专利摘要:
The invention relates to a method of processing, by a processing entity (EnT), an authorization to implement a service and / or access to a good. Such a method comprises: - a reception step (10), from a requesting device (DR), a request (Rq) for implementing a service and / or access to a property; a step of searching (20) a dependency indicator (InD) from at least one datum of said implementation request (Rq); when a dependency indicator (InD) is present, a step of obtaining (30), with a verification device (DV), an authorization (Aut) for implementing said service and / or access to this property.
公开号:FR3031612A1
申请号:FR1551239
申请日:2015-02-13
公开日:2016-07-15
发明作者:Pierre Quentin
申请人:Compagnie Industrielle et Financiere dIngenierie Ingenico SA;
IPC主号:
专利说明:

[0001] 1 Method of processing an authorization to implement a service, devices and corresponding computer program. 1. Domain The proposed technique relates to the processing of online transactions. The proposed technique relates more particularly to the hierarchical processing of transactions. More specifically, the proposed technique makes it possible to secure access to a good or a service by a person who has an authority for the implementation of said service and / or access to said property. The proposed method fits for example in the parent / child relationship or in tutelary relationships. 2. Prior Art There are techniques whereby a person with authority over another person can ensure that a good or service remains inaccessible to an unauthorized person. The simplest and most effective way for a property is to lock it and keep the key or keep the means of use of the property: this is for example the case of car keys which may be retained by the custodian of authority and provided to the claimant at the discretion of the depositary of authority. For services, for example Internet access or access to specific services on the Internet (eg social networks, etc.), the easiest way is to not divulge a password that remains held by the custodian of the authority and which is seized by it with each request (if the person in charge of an authority accepts it of course). For other types of services, such as payment services, authorization to purchase or withdraw money is often managed by the bank: the custodian of the authority configures the access of the bank. applicant to his means of payment by, for example, setting maximum amounts for withdrawal and / or expenditure, etc. These methods, which may be more or less effective, however, suffer from problems that are often related to the need for the person with an authority to be present, alongside the applicant to validate or not access to the good or service. For banking services although the presence of the custodian of an authority is not necessary, other problems arise: the 3031612 2 ceiling of expenditure or withdrawal avoids that too much money is unexpectedly spent, however the granularity of expenditure can not be easily controlled. It is not possible, for example to accept such type of purchase and refuse such other type of purchase.
[0002] This inability to confer granularity is also detrimental to other services than payment services. Thus, for example, in the case of access to a social network, it is not possible to authorize certain actions (add a comment for example) while refusing others (like contacting an unknown person for example) ).
[0003] There is therefore a need to provide a method of processing an authorization to implement a service or access to a good that does not have the disadvantages of the prior art. 3. Summary The proposed technique does not have these disadvantages of the prior art. More particularly, the proposed technique allows the person in charge of the authority over another person, at the same time, to manage access to a good or a service in a fine way while not requiring a presence of the person. custodian of authority. More particularly, the proposed technique relates to a method of processing, by a processing entity, an authorization to implement a service and / or access to a good. Such a method comprises: a step of receiving, from a requesting device, a request to implement a service and / or access to a property; A step of searching for a dependency indicator from at least one datum of said implementation request; when a dependency indicator is present, a step of obtaining, from a verification device, an authorization to implement said service and / or access to said property.
[0004] Thus, it is possible, thanks to the proposed technique of constraining access to a good or the implementation of a service to an authorization given by another device, distinct from the requesting device.
[0005] According to a particular characteristic, the step of obtaining, from a verification device, an authorization to implement said service and / or access to said property comprises: obtaining a representative data item a verification device to which the authorization must be requested; the transmission of a notification to the verification device with which this authorization must be required. a decision to issue an authorization based on a given datum or absence of data received from the device.
[0006] According to one particular characteristic, the decision to issue an authorization based on a datum or a lack of data received from the device comprises a reception: either of an authorization, including a seizure, on the device verification, of information that can be compared with reference information; a lack of authorization including: a specific refusal, transmitted in a reply to the above-mentioned notification; or a lack of response in a given time.
[0007] According to a particular characteristic, said information that can be compared with reference information is a personal identification code. Thus, the proposed technique makes it possible to secure more than existing techniques access to goods or services. According to a particular feature, the step of obtaining, with a verification device, further comprises: transmitting, to the verification device, a request for establishment of a secure link; an establishment of a secure link between the processing entity and the secure execution environment of the verification device; Transmitting the notification to the verification device via the secure link, accompanied by a request to enter a PIN code; an implementation of a display module and a secure input module; An encryption of the PIN code entered by the verification device; transmitting the encrypted PIN code to the processing entity; a verification of the validity of the PIN code entered by the processing entity. In another aspect, the described technique also relates to a processing entity of an authorization to implement a service and / or access to a good. Such an entity comprises: means for receiving a request for implementation of a service and / or access to a property; means for searching for a dependency indicator from at least one data item of said implementation request; means for obtaining, from a verification device, authorization to implement said service and / or access to said property, said means being implemented when a dependency indicator is present. According to another aspect, the described technique also relates to a system 15 for processing an authorization for implementing a service and / or access to a property, characterized in that it comprises: an entity processing an authorization to implement a service and / or access to a property comprising: means for receiving a request to implement a service 20 and / or access to a service good ; search means of a dependency indicator from at least one datum of said implementation request; means for obtaining, from a verification device, authorization to implement said service and / or access to said property, said means being implemented when a dependency indicator is present. a verification device comprising: means for receiving a notification; means for issuing an authorization, comprising means for entering a secure personal identification code. In at least one embodiment of the proposed technique, the latter requires an implementation via a communication terminal of the smart phone type, the terminal comprising a transaction security module called a "secure element". . Such a transaction security module is configured to be used in the context of the present technique to establish a secure connection between the communication terminal and a server.
[0008] According to a preferred implementation, the various steps of the methods according to the proposed technique are implemented by one or more software or computer programs, comprising software instructions intended to be executed by a data processor of a relay module according to the proposed technique and being designed to control the execution of the various process steps.
[0009] Accordingly, the proposed technique is also directed to a program that can be executed by a computer or a data processor, which program includes instructions for controlling the execution of the steps of a method as mentioned above. This program can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any another desirable form. The proposed technique is also directed to a data processor readable medium, and including instructions of a program as mentioned above. The information carrier may be any entity or device capable of storing the program. For example, the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a magnetic recording medium, for example a floppy disk or a diskette. Hard disk. On the other hand, the information medium may be a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means. The program according to the proposed technique can be downloaded in particular on an Internet type network.
[0010] Alternatively, the information carrier may be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question.
[0011] According to one embodiment, the proposed technique is implemented by means of software and / or hardware components. In this context, the term "module" may correspond in this document to a software component as well as to a hardware component or to a set of hardware and software components.
[0012] A software component corresponds to one or more computer programs, one or more subroutines of a program, or more generally to any element of a program or software capable of implementing a function or a set of functions, as described below for the module concerned. Such a software component is executed by a data processor of a physical entity (terminal, server, gateway, router, etc.) and is capable of accessing the hardware resources of this physical entity (memories, recording media, communication buses, I / O boards, user interfaces, etc.). In the same way, a hardware component corresponds to any element of a hardware set (or hardware) capable of implementing a function or set of functions, as described below for the module concerned. It may be a hardware component that is programmable or has an integrated processor for executing software, for example an integrated circuit, a smart card, a memory card, an electronic card for executing a firmware ( firmware), etc. Each component of the system previously described of course uses its own software modules. The various embodiments mentioned above are combinable with each other for the implementation of the proposed technique. 4. Figures Other features and advantages of the proposed technique will become more apparent upon reading the following description of a preferred embodiment, given by way of example only and not limiting, and the accompanying drawings, among which: : Figure 1 presents a synoptic of the proposed technique; Figure 2 details some implementation steps; Figure 3 illustrates the implementation for a hierarchical payment service; Figure 4 shows the structure of an authorization processing device; FIG. 5 shows the structure of a communication device; 5. Description 5.1 Principle As explained, the object of the present technique is to allow the management of an access to a good or a service in a fine and needless way, for a person custodian of a verification authority or accreditation, to be near or beside a person requesting access to a good or service. The proposed technique is very useful for example in the case of parent / child relations (in the context of the child's empowerment) and / or in the case of tutelary relationship involving a person under guardianship, from 'a responsible person, the authorization to carry out this or that action of everyday life. The proposed technique implements, in a general manner, several entities. These entities may, depending on the embodiments, be all distinct. Other embodiments may include merging different entities, particularly server entities located in the communication network and to which the responsible user verification device is connected. In general, as described in connection with FIG. 1 and FIG. 2, the proposed method comprises, within a server (which is the processing entity for access to the good or the service): A step of receiving (10) a request (Rq) for implementing a service (or access to a good); this request includes data allowing to identify on the one hand the service in question, on the other hand an identifier of the applicant for the service (for example an identifier of the child or a bank account number or a number of bank card) and finally additional data which is a function of the service required; a step of obtaining (20) a dependency indicator (lnD); this dependency indicator can be obtained for example by searching, in a database (DB), data necessary for the implementation of the service; when it finds that a dependency indicator is present and therefore the access to the service requires obtaining (30) an authorization (Aut) from a verification device, the serveu implements this step obtaining (30) the authorization (Aut).
