WO2005008608A1 - Systeme de paiement, terminal de systeme de paiement et procede pour realiser un paiement electronique - Google Patents

Systeme de paiement, terminal de systeme de paiement et procede pour realiser un paiement electronique Download PDF

Info

Publication number
WO2005008608A1
WO2005008608A1 PCT/EP2004/007566 EP2004007566W WO2005008608A1 WO 2005008608 A1 WO2005008608 A1 WO 2005008608A1 EP 2004007566 W EP2004007566 W EP 2004007566W WO 2005008608 A1 WO2005008608 A1 WO 2005008608A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
data
background system
payment
transmission
Prior art date
Application number
PCT/EP2004/007566
Other languages
German (de)
English (en)
Inventor
Rene Lehmann
Original Assignee
Rene Lehmann
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE20310759U external-priority patent/DE20310759U1/de
Priority claimed from DE10331733A external-priority patent/DE10331733A1/de
Application filed by Rene Lehmann filed Critical Rene Lehmann
Publication of WO2005008608A1 publication Critical patent/WO2005008608A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3223Realising banking transactions through M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F15/00Coin-freed apparatus with meter-controlled dispensing of liquid, gas or electricity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Definitions

  • the invention relates to a payment system with the generic features of claim 1, a terminal for such a payment system and a method for carrying out an electronic payment process.
  • a payment system with a background system with access to databases in which data on traders and potential customers, in particular bank customers with bank accounts, is stored is generally known.
  • the payment system also has a first group of terminals, which are available as dealer terminals at points of sale or service points.
  • the payment system has a second group of terminals as customer terminals, the customer terminals being operated by users who wish to make a payment at the dealer terminal or towards a dealer terminal. It is generally known to use a simple encryption system in order not to transmit the data as plain text.
  • the payment system thus serves to carry out a monetary transaction by transferring data between a specific first terminal of the first group of terminals and a specific second terminal of the second group of terminals.
  • a problem with such payment systems is the security of the authorization of the payment by the customer, whereby it cannot be ensured against misuse that the person who initiates the payment is actually the person who is authorized to do so.
  • a customer only authorizes a head office to credit money from his account to a merchant's account.
  • the central office can be a bank, a credit card institute, etc.
  • the signature is usually sufficient at the location of the action or purchase of the customer on a form which the dealer receives as credit card receipt, direct debit receipt, etc. after the customer has inserted his card into a corresponding dealer terminal.
  • the merchant After the customer has signed, the merchant only checks whether the supposed card holder is correct by comparing the signature on the receipt and the signature on the customer's card.
  • a somewhat higher level of security is provided by entering a personal identification number (PIN), which the customer enters into the dealer terminal.
  • PIN personal identification number
  • the data that was entered in the dealer terminal can be transferred to the background system in different ways.
  • Telephone connections with special protocols for data transmission such as payment traffic terminals (ZVT) are customary for the transmission of the data.
  • ZVT payment traffic terminals
  • the use of mobile radio devices is also known, the advantage being taken advantage of the fact that the customer is known to the mobile radio operator and the latter has the permission to collect amounts together with the mobile radio bill as a collection company.
  • the customer authenticates himself by transmitting the mobile number of his mobile device serving as the customer terminal or, in the best case, provides additional security by entering a further PIN or comparable identification.
  • the method also has a background system with a background method for credit check, authorization check, etc., this method essentially corresponds to the standard methods of conventional online payments such as when using an EC card (EC: Eurocheque) in connection with a PIN input.
  • EC card EC: Eurocheque
  • An electronic payment system is known from WO 98/47116, which essentially corresponds to methods known per se from the area of credit card inquiries and the so-called e-cash and from loading electronic wallets.
  • the customer terminal, dealer terminal and a server in the background system are connected to one another during the process, which is an online process. Attention is also drawn to the possibility of using encryption methods, although there is no specific description of the type of encryption.
  • customer data is stored in the so-called SIM card (SIM: Subscriber Identification Module), in which the IMSI identifier (IMSI: International Mobile Subscriber Identity) that is uniquely assigned to the SIM card is also stored.
  • SIM card SIM: Subscriber Identification Module
  • IMSI International Mobile Subscriber Identity
  • the SIM card is protected against misuse by a 4-digit PIN as long as the PIN is kept secret.
  • the storage of customer data in the SIM card is particularly disadvantageous.
  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications System
  • the object of the invention is to further develop a payment system for electronically carrying out a monetary transaction, terminals for such a payment system and a method for carrying out an electronic payment process.
  • the starting point is an electronic payment system with a background system that enables access to databases. In the usual way, necessary data of dealers and customers as well as bank accounts of these dealers and customers are stored in the databases. Access to this data from outside is blocked.
  • the payment system also has two groups of terminals, a first group of terminals serving as merchant terminals and a second group of terminals serving as customer terminals, with a payment from the operator of a customer terminal to the operator of a dealer terminal is initiated.
  • the term terminal can be seen widely here and includes passive devices with an electronic chip, which is activated when contacted by an external field in order to exchange data.
  • a terminal is to be understood to mean, for example, mobile radio devices with a SIM card for identifying them in a specific mobile radio network, mobile computers with radio network interfaces and network terminals with network access to a remote data source.
  • the payment system also has an encryption system for encrypting the data to be transmitted or parts of the data, so that they cannot be transmitted as plain text, making interception and direct use more difficult.
  • the payment system is used to carry out a monetary transaction by transferring data or data records between a first terminal of the first group of terminals and a second terminal of the second group of terminals, the data not necessarily having to be exchanged directly between the terminals concerned.
  • an encryption system is used to encrypt the data between the first terminal, the second terminal and / or the background system, which provides unique key pairs, each with a public key and a private key.
  • the public key is used to have data or data records encrypted by a third-party device before the data is transmitted.
  • the encrypted data is then decrypted by the recipient using the private key.
  • An encryption system with, for example, a so-called RSA key pair is therefore used.
  • a system key can be used if the background system is to be used to charge electronic exchanges and the like arranged in the terminal.
  • a key pair is particularly advantageous if the transmission of the data between the first terminal and the background system, between the second terminal and the background system and / or between the second terminal and the first terminal is carried out with one or preferably two such key pairs , With two key pairs, one key pair is provided for each connection direction, so that in an ideal configuration each of the devices has a unique key pair for each special connection to one of the other devices in order to encrypt data with a public key, which can only be decrypted by the receiver-side device ,
  • Such a third device can, in particular, be the further device present in the payment system, so that, for example, data encrypted by the background system after a check for the customer terminal as the second terminal is first transmitted to the first terminal or dealer terminal, in order to finally be sent from the first terminal to be forwarded to the second terminal.
  • the data can then be decrypted with the private key, while in the dealer terminal only forwarding of data that cannot be decrypted and cannot be used further.
  • Such a transmission can of course be carried out in any direction between the three participating devices, dealer terminal, customer terminal and background system, with the interposition of the third of these devices if a corresponding number of individually and uniquely assigned key pairs is provided in the corresponding devices ,
  • this also enables the transfer of customer data through the second terminal to the dealer terminal if the second terminal cannot establish a direct data connection to the background system at the moment or in principle.
  • the dealer terminal then forwards the data from the customer terminal to the background system via any communication link. Nevertheless, it is ensured that misuse in the area of the dealer terminal or the data connections is not possible.
  • payment data can also be transmitted from the second or customer terminal to the background system independently of the first or dealer terminal.
  • This case enables e.g. Constellations in which data from the dealer terminal or an article assigned to the dealer terminal are transferred to the second terminal manually or via an automated interface.
  • the data is encrypted as payment data with the public key of the background system and transmitted to it.
  • the background system can then initiate a transaction with or without prior consultation with the first and / or the second terminal.
  • data that are to be transmitted from the first or second terminal are supplemented prior to the transmission by additional data that were previously requested and received by the background system for the special payment process.
  • This additional data consists in particular of a transaction number clearly assigned to the process, which can be uniquely assigned to the case process and the originally requesting device by the background system upon receipt of corresponding data.
  • the Additional data thus represent a transaction number.
  • Data which are transmitted from the first terminal to the second terminal or vice versa can be provided with such a transaction number, in particular in order to then be forwarded from the receiving terminal to the background system.
  • a further addition to the data of the receiving station can be carried out, whereby this supplementary data or the total combination of the supplementary data and the encrypted original data can in turn be encrypted.
  • the background data can in particular also be used as a key or code for encrypting further data to be transmitted.
  • the encryption advantageously takes place in an encryption or control device that is independent of the interfaces for transmission and cannot be accessed from the outside.
  • a smart card with a cryptocoprocessor can advantageously be used for this purpose.
  • the encryption device is assigned one or two individual key pairs which are used to secure the connection to the background system for the transmission of data from the background system.
  • the keys, in particular the private key are stored in a memory area that is not accessible from the outside and can only be accessed by the smart card.
  • An interface for short distances is advantageously used for the transmission between the first terminal and the second terminal, in order to avoid the disadvantages of widely dispersing interfaces.
  • this can be an interface according to ISO 14443, which can also communicate directly with the smart card if it is designed as a dual-interface smart card with such an interface.
  • time information data is particularly advantageous, such time information data also being usable as a key for encrypting the data or as a further key for further encryption.
  • the time information is advantageously provided as additional data on request by the background system or the respective terminal, so that the background system can use the time information of received data to check whether too long a time has passed since the start of the process. This prevents malicious interception and repeated sending of a payment data record, for example. Otherwise, the time information can be checked on the receiver side after the data has been transmitted, which includes not only the background system, but also the other terminal communicating with a terminal, with regard to a maximum permissible duration of the operation.
  • the time information is advantageously encrypted together with the data to be transmitted using the unique key, so that a further device which transmits the encrypted data is not able to decrypt the attached time information and manipulate it before it is forwarded.
  • such a system can also be used to transfer data as application data to a terminal.
  • application data can be transmitted from the background system to the terminal, in particular to the customer terminal, so that its functionality or its area of application can be expanded.
  • application data can also be concert tickets or tickets for public transport.
  • the application data can directly manipulate the functionality of one of the control devices of the received terminal to determine its area of use or Extend functionality.
  • the data can advantageously also be loaded into an independent and possibly interchangeable processor chip card or smart card.
  • the data can also be advantageously loaded into other storage media, for example an exchangeable memory card.
  • a real money flow advantageously takes place only within the background system, but not via the connections to the first or to the second terminal. There is no real cash flow between the two terminals either, but only a transfer of encrypted data, which is then used to trigger the actual monetary financial transaction after corresponding forwarding in the background system.
  • a terminal provided as the first terminal for such a transaction system advantageously has an interface to the background system and a further interface, in particular an output interface to the second terminal.
  • the output interface to the second terminal can be designed in the simplest embodiment in the form of a displayed website with data to be transmitted by hand. However, interfaces that allow direct automatic transmission, in particular of encrypted data, are preferred.
  • the terminal has a control device for receiving, processing and transmitting data and for encrypting the data in a secure memory using keys that cannot be accessed from outside.
  • a terminal is constructed as a second terminal for such a transaction system, the simplest embodiment of which only has an interface to either the background system or the first terminal.
