WO2001044886A2 - Systeme informatique pour application a acces par accreditation - Google Patents
Systeme informatique pour application a acces par accreditation Download PDFInfo
- Publication number
- WO2001044886A2 WO2001044886A2 PCT/FR2000/003549 FR0003549W WO0144886A2 WO 2001044886 A2 WO2001044886 A2 WO 2001044886A2 FR 0003549 W FR0003549 W FR 0003549W WO 0144886 A2 WO0144886 A2 WO 0144886A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- flow
- software
- user
- terminal
- Prior art date
Links
- 230000004044 response Effects 0.000 claims abstract description 11
- 238000013523 data management Methods 0.000 claims description 10
- 238000007726 management method Methods 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 4
- 238000010200 validation analysis Methods 0.000 claims description 4
- 102100039164 Acetyl-CoA carboxylase 1 Human genes 0.000 claims description 3
- 102100021641 Acetyl-CoA carboxylase 2 Human genes 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 101000677540 Homo sapiens Acetyl-CoA carboxylase 2 Proteins 0.000 claims description 2
- 101000894929 Homo sapiens Bcl-2-related protein A1 Proteins 0.000 claims description 2
- 230000002401 inhibitory effect Effects 0.000 claims description 2
- 101710190443 Acetyl-CoA carboxylase 1 Proteins 0.000 claims 1
- 230000004048 modification Effects 0.000 abstract description 10
- 238000012986 modification Methods 0.000 abstract description 9
- 230000003068 static effect Effects 0.000 description 27
- 238000000034 method Methods 0.000 description 18
- 230000008569 process Effects 0.000 description 18
- 230000015654 memory Effects 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 108091006146 Channels Proteins 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000006872 improvement Effects 0.000 description 3
- 102100022094 Acid-sensing ion channel 2 Human genes 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 101000901079 Homo sapiens Acid-sensing ion channel 2 Proteins 0.000 description 1
- QLDHWVVRQCGZLE-UHFFFAOYSA-N acetyl cyanide Chemical compound CC(=O)C#N QLDHWVVRQCGZLE-UHFFFAOYSA-N 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Definitions
- COMPUTER SYSTEM FOR APPLICATION BY ACCREDITATION ACCESS The invention relates to improvements made to computer systems in which the access of a user to one or more software, for example applications, is controlled by one or more flow-through data.
- the security of a computer system in particular the security of access to software such as operating systems or applications (home banking, electronic commerce, etc.) relies on user authentication at means of static flow-through data which, most often, consists of a name assigned to the user ("login na e") and a static password.
- the term “computer system” is understood to mean any system comprising a personal computer, a telephone, a mobile telephone, a personal digital assistant, etc. allowing a user to run either a local application or the client part. of an application, for example in the context of a client-server architecture.
- Different authentication protocols based on the knowledge of a static password by a user are known:
- the password is transmitted in clear to a server-side authentication module
- a session key is transmitted using a public key algorithm (for example of the DIFFE-HELLMAN type), which makes it possible to establish a secure channel between two entities, via which the password will be transmitted , without it being necessary for them to share a secret password beforehand;
- a public key algorithm for example of the DIFFE-HELLMAN type
- the client part of the application encrypts the password (or a digest of the password) by means of a hazard sent by the authentication module on the server side;
- flow-through data is transmitted to the user by the server-side authentication module, in encrypted form using the user's password, so that only the latter can use the flow-through data .
- a first known solution consists in using dynamic passwords, that is to say passwords which are modified with each use.
- These passwords dynamic can be of the synchronous type (that is to say they are modified synchronously on the user side and on the server side, for example as a function of time and / or of the number of uses) or asynchronous (at each request of access, the server-side authentication module generates a different hazard or challenge which is transmitted on the user side to generate the dynamic password using an appropriate algorithm).
- secret keys are shared on the server side and the user side.
- dynamic passwords can be generated by a personal security device (PSD) such as a smart card, a portable and secure electronic device ("token", etc.).
- PSD personal security device
- token portable and secure electronic device
- Another solution uses public key cryptography systems, the user having a private key and the public key being certified by a certification authority. An authentication sequence using such a system can take place as follows:
- the user transmits a certificate (containing his username, public key, address, etc.) to the server;
- the server authentication module upon receipt of the certificate, the server authentication module generates and sends the user a hazard
- the authentication module checks the signed hazard using the public key and authenticates the user if there is consistency.
- the invention aims to improve the security of the mechanisms by which, by means of static flow-through data (username, password, etc.), a user with a terminal can authenticate against software executed either locally in this terminal, or partly in this terminal and in a server to which this terminal is connected.
- static flow-through data username, password, etc.
- Another object of the invention is to provide a computer system comprising sophisticated mechanisms for controlling access to one or more applications and in which, in addition, the authentication protocol based on the sharing of secret flow-through data and The static between the client side and the server side of an application is not changed and the authentication module of the server side application remains unchanged.
