EP4264579A1 - Authentification à facteurs multiples utilisant un dispositif mobile à porter sur soi, et systèmes de commande d'accès - Google Patents
Authentification à facteurs multiples utilisant un dispositif mobile à porter sur soi, et systèmes de commande d'accèsInfo
- Publication number
- EP4264579A1 EP4264579A1 EP21909678.1A EP21909678A EP4264579A1 EP 4264579 A1 EP4264579 A1 EP 4264579A1 EP 21909678 A EP21909678 A EP 21909678A EP 4264579 A1 EP4264579 A1 EP 4264579A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- access
- secure resource
- credential
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 20
- 208000015181 infectious disease Diseases 0.000 claims description 6
- 230000036541 health Effects 0.000 claims description 5
- 238000005259 measurement Methods 0.000 claims description 4
- 208000035473 Communicable disease Diseases 0.000 claims description 3
- 230000003287 optical effect Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 230000000747 cardiac effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000006213 oxygenation reaction Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000029058 respiratory gaseous exchange Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 210000000707 wrist Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Definitions
- This disclosure relates to the field of security systems used to control access to secure premises and computer systems. More specifically, the disclosure relates to systems for controlling access to secure premises, computer systems and applications available from such systems to operate on mobile devices.
- a method for providing user access to a secure resource comprising information or physical premises.
- a method includes receiving, at a first access-control system controlling access to a first secure resource, a first request from a user to access the first secure resource.
- the first request has a first user authentication credential.
- a second request is received, at a second access-control system (i) different from the first access-control system and (ii) controlling access to a second secure resource different from the first secure resource, from the user to access the second secure resource.
- the second request has a second user authentication credential different from the first user credential. Then it is determined whether to accord the user access to the second resource based on at least (a) the second user credential and (b) whether the first access-control system accorded the user access to the first secure resource based on the first user authentication credential.
- the second user credential comprises at least one biometric measurement.
- the at least one biometric measurement corresponds to a health condition of the user.
- the health condition comprises infection by a communicable disease.
- the first user credential is transmitted from a smartphone.
- the second user credential is transmitted from a user worn security device.
- the user worn security device comprises at least one biometric sensor.
- FIG. 1 shows a flow chart of an example embodiment of a method according to the present disclosure.
- a user communicates with a server, computer or computer system.
- the server, computer or computer system has resident on it, in any form of data storage medium, data and/or applications to be accessed only by particular authorized users.
- the server, computer or computer system may also control access, such as by operating electronic locks or gates, to a controlled access or otherwise secure facility.
- the communication between the user and the server, computer or computer system may be edge based, cloud based or otherwise, such as by a user terminal proximate entry point to a secure area.
- the user in a method according to the present disclosure will have in his possession a mobile device, such as a smartphone, to operate applications and/or to access data stored on the computer system, computer or server.
- the server, computer or computer system may return a session registration query.
- the user registers the mobile device for an authenticated session by responding to the session registration query.
- Such response may be made by using the mobile device to scan an optical identification code, such as a QR code, generated and displayed by the server, computer or computer system in response to the user communication.
- the mobile device By scanning the optical identification code, the mobile device will generate a signal in response, e.g., a pattern or code on the device’s display (which may be optically scanned by the server, computer or computer system), or by communicating a specific SMS text message or radio signal, which when communicated to the computer, computer system or server, temporarily authenticates the mobile device to an access session within the computer, computer system or server.
- a signal in response, e.g., a pattern or code on the device’s display (which may be optically scanned by the server, computer or computer system), or by communicating a specific SMS text message or radio signal, which when communicated to the computer, computer system or server, temporarily authenticates the mobile device to an access session within the computer, computer system or server.
- the foregoing device registration may be temporary.
- the server, computer or computer system operator may set a fixed time duration for the access session and/or close the registration when the access session on the server, computer or computer system is terminated by the user.
- the server, computer or computer system operator may also program the system (including the server and/or computer system) to terminate the access session registration after a predetermined timeout period in which no user input or commands are entered into the mobile device by the user.
- the mobile device may be further authenticated by entry into a data input field (whether on the mobile device or other session data entry facility) the user’s passwords, passcodes, user’s biometric information (e.g., fingerprint scan) or other multi-factor authentication methods already set up by the user with respect to the particular mobile device. Such authentication replaces the need for the computer system, computer or server to store user passwords or other authentication data for the particular user or any other user.
- Mobile device authentication can also be performed by linking the authentication method to the user’s employer site (company) login facility, a user Google (or social media) account login, a user Microsoft account login, linked or other third party mobile device authentication service.
