WO2014020244A1 - Secure payment method and device intended for implementing said method - Google Patents

Secure payment method and device intended for implementing said method Download PDF

Info

Publication number
WO2014020244A1
WO2014020244A1 PCT/FR2013/000207 FR2013000207W WO2014020244A1 WO 2014020244 A1 WO2014020244 A1 WO 2014020244A1 FR 2013000207 W FR2013000207 W FR 2013000207W WO 2014020244 A1 WO2014020244 A1 WO 2014020244A1
Authority
WO
WIPO (PCT)
Prior art keywords
validation
transaction
key
autonomous
payment
Prior art date
Application number
PCT/FR2013/000207
Other languages
French (fr)
Inventor
Benito PENNELLA
Original Assignee
Pennella Benito
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pennella Benito filed Critical Pennella Benito
Publication of WO2014020244A1 publication Critical patent/WO2014020244A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes

Definitions

  • the invention relates to a secure payment method and to a device for implementing said method.
  • a transaction validation method implementing a simple device preferably housing type comprising at least one validation key.
  • a- associate at least one means of payment with an autonomous validation device
  • the invention also relates to such a method characterized in that the autonomous validation device comprises a transaction validation key.
  • the invention also relates to such a method characterized in that the autonomous validation device further comprises a transaction repudiation key corresponding to a rejection of said transaction.
  • the invention also relates to such a method characterized in that the interrogation and validation is performed via a telephone network.
  • the invention also relates to such a method characterized in that said telephone network is a wireless cellular telephone network, and in that the autonomous validation device is a cellular telephone adapted to operate with such a network.
  • the invention also relates to such a method characterized in that further comprises a configuration step during which the user designates one of the phone keys as a validation key.
  • the invention also relates to such a method characterized in that the validation is performed by transmitting an encrypted message.
  • the invention also relates to such a method characterized in that the encryption is effected by transmitting a predetermined occurrence of a pseudo-random code from a determined pseudo-random code generator.
  • the subject of the invention is also such a method characterized in that it comprises a communication interface capable of emitting a signal characteristic of pressing a validation key of a transaction.
  • the invention also relates to such a method characterized in that said device is furthermore a cellular telephone provided with an encryption device and in that one of the keys of the telephone also provides the function of a validation key.
  • FIG. 1 is a block diagram of the preferred embodiment of the validation device according to the invention.
  • FIG. 2 is an explanatory diagram of the method according to the invention.
  • FIG. 3 is a flowchart of the method according to the invention.
  • FIG. 4 is a flowchart of an application implemented by the method according to
  • a validation device 10 autonomous comprising a power supply 15 typically a battery or a rechargeable battery.
  • a communication interface 11 receives a query 12 for the purpose of validating the transaction or not, such as a payment by credit card or a withdrawal of money. If the cardholder is at the origin of the transaction, he activates the validation key 13, for example with the word "YES”. If the card holder (and bearer of the device according to the invention) is not at the origin of the transaction, he presses a key 14 for example the mention "NO" invalidating the transaction or advantageously does not respond which is considered a repudiation of the transaction.
  • the validation device also comprises a third key, (not shown), of invalidation, permanent or temporary, of the bank card for which an attempted transaction, deemed illegitimate by the card owner upon receipt of The interrogation 12.
  • the method of invalidation of the card comprises a step of entering a numerical or alphanumeric code.
  • the relevant information on the current transaction such as the currency used, the amount, the identity of the provider or merchant with whom the transaction is performed and the like.
  • the display is completed or replaced by an announcement in voice synthesis about the transaction.
  • a response is coded and / or encrypted.
  • the coding is performed by a pseudo-random code generator 17 synchronized with a similar pseudo-random code generator of the banking system.
  • the coding is performed by a pseudo-random code generator 17, synchronized with a similar generator, that is to say based on the same polynomial of a bank transaction validation system.
  • the validation of the operation, by pressing the key 13 corresponds to the transmission 16 of a code having the following occurrence with respect to the previous transmission 16 generated by the arrangement 10 according to the invention, while the repudiation of the operation following the pressing of the key 14 or a non-activation of the validation key 13 during a predefined period of time, for example equal to two minutes corresponds to the jump of at least one occurrence successive codes generated by a pseudo random generator 17.
  • the device 10 is a dedicated box comprising communication means (the communication interface 11) adapted to a communication network, advantageously wireless, dedicated to either an existing type network such as the GPS upstream channel, Argos beacon or, preferably, the cell phone network.
  • a communication network advantageously wireless, dedicated to either an existing type network such as the GPS upstream channel, Argos beacon or, preferably, the cell phone network.
  • the housing 10 is a cellular phone type GSM, smartphone or other.
  • Such a telephone may be provided with specific validation keys 13 and repudiation 14, it is more economical to assign the function of said keys to keys.
  • the assignment to pre-existing keys of the validation or repudiation functions is performed during an initialization procedure by the end user so as to make it extremely difficult for the unauthorized person to validate without knowing which key the phone plays the role of the validation key 13.
  • the interrogation 12 and the validation or repudiation response communications 16 are performed by service messages (SMS).
  • SMS service messages
  • the program for assigning validation and processing keys is stored in a permanent memory of the telephone delivered by the manufacturer or provided as an application.
  • FIG. 2 there can be seen a housing 10 provided with at least one validation key 13 to which a plurality of payment means 18.1, 18.2 to 18.n have been associated, typically bank cards provided in a known manner with the chips 19 and 18. / or tracks 20.
  • a single box 10 makes it possible to perform the validation of transactions performed by a plurality of cards.
  • a card for example the card 18.1
  • a device 21 responsible for a transaction such as a payment terminal or a cash dispenser
  • the latter establishes a communication 22 with a bank symbolized by the storage medium 23 as well as with the housing 10.
  • the customer having introduced the card 18.1 in the apparatus 21 receives a message on its housing 10, provided that the bank 23 has authorized the transaction.
  • the customer presses the key 13 of the case 10.
  • the holder of the card carrying the case 10 does not validate the operation. which is stopped and appropriate measures are taken such as, for example, the non-return of the card 18.1 by the apparatus 21, ...
  • FIG. 3 an example of a treatment sequence according to the invention can be seen.
  • the customer initiates the transaction, for example by the introduction of a payment card 18.1 in a suitable reader 21.
  • the customer enters his PIN code in 25.
  • the customer in the case of withdrawal of money, the customer enters the amount of the transaction to be made. In the case of a purchase, the merchant enters the amount to be paid.
  • the banking system comprising the apparatus 21 and the bank 23 issue the interrogation of the validation device 10.
  • the banking system knows the generator polynomial of the pseudo-random code generator as well as the occurrence of the expected response as a function of the transaction history performed by the customer.
  • the system checks to see if a valid validation has been received from the client.
  • the transmission of a valid validation 27 is accepted in the case where the code generated by the pseudo-random code generator advantageously accompanied by the transaction number issued by the bank 23 corresponds to the expected values.
  • the bank also verifies the telephone number of the transmitter and compares it with the number of the box 10 of the customer registered in its computer system 23. The validation 27 makes it possible to perform the transaction.
  • a repudiation 28 corresponds either to the absence of entry on the key 13 or the entry of a key 14. In such a case, the operation is rejected.
  • SMS to be exchanged have an extremely small amount of data, so it is possible and advantageous to assign this type of message a high priority even in the case of a congested telephone network.
  • the method according to the present invention is extremely simple to implement for the end customer insofar as it suffices to press a key to automatically generate a validation message, without having to memorize or enter a confidential code.
  • the preferred embodiment implementing on the one hand smart cards and on the other hand a cellular network, it benefits from all the security systems that are already incorporated.
  • the coding uses, in addition to and / or instead of a pseudo-random code generator, a function of the time of the establishment of the call 12.6.
  • the application is a standard application, the same for all customers implementing a platform as marketed on the IPhone, Android, Windows name.
  • the personalization that is to say the association with at least one credit card is done for example by entering a code communicated by the bank.
  • the transaction authorization is prior to the transaction request, for example the introduction of a bank card in a card reader of a cash dispenser.
  • the user authorizes a withdrawal for a credit card for a limited time for example to two minutes, four minutes or ten minutes by pressing the validation key 13 of his phone and, after storing it, goes to distributor and performs the withdrawal operation.
  • the user indicates on the phone the amount of the desired transaction, either by entering the amount on the number keys of the phone, or by selecting the amount among the proposed amounts by pressing the validation key the number of times
  • the application is initialized, for example by entering a code provided by the bank to associate the phone to a credit card.
  • the SMS service message reception detection is performed. It is understood that the SMS is given as an example but we implement the most suitable network, typically the fastest network (UTMS data network, 3G, 3G +, 4G or the like).
  • the application reads the received SMS.
  • the application has identified whether it is a request for validation.
  • the application displays on the smartphone screen a validation request message.
  • the application generates and sends the validation SMS containing the data expected by the bank.
  • the cell phone has one or more connectors capable of receiving a chip (electronic circuit) of a smart card (credit card, withdrawal or payment) so as to be able to substitute for at least one such card.
  • the telephone implemented according to the present invention comprises means, preferably encrypted, short-distance communication type Bluetooth, RFID, contact or other.
  • the range is reduced and / or the directivity is increased to reduce to avoid the interception of data exchanges with a payment terminal, transaction or withdrawal of money adapted to communicate with the phone.
  • a housing according to the unique invention can ensure the security of a plurality of cards.
  • Either a single validation server associates the box with a plurality of cards, or the validation server of each issuing agency and / or manager of such a card associates the card holder to its validation box, including his phone. It can be convenient, but not necessary, the same touch of the case the validation key for all the cards associated with said box. It is the same for the repudiation key.
  • SIM card subscriberator
  • the phone is identified by its unique identification number (IMEI) as well as by the identification smart card (SIM card) issued by the telecommunication operator and assigning a telephone number. Security is further enhanced by combining the identification number of the phone with that of the SIM card.
  • the combination of these two numbers is for example a concatenation, an addition, or, preferably a multiplication.
  • each of the identification numbers of the telephone and the SIM card are prime numbers of randomly selected lengths making it very difficult to guess which prime numbers are used among all prime numbers. In the case of securing a plurality of payment means 18.1, 18.2, ... a prime number of great length is associated in the SIM card with each payment means.
  • the security server of the bank 23 knows at least one of said prime numbers, preferably both, associated, for example, the payment means 18.1 to secure.
  • the two prime numbers associated with a payment means 18.1 are distributed on two mutually cooperating security servers.
  • the interrogation 12 is not only transmitted by a secure channel, but is also encrypted by a "public key and private key" type algorithm, or RSA, the two so-called prime numbers playing the roles. public key and private key.
  • the two prime numbers are kept secret, preferably, the unique identification number of the telephone (IMEI), common to all means of payment 18.1, 18.2, ..., 18.n is considered as the public key.
  • IMEI unique identification number of the telephone
  • the telephone or, preferably, the SIM card decodes the interrogation 12, and elaborates a validation or repudiation response 16 according to the keys 13 or 14 captures and encrypts the response developed according to the same algorithm.
  • the phone transmits the encrypted response 16.
  • each secure payment means 18 comprises means (for example, incorporated in the chip 19) for storing and sending, on command, an encryption key considered here as a public key; the telephone, or preferably the SIM card containing the encryption key considered here as a private key.
  • the apparatus 21 initiates the transmission of the interrogation 12 and activates the preferably encrypted transmission over a short range of Bluetooth, RFID type. , by contact or other, by the card 18 of the public key to the phone that presents it to the SIM card. If necessary, the device 21 provides power to the card 18. On the other hand, the phone receives the interrogation 12, warns the user and presents it to the SIM card.
  • the phone communicates to the SIM card if the validation key 13 or the repudiation key 14 has been entered.
  • the SIM card decrypts with its private key interrogation 12, elaborates, according to the key 13 or 14 enters the corresponding response expected.
  • the SIM card encrypts the preferred response by the public key provided by the payment means 18.
  • the phone responds advantageously as an SMS. This response is transmitted to the bank 23 corresponding to the card 18 used.
  • the bank 23 decrypts the response by the private key and if the answer corresponds to that expected with input of the validation key 13 authorizes the transaction. It should be noted that a possible interception of the public key does not make it possible to carry out a fraudulent operation.
  • the risk of this interception can be avoided, either by directly memorizing the couples private key- public key with an identification of the means of payment 18 associated in the SIM card interrogation 12 containing in clear or with a different encryption preferably lower than the RSA encryption the identification of the means of payment 18 corresponding to the current transaction; either the public key is transmitted in the interrogation 12 in the clear or with a different encryption preferably lower than the RSA encryption.
  • the RSA encryption implements a number of bits (for example equal to 512, 1024, 2048, 4096, 8182 or other) which is chosen according to the number of clients (boxes 10) and the payment means 18 to be protected to dispose of a number of prime numbers sufficient to allocate public keys and private keys.
  • a number of bits for example equal to 512, 1024, 2048, 4096, 8182 or other
  • only a small percentage of available prime numbers are allocated as encryption keys.
  • a large number of usable prime numbers makes it possible to use a single private key per user (or SIM card).
  • SIM card typically a private key per payment means 18
  • a plurality of private keys by a single SIM card is not outside the scope of the present invention.
  • the SIM card advantageously comprises a table of correspondence between means of payment 18, or between public keys on the one hand and the private keys on the other hand. It is understood that the allocation of the same number as a key (public and / or private) to several users or several cards, although not preferred, is not outside the scope of the present invention.
  • the housing 10 is the only means in which the user can have confidence it may be advantageous to provide it with security means, including biometric.
  • security means including biometric.
  • biometric In the case of phone with a camera, it can, for example, be used to compare the back of the eye of the user with that recorded in the SIM card. Answer 16 is developed only in case of correspondence.
  • the biometric validation is requested at the initialization of the security application according to the invention, with each transaction, or, advantageously only during the "risky" transactions such as transaction of a significant amount, transaction made of a place where the customer seldom visits or from a reputable place for numerous attempts at fraud.
  • the present invention applies to securing transactions implementing payment means, including payment cards, credit cards, bank cards or the like.

Abstract

The invention relates to a secure payment method and to a device intended for implementing said method. The invention relates to a transaction validation method, characterized in that it comprises the following steps: a) associating at least one payment means (18.1, 18.2,... 18.n) with a self-contained validation device (10); b) presenting the payment means (18.1) to an apparatus (21) in charge of carrying out a desired transaction, with a view to carrying out said transaction; c) querying (12) said self-contained validation device (10); d) having the client perform a deliberate operation, characteristic of the validation of the transaction, on said self-contained validation device (10); and e) validating (16) and performing the transaction. The present invention can be used for securing the transactions that use payment means, in particular debit cards, credit cards, bank cards, or the like.

