WO2021054854A1 - Génération et utilisation d'un modèle numérique de confiance de document - Google Patents

Génération et utilisation d'un modèle numérique de confiance de document Download PDF

Info

Publication number
WO2021054854A1
WO2021054854A1 PCT/RU2019/000830 RU2019000830W WO2021054854A1 WO 2021054854 A1 WO2021054854 A1 WO 2021054854A1 RU 2019000830 W RU2019000830 W RU 2019000830W WO 2021054854 A1 WO2021054854 A1 WO 2021054854A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
digital image
application
security element
trusted
Prior art date
Application number
PCT/RU2019/000830
Other languages
English (en)
Russian (ru)
Inventor
Александр Юрьевич БАРАНОВ
Original Assignee
Александр Юрьевич БАРАНОВ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Александр Юрьевич БАРАНОВ filed Critical Александр Юрьевич БАРАНОВ
Publication of WO2021054854A1 publication Critical patent/WO2021054854A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the claimed invention is aimed at creating a reliable image of a digital document on a tangible medium and using it as a full-fledged digital document, be it a passport, travel document or bank card.
  • the invention is aimed at describing the principle of secure tokenization of applications on contactless smart cards (hardware tokens, security elements), their storage and management of tokenized document images. State of the art.
  • a device for tokenizing the confidentiality of payments is known (RU 2602394).
  • This solution proposes to convert orders of tokenized payment for purchases into the movement of funds for payment of purchases between the accounts of multiple issuers.
  • the PPT receives a token arbitration request from a merchant containing unambiguous, source-independent, universally resolvable payment token information for processing a purchase order from a user.
  • the PPT queries the token database for information about the issuer using the payment token information and obtains the information about the issuer. Based on the information about the payment token, the PPT also determines that the user should be prompted for payment options, and transmits the request for payment options to the user's mobile device.
  • the PPT Upon receiving a response from the mobile device, the PPT generates a purchase authorization request based on the payment options and predefined settings for the issuers to be contacted in order to process the purchase order, and transmits the generated authorization request to the issuer.
  • a token requestor eg, a token requestor
  • parameters for generating a token to control and customize the token generation process For example, requesting a token a party can specify (for example, select from a list or provide a list) the accounts to be tokenized. Accounts can be identified using account identifiers (such as account numbers) or bank identification numbers (BIN).
  • the party requesting the token can also specify encryption keys for the generated tokens.
  • the party requesting the token can also specify additional parameters, such as notification thresholds indicating when token-related notifications should be generated.
  • a patent is known (WO 2016193227).
  • the NCE-based software application acts as an interface / proxy and handles insensitive security functions, while a trusted application in TEE and an applet on SE interact to handling security-sensitive functions.
  • An end-to-end security relationship can be established between the SIM, TEE, and SAM (Secure Authentication Module) provided for a second NFC-enabled device (eg, a contactless reader) that communicates with the first device in a contactless manner.
  • SAM Secure Authentication Module
  • the solution integrates NSE, TEE, SE and SAM to provide secure contactless applications and also supports advanced security measures.
  • a patent has also been identified from the prior art (EP2048590).
  • the invention relates to a method for communication between a secure processor with a terminal interface, by means of which the terminal interface sends a request for the desired interaction with a software module.
  • the method is performed in such a way that the terminal interface or digital processor connected to the terminal interface integrates the template into the request for the desired interaction, the template including information about the class of interactions with which the desired interaction consists in the fact that the subscriber identity module contains at least two different software modules and that the secure processor (10) and / or the mobile device that is connected to the secure processor contains a selector in which the selector is able to parse the pattern, the selector specifying the class of interactions to which the request belongs, and that the selector makes the selection a selectable software module, in which the choice is influenced by the interaction class to which the desired interaction belongs.
  • a method of simplifying a transaction between a first party and a second party is known (W02005059693).
  • the system to facilitate the transaction between the first party and the second party is operated by a trusted third party system and is programmed to carrying out the method by receiving instructions from the first party to fulfill at least part of the obligations of the first party in said transaction.
  • the system communicates with the other party and provides the other party with tangible assurance that the other party is communicating with the trusted third party system through the system.
