WO2008064821A2 - Verfahren und system zum auslesen von daten aus einem speicher eines mobilen fernen geräts - Google Patents
Verfahren und system zum auslesen von daten aus einem speicher eines mobilen fernen geräts Download PDFInfo
- Publication number
- WO2008064821A2 WO2008064821A2 PCT/EP2007/010161 EP2007010161W WO2008064821A2 WO 2008064821 A2 WO2008064821 A2 WO 2008064821A2 EP 2007010161 W EP2007010161 W EP 2007010161W WO 2008064821 A2 WO2008064821 A2 WO 2008064821A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- data
- wireless communication
- mobile
- modem
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 29
- 238000004891 communication Methods 0.000 claims description 29
- 238000013475 authorization Methods 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 description 11
- 241001656913 Buxus balearica Species 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007630 basic procedure Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C23/00—Non-electrical signal transmission systems, e.g. optical systems
- G08C23/04—Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
-
- G—PHYSICS
- G08—SIGNALLING
- G08G—TRAFFIC CONTROL SYSTEMS
- G08G1/00—Traffic control systems for road vehicles
- G08G1/20—Monitoring the location of vehicles belonging to a group, e.g. fleet of vehicles, countable or determined number of vehicles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the invention relates to a method for reading out data from a memory of a mobile remote device, e.g. dvseckats, by a server, wherein between the server and the device a wireless communication connection is established.
- the invention relates to a system for reading data from a memory of a mobile remote device, e.g.ffygerats, by a server, as well as the device is assigned a modem for wireless communication.
- WO 2006/004231 A1 deals with the remote reading of an energy meter, wherein if data is not received, a line connection to a read modem is to be established, an authentication code being provided for this special case. Specifically, however, it is about the use of services of an existing network, especially in a stationary equipment, as opposed to access to individual remote, mobile, passive devices by a central station.
- EP 1 655 921 A1 it is known from EP 1 655 921 A1, for example. It has become known to subject users of a communication system for network access to authentication so that only authorized subscriber terminals are granted access to the network. Also known per se are VPN connections, see, for example, US 2006/0155822 A1, which generally discloses a VPN connection between a mobile device and an Internet device, which concerns a service network, in which a rights assignment and the use of services stand in the foreground. The problem of reading data, in particular data that can be assigned to different owners, in objects or devices that are mobile and completely passive, is not addressed here.
- it is intended to allow downloading of authentic data if the object or device containing the data is too far away to reach it directly, or if it is constantly changing its location due to the mobile training. It should also be possible to request and download certain data from different devices, especially on behalf of authorized companies.
- the invention provides a method and a system for reading out data as stated in the independent claims.
- Advantageous embodiments and further developments are specified in the dependent claims.
- data from a mobile remote (vehicle) device can be requested and downloaded from a data station, a server, which can also be mobile, for example, in addition to being stationary.
- a conventional radio connection in particular via GPRS or GSM, but also an infrared (IR) connection, a wireless LAN connection or the like.
- IR infrared
- VPN Virtual Private Network
- the server After establishing such a communication connection from the server, a VPN (Virtual Private Network) connection between the server and the device is realized, and the corresponding applications are integrated into the connection on the server and on the remote device.
- the required data can only be downloaded with the appropriate authorization, whereby this data transmission is preferably also carried out under encryption for security reasons.
- data requested by different companies from a wide range of devices can be requested and downloaded to the server, and the server (or one of several servers operating in the network) can also be made available to various customers for such download services.
- the authentication using an authentication card is made in a m card reader - after handover, for example, by a customer of the server - is read, so access to certain mobile devices, such as devices in certain Vehicles, in the field, to obtain.
- the authentication unit it is also possible to connect the authentication unit to a management unit for virtual card images (electronic "authorization cards") and no additional measures are required.
- virtual card images electronic "authorization cards”
- the numbers of the devices in the case of mobile phone connections can be public and the access to the data According to the invention, as mentioned, via the authentication, in particular via an authentication card.
- Dxe invention thus enables the secure reading of data from a memory of a mobile remote device, which is a passive device, with all the necessary steps for reading the data from the side of the server or computer, ie the "terminal", are made
- Server-side authentication ensures that only permissible access to data in the mobile, passive devices can take place, whereby in the case of data from different owners, authentication also ensures access to only one's own data
- Service connection and no network connection there are no compulsory ones Service connection and no network connection, and access to signed, protected data in a passive, mobile object in a secure manner, starting from the central data terminal, is made possible.
- the - known per se - VPN- Connection of meaning.
- FIG. 1 is a block diagram of a system according to the invention for remote reading of data with a server and a mobile device;
- FIG. 1 is a block diagram of a system according to the invention for remote reading of data with a server and a mobile device;
- FIG. 3 shows a flow chart for illustrating the basic procedure in the method according to the invention for remote reading of data
- 4 and 5 are detailed flowcharts to portions in the flowchart of FIG. 3, illustrating the authentication procedure and the data transmission.
- FIG. 1 schematically illustrates a system 1 for reading out data from a passive remote device 2, which is a mobile device, specifically a vehicle device, such as a so-called OBU (On-Board Unit), but also another device, such as a device connected to a tachograph in the case of trucks.
- a passive remote device 2 which is a mobile device, specifically a vehicle device, such as a so-called OBU (On-Board Unit), but also another device, such as a device connected to a tachograph in the case of trucks.
- OBU On-Board Unit
- a server 4 is to be understood only as an example, and that also several servers in the network, possibly in conjunction with a common database 5, as memory where the downloaded data is stored, may be present, and In particular, a plurality of devices 2, for example, several thousand devices 2, may be present.
- the memory 3 in the respective device 2 can be present in various known embodiments, and the data are written into this memory 3 or read out of the memory 3 with the aid of a processor 6 or the like.
- the processor 6 (hereinafter referred to simply as ⁇ P 6) is assigned an encryption / decryption unit 7, which may be designed as a separate component and connected to the ⁇ P 6, but which is also formed as a software module in a program memory of the ⁇ P 6 can be.
- the ⁇ P 6 contains further Also, a corresponding communication module (not illustrated in detail) to the server 4 via an interface 8 and an associated modem 9 for wireless communication, such as a GPRS modem or a wireless LAN modem (W-LAN modem) to communicate.
- the respective connection establishment over these wireless communication paths takes place from the server 4, which has a corresponding communication modem 10, e.g. a GPRS modem or a wireless LAN modem, with which it is connected via an interface 11.
- the server 4 contains computer means 12, which may be formed by one or more processors or microcomputers ( ⁇ C), a part of which forms a separate control unit 13, which has an encryption / decryption unit 14 assigned and via a VPN device 15 and the Interface 11 is connected to the modem 10.
- ⁇ C microcomputers
- an authentication unit 16 is provided in the computer means 12, which is connected via an interface 17 to a card reader 18 for reading authorization cards 19 which contain a code and which are inserted into the card reader 18.
- a unit 18 there may also be a management unit for virtual authorization cards (virtual card images).
- an input unit 20 is provided, in which case also a corresponding authentication procedure is conceivable in order to prove an access authorization for the request of data from the respective device 2.
- the control unit 13 of the computer means 12 is further connected via an interface 21 to the memory 5.
- FIG. 1A illustrates a system 1 modified from the system according to FIG. 1 for reading out data from a remote, mobile device 2, for example once again an OBU vehicle device.
- the system 1 here also has a server 4 for retrieving data from the remote device 2, specifically from its memory 3.
- the server 4 is preferably designed as a mobile read-out device, and he or she is in principle similar to the server 4 of FIG. 1 formed so that, as far as agreement is given, a re-detailed description may be unnecessary, similar to the case of Device 2.
- corresponding components of the server 4 as well as the remote device 2 have been given the same reference numbers.
- the server 4 again has computer means 12 with a control unit 13, a
- the card reader 18 is integrated in the server 4 in order to be able to insert authorization cards 19 directly into the server 4 and to be able to read from it.
- a VPN device 15 is also connected to the computer means 13 using a mobile telephone modem, e.g. a GSM modem or a W-LAN modem, generally a modem 10, is connected via an interface 11 to the VPN device 15.
- a mobile telephone modem e.g. a GSM modem or a W-LAN modem, generally a modem 10.
- a modem 10 'known per se for infrared communication is also connected to the VPN device 15.
- the remote device 2 also has an IR modem 9 'with IR transmitting means 22' and IR receiving means 23 ', this IR modem 9' being connected to the processor 6 of the device 2 via the encryption / descrambling unit 7 ,
- This IR modem 9 ' instead of the wireless modem, wireless modem or mobile modem 9 shown in FIG. 1 or preferably, as shown in Fig. IA, be provided in addition to the latter modem 9 so as to Readout of data on request from the server 4 hm depending on the choice or for more favorable communication conditions either via the W-LAN or mobile phone connection (modems 9, 10) or via the infrared communication connection (modems 9 ', 10') provided.
- a mobile server 4 it is also expedient to connect this server 4 to the database 5 via a wireless network Network (radio network) to produce, unless the database 5 is integrated into the server 4.
- a wireless network Network radio network
- an arrangement of transmitting and receiving radio modems 24 and 25 for the communication between the mobile server 4 and the database 5 is illustrated by dashed lines as an example in Fig. IA.
- connection between the server 4 and device 2 is schematically illustrated schematically with the provided several security levels.
- the production of a communication connection 30 is illustrated as the first measure (outer shell) and the establishment of a VPN connection 31 as the next inner "shell.”
- the described authentication 32 and the encryption 33 are in the transmission of the Data between the respective applications 34, 35 of the server 4 and the device 2 are respectively indicated in detail at 36 the data request and the authentication process and the transfer of keys and at 37 the transmission of the data.
- FIG. 3 It is generally shown in FIG. 3 that according to a field 40, if there is a desire for data transmission, a wireless connection to the device 2 is established from the server 4. In accordance with an interrogation field 41, it is then checked whether this wireless connection is established, for example via GSM or GPRS, or else via IR, and if not, return to the initial field 40. However, as soon as the wireless connection is established, it is queried in accordance with a further query field 42 whether there is a legitimate query, ie whether an authentication has been or has been made.
- the process continues immediately to the end 43 of the process. If, however, in the check according to query field 42, the result is an authorization of the query, then according to a field 44, the VPN connection is established from the server. Following this, in accordance with a field 45, the data is transmitted from the device 2 to the server 4, wherein continuously according to an interrogation field 46 queries whether the data has already been completely transferred. If this is not the case, the data transmission is continued according to box 45. However, when the data has been completely transferred, the end 43 of the process is reached.
- FIG. 4 illustrates in more detail the process during the authentication, it being assumed that the security modules (crypto-control) of the server 4 and of the terminal 2 each have special keys; the corporate key, along with the terminal (frontend) key, must be a valid pair.
- the server 4 sends the corporate identifier for authentication purposes, i. an identification of the company for which the data transmission is to be initiated and which is authorized to transmit the data from the respective terminal 2.
- this corporate identifier is then checked in the device 2, and if the device 2 rejects it, i. the enterprise identifier is not known to the device 2, the transition to the end 43 as described.
- the device 2 sends back a confirmation message to the server 4, s. Box 52 in Fig. 4.
- the server 4 provides a VPN key for establishing a VPN connection, s. Field 53, after which the establishment of the VPN connection according to box 54 takes place.
- the server 4 asks for a list of accessible data; It should be taken into account here that several authorized subscribers are conceivable, to whom data is assigned in each case, but which also have to be protected against each other.
- the device 2 sends the list of accessible data to the server 4, then the server 4 queries the data for the transmitted list, s. Box 57 in Fig. 5, and according to box 58, the device 2 sends the data and the associated signature, if, as is preferred, the data is already stored in the memory 3 of the device 2 stored.
- the server 4 is further queried continuously in accordance with query box 59, whether the list end is reached, ie whether all data transfer according to the list were; if not, returns to box 57 to request further data. If, however, a complete transmission of the data according to the list is given, the data transfer is terminated according to field 60, the VPN connection is closed according to field 61 and, finally, according to field 62, the wireless communication connection (GSM, GPRS) is ended, the end step 43 then reached.
- GSM Global System for Mobile communications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BRPI0718934-6A2A BRPI0718934A2 (pt) | 2006-12-01 | 2007-11-23 | Processo e sistema para leitura de dados em uma memória de um aparelho móvel remoto. |
US12/517,162 US20100075633A1 (en) | 2006-12-01 | 2007-11-23 | Method and System for the Reading of Data from a Memory in a Mobile Remote Appliance |
EP07846762A EP2100428A2 (de) | 2006-12-01 | 2007-11-23 | Verfahren und system zum auslesen von daten aus einem speicher eines mobilen fernen geräts |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT0200106A AT504581B1 (de) | 2006-12-01 | 2006-12-01 | Verfahren und system zum auslesen von daten aus einem speicher eines fernen geräts durch einen server |
ATA2001/2006 | 2006-12-01 | ||
AT0081807A AT505078B9 (de) | 2006-12-01 | 2007-05-23 | Verfahren und system zum auslesen von daten aus einem speicher eines fernen geräts durch einen server |
ATA818/2007 | 2007-05-23 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2008064821A2 true WO2008064821A2 (de) | 2008-06-05 |
WO2008064821A3 WO2008064821A3 (de) | 2008-10-16 |
Family
ID=39494749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2007/010161 WO2008064821A2 (de) | 2006-12-01 | 2007-11-23 | Verfahren und system zum auslesen von daten aus einem speicher eines mobilen fernen geräts |
Country Status (6)
Country | Link |
---|---|
US (1) | US20100075633A1 (de) |
EP (1) | EP2100428A2 (de) |
AT (2) | AT504581B1 (de) |
BR (1) | BRPI0718934A2 (de) |
RU (1) | RU2454819C2 (de) |
WO (1) | WO2008064821A2 (de) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2189921A3 (de) * | 2008-11-21 | 2010-06-23 | ads-tec GmbH | Diagnosegerät zur Verbindung mit einem Kraftfahrzeug |
EP2157551A3 (de) * | 2008-08-21 | 2013-02-27 | NORDSYS GmbH | Tachographen-Auslesevorrichtung |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102006048029B4 (de) * | 2006-10-09 | 2008-10-02 | Continental Automotive Gmbh | Verfahren und Vorrichtung zur Übertragung von Daten zwischen einem Fahrtschreiber und einer Datenverarbeitungseinrichtung |
DE102008006840A1 (de) * | 2008-01-30 | 2009-08-13 | Continental Automotive Gmbh | Datenübertragungsverfahren und Tachographensystem |
DE102008047433A1 (de) * | 2008-09-15 | 2010-03-25 | Continental Automotive Gmbh | Verfahren zum Freischalten von Funktionen eines Tachographen |
US9118667B2 (en) | 2011-06-03 | 2015-08-25 | Blackberry Limited | System and method for accessing private networks |
DE102014209191A1 (de) * | 2014-05-15 | 2015-12-03 | Continental Automotive Gmbh | System und Verfahren zum Herunterladen von auf einem Tachografen gespeicherten Daten |
DE102022205652B4 (de) | 2022-06-02 | 2024-04-25 | Siemens Aktiengesellschaft | Drahtlose Bereitstellung von Informationen aus Schalter-Funktionstests |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0996105A1 (de) | 1998-09-29 | 2000-04-26 | Gantner Electronic GmbH | System zur Überwachung, Steuerung, Verfolgung und Handling von Objekten |
WO2000036812A1 (en) | 1998-12-17 | 2000-06-22 | Portus Pty Limited | Local and remote monitoring using a standard web browser |
US20020004387A1 (en) | 2000-04-25 | 2002-01-10 | Newville Todd A. | Information portal |
EP1585257A2 (de) | 2004-03-19 | 2005-10-12 | Iskraemeco, Merjenje in Upravljanje Energije, D.D. | Verfahren zum Auslesen, Kontrollieren und Fernüberwachen von intelligenten Verbrauchsmessgeräten |
WO2006004231A1 (en) | 2004-06-30 | 2006-01-12 | Nuri Telecom Co., Ltd. | Remote meter-reading system and method using duplicated data transmission of packet data transmission and circuit data transmission |
US7034683B2 (en) | 2000-11-06 | 2006-04-25 | Loran Technologies, Inc. | Electronic vehicle product and personnel monitoring |
EP1655921A1 (de) | 2004-09-30 | 2006-05-10 | Samsung Electronics Co., Ltd. | Vorrichtung und Verfahren zur Authentifizierung eines Benutzers auf Zugangsrechte auf ein Netzwerk in einem Kommunikationssystem |
US20060155822A1 (en) | 2005-01-11 | 2006-07-13 | Industrial Technology Research Institute | System and method for wireless access to an application server |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI102499B (fi) * | 1997-03-10 | 1998-12-15 | Nokia Telecommunications Oy | Kopioitujen SIM-korttien etsintä |
ES2285812T3 (es) * | 1998-11-10 | 2007-11-16 | Aladdin Knowledge Systems Ltd. | Metodo de interaccion usuario-ordenador para ser usado por sistemas de ordenador conectables de forma flexible. |
US6735324B1 (en) * | 2000-07-31 | 2004-05-11 | Digimarc Corporation | Digital watermarks and trading cards |
WO2004006165A1 (en) * | 2002-07-09 | 2004-01-15 | Bnc Ip Switzerland Gmbh | System and method for providing secure identification solutions |
US20050174236A1 (en) * | 2004-01-29 | 2005-08-11 | Brookner George M. | RFID device tracking and information gathering |
US8341289B2 (en) * | 2005-05-17 | 2012-12-25 | Rajant Corporation | System and method for communication in a wireless mobile ad-hoc network |
-
2006
- 2006-12-01 AT AT0200106A patent/AT504581B1/de not_active IP Right Cessation
-
2007
- 2007-05-23 AT AT0081807A patent/AT505078B9/de not_active IP Right Cessation
- 2007-11-23 WO PCT/EP2007/010161 patent/WO2008064821A2/de active Application Filing
- 2007-11-23 BR BRPI0718934-6A2A patent/BRPI0718934A2/pt not_active IP Right Cessation
- 2007-11-23 US US12/517,162 patent/US20100075633A1/en not_active Abandoned
- 2007-11-23 EP EP07846762A patent/EP2100428A2/de not_active Withdrawn
- 2007-11-23 RU RU2009125000/08A patent/RU2454819C2/ru not_active IP Right Cessation
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0996105A1 (de) | 1998-09-29 | 2000-04-26 | Gantner Electronic GmbH | System zur Überwachung, Steuerung, Verfolgung und Handling von Objekten |
WO2000036812A1 (en) | 1998-12-17 | 2000-06-22 | Portus Pty Limited | Local and remote monitoring using a standard web browser |
US20020004387A1 (en) | 2000-04-25 | 2002-01-10 | Newville Todd A. | Information portal |
US7034683B2 (en) | 2000-11-06 | 2006-04-25 | Loran Technologies, Inc. | Electronic vehicle product and personnel monitoring |
EP1585257A2 (de) | 2004-03-19 | 2005-10-12 | Iskraemeco, Merjenje in Upravljanje Energije, D.D. | Verfahren zum Auslesen, Kontrollieren und Fernüberwachen von intelligenten Verbrauchsmessgeräten |
WO2006004231A1 (en) | 2004-06-30 | 2006-01-12 | Nuri Telecom Co., Ltd. | Remote meter-reading system and method using duplicated data transmission of packet data transmission and circuit data transmission |
EP1655921A1 (de) | 2004-09-30 | 2006-05-10 | Samsung Electronics Co., Ltd. | Vorrichtung und Verfahren zur Authentifizierung eines Benutzers auf Zugangsrechte auf ein Netzwerk in einem Kommunikationssystem |
US20060155822A1 (en) | 2005-01-11 | 2006-07-13 | Industrial Technology Research Institute | System and method for wireless access to an application server |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2157551A3 (de) * | 2008-08-21 | 2013-02-27 | NORDSYS GmbH | Tachographen-Auslesevorrichtung |
EP2189921A3 (de) * | 2008-11-21 | 2010-06-23 | ads-tec GmbH | Diagnosegerät zur Verbindung mit einem Kraftfahrzeug |
Also Published As
Publication number | Publication date |
---|---|
RU2454819C2 (ru) | 2012-06-27 |
AT505078B9 (de) | 2009-08-15 |
AT505078A1 (de) | 2008-10-15 |
AT504581A1 (de) | 2008-06-15 |
AT504581B1 (de) | 2009-03-15 |
RU2009125000A (ru) | 2011-01-10 |
BRPI0718934A2 (pt) | 2014-02-04 |
EP2100428A2 (de) | 2009-09-16 |
AT505078B1 (de) | 2009-06-15 |
US20100075633A1 (en) | 2010-03-25 |
WO2008064821A3 (de) | 2008-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AT505078B9 (de) | Verfahren und system zum auslesen von daten aus einem speicher eines fernen geräts durch einen server | |
EP2338255B1 (de) | Verfahren, computerprogrammprodukt und system zur authentifizierung eines benutzers eines telekommunikationsnetzwerkes | |
DE102008042262B4 (de) | Verfahren zur Speicherung von Daten, Computerprogrammprodukt, ID-Token und Computersystem | |
EP2415228B1 (de) | Verfahren zum lesen von attributen aus einem id-token über eine mobilfunkverbindung | |
EP1379935B1 (de) | Verfahren zur authentifizierung eines anwenders bei einem zugang zu einem softwarebasierten system über ein zugangsmedium | |
WO2006027171A1 (de) | Elektronisches ticket | |
WO2010145979A1 (de) | Verfahren zum einbuchen eines mobilfunkgeräts in ein mobilfunknetz | |
DE102009027686A1 (de) | Verfahren zum Lesen von Attributen aus einem ID-Token | |
EP3649625B1 (de) | Verfahren zur delegation von zugriffsrechten | |
EP2567345A2 (de) | Verfahren zum lesen eines rfid-tokens, rfid-karte und elektronisches gerät | |
WO2008046575A1 (de) | Verfahren zum ausführen einer applikation mit hilfe eines tragbaren datenträgers | |
WO2011088970A1 (de) | Verfahren zum durchführen einer transaktion zwischen einem tragbaren datenträger und einem terminal | |
EP2548358B1 (de) | Verfahren zur dynamischen autorisierung eines mobilen kommunikationsgerätes | |
EP1075161B1 (de) | Verfahren und Vorrichtungen zur Zugangskontrolle eines Benutzers eines Benutzerrechners zu einem Zugangsrechner | |
DE10300515A1 (de) | Verfahren und Vorrichtung zum Bezahlen in Netzen bei einmaliger Anmeldung | |
DE102008042582A1 (de) | Telekommunikationsverfahren, Computerprogrammprodukt und Computersystem | |
EP2199944A2 (de) | Verfahren zur Authentifizierung einer Person gegenüber einer elektronischen Datenverarbeitungsanlage mittels eines elektronischen Schlüssels | |
EP1519603A1 (de) | Verfahren zur Authentisierung eines Teilnehmers für einen über ein Kommunikationssystem angebotenen Dienst | |
DE60021654T2 (de) | System und Verfahren zum Bereitstellen von Diensten mit vertrautem Ortindikator, und fahrbares Gerät zur Anzeige von ihnen | |
DE202004016344U1 (de) | Elektronisches Ticket | |
DE102015209073B4 (de) | Verfahren zum Lesen von Attributen aus einem ID-Token | |
EP4072180A1 (de) | Verfahren zur autorisierung eines ladevorgangs an einem ladepunkt | |
DE102014209191A1 (de) | System und Verfahren zum Herunterladen von auf einem Tachografen gespeicherten Daten | |
DE102022001848B3 (de) | Verfahren zum nutzerbezogenen Einrichten eines Endgerätes | |
EP3435697B1 (de) | Verfahren zur authentisierung eines nutzers gegenüber einem diensteanbieter und authentisierungseinrichtung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 12517162 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 3618/DELNP/2009 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007846762 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2009125000 Country of ref document: RU Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: PI0718934 Country of ref document: BR Kind code of ref document: A2 Effective date: 20090601 |