[go: up one dir, main page]

EP3518190A1 - Procédé et dispositif d'authentification à facteurs multiples - Google Patents

Procédé et dispositif d'authentification à facteurs multiples Download PDF

Info

Publication number
EP3518190A1
EP3518190A1 EP19154384.2A EP19154384A EP3518190A1 EP 3518190 A1 EP3518190 A1 EP 3518190A1 EP 19154384 A EP19154384 A EP 19154384A EP 3518190 A1 EP3518190 A1 EP 3518190A1
Authority
EP
European Patent Office
Prior art keywords
user
factor
processing unit
factor authentication
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP19154384.2A
Other languages
German (de)
English (en)
Inventor
Jörg Fischer
Manfred Paeschke
Robert Musick
Lazar KULIKOVSKY
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Publication of EP3518190A1 publication Critical patent/EP3518190A1/fr
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • G07D7/0034Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using watermarks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation

Definitions

  • the present invention relates to a method for multi-factor authentication. Furthermore, the invention relates to an apparatus for carrying out the method for multi-factor authentication.
  • the WO 2013/034603 A1 describes a method for verifying a security document with a security feature in the form of a fluorescent printing element.
  • a method which is for identifying a user using a communication device.
  • the method provides that detected biometric features of an identification document of a user are transmitted to an electronic identification service.
  • Multi-factor authentication which uses multiple factors, is often complicated and not very flexible.
  • the object of the present invention based on the present state of the art, is to provide a simplified method for the multi-factor authentication of a user's identity, which enables flexible multi-factor authentication.
  • the object is achieved by a method for multi-factor authentication of an identity of a A user according to the appended claim 1 and an apparatus for carrying out the method according to the attached independent claim 7 or 8.
  • the method according to the invention serves to identify the identity of a user by means of a multi-factor authentication.
  • a first and at least one second factor suitable for authentication are selected, which can be processed or checked by a data processing unit.
  • the at least two factors serve to authenticate the user identity and are therefore part of the multi-factor authentication.
  • An entity can be tested by means of the method according to the invention.
  • a first single factor authentication is performed by the data processing unit, wherein the first factor is checked for authenticity and / or integrity.
  • Authenticity stands for authenticity or security, whereby, for example, the authenticity of a document is checked.
  • a "document” may, for example, be an identification, value or security document, in particular a sovereign document, in particular a paper-based and / or plastic-based and / or electronic document, such as a passport, identity card, visa, driver's license, vehicle registration document, vehicle registration document, Health card, or a company card or the like. his.
  • the term integrity stands for integrity, reliability, completeness, freedom from errors, whereby, for example, a falsification of an image can be detected and thus its use can be prevented.
  • the result of the first single-factor authentication of the first factor is output by the data processing unit.
  • Another procedural step sees that the result of the first single-factor authentication is checked by means of a further factor, wherein the second factor is checked for authenticity and / or integrity.
  • the further factor is checked by carrying out a second single-factor authentication with the aid of the data processing unit.
  • the result of the second single-factor authentication is output.
  • the output of the single-factor authentication takes place, for example, internally in the data processing unit to a calculation module or corresponding program unit carrying out the further step of confirming the identity of the user.
  • the identity of the user is confirmed by the data processing unit if the respective single-factor authentications of the first and the second factor have confirmed the authenticity of the user.
  • the multiple single-factor authentication forms part of multi-factor authentication and results in a combination. If at least one of the two single-factor authentications could not confirm the identity of the applicant, an error signal can be generated and output.
  • the method is designed as a single-stage process, wherein for the multi-factor authentication, the at least two factors are subjected to a single-factor authentication and the identity of the user is confirmed after successful authentication of the factors.
  • the multi-factor authentication can be based on a basic identity, which is for example a passport or an identity card.
  • the method of multi-factor authentication as a one-step process is data-sparing, since only the data necessary for authentication are stored in a digital memory store. The method comprises the method steps described above.
  • At least one additional identity determination factor is subjected to single-factor authentication, wherein the single-factor authentication is part of the multi-factor authentication.
  • three factors undergo single authentication and are used for multi-factor authentication. More preferably, five factors undergo single authentication and are used for multi-factor authentication. Alternatively, preferably, seven factors undergo single authentication and are used for multi-factor authentication.
  • the method is designed as a multi-stage process. Authentication may be on the basis of a primal identity that needs to be verified only once, for example, by personally verifying the identity by a designated controller, as described e.g. in the so-called POSTIDENT method is possible.
  • a digital ID or a digital identifier is generated from the authenticated factors or from the results of the multi-factor authentication and transmitted by the data processing unit to a secure memory area if the identity of the user, for example, as a result of the POSTIDENT authentication was confirmed.
  • the secure memory area is an intelligent data memory which is protected against foreign access, so that the digital identifier is also protected and the intelligent data memory serves as a digital vault.
  • a partial identity is generated from the stored digital identifier by the data processing unit at a later time.
  • a third single-factor authentication is performed on the data processing unit, in which a third factor is checked for authenticity and / or integrity. Furthermore, the data processing unit issues an output of a result of the third single-factor authentication.
  • the result of the third single-factor authentication with the generated partial identity is combined by the data processing unit into a combined digital ID.
  • the identity of the user is confirmed by the data processing unit with the aid of the combined digital ID.
  • the described method steps ensure fast, flexible authentication of the user identity.
  • POSTIDENT can once confirm the original identity and then generate a digital ID as an everyday ID, which can be used with another factor in numerous applications.
  • the digital identifier may be augmented with other factors that have undergone single-factor authentication.
  • the digital identifier can be continuously extended and adapted by the user, so that the digital identifier or its security is constantly growing.
  • the process steps are preferably carried out several times.
  • the digital ID becomes a secure external memory area via a secure communication link transmitted outside the data processing unit.
  • at least one of the factors is checked for integrity and authenticity so as to ensure the authenticity and integrity of each factor.
  • the single-factor authentications are based on reference data.
  • the reference data are preferably stored or stored in a digital data memory. Particularly preferably, the reference data are stored or stored encrypted in a digital data memory.
  • the reference data is associated with the respective factors used for authentication.
  • the reference data may be stored in an intelligent database system with intrinsic security.
  • the storage of the reference data preferably takes place in a central memory. Alternatively preferably, the storage of the reference data takes place in a decentralized memory. The storage can take place in an external memory, for example on a remote server.
  • the at least two factors from different groups can be selected and classified in these.
  • the groups to which the factors belong are possession, knowledge, trait and addition. Further groupings can be defined. Alternatively, preferably, the at least two factors from the same group are selectable and to be classified in this.
  • a ownership factor is assigned to the ownership group.
  • the possession factor is an object which is in the possession of the user and is usable by the user.
  • the ownership factor can be formed by ownership: a badge, a mobile phone, a wearable or a SmartWatch.
  • the ownership factor may be another unlisted type that is in the user's possession and which is usable by the user.
  • a knowledge factor is assigned to the knowledge group.
  • the knowledge factor is information that the user knows and can possibly reproduce.
  • the knowledge factor is information stored in a memory or a data processing unit.
  • the knowledge factor can be formed by knowledge: a number, a password, a gesture, an e-mail account, a social media account or the type and / or the number and / or the combination of the individual to the multimedia Factor authentication factors used. Other types of knowledge factors for the process, not listed here, may be used.
  • a feature factor is assigned to the characteristic group.
  • the feature factor is a physical characteristic of the user, so authentication can not be done without the user.
  • the feature factors preferably include characteristics of the user.
  • the feature factor may be formed by: a user's face, a user's iris, a user's fingerprint, a user's vein, a user's muscle, a user's gait, or a user's property. Further user characteristics as feature factors are possible.
  • the additional factor is assigned to the group Addition.
  • the additional factor can be formed by: a position, a history or a user behavior, or by a relationship with another identity, wherein the further identity is already authenticated.
  • the method according to the invention is a dynamic method, which has the advantage of a flexible choice of the factors used for the user identification by a user brings.
  • Single-factor authentication and thus verification of the individual factors selected in the process, is based on specific characteristics of the factors involved. Using sensors, the specific characteristics of the respective factors can be checked. The following are examples of the respective listed factors of the various groups. Alternative authentications and / or integrity checks of the individual factors are conceivable.
  • the identity document as a possession factor can be checked for authenticity and authenticity (authenticity and integrity) using a near video with LED or NFC.
  • the near video By means of the near video, the user identity is checked, whereby a video of the ID document is created together with the user.
  • the review By comparing a user photo, which is located on the identification document, with a recording of the face of the user, the review can be done.
  • the user photo of the ID document may be compared with a reference image.
  • the reference image can be stored in an internal or external memory.
  • the identification document can be checked for authenticity by means of an alternative data and security feature check (for example emission of specific radiation at a predetermined excitation). Data verification may be based on bibliographic data on the identity document.
  • an alternative data and security feature check for example emission of specific radiation at a predetermined excitation.
  • Data verification may be based on bibliographic data on the identity document.
  • the factors have security features.
  • the factors of a group are distinguishable from each other.
  • the factors may have several different security features.
  • an identity document may have a security element that can be excited by an electromagnetic radiation.
  • the mobile phone as a possession factor can be checked by validating the SIM or the IMEI of the mobile phone using a stored reference of the SIM and / or the IMEI for comparison. In particular, device-specific features are checked. Other mobile devices can also be used as a possession factor, for example a tablet.
  • the wearable or the smartwatch as a possession factor can be authenticated by checking the SNR (serial number of the device) or the ID of the respective device.
  • the knowledge factors preferably include encryptions, accounts or references.
  • the knowledge factor number, password or a gesture of the user can be checked and authenticated by a login or a login.
  • encryptions are checked by entering the appropriate data and comparing with reference data.
  • the knowledge factor e-mail account or social media account can be checked by means of the data processing unit by a link or a transmitted code.
  • Another knowledge factor namely the type, the number and / or the combination of the various factors that are used for the multi-factor authentication, can be compared with stored references.
  • the face and / or iris of the user as a feature factor can be authenticated by means of a smart live video or selfie video or a user video by comparison with a badge photograph or with badge data or with stored reference data.
  • the feature factor fingerprint and / or veins are to be recorded by sensor recordings and compared with card data or stored reference data.
  • the Feature factor of the user's property or gait of the user can be checked by data acquisition by means of acceleration sensors and or gyroscope and / or GPS and data comparison with a mobile terminal which acquires the required data and using reference data.
  • a suitable mobile terminal is for example a mobile phone or a smartwatch or a wearable.
  • the user's characteristics or gait can be checked by comparing reference data with data generated by video analysis of the user with a remote system or proximity system.
  • the position as an additional factor must be authenticated by comparing MNO and / or GPS data (geo-fencing).
  • the additional factor history and / or behavior is to be checked by comparing the last, stored login data, the last purchases or the favorite places of the user.
  • the additional factor guarantor and / or relationship is to be authenticated by confirmation by means of at least one further identity in real time or by means of a stored reference identity.
  • the detection of the respective features of the individual factors is preferably carried out with devices or devices designed for this purpose. Particularly preferably, the specific features of the individual factors are detected by means of sensors designed for this purpose.
  • the single-factor authentication is performed successively.
  • the single factor authentication can be performed concurrently.
  • factors for the multi-factor authentication are used, which are available to the user in a timely manner.
  • the inventive method preferably combines classical factors and new technologies for authenticating an identity, which advantageously results in a secure method for user identification.
  • An advantage of the method according to the invention is that there is a strong user authentication, since several factors are used for the authentication.
  • Another advantage of the method is that the method is user-friendly and the user can freely choose the factors, their number and combination. The user can primarily use the factors and devices available to him. Alternatively preferably, the type, number and combination of factors are automatically and / or dynamically selectable. It has proved to be advantageous that the user does not need any additional or additional devices for authentication of his identity.
  • dynamic multifactor authentication is to be understood as meaning, in particular, multifactor authentication, in which the type and number of factors are determined dynamically for each authentication request depending on the respectively required degree of authentication.
  • the method is therefore dynamic in the sense that the selection of the combination of features to be detected for a successful authentication of the user takes place upon receipt of the authentication request.
  • the selection can therefore take place individually, ie dynamically, for each authentication request.
  • the selection for identical authentication requests may be different. This increases the safety of the process.
  • the selection can be adapted or changed as a function of changed framework conditions or detection of irregularities (such as, for example, a request from a terminal other than usual).
  • a calculator For automatic selection of factors and their combination, number and type, a calculator can be used. Default values for the type, number and / or combination of the factors are preferably fed to the data processing unit. The verification of authenticity and / or integrity can also be called verification.
  • the device according to the invention is designed to execute the above-described method for multi-factor authentication of a user's identity on the basis of two factors with security features.
  • the device comprises at least one sensor which serves to detect the security features of the factors.
  • the sensor may be an image sensor, a motion sensor or accelerometer, a biometric sensor, or a position sensing sensor. Other types of sensors may be used in the multi-factor authentication device.
  • the sensor is designed to detect a signal of the security feature.
  • the device comprises a data processing unit.
  • the data processing unit receives the signal detected by the sensor.
  • the data processing unit subjects the detected signal to a single-factor authentication to confirm the identity of the user, if the results of both the first and the second single-factor authentication confirm the authenticity of the user.
  • An image sensor can be integrated in an image acquisition unit for taking a picture, an image series or a video his.
  • the image acquisition unit is, for example, a camera.
  • the motion sensor or acceleration sensor is preferably designed to record a movement or a gait of a user.
  • the biometric sensor is a sensor for receiving a fingerprint of the user.
  • the biometric sensor is a sensor designed to receive the iris of the user.
  • the biometric sensor may be configured to detect the muscle activity of the user.
  • the device for multi-factor authentication of a user's identity on the basis of a security document with user data and / or a security feature that reacts to electromagnetic radiation comprises an image acquisition unit, a lighting unit and a data processing unit.
  • the image capture unit is used to capture an image, a series of images or a video of the security document, wherein a signal or data record is generated, which serves to authenticate a first factor.
  • the signal or the data record which, for example, reflects a photograph of the security document, serves to authenticate the user identity.
  • the image acquisition unit may include one or more sensors.
  • the lighting unit is designed to generate electromagnetic radiation.
  • the illumination unit is to be arranged opposite the security document such that the electromagnetic radiation radiates to the security document, in particular to the security feature.
  • the security document can receive the electromagnetic radiation and is stimulated to react or to luminescence.
  • the data processing unit is used to perform a first single-factor authentication of the first factor based on the image, the image series or the video of the user data with
  • the data processing unit is used to carry out a second single-factor authentication on the basis of the luminescence-stimulated security feature.
  • the second single-factor authentication preferably takes place on the security document by means of the image, the series of images or the video of the security feature excited for luminescence by comparison with a reference value of the excited security feature. Furthermore, the data processing unit serves to confirm the identity of the user, if the results of the single-factor authentication confirm the authenticity of the user.
  • the lighting unit is spaced from the security document to order.
  • the lighting unit is preferably an LED light.
  • a security feature is applied to the security document.
  • the security feature is a luminescent material which can be excited by electromagnetic radiation for photoluminescence.
  • the security feature may be formed as a pattern.
  • the security feature is at least partially overlapping on a user photograph located on the security document.
  • the device for carrying out the method for multi-factor authentication is a mobile terminal.
  • the device for carrying out the method for multi-factor authentication is preferably a tablet.
  • the device for carrying out the method for multi-factor authentication is a smartphone.
  • the lighting unit may be a flash function of the mobile terminal.
  • the lighting unit is an LED light of a smartphone, with the LED light, a flash function of a camera is executable.
  • the output of the result of the multi-factor authentication is preferably via a display or a monitor of the device, in particular of the mobile terminal.
  • the output of the result of the multi-factor authentication is alternatively preferably via an acoustic interface of the device, in particular of the mobile terminal.
  • FIG. 1 shows a greatly simplified representation of an arrangement for carrying out a method step of a method according to the invention for multi-factor authentication of a user identity (in FIG. 2 shown), which is carried out with a device according to the invention.
  • the device is a mobile terminal, in particular a smartphone 01 of the user.
  • the smartphone 01 includes a camera (not shown) and a lighting unit (not shown) associated with the camera.
  • the camera of the smartphone 01 can be used to take a picture, a series of pictures or a video from an identity card 02.
  • the identity card 02 is a security document which is assigned to a user 07.
  • the identity card 02 includes not only a photo 03 or photo of the user 07 but also his personal data 04.
  • the identity card 02 comprises at least one security feature 06.
  • the security feature 06 may be a luminescent material applied to the identity card 02, which can be excited by electromagnetic radiation for photoluminescence.
  • the electromagnetic radiation can be generated by the illumination unit, for example an LED light, of the smartphone 01.
  • the security feature 06 is at least partially integrated into the photo 03 located on the identity card 02, for example by using luminescent pigments in a transparent protective layer covering the photo. This ensures the trustworthiness, integrity, identity card 02.
  • the verification of the authenticity, ie the authenticity, is carried out by checking the security feature 06 on the identity card 02, wherein the security feature 06 is measured, for example.
  • the verification and single-factor authentication of the security feature 06 as a first factor reflects a method step of the multi-factor authentication of the method according to the invention.
  • the personal data 04 of the user can be checked.
  • the personal data 04 or biographical data of the user 07 can be compared with reference data stored on a computer.
  • the identity card 02 is in the possession of the user and is a possession factor which can be used for the multi-factor authentication.
  • Another possession factor is the smartphone 01 of the user, which can also be used in a further process step for multi-factor authentication.
  • the single authentication of the smartphone 01 can by means of verification the device number with a stored reference number.
  • the multi-factor authentication described above is done by means of two ownership factors. If both factors are authenticated, the identity of the user is considered confirmed.
  • Fig. 2 shows an alternative method step of the method for multi-factor authentication, wherein the user 07 with a, in his possession, smartphone 01 and his ID card 02 performs a multi-factor authentication.
  • the verification of the authenticity and integrity of the identity card 02 and the smartphone 01 done, as to Fig. 1
  • a single authentication of the user 07 with the ID card 02, wherein the user 07 with the camera of the smartphone 01 generates a live video is carried out on the basis of a security feature 06 of the ID card 02 and the device number of the smartphone.
  • the face of the user 07 is compared to the live image with the photo 03, which is located on the identity card 02.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Collating Specific Patterns (AREA)
EP19154384.2A 2018-01-30 2019-01-30 Procédé et dispositif d'authentification à facteurs multiples Pending EP3518190A1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102018102013 2018-01-30

Publications (1)

Publication Number Publication Date
EP3518190A1 true EP3518190A1 (fr) 2019-07-31

Family

ID=65243480

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19154384.2A Pending EP3518190A1 (fr) 2018-01-30 2019-01-30 Procédé et dispositif d'authentification à facteurs multiples

Country Status (1)

Country Link
EP (1) EP3518190A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3859692A1 (fr) * 2020-01-30 2021-08-04 Bundesdruckerei GmbH Équipement terminal et procédé de détermination des données à caractère personnel au moyen d'un document d'identification
WO2023089406A1 (fr) * 2021-11-16 2023-05-25 International Business Machines Corporation Vérification d'authentification multifactorielle

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030115142A1 (en) * 2001-12-12 2003-06-19 Intel Corporation Identity authentication portfolio system
WO2013034603A1 (fr) 2011-09-06 2013-03-14 Bundesdruckerei Gmbh Procédé et ensemble permettant la vérification d'un document sécurisé doté d'un signe de sécurité sous la forme d'un élément d'impression fluorescent et utilisation d'un tel ensemble
DE102014100463A1 (de) 2014-01-16 2015-07-16 Bundesdruckerei Gmbh Verfahren zum Identifizieren eines Benutzers unter Verwendung eines Kommunikationsgerätes
US20160217356A1 (en) * 2010-09-18 2016-07-28 Philip Wesby System and Method for Encoding and Controlled Authentication
DE102016107250A1 (de) 2015-04-22 2016-10-27 Deutsches Zentrum für Luft- und Raumfahrt e.V. Verfahren, Einrichtung und Computerprogramm zur Multi-Faktor-Authentifizierung und/oder -Identifizierung von Benutzern
DE102015219393A1 (de) 2015-10-07 2017-04-13 Koenig & Bauer Ag Verfahren zur Identifikation eines Gegenstandes
WO2017168194A1 (fr) * 2016-04-01 2017-10-05 Intel Corporation Technologies pour une authentification de seuil à facteurs multiples
DE102016113499A1 (de) * 2016-07-21 2018-01-25 Huf Hülsbeck & Fürst Gmbh & Co. Kg Authentifizierungsverfahren zur Authentifizierung eines Benutzers eines Endgeräts

