[go: up one dir, main page]

WO2002071177A2 - Procede et systeme de transactions electroniques sensiblement securisees - Google Patents

Procede et systeme de transactions electroniques sensiblement securisees Download PDF

Info

Publication number
WO2002071177A2
WO2002071177A2 PCT/SG2001/000024 SG0100024W WO02071177A2 WO 2002071177 A2 WO2002071177 A2 WO 2002071177A2 SG 0100024 W SG0100024 W SG 0100024W WO 02071177 A2 WO02071177 A2 WO 02071177A2
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
network
session
user information
customer
Prior art date
Application number
PCT/SG2001/000024
Other languages
English (en)
Other versions
WO2002071177A3 (fr
Inventor
Song Chim Jeffrey Chia
Ying Yip Chan
Ohn Chee Wong
Boom Leong Yap
Original Assignee
Moneyhive.Com Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Moneyhive.Com Pte Ltd filed Critical Moneyhive.Com Pte Ltd
Priority to AU2001237888A priority Critical patent/AU2001237888A1/en
Priority to PCT/SG2001/000024 priority patent/WO2002071177A2/fr
Publication of WO2002071177A2 publication Critical patent/WO2002071177A2/fr
Publication of WO2002071177A3 publication Critical patent/WO2002071177A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Definitions

