Method of authorizing a person, an authorizing architecture and a computer program product
First Claim
1. A method of authorizing a person, comprising the steps of:
- receiving authentication data from a personal authentication device transmitting said authentication data to a reader associated with a central authorization system;
including, by the reader, the received authentication data in a request message and transmitting, by the reader, the request message to the central authorization system;
transmitting the request message to the central authorization system via the personal authentication device and a central authentication system;
receiving the request message at the central authorization system and retrieving the authentication data from the request message;
performing an authentication process at a central authentication system using said authentication data;
executing an authorization process at the central authorization system based on the authentication process result; and
executing an authorization process at the central authorization system based on the authentication process result, wherein performing an authentication process includes generating a query message including the authentication data and transmitting the query message to the central authentication system associated with the personal authentication device, verifying the query message at the central authentication system by checking the authentication data in the query message, verifying the authentication data, generating an authorization message if the verification of the authentication data was successful and transmitting the authorization message to an actuator associated with the central authorization system.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a method for authorizing a person. The method comprises the step of receiving authentication data from a personal authentication device transmitting said data to a reader associated with a central authorization system. Further, the method comprises the steps of including the received authentication data in a request message and transmitting the request message to the central authorization system, receiving the request message at the central authorization system and retrieving the authentication data from the request message. The method also comprises the steps of performing an authentication process at a central authentication system using said reader authentication data and executing an authorization process at the central authorization system based on the authentication process result.
-
Citations
17 Claims
-
1. A method of authorizing a person, comprising the steps of:
-
receiving authentication data from a personal authentication device transmitting said authentication data to a reader associated with a central authorization system; including, by the reader, the received authentication data in a request message and transmitting, by the reader, the request message to the central authorization system; transmitting the request message to the central authorization system via the personal authentication device and a central authentication system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; executing an authorization process at the central authorization system based on the authentication process result; and executing an authorization process at the central authorization system based on the authentication process result, wherein performing an authentication process includes generating a query message including the authentication data and transmitting the query message to the central authentication system associated with the personal authentication device, verifying the query message at the central authentication system by checking the authentication data in the query message, verifying the authentication data, generating an authorization message if the verification of the authentication data was successful and transmitting the authorization message to an actuator associated with the central authorization system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An authorizing architecture, comprising a central authorization system for authorizing a person, at least one reader and at least one actuator, the reader and the actuator being associated with the central authorization system, further comprising a central authentication system communicatively connected to the central authorization system, wherein the architecture is arranged for performing the steps of:
-
receiving authentication data from a personal authentication device transmitting said authentication data to a reader associated with the central authorization system; including, by the reader, the received authentication data in a request message and transmitting the request message, by the reader, to the central authorization system via the personal authentication device and the central authentication system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; and executing an authorization process at the central authorization system based on the authentication process result, wherein executing an authentication process includes generating a query message including the authentication data and transmitting the query message to the central authentication system associated with the personal authentication device, verifying the query message at the central authentication system by checking the authentication data in the query message, verifying the authentication data, generating an authorization message if the verification of the authentication data was successful and transmitting the authorization message to an actuator associated with the central authorization system. - View Dependent Claims (16)
-
-
17. A computer program product for authorizing a person, the computer program product comprising computer readable code stored on a non-transitory computer-readable medium for causing a processor to perform the steps of:
-
receiving authentication data from a personal authentication device transmitting said authentication data to a reader associated with a central authorization system; including, at the reader, the received authentication data in a request message and transmitting the request message, by the reader, to the central authorization system via the personal authentication device and a central authentication system; receiving the request message at the central authorization system and retrieving the authentication data from the request message; performing an authentication process at a central authentication system using said authentication data; and executing an authorization process at the central authorization system based on the authentication process result, wherein executing an authentication process includes generating a query message including the authentication data and transmitting the query message to the central authentication system associated with the personal authentication device, verifying the query message at the central authentication system by checking the authentication data in the query message, verifying the authentication data, generating an authorization message if the verification of the authentication data was successful and transmitting the authorization message to an actuator associated with the central authorization system.
-
Specification