Method for controlling the access to a specific type of services and authentication device for controlling the access to such type of services
First Claim
1. A method for controlling access to a specific type of services among a plurality of types of services proposed by a service supplier, a type of service comprising services requiring the same access rights to access the services, the method comprising:
- entering, by an authentication device of a user, a personal identification code specific to the user, the personal identification code being identical for at least two different services of a same type of service proposed by the service supplier;
receiving by the authentication device, from said user, an indication of a specific type of services for which the access is required;
transforming said personal identification code in the authentication device, in a way depending on at least one cryptographic function specific to the user and on the required specific type of services, the cryptographic function being memorized in the authentication device;
transmitting the result of the transformation of said personal identification code to the service supplier; and
receiving, from the service provider, an access right corresponding to the required specific type of service.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and device for controlling access to a specific type of services among a plurality of type of services proposed by a service supplier. The method includes entering, into an authentication device of the user, a personal identification code specific to the user, the personal identification code being identical for at least two different types of services proposed by the service supplier; and indicating, by said user, said specific type of services for which the access is required, the indication being made in the authentication device. The method further comprises transforming said personal identification code, in a way depending on a cryptographic function specific to said user and to said required specific type of services, the cryptographic function being memorized in the authentication device; transmitting the result of the transformation of said personal identification code to the service supplier; authenticating the user by the service supplier by means of the transmitted result of said transformation, and assigning an access right according to the result of the authentication. The device implements the record.
4 Citations
20 Claims
-
1. A method for controlling access to a specific type of services among a plurality of types of services proposed by a service supplier, a type of service comprising services requiring the same access rights to access the services, the method comprising:
-
entering, by an authentication device of a user, a personal identification code specific to the user, the personal identification code being identical for at least two different services of a same type of service proposed by the service supplier; receiving by the authentication device, from said user, an indication of a specific type of services for which the access is required; transforming said personal identification code in the authentication device, in a way depending on at least one cryptographic function specific to the user and on the required specific type of services, the cryptographic function being memorized in the authentication device; transmitting the result of the transformation of said personal identification code to the service supplier; and receiving, from the service provider, an access right corresponding to the required specific type of service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An authentication device for controlling the access to a specific type of services among a plurality of types of services proposed by a service supplier, a type of services comprising the services requiring same access rights to access the services, the authentication device comprising;
-
at least a processor; a memory connected to the processor, the memory storing at least two distinct cryptographic functions; and an interface connected to the processor and configured to select at least one type of services among said plurality of types of services; wherein the processor is configured to perform one of the distinct cryptographic functions based on a selected type of service. - View Dependent Claims (17, 18, 19, 20)
-
Specification