WO2013064137A1 - Verfahren zur eingabe einer persönlichen identifikationsnummer und technisches hilfsmittel dafür - Google Patents
Verfahren zur eingabe einer persönlichen identifikationsnummer und technisches hilfsmittel dafür Download PDFInfo
- Publication number
- WO2013064137A1 WO2013064137A1 PCT/DE2012/001045 DE2012001045W WO2013064137A1 WO 2013064137 A1 WO2013064137 A1 WO 2013064137A1 DE 2012001045 W DE2012001045 W DE 2012001045W WO 2013064137 A1 WO2013064137 A1 WO 2013064137A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pin
- technical
- input field
- input
- stored
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1033—Details of the PIN pad
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/0202—Constructional details or processes of manufacture of the input device
- G06F3/0219—Special purpose keyboards
Definitions
- the invention relates to a method for entering a personal identification number and a technical tool for it.
- the term "phishing” refers to the attempt to obtain sensitive, confidential or secret information such as user names (usernames), passwords or credit card details, in particular the personal identification number (PIN for short)
- PIN personal identification number
- An unauthorized user masquerades, usually with criminal intent, and pretends to be a trusted identity in an electronic communications environment (computer-aided network or customer service systems).
- PED Personal Electronic Data Entry Device
- thermal imaging cameras are better suited for phishing attacks than conventional optical cameras, as conventional ones can only observe the PIN input at the same time as the actual input.
- thermal imaging cameras enable a later, time-shifted mapping of the code input. For example, if a user blocks their view of the input field with their body or hand, it is hardly possible for the fraudster to observe the PIN entry at the same time.
- this limitation can easily be circumvented by the use of thermal imaging cameras.
- the thermal fingerprint left by the PIN input on the PED could still be seen in the image 10 minutes after actual input by a thermal imaging camera (see Figure 1). So the body heat of the user is sufficient to heat the buttons used in the input field so that they are clearly distinguishable from unused buttons in the thermal image. As a result, after the legitimate user has long since left the machine area, a fraudster can visualize the code entered using a thermal imager.
- the code (Temperature assignment in false color display, etc.) can be obtained automatically in the actually entered order from the raw data of a selected image of the thermal imager.
- algorithms have been developed that reliably determine the searched code (PIN) completely automatically from the existing thermal image footage (single post-hoc frame analysis, etc.). This obviously demonstrates that thermal imaging can be routinely used and shows great economic potential for fraudsters.
- Anti-skimming modules can be attached to the card slot of the machines
- biometrics Another variation on phishing is based on biometrics (biometry).
- biometric measurements or analyzes of biological data are performed to identify stable physical characteristics that can clearly identify a specific person.
- fingerprints, retinal scans, geometry of the hands or even facial features and facial features are used as unique, individual patterns.
- biometrics could be used to identify and verify the legitimate cardholder and PIN intruder.
- the prior art has the following disadvantages in particular. All the methods and devices described are unsuitable for practical use because they do not protect against simultaneous observation and time-delayed observation by fraudsters. Even rudimentary technical knowledge enables fraudsters to copy service cards and spy on their personal identification number in order to be unlawful services of service companies, in particular at vending machines worldwide Cash transactions and cash withdrawals at ATMs. Accordingly, the prior art is no reliable protection against phishing attacks.
- the object underlying the present invention is to propose a method and a technical tool, the spying of personal
- the present invention is a method for entering a personal identification number, PIN, by using the usually locally fixed input field of a machine, in which the simultaneous and time-skewed observation of the actual PIN entry is prevented.
- this is done by using a portable technical device for the actual entry of the PIN, in which the required PIN is preset spatially and temporally separately from the actual PIN entry and stored in the technical aid.
- Auxiliary means are actually transferred to the input field.
- the PIN stored in the technical tool can be deleted.
- the mobile technical device is preferably a cordless and portable or handheld device.
- Personal identification number For the purposes of the present invention, the term "personal identification number; Abbreviation: PIN "the necessary information - usually in the form of a set of numbers in the correct order but also letter or (special) character series and also the combination of numbers, letters and (special) character series, bar codes on displays or the like - those of a user - usually a customer of a service company or even an employee of a company who must authorize to perform a technical function of the company
- Company - must be entered into a machine in order to be able to carry out personal activities - usually service or other technical functions - through the relevant machine.
- personal activities usually service or other technical functions - through the relevant machine.
- transfer of money transfer of money (transactions, transfers) and the issuing of cash - in customary or bank-automatic machines - must be mentioned here.
- APPs and barcodes are included on displays or the like.
- Vending machine or vending machine For the purposes of the present invention, the term “vending machine” or “vending machine” encompasses all technical devices or devices which have an input field into which the PIN must be entered. In addition to all machines known to those skilled in the art, money transfer machines and ATMs, also referred to as ATMs (Automated Teller Machines), are to be named here in the sense of the present invention, which permit the issuing of cash.
- ATMs Automatic Teller Machines
- Input Field PIN Entry Device, PED for short:
- the term "input field” encompasses all keyboards, control panels or other input instruments which enable input of the personal identification number, PIN, in machines in the sense of the present invention, in particular the input fields to money transfer machines and ATMs, also called ATMs (Automated Teller Machines), to call, which require a manual input of the PIN .
- Here are also display-based PIN transmissions by barcodes (on or two-dimensional) and near field communication (NFC) or the like.
- Coupling or coupling In the context of the present invention, the term coupling encompasses all possibilities known to the person skilled in the art for the transmission of the data in the
- inventive technical aids stored PIN on the input field are mentioned.
- the transmission by barcodes (one or two-dimensional) and the near field communication (NFC: near field comunication) or the like may be mentioned.
- NFC near field comunication
- simultaneous observation direct or indirect (through mirror systems, etc.), simultaneous observation or spying on the PIN input by a second person who is present locally - also called a natural observer here.
- simultaneous observation also spying on the PIN entry through the use of technical aids such as cameras or others
- Imaging procedures that record and / or transmit the PIN entry process - here called a technical observer.
- Deferred observation means an observation that occurs later in time than the simultaneous observation, ie the direct or indirect, delayed (hence later) observation or spying of the PIN entry by a technical observer as soon as the user has completed the PIN entry and, if necessary, has already left the area of the machine.
- Technical aids that are routinely used for "time-delayed observation” include Thermal imaging cameras that can image and record the thermal imprint of the fingers on the input panel after users manually enter their PINs. This makes it possible to spy on the PIN in a technically feasible manner, even if the user is no longer present - ie a time-delayed observation by a technical observer.
- thermal sensors are moisture-sensitive process or
- Another object of the present invention is thus a technical tool for entering a personal identification number, PIN, by using the usually locally fixed input field of a machine, in which the simultaneous and time-delayed observation of the actual PIN input is prevented.
- the fiction, contemporary technical aids should preferably be portable and / or durable in the hand, whereby the required PIN can be entered and stored spatially and temporally separated from the actual PIN input through the input field in the technical tool.
- the technical aid according to the invention is preferably additionally characterized in that it can be applied to the input field, covers the functional fields of the input field and can be removed again after use from the input field.
- the technical aid according to the invention indicates that this or its actuators leaves no thermal traces during the transmission of the PIN, so that time-delayed observation of the PIN input, for example by thermal imaging devices, is prevented. This can be done by thermal insulation but also by per se suitable material and design, in particular the actuators.
- the initiation of the PIN transmission to the technical aids according to the invention takes place at the back with the help of a single
- the PIN stored in the technical aid according to the invention is electronically controlled in the correct order after being triggered back on the input field.
- EAP electroactive polymers
- An embodiment of the technical aid according to the invention is also characterized in that after the actual entry of the PIN via the input field, the PIN data stored in the technical aid is deleted.
- the PIN data stored in the technical aid after a predetermined time without triggering the technical aid, i. without actual PIN entry, deleted.
- the technical aid according to the invention has the shape of a cuboid.
- the technical aid according to the invention in the form of a cuboid with or without rounded edges, with a width (B) between 80 mm and 86 mm, and a length (L) between 95 mm and 109 mm, the height (H) can assume all values between 0.5 mm and 20 mm.
- the technical aid according to the invention is in the form of a cuboid with or without rounded edges, with a width (B) of approximately 83 mm and a length (L) of approximately 102 mm, the height (H) can thereby assume all values from 1 mm to 10 mm.
- an embodiment of the technical auxiliary means according to the invention that this assumes the shape of a cuboid and the length is preferably foldable in the middle.
- a further embodiment of the technical aid according to the invention is characterized in that it has a display for the representation of information, such as advertising information.
- Company - must be entered into a machine in order to be able to carry out personal activities - usually service or other technical functions - through the relevant machine.
- personal activities usually service or other technical functions - through the relevant machine.
- transfer of money transfer of money (transactions, transfers) and the issuing of cash - in customary or bank-automatic machines - must be mentioned here.
- Vending machine or vending machine For the purposes of the present invention, the term “vending machine” or “vending machine” encompasses all technical devices or devices which have an input field into which the PIN must be entered. In addition to all machines known to those skilled in the art, money transfer machines and ATMs, also referred to as ATMs (Automated Teller Machines), are to be named here in the sense of the present invention, which permit the issuing of cash.
- ATMs Automatic Teller Machines
- Input Field PIN Entry Device, PED for short:
- the term "input field” encompasses all keyboards, control panels or other input instruments which enable input of the personal identification number, PIN, in machines in the sense of the present invention, in particular the input fields to money transfer machines and ATMs, also called ATMs (Automated Teller Machines), to call that require manual entry of the PIN.
- Imaging procedures that record and / or transmit the PIN entry process - here called a technical observer.
- the term “deferred observation” means an observation that occurs later than the simultaneous observation, ie the direct or indirect, delayed (hence later) observation or spying of the PIN entry by a technical observer as soon as the user has completed the PIN entry
- Technical aids that are routinely used for "time-delayed observation” include thermal imaging cameras that monitor the thermal imprint of the fingers on the input field after the manual PIN entry of the machine Map users and record. This makes it possible to spy on the PIN in a technically feasible manner, even if the user is no longer present - ie a time-delayed observation by a technical observer.
- thermal imaging cameras that monitor the thermal imprint of the fingers on the input field after the manual PIN entry of the machine Map users and record. This makes it possible to spy on the PIN in a technically feasible manner, even if the user is no longer present - ie a time-delayed observation by a technical observer.
- Example 1 In one embodiment of the inventive technical aid for entering a PIN, this has a front and a back control surface. On the back is the mirrored input field for temporally and spatially separated PIN entry in the technical aid according to the invention. On the front side is the user interface for the actual input of the PIN by the user, thus preventing a simultaneous and time-delayed observation. The user can enter a PIN over the user interface on the front side separated from the time and space
- the PIN is stored at least until the first transfer to a ⁇ input field in a memory of the technical aid.
- the technical tool can be designed to delete it from the memory after the first transmission of the PIN.
- a portable technical tool for example, according to Example 1 is used to enter a personal identification number, PIN, to prevent the simultaneous and time-delayed observation of the actual PIN entry.
- PIN personal identification number
- a. The required PIN is entered and stored spatially and temporally separated from the actual PIN entry in the technical tool. This can happen anywhere where the customer (user) does not suspect a natural observer (fraudster) or even a technical observer, for example, at home.
- the customer (user) enters the desired service area with the machine or the like, which has a PIN-protected functionality and sets the technical tool to the input field, PED.
- PED personal identification number
- the customer (user) triggers the technical aid, so that the PIN is actually transferred to the input field.
- the customer (user) confirms the PIN entry on the provided
- Input field of the PED if available.
- the stored in the technical tool PIN is deleted, or optionally retained for the renewed PIN transmission.
- the customer (user) can then take advantage of the desired service on the machine and finally removes his portable technical tool from the PED of the machine, if he did not do so already after the actual PIN transfer.
- Figure 1 is a heat camera image of a PIN input field immediately after
- Figure 2 is a schematic representation of a conventional PIN input field
- Figure 3 is a plan view of the underside of an embodiment of the
- Figure 4 is a plan view of the top of an embodiment of the
- FIG. 6 shows a collapsible technical aid according to the invention
- FIG. 1 shows an image taken by a thermal imaging camera (from a series of further images of the recorded image material), with the ten regions of interest marked by the colored boxes and the temperature associated with the misrepresentation on the right , This image was taken a few minutes after the PIN was entered (when typing, the input field was hidden by the other hand). It can be clearly seen that the four keys used can be assigned to the numbers 1, 4, 5 and 8 (standard keyboard for ATMs). In addition, it can also be seen that the numbers 1 and 4 were entered before the numbers 5 and 8 (the correct code was actually 1485).
- FIG. 2 shows a conventional input field (PIN Entry Device, PED) in a schematic
- Input fields usually correspond to an international standard.
- the number input field is arranged in an area of width (B) equal to about 70 mm and the length (L) of about 95 mm.
- FIG. 3 shows an example of a mirrored input field in accordance with an embodiment of the present invention (downside).
- the mirrored input field has a mutually the same arrangement of the individual function fields of the number input field of the PED (here a PED as sketched in Figure 2), which, however, are arranged in mirrored symmetry (area symmetry).
- d. H The input field on the machine behaves in the same way as the right and left hands of a human.
- the number keys for 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9 are found - but in a mirrored arrangement - again.
- All numerical keys (stamp keys, stamp in FIG. 3) in the mirrored input field according to the invention are suitable both for entering the PIN into the technical aid according to the invention and for transmitting the PIN into the PED on the machine. This is done in the particular embodiment described here by mechanical power transmission by means of electronically controlled actuators (stamping keys, stamp in Fig. 3).
- ten knob-shaped spacers spacer in FIG. 3 ensure the proper fixing of the mirrored input field on the PED of the automaton, so that the motive force can also be transmitted to the PED without interference.
- space for a power supply battery in Fig. 3
- a function field key; acknowledgment key in Fig. 3 for confirming the entered PIN have been considered. All functions are electronically controlled (IC control).
- the front side of a technical aid according to the invention is outlined by way of example (upside). In a particular embodiment, this consists of two equal areas, which are connected to each other via kinkable joints.
- the exemplary user interface When unfolded, the exemplary user interface describes an area of width (B) of approximately equal to 83 mm and length (L) of approximately equal to 102 mm.
- width (B) of approximately equal to 83 mm
- L length of approximately equal to 102 mm.
- the size of a technical aid according to the invention corresponds approximately to the size of two merged credit cards (comparisons FIG. 5).
- the area corresponds to about two merged credit cards (see also Fig. 5).
- the area still has enough space for information such as. B. also advertising.
- Fig. 5 shows a schematic representation of two credit cards placed next to each other, each of which follows an international standard in size and dimension.
- the technical aid according to the invention assumes similar dimensions - that is, B approximately 83 mm and L approximately 102 mm.
- the front in this particular embodiment of the invention has only a single function key (START).
- This START key is used to start the actual transfer of the PIN to the PED, thus preventing the simultaneous and time-delayed observation of the actual PIN entry.
- this can be folded up before and after use, as shown schematically in FIG is shown (folded). It can be easily transported and fits into any standard wallet (purse) like a debit or credit card.
- Fig. 6 shows a schematic representation of a technical according to the invention
- the inventive technical aid is made of plastic, similar to the material used to make credit cards. It has a back and a front as in Example 1. All electronic (input, store, control, IC control, etc.) and electromechanical functions (controlling the actuators) are powered by a central miniature battery.
- the technical aid according to the invention is opened up spatially and temporally separately from the actual PIN input. It is programmed so that after opening the mirrored input field is automatically ready for operation. Now you can enter the PIN on the back (according to example 1) by using the mirrored input field. In the correct order, the PIN is entered via the mirrored input field into the technical aid according to the invention by pressing the keys 0 to 9 (stamp in FIG. 3), unobserved by possible fraudsters or technical observers. By pressing the confirmation key (Achnowledgement key in Fig. 3), the entered PIN is stored. The technical aid according to the invention can now be folded up again.
- the customer enters the desired service area with the machine. After reopening, the customer places the technical device with the back side (ie with the mirrored input field according to example 1) to the PED in the machine.
- the technical device with the back side ie with the mirrored input field according to example 1
- inventive technical aids is programmed so that the customer (user) by pressing the START button on the front of the unfolded technical aid (according to Example 1) causes the actual input of the PIN in the PED.
- the programming of the technical aid according to the invention ensures that the previously stored PIN is automatically transmitted to the PED by the correct control of the actuators in the mirrored input field.
- the size and dimension of the technical aid according to the invention is in the form that the input field of the PED required for entering the PIN is completely covered. Thus, a simultaneous observation is prevented (see Figures 2 and 4, according to Example 1).
- the customer then confirms the actual PIN entry by pressing the ENTER key on the PED of the machine (see Fig. 2) and can now enter the
- the inventive technical aid is folded again (see Fig. 6), stowed by the customer (user) and taken away.
- the user-programmable memory in the technical aid according to the invention - after a single use - emptied, i. the PIN is deleted after the actual transmission.
- the desired PIN must be entered again (activated).
- the PIN is also deleted as soon as the customer has not properly used his activated technical tool for a reasonable period of time - the customer, for example, the use, i. the actual PIN entry, has failed or technical tool according to the invention has been lost.
- the size and dimension of the technical aid according to the invention prevents simultaneous observation by fraudsters.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE112012004610.2T DE112012004610A5 (de) | 2011-11-03 | 2012-10-26 | Verfahren zur Eingabe einer persönlichen Identifikationsnummer und technisches Hilfsmittel dafür |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102011117513.3 | 2011-11-03 | ||
DE102011117513 | 2011-11-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013064137A1 true WO2013064137A1 (de) | 2013-05-10 |
Family
ID=47351336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/DE2012/001045 WO2013064137A1 (de) | 2011-11-03 | 2012-10-26 | Verfahren zur eingabe einer persönlichen identifikationsnummer und technisches hilfsmittel dafür |
Country Status (2)
Country | Link |
---|---|
DE (1) | DE112012004610A5 (de) |
WO (1) | WO2013064137A1 (de) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9519296B1 (en) | 2015-08-26 | 2016-12-13 | International Business Machines Corporation | Randomized input device heating |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009090102A2 (de) * | 2008-01-18 | 2009-07-23 | Wolfgang Mastnak | Mobiles eingabegerät zur eingabe von pin-nummern an transaktionsautomaten |
-
2012
- 2012-10-26 WO PCT/DE2012/001045 patent/WO2013064137A1/de active Application Filing
- 2012-10-26 DE DE112012004610.2T patent/DE112012004610A5/de not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009090102A2 (de) * | 2008-01-18 | 2009-07-23 | Wolfgang Mastnak | Mobiles eingabegerät zur eingabe von pin-nummern an transaktionsautomaten |
Non-Patent Citations (6)
Title |
---|
ANDERSON, R.: "Why cryptosystemsfail", PROCEEDINGS OF CCS 1993, 1993, pages 215 - 227 |
JOACHIM JAHN, SKIMMING - DATENDIEBSTAHL AN GELDAUTOMATEN STEIGT, 10 May 2011 (2011-05-10), Retrieved from the Internet <URL:http://www.faz.net/-01ty15> |
KREBS, B., ATMSKIMMERS: HACKING THE CASH MACHINE, 2011, Retrieved from the Internet <URL:http://krebsonsecurity.com/tag/atm-skimmer> |
RUSSELL, D., ATM CRIME, ATMFRAUD OVERVIEW, Retrieved from the Internet <URL:http://ezinearticles.com/?ATM-Crime.-ATM-Fraud-Overview> |
SAAR DRIMER; STEVEN J MURDOCH; ROSS ANDERSON, PIN ENTRY DEVICE (PED) VULNERABILITIES, Retrieved from the Internet <URL:http://www.cl.cam.ac.uk/research/security/banking/ped> |
ZALEWSKI, M., CRACKING SAFES WITH THERMAL IMAGING, 2005, Retrieved from the Internet <URL:http://lcamtuf.coredump.cx/tsafe> |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9519296B1 (en) | 2015-08-26 | 2016-12-13 | International Business Machines Corporation | Randomized input device heating |
US9881180B2 (en) | 2015-08-26 | 2018-01-30 | International Business Machines Corporation | Randomized input device heating |
US10043034B2 (en) | 2015-08-26 | 2018-08-07 | International Business Machines Corporation | Randomized input device heating |
US10282560B2 (en) | 2015-08-26 | 2019-05-07 | International Business Machines Corporation | Randomized input device heating |
US11010491B2 (en) | 2015-08-26 | 2021-05-18 | International Business Machines Corporation | Randomized input device heating |
Also Published As
Publication number | Publication date |
---|---|
DE112012004610A5 (de) | 2014-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2081135B1 (de) | Kontaktloser Datenträger | |
DE69938500T2 (de) | Authentifizierungskartensystem mit einer entfernten zertifizierungsinstanz | |
DE602004003478T2 (de) | Virtuelle tastatur | |
DE10249801B3 (de) | Verfahren zum Ausführen einer gesicherten elektronischen Transaktion unter Verwendung eines tragbaren Datenträgers | |
EP2949094A1 (de) | Verfahren zur authentisierung eines nutzers gegenüber einem automat | |
DE102005050395A1 (de) | Identifikationskarte mit Biosensor und Benutzerauthentifizierungsverfahren | |
DE19860177C2 (de) | Verfahren und Vorrichtung zur benutzerkontrollierten Freischaltung von Chipkartenfunktionen | |
DE10224209A1 (de) | Autorisierungseinrichtung-Sicherheitsmodul -Terminal-System | |
WO2013056783A1 (de) | Mobiles endgerät, transaktionsterminal und verfahren zur durchführung einer transaktion an einem transaktionsterminal mittels eines mobilen endgeräts | |
DE102011076004A1 (de) | Vorrichtung zur Zugangskontrolle, Zugangskontrollsystem und Verfahren zur Zugangskontrolle | |
WO2006015573A1 (de) | Datenträger zur kontaktlosen übertragung von verschlüsselten datensignalen | |
DE102013221768A1 (de) | Dokument mit einer kontaktlosen Chipkartenschnittstelle und elektronisches System | |
DE102006037879A1 (de) | Lesegerät für ein Dokument, Verfahren zum Lesen eines Datenobjekts und Computerprogrammprodukt | |
EP1686541A2 (de) | Identifizierungssystem | |
EP3252642B1 (de) | Lesegerät für eine chipkarte und computersystem | |
DE19822206A1 (de) | Vorrichtung zur Erkennung von Lebewesen oder Gegenständen | |
WO2013064137A1 (de) | Verfahren zur eingabe einer persönlichen identifikationsnummer und technisches hilfsmittel dafür | |
DE102012002619B3 (de) | Universalkarte zur Vereinfachung des Gebrauchs einer Vielzahl von Karten | |
WO2010040162A1 (de) | Identifikationsmerkmal | |
WO2017036455A2 (de) | Vorrichtung und verfahren zum authentifizieren und autorisieren von personen | |
Ezovski et al. | The electronic passport and the future of government-issued RFID-based identification | |
DE102005056862A1 (de) | Mobile Chipkarteneinrichtung und Verfahren zur Authentifizierung mittels Chipkarte gegenüber mindestens einer Einrichtung | |
DE102010054061B4 (de) | Tragbares System aus Datenträger und Eingabemittelträger, Verwendung und Verfahren des Systems | |
EP2544155A1 (de) | Personenidentifizierung | |
EP3465511B1 (de) | Biometrisch basiertes auslösen einer nutzaktion mittels eines id-tokens |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12799056 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1120120046102 Country of ref document: DE Ref document number: 112012004610 Country of ref document: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: FESTSTELLUNG EINES RECHTSVERLUSTS NACH REGEL 112(1) EPUE (EPA FORM 1205A VOM 21/08/2014) |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: R225 Ref document number: 112012004610 Country of ref document: DE Effective date: 20141106 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12799056 Country of ref document: EP Kind code of ref document: A1 |