WO2005059722A1 - Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm - Google Patents
Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm Download PDFInfo
- Publication number
- WO2005059722A1 WO2005059722A1 PCT/EP2004/014237 EP2004014237W WO2005059722A1 WO 2005059722 A1 WO2005059722 A1 WO 2005059722A1 EP 2004014237 W EP2004014237 W EP 2004014237W WO 2005059722 A1 WO2005059722 A1 WO 2005059722A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data carrier
- portable data
- user
- terminal
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Definitions
- the invention relates to a method for activating access to a computer system or to a program.
- the invention further relates to a portable data carrier for activating access to a computer system or to a program.
- the object of the invention is to enable access to a computer system or to a program via a terminal device in a secure and convenient manner for the user, without installing software provided specifically for this purpose on the terminal device.
- a data connection is established between the user's portable data carrier and a terminal. Authentication of the user is carried out from the portable data carrier. If authentication is successful, the portable data carrier will issue an access code for circuit to provide access to the computer system or program for transmission over the data link.
- the invention has the advantage that the use of the portable data carrier enables access to be activated in a very convenient manner.
- the intended user authentication ensures a high security standard. It is also particularly advantageous that no special software has to be installed on the end device to use the portable data carrier. This makes it possible for the user to unlock access using a third-party device on which the user is not allowed to install any software.
- the data connection can be established in particular via a USB interface of the terminal. Since an increasing number of end devices have a USB interface, the method according to the invention can therefore be used very universally. It is also advantageous that the portable data carrier can be supplied with its operating voltage via the USB interface and the portable data carrier therefore does not require its own voltage source.
- Authentication can be carried out on the basis of personal secret information entered by the user. This has the advantage that it can be implemented using simple means and that no high computing capacity has to be maintained. It is also possible to carry out the authentication on the basis of a biometric method, in particular the checking of a fingerprint of the user. This ensures a particularly high security standard.
- the access code is generated by the portable data carrier. In order to aggravate potential attacks, a random number can be taken into account when generating the access code, which random number is provided by the computer system. This means that a different access code is used each time, so that spying out the access code does not provide any information that can be used by an attacker.
- at least one access code is stored in the portable data carrier, protected against unauthorized access. This eliminates the computational effort for generating the access code.
- the access code can be provided for transmission over the data connection in a public area of a memory of the portable data carrier. This makes it possible to transmit the access code over the data connection by using commands from the terminal.
- an input device of the terminal is simulated by the portable data carrier. This creates the possibility of transmitting the access code from the portable data carrier as an input to the simulated input device via the data connection. This has the advantage that no manual command input is required for the transmission of the access code.
- the access code can be transmitted to a website, for example.
- software for establishing a connection to the computer system is stored in the memory of the portable data carrier. This ensures that the input device used is largely independent. Around To make external access to the storage of the portable data carrier as simple as possible, the storage can be operated as a drive.
- the portable data carrier according to the invention for activating access to a computer system or to a program for a user via a terminal without software installed specifically for this purpose on the terminal has a security chip for providing an access code for activating access to the computer system or program on.
- the special feature of the portable data carrier according to the invention is that a device is provided for establishing a data connection with the terminal and authentication of the user can be carried out with the security chip.
- the portable data carrier according to the invention is in particular designed such that it can be connected to a USB interface of the terminal.
- the portable data carrier has a USB hub, by means of which the data connection with the terminal is separated into several separate signal paths within the portable data carrier. This enables the portable data carrier to register several USB devices, for example an input device and a removable data carrier, with the end device.
- the portable data carrier according to the invention can have a memory designed as a flash EEPROM. Such a memory can be read out from outside the portable data carrier with little effort.
- the portable data carrier according to the invention has a sensor for capturing biometric data, in particular a fingerprint sensor. The invention is explained below with reference to the embodiments shown in the drawing.