- the purpose of the foregoing mobile device authentication is to identify the mobile device as belonging to the particular user, and thus authenticating the user without the need to store personal identification information concerning the user. Only the user would be expected to know the authentication code(s) or have the required biometric properties or information to satisfy any of the foregoing authentication methods.
- the authenticated mobile device can then be used to authenticate the optical identification (e.g., QR) code when such code is transmitted by the server, computer or computer system.
- the optical identification e.g., QR
- the wearable security device such as a key fob, wrist band, data card (e.g., photo ID card) on a lanyard, or other wearable security device issued by the system operator entity designated by the system operator.
- the wearable security device comprises a biometric sensor such as may be embedded in a wrist-worn band.
- the wearable security device may have an embedded radio frequency identification (RFID) tag and an embedded optical identification code such as a QR code.
- RFID radio frequency identification
- QR code embedded optical identification code
- the user presents the wearable security device to the authenticated mobile device to scan the optical identification code embedded in the wearable security device or to interrogate the RFID tag. This action authenticates the wearable security device, temporarily “pairing” it with the authenticated mobile device.
- the wearable security device can at that point be used temporarily to access a secure computer system, computer or server and/or a secure physical premises, whether using the mobile device or the wearable security device to gain physical access.
- This process may be performed by individually linking multiple devices using sensors and device authentication.
- the user To gain access to a secure premises or to privileged information, the user must have an active wearable security device and/or confirm the optical identification code or RFID tag on the wearable security device and the mobile device.
- the wearable security device may be one or more forms of a biometric sensing device sold under the trademark SYMP2PASS, which is a trademark registered in Canada of Idea Capital Inc., Edmonton, AB, Canada.
- SYMP2PASS sensor may comprise a radio frequency identification (RFID) tag with an identified, or embedded optical code such as a QR code to identify the specific wearable security device.
- RFID radio frequency identification
- the specific wearable security device may be made to correspond to medical information about the wearer without the requirement to obtain stored medical information about the wearer, that is, a specific individual person for whom stored medical information may not be used for purposes such as personal authentication to access a computer, a computer system or a secure facility.
- the wearable security device may form part of a kit to perform an olfactory sensitivity test, wherein a scent strip is provided with the wearable security device.
- a questionnaire may be answered, for example by accessing an Internet site associated with the provider of the wearable security device to which a user responds. Answers to the questionnaire may then associate certain medical diagnoses, such as exposure to a contagious condition, based on the answers to the questionnaire.
- the wearable security device will have associated therewith medical information relevant to the particular user of the wearable security device without access to any personal medical information of such user.
- one or more biometric sensors may be associated with the wearable security device, such as, and without limitation, a blood oxygenation sensor, a temperature sensor, a cardiac pulse rate sensor, a sphygmomanometer and a respiration rate sensor.
- a blood oxygenation sensor such as, and without limitation, a blood oxygenation sensor, a temperature sensor, a cardiac pulse rate sensor, a sphygmomanometer and a respiration rate sensor.
- Such sensor(s) may have data stored on any form of electronic data storage medium associated with the wearable security device, which data when communicated to a computer or computer system operated by the provider of the wearable security device, may make one or more inferences about the health condition of the user, for example, infection by a communicable disease.
- Such inference(s) may be communicated to the computer, server or computer system that has authentication required access, or controls access to a secure facility described above.
- FIG. 1 An example embodiment of a method and system components used therewith according to the present disclosure are shown in FIG. 1.
- a wearable security device 20 such as a wristband has embedded information, e.g., concerning an amount of access to secure information that is available by the user having purchased or otherwise obtained access rights, as explained above.
- the embedded information may be interrogated and displayed to the user, for example, on a mobile device 30 such as a smartphone, having resident thereon an appropriate application or computer program.
- the user may attempt to gain access to the secure information such as at a terminal 40 provided by the system operator.
- the terminal 40 as explained above may be in communication with a server, computer or computer system or server whereon resides the secure information.
- the wearable security device 20 may be presented to the terminal 40 for validation, such as by reading an embedded optical identification code such as a QR code.
- the mobile device 30 may be paired with the secure computer system or server by the mobile device 30 scanning an optical identification (e.g., QR) code displayed by the terminal 40 in response to the user entering a request for access.
- an optical identification e.g., QR
- the wearable security device 20 is validated for use with the mobile device 30 as explained above by validating the embedded identification code on the wearable security device 20.
- a sample display screen on the terminal 40 is shown on the right hand side of FIG. 1.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Mobile Radio Communication Systems (AREA)
- Selective Calling Equipment (AREA)
- Lock And Its Accessories (AREA)
Abstract
Un procédé pour fournir un accès utilisateur à une ressource sécurisée comprenant des informations ou des locaux physiques, consiste à recevoir, au niveau d'un premier système de commande d'accès commandant l'accès à une première ressource sécurisée, une première demande provenant d'un utilisateur pour accéder à la première ressource sécurisée. La première demande a un premier justificatif d'authentification d'utilisateur. Une seconde demande est reçue, au niveau d'un second système de commande d'accès (i) différent du premier système de commande d'accès et (ii) commandant l'accès à une seconde ressource sécurisée différente de la première ressource sécurisée, en provenance de l'utilisateur pour accéder à la seconde ressource sécurisée. La seconde demande a un second justificatif d'authentification d'utilisateur différent du premier justificatif d'utilisateur. Il est ensuite déterminé s'il faut accorder ou non l'accès utilisateur à la seconde ressource sur la base au moins (a) du second justificatif d'utilisateur et (b) si le premier système de commande d'accès a accordé l'accès utilisateur à la première ressource sécurisée sur la base du premier justificatif d'authentification d'utilisateur.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063128366P | 2020-12-21 | 2020-12-21 | |
PCT/IB2021/062132 WO2022137136A1 (fr) | 2020-12-21 | 2021-12-21 | Authentification à facteurs multiples utilisant un dispositif mobile à porter sur soi, et systèmes de commande d'accès |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4264579A1 true EP4264579A1 (fr) | 2023-10-25 |
Family
ID=82157536
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21909678.1A Pending EP4264579A1 (fr) | 2020-12-21 | 2021-12-21 | Authentification à facteurs multiples utilisant un dispositif mobile à porter sur soi, et systèmes de commande d'accès |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4264579A1 (fr) |
AU (1) | AU2021405284A1 (fr) |
CA (1) | CA3205932A1 (fr) |
WO (1) | WO2022137136A1 (fr) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IT201800002681A1 (it) * | 2018-02-15 | 2019-08-15 | Archimedetech Srl | Processo/metodo di autentificazione di identita’ con invio e scambio di una password personale temporanea fra almeno quattro dispositivi elettronici per successive attivita’ di ricariche, pagamenti, accessi e/o identificazioni del proprietario di un dispositivo mobile quale uno smartphone |
AU2020102011A4 (en) * | 2020-08-27 | 2020-10-08 | Varnavelias, Izabela MRS | A electronic biometric system |
-
2021
- 2021-12-21 CA CA3205932A patent/CA3205932A1/fr active Pending
- 2021-12-21 AU AU2021405284A patent/AU2021405284A1/en active Pending
- 2021-12-21 EP EP21909678.1A patent/EP4264579A1/fr active Pending
- 2021-12-21 WO PCT/IB2021/062132 patent/WO2022137136A1/fr unknown
Also Published As
Publication number | Publication date |
---|---|
WO2022137136A1 (fr) | 2022-06-30 |
CA3205932A1 (fr) | 2022-06-30 |
AU2021405284A1 (en) | 2023-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230134823A1 (en) | Proximity-Based System for Object Tracking | |
US10171460B2 (en) | Proximity-based system for automatic application or data access and item tracking | |
US20210334481A1 (en) | Proximity-Based System for Object Tracking an Automatic Application Initialization | |
US11182792B2 (en) | Personal digital key initialization and registration for secure transactions | |
US10176312B2 (en) | Fingerprint gestures | |
RU2710889C1 (ru) | Способы и системы для создания удостоверений личности, их проверки и управления ими | |
JP5863993B2 (ja) | ソーシャル・ネットワーキング・ウェブ・サービスを介した機密情報アクセスのための方法、システム、コンピュータ・プログラム | |
US10482225B1 (en) | Method of authorization dialog organizing | |
CA3152908A1 (fr) | Systeme informatique, methode et dispositif pour verifier un statut d'immunisation | |
US9946860B1 (en) | Systems and methods for allowing administrative access | |
CN109804608B (zh) | 提供对结构化存储数据的访问 | |
AU2021405284A1 (en) | Multi-factor authentication employing a wearable mobile device, and access-control systems | |
Khatoon et al. | Integrating OAuth and aadhaar with e-health care system | |
US12081991B2 (en) | System and method for user access using mobile identification credential | |
Hamid | A Secured Clinic Booking System with Multi Factor Authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230719 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |