TW200409521A - Authentication and identification system and transactions using such an authentication and identification system - Google Patents
Authentication and identification system and transactions using such an authentication and identification system Download PDFInfo
- Publication number
- TW200409521A TW200409521A TW092113845A TW92113845A TW200409521A TW 200409521 A TW200409521 A TW 200409521A TW 092113845 A TW092113845 A TW 092113845A TW 92113845 A TW92113845 A TW 92113845A TW 200409521 A TW200409521 A TW 200409521A
- Authority
- TW
- Taiwan
- Prior art keywords
- identification
- terminal
- user
- operator
- promoter
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/16—Payments settled via telecommunication systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/29—Payment schemes or models characterised by micropayments
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3229—Use of the SIM of a M-device as secure element
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
200409521 玖、發明說明: I:發明戶斤屬之技術領域3 發明的技術領域 本發明係有關一種鑑定以及識別系統以及利用此種梦定 以及識別系統所進行的交易,更確切來說,本發明係有關 利用行動電話的該種系統以及交易。 I:先前技術3 定義 在本發明_書巾,輸邮電話來進行 话、手機、蜂巢式電話、PDA、記事本 仃動电 膝上型電腦、平板式電腦、以及料”己型電腦、 式的無線裝置。 犯的任何其他可攜200409521 (1) Description of the invention: I: Technical field of the inventor 3 Technical field of the invention The present invention relates to an identification and identification system and transactions using such a dream determination and identification system. More precisely, the present invention The system and transactions related to the use of mobile phones. I: The prior art 3 is defined in the present invention_bookskins, phone calls, cellphones, cellular phones, PDAs, notepads, laptop computers, tablet computers, and laptop computers Wireless device. Any other portable
在本發明的說明書中 列意義: 以下的首字母 $略字將具有下In the description of the present invention, the meanings are as follows: The following initials $ 略 字 will have the following
3G ID PIN P〇S SAM SIM SMS 弟二代無線通訊標準袼式 識別碼 個人識別號 銷售點 安全存取模組 用戶識別模_戶身分模組) 短訊息服務 200409521 STK SIM工具組 TMSI 行動用戶臨時識別碼 USSD 非結構性增添服務資料 術背景 在過去幾年來,已經嘗試過使用許多鐘定以及付款系 統’但到目前為止並沒有全球性的標準。不同系統持續地 出現。目w的平台並未充分地闡述如何產生能致能鑑定以 及不同類型之行動付款方式的一種一致性、方便、快速且 容易使用的使用者介面。 穴夕数目前的解決方案是平台 ……,、/、, 口 ,且分;f里用 方木的銷售商均努力的使其平台能成為國際性的標準。 種平口均具有其本身的哲學思考方式以及進程。因此, 種平口之間的父易流程以及使用者互動均是不同的,卫 同平八台中的交易流程以及使用者互動往往亦會不同。 今曰,有無數的行動電話使用者,他 動電話視為一稽古庙D 士 」八〇|刀郡將3G ID PIN P0S SAM SIM SMS Second-generation wireless communication standard mode identification code Personal identification number Point of sale security access module user identification module _ household identity module) Short message service 200409521 STK SIM tool group TMSI Mobile user temporary Identifier USSD Non-Structured Add-on Information Background In the past few years, attempts have been made to use many clocking and payment systems' but so far there is no global standard. Different systems continue to emerge. The platform of the project does not fully explain how to generate a consistent, convenient, fast, and easy-to-use user interface that enables authentication and different types of mobile payment methods. Anxie's current solution is the platform …… ,,,,, and 分, and the distributors; the sellers of square timber have worked hard to make their platform an international standard. Each kind of flat mouth has its own philosophical thinking mode and process. Therefore, the parent-to-child flow and user interaction are different between these types of mouths, and the transaction flow and user interaction in Weitong Pingtai are often different. Today, there are countless mobile phone users, and his mobile phone is regarded as a prince of an ancient temple.
類生活的-部八,行的配備。行動電話已經成為 、 刀,且大部分的時間中,行動電每部/在 的身邊。行動電与^ ϋ Ρ在我 w為與化用程度相關的個 ,如果方便且容易使用的H 又嶋置 可以制的話或者如^其他的方. 人细將開始使用行動電話 道:卡:· 相當危險的。行動電話將===:價職心 、 種南級的保Class of life-ministry, line of equipment. Mobile phones have become a knife, and most of the time, mobile phones are at / beside each other. The mobile phone and ^ 在 P are related to the degree of utilization, if the convenient and easy to use H and the system can be made or if ^ other parties. People will start to use the mobile phone channel: card: · Quite dangerous. The mobile phone will be ===
66
蠖方式,而如果遺失的話,僅會損失該A 值以及任何預付價值,相關的帳戶订動I置的市場價 保護。 〃。用卡號碼仍可受到 因此,本發明的主要目的是提供— 统,其中將在-個不_電信頻道H軸定以及識別系 的資料,以使第三者攻擊動作有關使用者身分 進行可能發生的賴行為。’、’"#充分的有用資訊來 本發明的另一種目的在於具有一 統,藉此可針對各個鏗定程序而種以及識別系 石馬。 種鐘定以及識別 本發明的另一個目的是使用行 以及識«統。 了 I錢提供該種鑑定 本二明的最終目的在於提供使用該_定以及識別系 、·先的父易系統。 【發明内容】 發明的概要說明 根據本發明的上述以及其他目的,本發明將提供一泡 用以鑑定以及識別使用者的方法,藉此可以使: ⑻弟-終端機將在第—電信頻道與—促進者進行靖 訊;以及 (b)乐二終端機將在第二電信頻道與—操作者進行過 訊,該操作者與該促進者係能夠彼此通訊,其中 (C)並不需要由該操作者、促進者、或該第二終端機 對該第一終端機提供該使用者的身分資料; ⑹並不需要由該操作者、促進者、或該第一終端機 對該第二終端機提供該第—終端機的身分資料; 且其中 ' ⑹該第-終端機與該促進者之間的任何通訊並不需 要包含有關該使用者或該第二終端機之身分細節的 資料;以及 ⑴該第二終端機與該操作者之間的任何通訊並不需 要包含有關該第-終端機之身分細節的資料。 、本發明亦將提供-種用以鑑定以及識別使用者的方法 以令-促進者能在第-電信頻道上對第—終端機提供— 項鑑定以及識別訊息,藉此 ⑻-使用者的終端機將能夠在第二電信頻道上與一操 作者進行通訊,而該_者_促進者係能夠彼此 通訊, 其中 (b)亚不需要*該操作者、促進者、或該第二終端機對 該第一終端機提供該使用者的身分資料; ⑹並不需要由該操作者、促進者、或該第—終端機對 該第二終端機提供該第一終端機的身分資料; 且其中 200409521 ⑹該第-終端機與該促進者之_任何通訊並不需要 包含有關該使用者或該第二終端機之身分細節的資 料;以及 ⑹該第二終端機與該操作者之間的任何通訊並不需要 包含有關該第-終端機之身分細節的資料。Method, and if lost, only the value of A and any prepaid value will be lost, and the relevant account will be set to protect the market price. Alas. The card number can still be affected. Therefore, the main object of the present invention is to provide a system in which information on the H-axis of the telecommunication channel and identification system are determined so that a third party attack action may occur regarding the identity of the user. Lai behavior. ’,’ &Quot;# Sufficient useful information is provided. Another object of the present invention is to have uniformity, whereby the individual horses can be seeded and identified for each predetermined procedure. Kindling and Recognition Another object of the present invention is to use lines and recognize the system. In order to provide this kind of identification, the ultimate purpose of Ben Erming is to provide a parent-easy system that uses this identification and identification system. [Summary of the Invention] Summary of the Invention According to the above and other objects of the present invention, the present invention will provide a method for identifying and identifying a user, thereby enabling: a younger brother-terminal to be in the first telecommunication channel and — The promoter promotes Jingxun; and (b) the Le Er terminal will communicate with — the operator on the second telecommunication channel, the operator and the promoter can communicate with each other, of which (C) does not need The operator, facilitator, or the second terminal provides the identity information of the user to the first terminal; 不需要 The operator, facilitator, or the first terminal does not need to provide the second terminal to the second terminal Provide the identity information of the first terminal; and any communication between the first terminal and the promoter does not need to include information about the identity of the user or the second terminal; and Any communication between the second terminal and the operator need not include information about the identity of the first terminal. The present invention will also provide a method for identifying and identifying a user so that the promoter can provide the first terminal with an authentication and identification message on the first telecommunication channel, thereby making the user ’s terminal Machine will be able to communicate with an operator on the second telecommunication channel, and the _promoter_facilitator is able to communicate with each other, where (b) Asia does not need * the operator, facilitator, or the second terminal pair The first terminal provides the identity information of the user; 不需要 It is not necessary for the operator, the promoter, or the first terminal to provide the second terminal with the identity information of the first terminal; and 200409521任何 Any communication between the second terminal and the promoter does not need to include information about the identity of the user or the second terminal; and ⑹ any communication between the second terminal and the operator It is not necessary to include details about the identity of the first terminal.
該使用者並不需要對該第一終端機提供任何身分資訊 或資料,也不必對該第-終端機的任何操作者提供。如果 由該使用者或該第二終端機對該第_終端機或該第一終 端機的—操作者提供有_使用者的身分資料或資訊的 居W土地疋4種貝訊或貢料並無法被輸入到該第一終端 機中’且無法由該第-終端機傳送到該促進者。 足進者將產生_項促進者的訊息,其有關欲用於單 4a疋私序的_個僅能單次使㈣鑑定以及制符號;該 斤進者將仙㈣—電信頻道傳送包含該鑑定以及識別 符號的該項促進者訊息到該第_終端機。The user does not need to provide any identity information or information to the first terminal, nor does it need to provide any operator of the first terminal. If the user or the second terminal provides information on the identity of the user to the _ terminal or the first terminal, the operator shall provide 4 types of information or tribute to the residence. Cannot be entered into the first terminal 'and cannot be transmitted from the first terminal to the promoter. The enthusiast will generate a message of _promoter, which is about _ identification and symbol that can only be used for a single 4a private sequence. The jinjin will include the Xian-Telecom channel transmission to include the identification. And the promoter's message of the identification symbol to the _th terminal.
ϋ亥第終^而機將接收來自該促進者而包含該 及識別付號的该促進者訊息,卩使該鑑定以及識別 竹號=被傳适讀人到該第二終端機中,該第二終端機將 在/第4頻運上傳送該鐘定以及識別符號到該操作 者。 」木作者可接收來自該第二終端機的該鑑定以及識別 該較以及識別符號Μ已經加人了該使用者的至 戠I田即’且雜作者將對該促進者傳送該鑑定以及 識別符號从鼓时岐少-制細節。 9 200409521 較佳地’該促進者將接收來自該操作者的該鑑定以及 識別符號以及該使用者的至少—識別細節、使用該鐘定以 及制符號來檢索該項訊息、針對所接收到的該鑑定以及 識別符號來檢查該訊息中的該鐘定以及識別符號,且在進 行-項成功的匹配動作之後,該促進者將對該第一終端機 提供-項包含該使用者之鑑定的鐘定訊息,而該鑑定訊息 係在該第一電信頻道上傳送。 該鑑定以及識別可能為一交易系統的部份,該交易系 統為以下項目中的一項或數項:一金融交易、一付款交 · 易、一佇列交易、一服務供應者的登入與登出動作、做出 一項預約或預定、由一服務供應者安排一項服務、由一服 務供應者中斷一項服務、以及登入到一應用程式或網際網 路。 該第一終端機可為一零售商的一終端機,較佳地為一 銷售點終端機,且該第二終端機可為該使用者的一行動電 話。該使用者的至少一識別細節包含從該行動電話之SIM 卡取得的至少一資訊項目及/或從該行動電話取得的至少 鲁 一項目。任擇地或此外地,它可由該操作者加入到其中或 者在該操作者處加入。 該鑑定以及識別符號可由該使用者傳送到該第二終端 機,而該使用者係正觀看該第一終端機上及/或與其相連之 任何顯示器上的鑑定以及識別符號,並且正將該鑑定以及 識別符號輸入到該第二終端機中;可在該第一終端機上印 出且將該鑑定以及識別符號的一份列印版本傳送給該使 10 200409521 用者以輸入到該第二終端機;可利用無線傳輪方式從該第 一終端機傳送到該第二終端機;或者可利用語音啟動方式 將該鑑定以及識別符號輸入到該第二終端機中。與1第一 終端機相連的^顯示器包括:如與-P〇s終端機:的 -現金櫃台或結帳付款台、收費站或停車場出口%款亭的 一顯示器等等。 當傳送該鑑定以及識別符號到該操作者時,亦可傳送 一 PIN。在該鑑定以及識別符號之前,可立即地傳送出= PIN,且在輸入或傳送該鑑定以及識別符號之前,該操作 者可先批准該PIN。 _定以及識別符號包含多個字元,且各個該等多個 字元可選自於下列項目:-數字、—字母、__符號、 一標點符號、一發音音調、以及一 ASCII字元。 該促進者與該操作者可為相同或不同的實體。該促進 者可為-金融機構的-部分,且該操作者可利⑽金融機 構的名義來提供多種金融服務。 在該使用者傳送該鐘定以及識別符號到該操作者時, 孩操作者可對该使用者提供一項確認訊息。 在另種形式中,本發明將提供一種用以鑑定以及識 別一位使用者的方法,藉此 ⑷第-終端機將在第一電信頻道與一促進者進行通 訊;以及 (b)弟二者的第二終端機將在第二電信頻道與一操作 者進行通訊,該操作者與該促進者係能夠彼此通訊; 11 200409521 其中為了回應於來自該第一終端機的一項請求: (c) 該促進者將產生一項訊息,其包含欲用於單一鏗 定程序的一個僅能單次使用的鑑定以及識別符號; (d) 该促進者將利用該第一電信頻道傳送包含該鑑定 以及識別符號的該項訊息到該第一終端機; (e) 該第一終端機將接收來自該促進者的該訊息,其 包含該鑑定以及識別符號; (f) 該鑑定以及識別符號將被傳送且輸入到該第二終 端機中; (g) 該第二終端機將在該第二電信頻道上傳送該鑑定 以及識別符號到該操作者; (h) 該彳呆作者將接收來自該第二終端機的該鑑定以及 識別符號,而該鑑定以及識別符號中係已經加入了 該使用者的至少一識別細節; ⑴該操作者將對該促進者傳送該鑑定以及識別符號 以及該使用者的至少一識別細節; (j) 該促進者將接收來自該操作者的該鑑定以及識別 符號以及該使用者的至少一識別細節,且使用該鑑 定以及識別符號來檢索該訊息; (k) 該促進者將針對於步驟(⑴中所接收到的該鑑定以 及識別符號來檢查該訊息中的該鑑定以及識別符 號;以及 ⑴在進行步驟⑴中的一項成功的匹配動作之後,該 促進者將對該第一終端機提供一項包含該使用者之 12 200409521 鑑疋的-項鑑定訊息,而_定訊息係在該第_電 信頻道上傳送。 本發明亦將提供-種用以鑑定以及識別一使用者的方 法,藉此第-終端機將能夠在第_電信頻道上與—促進者 通訊,且第二終端機將能在第二電信頻道上與—操作者通 訊,該操作者與該促進者絲夠彼此通訊;其中該第一終 端機將在該第-電賴道场送_項請求給驗進者,且 接收來自该促進者之由該促進者產生且包含欲用於單一 鑑定程序之一個僅能單次使用的鑑定以及識別符的一促 進者訊息;該第一終端機將傳送該鑑定以及識別符號到該 第二終端機以使: (a) 該第二終端機能在該第二電信頻道上傳送該鑑定 以及識別符號到該操作者; (b) 遠操作者能接收來自該第二終端機的該鑑定以及 識別符號’該鑑定以及識別符號中係已經加入了該 使用者的至少一識別細節; (c) 該操作者能對該促進者傳送該鑑定以及識別符號 以及該使用者的至少一識別細節; (d) 該促進者將接收來自該操作者的該鑑定以及識別 符號以及該使用者的至少一識別細節且使用該鑑定 以及識別符號來檢索該項訊息; (e) 該促進者能針對於步驟(d)中所接收到的該鑑定以 及識別符號來檢查該訊息中的該鑑定以及識別符 號;以及 13 200409521 ()在進行步驟(e)中的一項成功匹配動作之後,該促 進者能將對該第一終端機提供一項包含該使用者之 鑑定的一項鑑定訊息,而該鑑定訊息係在該第一電 ^頻道上傳送。 第、、’ς έ而機可為該使用者的一行動電話,且該第一 終^機可騎售商的終端機,較佳地為-齡點終端機。In the end, the machine will receive the promoter's message containing the identification number from the promoter, and make the identification and identification number = the appropriate reader is passed to the second terminal. The two terminals will transmit the clock and identification symbol to the operator on the 4th frequency. The author can receive the identification from the second terminal and identify the comparison and identification symbol M, which has been added to the user, and the miscellaneous author will transmit the identification and identification symbol to the promoter. From the drum when Qi Shao-make details. 9 200409521 Preferably 'the facilitator will receive the identification and identification symbol from the operator and at least-identification details of the user, use the clock and system symbol to retrieve the message, and for the received Authentication and identification symbols to check the clock and identification symbols in the message, and after performing a successful matching action, the promoter will provide the first terminal with a clock containing the user's identification Message, and the authentication message is transmitted on the first telecommunication channel. The identification and identification may be part of a transaction system, which is one or more of the following: a financial transaction, a payment transaction, a queue transaction, a service provider's login and registration Take action, make an appointment or reservation, arrange a service by a service provider, interrupt a service by a service provider, and log in to an application or the Internet. The first terminal may be a terminal of a retailer, preferably a point of sale terminal, and the second terminal may be a mobile phone of the user. The at least one identification detail of the user includes at least one information item obtained from the SIM card of the mobile phone and / or at least one item obtained from the mobile phone. Alternatively or in addition, it may be added to or by the operator. The identification and identification symbol can be transmitted by the user to the second terminal, and the user is watching the identification and identification symbol on the first terminal and / or any display connected to the identification terminal, and the identification is being identified. And the identification symbol is input to the second terminal; a printed version of the identification and identification symbol may be printed on the first terminal and transmitted to the user 10 200409521 for input to the second terminal The wireless terminal may be used to transmit from the first terminal to the second terminal; or the authentication and identification symbols may be input to the second terminal by using a voice activation method. The display connected to the first terminal includes: a display such as a-cash counter or checkout payment counter, a toll booth or a display at a parking lot outlet. When transmitting the identification and identification code to the operator, a PIN can also be transmitted. = PIN can be transmitted immediately before the identification and identification symbol, and the operator can approve the PIN before entering or transmitting the identification and identification symbol. The _ and identification symbols include multiple characters, and each of the multiple characters can be selected from the following:-number,-letter, __ symbol, a punctuation mark, a pronunciation tone, and an ASCII character. The facilitator and the operator may be the same or different entities. The facilitator can be a part of a financial institution, and the operator can provide a variety of financial services in the name of the financial institution. When the user transmits the clock and identification symbol to the operator, the operator may provide a confirmation message to the user. In another form, the present invention will provide a method for identifying and identifying a user, whereby the first terminal will communicate with a promoter on the first telecommunication channel; and (b) both The second terminal will communicate with an operator on the second telecommunication channel, and the operator and the promoter can communicate with each other; 11 200409521 Among them, in response to a request from the first terminal: (c) The facilitator will generate a message containing a single-use identification and identification symbol intended for use in a single program; (d) the facilitator will use the first telecommunications channel to transmit the identification and identification The message of the symbol to the first terminal; (e) the first terminal will receive the message from the promoter, which contains the identification and identification symbol; (f) the identification and identification symbol will be transmitted and Input to the second terminal; (g) the second terminal will transmit the identification and identification symbol to the operator on the second telecommunication channel; (h) the dull author will receive from the second terminal machine The identification and identification symbol, and at least one identification detail of the user has been added to the identification and identification symbol; ⑴ the operator will transmit the identification and identification symbol and at least one identification of the user to the promoter; Details; (j) the facilitator will receive the identification and identification symbol from the operator and at least one identification detail of the user, and use the identification and identification symbol to retrieve the message; (k) the facilitator will After the identification and identification symbol received in step (⑴) to check the identification and identification symbol in the message; and ⑴ after performing a successful matching action in step ,, the facilitator will The terminal provides an item of authentication information including the 12200409521 authentication of the user, and the message is transmitted on the telecommunication channel. The present invention will also provide a method for identifying and identifying a user. Method whereby the first terminal will be able to communicate with the promoter on the first telecommunication channel and the second terminal will be able to operate with the second telecommunication channel Communication, the operator and the facilitator can communicate with each other; wherein the first terminal will send an item request to the inspector at the No. 1 electric railway dojo, and receive from the facilitator generated by the facilitator and A facilitator message containing a single-use authentication and identifier intended for use in a single authentication procedure; the first terminal will transmit the authentication and identification symbol to the second terminal such that: (a) the The second terminal can transmit the identification and identification symbol to the operator on the second telecommunication channel; (b) the remote operator can receive the identification and identification symbol from the second terminal; At least one identification detail of the user has been added; (c) The operator can transmit the identification and identification symbol and at least one identification detail of the user to the promoter; (d) The promoter will receive from the operation The identification and identification symbol of the person and at least one identification detail of the user and use the identification and identification symbol to retrieve the message; (e) the facilitator can target at step (d) The received identification and identification symbol to check the identification and identification symbol in the message; and 13 200409521 () After performing a successful matching action in step (e), the facilitator can update the first terminal The machine provides an authentication message including an identification of the user, and the authentication message is transmitted on the first radio channel. The first and the second machine can be a mobile phone of the user, and the first terminal can ride a vendor's terminal, preferably an age point terminal.
从^㈣第二電錢道上進行的任何傳輸動作係使用 具有信,發送功能的—種電㈣統,例如gsm系統。 、彔;的形式中,本發明將提供一種傳送且使用pin 、法其將在傳送使用者ID之前,傳送該P|N到一操 ^者料作者將先參照該_來進行搜尋以提供有限數 、可此丨生,该彳呆作者隨後將參照該使用者ID來搜尋有 限數量的可能性。 、 安本發θ㈣提供—種支援不同付款模式的付款解決方 木,该等模式可為面對面式的、遠程式、郵 話訂購式。 宅Any transmission action from the second electronic money channel uses a type of electronic system with a function of sending and receiving, such as a gsm system. In the form of, the present invention will provide a transmission and use pin, which will transmit the P | N to an operator before transmitting the user ID. The author will first search by referring to the _ to provide limited As long as this number is available, the dull author will then search the user ID for a limited number of possibilities. Aberdeen provides a payment solution that supports different payment models. These models can be face-to-face, remote, and postal. House
^ 1 rh人衣罝不级能多種不同 應用以’以進行零㈣買、遠程付款、以及帳戶之| ^兒騎。I^地,它將可彻槓桿原理來操控〖 、’*鍵⑦、避免再度投資技術性的^備、提供$ 以,理所牽涉當事人的不同需求,且利用槓桿原理和 現子網路特徵以及其他標準gsm魏。它將較佳也 :有的現存手機與,卡來運作,而不需要進行修正! 】4 4 倾情境包括遠程付款、公車車費、停車f、郵賭、 ^ 4購付款、以及人對人的付款方式。 _ y/系:4中所牽涉到的當事人包括—行動電話使用者、 、丁動作者、-零售商一金融機構缝彳目金融機構、 以及一付款促進者。 標準化的付款程序較佳地將能保護企業邏輯、付款程 序乂及安王性’且因此使此種技術能更顯而易見。後端應 用將可根據使用者預定的所欲付款與帳戶_來執行: 要的交易。 圖式的簡要說明 為了能較容易的了解本發明且將其付諸實現,將對照 不具限制性之本翻錄實闕來進行制,本發明卿 將對照以下的圖式來進行說明,其中: 上。:、$行動付款糸統中之受#賴關係的概念方 塊圖; 弟囷將展示出具有該系統之相關介面的整體架構; 鲁 第3圖為根據本發明第一形式之一種行動付款情境之 受信賴關係的概念方塊圖; 第4圖為根據本發明第二形式之一種行動付款情境之 受信賴關係的概念方塊圖; 第5圖為可與本發明一同使用之各種不同形式終端機 的透視圖, 第6圖為本發明之—形式的程序步驟; 15 200409521 第7圖為本發明之第一實施例的程序步驟; 第8圖為本發明之第二實施例的程序步驟; 第9圖為本發明之第三實施例的程序步驟; 第10圖為本發明之第四實施例的程序步驟; 第11圖為本發明之付款程序的程序步驟; 第12圖為本發明之付款流程的程序步驟; 第13圖為本發明之第二形式的程序步驟; 第14圖將展示出加密位準;^ 1 rh can be used in a variety of different applications to make purchases, remote payments, and accounts | ^ 儿 骑. I ^, it will be able to use the principle of leverage to control 〖, '* key⑦, avoid re-investing in technical equipment, provide $ to justify the different needs of the parties involved, and use the principle of leverage and the characteristics of existing subnets And other standard gsm wei. It will be better and better: some existing mobile phones and cards work without modification!] 4 4 scenarios include remote payment, bus fare, parking f, gambling, ^ 4 purchase payment, and person-to-person Payment method. _ y / Department: The parties involved in 4 include—mobile phone users, mobile phone operators, —retailers, financial institutions, financial institutions, and payment promoters. Standardized payment procedures will preferably protect business logic, payment procedures and security ”and therefore make such technology more visible. The back-end application will be able to execute according to the user's desired payment and account_: the desired transaction. Brief description of the drawings In order to make it easier to understand the present invention and put it into practice, it will be made by ripping actual books without limitation. The present invention will be described with reference to the following drawings, where: . : The concept block diagram of the #lai relationship in the mobile payment system; the brother will show the overall structure of the relevant interface of the system; Figure 3 shows a mobile payment scenario according to the first form of the present invention. Conceptual block diagram of a trusted relationship; Figure 4 is a conceptual block diagram of a trusted relationship in a mobile payment scenario according to the second form of the present invention; and Figure 5 is a perspective of various forms of terminals that can be used with the present invention FIG. 6 is the program steps of the form of the invention; 15 200409521 FIG. 7 is the program steps of the first embodiment of the invention; FIG. 8 is the program steps of the second embodiment of the invention; FIG. 9 The program steps of the third embodiment of the present invention; FIG. 10 shows the program steps of the fourth embodiment of the present invention; FIG. 11 shows the program steps of the payment process of the present invention; and FIG. 12 shows the payment process of the present invention. Program steps; Figure 13 shows the program steps of the second form of the invention; Figure 14 shows the encryption level;
第15圖將展示出呼叫路徑;以及 第16圖將展示出可使用本發明的某些行動網路。 【實施方式】 較佳實施例的|^細說明Figure 15 will show the call path; and Figure 16 will show some mobile networks where the present invention can be used. [Embodiment] | ^ Detailed description of the preferred embodiment
本發明為-缝定以及識m它可針對多種目 而使用,其包括但不限於毅以及識別—位使用者;並 可用於多種不同的交易卜例如m統、—金融^ 系統、-付款系統,並且以及登人包括用於網際網= 用程式的純。針對上述純來說,該鑑定以及識別系 的運作實質上是相同的。將於以下說明多賴等交易^ =作為魏實例。但本翻並秘於所述的 首先請參照第1圖,目前全球有超過十億個行動電話 用戶。已經發出的SIM卡總數已經翻針億張。不同 用^的擁護者已經建立了彼此的信_係。對了進行行動 付款的目的,多種關係性均是相關的,例如: 仃力 16 行動電話操作者與其用戶; 信用金融機構與其零售商; 金融機構與其金融機構帳戶持有人;以及 信用卡公司與其金融機構。 —相0地’僅進德定服務的話,該等相關的關係性包 括订動兒5物作者與其用戶,以及需要與其顧客進行鑑定 動作的服務提供者。 ㈣L賴中’某些受信賴相關功能將對其它實體 _ 分配以提供整體服務。由服務提供者進行顧客鑑定而已經 =動操作者訂翁動電話服務的委任工作將形成用以 们刀別且不同電信頻道上的通訊。針對使用本發曰月 之鑑定以及識別方法的交易來說,委任信賴包括鑑定以及 識別的配對,从將:轉齡成二個不_舰。 _ 第1圖為種仃動付款情境的概念性方塊圖。不規則 形狀將代表目前的狀況一不明確且不整齊的介面一有 許多種變化方•及_情況。 · 、☆雖Μ等關係具有不同的安全位準,使用者目前都接 受所有位準,除了一種之外,其為操作者與其使用者之間 勺關h、α為並不祕進行付款。這不論贼的行動電 =系統為何’例如具有較高安全位準的GSM。GSM的高 安全位準主要係歸因於使用智慧卡的關係,在此實例中為 SIM 卡。 將穩固地建立顯示在第1圖中的受信賴關係-對其進 17 200409521 行改變將是不切實際且相當昂貴的。 現在請參看第2圖,其中將根據本發明展示出一系統 的一較佳實施例。付款促進者附近的虛線係表示—項功 能,其可為獨立式的、或者可合併於該操作者中、或者在 該金融機構中。 考量到目前盛行的威脅環境以及管理要件時,將可杏 行不同的安全位準,可以僅選擇鑑定以及識別符號,或= 選擇具有PIN的鑑定以及識別符號。The present invention is for sewing and identification. It can be used for various purposes, including but not limited to identification and identification of users. It can also be used for a variety of different transactions, such as financial systems, financial systems, and payment systems. , And as well as registrants include pure for Internet = apps. For the above pure, the operation of the identification and identification system is essentially the same. The Dorai et al. Transaction will be explained below as a Wei example. But this translation is not secret. Please refer to Figure 1. First, there are more than one billion mobile phone users worldwide. The total number of SIM cards issued has reached 100 million. Proponents of different uses have established mutual trust. For the purpose of making mobile payments, multiple relationships are relevant, such as: Lili 16 mobile phone operators and their users; credit financial institutions and their retailers; financial institutions and their financial institution account holders; and credit card companies and their finance mechanism. —Phase 0 place 'If only the service of Deding is entered, these related relationships include the authors of the subscriptions and their users, and the service providers who need to perform authentication with their customers. ㈣L 赖 中 ’Certain trusted related functions will be allocated to other entities to provide overall services. The service provider conducts customer identification and the commissioning of the operator's subscription to the mobile phone service will form communications for different and different telecommunication channels. For transactions using the method of identification and identification of the present month, the trust of trust includes identification and identification of the pairing, from: turning age into two non-ships. _ Figure 1 is a conceptual block diagram of an automatic payment scenario. The irregular shape will represent the current situation-an unclear and untidy interface-there are many variations and situations. ·, ☆ Although M and other relationships have different security levels, users currently accept all levels, except for one, which is a secret payment between the operator and its user. This is regardless of the action of the thief = the system ', such as GSM with a higher security level. The high security level of GSM is mainly due to the use of smart cards, in this case the SIM card. It will be solid to build the trusted relationship shown in Figure 1-making changes to it 200409521 would be impractical and quite expensive. Referring now to Figure 2, a preferred embodiment of a system will be shown in accordance with the present invention. The dotted line near the payment facilitator indicates a function that can be stand-alone, or can be incorporated into the operator, or in the financial institution. Taking into account the prevailing threat environment and management requirements, different security levels will be available. You can choose only the identification and identification symbol, or = select the identification and identification symbol with a PIN.
本發明將提供合作式的關係性模型,其將允許個㈣ 事人能“傳遞(pass on)’’信賴_即對其他當事人委任俨 賴。此動作將稱為“委任信賴(De丨egated Trust),,。委任作賴 如第3圖所示,該操作者與該金融機構具有是受作賴 關係性。誠用者與該操作者具有另—種受信賴關雜。、 該使用者將給T該行動操作者―項觀以代表使用 與該金融機構執行交易。 來The present invention will provide a cooperative relational model that will allow individuals to “pass on” trust—that is, appoint reliance on other parties. This action will be referred to as “Deegated Trust” ) ,,. Appointment of Reliance As shown in Figure 3, the operator has a reliance relationship with the financial institution. The honest user and the operator have another kind of trust. The user will give the mobile operator-Xiang Guan to execute transactions with the financial institution on behalf of the user. Come
用於進行行動付款的帳戶可為以下任一種帳戶類型: 與該行崎作者或-金融機構建立的預舰戶;與該行 操作者建立的已付帳戶;金融機構帳戶;或者信用卡帳 =。 金融交易係受限於國家的金融管理機構,而如果= f須要具有—份許可核得到鱗轉持1付帳= 話,便將仰賴個別的規則而定。 、 如第4圖所示, 之間的一種合作關係 本發明將❹f靖作者與—金融機構 ,該金融機構具備必要的許可證明。 】8 4 稱為委任金频構财化 化,—位㈣操作者將A 錢構制度 來提供有使用—金融機構作為受信賴合夥人 f有限關的絲機構财化服務。 構麵會可崎行崎⑽提供冊金融機 人^的主要當事 。乂孟融機構可僅保有 不需要制者的詳細資訊。U方面,且較佳地並 如此—來,該操作者可藉著簡單地建立The account used for mobile payments can be any of the following account types: a preship established with the bank's author or-financial institution; a paid account established with the bank's operator; a financial institution account; or a credit card account =. Financial transactions are limited by the country's financial management institutions, and if = f is required to have-a permit to obtain scale transfer to hold 1 account =, it will depend on individual rules. As shown in Figure 4, a cooperative relationship between the present invention and the financial institution, the financial institution has the necessary license certificate. ] 8 4 is called the commissioned financial structure financialization, where the operator will use the A money structure system to provide useful-financial institutions as a trusted partner f limited financial institutions financial services. The face-to-face meeting can be a rugged provider of bookkeepers ^.乂 Meng Rong institutions can only keep detailed information of those who do not need it. U side, and preferably and so-then, the operator can simply build
及=觸導麵缝戶的維持以 二力::Γ地係由金融機構來管理,且由該操作者提 t、之用戶貢料所支援。And = The maintenance of the seam households on the contact surface is based on the second force :: Γ land is managed by financial institutions, and is supported by user information provided by the operator.
在請參照第5圖’本發明可在零售商處使用不同前 :,例如具有_的P0S終端機1Q。利用此種終端 社、將了對•售商核發—磁條卡12’ a該磁條卡係相聯 :於支援信用/簽帳卡公司建立的一特別帳戶,以使該終端 “、可以撥打支援卡片公司的一現存電話號碼;具有軟體修 正的固網POS終端機14 ;無線p〇s終端機16 _連接有 GSM W18。將觸零f魅發該磁條卡彳2,且係相連 於特別針對該項服務所建立的新帳戶。該終端機Μ將可 撥打新的電話號碼給該付款促進者。依據該p〇S终端機, 將可能可咖««的磁條卡12置換為該終端機之鍵 盤上的熱鍵(未顯示)。可對該零售商核發_個具有定製化 軟體的新式行動式P0S終端機16,進而允許直接撥打電 ]9 話給該付款促進者;或著GSM電話2Q —利用零售商STK SIM卡,可使用GSM電話作為專用的⑽終端機設備。 可對該零售商核發-特別編程的STKS|M卡。 二根據本發明,均可對《售商與該使用者雙方提供-種則後-致的行動付款經驗,不管所執行的付款 類型為 何:可使用-標準行動電話來作為付款裝置。針對面對面 付认來况,打動電話可與一 p〇s終端機、ATM、販售機 或另一種介面—同使用。從使用者的觀點來看,各項交易 包含相似於撥打出—通電話或傳送—訊息的_種標準程 序,但包括輸入該鑑定以及識別符號,而如果適當的話, 包括輸入PIN。在從該使用者的行動電話傳送該鑑定以及 識別符號_操作者的過程巾,該程序將利雜打一通電 話或傳运一訊息的方式。當該操作者接收到該通電話或 USSD(電信系統中的信號發出系統將負責此動作)時,所撥 打的電話將被摘取出來且由該操作者用來開始該鑑定以 及識別程序。具有SMS的此程序是不同的。首先,該操 作者將以相同於語音電話或交換機中之USSD(此時,該操 作者已經知道是誰傳送出該SMS且該使用者所要求的是 SMS)的方式來接收SMS。該操作者隨後將摘取出指定的 SMSC號碼(預設且儲存在SIM中或者該使用者的行動電 話中,且嵌入到每個已傳送的SMS),且將此SMS(訊息) 轉送到適當的SMSC。該SMSC將傳送該SMS到指定的 目標號碼。SMS並不是把資料從該使用者傳送到該操作者 的一種較佳形式,因為SMS固有地包含有關該訊息之來 200409521 、水1目的地的貝料,且包含訊息路徑中的一⑽$路由器。 第6圖將展示出用以在一項金融交易程序中進行^ 以及識別的程歸驟。鮮步驟㈣來說 = 圖表1中。 不在 圖表1 用者 ** ——__ 4 ·該鑑定以及識別符號將被 輸入到該使用者的行動電話 中且傳送到該操作者以便鑑 定且識別一項採購動作; 5·如果需要的話,該使用者 隨後將輸入一 PIN。 零售商 1. 零售商將刷入一磁條卡或 者利用POS中的—熱鍵來 開始進行付款,並且輪入金 額; 2. 零售商接收來自該促進者 的一鑑定以及識別符號; 3·零售商將該鑑定以及識別 隻送給該顧客。Before referring to FIG. 5 ', the present invention can be used differently at a retailer: for example, a POS terminal 1Q with _. Using this kind of terminal agency, the issuer issued the magnetic stripe card 12 'a. This magnetic stripe card is linked: a special account established by the supporting credit / debit card company, so that the terminal "can call Supports an existing phone number of the card company; fixed network POS terminal 14 with software correction; wireless p0s terminal 16 _ connected to GSM W18. The magnetic stripe card 彳 2 will be sent to zero and will be connected to A new account created specifically for this service. The terminal M will be able to dial a new phone number to the payment promoter. According to the poS terminal, the magnetic stripe card 12 of the possible cocoa «« will be replaced with the A hot key (not shown) on the keyboard of the terminal. The retailer can be issued a new mobile POS terminal 16 with customized software to allow direct calls] 9 calls to the payment promoter; or GSM phone 2Q —Using the retailer STK SIM card, a GSM phone can be used as a dedicated terminal device. The retailer can be issued a specially programmed STKS | M card. 2. According to the present invention, both Provide the mobile payment with the user-after the kind No matter what type of payment is performed: a standard mobile phone can be used as a payment device. For face-to-face payment recognition, the mobile phone can be used with a POS terminal, ATM, vending machine or another interface-the same Use. From the user's point of view, each transaction contains a standard procedure similar to dialing-out a phone call or sending a message, but includes entering the identification and identification symbol, and if appropriate, including entering a PIN. The identification and identification symbol_operator's process towel is transmitted from the user's mobile phone. The program will facilitate the way of making a phone call or transmitting a message. When the operator receives the phone call or USSD (telecommunications system) The signalling system in the system will be responsible for this action), the dialed number will be taken out and used by the operator to start the identification and identification procedure. This procedure with SMS is different. First, the operator will Access in the same way as USSD in a voice phone or switch (at this time, the operator already knows who sent the SMS and the user requested an SMS) Receive the SMS. The operator will then pick up the designated SMSC number (default and stored in the SIM or the user's mobile phone and embedded in each transmitted SMS), and send the SMS (message) Forward to the appropriate SMSC. The SMSC will send the SMS to the designated destination number. SMS is not a better form of transmitting data from the user to the operator, because SMS inherently contains information about the origin of the message 200409521, The destination of water 1 contains shell material and a router in the message path. Figure 6 will show the steps used to identify and identify in a financial transaction process. Fresh steps = speaking = chart 1. Not in chart 1 User ** —— __ 4 The identification and identification symbol will be entered into the user's mobile phone and transmitted to the operator for identification and identification of a purchase action; 5. If required If so, the user will then enter a PIN. Retailer 1. The retailer will swipe a magnetic stripe card or use the hot key in the POS to start the payment and rotate the amount; 2. The retailer receives an identification and identification symbol from the promoter; 3. Retail The merchant sends the identification and identification to the customer only.
針對其他形式的交易來說,程序的初始化動作可能是 不同的。例如,當使用者正登人到—應餘式或網際網路 時,使用者開始進行登人程序的動作並要刷入_磁卡 或塵下特定独’也*需要輸人—金額。該登人程序的開 始可能為鮮的’但使用者將在其機眺端機上接收該鑑 定以及識別符號,如以下將說明地。該種登人程序等於上 述的步驟1與2。當使用者的終職·辦趟定以及識 別符號時,該使时可在_其行動電話進行步驟4與5 之前,先在其終端機上觀看該鏗定以及識別符號。 2] 該操作者將加入該使用者的至少一識別細節,且隨後 傳送該鑑定到該促進者。該至少—識別細節包含取自於咳 行動電話之S丨Μ卡及/絲自於該行動電財身的資訊/ 該鑑定以及識別符號將被傳送到該行動電話。這可能 為任何或多種適當構件,例如由p〇s終端機列印出來= 交給使用者/顧客、顯示在該P〇s終端機上,在p〇s上音 訊地產生’或者利用無線傳輪方式從該p〇s終端機傳送 到該行動電話。當使用者的視覺或聽力受損時,可以使用 不只-種方法。如果需要的話’可利用任何適當方法將該 鑑定以及識別符號輸入到該行動電話上,例如聲音啟動、 按鍵輸入、觸控筆輸入、以及聲音辨識等方式。 可在該鑑定以及識別符號之前先即時地傳送PIN,哎 者在該鑑定以及識別符號之後立即傳送p|N。僅需要輸入 該PIN,因為該操作者的提醒的關係。如果該系統是用於 使用者的受限範圍的話,在輸入該鑑定以及識別符號之 W,或者在傳送之前,該操作者可先核准該p丨N。如此一 來,操作者將知道該使用者(因為不同於該行動電話)係來 自於使用者的受限範圍。在傳送該PIN之前,該操作者亦 可核准該鑑定以及識別符號。 藉著在δ亥鏗疋以及識別符號之前先傳送該pin的動 作,该操作者將可參照該PIN而進行搜尋。該項搜尋的結 果應該為有限的可能性-從1開始的任何數。因此,當接 收到该鑑定以及識別符號時,或者收到來自該行動電話之 SIM卡的使用者時,由該操作者進行此項搜尋旧的動作 200409521 將相當程度地受到限制。這可加速該項程序。這是因為可 能有岭多具有相同使用者ID的使用者,但幾乎不會有具 有相同PIN的使用者。 该鑑定以及識別符號包含多個字元。各個該等字元可 為以下項目的一個或數個:一數字、一字母、一圖形符號、 一標點符號、一發音音調、以及一 ASCII字元。 该鏗定以及識別符號係由該促進者或其他受信賴當事 者隨機地產生。產生的隨機性在於所使用的字元及/或所使 用的字元數。例如在一實例中,可能僅有數字。它可能是 ® 由子母與數字符號構成的,或者可由非字母與非數字的字 元所構成。它可包含任何行動電話按鍵上可得的字元。唯 一的限制是,所有使用的字元必須要能夠由行動電話傳送 出去。假使使用語音辨識法的話,則不會限制在行動電話 按鍵上的字兀。 - 邊鐘定以及識別符號將可達成二種安全位準〜它將 識別出進行中的特定鑑定程序且作為一種追蹤裝置,以使 該促進者與該操作者能透過該程序中的所有步驟而可靠 · 地追蹤所進行的該鑑定以及識別動作,且將該使用者/顧客 識別為該鑑定以及識別程序中包含的人士。在進行一項六 易的過程中,第二方面將較重要,因為只有該使用者將包 含於該交易中。當與取自於該使用者或該使用者之终端機 /行動電話的一個人安全項目合併時,將包含三種安全位 準。 如第16圖清晰所見的,當處理一行動電話時,將對枳 23 ,者提供該行動電話的丨D作為撥打出-通電話的-正常 、'以使純作者知道要向料款。軸作將提供鑑定 、。戠別的第位準。當將該鑑定以及識別符號傳送到該 知作者時’將在建立一次該終端機/行動電話的鑑定時,提 供鐘定以及識別的第二位準。因為該行動電話可由另一位 =來使W合法或麵的),料該_便可提供鑑 疋以及識別的第三位準。 因此,該行動電話將提供該行動電話的身分,且因此 = 亍動電話之所有者的身分,該鑑定以及識別符號將 使麵動電話置於該鑑定以及識別程序中,且該_ Z人識別符最終_定且朗出該行動魏的所有者 使用及仃動“,且該所有者為受到鐘定與識別的人 士0 ^傳^心㈣之終端機之前’可由該促進者對該 鐘疋以及識別符號加上標籍 幻。織可此有一個或數個標籤。該 寺才示戴可用於多種目的,复 r 其包含但不限於該鑑定以及識別 付號的起源、目標終端機、 4乂易係為該鑑定以及識別的 主題、该鑑定以及識別的本質等。 :⑽識別符號可具有内建的時效,以使該促進 者必須在敎 的,根據多種因素而定,例 η為預。又 價值等。例如,適當的時間要^:本質、交易的 為對舄要速度(例如收費站、 如超級繼咖獅㈣秒,她於遠程= 24 200409521 或大量採購的交易來說為60秒。剩下的時 與該較以及識別符號的方式而顯示出來。此一二 顯示器、數字__器、長條__等來顯示:時鐘 則呆财及,城進者(該促進者將需要在行動電 置上使用取自該操作者的資訊)亦將進行1位置=如 作,如藉著檢查由該顧客所使用的晶胞是㈣敎 關。此亦可顧啦顯來進行。可彻相=行_For other forms of transactions, the initialization actions of the program may be different. For example, when the user is logged in to Yingying or the Internet, the user starts the sign-in procedure and needs to swipe in _ magnetic card or specific uniqueness under the dust * and also needs to enter the amount of money. The start of the login procedure may be fresh, but the user will receive the authentication and identification symbol on his terminal, as will be explained below. This login procedure is equivalent to steps 1 and 2 described above. When the user's final appointment, identification, and identification, the user can view the identification and identification on his terminal before performing steps 4 and 5 on his mobile phone. 2] The operator will add at least one identifying detail of the user and then transmit the identification to the facilitator. The at least-identification details include the SIM card from the mobile phone and / or information from the mobile phone's wealth / the identification and identification symbol will be transmitted to the mobile phone. This may be any suitable component or components, such as printing from a p0s terminal = handed over to the user / customer, displayed on the p0s terminal, audio generated on p0s, or using wireless transmission The round-trip mode is transmitted from the pos terminal to the mobile phone. When the user's vision or hearing is impaired, more than one method can be used. If necessary, the identification and identification symbols can be input to the mobile phone by any suitable method, such as voice activation, key input, stylus input, and voice recognition. The PIN can be transmitted immediately before the identification and identification symbol, or he can transmit p | N immediately after the identification and identification symbol. It is only necessary to enter the PIN because of the reminder of the operator. If the system is intended for a limited range of users, the operator can approve the pN before entering the W of the identification and identification symbol, or before transmitting. In this way, the operator will know that the user (because it is different from the mobile phone) comes from the restricted range of the user. The operator can also approve the identification and identification code before transmitting the PIN. By transmitting the pin before the delta signal and the identification code, the operator can search by referring to the PIN. The result of this search should be limited possibilities-any number starting from 1. Therefore, when the identification and identification code is received, or when the user of the SIM card from the mobile phone is received, the operator's search for the old action 200409521 will be considerably restricted. This can speed up the process. This is because there may be users with the same user ID, but few users with the same PIN. The identification and identification symbol contains multiple characters. Each of these characters can be one or more of the following: a number, a letter, a graphic symbol, a punctuation mark, a pronunciation tone, and an ASCII character. The identification and identification symbols are randomly generated by the facilitator or other trusted parties. The resulting randomness is the number of characters used and / or the number of characters used. For example, in one example, there may be only numbers. It may consist of a son and daughter and a number symbol, or it may be composed of non-letter and non-numeric characters. It can contain characters available on any mobile phone button. The only limitation is that all characters used must be able to be transmitted by a mobile phone. If the speech recognition method is used, the characters on the keys of the mobile phone will not be limited. -The side clock and identification symbol will achieve two security levels ~ It will identify the specific identification procedure in progress and serve as a tracking device so that the promoter and the operator can pass through all steps in the procedure Reliably and reliably track the identification and identification performed, and identify the user / customer as the person included in the identification and identification process. In the process of conducting a six-party exchange, the second aspect will be more important because only the user will be included in the transaction. When combined with a personal security item taken from the user or the user's terminal / mobile phone, three security levels will be included. As can be clearly seen in Figure 16, when a mobile phone is processed, it will be confronted with 者 23, which provides the mobile phone's D as the dial-out of the phone-normal, so that the pure author knows to pay for the material. Shafting will provide identification.戠 Another level. When transmitting the authentication and identification symbol to the known author ', it will provide the second level of clocking and identification when establishing an authentication of the terminal / mobile phone. Because the mobile phone can be legalized or verified by another digit), it is expected that the _ will provide the third level of identification and identification. Therefore, the mobile phone will provide the identity of the mobile phone, and therefore = the identity of the owner of the mobile phone, the identification and identification symbol will place the face-to-face mobile phone in the identification and identification process, and the _ Z person identification Fu finally _ determined and made clear that the owner of the action Wei used and acted ", and that the owner is a person who has been identified and identified by 0 ^ Chuan ^ before the terminal of the heart 'can be used by the promoter to the clock And the identification symbol is added with the logo magic. We can have one or several labels. The temple can be used for many purposes. It includes but is not limited to the identification and identification of the origin of the payment number, the target terminal, 4乂 Ease is the subject of the appraisal and identification, the nature of the appraisal and identification, etc .: The ⑽ identification symbol may have a built-in time limit, so that the promoter must be in 敎, according to various factors, for example, . And value, etc. For example, the appropriate time is ^: the nature, the transaction is the speed of the confrontation (for example, toll booths, such as the super following coffee lion seconds, she is at a remote = 24 200409521 or a large purchase transaction is 60 Seconds. Time and the comparison as well as the way of identifying symbols. This one or two displays, digital __ devices, long bars __, etc. are displayed: the clock is sloppy and the city advancer (the promoter will need to Put on the information from the operator) will also perform 1 position = if so, if by checking that the unit cell used by the customer is a pass. This can also be done by Gu Laxian. Can be thoroughly related = Row_
項相似的匹配動作~在該駭的期間巾將發生各種不PSimilar matching actions ~ During this period of hacking, various non-P
的通訊。Communication.
根據多種因素,該鐘定以及識別符號的長度將不同, 其包含但不限於:該交易的本質、該交易的位置該交易 的價值。例如’少數的字元,例如針對低價值交易及^需 要速度的交易及/或具有低安全性的交易則為3個或4個: 糊如收費站、停車場出σ);較多字^,例如6或8個 字元’如針對每天的採購正常價值範圍的“正常,,交易及/或 具有中度速度位準及/或具有巾度安全鱗(例如超級市場 或百貨公司);或者較長字元串,例如1()到16個字元, 如針對大量_的㈣及/或當有高安全料或隱秘性 時,及/或當時間不為重要因素時,及/或針對大量採蹲的 交易。 如果需要或所欲的話,該顧客/使用者可使用該p〇s 來輸入PIN。然而,t亥p〇s終端機不應該被該使用者用 來輸入6亥鑑定以及識別符號,因為該符號應該要在不同電 ^頻道上被傳送到忒操作者。相似地,如取自於該使用者 25 之行動電話SIM卡敝用者1D並不綠她纟p〇s傳送 出去,以使它亦應該在第二電信頻道上傳送。 面對面採購的開始將需要零售商與行動電話使用者雙 方的參與。 所有交易的致能者為該促進者、可為自由存在之法律 實體的邏輯實體、或其他參與當事人中之-的一項功能, 例如该操作者或金融機構。Depending on various factors, the length of the clock and the identification symbol will be different, including but not limited to: the nature of the transaction, the location of the transaction, and the value of the transaction. For example, 'a few characters, such as 3 or 4 for low-value transactions and transactions requiring speed and / or transactions with low security: such as toll stations, parking lot σ); more characters ^, For example, 6 or 8 characters' such as "normal, transaction, and / or modest speed level and / or safety scale (such as a supermarket or department store) for the normal range of daily purchases; or Long character strings, such as 1 () to 16 characters, such as for large numbers of _ and / or when there is high safety or privacy, and / or when time is not an important factor, and / or for large numbers Squat transactions. If necessary or desired, the customer / user can use the p0s to enter the PIN. However, the t0p0s terminal should not be used by the user to enter the 6a identification and identification Symbol, because the symbol should be transmitted to the operator on different radio channels. Similarly, if the user ’s mobile phone SIM card is taken from the user 25, the user ID is not transmitted. So that it should also be transmitted on the second telecommunication channel. The involvement of both the retailer and the mobile phone user will be required. All enablers of the transaction are a function of the facilitator, a logical entity that may be a freely existing legal entity, or other participating parties, such as the operation Or financial institution.
第6圖的程序亦可用於開始或終止-項服務。例如, 使用者可使用該系統來登入到該系統,例如於p〇S終端 機。如果如上所述地遵循麵定以及識別程序的話,可以 給予該使时該觀_條件與錄。此,著給予該零 :商所保有的-份硬拷貝、印製在該咖上(在印製該鐘 2以及識別符號的同時,或者在進行鍟定以及識別之後), 由傳送到-岐電子郵件或其他發訊帳戶的軟鮮,或者 為當時可得的。㈣叙❸_行動魏的限前會影塑 到如何進行。例如,如果該使用者具有電話致能pda = =它將針對欲傳送之該等條件與條款的文件具有充分的 σ己丨思,且儲存在該使用者的終端機。 可利用多種方法來決定該使用者對該 接受度,例如姻其行難簡#接受度㈣應=自 =作者的-項關訊息;利用—觸控筆來指出該哪 之㈣Ilf幕上的《,躲倾制錢受度簽章的一 列印版本;輸人P丨N或其他個人識別符在該行動電 P0…或著藉著簽署—硬拷貝且該零售商將對該促進: 26 提供該使用已經簽名m相,該料商隨後利用 正常的方法把該硬拷貝傳送到該促進者。 因為5玄使用者並未具有收到該鏗定以及識別符號之該 &作者的細即’此細節可能由該零售商以硬拷貝方式來提 i、或者針對條件與條款來提供。或者,可同時提供該種 、、、田節’且利用與麵定以及識別符號相同的方法來提供。 此方法可用於其他服務中,例如預定戲院、音樂會、 表演、運動比赛、旅遊等等的票券;進行餐廳、飯店的訂 位或其他德,涵汽車或其他I置/設備的服務;安排維 修人員或其他服務供應者到家、辦公室、或紐用者的其 他位置進行服義等。相似地,它可用於終止—項服務, 例如上述服務的任何一種。 、下將及明一項無線付款交易的四個實例: 1·預付收據的置換(僅有操作者); 纟侣付款(僅由操作者); 3·預付收據的置換(金融機構的牽連);以及 4_零售付款(金融機構的牽連)。 乂下肸對照第7圖到第1〇圖來說明上述的四項實例, I括上面圖表1中的步驟1與2,但並不多作說明,因 為對所有四個實例來說,都是相同的。 弟7圖將展示出預付付款的付款程序,其中該操作者 27 與該零售商具有關係性,且祕作為該付款促進者。 1· 2客將對該零售商支付現金而歸於該顧客的帳戶; 2.零售商將給予顧客其巾杨“及朗符號以及 金額的紙條’或者像顧客展示顯示在p〇s電話手 機、pos終端機顯示器、電腦顯示器、結=㈣ 顯示器或其他顯示器裝置上的該鐘定以及識別符 號與金額; 3’顧各傳送鐘定以及識別符號給操作者;The procedure in Figure 6 can also be used to start or stop a service. For example, a user can use the system to log in to the system, such as a POS terminal. If you follow the procedures for identification and identification as described above, you can give them the conditions and records. Therefore, the author gives the zero: a hard copy of the one held by the merchant, printed on the coffee (while printing the clock 2 and the identification symbol, or after performing the identification and identification), by transmitting to-Qi Electronics Mail or other messenger accounts, or available at the time. ㈣ 述 ❸_ Action Wei's time limit will shape how to proceed. For example, if the user has a phone-enabled pda == it will have sufficient σ thinking about the documents of these conditions and terms to be transmitted, and stored in the user's terminal. There are several methods that can be used to determine the user's acceptance, such as 姻 其 行 难 简 # , A printed version of the stamp of stamping money; the input P 丨 N or other personal identifier is on the action line P0 ... or by signing—a hard copy and the retailer will promote the: 26 Provide the use Having signed phase m, the material supplier then transmits the hard copy to the promoter using normal methods. Because the user of Wuxuan does not have the details of the & author who received the identification and identification symbol, this detail may be provided by the retailer in hard copy, or provided for the terms and conditions. Alternatively, it is possible to provide this kind of,,, and field festivals at the same time and to provide them by the same method as that of noodle set and identification symbol. This method can be used in other services, such as booking tickets for theaters, concerts, performances, sports competitions, tours, etc .; booking restaurants, restaurants, or other German, Han automobile or other I / equipment services; arrangements Maintenance personnel or other service providers perform services at home, office, or other locations. Similarly, it can be used to terminate a service, such as any of the aforementioned services. , General and four examples of a wireless payment transaction: 1. Replacement of prepaid receipts (only the operator); payments by couples (only by the operator); 3. Replacement of prepaid receipts (implication of financial institutions) ; And 4_ retail payments (implications of financial institutions). The following explains the four examples described above with reference to Figures 7 to 10. I include steps 1 and 2 in Figure 1 above, but they are not described in detail because for all four examples, identical. Brother 7 diagram will show the payment procedure of prepaid payment, in which the operator 27 is related to the retailer and acts as the payment promoter. 1.2 customers will pay the retailer with cash and attribute it to the customer's account; 2. the retailer will give the customer a towel and a note of "Lang symbol and amount 'or display it on the p0s phone, pos terminal display, computer display, knot = ㈣ display or other display device, the clock and the identification symbol and amount; 3 'Gu each transmitted clock and identification to the operator;
4·零售商傳送付款請求給操作者,該操作者亦將作為 該促進者; 5·操作者/促進者將進行匹配檢查,且如果正碎的 話,將向零售商確認追加的費用; 6_彳呆作者/促進者傳送確認SMS給顧客; 7·零售商將列印收據且將其交予顧客。4. The retailer sends a payment request to the operator, and the operator will also act as the promoter; 5. The operator / facilitator will perform a matching check, and if it is broken, the retailer will confirm the additional fee; 6_ The dull author / facilitator sends a confirmation SMS to the customer; 7. The retailer will print a receipt and give it to the customer.
▲弟。8圖將展不出該付款程序,其中該操作者將在其 話帳单上向顧客請款。如此—來,該麟者將作為該付: 二='而’如果不只包含-位操作者的話,較佳的: 私疋第二者付款提供者/促進者。 1·令售商將給予顧客具有金額的鑑定以及識別符號 2.顧客傳送鏗定以及識別符號給操作者; 3.如果而要的話,顧客將在POS上輸入PIN; 4·操作者料送顧客丨D、II定以《職號、時間、 以及位置(選擇性地)給促進者; 28 200409521 5. 零售商傳送PIN(如果輸入的話)、金額、P〇S ID、 零售商ID、鑑定以及識別符號、以及時間給促進 者; 6. 操作者傳送付款驗證結果-同意/拒絕-對轉送 此結果給零售商的促進者; 7. 操作者傳送確認SMS給顧客; 8. 零售商將列印收據且將其交予顧客;以及 9. (未顯示)將由行動操作者對顧客進行請款。 第9圖將說明預付付款的付款程序,其中該操作者並 未與該零售商具有直接的關係性。當與一金融機構合作 時,該操作者可以針對銷售時間(未顯示)來選擇取得零售 商的預付款。如所展示地,該操作者將作為該促進者,雖 然較合適的是指定第三者來扮演此腳色。 1. 顧客將對該零售商支付現金以歸於該顧客的帳戶; 2. 零售商將給予顧客其中有鑑定以及識別符號以及 金額的紙條; 3. 顧客將撥打電話且傳送鑑定以及識別符號; 4. 零售商傳送付款請求給金融機構; 5. 金融機構傳送付款建議給操作者; 6. 操作者向金融機構確認追加的費用,且該金融機構 將此訊息轉送給該零售商; 7. 操作者傳送確認SMS給顧客; 8. 零售商將列印收據且將其交予顧客。 29 200409521 第10圖將展示出面對面付款的付款程序,其包含一金 融機構以及第三者付款促進者。典型地,此情境可是用於 多位操作者的環境中。 1. 零售商將給予顧客其中有鑑定以及識別符號以及 金額的紙條; 2. 顧客將撥打電話且傳送鑑定以及識別符號; 3. 如果需要的話,顧客將在POS上輸入PIN; 4. 行動操作者傳送顧客丨D、鑑定以及識別符號、時 間,且如果需要或所欲的話,位置,給付款促進者; 5. 零售商傳送PIN(如果輸入的話)、金額、POS ID、 零售商丨D、鑑定以及識別符號、時間; 6. 促進者檢查其資料庫,並且鑑定且識別顧客; 7. 促進者傳送顧客丨D、鑑定以及識別符號、POS ID、 零售商ID、時間、金額以及PIN(如果輸入的話)到 金融機構; 8. 金融機構傳送付款驗證結果-同意/拒絕-對轉 送此結果給促進者與零售商-這將轉送給該零售 商; 9. 促進者傳送確認SMS給顧客; 10. 零售商將列印收據且將其交予顧客。 第11圖將展示出付款程序,而第12圖將展示出付款 流程: 30 200409521 1. 由使用者與零售商開始進行付款; 2. 由行動操作者摘取出交易資料; 3. 由付款促進者對資料進行配對;以及 4. 安排付款指令的路徑到金融機構。 該使用者應該具有: a. 與行動操作者訂購的有效電話服務以及一手機,其能 夠與具有信號發送功能的電信系統使用,例如 GSM ; b. 根據本發明而登錄服務; c. 必須具有與該項服務相關的一帳戶。該使用者選擇的 付款方法範圍則依據解決方案的實行方式以及相 關當事者之間所定的協議。可能的帳戶類型包括: • 預付帳戶(由該操作者或一金融機構提 供); • 行動電話已付帳戶(由該操作者提供); • 信用卡帳戶; • 簽帳卡帳戶; • 其他金融機構帳戶。 d. 需要遵從該項服務的條款與條件; e. 必須支付所使用之服務的費用; f. 將負責保護與該服務相關的該行動電話以及任何 PIN碼;以及 31 200409521 …^1地通知祕練進者,如料行動電話遺失 或遭竊的話,以便可以避免個人的金融損失。 車:=停車費的話’將必須登錄該使用者的汽 該行動操作者應該要: •實行所需的服務元件; •提供使用者對該項服務的預知; •=供其行動與後賴路基礎建設崎能該項服務; •提供委任的受信賴服務; •提供該項服務的帳戶; •針對與帳戶追加的費用來摘取且傳送受信賴資料; •發送帳單且蒐集付款; •產生且維持所有交易的記錄; •銷售且促銷該項服務;以及 •透過其顧客所關心之事來支援該使用者。 _作者需要針對各項交易對該付款促進者提供下列 資訊: a. 使用者身分(例如,MSISDN); b. 零售商與P〇s終端機身分; c. 時間標記; d·位置資訊(選擇性的)。 如果在此鏈結上的通訊為在電腦網路或網際網路上的 通訊的話,並不需要操作者或ISP。 200409521 忒知作者可傳送能被加密的一 PIN。 如果該操作者料要透職錢者㈣ 戶的電話帳單提健付款服務的話,可能不需要其2用 人’,該項服務隨後將完全地在該操作者的控制下:事 選擇性地,該操作者可以利用該用戶之位置 的協助將其服務區域分成多個區域,以便提升安全:月匕 該金融機構有二種選擇,端看是否完成的委任信賴。▲ Brother. Figure 8 will not show the payment procedure, in which the operator will charge the customer on his phone bill. So-come, the Lin will be the one who pays: Two = 'and' If not only-operators, it is better: Private second-party payment provider / facilitator. 1. The seller will give the customer an identification and identification code with the amount 2. The customer sends the identification and identification code to the operator; 3. If necessary, the customer will enter the PIN on the POS; 4. The operator will send the customer丨 D, II set "Promotion number, time, and location (optionally) to the facilitator; 28 200409521 5. The retailer transmits the PIN (if entered), amount, POS ID, retailer ID, identification, and Identification symbol and time to the promoter; 6. The operator sends the payment verification result-consent / rejection-to the promoter who forwarded this result to the retailer; 7. The operator sends a confirmation SMS to the customer; 8. The retailer will print Receipt and give it to the customer; and 9. (not shown) the customer will be charged by the mobile operator. Figure 9 illustrates the payment procedure for a prepaid payment, where the operator is not directly related to the retailer. When working with a financial institution, the operator can choose to obtain a prepayment from the retailer for the time of sale (not shown). As shown, the operator will act as the facilitator, although it is more appropriate to designate a third party to play this role. 1. The customer will pay the retailer with cash to attribute to the customer's account; 2. The retailer will give the customer a note with the identification and identification symbol and the amount; 3. The customer will make a call and transmit the identification and identification symbol; 4 The retailer sends a payment request to the financial institution; 5. The financial institution sends a payment proposal to the operator; 6. The operator confirms the additional fees to the financial institution, and the financial institution forwards this message to the retailer; 7. The operator Send a confirmation SMS to the customer; 8. The retailer will print the receipt and give it to the customer. 29 200409521 Figure 10 shows the payment process for face-to-face payments, which includes a financial institution and a third-party payment promoter. This scenario is typically used in an environment with multiple operators. 1. The retailer will give the customer a note with the identification and identification symbol and amount; 2. The customer will make a phone call and transmit the identification and identification symbol; 3. If necessary, the customer will enter a PIN on the POS; 4. Action The customer transmits D, identification and identification symbol, time, and location, if necessary or desired, to the payment promoter; 5. the retailer transmits PIN (if entered), amount, POS ID, retailer D, Identification and identification symbols, time; 6. Facilitator checks its database and identifies and identifies customers; 7. Facilitator transmits customers, identification and identification symbols, POS ID, retailer ID, time, amount and PIN (if (Input) to financial institution; 8. Financial institution sends payment verification result-consent / rejection-forward this result to promoter and retailer-this will be forwarded to the retailer; 9. promoter sends confirmation SMS to customer; 10 The retailer will print the receipt and give it to the customer. Figure 11 shows the payment process, and Figure 12 shows the payment process: 30 200409521 1. The user and the retailer initiate the payment; 2. The mobile operator extracts the transaction information; 3. The payment facilitates To match the information; and 4. arrange the path of payment instructions to financial institutions. The user should have: a. An effective telephone service ordered with the mobile operator and a mobile phone that can be used with telecommunication systems with signaling functions, such as GSM; b. A login service according to the invention; c. Must have An account associated with the service. The scope of the payment method selected by the user is based on the implementation of the solution and the agreement between the parties involved. Possible account types include: • Prepaid accounts (provided by the operator or a financial institution); • Mobile phone paid accounts (provided by the operator); • Credit card accounts; • Debit card accounts; • Other financial institution accounts . d. need to comply with the terms and conditions of the service; e. must pay for the service used; f. will be responsible for protecting the mobile phone and any PIN associated with the service; and 31 200409521… ^ 1 to inform the Secretary Trainees, if their mobile phones are lost or stolen, so as to avoid personal financial losses. Car: = parking fee 'will have to log in to the user ’s car. The operator should: • implement the required service components; • provide the user with the service's prediction; • = for his actions and the future This service can be used by infrastructure construction companies; • Provide trusted services for commissions; • Accounts that provide this service; • Extract and transmit trusted information for additional costs to accounts; • Send bills and collect payments; • Generate And maintain a record of all transactions; • sell and promote the service; and • support the user through what his customers care about. _The author needs to provide the following information to the payment promoter for each transaction: a. User identity (for example, MSISDN); b. Retailer and Pos terminal body; c. Time stamp; d. Location information ( (Optional). If the communication on this link is on a computer network or the Internet, no operator or ISP is required. 200409521 I know that the author can send a PIN that can be encrypted. If the operator is expected to pay for the service of the payer's phone bill, the user may not need its 2 employees, and the service will then be completely under the control of the operator: selectively, The operator can use the assistance of the user's location to divide its service area into multiple areas in order to improve security: the financial institution has two options, depending on whether the trust is completed or not.
任信賴完成的話,該金融機構可執行交易,而不須 入存的程序進行修正。如果並未絲委任信賴的話,兮 w機構可能需要在其线與該付款錢者之間提供Γ _的介面,且可能地為操作者。《要-種用以利用從 。亥付放促進者收到之❹者資料來執行交易的新邏輯。 該付款促進者應該要: •實行所需的服務元件以及介面; •設定使用者的簡況;If Ren Zhi completes the transaction, the financial institution can execute the transaction without having to modify the deposited procedures. If there is no trust, the institution may need to provide an interface between its line and the payer, and possibly an operator. "To-a kind to use from. The new logic of the payment information received by the promoters to execute transactions. The payment promoter should: • implement the required service components and interfaces; • set the user profile;
•接收付款指令以對資料進行配對而產生一項交易; •判定付款方法且遞交此項交易給選出付款提供者; •產生該項交易的確認訊息; •產生且維持所有交易的記錄;以及 •提供後端支援給其他當事人的顧客關心事項。 6亥種解決方案需要一種資料庫解決方案,其將完成資 料的配對且產生付款齡。該解決必彡Μ能夠縮放以便 處理大I的交^。該純可在今日廣泛使用的作業系統上 運作。 200409521 該資料庫典型地包含具有相關付款簡況的使用者|D, 以及選擇性地具有-相關簡況的零售商|D或服務旧。該 付款促進者必須要建立此纽以及包含在付款鏈中之其 他當事人之_介面’例如操作者、金融機構以及零售商。 。玄付认促進者(或-位特別的第三者)將需要產生該鑑 疋以及識別付號且將其傳送給零售商,且可轉送一已加密 PIN碼來進行大量金額的付款。 針對、冬‘機使用者來說,本發明將可湘現存S|M卡 及/或手機來運作。 如果行動電話作為P〇s終端機的話,較佳的是鎖 。商將傳$-制編程的stks|m卡給賴作者,且該網 i、應者將只仃用以摘取且傳送受信賴付款資料的服 元件。 下列服務將是可能的: •在零售通路上預付帳戶的追加費用; =用知作者在料通路上對商品及/或服務進行付 款,例如預付或已付帳戶; 利用金融機構在零售通路上對商品及/或服務進行 1款,例如金融機構,簽帳卡或信用卡帳戶,或: 4 寸別預付金融機構帳戶; •網際網路付款; 針對使用設備進行賴以及付款 ,例如網球場; •針對入場費進行付款; 十對公共運輸費用進行付款; 34 200409521 • V車費付款,·以及 •在帳戶之啦行錢的轉帳。 f : “出如何在個別實體上加密資料。 將各種μ行動餘 服務、網際網路安全等中 置/、心 例如SSL、隊以及專^ 性阻擒來提供安全• Receive a payment instruction to pair the data to generate a transaction; • Determine the payment method and submit the transaction to the selected payment provider; • Generate a confirmation message for the transaction; • Generate and maintain records of all transactions; and • Provide back-end support to customer concerns of other parties. Sixty solutions require a database solution that will complete the matching of data and generate a payment age. This solution must be able to scale to handle the intersection of large I. It runs on operating systems that are widely used today. 200409521 The database typically contains users | D with related payment profiles, and retailers | D or service with optional -related profiles. The payment facilitator must establish this button and other parties' interfaces included in the payment chain such as operators, financial institutions, and retailers. . The Xuanfu recognition promoter (or a special third party) will need to generate the identification and identification payment number and send it to the retailer, and can forward an encrypted PIN to make a large amount of payment. For users of mobile phones, the present invention will work with existing S | M cards and / or mobile phones. If the mobile phone is used as a Pos terminal, a lock is preferred. The merchant will pass the $ -system programming stks | m card to the author, and the network i and the respondent will only use the server to retrieve and transmit the trusted payment information. The following services will be possible: • Prepayment of additional account fees on the retail channel; = Knowledge authors pay for goods and / or services on the material channel, such as prepaid or paid accounts; use of financial institutions on the retail channel for payment 1 item for goods and / or services, such as a financial institution, debit card or credit card account, or: 4-inch prepaid financial institution account; • Internet payments; reliance and payment for use of equipment, such as tennis courts; • for Admission fees are paid; ten are for public transportation fees; 34 200409521 • V fare payments, and • Money transfers made in your account. f: "Explain how to encrypt data on individual entities. Provide various security services, Internet security, etc., such as SSL, team, and specific interception to provide security
何業界中她㈣糊準是目射 ^ 王技★’且超越了今日用以解作用, ==問題的標準。1〇年來的運作以二 藉著將r 出了現存2G與2加系、_有安全( 使靜作者2包含於付款料中㈣作,將可以 2用知作者_部鱗㈣以及行㈣路安 力全,或纽已經部署但^操作者的付款系統更In the industry, she must have been observing ^ Wang Ji ★ ’and surpassed the standard used to solve problems today, == problem. The operation in the past 10 years is based on the existence of 2G and 2 additions, and has security (to make the static author 2 included in the payment materials to work, will be able to use the author _ 部 stan㈣ and the line Anliquan, or New Zealand has been deployed but the operator's payment system is more
的所::交佳地進行端對端加密。這表示有關處理PIN 的所有_,勤«少財、管理、核料方法等等, 將為個別終端機實體(例如金融機構)所簡考量的。可由 付款促進者彻日_方式來傳送已加密的PIN。 針對小金額的採講及/或付款,可以不需要p|N 職將允獅料天嫌數_如2 :墙賴付 二要進行PIN鑑定。各種交易類型可利用指明是 而要的的標籤識別方式。在一段指定的期間中’不 需要_的付款動作將依照金額或交易次數而受限。 可能可以湘—個或數個方法來實行PIN系統: 35 200409521 •遞交P丨N作為該顧客所撥打之該鑑定以及識別符號 串的一部份;或者 •透過該POS終端機或電腦遞交pin。 在第一種狀況中,如果使用USSD的話,將意味著 GSM安全。現存的GSM基礎建設並不提供該行動電話使 用者(顧客)以及該金融機構之間的PIN端對端加密(其輸入 做為USSD串的一部分)。然而,藉著於基地台(BTS/BSC) 位準加密該PIN,將可達成高度的安全,因為並不會使用 使用者的真實身分。反之,將使用一種別名,即行動用戶 臨時識別碼(TMSI)。TMSI為一種提供使用者身分保護功 能的GSM安全特徵,且其係由VLR或MSC/VLR來管理。 雖^、可把必須對基地台基礎建設進行修改,此方法將可利 用現存SIM卡與手機來致能PIN的“近端對端,,加密動作。 當使用P〇S終端機來輸入PIN時,可在p〇s中利用 種安全存取模組(SAM)來加密該PIN。該金融機構可擁 X SAM。使用來作為p〇s終端機的行動電話將使用一 種特別的“零售商SIM卡,,,其中嵌入有SAM與p〇s應用 私式。藉著在個·道中加密資料,應該可達成高安全位 準。 因此: 摘客並不需要向該零售商或零售商的終端機或電 腦暴露其身分;以及 36 η 在°亥鑑定矛王序中,所需的資料係源自於二個分別的 傳輸頻道。單一頻道中的資訊並無法有效地防止詐 欺行為。 - 該二個頻道可能不是直接鏈結或連接。顧客將可直接 地與该操作者通訊,且該零售商將可直接地與該促進者通 戒。該操作者將與該促進者通訊。因此,在顧客與零售商 之間並没有直接的資料鏈結。因此,該零售商無法取得有 關顧客身分、PIN或帳戶細節的資料。 該系統的二個主要弱點在於: •内部人士可利用技術上簡單方式來進行犯罪;以及 •行動電話遺失或遭竊的問題。 技術上來說,該系統可免於受到行動網路上之偷聽者 、 的攻擊,也可免於使資料在P〇S上受到攔截。攻擊者必 須要同時攻擊二個頻道才可能成功。 不可能進行傳統的使用者名稱/密碼攻擊,因為從未向 · 零售商、零售商的終端機、或電腦透露使用者的細節。即 使密碼被擷取到(利用鑰匙碼記錄器)了,也是無用的,因 為攻擊者並無法存取使用者的行動電話來進行鑑定動作。 因為使用了二個頻道,如果一頻道並未運作的話,或 者如果在任一頻道上啟動了拒絕進行服務的話,該系統可 忐會讓服務的供應中斷。 如第15圖所示,該服務係依據同時可得且利用必要後 37 端程序與連結來運作的二個分別頻道來進行。付款交易的 四個主要重要連結路徑減秘第15圖中。 欠使用者的經驗、表現以及可靠性均是促成行動付款服 矛力成力的重要因素。同樣地,對疑難排解來說,重要的是 此夠决速地找顺誤發生齡置。以下的說明將簡單地描 1出σ種不同連結路徑以及相關聯確認訊息。 路徑1-3為顧客在進行一項交易的過程中將會經歷的 主要路^。目絲說,制行動電話的許乡服務並未提供 使用者表示其請求已經被處_-確認訊息。反之,服務 的Uil動作亦已經構成癌認訊息。較佳的{,將針對每項 父易嘗試產生一項確認訊息。 用來遞送確認訊息的方法以及遞送的訊息内容將依據 網路而&。正常成功交易開始的確認訊息典型地包含“您的 交易正在處理中一請耐心等待”的訊息。 行動電話路徑中的錯誤並非不常見,且典型地係因為 網路擁塞的關係。然而,即使僅有相當輕的負載,少量呼 叫設疋睛求錯誤的發生也是“正常,,的,因為用於最初網路 存取請求的Aloha協定將使用一種隨機存取突發傳輸。大 部分的手機將藉著回到閒置模式來回應此種問題,而不會 顯示任何錯誤訊息。 如果是呼叫設定錯誤的話,應該不會產生一項確認訊 息。該電話將回到閒置模式。在預定的期間中,如果並未 收到一項確認訊息的話,該使用者將需要重新撥打該數 石馬0 38 川0409521 如果使用者並未連線的話,他們可嘗試著連續撥打相 同的號碼數次。這並不會構成問題,因為交易僅會被配對 一次。 如果使用錯誤碼的話,該操作者將可能檢測到一錯誤 幸別入的鑑定以及谶別符號’並且產生一項錯誤確認訊息來 要求該使用者重新撥打。 在某些區域中,基地台的涵蓋區域是很小的。然而, 在部分網路中的信號發送機制均較語音通話功能來得強 大。如果信號相當微弱而無法摘取到使用者資訊的話,便 無去產生一項確認讯息。罕見地,該項請求可能會通過, 但該確認訊息可能無法通過。如果該項交易適切地完成 了,這並不冒構成一項問題,因為將在P〇S終端機列印 出一收據或者顯示在該p〇s終端機上。 如果行動網路有-項-般性錯誤的話,該行動用戶將 冒知道此問題,且將不會撥打電話或付款。 路徑2-4為零售商之PqS與促進者之間的有線路經。 /、里地’如果POS並未接㈣_項有效回應的話,時間 將會暫停且核發-收據,該收據將表示該項交易並不成 功。POS的暫停延誤將不會長於該促進者的暫停延誤。Desire :: The best way to perform end-to-end encryption. This means that all aspects of handling PINs, such as less money, management, verification methods, etc., will be briefly considered by individual terminal entities (such as financial institutions). The encrypted PIN can be transmitted by the payment promoter through the day. For small amount of procurement and / or payment, you do not need p | N to allow the number of suspected lion materials _ such as 2: Wall Lai Fu Second, you need to perform PIN identification. Various transaction types can be identified using a label that indicates what is needed. Payments that are 'unnecessary' during a specified period will be restricted based on the amount or number of transactions. It may be possible to implement the PIN system in one or more of the following ways: 35 200409521 • Submit P 丨 N as part of the authentication and identification symbol string dialed by the customer; or • Submit the pin through the POS terminal or computer. In the first case, if USSD is used, it will mean GSM security. The existing GSM infrastructure does not provide PIN end-to-end encryption (the input is part of the USSD string) between the mobile phone user (customer) and the financial institution. However, by encrypting the PIN at the base station (BTS / BSC) level, a high degree of security can be achieved because the user's true identity will not be used. Instead, an alias is used, the Mobile User Temporary Identifier (TMSI). TMSI is a GSM security feature that provides user identity protection and is managed by the VLR or MSC / VLR. Although the base station infrastructure must be modified, this method will use existing SIM cards and mobile phones to enable PIN "near-to-end," encryption operations. When using a POS terminal to enter a PIN The PIN can be encrypted with a secure access module (SAM) in p0s. The financial institution can own X SAM. The mobile phone used as a p0s terminal will use a special "retailer SIM" Card ,, which embeds SAM and pos application private. By encrypting the data in individual channels, a high level of security should be achieved. Therefore: Picking up customers does not need to reveal their identity to the retailer or the retailer's terminal or computer; and 36 η In the sequence of identifying the King of Spears, the required information is derived from two separate transmission channels. Information from a single channel is not effective in preventing fraud. -The two channels may not be directly linked or connected. The customer will be able to communicate directly with the operator and the retailer will be able to communicate directly with the promoter. The operator will communicate with the facilitator. Therefore, there is no direct data link between customers and retailers. As a result, the retailer was unable to obtain information on customer identity, PIN or account details. The two main weaknesses of the system are: • insiders can use technically simple ways to commit crimes; and • the problem of lost or stolen mobile phones. Technically, the system can be protected from being attacked by eavesdroppers on the mobile network, and it can also be protected from data being intercepted on POS. An attacker must attack two channels at the same time to succeed. Traditional username / password attacks are not possible because the details of the user are never revealed to the retailer, the retailer's terminal, or the computer. Even if the password is retrieved (using a key code recorder), it is useless because the attacker cannot access the user's mobile phone for authentication. Because two channels are used, if one channel is not functioning, or if a denial of service is activated on either channel, the system can interrupt the supply of services. As shown in Figure 15, the service is based on two separate channels that are available at the same time and operate using the necessary post-37 procedures and links. The four main important link paths for payment transactions are reduced in Figure 15. Owner experience, performance, and reliability are all important factors that make mobile payment services work. As such, it is important for troubleshooting to determine the age at which errors occur. The following description will briefly describe σ different connection paths and associated confirmation messages. Paths 1-3 are the main paths customers will go through in the course of a transaction ^. Mu Si said that the Xuxiang service for making mobile phones has not provided users with confirmation that their requests have been processed. Conversely, the service's Uil action has also constituted a cancer recognition message. The better {will try to generate a confirmation message for each parent. The method used to deliver the confirmation message and the content of the delivered message will be & based on the Internet. The confirmation message for the start of a normal successful transaction typically contains the message "Your transaction is being processed-please be patient". Mistakes in mobile phone paths are not uncommon and are typically due to network congestion. However, even with a fairly light load, a small number of call setup errors are "normal," because the Aloha protocol used for the initial network access request will use a random access burst. Most Your phone will respond to this problem by returning to idle mode without displaying any error message. If the call settings are incorrect, there should be no confirmation message. The phone will return to idle mode. During this period, if a confirmation message is not received, the user will need to redial the number of Shima 0 38 chuan 0409521. If the user is not connected, they can try to dial the same number several times in a row. This does not pose a problem, as the transaction will only be paired once. If an error code is used, the operator will likely detect an incorrect fare and identification symbol and generate an error confirmation message requesting that The user redials. In some areas, the coverage area of the base station is small. However, the signaling mechanism in some networks It is more powerful than the voice call function. If the signal is too weak to extract user information, there is no need to generate a confirmation message. Rarely, the request may be passed, but the confirmation message may not be passed. If the The transaction was properly completed, which does not pose a problem, because a receipt will be printed on the POS terminal or displayed on the POS terminal. If the mobile network has -item-generality If it is wrong, the mobile user will be aware of this problem and will not make calls or make payments. Paths 2-4 are routed between the retailer's PqS and the promoter. If there is a valid response, the time will be suspended and a receipt will be issued, which will indicate that the transaction was unsuccessful. The suspension delay of the POS will not be longer than that of the promoter.
、路彳二為行動操作者與促進者之間的連結。這通常 為租用,泉路或為利用SSL的一項網際網路連結。行動用 二或零售商並無法看見此連結中的暫停。如果此項連結中 斷的話,便無法完成一項匹配動作,且該鑑定/付款程序將 曰在雜進4處暫停。如果並未傳送—項錯誤訊息給扣S 39 4 4200409521 的話,該p〇s亦將暫停。 路徑4-5為促進者與金融機構之間的路徑。在一項成 功的匹配動狀後,該促進者將轉送付款請求(或者如果適 當的話,產生且轉送-項付款請求)給該金融機構…旦已 經處理該項請求了,該金融機構將把付款請求的結果傳送 回去。此路徑中的一項錯誤將在促進者處產生一項暫停。 此後’該促進者可以產生一項錯誤訊息給該p〇s ^行 動用戶。 網路用以透過各種不同網路節點來接受且傳播已撥打 數碼的機制將依據數碼的格式以及網路類型而不同。在 GSM系統中’可得的選擇為呢如或者撥打出將交換機 上終止的一通語音電話。 4促進者㈣地為_線±資料庫,它需要與少數的行 動操作者(大量交易)、許多零售商(單—交易)、以及少數金 融機構(大!父易)進行通訊。加人路徑安排資訊(即要將一 =己對乂易傳$到何處)的動作可由㈣操作者或促進者來 兀成如果路#安师訊細該㈣麵制話,包含所 有使用者的-㈣庫應該是可得的。 _新來的顧客將需要登錄。顧客與行動操作者之間將需 ^-份正式契約,該契約將同意將該使用者鑑定資訊提供 給其他當事人,且顧客與各個服務提供者之間亦需要一份 正式契約。可分配 us上的—個或數個缝,以便核發 Γ'4 °该顧客將藉著撥打印製在紙條上的號碼來簽名。該 订動操作者將提供使用者的細節給該促進者。 40 200409521 在過去忖來,行㈣作紅歸“其本身的 來_其用戶的正確身分,且第16㈣展示出目前使用 的夕個仃_路,以及操作者針對各_打出的電話而取 1且保有的包括呼叫者丨D、已崎數碼(號 碼)、通简間、以及通話位置。該位置正常地係位於首先 接收到该通電話的基地台。 p不句一這失的行動 & 口〜化珂小偷來說登錄該号2. Lu Xier is the link between the operator and the promoter. This is usually a lease, spring road, or an Internet connection using SSL. Mobile users or retailers cannot see the pauses in this link. If the link is interrupted, a matching action cannot be completed and the identification / payment process will be suspended at Miscellaneous 4. If an error message is not sent to S 39 4 4200409521, the p0s will also be suspended. Paths 4-5 are paths between facilitators and financial institutions. After a successful match, the facilitator will forward the payment request (or, if appropriate, generate and forward a payment request) to the financial institution ... once the request has been processed, the financial institution will send the payment The result of the request is transmitted back. An error in this path will create a pause at the facilitator. After that, the promoter can generate an error message to the mobile user. The mechanism that the network uses to accept and propagate dialled numbers through various network nodes will vary depending on the format of the number and the type of network. In the GSM system, the available options are, for example, or dial out a voice call that will terminate on the switch. The facilitator is a _line ± database, which needs to communicate with a small number of mobile operators (a large number of transactions), many retailers (single-transactions), and a small number of financial institutions (big! Father easy). The action of adding people to arrange information (that is, they want to pass $ to $) can be performed by the operator or facilitator. If the road # 安 师 讯 细 此 ㈣ 面 话, including all users The -㈣ library should be available. _New customers will need to log in. A formal contract will be required between the customer and the mobile operator, which will agree to provide the user identification information to other parties, and a formal contract will be required between the customer and each service provider. One or more seams on us can be assigned to issue Γ'4 ° The customer will sign by dialing the number printed on the note. The subscription operator will provide user details to the promoter. 40 200409521 In the past, the line made a return to "the correct identity of its own _ its user, and the 16th line shows the currently used road, and the operator takes 1 for each _ phone call And holds the caller D, Hasaki number (number), communication room, and call location. The location is normally located at the base station that received the call first. Mouth ~ Hua Ke thief to register the number
機將是沒麵值的’因為他料知道縣财相名稱以 及任何帳户細節。應該要向操作者報告遭竊的手機以減少 小偷嘗試著要登_電話以供自己使用的顺。為了減少 此種風險,用戶必須要利用其名稱或者只有原始電話所有 者以及操作者知道的其他憑證來登錄,例如出生曰。一曰 向仃動操作者或促進者報告有遺失或遭_手機時,該帳 戶便會被阻擋而無法仙。只有捕作者_ 顧客 帳戶時,才能恢復服務。 心The machine will have no face value ’because he expected to know the name of the county finance minister and any account details. The stolen phone should be reported to the operator to reduce the thief's attempt to log on to the phone for his own use. To reduce this risk, users must log in using their name or other credentials known only to the original phone owner and the operator, such as birth date. When a mobile operator or promoter is reported to have lost or received a mobile phone, the account will be blocked and cannot be used. Service can only be resumed if the author_customer account is captured. heart
其他交易形式的鑑定動作相似於所述的付款系統。然 而,可能不會包括_金融機構,且交易的開始可能不同, 如對照第6圖所述的。在登人時所使用魏定方法實例 有·且入網站、確認一種網路式交易、且登入到一 |Sp 中。第13圖將根據本發明展示出一種鑑定程序,該程序 係用以登人到應服式或網關路巾。在 作者亦將作__者: ^ 傳送出的登入請求係由使用者使用。此可或 不可為使用者本身或正常使用的電腦; 41 200409521 2. 促進者將產生且傳送鑑定以及識別符號到使用者的 電腦中; 3. 電腦將顯示具有鍟定以及識別符號與密碼輸入欄位 的登入螢幕; 4. 使用者將在其行動電話上輸入鑑定以及識別符號且 傳送該鑑定以及識別符號給該操作者; 5. 操作者將接收來自該使用者行動電話的鑑定以及識 別符號並且鑑定且識別使用者;以及 6. 如果需要的話,使用者將輸入PIN。此動作可在步 驟4之前進行。 使用此種鑑定以及識別程序的優點在於該使用者可在 各種不同位置上登入到網站,例如網咖,而不會冒著其使 用者名稱與密碼被擷取到的風險。 /月疋地,不管相關父易為何或是否包括一項交易,針 對各個較佳實施例來說,鑑定以及識別程序中的主要步驟 為在一電信頻道上接收該鑑定以及識別符號,且在第二電 L頻迢上傳送具有使用者丨D的該鑑定以及識別符號給操 作者。在二個分別的頻道上區分該資料,當與單次使用的 鏗定以及朗«合併時,GSM系統_有安全性將可 提供-安全位準且便於使用,這是f知技藝無法達成的。 已經在上面的本發明較佳實施例中進行說明,熟知技 蟄者將可了解的是,在不偏離本發_情況下可以對本發 明的設計細節、建構或運作進行許多不_變化與修正。 本赍明將延伸所有個別地或組合地揭露的特徵。 42 200409521 【圖式簡單說明】 第1圖為正常行動付款系統中之受信賴關係的概念方 塊圖, 第2圖將展示出具有該系統之相關介面的整體架構; 第3圖為根據本發明第一形式之一種行動付款情境之 受信賴關係的概念方塊圖; 第4圖為根據本發明第二形式之一種行動付款情境之 受信賴關係的概念方塊圖; 第5圖為可與本發明一同使用之各種不同形式終端機 的透視圖, 第6圖為本發明之一形式的程序步驟; 第7圖為本發明之第一實施例的程序步驟; 第8圖為本發明之第二實施例的程序步驟; 第9圖為本發明之第三實施例的程序步驟; 第10圖為本發明之第四實施例的程序步驟; 第11圖為本發明之付款程序的程序步驟; 第12圖為本發明之付款流程的程序步驟; 第13圖為本發明之第二形式的程序步驟; 第14圖將展示出加密位準; 第15圖將展示出呼叫路徑;以及 第16圖將展示出可使用本發明的某些行動網路。 【圖式之主要元件代表符號表】 10 POS終端機 12 磁條卡 43 200409521 14 、固網P〇S終端機16 無線P〇S終端機 18 GSM電話 20 GSM電話The authentication of other transaction forms is similar to the payment system described. However, financial institutions may not be included and the start of the transaction may be different, as described in relation to Figure 6. Examples of the Wei Ding method used when logging in are: • Entering the website, confirming an online transaction, and logging in to | Sp. Figure 13 shows an authentication procedure according to the present invention, which procedure is used to board a person to a serving or gateway towel. The author will also be __ by: ^ The login request sent is used by the user. This may or may not be the user's own or normal computer; 41 200409521 2. The promoter will generate and send identification and identification symbols to the user's computer; 3. The computer will display the fields with the identification and identification symbol and password Position login screen; 4. The user will enter the identification and identification symbol on his mobile phone and send the identification and identification symbol to the operator; 5. The operator will receive the identification and identification symbol from the user's mobile phone and Identify and identify the user; and 6. If required, the user will enter a PIN. This action can be performed before step 4. The advantage of using such an authentication and identification program is that the user can log in to a website, such as an Internet cafe, in various locations without risking his user name and password being retrieved. Regardless of whether or not the relevant parent is involved or not, a major step in the identification and identification procedure for each preferred embodiment is to receive the identification and identification symbol on a telecommunication channel, and The second electric L frequency transmits the identification and identification symbol with the user D to the operator. Distinguish the information on two separate channels. When combined with single-use Luding and Lang «, the GSM system will be provided with security-a safe level and easy to use, which cannot be achieved by the know-how . Having described the above preferred embodiments of the present invention, those skilled in the art will understand that many design changes, constructions, or operations of the present invention can be made without departing from the present invention. This booklet will extend all features disclosed individually or in combination. 42 200409521 [Brief description of the diagram] Figure 1 is a conceptual block diagram of the trusted relationship in a normal mobile payment system, and Figure 2 will show the overall architecture of the relevant interface of the system; Figure 3 is a diagram according to the present invention. Conceptual block diagram of a trusted relationship in a form of a mobile payment scenario; Figure 4 is a conceptual block diagram of a trusted relationship in a form of a mobile payment scenario according to the second form of the invention; and Figure 5 is a diagram that can be used with the present invention Perspective views of various types of terminals, FIG. 6 is a program step of one form of the present invention; FIG. 7 is a program step of the first embodiment of the present invention; and FIG. 8 is a view of a second embodiment of the present invention. Program steps; Figure 9 is the program steps of the third embodiment of the present invention; Figure 10 is the program steps of the fourth embodiment of the present invention; Figure 11 is the program steps of the payment procedure of the present invention; Figure 12 is The program steps of the payment process of the present invention; FIG. 13 is the program steps of the second form of the present invention; FIG. 14 will show the encryption level; FIG. 15 will show the call path; It will demonstrate the use of certain mobile networks invention. [Representative symbol table of the main components of the figure] 10 POS terminal 12 Magnetic stripe card 43 200409521 14 Fixed-line P0S terminal 16 Wireless P0S terminal 18 GSM phone 20 GSM phone
4444
Claims (1)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SG200207202 | 2002-11-28 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| TW200409521A true TW200409521A (en) | 2004-06-01 |
Family
ID=32391125
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW092113845A TW200409521A (en) | 2002-11-28 | 2003-05-22 | Authentication and identification system and transactions using such an authentication and identification system |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU2003282770A1 (en) |
| TW (1) | TW200409521A (en) |
| WO (1) | WO2004049621A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI661333B (en) * | 2014-01-10 | 2019-06-01 | 愛爾蘭商主流專利控股有限公司 | System and method for communicating credentials |
Families Citing this family (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2417355A (en) * | 2004-08-12 | 2006-02-22 | Robert Culyer | Method for sending PIN protected mobile phone based tickets and coupons |
| US7865448B2 (en) | 2004-10-19 | 2011-01-04 | First Data Corporation | Methods and systems for performing credit transactions with a wireless device |
| EP1960954A4 (en) * | 2005-08-22 | 2012-12-05 | Xchange Inc G | A method of converting cash into virtual cash and loading it to mobile phone cash account |
| US8201231B2 (en) | 2007-02-21 | 2012-06-12 | Microsoft Corporation | Authenticated credential-based multi-tenant access to a service |
| US8510798B2 (en) | 2007-04-02 | 2013-08-13 | Sony Corporation | Authentication in an audio/visual system having multiple signaling paths |
| US8429713B2 (en) | 2007-04-02 | 2013-04-23 | Sony Corporation | Method and apparatus to speed transmission of CEC commands |
| US20090307141A1 (en) * | 2008-06-06 | 2009-12-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Secure Card Services |
| US9183549B2 (en) | 2008-08-26 | 2015-11-10 | Mts Holdings, Inc. | System and method of secure payment transactions |
| US8412626B2 (en) * | 2009-12-10 | 2013-04-02 | Boku, Inc. | Systems and methods to secure transactions via mobile devices |
| CN103201758A (en) * | 2010-11-10 | 2013-07-10 | 斯玛特哈伯私人有限公司 | Method and apparatus for executing financial transactions via unsecured public telecommunications infrastructure |
| ITRM20110070A1 (en) * | 2011-02-16 | 2012-08-17 | Hideea S R L | ANONYMOUS AUTHENTICATION METHOD FOR THE USE OF A SERVICE |
| EP2634736A1 (en) * | 2012-02-29 | 2013-09-04 | Accenture Global Services Limited | Computer network, electronic transactions cloud and computer-implemented method for secure electronic transactions |
| WO2014086972A1 (en) * | 2012-12-06 | 2014-06-12 | Nec Europe Ltd. | Method and system for mobile money |
| WO2014174342A1 (en) * | 2013-04-25 | 2014-10-30 | Elharras Mohamed | Mobile payment with strong authentication and non repudiation |
| US9940608B2 (en) | 2013-05-16 | 2018-04-10 | Mts Holdings, Inc. | Real time EFT network-based person-to-person transactions |
| CN104076782A (en) * | 2014-06-26 | 2014-10-01 | 上海市城市建设设计研究总院 | New energy automobile remote sharing and appointment making device of large-scale entrepreneurship park |
| US10789586B2 (en) | 2017-12-04 | 2020-09-29 | Mastercard International Incorporated | Transaction verification based on a transaction identifier and associated location data |
| US11144924B2 (en) | 2017-12-14 | 2021-10-12 | Mastercard International Incorporated | Facilitating peer-to-peer transactions using virtual debit accounts of virtual wallets |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH0950465A (en) * | 1995-08-04 | 1997-02-18 | Hitachi Ltd | Electronic shopping method, electronic shopping system, and document authentication method |
| EP1026641B1 (en) * | 1999-02-01 | 2013-04-24 | International Business Machines Corporation | Method and system for establishing a trustworthy connection between a user and a terminal |
| JP2002215582A (en) * | 2000-12-28 | 2002-08-02 | Morgan Stanley Dean Witter Japan Ltd | Authentication method and device |
| FR2823882A1 (en) * | 2001-04-23 | 2002-10-25 | New Access Sa | Commercial transaction using prepayment card over the Internet, uses personal computer or mobile phone, certification center validates data contained on prepayment card |
-
2003
- 2003-05-22 TW TW092113845A patent/TW200409521A/en unknown
- 2003-11-28 AU AU2003282770A patent/AU2003282770A1/en not_active Abandoned
- 2003-11-28 WO PCT/SG2003/000279 patent/WO2004049621A1/en not_active Ceased
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI661333B (en) * | 2014-01-10 | 2019-06-01 | 愛爾蘭商主流專利控股有限公司 | System and method for communicating credentials |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2003282770A1 (en) | 2004-06-18 |
| WO2004049621A1 (en) | 2004-06-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7069001B2 (en) | Method for supporting cashless payment | |
| US10270587B1 (en) | Methods and systems for electronic transactions using multifactor authentication | |
| US7757945B2 (en) | Method for electronic payment | |
| US8682802B1 (en) | Mobile payments using payment tokens | |
| EP2248083B1 (en) | Method for authentication | |
| CN104871187B (en) | online trading system | |
| TW200409521A (en) | Authentication and identification system and transactions using such an authentication and identification system | |
| ES2284667T3 (en) | PROCEDURE FOR PAYMENT THROUGH THE MOBILE PHONE AT ANY POINTS OF SALE OR SERVICES. | |
| EP2701415A1 (en) | Mobile electronic device and use thereof for electronic transactions | |
| US20140358777A1 (en) | Method for secure atm transactions using a portable device | |
| US20120136798A1 (en) | Securing mobile transactions | |
| US20110103586A1 (en) | System, Method and Device To Authenticate Relationships By Electronic Means | |
| TW200306483A (en) | System and method for secure credit and debit card transactions | |
| JP2013529327A (en) | A secure and sharable payment system using trusted personal devices | |
| KR20040095363A (en) | System and method for secure credit and debit card transactions | |
| US20150066745A1 (en) | Payment relay system and method | |
| JP6667498B2 (en) | Remote transaction system, method and POS terminal | |
| KR20170058950A (en) | System and method for electronic payments | |
| KR20010100380A (en) | Method and apparatus for paying a charge of goods or service using a mobile phone | |
| CN110494878A (en) | It is remitted money by telecom operators via the digital properties of telephone number | |
| US20100257097A1 (en) | Secure transactions using non-secure communications | |
| US12211044B2 (en) | Secure one-touch transaction system and method | |
| JP2011044151A (en) | Method and system for safe payment by portable terminal | |
| KR20140047543A (en) | Insurance watch and pament agent system and method based on location of mobile | |
| CN104574691B (en) | A kind of method for processing business and system based on automatic teller machine |