WO2015081899A1 - 一种用于物理介质数字化及实体店优化的数字令牌系统 - Google Patents
一种用于物理介质数字化及实体店优化的数字令牌系统 Download PDFInfo
- Publication number
- WO2015081899A1 WO2015081899A1 PCT/CN2014/093281 CN2014093281W WO2015081899A1 WO 2015081899 A1 WO2015081899 A1 WO 2015081899A1 CN 2014093281 W CN2014093281 W CN 2014093281W WO 2015081899 A1 WO2015081899 A1 WO 2015081899A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- digital
- store
- mobile device
- digital token
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/047—Payment circuits using payment protocols involving electronic receipts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/354—Card activation or deactivation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/006—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Definitions
- the present invention relates to the use of a Digital Token system to digitize physical media carrying information such as identification documents (including cards) and financial cards (including bank cards).
- Applying digital financial cards and other forms of the digital token system to physical store optimizations enables physical stores to use the mobile Internet's information technology to optimize checkout and shopping methods.
- the user uses ⁇ to display the physical medium carrying the information on the terminal of the same or another authority, and the terminal verifies by manual audit, automatic machine reading, or a combination of the two: The authenticity and integrity of the physical medium; the true relevance of the user to the physical medium carrying the information.
- Google Wallet scans and stores information from multiple financial cards in a smartphone, using a mobile card in a smartphone to select a specific card, via Near Field Communication (NFC). The technology transmits it to the financial card reading terminal to complete the transaction.
- NFC Near Field Communication
- Another example is the Coin system that is expected to be released to users in the summer of 2014 (see http://www.onlycoin.com, website visit) On November 14, 2013, the information of eight financial cards can be scanned and stored in a super card. Use ⁇ to press a button on the super card to select a financial card and complete the payment.
- Another type of shopping for offline traditional physical stores such as selecting items at physical stores and counters, determining the use of cash or credit card transactions after purchase.
- Existing physical stores have adopted some new technologies to improve the shopping experience of physical stores. For example, some brick-and-mortar stores in North America have adopted self-service checkout: Customers scan their purchases at the exit and pay by credit card.
- the physical store shopping with cash, bank card or digital wallet as payment means can solve the user's live experience, but has certain disadvantages compared with online shopping.
- a shopping cart is required to purchase more items, which takes up more aisle space and consumes a certain amount of physical strength of the buyer.
- the main object of the present invention is to provide a digital token system that can include physical media such as but not limited to identity documents (including cards) and financial cards. Digitizing.
- the digital token system, digital financial card and mobile internet information technology enable the store to optimize checkout and shopping methods.
- the present invention consists of the following parts.
- a generalized abstract design comprising an authority, a user and a token, a terminal.
- the present invention is based on a generalized ternary abstract design that is applicable to both traditional physical media and electronic media, including an Authority, a User and Token, and a Terminal (Terminal). ) Three elements.
- the user carries the token and moves.
- (3) The user uses a token or a distributed terminal (the terminal may be an authorized terminal of the same authority as described above to be associated with it in the background, or a relatively independent terminal, or an authorized terminal of another authority)
- the token must be guaranteed to be authentic and complete during its movement and use. In traditional physical media carrying information, this is ensured by the security mechanism of the physical medium; in electronic media applications (such as credit card applications for online purchases), this is guaranteed by digital encryption, digital signatures, and the like.
- the present invention provides a digital token system comprising the following components.
- the user submits a token issuance application to the registration authority of the authority (issuing agency).
- the registration authority checks user information.
- the system further includes:
- the issuing organization digitizes the approved user information and related information and encapsulates it in an electronic package (electronic
- This electronic package is called a Digital Token.
- the electronic package may contain one or more electronic files.
- the electronic package includes information printed on a physical medium corresponding to the information (for the identity document (including the card), such as the user's name, date of birth, date of issue, date of expiration, number of documents (including card) Etc.; for financial cards, such as the user's name, card number, expiration date, verification code, etc., and digitally corresponding hidden information on the physical medium carrying the information, may contain the corresponding physical information carrying the information Digital background images, digital photos, digital images of digital images
- biometric identifications such as, but not limited to, fingerprints, voiceprints, iris scanning, retinal scanning, and the like.
- the electronic package may contain an electronic simulation of the security mechanism on the physical medium carrying the information to implement an electronic form of the corresponding security mechanism, such as but not limited to: a digital fingerprint or a digital watermark ( Digital watermarking).
- Software is used to simulate hardware security mechanisms on physical media carrying information.
- Digital fingerprinting can further use encryption technology. These encrypted or unencrypted digital fingerprints can be distributed at different locations in the electronic package. Encrypted digital fingerprints can also be nested, ie encrypted segments contain encrypted segments.
- the electronic package itself can also be encrypted.
- the electronic package may use an information technology, such as but not limited to a digital certificate, to implement a digital signature to ensure the authenticity, integrity, and non-repudiation of the electronic package (non-repudiation). ) It is also possible to verify the contents of the electronic package directly at the terminal without using digital signature technology. In addition, the electronic package can be stamped with an unalterable digital time-stamping.
- an information technology such as but not limited to a digital certificate
- the system further includes:
- the issuing authority transmits the above digital token by wire or wireless or a combination of both (for example)
- the electronic transmission may be implemented in an encrypted or unencrypted manner.
- the electronic transmission can be implemented by pushing or pulling.
- the issuing authority may directly push the digital token, for example by email or directly to the user-specified mobile device, to the user. If the decrypted password is a static password, it can notify the user by SMS or mobile application SMS.
- the issuing institution may store the digital token on the security server, and inform the user to extract the network address and extract the password, and the user downloads the digital token by himself.
- the system further includes:
- the user stores each digital token originating from the same or different issuing authority in the mobile device.
- An ideal form of the mobile device is a smart phone, which has a built-in mobile application to implement management of digital tokens.
- the mobile device can be a simplified version of a portable digital token storage and management device.
- the mobile device should encrypt and store the digital token.
- Each digital token may be classified or encrypted in combination with a certain standard, such as, but not limited to, frequency of use.
- Classification encryption assigns individual digital tokens to different categories, each of which is individually encrypted.
- Hierarchical encryption is the implementation of two or more encryptions, with each digital token placed in a different encryption layer. If the user encrypts with their own private key, the private key should be additionally protected, placed in an external encrypted cloud, or placed on a separate smart card.
- the mobile device may be associated with one or more external cloud (Cloud) storage to implement the function of exporting the digital token to the cloud and deleting it from the local machine or importing from the cloud to achieve additional security. All or part of the digital tokens in the mobile device can also be backed up to the external cloud. If the technology of the mobile Internet can guarantee the availability of network connections and the cloud, all digital tokens can be stored in the cloud, and any digital token can be used on demand.
- Cloud external cloud
- the mobile device or a terminal device described later may visualize the content in the digital token to be displayed on the screen of the device, or generate a digital file (such as a digital picture or a pdf file, etc.) to simulate The visual appearance of the corresponding physical medium carrying the information for visual inspection or for copying or printing.
- the digital file can be digitally signed by the user, or stamped with a digital interstitial stamp, or both.
- the mobile device should authorize legitimate access to the digital token using a security method such as a Personal Identification Number (PIN) or fingerprint recognition.
- a security method such as a Personal Identification Number (PIN) or fingerprint recognition.
- the system further includes:
- the proxy card receives the digital token, and may be wired or connected to the mobile device, or may be wirelessly connected.
- the wireless connection method can be, but is not limited to, Near Field Communication (NFC).
- NFC Near Field Communication
- the size of the proxy card can be flexibly designed as long as it matches the corresponding reading terminal.
- the current proxy card size is based on the standard financial card size, that is, 85.60mm x 53.98mm in accordance with ISO/IEC 7810 Id-1 standard.
- the proxy card may have a corresponding dynamic writable storage module of the information storage module of the physical medium corresponding to the digital token to write related content in the digital token. For example, if a traditional financial card stores information in a magnetic strip, the proxy card should have a writable magnetic strip. When the proxy card receives a digital token corresponding to a financial card, the relevant information can be dynamically written to the magnetic strip for reading on the financial card terminal.
- the proxy card can also have, but is not limited to, EMV (Europay, MasterCard and
- the proxy card may be in a "reservation mode" or a "forgotten mode".
- reservation mode the digital token information received from the above mobile device can remain on the proxy card until the next time it is rewritten.
- the forget mode the information is automatically erased from the proxy card after a timeout or a limited number of times (for example, once).
- the proxy card in the reserve mode may require activation.
- the proxy card In the reserve mode, after the proxy card is overtime (timeout) or after a limited number of times (for example, once), it is automatically inactive. It is not necessary to download the same digital token from the above mobile device again before the next use, but it needs to be activated.
- the proxy card may have a write-back temporary storage unit for receiving write-back data from the slave terminal.
- the temporarily written writeback data is written back to the mobile device by wired or wireless synchronization, and then erased from the temporary storage unit of the proxy card.
- the proxy card mainly implements two functions.
- (A) exists in the form of a physical medium compatible with existing terminals.
- the proxy card may implement a "buffering" mode, that is, information on one proxy card that can simultaneously retain two or more digital tokens, and use one of the digital tokens at a specific moment.
- a proxy card compatible with a financial card digital token may have a duality mode, that is, a set of dynamically writable magnetic strips, a dynamically writable EMV chip, and a dynamically writable near field at different locations on both sides of the proxy card.
- a communication (NFC) chip that can simultaneously store the corresponding information of two digital tokens corresponding to the financial card.
- the user may have an additional proxy card for backup purposes.
- the system further includes:
- the terminal device checks the digital token.
- the terminal may be manual, machine automatic, or a combination of both.
- the terminal reads the data on the proxy card and performs verification. If the verification is passed, give the user the appropriate authority; otherwise, reject it.
- the terminal may be connected to the issuing mechanism of the digital token (that is, the terminal is an authorized terminal of the issuing authority), and access the background database for verification.
- the terminal may not be connected to the issuing mechanism of the digital token (that is, the authorized terminal of the terminal non-issuing mechanism), is a relatively independent terminal, or is connected to another issuing institution (ie, the terminal is another An authorized terminal of the issuing organization).
- the terminal is another An authorized terminal of the issuing organization.
- a digital token corresponding to a country's passport can be checked by a border agency in another country. The border agency only needs to verify the digital signature of the digital token to ensure its authenticity and integrity without having to connect to the passport issuing authority of the country of origin.
- the terminal may issue a new digital token, write back to the proxy card, synchronize to the mobile device, and hang down to the original digital token.
- a new digital token For example, but not limited to: A citizen of a country applies for a visa at the embassy or consulate of another country to present a digital token of his/her passport, and the visa officer issues a digital token for the visa of the country, which can be written back to the mobile device. And hang it under the digital token of the original passport.
- the system further includes:
- the verification infrastructure should verify the information within the digital token itself and/or the digital token.
- the widely used back-test infrastructure is the Public Key Infrastructure (PKl).
- PKl Public Key Infrastructure
- the system further includes: [0088] (8) After the digital token is verified, the user has the corresponding authority.
- the corresponding authority owned by the user through the digital token such as but not limited to: the passport digital token plus the visa digital token verified by the user is granted the border clearance right, and the verified credit card digital token is given to the user for the credit consumption. Right, and so on.
- the digital token may not be directly used, but is re-encoded for use. For example, but not limited to the following methods.
- the content of the digital token may be encoded as a visual code such as a two-dimensional code.
- the content of the digital token can be virtualized.
- the original financial khaki number, expiration date, verification code, etc. can be replaced with a corresponding set of virtual values.
- the content of the digital token may be further tokenized. That is, replace the original token with a token containing non-sensitive or limited-sensitive data.
- the lifetime of the re-encoded form of the digital token shall not be longer than the lifetime of the original digital token, and may be limited to a short life span or a limited number of uses (eg, one time). Recoding can also be changed as needed.
- the re-encoding of the digital token may add additional security, and may also make the digital token suitable for more terminal devices.
- the digital token can be used.
- Traditional methods such as telephone or mobile applications in mobile devices report loss.
- the issuing authority can revoke the old digital token and issue a new digital token close to the actual one.
- the above system implements digital production, distribution, and use of the digital tokens in addition to the mobile device storing the plurality of digital tokens and the proxy card that is given a digital token. Compared with traditional physical media carrying information, the system has greatly improved economics, efficiency, privacy and security, and has extremely broad application prospects.
- the digital token (or its re-encoded form) generated in the above system can be directly transmitted to the trusted terminal for verification and the corresponding authority of the authorization is directly transmitted on the Internet. For example, but not limited to: Users who are citizens of a country can electronically transmit their passport's digital token (or its re-encoded form) to an embassy or consulate in another country to apply for a visa.
- the library can The digital token issued by the country’s visa is also electronically transmitted back to the user.
- the digital token of the original passport or its re-encoded form can be used as the basis for the generation of the visa digital token, that is, the visa digital token is derived from the original passport digital token or its re-encoded form.
- the security of the above-mentioned remote use of digital tokens (or their re-encoded form) is ensured if digital signature (and encryption) techniques are used.
- the digital token itself in the above system may exist in the security server of the authority (issuing authority) or its designated other service provider (this "security server” may be centralized) Or decentralized; can also be multi-layered or nested; or both (centralized/decentralized +
- the user On layered/nested)), the user just obtains its re-encoding form, such as a tokenized form, as an index of the real token, which is obtained by the third party after the authorization is obtained through the index/tokenization form.
- a real token or another re-encoding form is obtained on the secure server.
- a user may have a digitally signed passport or a driver's license token index, and a third party is authorized to use the token index to obtain a digitized passport on a security server of an authority (issuing authority) or other service provider designated by it.
- Driver's license and its visual form In this way, the security, authenticity and authority of the token can be further enhanced.
- the above system is not only suitable for digitizing traditional physical documents (including cards), but also for digitizing any application that uses physical media to transfer information, such as but not limited to: paper ballots, faxes, various types of tickets (such as bank drafts). and many more.
- the above system is also applicable to the digitization of information that is not present but that is present on the available physical medium.
- the tag can be, but is not limited to, a Universal Product Code (UPC), a two-dimensional code, a Near Field Communication (NFC) tag, Radio Frequency Identification (RFID) tags, etc.
- UPC Universal Product Code
- NFC Near Field Communication
- RFID Radio Frequency Identification
- items can be swept directly into the mobile app using physical recognition technology.
- [0108] (4) Paying for the purchased item in the mobile application using the digital wallet technology that has been implemented or implemented by the above digital token system, and obtains the corresponding electronic receipt.