  • the system communicates information to the second party to ensure that the instructions of the first party have been or will be followed.
  • trust in the third party is transferred to the first party, and the second party can trust that the obligations of the first party have been or will be fulfilled.
  • the user has a secureelement (embeddedsecureelement) that stores information (from just a number as an identifier (Proximity / RFIDcards) to complex structures such as a bank card (EMVpaymentcards) or national documents (elD, ePassport, mobilelD, ICAO , elDAS, NationallD, Driverlicense, Insurancecard)).
  • a secure medium certified by the Common Criteria Certification Evaluation AssuranceLevel (CCEAL) is accepted by the industry as proof of high reliability and ensures that current hacking methods are more expensive than the information they contain (principle of sufficiency).
  • terminals are used for contactless exchange with a secure medium, within which, due to the power of the polyterminal, contact with the secure medium is ensured and a two-way exchange is carried out according to a predetermined exchange protocol (specification).
  • a predetermined exchange protocol for banking transactions, this is compliance with the requirements for ContactlessEMV (cEMV).
  • cEMV ContactlessEMV
  • Transport and national documents may have their own national standards and specifications.
  • identification a secure medium contains a private and public key inside it.
  • the public key only allows data to be encrypted, the private key allows decryption.
  • the terminal requests the public key from the card, generates random data, encrypts it with the public key of the secure medium and gives it to the carrier.
  • the carrier decrypts the data with its private key (which never leaves the carrier) and gives it to the terminal for comparison. If the data matches, the terminal considers the provided secure medium to be genuine.
  • both the carrier and the terminal possess keys to mutually sign / authenticate the exchange and ensure that there are no forgeries or man-in-middle attacks on security.
  • the terminal is classically a two-chip (two chips) solution, in which one chip is a transmitter (NFCanalogfront-end, transmiter, transceiver, transceiver) of an analog signal in accordance with the requirements for the quality and size of the generated field (for ContactlessEMV EMVL certification rules apply1).
  • the transmitter does not know anything about the security of the exchange.
  • the second chip (microcontroller, microprocessor) is used to create an exchange session, check the card for validity, read data and then transfer it in the required exchange formats to a workstation (computer, mobile phone).
  • the microcontroller must contain various blocks of encryption and secure storage of access keys, which, in the event of a hack, will be reset to zero to prevent compromise of the infrastructure as a whole.
  • microcircuits have become available on the market that physically contain in the same housing both a transmitter and a security element that meets the requirements of CCEAL.
  • the security element contains applets that emulate banking, transport and access control cards, that is, they work in the sagb-net1abop mode (a common example is ApplePay or GooglePay).
  • microcircuits can also contain applets of another type - implementing the functionality of a contactless reader (readermodeapplet).
  • readermodeapplet By implementing applets in readermode, it is possible to provide unprecedented security for reading and then storing a data image from a secure medium.
  • POS contactless reader
  • mPOS contactless reader
  • the application access keys are stored on the security element (on the user card) and encryption keys data for acquiring.
  • the security element on the user card
  • encryption keys data for acquiring.
  • the exit from the security element of the terminal only encrypted data is released, which is necessary for the acquiring bank to conduct a transaction within the framework of the payment system.
  • high security, flexibility and low cost of the payment terminal solution are achieved.
  • the objective of this invention is to create a trusted image of a digital document on one secure medium (namely, on its security element) for use by any external applications and in order to create a trusted (non-falsified) image of a digital document (passport, bank card, transport card , national identity, etc.), which can continue to act in the KYC (KnowYourCustomer) procedure.
  • KYC KnowYourCustomer
  • a secure medium means any device with a secure microchip (security element) or a secure execution unit (SecureElement, TrustedExecutionEnvironment) and a contactless reading unit controlled by it — such.
  • a smartphone or wearable device can act as such a secure medium, but is not limited to these form factors.
  • the technical result of the claimed invention is to create a trusted image of a digital document on a single secure medium for use by any third-party applications. Since the entire exchange procedure takes place in a contactless exchange session and the data is stored directly in the same microcircuit (in the security element), using the declared method and systems, a trusted and unforgeable image of a digital document (passport, bank card, transport card, national identity, etc.) etc.), which can further act in the KYC (KnowYourCustomer) procedure.
