The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 27, 2016

Filed:

Mar. 25, 2015
Applicants:

Mike Bobinski, Bonn, DE;

Michael Voucko, Frankfurt, DE;

Inventors:

Mike Bobinski, Bonn, DE;

Michael Voucko, Frankfurt, DE;

Assignee:

Deutsche Post AG, Bonn, DE;

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); H04L 29/06 (2006.01); G06F 21/60 (2013.01); H04W 12/04 (2009.01); G06F 9/445 (2006.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 21/602 (2013.01); G06F 8/61 (2013.01); H04L 9/0825 (2013.01); H04L 9/0863 (2013.01); H04L 9/0894 (2013.01); H04L 63/0815 (2013.01); H04W 12/04 (2013.01); H04L 63/067 (2013.01); H04L 2463/062 (2013.01);
Abstract

A first installation stores key identifications with allocation to a respective user and a second installation stores secret keys which each can be found by means of a key identification. The first installation authenticates a user who logs onto the first installation via a user device, creates a temporary identifier, allocates the identifier to the user and transmits the identifier to the user device. The second installation receives a request for a secret key from the user device together with the identifier and requests a key identification from the first installation, wherein the received identifier is transmitted. The first installation determines a user allocated to the received identifier, identifies a key identification stored for the determined user and transmits the key identification to the second installation. This second installation determines a secret key based on the received key identification and transmits the secret key to the user device.


Find Patent Forward Citations

Loading…