[go: up one dir, main page]

WO2010007178A1 - Système de distribution de jeton - Google Patents

Système de distribution de jeton Download PDF

Info

Publication number
WO2010007178A1
WO2010007178A1 PCT/EP2009/059268 EP2009059268W WO2010007178A1 WO 2010007178 A1 WO2010007178 A1 WO 2010007178A1 EP 2009059268 W EP2009059268 W EP 2009059268W WO 2010007178 A1 WO2010007178 A1 WO 2010007178A1
Authority
WO
WIPO (PCT)
Prior art keywords
token
container
delivery
delivery number
distribution system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2009/059268
Other languages
English (en)
Inventor
Martin Jones Strauch
Martin Sean Kelly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DIGITAL LOCKSMITHS Ltd
Original Assignee
DIGITAL LOCKSMITHS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DIGITAL LOCKSMITHS Ltd filed Critical DIGITAL LOCKSMITHS Ltd
Publication of WO2010007178A1 publication Critical patent/WO2010007178A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/045Payment circuits using payment protocols involving tickets
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0866Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • a known token distribution system is described in WO01/74031 in which a token is sent between two computers using secured networked communications.
  • Another problem is that the customer can only receive tokens via computers on which this program is installed.
  • a token distribution system comprising:
  • a portable token container comprising: a processor, and memory in which is recorded a unique identifier, a delivery number, cryptographic data and a program;
  • e) means in the token issuing system for responding to a request for a token by constructing a data telegram comprising: the token, the unique identifier, the delivery number and a signature, the signature being generated using cryptographic data being specific to the token container and held by the token issuing system
  • the token By employing the invention it is possible for the token to be delivered by any transmission medium suitable for transmitting electronic data without the need to setup a secure network communication.
  • the portable token container could take the form of a smart card, though the physical form is limitless in variation. It is important that the token container comprises means and/or has a physical construction to inhibit unauthorised access and amendment of data held on the card, in particular information associated with cryptographic functions. Communication with the token can be via a contact or contactless interface.
  • the means for retrieving the unique identifier and delivery number can be provided by the customer identifying himself in some way, e.g. by providing a username name or email address, whereupon the token issuing system looks up the identifier and delivery number from a database.
  • the identifier and delivery number can be retrieved directly from the token container via a communication session with the token container. This option is not preferred, as unless the session is secured, there may be security risks if the unique identifier and delivery number and resultant data telegram were accessed by third parties.
  • the token is preferable encrypted using known encryption techniques.
  • the signature allows the program of the token container to verify the origin of the data telegram, and to verify that that token nor delivery number nor unique identifier have been altered since the data telegram was sent by the token issuing system.
  • the invention allows for the token encryption and signature generation to be performed without reliance on conversing with the portable token container.
  • the data telegram is ultimately sent to the token container, a benefit of the invention is that this can be done via many possible routes for example, the internet, email, SMS, or to point of sale terminals or a combination or plurality of these.
  • the customer can request the token via a website; by phone, cellular or otherwise or a point of sale terminal.
  • Figure 1 is a schematic of a token issuing system
  • Figure 2 is a diagram showing the functions performed by the telegram generator of Fig 1 ;
  • Figure 3 is a flow chart showing functions performed by a program held in the token container of Fig 1 ;
  • Figures 4A to 4F are schematic representations of a memory of the token container holding delivery numbers.
  • a token distribution system comprising a customer's PC 1 with associated card reader 1A containing a smart card 1 B.
  • the smart card 1 B has a processor, and memory in which is recorded a unique identifier, a delivery number, cryptographic data and a program. All as is conventional in a smart card 1 B except for the delivery number.
  • the telegram request is received by a delivery processor 4A which responds by accessing a database 4B.
  • the database 4B contains a record for each customer, the record having been generated in after the registration of the customer with smart card issuer 5.
  • Each record contains information specific to the customer's token container 1 B, namely i) the unique identifier of the customer's token container, ii) a delivery number, iii) cryptographic information; and iv) information specific to the customer including but not restricted to addresses in particular mobile phone number, email address and postal address.
  • the customer's token is passed to the telegram generator 4C together with the unique identifier of the customer's token container 1 B, the delivery number and the cryptographic information from database 4B.
  • the token is encrypted using the cryptographic information to form a partly encrypted block of data which is then signed also using the cryptographic information to produce the data telegram.
  • the whole process can be performed automatically using any one of many off the shelf programmed hardware security modules commercially available.