- the subject of the invention is a computer system for the execution of at least one software whose access by a user is controlled by the supply of at least one flow-through datum allocated to said user, the said system comprising :
- At least one terminal comprising data processing means for executing said software at least in part, - first storage means associated with said software for storing at least one first flow-through data specific to said user,
- access control means for authorizing access to said software in response to consistency between said first flow-through data stored in said first storage means and a second flow-through data applied via said terminal to said software
- the computer system according to the invention further comprises one or more of the following characteristics considered alone or in combination:
- said access control means are adapted to authorize access to said software in response to an identity between said first and second flow-through data
- said second storage means are suitable for storing a first identification code of said user
- said terminal comprises interface means for applying a second identification code to said personal security device, and access to said personal security device being authorized in response to an identity between said first and second identification codes
- - said flow-through data updating means are adapted to automatically generate and transmit said new flow-through data directly to said first and second storage means, without communication of said new flow-through data to said user
- - said flow-through data management means are software means forming part of said software
- said flow-through data updating means are adapted to generate and load new flow-through data into said first and second storage means following an access authorization given by said access control means,
- said flow-through data management means are software means independent of said software
- said flow-through data updating means are adapted to generate and load new flow-through data into said first and second storage means following validation of said identification code by said validation means,
- said flow-through data management means include means for dating and loading in at least one of said storage means the date on which a flow-through data is generated and inhibiting means for not authorizing the generation of new flow-through data by said updating means that after expiration of a period determined since the generation of said flow-through data stored in said storage means,
- - said software is stored and executed entirely in said terminal for the local implementation of said application
- - said system comprises at least one server and data transmission means between said terminal and said server
- said software is stored and executed partly in said terminal and partly in said server
- said first storage means are associated with said server.
- FIG. 1 is a general block diagram of a computer system according to a first embodiment of the invention in the case of an application executed partly in a terminal and partly in a server,
- FIG. 2 is a block diagram of a first embodiment of the computer system of FIG. 1,
- FIG. 3 is a functional diagram illustrating a first mode of updating the flow-through data in the computer system of FIG. 2,
- FIG. 4 is a functional diagram illustrating a second mode of updating the flow-through data in the computer system of FIG. 2
- FIG. 5 illustrates a second mode of execution of the computer system of FIG. 1,
- FIG. 6 illustrates a mode of updating the flow-through data in the computer system of FIG. 5,
- FIG. 7 illustrates a third embodiment of the computer system of FIG. 1,
- FIG. 8 illustrates a fourth embodiment of the computer system of FIG. 1,
- FIG. 9 illustrates a computer system according to a second embodiment of the invention in which one or more applications are executed locally in a terminal
- FIG. 10 illustrates a mode of updating the flow-through data in the computer system of FIG. 9
- the computer system shown comprises a terminal T which is connected, on the one hand to a personal security device PSD and, on the other hand, to an information system I via network R
- the personal security device PSD is connected to the terminal T by means L making it possible to ensure a bidirectional transmission of information between them
- the terminal T can be constituted, for example, by a personal computer, a telephone, a mobile telephone, a personal digital assistant, etc. It is conventionally provided with user interface means, data processing means (microprocessor) and appropriate memories (not shown) Thanks to appropriate software ACC1, ACC2, ACCN, the terminal T is capable of executing applications A1, A2, An in connection, via the network R, with servers S ⁇ S 2 , S n respectively containing software ACS ⁇ ACS 2 , ACS n
- each server Si, S 2 , S n of the information system I could implement several applications
- the software of each application is distributed between the terminal T and one of the servers of the information system I the software of the application A1 consists of the software ACC1 and ACS L the software of the application A2 by the software ACC2 and ACS 2 , the software of the application An by the software ACCN and the software ACS N.
- the network R ensuring the transmission of bidirectional data between the terminal T and the servers S ⁇ S 2 S n of the information system I can be of any nature, for example the Internet.
- a personal security device PSD is a device owned and / or accessible (for example by personal identification PIN code or other) exclusively by an authorized user, and making it possible to securely store data therein. by offering security guarantees against reading and / or writing of data by an unauthorized person.
- a smart card a portable electronic device electrically powered and comprising a limited number of inputs and outputs as well as software and hardware protection means preventing access to buses internal on which the data pass through the device.
- the means of connection L with the terminal T are constituted by a smart card reader which can be external or integrated into the terminal T.
- the personal security device can be produced in the form of software installed in the terminal T and making it possible to store data securely in the terminal, this data possibly being able to be encrypted.
- This embodiment does not provide the same degree of security as that offered by a smart card, but it nevertheless represents a significant improvement insofar as, as will be explained below, the credential data of the user can be changed automatically, and therefore often.
- the personal security device PSD comprises a memory M in which the flow-through data specific to the user of the terminal T is stored and allowing the latter to implement the various applications A1, A2 An.
- These flow-through data assigned to the user consist for example of a user name and password specific to the application in question.
- the various servers S ,, S 2 , S n comprise files Fi, F 2 F n respectively in which the flow-through data of all the users authorized to access an application implemented are stored. by the server considered. This is how the flow-through data of the user of the terminal T are stored in the memory M and the file F T as regards the application A1, in the memory M and the file F 2 as regards the application A2, in the memory M and in the file F N as regards the application An.
