WO2010109060A1 - Procédé et appareil permettant des opérations de paiement hors ligne avec un transfert de données minimal - Google Patents

Procédé et appareil permettant des opérations de paiement hors ligne avec un transfert de données minimal Download PDF

Info

Publication number
WO2010109060A1
WO2010109060A1 PCT/FI2010/050199 FI2010050199W WO2010109060A1 WO 2010109060 A1 WO2010109060 A1 WO 2010109060A1 FI 2010050199 W FI2010050199 W FI 2010050199W WO 2010109060 A1 WO2010109060 A1 WO 2010109060A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameters
time period
predetermined time
private key
key
Prior art date
Application number
PCT/FI2010/050199
Other languages
English (en)
Inventor
Nadarajah Asokan
Jan-Erik Ekberg
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Priority to CN2010800139245A priority Critical patent/CN102369547A/zh
Priority to BRPI1014196A priority patent/BRPI1014196A8/pt
Publication of WO2010109060A1 publication Critical patent/WO2010109060A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/321Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures

Definitions

  • An embodiment relates to a computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause an apparatus to perform a number of functions.
  • the processors at least perform the following: initiating receiving of one or more parameters for off-line payment, wherein the parameters relate to a predetermined time period; generating, based on the parameters, a public key and a private key that are valid for the predetermined time period; and signing transaction data associated with the off-line payment using the private key during the predetermined time period.
  • Another embodiment relates to an apparatus comprising a processor and a memory storing executable instructions that (1) as part of execution or as a result of execution at least or (2) as both part of execution and as a result of execution at least cause the apparatus to perform at least the following: initiating receiving of one or more parameters for off-line payment, wherein the parameters relate to a predetermined time period; generating, based on the parameters, a public key and a private key that are valid for the predetermined time period; and signing transaction data associated with the off-line payment using the private key during the predetermined time period.
  • Another embodiment relates to an apparatus comprising means for initiating receiving of one or more parameters for off-line payment, wherein the parameters relate to a predetermined time period; means for generating, based on the parameters, a public key and a private key that are valid for the predetermined time period; and means for signing transaction data associated with the offline payment using the private key during the predetermined time period.
  • Another embodiment relates to an apparatus comprising a processor and a memory storing executable instructions that if executed cause the apparatus to at least perform generating cryptographic parameters that relate to a predetermined time period; generating, using the cryptographic parameters, a first public key and a first private key that are valid for the predetermined time period which verify an identity of a party in an off-line transaction; and generating a first certificate related to the first public key and the first private key, which verify the cryptographic parameters for the party, wherein for a subsequent time period, different cryptographic information is generated.
  • Another embodiment relates to an apparatus comprising means for generating cryptographic parameters that relate to a predetermined time period; means for generating, using the cryptographic parameters, a first public key and a first private key that are valid for the predetermined time period which verify an identity of a party in an off-line transaction; means for generating a first certificate related to the first public key and the first private key, which verify the cryptographic parameters for the party, wherein for a subsequent time period, different cryptographic information is generated.
  • Yet another embodiment relates to a method that comprises generating cryptographic parameters that relate to a predetermined time period; generating, using the cryptographic parameters, a first public key and a first private key that are valid for the predetermined time period which verify an identity of a party in an off-line transaction; and generating a first certificate related to the first public key and the first private key, which verify the cryptographic parameters for the party, wherein for a subsequent time period, different cryptographic information is generated.
  • FIG. 1 is diagram of a communications system capable of providing off-line transaction, according to an exemplary embodiment
  • FIG. 2A is a diagram of functional components of a device for performing off-line transactions, in accordance with one embodiment
  • FIG. 2B is a diagram of one example of a user device performing an off-line transaction, in accordance with one embodiment
  • FIG. 3 is a flowchart of a process for generating transaction credentials between a user device and a trusted service, in accordance with one embodiment
  • FIG. 4 is a flowchart of a process for generating transaction credentials between a merchant and a trusted service, in accordance with one embodiment
  • FIG. 5 is a flowchart of a process for performing an off-line transaction, in accordance with one embodiment
  • FIG. 6 is a flowchart of a process for generating transaction credentials between a user device and a merchant, in accordance with one embodiment
  • FIG. 7 is a ladder diagram of an example protocol for off-line transactions, in accordance with another embodiment
  • FIG. 8 is a diagram of hardware that can be used to implement an embodiment of the invention.
  • FIG. 9 is a diagram of a chip set that can be used to implement an embodiment of the invention.
  • FIG. 10 is a diagram of a mobile station (e.g., handset) that can be used to implement an embodiment of the invention.
  • FIG. 1 is diagram of a communications system capable of providing off-line transactions, according to an exemplary embodiment.
  • a user device 101a-101n is operated by a respective user to access various resources available over the network 103.
  • the user device 10Ia-IOIn may rely on a trusted third party, such as a bank or financial institution, 107 to provide various services over the network 103.
