Unlock instant, AI-driven research and patent intelligence for your innovation.

Access management method and device

An access management and access token technology, applied in security devices, secure communication devices, computer security devices, etc., can solve the problem of inability to obtain permanent access to access-controlled devices.

Active Publication Date: 2020-08-14
NOKIA TECH OY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of changing credentials is that in the case of a single credential being compromised, unauthorized parties cannot gain permanent access to access-controlled devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access management method and device
  • Access management method and device
  • Access management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] By receiving the access token from the access service via the user device instead of via the gateway, the advantage can be obtained that access to the controlled device can be made simpler, since the access controlled device may no longer need to be equipped with a different communication capability towards the gateway . Examples of accessing controlled devices and user devices are provided below.

[0041] figure 1A system according to at least some embodiments of the invention is shown. The system includes an access-controlled device 120, which may include, for example, an IoT device or another type of access-controlled device, such as a medical patient information repository or its controller. Access-controlled device 120 may include a processing core and memory, and may be powered by a stable power source or, for example, by a rechargeable battery. For example, access-controlled devices 120 may include personal wearable and / or embedded devices. Access-controlled ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to an exemplary aspect of the present invention, there is provided an apparatus comprising: a memory configured to store an encryption key and a list of access tokens; and at least one processing core configured to: based at least in part on the current time and at least one of the serial numbers, select a first access token from a list of access tokens; decide whether to grant access to the device to the user device based at least in part on the first access token; and enable the device to be accessed from the user device and the second At least one of the user devices receives a second list of access tokens.

Description

technical field [0001] The invention relates to the field of managing access to devices using access tokens. Background technique [0002] When a user device attempts to access an access-controlled device, the user device may be required to provide credentials to prove that it or the user is authorized to access the device. For example, where the device being accessed is an electronic lock controller, the user device needs to be in possession of a key, which may include, for example, a cryptographic token to be presented to the device for access to be authorized. [0003] The credential may be static in that it remains unchanged over time, or the access-controlled device may be arranged to receive new credentials periodically, eg over a fixed network connection. The advantage of changing credentials is that in the event of a single credential being compromised, unauthorized parties cannot gain permanent access to the access-controlled device. [0004] In an Internet of Thi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00H04L9/32G06F21/45H04W12/08H04W12/00
CPCG06F21/335G06F21/45G06F2221/2109H04L9/3228H04L9/3234H04L9/3297H04L2209/805H04L12/08H04W4/80H04W12/61H04W12/084G07C9/00H04L9/0863H04L63/083H04L2209/80
Inventor O·O·科斯基麦斯T·T·米科拉L·L·布兰茨
Owner NOKIA TECH OY