DE102018211013A1 - Method and device for processing a payment transaction with a crypto wallet - Google Patents
Method and device for processing a payment transaction with a crypto wallet Download PDFInfo
- Publication number
- DE102018211013A1 DE102018211013A1 DE102018211013.1A DE102018211013A DE102018211013A1 DE 102018211013 A1 DE102018211013 A1 DE 102018211013A1 DE 102018211013 A DE102018211013 A DE 102018211013A DE 102018211013 A1 DE102018211013 A1 DE 102018211013A1
- Authority
- DE
- Germany
- Prior art keywords
- message
- address
- payment transaction
- following features
- wallet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
- G06Q20/3255—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks using mobile network messaging services for payment, e.g. SMS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Verfahren (10) zum Abwickeln einer Zahlungstransaktion (16) mit einer Krypto-Geldbörse (20),
gekennzeichnet durch folgende Merkmale:
- eine erste Mitteilung wird an eine in der Adresse enthaltene Rufnummer gesendet (11),
- eine zweite Mitteilung (12) wird von der Rufnummer empfangen und
- abhängig von der zweiten Mitteilung (12) wird wahlweise eine Freigabe (13) der Zahlungstransaktion (16) erteilt.
Method (10) for processing a payment transaction (16) with a crypto wallet (20),
characterized by the following features:
a first message is sent to a number contained in the address (11),
- A second message (12) is received by the number and
- Depending on the second message (12), a release (13) of the payment transaction (16) is optionally given.
Description
Die vorliegende Erfindung betrifft ein Verfahren zum Abwickeln einer Zahlungstransaktion mit einer Krypto-Geldbörse. Die vorliegende Erfindung betrifft darüber hinaus eine entsprechende Vorrichtung, ein entsprechendes Computerprogramm sowie ein entsprechendes Speichermedium.The present invention relates to a method for processing a payment transaction with a crypto wallet. The present invention also relates to a corresponding device, a corresponding computer program and a corresponding storage medium.
Stand der TechnikState of the art
Eine sogenannte Krypto-Geldbörse (cryptocurrency wallet) speichert die zum Einnehmen oder Ausgeben von Einheiten einer Kryptowährung erforderlichen öffentlichen und privaten Schlüssel. Krypto-Geldbörsen nach dem Stand der Technik können mehrere Paare aus öffentlichen und privaten Schlüsseln enthalten. Im Falle der Kryptowährung Bitcoin und derer Derivate wird die eigentliche Kryptowährung hingegen dezentral in einem öffentlich zugänglichen Hauptbuch geführt. Jede Einheit der Kryptowährung besitzt einen privaten Schlüssel, der es erlaubt, die Einheit durch das Ergänzen einer Zahlungstransaktion in diesem verteilten Hauptbuch (distributed ledger) gleichsam „auszugeben“.A so-called cryptocurrency wallet stores the public and private keys required to ingest or issue units of a cryptocurrency. Prior art crypto wallets can contain multiple pairs of public and private keys. In the case of the cryptocurrency Bitcoin and its derivatives, however, the actual cryptocurrency is kept decentrally in a publicly accessible general ledger. Each unit of the cryptocurrency has a private key, which allows the unit to be “issued”, as it were, by completing a payment transaction in this distributed ledger.
Bekannt sind insbesondere sogenannte Hardware-Geldbörsen (hardware wallets, HW-Wallets). Wenn der Benutzer einer solchen Geldbörse eine Zahlung abwickelt, wird mittels einer Anwendungsprogrammierschnittstelle (application programming interface, API) der Geldbörse die eigentliche Zahlungstransaktion erstellt. Dann signiert die Hardware der Geldbörse die Transaktion und stellt einen öffentlichen Schlüssel bereit, der wiederum mittels der API über das Internet versendet wird. Auf diese Weise verlassen die Signaturschlüssel niemals die Hardware-Geldbörse.So-called hardware wallets (hardware wallets) are known in particular. When the user of such a wallet processes a payment, the actual payment transaction is created using an application programming interface (API) of the wallet. The wallet hardware then signs the transaction and provides a public key, which in turn is sent over the Internet using the API. This way, the signature keys never leave the hardware wallet.
