WO2014118065A1 - Method for authorising access to a service via a mobile telephone by validation of a prepayment implementing an rfid card and associated devices - Google Patents
Method for authorising access to a service via a mobile telephone by validation of a prepayment implementing an rfid card and associated devices Download PDFInfo
- Publication number
- WO2014118065A1 WO2014118065A1 PCT/EP2014/051266 EP2014051266W WO2014118065A1 WO 2014118065 A1 WO2014118065 A1 WO 2014118065A1 EP 2014051266 W EP2014051266 W EP 2014051266W WO 2014118065 A1 WO2014118065 A1 WO 2014118065A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile terminal
- mpt
- validation
- service
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/28—Pre-payment schemes, e.g. "pay before"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/321—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/342—Cards defining paid or billed services or quantities
Definitions
- the field of the invention relates to the validation of a pre-payment using a mobile terminal, with a view to authorising access to a service.
- the diversity of commercial offers relating to mobile telephony services includes options known as "prepaid". These options enable the purchase, before access to the service, for a predefined amount, of a time of access to the service or a number of units for quantifying access to the service. The payment is therefore made before the use of the service which is associated therewith and corresponding rights are stored by the mobile telephony system.
- the user has a mobile telephone equipped with his authentication card (SIM (subscriber identity module) card), also called a terminal, and purchases, according to his needs in terms of communication time (or time of use of a service), prepayment cards each associated with an amount (a sum of money).
- SIM subscriber identity module
- the principle of implementation of a payment using these cards is based on an identification number (also called an activation code) marked on each card. At the time of purchase, the number present on the card is hidden. The number is printed in an area sometimes covered by a panel which can be removed by scratching or hidden by an opaque packaging element.
- the user first acquaints himself with the number, after scratching off the panel or after removing the packaging then dials, on his mobile telephone, a specific number for accessing a payment validation server. Once communication is established with the validation server, the user enters the number on the card on his mobile telephone, which leads to the activation of rights to telephone communication for a predefined period or for a predefined amount (sum of money).
- the operation consists in activating telephone rights associated with a prepaid card.
- the telephone rights also apply to the transmission of short messages of SMS type.
- the number to be entered is generally long in order to avoid the likelihood of finding a valid number without having previously purchased a valid prepaid card.
- This method comprising the entry of a long number is sometimes tedious, notably for elderly people or those suffering from visual impairments.
- the number must, furthermore, be entered within a designated, generally quite short, time. In case of error when entering the number, the validation does not take place and the operation must be started again.
- the method is therefore sometimes tricky to carry out. 3. Summary of the invention.
- the invention enables the situation to be improved by proposing an easier method, requiring less time and with an increased level of security.
- the invention relates to a method for validation of access to a service, in a mobile terminal, the mobile terminal being suitable for the implementation of the service and comprising at least two communication interfaces, the method being characterised in that it comprises steps of :
- RFID radio frequency identification
- the step of transmission comprises a step of receipt of a notification of access validation or payment validation.
- the step of coupling comprises the transmission of an activation code from the radio frequency identification (RFI D) tag to the mobile terminal.
- RFID D radio frequency identification
- the request comprises the activation code read from the RFID tag or an item of information representative of this activation code.
- the method comprises, before the step of coupling, a step of activation of the radio frequency identification tag.
- the step of activation of the tag comprises the removal of a mechanical element of the radio frequency identification tag whose position aims to render inoperative the transmissions to and from the identification tag.
- the mechanical element of the radio frequency identification tag constitutes a shield to reduce the effectiveness of an antenna of the radio frequency identification tag.
- the method comprises a step of entering, on the mobile terminal, a second validation code, the second validation code being associated with the radio frequency identification tag.
- this second code is a short code marked on the RFI D tag.
- the invention also relates to a mobile terminal, such as a mobile telephone, for example, suitable for the implementation of a service (telephone communications and transmission of messages) and for the validation of the payment for access to this service or more generally of access to this service.
- the mobile terminal comprises at least two wireless communication interfaces; it further comprises:
- the terminal is suitable for the implementation of mobile telephony operations.
- the first interface of the mobile terminal is compatible with an NFC (near field communication) wireless communication standard.
- NFC near field communication
- the invention further relates to an RFID (radio frequency identification) tag configured for the transmission of an activation code to a mobile terminal with a view to validating a payment relating to access to a service from the mobile terminal.
- the RFID tag is configured for the transmission, receipt and storage of an information code from a mobile terminal, the information relating to the validation of access to a service by a mobile terminal.
- the radio frequency identification tag comprises a detachable mechanical element whose position, on the identification tag, aims to render inoperative the communication operations from and to the identification tag.
- the detachable mechanical element of the RFID tag is a breakable part, such as for example a breakable corner, of the identification tag, the breakable part comprising a shielding element aiming to reduce or negate the effectiveness of an antenna of the identification tag, which antenna is used for the transmissions of data from and to the RFI D identification tag.
- the invention also relates to a device comprising an antenna element constituted of a short-circuit loop, characterised in that:
- the device is configured to be associated with an antenna of a device of radio frequency identification (RFID) tag type and,
- the device comprising the loop antenna is suitable for modifying the characteristics of the antenna of the radio frequency identification (RFID) tag, so that communications with the tag are rendered inoperative by the association.
- RFID radio frequency identification
- the invention therefore proposes to replace an activation code printed on a prepaid card with a passive RFI D identification tag which contains the activation code and is suitable for transmitting it to a mobile terminal equipped with an NFC reader upon request of the latter.
- the call to a specific remote server is replaced with a transaction for validation of access (and/or of payment), under control of an application executed on the mobile terminal.
- the application establishes a connection with a remote server, via a network; the remote server being configured to carry out operations for access validation and maintain a list of access rights to one or more services, according to the transactions and/or payments previously validated for each of the holders of compatible mobile telephones.
- the mobile terminal writes to the RFID identification tag, during a step of notification, information aiming to identify the terminal and/or its holder.
- information aiming to identify the terminal and/or its holder.
- the method makes it possible to strengthen the security of the process as the number (activation code) can be significantly longer since it does not need to be entered manually during an operation carried out be the user of the mobile telephone.
- the code can comprise several tens of successive symbols, for example, according to the capacity of an internal memory of the RFID tag.
- the method simplifies the operations useful for the validation of access (and/or of payment) and for "topping up" units for consuming/accessing a service of the mobile terminal.
- the method makes it possible to simplify the use of a prepayment card for users less accomplished at this type of operation or having visual impairments, for example.
- the presence of a breakable element of the tag advantageously makes it possible to verify that it is not possible to have used the tag before its acquisition.
- the presence of a (possibly very short) code associated with the user makes it possible to increase further the level of security of the operation for validation of access and/or of payment while not being detrimental to the ease of implementation of the method. 4. List of figures.
- FIG. 1 shows a mobile telephony system comprising a station, a mobile terminal coupled to an RFID identification tag, a network and a payment validation server.
- FIG. 2 shows the mobile terminal device of figure 1 .
- FIG. 3 is a functional diagram showing a method for validation of payment by prepaid RFI D tag, according to the concept of the invention.
- modules shown are functional units that may or may not correspond to physically distinguishable units.
- these modules or some of them are grouped together in a single component, or constituted of functions of the same software.
- some modules are composed of separate physical entities.
- Figure 1 shows a mobile telephony system comprising a station (also called a terminal or relay) MPSTA 3 of a mobile telephony network MPNET 4.
- a mobile telephony terminal MPT 1 is connected to the station MPSTA 3 by a wireless connection.
- the network is of GSM or 3G or 4G type.
- An authentication and payment validation server MPAUTHSRV 5 is also connected to the mobile telephony network MPNET 4.
- a prepaid payment tag RFIDT 2 is coupled with the mobile terminal MPT 1 , with a view to validating a payment enabling access to a service.
- the service corresponds to the capacity to transmit and receive telephone calls from and to the mobile terminal MPT 1 , and via the mobile telephone network MPNET 4.
- the service also includes the exchange of data via the intermediary of the mobile telephone network MPNET 4.
- the mobile telephony terminal MPT 1 comprises a near field, bidirectional, wireless communication interface, more commonly called an NFC interface. This interface enables coupling with other items of equipment compatible with the NFC standard and the exchange of data at relatively short distances. The distances range from direct contact to several centimetres. The significant proximity necessary for establishing communications, specific to the NFC standard, guarantees a high level of security.
- the NFC interface suitable for reading the radio frequency identification tag RFI DT 2, enables, according to the inventive concept, a validation code (or activation code) comprised in the tag RFIDT 2 to be entered during a transaction for validation of payment under control of a specific application executed by the mobile telephony terminal MPT 1 .
- the method for coupling between the mobile telephony terminal MPT 1 and the tag RFIDT 2, called “near field", in NFC mode, uses electromagnetic coupling between two loop antennae in order to communicate.
- the energy generated by the emission of radio frequency waves within the antenna of the RFID tag makes it possible to supply power thereto without recourse to an external power supply source.
- the equivalent circuit diagram of a loop antenna corresponds to a resonant circuit whose inductor is constituted by the antenna and capacitor is defined by the electronic circuit (or embedded chip) and notably by the input capacitor of the circuit.
- a protective device consists in incorporating in the radio frequency identification tag RFI DT 2 a breakable corner comprising a short- circuit loop coupled to the antenna.
- This loop added at manufacture, either be the same manufacturing process as the antenna or by printing using conductive ink, has the effect of reducing the overall impedance of the antenna, which results in a shift in the resonance to higher frequencies, thus preventing the correct operation of the identification tag RFI DT 2.
- the action of breaking the pre- scored corner of the prepaid identification tag RFI DT 2 before its use with a view to validation of the payment for access to the telephony service leads to the resetting of the value of the inductance of the antenna to its nominal value and therefore to the resonance required for operation according to the NFC communication standard.
- the tag RFIDT 2 is prepared, for example by breaking the breakable corner previously described. According to a variant, the breakable corner preventing the use or inadvertent reading of the tag RFI DT 2 is not present and the tag is immediately readable.
- the user executes an application for validation of payment on the mobile terminal MPT 1 .
- the application configures the NFC interface of the mobile terminal MPT 1 to enable the reading of the tag RFIDT 2 by the mobile terminal MPT 1 .
- the tag RFI DT 2 is then read when it is sufficiently close to the terminal MPT 1 . During this reading operation, an activation code is transmitted from the tag to the mobile terminal MPT 1 .
- This code comprises information representative of credit for consuming the telephony service.
- This information corresponds, according to the tag, to a sum of money, units of time of consumption (telephone communication, for example) or units of capacity of access to variants of use of the service (access to data, download of content, etc.).
- the activation code is transmitted by the mobile terminal MPT 1 to the authentication and payment validation server MPAUTHSRV 5, via the intermediary of the mobile telephony station MPSTA 3 and via the mobile telephony network MPNET 4.
- the transmission of the code is carried out by transmission of a payment validation request.
- the server analyses the transmitted code and verifies its integrity by use of a verification algorithm defined by the service provider responsible for the implementation of the payment or of the system.
- the holder of the mobile terminal MPT 1 is associated, by storage in the payment validation server MPAUTHSRV 5, with rights to use the service depending on the transmitted activation code.
- An activation code can, for example, correspond to predefined credit of five euros.
- Another code can, for example, correspond to rights to thirty minutes of telephone communication.
- the exchanges between the mobile telephony terminal MPT 1 and the authentication and payment validation server are encrypted in order to increase the security of the system for validation of payment and of access to the service.
- the tag RFIDT 2 is compatible with NFC standard IS014444, standard IS015693 or an evolution of one of these standards.
- the tag RFIDT 2 comprises a non-volatile memory making it possible to write a unique activation code, at manufacture.
- FIG 2 shows architectural details of the mobile telephony terminal MPT 1 which appears in figure 1 .
- the mobile terminal MPT 1 comprises a control unit CU suitable for implementing typical mobile telephony functions and executing embedded software applications.
- the control unit CU comprises non-volatile memory for storing data (executable programs, systems data, data relating to the user and services) and volatile memory useful for executing software routines.
- the mobile terminal comprises an input/output module K, connected to the control unit CU by a communication bus KBUS.
- the input/output module K comprises a touch screen enabling a contextual display, and the entry of data by the user, on a keyboard displayed on the screen.
- the input/output module K also comprises typical input/output elements, such as a vibrator, one or more light-emitting diodes, a microphone, an earphone and associated interfacing circuits.
- the mobile terminal MPT comprises a power supply module PSU.
- This module comprises a rechargeable energy accumulator and associated circuits. It supplies power to the various modules and circuits which constitute the mobile terminal MPT, notably via a power bus PBUS.
- the mobile terminal MPT further comprises two communication interfaces, MP-IF1 and MP-IF2.
- MP-I F1 and MP-IF2 are bidirectional wireless communication interfaces. More specifically and still according to the embodiment of the invention, MP-IF2 is a communication interface compatible with the NFC standard. This interface enables the exchange of data with a radio frequency identification (RFI D) tag device.
- RFID D radio frequency identification
- the NFC communication interface MP-I F2 is therefore configured and suitable for reading an activation code (also called activation number) in a radio frequency identification tag and more specifically in the tag RFI DT 2 shown in figure 1 .
- the mobile terminal MPT also comprises a wireless bidirectional communication interface MP-IF1 , coupled to an antenna ANT, enabling the exchange of data with the mobile telephony network MPNET 4, via the intermediary of the mobile telephony station MPSTA 3 to which the mobile terminal MPT is connected. When roaming, the mobile terminal can be connected to a plurality of other stations similar to station MPSTA 3 but not shown, not being necessary for the understanding of the invention.
- communication interface MP-I F1 is compatible with the GSM, EDGE, GPRS, 3G and 4G mobile telephony standards, traditionally used on a mobile telephony network.
- the mobile terminal MPT and RFID tag RFI DT 2 are coupled via the intermediary of NFC interface MP-IF2 in order to read a payment validation code comprised in the RFI D tag RFI DT 2 which is sent by the mobile terminal MPT to the authentication and payment validation server MPAUTHSRV 5.
- This operation participates in a transaction for validation of payment for access to the telephony service implemented by an operator on the network MPNET 4.
- the mobile terminal MPT is suitable for the implementation of the service and comprises at least two communication interfaces MP-I F1 and MP-IF2.
- the payment validation method comprises, according to the inventive concept, the steps of :
- the application is executed by the control unit CU and interacts with the user of the mobile terminal via the input/output module K and its touch keyboard, - coupling, by means of NFC interface MP-I F2, the radio frequency identification tag RFI DT 2 with the mobile terminal MPT; the coupling comprises the transmission of an activation code from the tag RFIDT 2 to the mobile terminal MPT,
- the request for validation of access and/or of payment transmitted from the mobile terminal MPT to the remote server MPAUTHSRV 5 comprises the activation code read from the tag RFDIT 2.
- the data authentication server MPAUTHSRV 5 when the data authentication server MPAUTHSRV 5 has recognised and validated the code read in the tag RFIDT 2 (or an item of information representative of this activation code), it transmits information to the mobile terminal MPT, with a view to providing notification of the validity of the access and/or payment as well as access to the corresponding service and storage of associated rights.
- the operation of storing associated rights comprises the storage, in the remote server MPAUTHSRV 5, of information making it possible to identify the mobile terminal MPT 1 , its holder and an identifier of the radio frequency tag RFI DT 2.
- the notification is made during a step of receipt of a notification of access validation and/or payment validation by the mobile terminal MPT 1 .
- the mobile terminal stores at least one item of information relating to the validation of access to a service, or of payment for access to this service, in the RFID label RFIDT 2 indicating that the tag has been successfully used and aiming to invalidate any other attempt at subsequent use.
- the terminal MPT sends a request to the remote server MPAUTHSRV 5.
- the request comprises the activation code previously read in the tag RFI DT 2 or an item of information representative of this code.
- the tag In the case where the tag is equipped with a breakable part comprising a shielding element or an antenna element aiming to redefine the resonance frequency of the system, it must be removed before carrying out the coupling of the tag RFI DT 2 with the terminal MPT 1 , via its NFC communication interface MP-I F2.
- the procedure for validation of access to a service and/or of payment for access to this service comprises an additional step, before or after the coupling of the tag RFIDT 2 with the terminal MPT 1 , during which the user enters an additional item of information readable by him on the tag RFI DT 2 into the mobile terminal MPT, via the input/output module K (via the touch screen of the terminal MPT, for example).
- This complementary item of information makes it possible to increase the security of the transaction even further by completely avoiding the possibility of carrying out a payment validation by bringing the tag and the terminal into close proximity inadvertently, it only being possible to finalise the transaction for validation of access to the service or of payment if this manual operation has taken place.
- the complementary information is a very short code, for example a 1 , 2 or 3 digit code, similar to the visual cryptograms used during remote payment transactions by bank card.
- the mobile terminal MPT is therefore suitable for the implementation of a telephony and data transmission service and for the validation of access and/or of payment for access to this (or these) service(s).
- the terminal MPT comprises at least two wireless communication interfaces MP-IF1 and MP-IF2. It further comprises means for executing the application for validation of access and/or of payment for access, for configuring interface MP-IF2 for the coupling of the radio frequency identification tag RFI DT 2, the coupling comprising the transmission of the activation code useful for the validation of access and/or of payment, and means for configuring interface MP-IF1 for the transmission of a request for validation of access and/or of payment for access to the remote server MPAUTHSRV 5.
- the terminal MPT 1 is suitable for the implementation of mobile telephony operations as known to those skilled in the art.
- FIG. 3 is a diagram showing the method implemented for the transaction for validation of access to a service and/or of payment for access to a service according to the embodiment of the invention.
- Step SO corresponds to the initial step.
- the mobile terminal MPT is connected to the mobile telephony network MPNET 4, via the station STA 3, and is configured for the implementation of typical mobile telephony functions.
- the mobile terminal is configured for accessing the mobile telephony service according to a billing method known as "prepaid".
- prepaid billing method
- the holder/user of the mobile telephone purchases the tag RFIDT 2 which contains an activation code for validating access rights to the service.
- the purchase of the tag is characterised by a price. This price corresponds to the credit which will result from a transaction for validation of access and will give rise to the storage of access rights to the service for the mobile terminal MPT 1 , equivalent to the price paid.
- the sale of the tag RFIDT 2 to the holder/user of the mobile terminal MPT 1 therefore constitutes a billing system for access to the mobile telephony service by the terminal MPT 1 .
- the user/holder of the mobile terminal MPT 1 who wishes to perform a top-up of credit and to increase his rights to use the mobile telephony service launches the execution, in step S1 , of a top-up/payment/access validation/access rights acquisition application on the terminal MPT 1 .
- the top-up/payment/access validation/access rights acquisition application is automatically launched following the detection by the mobile terminal MPT 1 of the tag RFIDT 2 being moved into close proximity.
- a step of validation of the tag RFI DT 2 is necessary and comprises the removal of a breakable (detachable) part of the tag.
- This part comprises an antenna element or a shielding element aiming to modify the characteristics of the antenna and to inhibit the operation of the tag RFI DT 2 before its removal.
- the step of validation of the tag RFI DT 2 is carried out at the checkout at the retailer, by writing, using a device equipped with an NFC interface, an item of information aiming then to indicate to the mobile terminal MPT 1 used for the access validation transaction operation that the tag RFIDT 2 is valid.
- the tag is therefore configured at manufacture to appear invalid to a mobile terminal such as MPT 1 and is then validated at the checkout at the retailer.
- a second item of information will then subsequently be written to the tag RFIDT 2, in case of success of the payment validation transaction, in order to invalidate the tag RFIDT 2 having been successfully used for the validation of access or the acquisition of access rights to a service.
- the activation code contained in the tag RFIDT 2 is read by the mobile terminal MPT 1 .
- the details for implementation of the tag RFI D which comprises a control unit, a non-volatile memory and a volatile memory, are not described here, not being necessary for the understanding of the inventive concept.
- step S3 the activation code, which encodes the credit corresponding to the purchase (to the price) of the tag RFIDT 2 is transmitted to the remote server for validation of access and or of payment for access rights MPAUTHSRV 5, under control of the application for validation of access to a service and the control unit CU of the mobile terminal MPT 1 .
- the server analyses the code as well as the other information inserted into the request for validation of access and/or of payment for access to a service, such as (identification) information representative of the mobile terminal and its holder.
- the server When the server detects that the activation code is valid, it stores the access rights to the mobile telephony service corresponding to the purchase price of the tag RFI DT 2.
- the access rights are stored (updated) in a database of the mobile telephony system, for example on the server M PAUTHSRV 5, and will be updated gradually with use (of access to the service).
- An item of notification information is then sent by the remote server MPAUTHSRV 5 to the mobile terminal MPT 1 and made available to the user under control of the application for validation of access and/or of payment.
- an item of information for validation of access and/or of payment is written to a non-volatile memory of the tag RFIDT 2 (for example to a data register).
- the server does not succeed in validating the activation code presented by the request, for example in the case where this code has already been the subject of a previous payment validation, it provides notification of the failure of the procedure to the user and does not store rights associated with access to the service.
- the step of coupling the terminal and the tag comprises a step of reading an item of information comprises in the tag RFIDT 2 indicating whether the tag has already been used previously.
- the executed application for validation of access and/or of payment provides a notification of invalidity of the tag to the user.
- the invention also relates to a device comprising an antenna element constituted of a short-circuit loop which, associated with the antenna of the tag RFIDT 2, aims to modify the characteristics of the antenna of the tag RFI DT 2, so that the communications with the tag are rendered inoperative by the association.
- the device comprising the short-circuit loop antenna is for example a breakable (detachable) corner connected to the tag and therefore the proximity sufficiently modifies the inductance of the antenna so that it cannot operate normally and so that the tag cannot be used without first having detached the breakable corner, and therefore the device.
- this device is a packaging element wherein is inserted the tag.
- the tag cannot be coupled to a mobile terminal with a view to carrying out a transaction for validation of access and/or of payment for access if it has not been removed from the packaging which, due to the presence of the loop antenna, prevents radio frequency coupling of the tag.
- the invention is described by an embodiment where the mobile terminal is a mobile telephony terminal and where the service is a mobile telephony service.
- the invention is not limited to this embodiment but also applies to any type of mobile terminal comprising an interface suitable for the coupling of a radio frequency identification tag and a telecommunication interface configured for connection to a remote server for validation of access to a service, such as, for example, a tablet, a portable computer, a games console, a personal organiser, a portable video player, a portable audio player or a smartwatch.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to a method for validation of access to a service, in a mobile terminal (MPT 1). The mobile terminal (MPT 1) is suitable for the implementation of the service and comprises at least two communication interfaces (MP-IF2, MP-IF1). The method comprises steps of starting up an application (S1) for validation of access on the mobile terminal, of coupling (S2), by means of the first interface of a radio frequency identification tag and of transmitting a request for validation (S3) of payment from the second interface (MP-IF1) of said terminal, to a remote server (MPAUTHSRV 5). The invention also relates to the mobile terminal (MPT 1), the identification tag (RFIDT 2) and an antenna shielding element.
Description
METHOD FOR AUTHORISING ACCESS TO A SERVICE VIA A MOBILE TELEPHONE BY VALIDATION OF A PREPAYMENT IMPLEMENTING AN RFID
CARD AND ASSOCIATED DEVICES 1. Field of the invention.
The field of the invention relates to the validation of a pre-payment using a mobile terminal, with a view to authorising access to a service. 2. Prior Art.
The diversity of commercial offers relating to mobile telephony services includes options known as "prepaid". These options enable the purchase, before access to the service, for a predefined amount, of a time of access to the service or a number of units for quantifying access to the service. The payment is therefore made before the use of the service which is associated therewith and corresponding rights are stored by the mobile telephony system.
This means paying for the mobile telephony service before the corresponding use of the telephone authorised by the payment and for a period dependant on a predefined fixed sum.
According to this method, the user has a mobile telephone equipped with his authentication card (SIM (subscriber identity module) card), also called a terminal, and purchases, according to his needs in terms of communication time (or time of use of a service), prepayment cards each associated with an amount (a sum of money).
These cards are marketed at numerous points of sale such as supermarkets or newsagents, for example.
The principle of implementation of a payment using these cards is based on an identification number (also called an activation code) marked on each card. At the time of purchase, the number present on the card is hidden. The number is
printed in an area sometimes covered by a panel which can be removed by scratching or hidden by an opaque packaging element.
The user first acquaints himself with the number, after scratching off the panel or after removing the packaging then dials, on his mobile telephone, a specific number for accessing a payment validation server. Once communication is established with the validation server, the user enters the number on the card on his mobile telephone, which leads to the activation of rights to telephone communication for a predefined period or for a predefined amount (sum of money). The operation consists in activating telephone rights associated with a prepaid card. The telephone rights also apply to the transmission of short messages of SMS type.
The number to be entered is generally long in order to avoid the likelihood of finding a valid number without having previously purchased a valid prepaid card. The result is that this method comprising the entry of a long number is sometimes tedious, notably for elderly people or those suffering from visual impairments. The number must, furthermore, be entered within a designated, generally quite short, time. In case of error when entering the number, the validation does not take place and the operation must be started again.
The method is therefore sometimes tricky to carry out. 3. Summary of the invention. The invention enables the situation to be improved by proposing an easier method, requiring less time and with an increased level of security.
More specifically, the invention relates to a method for validation of access to a service, in a mobile terminal, the mobile terminal being suitable for the implementation of the service and comprising at least two communication interfaces, the method being characterised in that it comprises steps of :
-starting up an application for validation of access to a service on the mobile terminal,
-coupling, by means of the first interface, a radio frequency identification (RFID) tag with the mobile terminal,
- transmitting a request for validation of access to the service, from the second interface of the terminal, to a remote server.
According to an embodiment of the invention, the step of transmission comprises a step of receipt of a notification of access validation or payment validation. According to an embodiment of the invention, the step of coupling comprises the transmission of an activation code from the radio frequency identification (RFI D) tag to the mobile terminal.
According to an embodiment of the invention, the request comprises the activation code read from the RFID tag or an item of information representative of this activation code.
According to an embodiment of the invention, the method comprises, before the step of coupling, a step of activation of the radio frequency identification tag.
According to an embodiment of the invention, the step of activation of the tag comprises the removal of a mechanical element of the radio frequency identification tag whose position aims to render inoperative the transmissions to and from the identification tag.
According to an embodiment of the invention, the mechanical element of the radio frequency identification tag constitutes a shield to reduce the effectiveness of an antenna of the radio frequency identification tag.
According to an embodiment of the invention, the method comprises a step of entering, on the mobile terminal, a second validation code, the second
validation code being associated with the radio frequency identification tag. For example, this second code is a short code marked on the RFI D tag.
The invention also relates to a mobile terminal, such as a mobile telephone, for example, suitable for the implementation of a service (telephone communications and transmission of messages) and for the validation of the payment for access to this service or more generally of access to this service. The mobile terminal comprises at least two wireless communication interfaces; it further comprises:
- means for executing an application for validation of access to a service or of the payment previously required for access to a service,
- means for configuring the first interface for the coupling of a radio frequency identification (RFID) tag, the coupling comprising the transmission of an activation code useful for the validation of access (or of the payment previously required for access),
- means for configuring the second interface for the transmission of a request for access validation to a remote server.
According to an embodiment of the invention, the terminal is suitable for the implementation of mobile telephony operations.
According to an embodiment of the invention, the first interface of the mobile terminal is compatible with an NFC (near field communication) wireless communication standard.
The invention further relates to an RFID (radio frequency identification) tag configured for the transmission of an activation code to a mobile terminal with a view to validating a payment relating to access to a service from the mobile terminal. According to an embodiment of the invention, the RFID tag is configured for the transmission, receipt and storage of an information code from a mobile
terminal, the information relating to the validation of access to a service by a mobile terminal.
According to an embodiment of the invention, the radio frequency identification tag comprises a detachable mechanical element whose position, on the identification tag, aims to render inoperative the communication operations from and to the identification tag.
According to an embodiment of the invention, the detachable mechanical element of the RFID tag is a breakable part, such as for example a breakable corner, of the identification tag, the breakable part comprising a shielding element aiming to reduce or negate the effectiveness of an antenna of the identification tag, which antenna is used for the transmissions of data from and to the RFI D identification tag. The invention also relates to a device comprising an antenna element constituted of a short-circuit loop, characterised in that:
- the device is configured to be associated with an antenna of a device of radio frequency identification (RFID) tag type and,
- the device comprising the loop antenna is suitable for modifying the characteristics of the antenna of the radio frequency identification (RFID) tag, so that communications with the tag are rendered inoperative by the association.
The invention therefore proposes to replace an activation code printed on a prepaid card with a passive RFI D identification tag which contains the activation code and is suitable for transmitting it to a mobile terminal equipped with an NFC reader upon request of the latter.
The call to a specific remote server, as it exists in the methods traditionally used, is replaced with a transaction for validation of access (and/or of payment), under control of an application executed on the mobile terminal. The application establishes a connection with a remote server, via a network; the remote server being configured to carry out operations for access validation and maintain a list of access rights to one or more services, according to the transactions and/or
payments previously validated for each of the holders of compatible mobile telephones.
According to an embodiment of the invention, the mobile terminal writes to the RFID identification tag, during a step of notification, information aiming to identify the terminal and/or its holder. Thus, it is possible to define which terminal and/or holder has been able to benefit from the credit for consuming the service (or credit for accessing the service) in the case of improper use or inopportune reading of the tag, in error, even though the system aims to make such a reading improbable.
Advantageously, the method makes it possible to strengthen the security of the process as the number (activation code) can be significantly longer since it does not need to be entered manually during an operation carried out be the user of the mobile telephone.
Thus, the code can comprise several tens of successive symbols, for example, according to the capacity of an internal memory of the RFID tag.
The method, according to the inventive concept, simplifies the operations useful for the validation of access (and/or of payment) and for "topping up" units for consuming/accessing a service of the mobile terminal.
Advantageously, the method makes it possible to simplify the use of a prepayment card for users less accomplished at this type of operation or having visual impairments, for example.
The presence of a breakable element of the tag advantageously makes it possible to verify that it is not possible to have used the tag before its acquisition.
Advantageously, the presence of a (possibly very short) code associated with the user makes it possible to increase further the level of security of the operation for validation of access and/or of payment while not being detrimental to the ease of implementation of the method.
4. List of figures.
The invention will be better understood, and other specific features and advantages will emerge upon reading the following description, the description making reference to the annexed drawings wherein:
- Figure 1 shows a mobile telephony system comprising a station, a mobile terminal coupled to an RFID identification tag, a network and a payment validation server.
- Figure 2 shows the mobile terminal device of figure 1 .
- Figure 3 is a functional diagram showing a method for validation of payment by prepaid RFI D tag, according to the concept of the invention.
5. Detailed description of embodiments of the invention.
In figures 1 to 2, the modules shown are functional units that may or may not correspond to physically distinguishable units. For example, these modules or some of them are grouped together in a single component, or constituted of functions of the same software. On the contrary, according to other embodiments, some modules are composed of separate physical entities.
Figure 1 shows a mobile telephony system comprising a station (also called a terminal or relay) MPSTA 3 of a mobile telephony network MPNET 4. A mobile telephony terminal MPT 1 is connected to the station MPSTA 3 by a wireless connection. According to an embodiment of the invention, the network is of GSM or 3G or 4G type. An authentication and payment validation server MPAUTHSRV 5 is also connected to the mobile telephony network MPNET 4. A prepaid payment tag RFIDT 2 is coupled with the mobile terminal MPT 1 , with a view to validating a payment enabling access to a service. According to the embodiment, the service corresponds to the capacity to transmit and receive telephone calls from and to the mobile terminal MPT 1 , and via the mobile telephone network MPNET 4. The service
also includes the exchange of data via the intermediary of the mobile telephone network MPNET 4. The mobile telephony terminal MPT 1 comprises a near field, bidirectional, wireless communication interface, more commonly called an NFC interface. This interface enables coupling with other items of equipment compatible with the NFC standard and the exchange of data at relatively short distances. The distances range from direct contact to several centimetres. The significant proximity necessary for establishing communications, specific to the NFC standard, guarantees a high level of security. The NFC interface, suitable for reading the radio frequency identification tag RFI DT 2, enables, according to the inventive concept, a validation code (or activation code) comprised in the tag RFIDT 2 to be entered during a transaction for validation of payment under control of a specific application executed by the mobile telephony terminal MPT 1 .
The method for coupling between the mobile telephony terminal MPT 1 and the tag RFIDT 2, called "near field", in NFC mode, uses electromagnetic coupling between two loop antennae in order to communicate. The energy generated by the emission of radio frequency waves within the antenna of the RFID tag makes it possible to supply power thereto without recourse to an external power supply source.
The equivalent circuit diagram of a loop antenna corresponds to a resonant circuit whose inductor is constituted by the antenna and capacitor is defined by the electronic circuit (or embedded chip) and notably by the input capacitor of the circuit.
A protective device, according to the invention, consists in incorporating in the radio frequency identification tag RFI DT 2 a breakable corner comprising a short- circuit loop coupled to the antenna. The presence of this loop, added at manufacture, either be the same manufacturing process as the antenna or by printing using conductive ink, has the effect of reducing the overall impedance of the antenna, which results in a shift in the resonance to higher frequencies, thus preventing the correct operation of the identification tag RFI DT 2. The action of breaking the pre- scored corner of the prepaid identification tag RFI DT 2 before its use with a view to validation of the payment for access to the telephony service leads to the resetting of the value of the inductance of the antenna to its nominal value and therefore to the resonance required for operation according to the NFC communication standard.
During a transaction for validation of payment, making it possible to acquire access rights to the service, the tag RFIDT 2 is prepared, for example by breaking the breakable corner previously described. According to a variant, the breakable corner preventing the use or inadvertent reading of the tag RFI DT 2 is not present and the tag is immediately readable. The user executes an application for validation of payment on the mobile terminal MPT 1 . The application configures the NFC interface of the mobile terminal MPT 1 to enable the reading of the tag RFIDT 2 by the mobile terminal MPT 1 . The tag RFI DT 2 is then read when it is sufficiently close to the terminal MPT 1 . During this reading operation, an activation code is transmitted from the tag to the mobile terminal MPT 1 . This code comprises information representative of credit for consuming the telephony service. This information corresponds, according to the tag, to a sum of money, units of time of consumption (telephone communication, for example) or units of capacity of access to variants of use of the service (access to data, download of content, etc.). The activation code is transmitted by the mobile terminal MPT 1 to the authentication and payment validation server MPAUTHSRV 5, via the intermediary of the mobile telephony station MPSTA 3 and via the mobile telephony network MPNET 4. The transmission of the code is carried out by transmission of a payment validation request. The server analyses the transmitted code and verifies its integrity by use of a verification algorithm defined by the service provider responsible for the implementation of the payment or of the system. If the transmitted validation code is recognised as being valid, the holder of the mobile terminal MPT 1 is associated, by storage in the payment validation server MPAUTHSRV 5, with rights to use the service depending on the transmitted activation code. An activation code can, for example, correspond to predefined credit of five euros. Another code can, for example, correspond to rights to thirty minutes of telephone communication. According to the embodiment of the invention, the exchanges between the mobile telephony terminal MPT 1 and the authentication and payment validation server are encrypted in order to increase the security of the system for validation of payment and of access to the service. The details specific to the operation of the elements which constitute the system, such as the mobile terminal MPT 1 , the station MPSTA 3, the elements which form the communication network MPNET 4 and the server MPAUTHSRV 5, or the control unit embedded in the radio frequency identification
tag RFIDT 2 are not shown here, not being necessary for the understanding of the inventive concept.
According to the embodiment of the invention, the tag RFIDT 2 is compatible with NFC standard IS014444, standard IS015693 or an evolution of one of these standards.
The tag RFIDT 2 comprises a non-volatile memory making it possible to write a unique activation code, at manufacture.
Figure 2 shows architectural details of the mobile telephony terminal MPT 1 which appears in figure 1 . The mobile terminal MPT 1 comprises a control unit CU suitable for implementing typical mobile telephony functions and executing embedded software applications. The control unit CU comprises non-volatile memory for storing data (executable programs, systems data, data relating to the user and services) and volatile memory useful for executing software routines. The mobile terminal comprises an input/output module K, connected to the control unit CU by a communication bus KBUS. The input/output module K comprises a touch screen enabling a contextual display, and the entry of data by the user, on a keyboard displayed on the screen. The input/output module K also comprises typical input/output elements, such as a vibrator, one or more light-emitting diodes, a microphone, an earphone and associated interfacing circuits.
The mobile terminal MPT comprises a power supply module PSU. This module comprises a rechargeable energy accumulator and associated circuits. It supplies power to the various modules and circuits which constitute the mobile terminal MPT, notably via a power bus PBUS. The mobile terminal MPT further comprises two communication interfaces, MP-IF1 and MP-IF2. According to the embodiment of the invention, MP-I F1 and MP-IF2 are bidirectional wireless communication interfaces. More specifically and still according to the embodiment of the invention, MP-IF2 is a communication interface compatible with the NFC standard. This interface enables the exchange of data with a radio frequency identification (RFI D) tag device. The NFC communication interface MP-I F2 is therefore configured and suitable for reading an activation code (also called activation number) in a radio frequency identification tag and more specifically in the tag RFI DT 2 shown in figure 1 . The mobile terminal MPT also comprises a wireless bidirectional communication interface MP-IF1 , coupled to an antenna ANT, enabling
the exchange of data with the mobile telephony network MPNET 4, via the intermediary of the mobile telephony station MPSTA 3 to which the mobile terminal MPT is connected. When roaming, the mobile terminal can be connected to a plurality of other stations similar to station MPSTA 3 but not shown, not being necessary for the understanding of the invention. According to the embodiment, communication interface MP-I F1 is compatible with the GSM, EDGE, GPRS, 3G and 4G mobile telephony standards, traditionally used on a mobile telephony network.
According to the embodiment of the invention, the mobile terminal MPT and RFID tag RFI DT 2 are coupled via the intermediary of NFC interface MP-IF2 in order to read a payment validation code comprised in the RFI D tag RFI DT 2 which is sent by the mobile terminal MPT to the authentication and payment validation server MPAUTHSRV 5.
This operation participates in a transaction for validation of payment for access to the telephony service implemented by an operator on the network MPNET 4.
The mobile terminal MPT is suitable for the implementation of the service and comprises at least two communication interfaces MP-I F1 and MP-IF2.
The payment validation method comprises, according to the inventive concept, the steps of :
- starting up an application for validation of access and/or of payment on the mobile terminal MPT; the application is executed by the control unit CU and interacts with the user of the mobile terminal via the input/output module K and its touch keyboard, - coupling, by means of NFC interface MP-I F2, the radio frequency identification tag RFI DT 2 with the mobile terminal MPT; the coupling comprises the transmission of an activation code from the tag RFIDT 2 to the mobile terminal MPT,
- transmitting a request for validation of access and/or of payment, from interface MP-IF1 of the terminal MPT, to the remote server MPAUTHSRV 5, via the network MPNET 4 and via the mobile telephony station MPSTA 3.
According to an embodiment of the invention, the request for validation of access and/or of payment transmitted from the mobile terminal MPT to the remote server MPAUTHSRV 5 comprises the activation code read from the tag RFDIT 2. According to the embodiment of the invention, when the data authentication server MPAUTHSRV 5 has recognised and validated the code read in the tag RFIDT 2 (or an item of information representative of this activation code), it transmits information to the mobile terminal MPT, with a view to providing notification of the validity of the access and/or payment as well as access to the corresponding service and storage of associated rights. The operation of storing associated rights comprises the storage, in the remote server MPAUTHSRV 5, of information making it possible to identify the mobile terminal MPT 1 , its holder and an identifier of the radio frequency tag RFI DT 2. The notification is made during a step of receipt of a notification of access validation and/or payment validation by the mobile terminal MPT 1 . According to the embodiment of the invention, the mobile terminal stores at least one item of information relating to the validation of access to a service, or of payment for access to this service, in the RFID label RFIDT 2 indicating that the tag has been successfully used and aiming to invalidate any other attempt at subsequent use.
During the payment validation transaction, the terminal MPT sends a request to the remote server MPAUTHSRV 5. The request comprises the activation code previously read in the tag RFI DT 2 or an item of information representative of this code.
In the case where the tag is equipped with a breakable part comprising a shielding element or an antenna element aiming to redefine the resonance frequency of the system, it must be removed before carrying out the coupling of the tag RFI DT 2 with the terminal MPT 1 , via its NFC communication interface MP-I F2.
According to a variant embodiment of the invention, the procedure for validation of access to a service and/or of payment for access to this service comprises an additional step, before or after the coupling of the tag RFIDT 2 with the terminal MPT 1 , during which the user enters an additional item of information
readable by him on the tag RFI DT 2 into the mobile terminal MPT, via the input/output module K (via the touch screen of the terminal MPT, for example). This complementary item of information makes it possible to increase the security of the transaction even further by completely avoiding the possibility of carrying out a payment validation by bringing the tag and the terminal into close proximity inadvertently, it only being possible to finalise the transaction for validation of access to the service or of payment if this manual operation has taken place. The complementary information is a very short code, for example a 1 , 2 or 3 digit code, similar to the visual cryptograms used during remote payment transactions by bank card.
According to the embodiment of the invention, the mobile terminal MPT is therefore suitable for the implementation of a telephony and data transmission service and for the validation of access and/or of payment for access to this (or these) service(s). The terminal MPT comprises at least two wireless communication interfaces MP-IF1 and MP-IF2. It further comprises means for executing the application for validation of access and/or of payment for access, for configuring interface MP-IF2 for the coupling of the radio frequency identification tag RFI DT 2, the coupling comprising the transmission of the activation code useful for the validation of access and/or of payment, and means for configuring interface MP-IF1 for the transmission of a request for validation of access and/or of payment for access to the remote server MPAUTHSRV 5. Naturally, the terminal MPT 1 is suitable for the implementation of mobile telephony operations as known to those skilled in the art.
The antenna element comprised in any removable part of the tag and aiming to move its resonance frequency is considered as a shielding element in the present description. Figure 3 is a diagram showing the method implemented for the transaction for validation of access to a service and/or of payment for access to a service according to the embodiment of the invention. Step SO corresponds to the initial step. The mobile terminal MPT is connected to the mobile telephony network MPNET 4, via the station STA 3, and is configured for the implementation of typical
mobile telephony functions. The mobile terminal is configured for accessing the mobile telephony service according to a billing method known as "prepaid". When the credit of units consumed gradually during use of the service reaches zero (credit used up), the access rights to the service are revoked and new access rights to the service must be acquired by acquisition of credit.
According to the invention, the holder/user of the mobile telephone purchases the tag RFIDT 2 which contains an activation code for validating access rights to the service. The purchase of the tag is characterised by a price. This price corresponds to the credit which will result from a transaction for validation of access and will give rise to the storage of access rights to the service for the mobile terminal MPT 1 , equivalent to the price paid. The sale of the tag RFIDT 2 to the holder/user of the mobile terminal MPT 1 therefore constitutes a billing system for access to the mobile telephony service by the terminal MPT 1 .
The user/holder of the mobile terminal MPT 1 who wishes to perform a top-up of credit and to increase his rights to use the mobile telephony service launches the execution, in step S1 , of a top-up/payment/access validation/access rights acquisition application on the terminal MPT 1 . According to a variant embodiment of the invention, the top-up/payment/access validation/access rights acquisition application is automatically launched following the detection by the mobile terminal MPT 1 of the tag RFIDT 2 being moved into close proximity.
In S2, and when the tag RFIDT 2 is brought close to mobile terminal MPT 1 , a coupling takes place between these two devices, via the intermediary of N FC interface MP-IF2 of the mobile terminal MPT 1 .
According to an embodiment of the invention, a step of validation of the tag RFI DT 2 is necessary and comprises the removal of a breakable (detachable) part of the tag. This part comprises an antenna element or a shielding element aiming to modify the characteristics of the antenna and to inhibit the operation of the tag RFI DT 2 before its removal.
According to a variant embodiment, the step of validation of the tag RFI DT 2 is carried out at the checkout at the retailer, by writing, using a device equipped with an NFC interface, an item of information aiming then to indicate to the mobile
terminal MPT 1 used for the access validation transaction operation that the tag RFIDT 2 is valid. The tag is therefore configured at manufacture to appear invalid to a mobile terminal such as MPT 1 and is then validated at the checkout at the retailer.
According to this variant, a second item of information will then subsequently be written to the tag RFIDT 2, in case of success of the payment validation transaction, in order to invalidate the tag RFIDT 2 having been successfully used for the validation of access or the acquisition of access rights to a service. This makes it possible advantageously to guard against theft of rights and improper validation of access to a service by bringing a mobile terminal close to a radio frequency identification tag presented in the shop and not yet paid for at the checkout at the distributor.
During the coupling, the activation code contained in the tag RFIDT 2 is read by the mobile terminal MPT 1 . The details for implementation of the tag RFI D, which comprises a control unit, a non-volatile memory and a volatile memory, are not described here, not being necessary for the understanding of the inventive concept.
In step S3, the activation code, which encodes the credit corresponding to the purchase (to the price) of the tag RFIDT 2 is transmitted to the remote server for validation of access and or of payment for access rights MPAUTHSRV 5, under control of the application for validation of access to a service and the control unit CU of the mobile terminal MPT 1 . The server analyses the code as well as the other information inserted into the request for validation of access and/or of payment for access to a service, such as (identification) information representative of the mobile terminal and its holder.
When the server detects that the activation code is valid, it stores the access rights to the mobile telephony service corresponding to the purchase price of the tag RFI DT 2. The access rights are stored (updated) in a database of the mobile telephony system, for example on the server M PAUTHSRV 5, and will be updated gradually with use (of access to the service). An item of notification information is then sent by the remote server MPAUTHSRV 5 to the mobile terminal MPT 1 and made available to the user under control of the application for validation of access and/or of payment. In addition, an item of information for validation of access and/or
of payment is written to a non-volatile memory of the tag RFIDT 2 (for example to a data register).
If the server does not succeed in validating the activation code presented by the request, for example in the case where this code has already been the subject of a previous payment validation, it provides notification of the failure of the procedure to the user and does not store rights associated with access to the service. According to a variant embodiment, the step of coupling the terminal and the tag comprises a step of reading an item of information comprises in the tag RFIDT 2 indicating whether the tag has already been used previously. In the case where the tag appears to have been used during a transaction for validation of access and/or of payment, the executed application for validation of access and/or of payment provides a notification of invalidity of the tag to the user.
The invention also relates to a device comprising an antenna element constituted of a short-circuit loop which, associated with the antenna of the tag RFIDT 2, aims to modify the characteristics of the antenna of the tag RFI DT 2, so that the communications with the tag are rendered inoperative by the association. The device comprising the short-circuit loop antenna is for example a breakable (detachable) corner connected to the tag and therefore the proximity sufficiently modifies the inductance of the antenna so that it cannot operate normally and so that the tag cannot be used without first having detached the breakable corner, and therefore the device. According to another variant, this device is a packaging element wherein is inserted the tag. According to this variant, the tag cannot be coupled to a mobile terminal with a view to carrying out a transaction for validation of access and/or of payment for access if it has not been removed from the packaging which, due to the presence of the loop antenna, prevents radio frequency coupling of the tag.
The invention is described by an embodiment where the mobile terminal is a mobile telephony terminal and where the service is a mobile telephony service. However, the invention is not limited to this embodiment but also applies to any type
of mobile terminal comprising an interface suitable for the coupling of a radio frequency identification tag and a telecommunication interface configured for connection to a remote server for validation of access to a service, such as, for example, a tablet, a portable computer, a games console, a personal organiser, a portable video player, a portable audio player or a smartwatch.
Claims
1 . Method for accessing a service, in a mobile terminal (MPT 1 ), said mobile terminal (MPT 1 ) being suitable for the implementation of said service and comprising at least two communication interfaces (MP-IF2, MP-IF1 ), said method being characterised in that it comprises:
- by means of the first interface (MP-I F2), a first transmission of an activation code from an identification tag (RFI DT 2) to said mobile terminal (MPT 1 ) with a view to validating said access to said service from said mobile terminal. - a second transmission of a request for access validation (S3), from said second interface (MP-IF1 ) of said terminal (MPT 1 ) to a server (MPAUTHSRV 5)
- after said first and second transmissions, access to said service by said mobile terminal (MPT 1 ).
2. Method according to claim 1 characterised in that said service relates to the use of said mobile terminal.
3. Method, according to any one of claims 1 to 2, characterised in that it comprises, after the step of transmission (S3), a step of receipt of a notification of access validation or payment validation.
4. Method, according to any one of claims 1 to 3, characterised in that said service is a mobile telephony service implemented by said mobile terminal (MPT 1 ).
5. Method, according to claim 4, characterised in that said request comprises said activation code or an item representative of said activation code.
6. Method, according to any one of claims 1 to 5, characterised in that it comprises, before the step of coupling (S2), a step of activation of said radio frequency identification tag (RFIDT 2).
7. Method, according to claim 6, characterised in that said step of activation of said tag (RFI DT 2) comprises the removal of an element of said radio frequency identification tag whose position aims to render inoperative the transmissions to and from said identification tag (RFIDT 2).
8. Method, according to claim 7, characterised in that said element of said radio frequency identification tag (RFI DT 2) constitutes a shield to reduce the effectiveness of an antenna of said radio frequency identification tag (RFI DT 2).
9. Method, according to any one of claims 1 to 8, characterised in that it comprises a step of entering, on said mobile terminal, a second validation code, said second validation code being associated with said radio frequency identification tag (RFIDT 2).
10. Mobile terminal (MPT 1 ), suitable for the implementation of a service and for the validation of access to said service, said terminal comprising at least two wireless communication interfaces (MP-I F2, MP-IF1 ) and being characterised in that:
- said terminal (MPT 1 ) comprises means for execution (CU, K) of an application for validation of access to said service,
- said first interface (MP-I F2) is configured for coupling a radio frequency identification tag (RFIDT 2), said coupling comprising the transmission of an activation code useful for the validation of said access to said service,
- said second interface (MP-I F1 ) is configured for the transmission of a request for access validation or payment validation to a remote server (MPAUTHSRV 5).
- said mobile terminal (MPT 1 ) further comprises means for execution of a function participating in the implementation of said service.
1 1 . Mobile terminal (MPT 1 ) according to claim 10, characterised in that it is suitable for implementation of mobile telephony operations.
12. Mobile terminal (MPT 1 ) according to any one of claims 10 or 1 1 , characterised in that said first interface (MP-IF2) is compatible with a Near Field Communications wireless communication standard.
13. Radio frequency identification tag (RFIDT 2), configured for the transmission of an activation code to a mobile terminal (MPT 1 ) with a view to validating access to a service from said mobile terminal (MPT 1 ).
14. Radio frequency identification tag (RFI DT 2) according to the preceding claim, configured for the receipt of an item of information from a mobile terminal
(MPT 1 ), said item of information relating to the validation of access to a service by said mobile terminal (MPT 1 ).
15. Radio frequency identification tag (RFI DT 2) according to any one of claims 13 to 14, characterised in that it comprises a detachable element whose position, on said identification tag (RFIDT 2), aims to render inoperative the communication operations from and to said identification tag (RFIDT 2).
16. Radio frequency identification tag (RFIDT 2) according to claim 1 5, characterised in that said detachable element is a breakable part of said identification tag (RFIDT 2), said breakable part comprising a shielding element aiming to reduce the effectiveness of an antenna of said identification tag.
17. Device comprising an antenna element constituted of a short-circuit loop, characterised in that:
- said device is configured to be associated with an antenna of a device of radio frequency identification tag type (RFIDT 2) according to any one of claims 12 to 1 5,
- said device is suitable for modifying the characteristics of said antenna of said tag device (RFI DT 2), so that the communications with said tag (RFIDT 2) are rendered inoperative by the association.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1350888 | 2013-02-01 | ||
FR1350888A FR3001821A1 (en) | 2013-02-01 | 2013-02-01 | METHOD OF AUTHORIZING ACCESS TO A SERVICE VIA A MOBILE TELEPHONE BY VALIDATION OF A PREPAID USING AN RFID CARD AND ASSOCIATED DEVICES |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014118065A1 true WO2014118065A1 (en) | 2014-08-07 |
Family
ID=48044907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2014/051266 WO2014118065A1 (en) | 2013-02-01 | 2014-01-22 | Method for authorising access to a service via a mobile telephone by validation of a prepayment implementing an rfid card and associated devices |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR3001821A1 (en) |
WO (1) | WO2014118065A1 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120089513A1 (en) * | 2010-10-04 | 2012-04-12 | Kt Corporation | Near field communication terminal capable of loading card with money and method of operating the same |
-
2013
- 2013-02-01 FR FR1350888A patent/FR3001821A1/en active Pending
-
2014
- 2014-01-22 WO PCT/EP2014/051266 patent/WO2014118065A1/en active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120089513A1 (en) * | 2010-10-04 | 2012-04-12 | Kt Corporation | Near field communication terminal capable of loading card with money and method of operating the same |
Also Published As
Publication number | Publication date |
---|---|
FR3001821A1 (en) | 2014-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9418362B2 (en) | Amplifying radio frequency signals | |
US9311766B2 (en) | Wireless communicating radio frequency signals | |
US9304555B2 (en) | Magnetically coupling radio frequency antennas | |
US8651376B2 (en) | Near field communication device, authentication system using the same and authentication method thereof | |
US8109444B2 (en) | Selectively switching antennas of transaction cards | |
US8811895B2 (en) | System and method for presentation of multiple NFC credentials during a single NFC transaction | |
US8070057B2 (en) | Switching between internal and external antennas | |
US20150118958A1 (en) | Switching between near-field communication systems | |
US20020174336A1 (en) | Information protection system and information protection method | |
KR101389468B1 (en) | Method for issuing mobile credit card in portable terminal using credit card and credit card for the same | |
KR20110068116A (en) | Mobile terminal, smart card, and method for providing payment information | |
WO2013034725A1 (en) | Method for validating an electronic transaction, and system thereof | |
JP4711970B2 (en) | Transaction device with expected pre-treatment | |
JP2011215764A (en) | Information processing system, information processing server, information processing method and information processing program and the like | |
KR101646328B1 (en) | Mobile credit card settlement method and service apparatus using the same, phone | |
WO2014118065A1 (en) | Method for authorising access to a service via a mobile telephone by validation of a prepayment implementing an rfid card and associated devices | |
JP5846985B2 (en) | Terminal unauthorized use identification system, terminal unauthorized use identification method, program | |
EP2881908A1 (en) | NFC top-up | |
EP2754109A1 (en) | Method for validating an electronic transaction, and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14701120 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14701120 Country of ref document: EP Kind code of ref document: A1 |