- FIG. 1 shows a schematic representation of the architecture of an exemplary embodiment of a portable data carrier designed according to the invention, which is connected to a personal computer to enable access to a computer system or to a program,
- Fig. 2 shows an embodiment of the procedure according to the invention for activating access using the portable data carrier
- FIG. 3 shows a schematic representation of the architecture of a further exemplary embodiment of the portable data carrier according to the invention.
- the portable data carrier 1 shows a schematic representation of the architecture of an exemplary embodiment of a portable data carrier 1 designed according to the invention, which is connected to a personal computer 2 to enable access to a computer system or a program.
- the portable data carrier 1 is preferably designed as a small device, which is also referred to as a token and is preferably plugged into a connection of the personal computer 2.
- the portable data carrier 1 has an integrated circuit 3, which is connected to a non-volatile memory 4, a fingerprint sensor 5 and a security chip 6. Externally, the integrated circuit 3 is connected to a USB interface 7 of the personal computer 2.
- USB is the usual abbreviation tion for Universal Serial Bus.
- the personal computer 2 is connected to a network, for example the Internet, in a manner not shown in the figures.
- An application-specific integrated circuit, or ASIC for short, is used as the integrated circuit 3, and its mode of operation is specifically tailored to the portable data carrier 1.
- the non-volatile memory 4 is designed in particular as a flash EEPROM.
- the connection of the portable data carrier 1 with the USB interface 7 of the personal computer 2 serves on the one hand to supply the portable data carrier 1 with an operating voltage and on the other hand to transfer data between the portable data carrier 1 and the personal computer 2.
- the operation of the portable data carrier 1 is described in Individual explained with reference to FIG. 2.
- FIG. 2 shows an exemplary embodiment of the procedure according to the invention for activating access using the portable data carrier 1.
- One action or several actions are each represented by a block.
- the associated block is shown in one of three columns, depending on whether the respective action of a protected website via which access is to take place is attributable to portable data carrier 1 or the user.
- the actions that take place on the website are shown in the left column.
- the actions of portable data carrier 1 are shown in the middle column.
- the corresponding actions of the user are illustrated in the right column.
- the personal computer 2 is used to activate the website required for the activation of the access called and the portable data carrier 1 inserted into a connector of the USB interface 7 of the personal computer 2 and thereby activated.
- the user enters a user ID on the website accessed.
- the entry can be made, for example, by the user transferring the user ID from a public area of the non-volatile memory 4 of the portable data carrier 1 to the website.
- This is shown as a block B2.
- the public area of the non-volatile memory 4 is accessible from outside the portable data carrier 1. Commands such as "copy” or "cut” and "paste" can therefore be used for the transfer on a conventional personal computer 2.
- Block B3 illustrates that the random number is used as an input for generating a response of portable data carrier 1, represented as block B6.
- the response is only generated if the user is successfully authenticated.
- authentication takes place by means of verification of a User's fingerprint.
- the verification is triggered in block B8 by the user, for example, by placing a finger on the fingerprint sensor 5 or by executing a program in the non-volatile memory 4 of the portable data carrier 1.
- the fingerprint sensor 5 takes an image, the features of which are extracted and compared with stored reference features.
- the user can also be authenticated by entering a personal secret number.
- the portable data carrier 1 After successful authentication, the portable data carrier 1 generates the answer.
- the random number is taken into account when generating the response. For example, a digital signature of the hashed random number is calculated to generate the response.
- a block B9 the answer is provided in the public area of the non-volatile memory 4 of the portable data carrier 1.
- block BIO the user transfers the response from the non-volatile memory 4 of the portable data carrier 1 to the website by using the "cut” and "insert" commands.
- a block 11 indicates that the associated server verifies the correctness of the response and accordingly enables access for the user.
- a simplified modification of the method according to the invention without a random number can also be used.
- This modification verifies the user's fingerprint. If the result is positive, a one-time password is generated by the portable data carrier 1 and stored in the public area of the non-volatile memory 4 of the portable data carrier 1. The user transfers the one-time password to the website in the manner already described. Thereupon the access for the user is activated for a predetermined period of time. Also at The modification can further simplify the method according to the invention by using a personal secret number for authenticating the user instead of the fingerprint. In this case, an executable program is stored in the public area of the non-volatile memory 4 of the portable data carrier 1, which requires the user's personal identification number to be entered.