Description

Procédé de paiement sécurisé et dispositif en vue de la mise en oeuvre dudit procédé.  Secure payment method and device for implementing said method.
L'invention se rapporte à un procédé de paiement sécurisé et à un dispositif en vue de la mise en œuvre dudit procédé. The invention relates to a secure payment method and to a device for implementing said method.
Il est connu de munir les cartes de crédit de divers moyens de sécurité pour s'assurer que le paiement est effectué par le propriétaire légitime. It is known to provide credit cards with various means of security to ensure that payment is made by the rightful owner.
Toutefois, un nombre de fraudes important subsiste.  However, a significant number of frauds persist.
C'est par conséquent le but de la présente invention d'offrir un procédé de paiement et/ou de retrait d'argent sécurisé. It is therefore the object of the present invention to provide a method of secure payment and / or withdrawal of money.
C'est également le but de la présente invention d'offrir un tel procédé pouvant être mis en œuvre partout dans le monde. It is also the object of the present invention to provide such a method that can be implemented anywhere in the world.
C'est également le but de la présente invention d'offrir un tel procédé n'engendrant qu'un surcoût de transaction modéré.  It is also the object of the present invention to provide such a method generating only a moderate transaction overhead.
Ces buts sont atteints selon l'invention par un procédé de validation de transaction mettant en œuvre un simple dispositif de préférence de type boîtier comportant au moins une touche de validation. These objects are achieved according to the invention by a transaction validation method implementing a simple device preferably housing type comprising at least one validation key.
L'invention a principalement pour objet un procédé de validation de transaction caractérisé en ce qu'il comporte les étapes suivantes :  The subject of the invention is mainly a transaction validation method characterized in that it comprises the following steps:
a- associer au moins un moyen de paiement à un dispositif autonome de validation ;  a- associate at least one means of payment with an autonomous validation device;
b- présenter le moyen de paiement à un appareil chargé d'effectuer une transaction désirée, en vue d'effectuer ladite transaction ;  b- present the means of payment to an apparatus responsible for carrying out a desired transaction, with a view to effecting said transaction;
c- effectuer une interrogation dudit dispositif autonome de validation ;  c- querying said autonomous validation device;
d- effectuer une opération volontaire par le client sur ledit dispositif autonome de validation caractéristique de la validation de la transaction ;  d- perform a voluntary operation by the client on said autonomous validation device characteristic of the validation of the transaction;
e- valider et effectuer la transaction.  e- validate and complete the transaction.
L'invention a aussi pour objet un tel procédé caractérisé en ce que le dispositif autonome de validation comporte une touche de validation de transaction. The invention also relates to such a method characterized in that the autonomous validation device comprises a transaction validation key.
L'invention a aussi pour objet un tel procédé caractérisé en ce que le dispositif autonome de validation comporte en outre une touche de répudiation de transaction correspondant à un rejet de ladite transaction. The invention also relates to such a method characterized in that the autonomous validation device further comprises a transaction repudiation key corresponding to a rejection of said transaction.
L'invention a aussi pour objet un tel procédé caractérisé en ce que l'interrogation et la validation s'effectuent par l'intermédiaire d'un réseau téléphonique. L'invention a aussi pour objet un tel procédé caractérisé en ce que ledit réseau téléphonique est un réseau téléphonique sans fil, cellulaire, et en ce que le dispositif autonome de validation est un téléphone cellulaire adapté à fonctionner avec un tel réseau. The invention also relates to such a method characterized in that the interrogation and validation is performed via a telephone network. The invention also relates to such a method characterized in that said telephone network is a wireless cellular telephone network, and in that the autonomous validation device is a cellular telephone adapted to operate with such a network.
L'invention a aussi pour objet un tel procédé caractérisé en ce qui comporte en outre une étape de configuration durant laquelle l'utilisateur désigne une des touches du téléphone comme touche de validation. The invention also relates to such a method characterized in that further comprises a configuration step during which the user designates one of the phone keys as a validation key.
L'invention a aussi pour objet un tel procédé caractérisé en ce que la validation s'effectue par transmission d'un message crypté. The invention also relates to such a method characterized in that the validation is performed by transmitting an encrypted message.
L'invention a aussi pour objet un tel procédé caractérisé en ce que le cryptage s'effectue par émission d'une occurrence prédéterminée d'un code pseudo-aléatoire à partir d'un générateur de code pseudo-aléatoire déterminé. The invention also relates to such a method characterized in that the encryption is effected by transmitting a predetermined occurrence of a pseudo-random code from a determined pseudo-random code generator.
L'invention a aussi pour objet un tel procédé caractérisé en ce qu'il comporte line interface de communication susceptible d'émettre un signal caractéristique de l'appui sur une touche de validation d'une transaction. The subject of the invention is also such a method characterized in that it comprises a communication interface capable of emitting a signal characteristic of pressing a validation key of a transaction.
L'invention a aussi pour objet un tel procédé caractérisé en ce que ledit dispositif est en outre un téléphone cellulaire muni d'un dispositif de cryptage et en ce que une des touches du téléphone assure en outre la fonction de touche de validation. The invention also relates to such a method characterized in that said device is furthermore a cellular telephone provided with an encryption device and in that one of the keys of the telephone also provides the function of a validation key.
L'invention sera mieux comprise à l'aide des figures ci-après : The invention will be better understood using the following figures:
- la figure 1 est un schéma de principe de l'exemple préféré de réalisation du dispositif de validation selon l'invention, FIG. 1 is a block diagram of the preferred embodiment of the validation device according to the invention,
la figure 2 est un schéma explicatif du procédé selon l'invention,  FIG. 2 is an explanatory diagram of the method according to the invention,
la figure 3 est un organigramme du procédé selon l'invention,  FIG. 3 is a flowchart of the method according to the invention,
- la figure 4 est un organigramme d'une application mise en œuvre par le procédé selon  FIG. 4 is a flowchart of an application implemented by the method according to
l'invention.  the invention.
Sur la figure 1, on peut voir un dispositif de validation 10 selon l'invention, autonome comportant une alimentation électrique 15 typiquement une pile ou une batterie rechargeable. In Figure 1, there can be seen a validation device 10 according to the invention, autonomous comprising a power supply 15 typically a battery or a rechargeable battery.
