access is protected by at least one primary access control device , In this case, the device is accessed by means of a second access before using the configuration access, the configuration access being released after this access.
  • This method has the advantage that the pre-accession configuration access can not be a target for an abusive attack, with only an actual authorized user accessing it.
  • the solution of the problem further provides a device with access control for a configuration access, wherein the configuration access is accessible via a first data connection, and wherein the configuration access is protected by means of at least one primary access control device.
  • the device is equipped with a second access, this second access being independent of the first data connection.
  • the configuration access is only released after access to the second access for use by this device, the method described above can be performed, whereby the there Improvements regarding the protection against abusive access described above can be realized.
  • the configuration access is enabled only for a predetermined period of time and locked again after this period of time.
  • the thus limited access time eliminates the risk that a user forgets or even deliberately omits the re-activation of the lock, and the shorter the (preconfigured) risk of successful abusive attack ) Period of time during which the configuration access is enabled.
  • the timer is advantageously set up so that it is started only by an authorized access to the second access, for which a corresponding access control can be provided.
  • the second access is a device located on the device or connected to the device. Tied switching device or input device, for example in the form of a key switch or in the form of a function that is activated at a locally located on the device user interface.
  • remote access may also prove advantageous if, as the second access, a second connection independent of the first data connection, e.g. Data connection is used. In this case would have for abusive access both an abusive
  • a frequently used way to configure a device can be used if the configuration access is a web-based user interface.
  • a user-specific user-recognition query and / or a password query and / or a PIN query are used as the primary access control device.
  • the device upon access to the second access, to issue a preferably limited valid acknowledgment code which must be entered at the next configuration session to use the configuration access as part of the primary access control device.
  • the method is particularly useful when the device uses a base station for a mobile communication device, such as a base station for a DECT telephone system or for a WLAN computer network. It is advantageous for the second access at the base station already operated (registered) device used. Thus, in the case of mobile devices, access to the second access takes place via a radio interface (air interface), while the first data connection is a (eg, corded) network. to a local data network (LAN).
  • a radio interface air interface
  • the first data connection is a (eg, corded) network.
  • LAN local data network
  • a configuration session can, in principle, take any length of time, but is terminated automatically if no further entries are made to the configuration access within a predetermined period of time.
  • the second access can also be protected by means of access control; in the case of a switch attached to the device or a switch connected thereto, these may also be mechanical means, for example key switches or the like; otherwise, PIN requests, smart card readers, fingerprint sensors or the like are also used here. used.
  • the single figure shows a schematic representation of an arrangement of a device, a data network, a "firewall” and multiple computers.
  • the device G is connected to the public communication network ⁇ N (public ISDN telephone network) and the local data network LAN.
  • the local data network LAN is connected via a router with a firewall FW to a public data network DN, namely the Internet.
  • a first data processing device PCl personal computer
  • the second data processing device PC2 is part of the public data network DN.
  • NAT Network Address Translation
  • the configuration of the device G by means of a web browser installed on the data processing device PC1 will be explained below with reference to the figure.
  • a user enters into the address bar of the web browser to the data processing device PCl the local network address (IP address, URL, URI) of the device G, whereby the user interface UI of the device G is initiated via an integrated web Server to transfer an access page for the configuration access via the local data network LAN to the data processing device PCl and display there by means of the browser.
  • This first access page contains information that the configuration access is currently blocked and no further entries are possible.
  • the user accesses a second access of the device G, namely the T key, after which the first access page of the configuration access is updated and transmitted via the local data network LAN as the first data connection to the browser of the data processing device PC1.
  • This can be done either by a triggered by the device G "refresh" the presentation of the first access page, or by re-calling the network address of the device G by the user of the data processing device PCl.
  • the user can also confirm the key prior to accessing the configuration access, then omit the issue of the "locked" information and the configuration access can be used after passing through the primary access control device.
  • a timer ZG of the device G is started simultaneously with the transmission of the updated access page, which is pre-assigned with 120 seconds in the present exemplary embodiment.
  • a user of the data processing device PC1 or another data processing device PC2 has 120 seconds to start a configuration session via a first data connection, which runs here via the local data network LAN.
  • the user of the data processing device PC1 is now confronted on a second access page with a primary access control device, which consists in entering a valid combination of a user name and a password;
  • the timer ZG is restarted in the present embodiment with each access to one of the parameters, so that only in cases where there are no further inputs of the user for more than 120 seconds, the configuration session by the device G is forcibly terminated.
  • the maximum value of the timer ZG is a value that specifies the maximum value for the timer ZG.
  • a user can also call up a corresponding menu function of the handset MT registered on the device G or another connected device.
  • the second access from a corresponding procedure, which takes place for a corresponding transmission of a command sequence from the handset MT via an air interface (radio link) to the antenna ANT of the device G, wherein in the further sequence after evaluation of the command sequence, the timer ZG is started.
  • the data processing device PC2 can be used in an alternative embodiment for a configuration session, - it is assumed that the data processing device PC2 and thus its users are not in the immediate vicinity of the device and thus with a local access, for example to the Key T as second access is not possible.
  • a user could ask by means of a telephone call or a person located near the device G to operate the T key.
  • the user of the data processing device PC2 can send an e-mail message to an e-mail account assigned to the device G, this e-mail message then containing a special identifier (password) for the start of the timer ZG.
  • Such an e-mail message is then received by an E-client located in the device G, evaluated and taken as a reason for positive evaluation of the identifier contained in the e-mail message for the start of the timer ZG.
  • the second access then consists in the use of an e-mail message or the facilities required for the reception and evaluation of such a message, although for the transmission of the e-mail message the same transmission medium, namely the local data network LAN , but there is another data connection in it.
  • there A potential attack in the sense of improper access would have to coordinate two logically separate attacks, namely on the web server of the device G and on the email client of the device G, whereby the likelihood of a success of such an attack is reduced.
  • an attack on the configuration access and thus only on the primary access control device is only possible if "randomly" the configuration access was "opened” by a previous access to the second access, which however is difficult to predict Event represents.
  • an acknowledgment code generated, for example, by means of random number generator, e.g. by means of a display attached to the device or via an output on a display of the handset MT.
  • This acknowledgment code is stored simultaneously within the device G, whereby a user is additionally or alternatively requested to enter the acknowledgment code in the context of authentication with respect to the primary access control. Only in the case where the entered acknowledgment code matches the acknowledgment code previously issued by the device, the configuration access is released from the device G. In this case, each acknowledgment code is advantageously usable only once and / or only for a limited time.
  • the second access from the trunk connection of the device G ie from the connection to the public communication network ⁇ N, the ISDN network.
  • an authorized external user for example, a user of the data processing device PC2
  • the user is prompted after the conclusion of the connection to enter a PIN that must be known to this user, and which enters this user on the keyboard of his phone and which is transmitted by means of DTMF signaling or other transmission to the device G.
  • the device G enables access to the user interface UI by starting the timer ZG and accessing the configuration access by means of the data processing device PC2 , Where appropriate, the access control device requires the input of further data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

L'invention concerne un procédé permettant le contrôle d'accès pour une entrée de configuration (UI) d'un appareil (G), l'accès à l'entrée de configuration (UI) étant réalisé par le biais d'une première liaison de données (LAN) et l'entrée de configuration (UI) étant protégée par au moins un dispositif primaire de contrôle d'accès. Ce faisant, on accède à l'appareil (G) avant l'utilisation de l'entrée de configuration (UI) au moyen d'un deuxième accès, l'entrée de configuration (UI) étant libérée après cet accès pendant un certain laps de temps et à nouveau bloqué une fois ce laps de temps écoulé.
EP08735357A 2008-04-22 2008-04-22 Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration Withdrawn EP2266292A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2008/003228 WO2009129821A1 (fr) 2008-04-22 2008-04-22 Procédé de contrôle d’accès pour une entrée de configuration d'appareil et appareil à un contrôle d’accès pour une entrée de configuration

Publications (1)

Publication Number Publication Date
EP2266292A1 true EP2266292A1 (fr) 2010-12-29

Family

ID=40187997

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08735357A Withdrawn EP2266292A1 (fr) 2008-04-22 2008-04-22 Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration

Country Status (2)

Country Link
EP (1) EP2266292A1 (fr)
WO (1) WO2009129821A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009060469A1 (de) * 2009-12-22 2011-06-30 eQ-3 AG, 26789 Verfahren und Vorrichtung zur Sicherung der Kommunikation zwischen einem Heimautomatisierungsserver und einem zentralen Konfigurationsserver
EP2842358A4 (fr) * 2012-04-23 2016-01-06 Ericsson Telefon Ab L M Appareil oam pour une station radio de base

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3628250B2 (ja) * 2000-11-17 2005-03-09 株式会社東芝 無線通信システムで用いられる登録・認証方法
US7522729B2 (en) * 2003-11-06 2009-04-21 Buffalo Inc. Encryption key setting system, access point, encryption key setting method, and authentication code setting system
US20050138148A1 (en) * 2003-12-22 2005-06-23 At&T Corporation Signaling managed device presence to control security
EP1615380A1 (fr) * 2004-07-07 2006-01-11 Thomson Multimedia Broadband Belgium Dispositif et méthode pour la registration dans un réseau local sans fil

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2009129821A1 *

Also Published As

Publication number Publication date
WO2009129821A1 (fr) 2009-10-29

Similar Documents

Publication Publication Date Title
DE602004005461T2 (de) Mobile Authentifizierung für den Netzwerkzugang
DE69637053T2 (de) Personalisierung von Teilnehmeridentifikationsmodulen für Mobiltelefone über Funk
EP3416140B1 (fr) Procédé et dispositif d'authentification d'un utilisateur sur un véhicule
EP2250598B1 (fr) Système client/serveur de communication selon le protocole standard opc ua comportant des mécanismes d'authentification single sign-on et procédé d'exécution de single sign-on dans ce système
DE102006042358B4 (de) Verfahren und Servicezentrale zum Aktualisieren von Berechtigungsdaten in einer Zugangsanordnung
DE60226014T2 (de) Tragbares gerät zum sichern des paketenverkehrs in einem wirtsystem
EP2898714A1 (fr) Module d'identité d'abonné permettant d'authentifier un abonné d'un réseau de communication
EP3582033B1 (fr) Procédé de fonctionnement securisé d'un appareil de terrain
DE102008046639B4 (de) Verfahren zur Bereitstellung mindestens einer Leistung über ein Serversystem
EP1964042B1 (fr) Procede de preparation d'une carte a puce pour des services de signature electronique
EP3266186B1 (fr) Appareil de réseau et procédé d'accès à un composant de réseau dans un réseau de données
EP2266292A1 (fr) Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration
DE60115672T2 (de) Sicherheitsarchitektur der internet-protokoll telefonie
AT504633B1 (de) Verfahren zur authentifizierung eines mobilfunkendgerätes
EP3585084A1 (fr) Établissement d'une autorisation d'accès à un réseau partiel d'un réseau de téléphonie mobile
WO2017144649A1 (fr) Sécurisation d'autorisations d'accès à des installations fixes
DE60310872T2 (de) Verfahren zur Verwaltung einer Einstellung eines Gateways von einem Benutzer des Gateways
EP1935202B1 (fr) Deblocage de cartes de telephonie mobile
EP1869921B1 (fr) Procede pour ameliorer la securite contre l'utilisation abusive d'une carte a puce et carte a puce pour realiser ce procede
EP1936905B1 (fr) Procédé destiné à l'utilisation d'un terminal VoIP et terminal VoIP
EP1768316B1 (fr) Déblocage d'une carte mobile
EP1419636B1 (fr) Procede d'ouverture automatique de session d'une station d'abonne se trouvant en particulier a bord d'un vehicule dans un systeme d'information externe
EP2456157A1 (fr) Protection de la sphère privée lors de l'inscription d'un utilisateur à un service Web sécurisé à l'aide d'un téléphone mobile
DE60205176T2 (de) Vorrichtung und Verfahren zur Benutzerauthentisierung
WO2024083877A1 (fr) Procédé de fonctionnement d'un dispositif de verrouillage électromécanique

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20100902

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20120717

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130129