WO1999003070A1 - Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une façon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal - Google Patents
Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une façon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal Download PDFInfo
- Publication number
- WO1999003070A1 WO1999003070A1 PCT/FR1998/001477 FR9801477W WO9903070A1 WO 1999003070 A1 WO1999003070 A1 WO 1999003070A1 FR 9801477 W FR9801477 W FR 9801477W WO 9903070 A1 WO9903070 A1 WO 9903070A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- computer
- terminal
- computer terminal
- image
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Definitions
- the present invention relates to the field of securing computer transactions, and access to computer equipment.
- Patent EP677801 relates for example to a system for entering authentication information in graphic form.
- the input means is attached to the computer equipment, which possibly allows collective access. It is therefore impossible to prohibit a cryptanalysis attack by systematic testing of graphic configurations.
- Patent EP101772 describes a security solution by analyzing the user's physical characteristics. Again, these are means built into the IT equipment itself. Access to the equipment therefore allows systematic attacks, and possibly the physical circumvention of security means.
- Patent EP159539 relates to a chip card system intended to be used in place of money, as identity cards or as a memory medium. A single smart card can be used successively for different uses.
- An evaluation circuit, for which a determined selection procedure is fixed, is provided to be certain that the zones relating to the use case considered and only these zones are associated.
- the fixed device for its part contains a device which, when several mobile devices are present in the environment considered, controls multiple access. For for particular applications, the input-output device remains for the state at reception and automatically transmits the necessary information, upon reception, from the fixed station, of a signal, with which the information of use is transmitted.
- This patent does not describe a means of identification and authentication specifically related to portable equipment.
- PCT patent 093/11511 describes an access prohibition device controlling, by physical or logical means, human access to an objective, such as a limited access area or a computerized system, is controlled by means of a data processing system having access to a memory of authorized users and to a memory of complex images, particularly images of human faces.
- Each authorized user knows some of the complex images and these coded images are associated with a state of identity unique to said user.
- an image matrix comprising the coded images is presented to the user on a display device and, by means of an appropriate input device, said user must identify the images representing these coded images, in order to confirm the authorization and obtain access.
- User and image memories can be carried by a credit card as a section of an optical disc.
- the extreme security of the system lies in the inability of one person to communicate adequately to another person the ability to recognize a third person or another complex image.
- the utility model G9304488.7 relates to an autonomous portable equipment comprising a means of identification of the user.
- the present invention relates to an individual computer terminal capable of communicating with a collective IT equipment, or at least not reserved for a single user, in a secure manner, as well as an identification and authentication method implemented by said terminal.
- the invention relates to a system for securing computer equipment using several elements:
- the invention lies in the distribution of security functions between these three components.
- the "public" IT equipment is accessible by a potentially large number of users, and in particular unauthorized users. It is difficult to guarantee the security of such equipment, insofar as they lend themselves to systematic attacks which, admittedly, can prove to be tedious, but are not beyond the reach of a malicious person with long access to the public equipment.
- the portable terminal is the complementary element of the "public" equipment on the one hand and of the identification means on the other hand.
- the fact that it is portable makes it possible to physically prohibit access to it, for example by obliging the user to keep it under his responsibility, or to store it physically in a safe place, for example a strong cabinet.
- the means of identification and authentication fulfills a double function: it enables the security functions of the portable terminal to be activated. It also allows the user to physically check the nature of the means of identification and its integrity. It can be closely linked to the authorized user.
- the scope includes private, professional and public use.
- the passage " from one to the other is done under the control of the user.
- the public domain is trivialized.
- the invention relates in its most general form to an individual terminal for the operation of secure applications of the type comprising means of communication with other public computer equipment, characterized in that it comprises a means of authentication of the authorized user and means for transmission to the IT equipment with which he is in contact the result of the authentication step.
- the authentication means is recognizable and verifiable by the authorized user, and comprises identification means verifiable by the user and identification and authentication means verifiable by the portable terminal which are physically linked.