Une interface de communication 11 reçoit une interrogation 12 en vue de la validation, ou non, de la transaction telle qu'un paiement par carte bancaire ou un retrait d'argent. SI le titulaire de la carte est à l'origine de la transaction, il active la touche de validation 13, portant par exemple la mention « OUI ». Si le titulaire de la carte (et porteur du dispositif selon l'invention) n'est pas à l'origine de la transaction, il appuie sur une touche 14 portant par exemple la mention « NON » invalidant la transaction ou avantageusement ne répond pas ce qui est considéré comme une répudiation de la transaction. Avantageusement, le dispositif de validation comporte en outre une troisième touche, (non illustrée), d'invalidation, permanente ou temporaire, de la carte bancaire pour laquelle une tentative de transaction, jugée illégitime par le propriétaire de la carte lors de la réception de l'interrogation 12. Avantageusement, le procédé d'invalidation de la carte comporte une étape de saisie d'un code numérique ou alphanumérique. A communication interface 11 receives a query 12 for the purpose of validating the transaction or not, such as a payment by credit card or a withdrawal of money. If the cardholder is at the origin of the transaction, he activates the validation key 13, for example with the word "YES". If the card holder (and bearer of the device according to the invention) is not at the origin of the transaction, he presses a key 14 for example the mention "NO" invalidating the transaction or advantageously does not respond which is considered a repudiation of the transaction. Advantageously, the validation device also comprises a third key, (not shown), of invalidation, permanent or temporary, of the bank card for which an attempted transaction, deemed illegitimate by the card owner upon receipt of The interrogation 12. Advantageously, the method of invalidation of the card comprises a step of entering a numerical or alphanumeric code.
Pour les dispositifs de validation 10 munie d'un afficheur, notamment d'un afficheur  For the validation devices 10 equipped with a display, in particular a display
alphanumérique, il est avantageux d'afficher lors d'une interrogation 12 les informations pertinentes sur la transaction en cours, telles que la monnaie utilisée, le montant, l'identité du prestataire ou commerçant avec lequel on effectue la transaction et analogue. En variante l'affichage est complété ou remplacé par une annonce en synthèse vocale concernant la transaction.  alphanumeric, it is advantageous to display during a query 12 the relevant information on the current transaction, such as the currency used, the amount, the identity of the provider or merchant with whom the transaction is performed and the like. Alternatively the display is completed or replaced by an announcement in voice synthesis about the transaction.
Avantageusement une réponse est codée et/ou cryptée. Avantageusement, le codage s'effectue par un générateur de code pseudo-aléatoire 17 synchronisé avec un générateur de code pseudo-aléatoire analogue du système bancaire.  Advantageously, a response is coded and / or encrypted. Advantageously, the coding is performed by a pseudo-random code generator 17 synchronized with a similar pseudo-random code generator of the banking system.
Avantageusement, le codage s'effectue par un générateur de code pseudo-aléatoire 17, synchronisé avec un générateur analogue, c'est-à-dire basé sur un même polynôme d'un système de validation de transaction bancaire. Par exemple, la validation de l'opération, par appui sur la touche 13, correspond à l'émission 16 d'un code ayant l'occurrence suivante par rapport à l'émission 16 précédente générée par la disposition 10 selon l'invention, alors que la répudiation de l'opération suite à l'appui sur la touche 14 ou à une non activation de la touche de validation 13 pendant une période de temps prédéfinie, par exemple égale à deux minutes correspond au saut d'au moins une occurrence de codes successifs générés par un générateur pseudo aléatoire 17. Advantageously, the coding is performed by a pseudo-random code generator 17, synchronized with a similar generator, that is to say based on the same polynomial of a bank transaction validation system. For example, the validation of the operation, by pressing the key 13, corresponds to the transmission 16 of a code having the following occurrence with respect to the previous transmission 16 generated by the arrangement 10 according to the invention, while the repudiation of the operation following the pressing of the key 14 or a non-activation of the validation key 13 during a predefined period of time, for example equal to two minutes corresponds to the jump of at least one occurrence successive codes generated by a pseudo random generator 17.
Dans une première variante de réalisation, le dispositif 10 est un boitier dédié comportant des moyens de communication (l'interface de communication 11) adapté à un réseau de communication, avantageusement sans fil, dédié, soit à un réseau de type existant tel que le canal montant GPS, balise Argos ou, de préférence, le réseau de téléphonie cellulaire.  In a first variant embodiment, the device 10 is a dedicated box comprising communication means (the communication interface 11) adapted to a communication network, advantageously wireless, dedicated to either an existing type network such as the GPS upstream channel, Argos beacon or, preferably, the cell phone network.
De manière préférée, le boitier 10 est un téléphone cellulaire de type GSM, Smartphone ou autre.Preferably, the housing 10 is a cellular phone type GSM, smartphone or other.
Bien qu'un tel téléphone puisse être muni des touches de validation 13 et de répudiation 14 spécifiques, il est plus économique d'assigner la fonction desdites touches à des touches Although such a telephone may be provided with specific validation keys 13 and repudiation 14, it is more economical to assign the function of said keys to keys.
préexistantes du téléphone. De préférence, l'assignation à des touches préexistantes des fonctions de validation ou de répudiation s'effectue lors d'une procédure d'initialisation par l'utilisateur final de manière à rendre extrêmement difficile la validation par une personne non autorisée sans savoir quelle touche du téléphone joue le rôle de la touche de validation 13. pre-existing phone. Preferably, the assignment to pre-existing keys of the validation or repudiation functions is performed during an initialization procedure by the end user so as to make it extremely difficult for the unauthorized person to validate without knowing which key the phone plays the role of the validation key 13.
Avantageusement, les communications d'interrogation 12 et de réponse de validation ou de répudiation 16 s'effectuent par des messages de service (SMS). Le programme d'assignation de touches de validation et de traitement est stocké dans une mémoire permanente du téléphone soit livrée par le constructeur soit fournie sous forme d'une application.  Advantageously, the interrogation 12 and the validation or repudiation response communications 16 are performed by service messages (SMS). The program for assigning validation and processing keys is stored in a permanent memory of the telephone delivered by the manufacturer or provided as an application.
Sur la figure 2, on peut voir un boîtier 10 muni d'au moins une touche de validation 13 auquel on a associé une pluralité de moyens de paiement 18.1,18.2 à 18.n typiquement des cartes bancaires munies de manière connue des puces 19 et/ou de pistes 20. Ainsi, un boîtier unique 10 permet d'effectuer la validation des transactions effectuées par une pluralité de cartes. Lors de l'introduction d'une carte, par exemple la carte 18.1, dans un appareil 21 chargé d'une transaction tel qu'un terminal de paiement ou un distributeur de billets, ce dernier établit une communication 22 avec une banque symbolisée par le moyen de stockage 23 ainsi qu'avec le boîtier 10. Le client ayant introduit la carte 18.1 dans l'appareil 21 reçoit un message sur son boîtier 10, sous réserve que la banque 23 ait autorisé la transaction. Pour terminer la transaction, le client appuie sur la touche 13 du boîtier 10. Dans le cas où la carte 18.1 est une fausse carte et/ou utilisée de manière illégitime, le titulaire de la carte porteur du boîtier 10 ne valide pas l'opération qui est stoppée et des mesures appropriées sont prises telles que, par exemple, la non restitution de la carte 18.1 par l'appareil 21, ... In FIG. 2, there can be seen a housing 10 provided with at least one validation key 13 to which a plurality of payment means 18.1, 18.2 to 18.n have been associated, typically bank cards provided in a known manner with the chips 19 and 18. / or tracks 20. Thus, a single box 10 makes it possible to perform the validation of transactions performed by a plurality of cards. When introducing a card, for example the card 18.1, in a device 21 responsible for a transaction such as a payment terminal or a cash dispenser, the latter establishes a communication 22 with a bank symbolized by the storage medium 23 as well as with the housing 10. The customer having introduced the card 18.1 in the apparatus 21 receives a message on its housing 10, provided that the bank 23 has authorized the transaction. To terminate the transaction, the customer presses the key 13 of the case 10. In the case where the card 18.1 is a false card and / or illegitimately used, the holder of the card carrying the case 10 does not validate the operation. which is stopped and appropriate measures are taken such as, for example, the non-return of the card 18.1 by the apparatus 21, ...