- the electronic receipt is a digital token issued by the store.
- the electronic receipt can be checked in one of two ways, semi-manual and automatic.
- the semi-manual method that is, the electronic receipt reader at the exit verifies the validity of the electronic receipt and displays the electronic or paper purchased list of goods by the clerk, and the clerk manually checks the purchased item in a manual manner. .
- the electronic receipt reader at the exit verifies the validity of the electronic receipt and visualizes the shopping item on a large screen display at the exit (preferably, the large screen is visible to the public) , that is, a digital photo of the corresponding item is displayed on the large screen.
- This method is sufficient in most cases to verify that the purchased product has been paid.
- More stringent verification methods can also be used, such as but not limited to: Dividing items into "weighable” and "non-weighable", and total weighing of all weighable items at the exit. The weighing item is subjected to the aforementioned visual large screen display.
- the physical store can use self-service checkout at the exit.
- the second optimization method for a physical store is no shopping cart shopping (hereinafter referred to as "car-free shopping").
- the basic idea of car-free shopping is to further extend the "inferiority" of the offline store to the "experience store” of the online store, so that its "live experience” is the advantage of attracting customers to shop.
- the basic principle is to divide the physical store into “showroom” and “storage space” (storage space, warehouse). 5 points, only samples are placed in the experience space for customer experience, or a certain number of small items. And the purchaseable goods are mainly placed in the warehouse in the background.
- the basic shopping process is as follows.
- the customer can take a break, take a short meal, coffee, read (electronic) books and other leisure activities, or continue shopping near the store, or perform other activities.
- the location can be a labeled locker
- the shopping cart may also be a shopping cart placed at a designated location (the shopping cart may be accompanied by an electronic tag that directly or indirectly corresponds to the electronic receipt and has a voice or flashing prompt).
- the store may reward the customers who quickly pick up the goods. How much rebate can be associated with the speed of picking up.
- the mobile internet technology of online shopping can be embedded, thereby realizing the retail shopping fusion on the offline to the line.
- browsing of online product reviews (revi ew), searching and application of online discounts or discount rolls for the desired shopping products, and price matching (pric e match) (also known as price protection) Protection)) Search and request (request) and other functions. If the price matching request cannot be accepted by the store, some costs can be automatically estimated to determine if it should be purchased now, such as but not limited to the following.
- the location service function of the mobile device is based on a GPS (Global Positioning System) to measure the distance from the store to the store. With the actual oil price, you can estimate the extra cost of the customer driving to the store.
- GPS Global Positioning System
- the mobile internet shopping technology can also be embedded in the aforementioned process of purchasing the distributed checkout.
- One ideal mode of the above mobile device is a smartphone.
- the physical store can provide mobile devices that are simplified in function and dedicated to car-free shopping, allowing customers to rent for free (required deposit)
- the customer After the purchase is completed, the customer must return the mobile device to the physical store.
- the above carless shopping method may be further optimized, such as but not limited to the following method.
- [0131] Applying an "indoor navigation" system.
- the customer inputs the keyword, number, etc. of the item in the mobile application, or uploads the photo of the item, and the mobile application quickly gives the indoor positioning information of the item, such as the shelf number; etc.; more ideally, can provide a visual "indoor map navigation" Information, visualizing the customer's current location, destination merchandise location, and (best) arrival route.
- the customer may choose to deliver the purchased item as a gift to another person's home.
- the customer informs the store of the parking space information through the mobile application.
- the parking space information can be obtained by the following but not limited methods: parking lot positioning system (such as GPS parking space positioning); assigning numbers to each parking space (similar to the numbering system of the airport parking lot), the customer inputting the parking space number himself; the customer inputting the license plate number The license plate number is then automatically scanned by the video monitor; the customer uses the storage bin (as described below) to store the car key, which has a number corresponding to the parking space number that is sent to the store.
- parking lot positioning system such as GPS parking space positioning
- (B) The customer places the car key in the storage box corresponding to the parking space.
- the storage compartment can be accessed by the customer and the store delivery personnel.
- (C) After the store stocks, the delivery personnel obtain the car keys and deliver them to the car trunk and/or the car, and return the car keys to the original storage box.
- the store pushes the delivery completion information to the customer by means of a mobile application or the like.
- the mobile application should record the storage bin number and/or visual storage bin positioning information to facilitate the customer to locate the storage bin storing the car key.
- the position of the storage box may not be limited to the following.
- the customer can choose not to use the storage box to exchange the car keys, but to receive the information that the goods will be delivered after the stocking is completed, and wait for the car.
- This method requires a high degree of synchronization between the customer and the delivery person, and requires a relatively accurate estimation of the approximate time that the delivery person arrives at the parking space.
- One possible solution is to display the current location of the delivery person and the approximate "remaining arrival time" in a "map" in the mobile application. This solution is more feasible for a single store, but for high-asynchronous situations, such as shopping in multiple adjacent stores, such as shopping malls and outlets, the results are not good.
- (A) The same delivery person can deliver items of multiple customers at a time. Items can be assigned to delivery personnel based on the proximity of the parking space and/or the proximity of the shipping space.
- the delivery personnel can be robotized, automated, and "unmanned”.
- the above car-free shopping method requires the physical store to quickly and accurately stock up after receiving the payment notification.
- physical store warehouses can use the following methods to improve stocking efficiency.
- the storage of the store's back-end warehouse can be optimized. For example, but not limited to: The best-selling items can be placed at the front end of the pick-up path, items can be sorted, and so on.
- the above car-free shopping method is applicable to all kinds of physical stores that require a shopping cart, and is particularly suitable for large warehouse stores such as Costco, large-sized goods stores such as IKEA, supermarkets such as Wal-Mart. (Walm art), shopping malls, direct sales malls and other physical stores with long shopping routes and many available items.
- shopping malls and direct sales malls can add lockers shared by multiple stores so that users can pick up items purchased from multiple stores from the same location.
- the above car-free shopping method is also applicable to transforming an original warehouse, a storage center, or even a freight center into a car-free shopping center.
- FIG. 1 lists the main modules of the car-free shopping method.
- a digital certificate such as the aforementioned passport, driver's license or any other document representing an identity.
- a digital token (Digital Token) system designed by the applicant of the present invention can complete digitization of passport, ID card, financial card, membership card and other physical media carrying information (digitalization)
- the present invention is not only applicable to digitizing traditional physical documents (including cards), but also digitally carrying any The physical medium of information, such as but not limited to: paper ballots, faxes, various types of notes (such as bank drafts, etc.). Particularly suitable, the present invention can digitize any physical medium carrying information carried by any user. The invention is also applicable to the digitization of information that is not present but that is present in the available physical medium.
- the digital token system and digitized financial card can create new physical store checkout and shopping methods.
- the following optimizations can be made to the physical store to form a new one.
- New checkout and shopping methods are beneficial to enhance the business method and shopping experience of a physical store, such as but not limited to the following.
- the car-free shopping method provides a similarly pleasing shopping experience in a physical store with additional advantages such as, but not limited to, the following.
- FIG. 1 lists the main modules of the shopping cartless shopping method.
- FIG. 2 is a diagram showing the main flow of a shopping cartless shopping method for a car based on wireless digital key control, based on FIG.
- FIG. 3 is a diagram showing the main flow of the shopping cart-free shopping method in which the customer finally extracts the merchandise based on FIG.