- the computer system of FIG. 1 may include several terminals T connected by the network R to the information system I and intended to be used by different users.
- an application home banking, electronic commerce, etc.
- a user launches this application on his terminal T.
- Access to the personal security device PSD may be subject to the provision by the user of a personal identification number PIN via his terminal T.
- the user's credentials relating to the application in question are read in the personal security device PSD and are transmitted to the server considered. The latter compares the flow-through data received from the terminal T with that contained in its flow-through data file and authorizes the execution of the application if there is a match.
- CMP software management means are provided for flow-through data.
- these CMP means are distributed between the terminal T and the servers S ⁇ S 2 S n assigned to the different applications. To ensure authentication vis-à-vis a given application, it is necessary, at the level of the terminal T, to read from the personal security device PSD the flow-through data relating to this application.
- FIG. 2 in which, for reasons of simplicity, only one server S has been shown.
- the flow-through data management software appears, on the terminal side, as a modified application software on the ACC M client side.
- the part of this software ensuring the management of flow-through data is represented by a circle CMP C.
- the flow-through data management software is represented by a CMP S circle: this software is that which exists as standard in any application to allow the modification of flow-through data of users or the loading of flow-through data relating to new users.
- CMP C and CMP S software which part respectively of the ACC M and ACS software, together form the CMP software for managing the flow-through data of FIG. 1.
- the software means for managing the flow-through data integrated into the application A have direct access to the personal security device PSD by means of the application software modified on the client side ACC, and to the file of flow-through data F from server S.
- a PSD device devoid of flow-through data is given to it by a security administrator.
- This PSD device does not contain a static password.
- the user connects his PSD device to his terminal T and initializes therein a personal identification number PIN.
- the user then installs the modified client-side ACC M application software in place of the standard client-side application software previously used.
- the user enters his personal identification number PIN to authorize access to the PSD device and then opens access to the application using the static flow-through data known to him that he used to use with his standard client-side application software.
- This current flow-through data is presented to the ACS server-side application software using the standard authentication protocol.
- the CMP C part of the modified application software on the client side ACC M generates a random password, presents a request to change the password to the CMP S software on the server side, transmitting the new one. password, and then loads the static flow-through data, including the generated password and possibly the user name, into the PSD device.
- the new generated static password is then stored in the file F and in the memory M while being unknown to the user.
- the update or the change of the static password can be ensured each time the application is considered as illustrated in FIG. 3, or periodically, for example every day, as illustrated in FIG. 4, or even on a specific request from the system administrator.
- the user formulates in 1 a request for access to an application X at the level of the terminal T and this is taken into account at 2 at the level of the server S.
- the user enters at 3 his personal identification number or PIN code via the terminal T and this is transmitted to the PSD device which performs in 4 a comparison of the number entered by the user with that stored in 5 in the PSD device.
- the PSD device reads at 8 the flow-through datum (static password) stored therein for the application X and this datum is transmitted via the terminal T to the server S where a comparison is performed in 9 with the flow-through data (static password) stored in the file F for the application X and the user considered (block 10). If the data compared in 9 do not match, access to the application X is refused at 11. Otherwise, access to the application X is authorized at 12 at the server S and the terminal T generates in 13 a new flow-through datum for the application X.
- This new flow-through data (password generated randomly) is transmitted respectively to the server S and to the device PSD and at 14 and 15 it is stored respectively in the file F and in the memory M.
- the process ends at 16 and 17 by the execution or execution of the application X respectively at the level of the server S and of the terminal T.
- the modification or updating of the flow-through data may be subject to the expiration of a predetermined period since the last change of this password.
- the process implemented is identical to that of FIG. 3 up to step 12 and will therefore not be described again.
- step 12 the terminal T initiates in 18 a process for changing flow-through data for the application X, which leads in 19 to reading in the device
- step 20 If it is determined in step 20 that the minimum time allowed has elapsed, it is proceeded at 23 at the level of the terminal T to the generation of new flow-through data for the application X and this is memorized in 24 and 25 respectively in the file F of the server S and the memory M of the device PSD, with memorization of its date of update at least in the memory M of the device PSD.
- the embodiment of the invention illustrated in FIG. 5 differs from that of FIG. 2 as regards the mode of implementation of the software means for managing flow-through data.
- the flow-through data management software is part of a DD data insertion software ("Drag and Drop") which is independent of the client-side application software or ACC terminal.
- the information system I side there is a CMS flow-through data management software module independent of the application software on the ACS server side and which manages the file F of flow-through data associated with the server S.
- the CMS module can be implemented in server S or in a server independent of it.
- FIG. 2 it should be understood that the implementation of the invention does not imply any hardware and software modification at the level of the information system I.
- a user of the terminal T already has an authorization to access an application executed on the terminal side by the application software on the client side ACC and on the server side by the application software on the server side ACS.
- the user is also supposed to be in possession of flow-through data allowing him to authenticate himself vis-à-vis the application and to open it.
- the user is provided with a blank PSD device, that is to say without any credentials, by a security administrator.
- the user then connects his PSD device to his terminal T and installs the DD software in his terminal. In addition, it initializes the personal identification number PIN controlling access to its personal security device PSD.
- the old flow-through data are requested from the user and communicated to the CMS flow-through data management module by the DD software in order to authenticate the user.
- New flow-through data (static password) is generated by the DD software and transmitted to the CMS module, which updates the flow-through data file F, either directly or through the ACS software.
- These new flow-through data are not known to the user and may include a "strong" static password as described above.
- the user launches the DD program, enters his personal identification number PIN to allow access to the PSD device and inserts at the ACC software the static flow-through data read by the DD software in the PSD device , for example by a "drag and drop" operation implemented by the DD software using a mouse.
- the user requests access to the DD software on his terminal T.
- his personal identification number PIN and, in 28, this is compared in the PSD device with the personal identification number PIN which is stored there in 29. If the two numbers do not match , access is refused in 30. If the two numbers match, a process for updating the flow-through data of the application X is initiated in 31.
- This process is translated into 32, at the CMS module, by a request authentication of the user for the application X and at 33 by reading the flow-through data of the user currently stored in the file F for the application X.
- the process initiated at 31 leads to 34 at the reading in the PSD device, flow-through data of the user for the application X and these are transmitted via the terminal R to the CMS module.
- the DD software generates a new flow-through datum for the application X.
- This new flow-through datum is stored at 38 in the file F via the CMS module and at 39 in the PSD device.
- the CMP part T of the software DD then initiates at 40 a process for updating the flow-through data for the application Y, and so on for all the applications for which flow-through data are contained in the PSD device.
- the generation of new flow-through data may be subject to the expiration of a predetermined time since the generation and storage of the flow-through data currently stored. in the PSD device.
- connection of the terminal T to the CMS module is not a prerequisite for accessing the application. This is carried out as described with reference to FIG. 2 by sending flow-through data to the application software on the ACS server side and, if it cannot be accessed by the CMS module to modify the flow-through data, for example if the CMS module is implemented in a server other than the server S, the access to the application supported by the server S can nevertheless be carried out thanks to the unmodified flow-through data contained in the memory M and the file F. The updating days of this flow-through data will simply be deferred until a connection with the CMS module can be established during a new launch of the DD program.
- the device according to the invention therefore differs in all respects from password server systems which require the prior establishment of a connection of the terminal with this password server in order to allow access to an application.
- FIG. 7 illustrates an embodiment of the invention which differs from that of FIG. 5 only as regards the means of initialization and personalization of the system.
- a personalization tool T is provided, provided with flow-through data management software CMP P allowing a security administrator to initialize flow-through data, relating to a user for a given application, in the file F of the server supporting the application in question and in the personal security device PSD intended for the user.
- CMP P flow-through data management software
- the personal identification code PIN is loaded into the PSD device by means of the personalization tool T.
- the flow-through data of the user for the application in question can be initialized or updated by the security administrator directly using standard administration tools intended to define the rights of the user vis-à-vis the application.
- the PSD device and the associated PIN code are given to the user by separate channels, as is conventional, in particular with regard to smart cards.
- the user connects his PSD device to his terminal T and loads the DD software into his terminal.
- the user launches the DD software, enters their code
- this initialization and personalization process could also be implemented in the case of a hardware and software architecture as described in FIG. 2, that is to say in the case where the flow-through data management software is an integral part of the ACC M client side and ACS server side application software.
- FIG. 8 illustrates an alternative embodiment of the initialization and personalization process of FIG. 7.
- the flow-through data of the users are generated by a personalization tool under the command of an administrator of security and are stored, for each user, in an initial flow-through data file K associated with the flow-through data management module CMS.
- a blank PSD device that is to say one containing no credential data, is given to the user by the security administrator.
- an initial authentication password also stored in the K file, is transmitted to the user.
- FIG. 9 illustrates a second embodiment of the invention in which the application is executed purely locally in the terminal T by means of application software LA loaded therein.
- the file F of the flow-through data is stored in memory in the terminal T.
- the software CMP for management of flow-through data is also executed locally and is part of the data insertion software DD.
- This CMP software has direct access to the personal security device PSD, and access to the file F, either directly as shown, or through the application software LA.
- a blank PSD device devoid of any flow-through data is given to the user by a security administrator.
- the user connects his PSD device to his terminal T, loads the DD software and assigns a personal identification code PIN to his PSD device.
- the old credentials of the user for the LA application are then required in the DD software to authenticate the user.
- the DD software generates new flow-through data which is loaded into the PSD device and replaces the old flow-through data in the file F, either directly or in the evening via the LA application.
- the user then just has to launch the DD program, enter his PIN code allowing access to the PSD device and load the flow-through data into the LA application software by an operation. of "drag and drop" as described with reference to FIGS. 5, 7 and 8, it being understood once again that the flow-through data are not displayed on the screen during this operation and therefore remain unknown to the user.
