WO2013127520A1 - Libération de transaction authentifiée - Google Patents
Libération de transaction authentifiée Download PDFInfo
- Publication number
- WO2013127520A1 WO2013127520A1 PCT/EP2013/000560 EP2013000560W WO2013127520A1 WO 2013127520 A1 WO2013127520 A1 WO 2013127520A1 EP 2013000560 W EP2013000560 W EP 2013000560W WO 2013127520 A1 WO2013127520 A1 WO 2013127520A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- transaction
- authentication
- electronic
- document
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/352—Contactless payments by cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
Definitions
- the invention relates to a method for the authenticated release of an electronic transaction.
- a transaction record is provided and displayed on the PC or terminal, through which the transaction is described.
- the transaction record includes, for example, a destination account to which a monetary amount is to be transferred and the amount of money to be transferred.
- the user checks the displayed transaction record and makes an input on approval at the PC or terminal, whereby the transaction is confirmed.
- EP 0 986 275 B1 describes a transaction method for delivery from a service provider to a customer in which order data containing a monetary amount is transmitted to a validation platform by way of short messages and verification of the order data by the validation platform the amount of money is deducted from a cash account of the customer and transferred to a money account of the service provider.
- authentication is generally additionally required, for example by entering a PIN (personal identification number) or TAN (transaction number) on the PC or terminal.
- PIN personal identification number
- TAN transaction number
- a PIN must be remembered by the user and is therefore often forgotten or handled lightly, e.g. spotted out.
- the use of a TAN for authentication is much more secure than a PIN.
- the management of a reliable TAN system is complex.
- DE 10 2005 003 647 A1 discloses an identification system in which the electronic memory of an electronic identification document (e.g., electronic passport) is accessed by means of a separate authorization document, e.g. an additional card with authorization data.
- Electronic identification documents such as electronic passports or electronic identity cards such as the new German ID card, have a chip and a contactless interface (e.g., NFC antenna) through which electronic communication with the chip is possible.
- ARM Trustzone Architecture Under the name ARM Trustzone Architecture a two-part runtime architecture of the company ARM for a microprocessor system is known, which includes two run time environments. A first, “Normal Zone” or “Normal World” called insecure runtime environment is by a Nor- mal operating system controlled. A second "trust zone” or “trusted world” or “secure world” secure or trusted runtime environment is controlled by a security operating system The normal operating system may be, for example, a common operating system such as Android, Windows Phone, Symbian or the like.
- a security operating system for chips to be implemented in mobile terminals is manufactured and sold under the trade name MOBICORE.
- WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card for wireless operation and additionally a certificate chip card for transaction confirmation for payment transactions.
- the certificate chip card contains identification data with which a certificate personalized to a user can be created.
- an encrypted and signed data packet is generated from transaction data and sent with the mobile phone to a clearing center. This will release the transaction.
- WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card for wireless operation and additionally a certificate chip card for transaction confirmation for payment transactions.
- the certificate chip card contains identification data with which a certificate personalized to a user can be created.
- an encrypted and signed data packet is generated from transaction data and sent with the mobile phone to a clearing center. This will release the transaction.
- WO 2004/053807 AI describes a payment system by means of a dual-slot mobile phone with two smart cards, namely a conventional SIM card
- AI manipulation security is sought by the fact that the certification card is contact-based operated directly in the terminal.
- the invention is based on the object of providing a user-friendly, universally applicable and reliable method for the authenticated release of an electronic transaction.
- the object is achieved by a method according to claim 1.
- Advantageous embodiments of the invention are specified in the dependent claims.
- the inventive method is provided for authenticated release of an electronic transaction.
- the transaction is completely or partially marked by a transaction record.
- the transaction record can be complete from the beginning or can be supplemented or extended during the course of the procedure (see below).
- the transaction is released by means of an electronic terminal to a transaction partner computer, eg a transaction server, which stands for example at a bank or a clearing center or the like.
- a transaction partner computer eg a transaction server, which stands for example at a bank or a clearing center or the like.
- the method provides: a transaction record obtained from the transaction partner at the terminal; requested a release of the transaction at the terminal; and at the terminal an authentication date accepted for authentication and causes the authenticated release of the transaction by the authentication date is provided for forwarding to the transaction partner.
- the authentication date is finally forwarded to the transaction partner, eg transaction server, and usually the transaction record as well.
- the transaction server performs the transaction or at least initiates the transaction.
- the method is characterized in that the authentication date is provided in electronic form to the terminal via an electronic connection from a separate from the terminal, structurally independent of the terminal electronic authentication document, which is paired with the terminal.
- the authentication document and the end device are paired with each other so that the release of the transaction is possible with a paired with the terminal authentication document and that the release of the transaction with an unpaired with the terminal authentication document is not possible.
- the release of the transaction is secured by an authentication.
- the authentication document can be operated independently of the terminal, the terminal and the authentication document do not have to be structurally coordinated with one another, as is required, for example, as in the solution from WO 2004/053807 A1.
- the pairing between the terminal and the authentication document ensures that, despite the independence between the terminal and the authentication document, potentially manipulated, unauthorized authentication documents do not receive any releasing access to the terminal. The user of the terminal and authentication document thus retains the power to release the transaction.
- the method of claim 1 is considerably more user friendly.
- a user-friendly, universally applicable and reliable method for the authenticated release of an electronic transaction is provided.
- a transaction partner computer instead of the already explicitly mentioned transaction server alternatively another / further mobile device may be provided, the transaction confirmation is thus carried out via a peer-to-peer connection between basically equal mobile devices as transaction partners.
- the pairing is achieved, for example, by storing a characteristic date for the authentication document in the terminal.
- the pairing is generated, for example, in an upstream initialization step, in which the characteristic date from the authentication document is stored in the terminal.
- the characteristic date for example, a unique serial number of the authentication document or the like is used, or a (cryptographic) check sum over such a serial number or the like.
- the ID card number or a (cryptographic) checksum via the ID card number is used as the characteristic date.
- a checksum is used and not the serial number or identity card number in plain text.
- the mobile device in a secure environment performs a certificate exchange with the ID card and thus is able to build only with this later a secure channel.
- the release for such an exchange can be made by entering a PIN with identity card (once).
- a cryptographic signature generated via the transaction data record is optionally used as the authentication date.
- the authentication date is generated in the authentication document.
- a cryptographic signature on the transaction record is more accurately generated as an authentication date.
- a contactless connection in particular NFC connection, is used as the electronic connection.
- the transaction data record is transmitted via the electronic connection from the terminal to the authentication document.
- the generated authentication date eg the signature
- the transmitted transaction record is stored in the authentication document, optionally volatile, e.g. only to generate the authentication date, e.g. Signature, optional non-volatile.
- Non-volatile storage makes it possible to continue the transaction later after a temporary failure of the power supply to the terminal.
- the transaction record stored in the authentication document is deleted from the authentication document again after the authentication date has been provided from the authentication document to the terminal.
- the authentication date, e.g. Signature also stored in the authentication document (non-volatile) and deleted after transmission to the terminal again.
- Non-volatile storage and again deletion of transaction data record and authentication date (for example signature) in the authentication document after transmission to the terminal makes the method particularly suitable for ticketing.
- the deletion corresponds to a validation of the ticket.
- an electronic identification document is used as the authentication document, in particular an electronic identity card or passport, in particular with a microprocessor and signature function. place, such as the so-called new German identity card nPA.
- An electronic identification document, in particular identity card is particularly preferred as an authentication document, since the user usually carries it with him anyway.
- an authentication document in the form of an identification document makes it possible to simply supplement the transaction data record with additional data (see below) in order to facilitate the handling for the user.