- FIG. 4 is a diagram showing the main flow of a shopping cart-free shopping method for a vehicle based on a conventional physical key control, based on FIG.
- FIG. 5 is a mode comparison of a physical medium financial card and a digital financial card of the system.
- the user submits a credit card application to a financial institution.
- the financial institution checks the user's credit history and other user information and decides whether to approve the application.
- the financial institution electronically encapsulates the information (including the signed digital photo and the digital background image on both sides of the credit card) stored in the traditional physical credit card into the electronic package, which is called the credit card.
- Digital token The financial institution must digitally sign the digital token. Digital signatures are based on public key infrastructure (PKI).
- the above digital token can be activated by a conventional telephone, short message or from a mobile application. (4) Repeating the above (1) to (3) The user may store a plurality of digital tokens issued by the same or different financial institutions in the same mobile device.
- the mobile device is connected to one or more external cloud storages to implement functions such as exporting some or all of the digital tokens to the cloud, importing from the cloud, backing up to the cloud, recovering from the cloud, and the like.
- the storage system of the digital token in the mobile device exists in an encrypted manner.
- One of the ideal forms of the above mobile device is a smartphone. Smartphones manage digital tokens through mobile applications. Access to mobile applications requires password entry or fingerprint authentication.
- the proxy card may receive a re-encoded form of a digital token from the mobile device at a given time
- the agent card is a credit card sized card, size 85.60mm x in accordance with ISO/IEC 7810 Id-1
- the agent card has a dynamic writable magnetic strip, a dynamic writable EMV chip, a dynamic writable near field communication (NFC) chip, and the like.
- the information receiving temporary storage unit is implemented by a near field communication tag (NFC tag).
- a card application similar to the use of a conventional credit card is required, and the mobile application dynamically applies for a copy of the digital token to the financial institution's secure server via the mobile Internet based on the original digital token.
- the lifetime is not longer than the lifetime of the original digital token, set to be limited to a short lifetime or limited use
- the temporary digital token is transmitted from the above mobile device to the proxy card through Near Field Communication (NFC) technology.
- NFC Near Field Communication
- the dynamic writeable near field communication chip then dynamically writes its content to a magnetic strip, EMV chip and/or near field communication (NFC) chip corresponding to a conventional physical credit card, as needed.
- the power required for the dynamic write operation of the proxy card should be provided by the mobile device via wired or wireless powered technology.
- each transaction limit of the proxy card can be set, daily (and week, month, etc.)
- the proxy card has two working modes: “reserved mode” or "forgotten mode”.
- the proxy card In the reservation mode, information received from the mobile device described above may remain on the proxy card until the next rewrite. In this mode, there is an option in the mobile application of the above mobile device to set whether the proxy card needs to be activated. If the activation option is set, the proxy card will enter the inactive state after a period of use, and must be activated from the mobile device before the next use. [0203] In the forgetting mode, the information is automatically erased from the proxy card after reading or after a limited number of times (for example, one time). Over-the-counter values or a limited number of values are set from the mobile device. In this mode, the proxy card must be booted from the mobile device above and receive a digital token from the mobile device for use.
- the proxy card has a duality mode, that is, a set of dynamic writable magnetic strips, a dynamic writable EMV chip, and a dynamic writable near field communication (NFC) chip respectively at different positions on both sides of the proxy card, thereby The corresponding information contained in the digital tokens of the two credit cards can be stored simultaneously.
- a duality mode that is, a set of dynamic writable magnetic strips, a dynamic writable EMV chip, and a dynamic writable near field communication (NFC) chip respectively at different positions on both sides of the proxy card, thereby The corresponding information contained in the digital tokens of the two credit cards can be stored simultaneously.
- the user may have an additional proxy card as a backup for the original card to be lost.
- the mobile application managed by the digital token in the proxy card and the mobile device must be paired with each other's activation key (key): If the presence of the other party cannot be detected, one of the parties cannot be started separately. As such, losing only one of them will not cause any security breach.
- a conventional credit card terminal device can read a magnetic stripe, an EMV chip, or an NFC chip to complete a credit card transaction.
- the terminal device supports direct reading of the digital token, in particular, the digital token uses digital signature technology, the terminal verifies the authenticity, integrity and relevance of the digital token through the Internet, and reads Its content.
- the background infrastructure provides a verification service for the terminal.
- the terminal is directly compatible with reading the digital token stored on the mobile device, and the hardware and software security measures on the mobile device can ensure that only one digital token selected by the user can be used by the terminal. Access, the proxy card can be cancelled in this scenario.
- the cancellation of the proxy card has caused the above mobile application to evolve into a digital wallet similar to Google Wallet.
- a proxy card Whether or not a proxy card is used, a credit card digital token (or a temporary digital token associated therewith) stored on the mobile device can be used for financial payments for mobile applications in the mobile device. Based on this, in the case of a car controlled by a wireless digital key, a flow of delivery to a shopping cart without a shopping cart in a car parked by a customer is as follows.
- the customer parks in the parking lot of the physical store, snatches the car-free shopping mobile application, and is based on the mobile device
- a location service function such as Wi-Fi or GPS locates the current physical store, and check-in the mobile Internet shopping service connected to the physical store in the mobile application.
- the service can be, but is not limited to, a mobile web app or a mobile app.
- the customer can use the mobile web application or mobile application provided by the physical store of the current location.
- the customer applies the "indoor navigation" system.
- the customer inputs the keyword, number, etc. of the item in the mobile application, or uploads the photo of the item, and the mobile application quickly gives the indoor positioning information of the product, such as the shelf number, and gives a visualized "indoor map navigation" information, visualizing The customer's current location, destination merchandise location, and (best) arrival line.
- the (location) function is based on GPS (Global Positioning System) to measure the distance traveled to the store, supplemented by the actual oil price, to estimate the additional cost of the customer driving to the store.
- GPS Global Positioning System
- Each item may be designated to be delivered to the parking space by the store, delivered to the customer's home, or delivered as a gift to someone else's home.
- [0223] (4) Paying for the shopping item in the mobile application using the digital wallet that has been implemented or implemented by the above digital token system, and obtains the corresponding electronic receipt.
- the electronic receipt is a digital token issued by the store.
- the parking space information is obtained by: parking lot positioning system (such as GPS parking space positioning); assigning number to each parking space (similar to the numbering system of the airport parking lot), the customer enters the parking space number The customer enters the license plate number, and then the license plate number is automatically scanned by the video monitor; the storage box used by the customer to store the car key has a number corresponding to the parking space number, which is sent to the store. At the same time, the customer sends a license to the car to access the digital token to the store so that the delivery person can use the digital token to smash the trunk and/or the car.
- parking lot positioning system such as GPS parking space positioning
- assigning number to each parking space similar to the numbering system of the airport parking lot
- the customer enters the parking space number
- the license plate number is automatically scanned by the video monitor
- the storage box used by the customer to store the car key has a number corresponding to the parking space number, which is sent to the store.
- the customer sends a license to the car to access the digital token to the
- the delivery personnel will deliver the goods to the parking space by the delivery personnel, and use the aforementioned car to access the digital token to smash the trunk and/or the car to place the items.
- FIG. 2 depicts the main flow of the car-free shopping method of the above-described car controlled by a wireless digital key.
- the user submits a credit card application to a financial institution.
- the financial institution checks the user's credit history and other user information and decides whether to approve the application.