- the DD software initiates at 45 a process for updating the flow-through data for the application X. To this end, it reads at 46 the flow-through data stored for the application X in the file F and at 47 those stored for this same application X in the PSD device. These flow-through data are compared in 48 and, in the event of discrepancy, modification of the data is refused in 49. Otherwise, the DD software generates at 50 a new flow-through datum for the application X and this is stored at 51 in the file F and at 52 in the device PSD.
- the terminal T is equipped with software for several applications X, Y, etc., a new process for updating the flow-through data for the application Y is initiated in 53, and so on for all the applications.
- This static password can be complex and have the maximum length compatible with the application considered, since it does not have to be memorized by the user and entered by the latter in his terminal.
- this static password is updated periodically automatically, that is to say that this update is not subject to the discretion of the user.
- This static password "strong" and renewed periodically, is stored in a personal security device for the user, of the chip card or similar type or of the purely software type, which offers a very high degree of protection against reading attempts. illicit data contained therein.
- the system described does not require the terminal to connect in real time to any server other than the one on which the application is possibly partially executed. Indeed, if in the embodiments of FIGS. 5, 7 and 8, the CMS module for managing flow-through data can be installed in a server independent of that in which the application is partly executed, it does not remain. unless the connection to this independent server is not necessary to access the application.
- the system described therefore differs fundamentally from password server systems.
- the system described does not involve any modification at the level of the existing servers, the only modifications necessary concerning the software to be implemented in the terminal (s).
- the computer system described therefore makes it possible to considerably strengthen the security of existing systems using authentication by static flow-through data to access one or more applications.
- the embodiments described are only examples and they could be modified, in particular by substitution of technical equivalents, without departing from the scope of the invention.
- the updating of the flow-through data could be carried out, not as described during each access to an application or after a predetermined period of time has elapsed, but based on a number of events.
- a counter can be incremented on each authentication request or each access to the flow-through data.
- this counter is compared with a threshold value, and if this is reached, the flow-through data is modified.
- This threshold can be chosen so that the flow-through data update takes place during each successful authentication with an application as described with reference to FIG. 6.
- flow-through data used in the description and the claims denotes both the flow-through data proper (password, username,) used to authenticate vis-à-vis an application that one or more secret or private keys for calculating one or more flow-through data proper.
- the updating of the "flow-through data" referred to in the foregoing may therefore, depending on the case, relate to flow-through data proper and / or secret or private keys for calculating flow-through data itself.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP00988927A EP1238322A2 (fr) | 1999-12-17 | 2000-12-15 | Systeme informatique pour application a acces par accreditation |
CA002395374A CA2395374A1 (fr) | 1999-12-17 | 2000-12-15 | Systeme informatique pour application a acces par accreditation |
KR1020027007779A KR20020084073A (ko) | 1999-12-17 | 2000-12-15 | 인증 액세스에 의한 애플리케이션용 컴퓨터 시스템 |
AU25269/01A AU2526901A (en) | 1999-12-17 | 2000-12-15 | Computer system for application by accreditation access |
JP2001545914A JP2003517670A (ja) | 1999-12-17 | 2000-12-15 | 認可によってアクセスするアプリケーション向けのデータ処理システム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR99/15980 | 1999-12-17 | ||
FR9915980A FR2802666B1 (fr) | 1999-12-17 | 1999-12-17 | Systeme informatique pour application a acces par accreditation |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001044886A2 true WO2001044886A2 (fr) | 2001-06-21 |
WO2001044886A3 WO2001044886A3 (fr) | 2001-12-13 |
Family
ID=9553415
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2000/003549 WO2001044886A2 (fr) | 1999-12-17 | 2000-12-15 | Systeme informatique pour application a acces par accreditation |
Country Status (10)
Country | Link |
---|---|
US (2) | US6988210B1 (fr) |
EP (1) | EP1238322A2 (fr) |
JP (1) | JP2003517670A (fr) |
KR (1) | KR20020084073A (fr) |
