WO2006042992A2 - System and method for information access control - Google Patents
System and method for information access control Download PDFInfo
- Publication number
- WO2006042992A2 WO2006042992A2 PCT/FR2005/050853 FR2005050853W WO2006042992A2 WO 2006042992 A2 WO2006042992 A2 WO 2006042992A2 FR 2005050853 W FR2005050853 W FR 2005050853W WO 2006042992 A2 WO2006042992 A2 WO 2006042992A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signature
- key
- information
- access
- access control
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 14
- 238000012795 verification Methods 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012360 testing method Methods 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 239000004148 curcumin Substances 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 101000995928 Mus musculus Nucleolar protein 58 Proteins 0.000 description 1
- 102100039692 RNA-binding motif, single-stranded-interacting protein 1 Human genes 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/088—Access security using filters or firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a system and method for controlling access to information.
- the invention may especially apply to the parental control of television program or the control of the information accessed via a computer on the Internet network.
- access device In a general way, we will consider in the rest of this document that the information to which one wishes to control access is accessible via a device called "access device".
- This device can therefore consist in particular of a decoder connected to a television network or by a personal computer.
- the access control systems and in particular the parental control systems, use secret codes memorized in the access device, typically during the first use of this device.
- Such systems have a first major disadvantage in that they rely on a weak authentication system, the only knowledge of the password being sufficient to modify the parameters of the access control.
- This system aims at a system for controlling access to information, the actual control being implemented by an access to information device.
- This system comprises:
- a mobile device comprising means for storing a private signature key and means for signing a message representative of the information, these signature means using the private signature key and a personal data of the user of the mobile equipment;
- a signature server comprising means for storing a public verification key associated with the private signature key and means for verifying the validity of the signature, these verification means using the public verification key;
- the access device being adapted to implement this access control, based on information representative of the result of the verification.
- access control to information any action to modify the access rights (prohibit, authorize, restrict, restore, ...) to this information, for a period of time determined or not.
- the access control is implemented when the signature server has verified the validity of the signature made by the mobile equipment, that is to say when the user of this equipment Mobile has been authenticated as a person authorized to control access to information.
- this responsible person may be remote from the access device.
- the access control system implements a strong authentication mechanism, making it very difficult or impossible to pirate the control system since it is necessary to be in possession of the control system. mobile equipment and personal data of the user to activate access control.
- an entity A wishing to authenticate presents an authentication request to an authentication entity B;
- the authentication entity B generates a challenge, most often in the form of a random number, and transmits this challenge to the authenticating entity A;
- the authenticating entity A signs the challenge received according to a known cryptographic algorithm and returns this signature to the authentication entity B; - the authentication entity B verifies the signature and validates, if necessary, the authentication of the entity A.
- the aforementioned personal data is constituted by a personal code (“PIN”) entered on the mobile equipment.
- PIN personal code
- this personal data may be a biometric data of the user.
- the signature means use the WIM ("Wireless Identity Module”) technology defined by the OMA ("Open Mobile Alliance") standardization group.
- WIM technology is a standardized PKI-based signature program ("Public Key Infrastructure”) for performing electronic signatures and securing data exchanged as part of the Wireless Access Protocol (WAP).
- WAP Wireless Access Protocol
- the implementation of WIM on SIM card can also allow its use outside the WAP, by exchange of ISO 7816 orders between the application of the mobile phone and the card, in particular for its use in association with proximity technologies, or the added unplanned features dabs WAP-WMLScriptCrypto API.
- OMA-WAP-WIM-V1 -1-2002 / 024-C.pdf WAP-161-WMLScriptCrypto-20010620 -a.pdf.
- the access device comprises means for creating the message to be signed, preferably from parameters defining the information to be controlled, these parameters being inputted with input means of this device.
- the access device comprises means for sending the message to the signature server;
- the signature server comprises means for transmitting the message to the mobile equipment;
- the mobile equipment comprises means for sending the signature to the signature server.
- the message can be received by the mobile equipment, via a mobile telecommunications network, for example of the GSM, GPRS or UMTS type.
- a mobile telecommunications network for example of the GSM, GPRS or UMTS type.
- the access control can be activated remotely, as long as the mobile equipment is in an area covered by the mobile telecommunication network.
- the message to be signed can be sent from the signature server to the mobile device using the SMS standard or a Push Wap type mechanism.
- the access control system In a second preferred embodiment of the access control system:
- the access device comprises means for sending the message to the mobile equipment and means for sending the signature to the signature server;
- the mobile equipment comprises means for sending the signature to the access device.
- This second preferred embodiment makes it possible to carry out the signature on the mobile equipment, even if it is not in an area covered by the mobile telecommunications network.
- the message to be signed is sent to the mobile device directly by the access device, without passing through the signature server.
- the communication means between the access device and the mobile use a proximity link.
- This proximity link may notably comply with Bluetooth, IRDA, ISO 14443 or WLAN standards.
- the invention relates to a method for controlling access to information, this access control being implemented, during an access control step, by an access device to the information.
- This process comprises:
- the invention also relates to a device for accessing information, this device comprising:
- the invention also relates to a computer program stored in a memory of an access device as mentioned above, this program comprising instructions adapted to implement:
- FIG. 1 represents an access control system according to the present invention in a first embodiment
- FIG. 2 represents an access control method implemented in the system of FIG. 1;
- FIG. 3 represents an access control system according to the present invention in a second embodiment;
- FIG. 4 represents an access control method implemented in the system of FIG. 3.
- Figures 1 and 2 respectively represent an access control system and an access control method according to the invention in a first embodiment.
- This system comprises a device 100 for accessing information, for example constituted by a demodulator connected to a cable or satellite television network.
- the access device 100 may also be constituted by a personal computer connected to the Internet network.
- This access device 100 comprises known means 140 for controlling access to information by a user and a memory 115 in which is stored a computer program P according to the invention.
- access control means 140 can in particular be used in the context of a parental control of the information (television programs) accessible to children.
- the access device 100 comprises input means 120 (keyboard, mouse, remote control, ...) making it possible to capture, during a step E20 implemented by the program of computer P, the parameters of definition of information for which one wants to control access.
- these parameters are, for example, the time and the broadcast channel of a program or set of programs. .
- these parameters can be constituted by the URL address of a Web page available on the Internet or by keywords for filtering content.
- the access device 100 comprises means not shown here, to create, during this same step E20, a message m from the aforementioned parameters.
- This message m may for example consist of a character string in which are concatenated the time and the broadcast channel of a television program ("TF1 # 20.30-22.00") and the type of modification of the rights of desired access ("prohibit", "authorize”, "restore”, ).
- the system according to the invention also comprises a signature server 200 adapted to implement a public key based signature (PKI) algorithm.
- PKI public key based signature
- the signature server 200 is the ORANGE TRUST server of the MSSP type ("Mobile Signature Service Provider") defined in the documents ETSI SCP 102.204 and ETSI SCP 102.207.
- the access device 100 and the signature server 200 respectively comprise means 130 and 210 for access to a communication network 10.
- These communication means consist, for example, of a network card and software means implementing standard protocols (HTTP, ...) or proprietary protocols on standard telecommunication networks (PSTN, ADSL, ISDN, etc.).
- the access device and the signature server 200 can exchange digital data via the network 10.
- this network 10 is constituted by the Internet network.
- the computer program P of the access device 100 sends, to the signature device 200, the message m obtained at the input step E20.
- the signature server 200 comprises means 240 for mobile communication enabling it to send and receive messages via a mobile communication network 20.
- These mobile communication means 240 consist, for example, of a hardware and software module implementing a communication protocol of GSM, GPRS or UMTS type.
- the signature server 200 is thus adapted to transmit, during a step E40, the message m to the mobile equipment 300 of a person authorized to prevent access to information by the access device 100.
- this transmission step E40 uses the SMS standard or a Push Wap type mechanism, respectively described in the documents "ETSI TS 100.901" and “WAP-251-Push Message-20010322-a.pdf".
- the mobile number 300 is communicated by the access device 100 to the signature server 200 during the aforementioned step E30 of sending the message m.
- the mobile number 300 is stored in a memory 1 10 of the access device 100, for example during a preliminary step E10 implemented by the computer program P.
- the mobile 300 performs, after receiving the message m by mobile communication means 310, the signature s of this message m, during a step E50. More specifically, upon receipt of the message m, the user of the mobile equipment 300 is invited to enter a personal code ("PIN"), this personal code unlocking the private key signature key_priv to generate the electronic signature s.
- PIN personal code
- a user's biometric data is used to unlock the private key key_priv, instead of the aforementioned personal code ("PIN").
- this signature step E50 uses a public key signature algorithm contained for example in the WIM.
- the mobile 300 includes a memory 320 in which are stored a key signature private key_priv and PIN personal code.
- the signature step E50 is followed, in this first embodiment, by a step E60 sending the signature s to the signature server 200.
- the signature server 200 includes a memory 220 storing a public key key_pub verification key associated with the key private key_priv of the mobile 300.
- the signature server 200 also comprises means 230 adapted to check the validity of the signature s using the public key key_pub.
- the signature server 200 After receiving the signature s (step E60), the signature server 200 performs a test E70, in which it checks whether the signature s is valid, that is to say if the signature was made by a user authorized to control access to the information identified by the message m. If the signature is valid, the result of the verification test E70 is positive and this test is followed by a step E80 during which the signature server 200 sends an access control command to the access device 100.
- the computer program P of the access device 100 implements, during a step E90, the access control to the information in cooperation with the aforementioned access control means 140.
- step E100 the access control method ends (step E100).
- the signature is erroneous, the result of the verification test E70 is negative and the access control method ends (step E100).
- the access device 100 does not receive an access control command, it does not implement the access control step E90 and the access rights remain unchanged.
- the input means 120 of the access device 100 comprise means for requesting the change of the number of the mobile 300 stored in the preliminary step E10 in the memory 110 of the access device 100.
- a message m 'representative of this request (for example "responsible change") is received for signature by the mobile 300 whose number was recorded during the preliminary step E10.
- the signature server 200 then sends an unlock command to the access device 100 which proposes the entry of a new mobile number.
- This second embodiment is particularly interesting when the mobile 300 is in an area that does not allow it to access the mobile network 20.
- the access device 100 and the mobile equipment 300 respectively comprise means 150 and 340 of proximity communication.
- these proximity communication means are contactless means adapted to establish a communication link in accordance with the ISO 14443 standard.
- they may be constituted by infrared, Bluetooth or USB communication modules. ...
- the message m obtained during the inputting step E20 is transmitted during a step E30 'to the mobile equipment 300 using this proximity communication link.
- This sending step E30 ' is implemented by the computer program P.
- the mobile equipment 300 On receipt of this message, the mobile equipment 300 implements the signature step E50 already described, then sends, in return, the signature s to the access device 100 during a step E60 ', using the means of communication of proximity.
- the access device 100 Upon receipt of this signature s, the access device 100 transmits, during a step E65 ', this signature to the server 200 using the network communication means 130 already described.
- the signature server 200 checks during the test E70 already described whether the signature is valid or not.
- This signature verification test E70 is followed by the steps E80 and E90 already described.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0410999 | 2004-10-18 | ||
| FR0410999 | 2004-10-18 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2006042992A2 true WO2006042992A2 (en) | 2006-04-27 |
| WO2006042992A3 WO2006042992A3 (en) | 2006-10-19 |
Family
ID=34949492
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/FR2005/050853 WO2006042992A2 (en) | 2004-10-18 | 2005-10-14 | System and method for information access control |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2006042992A2 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011110539A1 (en) * | 2010-03-08 | 2011-09-15 | Gemalto Sa | System and method for using a portable security device to cryptographically sign a document in response to signature requests from a relying party to a digital signature service |
-
2005
- 2005-10-14 WO PCT/FR2005/050853 patent/WO2006042992A2/en active Application Filing
Non-Patent Citations (2)
| Title |
|---|
| ETSI PROJECT M-COMMERCE (M-COMM): "ETSI TS 102 204 V1.1.4: Mobile Commerce (M-COMM); Mobile Signature Service; Web service interface" ETSI TECHNICAL SPECIFICATION, [Online] août 2003 (2003-08), pages 1-65, XP002313340 Extrait de l'Internet: URL:http://portal.etsi.org/docbox/EC_Files /EC_Files/ts_102204v010104p.pdf> [extrait le 2005-01-11] cité dans la demande * |
| MENEZES, OORSCHOT, VANSTONE: "HANDBOOK OF APPLIED CRYPTOGRAPHY" CRC PRESS SERIES ON DISCRETE MATHEMATICS AND ITS APPLICATIONS, 1997, XP002313341 BOCA RATON, FL, US ISBN: 0-8493-8523-7 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011110539A1 (en) * | 2010-03-08 | 2011-09-15 | Gemalto Sa | System and method for using a portable security device to cryptographically sign a document in response to signature requests from a relying party to a digital signature service |
| US9065823B2 (en) | 2010-03-08 | 2015-06-23 | Gemalto Sa | System and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying party to a digital signature service |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2006042992A3 (en) | 2006-10-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3262860B1 (en) | Automatic recognition method between a mobile device and a vehicle using the ble protocol | |
| US8165299B2 (en) | Network authentication | |
| EP1807966B1 (en) | Authentication method | |
| EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
| EP2139218A1 (en) | Method and system for managing a purchase decision taken by a purchaser using a mobile radiotelephone | |
| EP1678964B1 (en) | Authentication method and device in a telecommunication network using a portable device | |
| WO2007119032A1 (en) | Method of securing access to a proximity communication module in a mobile terminal | |
| US20040199764A1 (en) | Method for authentication of a user on access to a software-based system by means of an access medium | |
| EP3959629A1 (en) | Hardware authentication token with remote validation | |
| CN103765843A (en) | Method and apparatus for authenticating users of a hybrid terminal | |
| WO2006087438A1 (en) | Method and device for accessing a sim card housed in a mobile terminal by means of a domestic gateway | |
| EP0317400A1 (en) | Apparatus and method for securing data exchange between a teletext terminal and a host | |
| WO2002078288A1 (en) | Method, system, and end user device for identifying a sender in a network | |
| EP1190549B1 (en) | Method and system for securely accessing a computer server | |
| WO2013034865A1 (en) | Authentication method | |
| WO2006042992A2 (en) | System and method for information access control | |
| EP2159763B1 (en) | System and method for delivering a good or a service to a user | |
| WO2003003691A1 (en) | Method and device for securing communications in a computer network | |
| FR3146219A1 (en) | Method of issuing an access authorization for an individual and verification method | |
| CN116094703A (en) | VPN authentication method and device | |
| WO2012022856A1 (en) | Method of authenticating a user of the internet network | |
| FR2839832A1 (en) | Access control system for information server uses first access request, return of authentication, and second request to establish access | |
| KR20090006815A (en) | How to handle customer authentication | |
| KR20060112167A (en) | Customer authentication relay method and system, server and recording medium therefor | |
| WO2002030039A1 (en) | Method for authenticating an electronic document |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 05810638 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 05810638 Country of ref document: EP Kind code of ref document: A2 |