- the financial institution electronically encapsulates the information (including the signed digital photo and the digital background image on both sides of the credit card) stored in the traditional physical credit card into the electronic package, which is called the credit card. Digital token.
- the financial institution can digitally sign the digital token.
- Digital signatures can be based on, but not limited to, public key infrastructure (PKI).
- Digitally signed digital tokens may contain additional information such as, but not limited to, digital photos of the user and other digitized biometrics such as fingerprints, voice prints, iris scans, retinal scans, and the like.
- the financial institution additionally encrypts the digital token described above, and electronically transmits to the storage accessible by the user in a manner such as, but not limited to, an email sent to the user or directly pushed to the user's mobile device. In space.
- the decrypted password is communicated to the user in a manner such as, but not limited to, a text message or a phone call.
- the user obtains the encrypted packet and decodes it to restore the digital token as described above and stores it in the mobile device.
- the financial institution may store the digital token on its own secure server, and notify the user of the digital token by way of, for example, but not limited to, an email, an instant message, a short message, or a phone call.
- the download address and the extracted password are downloaded by the user to their mobile device.
- the above digital token can be activated by a conventional telephone, short message or from a mobile application.
- the mobile device can be connected to one or more external cloud storages to implement functions such as exporting some or all of the digital tokens to the cloud, importing from the cloud, backing up to the cloud, recovering from the cloud, and the like.
- the storage system of the digital token in the mobile device should be encrypted.
- Each digital token may be classified according to certain criteria, such as, but not limited to, frequency of use, further classified encryption or layered encryption, or a combination of the two.
- Classification encryption is to assign individual digital tokens to different categories, each of which is individually encrypted.
- Hierarchical encryption implements two or more layers of encryption. Each digital token is placed in a different encryption layer. The most frequently used digital token can be placed in the top-level encryption layer. If the user encrypts the digital token with his or her private key, the private key should be additionally protected, placed in an external encrypted cloud, or preferably placed on a separate smart card.
- Smartphones manage digital tokens through mobile applications. Access to mobile applications may require secure authorization such as password entry.
- a mobile device dedicated to digital token storage and management can be designed
- the form of the mobile device can be flexibly designed, and one form is a companion card of the following proxy card, that is, the mobile device acts as a card case of the following proxy card.
- the companion card itself is a card that is slightly larger than the proxy card size, and has a card slot for the proxy card.
- the companion card has a display screen that displays all the information in the digital token that corresponds to the traditional physical card.
- the input interface can be a touch screen, or for a simplified design and cost savings, it can be a numeric keyboard like a traditional telephone keyboard (numeric
- Each digital token can be passed to a companion card from a personal computer's operating system (OS), such as but not limited to the Windows platform, through a dedicated accessory.
- OS operating system
- the companion card can be activated by entering a personal identification number (PIN) or verifying the user's fingerprint (no proxy card) , as described below, the companion card cannot be activated).
- PIN personal identification number
- no proxy card verifying the user's fingerprint
- the user can choose to have a smartphone and a companion card at the same time, and the digital tokens in the smartphone and companion card can be directly wired or wirelessly synchronized.
- the proxy card may receive a digital token from the mobile device at a given time.
- the agent card is a credit card sized card, size 85.60mm x in accordance with ISO/IEC 7810 Id-1
- the agent card has an information receiving temporary storage unit, a write-back unit, a dynamic writable magnetic strip, a dynamic writable EMV chip, a dynamic writable near field communication (NFC) chip, and the like.
- the information receiving temporary storage unit can be implemented by, but not limited to, a near field communication tag (NFC tag).
- the information receiving temporary storage unit that transmits a digital token to the proxy card from the above mobile device via a wireless technology such as, but not limited to, Near Field Communication (NFC) technology.
- NFC Near Field Communication
- the content is then dynamically written as needed to the magnetic stripe, EM V chip and/or near field communication (NFC) chip corresponding to a conventional physical credit card.
- the information in the temporary storage unit is deleted.
- the temporary storage unit is a near field communication tag, which can be combined with a writeable near field communication (NFC) chip of the corresponding credit card.
- the power required for the dynamic write operation of the proxy card should be provided by the mobile device via wired or wireless powered technology. If the external power supply technology on the mobile device is temporarily unavailable, the battery on the proxy card should be rechargeable or replaceable to save maintenance costs.
- the digital token uses digital signature technology
- the content of the digital token does not need to be dynamically written into the magnetic strip, the EMV chip, and the near Field communication (NFC) chip, etc., but directly retained in the information receiving temporary storage unit of the proxy card.
- the above-mentioned dynamic writable magnetic stripe, dynamic writable EMV chip, and dynamic writable near field communication (NFC) chip are designed to be compatible with conventional terminal devices.
- each transaction limit of the proxy card Through the mobile application of the mobile device, each transaction limit of the proxy card, the number of transactions per day (and week, month, etc.), the daily (and weekly, monthly, etc.) transaction limit, and the like can be set.
- the proxy card has two working modes: “reserved mode” or "forgotten mode”.
- the proxy card In the reservation mode, information received from the mobile device described above may remain on the proxy card until the next rewrite. In this mode, there is an option in the mobile app of the above mobile device to set whether the proxy card needs to be activated. . If the activation option is set, the proxy card will enter the inactive state after a period of use, and must be activated from the mobile device before the next use.
- a preferred design is: the mobile device is a companion card, and after the partner card is activated by inputting a personal identification number (PIN) or verifying the user's fingerprint, the extraction operation of the agent card is automatically triggered to activate the proxy card;
- the device is a smart phone, and a special protective cover can be designed for it.
- the protective cover has an additional card slot on the back of the smart phone for placing the proxy card, and the mechanism for activating the proxy card on the aforementioned companion card is also applicable. For smartphones.
- the information is automatically erased from the proxy card after the reading or after a limited number of times (for example, one time).
- Super-values or a limited number of values can be set from the mobile device.
- the proxy card In this mode, the proxy card must be booted from the mobile device above and receive a digital token from the mobile device for use.
- the mobile device If there is no writeback data on the proxy card, optionally, once the proxy card is activated, the mobile device starts a timer, and the proxy card must back-tap the mobile device before it is exceeded. To enter the deactivated state, otherwise the alarm will be triggered to alert the user that the proxy card may be lost.
- the write back data is stored in the write back unit of the proxy card.
- the proxy card must call back to the mobile device to synchronize the writeback data back to the mobile device, the writeback data is cleared from the writeback unit of the proxy card, and then the proxy card enters an inactive state.
- the mobile device has a digital token that can be written back, preferably, the mobile device should be connected to an external cloud.
- the mobile device After the write-back data is synchronized from the proxy card to the mobile device, the mobile device further synchronizes it to the cloud. Once the mobile device is lost, the digital token can be written back to recover from the cloud. If the mobile device is lost and the writeback digital token is not synced back to the cloud, you should use one of the following two methods.
- the proxy card may have a "buffer" mode, that is, two or more digital tokens may be reserved on one proxy card. Information, using information about one of the digital tokens at a particular moment.
- a proxy card has a duality mode, that is, a set of dynamic writable magnetic strips, a dynamic writable EMV chip, and dynamic writable near field communication (NFC) at different positions on both sides of the proxy card.
- the chip can thus store the corresponding information contained in the digital tokens of the two credit cards.
- the user may have an additional proxy card as a backup for the original card to be lost.
