EP4241190A1 - Durch strukturelle entkopplung von persönlichen und dienstidentifikatoren gesichertes authentifizierungsverfahren - Google Patents
Durch strukturelle entkopplung von persönlichen und dienstidentifikatoren gesichertes authentifizierungsverfahrenInfo
- Publication number
- EP4241190A1 EP4241190A1 EP21819918.0A EP21819918A EP4241190A1 EP 4241190 A1 EP4241190 A1 EP 4241190A1 EP 21819918 A EP21819918 A EP 21819918A EP 4241190 A1 EP4241190 A1 EP 4241190A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- identifier
- computer equipment
- user
- service
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000003213 activating effect Effects 0.000 claims abstract 2
- 230000006870 function Effects 0.000 claims description 29
- 230000002441 reversible effect Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 239000011159 matrix material Substances 0.000 description 6
- 238000012546 transfer Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 238000010200 validation analysis Methods 0.000 description 3
- AFUDNVRZGPHSQO-UHFFFAOYSA-N 2-(2-methylpropylamino)-1,2-diphenylethanol Chemical compound C=1C=CC=CC=1C(NCC(C)C)C(O)C1=CC=CC=C1 AFUDNVRZGPHSQO-UHFFFAOYSA-N 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- ZLSSXLNNHMPGJW-UHFFFAOYSA-N [1-hydroxy-4-[methyl(pentyl)amino]-1-phosphonobutyl]phosphonic acid Chemical compound CCCCCN(C)CCCC(O)(P(O)(O)=O)P(O)(O)=O ZLSSXLNNHMPGJW-UHFFFAOYSA-N 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000000135 prohibitive effect Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Definitions
- the present invention relates to the field of authentication of a user carrying out electronic transactions using a terminal connected to computer equipment or access to a physical system.
- Biometric recognition techniques based on image capture systems coupled to a central database storing personal information constitute a path that comes up against harmful limits. Indeed, the biometric data may vary slightly. To take these variations into account, provision is made to retain only a small part of points considered to be invariant. However, this translates to:
- the invention therefore relates to the field of authentication excluding biometric data, and more specifically the field of electronic transactions activated using a reliable unique identifier such as for example a QrCode, an alphanumeric identifier, an email address , a unique identification number such as an IBAN or a social security number, and securing the process of registration of the identifier, storage and verification to reduce the risks in the event of computer attacks from a server of the transaction system.
- a reliable unique identifier such as for example a QrCode, an alphanumeric identifier, an email address , a unique identification number such as an IBAN or a social security number
- the method described in the invention comprises generating a one-time transaction request identification; the transaction manager linking this identification to banking information of a subscribed user; providing the transaction request identification to the subscribed user who is making a request to purchase a product or service of value from a merchant.
- the purchase request consists of providing the identification of the transaction request to the merchant.
- the merchant sends a payment request to the transaction manager for a transfer of funds equal to the value from the user to the merchant; the payment request including the identification of the transaction request and the value.
- the transaction manager verifies the validity of the identification of the transaction request, then it invalidates the reuse of this identification. If the identification of the transaction request is valid, an electronic funds transfer request is sent to a financial institution in order to allow the transfer of the cashed value from the user to the merchant, the electronic funds transfer request comprising banking information.
- European patent EP2839603B1 describes a user authentication method comprising the execution, by a processing system, of the following operations:
- the stored record comprising at least code value complexity preference data that defines a user-preferred level of complexity for a user in validating user input received in response to the presentation of security matrices, and a user-defined keyword consisting of an ordered sequence of symbols comprising members of a predetermined symbol set selected from one or more symbol sets supported by the processing, where the symbols of the ordered sequence have been previously selected by the user regardless of other user selections,
- One of the sources of vulnerability lies in the management of identifiers. Knowing the identifier makes it possible to go through a first step in the authorization procedure for a service, the information being used for the next step, which is the authentication of the user who has transmitted — legally or fraudulently — a valid identifier. .
- the security of the identifier depends on the measures taken by the user to keep it secret, and if necessary on the electronic means provided on the physical support of the identifier when it is recorded on a key, a card or a portable equipment such as a telephone.
- a third drawback lies in the risk of data interception and fraudulent reuse of this data.
- a fourth disadvantage lies in the risk of creating a false account to access the services of a third party user.
- the present invention relates, in its most general sense, to a secure transaction method for a security identifier, in particular without a token, consisting in recording on a first computer equipment B a unique digital identifier ID ⁇ associated with a unique user.
