WO2022179986A1 - Carte de paiement, procédé d'authentification et utilisation pour un paiement à distance - Google Patents
Carte de paiement, procédé d'authentification et utilisation pour un paiement à distance Download PDFInfo
- Publication number
- WO2022179986A1 WO2022179986A1 PCT/EP2022/054274 EP2022054274W WO2022179986A1 WO 2022179986 A1 WO2022179986 A1 WO 2022179986A1 EP 2022054274 W EP2022054274 W EP 2022054274W WO 2022179986 A1 WO2022179986 A1 WO 2022179986A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- payment card
- authentication
- cryptogram
- bearer
- payment
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000003287 optical effect Effects 0.000 claims abstract description 6
- 238000004891 communication Methods 0.000 claims description 16
- 230000008520 organization Effects 0.000 claims description 11
- 238000010200 validation analysis Methods 0.000 claims description 11
- 239000011159 matrix material Substances 0.000 claims description 10
- 230000000007 visual effect Effects 0.000 description 9
- 238000013475 authorization Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 4
- 238000004049 embossing Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 230000001815 facial effect Effects 0.000 description 2
- 238000007650 screen-printing Methods 0.000 description 2
- 239000011449 brick Substances 0.000 description 1
- 239000011111 cardboard Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000011087 paperboard Substances 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
- G06Q20/3415—Cards acting autonomously as pay-media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3223—Realising banking transactions through M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3276—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4015—Transaction verification using location information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Definitions
- the present invention falls within the field of securing financial transactions by credit card, and more particularly remote banking payments made on the Internet.
- a bank card is a card made of plastic, or even paper or cardboard, with a side of a few centimeters and one to two millimeters thick.
- the card conventionally carries at least one integrated circuit capable of containing information.
- This integrated circuit corresponds to the chip and may contain a microprocessor capable of processing this information or be limited to non-volatile memory circuits and, possibly, a security component such as a memory card.
- This security data is generally written on one or the other of the faces of this smart card.
- a bank card includes identification data for a bank account and/or the owner of the bank card. These identification data are generally written on the front of the bank card. More precisely, the card number, also called PAN number, is linked to a bank account.
- most bank cards include, on the one hand, the identity of the holder of the bank card (surname and first name and/or company name).
- banking organizations also enter the expiry date of the payment card.
- bank cards also include a security code or a visual cryptogram affixed to the back (or rear face) of the bank card.
- Fraud of the first type involves the physical theft of the bank card and the hacker, in possession of this stolen card, who also has security data that allows him to usurp the identity of the bearer of the bank card in order to online payments.
- the visual hacking of security data can also be assimilated to this first type of identity theft fraud. Indeed, visual hacking occurs in principle during a payment in store, the seller copying the security data without the knowledge of the holder / cardholder. The pirate is then in possession of the secure data of the bank card and can carry out transactions remotely, either for his own account or to resell them to a third party.
- Phishing is the second type of identity theft fraud. This technique is undoubtedly the one that has developed the most in recent years. The technique consists in making the victim believe that he is addressing a trusted third party such as a bank, an administration, in order to extract personal information from him: password, credit card number, number or photocopy of identity card, date of birth, etc. This can be achieved by replicating an entire website, by sending an email or even by sending a text message. As a result, the hacker finds himself in possession of the secure data of the bank card which also allows him to carry out transactions for his own account.
- a trusted third party such as a bank
- an administration in order to extract personal information from him: password, credit card number, number or photocopy of identity card, date of birth, etc. This can be achieved by replicating an entire website, by sending an email or even by sending a text message.
- the hacker finds himself in possession of the secure data of the bank card which also allows him to carry out transactions for his own account.
- banking organizations have implemented payment security methods by sending a payment confirmation text message or "sms" to the cardholder's mobile phone.
- This text message generally includes an alphanumeric code sent by the banking institution in order to validate the payment.
- This service is called “3D-Secure ® ” authentication.
- 3D-Secure ® This service is called “3D-Secure ® ” authentication.
- this system provides some security, it has some flaws that allow hackers to circumvent it. First of all, not all banks offer such a service. Similarly, the payment system of all merchant sites does not allow the use of this method of securing the financial transaction. So that to date only 40% of French online transactions are validated by this system. In addition, this system makes it possible to change the telephone number to which the alphanumeric code is sent. A godsend for the pirate who can thus divert the sending of the alphanumeric code to his own mobile phone.
- the CW cryptogram is said to be dynamic, since the series of three digits evolves randomly, automatically and at regular frequency. Thus, it is possible to entrust without fear the information of a dynamic bank card for online transactions. Indeed, even in the event of hacking by phishing, the security data of the bank card will be unusable, since the cryptogram changes regularly.
- the dynamic cryptogram bank card is only a partial answer to the problem of phishing. However, it does not address the problem of physical theft of the bank card. Apart from the fact that the technique embedded in such a card is a technological feat, in particular through the integration of both a battery and a screen in the thickness of the card, this technology is very expensive and not ecological, which delays its generalization.
- the plaintiff has developed a technical solution which aims to secure online payment through double authentication ensuring the authentication of the bank card and the holder of this bank card.
- a first aspect of the present invention relates to a payment card comprising a front side and a back side, the payment card also incorporates an electronic chip, the front side comprising security data which includes, at least, a PAN number , an identity of the bearer of the payment card and an expiry date of the payment card, the back side having a CW cryptogram generally consisting of three digits.
- the payment card is characterized in that it has on one side at least one authentication cryptogram comprising a number of characters between 200 and 10,000, this authentication cryptogram is unique and the owner of the payment card. payment on which the authentication cryptogram is affixed, this authentication cryptogram constitutes a means of identification of the payment card by optical recognition, this means of identification being linked to a bank account to which the payment card is linked.
- the payment card according to the invention is equipped with a proprietary authentication cryptogram which is affixed to one side of the payment card.
- This authentication cryptogram contains a large number of characters which makes it unique.
- the authentication cryptogram contributes to providing a means of authentication of the payment card by optical recognition of the authentication cryptogram.
- This authentication cryptogram helps to improve the security of secure operations, by limiting phishing fraud. Indeed, when a hacker has managed to steal the security data of the payment card, an authentication method according to the invention requires the validation of the secure operation by optical recognition of the authentication cryptogram. Thus, if the hacker does not hold the payment card and its secure data, he cannot use the payment card for his benefit.
- the authentication cryptogram is a matrix code consisting of a determined number of black modules arranged in a white background so as to form a single pattern, each black module constituting a character of the authentication cryptogram.
- This type of matrix code provides a large number of combinations which allows each payment card to include a unique authentication cryptogram also called "owner".
- the PAN number consists of four series of four digits
- the payment card comprising a PAN cryptogram substituting at least one series of four digits of the PAN number.
- the PAN cryptogram provides additional security that helps prevent physical theft and/or visual hacking of the payment card. Indeed, even in the event of physical theft and/or visual hacking, the hacker does not hold the full PAN number of the payment card. It is therefore unusable.
- the PAN cryptogram comprises between 16 and 100 characters, preferably the PAN cryptogram comprises between 36 and 64 characters.
- the PAN cryptogram is a gimbal grid.
- the CW ciphertext can be substituted by a ciphertext having a number of characters greater than three. This feature also aims to hide the security data of the payment card in order to fight against physical theft and/or visual hacking of the payment card.
- a second aspect of the invention relates to a method for authenticating a payment card defined according to the first aspect of the invention, and the bearer of this payment card.
- the authentication method aims to carry out a secure operation relating to the personal data of the bearer of the payment card.
- the authentication process comprises at least: a) A first step of authentication of the payment card by entering the security data of the payment card and/or a first authentication of the bearer of the payment card, the bearer of the payment card providing his identity and/or an identifier; b) A step of requesting a secure transaction relating to the personal data of the bearer of the payment card, the request made to a secure digital space linked to the bank account of the payment card opened with a banking institution , the secure digital space being stored on a remote server managed by the banking institution; c) A step of verifying the security data entered on the payment card, this step being carried out by comparing the security data entered with reference data stored in the secure digital space; d) A second step of authentication of the payment card and the bearer of the payment card, the second authentication step being carried out by recognition of the authentication cryptogram owner of the payment card, this step being carried out through a digital recognition module available or accessible via a digital terminal belonging to the bearer of the payment card, and; e) A stage for final
- the method according to the invention integrates a double authentication of the payment card and/or of the holder of this card.
- This double authentication reinforces the security of a secure operation such as a remote payment. Indeed, this process involves entering the security data of the payment card, but also that it is the bearer of this card who performs this operation to open the recognition module, and finally that the bearer of the payment card holds his payment card for the cryptogram owner of the payment card is recognized.
- the authentication process makes phishing hacking, as we know it today, ineffective since this type of hacking does not make it possible to recover the proprietary authentication cryptogram of the payment card.
- the second authentication step d) is performed by opening a secure communication channel between the secure digital space of the bank account and the digital terminal of the bearer of the payment card, the secure digital space of the bank account then calling for the opening of the digital recognition module.
- the authentication method comprises, on opening the recognition module, a biometric and/or codified authentication operation of the bearer of the payment card, in if the authentication of the bearer of the payment card is successful, the recognition module gives access to a camera of the digital terminal to allow digital capture of the authentication cryptogram of the payment card.
- the method comprises a comparison of the authentication cryptogram affixed to the payment card, with a reference digital image of the authentication cryptogram stored in the secure digital space. from the bank account.
- connection step a) when the connection step a) is performed on a secure online portal separate from the secure digital space 6, a secure communication channel is opened between the portal in secure line and a secure digital space linked to the bank account of the payment card.
- the authentication method comprises a step of geolocation of the digital terminal of the bearer of the payment card.
- a third aspect of the invention relates to a use of the authentication method defined according to the second aspect of the invention, to operate a validation of remote payment and in particular of a remote payment made via a website, the remote payment being operated through a payment card defined according to the first aspect of the invention.
- FIG. 1 is a representation of a front face of a payment card in accordance with the invention.
- FIG. 2 is a representation of a reverse side of the payment card in Figure 1.
- FIG. 3 is a representation of a digital terminal receiving a call from a banking server in order to authenticate a payment card.
- FIG. 4 is a representation of a recognition step of the authentication cryptogram of the payment card of figures 1 and 2.
- FIG. 5 is a representation of a system and method for authenticating a payment card in accordance with a first embodiment of the invention.
- FIG.6 is a representation of a system and method for authenticating a payment card that complies with a second embodiment of the invention.
- the invention relates to a payment card 1.
- This payment card 1 corresponds to a bank card.
- the payment card 1 according to the invention is linked to a bank account opened with a banking organization.
- the bank account and the payment card 1 are assigned to a user also called the holder of the bank account, or bearer 100 of the payment card 1 .
- the payment card 1 comprises a front face 10 and a back face 11. Conventionally, the payment card 1 also incorporates an electronic chip 12. This electronic chip 12 comprises a processor and a memory configured to execute an algorithm and/or store data.
- the front face 10 includes security data 2.
- the security data 2 includes at least one PAN number 20.
- the PAN number 20 is composed of several series of digits, for example four series four digits, making a total of sixteen digits.
- the term PAN is common in banking jargon. In this example, reading payment card 1 from left to right, the PAN number 20 has a first set of numbers 200, a second set of numbers 201, a third set of numbers and a fourth set of numbers 203.
- the PAN cryptogram 21 replaces the third series of digits of the PAN number 2
- the PAN ciphertext 21 substitutes the fourth series 203 of digits of the PAN number 2.
- the PAN 21 cryptogram comprises between 16 and 100 characters.
- the PAN cryptogram 21 comprises between 36 and 64 characters.
- the cryptogram PAN 21 consists of a gimbal grid. Nevertheless, it is quite possible to consider the use of another type of PAN 21 cryptogram such as a simple bar code or a matrix bar code.
- the security data 2 also includes the identity 22 of the bearer 100 of the payment card 1.
- the security data 2 includes a deadline 23 for the validity of the payment card 1 .
- the security data 2, 20, 21, 22, 23 affixed to the front face 10 of the payment card 1 are written by printing and/or embossing, or even by screen printing on the surface of the payment card 1
- the other security data 2, 20, 22, 23 are affixed by embossing.
- the reverse side 11 has a CW cryptogram 24.
- This CW cryptogram 24 generally consists of three digits.
- a gimbal grid, simple barcode or matrix barcode type cryptogram can be used to replace the CW 24 cryptogram.
- the CW cryptogram 24 is also part of the security data 2 of the payment card 1. We are talking about security data since during a remote payment, these security data 2 are used to authenticate the payment card 1 with the bank management organization.
- the payment card 1 comprises at least one authentication cryptogram 3. It is unique and owner of the payment card 1.
- This authentication cryptogram 3 constitutes a means of authentication of the card of payment 1 by optical recognition. It is linked to the bank account of payment card 1.
- the authentication cryptogram 3 can be affixed to a face 10, 11 of the payment card 1.
- the authentication cryptogram 3 is affixed to the back face 11.
- the authentication cryptogram 3 could also be placed on the front face 10 of the payment card 1.
- the authentication cryptogram 3 comprises a number of characters between 200 and 10,000.
- the authentication cryptogram 3 consists of a matrix code.
- Matrix code is also called “two-dimensional barcode”.
- the matrix code consists of a determined number of black modules arranged in a white background in such a way as to form a single pattern. Therefore, each black module constitutes a character of the authentication cryptogram 3.
- Each black module has determined dimensions. This type of matrix code is known as a “QR code®”. The high number of characters in the authentication cryptogram 3 gives it its unique character.
- the authentication cryptogram 3 could consist of another type of visual cryptogram such as a holographic cryptogram, a gimbal grid, etc.
- a data matrix cryptogram is that it can already be read, recognized by a smartphone and current banking applications.
- the invention also relates to an authentication system 4 of a payment card 1 and of the bearer 100.
- the double authentication of the bearer 100 and of his payment card 1 contributes to achieving a secure operation relating to the personal data of the bearer 100 of the payment card 1.
- the secure operation may correspond to a remote payment made using the payment card 1 (FIG. 5).
- This double authentication is particularly useful for remote payment via the Internet.
- double authentication can also be used to carry out a digital signature, operation on a loyalty account, transfer of bank funds, etc.
- the authentication system 4 includes a digital terminal 5.
- the digital terminal 5 may consist of a "smartphone” or smart mobile phone, a digital tablet, etc. More broadly, it is possible to implement the invention with an electronic device equipped with display means such as a screen, a multimedia capture tool such as a camera or a video camera, a memory and a processor to store and run algorithmic applications.
- the electronic device can also comprise means of communication through a telecommunications network such as a mobile telephone network, a wired telephone network, the Internet, etc.
- the digital terminal 5 integrates a recognition module 50 of the authentication cryptogram 3 owner of the payment card 1.
- the recognition module 50 is configured for a digital capture of the authentication cryptogram 3.
- the recognition module 50 is integrated into an application system configured to take control of the camera of the digital terminal 5.
- the recognition module 50 can be integrated into an application for managing the bank account linked to payment card 1 .
- This bank account management application is of course stored and executed by the digital terminal 5. It should be noted that on the day of writing this document, each banking organization provides its customers with a bank management application.
- the recognition module 50 is therefore an algorithmic brick which can be added to an already pre-existing application or correspond to an application algorithm strictly speaking.
- the digital terminal 5 is configured to communicate remotely through a wireless communication network.
- the digital terminal 5 can include communication means such as a mobile telephone transmitter/receiver.
- the transmitter/receiver can be of the GSM, 2G, 3G, 4G, 5G, 6G type.
- the digital terminal 5 can include a near field transmitter/receiver, such as Bluetooth, Wifi or other. It should be noted that most digital terminals include a Wifi transmitter/receiver and a transmitter/receiver Bluetooth.
- mobile telephones or smartphones additionally comprise a mobile telephone transmitter/receiver.
- the authentication system 4 further comprises a secure digital space 6.
- the secure digital space 6 is linked to the bank account of the payment card 1.
- the secure digital space 6 is managed by a banking organization managing said bank account of the bearer of the payment card 1.
- the secure digital space 6 is stored by a remote server. In a known manner, this secure digital space 6 is accessible remotely via secure protocols, such as the service call.
- This service call is of the same type as that used by electronic payment terminals (TPE) to make bank payments following the reading of a bank payment card.
- a service call can be secured by a security protocol of the APA, HTTPS, OAuth2 type.
- the secure digital space 6 is also configured to open a secure communication channel using a payment validation system, of the PSP or “Payment service provider” type for example.
- a PSP payment validation system corresponds to an application programming interface also called “API”.
- the API of this payment validation system is configured to open a secure communication channel between the secure digital space 6 and the holder of the bank account, in order to confirm a remote payment.
- the payment validation system used is configured to establish secure communication between the secure digital space 6 and the digital terminal 5 of the bearer 100 of the payment card 1 connected to said bank account.
- the authentication system 4 may include a secure online portal 7.
- the online portal 7 is itself stored on a remote server which is separate from the banking server.
- the online portal 7 is configured to communicate with the remote server storing a secure digital space 6 of a bank account.
- the online portal 7 is a payment portal hosted on a website such as a merchant site.
- the online portal 7 is configured to carry out a secure operation relating to the personal data of the bearer 100 of the payment card 1 .
- Said secure operation may correspond, as described previously, to a remote payment, a digital signature, a transaction on a loyalty account, a transfer of bank funds, etc.
- the online portal 7 can be confused with the secure digital space 6. This possibility is more specific to a bank funds transfer operation or an operation on a card. of loyalty.
- the wearer 100 communicates directly with his digital terminal 5 with the secure digital space 6.
- the secure digital space 6 is configured to communicate remotely through a wireless communication network with the digital terminal 5 and/or the online portal 7 .
- the secure operation relating to the personal data of the bearer 100 is carried out after a double authentication of the payment card 1 of the bearer 100 of the payment card 1.
- the authentication system 4 involves a classic first authentication in all online payment transactions. This first authentication corresponds, on the one hand, to an authentication of the bearer 100 by his connection to a personal digital space.
- This authentication of the bearer 100 includes the information of an identifier and a password or else a biometric recognition.
- the first authentication also involves information security data 20, 21, 22, 23, 24, 200, 201, 203 of the payment card 1. It should be noted that in this example the number PAN 20 includes a PAN 21 cryptogram.
- the bearer 100 can reveal this series of digits via a revelation process described by the French patent application FR 20 05961 also held by the plaintiff.
- the first authentication is performed by connecting to an online portal 7. Conversely, in the example of Figure 6, the first authentication is performed directly with the secure digital space 6 linked to payment card 1.
- the authentication system 4 involves a second authentication. This second authentication takes place through a secure communication channel open between the secure digital space 6 and the digital terminal 5 of the bearer 100 of the payment card 1.
- this second authentication corresponds, on the one hand, to authentication of the bearer 100 by entering a password or by biometric recognition via the recognition module 50.
- the payment module recognition 50 performs a second authentication of the payment card 1.
- This second authentication involves reading or capturing the authentication cryptogram 3 of the payment card 1.
- this double authentication conditions the validation of the secure operation on the fact that the bearer 100 holds his payment card 1 during the validation of the operation.
- a pirate cannot validate the secure operation.
- an additional level of security is provided by a payment card 1 equipped with a PAN 21 cryptogram.
- the invention also relates to a method for authenticating a payment card 1 in accordance with the invention and the bearer 100 of this payment card 1.
- This authentication is carried out in order to carry out a secure operation relating to data personal details of the bearer 100 of the payment card 1.
- this authentication method can be used to carry out a validation of remote payment and in particular of a remote payment made via a website.
- the method according to the invention can also be useful for carrying out a financial transaction, an operation on a loyalty account, a digital signature, etc.
- the authentication process includes a first authentication step of the payment card 1 and of the bearer 100 of the payment card 1.
- This first authentication step is named a).
- the bearer 100 enters the security data 20, 21, 22, 23, 24, 200, 201, 203 of the payment card 1.
- step a) may also involve authentication of the identity of the bearer 100 of the payment card 1.
- This authentication is carried out by connection to a secure digital space. The connection involves entering an identifier accompanied by an access code and/or biometric recognition. Biometric recognition can be digital or facial. This functionality depends on the characteristics integrated into the digital terminal 5 of the bearer 100 of the payment card 1.
- the authentication method includes a step of requesting a secure transaction relating to the personal data of the bearer 100 of the payment card 1.
- the request step is denoted b) .
- the request is made to a secure digital space 6 linked to the bank account of the payment card 1.
- This bank account is of course opened with a banking organization.
- the secure digital space 6 is stored on a remote server managed by the banking organization.
- the secure digital space 6 is accessible remotely through current telecommunication means (internet, mobile telephony).
- the authentication process includes a step of verifying the security data 20, 21, 22, 23, 24, 200, 201, 203 entered on the payment card 1. This step is denoted c).
- the verification step c) is performed by comparing the security data 20, 21, 22, 23, 24, 200, 201, 203 filled in with reference data stored in the secure digital space 6.
- the method according to the invention calls for a second authentication in order to validate the operation relating to the personal data of the bearer 100 of the payment card 1 .
- the authentication process includes a second step of authentication of the payment card and of the bearer of the payment card.
- This second authentication step is denoted d).
- the second authentication step is carried out by recognition of the authentication cryptogram 3 owner of the payment card 1.
- step d) is performed through a digital recognition module 50 available or accessible by the digital terminal 5 belonging to the bearer 100 of the payment card 1.
- the second authentication step d) is carried out by opening a secure communication channel between the secure digital space 6 and the digital terminal 5 of the bearer 100 of the payment card 1 .
- a secure communication channel can use a PSP system described above.
- the secure digital space 6 of the bank account calls for the opening of the digital recognition module 50 on the digital terminal 5 of the bearer 100 of the payment card 1.
- the method may include a biometric and/or encoded authentication operation of the bearer 100 of the payment card 1 .
- biometric authentication by recognition of a fingerprint 51 is requested.
- the recognition module 50 gives access to a camera of the digital terminal 5 to allow digital capture of the authentication cryptogram 3 owner of the payment card 1 (see figure 4).
- the recognition module 50 includes a frame 52 in the payment card 1 must be placed through the screen of the digital terminal 5. It should be noted that the recognition module 50 asks to scan the payment card 1.
- the second authentication step comprises a comparison operation of the authentication cryptogram 3 affixed to the payment card 1, with a reference digital image of the authentication cryptogram. This reference image is stored in the secure digital space 6 of the bank account. When the picture of reference corresponds to cryptogram 3 affixed to the payment card, the second authentication step is considered successful.
- the secure operation can be aborted immediately, however, the method can allow the bearer 100 of the payment card to benefit from a determined number of attempts to acknowledgement. For example, it is possible to offer three recognition attempts of the authentication cryptogram 3 before the secure operation is interrupted by failure of the double authentication of the payment card 1 and the identity of its bearer 100. In the event of a first failure, it is also possible to switch to more classic authentication methods such as the 3D secure system presented in the introduction to this document.
- the authentication method includes a step for finalizing the secure operation relating to the personal data of the bearer 100 of the payment card 1.
- the step of finalization is denoted e).
- the finalization step transmits the authorizations to proceed with said secure operation.
- the authentication method may include a step of geolocation of the digital terminal 5 of the bearer 100 of the payment card 1.
- the location of the bearer 100 of the payment card 1 can give information as to a attempted fraud. Indeed, if the digital terminal 5 is located in a State different from that in which the bank account was opened, this can generate an alert for the attention of the bearer 100.
- the recognition module 50 is configured to have access to the location data of the digital terminal 5.
- the IP address of the digital terminal 5 can make it possible to provide information on the geolocation of the bearer 100 of the payment card 5.
- this geolocation is intended to ensure that the entry of the security data 20, 21, 22, 23, 24, 200, 201, 203 of the payment card 1 and the recognition of the cryptogram of authentication 3, in particular of the "QR code®" are carried out from the same place.
- the first authentication step a) when the first authentication step a) is performed following a connection to a secure digital space of a secure online portal 7 separate from the space secure digital 6,
- This possibility corresponds to a purchase made by the bearer 100 of the payment card 1 on the online portal 7 of a merchant site.
- the bearer 100 enters the security data 20, 21, 22, 23, 24, 200, 201, 203 directly into the secure digital space of the online portal 7.
- the request step b) is carried out through a secure communication channel which is open between the online portal 7 and the secure digital space 6. This channel may be the one already used between a service provider payment and a bank.
- the finalization step e) also takes place through this secure communication channel.
- the finalization step e) consists in transmitting the direct debit authorizations between the banking organization of the payment card 1 and a banking organization to which is attached the payment portal.
- the online portal 7 can also request a digital signature which will be provided through the authentication process of the invention.
- the validation step e) transmits an authorization or a digital signature.
- the first authentication step a) is carried out following a connection to the secure digital space 6 linked to the bank account of the payment card 1 .
- the bearer 100 identifies himself to the secure digital space 6.
- the bearer 100 authenticates himself by entering his identity, via an identifier. This identifier is verified using a password and/or by biometric recognition (digital or facial).
- the request step b) is performed within the secure digital space 6.
- the finalization step e) takes place directly with the banking institution, for example to carry out an internal banking transaction, that is to say, between two bank accounts opened with the same organisation. These two bank accounts can belong to the same bearer 100 or to two different entities.