CN (1) | CN1409836A (fr) |
AU (1) | AU2526901A (fr) |
CA (1) | CA2395374A1 (fr) |
FR (1) | FR2802666B1 (fr) |
TW (1) | TW518489B (fr) |
WO (1) | WO2001044886A2 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10130493A1 (de) * | 2001-06-25 | 2003-01-30 | Brueninghaus Hydromatik Gmbh | Verfahren zur Freigabe eines Zugriffs auf ein elektronisches Steuergerät |
CN1307502C (zh) * | 2001-12-03 | 2007-03-28 | 先进微装置公司 | 对安全性敏感指令监控执行的方法与装置 |
CN100347989C (zh) * | 2002-12-05 | 2007-11-07 | 佳能株式会社 | 双关卡设备访问管理 |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
Families Citing this family (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2802666B1 (fr) * | 1999-12-17 | 2002-04-05 | Activcard | Systeme informatique pour application a acces par accreditation |
US7409700B1 (en) * | 2000-11-03 | 2008-08-05 | The Walt Disney Company | System and method for enhanced broadcasting and interactive |
GB2381423B (en) * | 2001-10-26 | 2004-09-15 | Ericsson Telefon Ab L M | Addressing mechanisms in mobile IP |
GB2384331A (en) * | 2002-01-19 | 2003-07-23 | Hewlett Packard Co | Access control using credentials |
US20030204732A1 (en) * | 2002-04-30 | 2003-10-30 | Yves Audebert | System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients |
AU2003216032A1 (en) * | 2002-12-12 | 2004-06-30 | Encentuate Pte Ltd | Identity management system for automatic user authentication |
US8051470B2 (en) | 2002-12-12 | 2011-11-01 | International Business Machines Corporation | Consolidation of user directories |
US20040177258A1 (en) * | 2003-03-03 | 2004-09-09 | Ong Peng T. | Secure object for convenient identification |
US7325002B2 (en) * | 2003-04-04 | 2008-01-29 | Juniper Networks, Inc. | Detection of network security breaches based on analysis of network record logs |
CN1319314C (zh) * | 2003-05-12 | 2007-05-30 | 明基电通股份有限公司 | 防止手机加密网络锁被破解的保护方法及相关装置 |
EP1486908A1 (fr) * | 2003-06-12 | 2004-12-15 | Axalto S.A. | Carte à puce avec deux ports d'entrée/sortie pour la connexion des environnements sécurisés et non sécurisés |
CN100432889C (zh) * | 2003-09-12 | 2008-11-12 | Rsa安全公司 | 提供断开鉴别的系统和方法 |
DE602004011965T2 (de) * | 2003-10-06 | 2009-02-26 | Nxp B.V. | Verfahren und schaltung zum identifizieren und/oder verifizieren von hardware und/oder software eines geräts und eines mit dem gerät arbeitenden datenträgers |
DE10359680A1 (de) * | 2003-12-18 | 2005-07-14 | Giesecke & Devrient Gmbh | Verfahren zur Freischaltung eines Zugangs zu einem Computersystem oder zu einem Programm |
US7581111B2 (en) * | 2004-02-17 | 2009-08-25 | Hewlett-Packard Development Company, L.P. | System, method and apparatus for transparently granting access to a selected device using an automatically generated credential |
US7581248B2 (en) * | 2004-06-28 | 2009-08-25 | International Business Machines Corporation | Federated identity brokering |
US20060031926A1 (en) * | 2004-08-03 | 2006-02-09 | Idan Shoham | Method for reduced signon, using password synchronization instead of a credential database and scripts |
SG121908A1 (en) * | 2004-10-13 | 2006-05-26 | Encentuate Pte Ltd | A predictive method for multi-party strengthening of authentication credentials with non-real time synchronization |
US8006288B2 (en) * | 2004-11-05 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for accessing a computer application program |
US7500269B2 (en) * | 2005-01-07 | 2009-03-03 | Cisco Technology, Inc. | Remote access to local content using transcryption of digital rights management schemes |
US7340769B2 (en) * | 2005-01-07 | 2008-03-04 | Cisco Technology, Inc. | System and method for localizing data and devices |
US7533258B2 (en) * | 2005-01-07 | 2009-05-12 | Cisco Technology, Inc. | Using a network-service credential for access control |
BRPI0605904A (pt) * | 2005-02-14 | 2007-12-18 | Matsushita Electric Ind Co Ltd | dispositivo de execução de aplicativo, método de gerenciamento, e programa |
US7983979B2 (en) * | 2005-03-10 | 2011-07-19 | Debix One, Inc. | Method and system for managing account information |
US7831833B2 (en) * | 2005-04-22 | 2010-11-09 | Citrix Systems, Inc. | System and method for key recovery |
US7730181B2 (en) * | 2006-04-25 | 2010-06-01 | Cisco Technology, Inc. | System and method for providing security backup services to a home network |
GB0612775D0 (en) * | 2006-06-28 | 2006-08-09 | Ibm | An apparatus for securing a communications exchange between computers |
US9324082B2 (en) * | 2007-07-06 | 2016-04-26 | Ebay Inc. | System and method for providing information tagging in a networked system |
US8196191B2 (en) * | 2007-08-17 | 2012-06-05 | Norman James M | Coordinating credentials across disparate credential stores |
US8863246B2 (en) * | 2007-08-31 | 2014-10-14 | Apple Inc. | Searching and replacing credentials in a disparate credential store environment |
US20090077638A1 (en) * | 2007-09-17 | 2009-03-19 | Novell, Inc. | Setting and synching preferred credentials in a disparate credential store environment |
