METHOD OF TRANSFERRING ACCESS RIGHTS TO A SERVICE FROM ONE DEVICE TO ANOTHER
First Claim
Patent Images
1. A transfer method for transferring a right to access a service to a device of a borrower, the method being performed by a device of a lender, comprising:
- holding at least one access right to access a service enabling the lender'"'"'s device to access the service in accordance with said at least one access right;
obtaining authentication data associated with the borrower or with the borrower'"'"'s device;
duplicating said at least one access right;
using a cryptographic key associated with the lender'"'"'s device to calculate a cryptogram from a message containing the authentication data and said at least one duplicated access right; and
sending the cryptogram to the borrower'"'"'s device in order to transfer the duplicated access right thereto.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of transfer transferring a right to access a service from a device (2) of a lender (P) to a device (25) of a borrower (E), the method comprising:
- holding an access right to a service;
- obtaining authentication data associated with the borrower (E) or the borrower'"'"'s device (25);
- duplicating said at least one access right (D1-D2);
- using a cryptographic key associated with the device (2) of the lender (P) to calculate a cryptogram containing authentication data and duplicated rights; and
- sending the cryptogram to the device (25) of the borrower (E).
Correspondingly, the invention also provides a method of controlling access to such a service by a service provider, and also a method of managing a transfer of such access rights from the device (2) of the lender (P) to the service provider.
37 Citations
15 Claims
-
1. A transfer method for transferring a right to access a service to a device of a borrower, the method being performed by a device of a lender, comprising:
-
holding at least one access right to access a service enabling the lender'"'"'s device to access the service in accordance with said at least one access right; obtaining authentication data associated with the borrower or with the borrower'"'"'s device; duplicating said at least one access right; using a cryptographic key associated with the lender'"'"'s device to calculate a cryptogram from a message containing the authentication data and said at least one duplicated access right; and sending the cryptogram to the borrower'"'"'s device in order to transfer the duplicated access right thereto. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 15)
-
-
9. A control method for controlling access to a service, the method being performed by a service provider, comprising:
-
receiving a first cryptogram from a device of a borrower, the first cryptogram being calculated on the basis of a first cryptographic key associated with a device of a lender, said first cryptogram comprising first authentication data associated with the borrower or with the borrower'"'"'s device together with at least one access right transferred by the lender'"'"'s device to give access to a service; authenticating the first cryptogram using a second cryptographic key matching said first key in order to verify that said first cryptogram does indeed come from the lender'"'"'s device; authenticating the borrower or the borrower'"'"'s device by receiving second authentication data of the borrower or of the borrower'"'"'s device and verifying the authenticity of the borrower'"'"'s device from the first authentication data extracted from said first cryptogram and from the received second authentication data; and deciding to allow the borrower access to the service in compliance with said at least one transferred access right if, and only if, said authentication steps take place successfully. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification