WO2013127520A1 - Libération de transaction authentifiée - Google Patents

Libération de transaction authentifiée Download PDF

Info

Publication number
WO2013127520A1
WO2013127520A1 PCT/EP2013/000560 EP2013000560W WO2013127520A1 WO 2013127520 A1 WO2013127520 A1 WO 2013127520A1 EP 2013000560 W EP2013000560 W EP 2013000560W WO 2013127520 A1 WO2013127520 A1 WO 2013127520A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
transaction
authentication
electronic
document
Prior art date
Application number
PCT/EP2013/000560
Other languages
German (de)
English (en)
Inventor
Helmut Scherzer
Hermann Sterzinger
Original Assignee
Giesecke & Devrient Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke & Devrient Gmbh filed Critical Giesecke & Devrient Gmbh
Priority to EP13707816.8A priority Critical patent/EP2820600A1/fr
Publication of WO2013127520A1 publication Critical patent/WO2013127520A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Definitions

  • the invention relates to a method for the authenticated release of an electronic transaction.
  • a transaction record is provided and displayed on the PC or terminal, through which the transaction is described.
  • the transaction record includes, for example, a destination account to which a monetary amount is to be transferred and the amount of money to be transferred.
  • the user checks the displayed transaction record and makes an input on approval at the PC or terminal, whereby the transaction is confirmed.
  • EP 0 986 275 B1 describes a transaction method for delivery from a service provider to a customer in which order data containing a monetary amount is transmitted to a validation platform by way of short messages and verification of the order data by the validation platform the amount of money is deducted from a cash account of the customer and transferred to a money account of the service provider.
  • authentication is generally additionally required, for example by entering a PIN (personal identification number) or TAN (transaction number) on the PC or terminal.
  • PIN personal identification number
  • TAN transaction number
  • a PIN must be remembered by the user and is therefore often forgotten or handled lightly, e.g. spotted out.
  • the use of a TAN for authentication is much more secure than a PIN.
  • the management of a reliable TAN system is complex.
  • DE 10 2005 003 647 A1 discloses an identification system in which the electronic memory of an electronic identification document (e.g., electronic passport) is accessed by means of a separate authorization document, e.g. an additional card with authorization data.
  • Electronic identification documents such as electronic passports or electronic identity cards such as the new German ID card, have a chip and a contactless interface (e.g., NFC antenna) through which electronic communication with the chip is possible.
  • ARM Trustzone Architecture Under the name ARM Trustzone Architecture a two-part runtime architecture of the company ARM for a microprocessor system is known, which includes two run time environments. A first, “Normal Zone” or “Normal World” called insecure runtime environment is by a Nor- mal operating system controlled. A second "trust zone” or “trusted world” or “secure world” secure or trusted runtime environment is controlled by a security operating system The normal operating system may be, for example, a common operating system such as Android, Windows Phone, Symbian or the like.
  • a security operating system for chips to be implemented in mobile terminals is manufactured and sold under the trade name MOBICORE.
  • WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card for wireless operation and additionally a certificate chip card for transaction confirmation for payment transactions.
  • the certificate chip card contains identification data with which a certificate personalized to a user can be created.
  • an encrypted and signed data packet is generated from transaction data and sent with the mobile phone to a clearing center. This will release the transaction.
  • WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card for wireless operation and additionally a certificate chip card for transaction confirmation for payment transactions.
  • the certificate chip card contains identification data with which a certificate personalized to a user can be created.
  • an encrypted and signed data packet is generated from transaction data and sent with the mobile phone to a clearing center. This will release the transaction.
  • WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card
  • AI manipulation security is sought by the fact that the certification card is contact-based operated directly in the terminal.
  • the invention is based on the object of providing a user-friendly, universally applicable and reliable method for the authenticated release of an electronic transaction.
  • the object is achieved by a method according to claim 1.
  • Advantageous embodiments of the invention are specified in the dependent claims.
  • the inventive method is provided for authenticated release of an electronic transaction.
  • the transaction is completely or partially marked by a transaction record.
  • the transaction record can be complete from the beginning or can be supplemented or extended during the course of the procedure (see below).
  • the transaction is released by means of an electronic terminal to a transaction partner computer, eg a transaction server, which stands for example at a bank or a clearing center or the like.
  • a transaction partner computer eg a transaction server, which stands for example at a bank or a clearing center or the like.
  • the method provides: a transaction record obtained from the transaction partner at the terminal; requested a release of the transaction at the terminal; and at the terminal an authentication date accepted for authentication and causes the authenticated release of the transaction by the authentication date is provided for forwarding to the transaction partner.
  • the authentication date is finally forwarded to the transaction partner, eg transaction server, and usually the transaction record as well.
  • the transaction server performs the transaction or at least initiates the transaction.
  • the method is characterized in that the authentication date is provided in electronic form to the terminal via an electronic connection from a separate from the terminal, structurally independent of the terminal electronic authentication document, which is paired with the terminal.
  • the authentication document and the end device are paired with each other so that the release of the transaction is possible with a paired with the terminal authentication document and that the release of the transaction with an unpaired with the terminal authentication document is not possible.
  • the release of the transaction is secured by an authentication.
  • the authentication document can be operated independently of the terminal, the terminal and the authentication document do not have to be structurally coordinated with one another, as is required, for example, as in the solution from WO 2004/053807 A1.
  • the pairing between the terminal and the authentication document ensures that, despite the independence between the terminal and the authentication document, potentially manipulated, unauthorized authentication documents do not receive any releasing access to the terminal. The user of the terminal and authentication document thus retains the power to release the transaction.
  • the method of claim 1 is considerably more user friendly.
  • a user-friendly, universally applicable and reliable method for the authenticated release of an electronic transaction is provided.
  • a transaction partner computer instead of the already explicitly mentioned transaction server alternatively another / further mobile device may be provided, the transaction confirmation is thus carried out via a peer-to-peer connection between basically equal mobile devices as transaction partners.
  • the pairing is achieved, for example, by storing a characteristic date for the authentication document in the terminal.
  • the pairing is generated, for example, in an upstream initialization step, in which the characteristic date from the authentication document is stored in the terminal.
  • the characteristic date for example, a unique serial number of the authentication document or the like is used, or a (cryptographic) check sum over such a serial number or the like.
  • the ID card number or a (cryptographic) checksum via the ID card number is used as the characteristic date.
  • a checksum is used and not the serial number or identity card number in plain text.
  • the mobile device in a secure environment performs a certificate exchange with the ID card and thus is able to build only with this later a secure channel.
  • the release for such an exchange can be made by entering a PIN with identity card (once).
  • a cryptographic signature generated via the transaction data record is optionally used as the authentication date.
  • the authentication date is generated in the authentication document.
  • a cryptographic signature on the transaction record is more accurately generated as an authentication date.
  • a contactless connection in particular NFC connection, is used as the electronic connection.
  • the transaction data record is transmitted via the electronic connection from the terminal to the authentication document.
  • the generated authentication date eg the signature
  • the transmitted transaction record is stored in the authentication document, optionally volatile, e.g. only to generate the authentication date, e.g. Signature, optional non-volatile.
  • Non-volatile storage makes it possible to continue the transaction later after a temporary failure of the power supply to the terminal.
  • the transaction record stored in the authentication document is deleted from the authentication document again after the authentication date has been provided from the authentication document to the terminal.
  • the authentication date, e.g. Signature also stored in the authentication document (non-volatile) and deleted after transmission to the terminal again.
  • Non-volatile storage and again deletion of transaction data record and authentication date (for example signature) in the authentication document after transmission to the terminal makes the method particularly suitable for ticketing.
  • the deletion corresponds to a validation of the ticket.
  • an electronic identification document is used as the authentication document, in particular an electronic identity card or passport, in particular with a microprocessor and signature function. place, such as the so-called new German identity card nPA.
  • An electronic identification document, in particular identity card is particularly preferred as an authentication document, since the user usually carries it with him anyway.
  • an authentication document in the form of an identification document makes it possible to simply supplement the transaction data record with additional data (see below) in order to facilitate the handling for the user.
  • the transaction record is extended or supplemented by additional data stored in the authentication document.
  • the addition can be made either in the terminal or in Authentif ikations punct.
  • the additional data is transmitted to the terminal and the transaction record in the terminal is supplemented or extended.
  • the transaction data record is transmitted to the authentication document without the additional data and the supplement or extension is carried out there.
  • person-specific data such as e.g. Name and address of the transaction participant to be released, which releases the transaction.
  • an electronic identification document of the releasing transaction participant is provided as the authentication document, this already contains its name and address. Additional data such as Name and address can therefore be automatically included in the transaction record.
  • the terminal is optionally selected from the group of terminals comprising: mobile terminal including in particular mobile phone, smart phone; Computers, in particular desktop computers, notebooks, netbooks; Tablet PC with or without mobile phone interface.
  • mobile terminal including in particular mobile phone, smart phone; Computers, in particular desktop computers, notebooks, netbooks; Tablet PC with or without mobile phone interface.
  • a mobile terminal such as
  • the terminal optionally comprises a secure runtime environment, for example, in a mobile terminal, the trust zone of a Mobicore security operating system of the Applicant of the present patent application.
  • the electronic connection between the authentication document and the terminal is operated at the terminal in the secure runtime environment. This ensures that the pairing remains set to the selected authentication document and can not or can not easily be changed to another authentication document.
  • a payment transaction is provided as a transaction, wherein the transaction record comprises at least one payee and / or one payment amount.
  • a vote reconciliation transaction wherein the transaction record comprises at least one selected election proposal to be elected.
  • the pairing between the terminal and the authentication document is optionally further checked and the release of the transaction is prevented or aborted if, according to the check, the terminal and the authentication document are not paired with one another. This situation can occur if a wrong authentication document or device is used.
  • a user input is accepted at the terminal.
  • the transaction (eg ticket) is transferred to a server (eg the service provider) to use the nPA (authentication document) for identification of the stored transaction in a subsequent verification and failed mobile device (battery empty) and thus a verification to perform the transaction despite a failed mobile device.
  • a server eg the service provider
  • nPA authentication document
  • the method is thus designed in two stages.
  • transaction data of a transaction data record is displayed on the terminal, and a user confirms by an input on the terminal the transaction data displayed on the terminal, for example by keyboard input or input on a touch pad or touch screen display.
  • the authentication date is operated via an electronic connection from a terminal that can be operated independently of the terminal. ren electronic authentication document, which is paired with the terminal, provided in electronic form to the terminal.
  • the authentication date is provided from the electronic authentication document to the terminal that the authentication document is approximated to the terminal, in particular in accordance with a predetermined movement pattern (Gesture) is approximated to the terminal.
  • a confirmation of the transaction data record can be effected by user input in order to prevent unwanted confirmation of transac- tion occurring as a result of a random approach of the authentication document (for example identity card).
  • the user approaches the authentication document to the terminal.
  • the transaction record which is optionally supplemented or extended by additional data, is transmitted from the terminal to the authentication document for signature generation and / or optionally supplemented or extended in the authentication document with additional data.
  • the cryptographic signature is generated in the authentication document.
  • the signature generated in the authentication document is transmitted back to the terminal.