Offenbarung der ErfindungDisclosure of the invention
Das vorgeschlagene Verfahren fußt auf der Erkenntnis, dass sich bei Kryptowährungen in der Regel beliebig viele Adressen generieren lassen, an die Geld überwiesen werden kann. Die Zeichenfolgen der Adressen mögen auf den ersten Blick zufällig erscheinen, haben aber stets einen direkten Bezug zu einem geheimen Schlüssel.The proposed method is based on the knowledge that, as a rule, any number of addresses can be generated for cryptocurrencies to which money can be transferred. The strings of the addresses may appear random at first glance, but they always have a direct connection to a secret key.
Der nachfolgend beschriebene Ansatz trägt ferner dem Wunsch zahlreicher Anwender Rechnung, Überweisungen mit Kryptowährungen besser abzusichern. Insbesondere soll vermieden werden, dass Überweisungen (z. B. durch Hacker) unbeabsichtigt auf Konten außerhalb des eigenen Rechtsraums geschleust werden und dadurch das Geld nur sehr schwer auf dem Rechtsweg zurückerstritten werden kann. Idealerweise soll mit einfachen Mitteln überprüft werden können, ob eine Überweisungsadresse plausibel ist.The approach described below also takes into account the desire of numerous users to better secure transfers with cryptocurrencies. In particular, it is to be avoided that transfers (e.g. by hackers) are inadvertently smuggled into accounts outside of one's own legal area and that it is very difficult for the money to be won back by legal means. Ideally, it should be possible to check by simple means whether a transfer address is plausible.
Die Erfindung stellt vor diesem Hintergrund ein Verfahren zum Abwickeln einer Zahlungstransaktion mit einer Krypto-Geldbörse, eine entsprechende Vorrichtung, ein entsprechendes Computerprogramm sowie ein entsprechendes Speichermedium gemäß den unabhängigen Ansprüchen bereit.Against this background, the invention provides a method for processing a payment transaction with a crypto wallet, a corresponding device, a corresponding computer program and a corresponding storage medium according to the independent claims.
Ein Vorzug dieser Lösung liegt darin, dass ein Angreifer nicht einfach unbemerkt Geld auf sein eigenes Konto umleiten kann, indem er beim Bezahlvorgang heimlich die Überweisungsadresse austauscht. Durch das erfindungsgemäße Verknüpfen von Kryptowährungskonten mit Telefonnummern ist auch nachvollziehbar, wem ein bestimmtes Konto gehört, auf das Geld überwiesen wird. Überweisungen außerhalb des eigenen Rechtssystems (beispielsweise Deutschlands oder Europas) können zusätzlich anhand der internationalen Vorwahl erkannt und vermieden werden.One advantage of this solution is that an attacker cannot simply divert money to his own account without being noticed, by secretly exchanging the transfer address during the payment process. By linking cryptocurrency accounts to telephone numbers according to the invention, it is also possible to understand who owns a particular account to which money is transferred. Transfers outside of one's own legal system (e.g. Germany or Europe) can also be recognized and avoided using the international area code.
Durch die in den abhängigen Ansprüchen aufgeführten Maßnahmen sind vorteilhafte Weiterbildungen und Verbesserungen des im unabhängigen Anspruch angegebenen Grundgedankens möglich. So kann vorgesehen sein, dass Mitteilungen über eine GSM-Schnittstelle zwischen dem Fahrzeug und einem Telekommunikationsanbieter ausgetauscht werden, welcher mit der Cloud über eine drahtgebundene Schnittstelle verbunden ist. Geld aus unberechtigten Überweisungen lässt sich auf diese Weise zurückfordern: Die Besitzer von Telefonnummern sind leicht zu identifizieren, da sie sich in der Regel beim Telekommunikationsanbieter ausweisen müssen, bevor sie eine Telefonnummer bekommen.The measures listed in the dependent claims allow advantageous developments and improvements of the basic idea specified in the independent claim. It can be provided that messages are exchanged between the vehicle and a telecommunications provider via a GSM interface, which is connected to the cloud via a wired interface. Money from unauthorized transfers can be reclaimed in this way: The owners of telephone numbers are easy to identify, as they are usually with the telecommunications provider have to identify them before they get a phone number.
Ferner kann vorgesehen sein, dass die erste Mitteilung eine geheime Zufallszahl und die zweite Mitteilung einen Streuwert (hash) umfasst, wobei die Freigabe nur dann erteilt wird, falls der Streuwert ein Bild der Zufallszahl und der Zahlungsdetails unter einer vorgegebenen Streuwertfunktion ist. Unseriöse Anbieter können dem Telekommunikationsanbieter somit gemeldet und durch diesen gesperrt werden, indem er anstatt des Hashes eine Information über die Sperrung des Kontos zurückmeldet.Furthermore, it can be provided that the first message comprises a secret random number and the second message has a scatter value (hash), the release being issued only if the scatter value is an image of the random number and the payment details under a predetermined scatter value function. Untrustworthy providers can thus be reported to the telecommunications provider and blocked by the latter by reporting information about the blocking of the account instead of the hash.
Schließlich kann vorgesehen sein, dass die Adresse des Zahlungsempfängers erzeugt wird, indem wiederholt ein Streuwert unterschiedlicher Zufallszahlen und dem geheimen Schlüssel ermittelt wird, bis dieser gemäß einem vorgegebenen Schema die Rufnummer des Zahlungsempfängers enthält. Für Dienstleister mag es sich als gewinnbringend erweisen, auf diesem Wege zufällige geheime Schlüssel zu erzeugen und damit solange zufällige Überweisungsadressen zu generieren, bis eine der Überweisungsadressen die richtige Rufnummer umfasst. Sofern es sich beim Herausgeber der Adresse um ein vertrauenswürdiges Unternehmen handelt, werden sich für diese Überweisungsadresse und den geheimen Schlüssel Käufer finden, die letzterem glauben, dass der angebotene Schlüssel tatsächlich geheim gehalten wurde und nur dem Käufer zugänglich ist. Für diesen Kunden wäre es sehr viel aufwändiger, einen geheimen Schlüssel mit für ihn passender Rufnummer selbst zu erzeugen, da bei jedem Versuch die Wahrscheinlichkeit, eine Adresse zu erzeugen, die nicht zu seiner Rufnummer passt, die Erfolgswahrscheinlichkeit bei weitem überwiegt.Finally, it can be provided that the address of the payee is generated by repeatedly determining a scatter value of different random numbers and the secret key until it contains the payee's number according to a predetermined scheme. It may prove profitable for service providers to generate random secret keys in this way and thus to generate random transfer addresses until one of the transfer addresses contains the correct phone number. If the publisher of the address is a trustworthy company, buyers will find for this transfer address and the secret key, who believe the latter that the offered key was actually kept secret and is only accessible to the buyer. It would be much more difficult for this customer to generate a secret key with the number that suits him, since each attempt to generate an address that does not match his number far outweighs the probability of success.
Figurenlistelist of figures
Ausführungsbeispiele der Erfindung sind in den Zeichnungen dargestellt und in der nachfolgenden Beschreibung näher erläutert. Es zeigt:
-
1 das Flussdiagramm eines Verfahrens gemäß einer ersten Ausführungsform. -
2 schematisch eine Krypto-Geldbörse gemäß einer zweiten Ausführungsform.
-
1 the flowchart of a method according to a first embodiment. -
2 schematically a crypto wallet according to a second embodiment.
Ausführungsformen der ErfindungEmbodiments of the invention
Ein Prüfkriterium für eine Telefonnummer, bei der das Verfahren (
Der Telekommunikationsanbieter (
Das HW-Wallet (
Alternativ zur Integration eines GSM-Moduls kann das HW-Wallet (
Die vorstehend exemplarisch für das Bezahlen mit einem Fahrzeug (
ZITATE ENTHALTEN IN DER BESCHREIBUNG QUOTES INCLUDE IN THE DESCRIPTION
Diese Liste der vom Anmelder aufgeführten Dokumente wurde automatisiert erzeugt und ist ausschließlich zur besseren Information des Lesers aufgenommen. Die Liste ist nicht Bestandteil der deutschen Patent- bzw. Gebrauchsmusteranmeldung. Das DPMA übernimmt keinerlei Haftung für etwaige Fehler oder Auslassungen.This list of documents listed by the applicant has been generated automatically and is only included for the better information of the reader. The list is not part of the German patent or utility model application. The DPMA assumes no liability for any errors or omissions.
Zitierte PatentliteraturPatent literature cited
- DE 102016206916 A1 [0004]DE 102016206916 A1 [0004]
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102018211013.1A DE102018211013A1 (en) | 2018-07-04 | 2018-07-04 | Method and device for processing a payment transaction with a crypto wallet |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102018211013.1A DE102018211013A1 (en) | 2018-07-04 | 2018-07-04 | Method and device for processing a payment transaction with a crypto wallet |
Publications (1)
Publication Number | Publication Date |
---|---|
DE102018211013A1 true DE102018211013A1 (en) | 2020-01-09 |
Family
ID=68943616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE102018211013.1A Pending DE102018211013A1 (en) | 2018-07-04 | 2018-07-04 | Method and device for processing a payment transaction with a crypto wallet |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE102018211013A1 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016206916A1 (en) | 2016-04-22 | 2017-10-26 | Bundesdruckerei Gmbh | Electronic method for the cryptographically secured transfer of an amount of a cryptocurrency |
-
2018
- 2018-07-04 DE DE102018211013.1A patent/DE102018211013A1/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102016206916A1 (en) | 2016-04-22 | 2017-10-26 | Bundesdruckerei Gmbh | Electronic method for the cryptographically secured transfer of an amount of a cryptocurrency |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE102018106682B4 (en) | PROVIDING OUT-OF-BAND VERIFICATION FOR BLOCKCHAIN TRANSACTIONS | |
DE102012206341B4 (en) | Joint encryption of data | |
EP2765752B1 (en) | Method for equipping a mobile terminal with an authentication certificate | |
WO2016008659A1 (en) | Method and a device for securing access to wallets in which cryptocurrencies are stored | |
DE112011100182T5 (en) | Transaction check for data security devices | |
WO2021170645A1 (en) | Method for directly transmitting electronic coin datasets between terminals, payment system, protection system, and monitoring unit | |
DE102015222347A1 (en) | Electronic payment method and server computer | |
DE202015009601U1 (en) | System for personal identification and verification | |
EP4224786A1 (en) | Method and device for creating electronic signatures | |
DE102015213180A1 (en) | Method and device for authenticating a service user for a service to be provided | |
EP4315117A1 (en) | Method and device for generating, providing, and transferring a trusted electronic dataset or certificate based on an electronic document concerning a user | |
DE202015009562U1 (en) | System for personal identification and verification | |
EP2730050B1 (en) | Method for generating and verifying an electronic pseudonymous signature | |
DE102020118716A1 (en) | Procedure for the secure implementation of a remote signature and security system | |
EP2932677B1 (en) | Method for secure transmission of a digital message | |
DE102018211013A1 (en) | Method and device for processing a payment transaction with a crypto wallet | |
DE102021004548A1 (en) | METHOD AND TRANSACTION SYSTEM FOR TRANSFERRING TOKENS IN AN ELECTRONIC TRANSACTION SYSTEM | |
DE102018210936A1 (en) | Method and device for processing a payment transaction with a crypto wallet | |
DE102018210501A1 (en) | Method and device for processing a payment transaction with a crypto wallet | |
EP2696319B1 (en) | Method for enabling a transaction | |
EP3358488B1 (en) | Method for detecting unauthorised copies of a digital security token | |
DE102017211201A1 (en) | Method for asymmetric key management and security-relevant installation | |
DE102012220774B4 (en) | Procedures for Conducting Transactions | |
DE102010028217A1 (en) | Electronic device, telecommunication system and method for reading data from an electronic device | |
DE102020210810A1 (en) | Method and device for mutually evaluating service providers and service recipients using a decentralized transaction database |