Sur la figure 3, on peut voir un exemple de séquence de traitement selon l'invention.  In FIG. 3, an example of a treatment sequence according to the invention can be seen.
En 24, le client initie la transaction, par exemple par l'introduction d'une carte de paiement 18.1 dans un lecteur adapté 21. De manière connue, sur invitation, le client saisit son code confidentiel (PIN) en 25. At 24, the customer initiates the transaction, for example by the introduction of a payment card 18.1 in a suitable reader 21. In known manner, by invitation, the customer enters his PIN code in 25.
En 26, dans le cas d'un retrait d'argent, le client saisit le montant de la transaction à effectuer. Dans le cas d'un achat, le commerçant saisit le montant à payer. In 26, in the case of withdrawal of money, the customer enters the amount of the transaction to be made. In the case of a purchase, the merchant enters the amount to be paid.
En 12, le système bancaire comportant l'appareil 21 et la banque 23 émettent l'interrogation du dispositif de validation 10. Le système bancaire connaît le polynôme générateur du générateur de code pseudo aléatoire ainsi que l'occurrence de la réponse attendue en fonction de l'historique des transactions effectuées par le client.  At 12, the banking system comprising the apparatus 21 and the bank 23 issue the interrogation of the validation device 10. The banking system knows the generator polynomial of the pseudo-random code generator as well as the occurrence of the expected response as a function of the transaction history performed by the customer.
En 16, le système vérifie si une validation correcte a été reçue du client. La transmission d'une validation correcte 27 est acceptée dans le cas où le code généré par le générateur de code pseudo aléatoire avantageusement accompagné du numéro de transaction émise par la banque 23 correspond aux valeurs attendues. De manière préférée, la banque vérifie également le numéro de téléphone de l'émetteur et le compare avec le numéro du boîtier 10 du client enregistré dans son système informatique 23. La validation 27 permet d'effectuer la transaction. At 16, the system checks to see if a valid validation has been received from the client. The transmission of a valid validation 27 is accepted in the case where the code generated by the pseudo-random code generator advantageously accompanied by the transaction number issued by the bank 23 corresponds to the expected values. Preferably, the bank also verifies the telephone number of the transmitter and compares it with the number of the box 10 of the customer registered in its computer system 23. The validation 27 makes it possible to perform the transaction.
Une répudiation 28 correspond soit à l'absence de saisie sur la touche 13 ou à la saisie d'une touche 14. Dans un tel cas, l'opération est rejetée. A repudiation 28 corresponds either to the absence of entry on the key 13 or the entry of a key 14. In such a case, the operation is rejected.
Il est à noter que les SMS à échanger présentent un volume de données extrêmement faibles ainsi, il est possible et avantageux d'assigner à ce type de messages une priorité haute même dans le cas d'un réseau téléphonique encombré. It should be noted that the SMS to be exchanged have an extremely small amount of data, so it is possible and advantageous to assign this type of message a high priority even in the case of a congested telephone network.
Le procédé selon la présente invention est extrêmement simple à mettre en oeuvre pour le client final dans la mesure où il lui suffit d'appuyer sur une touche pour générer automatiquement un message de validation, sans avoir à mémoriser ni à saisir un code confidentiel. Dans l'exemple préféré de réalisation mettant en œuvre d'une part des cartes bancaires à puce et, d'autre part un réseau de téléphonie cellulaire, il bénéficie de tous les systèmes de sécurité qui y sont déjà incorporés.  The method according to the present invention is extremely simple to implement for the end customer insofar as it suffices to press a key to automatically generate a validation message, without having to memorize or enter a confidential code. In the preferred embodiment implementing on the one hand smart cards and on the other hand a cellular network, it benefits from all the security systems that are already incorporated.
En variante, le codage utilise en complément et/ou en lieu et place d'un générateur de code pseudo aléatoire, une fonction de l'heure de l'établissement de la communication 12,6. As a variant, the coding uses, in addition to and / or instead of a pseudo-random code generator, a function of the time of the establishment of the call 12.6.
Avantageusement, l'application est une application standard, la même pour tous les clients mettant en uvre une plateforme telle que commercialisée sur la dénomination IPhone, Androïd, Windows. La personnalisation c'est-à-dire l'association à au moins une carte de crédit s'effectue par exemple par la saisie d'un code communiqué par la banque. En variante, l'autorisation de transaction est préalable à la demande de transaction, par exemple à l'introduction d'une carte bancaire dans un lecteur de carte d'un distributeur de billets. Par exemple, l'utilisateur autorise un retrait pour une carte bancaire pour une durée limitée par exemple à deux minutes, quatre minutes ou dix minutes en actionnant la touche de validation 13 de son téléphone puis, après avoir rangé celui-ci, se rend au distributeur et effectue l'opération de retrait. Advantageously, the application is a standard application, the same for all customers implementing a platform as marketed on the IPhone, Android, Windows name. The personalization that is to say the association with at least one credit card is done for example by entering a code communicated by the bank. Alternatively, the transaction authorization is prior to the transaction request, for example the introduction of a bank card in a card reader of a cash dispenser. For example, the user authorizes a withdrawal for a credit card for a limited time for example to two minutes, four minutes or ten minutes by pressing the validation key 13 of his phone and, after storing it, goes to distributor and performs the withdrawal operation.
Cela évite d'avoir à manipuler le téléphone en public devant le distributeur.  This avoids having to handle the phone in public in front of the distributor.
Avantageusement, l'utilisateur indique sur le téléphone le montant de la transaction désirée, soit en saisissant le montant sur les touches numériques du téléphone, soit en sélectionnant le montant parmi les montants proposés en appuyant sur la touche de validation le nombre de fois  Advantageously, the user indicates on the phone the amount of the desired transaction, either by entering the amount on the number keys of the phone, or by selecting the amount among the proposed amounts by pressing the validation key the number of times
correspondant au montant désiré.  corresponding to the desired amount.
Sur la figure 4, on peut voir l'exemple préféré d'exécution d'une application par smartphone selon l'invention.  In Figure 4, we can see the preferred example of execution of a smartphone application according to the invention.
En 41, on effectue l'initialisation de l'application par exemple en saisissant un code fourni par la banque permettant d'associer le téléphone à une carte bancaire. En 42, on effectue la détection de réception de message de service SMS. Il est bien entendu que le SMS n'est donné qu'à titre d'exemple mais on met en œuvre le réseau le plus adapté, typiquement le réseau le plus rapide (réseau de données UTMS, 3G, 3G+,4G ou analogue).  In 41, the application is initialized, for example by entering a code provided by the bank to associate the phone to a credit card. At 42, the SMS service message reception detection is performed. It is understood that the SMS is given as an example but we implement the most suitable network, typically the fastest network (UTMS data network, 3G, 3G +, 4G or the like).
En 43, l'application effectue la lecture du SMS reçu.  At 43, the application reads the received SMS.
En 44, l'application a identifié s'il s'agit d'une demande de validation.  In 44, the application has identified whether it is a request for validation.
Si non, on retourne en 42. If no, we go back to 42.
Si oui, en 45, l'application affiche sur l'écran du smartphone un message de demande de validation. If yes, at 45, the application displays on the smartphone screen a validation request message.
En 46, en absence de saisie de la touche de validation 13, ou en cas de saisie de la touche de répudiation 14, on retourne en 42 sans émission de réponse. In 46, in the absence of entry of the validation key 13, or in the case of entry of the repudiation key 14, 42 is returned without transmission of response.
Au contraire, si la touche de validation 13 est saisie, on va en 16. En 16, l'application génère et envoie le SMS de validation comportant les données attendues par la banque. En variante, le téléphone cellulaire comporte un ou plusieurs connecteurs susceptibles de recevoir une puce (circuit électronique) d'une carte à puce (carte de crédit, de retrait ou de paiement) de manière à pouvoir se substituer à au moins une telle carte. Avantageusement, le téléphone mis en œuvre selon la présente invention comporte des moyens, de préférence cryptés, de communication à courte distance de type Bluetooth, RFID, par contact ou autres. Avantageusement, la portée est réduite et/ou la directivité est augmentée pour réduire pour éviter l'interception des échanges des données avec un terminal de paiement, de transaction ou de retrait d'argent adapté pour communiquer avec le téléphone.  On the contrary, if the validation key 13 is entered, it goes to 16. In 16, the application generates and sends the validation SMS containing the data expected by the bank. Alternatively, the cell phone has one or more connectors capable of receiving a chip (electronic circuit) of a smart card (credit card, withdrawal or payment) so as to be able to substitute for at least one such card. Advantageously, the telephone implemented according to the present invention comprises means, preferably encrypted, short-distance communication type Bluetooth, RFID, contact or other. Advantageously, the range is reduced and / or the directivity is increased to reduce to avoid the interception of data exchanges with a payment terminal, transaction or withdrawal of money adapted to communicate with the phone.
Il est bien entendu qu'un boîtier selon l'invention unique, notamment un téléphone unique, peut assurer la sécurisation d'une pluralité de cartes. Soit un serveur de validation unique associe le boîtier à une pluralité de cartes, soit le serveur de validation de chaque organisme émetteur et/ou gestionnaire d'une telle carte associe la carte du titulaire à son boîtier de validation, notamment à son téléphone. Il peut être commode, sans que cela soit nécessaire, qu'une même touche du boîtier soit la touche de validation pour toutes les cartes associées au dit boîtier. Il en est de même pour la touche de répudiation. Un éventuel changement de téléphone ou de ligne (carte SIM) est immédiatement signalé à chaque organisme émetteur et/ou gestionnaire d'une carte protégée par le dispositif selon l'invention par l'utilisateur ou, en son nom, par l'opérateur de télécommunication. Le téléphone est identifié aussi bien par son numéro d'identification unique (IMEI) que par la carte à puce d'identification (carte SIM) délivrée par l'opérateur de télécommunication et lui attribuant un numéro de téléphone. La sécurité est encore améliorée en combinant le numéro d'identification du téléphone avec celui de la carte SIM. La combinaison de ces deux numéros est par exemple une concaténation, une addition, ou, de préférence une multiplication. Dans l'exemple préféré de réalisation chacun des numéros d'identification du téléphone et de la carte SIM sont des nombres premiers de grandes longueurs choisis aléatoirement rendant très difficile de deviner quels nombres premiers sont utilisés parmi tous les nombres premiers. Dans le cas de sécurisation d'une pluralité de moyens de paiement 18.1, 18.2,... un nombre premier de grande longueur est associé dans la carte SIM à chaque moyen de paiement. Le serveur de sécurité de la banque 23 connaît au moins un des dits nombres premiers, avantageusement les deux, associés, par exemple, au moyen de paiement 18.1 à sécuriser. En variante, les deux nombres premiers associés à un moyen de paiement 18.1 sont répartis sur deux serveurs de sécurité coopérant mutuellement. Lors de l'initialisation de la transaction l'interrogation 12 est non seulement transmise par un canal sécurisé, mais en outre est cryptée par un algorithme du type « à clé publique et à clé privé » ou RSA les deux dits nombres premiers jouant les rôles de clé publique et de clé privée. Bien que les deux nombres premiers soit tenus secrets, de préférence, le nombre unique d'identification du téléphone (IMEI), commun à tous les moyens de paiement 18.1, 18.2,... ,18.n est considéré comme la clé publique. It is understood that a housing according to the unique invention, including a single phone, can ensure the security of a plurality of cards. Either a single validation server associates the box with a plurality of cards, or the validation server of each issuing agency and / or manager of such a card associates the card holder to its validation box, including his phone. It can be convenient, but not necessary, the same touch of the case the validation key for all the cards associated with said box. It is the same for the repudiation key. A possible change of telephone or line (SIM card) is immediately reported to each issuing agency and / or manager of a card protected by the device according to the invention by the user or, on his behalf, by the operator of telecommunication. The phone is identified by its unique identification number (IMEI) as well as by the identification smart card (SIM card) issued by the telecommunication operator and assigning a telephone number. Security is further enhanced by combining the identification number of the phone with that of the SIM card. The combination of these two numbers is for example a concatenation, an addition, or, preferably a multiplication. In the preferred embodiment each of the identification numbers of the telephone and the SIM card are prime numbers of randomly selected lengths making it very difficult to guess which prime numbers are used among all prime numbers. In the case of securing a plurality of payment means 18.1, 18.2, ... a prime number of great length is associated in the SIM card with each payment means. The security server of the bank 23 knows at least one of said prime numbers, preferably both, associated, for example, the payment means 18.1 to secure. Alternatively, the two prime numbers associated with a payment means 18.1 are distributed on two mutually cooperating security servers. During the initialization of the transaction, the interrogation 12 is not only transmitted by a secure channel, but is also encrypted by a "public key and private key" type algorithm, or RSA, the two so-called prime numbers playing the roles. public key and private key. Although the two prime numbers are kept secret, preferably, the unique identification number of the telephone (IMEI), common to all means of payment 18.1, 18.2, ..., 18.n is considered as the public key.
Le téléphone ou, de préférence, la carte SIM décode l'interrogation 12, et élabore une réponse de validation ou de répudiation 16 en fonction des touches 13 ou 14 saisit et crypte la réponse élaborée selon le même algorithme. Le téléphone émet la réponse 16 cryptée.  The telephone or, preferably, the SIM card decodes the interrogation 12, and elaborates a validation or repudiation response 16 according to the keys 13 or 14 captures and encrypts the response developed according to the same algorithm. The phone transmits the encrypted response 16.
En variante chaque moyen de paiement 18 sécurisé selon l'invention comporte des moyens (par exemple incorporés dans la puce 19) de mémorisation et d'émission, sur commande, d'une clé de cryptage considérée ici corne une clé publique; le téléphone, ou de préférence la carte SIM comportant la clé de cryptage considérée ici comme une clé privée. Lors de l'initialisation de la transaction, par exemple après la saisie du code confidentiel (PIN) l'appareil 21 initie l'émission de l'interrogation 12 et active la transmission de préférence cryptée, sur une courte portée de type Bluetooth, RFID, par contact ou autres, par la carte 18 de la clé publique vers le téléphone qui la présente à la carte SIM. Si nécessaire, l'appareil 21 assure l'alimentation électrique de la carte 18. D'autre part, le téléphone reçoit l'interrogation 12, en avertit l'utilisateur et la présente à la carte SIM. Le téléphone communique à la carte SIM si la touche de validation 13 ou de répudiation 14 a été saisie. La carte SIM décrypte à l'aide de sa clé privée l'interrogation 12, élabore, en fonction de la touche 13 ou 14 saisit la réponse correspondante attendue. La carte SIM crypte la réponse de préférence par la clé publique fournie par le moyen de paiement 18. Le téléphone émet la réponse avantageusement en tant qu'un SMS. Cette réponse est transmise à la banque 23 correspondant à la carte 18 utilisée. La banque 23 décrypte la réponse par la clé privée et si la réponse correspond à celle attendue avec saisie de la touche de validation 13 autorise la transaction. Il est à noter qu'une éventuelle interception de la clé publique ne permet pas d'effectuer une opération frauduleuse. Toutefois, le risque de cette interception peut être évité, soit en mémorisant directement les couples clé privée- clé publique avec une identification du moyen de paiement 18 associé dans la carte SIM l'interrogation 12 contenant en clair ou avec un cryptage différent de préférence plus faible que le cryptage RSA l'identification du moyen de paiement 18 correspondant à la transaction en cours ; soit la clé publique est transmise dans l'interrogation 12 en clair ou avec un cryptage différent de préférence plus faible que le cryptage RSA. As a variant, each secure payment means 18 according to the invention comprises means (for example, incorporated in the chip 19) for storing and sending, on command, an encryption key considered here as a public key; the telephone, or preferably the SIM card containing the encryption key considered here as a private key. During the initialization of the transaction, for example after the entry of the confidential code (PIN), the apparatus 21 initiates the transmission of the interrogation 12 and activates the preferably encrypted transmission over a short range of Bluetooth, RFID type. , by contact or other, by the card 18 of the public key to the phone that presents it to the SIM card. If necessary, the device 21 provides power to the card 18. On the other hand, the phone receives the interrogation 12, warns the user and presents it to the SIM card. The phone communicates to the SIM card if the validation key 13 or the repudiation key 14 has been entered. The SIM card decrypts with its private key interrogation 12, elaborates, according to the key 13 or 14 enters the corresponding response expected. The SIM card encrypts the preferred response by the public key provided by the payment means 18. The phone responds advantageously as an SMS. This response is transmitted to the bank 23 corresponding to the card 18 used. The bank 23 decrypts the response by the private key and if the answer corresponds to that expected with input of the validation key 13 authorizes the transaction. It should be noted that a possible interception of the public key does not make it possible to carry out a fraudulent operation. However, the risk of this interception can be avoided, either by directly memorizing the couples private key- public key with an identification of the means of payment 18 associated in the SIM card interrogation 12 containing in clear or with a different encryption preferably lower than the RSA encryption the identification of the means of payment 18 corresponding to the current transaction; either the public key is transmitted in the interrogation 12 in the clear or with a different encryption preferably lower than the RSA encryption.
Le cryptage RSA met en œuvre un nombre de bits (par exemple égal à 512, 1024, 2048, 4096, 8182 ou autre) qui est choisi en fonction du nombre de clients (boîtiers 10) et des moyens de paiement 18 à protéger pour disposer d'un nombre de nombres premiers suffisant pour attribuer les clés publiques et les clés privées. De préférence, conformément à la stratégie de cryptage RSA classique, on n'attribue qu'un faible pourcentage de nombres premiers disponibles comme clés de cryptage. En outre, un grand nombre de nombres premiers utilisables permet d'utiliser une clé privée unique par utilisateur (ou par carte SIM). Toutefois, d'une pluralité de clés privées par une carte SIM unique (typiquement une clé privée par moyen de paiement 18) ne sort pas du cadre de la présente invention. Dans un tel cas la carte SIM comporte avantageusement un tableau de correspondances entre moyens de paiement 18, ou entre clés publiques d'une part et les clés privées d'autre part. Il est bien entendu que l'attribution d'un même nombre en tant que clé (publique et/ou privée) à plusieurs utilisateurs ou plusieurs cartes, bien que non préféré, ne sort pas du cadre de la présente invention.  The RSA encryption implements a number of bits (for example equal to 512, 1024, 2048, 4096, 8182 or other) which is chosen according to the number of clients (boxes 10) and the payment means 18 to be protected to dispose of a number of prime numbers sufficient to allocate public keys and private keys. Preferably, in accordance with the conventional RSA encryption strategy, only a small percentage of available prime numbers are allocated as encryption keys. In addition, a large number of usable prime numbers makes it possible to use a single private key per user (or SIM card). However, a plurality of private keys by a single SIM card (typically a private key per payment means 18) is not outside the scope of the present invention. In such a case the SIM card advantageously comprises a table of correspondence between means of payment 18, or between public keys on the one hand and the private keys on the other hand. It is understood that the allocation of the same number as a key (public and / or private) to several users or several cards, although not preferred, is not outside the scope of the present invention.
Il est bien entendu que les moyens de protection compatibles peuvent être combinés sans sortir du cadre de la présente invention. Par exemple, la banque 23 ne validera une réponse attendue It is understood that the compatible protection means can be combined without departing from the scope of the present invention. For example, bank 23 will only validate an expected response
(correcte) que si elle provient d'un téléphone dont le numéro IMEI a été préalablement enregistré comme appartenant à l'utilisateur légitime. (correct) if it comes from a phone whose IMEI number has been previously registered as belonging to the legitimate user.
Dans la mesure où le boîtier 10 est le seul moyen dans lequel l'utilisateur peut avoir confiance il peut être avantageux de le munir avec des moyens de sécurité, notamment biométriques. Dans le cas de téléphone muni d'une caméra, celle-ci peut, par exemple, être utilisée pour comparer le fond de l'œil de l'utilisateur avec celui enregistré dans la carte SIM. La réponse 16 n'est élaborée uniquement en cas de correspondance. La validation biométrique est demandée à l'initialisation de l'application de sécurité selon l'invention, à chaque transaction, ou, avantageusement uniquement lors des transactions « risquées » telles que transaction d'un montant important, transaction effectuée d'un lieu où le client se rend rarement ou d'un lieu réputé pour des nombreuses tentatives de fraude.  Insofar as the housing 10 is the only means in which the user can have confidence it may be advantageous to provide it with security means, including biometric. In the case of phone with a camera, it can, for example, be used to compare the back of the eye of the user with that recorded in the SIM card. Answer 16 is developed only in case of correspondence. The biometric validation is requested at the initialization of the security application according to the invention, with each transaction, or, advantageously only during the "risky" transactions such as transaction of a significant amount, transaction made of a place where the customer seldom visits or from a reputable place for numerous attempts at fraud.
La présente invention s'applique à la sécurisation des transactions mettant en œuvre des moyens de paiement, notamment des cartes de paiement, des cartes de crédits, des cartes bancaires ou analogues. The present invention applies to securing transactions implementing payment means, including payment cards, credit cards, bank cards or the like.

Claims

REVENDICATIONS
1. Procédé de validation de transaction caractérisé en ce qu'il comporte les étapes suivantes : a- associer au moins un moyen de paiement (18.1, 18.2,... 18.n) à un dispositif autonome de validation (10) ; A method of transaction validation characterized in that it comprises the following steps: a- associating at least one payment means (18.1, 18.2, ... 18.n) with an autonomous validation device (10);
b- présenter le moyen de paiement (18.1) à un appareil (21) chargé d'effectuer une  b- present the means of payment (18.1) to a device (21) charged with performing a
transaction désirée, en vue d'effectuer ladite transaction ;  desired transaction, in order to effect said transaction;
c- effectuer une interrogation (12) dudit dispositif autonome de validation (10) ;  c- interrogating (12) said autonomous validation device (10);
d- effectuer une opération volontaire par le client sur ledit dispositif autonome de  d- perform a voluntary operation by the client on said autonomous device of
validation (10) caractéristique de la validation de la transaction ;  validation (10) characteristic of the transaction validation;
e- valider (16) et effectuer la transaction (27).  e-validate (16) and perform the transaction (27).
2. Procédé selon la revendication 1 caractérisé en ce que le dispositif autonome de validation (10) comporte une touche (13) de validation de transaction. 2. Method according to claim 1 characterized in that the autonomous validation device (10) comprises a key (13) for transaction validation.
3. Procédé selon la revendication 2 caractérisé en ce que le dispositif autonome de validation (10) comporte en outre une touche (14) de répudiation de transaction correspondant à un rejet de ladite transaction. 3. Method according to claim 2 characterized in that the autonomous validation device (10) further comprises a key (14) transaction repudiation corresponding to a rejection of said transaction.
4. Procédé selon l'une quelconque des revendications précédentes caractérisé en ce que 4. Method according to any one of the preceding claims, characterized in that
l'interrogation (12) et la validation (16) s'effectuent par l'intermédiaire d'un réseau téléphonique.  the interrogation (12) and the validation (16) are carried out via a telephone network.
5. Procédé selon la revendication 4 caractérisé en ce que ledit réseau téléphonique est un 5. Method according to claim 4 characterized in that said telephone network is a
réseau téléphonique sans fil, cellulaire, et en ce que le dispositif autonome de validation (10) est un téléphone cellulaire adapté à fonctionner avec un tel réseau.  wireless telephone network, cellular, and in that the autonomous validation device (10) is a cell phone adapted to operate with such a network.
6. Procédé selon la revendication 5 caractérisé en ce qui comporte en outre une étape de 6. Method according to claim 5 characterized in that further comprises a step of
configuration durant laquelle l'utilisateur désigne une des touches du téléphone comme touche de validation (13)  configuration during which the user designates one of the keys of the telephone as validation key (13)
7. Procédé selon l'une quelconque des revendications précédentes caractérisé en ce que la validation (16, 27) s'effectue par transmission d'un message crypté. 7. Method according to any one of the preceding claims, characterized in that the validation (16, 27) is carried out by transmission of an encrypted message.
8. Procédé selon la revendication 7 caractérisé en ce que le cryptage s'effectue par émission d'une occurrence prédéterminée d'un code pseudo-aléatoire à partir d'un générateur de code pseudo-aléatoire déterminé. 8. The method of claim 7 characterized in that the encryption is effected by transmitting a predetermined occurrence of a pseudo-random code from a determined pseudo-random code generator.
9. Dispositif autonome de validation (10) pour la mise en œuvre du procédé selon l'une 9. Autonomous validation device (10) for implementing the method according to one
quelconque des revendications précédentes caractérisé en ce qu'il comporte une interface de communication (11) susceptible d'émettre un signal caractéristique de l'appui sur une touche (13) de validation d'une transaction. any of the preceding claims characterized in that it comprises a communication interface (11) capable of emitting a signal characteristic of pressing a key (13) for validating a transaction.
10. Dispositif selon la revendication 9 caractérisé en ce que ledit dispositif est en outre un téléphone cellulaire muni d'un dispositif de cryptage (17) et en ce que une des touches du téléphone assure en outre la fonction de touche de validation. 10. Device according to claim 9 characterized in that said device is furthermore a cell phone provided with an encryption device (17) and in that one of the keys of the telephone further provides the function of validation key.
PCT/FR2013/000207 2012-08-02 2013-07-29 Secure payment method and device intended for implementing said method WO2014020244A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FRFR12/02164 2012-08-02
FR1202164A FR2994306B1 (en) 2012-08-02 2012-08-02 SECURE PAYMENT METHOD AND DEVICE FOR IMPLEMENTING SAID METHOD

Publications (1)

Publication Number Publication Date
WO2014020244A1 true WO2014020244A1 (en) 2014-02-06

Family

ID=47664323

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2013/000207 WO2014020244A1 (en) 2012-08-02 2013-07-29 Secure payment method and device intended for implementing said method

Country Status (2)

Country Link
FR (1) FR2994306B1 (en)
WO (1) WO2014020244A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5343529A (en) * 1993-09-28 1994-08-30 Milton Goldfine Transaction authentication using a centrally generated transaction identifier
US20090316903A1 (en) * 2006-05-01 2009-12-24 Gyun Tae Jeung Time sync-type otp generation device and method for mobile phones

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5343529A (en) * 1993-09-28 1994-08-30 Milton Goldfine Transaction authentication using a centrally generated transaction identifier
US20090316903A1 (en) * 2006-05-01 2009-12-24 Gyun Tae Jeung Time sync-type otp generation device and method for mobile phones

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DO VAN THANH ET AL: "Strong authentication with mobile phone as security token", MOBILE ADHOC AND SENSOR SYSTEMS, 2009. MASS '09. IEEE 6TH INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 12 October 2009 (2009-10-12), pages 777 - 782, XP031569142, ISBN: 978-1-4244-5113-5 *
HUNG-MIN SUN ET AL: "oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, IEEE, PISCATAWAY, NJ, US, vol. 7, no. 2, 1 April 2012 (2012-04-01), pages 651 - 663, XP011433659, ISSN: 1556-6013, DOI: 10.1109/TIFS.2011.2169958 *
MOHAMMED ALZOMAI ET AL: "The Mobile Phone as a Multi OTP Device Using Trusted Computing", NETWORK AND SYSTEM SECURITY (NSS), 2010 4TH INTERNATIONAL CONFERENCE ON, IEEE, PISCATAWAY, NJ, USA, 1 September 2010 (2010-09-01), pages 75 - 82, XP031801795, ISBN: 978-1-4244-8484-3 *

Also Published As

Publication number Publication date
FR2994306A1 (en) 2014-02-07
FR2994306B1 (en) 2016-11-18

Similar Documents

Publication Publication Date Title
EP1549011A1 (en) Communication method and system between a terminal and at least a communication device
EP2873045A1 (en) Secure electronic entity for authorizing a transaction
FR2892545A1 (en) METHOD AND DEVICE FOR JUSTIFYING MONETARY TRANSACTION
EP2119293B1 (en) Method and device for controlling the execution of at least one function in a short range wireless communication module of a mobile phone
EP2369780B1 (en) Method and system for validating a transaction, and corresponding transactional terminal and programme
FR2803961A1 (en) Securing of transactions carried out over the internet, uses non-reusable secret code generated by purchaser to identify purchaser to vendor and to third parties such as banks
EP3417592A1 (en) System for authenticating a user with a server
WO2017093182A1 (en) Payment method and device using said method
FR2832829A1 (en) Authentication of data sent or received by a user, uses mobile terminal and smart card carried by user to connect to authentication server
WO2009101347A1 (en) Method and system for dispensing banknotes from an automated teller machine
WO2014020244A1 (en) Secure payment method and device intended for implementing said method
EP1354288B1 (en) Method using electronic banking cards for making secure transactions
EP2053553A1 (en) Method and device for exchanging values between portable personal electronic entities
FR2829647A1 (en) Authentication of a transaction relating to acquisition and payment for goods and services, whereby authentication makes use of both Internet and mobile phone technology for transmission and validation of codes and passwords
EP2016700A1 (en) Terminal activation method
FR3051276B1 (en) METHODS OF IMPLEMENTING A TRANSACTION VIA A MOBILE TERMINAL
EP1308909B1 (en) Method for generating pseudo-random data in a chipcard, and associated authentication method and system
WO2017005644A1 (en) Method and system for controlling access to a service via a mobile media without a trusted intermediary
EP1965342A1 (en) Method of conducting a transaction between a payment module and a security module
EP1538571A1 (en) Identification method based on mobile equipment
FR3011111A1 (en) SECURING A TRANSMISSION OF IDENTIFICATION DATA
WO2022179986A1 (en) Payment card, authentication method and use for a remote payment
FR3038417A1 (en) SERVER AND METHOD FOR VERIFYING DYNAMIC SECURITY CODE
FR3111444A1 (en) Acquisition and secure processing method of acquired secret information
FR2980012A1 (en) Method for authenticating user to access bank payment terminal, involves authorizing realization of function if result of comparison of symbols of secret codes provided by user and by secure terminal is positive

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13776525

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: CONSTATATION DE LA PERTE D UN DROIT CONFORMEMENT A LA REGLE 112(1) CBE (OEB FORM 1205A DU 17.06.2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13776525

Country of ref document: EP

Kind code of ref document: A1