- said profile ID ⁇ being associated with at least one service identifier ID S ⁇ associated with a service S ⁇ , recorded on a second computer equipment S distinct from said first computer equipment B, said service S ⁇ being accessible by the user U ⁇ , and, during a transaction, to acquire the digital identifier ID ⁇ of a user U ⁇ , to transmit it to said first computer equipment B for comparison with the registered identifiers ID and to search and activate on the computer equipment S at least one service associated with the identifier of the user U ⁇ , characterized in that the step of registering a new user comprises the steps known living:
- a step of generating at least one reference identifier IDSEx calculated by applying a non-reversible FSE reference cryptographic function, distinct from the FR function, to said temporary random key, and recording in a computer table of the unique couple (ID S ⁇ , IDSEx) recorded on a computer equipment S, in that the execution of a transaction comprises the following steps:
- it also comprises, at the time of reception by a central computer equipment of an identifier ID ⁇ , a step of generating an identifier of IDPEx reference calculated by applying a non-reversible FPE cryptographic function, distinct from the FR and FSE reference functions, to said random key X and recording in a computer table of the pair (ID P ⁇ , IDPEx), where IDpi is a personal information identifier P ⁇ associated with the user U ⁇ and accessible to the latter, stored on a third computer equipment P distinct from said first and second computer equipment B and S, and at the time the transaction is carried out, the search for personal information P ⁇ on said third computer equipment P by applying the function FPE to said temporary random key, in order to calculate the identifier IDPEx and obtain the identifier IP p ⁇ associated with the personal information P ⁇ .
- IDpi is a personal information identifier P ⁇ associated with the user U ⁇ and accessible to the latter
- the invention also relates to a set of computer equipment for carrying out secure transactions of a tokenless security identifier, characterized in that said set of computer equipment comprises computer equipment allowing access to a first computer equipment B and to at least one second service computer equipment S, and a key computer equipment forming the support for said non-reversible functions.
- the assembly further comprises computer processing equipment for carrying out the control, security and plausibility processing of the information coming from the users' equipment.
- the invention further comprises a computer program for controlling the execution on a computer equipment of the realization of a secure transaction of a security identifier without token characterized in that it consists of a code controlling the acquisition of a digital identifier coming from remote equipment, the processing of said identifiers in accordance with the aforementioned method and the execution of the data exchange protocol between remote equipment and computer equipment for the operation of said.
- FIG. 1 represents the hardware architecture of computer equipment for the implementation of the invention
- FIG. 2 shows the block diagram of one invention
- FIG. 3 figure 3 represents the diagram of data exchanges for the enrollment procedure of a new user
- FIG. 4 figure 4 represents the data exchange diagram for the enrollment procedure of a user to a new service
- FIG. 5 represents the data exchange diagram for the service access procedure by an enrolled user.
- Figure 1 shows a block diagram of the hardware architecture of a system for implementing the invention.
- the user has a unique identifier which can be simply memorized, or recorded on a device in the possession of the user and transferred to a control terminal by entering it on a keyboard or a touch screen, or transmitting it from a memory by a physical link such as a connector or an optical or radiofrequency link.
- the input and output computer equipment (0) receives the information flows from the user equipment, manages the queues, for on-the-fly distribution on the processing computer equipment (1) and the returns to input terminals or identifier transmission equipment.
- This input and output equipment (0) also carries out control, security and plausibility, and transmission processing in order to verify that the information transmitted is indeed of a compliant nature. These include checking whether the identifier of the terminal or of the equipment transmitting the identifier (for example its IP address) is on a terminal registered on a blacklist, or whether the information presents anomalies representative attempted attacks, saturation or fraud.
- the computer equipment (0) opens a transactional session to interact with the equipment (1) giving access to the equipment (2 to 4) to obtain the user profiles, services and personal information and to react with the equipment (0) to exchange with the user concerned by a transactional session managed in synchronous or asynchronous mode.
- the computer equipment (2 to 4) manages the consolidated access to the user profiles, services and personal information, by interacting with a key computer equipment (5) forming the support for the non-reversible functions implemented by the method according to the invention.
- the computer equipment (6) makes it possible to administer the entire system, in particular keeping track of all the transactions, in order to allow the auditing of transactions and in the event of a physical crash, the restoration of transactions.
- FIG. 2 represents an example of a functional diagram
- the new user first proceeds to an enrollment via a computer equipment (0) as illustrated by FIG. 3. He opens a session with the computer equipment (1) and transmits a digital file corresponding to an enrollment request.
- This file contains an identifier, profile data and personal data. It may be transmitted in encrypted form.
