摘要:
The invention relates to a security element (1). The security element (1) has a viewing side and a back side that is opposite the latter. The security element comprises at least one luminous layer (2) that can emit light (20), and at least one mask layer (4) that, when the security element (1) is viewed from the viewing side, is arranged in front of the at least one luminous layer (2). The at least one mask layer (4) has at least one opaque region (5) and at least two transparent openings (41, 42). The at least two transparent openings (41, 42) has a substantially higher transmittance than the at least one opaque region (5) in respect of light (20) emitted by the at least one luminous layer (2), preferably a transmittance that is at least 20% higher, particularly preferably a transmittance that is at least 50% higher.
摘要:
A novel security feature for a valuable and/or security product is formed by a pattern that is formed on at least one carrier surface and has a color progression structure that is formed with a digital printing method from pattern elements arranged in a grid. The color progression structure is produced with at least two luminescence media that exhibit spectrally different luminescences. The valuable and/or security product according to the invention has one or more product carriers and at least one security feature that is arranged on or in the product carrier or carriers.
摘要:
The method relates to a method for generating a soft token, having the following: providing a secure element, wherein, in a protected storage area of the secure element, a secret key of a first asymmetric cryptographic key pair is stored, setting up a first cryptographically secured connection between an electronic device and a service computer system, transmitting a request for the generation of the soft token from the electronic device to the service computer system via the first connection, generating a one-time password on the basis of the reception of the request by the service computer system, registering the one-time password as an identifier of the first connection by the service computer system, transmitting the one-time password from the service computer system to the electronic device via the first connection, issuing the one-time password via a user interface of the electronic device, setting up a second cryptographically stored connection between a user computer system and the service computer system, entering the one-time password into the user computer system, transmitting the entered one-time password from the user computer system to the service computer system via the second connection, verifying, by means of the service computer system, whether the registered one-time password is in agreement with the one-time password received via the second connection, and only if this is the case, reading at least one attribute stored in an ID token, generating the soft token by signing the at least one attribute and the public key of the first cryptographic key pair, transmitting the soft token via the first connection to the electronic device and/or transmitting the soft token via the second connection to the user computer system.
摘要:
The invention relates to a method for generating a certificate for signing electronic documents by means of an ID token (106), having the following steps: —sending (201) a transaction request for a user to carry out a transaction, —as a result of the sending of the transaction request, a check is carried out as to whether the certificate (519) is available and if this is not the case, carrying out the following steps: generating (206) an asymmetrical key pair consisting of a private key and a public key using an ID token, said ID token (106) being assigned to the user; storing (207) the generated asymmetrical key pair on the ID token, wherein at least the private key is stored in a protected memory region of the ID token; transmitting (208; 509) the generated public key (518) to a first computer system, and generating (209) the certificate (519) by means of the first computer system for the public key.
摘要:
The disclosure relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, said method comprising: determining, by a terminal, of whether a contact-based interface of the ID token is present and can be used for data exchange with the terminal. If the ID token does not have the contact-based interface or this cannot be used, implementing a zero-knowledge authentication protocol via a contactless interface of the terminal and ID token; and deriving an ID token identifier by the terminal. If the ID token has the contact-based interface and this can be used, authenticating the user to the ID token via the contact-based interface; accessing to an ID token identifier by the terminal; sending of the ID token identifier from the terminal to an ID provider computer; use of the ID token identifier by the ID provider computer in order to authenticate the ID provider computer to the ID token; and read access of the ID provider computer to the at least one attribute stored in the ID token.
摘要:
A document having a non-volatile memory area for storing a secret identifier that has a first n-digit character sequence from a predefined character set; a random generator for selecting at least one character from the predefined character set for replacement of at least one character of the first character sequence, such that a second n-digit character sequence is defined as a result of this replacement; a volatile memory area for storing the at least one selected character; a display device for displaying the at least one selected character; an interface for inputting a third character sequence; and a processor element for authenticating the user to the document, wherein the processor element is configured to access the non-volatile memory area and the volatile memory area in order to read the second character sequence and check for a match between the second and third character sequences in order to authenticate the user.
摘要:
The invention relates to a mobile proximity coupling device (100) for inductive coupling with an integrated circuit of a proximity object, the integrated circuit comprising a coupling interface for inductive coupling, the mobile proximity coupling device (100) comprising a contactless interface (107) for inductive coupling with the coupling interface of the integrated circuit; a processor (109) for determining a quality indicator indicating a quality of the inductive coupling; and a display (111) for displaying a desired change of position of the mobile proximity coupling device relatively to the proximity object if the quality indicator indicates an insufficient quality of the inductive coupling.
摘要:
A card reader device is configured to carry out communication with a contactless readable card according to standard ISO/IEC 14443 type B. In order to provide that a modulation index, which self-adjusts in close range in a presence of a contactless readable card, corresponds to a desired specified modulation index, the magnetic field is received and evaluated via a reception antenna of the card reader device. The modulation index is controlled or regulated accordingly in case of deviations between a measured modulation index and a specified value for the modulation index in order to approximate the measured modulation index to the specified value.
摘要:
A method is proposed for providing position data for a chip card having portions for receiving or detecting position data of a localisation unit by the localisation unit, wherein the localisation unit is spatially separate from the chip card; transmitting the position data from the localisation unit to the chip card via a contactless interface with use of a cryptographic protocol; executing a distance-bounding protocol between the chip card and the localisation unit, wherein the distance-bounding protocol then concludes successfully precisely when the spatial distance between the chip card and localisation unit does not exceed a predefined maximum distance; and executing a chip card function with successful conclusion of the distance-bounding protocol, wherein the chip card function uses the transmitted position data as position data specifying the current position of the chip card.
摘要:
The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following steps: authenticating the user with respect to the ID token, authenticating a first computer system with respect to the ID token, after successful authentication of the user and the first computer system with respect to the ID token, read-access by the first computer system to the at least one attribute stored in the ID token for transfer of the at least one attribute to a second computer system.