摘要:
The present invention relates to a method and system for authenticating a user towards an application server, the user having a first client device being connected to the application server, wherein a second client device is used for authentication purposes of the user towards the application server, wherein the second client device is connected to an authentication server and comprises a secure element being able to communicate with the authentication server, wherein the method comprises the steps of: -- in a first step, the application server transmits a first authentication request information to the authentication server, the authentication request information comprising an identification information assigned to the secure element, -- in a second step, subsequent to the first step, the authentication server transmits a second authentication request information to the secure element, -- in a third step, subsequent to the second step, a first authentication answer information is generated by the secure element and transmitted to the authentication server, -- in a fourth step, subsequent to the third step, a second authentication answer information is transmitted by the authentication server to the application server, thereby authenticating the user.
摘要:
In a method for verifying an input password, a password verifying device coupled between a electronic device and an input device is configured to: in response to a password input request (601) from the electronic device, generating image data associated with a virtual keyboard and transmitting the image data to the electronic device; in response to password data from the electronic device, composing (604) an input password according to the password data; and in response to a password confirm request from the input device (4), comparing (606) the input password and a preset password stored therein.
摘要:
There is provided a method of programming a smart card, said smart card comprising a secure element and a microcontroller unit which is connected to said secure element, the method comprising: (a) the secure element receives a firmware image from a host device; (b) the secure element validates the firmware image; (c) the secure element forwards the firmware image to the microcontroller unit if the firmware image is valid; (d) the microcontroller unit receives the firmware image from the secure element; (e) the microcontroller unit extracts firmware from the firmware image; and (f) the microcontroller unit installs the firmware in a memory unit of said smart card. Furthermore, a corresponding computer program product and a corresponding programmable smart card are disclosed.
摘要:
[Problem to be Solved] Authentication of a manipulator performing a manipulation of various important manipulation sections is performed effectively without increasing cost and the authentication can be performed via a mobile information terminal depending on an object to be manipulated. [Solving means] A manipulator authentication operating system that confirms authentication of a manipulator of a manipulation section and performs a manipulation in cooperation with the manipulation section by a mobile information terminal possessed by the manipulator, wherein the mobile information terminal has "authentication information holding means" for holding unique authentication information and "a communication section" that can transmit the authentication information to the manipulation section and can perform information communication relating to an operation and a manipulation between the communication section and the manipulation section, and the manipulation section has "authentication information decoding means" that decodes authentication information transmitted by the "authentication information holding means" of the mobile information terminal via the "communication section" and, when the decoded authentication information is consistent with collation information held in advance, transmits a signal indicating the consistency to the mobile information terminal; and a manipulation of an object to be manipulated can be manipulated in cooperation with the manipulation section by the mobile information terminal when the "authentication information decoding means" has transmitted a signal indicating that the unique authentication information transmitted from the mobile information terminal is consistent with the collation information to the mobile information terminal.
摘要:
The present invention relates to a computer system comprising: - multiple sets (S1, S2, Si,...,SI-1, SI) of client computers (Ci1, Ci2,...,Cij,...CiJ), each client computer having installed thereon an application program (104), the application program comprising client computer specific log-in information (Lij), - a database system (112) being coupled to the set of client computers via a network (114), the database system having a log-in component (118) for logging-in the client computers, the database system being partitioned into multiple relational databases (DB1, DB2,...DBi,...DBI), each one of the databases being assigned to one set of the sets of client computers, each database storing encrypted data items, each data item being encrypted with one of the user or user-group specific cryptographic keys, the key identifier of the cryptographic key with which one of the data items is encrypted being stored in the database as an attribute of the one of the encrypted data items, the log-in component comprising assignment information (118) indicative of the assignment of the databases to the set of client computers.
摘要翻译:本发明涉及一种计算机系统,包括: - 多组(S1,S2,硅,...,SI-1,SI)的客户端计算机的(α1,CI2,...,C IJ,... CIJ) 具有安装在每个客户端计算机在其上,所述应用程序包括客户计算机专用的登录信息(LIJ)应用程序(104) - 在数据库系统(112),经由网络被耦合到该组的客户端计算机(114) 具有用于登录部件(118)的数据库系统测井在客户端计算机,数据库系统被划分成多个关系数据库(DB1,DB2,... DB I ... DBI),数据库中的每一个 被分配给一组集的客户端计算机中的,每一个数据库存储加密的数据项,每个数据项与所述用户或用户组特定的密码密钥中的一个,所述加密密钥的密钥标识符加密的数据的哪一个 项被加密被存储在作为属性所述一个加密的数据项时,日志的数据库 -in组分,其包含分配信息(118)指示所述数据库到设定客户端计算机的分配的。
摘要:
There are provided a method and system for authenticating a stamp touch. The method of authenticating a stamp touch according to the invention is executed in a wireless terminal having a capacitive touch screen which supports a multi-touch, the method including, a first operation in which N touch points touching a touch stamp having N (N≧5) touch units made of a conductive material on the capacitive touch screen are recognized, a second operation in which a touch authentication condition set for authenticating a touch using the touch stamp is used to check an authentication result of a geometrical position relation of the N touch points, and a third operation in which a designated service linked with the touch stamp starts when the N touch points are authenticated.
摘要:
The invention relates to a method for initialising database means of a service computer system, said system having means (154, 156) for providing a service for which authentication is required, and having authentication means (184) and means (152) for creating a network link to a user computer system (194) via a network (116), said means being designed to transmit an identification and an OTP from the user computer system to the service computer system. The database means (188) are designed to store a version of modifiable first data and unmodifiable second data using the identifier as an access key and the authentication means have means (168, 186) for the cryptographic derivation of an additional OTP with the aid of the version of the first and second data that is read out of the database means. The authentication means are designed to check that the OTP received via the network link corresponds to the additional OTP and to generate an authentication signal if this is the case, and to determine updated first data with the aid of a function (166, 186) and with the aid of the storage of the updated first data in the database means, if the OTP and the additional OTP correspond. The first data are read out of the security token (106) by an ID-provider computer system (136) in order to initialise the database means.
摘要:
Die Erfindung betrifft ein Elektronisches Transaktionsverfahren unter Verwendung eines ID-Tokens (106), der einem Nutzer (102) zugeordnet ist, wobei der ID-Token einen elektronischen Speicher (118) mit einem geschützten Speicherbereich (124) aufweist, in dem ein oder mehrere Attribute gespeichert sind, wobei ein Zugriff auf den geschützten Speicherbereich nur über einen Prozessor (128) des ID-Tokens möglich ist, und wobei der ID-Token eine Kommunikations-Schnittstelle (108) zur Kommunikation mit einem Lesegerät (196) eines Nutzer-Computersystems (100) aufweist.
摘要:
OBJECTIVE A user is prevented from inadvertently inputting authentication information to an unauthorized authentication system. In this manner, authentication information leakage is certainly avoided. SOLUTION A validity checking system includes an information processing card, an authentication system that performs mutual authentication with the information processing card, and a checking device. The information processing card includes a validity authenticating means that authenticates the validity of the authentication system, and an impersonation preventing means that carries out an impersonation preventing process on the result of the authentication performed by the validity authenticating means. The checking device includes a verifying means that verifies the authentication result subjected to the impersonation preventing process and is output from the information processing card, and a verification result output means that outputs the result of the verification performed by the verifying means to a user in a perceptible manner. The verifying means may not be provided in the checking device, and an independent verification device may be provided.