- the transaction record is extended or supplemented by additional data stored in the authentication document.
- the addition can be made either in the terminal or in Authentif ikations punct.
- the additional data is transmitted to the terminal and the transaction record in the terminal is supplemented or extended.
- the transaction data record is transmitted to the authentication document without the additional data and the supplement or extension is carried out there.
- person-specific data such as e.g. Name and address of the transaction participant to be released, which releases the transaction.
- an electronic identification document of the releasing transaction participant is provided as the authentication document, this already contains its name and address. Additional data such as Name and address can therefore be automatically included in the transaction record.
- the terminal is optionally selected from the group of terminals comprising: mobile terminal including in particular mobile phone, smart phone; Computers, in particular desktop computers, notebooks, netbooks; Tablet PC with or without mobile phone interface.
- mobile terminal including in particular mobile phone, smart phone; Computers, in particular desktop computers, notebooks, netbooks; Tablet PC with or without mobile phone interface.
- a mobile terminal such as
- the terminal optionally comprises a secure runtime environment, for example, in a mobile terminal, the trust zone of a Mobicore security operating system of the Applicant of the present patent application.
- the electronic connection between the authentication document and the terminal is operated at the terminal in the secure runtime environment. This ensures that the pairing remains set to the selected authentication document and can not or can not easily be changed to another authentication document.
- a payment transaction is provided as a transaction, wherein the transaction record comprises at least one payee and / or one payment amount.
- a vote reconciliation transaction wherein the transaction record comprises at least one selected election proposal to be elected.
- the pairing between the terminal and the authentication document is optionally further checked and the release of the transaction is prevented or aborted if, according to the check, the terminal and the authentication document are not paired with one another. This situation can occur if a wrong authentication document or device is used.
- a user input is accepted at the terminal.
- the transaction (eg ticket) is transferred to a server (eg the service provider) to use the nPA (authentication document) for identification of the stored transaction in a subsequent verification and failed mobile device (battery empty) and thus a verification to perform the transaction despite a failed mobile device.
- a server eg the service provider
- nPA authentication document
- the method is thus designed in two stages.
- transaction data of a transaction data record is displayed on the terminal, and a user confirms by an input on the terminal the transaction data displayed on the terminal, for example by keyboard input or input on a touch pad or touch screen display.
- the authentication date is operated via an electronic connection from a terminal that can be operated independently of the terminal. ren electronic authentication document, which is paired with the terminal, provided in electronic form to the terminal.
- the authentication date is provided from the electronic authentication document to the terminal that the authentication document is approximated to the terminal, in particular in accordance with a predetermined movement pattern (Gesture) is approximated to the terminal.
- a confirmation of the transaction data record can be effected by user input in order to prevent unwanted confirmation of transac- tion occurring as a result of a random approach of the authentication document (for example identity card).
- the user approaches the authentication document to the terminal.
- the transaction record which is optionally supplemented or extended by additional data, is transmitted from the terminal to the authentication document for signature generation and / or optionally supplemented or extended in the authentication document with additional data.
- the cryptographic signature is generated in the authentication document.
- the signature generated in the authentication document is transmitted back to the terminal.
- a necessary opening mechanism (eg PIN) for the authentication document (eg nPA) can be securely stored on the mobile phone so that a PIN entry required for accessing the authentication document (eg nPA) may not have to be explicitly performed by the user, but instead If necessary, the PIN is transmitted directly, without user intervention, from the mobile phone to the authentication document.
- FIG. 1 shows a system for illustrating the invention, with a mobile terminal, an electronic identity card and a transaction server;
- FIG. 2 is a flowchart of a transaction release transaction according to an embodiment of the invention.
- Fig. 1 shows a system for illustrating the invention, with a mobile terminal 10, an electronic identity card 20 as an authentication document 20 and a transaction server 30.
- a characteristic date xybf of the holder of the identity card 20 is stored in the electronic identity card 20 .
- the characteristic date xybf has been stored in an initialization step in the terminal 10 to authorize the transaction release ID card 20 on the mobile terminal 10.
- the characteristic date xybf can be, for example, the identity card number of the identity card 20, alternatively a certificate of the nPA, or the date of birth of the owner, optionally in combination. with its name, or the like.
- the characteristic date xybf is preferably unique, therefore, the unique identity card number or the nPA certificate is particularly suitable.
- FIG. 2 shows a flowchart of a transaction release transaction according to an embodiment of the invention.
- a mobile terminal 10 with a Mobicore security operating system which includes a secure runtime environment (Trustzone), and with touch-screen display and NFC interface is to be used to pay for a bill according to a transaction record.
- the transaction record includes a payee and a payable amount to pay.
- a transaction form is filled out of the trust zone with the transaction data record.
- the completed transaction form is stored in a transaction memory in the Mobicore Trustzone in the terminal 10.
- the transaction record is displayed on the display of the terminal 10 so that the terminal user can check the transaction record. 5. If the terminal user does not agree, he does not continue and thus ends the payment process. If the terminal user agrees with the displayed transaction record, he presses an "OK" - touch button, which is displayed on the terminal display.
- the terminal user approaches his nPA 20, which is paired with the terminal 10, to the terminal 10 to 10 in the NFC detection range of
- the nPA 20 is activated upon approach by the terminal 10. 8. A secure NFC end-to-end connection between the terminal 10 Mobicore Trustzone and the nPA 20 is established. Optionally, the terminal automatically transmits the PIN of the nPA stored in the trust zone to the nPA.
- the nPA 20 forms a checksum on the identity card number stored in the nPA and transmits the formed checksum via the secure NFC end-to-end connection to the terminal 10.
- the transmitted check sum is matched to a value stored in the trust zone Checksum checked.
- additional data in particular the name and address of the user, are transmitted from the nPA 20 to the terminal 10.
- the transaction record is supplemented with the additional data.
- the user must, e.g. Do not enter your name and address manually.
- the completed transaction record is transmitted to the nPA 20 via the end-to-end connection.
- the transaction record may be first transferred to the nPA 20 and then supplemented in the nPA 20 with the additional data.
- the nPA 20 which has a microprocessor, forms a cryptographic signature over the supplemented transaction record. 16. The nPA 20 sends at least the signature, alternatively also the supplemented transaction record, via the secure end-to-end NFC connection to the terminal 10.
- the terminal 10 sends the completed transaction record and the signature over it over the mobile network to the transaction server 30.
- Transaction server 30 initiates payment according to the supplemented transaction record.
- the invention has been described using the example of a payment transaction.
- the invention is analogously applicable to a eVoting-
- an election proposal is used as the transaction record to be supplemented.
- the user supplements the transaction record by his choice, e.g., "YES” or "NO” or a selection of two or more options, optionally by ticking on the terminal display, and optionally by additional data from his nPA, e.g. Name and adress.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
L'invention concerne un procédé de libération authentifiée d'une transaction électronique caractérisée en intégralité ou en partie par un ensemble de données de transaction, au moyen d'un terminal électronique par rapport à un partenaire de transaction, par ex. un serveur. Selon le procédé, une donnée d'authentification issue d'un document d'authentification électronique, apparié avec le terminal, pouvant être exploité indépendamment du terminal, est fournie sous forme électronique au terminal au moyen d'une connexion électronique.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13707816.8A EP2820600A1 (fr) | 2012-02-28 | 2013-02-26 | Libération de transaction authentifiée |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102012003885 | 2012-02-28 | ||
DE102012003885.2 | 2012-02-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013127520A1 true WO2013127520A1 (fr) | 2013-09-06 |
Family
ID=47833024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2013/000560 WO2013127520A1 (fr) | 2012-02-28 | 2013-02-26 | Libération de transaction authentifiée |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2820600A1 (fr) |
WO (1) | WO2013127520A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102013021935A1 (de) * | 2013-12-20 | 2015-06-25 | Giesecke & Devrient Gmbh | Verfahren und Vorrichtungen zum Verwenden eines Sicherheitselements mit einem mobilen Endgerät |
CN112330447A (zh) * | 2018-01-19 | 2021-02-05 | 创新先进技术有限公司 | 资金流转方法及装置、电子设备 |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087867A1 (en) * | 2000-11-28 | 2002-07-04 | Oberle Robert R. | RF ID card |
GB2396472A (en) * | 2002-12-18 | 2004-06-23 | Ncr Int Inc | System for cash withdrawal |
WO2004053807A1 (fr) | 2002-12-06 | 2004-06-24 | Deutsche Telekom Ag | Systeme de paiement au moyen d'un radiotelephone |
DE102005003647A1 (de) | 2005-01-26 | 2006-08-17 | Giesecke & Devrient Gmbh | Identifizierungssystem |
WO2008017643A1 (fr) * | 2006-08-11 | 2008-02-14 | Bundesdruckerei Gmbh | Lecteur pour un document, procédé de lecture d'un objet de données et produit de programme informatique |
US20090143104A1 (en) * | 2007-09-21 | 2009-06-04 | Michael Loh | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
EP0986275B1 (fr) | 1998-09-10 | 2009-09-09 | Swisscom AG | Procédé pour acheter des articles ou des services avec un téléphone mobile |
EP2182493A1 (fr) * | 2008-11-04 | 2010-05-05 | Gemalto SA | Authentification d'utilisateur à distance utilisant NFC |
WO2011004339A1 (fr) * | 2009-07-08 | 2011-01-13 | Logomotion, S.R.O. | Procédé et système d'authentification sans contact, et élément porteur de code pin |
GB2476989A (en) * | 2010-01-19 | 2011-07-20 | Proxama Ltd | Activation of secure function in mobile computing device using authentication tag |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SK50042008A3 (sk) * | 2008-01-04 | 2009-09-07 | Logomotion, S. R. O. | Spôsob a systém autentifikácie najmä pri platbách, identifikátor totožnosti a/alebo súhlasu |
US8112066B2 (en) * | 2009-06-22 | 2012-02-07 | Mourad Ben Ayed | System for NFC authentication based on BLUETOOTH proximity |
DE102010030590A1 (de) * | 2010-06-28 | 2011-12-29 | Bundesdruckerei Gmbh | Verfahren zur Erzeugung eines Zertifikats |
-
2013
- 2013-02-26 EP EP13707816.8A patent/EP2820600A1/fr not_active Ceased
- 2013-02-26 WO PCT/EP2013/000560 patent/WO2013127520A1/fr active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0986275B1 (fr) | 1998-09-10 | 2009-09-09 | Swisscom AG | Procédé pour acheter des articles ou des services avec un téléphone mobile |
US20020087867A1 (en) * | 2000-11-28 | 2002-07-04 | Oberle Robert R. | RF ID card |
WO2004053807A1 (fr) | 2002-12-06 | 2004-06-24 | Deutsche Telekom Ag | Systeme de paiement au moyen d'un radiotelephone |
GB2396472A (en) * | 2002-12-18 | 2004-06-23 | Ncr Int Inc | System for cash withdrawal |
DE102005003647A1 (de) | 2005-01-26 | 2006-08-17 | Giesecke & Devrient Gmbh | Identifizierungssystem |
WO2008017643A1 (fr) * | 2006-08-11 | 2008-02-14 | Bundesdruckerei Gmbh | Lecteur pour un document, procédé de lecture d'un objet de données et produit de programme informatique |
US20090143104A1 (en) * | 2007-09-21 | 2009-06-04 | Michael Loh | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
EP2182493A1 (fr) * | 2008-11-04 | 2010-05-05 | Gemalto SA | Authentification d'utilisateur à distance utilisant NFC |
WO2011004339A1 (fr) * | 2009-07-08 | 2011-01-13 | Logomotion, S.R.O. | Procédé et système d'authentification sans contact, et élément porteur de code pin |
GB2476989A (en) * | 2010-01-19 | 2011-07-20 | Proxama Ltd | Activation of secure function in mobile computing device using authentication tag |
Non-Patent Citations (1)
Title |
---|
See also references of EP2820600A1 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102013021935A1 (de) * | 2013-12-20 | 2015-06-25 | Giesecke & Devrient Gmbh | Verfahren und Vorrichtungen zum Verwenden eines Sicherheitselements mit einem mobilen Endgerät |
CN112330447A (zh) * | 2018-01-19 | 2021-02-05 | 创新先进技术有限公司 | 资金流转方法及装置、电子设备 |
Also Published As
Publication number | Publication date |
---|---|
EP2820600A1 (fr) | 2015-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016192842A1 (fr) | Terminal et procédé de paiement mobile dans un environnement d'exécution sécurisé | |
WO2018114654A1 (fr) | Système de paiement hors ligne en argent électronique avec un appareil mobile avec un temps de transaction et un règlement de clôture courts | |
DE10296888T5 (de) | System und Verfahren zur sicheren Eingabe und Authentifikation von verbraucherzentrierter Information | |
EP2080147B1 (fr) | Procédé pour l'exécution d'une application à l'aide d'un support de données portable | |
EP2715684A1 (fr) | Système électronique destiné à réaliser, rapidement et dans de bonnes conditions de sécurité, des transactions au moyen d'appareils mobiles | |
WO2013067561A1 (fr) | Procédé et dispositif pour effectuer des paiements scripturaux | |
DE102011116489A1 (de) | Mobiles Endgerät, Transaktionsterminal und Verfahren zur Durchführung einer Transaktion an einem Transaktionsterminal mittels eines mobilen Endgeräts | |
DE102017122799A1 (de) | Verfahren und Anordnung zur Übermittlung von Transaktionsdaten unter Nutzung eines öffentlichen Datennetzes | |
EP3811584A1 (fr) | Carte à puce en tant que jeton de sécurité | |
EP3428866A2 (fr) | Dispositif de transmission et de traitement de données et procédé de transmission et de traitement de données destinés au paiement d'une marchandise ou d'un service | |
WO2013011043A1 (fr) | Système mobile pour transactions financières | |
CN105956839A (zh) | 应用于智能家居平台的支付方法和装置 | |
WO2013127520A1 (fr) | Libération de transaction authentifiée | |
WO2014206660A1 (fr) | Procédé de transaction électronique et système informatique | |
EP3271855B1 (fr) | Procédé de génération d'un certificat pour un jeton de sécurité | |
EP2916252B1 (fr) | Procédé de transaction électronique et système informatique | |
DE102013212646A1 (de) | Elektronisches Transaktionsverfahren und Computersystem | |
DE102010036037A1 (de) | Verfahren zur Durchführung bargeldioser Zahlungstransaktionen und Transaktionsystem zur Durchführung des Verfahrens | |
DE102008047639A1 (de) | Verfahren und Vorrichtung zum Zugriff auf ein maschinenlesbares Dokument | |
EP3561753A1 (fr) | Procédé de transfert et de traitement de données et dispositif correspondant | |
EP2696319B1 (fr) | Procédé d'autorisation d'une transaction | |
DE102013022434B3 (de) | Elektronisches Transaktionsverfahren und Computersystem | |
WO2023046237A1 (fr) | Procédé d'échange numérique d'informations | |
EP2840757B1 (fr) | Administration individuelle et centrale des cartes de puce | |
DE102011077770A1 (de) | Bezahlsystem zur Bezahlung von Waren und Dienstleistungen sowie Verfahren hierfür |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13707816 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013707816 Country of ref document: EP |