WO2010007178A1 - Système de distribution de jeton - Google Patents
Système de distribution de jeton Download PDFInfo
- Publication number
- WO2010007178A1 WO2010007178A1 PCT/EP2009/059268 EP2009059268W WO2010007178A1 WO 2010007178 A1 WO2010007178 A1 WO 2010007178A1 EP 2009059268 W EP2009059268 W EP 2009059268W WO 2010007178 A1 WO2010007178 A1 WO 2010007178A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- token
- container
- delivery
- delivery number
- distribution system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/045—Payment circuits using payment protocols involving tickets
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- a known token distribution system is described in WO01/74031 in which a token is sent between two computers using secured networked communications.
- Another problem is that the customer can only receive tokens via computers on which this program is installed.
- a token distribution system comprising:
- a portable token container comprising: a processor, and memory in which is recorded a unique identifier, a delivery number, cryptographic data and a program;
- e) means in the token issuing system for responding to a request for a token by constructing a data telegram comprising: the token, the unique identifier, the delivery number and a signature, the signature being generated using cryptographic data being specific to the token container and held by the token issuing system
- the token By employing the invention it is possible for the token to be delivered by any transmission medium suitable for transmitting electronic data without the need to setup a secure network communication.
- the portable token container could take the form of a smart card, though the physical form is limitless in variation. It is important that the token container comprises means and/or has a physical construction to inhibit unauthorised access and amendment of data held on the card, in particular information associated with cryptographic functions. Communication with the token can be via a contact or contactless interface.
- the means for retrieving the unique identifier and delivery number can be provided by the customer identifying himself in some way, e.g. by providing a username name or email address, whereupon the token issuing system looks up the identifier and delivery number from a database.
- the identifier and delivery number can be retrieved directly from the token container via a communication session with the token container. This option is not preferred, as unless the session is secured, there may be security risks if the unique identifier and delivery number and resultant data telegram were accessed by third parties.
- the token is preferable encrypted using known encryption techniques.
- the signature allows the program of the token container to verify the origin of the data telegram, and to verify that that token nor delivery number nor unique identifier have been altered since the data telegram was sent by the token issuing system.
- the invention allows for the token encryption and signature generation to be performed without reliance on conversing with the portable token container.
- the data telegram is ultimately sent to the token container, a benefit of the invention is that this can be done via many possible routes for example, the internet, email, SMS, or to point of sale terminals or a combination or plurality of these.
- the customer can request the token via a website; by phone, cellular or otherwise or a point of sale terminal.
- Figure 1 is a schematic of a token issuing system
- Figure 2 is a diagram showing the functions performed by the telegram generator of Fig 1 ;
- Figure 3 is a flow chart showing functions performed by a program held in the token container of Fig 1 ;
- Figures 4A to 4F are schematic representations of a memory of the token container holding delivery numbers.
- a token distribution system comprising a customer's PC 1 with associated card reader 1A containing a smart card 1 B.
- the smart card 1 B has a processor, and memory in which is recorded a unique identifier, a delivery number, cryptographic data and a program. All as is conventional in a smart card 1 B except for the delivery number.
- the telegram request is received by a delivery processor 4A which responds by accessing a database 4B.
- the database 4B contains a record for each customer, the record having been generated in after the registration of the customer with smart card issuer 5.
- Each record contains information specific to the customer's token container 1 B, namely i) the unique identifier of the customer's token container, ii) a delivery number, iii) cryptographic information; and iv) information specific to the customer including but not restricted to addresses in particular mobile phone number, email address and postal address.
- the customer's token is passed to the telegram generator 4C together with the unique identifier of the customer's token container 1 B, the delivery number and the cryptographic information from database 4B.
- the token is encrypted using the cryptographic information to form a partly encrypted block of data which is then signed also using the cryptographic information to produce the data telegram.
- the whole process can be performed automatically using any one of many off the shelf programmed hardware security modules commercially available.
- cryptographic algorithms suitable for data encryption and data signing including those using principles as described in Applied Cryptography by Bruce Schneier (1994) (ISBN 0-0471-59756-2) published by Widely & Sons.
- the encryption stage may be omitted (route B) and a signature applied to the unique identifier, delivery number and token in unencrypted form. Even without the encryption stage, protection is still given by the combination of the identifier, delivery number and signature.
- the delivery processor 4A then increments the delivery number held in the database 4B and transmits the data telegram to the customer's token container 1 B using the delivery mode specified in the data telegram request, in the particular illustrated case, an email sent to the PC.
- the previously mentioned software on the PC 1 adapted to interface with the card reader 1A and token container 1 B is used to download the data telegram into the token container 1 B.
- Such software can be easily produced by conventional methods.
- the software held by the token container 1 B performs the functions of Fig 3. Firstly the unique identifier is checked at 3A that it matches that held by the token container 1 B. If this check is successful a further check is performed at 3B that the delivery number in the telegram is not the same as that any one previously recorded these being having been recorded at 3C. If this check is successful then the signature in the received data telegram is verified at 3D using the cryptographic data held by the token container 1 B. If this not successful the data telegram is rejected. If successful the delivery number is added 3E to the list at 3C. The data telegram is decrypted at 3F and. stored at 3G. Obviously where the telegram has not been encrypted, the decrypting step 3F is not necessary.
- the system can identify a window of delivery numbers expected to be received in the near future and to reject telegrams having delivery numbers which do not fall within that window. In this way the system does not need to record every previously used delivery number, only the previously received delivery numbers within the aforementioned window, as the window can be shifted when a continuous block of received delivery numbers at the beginning of the window are recorded as having been received.
- This system also allows telegrams issued by the issuing system in a particular order to be downloaded onto the token container a different order. This arrangement is shown in Figures 4A - 4F.
- Fig 4A illustrates a portion of memory 3C of the token container 1 B used for storing the delivery number(s).
- the memory 3C is sized to hold seven delivery numbers though this can be increased or decreased.
- the token container 1 B identifies the delivery number of the telegram and compares this with the delivery numbers held in memory 3C, as described above.
- a telegram having delivery number Il is received, a check of the memory 3C indicates that no telegrams having this delivery number have been stored and so stores the token and marks that delivery number Il has been stored (Fig 4B).
- a second telegram having delivery number VII is received by the token container 1 B and the above process repeated (Fig 4C).
- the generated telegram can be returned to the merchant for distribution to the customer.
- the database 4B does not need to contain addresses.
- the customer can retrieve the telegram from the website.
- the system may also include means in the token request to accept a specific address for delivery of the telegram rather than a requested mode of delivery. This would obviate the need for the customer record to hold specific addresses relating to the customer.
- the system may be provided with means to send a token to a token container which is not owned by the customer. This would enable to the token to be purchased by a customer as a gift, or where one customer is buying multiple tokens for use by different people with their own token containers.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Dans un système de distribution de jeton connu, l'ordinateur du client doit contenir un programme validé pour garantir la sécurité. Un tel programme peut être modifié ou manipulé, et les informations de sécurité que contient le programme peuvent être extraites. Un autre problème est que le client ne peut recevoir des jetons que par l'intermédiaire d'ordinateurs sur lesquels est installé ce programme. Selon l'invention, le problème est résolu avec un système de distribution de jeton comprenant un système de délivrance de jeton et un récipient de jeton portatif. Le système de délivrance de jeton transmet le jeton sous la forme d'un télégramme de données qui comprend le jeton, un identifiant unique, un numéro de distribution qui est spécifique à chaque télégramme de données envoyé au récipient de jeton et une signature numérique. Le récipient de jeton comprend des moyens pour vérifier à partir de l'identifiant unique que le jeton est prévu pour ce récipient de jeton, à partir du numéro de distribution, que le jeton de ce télégramme de données n'a pas été précédemment sauvegardé sur le récipient de jeton, et, à partir de la signature numérique, que le télégramme de données n'était modifié en aucune façon depuis son envoi à partir du système de délivrance de jeton. Si toutes ces vérifications sont effectuées avec succès, le jeton est sauvegardé dans le récipient de jeton. En faisant appel à l'invention, il est possible que le jeton soit distribué par un quelconque support de transmission approprié pour transmettre des données électroniques sans qu’il soit nécessaire de constituer une communication à réseau sécurisé.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/GB2008/050582 WO2010007334A1 (fr) | 2008-07-17 | 2008-07-17 | Distribution sécurisée de jetons électroniques |
| GBPCT/GB2008/050582 | 2008-07-17 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010007178A1 true WO2010007178A1 (fr) | 2010-01-21 |
Family
ID=40350223
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2008/050582 Ceased WO2010007334A1 (fr) | 2008-07-17 | 2008-07-17 | Distribution sécurisée de jetons électroniques |
| PCT/EP2009/059268 Ceased WO2010007178A1 (fr) | 2008-07-17 | 2009-07-17 | Système de distribution de jeton |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2008/050582 Ceased WO2010007334A1 (fr) | 2008-07-17 | 2008-07-17 | Distribution sécurisée de jetons électroniques |
Country Status (1)
| Country | Link |
|---|---|
| WO (2) | WO2010007334A1 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2793194A1 (fr) * | 2013-04-19 | 2014-10-22 | Kapsch TrafficCom AG | Procédé de charge d'une unité embarquée avec un ticket électronique |
| US20170026346A1 (en) * | 2010-11-30 | 2017-01-26 | Comcast Cable Communications, Llc | Secure Content Access Authorization |
| CN113489657A (zh) * | 2021-06-29 | 2021-10-08 | 中国银联股份有限公司 | 一种分布式流速控制系统及其运行方法 |
| CN113901522A (zh) * | 2021-06-06 | 2022-01-07 | 成都麦动信息技术有限公司 | 可靠电子处方终端 |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0823694A1 (fr) * | 1996-08-09 | 1998-02-11 | Koninklijke KPN N.V. | Tickets enregistrés dans des cartes à circuit intégré |
| EP0932128A2 (fr) * | 1998-01-27 | 1999-07-28 | NTT Data Corporation | Système de tickets électroniques, terminal de collection, terminal de prestation de services, terminal d'utilisateur, méthode électronique de correction de tickets et support d'enregistrement |
| US5949880A (en) * | 1996-01-31 | 1999-09-07 | Dallas Semiconductor Corporation | Transfer of valuable information between a secure module and another module |
| WO2001009851A1 (fr) * | 1999-07-30 | 2001-02-08 | Visa International Service Association | Transactions par carte a puce, via un reseau de telecommunications sans fil |
| WO2001074031A2 (fr) * | 2000-03-29 | 2001-10-04 | Cma Business Credit Services | Procede et appareil de verification d'un instrument porteur de valeurs |
| WO2002091308A1 (fr) * | 2001-05-09 | 2002-11-14 | John Wolfgang Halpern | Systeme de titre de transport a l'echelle regionale |
| EP1335310A1 (fr) * | 2000-10-19 | 2003-08-13 | James Jay Skinner | Systeme emetteur de billet electronique |
| FR2844126A1 (fr) * | 2002-08-30 | 2004-03-05 | Over The Air Ota | Systeme de"jetons"electroniques permettant l'utilisation, l'acces et l'adaptation des services en ligne sur les reseaux de telephones mobiles |
-
2008
- 2008-07-17 WO PCT/GB2008/050582 patent/WO2010007334A1/fr not_active Ceased
-
2009
- 2009-07-17 WO PCT/EP2009/059268 patent/WO2010007178A1/fr not_active Ceased
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5949880A (en) * | 1996-01-31 | 1999-09-07 | Dallas Semiconductor Corporation | Transfer of valuable information between a secure module and another module |
| EP0823694A1 (fr) * | 1996-08-09 | 1998-02-11 | Koninklijke KPN N.V. | Tickets enregistrés dans des cartes à circuit intégré |
| EP0932128A2 (fr) * | 1998-01-27 | 1999-07-28 | NTT Data Corporation | Système de tickets électroniques, terminal de collection, terminal de prestation de services, terminal d'utilisateur, méthode électronique de correction de tickets et support d'enregistrement |
| WO2001009851A1 (fr) * | 1999-07-30 | 2001-02-08 | Visa International Service Association | Transactions par carte a puce, via un reseau de telecommunications sans fil |
| WO2001074031A2 (fr) * | 2000-03-29 | 2001-10-04 | Cma Business Credit Services | Procede et appareil de verification d'un instrument porteur de valeurs |
| EP1335310A1 (fr) * | 2000-10-19 | 2003-08-13 | James Jay Skinner | Systeme emetteur de billet electronique |
| WO2002091308A1 (fr) * | 2001-05-09 | 2002-11-14 | John Wolfgang Halpern | Systeme de titre de transport a l'echelle regionale |
| FR2844126A1 (fr) * | 2002-08-30 | 2004-03-05 | Over The Air Ota | Systeme de"jetons"electroniques permettant l'utilisation, l'acces et l'adaptation des services en ligne sur les reseaux de telephones mobiles |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170026346A1 (en) * | 2010-11-30 | 2017-01-26 | Comcast Cable Communications, Llc | Secure Content Access Authorization |
| US10084759B2 (en) * | 2010-11-30 | 2018-09-25 | Comcast Cable Communications, Llc | Secure content access authorization |
| US10749846B2 (en) | 2010-11-30 | 2020-08-18 | Comcast Cable Communications, Llc | Secure content access authorization |
| US11784982B2 (en) | 2010-11-30 | 2023-10-10 | Comcast Cable Communications, Llc | Secure content access authorization |
| EP2793194A1 (fr) * | 2013-04-19 | 2014-10-22 | Kapsch TrafficCom AG | Procédé de charge d'une unité embarquée avec un ticket électronique |
| CN113901522A (zh) * | 2021-06-06 | 2022-01-07 | 成都麦动信息技术有限公司 | 可靠电子处方终端 |
| CN113489657A (zh) * | 2021-06-29 | 2021-10-08 | 中国银联股份有限公司 | 一种分布式流速控制系统及其运行方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2010007334A1 (fr) | 2010-01-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113574913B (zh) | 用于准备和执行对象认证的方法和系统 | |
| US5864667A (en) | Method for safe communications | |
| CN103716167B (zh) | 一种安全采集和分发传输密钥的方法及装置 | |
| CN101322424B (zh) | 用于初始化无线终端中的安全元件的方法和装置 | |
| CN100539581C (zh) | 向用户设备提供一组访问码 | |
| EP2689383B1 (fr) | Systèmes et procédés de signature électronique pour colis livré | |
| CN101419657B (zh) | 安全个人化近场通信芯片组的方法 | |
| US8340296B2 (en) | Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains | |
| US9047497B2 (en) | Method and system for authenticating a user by means of an application | |
| HU224268B1 (hu) | Eljárás elektronikus tranzakciók végrehajtására, továbbá chipkártya, valamint chipkártyát és felhasználó által vezérelt kommunikációs egységet tartalmazó rendszer | |
| CN101118630A (zh) | 个人识别/属性认证系统和个人识别/属性认证方法 | |
| CN101098225A (zh) | 安全数据传输方法及支付方法、支付终端和支付服务器 | |
| CN109118193A (zh) | 用于安全元件交易和资产管理的装置和方法 | |
| CN102314576A (zh) | 在nfc设备中执行安全应用的方法 | |
| JP2008517856A (ja) | マスター・タグ | |
| CN101110728A (zh) | Rfid产权证安全验证系统和验证方法 | |
| CN102123027A (zh) | 信息安全处理方法和移动终端 | |
| CN108924137A (zh) | 一种物联网环境下的隐私保护方法和系统 | |
| EP2461297B1 (fr) | Dispositif et procédé de distribution de numéros d'identification personnels | |
| CN101521670B (zh) | 一种应用数据获取的方法及系统 | |
| WO2010007178A1 (fr) | Système de distribution de jeton | |
| CN113868619A (zh) | 票券实名核验方法及系统 | |
| EP2668606A2 (fr) | Système adapté pour contrôler l'authenticité d'articles | |
| KR101710950B1 (ko) | 암호키 배포 방법, 그를 이용한 카드리더 모듈 및 암호키 배포 시스템 | |
| CN101101660A (zh) | 票据防伪方法及其系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09780802 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09780802 Country of ref document: EP Kind code of ref document: A1 |