  • the second terminal also has two interfaces to the background system on the one hand and the first terminal on the other hand.
  • the two interfaces can also be based on the same interface protocol, so that they can be provided structurally as a single interface.
  • the second terminal as a customer terminal has, in particular, a control device for receiving, processing and transmitting data and a control device for encrypting the data with a secure key of a key pair.
  • control device which coordinates the transmission via an interface
  • control device which performs the encryption of the data
  • the keys are stored in a memory that is not accessible from the outside or directly inaccessible from or in the control device responsible for encryption or decryption.
  • simple devices can also be provided as a second terminal.
  • SMS pad SMS: Short massage Service / Short Message Service
  • the encryption device is advantageously an independent chip, in particular with a cryptocoprocessor, which provides sufficient performance for complex encryption of the data.
  • the installation of a dual interface smart card known per se is preferred.
  • the independent chip is provided in addition to a SIM card, which serves to enable communication via the mobile radio networks.
  • the use of the short message service offers the further advantage that short messages do not have to be transmitted over a fixed connection between the data terminals involved.
  • Such a system also makes it possible, in particular, to initiate the actual payment process by transferring data through the second or customer terminal, which is operated by the payer, and advantageously even a direct integration of the merchant terminal can be omitted.
  • the data to be transmitted between two devices are advantageously encrypted or decrypted with a key pair, in which case this key pair is only known to the two devices involved.
  • a corresponding further key pair is provided for the transmission in the reverse direction. This even enables transmission via other intermediary devices, which as such should actually be classified as untrustworthy.
  • the secrecy of the public key also increases security.
  • the encryption is expediently carried out by means of a chip card, and confirmation or further encryption using a PIN or a SIM card number can advantageously be used.
  • Transmission via the short message service or an ISO 14443 interface is particularly preferred. In principle, however, any type of connection, such as end-to-end point connections in a mobile radio system, in a line-oriented fixed network or packet-oriented connections via a mobile or line-bound packet data network, is also possible.
  • a transmission is preferred in which the first or dealer terminal receives no or only encrypted data that cannot be decrypted by the first terminal with regard to the internal data of the second or customer terminal or its operator for transmission from or to the background system ,
  • FIG. 1 shows schematically a payment system with a large number of devices and transmission links, the process of a payment process by SMS in a shop also being schematically outlined;
  • Fig. 3 such a payment system for a payment process via SMS on the Internet or television without an existing GSM connection.
  • an electronic payment system consists of a large number of devices and components as well as transmission links.
  • the payment system shown has a first terminal as a merchant terminal 10, a second terminal as a customer terminal 20 and a background system 30, which exchange data or data records with one another via transmission links 41-43.
  • the terminals 10, 20 are representative of a large number of the most varied of devices and facilities which are suitable for the purposes of payment by electronic means.
  • the dealer terminal is a cash register 11 which transmits data, in particular a price indication, to an interface device 12.
  • the dealer terminal also has a control device C. Data is stored in a memory M which can be part of an independent storage device in the dealer terminal 10 or part of a processor of the control device.
  • the customer terminal 20 shown as an example is an SMS pad, which is essentially comparable to a mobile radio telephone without a voice transmission function.
  • the customer terminal 20 has, in particular, an integrated first interface device 21 for setting up a transmission link 43 to the interface device 12 of the dealer terminal 10. Via this transmission link 43, for example, price information, a transaction number TAN, a time information T and / or dealer identification information HID are transmitted as data.
  • the customer terminal 20 has a second interface device 22 which is designed to set up a transmission path 42 to the background system 30 which is independent of the first terminal 10.
  • the customer terminal or the SMS pad expediently has an input keyboard 24 for manual input of data and commands and a display device 25 for displaying data, information and input requests.
  • the customer terminal 20 also has a corresponding control and identification device with the correspondingly required components and data of a mobile radio device.
  • this includes a SIM card SIM.
  • the customer terminal 20 also has a separate control device C, which is integrated in the customer terminal 20 in particular as an additional chip.
  • This additional chip is preferably a dual interface chip card with a cryptocoprocessor.
  • the customer terminal preferably has a commercially available device as the first interface device 21 for setting up the transmission link to the dealer terminal 10.
  • the background system 30 essentially has a central computer or host 31. This is equipped with one or more interfaces 32 for setting up a first transmission path 41 to the dealer terminal 10 and a second transmission path 42 to the customer terminal 20.
  • the dealer terminal 10 has a correspondingly suitable interface device 13.
  • a single interface device with a dual function can be used in each case Setup of two different transmission links can be provided.
  • the host 31 of the background system 30 expediently has a central control device C for controlling its own operating sequence and for providing and processing transmitted or to be transmitted data.
  • the background system 30 has a timer or a clock for outputting time information or a time stamp T in order to have a current reference time available at each point in time.
  • the background system 30 expediently also has a memory, in particular a temporary memory M.
  • a dealer database 34 is provided for storing data from the dealer terminals 10 and the dealer data or operator of the dealer terminals 10.
  • data from customer terminals 20 or from operators of the customer terminals are stored in a customer database 35.
  • the background system 30 expediently has external interfaces to a personalization device 36 and external institutions 37, for example banks, credit card companies and publishers of security information.
  • the individual devices or the dealer terminal 10, the customer terminal 20 and the background system 30 have encryption and decryption devices which are formed by the respective control device C or a special processor.
  • a first and a second key pair are used as keys for the individual transmission links 41-43, each key pair consisting of a private and a public key. Data is encrypted with the public key, and decryption is only possible with the private key.
  • a key pair with a private key PSK and a public key ⁇ SK is provided in order to ensure security for the operator of the customer terminal 20 during transmissions between the customer terminal 20 and the background system 30. This key pair is used for transfers of data between only the customer terminal 20 and the background system 30.
