EA200701906A1 - METHOD FOR SAFE DATA TRANSFER - Google Patents
METHOD FOR SAFE DATA TRANSFERInfo
- Publication number
- EA200701906A1 EA200701906A1 EA200701906A EA200701906A EA200701906A1 EA 200701906 A1 EA200701906 A1 EA 200701906A1 EA 200701906 A EA200701906 A EA 200701906A EA 200701906 A EA200701906 A EA 200701906A EA 200701906 A1 EA200701906 A1 EA 200701906A1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- client terminal
- data
- positional information
- transmission
- database server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Telephonic Communication Services (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Computer And Data Communications (AREA)
- Pharmaceuticals Containing Other Organic And Inorganic Compounds (AREA)
- Storage Device Security (AREA)
Abstract
При обмене данными между клиентским терминалом (1) и защищенным сервером базы данных (2) данные кодируют, используя позиционную информацию, сформированную генератором (7) комбинаций в отдельном сервере (3) защиты. Позиционная информация используется для формирования изображения, специфичного для события обмена, которое доступно с клиентского терминала (1) и является основанием для ввода чувствительных данных в (1) клиентский терминал. Коммуникационная линия связи с тремя трактами между клиентским терминалом, сервером базы данных и сервером защиты значительно увеличивает трудность успешного перехвата и декодирования данных, введенных в клиентский терминал. Этот способ безопасной передачи данных особенно подходит для передачи данных пароля, например, при банковских операциях.When exchanging data between the client terminal (1) and the secure database server (2), the data is encoded using positional information generated by the combination generator (7) in the separate security server (3). The positional information is used to generate an image specific to the exchange event, which is available from the client terminal (1) and is the basis for inputting sensitive data into (1) the client terminal. The three-path communication link between the client terminal, the database server, and the security server greatly increases the difficulty of successfully intercepting and decoding data entered into the client terminal. This method of secure data transmission is particularly suitable for the transmission of password data, for example in banking transactions.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0504545.5A GB0504545D0 (en) | 2005-03-07 | 2005-03-07 | A method of secure data communication |
PCT/GB2006/050002 WO2006095203A1 (en) | 2005-03-07 | 2006-01-06 | A method of secure data communication |
Publications (1)
Publication Number | Publication Date |
---|---|
EA200701906A1 true EA200701906A1 (en) | 2008-02-28 |
Family
ID=34451837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200701906A EA200701906A1 (en) | 2005-03-07 | 2006-01-06 | METHOD FOR SAFE DATA TRANSFER |
Country Status (10)
Country | Link |
---|---|
JP (1) | JP2008537210A (en) |
CN (1) | CN101180662A (en) |
AU (1) | AU2006221804B2 (en) |
BR (1) | BRPI0608576A2 (en) |
CA (1) | CA2602861A1 (en) |
EA (1) | EA200701906A1 (en) |
GB (1) | GB0504545D0 (en) |
IL (1) | IL185709A (en) |
IN (1) | IN2014MN02389A (en) |
WO (1) | WO2006095203A1 (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100817767B1 (en) * | 2008-01-14 | 2008-03-31 | 알서포트 주식회사 | Authentication method using icon password |
JP2009175911A (en) * | 2008-01-23 | 2009-08-06 | Casio Comput Co Ltd | Information processing apparatus, information processing control program and information processing control method |
CN101316424A (en) * | 2008-07-08 | 2008-12-03 | 阿里巴巴集团控股有限公司 | Information transmission method, system and device |
JP5563951B2 (en) * | 2010-10-28 | 2014-07-30 | 株式会社日本総合研究所 | Information input method, information input system, information input device, and computer program |
CN102118249B (en) * | 2010-12-22 | 2014-04-30 | 厦门柏事特信息科技有限公司 | Photographing and evidence-taking method based on digital digest and digital signature |
JP2013076846A (en) * | 2011-09-30 | 2013-04-25 | Mitsubishi Ufj Nicos Co Ltd | Information encryption program, portable terminal, information protection system, and information encryption method |
GB2502773B (en) * | 2012-05-28 | 2015-03-11 | Swivel Secure Ltd | Method and system for secure user identification |
GB201212878D0 (en) | 2012-07-20 | 2012-09-05 | Pike Justin | Authentication method and system |
US10108796B2 (en) * | 2012-12-12 | 2018-10-23 | BBPOS Limited | System and method for PIN entry on mobile devices |
KR101416542B1 (en) * | 2012-12-24 | 2014-07-09 | 주식회사 로웸 | Method for Apparatus for managing passcode |
JP6040102B2 (en) * | 2013-06-04 | 2016-12-07 | 株式会社日立製作所 | Fraud information detection method and fraud information detection apparatus |
US20160253510A1 (en) * | 2013-09-12 | 2016-09-01 | Gcod Innovation Co., Ltd. | Method for security authentication and apparatus therefor |
AU2014393629B2 (en) * | 2014-05-08 | 2018-07-19 | Thumbzup UK Limited | Authentication code entry system and method |
US9357388B2 (en) * | 2014-05-27 | 2016-05-31 | Lenovo (Singapore) Pte. Ltd. | Symbol selection for swipe based authentication |
KR101480892B1 (en) * | 2014-11-13 | 2015-01-13 | 아이벡스랩 주식회사 | Method for Determining Certifying Pattern and Method Using the Same |
GB201520741D0 (en) | 2015-05-27 | 2016-01-06 | Mypinpad Ltd And Licentia Group Ltd | Authentication methods and systems |
CN106332070B (en) * | 2015-06-30 | 2020-08-28 | 北京壹人壹本信息科技有限公司 | Secure communication method, device and system |
EP3291504B1 (en) * | 2016-08-30 | 2020-03-11 | Wacom Co., Ltd. | Authentication and secure transmission of data between signature devices and host computers using transport layer security |
WO2020099811A1 (en) | 2018-11-15 | 2020-05-22 | Tricerion Limited | Game of chance after successfull authentication on a randomized touchscreen |
US11329959B2 (en) * | 2018-12-21 | 2022-05-10 | Fortinet, Inc. | Virtual routing and forwarding (VRF)-aware socket |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6209104B1 (en) * | 1996-12-10 | 2001-03-27 | Reza Jalili | Secure data entry and visual authentication system and method |
AR029173A1 (en) * | 1999-07-20 | 2003-06-18 | Diebold Inc | METHOD FOR THE DEVELOPMENT OF AUTOMATIC POCKETS |
US7305548B2 (en) * | 2001-10-22 | 2007-12-04 | Microsoft Corporation | Using atomic messaging to increase the security of transferring data across a network |
US7992007B2 (en) * | 2002-02-05 | 2011-08-02 | Cardinalcommerce Corporation | Dynamic pin pad for credit/debit/ other electronic transactions |
US7392396B2 (en) * | 2002-03-07 | 2008-06-24 | Symbol Technologies, Inc. | Transaction device with noise signal encryption |
GB2387702B (en) * | 2002-04-17 | 2005-06-01 | Cellectivity Ltd | Method of access control using PIN numbers |
-
2005
- 2005-03-07 GB GBGB0504545.5A patent/GB0504545D0/en not_active Ceased
-
2006
- 2006-01-06 WO PCT/GB2006/050002 patent/WO2006095203A1/en not_active Application Discontinuation
- 2006-01-06 AU AU2006221804A patent/AU2006221804B2/en not_active Ceased
- 2006-01-06 CA CA002602861A patent/CA2602861A1/en not_active Abandoned
- 2006-01-06 EA EA200701906A patent/EA200701906A1/en unknown
- 2006-01-06 BR BRPI0608576-8A patent/BRPI0608576A2/en not_active Application Discontinuation
- 2006-01-06 JP JP2008500278A patent/JP2008537210A/en active Pending
- 2006-01-06 CN CNA2006800155612A patent/CN101180662A/en active Pending
- 2006-01-06 IN IN2389MUN2014 patent/IN2014MN02389A/en unknown
-
2007
- 2007-09-04 IL IL185709A patent/IL185709A/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
IN2014MN02389A (en) | 2015-08-21 |
AU2006221804A1 (en) | 2006-09-14 |
GB0504545D0 (en) | 2005-04-13 |
IL185709A0 (en) | 2008-01-06 |
IL185709A (en) | 2012-05-31 |
BRPI0608576A2 (en) | 2010-01-12 |
CN101180662A (en) | 2008-05-14 |
JP2008537210A (en) | 2008-09-11 |
CA2602861A1 (en) | 2006-09-14 |
AU2006221804B2 (en) | 2012-06-14 |
WO2006095203A1 (en) | 2006-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EA200701906A1 (en) | METHOD FOR SAFE DATA TRANSFER | |
ES2680152T3 (en) | Authentication method and device convenient for the user using a mobile authentication application | |
US20200228321A1 (en) | Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity | |
ES2829916T3 (en) | Procedure, apparatus and system that provides a safety check | |
AU2016217549B2 (en) | Systems and methods for securely managing biometric data | |
US11018870B2 (en) | Biometric verification process using certification token | |
CN101897165B (en) | Method of authentication of users in data processing systems | |
CN101340437B (en) | Time source regulating method and system | |
CN103535090B (en) | For the system and method for the Identity Management of mobile device | |
AU2018200611A1 (en) | Image based key derivation function | |
CN106685905A (en) | Systems and methods of encrypted transmission of web pages | |
WO2005045617A3 (en) | Portable security transaction protocol | |
RU2008129307A (en) | APPARATUS AND METHOD FOR TRANSFER OF OBJECT OF RIGHTS FROM ONE DEVICE TO ANOTHER DEVICE BY MEANS OF A SERVER | |
ATE332549T1 (en) | DEVICE AND METHOD FOR SECURE COMMUNICATION BASED ON CHIP CARDS | |
CN103415858A (en) | Mobile application bar code identification method and system | |
CN107592308A (en) | A kind of two server multiple-factor authentication method towards mobile payment scene | |
CN101334884A (en) | Method and system for enhancing bank transfer safety | |
CN1805339A (en) | Digital signature supporting personal trusted device and its method for implementing signature | |
WO2013074786A1 (en) | Method and apparatus for trust based data scanning, capture, and transfer | |
JP2022512202A (en) | Trust token for resource access | |
US10050790B2 (en) | Method for authorizing a transaction | |
CN101212301B (en) | Authentication device and method | |
Mohammad et al. | User authentication and authorization framework in IoT protocols | |
KR20200037508A (en) | System and method of providing anonymity message service using block chain | |
KR20200064017A (en) | Method for generating fido2.o public key and private key based on blockchain |