  • the present invention generally relates to a method of secure transaction via electronic communication, and more particularly, to a method of authentication and to a method for communicating user account information.
  • a credit card facilitates making purchases over the network.
  • users are justifiably concerned about placing orders for merchandise on networks such as the Internet, for example via E-mail, because of the lack of secure communications.
  • Security on public networks at the present time is virtually non-existent, making it relatively easy for an unauthorized third party to gain access to credit card data transmitted over the network.
  • Access from public terminals also exposes the customer to keylogging programs that can capture the credit card data. Once a dishonest person has the credit card number, thousands of dollars can be improperly charged to the customer's credit card account.
  • the present invention provides a system that (1) enables a customer to place an order without concern that others may iUicitly gain access to the customer's credit card information, (2) relieve burden on the second (or trusted) party that others may illicitly gain access to their customer's full credit card information, (3) reveals no sensitive information to an observer and (4) reveals no information to someone posing as a customer.
  • the present invention represents a workable solution to this problem that is relatively efficient and foolproof.
  • a method for performing secure transactions in the context of a remote commercial transaction via electronic communication, such as over the Internet.
  • electronic communication such as over the Internet.
  • the customer is prompted to enter his account name and PIN by using data entry means such as a graphical keyboard at an electronic device. Values of the graphical keys are randomly generated and delivered as a definition file from another electronic device along a secure channel to the customer's first electronic device. The corresponding data in the definition file, instead of the actual authentication data, are communicated over the network when the customer enters the authentication information.
  • the customer enters only a subset of the credit card account number to which the order is to be charged. Only this subset is transmitted over die network to the second device.
  • Another subset of the credit card account number is pre-stored with a trusted party, such as the merchant, a bank, credit card company, certificate authority, payment service provider or like. The two subsets are combined and transmitted to existing payment clearing networks for processing.
  • the data entry means such as a graphical keyboard and its random values in the definition file, it prevents any capturing of authentication and credit card information, either at the customer's terminal or over the network.
  • this system offers high degree of security to the customer even when accessing from a public terminal.
  • the present invention also protects the merchant and customer from the misuse of the customer's credit card by third parties. All credit card payments are verified against the pre-stored subsets of credit card data, hence unauthorized use of credit card is prevented.
  • Figure 1 is a schematic representation of a flow chart showing various steps involved in the performance of the system and method of the present invention for substantially secure transactions;
  • Figure 2 is a graphical representation of a process showing various steps involved in the performance of the system and method of the present invention for substantially securely communicating user information over a network between a first electronic device and a second electronic device during a session.
  • Figure 3 is a graphical representation of a process showing various steps involved in the performance of the system and method of the present invention for substantially securely verifying tiiird-party information over a network between a first electronic device and a second electronic device during one of a transaction session.
  • the present invention is directed towards a system and method for accomphshing substantially secure transactions.
  • a credit card transaction is illustrated. It must be understood that this is intended to cover any kind of credit card, debit card, credit or debit account, savings or checking account, smart card or the like.
  • the system as well as an attendant method is preferably instigated by the customer viewing a product, identifying a desired amount for a transaction as at 10, by an electronic device 1.
  • a custodial authorizing entity may herein be defined as comprising that entity or institution which has or has been designated by the entity which has custodial responsibility for the financial data and security of a given credit card account of a customer.
  • the custodial authorizing entity is one of a merchant, a bank, a credit card company, a certificate authority, a payment service provider, and the like, receives the activation request and authenticates that the request is from a trusted source.
  • the authentication includes checking of IP address of the origin of activation request and the like. Such authentication is known to those skilled in the art.
  • a new session is then created by the electronic device of the custodial authorizing entity at 16.
  • the new session is given a unique Session Identifier.
  • a set of random values corresponding to the letters (A-Z) in the alphabet and the digits (0-9) is also created at 16.
  • the letters should consist of both sets of lowercase and uppercase letters.
  • "pseudo-random" numbers as this term is commonly used in the art to apply, for example, to time-based or list-based number generating systems, may be used in place of random numbers in the system of the present invention.
  • the random values are assigned accordingly to their graphical counterparts for the letters and digits. This can be achieved by tagging the random values to the corresponding graphical keys in the definition file belonging to the particular session.
  • the icons or pictures for the alphabets and digits (0-9) can be in any of the commonly supported graphical formats, such as GIF, JPEG and PNG. These graphical letters and digits make up the graphical keyboard. Preferably, file names of the icons or pictures should be randomly generated too. Arrangement of the letters and digits may be varied regularly to enhance security.
  • a Session Database stores a complete set of information required for that session at the electronic device 2 of the custodial authorizing entity at 18. The information may or may not be encrypted when it is stored in the database.
  • the Session Identifier, graphical keyboard and other transaction information are delivered back as a definition file to the electronic device 1 of the customer over a secure channel such as SSL at 20.
  • the definition file can take the form of a new browser window, the same browser window, a standalone Java applet, a Java applet embedded into a browser window or a browser plugin such as Flash S F files. In the preferred embodiment of the system, a new browser window with an embedded Java applet is used.
  • a graphical keyboard is displayed on the electronic device 1 of the customer at 22.
  • the customer uses the graphical keyboard to enter the authentication data, instead of the physical keyboard. This prevents any key-logging software from capturing the authentication data, as it is impossible to capture.
  • the screen location where the graphical keyboard appears or the arrangement of each key is changed from time to time to prevent others from "guessing" by observing the positions of the pointer or cursor.
  • Authentication data is transmitted over the network using a secure channel from electronic device 1 of the customer to the electronic device 2 of the custodial authorizing entity at 24.
  • the present invention builds on security of existing network security protocols by sending only the session identifier and the random values of the keys returned by the customer. In the remotest chance of a hacker being able to intercept the messages, the information is useless in obtaining the actual values of the customer's input. It should also be noted that the use of screen coordinates may be used in place of random values in the system of the present invention.
  • the custodial authorizing entity When the custodial authorizing entity receives the authentication data, it retrieves from the Session Database, with reference to'the Session Identifier, the actual values of the customer's input at 26. The actual values are then compared with the previous knowledge of the customer's authentication information stored on an Authentication Database at electronic device 2 of die custodial authorizing entity at 28. This database can to be encrypted for added security.
  • the custodial authorizing entity transmit verification correct to customer of electronic device 1 to get customer to enter the credit card information using the graphical keyboard at 32.
  • Customer credit information is transmitted over the network using a secure channel from electronic device 1 of the customer to the electronic device 2 of the custodial authorizing entity at 34.
  • Custodial authorizing entity may perform validation of customer credit number before approving transaction at 36.
  • an illustrated procedure shows how a registered customer is protected against unauthorised use of his credit card information by the merchant or any third party during electronic transactions.
  • Such transactions include for example: purchasing goods or services by transferring funds (paying) to a merchant's financial account; or transferring funds between a person's personal accounts, including credit card, debit or stored-value and bank (saving or checking) accounts.
  • Use of the procedure for the above transactions allows a customer to execute any electronic transaction from anywhere safely.
  • the customer can choose to pay from any pre-registered credit card, savings, checking, prepaid or debit account.
  • the customer then enters a subset of the credit card, savings, checking, prepaid or debit accoimt number depending on the payment choices (Step 1).
  • the graphical keyboard at 38 is used. In the remotest chance of a hacker being able to intercept the messages, the information is useless as only partial numbers are transmitted. Furthermore, the actual values transmitted are coded as random values.
  • the trusted party at 40 stores subsets of the customer's account number(s) in an Account Database. This database can to be encrypted for added security. A pre- stored set of the selected account number is retrieved from the Account Database and combined with the actual values of the customer's input (Step 2). The combined values and relevant information are joined to form a Transaction Message.
  • the Transaction Message is encrypted and sent over secure connections to existing banking networks for processing.
  • the TM can be sent by the trusted party directly to the banking network at 42 or indirectly to the merchant who re-transmits it to the banking network as is known to those skilled in the art.
  • an illustrated procedure shows how a registered customer and merchant are protected against fraudulent use of the customer's credit card by third party.
  • Such transactions could include for example: purchasing a good or service by transferring funds (paying) to a second party's financial account; or transferring funds between a person's credit accounts, from credit to debit or stored- value accounts, to, from, or between bank (saving or checking) accounts.
  • This procedure is carried out by the customer at 44 first registering with the trusted party at 46 (Step 1).
  • the trusted patty such as the merchant, a bank, credit card company, certificate authority, payment service provider or like, receives the registration and verifies that it is legitimate (Step 2).
  • the trusted party stores a subset of the customer's account data (Step 3). All subsequent transactions by non-registered customers are verified against the database of pre-stored account data (Step 4).
  • a non-registered customer at 48 enters information for purchases, the information is compared to the database of pre-stored accoimt data that belong to the registered customers. This is performed by the trusted party at 50. If there is a match, the non-registered customer at 52 is asked to either log in or change the account information used for payment (Step 5) because a registered customer's data is being used without authorisation.
  • the present invention therefore, prevents any fraudulent use of die registered customer's account by third party. However, the effectiveness of this system depends on the number of accounts that are pre-stored at the trusted party.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un procédé et un système permettant d'effectuer des transactions sensiblement sécurisées dans le cadre d'une transaction commerciale à distance par communication électronique, comme par Internet. Les cartes de crédits mentionnées dans la description suivante font référence à tout type de carte de crédit, carte de débit, compte créditeur ou débiteur, compte d'épargne ou compte-chèques, carte à puce et analogue. Le client est invité à saisir l'intitulé de son compte et un code d'identification personnel à l'aide d'un moyen de saisie tel qu'un clavier graphique sur un dispositif électronique. Des valeurs correspondant aux touches graphiques sont générées de façon aléatoire et transmises au dispositif électronique du client, sous forme de fichier de spécification, par un autre dispositif électronique le long d'un canal sécurisé. Les données correspondantes contenues dans le fichier de spécification, au lieu des données d'authentification courantes, sont communiquées par l'intermédiaire du réseau lorsque le client saisit les informations d'authentification. Une fois authentifié, le client saisit uniquement un sous-ensemble du numéro de compte-carte à débiter. Seul ce sous-ensemble est transmis par le réseau au second dispositif. Un autre sous-ensemble du numéro de compte-carte est préenregistré auprès d'une tierce personne de confiance, tel qu'un commerçant, une banque, une société émettrice de carte de crédit, un organisme de certification, un fournisseur de services de paiement ou analogue. Ces deux sous-ensembles sont combinés et transmis pour traitement à des réseaux existants de compensation de paiement.
PCT/SG2001/000024 2001-03-03 2001-03-03 Procede et systeme de transactions electroniques sensiblement securisees WO2002071177A2 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2001237888A AU2001237888A1 (en) 2001-03-03 2001-03-03 Method and system for substantially secure electronic transactions
PCT/SG2001/000024 WO2002071177A2 (fr) 2001-03-03 2001-03-03 Procede et systeme de transactions electroniques sensiblement securisees

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2001/000024 WO2002071177A2 (fr) 2001-03-03 2001-03-03 Procede et systeme de transactions electroniques sensiblement securisees

Publications (2)

Publication Number Publication Date
WO2002071177A2 true WO2002071177A2 (fr) 2002-09-12
WO2002071177A3 WO2002071177A3 (fr) 2005-03-10

Family

ID=20428906

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2001/000024 WO2002071177A2 (fr) 2001-03-03 2001-03-03 Procede et systeme de transactions electroniques sensiblement securisees

Country Status (2)

Country Link
AU (1) AU2001237888A1 (fr)
WO (1) WO2002071177A2 (fr)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1443728A3 (fr) * 2003-01-31 2005-07-06 Roke Manor Research Limited Explorateur de réseau de sécurité
WO2006073313A1 (fr) * 2005-01-05 2006-07-13 Lumex As Procede et systeme pour l'authentification d'information entree dans des systemes informatiques
WO2006100554A2 (fr) * 2005-03-10 2006-09-28 Axalto S.A Systeme et procede d'ouverture session securisee sur des systemes non proteges
WO2008148609A1 (fr) * 2007-06-08 2008-12-11 International Business Machines Corporation Procédé et système d'identification indépendante de la langue
CN1741074B (zh) * 2005-10-08 2011-03-16 胡阳 一种防止银行信用卡被盗用的方法
EP2300995A1 (fr) * 2008-07-08 2011-03-30 Alibaba Group Holding Limited Transmission d'informations en utilisant une séquence de frappe virtuelle
CN102045173A (zh) * 2009-10-12 2011-05-04 华为终端有限公司 用户设备的认证方法、装置和系统
US8095977B2 (en) 2007-01-19 2012-01-10 Microsoft Corporation Secure PIN transmission
DE102014201846A1 (de) * 2014-02-03 2015-08-06 Commocial Gmbh Verfahren zur sicheren Übertragung von Zeichen
US9552465B2 (en) 2012-07-20 2017-01-24 Licentia Group Limited Authentication method and system
US10592653B2 (en) 2015-05-27 2020-03-17 Licentia Group Limited Encoding methods and systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018139A1 (fr) * 1994-12-08 1996-06-13 Philips Electronics N.V. Entree de code de securite
GB2313460A (en) * 1996-05-21 1997-11-26 Bosch Gmbh Robert Graphical password entry
US5790785A (en) * 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
CA2214190A1 (fr) * 1997-10-15 1999-04-15 Michael Ernest Blom Clavier alphanumerique de saisie de donnees securitaire ameliore
WO2000048076A1 (fr) * 1999-02-12 2000-08-17 Arcot Systems, Inc. Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018139A1 (fr) * 1994-12-08 1996-06-13 Philips Electronics N.V. Entree de code de securite
US5790785A (en) * 1995-12-11 1998-08-04 Customer Communications Group, Inc. World Wide Web registration information processing system
GB2313460A (en) * 1996-05-21 1997-11-26 Bosch Gmbh Robert Graphical password entry
CA2214190A1 (fr) * 1997-10-15 1999-04-15 Michael Ernest Blom Clavier alphanumerique de saisie de donnees securitaire ameliore
WO2000048076A1 (fr) * 1999-02-12 2000-08-17 Arcot Systems, Inc. Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7933971B2 (en) 2003-01-31 2011-04-26 Roke Manor Research Limited Method for secure communication over a public data network via a terminal that is accessible to multiple users
EP1443728A3 (fr) * 2003-01-31 2005-07-06 Roke Manor Research Limited Explorateur de réseau de sécurité
WO2006073313A1 (fr) * 2005-01-05 2006-07-13 Lumex As Procede et systeme pour l'authentification d'information entree dans des systemes informatiques
WO2006100554A2 (fr) * 2005-03-10 2006-09-28 Axalto S.A Systeme et procede d'ouverture session securisee sur des systemes non proteges
WO2006100554A3 (fr) * 2005-03-10 2007-01-18 Axalto Sa Systeme et procede d'ouverture session securisee sur des systemes non proteges
CN1741074B (zh) * 2005-10-08 2011-03-16 胡阳 一种防止银行信用卡被盗用的方法
US8095977B2 (en) 2007-01-19 2012-01-10 Microsoft Corporation Secure PIN transmission
WO2008148609A1 (fr) * 2007-06-08 2008-12-11 International Business Machines Corporation Procédé et système d'identification indépendante de la langue
EP2300995A1 (fr) * 2008-07-08 2011-03-30 Alibaba Group Holding Limited Transmission d'informations en utilisant une séquence de frappe virtuelle
EP2300995A4 (fr) * 2008-07-08 2011-12-07 Alibaba Group Holding Ltd Transmission d'informations en utilisant une séquence de frappe virtuelle
US8484480B2 (en) 2008-07-08 2013-07-09 Alibaby Group Holding Limited Transmitting information using virtual input layout
CN102045173A (zh) * 2009-10-12 2011-05-04 华为终端有限公司 用户设备的认证方法、装置和系统
US10565359B2 (en) 2012-07-20 2020-02-18 Licentia Group Limited Authentication method and system
US9552465B2 (en) 2012-07-20 2017-01-24 Licentia Group Limited Authentication method and system
US10366215B2 (en) 2012-07-20 2019-07-30 Licentia Group Limited Authentication method and system
US11048783B2 (en) 2012-07-20 2021-06-29 Licentia Group Limited Authentication method and system
US11048784B2 (en) 2012-07-20 2021-06-29 Licentia Group Limited Authentication method and system
US11194892B2 (en) 2012-07-20 2021-12-07 Licentia Group Limited Authentication method and system
DE102014201846A1 (de) * 2014-02-03 2015-08-06 Commocial Gmbh Verfahren zur sicheren Übertragung von Zeichen
US10592653B2 (en) 2015-05-27 2020-03-17 Licentia Group Limited Encoding methods and systems
US10740449B2 (en) 2015-05-27 2020-08-11 Licentia Group Limited Authentication methods and systems
US11036845B2 (en) 2015-05-27 2021-06-15 Licentia Group Limited Authentication methods and systems
US11048790B2 (en) 2015-05-27 2021-06-29 Licentia Group Limited Authentication methods and systems