  • the same key pair can also be used for encrypting data which are to be transmitted from the background system 30 to the customer terminal.
  • both the private key PSK and the public key ⁇ SK would be stored both in the background system and in the customer termianal 20.
  • two key pairs are provided for the individual transmission links 41-43.
  • a private key PSK is stored in the customer terminal 20, which is used to decrypt data which was encrypted in the background system 30 with the public key ⁇ SK for transmission to the customer terminal 20. If a pair of keys is provided for transmissions between the customer terminal 20 and the dealer terminal 10, a private key PHK for decrypting data that has been encrypted in the dealer terminal 10 with a public key ⁇ HK is additionally stored in the customer terminal 20 ,
  • the background system 30 has a public key ⁇ SH for encryption and a private key PHS for decrypting data which are transmitted to or from the dealer terminal 10.
  • the dealer terminal 10 accordingly has a first private key PSF and a first public key ⁇ SH for decrypting or encrypting data that is transmitted to or from the background system 30.
  • dealer terminal 10 In the case of encrypted communication between dealer terminal 10 and customer terminal 20, one or advantageously two corresponding key pairs with a private key PHK and a public key ⁇ KH can also be provided for the transmission to or from the customer terminal 20.
  • Encryption of data to be transmitted between dealer terminal 10 and customer terminal 20 is, if used at all, in particular for dealer terminal 10 / customer terminal 20.
  • Combinations are expedient in which a specific customer regularly contacts his customer terminal 20 with a specific dealer or his dealer terminal 10. This can be of interest, for example, if a customer term is used to pay petrol station bills when using a company vehicle that is used by different drivers, so that there are firm business contacts with changing people.
  • the private and public keys are advantageously stored in the background system 30 in the customer database 35 or the dealer database 34, these two databases then having to be secured against unauthorized access.
  • a first step 1 an action takes place between the cash register 11 of the dealer terminal 10 and its interface device 12 as a terminal.
  • a price indication is transmitted as a data record between the cash register and the interface device 12.
  • the data can be transmitted in accordance with the RS 323 standard, for example.
  • a transmission takes place via the first transmission path 41 from the terminal 12 of the dealer terminal 10 to the interface 32 of the background system 30.
  • the price data and, in addition, the dealer identification information or dealer identification number HID are optionally encrypted together and then transmitted. Encryption of this data is not absolutely necessary, since there is no immediate security risk here. This also applies to the data that the dealer passes on to the customer. Only the data that is exchanged between the customer and the host in both directions is actually relevant for security, so that one can focus on the Encryption of this data can restrict. Nevertheless, the above transmission data can of course also be encrypted.
  • the public key ⁇ SH of the background system-dealer key pair ⁇ SH, PSH is used for encryption by the dealer terminal 10 or by its control device or by a special chip C, in particular a cryptocoprocessor.
  • the public key ⁇ SH is stored in the memory M or in the special chip C so that it cannot be read from the outside.
  • the key pair ⁇ SH, PSH is expediently a key pair for a so-called RSA encryption or a comparable secure encryption principle.
  • the transmission link 41 can be, for example, a radio connection for transmitting short messages SMS, data call (bidirectional data call) or a connection-oriented line in a fixed network.
  • data call bidirectional data call
  • connection-oriented line in a fixed network.
  • packet-oriented data networks can also be used for transmission.
  • the received data is decrypted in the background system 30 with the appropriate private key PSH, which is stored securely in the memory, in particular in the dealer database 34 of the background system 30, and is not accessible from the outside. It is then checked whether the dealer identification number HID is registered in the dealer database 34 as a system partner permitted for the requested transaction. This can be carried out using data from a blocking list 39, which can be part of a further internal or external storage device, in order to check whether the corresponding dealer or the corresponding dealer terminal 10 is not blocked for individual, special or all transactions. If the check is successful, the control device C of the background system 30 generates a transaction number TAN, which is assigned to the specific transaction process.
  • PSH public key
  • the received data and the generated data made available for dispatch are expediently stored in the temporary memory M.
  • current time data are also provided as time information T by the system clock and used as separate data T or as an integral part of the transaction number TAN for the current transaction process.
  • the data provided, in particular the price data, the transaction number TAN and possibly the time information T are then encrypted and made available for transmission to the dealer terminal 10 at the interface device 32 of the background system 30.
  • the dealer-background system-key pair ⁇ SH, PSH or, preferably, a separate background-system-dealer key pair ⁇ HS, PHS is used.
  • only some or all of the transmitted data can be encrypted.
  • the encryption for this and also the other transmissions is expediently carried out in such a way that the recipient side of the encrypted data can recognize which of the private keys is to be used.
  • the data encrypted in this way is then transmitted from the background system 30 via the first transmission path 41 to the dealer terminal 10.
  • Any type of transmission link can again be used for the transmission, a short message service or landline connection being particularly preferred.
  • the data received in this way is decrypted according to one embodiment with the appropriate private key PHS of the dealer terminal and processed for a further transmission via the third transmission path 43 to the customer terminal 20.
  • the data are then transmitted to the customer terminal 20 via the third transmission link 43.
  • the data which are provided in the background system are already in the background system 30 with a public key ⁇ KS Background system customer key pair ⁇ KS, PKS encrypted.
  • the data encrypted in this way is then transmitted to the customer terminal 20.
  • the public keys ⁇ KS encrypted with the background system customer key pair from, for example, the customer database 35 are transmitted either directly to the customer terminal 20 via the second transmission path 42 or, according to a preferred embodiment, via the first transmission path 41 to the dealer terminal 10.
  • Terminal 10 which cannot decrypt this data due to the lack of a suitable private key, this encrypted data is then forwarded via the third transmission link 43 to the customer terminal 20.
  • the received data is then decrypted and processed in the customer terminal 20 with the corresponding private key PKS.
  • the operator of the customer terminal 20 can now further process the received data.
  • This further processing includes in particular a review and approval of the planned transaction.
  • the received data with possibly further data of the customer terminal, which enable sufficient identification of the customer terminal 20 in the background system 30, is encrypted.
