Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019063256 - SYSTEM, IN PARTICULAR AUTHENTICITY SYSTEM

Publication Number WO/2019/063256
Publication Date 04.04.2019
International Application No. PCT/EP2018/073966
International Filing Date 06.09.2018
Chapter 2 Demand Filed 11.07.2019
IPC
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
G06K 9/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
9Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06Q 20/22 2012.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
22Payment schemes or models
H04L 29/08 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
G06Q 20/36 2012.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
36using electronic wallets or electronic money safes
CPC
G06K 9/00577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
9Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
00577Recognising objects characterised by unique random properties, i.e. objects having a physically unclonable function [PUF], e.g. authenticating objects based on their unclonable texture
G06Q 20/123
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
08Payment architectures
12specially adapted for electronic shopping systems
123Shopping for digital content
G06Q 20/223
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
22Payment schemes or models
223based on the use of peer-to-peer networks
G06Q 20/36
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices ; or networks
36using electronic wallets or electronic money safes
G06Q 20/40
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
H04L 2209/127
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2209Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
12Details relating to cryptographic hardware or logic circuitry
127Trusted platform modules [TPM]
Applicants
  • INNOGY INNOVATION GMBH
Inventors
  • STÖCKER, Carsten
  • KEMMANN, Harald
Agents
  • COHAUSZ & FLORACK PATENT- UND RECHTSANWÄLTE PARTNERSCHAFTSGESELLSCHAFT MBB
Priority Data
10 2017 122 227.826.09.2017DE
Publication Language German (DE)
Filing Language German (DE)
Designated States
Title
(DE) SYSTEM, INSBESONDERE AUTHENTIZITÄTSSYSTEM
(EN) SYSTEM, IN PARTICULAR AUTHENTICITY SYSTEM
(FR) SYSTÈME, EN PARTICULIER SYSTÈME D'AUTHENTIFICATION
Abstract
(DE)
Die Anmeldung betrifft ein System (100, 200, 300, 500), umfassend mindestens eine Vorrichtung (102, 202, 302) mit mindestens einer Ausgabeeinrichtung (106, 206, 306), eingerichtet zum Ausgeben von mindestens einem Datensatz, und mit mindestens einer PUF-Einrichtung (104, 204, 304), eingerichtet zum Erzeugen mindestens eines der Vorrichtung (102, 202, 302) eindeutig zugeordneten Schlüssels, wobei der Schlüssel beim Ausgeben des Datensatzes verwendet wird, mindestens ein Peer-to-Peer-Netzwerks (110, 210, 310, 510) umfassend mindestens eine Peer-to-Peer-Anwendung (114, 214, 314, 414), und mindestens ein von der Peer-to-Peer-Anwendung (114, 214, 314, 414) zumindest gesteuertes Schlüsselregister (118, 218, 318, 418), eingerichtet zumindest zum Speichern des der Vorrichtung (102, 202, 302) eindeutig zugeordneten Schlüssels, wobei die Peer-to-Peer-Anwendung (114, 214, 314, 414) mindestens ein von mindestens einem Teil der Peer-Computer (112, 212, 312, 502, 512, 564) des Peer-to-Peer-Netzwerks (110, 210, 310, 510) ausführbares Authentizitätsmodul (116, 216, 316, 416) umfasst, und wobei das Authentizitätsmodul (116, 216, 316, 416) zum Überprüfen des bei der Ausgabe des Datensatzes verwendeten Schlüssels basierend auf dem Schlüsselregister (118, 218, 318, 418) nach Empfang des Datensatzes durch die Peer-to-Peer-Anwendung (114, 214, 314, 414) eingerichtet ist.
(EN)
The invention relates to a system (100, 200, 300, 500) comprising at least one device (102, 202, 302) with at least one output device (106, 206, 306), which is designed to output at least one data set, and with at least one PUF device (104, 204, 304), which is designed to generate at least one key which is uniquely assigned to the device (102, 202, 302), said key being used upon outputting the data set; at least one peer-to-peer network (110, 210, 310, 510) comprising at least one peer-to-peer application (114, 214, 314, 414); and at least one key register (118, 218, 318, 418), which is at least controlled by the peer-to-peer application (114, 214, 314, 414) and which is designed to at least store the key uniquely assigned to the device (102, 202, 302), wherein the peer-to-peer application (114, 214, 314, 414) comprises at least one authenticity module (116, 216, 316, 416) which can be ran by at least one part of the peer computer (112, 212, 312, 502, 512, 564) of the peer-to-peer network (110, 210, 310, 510), and the authenticity module (116, 216, 316, 416) is designed to check the key which is used upon outputting the data set on the basis of the key register (118, 218, 318, 418) after receiving the data set by means of the peer-to-peer application (114, 214, 314, 414).
(FR)
La présente invention concerne un système (100, 200, 300, 500) comprenant au moins un dispositif (102, 202, 302) comportant : au moins un dispositif de sortie (106, 206, 306), conçu pour sortir au moins un ensemble de données, et au moins un dispositif PUF (104, 204, 304), conçu pour générer au moins une clé attribuée de manière unique au dispositif (102, 202, 302); la clé étant utilisée lors de la sortie de l'ensemble de données, au moins un réseau égal à égal (110, 210, 310, 510) comprenant au moins une application égale à égale (114, 214, 314, 414), et au moins un registre de clés (118, 218, 318, 418), commandé par l'application égale à égale (114, 214, 314, 414), étant conçu au moins pour mémoriser la clé attribuée de manière unique au dispositif (102, 202, 302); l'application égale à égale (114, 214, 314, 414) comportant au moins un module d'authentification (116, 216, 316, 416) exécutable par au moins une partie de l'ordinateur égal (112, 212, 312, 502, 512, 564) du réseau égal à égal (110, 210, 310, 510); et le module d'authentification (116, 216, 316, 416) étant conçu pour vérifier la clé utilisée lors de la sortie de l'ensemble de données en fonction du registre de clés (118, 218, 318, 418) après la réception de l'ensemble de données à l'aide de l'application égale à égale ( 114, 214, 314, 414).
Also published as
Latest bibliographic data on file with the International Bureau