WO2006000864B1 - Transaction & payment system securing remote authentication/validation of transactions from a transaction provider - Google Patents

Transaction & payment system securing remote authentication/validation of transactions from a transaction provider

Info

Publication number
WO2006000864B1
WO2006000864B1 PCT/IB2005/001672 IB2005001672W WO2006000864B1 WO 2006000864 B1 WO2006000864 B1 WO 2006000864B1 IB 2005001672 W IB2005001672 W IB 2005001672W WO 2006000864 B1 WO2006000864 B1 WO 2006000864B1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
remote server
tokens
seed
authentication token
Prior art date
Application number
PCT/IB2005/001672
Other languages
French (fr)
Other versions
WO2006000864A3 (en
WO2006000864A2 (en
Filing date
Publication date
Priority claimed from US10/871,051 external-priority patent/US7693797B2/en
Application filed filed Critical
Priority to EP05754250A priority Critical patent/EP1769419B1/en
Publication of WO2006000864A2 publication Critical patent/WO2006000864A2/en
Publication of WO2006000864A3 publication Critical patent/WO2006000864A3/en
Publication of WO2006000864B1 publication Critical patent/WO2006000864B1/en

Links

Abstract

A mobile terminal is equipped for SMS payment and service authentication with a remote transaction provider. The remote provider uses common secrets & a seed in a keyed Hash Machine Address Code (HMAC) executing a Message Digest Algorithm to generate a list of authentication token (username-password) for the purchase of services an/or goods. The common secrets and seed are shared with local redemption devices which also generate the list of authentication token. A subscriber conducts payment with the remote transaction provider and receives an authentication token corresponding to the purchased service. The subscriber provides the authentication token to the redemption device which compares the authentication token with sets of valid authentication tokens generated by the redemption terminal. If the comparison indicates a match, the redemption device provides the service to the subscriber.