  • KYC KnowYourCustomer
  • the technical result is achieved in the invention by a method of creating a trusted digital image of a document, which consists in supplying a signal to a security element located on a secure medium through a communication bus to launch an application; reading data recorded on the readable document medium using an application residing on the same security element; verification of the authenticity of the data recorded on the medium of the readable document with a public digital certificate; verification of the validity of the certificate; creation on the same element security of the digital image of the document; storing a digital image of a document on the same security element with the ability to read it.
  • a trusted digital image of a document by a third-party application which consists in creating a trusted digital image of a document according to the above method and providing a digital image of a document for a third-party application using an application located on the same security element, or Providing a trusted digital image of a document for a third-party application using an application located outside the security element.
  • the created digital image of the document is additionally signed with a certificate located on the security element; reading is contactless; reading is performed using an application that allows contactless, safe reading of data, i.e. the possibility of compromising the communication channel is excluded due to the fact that both applications are located in an environment with the highest level of trust (security); the encryption of the document image is performed by the asymmetric encryption mechanism; the encryption of the document image is performed by the symmetric encryption mechanism.
  • microcircuits physically containing a transmitter and a chip made in accordance with the requirements of CCEAL (CommonCriteriaCertificationEvaluationAssuranceLevel - the level of ensuring the assessment of an IT product or system, which is a numerical rating assigned after completion of the safety assessment according to common criteria, which is an international standard).
  • CCEAL CommonCriteriaCertificationEvaluationAssuranceLevel
  • the environment with the highest level of trust is a hardware-software environment in which the possibility of introducing software viruses, substitution of software or exchange data, unauthorized access is minimized or excluded.
  • a trusted environment can be, inter alia, a system that uses hardware and software to ensure the simultaneous processing of information of different categories of secrecy by a group of users without violating access rights.
  • the system for creating a trusted digital image of the document (according to independent paragraph 11), containing the medium of the readable document; controller for working with a safety element; a secure medium, which includes a communication bus and a security element, with an application installed on it for safe reading, verification and digital imaging.
  • system for creating a trusted digital image of a document further comprises a server on which an application is installed that verifies the validity of the certificate of the read document; and / or additionally comprises means for communicating with the controller.
  • a system for using a trusted digital image of a document by a third-party application comprising a system for creating a trusted digital image of a document according to claim 11, and an application located on a security element for providing a digital image of a document, or an application outside the security element to provide a digital image of the document.
  • system for using a trusted digital document image further comprises a user interface; and / or contains additional controller for working with the application for providing a digital image of a document.
  • Figure 1 shows a diagram of an implementation of a method for creating a trusted digital image of a document.
  • Figure 2 shows a diagram of an implementation of a method for using a trusted digital document image, including a method for creating a trusted digital document image.
  • Figure 3 shows a system for implementing a method for creating a trusted digital image of a document.
  • Figure 4 shows a system for implementing a method for creating a trusted digital image of a document, in which the controller is located on a secure medium.
  • Figure 5 depicts a system for implementing a method for creating a trusted digital image of a document, which includes an additional controller located in the communication means.
  • Figure 6 illustrates a system for implementing a method for using a trusted digital document image, in which an application is located on a security element to provide a digital document image.
  • Figure 7 illustrates a system for implementing a method for using a trusted digital document image, in which an application is located outside a security element to provide a digital document image.
  • Position 1 is an operation of signaling a security element located on the secure medium via a communication bus to start an application
  • Position 2 an operation of reading data recorded on the medium of the readable document using an application located on the same security element;
  • Position 3 the operation of verifying the validity of the data recorded on the medium of the readable document by a public digital certificate;
  • Position 6 an operation of storing a digital image of a document on the same security element with the ability to read it.
  • Position 7 the operation of providing a trusted digital image of a document for the operation of a third-party application using the application, either located on the same security element, or located outside the security element.
  • Item 12 application for secure reading, verification and digital imaging
  • Position 13 - an application that verifies the validity of the certificate of the read document, located on the server.
  • Item 16 - a controller for working with an application for providing a digital image of a document
  • Item 17 communication device controller
  • Position 21 is an application located on a security element for providing a digital image of a document.
  • Position 22 is an application located outside the security element for providing a digital image of a document.
  • the method for creating a trusted digital image of a document is characterized by seven sequential steps, namely (see figure 1):
  • the signal 1 to the safety element 11 through the communication bus 10 to launch the application is carried out by the controller 8 (or controller 17) using the application 12.
  • the controller 8 can be built into the housing of the safe medium 9.
  • a controller 17 is used, which is located on the communication means 18 (smartphone, tablet, personal computer).
  • Application (12) is used to implement data exchange between the secure medium 9 and the medium of the readable document 14.
  • an asymmetric serial bus can be used for communication, for example, I2C or SPI bus.
  • 2 data written on the readable document medium 14 are read using the application 12 located on the security element 11.
  • the application 12 carries out the process of reading, processing and storing the result of the application in the security element 11, according to a pre-configured script or script configured while the application is running 12.
  • the security element 11 requests a public key from the medium 14 containing readable data , generates random data, encrypts it with a public key and gives it to the carrier 14 containing the data to be read.
  • Media 14, containing the readable data, with its private key (which never leaves the carrier) decrypts the data and gives the security element 11 of the secure carrier 9 for comparison. If the data match, then the secure medium 9 considers the information located on the readable medium 14 to be genuine.
  • application (12) can use the asymmetric encryption mechanism.
  • Verification 4 of the validity of the certificate itself that is, the verification that it was generated by a valid issuer can occur using a previously saved chain of certificates in the application (12) or using a sequential hierarchical verification of the validity of the certificate, through a request from a special server 15 and work with Appendix 13.
  • the image of the digital document is created 5 using the application 12.
  • the data of the digital image of the document does not leave the security element 11, and the application 12 only controls the sequence of the creation process (the sequence of actions for creating a digital image of the document).
  • Saving 7 of a digital image of a document is as follows: application 12 performs primary data processing and writes the results to the security element 11 of the secure medium 9, thus creating a tokenized product. This creates a trusted digital image of the document with the possibility of subsequent interaction with it by applications 12, 21 located on the security element, for example, through the Shareable interface (JCOP) or the like, or by application 22 located outside the security element.
  • JCOP Shareable interface
  • the method of using a trusted digital image of a document in addition to creating, also includes the stage of providing a digital image of a document, respectively, a method of using a trusted image of a digital document is characterized by sequential actions, namely (see Fig. 2):
  • the digital image of the document on the secure medium 9 can implement the specification of the readable document. Due to this, the verified data of the document being read, read and processed within the secure environment of the security element 11, can be accessed from the application 12, 21 or from the application 22 in the corresponding data exchange specification, for example, ContactlessEMV or ICAO. [0091] In addition, the method enables contactless reading of digital image data.
  • Reading takes place using an application (21 or 22) that allows contactless, secure reading of data, due to the fact that both applications are located in an environment with the highest level of trust (security), i. E. the possibility of data compromise in the communication channel is minimized.
  • a trusted digital image of a document it is possible to select a trusted digital image of a document to provide the third-party application 20 automatically using the application by recognition. For example, by geolocation, upon hitting which a particular product is activated. Or temporary scenarios - one product is active in the morning, another one in the evening, or a combination of the above.
  • such material objects are used as: secure carrier 9; safety element 11; communication bus 10; controller 8 (16, 17); the carrier of the readable document 14; terminal; communication means 18; user interface 19, server 15.
  • a secure medium 9 is used, generating a field (electromagnetic field) into which the medium 14 of a readable document is introduced, it can be considered that in this method there is a process of influence of one material object on another with the help of material means ...
  • the material means are electromagnetic waves, located both in the field around the safe carrier 9 and the security element 11.
  • the material object (security element I) is exposed to electromagnetic waves of a given configuration (creating a digital image of the document), as a result of which its internal structure changes according to a pattern that allows you to use a digital image of a document.
  • a trusted digital image of a document such as a passport, bank card, transport card and national identity, created by these methods is a trusted digital image of the document.
  • the system for creating a trusted digital image of a document according to claim 11 can be implemented in various versions.
  • a system for creating a trusted digital document image comprises:
  • a secure medium 9 including a communication bus 10 and a security element 11 with an application 12 and possibly an application 21 installed thereon.
  • application 12 and application 21 are a single whole application.
  • the controller 8 is installed on the secure medium 9, and at other times the controller 8 is a stand-alone device. Moreover, the controller 8 sends a signal through the communication bus 10 to the security element 11 to launch the application 12.
  • the main element of the system for creating a trusted digital image of the document is the secure medium 9, which includes the communication bus 10 and the safety element 11, with the application (12) installed on it, the controller 8, which generates the signal 1.
  • the controller 8 is connected via the communication bus 10 to the safety element.
  • the secure medium 9 can be made in the form of an electronic medium module, in the form of a hardware token, placed in a smartphone or in a hard or soft case with a security element 11 placed inside it, a controller 8 connected to the safety element 11 via the communication bus 10.
  • the design of the safety carrier 9 is not limited to the above-mentioned construction models.
  • a security element 11 for example, you can use a security chip or a microcircuit physically containing in one housing a transmitter and a security element (not shown in the figures) with the fulfillment of the CC EAL requirement.
  • Security element 11 has various applets or trustlets installed.
  • the secure medium 9 is designed so that it is possible to write / create non-forged, trusted images of a digital document (passport, bank card, transport card, national identity, etc.) on it.
  • the security element 11, located on the secure medium 9 can contain either one or several digital images of the document. Switching between digital images of the document is carried out using the controller 8 (or 16). Safe medium 9 may additionally contain a connector connected to the controller 17.
  • a readable document carrier 14 containing a readable document which may be a passport, bank card, transport card, national identity, and so on.
  • the system for creating a trusted digital image of a document implements the creation of a digital image of a document, as follows:
  • the controller 8 located on the secure medium 9 sends a signal 1 to the security element 11 located on the secure medium 9 via the communication bus 10 to launch the application 12. Then, from the medium 14 of the readable document located in the immediate vicinity of the secure medium 9, the readout occurs 2 data. After that, as a result of the exchange of information (data) between the secure medium 9 and the medium 14 of the readable document, the validity of the data recorded on the medium 14 of the readable document is verified 3 with a public digital certificate, after which the validity of the certificate is verified 4, then 5 is created on the security element 11 digital image of the document, with the subsequent storage of 6 digital image of the document on the security element 11 with the ability to read it by the application (12, 21).
  • system further comprises a server 15 that verifies the validity of the certificate using application 13.
  • the system for creating a trusted digital image of a document comprises: [00111] - a secure medium 9, including a communication bus 10 and a security element 11, with an application 12 installed on it and possibly an application 21. [00112] - a medium of a readable document 14,
  • the communication means 18 can be a mobile phone, a tablet, a personal computer etc.
  • the system for creating a trusted digital image of a document shown in figure 5, implements the creation of a digital image of a document, as follows:
  • the controller 17 Located on the communication means 18, the controller 17 sends a signal 1 to the safety element 11 located on the safe medium 9 through the communication bus 10 (which can be either a separate element or a structural element of the safe medium 9 or the communication means 18) for launching the application 12.
  • data 2 is read from the medium 14 of the readable document located in the immediate vicinity of the secure medium 9.
  • the validity of the data recorded on the medium 14 of the readable document is verified by a public digital certificate, after which the validity of the certificate is verified 4 by checking that the certificate is generated by a valid issuer using the pre-stored codes in Appendix 12.
  • a system for using a trusted digital document image comprises:
  • a secure medium 9 including a communication bus 10; safety element 11, with installed on it application 12 and application 21; a controller 8 connected via a communication bus 10 to a safety element 11, which generates a signal; (it is possible to have a user interface 19, in Fig. 6 it is not indicated, which makes it possible to select the module of the safe reading program 12. Moreover, a keyboard, button, switch, etc. can be used as the user interface 19).
  • the controller 8 located on the secure medium 9 feeds 1 signal to the security element AND located on the secure medium 9 via the communication bus 10 to launch the application 12. Then, the readout occurs from the medium 14 of the readable document located in the immediate vicinity of the secure medium 9. 2 data. After that, as a result of the exchange of information (data) between the secure medium 9 and the medium 14 of the readable document, the validity of the data recorded on the medium 14 of the readable document is verified by a public digital certificate, after which the validity of the certificate is verified 4 by checking that the certificate is generated by a valid issuer using the pre-stored codes in Appendix 12.
  • a system for using a trusted digital document image contains
  • a secure medium 9 including a communication bus 10; safety element 11, with installed on it application 12 and application 21;
  • a system for using a trusted digital document image comprises
  • a secure medium 9 including a communication bus 10; safety element 11, with installed on it application 12 and application 21;
  • a communication means 18 comprising a user interface 19 allowing selection of an application module 12; processor 17 (controller), on which the application 22 is installed.
  • the system for using a trusted digital document image implements the creation and use of a digital document image, as follows:
  • the controller 8 sends a signal 1 to the safety element 11 located on the secure medium 9 through the communication bus 10 (which can be either a separate element or a structural element of the secure medium 9 or communication means 18) to launch the application 12.
  • Next data 2 is read from the readable document carrier 14 located in the immediate vicinity of the secure medium 9.
  • the validity of the data recorded on the medium 14 of the readable document is verified by a public digital certificate, after which the validity of the certificate is verified 4 by sending a request from the secure medium 9 to server 15 and receive a response.
  • the 7th digital image of the document is provided by the application 22 located on the communication means 18 for the operation of a third-party application 20.
  • the user has the opportunity, when providing 8 a digital image of the document, using the user interface 19 (located on the communication means 18), to select the application module 12 located on the security element 11 of the secure medium 9.
  • systems for using a trusted digital image of a document allow not only to create a reliable image of a digital document on one material medium, but also to use it by third-party applications, located on the terminal.
  • the terminal can be represented both as a separate device and as a module for a more complex system (for example, a device connected to a personal computer).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un système de génération et d'utilisation d'un modèle numérique de confiance d'un document, et un modèle numérique de document créé selon ce procédé, qui consiste à créer un modèle de confiance d'un document numérique sur un seul support sécurisé en vue de son utilisation par de quelconques applications auxiliaires. Toute la procédure d'échange se produit dans une session d'échange sans contact et des données sont sauvegardées directement dans ce même microcircuit (élément de sécurité), et on génère un modèle numérique de confiance et infalsifiable du document numérique (passeport, carte bancaire, carte de transport, carte nationale d'identité, etc.) qui peut ensuite être utilisé dans une procédure KYC (Know your Customer). Ce procédé de génération d'un modèle numérique de confiance d'un document consiste à: envoyer un signal vers un élément de sécurité disposé sur un support sécurisé via un bus de communication afin de lancer une application; lire des données enregistrées sur le support du document à lire à l'aide d'une application se trouvant dans ce même élément de sécurité; vérifier la fiabilité des données enregistrées sur le support du document à lire à l'aide d'un certificat numérique public; vérifier la fiabilité du certificat; créer sur ce même élément de sécurité un modèle numérique du document; sauvegarder le modèle numérique du document sur ce même élément de sécurité de façon à pouvoir le lire.
PCT/RU2019/000830 2019-09-18 2019-11-20 Génération et utilisation d'un modèle numérique de confiance de document WO2021054854A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
RU2019129307A RU2736507C1 (ru) 2019-09-18 2019-09-18 Способ и система создания и использования доверенного цифрового образа документа и цифровой образ документа, созданный данным способом
RU2019129307 2019-09-18

Publications (1)

Publication Number Publication Date
WO2021054854A1 true WO2021054854A1 (fr) 2021-03-25

Family

ID=73461124

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2019/000830 WO2021054854A1 (fr) 2019-09-18 2019-11-20 Génération et utilisation d'un modèle numérique de confiance de document

Country Status (2)

Country Link
RU (1) RU2736507C1 (fr)
WO (1) WO2021054854A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050018252A1 (en) * 2003-07-25 2005-01-27 Hubin Jiang Imaging system and business methodology
US20050066172A1 (en) * 2001-07-20 2005-03-24 Vorbruggen Dr Jan C Method and device for confirming the authenticity of a document and a safe for storing data
WO2005059693A2 (fr) * 2003-12-16 2005-06-30 Pitney Bowes, Inc. Procede et systeme pour faciliter des transactions
RU2602394C2 (ru) * 2011-06-07 2016-11-20 Виза Интернешнл Сервис Ассосиэйшн Устройства, способы и системы токенизации конфиденциальности платежей
US20180121691A1 (en) * 2015-09-24 2018-05-03 Sicpa Holding Sa Certification of items

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050066172A1 (en) * 2001-07-20 2005-03-24 Vorbruggen Dr Jan C Method and device for confirming the authenticity of a document and a safe for storing data
US20050018252A1 (en) * 2003-07-25 2005-01-27 Hubin Jiang Imaging system and business methodology
WO2005059693A2 (fr) * 2003-12-16 2005-06-30 Pitney Bowes, Inc. Procede et systeme pour faciliter des transactions
RU2602394C2 (ru) * 2011-06-07 2016-11-20 Виза Интернешнл Сервис Ассосиэйшн Устройства, способы и системы токенизации конфиденциальности платежей
US20180121691A1 (en) * 2015-09-24 2018-05-03 Sicpa Holding Sa Certification of items

Also Published As

Publication number Publication date
RU2736507C1 (ru) 2020-11-17

Similar Documents

Publication Publication Date Title
US11664997B2 (en) Authentication in ubiquitous environment
ES2599985T3 (es) Validación en cualquier momento para los tokens de verificación
CN107925572B (zh) 软件应用程序到通信装置的安全绑定
CN110249586B (zh) 用于在智能卡上安全存储敏感数据的方法和智能卡
US20160117673A1 (en) System and method for secured transactions using mobile devices
US20130226812A1 (en) Cloud proxy secured mobile payments
US20150199673A1 (en) Method and system for secure password entry
CN110582774B (zh) 用于软件模块绑定的系统和方法
CN111742314B (zh) 便携式装置上的生物计量传感器
US20150142666A1 (en) Authentication service
KR20060125835A (ko) 모바일 단말기를 이용하여 전자 트랜잭션을 수행하기 위한방법 및 시스템
CN103544599A (zh) 用于在移动终端内认证、存储和交易的嵌入式安全元件
JP2017537421A (ja) 支払いトークンのセキュリティを確保する方法
US11750368B2 (en) Provisioning method and system with message conversion
US20150142667A1 (en) Payment authorization system
EP2856440A1 (fr) Unité, système et procédé de paiement
US11880840B2 (en) Method for carrying out a transaction, corresponding terminal, server and computer program
Le et al. Building an Application that reads Secure Information Stored on the Chip of the Citizen Identity Card in Vietnam
KR102348823B1 (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법
KR102122555B1 (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법
El Madhoun et al. The EMV Payment System: Is It Reliable?
WO2015107346A1 (fr) Procédé et système d'authentification
RU2736507C1 (ru) Способ и система создания и использования доверенного цифрового образа документа и цифровой образ документа, созданный данным способом
KR20230130039A (ko) 공개/개인 키 인증을 위한 디바이스들, 시스템들 및방법들
KR20200103615A (ko) 사용자가 소지한 금융 카드 기반 본인 인증 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19945570

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01.08.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19945570

Country of ref document: EP

Kind code of ref document: A1