[0013] Obtaining (30) an authorization includes, for example: obtaining (310) a datum representative of a verification device to which the authorization must be requested; this data may for example be an address to which the verification device must be contacted (IP address, MAC address, for example); o the transmission (320) of a notification to the verification device with which this authorization must be required; and following this transmission, o reception (330), from the verification device: 10 - the authorization (Aut), materialized for example by the input, on the verification device having received the notification, information (InfS) that can be compared with reference information (infR), such as an encrypted PIN or PIN compared with a PIN or a PIN encrypted reference; 15 - or a lack of authorization (NonAut) materialized: - by a specific refusal, transmitted in a response to the aforementioned notification; - by a lack of response in a given time. The authorization is transmitted to the server (processing entity for access to the good or service), which in turn transmits this authorization if necessary to the requesting entity (which may be another server or device). In an indirect and complementary way, the proposed technique also applies perfectly to the monitoring, by a person, of the use of one's own goods or services by itself. For example, in the case of monitoring access to a social network, if a user receives, on his mobile terminal (smartphone), acting as a verification device, a notification to authorize the publication, in his name, a message on his social network even though this user is not currently connected to this social network and did not require a publication, this may be a sign of piracy or theft of identity. The proposed technique then makes it possible to manage this type of problem simply and effectively. Indeed, the dependency indicator is not only used to indicate a dependency of a service with respect to a custodian of an authority or liability. It is also a question of indicating a dependence on a supplementary authorization. In a particular embodiment, it is also not a matter of transmitting a simple message to a complementary device held by the user 5 (such as a mobile communication terminal). It is rather in this particular embodiment to implement a secure process of identification. Thus, unlike a method such as the 3D Secure (registered trademark) method, the notification transmitted to the verification device is part of a process for the secure transmission of data to the verification device. This transmission process comprises: establishing a SSH-type secure link (with, for example, establishing a virtual private link) between the server and the user's verification device (for example his smartphone); this link may be established for a limited period; Obtaining encryption material enabling the encryption of the data exchanged between the verification device and the server; transmitting the notification to the user verification device via the secure link, accompanied by a request to enter an identification code (PIN type or biometric authentication); Encryption of the PIN entered on the verification device by the user; transmitting the encrypted PIN code to the server; verification of the validity of the PIN entered by the server. In this embodiment, therefore, there is a relatively remote treatment, in terms of security, of a processing consisting of entering (on the terminal of the applicant, and therefore not on the verification terminal) a code received by SMS (on the verification terminal) in a field provided for this purpose. In a specific embodiment of the proposed technique, the device to which the authorization notification is transmitted is a communication terminal, for example of the smartphone type.
[0014] In one embodiment of the present technique, which is moreover complementary to the embodiment described below (payment authorization), the verification terminal (which is in the form of a communication terminal 3031612 10 smartphone type) includes means for secure execution of certain specific commands. These secure execution means comprise for example a secure display module and a secure input module. A secure display module ensures the integrity of a display on the screen of the verification terminal. It ensures that the data it displays on the screen is not compromised (i.e. subsequently modified by another process). A secure display module includes a circuit (hardware and / or software) interrupt for controlling the display of the communication terminal, in particular to prevent software or a malicious circuit to display information during the setting 10 implementation of a secure process. The secure display module receives the data to be displayed for example from a secure execution processor and / or a network interface comprising the data to be displayed (without modification or reprocessing). The secure display module displays this data and prevents any other (non-secure) module from tampering with this display.
[0015] A secure input module guarantees the integrity of an input made on the input means of the verification terminal. It ensures that the data it receives is not compromised (i.e. subsequently modified by another process or recorded in parallel by another process). A secure input module comprises a reception circuit (hardware and / or software) for directly receiving, without intermediary, the information coming from the input interface (touch interface or mechanical input interface). According to the optionally proposed technique, such a terminal also embeds a module called "secure element" (SE) or "security element". A "secure element" is an integrated security module within the communication terminal. Such a module makes it possible to secure data transmitted between the communication terminal and a device to which it is connected (for example a server). Such a module is in the form of a processor optionally comprising a dedicated secure memory. When it does not include a dedicated secure memory, such a processor includes an access interface to a secure memory. In a specific embodiment of the proposed technique, the device to which the authorization notification is transmitted also includes a secure execution environment (TEE). The advantage of this approach is to implement both a security module (SE) for its security features and both a secure execution environment (TEE) for the richer runtime environment. he offers. In other words, the secure execution environment (TEE) is responsible for displaying the notification on the screen of the verification device and is in charge of securing the seizure of the custodial user while that the security module offers more basic encryption and processing features but also more secure. The advantage of this approach is that the security module SE may be subject to certification (eg bank certification) in a much simpler way than a secure execution environment (TEE). Therefore, an additional advantage of the proposed solution, when used to make a payment, lies in the fact that this solution can be certified in a much simpler way. According to one aspect of the proposed technique, the verification device is also connected at startup of it to a control server. The control server is in charge of verifying the non-compromise of the verification device. When it starts, the verification device connects to a server (which may be the same as the previously described server) to perform a configuration compliance check. This check is performed by performing a registration with the server. This recording includes an exchange of encrypted data between the verification device and the control server, for example in the form of a double "challenge / response". The control server is used to maintain a list of communication terminals connected to the service. The data (private keys / public keys) that are used to register the verification device with the control server are contained, for example, in the security module integrated in the verification device. 5.2 Description of a particular embodiment The proposed technique finds an interesting application in the case of a hierarchical payment. For example, in the context of a parent / child relationship, it may be interesting (for the parent) to validate the purchases made by the child, in order to ensure, for example, that the child does not spend any money. inconsiderate way. Therefore, in this specific case, the method of the invention is implemented in order to process a payment authorization. The payment authorization is given by the parent in charge of the child (this type of scenario can also be implemented for anyone under guardianship). In this case of use (payment service), the general operation is the following 5: The child (or the person under guardianship) (K) fills (M01) a shopping cart, for example on a remote website , said trading site (SM). at the time of payment, the child, who has his own bank card, selects (M02), among the types of cards available, a type of card to use (Visa, Mastercard, Amex, etc.); this selection causes the redirection (M03) to a payment application managed by a payment service provider (PSP), in order to make a payment; the child enters (M04) the data of his / her payment card in order to carry out the payment (name of the bearer and / or number and / or date of validity and / or verification code). an EMV type transaction (in card mode not present) is then implemented (M05) by the payment service provider PSP (to which the merchant site SM has delegated the implementation of the payment). This transaction 20 comprises obtaining (M06) (for example a search within a database DB) of comparison data making it possible to verify that the data entered are valid (or obtaining an authorization from a banking institution BK). at the time of this obtaining (M06), the payment service provider PSP 25 also obtains an indicator of the dependency (Ind) of these payment data (dependence on a supplementary authorization to be provided by a verification device). Other parameters can also be obtained such as a possible financial ceiling for the authorization. when the payment service provider finds that the card data 30 supplied to him (or the authorization provided to him) requires an authorization to be used, the method then comprises: 3031612 13 o l obtaining (M07) the account (Acnt) and / or the card (Crd) to which the authorization must be requested; and / or o obtaining (M08) at least one connection parameter (PCnx) to a communication terminal (TC) from which this authorization must be required (depending on the account or card data previously obtained or independently of these account or card data); it is for example an IP address or a MAC address of the verification device); the transmission (M09) of a notification (notif) to this communication terminal (by the method described previously); the reception (M10) of either the authorization (Aut), materialized for example by the input, on the verification device having received the notification, of information that can be compared with reference information; soit either of a lack of materialized authorization: - by a specific refusal (Ref), transmitted in a reply to the aforementioned notification; - by a lack of response in a given time (Tup).
[0016] The finalization of the transaction (i.e. acceptance and payment or refusal) is then performed by the payment service provider (PSP). A response may be transmitted (M11) to the requesting terminal (child terminal). As previously indicated, the transmission of the notification to the communication terminal comprises the following steps which take place between the payment provider's server and the communication terminal of the parent: a transmission, to the verification device, of a request for establishment of a secure link; establishing a secure link, for example of the SSH type (with for example establishment of a virtual private link) between the processing entity 30 and the secure execution environment of the parent's communication verification device; this link is established for a limited period; Obtaining encryption material enabling the encryption of the data exchanged between the communication verification device and the processing entity (temporary, complementary encryption material); transmitting the notification to the communication verification device 5 via the secure link, accompanied by a request to enter a PIN code; the implementation of a secure display module and a seizure module to allow secure entry of the PIN code; PIN code encryption (inputted) by the communication verification device; transmitting the encrypted PIN code to the processing entity; checking the validity of the PIN code entered by the processing entity. The validity of the PIN entered is worth authorization: it means that it is the entry of a valid PIN code and the verification of the conformity of this one that leads to the authorization.
[0017] On the contrary, a lack of input for a predetermined time or a wrong input results in a refusal. In a complementary manner, the process for obtaining an authorization can implement a virtual payment terminal. The virtual payment terminal is instantiated through a payment service provider server. It makes it possible to establish a secure link with the verification terminal. Such an implementation is then in accordance with the methods described in the documents FR1550192 and FR1550193 incorporated by reference herein. 5.3 Implementing devices. In connection with FIG. 4, a processing device comprising means for carrying out the previously described method is described. For example, the processing device comprises a memory 41 consisting of a buffer memory, a processing unit 42, equipped for example with a microprocessor, and driven by the computer program 43, implementing the steps necessary for the processing authorization for the implementation of services or access to goods. At initialization, the code instructions of the computer program 43 are, for example, loaded into a memory before being executed by the processor of the processing unit 42. The processing unit 42 receives as input through example a set of initial lexemes or existing dictionary data. The microprocessor of the processing unit 42 implements the steps of the method, according to the instructions of the computer program 43 to allow access to the good or the service.
[0018] For this, the processing device comprises, in addition to the buffer memory 41, means for obtaining information external to the device, such as a set of data accessible in base; these means may be in the form of an access module to a communication network such as a network card. The device also comprises processing means, these data for delivering data allowing access to a verification device; these processing means comprise for example a processor specialized in this task; the device also comprises one or more means for accessing one or more databases. The device also includes means for updating authorization and / or access to goods or services, in particular means for weighting the relationships between the lexical and / or grammatical forms making up the dictionary. These means can be controlled by the processor of the processing unit 42 as a function of the computer program 43. With reference to FIG. 5, a verification device comprising means for carrying out the previously described method is described.
[0019] For example, the verification device comprises a memory 51 consisting of a buffer memory, a processing unit 52, equipped for example with a microprocessor, and driven by the computer program 53, implementing necessary for the implementation performing verification functions. At initialization, the code instructions of the computer program 53 are, for example, loaded into a memory before being executed by the processor of the processing unit 52. The processing unit 52 receives as input, for example a notification. The microprocessor of the processing unit 52 implements the steps of the creation method, according to the instructions of the computer program 53 to allow the entry of an authorization code (a PIN code for example).
[0020] For this, the device comprises, in addition to the buffer memory 51, display and input means; these means may be in the form of a processor or a set of secure resources for securing the entry of the authorization. The device also comprises cryptographic processing means; these processing means comprise for example a dedicated encryption processor and encryption keys, such as session keys derived from an initial key.
[0021] These means can be controlled by the processor of the processing unit 52 according to the computer program 53.
权利要求:
Claims (8)
[0001]
REVENDICATIONS1. Method of processing, by a processing entity (EnT), an authorization for implementing a service and / or access to a good, characterized in that it comprises: a reception step (10 ) from a requesting device (DR), a request (Rq) for implementing a service and / or access to a good; a step of searching (20) a dependency indicator (InD) from at least one data item of said request (Rq) for implementation; when a dependency indicator (InD) is present, a step of obtaining (30), with a verification device (DV), an authorization (Aut) for implementing said service and / or access audit good.
[0002]
2. Method according to claim 1, characterized in that the step of obtaining (30), with a verification device (DV), an authorization to implement said service and / or access to auditing includes: obtaining (310) a representative data (DrDv) of a verification device to which the authorization (Aut) must be requested; the transmission (320) of a notification (Notif) to the verification device (DV) from which this authorization is to be required. a decision to issue (330) an authorization (Aut) based on a datum or absence of data received from the device.
[0003]
3. Method according to claim 2, characterized in that the decision to issue an authorization based on a given datum or absence of data received from the device comprises a reception: either an authorization, comprising a seizure, on the verification device, of information that can be compared with reference information; a lack of authorization including: a specific refusal, transmitted in a reply to the above-mentioned notification; OR 3031612 18 - a lack of response in a given time.
[0004]
4. The processing method according to claim 3, characterized in that said information which can be compared with reference information is a personal identification code (PIN).
