WO2013168815A1 - 携帯端末を利用して認証および決済を行う方法およびシステム - Google Patents
携帯端末を利用して認証および決済を行う方法およびシステム Download PDFInfo
- Publication number
- WO2013168815A1 WO2013168815A1 PCT/JP2013/063234 JP2013063234W WO2013168815A1 WO 2013168815 A1 WO2013168815 A1 WO 2013168815A1 JP 2013063234 W JP2013063234 W JP 2013063234W WO 2013168815 A1 WO2013168815 A1 WO 2013168815A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- user
- server
- settlement
- terminal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10544—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
- G06K7/10712—Fixed beam scanning
- G06K7/10722—Photodetector array or CCD scanning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3226—Use of secure elements separate from M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Definitions
- the present invention relates to a method and system for performing authentication and payment using a portable terminal, and in particular, high security personal authentication using ID patterns printed on a net card or bit data corresponding to the ID patterns. And a method and system for performing authentication and payment using a mobile terminal adapted to perform payment.
- settlement is basically performed by a dedicated terminal connected to a dedicated line.
- a dedicated line or a dedicated terminal can not be installed without credit, and can not be used at locations where it is difficult to install such facilities.
- the card number and password are keyed in for personal authentication, so the keyed number or symbol May be phished or stored by a distributor. Once the card number or password is stolen, there is a problem that it is easily permitted to misuse the key input only.
- the authentication matrix table such as a random number table called a second PIN code to prevent the contents of the secret from being understood by a third party
- a method of transmission is used. For example, when sharing the same authentication matrix table between a financial institution and a user, and performing cash transactions on the net, the user places the numbers described in the position on the authentication matrix table instructed by the financial institution. By replying, there is one that confirms the match and performs personal authentication.
- the authentication matrix table is visually recognizable, it is not only possible to eliminate the possibility that the table will be stolen or copied for unauthorized use, but it is essentially key input Therefore, the authentication method using such a random number table can not maintain sufficient security.
- a QR code system in which a QR code in which encoded information is two-dimensionally arranged is captured by a camera and a captured image is decoded into characters or the like.
- the QR code is characterized in that the amount of information can be dramatically increased compared to the bar code or the like used in the card used.
- Patent Literatures 2 and 3 disclose techniques in which a card reader provided with sensor electrodes disposed in parallel with each other and a code of a fuse pattern is read by the card reader.
- An object of the present invention is to prevent unauthorized use of information on a card used even if the conventional information such as a card number and password is stolen, and perform authentication and settlement using a portable terminal with high convenience. Methods and systems are provided.
- a new net card holding an ID pattern is issued,
- the ID pattern of the net card is captured as an image by the camera, bit data is read from the captured image, and converted into an authentication ID using application software (hereinafter referred to as an application) specific to each user downloaded in advance for authentication and Execute payment
- application software hereinafter referred to as an application
- the same bit data as the bit data expressed in the ID pattern may be stored in the memory instead of the ID pattern, and the application may be activated and converted into an authentication ID by inputting a password.
- the seller can download the application for the seller to a general smartphone or personal computer without installing a dedicated line or a dedicated terminal, and can execute payment after authentication using the user's net card. It is like that.
- the user side converts the captured image into bit data and saves it in the memory or the application in order to save time and effort of capturing the ID pattern with the camera each time the user performs personal authentication.
- the bit data is downloaded with the bit data and stored in the memory, and when a preset password is input, the bit data stored in the memory is automatically read and converted from the bit data to an authentication ID by the application for personal authentication and settlement Can also be performed.
- one or more necessary usage cards are registered in advance in the net card, and it is possible to select which card is used to make a transaction at the time of commerce, and use the selected card. Make it possible to settle payments with the seller.
- the net card can also use the use card, input the ID pattern or password held in the net card, extract bit data from this, convert it into an authentication ID, and transmit this authentication ID through the communication line to perform authentication. Since the authentication is performed, an authentication ID different from the input ID pattern and password is output to the communication line. Therefore, even if this authentication ID is phished, it is not abused because the authentication ID is not input to the portable terminal.
- the application is configured to convert to an authentication ID according to the content specific to each user, even if the ID pattern, password or authentication ID is stolen, it can not be used by other mobile terminals. So you can build a business model with extremely high security.
- a net card holding an ID pattern is issued separately from the conventional usage card.
- the ID pattern is formed of an electrode of metal or the like, and is formed in a unique pattern which is different for each net card.
- the ID pattern is captured as an image by a camera incorporated in the user portable terminal, converted into an authentication ID by an application previously downloaded to the portable terminal, and performs personal authentication based on the converted authentication ID.
- the vendor application is downloaded in advance to the terminal of the distributor, and authentication and settlement are performed between the user portable terminal and the management program of the database operation company.
- the mobile terminal is preferably a smartphone or a personal computer.
- a smartphone with a built-in camera is compatible with the present invention because the camera and the terminal are linked.
- the terminal of the seller is preferably a portable terminal, especially when opening a store at an event.
- FIG. 1 is a system configuration diagram for explaining the outline of the entire system according to the present invention.
- an ID pattern 2 is formed on part of a net card 1.
- This ID pattern is not limited to the arrangement on the right side of the card as shown, but can be formed at an arbitrary position.
- the ID pattern is held on the net card 1 by an appropriate method such as printing or sticking.
- a card on which a separate random number table is displayed is issued.
- the present invention in place of authentication by the second password, It is possible to introduce high security authentication by the ID pattern according to the present invention.
- an ID pattern is captured by the camera 4 built in the user portable terminal 3.
- the user portable terminal 3 processes the ID pattern fetched from the camera by the user application downloaded from the server 5 of the database operation company.
- the user can also input a password from a user portable terminal owned by the user.
- the process is also performed by the user application.
- the membership number of the net card, the credit card number selected for settlement, and the trader terminal number to be settled are servers as settlement information. It is sent to 5 and accumulated and recorded as a history on the server.
- the vendor terminal 6 takes in the sales amount from the POS register 7 to which sales of goods are input, presents the sales amount to the user who is the customer, and is accepted, and then borrows the net card from the user Enter As a result, the membership number and the trader terminal number are transmitted to the server 5 as a settlement request.
- the server 5 transmits the settlement credit card information if the member number included in the settlement request received from the trader terminal 6 and the trader terminal number match the settlement information previously received and recorded from the user portable terminal 3 and match. And get payment approval from the credit company. If the settlement is approved, the settlement transaction will be concluded.
- the settlement data is accumulated as a settlement record in the user settlement history data section 8 and the vendor settlement history data section 9 of the server 5, respectively.
- the settlement information does not have to include the vendor terminal number, and in this case, the collation is performed only with the member number.
- FIG. 2 is a diagram showing an example of the configuration of the ID pattern 2.
- the black part of the ID pattern is made of an electrode such as metal.
- the ID pattern of FIG. 2 constitutes a bit pattern consisting of 8 bits vertically and 64 bits horizontally 8 bits.
- the mark M at the lower left is an origin mark clearly indicating the coordinate origin of the ID pattern. This origin mark M can be used for alignment of the ID pattern at the time of shooting with a camera.
- the configuration of the ID pattern is not limited to the format shown in FIG. 2, but may be an arbitrary pattern such as a QR code or a bar code as long as it constitutes a reproducible bit arrangement.
- FIG. 3 shows an example of a specific ID pattern 2.
- the eight horizontal lines in the Y row in FIG. 2 remain as they are, where the fuse marks on the upper and lower sides of the Y row are “1” and where they are not “0” It is.
- an ID pattern consisting of 64 bits in total of 8 bits in the X direction and 8 bits in the Y direction can be constructed.
- eight horizontal lines of the Y axis having four bits each at the top and bottom are always present, so pattern matching is performed by performing alignment based on these eight horizontal lines. can do.
- FIG. 4 is a diagram for explaining the relation between the ID pattern and the authentication ID.
- FIG. 4 shows an ID pattern similar to that of FIG. 2, in which eight horizontal lines and four bits are arranged above and below each horizontal line.
- the code of ABC ... H is given sequentially from left to right to the 8 bits arranged in the horizontal direction in FIG. 4, and the code from ABC to H is arranged in the vertical direction from the top to the bottom.
- the number of 8 is given. Therefore, it is possible to specify an address of a bit pattern consisting of 64 bits by the code and the number. That is, as shown in FIG. 4, A1 indicates the top left bit and H5 indicates the fifth bit from the top at the right end. It can be understood that C7, E3... Similarly designate the address of a specific bit in the bit pattern.
- the authentication ID is represented by, for example, a four-digit number.
- the four numbers of each digit are each represented by a 4-bit code. Therefore, for example, since the number "5" is (0101), in the ID pattern shown in FIG. 3, specifying one ID map address by specifying an ID map address as (A1, A4, D1, E4) Can. Similarly, it can be converted into a 4-digit number to obtain an authentication ID.
- the ID pattern is given to each user in the form of a pattern that forms at random bits, and the authentication ID is extracted from the ID pattern of this random bit configuration by the ID map address.
- FIG. 5 is a flow chart showing a net card issuance process in the database operation company. This flow chart will be described with reference to FIG.
- a member number is issued and registered in the server 5 in step 11
- a user application ID is issued and registered in the server 5 in step 12.
- an authentication ID for authenticating the user is registered in the server 5.
- an ID pattern, ID bit data in which the ID pattern is mapped and recorded, and an ID map address for extracting an authentication ID from the bit data are generated and registered in the server 5.
- the ID bit data may be not in the form of a map but in the form of a bit data string as long as the bit position can be specified by the ID map address.
- step 15 a net credit number is issued and registered in the server.
- step 16 when it is desired to selectively use either the net card or the existing usage card, credit card information including the card number and the personal identification number of one or more existing usage cards is registered in the server 5.
- step S17 the individual identification number assigned to the user portable terminal is registered in the server 5 as a user terminal number for identifying the user portable terminal, and a password for personal authentication is similarly registered in the server.
- a net card on which the membership number, ID pattern, ID bit data, net credit number, existing usage card number and the like are printed is newly issued to the member.
- the above registration information is associated with each other and registered in the server database.
- the user application is software downloaded to the user portable terminal and used by the user to perform authentication and settlement using the portable terminal, and includes an application ID, ID bit data, and an ID map address. This application is identified by the application ID and read out.
- the user application ID is a code for specifying the user application.
- the user application is managed by the application creation data unit 10 of the server 5 for each user along with the membership number, user application ID, authentication ID, ID pattern, ID bit data, and ID map address.
- the newly issued net card has an ID pattern, a member number, and a credit number, but no information such as an authentication ID, an ID map address, an application ID, and a code number of the credit card is held.
- the member number may be posted in a barcode format or the like.
- an application for additional registration of the existing usage card is applied to the database operating company using the user portable terminal. Since the form of additional registration is returned from the server of the operating company, the user enters credit card information including the user's membership number, terminal number, password, card number of the usage card to be added additionally, and PIN number in this form. You can make additional registration by filling in and replying.
- the user number indicates a member number or a user terminal number.
- the seller may not only set up a store and conduct business transactions, but also may want to open a store at some event venue to perform business transactions using a mobile terminal. In such a case, it is preferable that the shopkeeper be able to conduct commerce with the user using a portable smartphone or personal computer. In view of this point, the seller can issue a trader card as a trader member with extremely simple procedure.
- the trader's terminal number corresponding to the trader's member number and the individual identification number of the trader's terminal is registered in the server 5 and registers other Bibliographical matters. This allows the merchant to initiate a transaction, but usually a merchant card is issued with a merchant membership number.
- the trader number indicates a trader membership number or a trader terminal number.
- a user who holds a net card needs to download an application for a user from a net card issuing company in advance using a smart phone or a personal computer that he owns in order to conduct a commercial transaction using the net card.
- FIG. 6 is a flow chart showing the procedure of downloading the application.
- the user of the net card starts the operation of downloading the application relating to the net card with the user portable terminal owned by the user.
- step 22 the application site of the net card database operating company is accessed, and in step 23, the user application is selected from the application list transmitted from the operating company.
- step 24 the download web page is returned and displayed.
- the member number and / or the terminal number of the user portable terminal are input to the web page and transmitted.
- step 25 the server 5 on the database operation company side receives the member number and / or user terminal number transmitted from the user, selects the application ID dedicated to the member corresponding to the member number from the database, and in step 26 Perform personal authentication. If the authentication is established, in step 27, the user application corresponding to the membership number is downloaded to the user portable terminal using the user terminal number.
- the application for user includes an application ID, an ID map address, a program for converting into an authentication ID, and a program for making a settlement transaction with a seller.
- the user application may include ID bit data and an authentication ID. When ID bit data is included, authentication is performed with a password without using an ID pattern. When an authentication ID is included, authentication is performed by the user portable terminal itself without requesting the server for authentication.
- step 28 the user registers the downloaded application in the user portable terminal, creates and displays an icon of the application in step 29, and ends the download of the application in step 30.
- the server 5 executes downloading of the user application only once, and can not execute execution of the second application or later unless special procedures are performed.
- step 26 If it is determined in step 26 that the authentication is not established, the user portable terminal is notified in step 31 that the application can not be downloaded because the membership number is inconsistent. The user can repeat the operation of step 24 again.
- Step 24 inputs and transmits a vendor membership number and / or a vendor terminal number to the download web page, and the download of the vendor application is executed based on the flow of FIG. Ru.
- the vendor application is software used for payment commerce with a user.
- FIG. 6 is a flow diagram showing a procedure for converting an authentication ID into an authentication ID and performing authentication.
- step 40 when the authentication based on the ID pattern is entered from step 40 and the icon mark of the authentication application for the smartphone is touched in step 41, the web page screen is displayed in step 42, and the camera attached to the smartphone is activated.
- step 43 a frame for storing the ID pattern is displayed on the web page.
- step 44 the camera position is adjusted and shooting is performed so that the ID pattern is contained in the frame.
- the photographed ID pattern is automatically taken into the memory in analog form at step 45.
- a step 46 authenticates whether the incorporated analog ID pattern has been successfully incorporated. This authentication process is to check whether the ID pattern captured by the camera is within the frame and has an appropriate size and resolution. If it is determined in step 47 that the photographing process is not normal, the process returns to step 43 to perform camera photographing of the ID pattern again.
- step 47 64-bit data is taken in from analog ID pattern in step 48, converted into 64-bit ID bit data in map format, and ID bit data is recorded in the memory in step 49. . Since the recorded ID bit data can be made to include the ID bit data corresponding to the ID pattern when the user application is downloaded, the read ID bit data is compared with the downloaded data. can do. After the ID pattern is recorded as ID bit data, the image of the ID pattern is immediately erased in step 50, and security is improved by not storing it as a picture.
- step 51 the ID bit data in the memory recorded in step 49 and the ID map address downloaded in advance are read out, and in step 52, 16-bit data is extracted by referring to the ID bit data based on the ID map address. And convert it to an authentication ID consisting of four digits.
- step 54 the authentication ID obtained by the conversion and the authentication ID taken in advance together with the application are collated and authenticated. The authentication result is determined in step 55.
- authentication ID which consists of a 4-digit number was taken as an example here, it may be not only this but authentication ID which consists of a 10-digit number and a sign, for example.
- step 56 the server 5 of the database operation company is notified of the establishment of the authentication together with the member number. It is set so that the commerce by the credit card concerned can not be performed after the authentication by the net card is established. As a result, the server is in a standby state where commerce can be performed with a normal credit card. In the case of a transaction at a storefront or a transaction at a netbanking or a netshop, it is possible to start a commerce using the used card after inputting the membership number of the net card and confirming that the server has been authenticated.
- step 55 If it is determined in step 55 that authentication is not possible, the process returns to step 43, and the operation can be started again from shooting of the ID pattern.
- step 73 password authentication is entered, and at step 74 a password is entered. Then, in step 51, the application reads the ID bit data and the ID map address in response to the password input.
- steps 52 to 56 operate in the same manner as described above.
- step 51 the ID bit data is read out from the ID bit data stored in the memory in step 49, so that authentication by password can not be performed unless authentication by ID pattern is performed in advance. You can also. By doing this, the ID map address extracted using the codeable ID pattern composed of the image is registered in the memory, and authentication can be performed with the password thereafter, thereby improving security and user convenience. You may make it satisfy sex.
- authentication by password if ID bit data is included in the user application and downloaded, authentication by password can be performed without performing authentication by the ID pattern at all, so the user can start from the beginning Password authentication can be selected.
- FIG. 7 an example in which the authentication is performed in the user portable terminal has been described, but in FIG. 8, an example in which the server 5 performs authentication will be described.
- the same reference numerals as in FIG. 7 denote steps for executing the same functions.
- step 40 an operation of capturing an ID pattern with a camera and performing authentication is introduced from step 40.
- step 41 to step 50 the operations from step 41 to step 50 are the same as in FIG.
- 16 bit data is extracted with reference to the ID bit data recorded at step 49 or the ID bit data downloaded together with the application based on the ID map address downloaded in advance, and at step 52 the four digits are extracted. Convert to an authentication ID consisting of This conversion is performed in the manner described on the basis of FIG. At step 53, the converted authentication ID and membership number are sent to the server of the database operation company.
- the server receives the authentication ID and the member number transmitted from the portable terminal in step 61, and in step 62 checks the received information against the information recorded in the server database to perform an authentication operation. Next, at step 63, the authentication result is transmitted to the portable terminal of the user.
- the portable terminal receives the authentication result in step 65 and checks in step 66 whether the authentication has been established. If the authentication is not established, that effect is displayed in step 67, and retry is performed from step 41. If it is determined in step 66 that the authentication result is established, then in step 68, an input form screen is displayed on the portable terminal. The user listens to the vendor membership number from the seller and inputs it into the input form of the mobile terminal. Step 68 is significant in the sense that the user authorizes a particular merchant to make a credit payment, but in practice it is often better to omit this step 68 for the convenience of the transaction.
- step 69 the user displays a credit card selection screen and selects a credit card to be used for payment.
- step 70 the payment credit card information selected for payment, the trader membership number and the user membership number are sent to the server.
- the input of a trader number can also be omitted.
- the server receives the information in step 72 and stores it in the database.
- the server is in a standby state waiting for the member number and the trader terminal number to be input from the distributor who holds the trader member number. This enables a secure transaction to be achieved between the user and the merchant.
- the above has described an authentication method in which an ID pattern is imaged and converted into ID bit data, but it is also inconvenient to shoot a camera every time you shop, which is inconvenient. Therefore, once the camera is photographed and converted to ID bit data, the ID bit data is stored in the memory of the user portable terminal, and thereafter, a password is input without photographing the ID pattern. It is convenient to be able to read out ID bit data automatically only by Also, ID bit data can be downloaded together with the application and stored in memory. Since this ID bit data is unique to the portable terminal of the user and does not transmit through the communication line, it is extremely unlikely that it will be abused by others.
- Step 73 is an entrance in the case of inputting and authenticating with this password.
- the password is input in step 74, the ID bit data and the ID map address are automatically read by the operation of the user application, and the process proceeds to step 51 described above.
- authentication is performed through the process described above.
- the password can be effectively used only by the user portable terminal that has downloaded the user application, and the other application can not hold the same application, so the password is invalid. There is no fear of misuse by others.
- the camera input may be replaced by a net card.
- the user enters the user membership number in step 75 based on the seller-provided purchased product and the agreement on the price thereof, the seller who borrowed the net card from the user or the user himself / herself enters the user membership number.
- the member number may be input by key input or input by a card reader.
- an input form is returned, and a procedure for entering and transmitting a membership number and other necessary items is performed.
- step 76 the user membership number and the trade membership number are sent to the server.
- step 77 the server collates the user membership number and the trader membership number received from the user portable terminal and the trader terminal.
- step 68 collation of the trader member number is omitted.
- step 79 collation of the trader member number is transmitted to the distributor side, and the distributor receives it at step 79 and confirms that credit settlement can not be made.
- payment credit card information is sent to the seller at step 80.
- the seller side receives the settlement credit card information at step 81, fetches the billed amount from the POS register at step 82, transmits the credit card number and the billed amount to the credit company at step 83, and requests settlement approval.
- the result of the settlement approval request is checked at step 84, and if it is judged NO, that effect is sent to the server.
- the server receives the payment impossibility notification at step 91, performs processing for impossibility of payment at step 92, and notifies the user portable terminal of that. Then, in step 93, the user portable terminal receives the payment impossible notification. As a result, the user can make a cash transaction or retry to use another credit card.
- the information that payment is impossible may be recorded in the user payment history data part and the vendor payment history data part.
- step 84 If the settlement approval is obtained in step 84, the settlement is requested to the credit company in step 85 and the credit sales table is printed out, and the credit processing information is transmitted to the server in step 86.
- step 87 the server receives credit processing information, performs credit payment processing, and transmits a message to that effect to the user portable terminal.
- the user portable terminal receives the notification of the credit settlement in step 88, and displays that effect. This allows the user to confirm that the payment has been successfully completed.
- the server After completion of the credit settlement in step 87, the server accumulates and records data of credit settlement information in the user settlement history data section 8 and the trader settlement history data section 9 in step 89.
- the user or the dealer accesses the server of the database operation company using his or her own terminal, reads the history information of the user settlement history data unit 8 or the dealer settlement history data unit 9 under a predetermined procedure, and The confirmation of the transaction can be made.
- the net card carried by the user and the user portable terminal function as a pair, even if the net card is lost or stolen, another terminal is However, as long as the net card and the user portable terminal can not be stolen together, unauthorized use can be prevented and high security can be maintained.
- the user application downloaded to the user portable terminal is assigned the user application ID corresponding to one net card, it can be used only for the corresponding net card.
- the user application can be downloaded only to the user portable terminal having a terminal number unique to the portable terminal, and is not downloaded to other portable terminals. Therefore, unauthorized download of the user application is not possible, and high security is maintained.
- conversion from ID bit data to authentication ID can not be performed unless there is an application.
- the password input to the user portable terminal and the authentication ID converted from the ID bit data are different data, they are not used illegally even if they are leaked from the user portable terminal or server.
- the ID pattern set at random, the authentication ID, and the ID map address for converting the ID pattern to the authentication ID are created at the time of net card issuance, and can be used only by the user portable terminal as a united three party Because they are set as such, they can not be used for other mobile terminals and other applications. Therefore, a high degree of security can be maintained.
- the input to the user portable terminal is an ID pattern or password, and does not input a credit number, and the seller can use only the credit number sent from the server, and the seller does not enter a credit number. Because there is no need to enter it, there is very little risk that the credit number will be phishing.
- the configuration that can carry out the Internet transaction that is normally performed at present can be taken. Therefore, authentication in the security check according to the present invention If it is not possible to start a normal Internet transaction, it can be configured. As a result, since it is possible to conduct ordinary Internet transactions without the third party being aware of the existence of the first security barrier according to the present invention, the authentication ID and password can be given to others through phishing and skimming in the transaction process. Even if stolen, no one else can make unauthorized Internet transactions because they can not go through the first security barrier.
- the trader terminal may be a terminal connected to the Internet.
- various modifications can be made without departing from the spirit of the present invention.
- the present invention can also be used in an internet shop or internet banking.
Abstract
Description
クレジットカードや銀行カード等の一般の利用カードを用いてインターネットを介して認証および決済を行う場合、カード番号とパスワードをキー入力して個人認証を行っているため、それらキー入力された番号や記号がフィッシングされたり、販売業者に保存されてしまう場合もある。一旦カード番号やパスワードが盗まれると、キー入力のみで容易に不正使用することを許容してしまうという問題がある。
しかも、販売業者においては、専用回線や専用端末を設置することなく、一般のスマートフォンまたはパソコンに販売業者用のアプリをダウンロードしておき、ユーザのネットカードを利用して認証後の決済を実行できるようにしている。
以下、図面に基づき本発明を説明する。
従来の第2暗証番号を付加して個人認証を行う方法では、利用カードは別体の乱数表を表示したカードが発行されているが、本発明では、第2暗証番号による認証に替えて、本発明に係るIDパターンによるセキュリティの高い認証を導入することができる。
次いで、ステップ14で、IDパターンと、そのIDパターンをマップ化して記録したIDビットデータと、ビットデータから認証IDを抽出するためのIDマップアドレスとを生成しサーバ5に登録する。なお、IDビットデータは、IDマップアドレスでビット位置を指定することができるものであれば、マップ形式ではなくてもビットデータ列形式でもよい。
なお、ユーザ番号は会員番号またはユーザ端末番号を指す。
図6において、ステップ21で、ネットカードのユーザは自ら所有するユーザ携帯端末でネットカードに係るアプリのダウンロードの操作を開始する。先ず、ステップ22でネットカードのデータベース運用会社のアプリサイトにアクセスし、ステップ23で運用会社から送信されたアプリリストからユーザ用アプリを選択する。その結果、ステップ24でダウンロードウェブページが返送され表示される。そのウェブページに会員番号および/またはユーザ携帯端末の端末番号を入力し送信する。
IDパターンがIDビットデータとして記録された後、直ちにステップ50でIDパターンの映像は消去され、写真として保存されないようにしてセキュリティの向上を図っている。
図7において、ステップ73からパスワードによる認証に入り、ステップ74でパスワードを入力する。そして、ステップ51に進み、アプリはパスワード入力に応答してIDビットデータとIDマップアドレスを読み出す。以下、ステップ52からステップ56までは前述と同じ動作をする。
2 IDパターン
3 ユーザ携帯端末
4 カメラ
5 サーバ
6 業者端末
8 ユーザ決済履歴データ部
9 業者決済履歴データ部
10 アプリ作成管理データ部
Claims (22)
- 運用会社のサーバ(5)からダウンロードされた、認証および決済を行うプログラムと少なくともIDマップアドレスとユーザ番号を含むアプリ、
ID情報を入力する第1の入力装置(40−50,73,74)、
前記アプリによって前記ID情報を認証IDに変換する変換装置(51,52)
前記アプリに基づいて前記認証IDに基づき認証する認証装置(52,53,61−63,65,66)、
ネットカードに掲載された前記ユーザ番号とクレジット情報を前記サーバに送信する第1の送信装置(70)、
前記ユーザ番号を入力する第2の入力装置(75)、
前記ユーザ番号と運用会社に登録された業者番号を前記サーバに送信する第2の送信装置(76)、
前記第1と第2の送信装置から受信した前記ユーザ番号を照合し一致したとき、前記クレジット情報を業者端末に送信する第3の送信装置(77,78,80)、および
前記クレジット情報に基づきユーザに請求する金額を決済処理する決済装置、
を有し、
前記第1の入力装置、変換装置、認証装置および第1の送信装置を有するユーザ携帯端末(3)、
前記第3の送信装置を有する前記サーバ(5)、および
前記第2の入力装置、第2の送信装置および決済装置を有する前記業者端末(6)、
を備えた携帯端末を利用して認証および決済を行うシステム。 - 請求項1に記載のシステムにおいて、
前記第1の入力装置は、前記運用会社からユーザに発行されたネットカードに印刷されたIDパターンを撮影する前記ユーザ携帯端末に備え付けのカメラである前記システム。 - 請求項1に記載のシステムにおいて、
前記第1の入力装置は、所定のパスワードを入力するための前記ユーザ携帯端末の符号入力装置(74)である前記システム。 - 請求項2に記載のシステムにおいて、
前記第1の入力装置は、更に、所定のパスワードを入力するための前記ユーザ携帯端末の符号入力装置を備え、前記カメラと前記符号入力装置の一方を選択できるようにした前記システム。 - 請求項1に記載のシステムにおいて、
前記変換装置は、前記アプリによって、前記ID情報の入力に応答してIDビットデータとIDマップアドレスを読み出し、前記IDマップアドレスに基づいて前記IDビットデータを参照して前記認証IDに変換する前記システム。 - 請求項1に記載のシステムにおいて、
前記ダウンロードされたアプリには予めサーバに登録された当該ユーザの認証IDが含まれており、
前記認証装置は、前記変換装置で変換された認証IDを前記アプリに含まれた認証IDと照合して認証を実行する前記システム。 - 請求項1に記載のシステムにおいて、
前記認証装置は、前記変換装置で変換された認証IDと前記ユーザ番号を前記サーバに送信し、該サーバにおいて受信した認証IDとユーザ番号を該サーバに登録されている認証IDとユーザ番号と照合して一致したとき認証成立をユーザ携帯端末が返信するようにした前記システム。 - 請求項1に記載のシステムにおいて、
前記第3の送信装置におけるクレジット情報は、予め設定され前記ネットカードに掲載された複数のクレジット情報の内からユーザによって選択された1つのクレジット情報である。 - 請求項1に記載のシステムにおいて、
前記決済装置は、決済処理が完了したときその旨をサーバに送信する決済完了通知装置(86)を有し、
前記サーバは、更に、前記決済完了通知装置からの決済完了通知を受信し、決済情報として蓄積記録する決済履歴データ部(8、9)を有する前記システム。 - 請求項9に記載のシステムにおいて、
前記決済履歴データ部は、前記決済情報をユーザ決済履歴データ部(8)と業者決済履歴データ部(9)にそれぞれ記録する記録装置(89)を有する前記システム。 - 請求項10に記載のシステムにおいて、
前記ユーザ携帯端末は前記ユーザ決済履歴データ部にアクセスして決済履歴を閲覧できるようにした前記システム。 - 請求項10に記載のシステムにおいて、
前記業者端末は前記業者決済履歴データ部にアクセスして決済履歴を閲覧できるようにした前記システム。 - 請求項9に記載のシステムにおいて、
前記サーバは前記業者端末から前記決済完了通知を受け取ったとき前記ユーザ携帯端末にその旨を通知する通知装置(87)を有し、前記ユーザ携帯端末は前記決済完了通知を受信したときその旨を該ユーザ携帯端末に表示する決済表示装置(88)を有する前記システム。 - 請求項1に記載のシステムにおいて、
前記ユーザ携帯端末はスマートフォンである前記システム。 - 請求項1に記載のシステムにおいて、
前記業者端末はスマートフォンまたはパソコンである前記システム。 - 請求項1に記載のシステムにおいて、
前記決済装置は前記認証装置による認証が成立した後でなければ実行できないようにした前記システム。 - ユーザの所有する携帯端末において、
運用業者からダウンロードされた、認証を実行するプログラムと、IDビットデータと、IDビットデータの複数のビット位置をアドレスするIDマップアドレスと、を含むアプリ、および
パスワードを入力する第1の入力装置、
を備え、前記アプリは、
前記第1の入力装置からのパスワードの入力に応答して、前記IDマップアドレスに基づいて前記IDビットデータから認証IDに変換するようにした認証装置。 - 請求項17に記載の認証装置において、
前記運用業者が前記ユーザに発行したネットカードに掲載されたIDパターンを撮像するカメラ(4)を含む第2の入力装置、
前記第2の入力装置で読み取ったIDパターンからIDビットデータを取り込み記憶するメモリ(48、49)、
前記アプリによって前記メモリから読み出された前記IDビットデータから前記IDマップアドレスに基づいて認証IDに変換するようにした認証装置であって、前記第1と第2の入力変換装置の一方を選択して使用することができるようにした認証装置 - ユーザと販売業者との間で商品とその価格に合意が成立した場合、
ユーザの所持するユーザ携帯端末は、入力されたID情報を認証IDに変換し、この認証IDに基づいて認証が成立したとき、ユーザ番号とクレジット情報をサーバに送信し、
前記サーバは、前記ユーザ携帯端末からの前記ユーザ番号とクレジット情報を該サーバのメモリに保存し待機状態にし、
前記業者端末は、前記ユーザ番号が入力されたとき、該ユーザ番号と前記サーバに登録された当該業者番号を前記サーバに送信し、
前記サーバは、前記業者端末からの前記ユーザ番号と業者番号および前記メモリに保存された記前ユーザ番号と業者番号を照合し一致すれば、前記クレジット情報を前記業者端末に送信し、
前記業者端末は、前記サーバからのクレジット情報に基づき決済処理をし、前記サーバに決済完了の通知をし、および
前記サーバは、前記業者端末からの決済処理完了通知に基づき決済履歴データとして決済履歴データ部に記録する、
携帯端末を利用して認証および決済を行う方法。 - ID情報を入力する入力装置、
該ID情報に基づき認証IDを発生する変換装置、
該認証IDに基づき認証のための動作を実行する認証装置、および
認証が成立したとき、運用会社のサーバに登録されたユーザ番号と、決済に利用するクレジット情報を前記サーバに送信する送信装置、
を備えたユーザ携帯端末。 - 認証に用いるIDビットデータと認証IDとユーザ番号とクレジット情報を含むユーザ情報、および、販売業者の業者番号を含む業者情報を登録したデータベース、
ユーザ携帯端末からユーザ番号と認証IDを受信したとき、当該ユーザの個人認証を実行する認証装置、
個人認証の結果を前記ユーザ携帯端末に送信する第1の送信装置、
前記認証をしたユーザ携帯端末からユーザ番号とクレジット情報を受信したとき、それらをメモリに一時記憶し待機状態にするメモリ、
業者端末から当該ユーザ番号と業者番号の送信を受けたとき、前記ユーザ携帯端末から受信したユーザ番号を照合し、一致したならば、前記クレジット情報を前記業者端末に送信する第2の送信装置、および
前記業者端末から決済完了通知を受けたとき、決済完了履歴データとして登録する決済履歴データ部、
を備えた運用会社のサーバ。 - 業者とユーザとの間で商取引について合意された後、運用会社のサーバに登録されたユーザ番号を入力する入力装置、
前記ユーザ番号と運用会社のサーバに登録された業者番号をサーバに送信する第1の送信装置、
該サーバから当該ユーザのクレジット情報を受信したとき、クレジット決済を実行する決済処理装置、および
該決済が完了したときは、決済完了通知を前記サーバに送信する第2の送信装置、
を備えたクレジット決済端末。
Priority Applications (13)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13787359.2A EP2782034A4 (en) | 2012-05-10 | 2013-05-02 | METHOD AND SYSTEM FOR AUTHENTICATION AND PAYMENT VIA A PORTABLE DEVICE |
US14/368,777 US20140358790A1 (en) | 2012-05-10 | 2013-05-02 | Method and system for authentication and payment by using portable terminal |
AU2013260541A AU2013260541B2 (en) | 2012-05-10 | 2013-05-02 | Method and system for authentication and payment by using portable terminal |
RU2014145133/08A RU2568782C1 (ru) | 2012-05-10 | 2013-05-02 | Способ и система для аутентификации и расчета с использованием мобильного терминала |
SG11201407313VA SG11201407313VA (en) | 2012-05-10 | 2013-05-02 | Method and system for authentication and payment by using portable terminal |
IN10376DEN2014 IN2014DN10376A (ja) | 2012-05-10 | 2013-05-02 | |
CA2872847A CA2872847A1 (en) | 2012-05-10 | 2013-05-02 | Method and system for authentication and settlement using mobile terminal |
KR1020147034016A KR101554218B1 (ko) | 2012-05-10 | 2013-05-02 | 휴대 단말을 이용하여 인증 및 결제를 행하는 방법 및 시스템 |
JP2013550693A JP5519876B2 (ja) | 2012-05-10 | 2013-05-02 | 携帯端末を利用して認証および決済を行う方法およびシステム |
CN201380024535.6A CN104272314B (zh) | 2012-05-10 | 2013-05-02 | 利用移动终端进行认证和结算的方法以及系统 |
BR112014027778A BR112014027778A2 (pt) | 2012-05-10 | 2013-05-02 | sistema de autenticação e pagamento através de terminal móvel, dispositivo de autenticação, método de autenticação e pagamento, terminal móvel e servidor de uma empresa de gerenciamento |
HK15106433.5A HK1206117A1 (en) | 2012-05-10 | 2015-07-06 | Method and system for authentication and payment by using portable terminal |
US15/269,844 US20170011402A1 (en) | 2012-05-10 | 2016-09-19 | Method and system for authentication and payment by using portable terminal |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPPCT/JP2012/062014 | 2012-05-10 | ||
PCT/JP2012/062014 WO2013168261A1 (ja) | 2012-05-10 | 2012-05-10 | Idパターンのカメラ撮影による認証方法およびシステム |
PCT/JP2013/050500 WO2014106906A1 (ja) | 2013-01-07 | 2013-01-07 | Idパターンを利用した認証方法およびシステム |
JPPCT/JP2013/050500 | 2013-01-07 | ||
JP2013-98843 | 2013-04-18 | ||
JP2013098843 | 2013-04-18 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/368,777 A-371-Of-International US20140358790A1 (en) | 2012-05-10 | 2013-05-02 | Method and system for authentication and payment by using portable terminal |
US15/269,844 Continuation US20170011402A1 (en) | 2012-05-10 | 2016-09-19 | Method and system for authentication and payment by using portable terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013168815A1 true WO2013168815A1 (ja) | 2013-11-14 |
Family
ID=49550846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/063234 WO2013168815A1 (ja) | 2012-05-10 | 2013-05-02 | 携帯端末を利用して認証および決済を行う方法およびシステム |
Country Status (13)
Country | Link |
---|---|
US (2) | US20140358790A1 (ja) |
EP (1) | EP2782034A4 (ja) |
JP (1) | JP5519876B2 (ja) |
KR (1) | KR101554218B1 (ja) |
CN (1) | CN104272314B (ja) |
AU (1) | AU2013260541B2 (ja) |
BR (1) | BR112014027778A2 (ja) |
CA (1) | CA2872847A1 (ja) |
HK (1) | HK1206117A1 (ja) |
IN (1) | IN2014DN10376A (ja) |
RU (1) | RU2568782C1 (ja) |
SG (1) | SG11201407313VA (ja) |
WO (1) | WO2013168815A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015095057A (ja) * | 2013-11-11 | 2015-05-18 | 富士通株式会社 | 情報管理サーバ、端末および情報管理システム |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105389485B (zh) * | 2015-10-30 | 2018-07-31 | 上海斐讯数据通信技术有限公司 | 一种具有触摸显示屏的电子设备的密码管理方法和系统 |
WO2019195676A1 (en) * | 2018-04-05 | 2019-10-10 | Visa International Service Association | Smart device system and method of use |
US11210676B2 (en) * | 2019-07-01 | 2021-12-28 | Capital One Services, Llc | System and method for augmented reality display of account information |
CN113536279B (zh) * | 2021-07-20 | 2023-07-21 | 北京奇艺世纪科技有限公司 | 一种用户权限管理方法、装置、电子设备及存储介质 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3092012B2 (ja) | 1993-11-15 | 2000-09-25 | メイ ジョージ | キャパシティブ・データカード・システム |
US6196465B1 (en) | 1996-02-02 | 2001-03-06 | Tokyo Mechatoronics Co., Ltd. | Capacitive data card and reader thereof |
JP2002099858A (ja) * | 2000-09-26 | 2002-04-05 | Toshiba Tec Corp | 決済システム及び決済装置並びに決済方法 |
JP2004054897A (ja) * | 2002-05-29 | 2004-02-19 | Toshiba Tec Corp | カード認証サーバ装置及びカード認証プログラム |
JP2005128899A (ja) * | 2003-10-24 | 2005-05-19 | Nec Corp | 電子商取引システムおよび電子商取引方法 |
JP2005182338A (ja) * | 2003-12-18 | 2005-07-07 | Hitachi Ltd | 携帯電話を利用したクレジットカード認証システム |
JP2008129970A (ja) * | 2006-11-24 | 2008-06-05 | Mitsubishi Ufj Nicos Co Ltd | カード認証システム |
JP2009187198A (ja) | 2008-02-05 | 2009-08-20 | Medibic:Kk | 遺伝子診断サービスにおける情報管理システム |
JP2010165188A (ja) * | 2009-01-15 | 2010-07-29 | Sony Corp | 利用者認証システム、利用者認証装置、利用者認証方法、コンピュータプログラム |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5945653A (en) * | 1997-06-26 | 1999-08-31 | Walker Asset Management Limited Partnership | System and method for establishing and executing functions to affect credit card accounts and transactions |
JP3396680B2 (ja) * | 2001-02-26 | 2003-04-14 | バイオニクス株式会社 | 生体認証装置 |
JP3632767B2 (ja) * | 2001-09-03 | 2005-03-23 | 株式会社エイティング | 個人認証方法 |
US7606560B2 (en) * | 2002-08-08 | 2009-10-20 | Fujitsu Limited | Authentication services using mobile device |
US7110792B2 (en) * | 2003-05-19 | 2006-09-19 | Einar Rosenberg | Apparatus and method for increased security of wireless transactions |
KR100930457B1 (ko) * | 2004-08-25 | 2009-12-08 | 에스케이 텔레콤주식회사 | 이동통신단말을 이용한 인증 및 결제 시스템과 방법 |
EP2201543A1 (en) * | 2007-09-21 | 2010-06-30 | Wireless Dynamics, Inc. | Wireless smart card and integrated personal area network, near field communication and contactless payment system |
US20090222383A1 (en) * | 2008-03-03 | 2009-09-03 | Broadcom Corporation | Secure Financial Reader Architecture |
US9269010B2 (en) * | 2008-07-14 | 2016-02-23 | Jumio Inc. | Mobile phone payment system using integrated camera credit card reader |
US10380573B2 (en) * | 2008-09-30 | 2019-08-13 | Apple Inc. | Peer-to-peer financial transaction devices and methods |
US8483448B2 (en) * | 2009-11-17 | 2013-07-09 | Scanable, Inc. | Electronic sales method |
US20110161232A1 (en) * | 2009-12-28 | 2011-06-30 | Brown Kerry D | Virtualization of authentication token for secure applications |
JP2012008816A (ja) * | 2010-06-25 | 2012-01-12 | Univ Of Aizu | 認証カード、カード認証端末、カード認証サーバおよびカード認証システム |
JP5977256B2 (ja) * | 2011-01-14 | 2016-08-24 | フラッシュ・シーツ・エルエルシーFlash Seats,LLC | モバイルアプリケーションのバーコード識別方法およびそのシステム |
-
2013
- 2013-05-02 CA CA2872847A patent/CA2872847A1/en not_active Abandoned
- 2013-05-02 KR KR1020147034016A patent/KR101554218B1/ko not_active IP Right Cessation
- 2013-05-02 JP JP2013550693A patent/JP5519876B2/ja active Active
- 2013-05-02 US US14/368,777 patent/US20140358790A1/en not_active Abandoned
- 2013-05-02 SG SG11201407313VA patent/SG11201407313VA/en unknown
- 2013-05-02 BR BR112014027778A patent/BR112014027778A2/pt not_active IP Right Cessation
- 2013-05-02 RU RU2014145133/08A patent/RU2568782C1/ru active
- 2013-05-02 CN CN201380024535.6A patent/CN104272314B/zh not_active Expired - Fee Related
- 2013-05-02 AU AU2013260541A patent/AU2013260541B2/en not_active Ceased
- 2013-05-02 EP EP13787359.2A patent/EP2782034A4/en not_active Ceased
- 2013-05-02 IN IN10376DEN2014 patent/IN2014DN10376A/en unknown
- 2013-05-02 WO PCT/JP2013/063234 patent/WO2013168815A1/ja active Application Filing
-
2015
- 2015-07-06 HK HK15106433.5A patent/HK1206117A1/xx unknown
-
2016
- 2016-09-19 US US15/269,844 patent/US20170011402A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3092012B2 (ja) | 1993-11-15 | 2000-09-25 | メイ ジョージ | キャパシティブ・データカード・システム |
US6196465B1 (en) | 1996-02-02 | 2001-03-06 | Tokyo Mechatoronics Co., Ltd. | Capacitive data card and reader thereof |
JP2002099858A (ja) * | 2000-09-26 | 2002-04-05 | Toshiba Tec Corp | 決済システム及び決済装置並びに決済方法 |
JP2004054897A (ja) * | 2002-05-29 | 2004-02-19 | Toshiba Tec Corp | カード認証サーバ装置及びカード認証プログラム |
JP2005128899A (ja) * | 2003-10-24 | 2005-05-19 | Nec Corp | 電子商取引システムおよび電子商取引方法 |
JP2005182338A (ja) * | 2003-12-18 | 2005-07-07 | Hitachi Ltd | 携帯電話を利用したクレジットカード認証システム |
JP2008129970A (ja) * | 2006-11-24 | 2008-06-05 | Mitsubishi Ufj Nicos Co Ltd | カード認証システム |
JP2009187198A (ja) | 2008-02-05 | 2009-08-20 | Medibic:Kk | 遺伝子診断サービスにおける情報管理システム |
JP2010165188A (ja) * | 2009-01-15 | 2010-07-29 | Sony Corp | 利用者認証システム、利用者認証装置、利用者認証方法、コンピュータプログラム |
Non-Patent Citations (1)
Title |
---|
See also references of EP2782034A4 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015095057A (ja) * | 2013-11-11 | 2015-05-18 | 富士通株式会社 | 情報管理サーバ、端末および情報管理システム |
Also Published As
Publication number | Publication date |
---|---|
SG11201407313VA (en) | 2014-12-30 |
AU2013260541B2 (en) | 2015-12-17 |
RU2568782C1 (ru) | 2015-11-20 |
JP5519876B2 (ja) | 2014-06-11 |
KR101554218B1 (ko) | 2015-09-18 |
IN2014DN10376A (ja) | 2015-08-14 |
EP2782034A4 (en) | 2015-04-29 |
CN104272314A (zh) | 2015-01-07 |
EP2782034A1 (en) | 2014-09-24 |
KR20150003914A (ko) | 2015-01-09 |
CA2872847A1 (en) | 2013-11-14 |
AU2013260541A1 (en) | 2015-01-22 |
BR112014027778A2 (pt) | 2017-06-27 |
US20170011402A1 (en) | 2017-01-12 |
CN104272314B (zh) | 2017-07-04 |
HK1206117A1 (en) | 2015-12-31 |
JPWO2013168815A1 (ja) | 2016-01-07 |
US20140358790A1 (en) | 2014-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10853809B2 (en) | System and method for conducting secure electronic transactions | |
TWI591554B (zh) | Electronic ticket security system and method | |
CN106688004B (zh) | 一种交易认证方法、装置、移动终端、pos终端及服务器 | |
US20160019528A1 (en) | System and method for payment and settlement using barcode | |
CN104584086A (zh) | Pin验证 | |
JP6743023B2 (ja) | 携帯端末を利用した決済システム | |
CA2955197A1 (en) | Mobile communication device with proximity based communication circuitry | |
CN1672180A (zh) | 用于信用和借记卡交易的系统与方法 | |
US20170011402A1 (en) | Method and system for authentication and payment by using portable terminal | |
JP4193414B2 (ja) | 情報提供システム及び認証媒体に対するアクセス制御方法、並びにコンピュータ・プログラム | |
KR20140145190A (ko) | 전자 거래 방법 | |
CN103493034B (zh) | 通过具有成像系统的移动通信装置进行自动用户认证、在线结账和电子支付 | |
JP2008152338A (ja) | 携帯情報端末を利用したクレジットカード決済方法及びシステム | |
JP2005056157A (ja) | カード認証システム、サーバ装置、端末装置、方法、プログラム、及び記録媒体 | |
JP2020098491A (ja) | 注文決済装置、コンピュータプログラム及び注文決済方法 | |
JP2013186561A (ja) | 決済装置、決済システム、及び決済方法 | |
JP2002032572A (ja) | 認証システムと認証方法及び決済システム | |
US11961081B2 (en) | Payment system using customer's fingerprints | |
JP5202223B2 (ja) | ポイント書き換え方法 | |
JP6964348B2 (ja) | 自動サービス機器の電子決済方法、及び自動サービス機器の電子決済システム | |
JP7190816B2 (ja) | 認証情報生成装置、認証情報生成方法、および認証情報生成プログラム | |
WO2014106906A1 (ja) | Idパターンを利用した認証方法およびシステム | |
JP2023006478A (ja) | 情報処理装置、ユーザー端末、ユーザー媒体、認証方法、被認証方法及びコンピュータープログラム | |
JP2020173623A (ja) | 情報処理端末、情報処理装置、情報処理システム、情報処理方法、及びプログラム | |
JP2021033801A (ja) | サービス管理システム、サービス管理装置、サービス管理方法およびプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 2013550693 Country of ref document: JP Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13787359 Country of ref document: EP Kind code of ref document: A1 |
|
REEP | Request for entry into the european phase |
Ref document number: 2013787359 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013787359 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14368777 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2872847 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20147034016 Country of ref document: KR Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014027778 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2014145133 Country of ref document: RU Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2013260541 Country of ref document: AU Date of ref document: 20130502 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 112014027778 Country of ref document: BR Kind code of ref document: A2 Effective date: 20141106 |