Processing

Please wait...

Settings

Settings

Goto Application

1. WO2022094648 - METHOD FOR SUSPENDING PROTECTION OF AN OBJECT ACHIEVED BY A PROTECTION DEVICE

Publication Number WO/2022/094648
Publication Date 12.05.2022
International Application No. PCT/AT2021/060423
International Filing Date 09.11.2021
IPC
A61B 6/10 2006.1
AHUMAN NECESSITIES
61MEDICAL OR VETERINARY SCIENCE; HYGIENE
BDIAGNOSIS; SURGERY; IDENTIFICATION
6Apparatus for radiation diagnosis, e.g. combined with radiation therapy equipment
10Application or adaptation of safety means
B23K 9/09 2006.1
BPERFORMING OPERATIONS; TRANSPORTING
23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
KSOLDERING OR UNSOLDERING; WELDING; CLADDING OR PLATING BY SOLDERING OR WELDING; CUTTING BY APPLYING HEAT LOCALLY, e.g. FLAME CUTTING; WORKING BY LASER BEAM
9Arc welding or cutting
09Arrangements or circuits for arc welding with pulsed current or voltage
F04C 28/28 2006.1
FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
04POSITIVE-DISPLACEMENT MACHINES FOR LIQUIDS; PUMPS FOR LIQUIDS OR ELASTIC FLUIDS
CROTARY-PISTON, OR OSCILLATING-PISTON, POSITIVE-DISPLACEMENT MACHINES FOR LIQUIDS; ROTARY-PISTON, OR OSCILLATING-PISTON, POSITIVE-DISPLACEMENT PUMPS
28Control of, monitoring of, or safety arrangements for, pumps or pumping installations specially adapted for elastic fluids
28Safety arrangements; Monitoring
H02M 1/32 2007.1
HELECTRICITY
02GENERATION, CONVERSION, OR DISTRIBUTION OF ELECTRIC POWER
MAPPARATUS FOR CONVERSION BETWEEN AC AND AC, BETWEEN AC AND DC, OR BETWEEN DC AND DC, AND FOR USE WITH MAINS OR SIMILAR POWER SUPPLY SYSTEMS; CONVERSION OF DC OR AC INPUT POWER INTO SURGE OUTPUT POWER; CONTROL OR REGULATION THEREOF
1Details of apparatus for conversion
32Means for protecting converters other than by automatic disconnection
H04L 9/32 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
H04L 9/00 2022.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
CPC
H04L 2209/56
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
56Financial cryptography, e.g. electronic payment or e-cash
H04L 63/0209
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
02for separating internal from external traffic, e.g. firewalls
0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
H04L 63/0853
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0853using an additional device, e.g. smartcard, SIM or a different communication terminal
H04L 9/3228
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3226using a predetermined code, e.g. password, passphrase or PIN
3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
H04L 9/3239
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3236using cryptographic hash functions
3239involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
H04L 9/3247
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system ; or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
3247involving digital signatures
Applicants
  • RIDDLE & CODE GMBH [AT]/[AT]
Inventors
  • FÜRSTNER, Thomas
Agents
  • SONN PATENTANWÄLTE OG
Priority Data
A 50962/202009.11.2020AT
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) METHOD FOR SUSPENDING PROTECTION OF AN OBJECT ACHIEVED BY A PROTECTION DEVICE
(FR) PROCÉDÉ D'INTERRUPTION D'UNE PROTECTION D'UN OBJET ASSURÉE PAR UN DISPOSITIF DE PROTECTION
Abstract
(EN) The disclosure concerns a method for suspending protection of an object (1) achieved by a protection device (2), comprising the following steps: a first data connection (11) is established between the protection device (2) and a mobile device (3); a second data connection (12) is established between the protection device (2) and a transaction directory (4); the protection device (2) receives (20) via the first data connection (11) a public key; the protection device (2) requests (26) via the second data connection (12) a search of transactions associated with the public key within the transaction directory (4); the protection device (2) determines (28) that the search within the transaction directory (4) yields at least one transaction associated with the public key; a third data connection (13) is established between the protection device (2) and an authentication entity (5); the protection device (2) receives (34) via the first data connection (11) an identification string; the protection device (2) requires (35) via the third data connection (13) a clearance of the identification string by the authentication entity (5); the protection device (2) determines (37) that the identification string is cleared; based on a determination that the search within the transaction directory (4) yields at least one transaction and based on a determination that the identification string is cleared, the protection device (2) suspends (38) protection of the object (1).
(FR) La divulgation concerne un procédé d'interruption d'une protection d'un objet (1) assurée par un dispositif de protection (2), comprenant les étapes suivantes : une première connexion de données (11) est établie entre le dispositif de protection (2) et un dispositif mobile (3) ; une deuxième connexion de données (12) est établie entre le dispositif de protection (2) et un répertoire de transactions (4) ; le dispositif de protection (2) reçoit (20), par le biais de la première connexion de données (11), une clé publique ; le dispositif de protection (2) demande (26), par le biais de la deuxième connexion de données (12), une recherche de transactions associées à la clé publique dans le répertoire de transactions (4) ; le dispositif de protection (2) détermine (28) que la recherche dans le répertoire de transactions (4) donne lieu à au moins une transaction associée à la clé publique ; une troisième connexion de données (13) est établie entre le dispositif de protection (2) et une entité d'authentification (5) ; le dispositif de protection (2) reçoit (34), par le biais de la première connexion de données (11), une chaîne d'identification ; le dispositif de protection (2) demande (35), par le biais de la troisième connexion de données (13), une suppression de la chaîne d'identification par l'entité d'authentification (5) ; le dispositif de protection (2) détermine (37) que la chaîne d'identification est supprimée ; sur la base d'une détermination selon laquelle la recherche dans le répertoire de transactions (4) donne lieu à au moins une transaction et sur la base d'une détermination selon laquelle la chaîne d'identification est supprimée, le dispositif de protection (2) interrompt (38) la protection de l'objet (1).
Latest bibliographic data on file with the International Bureau