Claims

AMENDED CLAIMS[received by the International Bureau on December 19, 2005 (19.12.2005); original claims 1-74 replaced by new claims 1-68]
1. A method for payment and service authentication in a mobile environment, comprising; installing a communication connection between a remote server and at least one local server, wherein the communication connection is a non-continuous communication connection in operation; sharing common secret keys and a seed between the remote server and at least one local server when there is a connection between the servers for use in connection with an authentication algorithm; generating and storing in the remote server and in the at least one local server corresponding lists of valid authentication tokens for the purchase of services and/or goods based on the shared common secret keys and the seed using the authentication algorithm; requesting and providing payment for the services and/or goods from the remote server by a mobile, terminal; selecting an authentication token from the list of valid authenticating tokens stored at the remote server: returning the selected authentication token to the mobile terminal; submitting, by the mobile terminal, the authentication token to one of the at least one local servers for the purchase of services and/or goods: comparing the authentication token to the list of valid authentication tokens at the local server for verifying the payment for the services and/or goods from the remote server when not in communication connection with the remote servers; and providing the services and/or goods to the mobile terminal if the authentication token matches an authentication token in the list of valid authentication tokens in the at least one local server indicating verification of the payment from the remote server.
2. The method of claim 1 , wherein the list of valid authentication tokens are periodically updated.
3. The method of claim 2, wherein the list of valid tokens are periodically updated by changing at least the seed for the authentication algorithm.
4. The method of claim 1 , wherein the non-continuous communication connection is used for transferring from the remote server one or more seed updates to the at least one local servers.
5. The method of claim 1 , further comprising requesting, by the local server, mobile user identification information from the mobile terminal in exchange of providing the services and/or good to the mobile terminal.
6. The method of claim 1 , wherein the non-continuous communication connection is used for transferring from the at least one local servers to the remote server information relating to authentication token usage.
7. The method of claim 6, wherein the authentication token usage includes at least one of a mobile terminal identification information and mobile terminal user identification information.
8. The method of claim 1 , wherein the non-continuous communication connection is secure.
9. The method of claim 1 , further comprising: installing the authentication token into an electronic ticket.
10. The method of claim 1 , further comprising: authenticating the authentication token using RFlD.
11. The method of claim 3 , further comprising: generating the list of authentication tokens by recursively applying a keyed HMAC function to the common keys and the seed.
12. The method of claim 1 , further comprising: modifying the authentication tokens via the seed to be time based.
13. The method of claim 1 , further comprising: updating the shared common secret keys and seed in the remote server and the local server.
14. The method of claim 1 , further comprising: using SMS messaging in submitting the request to the remote server.
15. The method of claim 1, further comprising: using short range communication to transfer the authentication token to the local server.
16. The method of claim 1, further comprising: limiting validity of the authentication token to a time period.
17. The method of claim 1, further comprising: tying an accepted authentication token to a MAC hardware address of a requester.
18. The method of claim 16, further comprising: dividing the time period into several sub-timing periods.
19. The method of claim 18, further comprising: assigning separate authentication tokens to each sub-timing period.
20. The method of claim 19, further comprising: calculating the separate authentication token for sub-liming periods based on the order number or the time-period of the sub-timing period.
21. The method of claim 1, wherein the list of valid authentication tokens includes tokens for a current sub-timing period and tokens for a sub-timing period before and a sub-timing period after the current lime period to ensure the correct validity period for the token/ticket.
22. The method of claim 1 , wherein the seed is assigned a date (d) in the future,
23. The method of claim 22, wherein the seed is further assigned a time period (p).
24. The method of claim 1 , wherein the tokens are given out by the remote server in random order for single use.
25. The method of claim 1, wherein the token contains two-4-character hex strings, one as a username and one as a password.
26. The method of claim 1, wherein the local server compares a token to all possible tokens in time period (I) defined by a date (d); a period (p) and (r) a factor providing authentication periods overlap compensating for an assumed synchronization mismatch between the local server and the remote server clocks.
27. A system for payment and service authentication in a mobile environment, comprising; installing means installing a communication connection belween a remote server and at least one local server, wherein the communication connection is a non-continuous communication connection in operation; sharing means for sharing common secret keys and a seed between the remote server and at least one local server when there is a connection between the servers for use in connection with an authentication algorithm; generating means for generating and storing in the remote server and in the at least one local server corresponding lists of valid authentication tokens for the purchase of services and/or goods based on the shared common secret keys and the seed using the authentication algorithm; requesting and providing means for requesting and providing payment for the services and/or goods from the remote server by a mobile terminal; selecting means for selecting an authentication token from the list of valid authenticating tokens stored at the remote server returning means for returning the selected authentication token to the mobile terminal; submitting means, by the mobile terminal, for submitting the authentication token to one of the at least one local servers for the purchase of services and /or goods; comparing means for comparing the authentication token to the list of valid authentication tokens in the local server for verifying the payment for the services and/or goods from the remote server when no; in communication connection with the remote server; and providing means for providing the services and/or goods to the mobile terminal if the authentication token matches an authentication token in the list of valid authentication tokens in the at least one local server indicating verification of the payment from the remote server.
28. The system of claim 27, wherein the list of valid authentication tokens are periodically updated.
29. The system of claim 28, wherein the list of valid tokens are periodically updated by changing at least the seed for the authentication algorithm.
30. The system of claim 26, wherein the non-continuous communication connection is used for transferring from the remote server one or more seed updates to the at Ieast one local servers.
31. The system of claim 27, further comprising: requesting means requesting, by the local server, mobile user identification information from the mobile terminal in exchange of providing the services and/or the goods to the mobile terminal.
32. The system of claim 27, wherein the non-continuous communication connection is used for transferring from the at least one local servers to the remote server information relating to authentication token usage,
33. The system of claim 32, wherein the authentication token usage includes at least one of a mobile terminal identification information and mobile terminal user identification information.
34. The system of claim 28, wherein the non-continυous communication connection is secure.
35. The system of claim 27, wherein the authentication token is installed in a ticket.
36. The system of claim 27, wherein the generating means generates the list of authentication tokens by recursively applying a keyed HMAC function to the common keys and seed.
37. Th, system of claim 27, further comprising: modifying means modifying the authentication token via the seed to be time based.
38. The system of claim 27, further comprising: updating means updating the common secret keys and seed in the remote server and the local server,
39. The system of claim 27, further comprising terminal means enabled for submitting the SMS request to the remote server.
40. The system of claim 27, further comprising: terminal means enabled for short range communication to transfer the authentication token to the local server.
41. The system of claim 27, further comprising: limiting means limiting validity of the authentication token to a time period.
42. The system of claim 27, further comprising: tying means tying an accepted authentication token to a MAC hardware address of a requester.
43. The system of claim 41 , further comprising; dividing means dividing the time period into several sub-timing periods.
44. The system of claim 43, further comprising; assigning means assigning separate authentication tokens to each sub-timing period.
45. The system of claim 43, further comprising: calculating means calculating the separate authentication token for sub-timing periods based on the order number or the time-period of the sub-timing period.
46. The system of claim 27, wherein the list of valid authentication tokens includes tokens for a current sub-timing period and tokens f or a sub-timing period before and a sub-liming period after the current time period to ensure the correct validity period for the token/ticket.
47. The system of claim 27, wherein the seed is assigned a date (d) in the future.
48. The system of claim 47, wherein the seed is further assigned a time period (p).
49. The system of claim 28, wherein the tokens are given out by the remote server in random order for single use.
50. The system of claim 27, wherein the token contains two-4-character hex strings, one as a username an one as a password.
51. The system of claim 27, wherein the local server compares a token to all possible tokens in time period (I) defined by a date (d); a period (p) and (r) a factor providing authentication period over lap compensating for an assumed synchronization mismatch between the local server and the remote server clocks.
52. A medium, executable in a computer system, for payment and service authentication in a mobile environment, the medium, comprising: program code for installing a communication connection between a remote server and at least one local server, wherein the communication connection is a non-continuous communication connection in operation; program code for selecting and storing common secret keys and a seed between the remote server and at least one local server when there is a connection between the servers for use in an authentication algorithm: program code for generating and storing in the remote server a list of username- passwords as authentication tokens applicable for the purchase of services and/or goods based on the common secret keys and the seed using the authentication algorithm; program code for storing and executing the authentication algorithm in at least one local server to generate and store the list of authentication tokens in the local server; program code for requesting and providing payment for services from the remote server: program code for generating in the remote server an authentication token from the list and tied to the request: program code for submitting the authentication token to the local server for the purchase of services and/or good; program code for comparing the authentication token to the list of authentication taken generated at the local server from the common secrets and the seed for verifying the payment for the services and/or goods from the remote server when not in communication connection with the remote server; and program code for providing the service and/or goods if the authentication token matches an authentication token in the list of valid authentication tokens in the at least one local server indicating verification of the payment from the remote server.
53. A medium, executable in a computer system, for payment and service authentication in a mobile environment, the medium comprising: program code for installing a communication connection between a remote sewer and at least one local server, wherein the communication connection is a non-continuous communication connection in operation; program code for sharing common secret keys and a seed between the remote server and at least one local server when there is a connection between the servers for use in connection with an authentication algorithm; program code for generating and storing in the remote server and in the at Ieast one local server corresponding lists of valid authentication tokens for the purchase of services and/or goods based on the shared common secret keys and the seed using the authentication algorithm: program code for requesting and providing payment for the services and/or goods f rom the remote server by a mobile terminal; program code for selecting an authentication token from the list of valid authenticating tokens in the remote server: program code for returning the selected authentication token to the mobile terminal; program code for submitting, by the mobile terminal, the authentication token to one of the at least one local servers for the purchase of services and/or goods; program code for comparing the authentication token to the list of valid authentication tokens at the local server for verifying the payment lor the services and/or goods from the remote server when not in communication connection with the remote server; and program code for providing the services and/or goods to the mobile terminal if the authentication token matches an authentication token in the list of valid authentication tokens in the at least one local server indicating verification of the payment from the remote server.
54. The medium of claim 52, further comprising: program code for requesting, by the local server, mobile user identification information from the mobile terminal in exchange of providing the service and/or the goods to the mobile terminal.
55. The medium of claim 53, further comprising: program code for installing a communication connection between the remote and the at least one local servers which is non-continuous in operation.
56. The medium of claim 55, wherein the non-continuous communication connection is used for transferring from the remote server one or more seed updates to the at least one local servers.
57. The medium of claim 55, wherein the non-continuous communication connection is used for transferring from the at least one local servers to the remote server information relating to authentication token usage.
58. The medium of claim 53, wherein the authentication token usage includes at least one of a mobile terminal identification information and mobile terminal user identification information.
59. The medium of claim 55, wherein the non-continuous communication connection is secure.
60. The medium of claim 53, further comprising: program code for installing the authentication token into an electronic ticket.
61. The medium of claim 53, further comprising: program code for authenticating the authentication token using RFID.
62. The medium of claim 53, further comprising: program code for updating the common secret keys and seed in the remote server and the local server.
63. Transaction and payment apparatus operating in a mobile environment, comprising: installing means installing a communication connection between a remote server and at least one local server, wherein the communication connection is a non-continuous communication connection in operation; selecting means for selecting and storing common secret keys and a seed for use in an authentication algorithm; first communication means for sharing the common secret keys and the seed with at least one redemption apparatus; means for generating and storing corresponding lists of valid authentication tokens or services and/or goods available from a supplier based on the common secret keys and the seed with the authentication algorithm; second communication means implementing short message protocol for communication with remote users accessing the apparatus via a mobile terminal; transaction server means for processing requests by the users for the available services and/or goods and selecting an authentication token from the lists of valid authentication tokens stored at the remote server for the requested services and/or goods after payment by the user; and transmitting means transmitting the selected authentication token to the user via th e second communication means for the requested services and/or goods,
64. Redemption apparatus operating in a mobile environment comprising: processing mears for processing and validating tickets/tokens presented by users for available services and/or goods; communication means providing communication connection with a remote server for receiving common secret keys and a seed for use in an authentication algorithm, wherein the communication connection is a non-continuoυs communication connection in operation; generating and storing means generating a list of valid authentication tickets/tokens for the purchase of service and/or goods based on the shared common secret keys and the seed using the authenticating algorithm, and comparing means for comparing tickets/tokens presented by a user against the list of valid authentication tickets/token for access to the available services and/or goods in the case of validated tickets/tokens.
65. The redemption apparatus of claim 64, further comprising: storing means for storing the common secret keys and seed received from the transaction server,
66. The redemption apparatus of claim 64. further comprising: short-range communication means for receiving ticket/token information from a user via a mobile device.
67. The redemption apparatus of 64, wherein the comparing means compares a token to all possible tokens in time period (1) defined by a date (d); a period (p) and (r) a factor providing authentication periods overlap compensating for an assumed synchronization mismatch between the local server and the transaction server clocks.
68. The redemption apparatus of claim 64, wherein the local server provides the transaction server with token/ticket misuse information.
PCT/IB2005/001672 2004-06-21 2005-06-15 Transaction & payment system securing remote authentication/validation of transactions from a transaction provider WO2006000864A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP05754250A EP1769419B1 (en) 2004-06-21 2005-06-15 Transaction & payment system securing remote authentication/validation of transactions from a transaction provider

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/871,051 US7693797B2 (en) 2004-06-21 2004-06-21 Transaction and payment system security remote authentication/validation of transactions from a transaction provider
US10/871,051 2004-06-21

Publications (3)

Publication Number Publication Date
WO2006000864A2 WO2006000864A2 (en) 2006-01-05
WO2006000864A3 WO2006000864A3 (en) 2006-03-02
WO2006000864B1 true WO2006000864B1 (en) 2006-04-13

Family

ID=35481809

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2005/001672 WO2006000864A2 (en) 2004-06-21 2005-06-15 Transaction & payment system securing remote authentication/validation of transactions from a transaction provider

Country Status (4)

Country Link
US (1) US7693797B2 (en)
EP (1) EP1769419B1 (en)
CN (1) CN1969291A (en)
WO (1) WO2006000864A2 (en)

Families Citing this family (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7836295B2 (en) * 2002-07-29 2010-11-16 International Business Machines Corporation Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
JP4790731B2 (en) * 2005-02-18 2011-10-12 イーエムシー コーポレイション Derived seed
JP5049962B2 (en) * 2005-05-19 2012-10-17 サンディスク アイエル リミテッド Transaction authentication by token, subject to individual presence
US8352376B2 (en) * 2005-10-11 2013-01-08 Amazon Technologies, Inc. System and method for authorization of transactions
US8447700B2 (en) * 2005-10-11 2013-05-21 Amazon Technologies, Inc. Transaction authorization service
US8352323B2 (en) * 2007-11-30 2013-01-08 Blaze Mobile, Inc. Conducting an online payment transaction using an NFC enabled mobile communication device
US7657489B2 (en) 2006-01-18 2010-02-02 Mocapay, Inc. Systems and method for secure wireless payment transactions
JP4806271B2 (en) * 2006-02-27 2011-11-02 富士通株式会社 Information security system, its server, program
FR2898238B1 (en) * 2006-03-02 2008-06-06 Customer Product Relationship TRANSACTION METHOD BETWEEN TWO SERVERS HAVING A PRIOR VALIDATION STEP USING TWO MOBILE TELEPHONES
EP1912147A1 (en) * 2006-10-10 2008-04-16 NTT DoCoMo, Inc. Method and apparatus for selling a digital resource
US7970381B2 (en) * 2007-08-13 2011-06-28 General Motors Llc Method of authenticating a short message service (sms) message
US8332922B2 (en) * 2007-08-31 2012-12-11 Microsoft Corporation Transferable restricted security tokens
US8239326B1 (en) 2007-09-19 2012-08-07 Amazon Technologies, Inc. Method and apparatus for authorizing transactions using transaction phrases in a transaction authorization service
US8424057B2 (en) * 2007-12-28 2013-04-16 Ebay, Inc. Mobile anti-phishing
US8107921B2 (en) * 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US7930390B2 (en) 2008-01-14 2011-04-19 International Business Machines Corporation Identification method
US8204827B1 (en) 2008-03-27 2012-06-19 Amazon Technologies, Inc. System and method for personalized commands
US8620826B2 (en) 2008-03-27 2013-12-31 Amazon Technologies, Inc. System and method for receiving requests for tasks from unregistered devices
US8244592B2 (en) 2008-03-27 2012-08-14 Amazon Technologies, Inc. System and method for message-based purchasing
US8496169B2 (en) * 2009-01-02 2013-07-30 At&T Mobility Ii Llc System and method for electronic ticket verification, identification, and authorization with a wireless communication device
WO2010097813A1 (en) * 2009-02-27 2010-09-02 Rajender Kumar Nangia Method for providing donation and communication between a donor and donee in a network and the system thereof
US20110022835A1 (en) * 2009-07-27 2011-01-27 Suridx, Inc. Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates
EP2290876A1 (en) * 2009-08-24 2011-03-02 Gemalto SA Method for establishing an electronic authorisation for a user having an electronic identity document and method for controlling said authorization.
CA2699345C (en) 2009-08-26 2012-01-17 Mobiroo Inc. Digital device advertising system and method
FR2949926B1 (en) * 2009-09-09 2011-10-21 Alcatel Lucent ESTABLISHMENT OF SECURE COMMUNICATION
CN101719250B (en) * 2009-12-10 2013-07-24 中国联合网络通信集团有限公司 Payment authentication method, platform and system
US9119076B1 (en) 2009-12-11 2015-08-25 Emc Corporation System and method for authentication using a mobile communication device
US8516063B2 (en) 2010-02-12 2013-08-20 Mary Anne Fletcher Mobile device streaming media application
US8452980B1 (en) * 2010-03-29 2013-05-28 Emc Corporation Defeating real-time trojan login attack with delayed interaction with fraudster
US9668129B2 (en) * 2010-09-14 2017-05-30 Vodafone Ip Licensing Limited Authentication in a wireless access network
US20120124656A1 (en) * 2010-11-16 2012-05-17 Evolucard S/A Method and system for mobile device based authentication
CN102572815B (en) * 2010-12-29 2014-11-05 中国移动通信集团公司 Method, system and device for processing terminal application request
US8290876B1 (en) * 2011-01-12 2012-10-16 Steven Douglas Powell Method and system for securing a third party payment electronic transaction
US20120296826A1 (en) 2011-05-18 2012-11-22 Bytemark, Inc. Method and system for distributing electronic tickets with visual display
US10375573B2 (en) 2015-08-17 2019-08-06 Bytemark, Inc. Short range wireless translation methods and systems for hands-free fare validation
US10360567B2 (en) 2011-03-11 2019-07-23 Bytemark, Inc. Method and system for distributing electronic tickets with data integrity checking
US10453067B2 (en) 2011-03-11 2019-10-22 Bytemark, Inc. Short range wireless translation methods and systems for hands-free fare validation
US10762733B2 (en) * 2013-09-26 2020-09-01 Bytemark, Inc. Method and system for electronic ticket validation using proximity detection
US8494967B2 (en) 2011-03-11 2013-07-23 Bytemark, Inc. Method and system for distributing electronic tickets with visual display
TWI528766B (en) * 2012-02-05 2016-04-01 財團法人資訊工業策進會 Direct mode communication system and discovery interactive method thereof
CN104428819B (en) 2012-03-30 2017-09-08 诺基亚技术有限公司 The ticketing service of identity-based
US9300643B1 (en) * 2012-06-27 2016-03-29 Amazon Technologies, Inc. Unique credentials verification
US9087187B1 (en) 2012-10-08 2015-07-21 Amazon Technologies, Inc. Unique credentials verification
US10304047B2 (en) * 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US9413749B2 (en) * 2013-08-20 2016-08-09 Vascode Technologies Ltd. System and method of authentication of a first party respective of a second party aided by a third party
FR3018021B1 (en) * 2014-02-24 2017-08-11 Dejamobile METHOD AND SYSTEM FOR SECURING TRANSACTIONS PROVIDED BY A PLURALITY OF SERVICES BETWEEN A MOBILE DEVICE OF A USER AND A POINT OF ACCEPTANCE
US9325703B2 (en) 2014-02-27 2016-04-26 International Business Machines Corporation Automatic security parameter management and renewal
US20150332259A1 (en) * 2014-05-13 2015-11-19 Clear Token Inc. Secure payment system and method
US20200286077A1 (en) * 2014-05-13 2020-09-10 Clear Token, Inc. Payment And Enforcement System For Electric Vehicle Charging Stations
US11308462B2 (en) * 2014-05-13 2022-04-19 Clear Token Inc Secure electronic payment
US20160217457A1 (en) * 2014-05-13 2016-07-28 Clear Token Inc. Parking facility secure payment system
US20160005042A1 (en) * 2014-07-02 2016-01-07 Mistral Mobile Host card emulation out-of-bound device binding verification
SG11201701653WA (en) * 2014-09-26 2017-04-27 Visa Int Service Ass Remote server encrypted data provisioning system and methods
US11803784B2 (en) 2015-08-17 2023-10-31 Siemens Mobility, Inc. Sensor fusion for transit applications
US9742761B2 (en) * 2015-11-10 2017-08-22 International Business Machines Corporation Dynamic authentication for a computing system
CN108292454B (en) * 2015-12-03 2020-08-14 诺基亚技术有限公司 Access management method and device
RU2649295C2 (en) * 2015-12-31 2018-03-30 Акционерное общество "Национальная система платежных карт" Method of customer verification
AU2017281938A1 (en) * 2016-06-24 2018-10-25 Visa International Service Association Unique token authentication cryptogram
EP3285512A1 (en) * 2016-08-17 2018-02-21 Gemalto Sa Authentication server of a cellular telecommunication network and corresponding uicc
US20180060989A1 (en) * 2016-08-30 2018-03-01 MaaS Global Oy System, method and device for digitally assisted personal mobility management
US11212100B2 (en) * 2017-03-23 2021-12-28 Moovel North America, Llc Systems and methods of providing and electronically validating tickets and tokens
KR102362795B1 (en) * 2017-09-27 2022-02-11 삼성에스디에스 주식회사 Method for device-to-device communication between terminals comprising device-to-device authentication using hash-chain
US11481852B2 (en) 2019-10-18 2022-10-25 Landis+Gyr Innovations, Inc. Secure tokens for controlling access to a resource in a resource distribution network
US11790349B2 (en) 2019-10-18 2023-10-17 Landis+Gyr Technology, Inc. Secure tokens for controlling access to a resource in a resource distribution network
US11481851B2 (en) 2019-10-18 2022-10-25 Landis+Gyr Innovations, Inc. Secure tokens for controlling access to a resource in a resource distribution network

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5491752A (en) * 1993-03-18 1996-02-13 Digital Equipment Corporation, Patent Law Group System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
US5829007A (en) * 1993-06-24 1998-10-27 Discovision Associates Technique for implementing a swing buffer in a memory array
FI99071C (en) * 1995-02-15 1997-09-25 Nokia Mobile Phones Ltd Procedure for use of applications in a mobile telephone as well as a mobile telephone
US6085976A (en) * 1998-05-22 2000-07-11 Sehr; Richard P. Travel system and methods utilizing multi-application passenger cards
FI973945A (en) * 1997-10-13 1999-04-14 Nokia Telecommunications Oy A communication system that communicates short messages
US6957255B1 (en) * 1999-06-28 2005-10-18 Amdocs (Israel) Ltd. Method and apparatus for session reconstruction and accounting involving VoIP calls
EP1192608A2 (en) * 2000-04-19 2002-04-03 Magicaxess Electronic payment method and device
US8903737B2 (en) * 2000-04-25 2014-12-02 Accenture Global Service Limited Method and system for a wireless universal mobile product interface
FR2808948B1 (en) * 2000-05-12 2006-03-03 Ibm Corp Internat Business Mac SYSTEM AND METHOD FOR SINGLE AUTHENTICATION EACH REPRODUCTION OF A GROUP OF ELECTRONIC DOCUMENTS
CN1945616A (en) 2000-11-08 2007-04-11 松下电器产业株式会社 Private electronic value bank system
US20020161826A1 (en) * 2001-01-25 2002-10-31 Carlos Arteaga System and method for remote communication transactions
WO2002063517A2 (en) 2001-02-06 2002-08-15 Michael Joseph Elias A method and apparatus for processing a token
EP1282089B1 (en) * 2001-08-03 2009-12-16 Telefonaktiebolaget LM Ericsson (publ) Method and devices for inter-terminal payments
US7315944B2 (en) * 2001-11-13 2008-01-01 Ericsson Inc. Secure handling of stored-value data objects
JP3899918B2 (en) * 2001-12-11 2007-03-28 株式会社日立製作所 Login authentication method, its execution system, and its processing program
WO2003083619A2 (en) * 2002-03-29 2003-10-09 Bank One, Delaware, N.A. System and process for performing purchase transaction using tokens
US7475248B2 (en) * 2002-04-29 2009-01-06 International Business Machines Corporation Enhanced message security
FR2842055B1 (en) * 2002-07-05 2004-12-24 Nortel Networks Ltd METHOD FOR CONTROLLING ACCESS TO A CELLULAR RADIO COMMUNICATION SYSTEM THROUGH A WIRELESS LOCAL AREA NETWORK, AND CONTROL MEMBER FOR IMPLEMENTING THE METHOD
JP4553565B2 (en) 2002-08-26 2010-09-29 パナソニック株式会社 Electronic value authentication method, authentication system and device
GB2405566B (en) * 2002-10-14 2005-05-18 Toshiba Res Europ Ltd Methods and systems for flexible delegation