- the mobile application managed by the digital token in the proxy card and the mobile device must be paired with each other's activation key (key): If one cannot detect the presence of the other party, one of the parties cannot be started separately. As such, losing only one of them will not cause any security breach.
- proxy card in the reserve mode without activation requirements can be used separately (the mobile application still needs the proxy card as the startup key). If the proxy card is lost, it should be replaced and replaced, and its corresponding digital token should be reported separately and updated.
- its data can be automatically erased.
- a super- ⁇ (eg 72 hours) mechanism of the companion card can be set. During this period, the companion card is not used normally and is automatically locked. Alternatively, its data can be automatically erased.
- the terminal device checks the digital token.
- a conventional credit card terminal device can read a magnetic stripe, an EMV chip, or an NFC chip to complete a credit card transaction.
- the terminal device supports direct reading of the digital token, in particular the digital token uses digital signature technology, the terminal should verify the authenticity, integrity and relevance of the digital token, and read it content.
- the background infrastructure provides a verification service for the terminal.
- the proxy card can be canceled in this solution.
- the cancellation of the proxy card has caused the above mobile application to evolve into a digital wallet similar to Google Wallet.
- the digital token after selecting a digital token in the mobile device, the digital token may not be directly used, but may be re-encoded for use. For example, but not limited to the following methods.
- the content of the digital token may be encoded as a visual code such as a two-dimensional code.
- the content of the digital token can be virtualized.
- the original financial khaki number, expiration date, verification code, etc. can be replaced with a corresponding set of virtual values.
- the content of the digital token may be further tokenized. That is, replace the original token with a token containing non-sensitive or limited-sensitive data.
- the lifetime of the re-encoding of the digital token should be no longer than the lifetime of the original digital token, and can be set to be limited to a short lifetime or a limited number of times (eg, one time). Recoding can also be changed as needed.
- the re-encoding of the digital token may add additional security, and may also make the digital token suitable for more terminal devices.
- FIG. 5 shows the mode comparison between the physical media financial card and the digital financial card of the system.
- the tag may be, but not limited to, a Universal Product Code (UPC), a two-dimensional code, a Near Field Communication (NFC) tag, a Radio Frequency Identification (RFID) tag, or the like.
- UPC Universal Product Code
- NFC Near Field Communication
- RFID Radio Frequency Identification
- Customers can browse online View online reviews of the item, search for and apply the corresponding offer or discount volume, search and request price matching, and more.
- objects can be scanned directly using physical recognition techniques.
- the electronic receipt can be checked by a semi-manual method, that is, the electronic receipt reader at the exit verifies the validity of the electronic receipt and displays the electronic or paper purchased list of goods by the clerk, and the clerk takes the form of artificial visual inspection. Check the purchased items.
- the electronic receipt can be checked in an automatic manner.
- An electronic receipt reader at the exit verifies the validity of the electronic receipt and visualizes the purchased item on a large screen display at the exit (preferably, the large screen is visible to the public), ie displaying the corresponding item on a large screen Digital photo.
- More rigorous verification methods can also be used, such as but not limited to: Dividing items into "weighable” and “non-weighable", and performing total weight weighing on all weighable items at the exit. The weighing item is subjected to the aforementioned visual large screen display.
- a second implementation of physical store optimization is shopping without a shopping cart.
- the customer enters the physical store, snatches the car-free shopping mobile application, and uses the mobile device to provide location services based on Wi-Fi or GPS (location)
- the function locates the current physical store, check-in the mobile Internet shopping service connected to the physical store in the mobile application.
- the service can be, but is not limited to, a mobile web app or a mobile app.
- the customer can use the mobile web application or mobile application provided by the physical store of the current location.
- the customer can apply the "indoor navigation" system.
- the customer inputs the keyword, number, etc. of the item in the mobile application, or uploads the photo of the item, and the mobile application quickly gives the indoor positioning information of the item, such as the shelf number; etc.; more ideally, can provide a visual "indoor map navigation" Information, visualizing the customer's current location, destination merchandise location, and (best) arrival route.
- the customer can see the inventory amount of each item in the physical store.
- the quantity (or weight) of each item to be purchased can be specified separately. If the store does not have enough stock, you can choose other similar products in the store and choose whether to pick up or deliver the goods.
- the (location) function is based on GPS (Global Positioning System) to measure the distance traveled to the store, supplemented by the actual oil price, which can estimate the additional cost of the customer driving to the store.
- GPS Global Positioning System
- Each item can be designated to be picked up at the store, delivered to the customer's home, or delivered as a gift to someone else's home.
- [0304] (4) Paying for the shopping item in the mobile application using the digital wallet that has been implemented or implemented by the above digital token system, and obtains the corresponding electronic receipt.
- the electronic receipt is a digital token issued by the store.
- the customer returns to the pick-up area of the physical store, extracts the purchased goods from the locker, or uses the The electronic receipt triggers a voice or flashing prompt corresponding to the electronic tag on the shopping cart to find the shopping cart. If the locker uses an electronic lock, the above electronic receipt is used as a corresponding locker for the electronic key snoring. In order to facilitate and pick up the goods, the store can reward the customers who quickly pick up the goods. How much to return is associated with the speed of picking up.
- FIG. 3 depicts the main flow of the above car-free shopping method.
- a storehouse shared by a plurality of stores may be provided at a gathering place of a plurality of stores such as a shopping mall and a direct sales mall, so that the user extracts items purchased by a plurality of stores from the same place.
- the above-mentioned car-free shopping mobile application may be centrally managed, such as but not limited to: customers can view The stocking status of each store; When all stores are stocked, the mobile app posts a summary prompt to inform the user to pick up the goods.
- a location service function such as Wi-Fi or GPS locates the current physical store and checks-in the mobile Internet shopping service associated with the physical store in the mobile application.
- This service can be, but is not limited to, a mobile web app or a mobile app.
- the customer can use the mobile web application or mobile application provided by the physical store of the current location.
- the customer can apply the "indoor navigation" system.
- the customer inputs the keyword, number, etc. of the item in the mobile application, or uploads the photo of the item, and the mobile application quickly gives the indoor positioning information of the item, such as the shelf number; etc.; more ideally, can provide a visual "indoor map navigation" Information, visualizing the customer's current location, destination merchandise location, and (best) arrival route.
- the (location) function is based on GPS (Global Positioning System) to measure the distance traveled to the store, supplemented by the actual oil price, which can estimate the additional cost of the customer driving to the store.
- GPS Global Positioning System
- Each item may be designated to be delivered to the parking space by the store, delivered to the customer's home, or delivered as a gift to another's home.
- the parking space information can be obtained by, but not limited to, the following: parking lot positioning system (such as G PS parking space positioning); assigning numbers to each parking space (similar to the numbering system of the airport parking lot), the customer inputting the parking space number himself; No., then the license plate number is automatically scanned by the video monitor; the storage box used by the customer to store the car key has a number corresponding to the parking space number, and the number is sent to the store.
- parking lot positioning system such as G PS parking space positioning
- the store pushes the delivery completion information to the customer by means of a mobile application message or the like.
- FIG. 4 depicts the above-described car-free shopping method using a conventional physical key controlled car as an example. The main process.
- the digital token system of the present invention has other broad embodiments. E.g:
- (A) The user subscribes to and pays for the hotel room online, obtains the digital token issued by the hotel, and stores it in the mobile device. At the hotel site, the user circumvents the check-in procedure and goes directly to the door of the room. The digital token is sent wirelessly to the reader at the door for verification.