- the value entered by the user for the secret number is compared with a reference value and, if there is a match, a one-time password is again generated, which is stored in the public area of the non-volatile memory 4 of the portable data carrier 1 and is transmitted from there to the website by the user ,
- a browser can also be used in each case, which is implemented as an executable program in the portable data carrier 1.
- the Internet pages via which access can be activated by the user are stored as “favorites”. With this modification, it is not necessary to use the browser of the personal computer 2 and to use its security settings.
- FIG. 3 shows a schematic representation of the architecture of a further exemplary embodiment of the portable data carrier 1 according to the invention.
- This exemplary embodiment is distinguished in that the portable data carrier 1 is connected to the USB interface 7 of the personal computer 2 via an integrated USB hub 8.
- the USB hub 8 enables the connection of two USB devices to the USB interface 7 of the personal computer 2.
- Two separate signal paths are formed between the USB hub 8 and the integrated circuits 3 within the portable data carrier 1.
- the integrated circuit 3 simulates a USB keyboard for the first signal path and logs on to the operating system of the personal computer 2 as an additional keyboard.
- the USB keyboard is treated by the personal computer 2 like a physically existing keyboard and its inputs are processed accordingly.
- a flash drive is implemented for the second signal path.
- the flash drive has an executable program that allows a selection from various websites and services. Otherwise, the exemplary embodiment according to FIG. 3 corresponds to the exemplary embodiment shown in FIG. 1.
- portable data carrier 1 is inserted into a connection of USB interface 7 of personal computer 2.
- a desired website is selected using the executable program on the flash drive.
- the user places the input mark on the website in an input field provided for this purpose and triggers the biometric user authentication by placing a finger on the fingerprint sensor 5 of the portable data carrier 1.
- the portable data carrier 1 After successful authentication of the user, the portable data carrier 1 generates a one-time password and sends this via the first signal path to the input field on the website.
- a manual transfer of the one-time password to the website is not necessary, as for the the keyboard is simulated in the first signal path and this results in an automatic transmission. It is also possible to use a user ID and a password stored in the portable data carrier 1, to be sent to entspre r-reaching fields of the website.
- the user can access a large number of different websites without having to remember the associated user IDs and passwords, since these are automatically entered into the input fields of the visited website after the user has successfully authenticated.
- the user ID and password can also be entered in a local application or a network application with password protection.
- entry into the login screen of an operating system is also possible.
- the program can record the user commands most recently entered via the standard input device.
- the program can propose that the login information be registered automatically. Depending on the configuration settings of the program, the login information can be entered automatically the next time the user is authenticated against the token. Alternatively, the program can ask you to put your finger on.
- An important aspect in all variants of the method according to the invention is that it is not necessary to install software on the personal computer 2 specifically for the method.
- Standard software of the personal computer 2 and / or software that is implemented on the portable data carrier 1 can be used to carry out the method.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Hardware Redundancy (AREA)
- Electrical Discharge Machining, Electrochemical Machining, And Combined Machining (AREA)
- Electrotherapy Devices (AREA)
Priority Applications (7)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE502004011249T DE502004011249D1 (de) | 2003-12-18 | 2004-12-14 | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm |
| EP04820436A EP1697820B1 (de) | 2003-12-18 | 2004-12-14 | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm |
| CA2550566A CA2550566C (en) | 2003-12-18 | 2004-12-14 | Process for releasing the access to a computer system or to a program |
| US10/583,378 US8739277B2 (en) | 2003-12-18 | 2004-12-14 | Process for releasing the access to a computer system or to a program |
| JP2006544316A JP2007517287A (ja) | 2003-12-18 | 2004-12-14 | コンピュータシステムまたはプログラムへのアクセスを開放するための方法 |
| AT04820436T ATE470182T1 (de) | 2003-12-18 | 2004-12-14 | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm |
| IL176378A IL176378A (en) | 2003-12-18 | 2006-06-18 | Method for activation of an access to a computer system or to a program |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE10359680.1 | 2003-12-18 | ||
| DE10359680A DE10359680A1 (de) | 2003-12-18 | 2003-12-18 | Verfahren zur Freischaltung eines Zugangs zu einem Computersystem oder zu einem Programm |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2005059722A1 true WO2005059722A1 (de) | 2005-06-30 |
Family
ID=34672902
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2004/014237 Ceased WO2005059722A1 (de) | 2003-12-18 | 2004-12-14 | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm |
Country Status (10)
| Country | Link |
|---|---|
| US (1) | US8739277B2 (https=) |
| EP (1) | EP1697820B1 (https=) |
| JP (1) | JP2007517287A (https=) |
| CN (1) | CN100435061C (https=) |
| AT (1) | ATE470182T1 (https=) |
| CA (1) | CA2550566C (https=) |
| DE (2) | DE10359680A1 (https=) |
| ES (1) | ES2343188T3 (https=) |
| IL (1) | IL176378A (https=) |
| WO (1) | WO2005059722A1 (https=) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3928640B2 (ja) * | 2004-11-09 | 2007-06-13 | コニカミノルタビジネステクノロジーズ株式会社 | 画像処理装置 |
| WO2007095265A2 (en) * | 2006-02-10 | 2007-08-23 | Rsa Security Inc. | Method and system for providing a one time password to work in conjunction with a browser |
| DE102006007323A1 (de) * | 2006-02-16 | 2007-05-24 | Siemens Ag | Prozessgerät |
| EP2011052B1 (en) | 2006-04-24 | 2018-11-14 | Yubico Ab | Device and method for identification and authentication |
| JP4876727B2 (ja) * | 2006-06-16 | 2012-02-15 | 大日本印刷株式会社 | 電子機器の不正使用防止システム |
| US20100031336A1 (en) * | 2006-12-14 | 2010-02-04 | Denis Dumont | Peripheral Security Device |
| DE102007034346A1 (de) * | 2007-07-24 | 2009-01-29 | Cherry Gmbh | System und Verfahren zur sicheren Eingabe einer PIN |
| EP2339493A1 (en) * | 2009-12-22 | 2011-06-29 | Gemalto SA | Authenticating human interface device |
| CN103250160A (zh) | 2010-10-15 | 2013-08-14 | 惠普发展公司,有限责任合伙企业 | 认证指纹图像 |
| US9954578B2 (en) | 2011-09-08 | 2018-04-24 | Yubico Inc. | Devices and methods for identification, authentication and signing purposes |
| US8924734B2 (en) * | 2011-12-07 | 2014-12-30 | Synaptilogix LLC | Key and method for entering computer related passwords via a mnemonic combination |
| DE102012024390A1 (de) * | 2012-12-13 | 2014-06-18 | Giesecke & Devrient Gmbh | Verfahren zur Bereitstellung von Messdaten einer Vorrichtung zur Bearbeitung von Wertdokumenten und Wertdokumentbearbeitungsvorrichtung |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10211036A1 (de) * | 2002-03-13 | 2003-10-09 | Fujitsu Siemens Computers Gmbh | Zugangsschutz |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2967764B2 (ja) * | 1997-06-30 | 1999-10-25 | 日本電気株式会社 | 非接触式icカードおよびそれを用いたログイン方法 |
| JP2000215172A (ja) * | 1999-01-20 | 2000-08-04 | Nec Corp | 個人認証システム |
| US6324537B1 (en) * | 1999-09-30 | 2001-11-27 | M-Systems Flash Disk Pioneers Ltd. | Device, system and method for data access control |
| FR2802666B1 (fr) * | 1999-12-17 | 2002-04-05 | Activcard | Systeme informatique pour application a acces par accreditation |
| JP2001216271A (ja) * | 2000-02-03 | 2001-08-10 | Sony Corp | 情報処理システム、情報蓄積装置、アダプタ装置、情報端末装置 |
| DE10034993B4 (de) * | 2000-07-19 | 2005-05-19 | Sc Itec Gmbh | Universelles Sicherheitsmodul |
| JP2002123495A (ja) * | 2000-10-16 | 2002-04-26 | Matsushita Electric Ind Co Ltd | 電子認証システムおよびデータ記録システム |
| DE10057697A1 (de) * | 2000-11-21 | 2002-05-29 | Fujitsu Siemens Computers Gmbh | Speichermedium |
| JP3860721B2 (ja) * | 2001-01-12 | 2006-12-20 | 日本電信電話株式会社 | 認証システム |
| WO2002073877A2 (en) * | 2001-03-09 | 2002-09-19 | Pascal Brandys | System and method of user and data verification |
| FR2849945B1 (fr) * | 2003-01-10 | 2005-03-11 | Atmel Corp | Moyens pour la communication des cartes a puces usb utilisant des transferts a vitesse maximale ou elevee |
| US6769622B1 (en) * | 2003-03-14 | 2004-08-03 | Stmicroelectronics, Inc. | System and method for simulating universal serial bus smart card device connected to USB host |
-
2003
- 2003-12-18 DE DE10359680A patent/DE10359680A1/de not_active Ceased
-
2004
- 2004-12-14 DE DE502004011249T patent/DE502004011249D1/de not_active Expired - Lifetime
- 2004-12-14 CN CNB2004800418854A patent/CN100435061C/zh not_active Expired - Lifetime
- 2004-12-14 CA CA2550566A patent/CA2550566C/en not_active Expired - Lifetime
- 2004-12-14 AT AT04820436T patent/ATE470182T1/de not_active IP Right Cessation
- 2004-12-14 ES ES04820436T patent/ES2343188T3/es not_active Expired - Lifetime
- 2004-12-14 JP JP2006544316A patent/JP2007517287A/ja active Pending
- 2004-12-14 US US10/583,378 patent/US8739277B2/en active Active
- 2004-12-14 EP EP04820436A patent/EP1697820B1/de not_active Expired - Lifetime
- 2004-12-14 WO PCT/EP2004/014237 patent/WO2005059722A1/de not_active Ceased
-
2006
- 2006-06-18 IL IL176378A patent/IL176378A/en active IP Right Grant
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE10211036A1 (de) * | 2002-03-13 | 2003-10-09 | Fujitsu Siemens Computers Gmbh | Zugangsschutz |
Non-Patent Citations (4)
| Title |
|---|
| "Web Authentifizierung mit wibu-key", KEYNOTE, no. 2, October 2001 (2001-10-01), pages 6 - 6, XP002317943, Retrieved from the Internet <URL:http://wibu.de/files/news/kn2.pdf> [retrieved on 20050214] * |
| "Web-Authentifizierung", WIBU-MAGAZIN, March 2003 (2003-03-01), pages 4, XP002317944, Retrieved from the Internet <URL:http://wibu.de/files/news/kn5.pdf> [retrieved on 20050215] * |
| DE LA PUENTE F ET AL INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS: "Pocket device for authentication and data integrity on internet banking applications", PROCEEDINGS 37TH. ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY. (ICCST). TAIPEI, TAIWAN, OCT. 14 - 16, 2003, IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, NEW YORK, NY : IEEE, US, vol. CONF. 37, 14 October 2003 (2003-10-14), pages 43 - 50, XP010706183, ISBN: 0-7803-7882-2 * |
| RANKL W ET AL: "Handbuch der Chipkarten, PASSAGE", HANDBUCH DER CHIPKARTEN. AUFBAU - FUNKTIONSWEISE - EINSATZ VON SMART CARDS, MUENCHEN : CARL HANSER VERLAG, DE, 1999, pages 450 - 459, XP002268702, ISBN: 3-446-21115-2 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP1697820B1 (de) | 2010-06-02 |
| ES2343188T3 (es) | 2010-07-26 |
| ATE470182T1 (de) | 2010-06-15 |
| DE502004011249D1 (de) | 2010-07-15 |
| US20080036572A1 (en) | 2008-02-14 |
| CN1918527A (zh) | 2007-02-21 |
| IL176378A0 (en) | 2006-10-05 |
| JP2007517287A (ja) | 2007-06-28 |
| DE10359680A1 (de) | 2005-07-14 |
| US8739277B2 (en) | 2014-05-27 |
| EP1697820A1 (de) | 2006-09-06 |
| IL176378A (en) | 2011-11-30 |
| CN100435061C (zh) | 2008-11-19 |
| CA2550566C (en) | 2015-05-19 |
| CA2550566A1 (en) | 2005-06-30 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1358533B1 (de) | Verfahren, anordnung und sicherheitsmedium zur authentifizierung eines benutzers | |
| DE60001222T2 (de) | Rechenvorrichtung und -verfahren mit gesicherter authentikationseinrichtung | |
| DE60306844T2 (de) | Methode und System zur Datenaktualisierung | |
| EP2338255B1 (de) | Verfahren, computerprogrammprodukt und system zur authentifizierung eines benutzers eines telekommunikationsnetzwerkes | |
| DE102011089580B3 (de) | Verfahren zum Lesen von Attributen aus einem ID-Token | |
| EP2137664A2 (de) | Verfahren zur erzeugung bestätigter transaktionsdaten und vorrichtung dazu | |
| WO2010075921A2 (de) | Anforderungsbasiertes personenidentifikationsverfahren | |
| EP2602738A2 (de) | Vorrichtung zum Schutz von Sicherheitstoken gegen Malware | |
| EP3748521B1 (de) | Verfahren zum lesen von attributen aus einem id-token | |
| EP1697820B1 (de) | Verfahren zur freischaltung eines zugangs zu einem computersystem oder zu einem programm | |
| EP3252643B1 (de) | Lesegerät für eine chipkarte und computersystem | |
| DE102004044454A1 (de) | Tragbares Gerät zur Freischaltung eines Zugangs | |
| WO2014131557A1 (de) | Generieren eines schlüssels unter verwendung von biometrischen daten und ein puf | |
| EP2080144B1 (de) | Verfahren zum freischalten einer chipkarte | |
| WO2006089710A1 (de) | Sicherheitsmodul | |
| EP3767513B1 (de) | Verfahren zur sicheren durchführung einer fernsignatur sowie sicherheitssystem | |
| EP2169579B1 (de) | Verfahren und Vorrichtung zum Zugriff auf ein maschinenlesbares Dokument | |
| DE102017127280A1 (de) | Schutz vor realtime phishing und anderen attacken während eines login-prozesses an einem server | |
| EP2893483B1 (de) | Verfahren zur personalisierung eines secure elements (se) und computersystem | |
| EP3510515B1 (de) | Datenbrille zum kryptographischen signieren von bilddaten | |
| EP3358488B1 (de) | Verfahren zum erkennen von unberechtigten kopien digitaler sicherheits-token | |
| EP1365363B1 (de) | Verfahren zur Ausführung einer Datentransaktion mittels einer aus einer Haupt- und einer trennbaren Hilfskomponente bestehenden Transaktionsvorrichtung | |
| DE102019109343A1 (de) | Verfahren und Vorrichtung zur Übertragung digitaler Daten | |
| DE102005030305A1 (de) | Verahren zur digitalen Authentifizierung unter Verwendung eines externen Speichermediums für einen Computer | |
| WO2010130489A1 (de) | Elektronischer schlüssel zur authentifizierung |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 176378 Country of ref document: IL |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2550566 Country of ref document: CA Ref document number: 2006544316 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2004820436 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 200480041885.4 Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2004820436 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 10583378 Country of ref document: US |
|
| WWP | Wipo information: published in national office |
Ref document number: 10583378 Country of ref document: US |