Similar Documents

Publication Publication Date Title
WO2006000864B1 (en) Transaction & payment system securing remote authentication/validation of transactions from a transaction provider
US11689511B2 (en) Communication device using virtual access device and transaction applet
US7693797B2 (en) Transaction and payment system security remote authentication/validation of transactions from a transaction provider
US7882552B2 (en) Remote administration of smart cards for secure access systems
EP1278333B1 (en) Terminal communication system
US8549602B2 (en) System and method for handling permits for user authentication tokens
CN108476227A (en) System and method for equipment push supply
US9363262B1 (en) Authentication tokens managed for use with multiple sites
CN102483779A (en) Method for reading attributes from an id token
GB2448027A (en) Managing a digital identity of a user based on transitive trust between relying parties
KR101202295B1 (en) Method of paying with unique key value and apparatus thereof
US20130080331A1 (en) System and Method for Instantaneous Retail Payment
WO1998032113A1 (en) Method and system for controlling key for electronic signature
CN101448257A (en) Control system for validating user terminal and control method thereof
KR20070084801A (en) Creating and authenticating one time password using smartcard and the smartcard therefor
US10867326B2 (en) Reputation system and method
KR20020075325A (en) Certified copy issue system for wireless internet
CN111461706A (en) User information binding method and device based on block chain
KR101617452B1 (en) Method for Settling On-Line using One-Time Password
KR20040087362A (en) User Terminal Having Electronic Credit Storage Device, Service System and Method for Operating Self-Identified Electronic Credit Using the Same
KR100643501B1 (en) Key delivery method and the system for IC card issuing
CN114066626A (en) Cryptocurrency transaction system
KR20100134200A (en) System and method for settling on-line using mobile phone number and recording medium
JP2004334783A (en) Electronic value distribution system and electronic value distribution method
JP2002334304A (en) Method and system for batch modification of information stored in ic card