Processing

Please wait...

PATENTSCOPE will be unavailable a few hours for maintenance reason on Saturday 31.10.2020 at 7:00 AM CET
Settings

Settings

Goto Application

1. WO2019185343 - ACCESS CONTROL

Publication Number WO/2019/185343
Publication Date 03.10.2019
International Application No. PCT/EP2019/056065
International Filing Date 11.03.2019
IPC
G06F 21/62 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/60 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
G06Q 20/38 2012.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/08 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
CPC
G06F 21/604
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
604Tools and structures for managing or administering access control systems
G06F 21/62
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
G06F 21/6209
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6209to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
G06F 21/6218
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
G06F 21/6227
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
6227where protection concerns the structure of data, e.g. records, types, queries
G06Q 20/389
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
389Keeping log of transactions for guaranteeing non-repudiation of a transaction
Applicants
  • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY [GB]/[GB]
Inventors
  • ROSCOE, Jonathan
Agents
  • BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
Priority Data
18163825.525.03.2018EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) ACCESS CONTROL
(FR) CONTRÔLE D'ACCÈS
Abstract
(EN)
A computer implemented method of access control for a restricted resource comprising: receiving a request from an authenticated resource consumer to access the restricted resource, the request including an identifier of the consumer; accessing a set of transactions from a blockchain database based on the identifier of the consumer, each transaction corresponding to a prior security event concerning the consumer, to generate a set of prior security events; comparing the set of prior security events with an access control profile for the restricted resource; and responsive to the comparison, precluding access to the restricted resource by the consumer.
(FR)
L'invention a trait à un procédé mis en œuvre par ordinateur pour le contrôle d'accès à une ressource limitée, comprenant les étapes qui consistent : à recevoir une demande provenant d'un consommateur de ressources authentifié pour accéder à la ressource limitée, ladite demande incluant un identifiant du consommateur ; à accéder à un ensemble de transactions à partir d'une base de données de chaîne de blocs selon l'identifiant du consommateur, chaque transaction correspondant à un événement de sécurité antérieur concernant le consommateur, pour générer un ensemble d'événements de sécurité antérieurs ; à comparer l'ensemble d'événements de sécurité antérieurs à un profil de contrôle d'accès pour la ressource limitée ; et, en réponse à la comparaison, à empêcher l'accès à la ressource limitée par le consommateur.
Latest bibliographic data on file with the International Bureau