- the finalization step consists in transferring the direct debit authorizations from the bank account of the bearer 100 of the payment card 1 , to a beneficiary banking organization.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
Claims
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/547,741 US20240232853A9 (en) | 2021-02-24 | 2022-02-21 | Payment card, authentication method and use for a remote payment |
CN202280029741.5A CN117178283A (zh) | 2021-02-24 | 2022-02-21 | 支付卡、认证方法及远程支付用途 |
EP22706329.4A EP4298580A1 (fr) | 2021-02-24 | 2022-02-21 | Carte de paiement, procédé d'authentification et utilisation pour un paiement à distance |
BR112023017020A BR112023017020A2 (pt) | 2021-02-24 | 2022-02-21 | Cartão de pagamento, processo de autentificação e de utilização para um pagamento remoto |
MX2023009925A MX2023009925A (es) | 2021-02-24 | 2022-02-21 | Tarjeta de pago, metodo de autenticacion y uso para un pago remoto. |
CA3209526A CA3209526A1 (fr) | 2021-02-24 | 2022-02-21 | Carte de paiement, procede d'authentification et utilisation pour un paiement a distance |
IL305443A IL305443A (en) | 2021-02-24 | 2022-02-21 | Payment card method for verification and use for remote payment |
JP2023574756A JP2024507012A (ja) | 2021-02-24 | 2022-02-21 | 支払いカード、認証方法、及び遠隔支払いのための使用 |
ZA2023/08787A ZA202308787B (en) | 2021-02-24 | 2023-09-15 | Payment card, authentication method and use for a remote payment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR2101800A FR3120149B1 (fr) | 2021-02-24 | 2021-02-24 | Carte de paiement, procédé d’authentification et utilisation pour un paiement à distance |
FRFR2101800 | 2021-02-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022179986A1 true WO2022179986A1 (fr) | 2022-09-01 |
Family
ID=75539552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2022/054274 WO2022179986A1 (fr) | 2021-02-24 | 2022-02-21 | Carte de paiement, procédé d'authentification et utilisation pour un paiement à distance |
Country Status (11)
Country | Link |
---|---|
US (1) | US20240232853A9 (fr) |
EP (1) | EP4298580A1 (fr) |
JP (1) | JP2024507012A (fr) |
CN (1) | CN117178283A (fr) |
BR (1) | BR112023017020A2 (fr) |
CA (1) | CA3209526A1 (fr) |
FR (1) | FR3120149B1 (fr) |
IL (1) | IL305443A (fr) |
MX (1) | MX2023009925A (fr) |
WO (1) | WO2022179986A1 (fr) |
ZA (1) | ZA202308787B (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240020700A1 (en) * | 2022-07-15 | 2024-01-18 | Stripe, Inc. | Machine learning for fraud preventation across payment types |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050103837A1 (en) * | 2003-11-13 | 2005-05-19 | Boyer Charles E. | High-security card and system |
EP2610824A1 (fr) * | 2011-12-30 | 2013-07-03 | Oberthur Technologies | Carte bancaire et procédé de réponse à une demande de transaction |
US20160155123A1 (en) * | 2014-10-08 | 2016-06-02 | Hankooknfc, Inc. | System and method for user authentication by using a physical financial card and mobile communication terminal |
FR3038256A1 (fr) * | 2015-07-02 | 2017-01-06 | Rivero Francois Gilles Pierre Gonzalez | Etiquette de securite autocollante comportant un hologramme specifique contenant le cryptogramme visuel (cvv) |
US20170228722A1 (en) * | 2016-02-05 | 2017-08-10 | At&T Intellectual Property I, L.P. | Real-time valuation display for transaction cards |
US9830756B1 (en) * | 2016-05-25 | 2017-11-28 | Bank Of America Corporation | Resolving card malfunctions using card information access control |
WO2020120849A1 (fr) | 2018-12-11 | 2020-06-18 | Ccs 12 | Dispositif et procédé pour sécuriser des données sécuritaires d'une carte de paiement bancaire |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3574619A (en) | 1968-04-10 | 1971-04-13 | Eastman Kodak Co | Concentrated liquid color developers containing benzyl alcohol |
-
2021
- 2021-02-24 FR FR2101800A patent/FR3120149B1/fr active Active
-
2022
- 2022-02-21 EP EP22706329.4A patent/EP4298580A1/fr active Pending
- 2022-02-21 WO PCT/EP2022/054274 patent/WO2022179986A1/fr active Application Filing
- 2022-02-21 MX MX2023009925A patent/MX2023009925A/es unknown
- 2022-02-21 JP JP2023574756A patent/JP2024507012A/ja active Pending
- 2022-02-21 US US18/547,741 patent/US20240232853A9/en active Pending
- 2022-02-21 BR BR112023017020A patent/BR112023017020A2/pt unknown
- 2022-02-21 CA CA3209526A patent/CA3209526A1/fr active Pending
- 2022-02-21 IL IL305443A patent/IL305443A/en unknown
- 2022-02-21 CN CN202280029741.5A patent/CN117178283A/zh active Pending
-
2023
- 2023-09-15 ZA ZA2023/08787A patent/ZA202308787B/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050103837A1 (en) * | 2003-11-13 | 2005-05-19 | Boyer Charles E. | High-security card and system |
EP2610824A1 (fr) * | 2011-12-30 | 2013-07-03 | Oberthur Technologies | Carte bancaire et procédé de réponse à une demande de transaction |
US20160155123A1 (en) * | 2014-10-08 | 2016-06-02 | Hankooknfc, Inc. | System and method for user authentication by using a physical financial card and mobile communication terminal |
FR3038256A1 (fr) * | 2015-07-02 | 2017-01-06 | Rivero Francois Gilles Pierre Gonzalez | Etiquette de securite autocollante comportant un hologramme specifique contenant le cryptogramme visuel (cvv) |
US20170228722A1 (en) * | 2016-02-05 | 2017-08-10 | At&T Intellectual Property I, L.P. | Real-time valuation display for transaction cards |
US9830756B1 (en) * | 2016-05-25 | 2017-11-28 | Bank Of America Corporation | Resolving card malfunctions using card information access control |
WO2020120849A1 (fr) | 2018-12-11 | 2020-06-18 | Ccs 12 | Dispositif et procédé pour sécuriser des données sécuritaires d'une carte de paiement bancaire |
Also Published As
Publication number | Publication date |
---|---|
IL305443A (en) | 2023-10-01 |
CN117178283A (zh) | 2023-12-05 |
FR3120149A1 (fr) | 2022-08-26 |
EP4298580A1 (fr) | 2024-01-03 |
MX2023009925A (es) | 2023-09-29 |
FR3120149B1 (fr) | 2023-07-21 |
US20240232853A9 (en) | 2024-07-11 |
US20240135359A1 (en) | 2024-04-25 |
BR112023017020A2 (pt) | 2023-09-26 |
ZA202308787B (en) | 2024-04-24 |
JP2024507012A (ja) | 2024-02-15 |
CA3209526A1 (fr) | 2022-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3690686B1 (fr) | Procédé d'authentification, serveur et dispositif électronique d'identité | |
EP2619941B1 (fr) | Procede, serveur et systeme d'authentification d'une personne | |
EP2591463B1 (fr) | Système et procédé d'identification et d'enregistrement d'identité sécurisés | |
EP1153376A1 (fr) | Procede de telepaiement et systeme pour la mise en oeuvre de ce procede | |
FR2779018A1 (fr) | Terminal et systeme pour la mise en oeuvre de transactions electroniques securisees | |
EP1255178B1 (fr) | Dispositif de sécurité pour transaction en ligne | |
EP2826005B1 (fr) | Securisation d'une transmission de donnees | |
FR2901079A1 (fr) | Procede pour securiser une transaction par carte a puce, terminal d'ecriture pour securiser une telle transaction, et carte a puce securisee | |
EP4298580A1 (fr) | Carte de paiement, procédé d'authentification et utilisation pour un paiement à distance | |
FR2810759A1 (fr) | Procede pour effectuer une transaction commerciale en ligne par l'intermediaire d'un reseau de communication et dispositif electronique pour passer des commandes commerciales en ligne | |
WO2003081547A1 (fr) | Procede et systeme de securisation d'un paiement par carte de credit | |
EP1749415A2 (fr) | Procedes de securisation d'appareils tels que des terminaux mobiles, et ensembles securises comprenant de tels appareils | |
FR3111206A1 (fr) | Procédé de révélation digitale d’au moins une donnée sécuritaire d’une carte à puce et utilisations de ce procédé | |
CA2325895C (fr) | Procede de paiement securise | |
FR3011111A1 (fr) | Securisation d'une transmission de donnees d'identification | |
FR2820915A1 (fr) | Methode de securisation d'une transaction commerciale au moyen d'une carte a memoire | |
FR3143143A1 (fr) | Procédé de connexion à un compte personnel sur un service en ligne au moyen d’une chaîne de blocs | |
FR2796742A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements | |
EP3223219A1 (fr) | Procédé de transfert de transaction, procédé de transaction et terminal mettant en oeuvre au moins l'un d'eux | |
FR2790854A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiement et telepaiements | |
FR2788620A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements | |
FR2790891A1 (fr) | Supports et systemes d'echange de donnees securises notamment pour paiements et telepaiements | |
FR2814622A1 (fr) | Procede de transaction en ligne comportant une pluralite d'etapes d'echanges de messages entre un emetteur, un destinataire et un serveur de validation | |
WO2007048839A1 (fr) | Procede de securisation des paiements par decoupage des montants | |
EP1035524A2 (fr) | Cartes à puce et sytèmes d'échange de données sécurisés notamment pour paiements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22706329 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023574756 Country of ref document: JP Ref document number: 3209526 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12023552324 Country of ref document: PH Ref document number: 305443 Country of ref document: IL Ref document number: MX/A/2023/009925 Country of ref document: MX |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112023017020 Country of ref document: BR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317062715 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022706329 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 112023017020 Country of ref document: BR Kind code of ref document: A2 Effective date: 20230823 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022706329 Country of ref document: EP Effective date: 20230925 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 523450406 Country of ref document: SA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 523450406 Country of ref document: SA |