EP2115995A1 - Elektronische visitenkarte - Google Patents
Elektronische visitenkarteInfo
- Publication number
- EP2115995A1 EP2115995A1 EP08707417A EP08707417A EP2115995A1 EP 2115995 A1 EP2115995 A1 EP 2115995A1 EP 08707417 A EP08707417 A EP 08707417A EP 08707417 A EP08707417 A EP 08707417A EP 2115995 A1 EP2115995 A1 EP 2115995A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- data carrier
- carrier
- communication
- carriers
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
- G06Q20/3415—Cards acting autonomously as pay-media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
Definitions
- the present invention relates to a method for transmitting data via a communication link between at least two communication nikationsvorraumen, wherein the communication devices are each connected to a disk in which data of each user are stored.
- the data is personal data, such as e.g. occur in electronic business cards.
- Electronic business cards are known in the art e.g. from mobile phones or emails.
- the user can use his mobile phone to send his electronic business card by SMS to a specific person.
- the electronic business card is stored in the SIM card of the mobile phone.
- the user can send his electronic business card by email.
- the data of the electronic business card are for this purpose e.g. stored on a workstation.
- the owner of the electronic business card sends a copy of the electronic business card via SMS or email.
- Another way of spreading the electronic business card is that the data of the electronic business card are distributed externally.
- the data of the electronic business card as e.g. Name, address, telephone number, etc. on a server, e.g. a server according to the so-called lightweight directory access protocol (LDAP), are stored.
- LDAP lightweight directory access protocol
- This server can then be accessed by third parties if they want to retrieve the data stored there electronic business card.
- the data of the electronic business cards are then externally administrated and distributed by the server.
- the data After receiving the electronic business card on the mobile phone or the computer then the data must be manually copied or entered become what is error prone.
- the entered data can then be used on the mobile phone to associate a name of the address book with the transferred telephone number, for example, and display the name instead of the telephone number.
- EP 1 444846 B1 discloses a method of enabling a user to handle a personalization object received from a first communication terminal on a second communication terminal while the communication terminals are in a state of establishing a call or in the state of a call. This includes the steps of sending a personalization object to the second terminal by the first terminal and receiving and temporarily storing the personalization object by the second terminal, wherein alerting the user by the second terminal about obtaining the personalization object and allowing the user select whether the received personalization object is rejected or executed in the second terminal.
- EP 1 444846 B1 discloses a method and a corresponding apparatus which differs from the method described above only by the steps of initiating a call from the first terminal, the first terminal having a plurality of settings which can be set by the user are to handle an outgoing personalization object, including a "first ask” setting, and with this step asking the user whether to send a personalization object or not, if the "first ask" setting of the first terminal is active.
- US 2005/0135294 A1 discloses a mobile communication system and a corresponding method for exchanging data packets between a host of a mobile communication terminal and at least one client of a mobile communication terminal. The host sends an SMS message containing a list of data to be provided and an IP address for the data packet communication.
- At least one client sends to the host a list of data whose transmission is requested for download and authentication information over PPP channels established for data packet communication.
- the host then sends the data requested by the client over the PPP channels to the client. Therefore, the data can be exchanged between the host and the client without using a separate device or device for data exchange.
- a disadvantage of the prior art is that the exchange of electronic data, in particular of electronic business cards, happens only by the instigation of the owner of the data.
- a secure data transmission is furthermore not guaranteed in the prior art.
- the object of the present invention is solved by the independent claims 1 and 11. Advantageous embodiments are mentioned in the subclaims.
- the present invention discloses to achieve the object a method for transmitting data via a communication link between at least two communication devices, the communication devices are each connected to a disk, and at connection recording at least one disk establishes a communication link to at least one other disk for data transmission in which the data medium which establishes a communication link to at least one other data carrier in order to retrieve data from another data carrier, after the establishment of the communication connection, authenticates against the other data carrier, and then in dependence on a rights management system which in Each data carrier is present with which is determined which other data carriers on which data of the data carrier has an access right, the requested data according to the access authorization of the request nden data carrier are transmitted to the requesting data carrier, wherein the data carrier before the transfer negotiate a transfer key for the data and transmit encrypted after negotiating the transfer key, the data to be transmitted.
- An advantage of the method of the present invention is that a direct communication between the data carriers is present.
- the entire course of the communication from the establishment of the communication connection, the data transmission and the dismantling of the communication connection is controlled exclusively by the data carriers without the participation of the communication devices to which the data carriers are connected.
- the data is first encrypted in the data carrier itself before it leaves the protected environment of the data carrier. After receiving the data, the data is then decrypted again in the secure environment of the other data carrier. before they are processed.
- insecure transmission media such as the Internet
- the flow of communication can be triggered by the presence and type of a usable communication channel at least one volume to be displayed, for example by an IP address and a port of a communication partner.
- the decision as to whether a data update should be carried out and a connection established for this purpose starts from the data carrier itself.
- the owner of the data carrier can also determine with the help of the rights management system which other user or his data carrier receives access to which data of his data carrier.
- the owner of the data has the data in his hands.
- the owner has e.g. the possibility to assign your own data to a specific class.
- assigning certain access rights to a class e.g. a ring-like exchange of data entries with family members, business partners etc. is possible.
- the purpose of the present method is both the simplified manual and the simplified automated data exchange between at least two data carriers.
- An example of this is an electronic business card.
- the present method can be used to automatically query the data of the other persons and, if necessary, to carry out the corresponding updates.
- the present invention it is e.g. Also possible based on the stored electronic business cards in a move certain electronic business cards and thus to select the appropriate people and so to inform about the new address.
- the electronic business card is only one possible embodiment.
- the application of the present invention e.g. the use of the present invention for processing payment transactions, e.g. a credit institution is entitled to retrieve the necessary account data.
- An essential feature of the present invention is that the entire data processing, encryption and decryption and storage of the data takes place in the respective data carriers themselves.
- the data processing takes place in a secure environment.
- the communication devices are relieved of the data processing in which the Disk are located. This manifests itself in a simpler structure of the communication devices and thus a more favorable production price.
- the transmitted data is provided with a signature.
- the data is encrypted with a public-key certificate.
- all other methods are also suitable which ensure the security of the data transmission over an insecure medium, such as e.g. to ensure the internet.
- the present invention has the advantage that not only from the own data carrier data can be queried from another medium, but also from the other data carrier's own data can be queried, the transmission of the data always in dependence of assigned respective access rights. This means that the present invention has the advantage that the data transmission between the data carriers can be both unidirectional and bidirectional.
- the present invention is suitable for both wired and wireless communication links.
- a wired communication connection here is the Internet, as an example of a connection in a packet-switched network, and for a wireless communication connection to call the mobile network.
- the use of the present invention does not depend on whether it is a wireless or a wired communication system.
- smart cards or also USB tokens or another secure data carrier may be considered, e.g. Trusted Base in TPM etc.
- TPM Trusted Base
- all data carriers are suitable which are suitable for use in the invention to store and process data.
- a realization of the data medium in software is possible.
- a realization of the data carrier as a computer is possible.
- the computer could advantageously be e.g. in a mobile communication network as the computer of a network operator, the data stored in SIM cards of mobile telephones, e.g. A user can retrieve and update a SIM card or retrieve and update data from the computer.
- the method of the present invention has the advantages that the access to the data is fast, straightforward, error-free, up-to-date and secure.
- the administration or administration of access rights is done by the owner and therefore user of the data medium.
- the disk In the case of a denied authentication, the disk emits an alarm signal.
- the denied authentication may be a proper first-time connection request, as well as a tampering attempt.
- the user of the data carrier can then decide how to proceed.
- the user is supported in managing access rights after or during the first connection attempt.
- the object of the present invention is also achieved by a device for transmitting data via a communication link between at least two communication devices, wherein the communication devices are each connected to a data carrier, which is characterized in that the data carriers each have a Have apparatus for establishing a communication connection and for data exchange between the data carriers of the communication devices, and the data carriers each have a device for rights management for the data stored in a database to allow the respective user of the data carrier to determine who to which data its data carrier, which has access rights, and the data carriers have a device for negotiating a transfer key for the data, and the data carriers have a device for transferring them encrypt the data using the negotiated transfer key.
- FIG. 2 shows on the one hand an exemplary structure of the database 4, 18 of the data carrier 2, 16 of an electronic business card and on the other hand the possibilities in which direction which data can be transmitted from and to the data carrier 2, 16.
- Figure 1 illustrates the principle of the present invention. For reasons of clarity, the communication devices but not shown, but only the disk 2, 16. It is expressly understood that the data carriers 2, 16 described below each connected to a communication device are, wherein the communication devices are connected to a transmission medium 12.
- FIG. 1 shows a first data carrier 2, which is accessible via an insecure medium 12, e.g. Internet, connected to a second volume 16.
- an insecure medium 12 e.g. Internet
- Each data carrier 2, 16 has a database 4, 18 for storing data, a rights management system 6, 20 for managing the access rights to the data, and an encryption module 8, 22 for encrypting the data to be sent to decrypt the receiving data.
- WiIl now access disk 16 to the data from disk 2, so verifies disk 2 based on the identification of disk 16 only the access rights of disk 16 by means of the rights management 6. Depending on the access rights then receives disk 16 access to the data from disk 2 ,
- the owner of a data carrier 2, 16 can not only specify which data carrier can access his data, but also which data carrier may access which data of the database 4, 18.
- the rights management 6 can also determine which data of the database 4 the data carrier 16 is allowed to access.
- a transfer key is agreed between the data carriers 2, 16, by means of which the data to be transmitted are encrypted before being transmitted in the encryption module 8.
- secured transmission may also be transmitted over an insecure medium 12, such as a non-removable medium. the internet is guaranteed.
- the transmitted data is first decrypted in the encryption module 22. Thereafter, the decrypted data is stored in the database 18.
- the data carrier 2 is able to access data of the database 18 of the data carrier 16. According to the invention, it is possible that both data carriers 2, 16 mutually, temporally successively or simultaneously access the data of the database 4, 18 of the other data carrier 2, 16.
- FIG. 2 shows on the one hand a structure of the database 4, 18 of the data carrier 2, 16 using the example of an electronic business card and on the other hand the possibilities in which direction which data can be transmitted from and to the data carrier 2, 16.
- the data carrier 2, 16 consists of an encryption module 8, 22, a rights management 6, 20 and a database 4, 18, e.g. an address book which is valid, i. current data from electronic business cards, contains.
- the current data so-called contact data, may be distinguished into the user's own data, here referred to as "My Business Card:”, and the data obtained from other persons, here referred to as "My Address Book Entries:” ,
- the electronic business card also contains the name of the user. In addition to the name are also his address, telephone number, email address, homepage, etc. conceivable personal data.
- the business card contains a certificate. If a recipient passes on the business card to a third party, the certificate will be changed. Based on the changed certificate, the third party can determine that he has not received the business card directly from the owner of the business card and that the content of the business card may have been changed. Furthermore, the business card has the last update date. This allows the owner and recipient of the business card to determine when the business card data was last updated.
- the owner of the business card can also determine their validity.
- An essential feature of the present invention is that the owner of the business card can specify different access classes. This means that the owner can define who has which data
- business access class it is possible to specify which business partner is to store business data, such as business data. business telephone number or business address, also allowed to access the private data.
- the payment info access class it is possible to specify data that is important for the settlement of a payment transaction, e.g. Account number and bank code or validity of credit card, and which bank may access it.
- data that is important for the settlement of a payment transaction e.g. Account number and bank code or validity of credit card, and which bank may access it.
- a bank an internet shop or a service is conceivable, which is allowed to access the payment info.
- the database 4, 18, here in the form of an address book also contain data or address book entries of other persons.
- the address book entries contain the business card information of other persons, such as name, address, telephone number, email address, etc.
- the address book entries for the secure transmission of data contain the public key, the certificate or the signature of the contact person.
- the address book entries include the last update date and the expiration date of the contact's data.
- the address book stores which permitted access class, i. Access rights that the owner of the address book has on the data of the contact person.
- the owner of the address book as a business partner can have access only to the business but not to the private data of the contact person.
- the data carrier 2, 16 automatically retrieves the current data from a connection partner or contact person stored in the database 4, 18.
- the data of the business card eg the address, of the owner of the business card can be queried via a communication network, eg Internet, from another data carrier with a business card function or by other inquiry services.
- the other data carrier or query identify the service. This identification is possible, for example, by the other data medium or query service presenting its own electronic business card or its own certificate. After checking the identity and the access rights by the data base of the owner of the data, the other data medium or query service is then granted access to the data according to the access rights defined in the access class.
- the data to be delivered is encrypted and signed to the other volume or query service.
- an insecure transmission medium e.g. Internet
- the owner of the data carrier using a computer the data of the data carrier, here the data of an address book, query, read and change, and thus the administration of the data is in the hands of the owner.
- Another application of the present invention is the use of the invention, e.g. in the telephone network, if you can still call the fire department or police, but is no longer able to speak.
- the present invention it would be possible for police or fire departments to determine where the caller is located and to send help by querying the address from the data carrier.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102007005675A DE102007005675A1 (de) | 2007-01-31 | 2007-01-31 | Elektronische Visitenkarte |
PCT/EP2008/000722 WO2008092662A1 (de) | 2007-01-31 | 2008-01-30 | Elektronische visitenkarte |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2115995A1 true EP2115995A1 (de) | 2009-11-11 |
Family
ID=39473574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP08707417A Withdrawn EP2115995A1 (de) | 2007-01-31 | 2008-01-30 | Elektronische visitenkarte |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2115995A1 (de) |
DE (1) | DE102007005675A1 (de) |
WO (1) | WO2008092662A1 (de) |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2343091B (en) * | 1998-10-19 | 2004-05-19 | Ibm | Electronic business card exchange |
DE19914225A1 (de) * | 1999-03-29 | 2000-10-12 | Fraunhofer Ges Forschung | Vorrichtung und Verfahren für die sichere elektronische Datenübertragung |
US7286821B2 (en) | 2001-10-30 | 2007-10-23 | Nokia Corporation | Communication terminal having personalisation means |
DE10310350A1 (de) | 2003-03-10 | 2004-10-07 | Giesecke & Devrient Gmbh | Kommunikation zwischen tragbaren Datenträgern |
KR100754651B1 (ko) | 2003-12-23 | 2007-09-05 | 삼성전자주식회사 | 패킷 데이터 통신을 이용한 이동통신 단말기들 간의데이터 교환이 가능한 이동 통신 시스템 및 방법 |
-
2007
- 2007-01-31 DE DE102007005675A patent/DE102007005675A1/de not_active Withdrawn
-
2008
- 2008-01-30 WO PCT/EP2008/000722 patent/WO2008092662A1/de active Application Filing
- 2008-01-30 EP EP08707417A patent/EP2115995A1/de not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2008092662A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2008092662A1 (de) | 2008-08-07 |
DE102007005675A1 (de) | 2008-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69904570T3 (de) | Verfahren, anordnung und einrichtung zur authentifizierung durch ein kommunikationsnetz | |
DE60221880T2 (de) | System und verfahren zur erzeugung eines gesicherten netzes unter verwendung von beglaubigungen von verfahrensgruppen | |
DE60114986T2 (de) | Verfahren zur herausgabe einer elektronischen identität | |
DE102008000895B4 (de) | Verwendung eines mobilen Telekommunikationsgeräts als elektronische Gesundheitskarte | |
WO2005015514A1 (de) | Verfahren zum übermitteln von geschützten informationen an mehrere empfänger | |
EP1374011A2 (de) | Verfahren zum absichern einer transaktion auf einem computernetzwerk | |
WO2010031698A2 (de) | Verfahren zur speicherung von daten, computerprogrammprodukt, id-token und computersystem | |
DE60209809T2 (de) | Verfahren zur digitalen unterschrift | |
EP3295354A1 (de) | Verfahren und vorrichtung zur authentifizierung eines dienstnutzers für eine zu erbringende dienstleistung | |
DE102011075257B4 (de) | Beantwortung von Anfragen mittels des Kommunikationsendgeräts eines Nutzers | |
DE60203041T2 (de) | Verfahren und vorrichtung zum beglaubigen einer transaktion | |
EP1588295A2 (de) | Verfahren zum erbringen von diensten in einem datenübertragungsnetz und zugehörige komponenten | |
EP1282087A1 (de) | Verfahren zur Durchführung von Transaktionen von elektronischen Geldbeträgen zwischen Teilnehmerendgeräten eines Kommunikationsnetzes, Transaktionsserver und Programmmodul hierfür | |
EP3254432B1 (de) | Verfahren zur berechtigungsverwaltung in einer anordnung mit mehreren rechensystemen | |
DE60300660T2 (de) | Verfahren und System für mobile Endgeräte zum Vergeben und Verwalten von mit einem gekauften Inhalt verbundenen Nutzungsrechten | |
EP2115995A1 (de) | Elektronische visitenkarte | |
EP2397960B1 (de) | Verfahren zum Lesen von Attributen aus einem ID-Token über eine Telekommunikations-Chipkarte und ein Server-Computersystem | |
DE60216056T2 (de) | Verfahren und anordnung in einem kommunikationssystem | |
DE10136414A1 (de) | Verfahren zum Bezug einer über ein Datennetz angebotenen Leistung | |
WO2007079792A1 (de) | Verfahren und vorrichtung zum mobilfunknetzbasierten zugriff auf in einem öffentlichen datennetz bereitgestellten und eine freigabe erfordernden inhalten | |
DE102012025910B3 (de) | System zur Durchführung von Transaktionen | |
EP0951771A1 (de) | Verfahren zum liefern von daten bei genehmigung durch eine prüfstelle | |
EP2933769A1 (de) | Transaktionsverfahren | |
DE112013002111B4 (de) | Managen von sich wiederholenden Zahlungen von mobilen Endstellen | |
DE10331733A1 (de) | Bezahlsystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090831 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20091117 |
|
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G07F 7/10 20060101ALI20160914BHEP Ipc: G06Q 20/34 20120101ALI20160914BHEP Ipc: G06Q 10/10 20120101ALI20160914BHEP Ipc: H04L 29/06 20060101AFI20160914BHEP Ipc: H04W 4/12 20090101ALN20160914BHEP Ipc: G06Q 20/40 20120101ALI20160914BHEP |
|
INTG | Intention to grant announced |
Effective date: 20160929 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20170210 |