[go: up one dir, main page]

CA2244126A1 - Procedure and device for loading input data into an algorithm during authentication - Google Patents

Procedure and device for loading input data into an algorithm during authentication

Info

Publication number
CA2244126A1
CA2244126A1 CA002244126A CA2244126A CA2244126A1 CA 2244126 A1 CA2244126 A1 CA 2244126A1 CA 002244126 A CA002244126 A CA 002244126A CA 2244126 A CA2244126 A CA 2244126A CA 2244126 A1 CA2244126 A1 CA 2244126A1
Authority
CA
Canada
Prior art keywords
input data
procedure
algorithm during
during authentication
loading input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002244126A
Other languages
French (fr)
Other versions
CA2244126C (en
Inventor
Frank Schaefer-Lorinser
Alfred Scheerhorn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Telekom AG
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE19622533A external-priority patent/DE19622533A1/en
Application filed by Individual filed Critical Individual
Publication of CA2244126A1 publication Critical patent/CA2244126A1/en
Application granted granted Critical
Publication of CA2244126C publication Critical patent/CA2244126C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0866Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Finance (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

2.1 The problem with security in paying with chip cards is the loading of input data into an algorithm during authentication.
2.2 Separating the data blocks and switching; an additional feedback after the post-connected counters on and off at preselected times (number of clock pulses) helps to improve the security of debited and credited data.
2.3 The invention can be used for all authentication procedures where chip cards are used.
CA002244126A 1996-06-05 1997-06-04 Procedure and device for loading input data into an algorithm during authentication Expired - Lifetime CA2244126C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19622533.7 1996-06-05
DE19622533A DE19622533A1 (en) 1996-06-05 1996-06-05 Method and device for loading input data into an algorithm during authentication
PCT/EP1997/002894 WO1997046983A2 (en) 1996-06-05 1997-06-04 Method and device for loading input data into an algorithm during authentication

Publications (2)

Publication Number Publication Date
CA2244126A1 true CA2244126A1 (en) 1997-12-11
CA2244126C CA2244126C (en) 2006-10-10

Family

ID=37114248

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002244126A Expired - Lifetime CA2244126C (en) 1996-06-05 1997-06-04 Procedure and device for loading input data into an algorithm during authentication

Country Status (1)

Country Link
CA (1) CA2244126C (en)

Also Published As

Publication number Publication date
CA2244126C (en) 2006-10-10

Similar Documents

Publication Publication Date Title
CA2183629A1 (en) Method and apparatus for utilizing a token for resource access
GB2273381B (en) Apparatus for accepting and retaining an information card
GB9615993D0 (en) Pocket-size information transfer apparatus and IC card using the same
EP0646895A3 (en) Thin IC card and method for producing the same.
DE69430075D1 (en) SECURITY FOR INTERACTIVE TELEVISION THROUGH TIME MARKING TRANSACTIONS
AU5299799A (en) Method for preventing unauthorized use of credit cards in remote payments and anoptional supplemental-code card for use therein
CA2318936A1 (en) Method for protecting the audio/visual data across the nrss interface
SG42847A1 (en) Device and method for data encryption
FR2718091B1 (en) Theft security device applying electronic coding for authorization of use for vehicles.
NO992776L (en) Procedure and system for conducting electronic money transactions
GB2215897B (en) Method and apparatus for use in updating the credit value of a phone payment card
AU4542997A (en) Method and arrangement for protecting electronic computing units, in particular chip cards
MX9606435A (en) Smart card message transfer without microprocessor intervention.
EP0778691A3 (en) Telephone used for electronic money card transaction and method of operation of the same
AU8161994A (en) IC card having an electronic apparatus
AU3032197A (en) Method and device for loading input data into an algorithm during authentication
GB2284689B (en) Ic card back-up generating and programming device
CA2244126A1 (en) Procedure and device for loading input data into an algorithm during authentication
EP0621549A3 (en) Nonlinear operation unit and data processing apparatus using the nonlinear operation unit.
AUPO940397A0 (en) Data processing method and apparatus (ART65)
SE9503841D0 (en) Procedure and apparatus for data communication
PL317383A1 (en) Method of and apparatus for effecting payments by means of chip cards with the wallet function
AU4123496A (en) Transaction processing system and method, and terminal equipment and ic card used for the transaction processing system and method
LT98111A (en) Method for operation of game system using credit card and the game system
AU1879997A (en) Process and device for verifying the authenticity of documents in the form of chip cards

Legal Events

Date Code Title Description
EEER Examination request
MKEX Expiry

Effective date: 20170605