WO2002071177A2 - Procede et systeme de transactions electroniques sensiblement securisees - Google Patents
Procede et systeme de transactions electroniques sensiblement securisees Download PDFInfo
- Publication number
- WO2002071177A2 WO2002071177A2 PCT/SG2001/000024 SG0100024W WO02071177A2 WO 2002071177 A2 WO2002071177 A2 WO 2002071177A2 SG 0100024 W SG0100024 W SG 0100024W WO 02071177 A2 WO02071177 A2 WO 02071177A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- network
- session
- user information
- customer
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000013479 data entry Methods 0.000 claims abstract description 13
- 238000012546 transfer Methods 0.000 claims description 2
- 238000004891 communication Methods 0.000 abstract description 4
- 238000012545 processing Methods 0.000 abstract description 3
- 238000013459 approach Methods 0.000 description 5
- 230000004913 activation Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
Definitions
- the present invention generally relates to a method of secure transaction via electronic communication, and more particularly, to a method of authentication and to a method for communicating user account information.
- a credit card facilitates making purchases over the network.
- users are justifiably concerned about placing orders for merchandise on networks such as the Internet, for example via E-mail, because of the lack of secure communications.
- Security on public networks at the present time is virtually non-existent, making it relatively easy for an unauthorized third party to gain access to credit card data transmitted over the network.
- Access from public terminals also exposes the customer to keylogging programs that can capture the credit card data. Once a dishonest person has the credit card number, thousands of dollars can be improperly charged to the customer's credit card account.
- the present invention provides a system that (1) enables a customer to place an order without concern that others may iUicitly gain access to the customer's credit card information, (2) relieve burden on the second (or trusted) party that others may illicitly gain access to their customer's full credit card information, (3) reveals no sensitive information to an observer and (4) reveals no information to someone posing as a customer.
- the present invention represents a workable solution to this problem that is relatively efficient and foolproof.
- a method for performing secure transactions in the context of a remote commercial transaction via electronic communication, such as over the Internet.
- electronic communication such as over the Internet.
- the customer is prompted to enter his account name and PIN by using data entry means such as a graphical keyboard at an electronic device. Values of the graphical keys are randomly generated and delivered as a definition file from another electronic device along a secure channel to the customer's first electronic device. The corresponding data in the definition file, instead of the actual authentication data, are communicated over the network when the customer enters the authentication information.
- the customer enters only a subset of the credit card account number to which the order is to be charged. Only this subset is transmitted over die network to the second device.
- Another subset of the credit card account number is pre-stored with a trusted party, such as the merchant, a bank, credit card company, certificate authority, payment service provider or like. The two subsets are combined and transmitted to existing payment clearing networks for processing.
- the data entry means such as a graphical keyboard and its random values in the definition file, it prevents any capturing of authentication and credit card information, either at the customer's terminal or over the network.
- this system offers high degree of security to the customer even when accessing from a public terminal.
- the present invention also protects the merchant and customer from the misuse of the customer's credit card by third parties. All credit card payments are verified against the pre-stored subsets of credit card data, hence unauthorized use of credit card is prevented.
- Figure 1 is a schematic representation of a flow chart showing various steps involved in the performance of the system and method of the present invention for substantially secure transactions;
- Figure 2 is a graphical representation of a process showing various steps involved in the performance of the system and method of the present invention for substantially securely communicating user information over a network between a first electronic device and a second electronic device during a session.
- Figure 3 is a graphical representation of a process showing various steps involved in the performance of the system and method of the present invention for substantially securely verifying tiiird-party information over a network between a first electronic device and a second electronic device during one of a transaction session.
- the present invention is directed towards a system and method for accomphshing substantially secure transactions.
- a credit card transaction is illustrated. It must be understood that this is intended to cover any kind of credit card, debit card, credit or debit account, savings or checking account, smart card or the like.
- the system as well as an attendant method is preferably instigated by the customer viewing a product, identifying a desired amount for a transaction as at 10, by an electronic device 1.
- a custodial authorizing entity may herein be defined as comprising that entity or institution which has or has been designated by the entity which has custodial responsibility for the financial data and security of a given credit card account of a customer.
- the custodial authorizing entity is one of a merchant, a bank, a credit card company, a certificate authority, a payment service provider, and the like, receives the activation request and authenticates that the request is from a trusted source.
- the authentication includes checking of IP address of the origin of activation request and the like. Such authentication is known to those skilled in the art.
- a new session is then created by the electronic device of the custodial authorizing entity at 16.
- the new session is given a unique Session Identifier.
- a set of random values corresponding to the letters (A-Z) in the alphabet and the digits (0-9) is also created at 16.
- the letters should consist of both sets of lowercase and uppercase letters.
- "pseudo-random" numbers as this term is commonly used in the art to apply, for example, to time-based or list-based number generating systems, may be used in place of random numbers in the system of the present invention.
- the random values are assigned accordingly to their graphical counterparts for the letters and digits. This can be achieved by tagging the random values to the corresponding graphical keys in the definition file belonging to the particular session.
- the icons or pictures for the alphabets and digits (0-9) can be in any of the commonly supported graphical formats, such as GIF, JPEG and PNG. These graphical letters and digits make up the graphical keyboard. Preferably, file names of the icons or pictures should be randomly generated too. Arrangement of the letters and digits may be varied regularly to enhance security.
- a Session Database stores a complete set of information required for that session at the electronic device 2 of the custodial authorizing entity at 18. The information may or may not be encrypted when it is stored in the database.
- the Session Identifier, graphical keyboard and other transaction information are delivered back as a definition file to the electronic device 1 of the customer over a secure channel such as SSL at 20.
- the definition file can take the form of a new browser window, the same browser window, a standalone Java applet, a Java applet embedded into a browser window or a browser plugin such as Flash S F files. In the preferred embodiment of the system, a new browser window with an embedded Java applet is used.
- a graphical keyboard is displayed on the electronic device 1 of the customer at 22.
- the customer uses the graphical keyboard to enter the authentication data, instead of the physical keyboard. This prevents any key-logging software from capturing the authentication data, as it is impossible to capture.
- the screen location where the graphical keyboard appears or the arrangement of each key is changed from time to time to prevent others from "guessing" by observing the positions of the pointer or cursor.
- Authentication data is transmitted over the network using a secure channel from electronic device 1 of the customer to the electronic device 2 of the custodial authorizing entity at 24.
- the present invention builds on security of existing network security protocols by sending only the session identifier and the random values of the keys returned by the customer. In the remotest chance of a hacker being able to intercept the messages, the information is useless in obtaining the actual values of the customer's input. It should also be noted that the use of screen coordinates may be used in place of random values in the system of the present invention.
- the custodial authorizing entity When the custodial authorizing entity receives the authentication data, it retrieves from the Session Database, with reference to'the Session Identifier, the actual values of the customer's input at 26. The actual values are then compared with the previous knowledge of the customer's authentication information stored on an Authentication Database at electronic device 2 of die custodial authorizing entity at 28. This database can to be encrypted for added security.
- the custodial authorizing entity transmit verification correct to customer of electronic device 1 to get customer to enter the credit card information using the graphical keyboard at 32.
- Customer credit information is transmitted over the network using a secure channel from electronic device 1 of the customer to the electronic device 2 of the custodial authorizing entity at 34.
- Custodial authorizing entity may perform validation of customer credit number before approving transaction at 36.
- an illustrated procedure shows how a registered customer is protected against unauthorised use of his credit card information by the merchant or any third party during electronic transactions.
- Such transactions include for example: purchasing goods or services by transferring funds (paying) to a merchant's financial account; or transferring funds between a person's personal accounts, including credit card, debit or stored-value and bank (saving or checking) accounts.
- Use of the procedure for the above transactions allows a customer to execute any electronic transaction from anywhere safely.
- the customer can choose to pay from any pre-registered credit card, savings, checking, prepaid or debit account.
- the customer then enters a subset of the credit card, savings, checking, prepaid or debit accoimt number depending on the payment choices (Step 1).
- the graphical keyboard at 38 is used. In the remotest chance of a hacker being able to intercept the messages, the information is useless as only partial numbers are transmitted. Furthermore, the actual values transmitted are coded as random values.
- the trusted party at 40 stores subsets of the customer's account number(s) in an Account Database. This database can to be encrypted for added security. A pre- stored set of the selected account number is retrieved from the Account Database and combined with the actual values of the customer's input (Step 2). The combined values and relevant information are joined to form a Transaction Message.
- the Transaction Message is encrypted and sent over secure connections to existing banking networks for processing.
- the TM can be sent by the trusted party directly to the banking network at 42 or indirectly to the merchant who re-transmits it to the banking network as is known to those skilled in the art.
- an illustrated procedure shows how a registered customer and merchant are protected against fraudulent use of the customer's credit card by third party.
- Such transactions could include for example: purchasing a good or service by transferring funds (paying) to a second party's financial account; or transferring funds between a person's credit accounts, from credit to debit or stored- value accounts, to, from, or between bank (saving or checking) accounts.
- This procedure is carried out by the customer at 44 first registering with the trusted party at 46 (Step 1).
- the trusted patty such as the merchant, a bank, credit card company, certificate authority, payment service provider or like, receives the registration and verifies that it is legitimate (Step 2).
- the trusted party stores a subset of the customer's account data (Step 3). All subsequent transactions by non-registered customers are verified against the database of pre-stored account data (Step 4).
- a non-registered customer at 48 enters information for purchases, the information is compared to the database of pre-stored accoimt data that belong to the registered customers. This is performed by the trusted party at 50. If there is a match, the non-registered customer at 52 is asked to either log in or change the account information used for payment (Step 5) because a registered customer's data is being used without authorisation.
- the present invention therefore, prevents any fraudulent use of die registered customer's account by third party. However, the effectiveness of this system depends on the number of accounts that are pre-stored at the trusted party.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001237888A AU2001237888A1 (en) | 2001-03-03 | 2001-03-03 | Method and system for substantially secure electronic transactions |
PCT/SG2001/000024 WO2002071177A2 (fr) | 2001-03-03 | 2001-03-03 | Procede et systeme de transactions electroniques sensiblement securisees |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/SG2001/000024 WO2002071177A2 (fr) | 2001-03-03 | 2001-03-03 | Procede et systeme de transactions electroniques sensiblement securisees |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002071177A2 true WO2002071177A2 (fr) | 2002-09-12 |
WO2002071177A3 WO2002071177A3 (fr) | 2005-03-10 |
Family
ID=20428906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SG2001/000024 WO2002071177A2 (fr) | 2001-03-03 | 2001-03-03 | Procede et systeme de transactions electroniques sensiblement securisees |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001237888A1 (fr) |
WO (1) | WO2002071177A2 (fr) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1443728A3 (fr) * | 2003-01-31 | 2005-07-06 | Roke Manor Research Limited | Explorateur de réseau de sécurité |
WO2006073313A1 (fr) * | 2005-01-05 | 2006-07-13 | Lumex As | Procede et systeme pour l'authentification d'information entree dans des systemes informatiques |
WO2006100554A2 (fr) * | 2005-03-10 | 2006-09-28 | Axalto S.A | Systeme et procede d'ouverture session securisee sur des systemes non proteges |
WO2008148609A1 (fr) * | 2007-06-08 | 2008-12-11 | International Business Machines Corporation | Procédé et système d'identification indépendante de la langue |
CN1741074B (zh) * | 2005-10-08 | 2011-03-16 | 胡阳 | 一种防止银行信用卡被盗用的方法 |
EP2300995A1 (fr) * | 2008-07-08 | 2011-03-30 | Alibaba Group Holding Limited | Transmission d'informations en utilisant une séquence de frappe virtuelle |
CN102045173A (zh) * | 2009-10-12 | 2011-05-04 | 华为终端有限公司 | 用户设备的认证方法、装置和系统 |
US8095977B2 (en) | 2007-01-19 | 2012-01-10 | Microsoft Corporation | Secure PIN transmission |
DE102014201846A1 (de) * | 2014-02-03 | 2015-08-06 | Commocial Gmbh | Verfahren zur sicheren Übertragung von Zeichen |
US9552465B2 (en) | 2012-07-20 | 2017-01-24 | Licentia Group Limited | Authentication method and system |
US10592653B2 (en) | 2015-05-27 | 2020-03-17 | Licentia Group Limited | Encoding methods and systems |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996018139A1 (fr) * | 1994-12-08 | 1996-06-13 | Philips Electronics N.V. | Entree de code de securite |
GB2313460A (en) * | 1996-05-21 | 1997-11-26 | Bosch Gmbh Robert | Graphical password entry |
US5790785A (en) * | 1995-12-11 | 1998-08-04 | Customer Communications Group, Inc. | World Wide Web registration information processing system |
CA2214190A1 (fr) * | 1997-10-15 | 1999-04-15 | Michael Ernest Blom | Clavier alphanumerique de saisie de donnees securitaire ameliore |
WO2000048076A1 (fr) * | 1999-02-12 | 2000-08-17 | Arcot Systems, Inc. | Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique |
-
2001
- 2001-03-03 WO PCT/SG2001/000024 patent/WO2002071177A2/fr active Application Filing
- 2001-03-03 AU AU2001237888A patent/AU2001237888A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1996018139A1 (fr) * | 1994-12-08 | 1996-06-13 | Philips Electronics N.V. | Entree de code de securite |
US5790785A (en) * | 1995-12-11 | 1998-08-04 | Customer Communications Group, Inc. | World Wide Web registration information processing system |
GB2313460A (en) * | 1996-05-21 | 1997-11-26 | Bosch Gmbh Robert | Graphical password entry |
CA2214190A1 (fr) * | 1997-10-15 | 1999-04-15 | Michael Ernest Blom | Clavier alphanumerique de saisie de donnees securitaire ameliore |
WO2000048076A1 (fr) * | 1999-02-12 | 2000-08-17 | Arcot Systems, Inc. | Procede et appareil pour une introduction securisee de codes d'acces dans un environnement informatique |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7933971B2 (en) | 2003-01-31 | 2011-04-26 | Roke Manor Research Limited | Method for secure communication over a public data network via a terminal that is accessible to multiple users |
EP1443728A3 (fr) * | 2003-01-31 | 2005-07-06 | Roke Manor Research Limited | Explorateur de réseau de sécurité |
WO2006073313A1 (fr) * | 2005-01-05 | 2006-07-13 | Lumex As | Procede et systeme pour l'authentification d'information entree dans des systemes informatiques |
WO2006100554A2 (fr) * | 2005-03-10 | 2006-09-28 | Axalto S.A | Systeme et procede d'ouverture session securisee sur des systemes non proteges |
WO2006100554A3 (fr) * | 2005-03-10 | 2007-01-18 | Axalto Sa | Systeme et procede d'ouverture session securisee sur des systemes non proteges |
CN1741074B (zh) * | 2005-10-08 | 2011-03-16 | 胡阳 | 一种防止银行信用卡被盗用的方法 |
US8095977B2 (en) | 2007-01-19 | 2012-01-10 | Microsoft Corporation | Secure PIN transmission |
WO2008148609A1 (fr) * | 2007-06-08 | 2008-12-11 | International Business Machines Corporation | Procédé et système d'identification indépendante de la langue |
EP2300995A1 (fr) * | 2008-07-08 | 2011-03-30 | Alibaba Group Holding Limited | Transmission d'informations en utilisant une séquence de frappe virtuelle |
EP2300995A4 (fr) * | 2008-07-08 | 2011-12-07 | Alibaba Group Holding Ltd | Transmission d'informations en utilisant une séquence de frappe virtuelle |
US8484480B2 (en) | 2008-07-08 | 2013-07-09 | Alibaby Group Holding Limited | Transmitting information using virtual input layout |
CN102045173A (zh) * | 2009-10-12 | 2011-05-04 | 华为终端有限公司 | 用户设备的认证方法、装置和系统 |
US10565359B2 (en) | 2012-07-20 | 2020-02-18 | Licentia Group Limited | Authentication method and system |
US9552465B2 (en) | 2012-07-20 | 2017-01-24 | Licentia Group Limited | Authentication method and system |
US10366215B2 (en) | 2012-07-20 | 2019-07-30 | Licentia Group Limited | Authentication method and system |
US11048783B2 (en) | 2012-07-20 | 2021-06-29 | Licentia Group Limited | Authentication method and system |
US11048784B2 (en) | 2012-07-20 | 2021-06-29 | Licentia Group Limited | Authentication method and system |
US11194892B2 (en) | 2012-07-20 | 2021-12-07 | Licentia Group Limited | Authentication method and system |
DE102014201846A1 (de) * | 2014-02-03 | 2015-08-06 | Commocial Gmbh | Verfahren zur sicheren Übertragung von Zeichen |
US10592653B2 (en) | 2015-05-27 | 2020-03-17 | Licentia Group Limited | Encoding methods and systems |
US10740449B2 (en) | 2015-05-27 | 2020-08-11 | Licentia Group Limited | Authentication methods and systems |
US11036845B2 (en) | 2015-05-27 | 2021-06-15 | Licentia Group Limited | Authentication methods and systems |
US11048790B2 (en) | 2015-05-27 | 2021-06-29 | Licentia Group Limited | Authentication methods and systems |
Also Published As
Publication number | Publication date |
---|---|
AU2001237888A1 (en) | 2002-09-19 |
WO2002071177A3 (fr) | 2005-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7287270B2 (en) | User authentication method in network | |
EP1316076B1 (fr) | Systeme et procede d'identification de codes eliminables aleatoires synchrones integres | |
US8365988B1 (en) | Dynamic credit card security code via mobile device | |
US7177835B1 (en) | Method and device for generating a single-use financial account number | |
CA2688762C (fr) | Transactions de carte de paiement securisees | |
US6163771A (en) | Method and device for generating a single-use financial account number | |
US7891563B2 (en) | Secure payment card transactions | |
KR20100054757A (ko) | 대역밖 인증을 이용한 지불 거래 처리 | |
WO2001090987A1 (fr) | Systeme et procede de transactions | |
KR100715359B1 (ko) | 모바일 결제 인증 시스템 및 방법 | |
WO2002071177A2 (fr) | Procede et systeme de transactions electroniques sensiblement securisees | |
WO2000062214A1 (fr) | Technique de securite pour carte de credit | |
WO2001011515A2 (fr) | Procede et systeme permettant de faire des paiements electroniques anonymes sur le web | |
CA2291430A1 (fr) | Systeme de securite pour les transactions sur internet | |
KR20070080055A (ko) | 도용방지용 온라인 비용결제 시스템 및 그 방법 | |
WO2001092982A2 (fr) | Systeme et procede de transactions securisees via un reseau de communication | |
JP4903346B2 (ja) | 擬似或いは代理口座番号なしでコンピュータネットワークを越えて安全な支払いを処理するための改善された方法およびシステム | |
JP3497936B2 (ja) | 個人認証方法 | |
ZA200301322B (en) | Code identification method and system. | |
EP1861804A2 (fr) | Securisation d'autorisation d'acces | |
AU2003200600B2 (en) | Code identification method and system | |
CN117372018A (zh) | 一种基于b2c的电子商务安全支付系统及方法 | |
WO2003012755A1 (fr) | Procede et systeme d'identification de code | |
CA2204547A1 (fr) | Methode permettant de proteger de bout en bout les transactions de services de paiement et de transfert electronique de fonds sur tout reseau non protege et non fiable | |
IES85150Y1 (en) | Securing access authorisation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase in: |
Ref country code: JP |