- the door lock in the user's home is a wireless digital lock that the user can control.
- the user can issue a digital token to the person or other person as a digital key, authorizing the shackle to enter the house.
- Wirelessly networked cars can use digital tokens to control driver/passenger door locks and trunk locks.
- a digital certificate such as the aforementioned passport, driver's license or any other document representing an identity.
- the digital token system of the present invention can complete the digitization of passports, ID cards, financial cards, membership cards and other physical media carrying information, thereby reducing or avoiding the production of physical media and improving Efficient issuance and use, and greatly enhances privacy and security; it also applies to the digitization of information that is not present but is available on physical media. Similar to e-mail and other electronic communication methods gradually replacing paper media communication and greatly affecting the post office letter business, the present invention will gradually replace the production and distribution of traditional physical documents and physical cards, and greatly affect the business and efficiency of government agencies and financial institutions. The impact of research and the direction of computer security is further biased towards software security from hardware security.
- the car-free shopping method based on the digital token system will greatly enhance the advantages of traditional physical stores compared to online stores and minimize their disadvantages, and realize the true integration of offline and online businesses.
- the car-free shopping method is compatible with existing shopping cart shopping methods, enabling a gradual shift from car shopping to car-free shopping.
- the car-free shopping method is also suitable for transforming the original storage center and even the freight center into a car-free shopping center.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP14867795.8A EP3174240A4 (en) | 2013-12-08 | 2014-12-08 | Digital token system for physical medium digitalization and physical store optimization |
CA2978920A CA2978920A1 (en) | 2013-12-08 | 2014-12-08 | Digital token system for physical medium digitalization and physical store optimization |
US15/102,272 US20170169422A1 (en) | 2013-12-08 | 2014-12-08 | Digital Token System for Physical Medium Digitalization and Physical Store Optimization |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310668451 | 2013-12-08 | ||
CN201310668451.8 | 2013-12-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015081899A1 true WO2015081899A1 (zh) | 2015-06-11 |
Family
ID=53272917
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/093281 WO2015081899A1 (zh) | 2013-12-08 | 2014-12-08 | 一种用于物理介质数字化及实体店优化的数字令牌系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20170169422A1 (zh) |
EP (1) | EP3174240A4 (zh) |
CA (1) | CA2978920A1 (zh) |
WO (1) | WO2015081899A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111052164A (zh) * | 2017-08-30 | 2020-04-21 | 乐天株式会社 | 结算系统、结算方法以及程序 |
US10701059B2 (en) | 2015-12-29 | 2020-06-30 | Morphotrust Usa, Llc | Onboard vehicle digital identification transmission |
WO2021048860A1 (en) * | 2019-09-12 | 2021-03-18 | Or-Oz Ltd. | Method and system for providing packages in a shopping environment |
Families Citing this family (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130311382A1 (en) * | 2012-05-21 | 2013-11-21 | Klaus S. Fosmark | Obtaining information for a payment transaction |
CN105264487B (zh) * | 2013-03-15 | 2018-09-07 | 美国邮政管理局 | 身份验证系统和方法 |
EP2843605A1 (en) * | 2013-08-30 | 2015-03-04 | Gemalto SA | Method for authenticating transactions |
US10356651B2 (en) | 2014-07-17 | 2019-07-16 | Cirrent, Inc. | Controlled connection of a wireless device to a network |
US10834592B2 (en) | 2014-07-17 | 2020-11-10 | Cirrent, Inc. | Securing credential distribution |
US9942756B2 (en) | 2014-07-17 | 2018-04-10 | Cirrent, Inc. | Securing credential distribution |
US10154409B2 (en) | 2014-07-17 | 2018-12-11 | Cirrent, Inc. | Binding an authenticated user with a wireless device |
US20160171581A1 (en) * | 2014-12-11 | 2016-06-16 | Toshiba Global Commerce Solutions Holdings Corporation | Apparatus and method for locating products in a retail store using a mobile device |
US10200359B1 (en) * | 2015-06-30 | 2019-02-05 | Symantec Corporation | Systems and methods for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services |
JP6658000B2 (ja) * | 2016-01-27 | 2020-03-04 | 株式会社リコー | 情報処理装置、画像出力制御方法およびプログラム |
US11170373B2 (en) * | 2016-10-21 | 2021-11-09 | Mastercard International Incorporated | Single screen mobile checkout |
CN108460591A (zh) * | 2017-02-22 | 2018-08-28 | 阿里巴巴集团控股有限公司 | 支付处理方法及装置、交易方法和移动设备 |
FR3073643B1 (fr) * | 2017-11-10 | 2021-03-12 | Imprimeria Nat Sa | Procede d'obtention d'une identite numerique de niveau de securite eleve |
US11449875B1 (en) * | 2018-01-12 | 2022-09-20 | Wells Fargo Bank, N.A. | Organizational and personal identity verification and validation |
JP6958369B2 (ja) * | 2018-01-12 | 2021-11-02 | トヨタ自動車株式会社 | 判定システム、判定方法、及び、認証情報制御システム |
US10796016B2 (en) | 2018-03-28 | 2020-10-06 | Visa International Service Association | Untethered resource distribution and management |
CN109448263A (zh) * | 2018-10-11 | 2019-03-08 | 苏州诚满信息技术有限公司 | 一种基于移动支付的购物品存储设备及其工作方法 |
US20220044504A1 (en) * | 2018-12-16 | 2022-02-10 | Biig Technologies Inc. | Smart license plate vault |
US11196737B2 (en) | 2019-04-30 | 2021-12-07 | Bank Of America Corporation | System for secondary authentication via contactless distribution of dynamic resources |
US10998937B2 (en) | 2019-04-30 | 2021-05-04 | Bank Of America Corporation | Embedded tag for resource distribution |
US11234235B2 (en) | 2019-04-30 | 2022-01-25 | Bank Of America Corporation | Resource distribution hub generation on a mobile device |
US10970014B2 (en) | 2019-05-28 | 2021-04-06 | Kyocera Document Solutions Inc. | Authentication of user at a device using a mobile application |
US10768873B1 (en) * | 2019-05-28 | 2020-09-08 | Kyocera Document Solutions Inc. | Authentication system for printing at a device using a mobile application |
US10831424B1 (en) | 2019-05-28 | 2020-11-10 | Kyocera Document Solutions Inc. | Authentication system with refresh tokens to print using a mobile application |
US10963202B2 (en) | 2019-05-28 | 2021-03-30 | Kyocera Document Solutions Inc. | Authentication system using a code with a mobile application |
US11790471B2 (en) | 2019-09-06 | 2023-10-17 | United States Postal Service | System and method of providing identity verification services |