  • a public key ⁇ SK of the background system customer key pair ⁇ SK, PSK is used for encryption.
  • a cryptocoprocessor of the customer terminal 20 is used for encryption, which is used for this purpose as an independent chip in the customer terminal 20.
  • the encrypted data provided in this way are then made available to one of the interface devices 22 for transmission to the background system 30.
  • the data provided in this way can optionally be transmitted to the background system 30 via the third transmission point 43 and the dealer terminal 10 as an intermediate device and from there via the first transmission path 41.
  • the transmission of the encrypted data from the customer terminal 20 via the second interface device 22 directly to the background system 30 or its interface device 32 is preferred.
  • the short message service SMS is preferably used for this transmission, other types of transmission lines and Transmission systems can be used in principle.
  • the customer terminal 20 has the SIM card SIM, which controls the transmission via the second transmission link 42 or provides data which are required for the transmission using the short message service SMS.
  • transmission systems are preferably used which prevent recording or interception of the transmitted data as well as possible. Accordingly, an interface according to ISO 14443 is preferred, although other systems, for example Bluetooth, infrared interface, can also be used as interface systems.
  • the transaction number TAN, the dealer identification number HID and, if appropriate, the time information T there are others Transfer data.
  • These further data serve to identify the customer terminal 20 with respect to the background system 30 and are in particular a SIM number, a card number of the corresponding smart card, a personal identification number PIN, which is preferably assigned to the user of the customer terminal, and preferably information about the desired payment method.
  • appropriate payment methods are preferably proposed to the user of the customer terminal 20 in the event that different payment methods are possible for the user via different payment systems or via different accounts.
  • the user of the customer terminal 20 can then read the possible payment methods on the display device 25 and select one of the desired payment methods via the input keyboard 24.
  • the transmission of data from the customer terminal 20 is to be carried out in encrypted form.
  • some of the data to be transmitted or preferably all of the data to be transmitted are encrypted.
  • the background system 30 decrypts the data received in the fifth step 5 with the corresponding private key PSK and checks the data for the admissibility of the transaction.
  • This check includes, for example, a check of the customer terminal 20 and / or the user of the customer terminal 20 using the corresponding data from the customer database 30, the PIN entered and the blocking list 39. reviews at external institutions 37 are also possible.
  • the transaction number TAN is checked on the basis of the data previously stored in the temporary memory M of the background system 30.
  • a credit check is carried out by the customer terminal 20 notified payment method instead. If these and any other verification steps are positive, the corresponding transaction is initiated. This can be done either in the background system 30 itself or preferably by sending corresponding data to an external institution.
  • confirmation messages are sent from the background system 30 via the interface device 32.
  • a first confirmation message is sent via the second transmission link 42, in particular via short message service SMS, to the customer terminal 20 in order to display a confirmation of the transaction on its display device 25.
  • a payment confirmation OK in particular the price
  • the dealer identification number HID and the payment method are confirmed.
  • a confirmation that the payment has been made is sent to the dealer terminal 10 via the first transmission link 41.
  • the transaction number and the price are preferably also transmitted as data to the dealer terminal 10.
  • a corresponding document can then be printed out in the dealer terminal 10 for transfer to the user of the customer terminal 20.
  • the payment confirmations are preferably also each in encrypted form, a corresponding public key ⁇ KS of the customer-background system key pair ⁇ KS, PKS being used for the transmission to the customer terminal 20.
  • a public key ⁇ HS of the dealer-background system key pair ⁇ HS, PHS is used accordingly for the transmission to the dealer terminal.
  • the data arriving at the background system 30 are checked before the execution of a transaction with regard to the time elapsed since the original time information T was sent out. In this way it can be prevented that a data record intercepted in particular on the second transmission link 42 from the customer terminal 20 to the background system 30 is intended to be sent repeatedly to the Background system 30 is forwarded, which could possibly result in a multiple execution of the transaction.
  • a data exchange with external devices takes place between the background system 30 and other external devices, provided that corresponding activities are not carried out in the background system 30 itself.
  • This relates, for example, to the personalization of a customer terminal and / or a dealer terminal by a personalization device 36.
  • PIN personal identification numbers
  • smart card with corresponding clearly assigned identification information this can also include checking the respective user.
  • a so-called call center 38 can be connected to the background system 30, via which a telephone call or possibly other communication channels such as e.g. the short message service or electronic mail from a customer, for example, can be contacted with the background system 30.
  • a call center 38 can also be used to order a transaction by telephone.
  • additional information can be communicated to the customer terminal 20 which payment methods are permissible with a view to the communicating dealer terminal 10 or its operator.
  • the display device 25 then only shows the selection of the payment methods which form an intersection between the payment methods which are possible with a view of the dealer terminal 10 and with a view of the customer terminal 20.
  • Further encryption can be associated with the positive confirmation by the operator of the customer terminal 20 that the payment data may be transmitted to the background system 30 in the fifth step 5.
  • the customer's personal identification number PIN is also encrypted.
  • the encryption takes place directly in the chip card, in particular in the cryptocoprocessor C.
  • the card number or internal number is advantageously also used when forming the data record to be transmitted to the background system 30.
  • a data record with usual SMS header data in particular the telephone number of the SIM card, and subsequently the actual encrypted data is sent in the usual way. It is preferably sent directly from the customer terminal 20 to a short message service router and from there to the background system 30.
  • FIG. 2 shows an alternative exemplary embodiment for a transaction process in connection with payment for an offer on the Internet or television using a customer terminal 20. Details and procedural steps in this and a further exemplary embodiment which have already been described are omitted. In this regard, reference is made to the corresponding description above. In particular, the same reference numerals are chosen for the same or similar structural or procedural implementations.
  • the customer faces an offer on the Internet or television.
