Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020202118 - METHOD, ELECTRONIC IDENTITY OBJECT, AND TERMINAL FOR RECOGNIZING AND/OR IDENTIFYING A USER

Publication Number WO/2020/202118
Publication Date 08.10.2020
International Application No. PCT/IB2020/053243
International Filing Date 05.04.2020
IPC
H04W 4/80 2018.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
4Services specially adapted for wireless communication networks; Facilities therefor
80Services using short range communication, e.g. near-field communication , radio-frequency identification or low energy communication
H04L 9/00 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
H04L 9/32 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Arrangements for secret or secure communication
32including means for verifying the identity or authority of a user of the system
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/02 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
02Protecting privacy or anonymity
CPC
H04L 63/0435
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
04for providing a confidential data exchange among entities communicating through data packet networks
0428wherein the data content is protected, e.g. by encrypting or encapsulating the payload
0435wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
H04L 63/0861
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
0861using biometrical features, e.g. fingerprint, retina-scan
H04L 63/126
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
126the source of the received data
H04L 9/008
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
008involving homomorphic encryption
H04L 9/0838
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
H04L 9/0897
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
9Cryptographic mechanisms or cryptographic; arrangements for secret or secure communication
08Key distribution ; or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
0897involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
Applicants
  • GLOBAL ID SA [CH]/[CH]
Inventors
  • SONNA MOMO, Lambert
  • BALLI, Fatih
  • VAUDENAY, Serge
  • DURAK, Betül
Agents
  • P&TS SA (AG, LTD.)
Priority Data
00469/1905.04.2019CH
00807/1917.06.2019CH
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) METHOD, ELECTRONIC IDENTITY OBJECT, AND TERMINAL FOR RECOGNIZING AND/OR IDENTIFYING A USER
(FR) PROCÉDÉ, OBJET D'IDENTITÉ ÉLECTRONIQUE ET TERMINAL POUR RECONNAÎTRE ET/OU IDENTIFIER UN UTILISATEUR
Abstract
(EN)
A method for recognizing and/or identifying a user (9) with a chip (C) in an electronic identity object storing a digital identity (24), the method comprising steps of: - establishing a wireless or electrical connection between the electronic identity object (C) and a verification terminal (T); - verifying, in the electronic identity object, if the verification terminal is authorized to communicate with the electronic identity object (C), and in response of a positive verification sharing a secret (K): using the shared secret (K) for establishing an encrypted symmetric data link (5) between the electronic identity object and the verification terminal (T); transmitting, through the encrypted data link (5), said digital identity (24) stored in the electronic identity object to the verification terminal (T); and verifying in the verification terminal (T) the authenticity of said digital identity (24).
(FR)
Un procédé de reconnaissance et/ou d'identification d'un utilisateur (9) avec une puce (C) dans un objet d'identité électronique stockant une identité numérique (24), le procédé comprenant les étapes consistant à : -établir une connexion sans fil ou électrique entre l'objet d'identité électronique (C) et un terminal de vérification (T) ; -vérifier, dans l'objet d'identité électronique, si le terminal de vérification est autorisé à communiquer avec l'objet d'identité électronique (C), et en réponse à une vérification positive partageant un secret (K) : utiliser le secret partagé (K) pour établir une liaison de données symétrique chiffrée (5) entre l'objet d'identité électronique et le terminal de vérification (T) ; transmettre, par l'intermédiaire de la liaison de données chiffrées (5), ladite identité numérique (24) stocké dans l'objet d'identité électronique au terminal de vérification (T) ; et vérifier dans le terminal de vérification (T) l'authenticité de ladite identité numérique (24).
Latest bibliographic data on file with the International Bureau