[0005]
5. Processing method according to claim 2, characterized in that the obtaining step (30), with a verification device (DV), further comprises: - a transmission, to the verification device (DV) a request to establish a secure link; an establishment of a secure link between the processing entity and the secure execution environment of the verification device (DV); a transmission of the notification to the verification device (DV) via the secure link, accompanied by a request to enter a PIN code; an implementation of a secure display module and a seizure module; an encryption of the PIN code entered by the verification device (DV); a transmission of the encrypted PIN code to the processing entity; a verification of the validity of the PIN code entered by the processing entity. 20
[0006]
6. Processing entity of an authorization for implementing a service and / or access to a good, an entity characterized in that it comprises: means for receiving a request to implement a service; a service and / or access to a property; Means for searching for a dependency indicator from at least one datum of said implementation request; means for obtaining, from a verification device, authorization to implement said service and / or access to said property, said means being implemented when a dependency indicator is present. 30
[0007]
7. System for processing an authorization for implementing a service and / or access to a good, characterized in that it comprises: 3031612 19 - an entity for processing an authorization for implementation service and / or access to a property comprising: means for receiving a request for implementation of a service and / or access to a property; Means for searching for a dependency indicator from at least one datum of said implementation request; means for obtaining, from a verification device, authorization to implement said service and / or access to said property, said means being implemented when a dependency indicator is present. a verification device comprising: means for receiving a notification (Notif); means for issuing an authorization (Aut), comprising means for entering a secure personal identification code. 15
[0008]
8. Computer program product downloadable from a communication network and / or stored on a computer readable medium and / or executable by a microprocessor, characterized in that it comprises program code instructions for the execution of a processing method according to claim 1 when executed on a processor. 25
类似技术:
公开号 | 公开日 | 专利标题
EP3243177B1|2021-11-17|Method for processing an authorisation to implement a service, devices and corresponding computer program
EP3113099B1|2021-01-13|Payment container, creation method, processing method, devices and programs therefor
FR3021799A1|2015-12-04|IDENTIFICATION METHOD, DEVICE AND PROGRAM THEREOF
CA2973836A1|2018-01-21|Data-processing method by an electronic data-acquisition device, device and corresponding program
EP3032799B1|2018-08-29|Method for authenticating a user, corresponding server, communication terminal and programs
EP3214564A1|2017-09-06|Method for running and processing data, terminal and corresponding computer program
EP3113094B1|2019-11-20|Method for processing transaction data, device and corresponding program
WO2015028435A2|2015-03-05|Method for processing transactional data, corresponding devices and computer programmes
WO2008104704A1|2008-09-04|Electronic payment system including a mobile terminal comprising an electronic purse and a server
FR3031608A1|2016-07-15|METHOD FOR PROCESSING AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM
FR3031609A1|2016-07-15|METHOD OF PROCESSING A TRANSACTION FROM A COMMUNICATION TERMINAL
WO2017103484A1|2017-06-22|Method for securing a transaction from a mobile terminal
EP2950255A1|2015-12-02|Method for delegating an implementation of transactions, corresponding devices and programs
FR3086414A1|2020-03-27|TRANSACTION PROCESSING METHOD, DEVICE, SYSTEM AND PROGRAM
CA2946145A1|2015-10-22|Methods for processing transactional data, and corresponding devices and programs
WO2018024980A1|2018-02-08|Method for implementing a transaction from an electronic transaction means
WO2017077210A1|2017-05-11|Method for verifying identity during virtualization
FR3058814A1|2018-05-18|METHOD FOR PROCESSING TRANSACTIONAL DATA, COMMUNICATION TERMINAL, CARD READER AND CORRESPONDING PROGRAM.
FR3053548A1|2018-01-05|METHOD OF AUTHENTICATING PAYMENT DATA, DEVICES AND PROGRAMS THEREFOR.
FR3008516A1|2015-01-16|TRANSACTION METHOD, TERMINAL AND CORRESPONDING COMPUTER PROGRAM.
FR3031610A1|2016-07-15|METHOD OF PROCESSING A TRANSACTION FROM A COMMUNICATION TERMINAL
同族专利:
公开号 | 公开日
EP3243177A1|2017-11-15|
US20170357960A1|2017-12-14|
US11232430B2|2022-01-25|
CA2971635A1|2016-07-14|
EP3243176A1|2017-11-15|
WO2016110590A1|2016-07-14|
FR3031614B1|2018-03-23|
FR3031612B1|2018-04-06|
FR3031614A1|2016-07-15|
WO2016110588A1|2016-07-14|
EP3243178B1|2021-04-28|
ES2881276T3|2021-11-29|
FR3031613B1|2018-04-06|
CA2971647A1|2016-07-14|
FR3031613A1|2016-07-15|
WO2016110589A4|2016-09-29|
US10482450B2|2019-11-19|
EP3243176B1|2021-12-01|
EP3243177B1|2021-11-17|
US10970706B2|2021-04-06|
CA2971670A1|2016-07-14|
WO2016110589A1|2016-07-14|
US20180007052A1|2018-01-04|
US20180025343A1|2018-01-25|
EP3243178A1|2017-11-15|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
WO2004072914A2|2003-02-13|2004-08-26|Valista Limited|Authentication by owner to shared payment instruments|
US7434723B1|2005-05-26|2008-10-14|Sprint Communications Company L.P.|Mobile payment authorization system and method|
EP2157540A1|2007-04-17|2010-02-24|Sony Corporation|Information processing device and information processing method|
US20100114733A1|2008-10-30|2010-05-06|Socialwise, Inc.|Party Payment System|
US20110238569A1|2010-03-25|2011-09-29|Bizmodeline Co., Ltd.|Mobile payments|
US20140074714A1|2012-09-10|2014-03-13|Gilbarco S.R.L.|Attended dispensing environment utilizing mobile payment|
US3475191A|1966-09-07|1969-10-28|Minnesota Mining & Mfg|Inorganic flake material|
FR1550192A|1967-09-04|1968-12-20|
CA2305249A1|2000-04-14|2001-10-14|Branko Sarcanin|Virtual safe|
AT254773T|2002-03-18|2003-12-15|Ubs Ag|SECURE USER AUTHENTICATION VIA A COMMUNICATION NETWORK|
GB0517615D0|2005-08-30|2005-10-05|Ecebs Ltd|Improved smartcard system|
US20090294526A1|2008-05-27|2009-12-03|Visa U.S.A. Inc.|Testing capability allowing new data tags|
US10454693B2|2009-09-30|2019-10-22|Visa International Service Association|Mobile payment application architecture|
US8358596B2|2010-09-20|2013-01-22|Research In Motion Limited|Communications system providing mobile wireless communications device application module associations for respective wireless communications formats and related methods|
EP2455922B1|2010-11-17|2018-12-05|Inside Secure|NFC transaction method and system|
EP2707847A4|2011-05-10|2015-04-01|Dynamics Inc|Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms|
DE102011109318A1|2011-08-03|2013-02-07|Giesecke & Devrient Gmbh|Mechanism for communication between two applications on a security module|
DE102011114989A1|2011-10-06|2013-04-11|Giesecke & Devrient Gmbh|transaction system|
CA2856567A1|2011-11-30|2013-06-06|Spectrum Message Services Pty Ltd|A system, payment agent and computer readable storage medium for facilitating contactless mobile payment transactions|
CN102610043B|2012-02-09|2015-06-24|于梦媛|Mobile terminal with virtual card-swiping function|
US8763896B2|2012-02-23|2014-07-01|XRomb Inc.|System and method of loading a transaction card and processing repayment on a mobile device|
US9344275B2|2012-05-08|2016-05-17|Arm Technologies Israel Ltd.|System, device, and method of secure entry and handling of passwords|
CN102722743B|2012-05-22|2015-07-22|深圳市斯凯荣科技有限公司|Remote wireless smart card, smart card terminal equipment and remote wireless smart card transmission system|
WO2014036021A1|2012-08-28|2014-03-06|Visa International Service Association|Secure device service enrollment|
US20140074655A1|2012-09-07|2014-03-13|David Lim|System, apparatus and methods for online one-tap account addition and checkout|
EP2746981A1|2012-12-19|2014-06-25|ST-Ericsson SA|Trusted execution environment access control rules derivation|
US8935746B2|2013-04-22|2015-01-13|Oracle International Corporation|System with a trusted execution environment component executed on a secure element|
US9585006B2|2013-06-26|2017-02-28|Cellco Partnership|Express mobile device access provisioning methods, systems, and apparatus|
US9594917B2|2013-06-28|2017-03-14|Nxp B.V.|Secured multi-directional, multi-interface transaction processing|
US10366387B2|2013-10-29|2019-07-30|Visa International Service Association|Digital wallet system and method|
US9602508B1|2013-12-26|2017-03-21|Lookout, Inc.|System and method for performing an action based upon two-party authorization|
US9916079B2|2014-06-05|2018-03-13|Openpeak Llc|Method and system for enabling the sharing of information between applications on a computing device|
WO2016026025A1|2014-08-22|2016-02-25|Mobeewave Inc.|Method and device for controlling access from the device to a card via a nfc interface|
US10592890B2|2014-09-03|2020-03-17|Intel Corporation|Methods and arrangements to complete online transactions|US10997592B1|2014-04-30|2021-05-04|Wells Fargo Bank, N.A.|Mobile wallet account balance systems and methods|
US10445739B1|2014-08-14|2019-10-15|Wells Fargo Bank, N.A.|Use limitations for secondary users of financial accounts|
WO2016129863A1|2015-02-12|2016-08-18|Samsung Electronics Co., Ltd.|Payment processing method and electronic device supporting the same|
KR20160105261A|2015-02-27|2016-09-06|삼성전자주식회사|Method and apparatus for providing card service using electronic device|
EP3262582B1|2015-02-27|2021-03-17|Samsung Electronics Co., Ltd.|Electronic device providing electronic payment function and operating method thereof|
EP3185194A1|2015-12-24|2017-06-28|Gemalto Sa|Method and system for enhancing the security of a transaction|
CN108604280B|2016-03-30|2021-05-04|华为技术有限公司|Transaction method, transaction information processing method, transaction terminal and server|
US10601636B2|2016-11-04|2020-03-24|Crosscode, Inc.|Method and system for architecture analysis of an enterprise|
US10628611B2|2016-11-04|2020-04-21|Qualcomm Incorporated|Exclusive execution environment within a system-on-a-chip computing system|
KR20180060300A|2016-11-28|2018-06-07|삼성전자주식회사|Method for Managing Program and Electronic Device supporting the same|
US10897360B2|2017-01-26|2021-01-19|Microsoft Technology Licensing, Llc|Addressing a trusted execution environment using clean room provisioning|
US10972265B2|2017-01-26|2021-04-06|Microsoft Technology Licensing, Llc|Addressing a trusted execution environment|
US10897459B2|2017-01-26|2021-01-19|Microsoft Technology Licensing, Llc|Addressing a trusted execution environment using encryption key|
US10650153B2|2017-01-31|2020-05-12|Ent. Services Development Corporation Lp|Electronic document access validation|
CN109863475A|2017-10-09|2019-06-07|华为技术有限公司|The upgrade method and relevant device of a kind of application in safety element|
US11074577B1|2018-05-10|2021-07-27|Wells Fargo Bank, N.A.|Systems and methods for making person-to-person payments via mobile client application|
US20200007546A1|2018-06-28|2020-01-02|Intel Corporation|Technologies for updating an access control list table without causing disruption|
CN109325744A|2018-10-23|2019-02-12|北京三快在线科技有限公司|Payment processing method, device, medium and electronic equipment|
法律状态:
2016-02-23| PLFP| Fee payment|Year of fee payment: 2 |
2016-07-15| PLSC| Publication of the preliminary search report|Effective date: 20160715 |
2017-02-24| PLFP| Fee payment|Year of fee payment: 3 |
2017-10-13| CD| Change of name or company name|Owner name: INGENICO GROUP, FR Effective date: 20170912 |
2018-02-23| PLFP| Fee payment|Year of fee payment: 4 |
2020-02-21| PLFP| Fee payment|Year of fee payment: 6 |
2021-02-24| PLFP| Fee payment|Year of fee payment: 7 |
2022-01-07| TP| Transmission of property|Owner name: BANKS AND ACQUIRERS INTERNATIONAL HOLDING, FR Effective date: 20211202 |
优先权:
申请号 | 申请日 | 专利标题
FR1550192|2015-01-09|
FR1550191|2015-01-09|
FR1550193|2015-01-09|
FR1550191A|FR3031608A1|2015-01-09|2015-01-09|METHOD FOR PROCESSING AUTHORIZATION TO IMPLEMENT A SERVICE, DEVICES AND CORRESPONDING COMPUTER PROGRAM|
FR1550192A|FR3031609A1|2015-01-09|2015-01-09|METHOD OF PROCESSING A TRANSACTION FROM A COMMUNICATION TERMINAL|
FR1550193A|FR3031610A1|2015-01-09|2015-01-09|METHOD OF PROCESSING A TRANSACTION FROM A COMMUNICATION TERMINAL|EP16700256.7A| EP3243177B1|2015-01-09|2016-01-08|Method for processing an authorisation to implement a service, devices and corresponding computer program|
PCT/EP2016/050316| WO2016110588A1|2015-01-09|2016-01-08|Method for processing an authorisation to implement a service, devices and corresponding computer program|
US15/542,436| US10482450B2|2015-01-09|2016-01-08|Method for processing an authorization to implement a service, devices and corresponding computer program|
CA2971647A| CA2971647A1|2015-01-09|2016-01-08|Method for processing an authorisation to implement a service, devices and corresponding computer program|
[返回顶部]