  • a necessary opening mechanism (eg PIN) for the authentication document (eg nPA) can be securely stored on the mobile phone so that a PIN entry required for accessing the authentication document (eg nPA) may not have to be explicitly performed by the user, but instead If necessary, the PIN is transmitted directly, without user intervention, from the mobile phone to the authentication document.
  • FIG. 1 shows a system for illustrating the invention, with a mobile terminal, an electronic identity card and a transaction server;
  • FIG. 2 is a flowchart of a transaction release transaction according to an embodiment of the invention.
  • Fig. 1 shows a system for illustrating the invention, with a mobile terminal 10, an electronic identity card 20 as an authentication document 20 and a transaction server 30.
  • a characteristic date xybf of the holder of the identity card 20 is stored in the electronic identity card 20 .
  • the characteristic date xybf has been stored in an initialization step in the terminal 10 to authorize the transaction release ID card 20 on the mobile terminal 10.
  • the characteristic date xybf can be, for example, the identity card number of the identity card 20, alternatively a certificate of the nPA, or the date of birth of the owner, optionally in combination. with its name, or the like.
  • the characteristic date xybf is preferably unique, therefore, the unique identity card number or the nPA certificate is particularly suitable.
  • FIG. 2 shows a flowchart of a transaction release transaction according to an embodiment of the invention.
  • a mobile terminal 10 with a Mobicore security operating system which includes a secure runtime environment (Trustzone), and with touch-screen display and NFC interface is to be used to pay for a bill according to a transaction record.
  • the transaction record includes a payee and a payable amount to pay.
  • a transaction form is filled out of the trust zone with the transaction data record.
  • the completed transaction form is stored in a transaction memory in the Mobicore Trustzone in the terminal 10.
  • the transaction record is displayed on the display of the terminal 10 so that the terminal user can check the transaction record. 5. If the terminal user does not agree, he does not continue and thus ends the payment process. If the terminal user agrees with the displayed transaction record, he presses an "OK" - touch button, which is displayed on the terminal display.
  • the terminal user approaches his nPA 20, which is paired with the terminal 10, to the terminal 10 to 10 in the NFC detection range of
  • the nPA 20 is activated upon approach by the terminal 10. 8. A secure NFC end-to-end connection between the terminal 10 Mobicore Trustzone and the nPA 20 is established. Optionally, the terminal automatically transmits the PIN of the nPA stored in the trust zone to the nPA.
  • the nPA 20 forms a checksum on the identity card number stored in the nPA and transmits the formed checksum via the secure NFC end-to-end connection to the terminal 10.
  • the transmitted check sum is matched to a value stored in the trust zone Checksum checked.
  • additional data in particular the name and address of the user, are transmitted from the nPA 20 to the terminal 10.
  • the transaction record is supplemented with the additional data.
  • the user must, e.g. Do not enter your name and address manually.
  • the completed transaction record is transmitted to the nPA 20 via the end-to-end connection.
  • the transaction record may be first transferred to the nPA 20 and then supplemented in the nPA 20 with the additional data.
  • the nPA 20 which has a microprocessor, forms a cryptographic signature over the supplemented transaction record. 16. The nPA 20 sends at least the signature, alternatively also the supplemented transaction record, via the secure end-to-end NFC connection to the terminal 10.
  • the terminal 10 sends the completed transaction record and the signature over it over the mobile network to the transaction server 30.
  • Transaction server 30 initiates payment according to the supplemented transaction record.
  • the invention has been described using the example of a payment transaction.
  • the invention is analogously applicable to a eVoting-
  • an election proposal is used as the transaction record to be supplemented.
  • the user supplements the transaction record by his choice, e.g., "YES” or "NO” or a selection of two or more options, optionally by ticking on the terminal display, and optionally by additional data from his nPA, e.g. Name and adress.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un procédé de libération authentifiée d'une transaction électronique caractérisée en intégralité ou en partie par un ensemble de données de transaction, au moyen d'un terminal électronique par rapport à un partenaire de transaction, par ex. un serveur. Selon le procédé, une donnée d'authentification issue d'un document d'authentification électronique, apparié avec le terminal, pouvant être exploité indépendamment du terminal, est fournie sous forme électronique au terminal au moyen d'une connexion électronique.
PCT/EP2013/000560 2012-02-28 2013-02-26 Libération de transaction authentifiée WO2013127520A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP13707816.8A EP2820600A1 (fr) 2012-02-28 2013-02-26 Libération de transaction authentifiée

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102012003885 2012-02-28
DE102012003885.2 2012-02-28

Publications (1)

Publication Number Publication Date
WO2013127520A1 true WO2013127520A1 (fr) 2013-09-06

Family

ID=47833024

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/000560 WO2013127520A1 (fr) 2012-02-28 2013-02-26 Libération de transaction authentifiée

Country Status (2)

Country Link
EP (1) EP2820600A1 (fr)
WO (1) WO2013127520A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013021935A1 (de) * 2013-12-20 2015-06-25 Giesecke & Devrient Gmbh Verfahren und Vorrichtungen zum Verwenden eines Sicherheitselements mit einem mobilen Endgerät
CN112330447A (zh) * 2018-01-19 2021-02-05 创新先进技术有限公司 资金流转方法及装置、电子设备

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087867A1 (en) * 2000-11-28 2002-07-04 Oberle Robert R. RF ID card
GB2396472A (en) * 2002-12-18 2004-06-23 Ncr Int Inc System for cash withdrawal
WO2004053807A1 (fr) 2002-12-06 2004-06-24 Deutsche Telekom Ag Systeme de paiement au moyen d'un radiotelephone
DE102005003647A1 (de) 2005-01-26 2006-08-17 Giesecke & Devrient Gmbh Identifizierungssystem
WO2008017643A1 (fr) * 2006-08-11 2008-02-14 Bundesdruckerei Gmbh Lecteur pour un document, procédé de lecture d'un objet de données et produit de programme informatique
US20090143104A1 (en) * 2007-09-21 2009-06-04 Michael Loh Wireless smart card and integrated personal area network, near field communication and contactless payment system
EP0986275B1 (fr) 1998-09-10 2009-09-09 Swisscom AG Procédé pour acheter des articles ou des services avec un téléphone mobile
EP2182493A1 (fr) * 2008-11-04 2010-05-05 Gemalto SA Authentification d'utilisateur à distance utilisant NFC
WO2011004339A1 (fr) * 2009-07-08 2011-01-13 Logomotion, S.R.O. Procédé et système d'authentification sans contact, et élément porteur de code pin
GB2476989A (en) * 2010-01-19 2011-07-20 Proxama Ltd Activation of secure function in mobile computing device using authentication tag

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SK50042008A3 (sk) * 2008-01-04 2009-09-07 Logomotion, S. R. O. Spôsob a systém autentifikácie najmä pri platbách, identifikátor totožnosti a/alebo súhlasu
US8112066B2 (en) * 2009-06-22 2012-02-07 Mourad Ben Ayed System for NFC authentication based on BLUETOOTH proximity
DE102010030590A1 (de) * 2010-06-28 2011-12-29 Bundesdruckerei Gmbh Verfahren zur Erzeugung eines Zertifikats

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0986275B1 (fr) 1998-09-10 2009-09-09 Swisscom AG Procédé pour acheter des articles ou des services avec un téléphone mobile
US20020087867A1 (en) * 2000-11-28 2002-07-04 Oberle Robert R. RF ID card
WO2004053807A1 (fr) 2002-12-06 2004-06-24 Deutsche Telekom Ag Systeme de paiement au moyen d'un radiotelephone
GB2396472A (en) * 2002-12-18 2004-06-23 Ncr Int Inc System for cash withdrawal
DE102005003647A1 (de) 2005-01-26 2006-08-17 Giesecke & Devrient Gmbh Identifizierungssystem
WO2008017643A1 (fr) * 2006-08-11 2008-02-14 Bundesdruckerei Gmbh Lecteur pour un document, procédé de lecture d'un objet de données et produit de programme informatique
US20090143104A1 (en) * 2007-09-21 2009-06-04 Michael Loh Wireless smart card and integrated personal area network, near field communication and contactless payment system
EP2182493A1 (fr) * 2008-11-04 2010-05-05 Gemalto SA Authentification d'utilisateur à distance utilisant NFC
WO2011004339A1 (fr) * 2009-07-08 2011-01-13 Logomotion, S.R.O. Procédé et système d'authentification sans contact, et élément porteur de code pin
GB2476989A (en) * 2010-01-19 2011-07-20 Proxama Ltd Activation of secure function in mobile computing device using authentication tag

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2820600A1 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013021935A1 (de) * 2013-12-20 2015-06-25 Giesecke & Devrient Gmbh Verfahren und Vorrichtungen zum Verwenden eines Sicherheitselements mit einem mobilen Endgerät
CN112330447A (zh) * 2018-01-19 2021-02-05 创新先进技术有限公司 资金流转方法及装置、电子设备

Also Published As

Publication number Publication date
EP2820600A1 (fr) 2015-01-07

Similar Documents

Publication Publication Date Title
WO2016192842A1 (fr) Terminal et procédé de paiement mobile dans un environnement d'exécution sécurisé
WO2018114654A1 (fr) Système de paiement hors ligne en argent électronique avec un appareil mobile avec un temps de transaction et un règlement de clôture courts
DE10296888T5 (de) System und Verfahren zur sicheren Eingabe und Authentifikation von verbraucherzentrierter Information
EP2080147B1 (fr) Procédé pour l'exécution d'une application à l'aide d'un support de données portable
EP2715684A1 (fr) Système électronique destiné à réaliser, rapidement et dans de bonnes conditions de sécurité, des transactions au moyen d'appareils mobiles
WO2013067561A1 (fr) Procédé et dispositif pour effectuer des paiements scripturaux
DE102011116489A1 (de) Mobiles Endgerät, Transaktionsterminal und Verfahren zur Durchführung einer Transaktion an einem Transaktionsterminal mittels eines mobilen Endgeräts
DE102017122799A1 (de) Verfahren und Anordnung zur Übermittlung von Transaktionsdaten unter Nutzung eines öffentlichen Datennetzes
EP3811584A1 (fr) Carte à puce en tant que jeton de sécurité
EP3428866A2 (fr) Dispositif de transmission et de traitement de données et procédé de transmission et de traitement de données destinés au paiement d'une marchandise ou d'un service
WO2013011043A1 (fr) Système mobile pour transactions financières
CN105956839A (zh) 应用于智能家居平台的支付方法和装置
WO2013127520A1 (fr) Libération de transaction authentifiée
WO2014206660A1 (fr) Procédé de transaction électronique et système informatique
EP3271855B1 (fr) Procédé de génération d'un certificat pour un jeton de sécurité
EP2916252B1 (fr) Procédé de transaction électronique et système informatique
DE102013212646A1 (de) Elektronisches Transaktionsverfahren und Computersystem
DE102010036037A1 (de) Verfahren zur Durchführung bargeldioser Zahlungstransaktionen und Transaktionsystem zur Durchführung des Verfahrens
DE102008047639A1 (de) Verfahren und Vorrichtung zum Zugriff auf ein maschinenlesbares Dokument
EP3561753A1 (fr) Procédé de transfert et de traitement de données et dispositif correspondant
EP2696319B1 (fr) Procédé d'autorisation d'une transaction
DE102013022434B3 (de) Elektronisches Transaktionsverfahren und Computersystem
WO2023046237A1 (fr) Procédé d'échange numérique d'informations
EP2840757B1 (fr) Administration individuelle et centrale des cartes de puce
DE102011077770A1 (de) Bezahlsystem zur Bezahlung von Waren und Dienstleistungen sowie Verfahren hierfür

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13707816

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2013707816

Country of ref document: EP