Also Published As

Publication number Publication date
AU2001237888A1 (en) 2002-09-19
WO2002071177A3 (fr) 2005-03-10

Similar Documents

Publication Publication Date Title
US7287270B2 (en) User authentication method in network
EP1316076B1 (fr) Systeme et procede d'identification de codes eliminables aleatoires synchrones integres
US8365988B1 (en) Dynamic credit card security code via mobile device
US7177835B1 (en) Method and device for generating a single-use financial account number
CA2688762C (fr) Transactions de carte de paiement securisees
US6163771A (en) Method and device for generating a single-use financial account number
US7891563B2 (en) Secure payment card transactions
KR20100054757A (ko) 대역밖 인증을 이용한 지불 거래 처리
WO2001090987A1 (fr) Systeme et procede de transactions
KR100715359B1 (ko) 모바일 결제 인증 시스템 및 방법
WO2002071177A2 (fr) Procede et systeme de transactions electroniques sensiblement securisees
WO2000062214A1 (fr) Technique de securite pour carte de credit
WO2001011515A2 (fr) Procede et systeme permettant de faire des paiements electroniques anonymes sur le web
CA2291430A1 (fr) Systeme de securite pour les transactions sur internet
KR20070080055A (ko) 도용방지용 온라인 비용결제 시스템 및 그 방법
WO2001092982A2 (fr) Systeme et procede de transactions securisees via un reseau de communication
JP4903346B2 (ja) 擬似或いは代理口座番号なしでコンピュータネットワークを越えて安全な支払いを処理するための改善された方法およびシステム
JP3497936B2 (ja) 個人認証方法
ZA200301322B (en) Code identification method and system.
EP1861804A2 (fr) Securisation d'autorisation d'acces
AU2003200600B2 (en) Code identification method and system
CN117372018A (zh) 一种基于b2c的电子商务安全支付系统及方法
WO2003012755A1 (fr) Procede et systeme d'identification de code
CA2204547A1 (fr) Methode permettant de proteger de bout en bout les transactions de services de paiement et de transfert electronique de fonds sur tout reseau non protege et non fiable
IES85150Y1 (en) Securing access authorisation

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP