GB2362489A - Secure communication - Google Patents
Secure communication Download PDFInfo
- Publication number
- GB2362489A GB2362489A GB0011673A GB0011673A GB2362489A GB 2362489 A GB2362489 A GB 2362489A GB 0011673 A GB0011673 A GB 0011673A GB 0011673 A GB0011673 A GB 0011673A GB 2362489 A GB2362489 A GB 2362489A
- Authority
- GB
- United Kingdom
- Prior art keywords
- user
- validation code
- purchase
- internet
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A method is presented for validating a purchase instruction which a user transmits to a server by internet. The server accesses a database to obtain contact information for the user, e.g. a phone number, and transmits a validation code to the user using the contact information. The user returns the validation code to the server by internet, and so validates the purchase.
Description
2362489 1 Secure runication
Field of the invention
The present invention relates to methods and apparatus for securely transferring instructions over a telecommunications network, such as the intemet. The invention is especiaRy useU for instructing commercial transactions online.
BackRround of the invention Internet commerce is presently growing rapidly, and encompasses the purchase by users of goods, services and even information (e.g. it is now possible to pay to download music).
To make a purchase, a user communicates purchase instructions via the internet to a website operated by a retafler- The instructions often include details of a credit card account held by the user. Typically, this data is printed on the credit card itself. The retailer accepts the purchase (e.g. the retailer may dispatch the purchased goods), and debits the user's credit card accordingly.
The above system is subject to a security problem that the data on the credit card is accessible to any third party who gains access to the card. Such a person can remember the credit card data printed on the card, and make purchases on his own account at any later time.
Often a single user will make multiple purchases from the same website over 2 an extended period of time. To avoid the. necessity for a given user to transmit the same credit card data repeatedly, it is known for the website to maintain a database of credit card information for many respective users. Each user is supplied with (or chooses) identification data which identifies him. The identification data includes a password and normally also a user name- Whenever a user wishes to make a purchase ftorn the website he supplies the website with his identification data. 71e website uses the identification data to access the database of credit card data, and extracts the credit card information for the user.
This arrangement exacerbates the security problem identified above, since a third pavty who Saing access to the identification data can use the website to rnake purchases. Such a third party may, for example, be an operative of the retailer. Alternatively, the third party may gain access to the identification data because the user has recorded it somewhere (e. g. on paper) to avoid having to remember it. In is fact, the level of crime associated with online purchasing is rising rapidly.
Although, as explained, the problem of internet security is particularly acute in the example of online purchasing, it arises in other cases also. Indeed, there are many instances in which a user wishes to communicate securely with a website.
Summary. of the invention 20 The present invention seeks to provide methods and apparatus for secure internet communication, especially for transmitting purchase instructions to an internet retailer. In general terms the present invention proposes that user supplies a website
3 with data indicating his identity- The website accesses a database of contact data in relation to a second telecommunications network, to find the contact data for the user.
For example, the second telecommunications network may be a telephone network (e.g. a mobile telephone network), and the contact data may be the user's telephone number. The website contacts the user using the second telecommunications network to check the- identity of the user.
for example, the website may send the user a validation code. This may be sent as part of a message to a mobile phone owned by the user. The user reads the validation code, and sends it to the website by internet (e.g. by entering it onto a webpage presented on the user's browser). Thuú, a third party will only he able to make use of the user's account with the website if he has access to the telecommunications device in the second telecommunications network associated with the contact data.
The database may be maintained by the website itself, as a database of its, contacts. Alternatively, the database may be a database maintained by an operator of a the second telecommunications network. In fact, a plurality of telephone operators may maintain respective databases. The user may indicate his telephone number to the website, so that the website can contact the appropriate telephone operator, and thus the correct database.
Having validated the identity of the user, the site may issue the bill in respect of the purchase to a credit card account in the normal manner (e.g. by asking the user to enter credit card details. or by accessing a database of previously entered credit card data). More preferably, bowever, the bill for the purchase may be paid from a 1 4 financial account associated with the second telecommunications network. For example, it may appear on the user's next monthly telephone bill. This obviates the need for any separate credit card account.
Brief descdption of the Fipres An example of the invention will now be explained in detail, for the sake of example only, with reference to the following figures, in which:
Fig= 1 shows the screens presented to the user in a first embodiment of the invention; and Fig. 2 is a block dia of the steps in a second em.1bodiment of the invention.
Detailed description of embodiments
Referring firstly to Fig. 1, the area labelled I represents schematically the display on a user's browser at a certain instant, that is tbLe user's screen. The screen 1 is a display generated by a server which functions as an online retailer- Screen I indicates a list of items (e.g. a user's "shopping basket"). By checking the box (and perhaps clicking on a "purchase" button.), the user indicates that he wants to pay for "item 2".
The display then changes to screen 2, in which the user Is invited to enter identification dala, specifically his user name and password, The server maintains a database of user names and passwords, so that it can verify the result. If he is unsuccessful in doing this, he is directed to screen 3, and is invited to retty.
If he is successfal, the user is directed to screen 4. At this point the server indicates that it is sending a message to a mobile phone (or other message reception device, such as a pager), and gives the number of the mobile phone. This number may be taken from a database which the server has accessed using the identification data, or alternatively the user may enter the telephone number himself into the screen 4. In the latter case, the fact that there is a user associated with the input identification data and the telephone number is verified (e-g- by contacting the operator of the telephone system), The display then changes to screen 5. The message sent to the mobile phone contains a validation code. The user can enter this, reading it from the screen of the mobile phone, and it is verified. If the user has entered the code unsuccessfully, he is directed to screen 6, and invited to retry If the user enters the code successfully, he is directed to screen 7. The purchase is completed, and the server issues a bill to the account associated with the mobile telephone nurnber.
Turning to Fig. 2, a block diagram is shown of the nine payment steps in a second embodiment of the invention At a first instant, the user is presented with a screen 11, inviting him to specify whether the purchase is to be made by visa, in cash (e.g. transmitted to the website operator by post), or by a phone validation (c-g. according to the present invention).
In step 1, the user specifies that he wants a telephone validation. The screen changes to screen 12. The user is invited to input a user ID, password and telephone number (indicating a telephone account which the user wishes to use for the validation). Entering this data is step 2.
6 All this data is verified (step 3) by accessing a database (e.g. maintained by the telephone operator) which contains the details of the user's name, password and ielephone number- The retailer server then sends (step 4) a signal to an SMS (short message servive) server. The SMS server sends (step 5) a message to the telephone number specified by the user, containing a verification code (this may for example be generated by the retailer server using a random number generator, or generaTed by the SMS server itself and transmitted to the retailer server)- In step 6 the user is presented with screen 13, and asked to enter the validation code. which he can read from the screen of his mobile phone. He doe-q this in step 7In step 8 the retailer server validates the validation code, which it has remembered. It then sends a bill to a billing agent, which may be in any industry with a conventional billing system in place, such as a telecommunications, utilities, banking or finance company. For example. it may be the operator of the mobile phone network.
After the action is processed successfully, the user is sent a conf=ation message (step 9).
Although the invention has been explained above in relation to particular embodiment3, many modifications are possibic within the scope of the invCrition as will be clear to a skilled person. For example, although the invention has been explained above in relation to instructing purchases, it is not limited in this respect. Rather the method may be applied in any situation in which it is wished to verify the identity of a user.
7 Furthermore, although the method has been explained above with reference to a user communicating primarily by internet, the invention is applicable also in the case that the user communicates with the retailer by any other telecommunication network- For example, the user may be using a point of sales terminal, and view any 5 of the screens shown in the embodiments on that terminal.
8
Claims (7)
- ClaimsAn internet-based method for validating a purchase instruction, the method comprising:receiving by internet, from a user, purchase information specifying a purchase, the user vAshes to make; receiving from the user by internet identification information indicating the identity of the user, using the identification information to extract, from a database, contact information for the user over a second telecommunication ne-twork, using the conzact information EO rransmit a validaiion code to the user over the second telecommunications network; receiving a validation code from the user by internet; and verifying that the validation code transmitted to the user corresponds to the validation code received from the user.
- 2- A method according to claim 1 in which the second telecommunications network is a telephone network, such as a mobile phone network.
- 3. A method according to claim 1 or claim 2 in which said validation code is sent as a text message.
- 4. A method according to any preceding claim fluther including debiting a 9 financial account, associated with the user and with the second telecommunication work, in respect of the purchase-
- 5. A server system for operating internet cornmerce, the server having. interface generation means for generating a user interface to receive from a user purchase inflormation specifying a purchase the user wishes to make, and ideniffication infbnnation indicating the identity of the user; purchase satisfaction means for completing the purchase specified by the purchase information; extraction means for extracting from the database, containing contact information for a plurality of users over a second telecommunicaiion network, said contact information for a specific user based on the identification information; and transmission means for transmitting a validation code to the user over the second telecommunications network based on the extracted contact infbrmation; is the interface means being arranged to receive a validation code from the user by internet; and the server system further comprising means for verifying that the validation code transmitted to the user corresponds to the validation code received from the user, and n that case controlling the pwchasosatisfaction means to satisfy the purchase.
- 6. A serversystem according to claim 5 in which the trssion means is arranged to transmit the validation code to the user by instructing a messaging service to transmit to the user, using the extracted contact datA, a text message including the validation code.
- 7. A method of verifying the identity of a user, the method comprising. receiving from the user, via a first telecommunication network, identification inforination indicating the identity of the user, using the identification information to extract from a database, contact information for the user over a second telecormunication network, using the contact infortnaflon to transmit a validation code to the user over the second telecommunication network; receiving a validation code from the user over the first teleconununication nexwork; and verifying that the validation code transmitted to the user corresponds to the validation code received from the user.
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0011673A GB2362489A (en) | 2000-05-15 | 2000-05-15 | Secure communication |
| AU43840/00A AU4384000A (en) | 2000-05-15 | 2000-07-04 | Secure communication |
| CA 2313832 CA2313832A1 (en) | 2000-05-15 | 2000-07-11 | Secure communication |
| CN 00121358 CN1324051A (en) | 2000-05-15 | 2000-07-21 | Safe communication |
| HK00105183A HK1034416A2 (en) | 2000-05-15 | 2000-08-17 | Secure communication |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0011673A GB2362489A (en) | 2000-05-15 | 2000-05-15 | Secure communication |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0011673D0 GB0011673D0 (en) | 2000-07-05 |
| GB2362489A true GB2362489A (en) | 2001-11-21 |
Family
ID=9891614
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0011673A Withdrawn GB2362489A (en) | 2000-05-15 | 2000-05-15 | Secure communication |
Country Status (5)
| Country | Link |
|---|---|
| CN (1) | CN1324051A (en) |
| AU (1) | AU4384000A (en) |
| CA (1) | CA2313832A1 (en) |
| GB (1) | GB2362489A (en) |
| HK (1) | HK1034416A2 (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2003091860A1 (en) * | 2002-04-26 | 2003-11-06 | Andawari Gmbh | Method for authenticating and/or authorising a person |
| WO2006106405A1 (en) * | 2005-04-05 | 2006-10-12 | The Standard Bank Of South Africa Limited | A method of authenticating a user of a network terminal device and a system therefor |
| WO2007006771A1 (en) * | 2005-07-13 | 2007-01-18 | Gemplus | Transaction authorization method and device |
| FR2955682A1 (en) * | 2010-01-28 | 2011-07-29 | Paycool Int Ltd | METHOD FOR PROVIDING A DYNAMIC CODE THROUGH A TELEPHONE |
| US8943548B2 (en) | 2005-12-21 | 2015-01-27 | Vasco Data Security, Inc. | System and method for dynamic multifactor authentication |
| US10440627B2 (en) | 2014-04-17 | 2019-10-08 | Twilio Inc. | System and method for enabling multi-modal communication |
| US10469670B2 (en) | 2012-07-24 | 2019-11-05 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
| US10560495B2 (en) | 2008-04-02 | 2020-02-11 | Twilio Inc. | System and method for processing telephony sessions |
| US10694042B2 (en) | 2008-04-02 | 2020-06-23 | Twilio Inc. | System and method for processing media requests during telephony sessions |
| US12549580B2 (en) | 2023-12-15 | 2026-02-10 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1995019593A1 (en) * | 1994-01-14 | 1995-07-20 | Michael Jeremy Kew | A computer security system |
| EP0844551A2 (en) * | 1996-10-28 | 1998-05-27 | Brian J. Veneklase | Computer security system |
-
2000
- 2000-05-15 GB GB0011673A patent/GB2362489A/en not_active Withdrawn
- 2000-07-04 AU AU43840/00A patent/AU4384000A/en not_active Abandoned
- 2000-07-11 CA CA 2313832 patent/CA2313832A1/en not_active Abandoned
- 2000-07-21 CN CN 00121358 patent/CN1324051A/en active Pending
- 2000-08-17 HK HK00105183A patent/HK1034416A2/en not_active IP Right Cessation
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1995019593A1 (en) * | 1994-01-14 | 1995-07-20 | Michael Jeremy Kew | A computer security system |
| EP0844551A2 (en) * | 1996-10-28 | 1998-05-27 | Brian J. Veneklase | Computer security system |
Cited By (35)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2003091860A1 (en) * | 2002-04-26 | 2003-11-06 | Andawari Gmbh | Method for authenticating and/or authorising a person |
| WO2006106405A1 (en) * | 2005-04-05 | 2006-10-12 | The Standard Bank Of South Africa Limited | A method of authenticating a user of a network terminal device and a system therefor |
| WO2007006771A1 (en) * | 2005-07-13 | 2007-01-18 | Gemplus | Transaction authorization method and device |
| FR2888691A1 (en) * | 2005-07-13 | 2007-01-19 | Gemplus Sa | TRANSACTION AUTHORIZATION METHOD AND DEVICE |
| US8943548B2 (en) | 2005-12-21 | 2015-01-27 | Vasco Data Security, Inc. | System and method for dynamic multifactor authentication |
| US10555169B2 (en) | 2005-12-21 | 2020-02-04 | Onespan North America Inc. | System and method for dynamic multifactor authentication |
| US11706349B2 (en) | 2008-04-02 | 2023-07-18 | Twilio Inc. | System and method for processing telephony sessions |
| US11843722B2 (en) | 2008-04-02 | 2023-12-12 | Twilio Inc. | System and method for processing telephony sessions |
| US12316810B2 (en) | 2008-04-02 | 2025-05-27 | Twilio Inc. | System and method for processing media requests during telephony sessions |
| US12294677B2 (en) | 2008-04-02 | 2025-05-06 | Twilio Inc. | System and method for processing telephony sessions |
| US11856150B2 (en) | 2008-04-02 | 2023-12-26 | Twilio Inc. | System and method for processing telephony sessions |
| US11831810B2 (en) | 2008-04-02 | 2023-11-28 | Twilio Inc. | System and method for processing telephony sessions |
| US10560495B2 (en) | 2008-04-02 | 2020-02-11 | Twilio Inc. | System and method for processing telephony sessions |
| US10694042B2 (en) | 2008-04-02 | 2020-06-23 | Twilio Inc. | System and method for processing media requests during telephony sessions |
| US11765275B2 (en) | 2008-04-02 | 2023-09-19 | Twilio Inc. | System and method for processing telephony sessions |
| US10893078B2 (en) | 2008-04-02 | 2021-01-12 | Twilio Inc. | System and method for processing telephony sessions |
| US10893079B2 (en) | 2008-04-02 | 2021-01-12 | Twilio Inc. | System and method for processing telephony sessions |
| US10986142B2 (en) | 2008-04-02 | 2021-04-20 | Twilio Inc. | System and method for processing telephony sessions |
| US11722602B2 (en) | 2008-04-02 | 2023-08-08 | Twilio Inc. | System and method for processing media requests during telephony sessions |
| US11283843B2 (en) | 2008-04-02 | 2022-03-22 | Twilio Inc. | System and method for processing telephony sessions |
| US11444985B2 (en) | 2008-04-02 | 2022-09-13 | Twilio Inc. | System and method for processing telephony sessions |
| US11575795B2 (en) | 2008-04-02 | 2023-02-07 | Twilio Inc. | System and method for processing telephony sessions |
| US11611663B2 (en) | 2008-04-02 | 2023-03-21 | Twilio Inc. | System and method for processing telephony sessions |
| FR2955682A1 (en) * | 2010-01-28 | 2011-07-29 | Paycool Int Ltd | METHOD FOR PROVIDING A DYNAMIC CODE THROUGH A TELEPHONE |
| WO2011095704A3 (en) * | 2010-01-28 | 2012-11-08 | Paycool International Ltd. | Method for providing a dynamic code via a telephone |
| US9355241B2 (en) | 2010-01-28 | 2016-05-31 | Paycool International Ltd. | Method for providing a dynamic code via a telephone |
| RU2598595C2 (en) * | 2010-01-28 | 2016-09-27 | Пэйкул Интернэшнл Лтд. | Method of providing dynamic code via telephone |
| US11063972B2 (en) | 2012-07-24 | 2021-07-13 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
| US10469670B2 (en) | 2012-07-24 | 2019-11-05 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
| US11882139B2 (en) | 2012-07-24 | 2024-01-23 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
| US11653282B2 (en) | 2014-04-17 | 2023-05-16 | Twilio Inc. | System and method for enabling multi-modal communication |
| US10873892B2 (en) | 2014-04-17 | 2020-12-22 | Twilio Inc. | System and method for enabling multi-modal communication |
| US12213048B2 (en) | 2014-04-17 | 2025-01-28 | Twilio Inc. | System and method for enabling multi-modal communication |
| US10440627B2 (en) | 2014-04-17 | 2019-10-08 | Twilio Inc. | System and method for enabling multi-modal communication |
| US12549580B2 (en) | 2023-12-15 | 2026-02-10 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform |
Also Published As
| Publication number | Publication date |
|---|---|
| AU4384000A (en) | 2001-11-22 |
| CA2313832A1 (en) | 2001-11-15 |
| GB0011673D0 (en) | 2000-07-05 |
| CN1324051A (en) | 2001-11-28 |
| HK1034416A2 (en) | 2001-09-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7275685B2 (en) | Method for electronic payment | |
| JP4334247B2 (en) | Portable terminal device and electronic money server | |
| JP4469121B2 (en) | Payment transaction method and payment transaction system | |
| US7287270B2 (en) | User authentication method in network | |
| US6980970B2 (en) | Secure networked transaction system | |
| US20020143634A1 (en) | Wireless payment system | |
| RU2323477C2 (en) | System and method for purchasing goods and services through access stations for accessing data transmission network using a network of trading terminals | |
| US7392388B2 (en) | Systems and methods for identity verification for secure transactions | |
| US20060224470A1 (en) | Digital mobile telephone transaction and payment system | |
| US20010037264A1 (en) | Payment for network-based commercial transactions using a mobile phone | |
| RU2263347C2 (en) | Method for performing transactions of users of mobile communication devices and computerized cashless transaction system for realization of said method | |
| WO2006135264A1 (en) | Online payment system for merchants | |
| US20030154165A1 (en) | Method and arrangement for the transmission of an electronic sum of money from a credit reserve | |
| US20070094113A1 (en) | Transactional mobile system | |
| WO2003014994A1 (en) | Accounting method by authentication of mobile telecommunication company | |
| CN1476578B (en) | System and method for purchasing goods and services via a financial data network access point | |
| KR20010100380A (en) | Method and apparatus for paying a charge of goods or service using a mobile phone | |
| KR100328576B1 (en) | Method for transferring an account using mobile phone | |
| WO2001041093A1 (en) | A system and method for conducting a financial transaction | |
| GB2362489A (en) | Secure communication | |
| EP3096274A2 (en) | Secure transaction system | |
| US7017804B2 (en) | Method for providing identification data of a banking card to a user | |
| US20020156728A1 (en) | Method and arrangement for the transmission of an electronic sum of money from a credit reserve by wap | |
| EP1906349A1 (en) | Payment and transaction system using digital mobile telephones | |
| WO2001095546A2 (en) | A method for wireless telephony payment and an apparatus therefor |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |