专利摘要:
This method of securing a payment carried out with the aid of a payment card associated with card identification data and with a security cryptogram, is characterized in that it comprises a step (2) of accessing means forming a bank server (1) for the dynamic generation of the security cryptogram for securing the payment.
公开号:AU2012360969A1
申请号:U2012360969
申请日:2012-12-21
公开日:2014-07-17
发明作者:Patrick WAJSBROT
申请人:PW GROUP;
IPC主号:G06F21-32
专利说明:
1 Method and system for securing a payment carried out with the aid of a payment card The present invention relates to a method and a system for securing a payment carried out with the aid of a payment card. 5 Such a payment today is for example done by inserting a certain number of pieces of information into the payment service, such as the card number, the final validity date or expiration date thereof, and a security cryptogram. This information is for example distributed on each surface of the card, which makes it possible to improve the security of this payment, since it is then very difficult to 10 access all of the information required to validate a payment, for example a fraudulent payment. Thus, for example, certain pieces of information, such as the card number and expiration date, may be on one surface of the card, while the cryptogram is on the other surface thereof. 15 However, it is not completely impossible to recover all of these pieces of information, which results in general security problems for this type of payment. The aim of the invention is therefore to resolve these problems. To that end, the invention relates to a method for securing a payment carried out with the aid of a payment card associated with card identification data and a security 20 cryptogram, characterized in that it includes a step for accessing means forming a bank server for the dynamic generation of the security cryptogram for securing the payment. The method according to the invention may comprise one or more of the following features, considered alone or according to any technically possible combination(s): - it includes a step for accessing the bank server-forming means to activate the 25 card; - the generation/activation is triggered at the user's initiative; - the access step includes: - a step for the insertion of identification data by the user, - a step for voice connection between the user and the server-forming 30 means, and - a step for voice authentication of the user to validate, or not validate, access to the server-forming means, by the latter; - the step for insertion by the user of identification data comprises a step for the introduction by the latter of a connection code; 35 - the connection code has been provided to the user by the server-forming means, during the registration of that user in the server-forming means; 2 - the step for creating a voice connection between the user and the server-forming means includes a step for calling the identified user at a preregistered telephone number; - the voice authentication step includes determining the user's voice print in order to authenticate, or not authenticate, that user; 5 - the voice authentication step includes the acquisition, by the server-forming means, of pre-established messages dictated by the user and comparing those acquired messages to messages pre-recorded in the server-forming means by the user, to authenticate, or not authenticate, that user. According to another aspect, the invention also relates to a system for 10 implementing such a method. The invention will be better understood using the following description, provided solely as an example and done in reference to the appended drawings, in which: - figure 1 shows a block diagram illustrating the structure and operation of a method and an access system for accessing bank server-forming means, 15 - figures 2 and 3 show graphic interfaces illustrating the access to these bank server-forming means, - figures 4 and 5 show graphic interfaces illustrating the registration of a bank card with these bank server-forming means, - figures 6 to 9 illustrate the dynamic generation and the use of a security 20 cryptogram for payment with the aid of a bank card, and - figures 10 to 12 show graphic interfaces illustrating the activation of a bank card with these bank server-forming means. These figures illustrate a method and a system for controlling the access by a user to means forming a server, in particular a bank server. 25 This access is for example done using computerized, telephone or other means at the user's disposal. In figure 1, the bank server-forming means are designated by general reference 1, while the user has a tool such as a computer, provided with means for introducing identification data into the server-forming means, at his disposal. 30 Thus, for example, this computer is designated by general reference 2 in figure 1, and is for example connected through an information transmission network, for example 3, to the server-forming means 1. The user also for example has a telephone, such as a mobile telephone, designated by general reference 4.
3 In fact, in the method and system according to the invention, the server-forming means are associated with means for registering that user in said server-forming means, such registration means being designated by general reference 5 in figure 1. These registration means then for example allow an operator of the bank server 5 forming means to enter therein, information relative to a user to be registered, and for example in particular a telephone number at which the user can be reached. In response to the registration of that user in the bank server-forming means, the latter send the user a connection code, for example such as an identifier. This identifier is next used by the user when he wishes to connect to the bank 10 server-forming means. This identifier is thus for example introduced into the server-forming means by the user via the computer 2, when he wishes to access the server-forming means and more particularly the services, operations or accounts, etc., provided or managed by them. Of course, other embodiments may be considered, the user also being able to use 15 a telephone, such as a mobile telephone 4, to introduce that identifier. After this step for the user to introduce his identification data, a step is provided for providing a voice connection between the user and the server-forming means. To that end, the server-forming means call the user at the telephone number preregistered and pre-entered in the server-forming means during user registration, for 20 example by the operator. These server-forming means then for example call the user's mobile telephone, designated by general reference 4, which allows the user to establish a voice relationship and authenticate himself by voice with the server-forming means. Several methods of authenticating the user may then be considered. 25 Thus, for example, the user's voice print may be determined from one or more sentences spoken by him, to perform that authentication. As an example, a sentence such as: "Hello. First name, last name. I am authenticating by voice", may be used, as will be described in detail below. According to another embodiment, the user may also for example dictate one or 30 more pre-established messages, the server-forming means then carrying out an acquisition step for those dictated messages and a step for comparing those acquired messages to messages prerecorded in the server-forming means by the user, in order to authenticate, or not authenticate, that user, as illustrated in figure 1. The means for acquiring messages dictated by the user are designated by general 35 reference 6 in this figure 1, and they are compared in 7 to messages that are prerecorded and stored in means designated by general reference 8, in order to authenticate, or not 4 authenticate, the user and to allow access to the server-forming means, or not allow such access, to the user. This authentication and secure access operation is for example also illustrated in figures 2 and 3. 5 Figure 2 in fact illustrates the connection of the user, the latter being invited to enter his identifier, such as his connection code, for example, in 9 and to validate it, to be called on his telephone by the server-forming means. Once the voice relationship is established with the server-forming means, the user then dictates one or more messages or sentences to authenticate himself with the bank 10 server-forming means, which, if it is the case, i.e., if the user is authenticated, as illustrated in figure 3, provides the user with access to different services, operations, accounts, etc. offered and/or managed by the bank server-forming means for the user. One of the services offered by the server-forming means is for example a service to register one or more of the user's bank cards, as illustrated in figure 4. 15 When the user activates the service or triggers the performance of that operation, the user must then for example enter the card number into the server-forming means, in order to register the latter with the server-forming means, as illustrated in figure 5. One can then see that this access control method and system make it possible to improve the access security to the bank server-forming means in general. 20 Indeed, the user must not only enter a connection code, but also authenticate himself by voice with the bank server-forming means before accessing the different operations, services or accounts provided or managed by said server-forming means. Thus, for example, one of these services or one of these operations may be a service for the dynamic generation of a cryptogram for securing a payment with the aid of 25 the bank card, which has for example been registered as previously described with the server-forming means by the user. This is for example illustrated in figures 6 to 9. Figure 6 illustrates the activation of the service at the initiative of the user, for example by selecting that service from a list of services, operations, accounts or others 30 offered to the user. As illustrated in figure 7, the user next selects the bank card that he will use to make any payment, for example on a merchant or other site. This bank card is for example selected by using and entering its number. Once the bank card is selected, it is then possible for the server-forming means to 35 launch the dynamic generation of a cryptogram for securing a payment using that bank card, as illustrated in figures 8 and 9.
5 The cryptogram is then displayed to the user (figure 8), who can thus enter it to validate and secure a payment (figure 9). This makes it possible to prevent the cryptogram from being taken and displayed permanently by the card, with the corresponding security problems. 5 In fact, the cryptogram for securing the payment by bank card is typically printed on the back of the bank card, which makes it easy to access and constitutes a security weakness. In the system according to the invention, the cryptogram is generated dynamically, at the user's request, and is therefore not permanently printed on the card. 10 This cryptogram can then have predetermined validity attributes. Thus, for example in figure 8, one can see that this cryptogram is associated with a message indicating the validity attributes of the cryptogram generated for the user, the latter for example being valid once for fifteen minutes to make a payment using the card. One can thus see that this dynamic generation of a security cryptogram makes it 15 possible to improve the usage security of bank cards. Another service offered by the server-forming means is for example a service for activating one or more bank cards, as illustrated in figures 10, 11 and 12. When the user activates the service or initiates the performance of this operation as illustrated in figure 10, it is then appropriate for example to enter the number of the 20 card to be activated into the server-forming means, as illustrated in figure 11, in order to activate said card as illustrated in figure 12. The card may in fact be deactivated by default and only be activated at the user's request or by someone acting on that user's behalf, for example a legal representative or other individual. 25 This also makes it possible to improve the usage security of these cards. Activation attributes may of course be associated therewith, for example a number of possible uses and/or a maximum authorized amount and/or a usage time limited and/or geographical usage area, etc. Thus, for example in figure 12, it is indicated that the card has been activated 30 successfully and that it can be used once for fifteen minutes. Of course, this is only one example, and other attributes may be considered.
权利要求:
Claims (9)
[1] 1.- A method for securing a payment carried out with the aid of a payment card associated with card identification data and a security cryptogram, characterized in that it 5 includes a step for accessing means (1) forming a bank server for the dynamic generation of the security cryptogram for securing the payment.
[2] 2.- The method according to claim 1, characterized in that it includes a step for accessing the bank server-forming means (1) to activate the card. 10
[3] 3.- The method according to claim 1 or 2, characterized in that the generation/activation is triggered at the user's initiative.
[4] 4.- The method according to claim 1, 2 or 3, characterized in that the access step 15 includes: - a step (2) for the insertion of identification data by the user, - a step for creating a voice connection between the user and the server forming means (1), and - a step for voice authentication of the user to validate, or not validate, 20 access to the server-forming means (1), by the latter.
[5] 5.- The method according to claim 4, characterized in that the step for insertion by the user of identification data comprises a step for the introduction by the latter of a connection code. 25
[6] 6.- The method according to claim 5, characterized in that the connection code has been provided to the user by the server-forming means (1), during the registration of that user in the server-forming means. 30 7.- The method according to any one of claims 4 to 6, characterized in that the step for creating a voice connection between the user and the server-forming means (1) includes a step for calling the identified user at a preregistered telephone number (4).
[7] 8.- The method according to any one of claims 4 to 7, characterized in that the 35 voice authentication step includes determining the user's voice print in order to authenticate, or not authenticate, that user. 7
[8] 9.- The method according to any one of claims 4 to 7, characterized in that the voice authentication step includes the acquisition, by the server-forming means (1), of pre established messages dictated by the user and comparing those acquired messages to 5 messages pre-recorded in the server-forming means (1) by the user, to authenticate, or not authenticate, that user.
[9] 10.- A system for securing a payment carried out with the aid of a payment card associated with card identification data and a security cryptogram for implementing a 10 method according to any one of the preceding claims, characterized in that it includes means (2) for accessing bank server-forming means (1) for the dynamic generation of the security cryptogram for securing the payment.
类似技术:
公开号 | 公开日 | 专利标题
US9047473B2|2015-06-02|System and method for second factor authentication services
US8151328B1|2012-04-03|Accessing secure network areas by utilizing mobile-device authentication
EP2115993B1|2017-11-15|Method for generating digital fingerprint
EP1615097A2|2006-01-11|Dual-path-pre-approval authentication method
US8171303B2|2012-05-01|Authenticating a login
EP2819050B1|2019-12-25|Electronic signature system for an electronic document using a third-party authentication circuit
EP3534584B1|2021-09-22|Service implementation method and apparatus
US20070255564A1|2007-11-01|Voice authentication system and method
US11128634B1|2021-09-21|System and method for providing a web service using a mobile device capturing dual images
CN101025843B|2010-05-26|Self-service financial transaction system and method
WO2007037703A1|2007-04-05|Human factors authentication
CN102790674A|2012-11-21|Authentication method, equipment and system
US9143500B1|2015-09-22|Cloud data storage access verification method utilizing a variable assigning request string generator and receiver algorithm
US9525694B2|2016-12-20|Authenticating customers and managing authenticated sessions
CN109120597B|2020-09-01|Identity verification and login method and device and computer equipment
CA2968656C|2018-09-04|Identity and phone number verification
US11057372B1|2021-07-06|System and method for authenticating a user to provide a web service
US9491170B2|2016-11-08|Authenticating customers and managing authenticated sessions
CN104104671B|2017-11-10|Establish the unified dynamic authorization code system of business entity's account
US20110246366A1|2011-10-06|Authentication using telecommunications device
WO2019153461A1|2019-08-15|Identity information changing method and apparatus, terminal device, and storage medium
CN107241362B|2020-11-24|Method and device for identifying identity of verification code input user
CN107113613A|2017-08-29|Server, mobile terminal, real-name network authentication system and method
US20140351143A1|2014-11-27|Method and system for securing a payment carried out with the aid of a payment card
CN107645726A|2018-01-30|A kind of method and system for mobile terminal user identity certification
同族专利:
公开号 | 公开日
BR112014015995A2|2017-06-13|
EP2798564A1|2014-11-05|
MX2014007776A|2015-04-13|
RU2644144C2|2018-02-07|
FR2985341A1|2013-07-05|
WO2013098238A1|2013-07-04|
BR112014015995A8|2017-07-04|
FR2985341B1|2015-01-09|
RU2014131482A|2016-02-20|
US20140351143A1|2014-11-27|
MX362238B|2019-01-09|
AU2012360969B2|2018-06-28|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
SE514999C2|1999-02-05|2001-05-28|Ericsson Telefon Ab L M|Service card transactions over a wireless LAN|
US7953671B2|1999-08-31|2011-05-31|American Express Travel Related Services Company, Inc.|Methods and apparatus for conducting electronic transactions|
US7865414B2|2000-03-01|2011-01-04|Passgate Corporation|Method, system and computer readable medium for web site account and e-commerce management from a central location|
US20030216997A1|2002-05-16|2003-11-20|Cohen Morris E.|Financial cards|
US20050075985A1|2003-10-03|2005-04-07|Brian Cartmell|Voice authenticated credit card purchase verification|
KR100930457B1|2004-08-25|2009-12-08|에스케이 텔레콤주식회사|Authentication and payment system and method using mobile communication terminal|
EP1802155A1|2005-12-21|2007-06-27|Cronto Limited|System and method for dynamic multifactor authentication|
US7512567B2|2006-06-29|2009-03-31|Yt Acquisition Corporation|Method and system for providing biometric authentication at a point-of-sale via a mobile device|
WO2008098029A1|2007-02-06|2008-08-14|Vidoop, Llc.|System and method for authenticating a user to a computer system|
US8271285B2|2007-08-02|2012-09-18|International Business Machines Corporation|Using speaker identification and verification speech processing technologies to activate and deactivate a payment card|
US7922082B2|2008-01-04|2011-04-12|M2 International Ltd.|Dynamic card validation value|
US20100161470A1|2008-12-24|2010-06-24|Mark Wiesman|Systems and methods for authenticating an identity of a user of a transaction card|
GB2478712A|2010-03-15|2011-09-21|David Jackson|Authorisation system|
RU106419U1|2011-02-24|2011-07-10|Открытое акционерное общество "Сбербанк России"|SYSTEM OF BIOMETRIC VERIFICATION OF HOLDERS OF PRO MAP 100|US10848482B1|2016-02-18|2020-11-24|Trusona, Inc.|Image-based authentication systems and methods|
法律状态:
2018-10-25| FGA| Letters patent sealed or granted (standard patent)|
2019-09-12| PC| Assignment registered|Owner name: IN-IDT Free format text: FORMER OWNER(S): PW GROUP |
优先权:
申请号 | 申请日 | 专利标题
FR1162584||2011-12-30||
FR1162584A|FR2985341B1|2011-12-30|2011-12-30|METHOD AND SYSTEM FOR SECURING A PAYMENT REALIZED USING A PAYMENT CARD|
PCT/EP2012/076658|WO2013098238A1|2011-12-30|2012-12-21|Method and system for securing a payment carried out with the aid of a payment card|
[返回顶部]