EP2266292A1 - Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration - Google Patents
Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configurationInfo
- Publication number
- EP2266292A1 EP2266292A1 EP08735357A EP08735357A EP2266292A1 EP 2266292 A1 EP2266292 A1 EP 2266292A1 EP 08735357 A EP08735357 A EP 08735357A EP 08735357 A EP08735357 A EP 08735357A EP 2266292 A1 EP2266292 A1 EP 2266292A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- access
- configuration
- access control
- configuration access
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Definitions
- the invention relates to a method for access control for a configuration access of a device according to the preamble of patent claim 1, and a device with a
- firewall obfuscates both the local ad- dressing of devices to the Internet and also blocks many locally used "ports" to the Internet, so that an attack on the configuration accesses of devices is also made more difficult. Nevertheless, attacks on the configuration accesses are not completely ruled out even in these cases, because in many cases firewalls can lose their effectiveness due to locally installed malware, for example so-called “Trojans” or "key loggers”.
- the object is achieved by a method according to the patent claim 1 and by a device according to the patent claim 11.
- PINs o.a. to release the configuration access (limited in time) only if an (authorized) access is actually to be made.
- the configuration access should only be released by the user or a person commissioned by him for a short time if necessary.
- the object solution provides a method for access control for a configuration access of a device in which the configuration access is accessed via a first data connection and in which the configuration access is protected by at least one primary access control device , In this case, the device is accessed by means of a second access before using the configuration access, the configuration access being released after this access.
- This method has the advantage that the pre-accession configuration access can not be a target for an abusive attack, with only an actual authorized user accessing it.
- the solution of the problem further provides a device with access control for a configuration access, wherein the configuration access is accessible via a first data connection, and wherein the configuration access is protected by means of at least one primary access control device.
- the device is equipped with a second access, this second access being independent of the first data connection.
- the configuration access is only released after access to the second access for use by this device, the method described above can be performed, whereby the there Improvements regarding the protection against abusive access described above can be realized.
- the configuration access is enabled only for a predetermined period of time and locked again after this period of time.
- the thus limited access time eliminates the risk that a user forgets or even deliberately omits the re-activation of the lock, and the shorter the (preconfigured) risk of successful abusive attack ) Period of time during which the configuration access is enabled.
- the timer is advantageously set up so that it is started only by an authorized access to the second access, for which a corresponding access control can be provided.
- the second access is a device located on the device or connected to the device. Tied switching device or input device, for example in the form of a key switch or in the form of a function that is activated at a locally located on the device user interface.
- remote access may also prove advantageous if, as the second access, a second connection independent of the first data connection, e.g. Data connection is used. In this case would have for abusive access both an abusive
- a frequently used way to configure a device can be used if the configuration access is a web-based user interface.
- a user-specific user-recognition query and / or a password query and / or a PIN query are used as the primary access control device.
- the device upon access to the second access, to issue a preferably limited valid acknowledgment code which must be entered at the next configuration session to use the configuration access as part of the primary access control device.
- the method is particularly useful when the device uses a base station for a mobile communication device, such as a base station for a DECT telephone system or for a WLAN computer network. It is advantageous for the second access at the base station already operated (registered) device used. Thus, in the case of mobile devices, access to the second access takes place via a radio interface (air interface), while the first data connection is a (eg, corded) network. to a local data network (LAN).
- a radio interface air interface
- the first data connection is a (eg, corded) network.
- LAN local data network
- a configuration session can, in principle, take any length of time, but is terminated automatically if no further entries are made to the configuration access within a predetermined period of time.
- the second access can also be protected by means of access control; in the case of a switch attached to the device or a switch connected thereto, these may also be mechanical means, for example key switches or the like; otherwise, PIN requests, smart card readers, fingerprint sensors or the like are also used here. used.
- the single figure shows a schematic representation of an arrangement of a device, a data network, a "firewall” and multiple computers.
- the device G is connected to the public communication network ⁇ N (public ISDN telephone network) and the local data network LAN.
- the local data network LAN is connected via a router with a firewall FW to a public data network DN, namely the Internet.
- a first data processing device PCl personal computer
- the second data processing device PC2 is part of the public data network DN.
- NAT Network Address Translation
- the configuration of the device G by means of a web browser installed on the data processing device PC1 will be explained below with reference to the figure.
- a user enters into the address bar of the web browser to the data processing device PCl the local network address (IP address, URL, URI) of the device G, whereby the user interface UI of the device G is initiated via an integrated web Server to transfer an access page for the configuration access via the local data network LAN to the data processing device PCl and display there by means of the browser.
- This first access page contains information that the configuration access is currently blocked and no further entries are possible.