  • the offer is given accordingly by a dealer terminal 10 ', which consists of a dealer center 13' and a display device 14 'connected to it.
  • the offer is displayed in the form of an article with additional information about the price, an article number and / or transaction number TAN, which is assigned to the article, as well as a dealer identification number HID.
  • the transaction number TAN may already have been assigned at an earlier point in time by the background system 30 specifically for the selected article of this special dealer or dealer terminal 10 ', so that the transaction number TAN is compared to the background system 30 and when it is returned to the dealer terminal 10 'is already sufficient to identify the corresponding dealer terminal 10' and the special article.
  • the customer transmits the data displayed on the display device 14 "by hand via the input keyboard 24 into the customer terminal 20.
  • a transmission can also be carried out via a corresponding interface device 12" with access to the corresponding page of the dealer.
  • Terminals 10 'and a third transmission link 43' can be carried out, which automatically enables the transfer from the dealer terminal 10 'to the customer terminal 20.
  • the transmission of the data essentially corresponds to the fourth step 4 of the first exemplary embodiment.
  • the customer enters the corresponding data in the customer terminal 20 and makes appropriate selection options, such as the desired payment method. Finally, the customer confirms his purchase request, whereupon a corresponding data record is created and encrypted in the customer terminal 20. Confirmation is as above by entering the PIN, which is integrated into the data record and encrypted. All data is processed and encrypted accordingly by the chip card C. A short message text or SMS text is then generated from the encrypted data record and transferred to the GSM part of the customer terminal 20.
  • the GSM part of the customer terminal in turn consists of the SIM card SIM or includes this as a further essential component.
  • a transmission via the second transmission link 42 to the background system 30 is carried out, as in the first exemplary embodiment.
  • the background system 30 decrypts the received data and carries out the corresponding checking steps with regard to the dealer, customer and credit rating.
  • dealer terminal 10' preferably being one in the present case Is a computer for processing purchase campaigns and arranging for the delivery of requested articles or the initiation of requested services.
  • the confirmation to the dealer terminal 10' is preferably sent via a corresponding packet-based data network in accordance with the TCP / IP protocol, for example.
  • Forms of transmission such as sending an electronic mail are e.g. possible.
  • a further transaction number TAN 2 is preferably transmitted to the dealer terminal 10 'for confirmation.
  • identification information is transmitted which enables the transfer.
  • a generated code can be generated which is transmitted to both the dealer terminal 10 'and the customer terminal 20.
  • the latter can identify himself to the dealer terminal 10 ', so that the download is released.
  • the dealer or the dealer terminal 10 'advantageously does not need any personal Information regarding the customer or the customer terminal 20.
  • this method requires a correspondingly large storage space for the dealer database 34 and / or a linking of the background system 30 to the Internet offers of the dealer terminals 10 '.
  • FIG. 3 shows a third exemplary embodiment.
  • the same reference symbols or those identified by asterisks and apostrophes denote components or method steps which have already been described with the aid of the above exemplary embodiments as being identical, having the same effect or being similar, which is why essentially only different features are described.
  • the transmission via the first, second and / or third transmission link 41, 42, 43 ' also takes place in this exemplary embodiment, preferably with the encryption system already described, using key pairs with private and public keys.
  • a payment system is shown in which the retailer terminal 10 'is in turn designed as an Internet provider or an offer via television.
  • a dealer terminal can also be provided as an alternative embodiment.
  • the data from the dealer terminal 10 ' are transmitted directly or, as shown, indirectly to the customer terminal 20, 20 *.
  • a selected item with a corresponding price is again displayed over the Internet.
  • various payment methods and payment via SMS message service may be offered.
  • the customer can in turn choose to pay via short message service.
  • the website or the television screen in turn display the data, the goods or service, download or delivery, etc. on the display device 14 '.
  • the price, an article number or a transaction number, which are provided specifically for the goods and number of pieces, are displayed.
  • the processing by the customer terminal 20, 20 * takes place in a manner which has essentially already been described.
  • the customer terminal 20, 20 * recognizes that neither a GSM connection for sending a short message SMS nor any other suitable connection is available.
  • the customer terminal 20, 20 * then calculates a code from the available data, using secure methods such as the DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard), RSA, etc., which are known per se.
  • the actual code is preferably encrypted with the public key ⁇ SK of the background system-Kuhden key pair ⁇ SK, PSK to protect against misuse, as was carried out in a comparable manner to the data for transmission in fifth step 5 in the above exemplary embodiments.
  • the code is transmitted in a fifth step 5 * from the customer terminal 20 to the background system 30 and there with the corresponding private one, if applicable
  • Data of the code the data required to carry out the transaction removed, whereby data supplied by the dealer terminal 10 * additionally to the background system 30 may also be used.
  • FIG. 3 shows alternative ways of transmitting the code from the customer terminal 20 *, 20 to the background system 30.
  • a new mask is displayed on the display device 14 'of the dealer terminal 10 in the case of Internet access, after appropriate selection of the customer by his inputs on an interface device 12 * in the case of Internet access.
  • the first text information is displayed prepared, such as the dealer name and the dealer identification number HID, the article, an article number and / or transaction number, a desired number of pieces, the price and an open field for entering the code, which the customer or customer Terminal 20 * is to be transferred.
  • the interface device can be an automatic interface 12 'which communicates with the customer terminal 20 *, 20 via the third transmission link 43', with which the customer can make inputs directly via the keyboard 24 of the customer terminal.
  • the input device of the dealer terminal 10 ' can also be a keyboard 12 * or the like on the dealer terminal 10', which is used for manual entry of the code by the customer or operator of the customer terminal 20, 20 * , who then uses the code reads and transmits from the display device 25 of the customer terminal 20 * .
  • Corresponding transmission is then carried out from the dealer terminal 10 'or the downstream central computer 13', for example by electronic mail program using an electronic mail in the fifth step 5 * to the background system 30.
  • the dealer or the dealer terminal 10 ' has no access to falsify or read out the code, since this contains correspondingly encrypted data from the customer terminal 20.
  • the customer lacks an input option at the dealer terminal 10 ', for example in the absence of a corresponding interface device 12', 12 *, as is the case when buying an offer shown on television.
  • the customer or user of the customer terminal 20 * can select a connection to the background system 30 in a manner known per se via the call center 38 in a fifth step 5 °.
  • the customer In contrast to a conventional order via call center 38, the customer notifies the call center 38 of the code calculated by the customer terminal 20 *, which is displayed on the display device 25 of the customer terminal 20 *.
  • the call center 28 can optionally additionally ask a security question stored in the background system 30 or at the call center 38, which the customer has to answer correctly.
  • the call center 38 then transmits the code 5 to the background system 30 via any connection route.
  • the encryption with the public key ⁇ SK of the background system customer key pair ⁇ SK, PSK prevents abuse by the call center 38. This applies in particular if time information is integrated in the code, which was updated by the background system 30 via the dealer terminal 10 ', was originally generated by the dealer terminal 10' or by the customer terminal 20 * and contains time information in the background system 30 can be compared.
  • transmission via a call center 38 can also be used, such as, for example, a call to a voice computer or a computer system, which enables control and data input via a telephone keypad.
  • the background system 30 can initiate a transaction on the basis of a secure transaction request and, in parallel or subsequently, send confirmation messages in a sixth step 6.1, 6.2 as in the above exemplary embodiments. While a corresponding confirmation can be transmitted directly to the dealer terminal 10 ', A corresponding confirmation message in the form of a short message SMS is temporarily stored in the short message service router via the second transmission link 42 until the customer terminal 20 * again establishes a communication connection to the short message service router and can receive the transaction confirmation with a time delay.
  • terminals that technically do not contain GSM / UMTS modules. Can be implemented e.g. a use of such terminals as pure encryption units for a) the case shown here and b) if the encrypted data is passed to the server via a terminal of the first group.
  • the provision of simple dealer or customer terminals 10, 20 is sufficient, which enables inexpensive implementation by provision of, for example, an SMS pad as customer terminal 20.
  • complex terminals can also be implemented, for example a conventional mobile radio device with an encryption chip C in addition to the SIM card, with the separation of the functionality into two components with communication information and communication functions on the one hand and encryption data and encryption functions on the other hand without external access to security particularly preferred in a preferred manner.
  • combinations with corresponding alternatives for devices and methods known per se are also possible, for example combinations with the most varied of protocols and systems for setting up transmission links.
  • the particularly preferred system thus consists of three components, the background system 30, the dealer terminal 10 and the customer terminal 20, for example an SMS pad of the customer with an integrated chip card (dual interface smart card, possibly with a cryptocoprocessor).
  • the background system consists of an SMS host for sending and receiving SMS messages and a server that performs standard clearing tasks and checks customers and dealers using the known methods.
  • he has the respective RSA key for encrypting and decrypting data records that are sent and received via SMS.
  • the dealer terminal is preferably a conventional POS (point of sale / sales) terminal, supplemented by an interface according to ISO 14443, an internet shop, or a GSM terminal supplemented by an interface according to ISO 14443.
  • POS point of sale / sales
  • Various applications can be included in this card, e.g. E-Börse, E-Ticket etc., and an application for the encryption of payment data and the management of the data.
  • the required RSA keys or keys of other key systems (3DES) are also securely stored in it.
  • the present procedure is intended to close this gap.
  • the combination of highly encrypted data records in connection with GSM / UMTS radio as independent data transmission can be ensured.
  • the Transaction data in particular those in which the sensitive data of the customer who is making the payment is transmitted, takes place independently of the retailer's terminal or even an internet connection, i.e. in a completely separate way that the retailer cannot control.
  • the data is encrypted and signed with an RSA key. Both a system of uniform keys and a customer-specific key can be used.
  • the encryption of the sensitive data is carried out by a microprocessor chip card, possibly with a cryptocoprocessor. This stores the keys securely.
  • the authentication of the creditor can be secured with a PIN.
  • This PIN can be stored on the card as well as in the background system or only in the background system.
  • the microprocessor chip card works in conjunction with a device according to GSM and or UMTS standard which secures the sending and receiving of SMS, possibly supports GPRS and DataCall. Additional functions are optional.
  • the transfer of the necessary data from the dealer to the customer can be carried out using an interface according to ISO 14443, if this is supported by the chip card or the device. Other interfaces are conceivable, since this data is not sensitive.
  • the way that encrypted data is transferred to the dealer terminal is also not critical, since it is then encrypted.
  • the processing in the background system differs from the known methods, in particular in clearing servers, by storing the RSA key, decrypting the data records, checking the decrypted PIN, possibly checking the SIM card number and vice versa the encryption of sensitive data records to the SMS-capable device, the inclusion of the GSM / UMTS time stamp in the security query and, if necessary, a random number.
  • the "cracking" of such a system can be ruled out for the foreseeable future.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système de paiement comportant un système d'arrière-plan (30) avec accès à des banques de données (34, 35, 39, 37), un premier groupe de terminaux, notamment avec un terminal vendeur (10), un deuxième groupe de terminaux, notamment avec un terminal client (20), et un système de codage pour réaliser une transaction d'argent dans le domaine du système d'arrière-plan par transmission de données entre un premier terminal (10) du premier groupe de terminaux et un deuxième terminal (20) du deuxième groupe de terminaux. L'invention vise à augmenter la sécurité pour le client. A cet effet, le système de codage pour la transmission de données entre le deuxième terminal ou le terminal client (20) et le système d'arrière-plan (30) comporte des codes (OSK, PSK, OKS, PKS) disponibles et utilisés avec une clé individuelle (OSK, OKS, OHS, OSH) pour les stations terminales de la liaison de transmission. Ainsi, une transmission qui ne peut pas être décodée par un vendeur peut malgré tout être réalisée par le biais de son terminal (10). La présente invention porte également sur des terminaux correspondants et sur un procédé de paiement.
PCT/EP2004/007566 2003-07-11 2004-07-09 Systeme de paiement, terminal de systeme de paiement et procede pour realiser un paiement electronique WO2005008608A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
DE10331733.3 2003-07-11
DE20310759.4 2003-07-11
DE20310759U DE20310759U1 (de) 2003-07-11 2003-07-11 Bezahlvorrichtung und Terminal
DE10331733A DE10331733A1 (de) 2003-07-11 2003-07-11 Bezahlsystem

Publications (1)

Publication Number Publication Date
WO2005008608A1 true WO2005008608A1 (fr) 2005-01-27

Family

ID=34081639

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2004/007566 WO2005008608A1 (fr) 2003-07-11 2004-07-09 Systeme de paiement, terminal de systeme de paiement et procede pour realiser un paiement electronique

Country Status (1)

Country Link
WO (1) WO2005008608A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010063563A2 (fr) * 2008-12-01 2010-06-10 Tagsolute Gmbh Procédé et dispositif pour autoriser une transaction
WO2019018918A1 (fr) * 2017-07-28 2019-01-31 Sentias Software Corp. Systèmes et procédés visant à autoriser des paiements à l'aide de cartes de paiement

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0880254A2 (fr) * 1997-04-22 1998-11-25 Sun Microsystems, Inc. Système et méthode de securité de serveur d'institution financière et de client browser de réseau
EP1049057A2 (fr) * 1999-04-26 2000-11-02 Citishare Corporation Méthode et système pour transmission-tunnel de messages via des systèmes de routage et de réglement d'une institution financière
EP1168771A2 (fr) * 2000-05-19 2002-01-02 SanaLink AG Systeme et methode pour transmettre des informations entre des docteurs et des hopitaux
EP1282089A1 (fr) * 2001-08-03 2003-02-05 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Procédé et dispositifs pour paiements entre terminaux
US6532543B1 (en) * 1996-08-13 2003-03-11 Angel Secure Networks, Inc. System and method for installing an auditable secure network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6532543B1 (en) * 1996-08-13 2003-03-11 Angel Secure Networks, Inc. System and method for installing an auditable secure network
EP0880254A2 (fr) * 1997-04-22 1998-11-25 Sun Microsystems, Inc. Système et méthode de securité de serveur d'institution financière et de client browser de réseau
EP1049057A2 (fr) * 1999-04-26 2000-11-02 Citishare Corporation Méthode et système pour transmission-tunnel de messages via des systèmes de routage et de réglement d'une institution financière
EP1168771A2 (fr) * 2000-05-19 2002-01-02 SanaLink AG Systeme et methode pour transmettre des informations entre des docteurs et des hopitaux
EP1282089A1 (fr) * 2001-08-03 2003-02-05 TELEFONAKTIEBOLAGET LM ERICSSON (publ) Procédé et dispositifs pour paiements entre terminaux

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010063563A2 (fr) * 2008-12-01 2010-06-10 Tagsolute Gmbh Procédé et dispositif pour autoriser une transaction
WO2010063563A3 (fr) * 2008-12-01 2010-12-09 Tagsolute Gmbh Procédé et dispositif pour autoriser une transaction
EP2637382A3 (fr) * 2008-12-01 2014-04-02 tagPAY GmbH Procédé d'autorisation d'une transaction
WO2019018918A1 (fr) * 2017-07-28 2019-01-31 Sentias Software Corp. Systèmes et procédés visant à autoriser des paiements à l'aide de cartes de paiement

Similar Documents

Publication Publication Date Title
EP1240632B1 (fr) Procede et systeme de transaction de paiement
DE60308385T2 (de) Verfahren zur Unterstützung bargeldloser Zahlung
EP1178444B1 (fr) Paiement électronique utilisant des SMS
DE69830993T2 (de) Elektronische transaktion und chipkarte für eine elektronische transaktion
EP0993664B1 (fr) Procede de transaction mis en oeuvre au moyen d'un appareil mobile
DE102007006659B4 (de) Mobiles Echtzeit Bezahlverfahren
WO2002023303A2 (fr) Procede destine a securiser une transaction sur un reseau informatique
DE102008035391A1 (de) Verfahren zur Authentifizierung
EP1203357A1 (fr) Commerce electronique pour services d'envoi de messages courts
DE69908382T2 (de) Verfahren zum elektronischen bezahlen
DE102011075257B4 (de) Beantwortung von Anfragen mittels des Kommunikationsendgeräts eines Nutzers
WO2010089049A1 (fr) Procédé et dispositifs de paiement à l'aide d'un terminal mobile
EP1374189B1 (fr) Procede pour securiser des produits numeriques lors d'un achat sur un reseau informatique
WO2013011043A1 (fr) Système mobile pour transactions financières
DE60122912T2 (de) Verfahren zum liefern von identifikationsdaten einer bezahlkarte an einen anwender
WO2005008608A1 (fr) Systeme de paiement, terminal de systeme de paiement et procede pour realiser un paiement electronique
DE10331733A1 (de) Bezahlsystem
EP1081919A1 (fr) Méthode pour donner une autorisation pour le payment de biens et/ou services achetés sur Internet dans des réseaux de transmission de données
EP1437668B1 (fr) Procédé pour le paiement de marchandises ou de services sans argent liquide au moyen d'un terminal radio mobile
DE20310759U1 (de) Bezahlvorrichtung und Terminal
EP1047028A1 (fr) Système et méthode de communication pour traiter efficacement des transactions électroniques dans des réseaux de communication mobile
EP1274971A2 (fr) Procede de paiement securise de livraisons et de services dans des reseaux ouverts
DE10008280C1 (de) Verfahren und System zur automatischen Abwicklung von bargeldlosen Kaufvorgängen
WO2004053807A1 (fr) Systeme de paiement au moyen d'un radiotelephone
WO2003070493A2 (fr) Systeme informatique et procede pour la transmission electronique de paiements

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase