WO2014003684A1 - Terminal et procédé d'authentification - Google Patents

Terminal et procédé d'authentification Download PDF

Info

Publication number
WO2014003684A1
WO2014003684A1 PCT/SG2012/000225 SG2012000225W WO2014003684A1 WO 2014003684 A1 WO2014003684 A1 WO 2014003684A1 SG 2012000225 W SG2012000225 W SG 2012000225W WO 2014003684 A1 WO2014003684 A1 WO 2014003684A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile device
touch screen
payment
encoded
sequence
Prior art date
Application number
PCT/SG2012/000225
Other languages
English (en)
Inventor
Kee Chee WONG
Original Assignee
Wong Kee Chee
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wong Kee Chee filed Critical Wong Kee Chee
Priority to PCT/SG2012/000225 priority Critical patent/WO2014003684A1/fr
Publication of WO2014003684A1 publication Critical patent/WO2014003684A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3274Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device

Definitions

  • the invention relates to a terminal and a method of authentication.
  • the account information may be easily seen and thus stolen by a third party e.g. a sales assistant or a bystander; credit card numbers and verification codes are visibly printed onto credit cards.
  • a third party e.g. a sales assistant or a bystander
  • credit card numbers and verification codes are visibly printed onto credit cards.
  • the magnetic cards are vulnerable to card skimming and the PIN codes may be seen and/or recorded by the third party. Accordingly, these methods of payment are vulnerable to information theft.
  • the invention relates to a method that automatically extracts an encoded identity code from a screen of a mobile device, the encoded identity code being useable for authorizing a transaction and/or performing identity authentication.
  • the identity code is encoded and it may not be possible for third parties to copy and/or extract the information within the encoded identity code. This may thus prevent a subsequent unauthorized use by a third party.
  • a method of authentication as claimed in claim 1. This may have the advantage of allowing for secure authentication that is less vulnerable to spoofing or data eavesdropping. Spoofing occurs when a thief masquerades as an authority e.g. a bank in order to steal payment information.
  • a payment terminal according to claim 15. This may have the advantage of a payment terminal that is capable of securely requesting for payment information from a user, whilst also being capable of reading an encoded response containing the payment information.
  • a method and/or payment terminal according to one or more of the embodiments may have one or more advantages including:
  • Figure 1 is a schematic drawing of a system for transaction payment according to an example embodiment comprising a mobile device, a payment terminal and a server;
  • Figure 2a is a schematic drawing of an outer view of the mobile device of Figure 1 ;
  • Figure 2b is a schematic drawing of an inner view of the mobile device of Figure 1 ;
  • Figure 3 is a schematic drawing of the payment terminal of Figure 1 ;
  • Figure 4 is a flow chart of a method of payment in the system of Figure 1 ;
  • Figure 5 is a schematic drawing of a system for security access control according to another example embodiment, comprising a first security terminal and a second security terminal, and the mobile device and server of Figure .
  • FIG. 1 shows a schematic drawing of the system 100.
  • the system 100 comprises a mobile device 200, a payment terminal 300 and a server 120.
  • Figures 2a and 2b then respectively show schematic drawings of an outer view and an inner view of the mobile device 200 of Figure 1
  • Figure 3 shows a schematic drawing of the payment terminal 300 of Figure 1.
  • the mobile device 200 comprises a touch screen 210 and may be any touch screen enabled device; it may for example be a smart phone, a tablet device, a mobile Internet device (MID), or an IPhoneTM device.
  • the mobile device 200 includes a processor 220 and a storage device 230.
  • the processor is configured to execute a payment application 232 that is stored in the storage device 230.
  • the payment application 232 is an application that is associated with a mode of payment, e.g. a credit card or a bank that is installed onto the mobile device 200.
  • the payment application 232 may be password protected such that the entry of a password is required to execute the payment application 232. This may allow for greater security and may avoid unauthorized monetary transactions. Additionally, upon execution of the payment application 232, the application may ask for transaction parameters e.g. the amount of a monetary transaction, an account number, a credit card number, a checksum, and/or a public key for encryption. Alternatively, these communication parameters may be pre-configured and read off the data storage 230.
  • the payment application 232 When performing a payment for a transaction, the payment application 232 is configured to receive an encoded request from the touch screen 210. The coded request is then decoded and verified by the application 232 in the processor 220. Should the decoded request pass verification, the payment application 232 will proceed to display a response image 212 on the touch screen 210. Alternatively, should the decoded request fail verification, the payment application 232 will ignore the request and await another coded request.
  • the response image 212 that is displayed on the touch screen 2 0 is encoded to contain identification information 234 identifying the payee (i.e. the payment account from which money is to be debited).
  • This identification information 234 may for example include an account identity (e.g. an account number), a checksum, or a public key.
  • the identification information 234 is read from the storage device 230 of the mobile device 200.
  • the payment application 232 While displaying the response image 212, the payment application 232 awaits an acknowledgement or feedback in the form of another sequence of touches from the stylus array 310 on the touch screen 210 i.e. the "acknowledgement" sequence. When the "acknowledgement" sequence is received on the touch screen 210, the payment application 232 discontinues the display of the response image 212.
  • the payment terminal 300 comprises a processor 330, a camera 320 and the stylus array 310 mentioned earlier.
  • the payment terminal 300 is configured to carry out "two-way communications" 140 with the mobile device 200; "downstream” information is transmitted from the payment terminal 300 to the mobile device 200, and "upstream” information is transmitted from the mobile device 200 to the payment terminal 300.
  • An example of “downstream” information is the encoded request from the payment terminal 300 taking the form of a sequence of touches made by the stylus array 310 on the touch screen 210.
  • An example of "upstream” information is the encoded response image 212 that is displayed on the touch screen 210. The displayed response image 212 is captured by the camera 320 to produce a picture 325 of the displayed response image 212.
  • the communication between them is thus bi-directional and described as "two-way".
  • the communication channel for each direction does not have to be of the same type or symmetrical, and it is envisaged that the channels of the "two-way communications" may optionally instead include a wired communications link, or a wireless radio link.
  • the processor 330 is configured to run a terminal software.
  • the terminal software first receives an external signal indicating the carrying out of a transaction. This external signal may for example be generated and sent to the processor 330 when the touch screen 210 of the mobile device 200 is placed on the stylus array 310, and in the field of view of the camera 320.
  • the terminal software then generates a request instruction to the stylus array 310.
  • the stylus array 310 executes the sequence of touches on the touch screen 210 of the mobile device 200.
  • the sequence of touches thus encodes a request that is transmitted to the touch screen 210.
  • the stylus array 310 comprises a plurality of styluses arranged with their respective touching points facing outwardly. Each of these stylus points may be moved to touch a touch screen positioned on the stylus array 310, and thus register a touch on a touch screen.
  • the touching points of the styluses are capable of registering a touch on any type of touch screen e.g. a resistive or a capacitive touch screen.
  • the camera 320 is then configured to monitor the display of the touch screen 210. Should the touch screen 210 display an encoded response image 212, the camera 320 then takes a picture 325 of the image 212 and transmits the picture 325 to the processor 330 for processing by the terminal software.
  • the terminal software Upon receiving the picture 325 at the processor 330, the terminal software decodes the picture 325 on the processor 330. If encryption is applied to the information during encoding, the decoded information is then decrypted. The resultant information after decoding and decryption is a decoded version of the identification information 234 that is encoded into the image 212.
  • the decoded identification information is transmitted from the payment terminal 300 to a server 120 for authentication.
  • the payment terminal 300 further comprises a transceiver 340, and the decoded identification information is transmitted via the transceiver 340 to the server 120 over the network connection 130.
  • the network connection 130 may be a wired or wireless connection and may for example be a telephone line to the server 120. It is envisaged that the network connection 30 be a secure connection and the traffic transmitted within the network connection 130 may thus be further encrypted by network appliances within and at both ends of the network connection 30.
  • the processor 330 receives the results of the authentication from the transceiver 340.
  • the terminal software processes the results and if authentication is deemed to be a failure, the payment terminal 300. displays a negative visual indication, e.g. an LED light indicating that payment is not successful, or a monitor display text indicating that payment is not successful. If authentication is deemed to be a success, the terminal software generates an acknowledgement instruction to the stylus array 310. Upon receiving the acknowledgement instruction, the stylus array 310 executes another sequence of touches on the touch screen 210 of the mobile device 200 i.e. an "acknowledgement" sequence.
  • the server 120 comprises a database 122.
  • the database 122 stores a copy of the corresponding identification information 234 for each of a plurality of mobile devices 200 that are enrolled to use the system 00. Additionally, the server 120 is connected to the payment terminal 300 via the network 130.
  • the server 120 receives a decoded copy of the identification information 234 for a mobile device 200. Authentication is performed on the decoded identification information by looking up the decoded identification information in the database 122. Should the decoded information be found in the database 122, authentication is deemed to be successful, and a message authorizing payment is transmitted over the network 130 from the server 120 to the transceiver 340 of the payment terminal 300. Additionally, the server 120 facilitates the payment by for example debiting the transaction amount from a bank account that is associated with the identification information.
  • the server 120 may be located within the payment terminal 300.
  • the network 130 may be an internal network connection, or may be a computer bus connecting the server 20 as a peripheral to the payment terminal 300.
  • Figure 4 is a flow chart showing the method 400 of payment in the system 100. It is envisaged that this method be carried out in a retail scenario where the payment terminal 300 is located at a point-of-sale terminal for a retail store.
  • a payment transaction is initiated.
  • a purchaser at the point-of-sale terminal of a retail store is shown a sum in which he is to pay.
  • the purchaser thus executes the payment application 232 on his mobile phone 200. If necessary, the purchaser enters a password into the mobile phone 200 in order to permit the execution of the application 232.
  • the purchaser places (or "taps") the mobile device 200 on the payment terminal 300 adjacent to the stylus array 310 and camera 320 of the payment terminal 300.
  • the method 400 then proceeds to step 410.
  • an encoded request is provided to a touch screen 210 of a mobile device 200.
  • the encoded request is provided to the touch screen 210 by the stylus array 310 of the payment terminal 300.
  • the payment terminal 300 initiates the encoded request by using the stylus array 310 to provide a sequence of touches to the touch screen 210.
  • Each of the sequence of touches is performed at a respective time and on a respective position of the touch screen 210.
  • the request is encoded within the sequence of touches using code representations such as for example, the time interval between the respective times of two consecutive touches, or the relative displacement between the respective positions of two consecutive touches.
  • the request may also be encoded by the relative position of a touch of the sequence from an origin of the touch screen 210 e.g. using the top-right hand corner of the touch screen 210 as a reference.
  • the encoded request is verified at the mobile device 200 to produce a verification result.
  • the encoded request is decoded and verified by the payment application 232 in the processor 220. Should the decoded request pass verification, the payment application 232 will proceed to display a response image 212 on the touch screen 210.
  • the sequence of touches is decoded by converting it into a sequence of code representations e.g. a sequence of time intervals between consecutive touches.
  • the sequence of code representations is then compared with a template and verification is a success if the sequence is similar to the template.
  • the method proceeds to step 430.
  • the mobile device 200 encodes a response image based on the verification result.
  • the encoded response image contains identification information 234 identifying the purchaser (i.e. the payment account from which money is to be debited).
  • This identification information 234 may for example include an account identity (e.g. an account number), a checksum, a credit card number or a public key.
  • the identification information 234 is read from the storage device 230 of the mobile device 200.
  • the encoded response image is displayed on the touch screen 2 0 of the mobile device 200.
  • the displayed response image 212 may for example be a barcode, a QR code, or a steganographic image.
  • the identification information 234 may be encoded within the barcode or QR code respectively.
  • the identification information 234 may be encoded within the image using steganography.
  • the identification information 234 that is encoded within the displayed response image 212 may be encrypted, e.g. using a tripleDES encryption. By doing so, even if the displayed response image 212 were to be captured by a third-party, the identification information 234 would be encrypted and thus may be inaccessible to the third-party.
  • a picture 325 of the displayed encoded image is captured by a camera 320 of the payment terminal 300.
  • the captured picture 325 is then transmitted to the processor 330.
  • the picture 325 of the displayed image is decoded in the processor 330 to identify the mobile device 200. If encryption is applied to the information during encoding, the decoded information is further decrypted. The resultant information after decoding and decryption is a decoded version of the identification information 234 that is encoded into the image 212.
  • the decoded identification information is transmitted to a server 120 and is received at the server 120.
  • the received decoded identification information is authenticated. Authentication is performed on the received identification information by looking up the identification information in the database 122. Should the identification information be found in the database 122, authentication is deemed to be successful and a payment authorization is generated.
  • the payment authorization is transmitted from the server 120 to the payment terminal 300.
  • the payment terminal 300 provides an acknowledgement of the payment authorization to the mobile device 200.
  • the stylus array 310 thus executes another sequence of touches on the touch screen 210 i.e. an "acknowledgement" sequence.
  • the "acknowledgement” sequence once again may be encoded as is done for the sequence of touches of step 410.
  • the “acknowledgement” sequence thus confirms the conclusion of the transaction to the mobile device 200.
  • the payment terminal 300 prints a paper receipt that is given to the purchaser.
  • the mobile device 200 may store the details of the transaction as identification information 234 in the storage device 230 of the mobile phone 200. These payment details may then be reused in future transactions.
  • FIG. 5 is a schematic drawing showing the system 500 for security access control. Parts of the system 500 which are identical to those of the system 100 of Figure 1 , or those of the payment terminal 300 of Figure 3, are referred to using like reference numerals.
  • the system 500 differs from the system 100 in having two security terminals 5 0a and 510b in place of the payment terminal 300.
  • the parts of the security terminals 510a and 510b are similar to each other, as well as similar to that for the payment terminal 300 except for a control port 530.
  • Both the security terminals 510a and 510b are capable of having "two-way communications" 140 with the mobile device 200.
  • the security terminals 510a and 510b are connected to the server 120 by the network 130. It is envisaged that the first security terminal 510a may be located in an access enrolment point e.g. at the front desk check-in station of a hotel, while the second security terminal 510b may be built into the doors of a secure area, e.g.
  • the control port 530 of the second security terminal 510b is connected to a security mechanism 540.
  • the security mechanism 540 may for example be an electric lock, or may be an electric gate. It is envisaged that such a system 500 may permit cost savings by reducing or eliminating the need for issuing card keys to the user.
  • the mobile device 200 is first enrolled into the system 500 using the first security terminal 510a.
  • the owner of the mobile device 200 executes a security application (not shown) on the mobile device 200.
  • the owner places (or "taps") the mobile device 200 on the first security terminal 510a adjacent to the stylus array 310 and camera 320 of the first security terminal 5 0a.
  • the first security terminal 510 uses the stylus array 310 to send an access code to the mobile device 200. This is sent as a sequence of touches on the touch screen 210 of the mobile device 200 similar to that done in step 410 of the method 400 for payment. Additionally, the first security terminal 510a transmits the access code to the server 120 for storage in the database 122.
  • the owner of the mobile device 200 places (or "taps") the mobile device 200 on the second security terminal 510b adjacent to the stylus array 310 and camera 320 of the second security terminal 510b. Another sequence of touches is placed on the touch screen 210 by the stylus array 310 of the second security device 510b.
  • the mobile device 200 verifies the other sequence of touches received on the touch screen 210 and should the sequence of touches pass verification, the mobile device 200 displays an encoded response image 212 on the touch screen 210.
  • the encoded response image 212 encodes the access code that is obtained from the first security terminal 510a.
  • the camera 320 of the second security terminal 510b then captures a picture 325 of the displayed response image 212.
  • the captured picture 325 is decoded in the processor 330 of the second security terminal 510b to yield the decoded access code.
  • the decoded access code is then transmitted to the server 120 for authentication. Should authentication of the access code be successful, the server 120 returns an access authorization to the security terminal 510.
  • the security terminal 510 thus activates the security mechanism 540 to grant access to the user. This is done via the control port 530 of the security terminal 510.
  • the encoded response image 212 that is displayed by the second security terminal 510b may additionally also encode information identifying the mobile device 200. This may allow the second security terminal 510b to additionally verify the identity of the mobile device 200 and thus implement an extra level of security check.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un procédé d'authentification comprenant la fourniture d'une demande codée à un écran tactile d'un dispositif mobile (410), l'affichage d'une image de réponse codée sur l'écran tactile (440), et le décodage de l'image affichée afin d'identifier le dispositif mobile (460).
PCT/SG2012/000225 2012-06-26 2012-06-26 Terminal et procédé d'authentification WO2014003684A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2012/000225 WO2014003684A1 (fr) 2012-06-26 2012-06-26 Terminal et procédé d'authentification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2012/000225 WO2014003684A1 (fr) 2012-06-26 2012-06-26 Terminal et procédé d'authentification

Publications (1)

Publication Number Publication Date
WO2014003684A1 true WO2014003684A1 (fr) 2014-01-03

Family

ID=49783651

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2012/000225 WO2014003684A1 (fr) 2012-06-26 2012-06-26 Terminal et procédé d'authentification

Country Status (1)

Country Link
WO (1) WO2014003684A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3534313A1 (fr) * 2018-03-01 2019-09-04 Mastercard International Incorporated Dispositif de paiement à écran tactile
TWI743427B (zh) * 2018-02-24 2021-10-21 開曼群島商創新先進技術有限公司 資料處理方法、終端設備和資料處理系統

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201107577A (en) * 2010-11-12 2011-03-01 xian-tang Lin Intelligent gate security system with one-time password function
CN101982783A (zh) * 2010-10-20 2011-03-02 天津市中环高科技有限公司 电容式触摸屏测试的工艺
US20110208659A1 (en) * 2006-08-15 2011-08-25 Last Mile Technologies, Llc Method and apparatus for making secure transactions using an internet accessible device and application
WO2011128913A1 (fr) * 2010-04-13 2011-10-20 Pranamesh Das Système de paiement sécurisé et partageable mettant en oeuvre un dispositif personnel de confiance
US20120146956A1 (en) * 2010-12-09 2012-06-14 T-Mobile Usa, Inc. Touch Screen Testing Platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110208659A1 (en) * 2006-08-15 2011-08-25 Last Mile Technologies, Llc Method and apparatus for making secure transactions using an internet accessible device and application
WO2011128913A1 (fr) * 2010-04-13 2011-10-20 Pranamesh Das Système de paiement sécurisé et partageable mettant en oeuvre un dispositif personnel de confiance
CN101982783A (zh) * 2010-10-20 2011-03-02 天津市中环高科技有限公司 电容式触摸屏测试的工艺
TW201107577A (en) * 2010-11-12 2011-03-01 xian-tang Lin Intelligent gate security system with one-time password function
US20120146956A1 (en) * 2010-12-09 2012-06-14 T-Mobile Usa, Inc. Touch Screen Testing Platform

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI743427B (zh) * 2018-02-24 2021-10-21 開曼群島商創新先進技術有限公司 資料處理方法、終端設備和資料處理系統
EP3534313A1 (fr) * 2018-03-01 2019-09-04 Mastercard International Incorporated Dispositif de paiement à écran tactile
US20190272531A1 (en) * 2018-03-01 2019-09-05 Mastercard International Incorporated Payment device with touch screen

Similar Documents

Publication Publication Date Title
US11664997B2 (en) Authentication in ubiquitous environment
US9886688B2 (en) System and method for secure transaction process via mobile device
KR101111381B1 (ko) 유비쿼터스 인증 관리를 위한 사용자 인증 시스템, 사용자 인증장치, 스마트 카드 및 사용자 인증방법
US10706136B2 (en) Authentication-activated augmented reality display device
EP2648163B1 (fr) Identification biométrique personnalisée et système de non-répudiation
TWI591554B (zh) Electronic ticket security system and method
US20140351596A1 (en) Method, system and apparatus for authenticating user identity
JP2018516505A (ja) ユビキタス環境での認証
WO2010133096A1 (fr) Système de traitement de carte de transaction et procédé d'amélioration de sécurité
CA2985808A1 (fr) Procedes et systemes pour utiliser une identite de consommateur pour effectuer des transactions electroniques
CN103559614A (zh) 用无记名方式付费的方法
JP6691582B2 (ja) ユーザー認証方法及び認証管理方法
JP2001344544A (ja) 携帯端末およびそれを用いた電子決済システム
KR101187414B1 (ko) 휴대용 단말기에 발급된 카드 인증 시스템 및 방법
WO2017074281A1 (fr) Système et procédé d'authentification multidimensionnelle destinés à des transactions bancaires sans carte et autres transactions impliquant un haut niveau de sécurité
KR20140011975A (ko) 태깅을 통한 카드결제용 디지털 시스템, 결제측 시스템 및 그 제공방법
WO2014003684A1 (fr) Terminal et procédé d'authentification
CN112352237A (zh) 用于认证码键入的系统和方法
TWI626606B (zh) Electronic card establishment system and method thereof
CN117178283A (zh) 支付卡、认证方法及远程支付用途
JP2006243984A (ja) 携帯端末内蔵認証装置、携帯端末用認証プログラム及びその記録媒体、携帯端末を利用する認証方法
JP2007257059A (ja) 認証システム
JP2020115386A (ja) ユビキタス環境での認証
KR20200103615A (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12879705

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12879705

Country of ref document: EP

Kind code of ref document: A1