- the authentication means is constituted by a display capable of displaying at least one image, and a means for designating at least one area of the image, as well as by means for comparing the designated area or areas with the reference zones previously recorded in a memory.
- the authentication means is constituted by a fingerprint sensor and by a computer capable of making the comparison between the data provided by the fingerprint sensor and data previously recorded in memory.
- the authentication means is constituted by a voice sensor and by a computer capable of making the comparison between the data provided by the voice sensor and data previously recorded in memory.
- the terminal comprises an acquisition means such as a keyboard, a pen-scanner or a means of voice recognition or any means of capturing biometric characteristics.
- acquisition means such as a keyboard, a pen-scanner or a means of voice recognition or any means of capturing biometric characteristics.
- the terminal also includes means for reminding deadlines.
- the invention also relates to a method of authenticating a user before a transaction between a computer terminal according to one of the preceding claims, and computer equipment, characterized in that it comprises a step of displaying at least one image, a step of selecting an area of said image and a step of comparing between the selected area and data previously recorded in memory.
- the first step consists in choosing an image at least from a plurality of displayed images, the comparison step comprising a verification of said selection with respect to a previously recorded sequence.
- the invention also relates to the juxtaposition of the 3 types of writing (in clear, ECO (optical coded writing) and CD-ROM type) on one or more supports.
- Each medium can correspond to an access level.
- the information can be distributed partially or entirely between these three types of writing, as well as the communication between two terminals by direct or indirect physical contact to serve as physical support for a transmission of ultrasonic type.
- the terminal hosts the functions of managing several bank accounts corresponding to cards or checks. The choice is made by the operator. In addition, the terminal allows the management of information relating to the social and patrimonial existence of one individual.
- FIG. 1 shows a perspective view of a terminal according to the invention
- FIG. 2 shows a perspective view of the additional computer equipment.
- the invention is described with reference to a nonlimiting example of embodiment of the invention.
- the terminal according to the invention is shown in Figure 1 consists of a housing (1) having on one side a display screen (2), a keyboard (9) and an antenna (3) for wireless communication with the additional equipment.
- the housing also has a fingerprint sensor (4) and a microphone (5) as well as a speaker (7).
- the box also includes a memory card reader (6) and a printer (8).
- the additional IT equipment is shown in Figure 2. It includes a screen (11), an antenna (12), a speaker (13) and a microphone (14).
- the individual terminal includes means for authenticating the user. Authentication can be achieved by various means.
- a first means is based on the selection of images and, where appropriate, the selection of areas of the chosen images. This method consists in choosing one or more images from a plurality of possible images. Then, the user will have to choose one or more details of the selected images. This information is stored during initialization of the terminal for personalization which may be limited in time. The user will then have to use the same selection sequence each time to identify himself.
- the advantage of such sequences is to be easier to remember than encrypted or alphanumeric codes. In addition, they offer a large number of possible combinations and make it more difficult to search for the identifier by trial and error.
- Another authentication mode which can be added to the previous one consists in using a biometric sensor such as a fingerprint sensor associated with software for comparison with reference fingerprints of the authorized user.
- Another authentication mode which can also be added to the previous ones consists in implementing a voice recognition means making it possible to analyze the voice of the user and to compare it with the voice of the authorized user previously registered.
- the bearer is authenticated by the terminal as an authorized operator, he has access to the functionalities of the terminal. It is possible to manage several levels of authentication and authorization, depending on the functionalities accessible.
- the inputs of commands and information are made after authentication by an acquisition means such as a keyboard (9), or a microphone associated with speech analysis software, or a pen-scanner which can analyze documents, screens or various objects.
- an acquisition means such as a keyboard (9), or a microphone associated with speech analysis software, or a pen-scanner which can analyze documents, screens or various objects.
- the terminal After authenticating the user, the terminal can control various functions: access to a previously selected area or equipment;
- the terminal may also include an agenda for memorizing the operations carried out to be carried out at a certain time. The terminal then allows:
- Second level ECO type coded writing, generalized reading by scanner
- Third level of secure access encrypted CD-ROM technology, specific reading device.
- the terminal hosts the functions of several payment cards and types of checks.
- the terminal loads the functions and parameters of the different means of payment and management financial, and cards that one wishes to use, which avoids the loss of cards, checks ...
- the terminal includes a printer (8) for printing alphanumeric characters as well as for editing codes such as ECO codes, preferably with sealing.
- each operation has a printing surface of approximately 30mm by 10mm, allowing two lines of 60 characters and a summary line to be entered in ECO code. It is thus possible to edit proof cards the size of a bank card, containing the summary of 50 operations per side.
- proof cards will be kept in a safe place. They can serve as proof for the operations carried out, but also as a safeguard in the event of loss or failure of the terminal.
- the "proof” is developed contradictorily between the portable terminal and the fixed terminal. After dialogue and agreement, the two devices print the same text on their respective proof cards.
- Communication between the individual terminal and the associated equipment is carried out by any known means: on contact, by wires and electrical contacts; - by ultrasound.
- the terminal has a piezoelectric transmitter-receiver cell which can be brought into contact with a rigid plate of the additional equipment.
- a specific protocol is used to manage the dialogue and ensure serial communication. This link makes it possible to use low transmission powers and therefore to reduce electromagnetic disturbances.
- the customer prepares his terminal (authentication) away from prying eyes.
- his terminal authentication
- the customer places his individual terminal on the merchant's table, equipped with an ultrasonic link and initiates dialogue with the merchant's additional equipment.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Human Computer Interaction (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU85459/98A AU8545998A (en) | 1997-07-08 | 1998-07-08 | Personal computer terminal capable of safely communicating with a computer equ ipment, and authenticating method used by said terminal |
EP98936482A EP0995172A1 (fr) | 1997-07-08 | 1998-07-08 | Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une facon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9708679A FR2765979B1 (fr) | 1997-07-08 | 1997-07-08 | Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une facon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal |
FR97/08679 | 1997-07-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999003070A1 true WO1999003070A1 (fr) | 1999-01-21 |
Family
ID=9509018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1998/001477 WO1999003070A1 (fr) | 1997-07-08 | 1998-07-08 | Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une façon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0995172A1 (fr) |
AU (1) | AU8545998A (fr) |
FR (1) | FR2765979B1 (fr) |
WO (1) | WO1999003070A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1269289B1 (fr) * | 2000-03-21 | 2006-05-31 | Anoto IP Lic HB | Controle d'acces |
US7254839B2 (en) | 2000-03-21 | 2007-08-07 | Anoto Ab | Secured access using a coordinate system |
GB2440612A (en) * | 2006-07-31 | 2008-02-06 | Intuit Inc | User authentication on a computer by selection of a portion of a displayed file |
US9762576B2 (en) | 2006-11-16 | 2017-09-12 | Phonefactor, Inc. | Enhanced multi factor authentication |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19957390A1 (de) * | 1999-11-24 | 2001-06-07 | Andreas Kuntze | Individualisierungssystem für einen Gegenstand |
AU2001251202A1 (en) * | 2000-04-07 | 2001-10-23 | Rsa Security, Inc. | System and method for authenticating a user |
FR2808153B1 (fr) * | 2000-04-21 | 2005-02-04 | Sagem | Terminal de transmission de donnees a memoire verrouillee |
EP1213638A1 (fr) * | 2000-12-06 | 2002-06-12 | Siemens Aktiengesellschaft | Activation d'équipement |
FI20030922A (fi) * | 2003-06-19 | 2004-12-20 | Elisa Oyj | Käyttäjän tunnistus |
FR2875031B1 (fr) * | 2004-09-08 | 2006-10-20 | Jacques Rivaillier | Terminal informatique de communication personnalise et portatif dote de memoires et modules amovibles avec lesquels il communique de facon confidentielle pour garantir la securite des echanges avec l'exterieur |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1983004327A1 (fr) * | 1982-05-21 | 1983-12-08 | Satyan Gangaram Pitroda | Systeme ayant un dispositif d'introduction a distance de donnees dans un ordinateur, appareil associe et son procede d'utilisation |
EP0101772A1 (fr) | 1982-09-01 | 1984-03-07 | Jerome Hal Lemelson | Systèmes de sécurité pour un ordinateur |
EP0159539A1 (fr) | 1984-04-04 | 1985-10-30 | Siemens Aktiengesellschaft | Système de cartes à circuit intégré |
GB2181582A (en) * | 1985-10-11 | 1987-04-23 | Victor Campbell Blackwell | Personal identification device |
DE3706466A1 (de) * | 1987-02-27 | 1988-09-08 | Siemens Ag | Tragbare bedieneinheit fuer chipkarten |
EP0508405A1 (fr) * | 1991-04-12 | 1992-10-14 | Sharp Kabushiki Kaisha | Système de localisation et récepteur GPS |
WO1993011511A2 (fr) | 1991-11-30 | 1993-06-10 | John Hugh Evans Davies | Dispositifs d'identification de personnes et systemes de commande d'acces |
DE9304488U1 (de) | 1993-03-24 | 1993-07-29 | Siemens AG, 80333 München | Fernsprechhandapparat |
EP0677801A1 (fr) | 1994-04-04 | 1995-10-18 | AT&T Corp. | Mot de passe graphique |
WO1996013814A1 (fr) * | 1994-10-28 | 1996-05-09 | Behruz Vazvan | Systeme de telepaiement en temps reel |
WO1996032700A1 (fr) * | 1995-04-11 | 1996-10-17 | Au-System | Ameliorations concernant les portefeuilles electroniques |
-
1997
- 1997-07-08 FR FR9708679A patent/FR2765979B1/fr not_active Expired - Fee Related
-
1998
- 1998-07-08 AU AU85459/98A patent/AU8545998A/en not_active Abandoned
- 1998-07-08 EP EP98936482A patent/EP0995172A1/fr not_active Withdrawn
- 1998-07-08 WO PCT/FR1998/001477 patent/WO1999003070A1/fr not_active Application Discontinuation
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1983004327A1 (fr) * | 1982-05-21 | 1983-12-08 | Satyan Gangaram Pitroda | Systeme ayant un dispositif d'introduction a distance de donnees dans un ordinateur, appareil associe et son procede d'utilisation |
EP0101772A1 (fr) | 1982-09-01 | 1984-03-07 | Jerome Hal Lemelson | Systèmes de sécurité pour un ordinateur |
EP0159539A1 (fr) | 1984-04-04 | 1985-10-30 | Siemens Aktiengesellschaft | Système de cartes à circuit intégré |
GB2181582A (en) * | 1985-10-11 | 1987-04-23 | Victor Campbell Blackwell | Personal identification device |
DE3706466A1 (de) * | 1987-02-27 | 1988-09-08 | Siemens Ag | Tragbare bedieneinheit fuer chipkarten |
EP0508405A1 (fr) * | 1991-04-12 | 1992-10-14 | Sharp Kabushiki Kaisha | Système de localisation et récepteur GPS |
WO1993011511A2 (fr) | 1991-11-30 | 1993-06-10 | John Hugh Evans Davies | Dispositifs d'identification de personnes et systemes de commande d'acces |
DE9304488U1 (de) | 1993-03-24 | 1993-07-29 | Siemens AG, 80333 München | Fernsprechhandapparat |
EP0677801A1 (fr) | 1994-04-04 | 1995-10-18 | AT&T Corp. | Mot de passe graphique |
WO1996013814A1 (fr) * | 1994-10-28 | 1996-05-09 | Behruz Vazvan | Systeme de telepaiement en temps reel |
WO1996032700A1 (fr) * | 1995-04-11 | 1996-10-17 | Au-System | Ameliorations concernant les portefeuilles electroniques |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1269289B1 (fr) * | 2000-03-21 | 2006-05-31 | Anoto IP Lic HB | Controle d'acces |
US7254839B2 (en) | 2000-03-21 | 2007-08-07 | Anoto Ab | Secured access using a coordinate system |
GB2440612A (en) * | 2006-07-31 | 2008-02-06 | Intuit Inc | User authentication on a computer by selection of a portion of a displayed file |
GB2440612B (en) * | 2006-07-31 | 2011-09-07 | Intuit Inc | Method and apparatus for authenticating a user |
US9762576B2 (en) | 2006-11-16 | 2017-09-12 | Phonefactor, Inc. | Enhanced multi factor authentication |
US10122715B2 (en) | 2006-11-16 | 2018-11-06 | Microsoft Technology Licensing, Llc | Enhanced multi factor authentication |
Also Published As
Publication number | Publication date |
---|---|
FR2765979B1 (fr) | 2005-05-27 |
AU8545998A (en) | 1999-02-08 |
EP0995172A1 (fr) | 2000-04-26 |
FR2765979A1 (fr) | 1999-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200402050A1 (en) | System and method for secure transactions at a mobile device | |
US10853809B2 (en) | System and method for conducting secure electronic transactions | |
EP2646990B1 (fr) | Procede et systeme de transaction nfc ameliores | |
US7647279B2 (en) | Method to make transactions secure by means of cards having unique and non-reproducible identifiers | |
AU2010289507B2 (en) | A personalized multifunctional access device possessing an individualized form of authenticating and controlling data exchange | |
US20120032782A1 (en) | System for restricted biometric access for a secure global online and electronic environment | |
Aru et al. | Facial verification technology for use in ATM transactions | |
EP2048814A1 (fr) | Procédé d'authentification biométrique, programme d'ordinateur, serveur d'authentification, terminal et objet portatif correspondants. | |
US20150142647A1 (en) | Consumer Bill-Pay | |
CN101504785B (zh) | 生物体认证控制方法及现金自动交易装置 | |
WO2015033162A1 (fr) | Autorisation de ticket | |
WO1999003070A1 (fr) | Terminal informatique individuel susceptible de communiquer avec un equipement informatique d'une façon securisee, ainsi qu'un procede d'authentification mis en oeuvre par ledit terminal | |
US10332082B2 (en) | Method and system for issuing a payment medium | |
WO2020221938A1 (fr) | Procédé de connexion sécurisée à un service web embarqué et dispositif correspondant | |
WO2010007479A2 (fr) | Appareil et procédé de génération d'un titre sécurisé à partir d'un titre officiel | |
RU2589847C2 (ru) | Способ оплаты товаров и услуг с использованием биометрических параметров клиента и устройство для его осуществления | |
US20220092600A1 (en) | System for Credit Card, Debit Card, and Voting Fraud Prevention | |
Kavyashree et al. | FINGERPRINT AND FACE RECOGNITION BASED ATM SYSTEM USING RASPBERRY PI | |
WO2021249950A1 (fr) | Procede de revelation digitale d'au moins une donnee securitaire d'une carte a puce et utilisations de ce procede | |
WO2006030108A1 (fr) | Terminal de communication qui s'identifie a l’operateur et authentifie ses elements amovibles | |
WO2024112341A1 (fr) | Authentification biométrique superposée | |
JP2005202729A (ja) | 自動取引システム | |
TR202004324A2 (tr) | BANKACILIK UYGULAMALARINDA ATM ve POS CİHAZLARINDA KART ALTERNATİFİ YÜZ TANIMA SİSTEMLERİNİN KULLANILMASI | |
EP1172775A1 (fr) | Procédé de protection d'un accès à un domaine sécurisé | |
FR2967513A1 (fr) | Serveur de transaction nfc |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998936482 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1998936482 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: CA |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998936482 Country of ref document: EP |