Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for reading attributes from an ID token

A technology for marking cards, attributes, used in the activation of coded identification cards or credit cards, coin-free or similar appliances, digital data authentication, etc., can solve problems such as insufficient data protection, achieve a high level of trust, convenience processing effect

Active Publication Date: 2014-06-25
BUNDESDRUCKEREI GMBH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among other disadvantages, one disadvantage is that data protection is not sufficient, as users' digital identities are stored centrally and user behavior can be recorded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reading attributes from an ID token
  • Method for reading attributes from an ID token
  • Method for reading attributes from an ID token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1 A user computer system 100 of a user 102 is shown. The user computer system 100 may be a personal computer, a portable computer such as a laptop or a palmtop, a personal electronic organizer, a mobile communication device, especially a smart phone, or the like. The user computer system 100 has an interface 104 for communicating with an ID token 106 having a corresponding interface 108 .

[0040] The user computer system 100 has at least a processor 110 for executing program instructions 112 and a network interface 114 for communicating via a network 116 . The network may be a computer network, such as the Internet.

[0041] ID token 106 has electronic memory 118 with protected storage areas 120 , 122 and 124 . Protected memory area 120 is used to store a parameter value (Referenzwert), which is required for authenticating user 102 on ID token 106 . For example, the parameter value is an identifier, in particular a so-called personal identification number (P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for reading at least one attribute stored in an ID token (106, 106′), wherein the ID token is assigned to a user (102), comprising the following steps: authenticating the user with respect to the ID token, authenticating a first computer system (136) with respect to the ID token, after successful authentication of the user and the first computer system with respect to the ID token, read-access by the first computer system to the at least one attribute stored in the ID token for transfer of the at least one attribute to a second computer system (150).

Description

technical field [0001] The present invention relates to a method for reading at least one attribute (Attribut) from an ID token card (ID-Token, or called an identity token card), a related computer program product, an ID token card and a computer system. Background technique [0002] The prior art has disclosed various methods for managing so-called digital identities of users. [0003] Microsoft's CardSpace (card space) is a customer-based digital identity system, the purpose of which is to allow Internet users to communicate their digital identities with online services. One of its disadvantages, among others, is that a user can tamper with his digital identity. [0004] In contrast, OPENID is a server-based system. A so-called identity server stores a database with the digital identities of registered users. Among other disadvantages, one disadvantage is that data protection is insufficient, since users' digital identities are stored centrally and user behavior can be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/33G06F21/35G06F21/43G06Q20/34G06Q20/40H04L9/32G06F21/44G06Q20/00
CPCG07F7/1091G06F2221/2119G07F7/1016G06Q20/347H04L2209/56H04L63/0853G07F7/1008G06Q20/341H04L2209/805G06F21/43G06F21/33G06F21/445H04L9/3263G06F21/35G06F21/31G07F7/1075G06Q20/40975G06F2221/2115G06Q20/40G07F7/10H04L9/3234H04L63/0823H04L41/28H04L63/0428H04L63/083H04L63/10
Inventor 法兰克·迪特里克法兰克·毕赛奥曼弗雷德·皮斯达
Owner BUNDESDRUCKEREI GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products