CZ306790B6 (cs) * | 2007-10-12 | 2017-07-07 | Aducid S.R.O. | Způsob navazování chráněné elektronické komunikace mezi různými elektronickými prostředky, zejména mezi elektronickými prostředky poskytovatelů elektronických služeb a elektronickými prostředky uživatelů elektronických služeb |
EP2232815B1 (fr) * | 2007-12-07 | 2020-02-26 | Orange | Procédé de contrôle d'applications installées sur un module de sécurité associé à un terminal mobile, module de sécurité, terminal mobile et serveur associés |
US20090172778A1 (en) * | 2007-12-26 | 2009-07-02 | Randall Stephens | Rule-based security system and method |
US20090199277A1 (en) * | 2008-01-31 | 2009-08-06 | Norman James M | Credential arrangement in single-sign-on environment |
US20090217367A1 (en) * | 2008-02-25 | 2009-08-27 | Norman James M | Sso in volatile session or shared environment |
US8402522B1 (en) * | 2008-04-17 | 2013-03-19 | Morgan Stanley | System and method for managing services and jobs running under production IDs without exposing passwords for the production IDs to humans |
US20100063932A1 (en) * | 2008-09-08 | 2010-03-11 | Jan Leonhard Camenisch | Forming Credentials |
US20100079239A1 (en) * | 2008-09-29 | 2010-04-01 | Riddhiman Ghosh | Repurposing User Identity Tokens |
US9665868B2 (en) | 2010-05-10 | 2017-05-30 | Ca, Inc. | One-time use password systems and methods |
US8607330B2 (en) * | 2010-09-03 | 2013-12-10 | International Business Machines Corporation | Orderly change between new and old passwords |
CN102567395A (zh) * | 2010-12-30 | 2012-07-11 | 百度在线网络技术(北京)有限公司 | 一种签名服务器及其控制方法 |
WO2012162351A1 (fr) * | 2011-05-23 | 2012-11-29 | Mastercard International, Inc. | Procédé et système de transactions combicard ayant un mécanisme de mise à jour de paramètres d'application |
US8667569B2 (en) * | 2011-09-29 | 2014-03-04 | Target Brands, Inc. | Credentials management |
JP5773494B2 (ja) | 2011-12-05 | 2015-09-02 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | 情報処理装置、制御方法及びプログラム |
EP2675106A1 (fr) * | 2012-04-23 | 2013-12-18 | ABB Technology AG | Accès utilisateur à un dispositif de commande et d'automatisation industrielle |
US9021563B2 (en) * | 2013-01-02 | 2015-04-28 | Htc Corporation | Accessory interface system |
US20180013755A1 (en) * | 2016-07-08 | 2018-01-11 | Microsoft Technology Licensing, Llc | Logon using master password or turn-varying password |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2676291A1 (fr) * | 1991-05-06 | 1992-11-13 | Bull Sa | Dispositif de securite pour systeme informatique et procede de reprise d'exploitation. |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
EP0929025A1 (fr) * | 1998-01-13 | 1999-07-14 | Nec Corporation | Dispositif pour l'actualisation de mot de passe et support d'enregistrement utilisé pour celui-ci |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5471382A (en) * | 1994-01-10 | 1995-11-28 | Informed Access Systems, Inc. | Medical network management system and process |
US7124302B2 (en) * | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
KR19990074117A (ko) * | 1998-03-06 | 1999-10-05 | 윤종용 | 보안 카드 체크식 컴퓨터 보안 시스템 및 그 방법 |
FR2802666B1 (fr) * | 1999-12-17 | 2002-04-05 | Activcard | Systeme informatique pour application a acces par accreditation |
-
1999
- 1999-12-17 FR FR9915980A patent/FR2802666B1/fr not_active Expired - Lifetime
-
2000
- 2000-11-28 US US09/723,284 patent/US6988210B1/en not_active Expired - Lifetime
- 2000-11-29 TW TW089125307A patent/TW518489B/zh active
- 2000-12-15 KR KR1020027007779A patent/KR20020084073A/ko not_active Application Discontinuation
- 2000-12-15 CA CA002395374A patent/CA2395374A1/fr not_active Abandoned
- 2000-12-15 CN CN00817145.9A patent/CN1409836A/zh active Pending
- 2000-12-15 WO PCT/FR2000/003549 patent/WO2001044886A2/fr not_active Application Discontinuation
- 2000-12-15 AU AU25269/01A patent/AU2526901A/en not_active Abandoned
- 2000-12-15 EP EP00988927A patent/EP1238322A2/fr not_active Ceased
- 2000-12-15 JP JP2001545914A patent/JP2003517670A/ja active Pending
-
2005
- 2005-10-20 US US11/253,559 patent/US7320139B2/en not_active Expired - Lifetime
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2676291A1 (fr) * | 1991-05-06 | 1992-11-13 | Bull Sa | Dispositif de securite pour systeme informatique et procede de reprise d'exploitation. |
US5887065A (en) * | 1996-03-22 | 1999-03-23 | Activcard | System and method for user authentication having clock synchronization |
EP0929025A1 (fr) * | 1998-01-13 | 1999-07-14 | Nec Corporation | Dispositif pour l'actualisation de mot de passe et support d'enregistrement utilisé pour celui-ci |
Non-Patent Citations (2)
Title |
---|
LUCKHARDT N: "PASSWORT PORTFOLIO" CT MAGAZIN FUER COMPUTER TECHNIK,DE,VERLAG HEINZ HEISE GMBH., HANNOVER, no. 13, 21 juin 1999 (1999-06-21), page 72 XP000828972 ISSN: 0724-8679 * |
See also references of EP1238322A2 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE10130493A1 (de) * | 2001-06-25 | 2003-01-30 | Brueninghaus Hydromatik Gmbh | Verfahren zur Freigabe eines Zugriffs auf ein elektronisches Steuergerät |
DE10130493B4 (de) * | 2001-06-25 | 2006-11-09 | Brueninghaus Hydromatik Gmbh | Verfahren zur Freigabe eines Zugriffs auf ein elektronisches Steuergerät |
CN1307502C (zh) * | 2001-12-03 | 2007-03-28 | 先进微装置公司 | 对安全性敏感指令监控执行的方法与装置 |
CN100347989C (zh) * | 2002-12-05 | 2007-11-07 | 佳能株式会社 | 双关卡设备访问管理 |
US8271792B2 (en) | 2008-02-20 | 2012-09-18 | Ricoh Company, Ltd. | Image processing apparatus, authentication package installation method, and computer-readable recording medium |
Also Published As
Publication number | Publication date |
---|---|
TW518489B (en) | 2003-01-21 |
EP1238322A2 (fr) | 2002-09-11 |
US20060037066A1 (en) | 2006-02-16 |
CA2395374A1 (fr) | 2001-06-21 |
FR2802666A1 (fr) | 2001-06-22 |
FR2802666B1 (fr) | 2002-04-05 |
AU2526901A (en) | 2001-06-25 |
US6988210B1 (en) | 2006-01-17 |
WO2001044886A3 (fr) | 2001-12-13 |
KR20020084073A (ko) | 2002-11-04 |
CN1409836A (zh) | 2003-04-09 |
US7320139B2 (en) | 2008-01-15 |
JP2003517670A (ja) | 2003-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2001044886A2 (fr) | Systeme informatique pour application a acces par accreditation | |
EP1004100B1 (fr) | Dispositif portable electronique pour systeme de communication securisee, et procede d'initialisation de ses parametres | |
EP3547203A1 (fr) | Méthode et système de gestion d'accès à des données personnelles au moyen d'un contrat intelligent | |
FR2779018A1 (fr) | Terminal et systeme pour la mise en oeuvre de transactions electroniques securisees | |
WO2006056669A1 (fr) | Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal | |
EP0425053A1 (fr) | Système de traitement de données comportant des moyens d'authentification d'une carte à mémoire, circuit électronique à utiliser dans ce système et procédé de mise en oeuvre de cette authentification | |
CN102822835B (zh) | 个人便携式安全网络访问系统 | |
EP1238340A2 (fr) | Dispositif informatique pour l'application de donnees accreditives a un logiciel ou a un service | |
EP2180423B1 (fr) | Controle de l'utilisation de machines virtuelles | |
EP1413088B1 (fr) | Methode pour creer un reseau virtuel prive utilisant un reseau public | |
EP2183698A2 (fr) | Gestion et partage de coffres-forts dematerialises | |
FR3114714A1 (fr) | Procédé d’accès à un ensemble de données d’un utilisateur. | |
EP1299837A1 (fr) | Procede de distribution commerciale en ligne de biens numeriques par l'intermediaire d'un reseau de communication et dispositif electronique d'achat de biens numeriques distribues par ce procede | |
EP2071799B1 (fr) | Procédé et serveur pour l'accès a un coffre-fort électronique via plusieurs entités | |
FR2730076A1 (fr) | Procede d'authentification par un serveur du porteur d'un objet portatif a microprocesseur, serveur et objet portatif correspondants | |
EP0969347B1 (fr) | Procédé d'authentification pour accès protégés dans un système informatique en réseau | |
FR2913551A1 (fr) | Methode d'authentification mutuelle et recurrente sur internet. | |
WO2022184726A1 (fr) | Procédé pour permettre à des utilisateurs de déployer des contrats intelligents dans une chaîne de blocs au moyen d'une plateforme de déploiement | |
EP3029878B1 (fr) | Procédé de transmission de secret à durée de vie limitée pour réaliser une transaction entre un terminal mobile et un équipement | |
WO2014135526A1 (fr) | Système et procédé de gestion d'au moins une application en ligne, objet portable utilisateur usb et dispositif distant du système | |
FR3007929A1 (fr) | Procede d'authentification d'un utilisateur d'un terminal mobile | |
WO2014135519A1 (fr) | Système et procédé de gestion d'au moins une application en ligne, objet portable utilisateur communiquant par un protocole radioélectrique et dispositif distant du système | |
EP3899765A1 (fr) | Réinitialisation d'un secret applicatif au moyen du terminal | |
FR3023039A1 (fr) | Authentification d'un utilisateur | |
WO2012107369A1 (fr) | Procede et dispositif de connexion a un service distant depuis un dispositif hote |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000988927 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 545914 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2395374 Country of ref document: CA Ref document number: 008171459 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020027007779 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 25269/01 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2000988927 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020027007779 Country of ref document: KR |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWR | Wipo information: refused in national office |
Ref document number: 2000988927 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000988927 Country of ref document: EP |