  • the user device 10Ia-IOIn can be any type of mobile terminal, fixed terminal, or portable terminal including mobile handsets, stations, units, devices, multimedia tablets, Internet nodes, communicators, desktop computers, laptop computers, Personal Digital Assistants (PDAs), or any combination thereof.
  • PDAs Personal Digital Assistants
  • the UEs 10Ia-IOIn can support any type of interface to the user (such as "wearable" circuitry, etc.).
  • a particular carrier may provide service such that the user device 10Ia-IOIn can have network access.
  • the user device 10Ia-IOIn can communicate with other computers and systems.
  • One example of such a system is a merchant 109.
  • the merchant 109 may permit online transaction processing or off-line transaction processing.
  • the trusted third party 107 is involved in generating the credentials used by both the user device 10Ia-IOIn and the merchant 109.
  • the credentials include various keys and certificates 111 that are stored on each user device 10Ia-IOIn and keys and certificates 113 stored at the merchants location.
  • these credentials can be used so that both parties can have confidence in the transaction. Also, because these credentials are stored locally, they do not have to be retrieved over a network connection during the transaction thereby allowing the transaction to take place off-line.
  • the communication network 103 of system 100 includes one or more networks such as a data network (not shown), a wireless network (not shown), a telephony network (not shown), or any combination thereof.
  • the data network may be any local area network (LAN), metropolitan area network (MAN), wide area network (WAN), the Internet, or any other suitable packet-switched network, such as a commercially owned, proprietary packet- switched network, e.g., a proprietary cable or fiber-optic network.
  • the wireless network may be, for example, a cellular network and may employ various technologies including enhanced data rates for global evolution (EDGE), general packet radio service (GPRS), global system for mobile communications (GSM), Internet protocol multimedia subsystem (IMS), universal mobile telecommunications system (UMTS), etc., as well as any other suitable wireless medium, e.g., microwave access (WiMAX), Long Term Evolution (LTE) networks, code division multiple access (CDMA), wireless fidelity (WiFi), satellite, mobile ad-hoc network (MANET), and the like.
  • EDGE enhanced data rates for global evolution
  • GPRS general packet radio service
  • GSM global system for mobile communications
  • IMS Internet protocol multimedia subsystem
  • UMTS universal mobile telecommunications system
  • any other suitable wireless medium e.g., microwave access (WiMAX), Long Term Evolution (LTE) networks, code division multiple access (CDMA), wireless fidelity (WiFi), satellite, mobile ad-hoc network (MANET), and the like.
  • FIG. 2A is a diagram of functional components of a device 101 for performing off-line transactions, in accordance with one embodiment.
  • the user device 101 includes a data receiver 203 that is capable of receiving data in a variety of modes.
  • the data receiver 203 can receive input from a keypad or user interface of the device 101. Additional sources of data can include a camera built into the device 101, text from text messages that can be received by the device 101, and audio input that is received by a microphone of the device 101.
  • the device 101 may also receive packet data that can be decoded and received by the data receiver 203.
  • a signed data verifier 205 is included as well.
  • the signed data verifier handles received data that may be encrypted or signed with a cryptographic key. In handling this data the signed data verifier 205 verifies that the data is properly signed or encrypted. If so, then the data can be further used in the transaction process. If not, then a user of the device 101 can be alerted and the transaction process can be terminated.
  • the user device 101 receives information from a trusted third party, or service, regarding short-lived key pairs that can be used for transactions.
  • an epoch key generator is used to generate a key pair for a current epoch. For example, an epoch can be for a single day and the user device 101 will receive key information from the trusted service every day and will generate an epoch key pair every day.
  • both the signed data verifier 205 and the epoch key generator 207 rely on local storage 209 of keys and certificates that can be used in the encryption/decryption and signing/verification processes. Furthermore, the generation of a key pair utilizes various parameters depending on the cryptographic algorithm being used. Thus, the cryptographic parameters may be stored in the storage 209 as well.
  • Another type of information that may be received by the data receiver 203 includes data about a transaction.
  • the user device 101 may take a picture of a bar code that describes the transaction (e.g., item, quantity, price, merchant ID, date, etc.) or the user may use a keypad or other user interface of the device 101 to enter the transaction description.
  • This data is then forwarded to a signed data generator 211.
  • the signed data generator 211 signs the data with the user's credentials so that a party receiving the signed data can trust that the data identifies the correct user identity.
  • the signed data may also include other information such as, for example, a limit to the amount of money this particular user has available or the age of the user so that certain age- restricted items cannot be purchased.
  • the output data transmitter 2113 can perform its function in a variety of different ways. If local networking is available between the user device 101 and the merchant (e.g., Bluetooth), then the data can be packetized and sent over the network. Alternatively, the signed data may be transmitted to the merchant by displaying a one dimensional or two dimensional barcode on a display screen of the device 101. The merchant would then scan or take a picture of that barcode as part of the transaction. Also, the signed output data may be transmitted as an audio signal out of a speaker of the device 101. Much like a modem signal, the output audio signal can be decoded by an appropriate device at the merchant location.
  • local networking is available between the user device 101 and the merchant (e.g., Bluetooth)
  • the signed data may be transmitted to the merchant by displaying a one dimensional or two dimensional barcode on a display screen of the device 101. The merchant would then scan or take a picture of that barcode as part of the transaction.
  • the signed output data may be transmitted as an audio signal out of a speaker of the
  • FIG. 2B is a diagram of one example of a user device 227 performing an off-line transaction, in accordance with one embodiment.
  • the cellular telephone 227 includes a display screen 229 that can display a barcode or other encoded visual information. Or, for example, steganographic techniques can be utilized to encode information into an image that is displayed.
  • the encoded information may also by in the format of a multimedia file such as, for example, an audio file 231, that the device 227 is capable of playing.
  • the encoded information in display 229, or the file 231 represents a transaction that is taking place with a merchant or vendor.
  • the encoded information represents a description by the transaction that has been signed using a credential of the user of the device 227.
  • This signed data can be captured by a merchant device 235 that has a media capture function 237 which could include taking a picture of the display 229 or receiving and decoding the audio file 231.
  • the captured data is then forwarded to an cryptographic application 239 that verifies the identity and information that is encoded within the captured data. Once the merchant is satisfied with the veracity of the information, the transaction can be completed. It is well understood that there are a variety of ways, separate from the transaction, that the merchant can settle accounts and receive payments from an appropriate source of funds related to the user making the transaction.
  • FIG. 3 is a flowchart 300 of a process for generating transaction credentials between a user device and a trusted service, in accordance with one embodiment.
  • step 301 the user and the service set up a long shared symmetrical key, Kc; this step is performed for each user so that each user has its own unique key.
  • Kc a long shared symmetrical key
  • the terms "customer”, “merchant” and “bank” are used to refer to the three parties that are involved in an offline transaction in accordance with an embodiment of the present invention. These terms are not intended to restrict implementations of the disclosed techniques and devices to only these specific types of entities but, instead, these terms are used to refer to the general roles of the entities within the transaction process. Also, consistent use of these terms will allow simple naming of keys based on these roles. For example, the subscript "C" in the example key Kc allows quick discernment that this is the customer's symmetric key being described.
  • the customer and the bank Prior to setting up the key Kc in step 301, the customer and the bank have established an account so that the customer may draw on funds in the bank or can buy on credit extended by the bank which will be paid back by the customer.
  • the key Kc allows the bank to encrypt data for the customer and for the customer to verify data received from the bank is truly from the bank.
  • One example of the data sent by the bank is that for every epoch, the bank transmits parameters for generating key pairs for that epoch that are received in step 303 by the customer.
  • An epoch can, for example, be one day or one week and represents the length of time before the bank will send out new parameters for the next epoch.
  • One exemplary cryptography technique is elliptic curve cryptography in general, and specifically elliptical curve digital signal algorithm (ECDSA).
  • ECDSA elliptic curve digital signal algorithm
  • the bit size of the public key believed to be needed for ECDSA is about twice the size of the security level, in bits.
  • the size of a DSA public key is at least 1024 bits, whereas the size of an ECDSA public key would be 160 bits.
  • the user device can then derive, in step 305, a short-lived key pair to be used for transactions during the current epoch.
  • the key pair SKc' and PKc' can be derived based on the symmetrical key Kc and the cryptography parameters received in step 303.
  • This short-lived key pair is a unique key pair for that customer during the epoch.
  • the bank also generates an epoch key pair that it uses during the epoch as well.
  • This key pair SK B ' and PK B l is used to sign and verify data exchanged by the bank during a current epoch.
  • the bank uses SK B l to create a user specific certificate valid for the epoch which the customer also receives a certificate Cc', in step 307.
  • This epoch specific certificate can be presented by the customer during a transaction and the merchant can use PK B l to verify the authenticity of the information within the certificate.
  • the certificate may identify the user by way of a cryptographic credential and may also indicate spending limits, available funds, or other information about the customer.
  • This process of key pair generation and receiving certificates repeats every epoch. Although discussed above as a "push" operation controlled by the bank, the customer may also "pull" the information at the start of each epoch.
  • the customer can verify that the epoch specific cryptography parameters received are really those chosen by the bank. Accordingly, the bank can send an authentication code Auth'c that is computed over the parameters using the shared key Kc.
  • the code can be easily verified and can, for example, be small in size such as about 128 bits.
  • FIG. 4 is a flowchart 400 of a process for generating transaction credentials between a merchant and a trusted service, in accordance with one embodiment.
  • the bank shares a public key PK B with any merchant, in step 401. This allows the merchant to verify data signed using the bank's private key SK B . Every epoch, the bank signs its epoch public key PK B l and sends the signed key to each merchant, in step 403, as a bank specific certificate C l B that can be verified using the key, PK B , in step 405.
  • the merchant is now able to process off-line transactions from customers that use the banks epoch public key, PK B l , during the transaction.
  • the bank also includes the epoch specific parameters (already sent to the customer) in the bank certificate C l B as well. Since C l B can be verified using the bank's long term public key PK B , the merchant can verify that the epoch specific cryptography parameters are really those chosen by the bank, and that PKB' is a genuine short-term public key which the bank will use during the current epoch..
  • FIG. 5 is a flowchart 500 of a process for performing an off-line transaction, in accordance with one embodiment.
  • the transaction data describes the transaction such as the identity of the merchant, the items being purchased, the quantities of various items, the amount of the purchase, and other similar information.
  • the transaction data may also be very simple and include the amount of the transaction and almost no other data.
  • This transaction data is entered into the customer's device as described earlier such as by a keypad or other input mode.
  • the customer signs the transaction data, in step 503, using their epoch-specific private key SKc'.
  • the customer then send the merchant the signed transaction data and their epoch specific certificate Cc', in step 505.
  • This information may be sent to the merchant via the display screen of the customer's device or as an audio file or other transmission means.
  • the merchant receives this information, in step 507, and verifies its authenticity and accuracy.
  • the merchant can verify the certificate, Cc', using the banks epoch specific public key PK B ' and can verify, in step 509, the customer's signature using PKc' using the information from the, now verified, certificate Cc'.
  • the transaction has completed after these verifications and the merchant can then commence efforts to receive the appropriate funds from the bank to cover the transaction.
  • the size of the epoch specific keys is chosen based on the length of the epoch.
  • the benefit is that the short-lived key pair is valid only during a given epoch and the length can be chosen so that it is secure during that period. After expiration of the epoch, breaking of the key pair provides no useful information.
  • FIG. 6 is a flowchart 600 of a process for generating transaction credentials between a user device and a merchant, in accordance with one embodiment.
  • the bank transmits the epoch cryptography parameters to the customer every epoch. This occurs whether the customer performs an off-line transaction during that epoch or not.
  • the merchant provides those parameters during the transaction but this assumes that a two-way communication takes place during the transaction.
  • the merchant sends the cryptography parameters to the customer who then can verify them as authentic, in step 603. Once verified, the customer can use the parameters to generate the short-lived key pair for the current epoch, in step 605.
  • An additional approach is to have the bank map the set of all Auth'c values to a bloom filter f* which is broadcast to all merchants at the start of every epoch and is transferred, along with the parameters, from the merchant to a customer on demand.
  • the customer can construct its own Auth' value and check for membership in the received f*.
  • FIG. 7 is a ladder diagram of an example protocol for off-line transactions, in accordance with another embodiment.
  • the parties in the diagram are the customer 702, the merchant 704, and the bank 706.
  • the bank shares its public key PK B 708 with all merchants 704 and a separate symmetric key Kc 710 with each customer.
  • the customer's device has storage 712 for Kc and the merchant 704 has storage 714 for PK ⁇ .
  • the bank 706 has storage for the public key PK B and the customer keys Kc.
  • the bank At the start of each epoch, the bank generates a variety of information 718.
  • This information can include: (a) the cryptography parameters used for generating key pairs during the current epoch, (b) a bank short-lived key pair for the current epoch (PKB'), (C) a certificate, CB' generated by the bank signing the epoch information with its secret key, (d) the epoch key pairs for each customer, PK l c , SK l c (e) a customer certificate (Cc') for each customer generated by signing the epoch information with the banks short-lived public key, and (f) an authentication message (Auth'c) that allows the customer to verify the cryptography parameters sent by the bank.
  • PKI bank short-lived key pair for the current epoch
  • a message 720 sent by the bank 706 to the merchant 704 includes the epoch cryptography parameters, the banks short-lived public key, PK B l , and the bank certificate, C B ', of the current epoch information.
  • a message 722 sent by the bank 706 to the customer includes the customer certificate Cc', and the authentication message Auth'c.
  • the merchant verifies the banks certificate and, in step 726, the device of the customer is used to verify the authentication message and to generate the short-lived key par for the epoch.
  • the customer's device can store the certificate Cc' and the key pair PK l c , SK l c in storage 728 while the merchant 704 can store the information it received in storage 730.
  • the customer 702 and the merchant 704 can now perform an off-line transaction with assurances of the authenticity and validity of the transaction.
  • the customer 702 signs the transaction data in step 732 and send it and the certificate Cc' in a message 734 to the merchant 704.
  • this message is not necessarily a network message but may include an image displayed on the customer's device or an audio file played by the customer's device.
  • the merchant 704 can verify the certificate using the bank's short-lived public key, PK B ', to obtain the customer's epoch public key PKc' . Then, the signed data can be verified using this key.
  • PK B ' the bank's short-lived public key
  • PKc' the customer's epoch public key
  • a reasonable duration for an epoch can be 1 day. Assuming that the strongest possible attacker is capable of doing on the order of 2 30 (or more conservatively 2 40 ) operations during this period, an ECDSA in a 60 or 80 bit elliptic curve can be used. This results in signatures made with the short-lived keys that are 120 (or 160) bits long. Also, C' B can be a standard signature (e.g., 512 bits with ECDSA). In an embodiment where the bank provides the cryptography parameters, the amount of data transferred via the various channels can be summarized, Table 1, as follows when using a b-bit elliptic curve:
  • the merchant to the customer channel will transport 4b+512 bits, but periodic sending of these messages from the bank can be avoided altogether.
  • the bank can pre-generate the parameters for several epochs at once. It can then pre-calculate the short-lived keypairs for several epochs (both for the customers and for the bank itself) and generate short-lived certificates C'c for customers for several epochs.
  • This has the advantage of reducing bank to customer communication.
  • the bank can provide certificates for several epochs at once. The parameters for a particular epoch will only be revealed during that epoch. Therefore, releasing C'c early does not hamper the security.
  • This improvement is advantageously combined with the variation of a two way communication between merchant and customer whereby the epoch-specific, "global" parameters can be given to the customer by the merchant. Then, the epoch-specific communication between the client and the bank can be avoided entirely.
  • the processes described herein for manipulating the images returned from a search engine may be implemented via software, hardware (e.g., general processor, Digital Signal Processing (DSP) chip, an Application Specific Integrated Circuit (ASIC), Field Programmable Gate Arrays (FPGAs), etc.), firmware or a combination thereof.
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Arrays
  • FIG. 8 illustrates a computer system 800 upon which an embodiment of the invention may be implemented.
  • Computer system 800 is programmed to carry out the inventive functions described herein and includes a communication mechanism such as a bus 810 for passing information between other internal and external components of the computer system 800.
  • Information also called data
  • Information is represented as a physical expression of a measurable phenomenon, typically electric voltages, but including, in other embodiments, such phenomena as magnetic, electromagnetic, pressure, chemical, biological, molecular, atomic, sub-atomic and quantum interactions. For example, north and south magnetic fields, or a zero and non-zero electric voltage, represent two states (0, 1) of a binary digit (bit). Other phenomena can represent digits of a higher base.
  • a superposition of multiple simultaneous quantum states before measurement represents a quantum bit (qubit).
  • a sequence of one or more digits constitutes digital data that is used to represent a number or code for a character.
  • information called analog data is represented by a near continuum of measurable values within a particular range.
  • a bus 810 includes one or more parallel conductors of information so that information is transferred quickly among devices coupled to the bus 810.
  • One or more processors 802 for processing information are coupled with the bus 810.
  • a processor 802 performs a set of operations on information.
  • the set of operations include bringing information in from the bus 810 and placing information on the bus 810.
  • the set of operations also typically include comparing two or more units of information, shifting positions of units of information, and combining two or more units of information, such as by addition or multiplication or logical operations like OR, exclusive OR (XOR), and AND.
  • Each operation of the set of operations that can be performed by the processor is represented to the processor by information called instructions, such as an operation code of one or more digits.
  • a sequence of operations to be executed by the processor 802, such as a sequence of operation codes constitute processor instructions, also called computer system instructions or, simply, computer instructions.
  • Processors may be implemented as mechanical, electrical, magnetic, optical, chemical or quantum components, among others, alone or in combination.
  • Computer system 800 also includes a memory 804 coupled to bus 810.
  • the memory 804 such as a random access memory (RAM) or other dynamic storage device, stores information including processor instructions. Dynamic memory allows information stored therein to be changed by the computer system 800. RAM allows a unit of information stored at a location called a memory address to be stored and retrieved independently of information at neighboring addresses.
  • the memory 804 is also used by the processor 802 to store temporary values during execution of processor instructions.
  • the computer system 800 also includes a read only memory (ROM) 806 or other static storage device coupled to the bus 810 for storing static information, including instructions, that is not changed by the computer system 800. Some memory is composed of volatile storage that loses the information stored thereon when power is lost.
  • Information is provided to the bus 810 for use by the processor from an external input device 812, such as a keyboard containing alphanumeric keys operated by a human user, or a sensor.
  • an external input device 812 such as a keyboard containing alphanumeric keys operated by a human user, or a sensor.
  • a sensor detects conditions in its vicinity and transforms those detections into physical expression compatible with the measurable phenomenon used to represent information in computer system 800.
  • Other external devices coupled to bus 810 used primarily for interacting with humans, include a display device 814, such as a cathode ray tube (CRT) or a liquid crystal display (LCD), or plasma screen or printer for presenting text or images, and a pointing device 816, such as a mouse or a trackball or cursor direction keys, or motion sensor, for controlling a position of a small cursor image presented on the display 814 and issuing commands associated with graphical elements presented on the display 814.
  • a display device 814 such as a cathode ray tube (CRT) or a liquid crystal display (LCD), or plasma screen or printer for presenting text or images
  • a pointing device 816 such as a mouse or a trackball or cursor direction keys, or motion sensor, for controlling a position of a small cursor image presented on the display 814 and issuing commands associated with graphical elements presented on the display 814.
  • a display device 814 such as a cathode ray tube (CRT
  • special purpose hardware such as an application specific integrated circuit (ASIC) 820
  • ASIC application specific integrated circuit
  • the special purpose hardware is configured to perform operations not performed by processor 802 quickly enough for special purposes.
  • application specific ICs include graphics accelerator cards for generating images for display 814, cryptographic boards for encrypting and decrypting messages sent over a network, speech recognition, and interfaces to special external devices, such as robotic arms and medical scanning equipment that repeatedly perform some complex sequence of operations that are more efficiently implemented in hardware.
  • Computer system 800 also includes one or more instances of a communications interface 870 coupled to bus 810.
  • Communication interface 870 provides a one-way or two-way communication coupling to a variety of external devices that operate with their own processors, such as printers, scanners and external disks. In general the coupling is with a network link 878 that is connected to a local network 880 to which a variety of external devices with their own processors are connected.
  • communication interface 870 may be a parallel port or a serial port or a universal serial bus (USB) port on a personal computer.
  • USB universal serial bus
  • communications interface 870 is an integrated services digital network (ISDN) card or a digital subscriber line (DSL) card or a telephone modem that provides an information communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • DSL digital subscriber line
  • a communication interface 870 is a cable modem that converts signals on bus 810 into signals for a communication connection over a coaxial cable or into optical signals for a communication connection over a fiber optic cable.
  • communications interface 870 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN, such as Ethernet. Wireless links may also be implemented.
  • LAN local area network
  • the communications interface 870 sends or receives or both sends and receives electrical, acoustic or electromagnetic signals, including infrared and optical signals, that carry information streams, such as digital data.
  • the communications interface 870 includes a radio band electromagnetic transmitter and receiver called a radio transceiver.
  • Non-volatile media include, for example, optical or magnetic disks, such as storage device 808.
  • Volatile media include, for example, dynamic memory 804.
  • Transmission media include, for example, coaxial cables, copper wire, fiber optic cables, and carrier waves that travel through space without wires or cables, such as acoustic waves and electromagnetic waves, including radio, optical and infrared waves. Signals include man-made transient variations in amplitude, frequency, phase, polarization or other physical properties transmitted through the transmission media.
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, CDRW, DVD, any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
  • a floppy disk a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, CDRW, DVD, any other optical medium, punch cards, paper tape, optical mark sheets, any other physical medium with patterns of holes or other optically recognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
  • FIG. 9 illustrates a chip set 900 upon which an embodiment of the invention may be implemented.
  • Chip set 900 is programmed to carry out the inventive functions described herein and includes, for instance, the processor and memory components described with respect to FIG. 8 incorporated in one or more physical packages.
  • a physical package includes an arrangement of one or more materials, components, and/or wires on a structural assembly (e.g., a baseboard) to provide one or more characteristics such as physical strength, conservation of size, and/or limitation of electrical interaction.
  • the chip set 900 includes a communication mechanism such as a bus 901 for passing information among the components of the chip set 900.
  • a processor 903 has connectivity to the bus 901 to execute instructions and process information stored in, for example, a memory 905.
  • the processor 903 may include one or more processing cores with each core configured to perform independently.
  • a multi-core processor enables multiprocessing within a single physical package. Examples of a multi-core processor include two, four, eight, or greater numbers of processing cores.
  • the processor 903 may include one or more microprocessors configured in tandem via the bus 901 to enable independent execution of instructions, pipelining, and multithreading.
  • the processor 903 may also be accompanied with one or more specialized components to perform certain processing functions and tasks such as one or more digital signal processors (DSP) 907, or one or more application-specific integrated circuits (ASIC) 909.
  • DSP digital signal processors
  • ASIC application-specific integrated circuits
  • a DSP 907 typically is configured to process real-word signals (e.g., sound) in real time independently of the processor 903.
  • an ASIC 909 can be configured to performed specialized functions not easily performed by a general purposed processor.
  • Other specialized components to aid in performing the inventive functions described herein include one or more field programmable gate arrays (FPGA) (not shown), one or more controllers (not shown), or one or more other special-purpose computer chips.
  • FPGA field programmable gate arrays
  • the processor 903 and accompanying components have connectivity to the memory 905 via the bus 901.
  • the memory 905 includes both dynamic memory (e.g., RAM, magnetic disk, writable optical disk, etc.) and static memory (e.g., ROM, CD-ROM, etc.) for storing executable instructions that when executed perform the inventive steps described herein.
  • the memory 905 also stores the data associated with or generated by the execution of the inventive steps.
  • FIG. 10 is a diagram of exemplary components of a mobile station (e.g., handset) capable of operating in the system of FIG. 1 , according to an exemplary embodiment.
  • a radio receiver is often defined in terms of front-end and back-end characteristics.
  • the front-end of the receiver encompasses all of the Radio Frequency (RF) circuitry whereas the back-end encompasses all of the base-band processing circuitry.
  • Pertinent internal components of the telephone include a Main Control Unit (MCU) 1003, a Digital Signal Processor (DSP) 1005, and a receiver/transmitter unit including a microphone gain control unit and a speaker gain control unit.
  • a main display unit 1007 provides a display to the user in support of various applications and mobile station functions.
  • An audio function circuitry 1009 includes a microphone 1011 and microphone amplifier that amplifies the speech signal output from the microphone 1011. The amplified speech signal output from the microphone 1011 is fed to a coder/decoder (CODEC) 1013.
  • a radio section 1015 amplifies power and converts frequency in order to communicate with a base station, which is included in a mobile communication system, via antenna 1017.
  • the power amplifier (PA) 1019 and the transmitter/modulation circuitry are operationally responsive to the MCU 1003, with an output from the PA 1019 coupled to the duplexer 1021 or circulator or antenna switch, as known in the art.
  • the PA 1019 also couples to a battery interface and power control unit 1020.
  • a user of mobile station 1001 speaks into the microphone 1011 and his or her voice along with any detected background noise is converted into an analog voltage.
  • the analog voltage is then converted into a digital signal through the Analog to Digital Converter (ADC) 1023.
  • ADC Analog to Digital Converter
  • the control unit 1003 routes the digital signal into the DSP 1005 for processing therein, such as speech encoding, channel encoding, encrypting, and interleaving.
  • the processed voice signals are encoded, by units not separately shown, using a cellular transmission protocol such as global evolution (EDGE), general packet radio service (GPRS), global system for mobile communications (GSM), Internet protocol multimedia subsystem (IMS), universal mobile telecommunications system (UMTS), etc., as well as any other suitable wireless medium, e.g., microwave access (WiMAX), Long Term Evolution (LTE) networks, code division multiple access (CDMA), wireless fidelity (WiFi), satellite, and the like.
  • a cellular transmission protocol such as global evolution (EDGE), general packet radio service (GPRS), global system for mobile communications (GSM), Internet protocol multimedia subsystem (IMS), universal mobile telecommunications system (UMTS), etc.
  • EDGE global evolution
  • GPRS general packet radio service
  • GSM global system for mobile communications
  • IMS Internet protocol multimedia subsystem
  • UMTS universal mobile telecommunications system
  • any other suitable wireless medium e.g., microwave access (WiMAX), Long Term Evolution (LTE)
  • the encoded signals are then routed to an equalizer 1025 for compensation of any frequency-dependent impairments that occur during transmission though the air such as phase and amplitude distortion.
  • the modulator 1027 combines the signal with a RF signal generated in the RF interface 1029.
  • the modulator 1027 generates a sine wave by way of frequency or phase modulation.
  • an up-converter 1031 combines the sine wave output from the modulator 1027 with another sine wave generated by a synthesizer 1033 to achieve the desired frequency of transmission.
  • the signal is then sent through a PA 1019 to increase the signal to an appropriate power level.
  • the PA 1019 acts as a variable gain amplifier whose gain is controlled by the DSP 1005 from information received from a network base station.
  • the signal is then filtered within the duplexer 1021 and optionally sent to an antenna coupler 1035 to match impedances to provide maximum power transfer. Finally, the signal is transmitted via antenna 1017 to a local base station.
  • An automatic gain control (AGC) can be supplied to control the gain of the final stages of the receiver.
  • the signals may be forwarded from there to a remote telephone which may be another cellular telephone, other mobile phone or a land-line connected to a Public Switched Telephone Network (PSTN), or other telephony networks.
  • PSTN Public Switched Telephone Network
  • Voice signals transmitted to the mobile station 1001 are received via antenna 1017 and immediately amplified by a low noise amplifier (LNA) 1037.
  • LNA low noise amplifier
  • a down-converter 1039 lowers the carrier frequency while the demodulator 1041 strips away the RF leaving only a digital bit stream.
  • the signal then goes through the equalizer 1025 and is processed by the DSP 1005.
  • a Digital to Analog Converter (DAC) 1043 converts the signal and the resulting output is transmitted to the user through the speaker 1045, all under control of a Main Control Unit (MCU) 1003-which can be implemented as a Central Processing Unit (CPU) (not shown).
  • MCU Main Control Unit
  • CPU Central Processing Unit
  • the MCU 1003 receives various signals including input signals from the keyboard 1047.
  • the MCU 1003 delivers a display command and a switch command to the display 1007 and to the speech output switching controller, respectively.
  • the MCU 1003 exchanges information with the DSP 1005 and can access an optionally incorporated SIM card 1049 and a memory 1051.
  • the MCU 1003 executes various control functions required of the station.
  • the DSP 1005 may, depending upon the implementation, perform any of a variety of conventional digital processing functions on the voice signals.
  • DSP 1005 determines the background noise level of the local environment from the signals detected by microphone 1011 and sets the gain of microphone 1011 to a level selected to compensate for the natural tendency of the user of the mobile station 1001.
  • the CODEC 1013 includes the ADC 1023 and DAC 1043.
  • the memory 1051 stores various data including call incoming tone data and is capable of storing other data including music data received via, e.g., the global Internet.
  • the software module could reside in RAM memory, flash memory, registers, or any other form of writable storage medium known in the art.
  • the memory device 1051 may be, but not limited to, a single memory, CD, DVD, ROM, RAM, EEPROM, optical storage, or any other non-volatile storage medium capable of storing digital data.
  • An optionally incorporated SIM card 1049 carries, for instance, important information, such as the cellular phone number, the carrier supplying service, subscription details, and security information.
  • the SIM card 1049 serves primarily to identify the mobile station 1001 on a radio network.
  • the card 1049 also contains a memory for storing a personal telephone number registry, text messages, and user specific mobile station settings.

Abstract

Une approche selon l'invention a pour but de faciliter les achats et autres opérations au moyen d'un dispositif pouvant être mis en réseau, mais de façon à ce que ces achats et autres opérations soient réalisés hors ligne. Des clés cryptographiques et certificats qui ont une durée de vie relativement courte et qui sont stockés dans un dispositif d'utilisateur (728) servent à réduire au minimum la quantité de données utilisées au cours de l'authentification et de la vérification de l'opération (732, 734, 736). Ainsi, l'opération peut être menée à bien sans transmission ni réception d'informations sur le réseau pendant l'opération.
PCT/FI2010/050199 2009-03-26 2010-03-16 Procédé et appareil permettant des opérations de paiement hors ligne avec un transfert de données minimal WO2010109060A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2010800139245A CN102369547A (zh) 2009-03-26 2010-03-16 用于以最少数据传递提供离线支付交易的方法和装置
BRPI1014196A BRPI1014196A8 (pt) 2009-03-26 2010-03-16 Método e aparelho para proporcionar transações de pagamento off-line com transferência de dados mínima

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16371209P 2009-03-26 2009-03-26
US61/163,712 2009-03-26
IN839/CHE/2009 2009-04-13
IN839CH2009 2009-04-13

Publications (1)

Publication Number Publication Date
WO2010109060A1 true WO2010109060A1 (fr) 2010-09-30

Family

ID=42780187

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FI2010/050199 WO2010109060A1 (fr) 2009-03-26 2010-03-16 Procédé et appareil permettant des opérations de paiement hors ligne avec un transfert de données minimal

Country Status (3)

Country Link
CN (1) CN102369547A (fr)
BR (1) BRPI1014196A8 (fr)
WO (1) WO2010109060A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013045743A3 (fr) * 2011-09-28 2013-06-13 Onsun Oy Système de paiement

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102903043B (zh) * 2012-09-19 2016-08-17 东莞宇龙通信科技有限公司 支付服务器和支付通道获取方法
CN103269272B (zh) * 2013-05-22 2016-03-02 河海大学 一种基于短期证书的密钥封装方法
CN104901806B (zh) * 2014-12-29 2016-06-22 腾讯科技(深圳)有限公司 一种虚拟资源处理方法、装置和系统
CN111833043B (zh) * 2015-05-25 2024-04-19 创新先进技术有限公司 信息交互方法、设备及服务端
US20170140358A1 (en) * 2015-11-18 2017-05-18 Andrew Orrock Network Bridge for Local Transaction Authorization

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008027620A1 (fr) * 2006-03-30 2008-03-06 Obopay Inc. Système de paiement mobile entre deux personnes

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1287327C (zh) * 2001-03-29 2006-11-29 伊贝斯卡株式会社 在线和/或离线电子货币卡交易系统及其方法
US20030099360A1 (en) * 2001-11-28 2003-05-29 Khoi Hoang Time-based encryption key

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008027620A1 (fr) * 2006-03-30 2008-03-06 Obopay Inc. Système de paiement mobile entre deux personnes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Federal information processing standards publication.", FIPS PUB 186-2 DIGITAL SIGNATURE STANDARD (DSS), 27 January 2000 (2000-01-27), Retrieved from the Internet <URL:http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf> [retrieved on 20100610] *
"Financial Cryptography. 5th International Conference, 19-22 Feb. 2001", article BLAZE, M ET AL.: "Offline micropayments without trusted hardware." *
LEE, Y ET AL.: "Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce.", COMPUTER COMMUNICATIONS, vol. 30, no. 4, 26 February 2007 (2007-02-26), Retrieved from the Internet <URL:doi:10.1016/j.comcom.2006.10.014> [retrieved on 20100608] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013045743A3 (fr) * 2011-09-28 2013-06-13 Onsun Oy Système de paiement
US9953319B2 (en) 2011-09-28 2018-04-24 Unito Oy Payment system

Also Published As

Publication number Publication date
BRPI1014196A2 (pt) 2016-04-26
CN102369547A (zh) 2012-03-07
BRPI1014196A8 (pt) 2017-07-25

Similar Documents

Publication Publication Date Title
US10762406B2 (en) Secure QR code service
US7784684B2 (en) Wireless computer wallet for physical point of sale (POS) transactions
CN105190661B (zh) 使用媒体绑定的安全移动支付
US9852418B2 (en) Trusted service manager (TSM) architectures and methods
US9183552B2 (en) Method and apparatus for providing automated payment with an audio token
US20230146705A1 (en) Federated closed-loop system
US20140279115A1 (en) Mobile payment using cloud computing
CN101576983A (zh) 一种基于移动终端的电子支付方法和系统
WO2014111888A1 (fr) Système de paiement mobile
US11698982B2 (en) System and method for protecting location data
WO2010109060A1 (fr) Procédé et appareil permettant des opérations de paiement hors ligne avec un transfert de données minimal
CN109995781A (zh) 数据的传输方法、装置、介质以及设备
AU2017319373A1 (en) Payment method and payment system based on security authentication mechanism
US20220329414A1 (en) Gateway agnostic tokenization
CN104240077B (zh) 一种基于短距离无线通信技术的编码加密器
WO2023160667A1 (fr) Procédé, appareil et système d&#39;authentification de sécurité pour transaction de devise numérique
Ahamad et al. A new mobile payment system with formal verification
US20100250443A1 (en) Method and apparatus for providing online payments
Khan et al. E-commerce in Pakistan: Growth potentials and e-payment solutions
Yang et al. A New Third-party Payment Scheme with Anonymity for Mobile Commerce
Martínez-Peláez et al. Efficient certificate path validation and its application in mobile payment protocols
Aujla et al. A secure account based mobile payment protocol with public key cryptography and biometric characteristics
US20230275766A1 (en) Integrating identity tokens and privacy-preserving identity attribute attestations into interactions
CN113762938A (zh) 用于双离线场景下的聚合支付方法、装置及接收端
Ugwu et al. A Secured Mobile Payment Transaction Protocol for Android Systems

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080013924.5

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10755484

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10755484

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: PI1014196

Country of ref document: BR

ENP Entry into the national phase

Ref document number: PI1014196

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20110922