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030115142A1 (en) * 2001-12-12 2003-06-19 Intel Corporation Identity authentication portfolio system
US20160217356A1 (en) * 2010-09-18 2016-07-28 Philip Wesby System and Method for Encoding and Controlled Authentication
WO2013034603A1 (fr) 2011-09-06 2013-03-14 Bundesdruckerei Gmbh Procédé et ensemble permettant la vérification d'un document sécurisé doté d'un signe de sécurité sous la forme d'un élément d'impression fluorescent et utilisation d'un tel ensemble
DE102014100463A1 (de) 2014-01-16 2015-07-16 Bundesdruckerei Gmbh Verfahren zum Identifizieren eines Benutzers unter Verwendung eines Kommunikationsgerätes
DE102016107250A1 (de) 2015-04-22 2016-10-27 Deutsches Zentrum für Luft- und Raumfahrt e.V. Verfahren, Einrichtung und Computerprogramm zur Multi-Faktor-Authentifizierung und/oder -Identifizierung von Benutzern
DE102015219393A1 (de) 2015-10-07 2017-04-13 Koenig & Bauer Ag Verfahren zur Identifikation eines Gegenstandes
WO2017168194A1 (fr) * 2016-04-01 2017-10-05 Intel Corporation Technologies pour une authentification de seuil à facteurs multiples
DE102016113499A1 (de) * 2016-07-21 2018-01-25 Huf Hülsbeck & Fürst Gmbh & Co. Kg Authentifizierungsverfahren zur Authentifizierung eines Benutzers eines Endgeräts

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3859692A1 (fr) * 2020-01-30 2021-08-04 Bundesdruckerei GmbH Équipement terminal et procédé de détermination des données à caractère personnel au moyen d'un document d'identification
WO2023089406A1 (fr) * 2021-11-16 2023-05-25 International Business Machines Corporation Vérification d'authentification multifactorielle
US11762973B2 (en) 2021-11-16 2023-09-19 International Business Machines Corporation Auditing of multi-factor authentication

Similar Documents

Publication Publication Date Title
DE60309176T2 (de) Biometrisches authentifizierungssystem
EP3189465B1 (fr) Procédé et système d'authentification destiné à l'enregistrement d'une caractéristique de sécurité aléatoire
EP3182317A1 (fr) Dispositif et procédé de fourniture personnalisée d'une clé
EP3889807B1 (fr) Système d'authentification basé sur un appareil de télécommunication doté d'un capteur d'activité cérébrale
EP3518190A1 (fr) Procédé et dispositif d'authentification à facteurs multiples
DE102014207439A1 (de) Maskierung von sensiblen Daten bei der Benutzer-Identifikation
EP3657750B1 (fr) Procédé d'authentification des lunettes intelligentes dans un réseau de données
EP3362999B1 (fr) Procédé de vérification d'un document, document et système informatique
AT507372A1 (de) Identifikationsmerkmal
EP2131316A1 (fr) Procédé d'authentification et système d'authentification pour produits
WO2016206976A1 (fr) Procédé et système pour authentifier un document et procédé pour créer et/ou personnaliser un document
WO2008110589A1 (fr) Procédé pour transmettre les données concernant une personne à un dispositif de contrôle
EP3510515B1 (fr) Lunettes intelligentes permettant la signature cryptographique de données d'image
EP3304846B1 (fr) Identification d'une personne sur la base d'une caractéristique biométrique de référence transformée
EP3304807B1 (fr) Identification d'une personne sur la base d'une caractéristique de référence biométrique transformée
EP3289507B1 (fr) Jeton id, système et procédé de génération de signature électronique
DE102020123755B4 (de) Verfahren zum Authentifizieren mit einem optoelektronisch lesbaren Code sowie Funktionsfreigabeeinrichtung und Computerprogramm hierzu
EP3338254B1 (fr) Appareil de verification de document
DE102009008184B4 (de) Prüfen einer Authentisierung eines Besitzers eines portablen Datenträgers
DE102012200299B4 (de) Verfahren und Vorrichtung zur Erhöhung der Sicherheit bei der Unterzeichnung eines Dokuments
DE102016110274B4 (de) Verfahren für ein biometrisch basiertes Auslösen einer Nutzaktion mittels einem Nutzer zugeordneten ID-Tokens
EP3859692A1 (fr) Équipement terminal et procédé de détermination des données à caractère personnel au moyen d'un document d'identification
WO2003071492A2 (fr) Procede pour constater le droit d'une personne a utiliser un support de donnees portatif
DE102019214227A1 (de) Verfahren und Einrichtung zum Prüfen der Originalität eines Produkts
EP3276909A1 (fr) Dispositif d'authentification

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20200120

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20221019

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526