- the customer accesses the service via computer equipment (0) which includes a means of entering or transmitting an identifier, for example a keyboard, a QRCode reader, a radiofrequency module, a connector for receiving a identifier registration device or an application in charge of transmitting the identifier.
- This equipment (0) is connected to a network to open a session with the system (100) which hosts the set of computer equipment constituting the hardware architecture of the invention.
- the first function (10) consists in recovering, controlling and transmitting the information necessary for the transaction, in particular the digital identifier acquired by the equipment computer (0) as well as associated information (for example the geolocation of the terminal, the identifiers of the terminal or of the application in charge of transmitting the identifier (IP address, various identifiers such as SIM card, etc.) or 1 'timestamp) , as well as information on the nature of the transaction.
- This information comes from the identifier of the supplier/terminal pair, for example when it is a terminal from a supplier made available to users, or from the identification of the service access application.
- Function (10) also opens a transactional session for each user.
- the user enrolled as explained above then proceeds to an enrollment in services via his computer equipment (0) as illustrated by FIG. 4. He opens a session with the computer equipment (1) and transmits a digital file corresponding to a service registration request.
- This file contains a service identifier, profile data and personal data. It may be transmitted in encrypted form.
- This process (11) is integrated into a processing chain linked to a transactional session opened for each user by the function (10).
- each transactional session consists in transmitting, controlling and reconciling the user profiles, the service identifiers and the personal information provided by the function (11), then in obtaining the service selected by the customer.
- This processing (11) is carried out by the computer equipment (1), by interacting with the computer equipment (2 to 4) and (5).
- the system (100) also integrates administration functions and functions in charge of traceability and security protocols.
- the user enrolled as explained above can then proceed to requests for access to previously enrolled services as illustrated by FIG. 5. He opens a session with the computer equipment (1) and transmits a digital file corresponding to a request for access to the service.
- This file contains an identifier and profile data. It may be transmitted in encrypted form.
- This request is checked by the equipment (1) to check whether the user is actually enrolled, and whether the requested service is enrolled. If this is the case, it transmits the access request to the computer equipment (2) corresponding to the requested service.
- This equipment (2) extracts the identifier IDR X from the identifier ID and performs a check of the profile recorded in the request. In case of erroneous control, the task is stopped by an interruption procedure and optionally a notification to the equipment (1) which transmits it to the equipment (0) of the user. If the check is positive, the computer equipment concerned (2) opens a session with the computer equipment (5) to obtain the public key KR then proceeds to calculate the source value X from a decryption function F - 1 (KV,Y) as discussed in more detail below.
- This source value thus calculated is controlled by the equipment 2, and transmitted to the equipment (1).
- the equipment then makes a request for access to the service (X) by a session with the equipment (4), which opens a session with the equipment (5) to transmit a request access to the KSE key.
- the equipment (5) extracts the identifier IDS ⁇ and the service data to transmit them to the equipment (1) which transmits them via the session initially opened to the equipment (0) of the 'user.
- One of the important aims of the invention is to guarantee data security natively integrated into its architecture ("by design") because the reference identifier of the digital identifier and the reference identifiers of the services are structurally different, their generation being managed by an algorithm based on a one-way cryptographic function so as to be able to perform reconciliations on the fly according to transactional needs.
- the proposed mechanism is based on the use of cryptographic protocols such as AES with keys of size greater than 128 bits, for example RSA with a key of 2048 bits.
- the computer equipment (1) draws a random value X at random, for example using a hash function to statistically avoid collisions.
- the computer equipment (2 to 4) interact with the computer equipment (5) to obtain the public keys KR, KPE and KSE to respectively manage the exchanges concerning the identification information, the services and the personal information.
- the IT equipments (2 to 5) manufacture the IDR reference identifier and at least one IDSE service identifier, as well as an IDPE personal information identifier, if applicable, according to the following simple rules (in the event of a collision with an existing identifier, a new X value will be generated):
- IDPE FPE(KPE, X)
- IDSE FSE(KSE, X) .
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR2011468A FR3116132A1 (fr) | 2020-11-09 | 2020-11-09 | Procede de d’authentification securise par le decouplage structurel des identifiants personnels et de services |
PCT/FR2021/051984 WO2022096841A1 (fr) | 2020-11-09 | 2021-11-09 | Procede d'authentification securise par le decouplage structurel des identifiants personnels et de services |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4241190A1 true EP4241190A1 (de) | 2023-09-13 |
Family
ID=75746680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21819918.0A Pending EP4241190A1 (de) | 2020-11-09 | 2021-11-09 | Durch strukturelle entkopplung von persönlichen und dienstidentifikatoren gesichertes authentifizierungsverfahren |
Country Status (4)
Country | Link |
---|---|
US (1) | US20230410098A1 (de) |
EP (1) | EP4241190A1 (de) |
FR (1) | FR3116132A1 (de) |
WO (1) | WO2022096841A1 (de) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPS087602A0 (en) | 2002-03-04 | 2002-03-28 | Ong, Yong Kin (Michael) | Electronic fund transfer system |
FR2962571B1 (fr) | 2010-07-08 | 2012-08-17 | Inside Contactless | Procede d'execution d'une application securisee dans un dispositif nfc |
US8869255B2 (en) | 2010-11-30 | 2014-10-21 | Forticom Group Ltd | Method and system for abstracted and randomized one-time use passwords for transactional authentication |
FR3033205B1 (fr) * | 2015-02-27 | 2018-04-06 | C.E.S.A.M.E.S Groupe | Procede de transaction sans support physique d'un identifiant de securite et sans jeton, securise par decouplage structurel des identifiants personnels et de services. |
-
2020
- 2020-11-09 FR FR2011468A patent/FR3116132A1/fr active Pending
-
2021
- 2021-11-09 WO PCT/FR2021/051984 patent/WO2022096841A1/fr active Application Filing
- 2021-11-09 EP EP21819918.0A patent/EP4241190A1/de active Pending
- 2021-11-09 US US18/035,848 patent/US20230410098A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2022096841A1 (fr) | 2022-05-12 |
FR3116132A1 (fr) | 2022-05-13 |
US20230410098A1 (en) | 2023-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11392940B2 (en) | Multi-approval system using M of N keys to perform an action at a customer device | |
EP3547270B1 (de) | Überprüfungsverfahren einer biometrischen authentifizierung | |
US9892404B2 (en) | Secure identity authentication in an electronic transaction | |
EP3547203A1 (de) | Methode und system für die zugriffsverwaltung von personenbezogenen daten mithilfe eines intelligenten vertrags | |
EP0055986B1 (de) | Sicherheitsverfahren und -vorrichtung zur Dreieckkommunikation von vertraulichen Daten | |
EP2614458B1 (de) | Authentifizierungsverfahren zum zugang auf eine webseite | |
CH633379A5 (fr) | Installation de securite notamment pour l'execution d'operations bancaires. | |
EP2048814A1 (de) | Verfahren zur biometrischen Authentifizierung, entsprechendes Computerprogramm, entsprechender Authentifizierungsserver, entsprechendes Endgerät und tragbares Objekt | |
CN103985036A (zh) | 一种带生物特征的二维码支付方法 | |
CN110533417B (zh) | 一种数字资产管理装置、发行方法及系统 | |
EP3742699A1 (de) | Starkes authentifizierungsverfahren einer person | |
FR3098947A1 (fr) | Procédé de traitement d’une transaction émise depuis une entité de preuve | |
EP3686788A1 (de) | Überprüfungsverfahren einer biometrischen authentifizierung | |
EP3731116B1 (de) | Verfahrem zur authentifizierung von einem identifikationsdocument für eine person und authentifizierung von dieser person. | |
US20240073697A1 (en) | Subscriber identity module (sim) card feature-based non-fungible token (nft) | |
EP2509025A1 (de) | Zugriffsverfahren auf eine geschützte Quelle einer gesicherten persönlichen Vorrichtung | |
US20220277102A1 (en) | Process using one-way hashing function for secure collection, presentation and storage of PII | |
FR3004561A1 (fr) | Methode et systeme d'amelioration de la securite des transactions electroniques | |
EP3262553B1 (de) | Verfahren zur transaktion ohne körperliche unterstützung eines sicherheitsidentifikators und ohne token, abgesichert durch strukturelle entkopplung der persönlichen und dienstidentifikatoren | |
Raina | Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices. | |
EP4241190A1 (de) | Durch strukturelle entkopplung von persönlichen und dienstidentifikatoren gesichertes authentifizierungsverfahren | |
FR2730076A1 (fr) | Procede d'authentification par un serveur du porteur d'un objet portatif a microprocesseur, serveur et objet portatif correspondants | |
FR2984047A1 (fr) | Procede d'echange de donnee chiffree entre un terminal et une machine | |
US20240073696A1 (en) | Resource exchange event verification based on subscriber identity module (sim) card feature comparison | |
FR3143143A1 (fr) | Procédé de connexion à un compte personnel sur un service en ligne au moyen d’une chaîne de blocs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230515 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) |