Method of Authorizing a Person, an Authorizing Architecture and a Computer Program Product
First Claim
1. A method of authorizing a person, comprising the steps of:
- receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system;
including the received authentication data in a request message and transmitting the request message to the central authorization system;
receiving the request message at the central authorization system and retrieving the authentication data from the request message;
performing an authentication process at a central authentication system using said authentication data; and
executing an authorization process at the central authorization system based on the authentication process result.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method for authorizing a person. The method comprises the step of receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system. Further, the method comprises the steps of including the received authentication data in a request message and transmitting the request message to the central authorization system, receiving the request message at the central authorization system and retrieving the authentication data from the request message. The method also comprises the steps of performing an authentication process at a central authentication system using said reader authentication data and executing an authorization process at the central authorization system based on the authentication process result.
-
Citations
20 Claims
-
1. A method of authorizing a person, comprising the steps of:
-
receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system; including the received authentication data in a request message and transmitting the request message to the central authorization system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; and executing an authorization process at the central authorization system based on the authentication process result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An authorizing architecture, comprising a central authorization system for authorizing a person, at least one reader and at least one actuator, the reader and the actuator being associated with the central authorization system, further comprising a central authentication system communicatively connected to the central authorization system, wherein the architecture is arranged for performing the steps of:
-
receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system; including the received authentication data in a request message and transmitting the request message to the central authorization system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; and executing an authorization process at the central authorization system based on the authentication process result. - View Dependent Claims (19)
-
-
20. A computer program product for authorizing a person, the computer program product comprising computer readable code stored on a nontransitory computer-readable medium for causing a processor to perform the steps of:
-
receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system; including the received authentication data in a request message and transmitting the request message to the central authorization system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; and executing an authorization process at the central authorization system based on the authentication process result.
-
Specification