US11250119B2 (en) | 2020-07-09 | 2022-02-15 | Bank Of America Corporation | Mobile device as a computer authenticator |
JP7363693B2 (ja) * | 2020-07-17 | 2023-10-18 | トヨタ自動車株式会社 | 配車システム、情報処理装置及び配車処理方法 |
DE102021117792A1 (de) | 2021-07-09 | 2023-01-12 | Bks Gmbh | Verfahren, Vorrichtungen und System zum Zugriff auf eine Produktionseinrichtung |
US11908262B2 (en) | 2021-11-18 | 2024-02-20 | Capital One Services, Llc | Token based secure access to a locker system |
US20230239137A1 (en) * | 2022-01-27 | 2023-07-27 | International Business Machines Corporation | Linking a physical identifier to a digital identifier |
US20230319031A1 (en) * | 2022-03-31 | 2023-10-05 | Capital One Services, Llc | Verification based on an encrypted representation of a physical identifier associated with a user |
TWI818647B (zh) * | 2022-07-27 | 2023-10-11 | 東海大學 | 即時動態組成任意尺寸庫位的方法及其系統 |
CN117113385B (zh) * | 2023-10-25 | 2024-03-01 | 成都乐超人科技有限公司 | 一种应用于用户信息加密的数据提取方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1383100A (zh) * | 2001-04-27 | 2002-12-04 | Kde株式会社 | 使用电子钱包的消费卡结帐方法 |
CN101884188A (zh) * | 2007-07-12 | 2010-11-10 | 创新投资有限责任公司 | 身份鉴别和受保护访问系统、组件和方法 |
CN102339431A (zh) * | 2010-07-22 | 2012-02-01 | 优乐福有限公司 | 利用通讯设备的即时付款服务方法 |
CN103426109A (zh) * | 2013-05-09 | 2013-12-04 | 陈飞 | 一种实现无购物车的商品选购的方法及系统 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3574559B2 (ja) * | 1998-01-27 | 2004-10-06 | 株式会社エヌ・ティ・ティ・データ | 電子チケットシステム、回収端末、サービス提供端末、利用者端末、電子チケット回収方法及び記録媒体 |
US7263497B1 (en) * | 1998-02-06 | 2007-08-28 | Microsoft Corporation | Secure online music distribution system |
US7599847B2 (en) * | 2000-06-09 | 2009-10-06 | Airport America | Automated internet based interactive travel planning and management system |
US20030070072A1 (en) * | 2001-10-09 | 2003-04-10 | Nick Nassiri | System and method of identity and signature and document authentication using a video conference |
KR20030072852A (ko) * | 2002-03-07 | 2003-09-19 | 인터내셔널 비지네스 머신즈 코포레이션 | 전자티켓을 구매하고 인증하기 위한 시스템 및 방법 |
US20130054470A1 (en) * | 2010-01-08 | 2013-02-28 | Blackhawk Network, Inc. | System for Payment via Electronic Wallet |
US20170046679A1 (en) * | 2004-04-09 | 2017-02-16 | Blackhawk Network, Inc. | Systems and methods for mimicking post-paid user experience with stored-value card accounts |
US8485442B2 (en) * | 2009-07-02 | 2013-07-16 | Biometric Payment Solutions | Electronic transaction verification system with biometric authentication |
WO2013123438A1 (en) * | 2012-02-15 | 2013-08-22 | Blackhawk Network, Inc | System and method of registering stored-value cards into electronic wallets |
US8676709B2 (en) * | 2012-07-31 | 2014-03-18 | Google Inc. | Merchant category codes in a proxy card transaction |
US20140278881A1 (en) * | 2013-03-14 | 2014-09-18 | Snipsnap App, Llc | Automated Method and System for Coupon Vision and Interpretation With Selective Use of Human Assisted Processing |
US9721147B1 (en) * | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
-
2014
- 2014-12-08 US US15/102,272 patent/US20170169422A1/en active Pending
- 2014-12-08 WO PCT/CN2014/093281 patent/WO2015081899A1/zh active Application Filing
- 2014-12-08 CA CA2978920A patent/CA2978920A1/en active Pending
- 2014-12-08 EP EP14867795.8A patent/EP3174240A4/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1383100A (zh) * | 2001-04-27 | 2002-12-04 | Kde株式会社 | 使用电子钱包的消费卡结帐方法 |
CN101884188A (zh) * | 2007-07-12 | 2010-11-10 | 创新投资有限责任公司 | 身份鉴别和受保护访问系统、组件和方法 |
CN102339431A (zh) * | 2010-07-22 | 2012-02-01 | 优乐福有限公司 | 利用通讯设备的即时付款服务方法 |
CN103426109A (zh) * | 2013-05-09 | 2013-12-04 | 陈飞 | 一种实现无购物车的商品选购的方法及系统 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3174240A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10701059B2 (en) | 2015-12-29 | 2020-06-30 | Morphotrust Usa, Llc | Onboard vehicle digital identification transmission |
US11444933B2 (en) | 2015-12-29 | 2022-09-13 | Idemia Identity & Security USA LLC | Onboard vehicle digital identification transmission |
US11743248B2 (en) | 2015-12-29 | 2023-08-29 | Idemia Identity & Security USA LLC | Onboard vehicle digital identification transmission |
CN111052164A (zh) * | 2017-08-30 | 2020-04-21 | 乐天株式会社 | 结算系统、结算方法以及程序 |
CN111052164B (zh) * | 2017-08-30 | 2023-09-15 | 乐天集团股份有限公司 | 结算系统、结算方法以及程序 |
WO2021048860A1 (en) * | 2019-09-12 | 2021-03-18 | Or-Oz Ltd. | Method and system for providing packages in a shopping environment |
Also Published As
Publication number | Publication date |
---|---|
CA2978920A1 (en) | 2015-06-11 |
EP3174240A1 (en) | 2017-05-31 |
US20170169422A1 (en) | 2017-06-15 |
EP3174240A4 (en) | 2018-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015081899A1 (zh) | 一种用于物理介质数字化及实体店优化的数字令牌系统 | |
JP6257005B2 (ja) | 還付システム及び方法 | |
US10262334B2 (en) | Electronic brand authentication method using scannable codes | |
JP7497809B2 (ja) | 自動販売方法、装置及びプログラム | |
CN104115172B (zh) | 网络可访问销售点设备实例 | |
US7900825B2 (en) | Electronic money system and transaction method using the same | |
US20190258814A1 (en) | Secure data delivery system | |
US7131574B1 (en) | Optical memory card based e-commerce business method | |
US20140229305A1 (en) | Real time paperless payment control | |
US11373148B2 (en) | Trash collection systems and methods | |
KR102256259B1 (ko) | 쇼케이스 공간 렌탈을 이용한 비대면 물품 거래 시스템 및 이의 관리방법 | |
US10665047B1 (en) | Methods and apparatus for accessing secured physical assets | |
US20230126016A1 (en) | Tokenization of collectibles and related methods | |
US11727437B2 (en) | Secure data delivery system | |
US20200058024A1 (en) | Method and system for automatically receiving and/or emitting information related to transactions | |
EP1901221A1 (en) | Settlement system using card settlement terminal | |
WO2015130771A1 (en) | Retail customer management system | |
WO2012143547A1 (en) | Real time paperless payment control | |
GB2536003A (en) | Ticketing system & Method | |
KR101172488B1 (ko) | 여권 관리 시스템 및 방법 | |
WO2021215193A1 (ja) | 情報処理装置、情報処理方法及び記録媒体 | |
JP3551891B2 (ja) | 商品受け取り・支払いシステムおよび方法 | |
JP4436699B2 (ja) | 金融取引システム及び該金融取引システムにおける金融取引書類の取扱方法 | |
JP6145319B2 (ja) | 個人等情報制御システム | |
WO2023183636A1 (en) | Secure data delivery system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14867795 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016562054 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2014867795 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2014867795 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15102272 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2978920 Country of ref document: CA |