- the user accesses a second access of the device G, namely the T key, after which the first access page of the configuration access is updated and transmitted via the local data network LAN as the first data connection to the browser of the data processing device PC1.
- This can be done either by a triggered by the device G "refresh" the presentation of the first access page, or by re-calling the network address of the device G by the user of the data processing device PCl.
- the user can also confirm the key prior to accessing the configuration access, then omit the issue of the "locked" information and the configuration access can be used after passing through the primary access control device.
- a timer ZG of the device G is started simultaneously with the transmission of the updated access page, which is pre-assigned with 120 seconds in the present exemplary embodiment.
- a user of the data processing device PC1 or another data processing device PC2 has 120 seconds to start a configuration session via a first data connection, which runs here via the local data network LAN.
- the user of the data processing device PC1 is now confronted on a second access page with a primary access control device, which consists in entering a valid combination of a user name and a password;
- the timer ZG is restarted in the present embodiment with each access to one of the parameters, so that only in cases where there are no further inputs of the user for more than 120 seconds, the configuration session by the device G is forcibly terminated.
- the maximum value of the timer ZG is a value that specifies the maximum value for the timer ZG.
- a user can also call up a corresponding menu function of the handset MT registered on the device G or another connected device.
- the second access from a corresponding procedure, which takes place for a corresponding transmission of a command sequence from the handset MT via an air interface (radio link) to the antenna ANT of the device G, wherein in the further sequence after evaluation of the command sequence, the timer ZG is started.
- the data processing device PC2 can be used in an alternative embodiment for a configuration session, - it is assumed that the data processing device PC2 and thus its users are not in the immediate vicinity of the device and thus with a local access, for example to the Key T as second access is not possible.
- a user could ask by means of a telephone call or a person located near the device G to operate the T key.
- the user of the data processing device PC2 can send an e-mail message to an e-mail account assigned to the device G, this e-mail message then containing a special identifier (password) for the start of the timer ZG.
- Such an e-mail message is then received by an E-client located in the device G, evaluated and taken as a reason for positive evaluation of the identifier contained in the e-mail message for the start of the timer ZG.
- the second access then consists in the use of an e-mail message or the facilities required for the reception and evaluation of such a message, although for the transmission of the e-mail message the same transmission medium, namely the local data network LAN , but there is another data connection in it.
- there A potential attack in the sense of improper access would have to coordinate two logically separate attacks, namely on the web server of the device G and on the email client of the device G, whereby the likelihood of a success of such an attack is reduced.
- an attack on the configuration access and thus only on the primary access control device is only possible if "randomly" the configuration access was "opened” by a previous access to the second access, which however is difficult to predict Event represents.
- an acknowledgment code generated, for example, by means of random number generator, e.g. by means of a display attached to the device or via an output on a display of the handset MT.
- This acknowledgment code is stored simultaneously within the device G, whereby a user is additionally or alternatively requested to enter the acknowledgment code in the context of authentication with respect to the primary access control. Only in the case where the entered acknowledgment code matches the acknowledgment code previously issued by the device, the configuration access is released from the device G. In this case, each acknowledgment code is advantageously usable only once and / or only for a limited time.
- the second access from the trunk connection of the device G ie from the connection to the public communication network ⁇ N, the ISDN network.
- an authorized external user for example, a user of the data processing device PC2
- the user is prompted after the conclusion of the connection to enter a PIN that must be known to this user, and which enters this user on the keyboard of his phone and which is transmitted by means of DTMF signaling or other transmission to the device G.
- the device G enables access to the user interface UI by starting the timer ZG and accessing the configuration access by means of the data processing device PC2 , Where appropriate, the access control device requires the input of further data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
L'invention concerne un procédé permettant le contrôle d'accès pour une entrée de configuration (UI) d'un appareil (G), l'accès à l'entrée de configuration (UI) étant réalisé par le biais d'une première liaison de données (LAN) et l'entrée de configuration (UI) étant protégée par au moins un dispositif primaire de contrôle d'accès. Ce faisant, on accède à l'appareil (G) avant l'utilisation de l'entrée de configuration (UI) au moyen d'un deuxième accès, l'entrée de configuration (UI) étant libérée après cet accès pendant un certain laps de temps et à nouveau bloqué une fois ce laps de temps écoulé.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/EP2008/003228 WO2009129821A1 (fr) | 2008-04-22 | 2008-04-22 | Procédé de contrôle d’accès pour une entrée de configuration d'appareil et appareil à un contrôle d’accès pour une entrée de configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2266292A1 true EP2266292A1 (fr) | 2010-12-29 |
Family
ID=40187997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP08735357A Withdrawn EP2266292A1 (fr) | 2008-04-22 | 2008-04-22 | Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2266292A1 (fr) |
WO (1) | WO2009129821A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009060469A1 (de) * | 2009-12-22 | 2011-06-30 | eQ-3 AG, 26789 | Verfahren und Vorrichtung zur Sicherung der Kommunikation zwischen einem Heimautomatisierungsserver und einem zentralen Konfigurationsserver |
EP2842358A4 (fr) * | 2012-04-23 | 2016-01-06 | Ericsson Telefon Ab L M | Appareil oam pour une station radio de base |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3628250B2 (ja) * | 2000-11-17 | 2005-03-09 | 株式会社東芝 | 無線通信システムで用いられる登録・認証方法 |
US7522729B2 (en) * | 2003-11-06 | 2009-04-21 | Buffalo Inc. | Encryption key setting system, access point, encryption key setting method, and authentication code setting system |
US20050138148A1 (en) * | 2003-12-22 | 2005-06-23 | At&T Corporation | Signaling managed device presence to control security |
EP1615380A1 (fr) * | 2004-07-07 | 2006-01-11 | Thomson Multimedia Broadband Belgium | Dispositif et méthode pour la registration dans un réseau local sans fil |
-
2008
- 2008-04-22 EP EP08735357A patent/EP2266292A1/fr not_active Withdrawn
- 2008-04-22 WO PCT/EP2008/003228 patent/WO2009129821A1/fr active Application Filing
Non-Patent Citations (1)
Title |
---|
See references of WO2009129821A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2009129821A1 (fr) | 2009-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE602004005461T2 (de) | Mobile Authentifizierung für den Netzwerkzugang | |
DE69637053T2 (de) | Personalisierung von Teilnehmeridentifikationsmodulen für Mobiltelefone über Funk | |
EP3416140B1 (fr) | Procédé et dispositif d'authentification d'un utilisateur sur un véhicule | |
EP2250598B1 (fr) | Système client/serveur de communication selon le protocole standard opc ua comportant des mécanismes d'authentification single sign-on et procédé d'exécution de single sign-on dans ce système | |
DE102006042358B4 (de) | Verfahren und Servicezentrale zum Aktualisieren von Berechtigungsdaten in einer Zugangsanordnung | |
DE60226014T2 (de) | Tragbares gerät zum sichern des paketenverkehrs in einem wirtsystem | |
EP2898714A1 (fr) | Module d'identité d'abonné permettant d'authentifier un abonné d'un réseau de communication | |
EP3582033B1 (fr) | Procédé de fonctionnement securisé d'un appareil de terrain | |
DE102008046639B4 (de) | Verfahren zur Bereitstellung mindestens einer Leistung über ein Serversystem | |
EP1964042B1 (fr) | Procede de preparation d'une carte a puce pour des services de signature electronique | |
EP3266186B1 (fr) | Appareil de réseau et procédé d'accès à un composant de réseau dans un réseau de données | |
EP2266292A1 (fr) | Procédé de contrôle d accès pour une entrée de configuration d'appareil et appareil à un contrôle d accès pour une entrée de configuration | |
DE60115672T2 (de) | Sicherheitsarchitektur der internet-protokoll telefonie | |
AT504633B1 (de) | Verfahren zur authentifizierung eines mobilfunkendgerätes | |
EP3585084A1 (fr) | Établissement d'une autorisation d'accès à un réseau partiel d'un réseau de téléphonie mobile | |
WO2017144649A1 (fr) | Sécurisation d'autorisations d'accès à des installations fixes | |
DE60310872T2 (de) | Verfahren zur Verwaltung einer Einstellung eines Gateways von einem Benutzer des Gateways | |
EP1935202B1 (fr) | Deblocage de cartes de telephonie mobile | |
EP1869921B1 (fr) | Procede pour ameliorer la securite contre l'utilisation abusive d'une carte a puce et carte a puce pour realiser ce procede | |
EP1936905B1 (fr) | Procédé destiné à l'utilisation d'un terminal VoIP et terminal VoIP | |
EP1768316B1 (fr) | Déblocage d'une carte mobile | |
EP1419636B1 (fr) | Procede d'ouverture automatique de session d'une station d'abonne se trouvant en particulier a bord d'un vehicule dans un systeme d'information externe | |
EP2456157A1 (fr) | Protection de la sphère privée lors de l'inscription d'un utilisateur à un service Web sécurisé à l'aide d'un téléphone mobile | |
DE60205176T2 (de) | Vorrichtung und Verfahren zur Benutzerauthentisierung | |
WO2024083877A1 (fr) | Procédé de fonctionnement d'un dispositif de verrouillage électromécanique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20100902 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA MK RS |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20120717 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20130129 |