专利摘要:
A method for securing data and ensuring its origin, wherein the data is transmitted from a customer device to a central electronically encrypted.
公开号:AT512289A4
申请号:T131/2012
申请日:2012-01-31
公开日:2013-07-15
发明作者:Heinrich Mag Beidl;Erwin Hrdy;Julius Ing Schauerhuber
申请人:Finalogic Business Technologies Gmbh;
IPC主号:
专利说明:

TELEPHONE: (+43 1) 532 41 30-0 TELEFAX: (+43 1) 532 41 31 E-MAIL: MAIL @ PATENTAT PROTECTION a. PARTNER:
PATENT OFFICES EUROPEAN PATENT AND TRADEMARK ATTORNEYS A-1200 VIENNA, BRIGITTENAUER LAND 50
DIPL.-ING. WALTER WOODEN DIPL.-1NG. DR. TECHN. EUSABETH SCHOBER
The invention relates to a method for securing data and ensuring its origin, wherein the data is transmitted electronically encrypted by a customer device to a control center.
In the prior art, methods for the secure transmission of electronic data using digital encryption techniques are known.
US 2002 059 146 A1 discloses a method for identifying a user and for securely transmitting number codes. In this case, a transaction code is used by encrypting a random number with the PIN of the user, which is known only to the user and a central office. The disadvantage here is that already the spying of the PIN compromises the security of this process.
AT 504 634 Bl and WO 2008 151 209 A1, also published as US 2008 298 588 A1, disclose methods for transferring encrypted messages. In this case, with alternating use of symmetric and asymmetric keys, such as RSA key pairs, a message via a third communication point, the so-called authentication device, sent, the first successful
• · 4 ·· I
mutual identification of the sender and receiver and corresponding transmission of keys among each other releases the message transmission. Disadvantage of this teaching is that permanently a third communication point, for example in the form of a server, must be operated.
WO 2008 076 442 A1 teaches a method for ranking the numbers on a number field on which, for example, a PIN is entered. The mechanical number field remains unchanged, but the user ignores the (standardized) numbering of the keys as they are entered. He is given on a screen display a new distribution of the numbers 0 to 9, after which he enters his PIN in the number field. As a result, the spying of the PIN by third parties is difficult. The disadvantage is that this security measure is ineffective if spying third parties know the algorithm for the numbering of numbers.
US 2003 182 558 A1 also shows a method for ranking numbers of a number field, wherein the numbers are additionally displayed in a different geometry than the conventional keyboard arrangement on a touch-sensitive screen. However, the disadvantage of ineffective protection with knowledge of the presentation algorithm remains.
It is the object of the method according to the invention to overcome the disadvantages of the prior art and to provide a method in which it is not possible by spying out • 4 · 4 · »
• 4 * 4 «4 4 4
• 4 * 4 «« · 44V 44 4444 a number entry or knowledge of one or more keys in the transmission of data to change the identity of the sender and the content of the data.
According to the Kerkhoff principle of 1883, a cryptosystem is secure, in spite of which an attacker knows all system details as long as the keys remain secret (Kerkhoff's Principle [1883]: A cryptosystem should be secure even if the attacker knows all the details about the system, with the exception of the secret key).
The objects are achieved according to the invention in that the method comprises the following steps: i) generating and storing an RSA key pair consisting of a first key (Sa) and a second key (Pa) for signing customer certificates in the center, ii) Generating and storing two RSA key pairs for the customer device consisting of a third key of the customer device (Sc) and a fourth key of the customer device (Pc) and a first key encryption key (St) and a second key encryption key (Pt), wherein the first key encryption key (St) and the second key encryption key (Pt) are suitable for secure transport of the third key of the customer equipment (Sc), 41 - generating an encrypted key by encrypting the third one Key of the customer device (Sc) with the second key ver key (Pt) and generating a customer certificate in the center by encrypting the customer-specific telephone number and the IMEI of the customer device and / or a customer number with the fourth key of the customer device (Pc) and then encrypting with the first key (Sa) for signing customer certificates, iv) transmitting the encrypted key and the customer certificate to the customer device, v) sending the first key encryption key (St) to the customer equipment upon request by the customer equipment, vi) decrypting the encrypted key with the first key encryption key (St) in the customer Customer device, wherein the third key of the customer device (Sc) is obtained, vii) encrypting a stringed number arrangement in the center with the fourth key of the customer device (Pc), viii) sending the encrypted stringed number order to the customer device, ix) decrypting the encrypted stringed digit arrangement in the customer device with the third key of the customer device (Sc), x) encrypting a first PIN entry on the customer device with the third key of the customer device (Sc) to a cipher, xi) sending the cipher and the customer certificate to the central office, xii) decrypting the cipher in the central office with the fourth key of the customer device (Pc), decrypting the first PIN entry and verifying the sent customer certificate with the customer certificate stored in the central office.
In one embodiment of the invention, it is preferred that the cipher is decrypted in the center and that the certificate transmitted by the customer device is compared with the certificate stored in the center in order to verify the authenticity of the data.
Furthermore, it is preferred in an embodiment of the method according to the invention that the concurrence of the lined-up number arrangement during the initialization of the method is selected once by the customer and transmitted to the control center. • »• ··· • ft ···· •» • · ·· • ft ···· «« ·
G:
In one embodiment of the invention, it is preferred that the trimming of the lined-up number arrangement in the control center be regenerated for each transmission to the customer device.
It is further preferred in an embodiment of the method according to the invention that the method comprises the further steps: iii. a) Generate a timestamp at headquarters, iv. a) transmitting the encrypted key together with the time stamp to the customer device, x.a) encrypting the first PIN input on the customer device together with the time key to a cipher.
A preferred embodiment of the method is characterized by the further steps: x.b) encrypting a second PIN entry on the customer device with the third key of the customer device (Sc) to a cipher to send a new PIN to the center, and x. c) encrypting a third PIN entry on the customer device with the third key of the customer device (Sc) to a cipher to confirm the new PIN.
Preferably, in one embodiment of the invention, in addition to the first PIN input, the number input of a credit card number and / or an expiration date of a credit card and / or a check digit of a credit card is carried out and encrypted is transmitted to the control center together with the first PIN entry.
In another preferred embodiment of the method according to the invention, in addition to the first PIN entry, the number entry of a goods-specific number, e.g. the ISBN of a book title, takes place and is transmitted encrypted together with the first PIN entry to the central office.
The invention will be explained in more detail with reference to an embodiment shown in the drawings. 1 shows a schematic representation of the transmission of preparatory data to a customer device, FIG. 2 shows a schematic customer device, and FIGS. 3a to 3d variously numbered digit arrangements on a number field.
The process, also referred to as the finalogic system, is used by owners of, for example, mobile telephone and communication devices, in order to be able to carry out legal transactions on secure processes. These include ordering goods or services and accessing protected information. ♦ * ♦ * ····································································.
This therefore relates to the protection of numeric and / or alphanumeric data entries on mobile telephone and communication devices against unauthorized third parties.
Such data entries may be and will be used in the process of • establishing, entering and changing the PIN of the mobile phone holder and • entering credit card data of the mobile phone or communications device holder.
This also concerns procedural steps for checking the authenticity of the origin and content of radio-transmitted data from mobile telephone and communication devices, the identity of the sender and the prevention of free readability of sensitive information by unauthorized third parties using cryptographic methods in real-time encryption to the action period.
To use the method according to the invention, the customer, who is a holder of a mobile telephone and communication device, in the following also customer device, either by phone or via a website, such as Finalogic's website, must register. • »· · • • • • • • • • • • • • • • * * * w w w w • • • • • • • • • • • • • • • • • • • ·· ··
He is asked - in addition to the required personal data - also the type of his device, for example iPho-ne4. Furthermore, it may be the customer's wish, for example at this time, to specify the type of payment method, for example credit card or the authorization passwords for access to certain information services. It is important that the actual access data, which have particularly sensitive information character, must be announced in the system at a later date.
Finally, the customer is asked for two data elements of his device: i. your own phone number (Phone #) and ii. The 15-digit International Mobile Equipment Identifier (IMEI) is unique in the world for any mobile phone or communication device. Every customer can read out this number by pressing the key combination * # 06 # from his device.
Alternatively or in addition to the IMEI, which is not very well protected and in some cases also multiple times assigned to many devices, a customer number can be agreed between the customer and the central office. In the following, the use of this customer number will increase the security of the method according to the invention instead of or together with the IMEI. • #: ιοί - · • φ ···· «*« #
After entering this information into the Finalogic system, the registration process is complete.
Now begins the cryptographic initialization process to ensure the genuineness of the origin and the authenticity of electronically transmitted data or the procedure for securing data and ensuring their origin. The Finalogic system works with data elements of the PKI - Public Key Infrastructure, according to the international standard IEEE P1363.
It uses asymmetric key pairs consisting of a secret part {private key} and a non-secret part (public key). The public key allows anyone to encrypt data for the owner of the private key, to check their digital signatures or to authenticate them. Authentification is the identification of one's own person. The private key enables its owner to decrypt data encrypted with the public key, to generate digital signatures, or to authenticate itself.
The following asymmetric key pairs are used: i. a first key for signing customer certificates Sa, the so-called secret PrivateKey (Finalogic); # * * · · · · · »« * J * * 1 > - * · Ä · · φ φ * * * * · «. "Ii. a second key Pa for signing customer certificates, the so-called public public key (Finalogic); iii. a first key encryption key St, the so-called Secret Private Key (Trans); iv. a second key encryption key, the so-called public public key (Trans); v. a third key of the customer device Sc, the so-called secret PrivateKey (Cust) of the customer, also called encryption key; vi. a fourth key of the customer device Pc, the so-called public public key (cust) of the customer, also called a decryption key; vii. and the data elements identifying the customer device: a. own telephone number (Phone #) and b. IMEI (Hardware Identification Number) and / or the
Customer number.
The procedure is as follows: i. In the central office (or data processing center) exactly one RSA key pair - Sa and Pa - is generated and stored.
However, for each customer device, two RSA key pairs are regenerated and stored: Sc and Pc, and St and Pt. The transport key pair St-Pt is required for secure transport of the secret customer key Sc to the customer device. The center also generates the so-called customer certificate or certificate for each customer. The necessary calculation rule is: (1) encrypt own phone #, IMEI (hardware identification number) and / or the customer number with the public customer key Pc: ENC (Pc) (Phone #, IMEI, KuNu), (2) encode the result ( 1) with the secret
Key from Finalogic Sa: ENC (Sa) (ENC (PC) (Phone #, IMEI (hardware identification number), KuNu)). An RSA key pair is a key pair consisting of a private key used to decrypt or sign data and a public key to encrypt or verify signatures. The private key is kept secret and can only be calculated from the public key at extremely high cost. Result is the certificate "CustPK Certificate". for this customer. In general, a certificate is a digital dataset that confirms certain properties of people or objects, and its authenticity and integrity through cryptographic processes.
can be checked. The digital certificate contains in particular the data required for its verification. Fig. 1 shows these steps and the transmission to the customer device, which is shown as a mobile phone. Together with a suitable for the telephone or communication device type of the customer program (APP, or even telephone provider independent program application on a mobile phone or communication device) or an equivalent program that can run under the device operating system, the cryptographic elements are • Encrypted secret customer key ENC (Pt) [Private Key (Cust) Sc] and • Customer certificate CustPK Certificate transmitted to the customer device by radio or line.
The receipt and storage of the above programs and files on the hard disk of the customer device requires the customer's consent.
With this program and this information, the following operations are now possible by the customer: m μ ψ
Personalization:
Not only is this authentication method able to provide unequivocal proof that, for example, a particular buy order has been submitted by the customer device with the unique customer number or IMEI (hardware identification number), but also to uniquely identify the owner.
For this purpose, the customer dials his personal PIN (Personal Identification Number) numeric / alphanumeric, as international standard between 4 to 12 digits long, for which the customer is responsible. Only with this PIN the customer can use all functions of his APP.
However, when PIN is entered on mobile telephone and communication devices, the customer is at risk of fraudulent attempts by unauthorized third parties to uncover his PIN. Of course, there is no difference to other systems equipped with similar protection mechanisms for the protection of personal powers. Therefore, the same retention rules of passwords apply.
For this reason, the PIN or other number entries are made in the method according to the invention using the so-called stringed PIN, as shown in FIG.
On the screen A of the customer device, the customer - in place of the usual sequence or order of the numbers 1 to 9 and 0 - a random arrangement of these digits shown according to this the customer on the keyboard N keyboard must enter his PIN.
Example 1 for numeric keyboards:
The usual numbering is: 1234567890. Their arrangement looks as shown in Fig. 3a. According to FIG. 3b, the numbered digit arrangement for this PIN entry is 6278015943. For the restricted entry of the PIN '7510', the customer now presses the key sequence '3765'.
Example 2 for numeric keyboards:
Here is another example to demonstrate the operation of the stringed PIN method. The numbered digit arrangement for this PIN entry is: 0768352419, as shown in Fig. 3c. For the restricted entry of PIN '415597', the customer now presses * 896602 '.
The random digit requesting rule alternates with every PIN or other numeric data entry (for example, the credit card number), not after each digit.
The process of personalization to ensure the authenticity of the identity of the sender and user of the system is as follows: ··················································································· * · I. Immediately after opening the APP, the central office requests the secret key decryption key St to obtain the customer's actual encryption key Sc. ii. Subsequently, the data processing center generates a new arbitrary digit arrangement, for example '9243605718', as shown in Fig. 3d, and encrypts it with the public customer key Pc according to ENC (Pc) (CustData, '92436057181), and is now sent to the customer. iii. The APP decrypts the obtained ciphertext with the secret customer key Sc DEC (Sc) (ENC (Pc) (CustData, 19243605718 ')).
On the screen appears the new arrangement rule according to (ii) for the numeric keypad, as can be seen in Fig. 3d. iv. The customer performs his PIN entry according to the displayed arrangement rule, the result is encrypted with the encryption key of the customer Sc. The certificate is also encrypted: ENC (Sc) (CustPK Certificate, 1397718 '). This is sent to the control center. v. At the head office, the ciphers are decrypted appropriately and the PIN '415597' is stored in the customer's master data, provided verification of the CustPK Certifiate customer certificate has been successful. The verification of the customer certificate guarantees the authenticity of the transmitted data and the identity of the origin.
The PIN change function works as follows, because from now on the customer can also select the 'PIN change function' at any time:
i. Enter the old PIN
ii. Enter the new PIN
iii. Repetition of the new PIN
The essential advantage of this method is that because the Finalogic system alters the digit ordering rule on each input, the ciphers of steps ii) and iii) differ in value - though the original values are identical.
For this reason, this PIN change function is technically superior to the conventional password change functions, since with Finalogic system a so-called data replay attack is successfully recognized and defended.
In practice, it has been found that customers remember the PIN not as a sequence of numbers, but as a graphic figure that the typing finger performs on the numeric keypad. Therefore, a constantly changing number of digits can be perceived as inconvenient and lead to input errors. To avoid this, the customer can alternatively select a concrete numbering of the numbers, which is assigned to his device by the Trust Server user-specific and transmitted. The numbering of the digits does not change according to each individual application, but remains the same for the individual customer. In this case, the surprising effect occurs that the PIN input continues to be largely secured against the spying of third parties, but at the same time the customer can and should note a graphic figure who performs his typing finger when entering. Of course, the user can at any time in the web registration process create a new dispute from the trust server or switch to the system with constantly changing number of digits, if it seems necessary for security reasons.
The transaction for legal transactions proceeds as follows: 1. Process of a purchase transaction (example): i. Immediately after opening the APP, the central office requests the secret key decryption key St to obtain the customer's actual encryption key Sc. ii. A timestamp is taken at the data processing center, which is encrypted with the public customer key Pc and sent to the customer, ENC (Pc) (CustData, '2010-07-01 / 10: 09: 11,571').
♦ ···· ··· · · «· · · · iii. The APP decrypts the obtained ciphertext with the secret customer key Sc DEC (Sc) (ENC (Pc) (CustData, '2010-07-01 / 10: 09: 11, 571')).
For example, if the book " The Seven Wonders of the World " If desired by the customer, its ISBN code together with the customer certificate and the time stamp is encrypted with the secret customer key Sc, ENC (Sc) (CustPK Certificate, 12010-07-01 / 10: 09: 11,571 ', 1 ISBN 3-8094-1694 -01), and sent to the data processing center.
In the data processing center, the cipher is suitably decrypted, the customer certificate is checked and, if the time stamp has not yet expired, the customer's purchase order is forwarded to the appropriate retailer. 2. Expiry of a credit card payment (example): If the customer chooses the method of payment by means of credit cards as an option, our secured procedure is again used by means of an exten- sive number request.
The individual transaction steps in detail are: i. Immediately after opening the APP, the central office requests the secret key encryption key St to obtain the customer's actual encryption key Sc. ii. The center generates a new digit order, for example, '9243605718', and encrypts it with the public customer key Pc ENC (Pc) (CustData, '9243605718'), and is sent to the customer. iii. The APP decrypts the received cipher with the secret customer key Sc according to DEC (Sc) (ENC (Pc) (CustData, '9243605718 1)).
On the screen appears the arrangement rule, as indicated in Fig. 3d. iv. Entering the card number, the expiry date and, if applicable, a check value according to the indicated penalty rule, the result is encrypted with the encryption key of the customer Sc, ENC (Sc) (CustPK Certificate, '7255236666666669', '92 / 94 ',' 999 '), and the
Central sent. v. At the head office, the ciphers are decrypted appropriately and the customer certificate is checked and, if positive, a corresponding credit card payment is initiated.
The data protection is also ensured because in the system using the method according to the invention, so-called HSMs (Host Security Modules) are used for data and data decryption and for the key management operations.
Such devices include for cryptographic purposes optimized and protected from any attack or access from the outside computation and storage. Their protection system goes so far that they never leave out values or instructions in unencrypted form and clear all key values as soon as any readout or data sampling attempt is detected. Also, the attempted removal of individual parts, even the unauthorized opening of the housing leads to the total memory loss - specifically, each bit of the key memory is overwritten with '0'.
In order to protect our customers' personal information, Fina-logic uses either • its own cable encryption keys if the other party also has HSM modules in the data traffic with the dealers, or • at least SSL encryption to the data receivers of the merchants who need to understand SSL.
SSL (Secure Socket Layer) encryption was developed by Netscape and RSA Data Security. The SSL protocol is intended to ensure that sensitive data is transmitted in encrypted form when surfing the Internet, such as credit card information during online shopping. Thus, it is to be prevented that third-party users can not read or manipulate the data during transmission. In addition, this encryption method ensures the identity of a website.
In the addressed encryption devices, such as Finalo-gic, a re-encryption operation takes place using the customer's decryption key Pc and the merchant's encryption key.
Safety requirements compliant HSMs must meet all safety requirements according to the international standard FIPS 140-2 Level 4. FIPS is the name of the Federal Information Processing Standard and is the name of the publicly-publicated US Stands. FIPS 140 implies that data in plain text can under no circumstances be read out or otherwise exported.
This approach guarantees our customers complete protection of their personal data during processing by Finalogic.
权利要求:
Claims (5)
[1]
Claims 1. A method of securing data and securing its origin, wherein the data is electronically encrypted from a customer device to a central office, and wherein the method comprises the steps of: i) generating and storing an RSA key pair consisting of a first one Key (Sa) and a second key (Pa) for signing customer certificates in the center, ii) generating and storing two RSA key pairs for the customer device consisting of a third key of the customer device (Sc) and a fourth key of the customer device (Pc ) and a first key encryption key (St) and a second key encryption key (Pt), wherein the first key encryption key (St) and the second key encryption key (Pt) are suitable for the secure transport of the third key of the customer equipment (Sc), iii) generating an encrypted rarely key by encrypting the third key of the customer device (Sc) with the second key encryption key (Pt) and generating a customer certificate in the center by encrypting the customer telephone number and the IMEI of the customer device and / or a customer number with the fourth key of Customer device (Pc) and then encrypted with the first key (Sa) for signing customer certificates, transmitting the encrypted key and the customer certificate to the customer device, sending the first key encryption key (St) to the customer device after a request by the customer device, decrypting the encrypted key with the first key encryption key (St) in the customer equipment, the third key of the customer equipment (Sc) is obtained, encrypting a stringed number arrangement in the center with the fourth key the client device (Pc), sending the encrypted stringed digit arrangement to the customer device, ix) decrypting the encrypted stringed number order in the customer device with the third key of the customer device (Sc), x) encrypting a first PIN entry on the customer device with the third one Xi) sending the cipher and the customer certificate to the central office; xii) decrypting the ciphers in the central office with the fourth key of the customer's device (Pc), decrypting the first PIN entry and verifying the sent Customer certificate with the customer certificate stored in the central office. Method according to Claim 1, characterized in that the cipher is decrypted in the center and that the certificate transmitted by the customer's device is compared with the certificate stored in the center in order to verify the authenticity of the data. Method according to one of claims 1 or 2, characterized in that the transmission of the data from the control center to the customer device and from the customer device to the central via radio and / or by line connection takes place. ≫ 2g ··


[2]
4. The method according to any one of claims 1 to 3, characterized in that the ration of the numbered string arrangement during the initialization of the method is selected once by the customer and transmitted to the control center.
[3]
5. The method according to any one of claims 1 to 3, characterized in that the concurrence of the lined-up number arrangement in the control center is newly generated for each transmission to the customer device.
[4]
6. The method according to any one of claims 1 to 5, characterized by the further steps iii. a) Generate a timestamp at headquarters, iv. a) transmitting the encrypted key together with the time stamp to the customer device, x.a) encrypting the first PIN input on the customer device together with the time key to a cipher.
[5]
7. The method according to any one of claims 1 to 6, characterized by the further steps: xb) encrypting a second PIN input at the customer device with the third key of the customer device (Sc) to a cipher to send a new PIN to the center, and xc) encrypt a third PIN entry on the customer device with the third key of the customer device (Sc) to a cipher to confirm the new PIN. Method according to one of Claims 1 to 6, characterized in that, in addition to the first PIN entry, the number input of a credit card number and / or an expiration date of a credit card and / or a check digit of a credit card is encrypted and sent to the central office together with the first PIN entry is transmitted. Method according to one of Claims 1 to 6, characterized in that, in addition to the first PIN entry, the number entry of a goods-specific number, e.g. the ISBN of a book title, takes place and, together with the first PIN entry, is transmitted in encrypted form to the central office
类似技术:
公开号 | 公开日 | 专利标题
EP2810400B1|2015-12-02|Cryptographic authentication and identification method using real-time encryption
DE112011100182B4|2021-01-21|Data security device, computing program, terminal and system for transaction verification
DE60211841T2|2006-09-21|Device for updating and revoking the validity of a trade mark in a public-key infrastructure
DE102017000768A1|2018-08-02|Method for performing two-factor authentication
DE60212577T2|2007-06-14|METHOD AND DEVICE FOR CERTIFYING DATA
DE60120369T2|2007-07-12|Method and data carrier for the registration of users of a public-key infrastructure and registration system
EP1946481B1|2011-01-12|Method for generating an advanced electronic signature for an electronic document
DE60023705T2|2006-07-20|SECURE DISTRIBUTION AND PROTECTION OF KEY INFORMATION
DE10124111B4|2006-05-04|System and method for distributed group management
DE60028778T2|2007-05-24|PROCESS FOR MAINTAINING AND DISTRIBUTION OF INDIVIDUAL FUSES
EP2749003B1|2018-06-27|Method for authenticating a telecommunication terminal comprising an identity module on a server device in a telecommunication network, use of an identity module, identity module and computer program
EP2765752B1|2017-05-24|Method for equipping a mobile terminal with an authentication certificate
DE102012206341A1|2012-10-31|Shared encryption of data
DE102005046844A1|2006-04-27|Cryptographic security for communication sessions
WO2007045395A1|2007-04-26|Device and method for carrying out cryptographic operations in a server-client computer network system
DE10124427A1|2002-01-17|Communication device authentication method compares hash values of transmission and reception devices provided using hash value algorithm
EP2512090A1|2012-10-17|Method for authenticating a subscriber
WO2005055018A1|2005-06-16|Method and device for securing digital data
DE10114157A1|2002-09-26|Computer-aided encryption key generation method provides public encryption key with common first part and second part specific to each receiver
EP2383672B1|2018-10-10|One-time-password generator
DE102005033228B4|2013-05-29|Method and security system for securing a data transmission in a communication system
DE102012220774B4|2022-02-24|Procedures for Conducting Transactions
DE10242673B4|2020-10-15|Procedure for identifying a user
EP3882796A1|2021-09-22|User authentication using two independent security elements
DE102006009725A1|2007-06-14|Public code authenticating method, involves producing signature from combination of public code and generated authentication characteristic, and publishing public code, authentication characteristic and produced signature
同族专利:
公开号 | 公开日
RU2584500C2|2016-05-20|
EP2810400B1|2015-12-02|
CN104322003A|2015-01-28|
US10089627B2|2018-10-02|
WO2013113050A1|2013-08-08|
EP2810400A1|2014-12-10|
ZA201405980B|2015-11-25|
AT512289B1|2013-07-15|
CN104322003B|2017-04-19|
US20150006404A1|2015-01-01|
RU2014135325A|2016-03-20|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
US20020029342A1|2000-09-07|2002-03-07|Keech Winston Donald|Systems and methods for identity verification for secure transactions|
US20030182558A1|2002-02-05|2003-09-25|Lazzaro John R.|Dynamic PIN pad for credit/debit/ other electronic transactions|
WO2003096165A2|2002-05-13|2003-11-20|Thomson Licensing S.A.|Paid access to a local area network|
EP1615181A1|2004-07-09|2006-01-11|Tricerion Ltd|A method of secure data communication|
WO2008067575A1|2006-12-04|2008-06-12|Hofstaedter Gernot|Method for transferring encoded messages|
US20080148186A1|2006-12-18|2008-06-19|Krishnamurthy Sandeep Raman|Secure data entry device and method|
US20080298588A1|2007-06-04|2008-12-04|Shakkarwar Rajesh G|Methods and systems for the authentication of a user|
US6795555B1|1999-12-30|2004-09-21|Nortel Networks Limited|Encryption key exchange protocol|
FR2818062B1|2000-12-07|2003-04-11|Thomson Multimedia Sa|METHOD FOR SECURE TRANSMISSION OF DIGITAL DATA FROM A SOURCE TO A RECEIVER|
GB0119629D0|2001-08-10|2001-10-03|Cryptomathic As|Data certification method and apparatus|
US7131003B2|2003-02-20|2006-10-31|America Online, Inc.|Secure instant messaging system|
CA2621147C|2008-02-15|2013-10-08|Connotech Experts-Conseils Inc.|Method of bootstrapping an authenticated data session configuration|
DE102011051498A1|2011-06-06|2012-12-06|Kobil Systems Gmbh|Secure access to data in one device|WO2016129863A1|2015-02-12|2016-08-18|Samsung Electronics Co., Ltd.|Payment processing method and electronic device supporting the same|
EP3262582B1|2015-02-27|2021-03-17|Samsung Electronics Co., Ltd.|Electronic device providing electronic payment function and operating method thereof|
US10193700B2|2015-02-27|2019-01-29|Samsung Electronics Co., Ltd.|Trust-zone-based end-to-end security|
KR20160105261A|2015-02-27|2016-09-06|삼성전자주식회사|Method and apparatus for providing card service using electronic device|
US10699274B2|2015-08-24|2020-06-30|Samsung Electronics Co., Ltd.|Apparatus and method for secure electronic payment|
US10846696B2|2015-08-24|2020-11-24|Samsung Electronics Co., Ltd.|Apparatus and method for trusted execution environment based secure payment transactions|
US9838379B1|2015-12-01|2017-12-05|Sprint Communications Company L.P.|Security tiering in a mobile communication device application framework|
US10115092B1|2016-03-04|2018-10-30|Sprint Communications Company L.P.|Service composition in a mobile communication device application framework|
CN109254734B|2018-09-06|2021-12-03|郑州云海信息技术有限公司|Data storage method, device and equipment and computer readable storage medium|
CN110958598A|2018-09-26|2020-04-03|中国移动通信有限公司研究院|Binding authentication method and device for mobile terminal and SIM card|
法律状态:
2020-09-15| MM01| Lapse because of not paying annual fees|Effective date: 20200131 |
优先权:
申请号 | 申请日 | 专利标题
ATA131/2012A|AT512289B1|2012-01-31|2012-01-31|CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD FOR MOBILE TELEPHONE AND COMMUNICATION DEVICES WITH REAL-TIME ENCRYPTION DURING THE ACTION PERIOD|ATA131/2012A| AT512289B1|2012-01-31|2012-01-31|CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD FOR MOBILE TELEPHONE AND COMMUNICATION DEVICES WITH REAL-TIME ENCRYPTION DURING THE ACTION PERIOD|
US14/376,077| US10089627B2|2012-01-31|2013-01-28|Cryptographic authentication and identification method using real-time encryption|
EP13703986.3A| EP2810400B1|2012-01-31|2013-01-28|Cryptographic authentication and identification method using real-time encryption|
CN201380013078.0A| CN104322003B|2012-01-31|2013-01-28|Cryptographic authentication and identification method using real-time encryption|
RU2014135325/08A| RU2584500C2|2012-01-31|2013-01-28|Cryptographic authentication and identification method with real-time encryption|
PCT/AT2013/000013| WO2013113050A1|2012-01-31|2013-01-28|Cryptographic authentication and identification method using real-time encryption|
ZA2014/05980A| ZA201405980B|2012-01-31|2014-08-14|Cryptographic authentication and identification method using real-time encryption|
[返回顶部]