  • cryptographic algorithms suitable for data encryption and data signing including those using principles as described in Applied Cryptography by Bruce Schneier (1994) (ISBN 0-0471-59756-2) published by Widely & Sons.
  • the encryption stage may be omitted (route B) and a signature applied to the unique identifier, delivery number and token in unencrypted form. Even without the encryption stage, protection is still given by the combination of the identifier, delivery number and signature.
  • the delivery processor 4A then increments the delivery number held in the database 4B and transmits the data telegram to the customer's token container 1 B using the delivery mode specified in the data telegram request, in the particular illustrated case, an email sent to the PC.
  • the previously mentioned software on the PC 1 adapted to interface with the card reader 1A and token container 1 B is used to download the data telegram into the token container 1 B.
  • Such software can be easily produced by conventional methods.
  • the software held by the token container 1 B performs the functions of Fig 3. Firstly the unique identifier is checked at 3A that it matches that held by the token container 1 B. If this check is successful a further check is performed at 3B that the delivery number in the telegram is not the same as that any one previously recorded these being having been recorded at 3C. If this check is successful then the signature in the received data telegram is verified at 3D using the cryptographic data held by the token container 1 B. If this not successful the data telegram is rejected. If successful the delivery number is added 3E to the list at 3C. The data telegram is decrypted at 3F and. stored at 3G. Obviously where the telegram has not been encrypted, the decrypting step 3F is not necessary.
  • the system can identify a window of delivery numbers expected to be received in the near future and to reject telegrams having delivery numbers which do not fall within that window. In this way the system does not need to record every previously used delivery number, only the previously received delivery numbers within the aforementioned window, as the window can be shifted when a continuous block of received delivery numbers at the beginning of the window are recorded as having been received.
  • This system also allows telegrams issued by the issuing system in a particular order to be downloaded onto the token container a different order. This arrangement is shown in Figures 4A - 4F.
  • Fig 4A illustrates a portion of memory 3C of the token container 1 B used for storing the delivery number(s).
  • the memory 3C is sized to hold seven delivery numbers though this can be increased or decreased.
  • the token container 1 B identifies the delivery number of the telegram and compares this with the delivery numbers held in memory 3C, as described above.
  • a telegram having delivery number Il is received, a check of the memory 3C indicates that no telegrams having this delivery number have been stored and so stores the token and marks that delivery number Il has been stored (Fig 4B).
  • a second telegram having delivery number VII is received by the token container 1 B and the above process repeated (Fig 4C).
  • the generated telegram can be returned to the merchant for distribution to the customer.
  • the database 4B does not need to contain addresses.
  • the customer can retrieve the telegram from the website.
  • the system may also include means in the token request to accept a specific address for delivery of the telegram rather than a requested mode of delivery. This would obviate the need for the customer record to hold specific addresses relating to the customer.
  • the system may be provided with means to send a token to a token container which is not owned by the customer. This would enable to the token to be purchased by a customer as a gift, or where one customer is buying multiple tokens for use by different people with their own token containers.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Dans un système de distribution de jeton connu, l'ordinateur du client doit contenir un programme validé pour garantir la sécurité. Un tel programme peut être modifié ou manipulé, et les informations de sécurité que contient le programme peuvent être extraites. Un autre problème est que le client ne peut recevoir des jetons que par l'intermédiaire d'ordinateurs sur lesquels est installé ce programme. Selon l'invention, le problème est résolu avec un système de distribution de jeton comprenant un système de délivrance de jeton et un récipient de jeton portatif. Le système de délivrance de jeton transmet le jeton sous la forme d'un télégramme de données qui comprend le jeton, un identifiant unique, un numéro de distribution qui est spécifique à chaque télégramme de données envoyé au récipient de jeton et une signature numérique. Le récipient de jeton comprend des moyens pour vérifier à partir de l'identifiant unique que le jeton est prévu pour ce récipient de jeton, à partir du numéro de distribution, que le jeton de ce télégramme de données n'a pas été précédemment sauvegardé sur le récipient de jeton, et, à partir de la signature numérique, que le télégramme de données n'était modifié en aucune façon depuis son envoi à partir du système de délivrance de jeton. Si toutes ces vérifications sont effectuées avec succès, le jeton est sauvegardé dans le récipient de jeton. En faisant appel à l'invention, il est possible que le jeton soit distribué par un quelconque support de transmission approprié pour transmettre des données électroniques sans qu’il soit nécessaire de constituer une communication à réseau sécurisé.
PCT/EP2009/059268 2008-07-17 2009-07-17 Système de distribution de jeton Ceased WO2010007178A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/GB2008/050582 WO2010007334A1 (fr) 2008-07-17 2008-07-17 Distribution sécurisée de jetons électroniques
GBPCT/GB2008/050582 2008-07-17

Publications (1)

Publication Number Publication Date
WO2010007178A1 true WO2010007178A1 (fr) 2010-01-21

Family

ID=40350223

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/GB2008/050582 Ceased WO2010007334A1 (fr) 2008-07-17 2008-07-17 Distribution sécurisée de jetons électroniques
PCT/EP2009/059268 Ceased WO2010007178A1 (fr) 2008-07-17 2009-07-17 Système de distribution de jeton

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/GB2008/050582 Ceased WO2010007334A1 (fr) 2008-07-17 2008-07-17 Distribution sécurisée de jetons électroniques

Country Status (1)

Country Link
WO (2) WO2010007334A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2793194A1 (fr) * 2013-04-19 2014-10-22 Kapsch TrafficCom AG Procédé de charge d'une unité embarquée avec un ticket électronique
US20170026346A1 (en) * 2010-11-30 2017-01-26 Comcast Cable Communications, Llc Secure Content Access Authorization
CN113489657A (zh) * 2021-06-29 2021-10-08 中国银联股份有限公司 一种分布式流速控制系统及其运行方法
CN113901522A (zh) * 2021-06-06 2022-01-07 成都麦动信息技术有限公司 可靠电子处方终端

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0823694A1 (fr) * 1996-08-09 1998-02-11 Koninklijke KPN N.V. Tickets enregistrés dans des cartes à circuit intégré
EP0932128A2 (fr) * 1998-01-27 1999-07-28 NTT Data Corporation Système de tickets électroniques, terminal de collection, terminal de prestation de services, terminal d'utilisateur, méthode électronique de correction de tickets et support d'enregistrement
US5949880A (en) * 1996-01-31 1999-09-07 Dallas Semiconductor Corporation Transfer of valuable information between a secure module and another module
WO2001009851A1 (fr) * 1999-07-30 2001-02-08 Visa International Service Association Transactions par carte a puce, via un reseau de telecommunications sans fil
WO2001074031A2 (fr) * 2000-03-29 2001-10-04 Cma Business Credit Services Procede et appareil de verification d'un instrument porteur de valeurs
WO2002091308A1 (fr) * 2001-05-09 2002-11-14 John Wolfgang Halpern Systeme de titre de transport a l'echelle regionale
EP1335310A1 (fr) * 2000-10-19 2003-08-13 James Jay Skinner Systeme emetteur de billet electronique
FR2844126A1 (fr) * 2002-08-30 2004-03-05 Over The Air Ota Systeme de"jetons"electroniques permettant l'utilisation, l'acces et l'adaptation des services en ligne sur les reseaux de telephones mobiles

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5949880A (en) * 1996-01-31 1999-09-07 Dallas Semiconductor Corporation Transfer of valuable information between a secure module and another module
EP0823694A1 (fr) * 1996-08-09 1998-02-11 Koninklijke KPN N.V. Tickets enregistrés dans des cartes à circuit intégré
EP0932128A2 (fr) * 1998-01-27 1999-07-28 NTT Data Corporation Système de tickets électroniques, terminal de collection, terminal de prestation de services, terminal d'utilisateur, méthode électronique de correction de tickets et support d'enregistrement
WO2001009851A1 (fr) * 1999-07-30 2001-02-08 Visa International Service Association Transactions par carte a puce, via un reseau de telecommunications sans fil
WO2001074031A2 (fr) * 2000-03-29 2001-10-04 Cma Business Credit Services Procede et appareil de verification d'un instrument porteur de valeurs
EP1335310A1 (fr) * 2000-10-19 2003-08-13 James Jay Skinner Systeme emetteur de billet electronique
WO2002091308A1 (fr) * 2001-05-09 2002-11-14 John Wolfgang Halpern Systeme de titre de transport a l'echelle regionale
FR2844126A1 (fr) * 2002-08-30 2004-03-05 Over The Air Ota Systeme de"jetons"electroniques permettant l'utilisation, l'acces et l'adaptation des services en ligne sur les reseaux de telephones mobiles

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170026346A1 (en) * 2010-11-30 2017-01-26 Comcast Cable Communications, Llc Secure Content Access Authorization
US10084759B2 (en) * 2010-11-30 2018-09-25 Comcast Cable Communications, Llc Secure content access authorization
US10749846B2 (en) 2010-11-30 2020-08-18 Comcast Cable Communications, Llc Secure content access authorization
US11784982B2 (en) 2010-11-30 2023-10-10 Comcast Cable Communications, Llc Secure content access authorization
EP2793194A1 (fr) * 2013-04-19 2014-10-22 Kapsch TrafficCom AG Procédé de charge d'une unité embarquée avec un ticket électronique
CN113901522A (zh) * 2021-06-06 2022-01-07 成都麦动信息技术有限公司 可靠电子处方终端
CN113489657A (zh) * 2021-06-29 2021-10-08 中国银联股份有限公司 一种分布式流速控制系统及其运行方法

Also Published As

Publication number Publication date
WO2010007334A1 (fr) 2010-01-21

Similar Documents

Publication Publication Date Title
CN113574913B (zh) 用于准备和执行对象认证的方法和系统
US5864667A (en) Method for safe communications
CN103716167B (zh) 一种安全采集和分发传输密钥的方法及装置
CN101322424B (zh) 用于初始化无线终端中的安全元件的方法和装置
CN100539581C (zh) 向用户设备提供一组访问码
EP2689383B1 (fr) Systèmes et procédés de signature électronique pour colis livré
CN101419657B (zh) 安全个人化近场通信芯片组的方法
US8340296B2 (en) Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains
US9047497B2 (en) Method and system for authenticating a user by means of an application
HU224268B1 (hu) Eljárás elektronikus tranzakciók végrehajtására, továbbá chipkártya, valamint chipkártyát és felhasználó által vezérelt kommunikációs egységet tartalmazó rendszer
CN101118630A (zh) 个人识别/属性认证系统和个人识别/属性认证方法
CN101098225A (zh) 安全数据传输方法及支付方法、支付终端和支付服务器
CN109118193A (zh) 用于安全元件交易和资产管理的装置和方法
CN102314576A (zh) 在nfc设备中执行安全应用的方法
JP2008517856A (ja) マスター・タグ
CN101110728A (zh) Rfid产权证安全验证系统和验证方法
CN102123027A (zh) 信息安全处理方法和移动终端
CN108924137A (zh) 一种物联网环境下的隐私保护方法和系统
EP2461297B1 (fr) Dispositif et procédé de distribution de numéros d'identification personnels
CN101521670B (zh) 一种应用数据获取的方法及系统
WO2010007178A1 (fr) Système de distribution de jeton
CN113868619A (zh) 票券实名核验方法及系统
EP2668606A2 (fr) Système adapté pour contrôler l'authenticité d'articles
KR101710950B1 (ko) 암호키 배포 방법, 그를 이용한 카드리더 모듈 및 암호키 배포 시스템
CN101101660A (zh) 票据防伪方法及其系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09780802

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09780802

Country of ref document: EP

Kind code of ref document: A1