[go: up one dir, main page]

WO2014081390A1 - Secure mobile financial transaction system and methods - Google Patents

Secure mobile financial transaction system and methods Download PDF

Info

Publication number
WO2014081390A1
WO2014081390A1 PCT/SG2013/000491 SG2013000491W WO2014081390A1 WO 2014081390 A1 WO2014081390 A1 WO 2014081390A1 SG 2013000491 W SG2013000491 W SG 2013000491W WO 2014081390 A1 WO2014081390 A1 WO 2014081390A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
card
message
transaction device
gateway processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/SG2013/000491
Other languages
French (fr)
Inventor
Joseph Christopher Boon Kiok KOH
Anthony Beng Kiok KOH
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MOBILE CREDIT PAYMENT Pte Ltd
Original Assignee
MOBILE CREDIT PAYMENT Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MOBILE CREDIT PAYMENT Pte Ltd filed Critical MOBILE CREDIT PAYMENT Pte Ltd
Priority to SG2014008379A priority Critical patent/SG2014008379A/en
Publication of WO2014081390A1 publication Critical patent/WO2014081390A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits

Definitions

  • a communication device described herein is a device which is free to move within a service area formed by a mobile communication network and wirelessly connects to and communicates with a desired counter party whenever and wherever.
  • OS operating system
  • apps application software
  • Users interact with such apps through high-resolution touchscreens, while gaining access to high-speed data access via including, but not limited to Wi-Fi and mobile broadband.
  • Other functions include but not limited to, having portable media players, digital cameras, pocket video cameras, GPS navigation units, and other peripheral modules.
  • communication devices are capable of combining with card reading devices to evolve into a new breed of mobile transaction terminal.
  • a simple transaction server serves as a control gateway between these mobile transaction terminals and the Acquirer, typically a bank or a card scheme.
  • transaction cards contain highly sensitive cardholder information that requires special transmission and storage.
  • Known systems present certain security compliance drawbacks, where security is not focally designed to operate as an integrated system throughout the Cardholder Data Environment (CDE) ecosystem. Hence, this give opportunities for hackers and fraud syndicates to gain entry point into the network, stealing valuable customer information or inject spyware.
  • Another drawbacks of existing systems is the accidental unauthorized storage of sensitive data in memory cache, demiliarized zone (DMZ) or exposed perimeter networking. Hence, many are not in compliant with the payment card industry standards such as PCI DSS.
  • An object of the present invention is to enhance security on the mobile financial transaction system that either uses the secured information of transaction cards, or highly sensitive details necessary for effecting a transaction.
  • They system comprises of an apparatus, a communication protocol, and a gateway processor.
  • An object of the present invention is to provide methods for effecting a secure mobile financial transaction that uses either uses the secured information of transaction cards, or highly sensitive details necessary for effecting a transaction.
  • the disclosed invention addresses the drawbacks of existing systems and methods by offering system security compliance.
  • un-identified transaction device will not couple with the communication device.
  • an encryption module implemented at the transaction device for simultaneous encryption of card information upon reading.
  • a communication protocol comprises of standardized interchange message format that exchange encrypted transaction information there between the apparatus and the gateway processor.
  • the interchange message discloses information format necessary for effective communication there between the transaction device and the gateway processor, which comprises, but not limited to message functions, message classes, message origins, data elements and code values.
  • a hardware security module HSM
  • SSM software security module
  • key management module a cryptographic module, or any combination thereof
  • a risk management module implemented at the gateway .processor analyzes any unusual or suspicious activities at the apparatus, including but not limited to faulty card, technical fallback, manual entry of card information.
  • system management module implemented at the gateway processor automatically updates the latest version of security protection for the system.
  • the gateway processor stores a master key in its security module.
  • the master key generates the primary key based on the transaction device's identification.
  • the primary key further generates secondary keys. Such secondary keys are shared between the transaction device and the gateway processor. In an embodiment, the secondary key further generates one-off keys.
  • the said one-off key is used to encrypt the transaction message.
  • the said transaction message and the transaction device identification are encapsulated, and sent through the communication protocol.
  • the encapsulated message is decapsulated in the gateway processor.
  • An one-off key is used to decrypt the said, message.
  • GPS global positioning system
  • the image of the person associated with the financial transaction is captured and reflected on the electronic receipt.
  • the fingerprint of the person associated with the financial transaction is captured and reflected on the electronic receipt.
  • derived unique key per transaction is used for dynamic key encryption purpose.
  • electronic signature (eSignature) module is implemented for signature verification purpose.
  • electronic signature captured for display on the electronic receipt is masked for security purpose.
  • electronic signature is digitally deconstructed and stored in the gateway processor.
  • the deconstructed data is reconstructed to form into an original receipt format, serving purposes such as, but not limited to chargeback disputes.
  • transaction security is greatly enhanced since any payment card fraud cases can be easily traced.
  • the presence of dynamic currency converter supports real-time conversion of foreign currency into local one.
  • a method is provided to reduce the probability of erraneous bid and ask price entry by user.
  • a method for re-writing transaction card information for the purpose of adding monetary value in the store-value card.
  • the PED present in the transaction device satisfies transaction requirements that may use static PIN for authentication
  • the PED present in the transaction device satisfies transaction requirements that may use dynamic PIN for authentication
  • the PED present in the transaction device satisfies transaction requirements that may use online PIN for authentication
  • the PED present in the transaction device satisfies transaction requirements that may use offline PIN for authentication
  • a system is provided to allow user gain access to periodical bill payments through the software application.
  • the transaction device provides the functionality that can operate with existing NFC contactless magswipe transaction card.
  • the transaction device provides the functionality that can operate with existing NFC contactless EMV transaction card.
  • FIG. 1 illustrates a flow diagram showing a system communication in accordance with an non- restrictive illustrative embodiment of the present invention there between the apparatus and gateway processor via communication protocol.
  • FIG. 2 illustrates a flow diagram of the connectivity link between the transaction device and the communication device.
  • FIG. 3 illustrates a flow diagram of the security protocol from the apparatus to the gateway processor in accordance with an non-restrictive illustrative embodiment of the present invention.
  • FIG. 4 illustrates a flow diagram of the security protocol from the gateway processor to the apparatus in accordance with an non-restrictive illustrative embodiment of the present invention.
  • FIG. 5 illustrates a flow diagram of the risk assessment on the financial transactions effected in the system in accordance with an non-restrictive illustrative embodiment of the present invention.
  • FIG. 6a illustrates the perspective back view of a transaction device linked to a communication device.
  • FIG. 6b illustrates the perspective view of a transaction device linked to a communication device.
  • FIG. 7a illustrates the perspective back view of a transaction device linked to a communication device in one housing.
  • FIG. 7b illustrates the perspective view of a transaction device linked to a communication device in one housing.
  • FIG. 8 illustrates a flow chart of bill payment process in accordance with an non-restrictive illustrative embodiment of the present invention.
  • FIG. 9 illustrates a flow chart of monetary value-adding to a store-value card process with an non- restrictive illustrative embodiment of the present invention .
  • a system and methods for performing secured financial transactions with mobility function using a transaction card with an apparatus through a gateway processor via a communication protocol.
  • FIG. 1 shows a transaction network 100 including a transaction apparatus 10, a communication protocol 20 and a gateway processor 30.
  • the apparatus 10 comprises of the coupling of transaction device 12 and communication device 14, of which the said coupling is controlled by software application 16.
  • the communication protocol 20 functions as a message standard exchange there between the apparatus 10 and the gateway processor 30
  • FIG. 2 shows the connectivity 200 between the transaction device 202 and the communication device 206 in the apparatus 10,
  • the connectivity link 204 is selected from the group consisting of cable, a wireless connection, an analog channel, a hands-free interface, a tethering interface, a Blue-tooth, a USB, a Wifi, radio frequency communication, microwave communication and infrared communication and any combination thereof
  • FIG. 3 shows a security protocol 300, where encrypted message 322 is transmitted from the apparatus 10 to the gateway processor 30.
  • the gateway processor 30 holds a master key 302 that it stored. This master key 302 will generate primary key 204, after which the primary key 304 is discarded. Prior to the discard, a secondary key 306 is generated, from which one-off key 308 are further generated.
  • the secondary key 306 is shared between the apparatus 10 and the gateway processor 30, of which the secondary key 306 in apparatus 10 is used to generate one-off key 308 for encryption purpose, while an identical secondary key 306 in gateway server 30 is used to generate one-off key 308 for decryption purpose.
  • Read data 320 captured is encrypted with one-off key 308 to become encrypted message 322.
  • Encrypted message 322 is further encapsulated through transaction device ID 324 to become encapsulated message 326, which is transmitted to the gateway processor 30.
  • encapsulated message 326 reached gateway processor 30, it is decapsulated through the authentication of the same transaction device ID 324 to obtain encrypted message 322.
  • Read data 320 is thus obtained by using the one-off key 308 to decrypt the encrypted message 322.
  • FIG. 4 shows a security protocol 400, where encrypted message 408 is transmitted from the gateway processor 30 to the apparatus 10.
  • a secondary key 402 is generated, from which one-off key 404 is further generated.
  • the secondary key 402 is shared between the gateway server 30 and the apparatis 10, of which the secondary key 402 in gateway server 30 is used to generate one-off key 404 for encryption purpose, while an identical secondary key 402 in apparatus 10 is used to generate one-off key 408 for decryption purpose.
  • Data 406 is encrypted with one-off key 404 to become encrypted message 408.
  • Encrypted message 408 is further encapsulated through transaction device ID 410 to become encapsulated message 412, which is transmitted to the apparatus 10. When encapsulated message 412 reached apparatus 10, it is decapsulated through the authentication of the same transaction device ID 410 to obtain encrypted message 408. Data 406 is thus obtained by using the one-off key 404 to decrypt the encrypted message 408.
  • FIG, 5 shows the risk assessment 500 on the financial transactions effected in the system.
  • Transaction activities will trigger the module 502 to start taking effect, where data will be analyzed primarily at 504.
  • the data will be further analyzed by risk assessment unit 506.
  • the transaction will be tagged as low-risk, thus allowing for the transaction to continue.
  • the transaction will be terminated at 512.
  • FIG. 6 A an embodiment 600 of a perspective back view of a transaction device 606 linked to a communication device 608 is shown.
  • the transaction device 606 has a slot 604 that runs along the length or a with of the transaction device 606, allowing a magnetic stripe of a transaction card to be read.
  • the transaction device 606 has another slot 602, allowing a IC chip of a transaction card to be inserted and read.
  • the communication device . 608 has a interactive touchscreen 610, allowing a user to interact with the software application present in the communication device.
  • FIG. 6b an embodiment 600 of a perspective view of a transaction device 606 linked to a communication device 608 is shown.
  • the transaction device 606 has a physical alphanumeric keypad 612, allowing a user to key in PIN deemed necessary for effecting a financial transaction.
  • FIG. 7A an embodiment of a perspective back view of a transaction device linked to a communication device in one housing 700 is shown.
  • the housing 706 is shared between the transaction device and the communication device.
  • the housing 706 has. a slot 704 that runs along a length .or a width of the housing, allowing a magnetic stripe of a transaction card to be read.
  • the housing 706 has another slot 702, allowing a IC chip of a transaction card to be inserted and read.
  • the housing 706 has an interactive touchscreen 708, allowing a user to interact with the software application present in the apparatus.
  • FIG. 7B an embodiment of a perspective view of a transaction device linked to a communication device in one housing 700 is shown.
  • the housing 706 has a physical alphanumeric keypad 710, allowing a user to key in PIN deemed necessary for effecting a financial transaction.
  • an archetypical working adult with commitments have a whole range of periodical expenses, such as that but not limted to credit card bills, utility bills, refuse collection bills, car loans, housing loans, ticket fines, insurance premiums, children's tuition fees and goodwill donations.
  • One existing method to settle these bill payments maybe be going to each individual creditor organization's website to pay accordingly, or through an bill aggregator website, while repeatedly going through the process such as typing in credit or debit card number and other necessary information.
  • FIG. 8 illustrates a flowchart diagram of a method for bill payment 800.
  • the method 800 begins operation at the initialization of software application request 802, where the user will then select bill 804 and be prompted if there is another bill 806 to add to the current process. If there is another bill 506 to add, it will return to select bill 804. Else, user will proceed to checkout 808, where the read card 810 action will take place. User will also be required to enter PIN entry 812. An electronic receipt will be sent to user's email 814, and user be promted to logout 816. If not, user will go back to select bill 804. Else, bill payment process is completed on 818.
  • Store-value cards are used extensively such as transit system farecards, telephone prepaid calling cards or for micropayments in shops or vending machines.
  • the existing method for doing a value-add to the said store- value cards are almost limited to stationary places such as vending machines and ATMs.
  • This method of value-adding the store-value cards with mobility creates the flexibility for users, eliminating process such as transportation and waiting, thus, saving time and money.
  • FIG. 9 illustrates a flowchart diagram of a method for adding monetary value to store-value card 900.
  • the method 900 begins operation at the initialization of software application request 902. Upon reading the transaction card 904, the user will be prompted to enter PIN 906. Upon the authorization 908 by the transaction card issuer, user will be prompted to enter value-add monetary amount 910. User will then be prompted to remove the existing transaction card from the transaction device and replace it with the store-value card for reading 914. Upon reading the store-value card 914, the card data will be sent to the store-value card issuer 916 for authorization. Authorization data will be sent back to allow the new data value to be written on the store-value card 91 8. The software application will end 920 upon the completion of the transaction.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention discloses a secure mobile financial transaction system that comprises of an apparatus, a communication protocol, and a gateway processor. The apparatus includes a transaction device coupled with a communication device, with a software application to support user interactivity. The communication protocol provides a secure communication standard used there between the apparatus and the gateway processor. The gateway processor manages the security protocol during information transmission throughout the system.

Description

SECURE MOBILE FINANCIAL TRANSACTION SYSTEM AND METHODS
BACKGROUND
The rapid popularization of communication devices saw rapid growth of people possessing them. A communication device described herein is a device which is free to move within a service area formed by a mobile communication network and wirelessly connects to and communicates with a desired counter party whenever and wherever. Typically, it has an operating system (OS), and can run various types of application software, known as apps. Users interact with such apps through high-resolution touchscreens, while gaining access to high-speed data access via including, but not limited to Wi-Fi and mobile broadband. Other functions include but not limited to, having portable media players, digital cameras, pocket video cameras, GPS navigation units, and other peripheral modules. As such, communication devices are capable of combining with card reading devices to evolve into a new breed of mobile transaction terminal. A simple transaction server serves as a control gateway between these mobile transaction terminals and the Acquirer, typically a bank or a card scheme. However, transaction cards contain highly sensitive cardholder information that requires special transmission and storage. Known systems present certain security compliance drawbacks, where security is not focally designed to operate as an integrated system throughout the Cardholder Data Environment (CDE) ecosystem. Hence, this give opportunities for hackers and fraud syndicates to gain entry point into the network, stealing valuable customer information or inject spyware. Another drawbacks of existing systems is the accidental unauthorized storage of sensitive data in memory cache, demiliarized zone (DMZ) or exposed perimeter networking. Hence, many are not in compliant with the payment card industry standards such as PCI DSS.
OBJECTS OF THE INVENTION
An object of the present invention is to enhance security on the mobile financial transaction system that either uses the secured information of transaction cards, or highly sensitive details necessary for effecting a transaction. They system comprises of an apparatus, a communication protocol, and a gateway processor.
An object of the present invention is to provide methods for effecting a secure mobile financial transaction that uses either uses the secured information of transaction cards, or highly sensitive details necessary for effecting a transaction. SUMMARY OF THE INVENTION
The disclosed invention addresses the drawbacks of existing systems and methods by offering system security compliance.
In an embodiment, through security algorithm set in the software application, un-identified transaction device will not couple with the communication device.
In an embodiment, an encryption module implemented at the transaction device for simultaneous encryption of card information upon reading.
In an embodiment, a communication protocol comprises of standardized interchange message format that exchange encrypted transaction information there between the apparatus and the gateway processor.
In an embodiment, the interchange message discloses information format necessary for effective communication there between the transaction device and the gateway processor, which comprises, but not limited to message functions, message classes, message origins, data elements and code values.
In one exemplary embodiment, a hardware security module (HSM), a software security module (SSM), a key management module, a cryptographic module, or any combination thereof, are implemented at the gateway processor to manage the transmission of encrypted and decrypted card information and transaction messages.
In an embodiment, a risk management module implemented at the gateway .processor analyzes any unusual or suspicious activities at the apparatus, including but not limited to faulty card, technical fallback, manual entry of card information.
In an embodiment, system management module implemented at the gateway processor automatically updates the latest version of security protection for the system.
In an embodiment, the gateway processor stores a master key in its security module.
In an embodiment, the master key generates the primary key based on the transaction device's identification.
In an embodiment, the primary key further generates secondary keys. Such secondary keys are shared between the transaction device and the gateway processor. In an embodiment, the secondary key further generates one-off keys.
In an embodiment, during the transmission of transaction message from the transaction device to the gateway processor, the said one-off key is used to encrypt the transaction message.
In an embodiment, the said transaction message and the transaction device identification are encapsulated, and sent through the communication protocol.
In an embodiment, the encapsulated message is decapsulated in the gateway processor. An one-off key is used to decrypt the said, message.
In an exemplary embodiment of the present disclosure, through the use of global positioning system (GPS) already present in the communication device, the actual physical geolocation of the financial transaction which took place is reflected on the electronic receipt.
In another exemplary embodiment of the present disclosure, through the use of digital camera already present in the communication device, the image of the person associated with the financial transaction is captured and reflected on the electronic receipt.
In yet another further exemplary embodiment of the present disclosure, through the biometric identification already present in the communication device, the fingerprint of the person associated with the financial transaction is captured and reflected on the electronic receipt.
In a further another exemplary embodiment of the present disclosure, derived unique key per transaction is used for dynamic key encryption purpose.
In a further still exemplary embodiment of the present disclosure, electronic signature (eSignature) module is implemented for signature verification purpose.
In yet another exemplary embodiment of the present disclosure, electronic signature captured for display on the electronic receipt is masked for security purpose.
In yet another exemplary embodiment of the present disclosure, electronic signature is digitally deconstructed and stored in the gateway processor. The deconstructed data is reconstructed to form into an original receipt format, serving purposes such as, but not limited to chargeback disputes. -
Advantageously, with the present invention disclosures, transaction security is greatly enhanced since any payment card fraud cases can be easily traced.
In an embodiment, the presence of dynamic currency converter (DCC) supports real-time conversion of foreign currency into local one.
In another exemplary embodiment of the present disclosure, a method is provided to reduce the probability of erraneous bid and ask price entry by user.
In an embodiment, a method is provided for re-writing transaction card information for the purpose of adding monetary value in the store-value card.
In an embodiment, the PED present in the transaction device satisfies transaction requirements that may use static PIN for authentication
In an embodiment, the PED present in the transaction device satisfies transaction requirements that may use dynamic PIN for authentication
In an embodiment, the PED present in the transaction device satisfies transaction requirements that may use online PIN for authentication
In an embodiment, the PED present in the transaction device satisfies transaction requirements that may use offline PIN for authentication
In one exemplary embodiment of the present disclosure, a system is provided to allow user gain access to periodical bill payments through the software application.
In accordance to yet still another embodiment of this invention, the transaction device provides the functionality that can operate with existing NFC contactless magswipe transaction card.
In accordance to yet still another embodiment of this invention, the transaction device provides the functionality that can operate with existing NFC contactless EMV transaction card.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a flow diagram showing a system communication in accordance with an non- restrictive illustrative embodiment of the present invention there between the apparatus and gateway processor via communication protocol. FIG. 2 illustrates a flow diagram of the connectivity link between the transaction device and the communication device.
FIG. 3 illustrates a flow diagram of the security protocol from the apparatus to the gateway processor in accordance with an non-restrictive illustrative embodiment of the present invention.
FIG. 4 illustrates a flow diagram of the security protocol from the gateway processor to the apparatus in accordance with an non-restrictive illustrative embodiment of the present invention.
FIG. 5 illustrates a flow diagram of the risk assessment on the financial transactions effected in the system in accordance with an non-restrictive illustrative embodiment of the present invention.
FIG. 6a illustrates the perspective back view of a transaction device linked to a communication device.
FIG. 6b illustrates the perspective view of a transaction device linked to a communication device.
FIG. 7a illustrates the perspective back view of a transaction device linked to a communication device in one housing.
FIG. 7b illustrates the perspective view of a transaction device linked to a communication device in one housing.
FIG. 8 illustrates a flow chart of bill payment process in accordance with an non-restrictive illustrative embodiment of the present invention.
FIG. 9 illustrates a flow chart of monetary value-adding to a store-value card process with an non- restrictive illustrative embodiment of the present invention .
DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
Generally stated and in accordance with an embodiment of the invention, there is provided a system and methods for performing secured financial transactions with mobility function using a transaction card, with an apparatus through a gateway processor via a communication protocol.
FIG. 1 shows a transaction network 100 including a transaction apparatus 10, a communication protocol 20 and a gateway processor 30. The apparatus 10 comprises of the coupling of transaction device 12 and communication device 14, of which the said coupling is controlled by software application 16. The communication protocol 20 functions as a message standard exchange there between the apparatus 10 and the gateway processor 30
FIG. 2 shows the connectivity 200 between the transaction device 202 and the communication device 206 in the apparatus 10, The connectivity link 204 is selected from the group consisting of cable, a wireless connection, an analog channel, a hands-free interface, a tethering interface, a Blue-tooth, a USB, a Wifi, radio frequency communication, microwave communication and infrared communication and any combination thereof
FIG. 3 shows a security protocol 300, where encrypted message 322 is transmitted from the apparatus 10 to the gateway processor 30. The gateway processor 30 holds a master key 302 that it stored. This master key 302 will generate primary key 204, after which the primary key 304 is discarded. Prior to the discard, a secondary key 306 is generated, from which one-off key 308 are further generated. The secondary key 306 is shared between the apparatus 10 and the gateway processor 30, of which the secondary key 306 in apparatus 10 is used to generate one-off key 308 for encryption purpose, while an identical secondary key 306 in gateway server 30 is used to generate one-off key 308 for decryption purpose. Read data 320 captured is encrypted with one-off key 308 to become encrypted message 322. Encrypted message 322 is further encapsulated through transaction device ID 324 to become encapsulated message 326, which is transmitted to the gateway processor 30. When encapsulated message 326 reached gateway processor 30, it is decapsulated through the authentication of the same transaction device ID 324 to obtain encrypted message 322. Read data 320 is thus obtained by using the one-off key 308 to decrypt the encrypted message 322.
FIG. 4 shows a security protocol 400, where encrypted message 408 is transmitted from the gateway processor 30 to the apparatus 10. A secondary key 402 is generated, from which one-off key 404 is further generated. The secondary key 402 is shared between the gateway server 30 and the apparatis 10, of which the secondary key 402 in gateway server 30 is used to generate one-off key 404 for encryption purpose, while an identical secondary key 402 in apparatus 10 is used to generate one-off key 408 for decryption purpose. Data 406 is encrypted with one-off key 404 to become encrypted message 408. Encrypted message 408 is further encapsulated through transaction device ID 410 to become encapsulated message 412, which is transmitted to the apparatus 10. When encapsulated message 412 reached apparatus 10, it is decapsulated through the authentication of the same transaction device ID 410 to obtain encrypted message 408. Data 406 is thus obtained by using the one-off key 404 to decrypt the encrypted message 408.
FIG, 5 shows the risk assessment 500 on the financial transactions effected in the system. Transaction activities will trigger the module 502 to start taking effect, where data will be analyzed primarily at 504. When the behavior triggered suspicion, the data will be further analyzed by risk assessment unit 506. Should the analyzed result be tolerable, the transaction will be tagged as low-risk, thus allowing for the transaction to continue. However, should the analyzed result be intolerable, the transaction will be terminated at 512.
With reference to FIG. 6 A, an embodiment 600 of a perspective back view of a transaction device 606 linked to a communication device 608 is shown. The transaction device 606 has a slot 604 that runs along the length or a with of the transaction device 606, allowing a magnetic stripe of a transaction card to be read. The transaction device 606 has another slot 602, allowing a IC chip of a transaction card to be inserted and read. The communication device .608 has a interactive touchscreen 610, allowing a user to interact with the software application present in the communication device.
With further reference now to FIG. 6b, an embodiment 600 of a perspective view of a transaction device 606 linked to a communication device 608 is shown. The transaction device 606 has a physical alphanumeric keypad 612, allowing a user to key in PIN deemed necessary for effecting a financial transaction.
With particular reference now to FIG. 7A, an embodiment of a perspective back view of a transaction device linked to a communication device in one housing 700 is shown. The housing 706 is shared between the transaction device and the communication device. The housing 706 has. a slot 704 that runs along a length .or a width of the housing, allowing a magnetic stripe of a transaction card to be read. The housing 706 has another slot 702, allowing a IC chip of a transaction card to be inserted and read. The housing 706 has an interactive touchscreen 708, allowing a user to interact with the software application present in the apparatus.
With further reference now to FIG. 7B, an embodiment of a perspective view of a transaction device linked to a communication device in one housing 700 is shown. The housing 706 has a physical alphanumeric keypad 710, allowing a user to key in PIN deemed necessary for effecting a financial transaction. in summary, an archetypical working adult with commitments have a whole range of periodical expenses, such as that but not limted to credit card bills, utility bills, refuse collection bills, car loans, housing loans, ticket fines, insurance premiums, children's tuition fees and goodwill donations. One existing method to settle these bill payments maybe be going to each individual creditor organization's website to pay accordingly, or through an bill aggregator website, while repeatedly going through the process such as typing in credit or debit card number and other necessary information. While another existing method is paying through a physical payment kiosk. FIG. 8 illustrates a flowchart diagram of a method for bill payment 800. The method 800 begins operation at the initialization of software application request 802, where the user will then select bill 804 and be prompted if there is another bill 806 to add to the current process. If there is another bill 506 to add, it will return to select bill 804. Else, user will proceed to checkout 808, where the read card 810 action will take place. User will also be required to enter PIN entry 812. An electronic receipt will be sent to user's email 814, and user be promted to logout 816. If not, user will go back to select bill 804. Else, bill payment process is completed on 818.
Store-value cards are used extensively such as transit system farecards, telephone prepaid calling cards or for micropayments in shops or vending machines. However, the existing method for doing a value-add to the said store- value cards are almost limited to stationary places such as vending machines and ATMs. This method of value-adding the store-value cards with mobility creates the flexibility for users, eliminating process such as transportation and waiting, thus, saving time and money.
FIG. 9 illustrates a flowchart diagram of a method for adding monetary value to store-value card 900. The method 900 begins operation at the initialization of software application request 902. Upon reading the transaction card 904, the user will be prompted to enter PIN 906. Upon the authorization 908 by the transaction card issuer, user will be prompted to enter value-add monetary amount 910. User will then be prompted to remove the existing transaction card from the transaction device and replace it with the store-value card for reading 914. Upon reading the store-value card 914, the card data will be sent to the store-value card issuer 916 for authorization. Authorization data will be sent back to allow the new data value to be written on the store-value card 91 8. The software application will end 920 upon the completion of the transaction.

Claims

1. The present invention provides a system and methods for performing secure mobile financial transactions between an apparatus through a gateway processor via a communication protocol, using a transaction card.
2. An apparatus according to claim 1, wherein comprises of a transaction device, a communication device and a software application.
3. An apparatus according to claim 2, wherein the said transaction device comprises of a device selected from the group consisting of: a secure controller, an analog signal reader, a digital signal reader, a bar code reader, a magnetic stripe reader, an integrated circuit reader, a smartcard reader and writer, an EMV reader and writer, a (Near-Field Communication) NFC controller, pin entry device (PED), an optical scanner, an alphanumeric keypad, a crytopgraphic module and any combination thereof.
4. An apparatus according to claim 2, wherein the said transaction device comprises of an integrated EMV kernel with an operating system (OS), and a firmware.
5. An apparatus according to claim 2, wherein the said transaction card is selected from the group consisting of but not limited to: a debit card, a credit card, a cash card, smart card, a stored value card, an ATM card and any combination thereof.
6. An apparatus according to claim 2, wherein the said communication device communicates with the transaction device through a connectivity link.
7. An apparatus according to claim 6, wherein the said connectivity link is selected from the group consisting of cable, a wireless connection, an analog channel, a hands-free interface, a tethering interface, a Blue-tooth, a USB, a Wifi, radio frequency communication, microwave communication and infrared communication and any combination thereof.
8. An apparatus according to claim 3, wherein the said transaction device and the communication device is combined to share one housing.
9. An apparatus according to claim 2, wherein the said communication device receives data from the transaction device;
10. An apparatus according to claim 2, wherein the said communication device transmits data to the transaction device;
11. An apparatus according to claim 2, wherein the communication device transmits data to gateway processor;
12. An apparatus according to claim 2, wherein the communication device receives data from gateway processor;
13. An apparatus according to claim 2, wherein the said software application allows interaction between user and the system.
14. A system according to claim 1, wherein the communication protocol comprises of, but not limited to standardized interchange message format and ISO message format that exchange transactions information.
15. A system according to claim 11, wherein the standardized interchange message comprises of a message consisting: messages, data elements and code values, application, registration procedures codes, maintenance procedures for messages, data elements and code values and any combination thereof.
16. A system according to claim 1, wherein the said communication protocol may be sent wirelessly through, but not limited to Internet, GPRS, GSM, Wifi, radio frequency communication, microwave communication and infrared communication.
17. A system according to claim 1 , wherein the said gateway processor comprises of a crytographic module, a master key cryptographic module, hardware security (HS) module, a dynamic currency converter (DCC) module, a risk management module, terminal management module, and any combination thereof.
18. A system according to claim 1 , wherein all cryptographic keys used must reside within the transaction device.
19. A system according to claim 1 , wherein the transaction device stores all cryptographic keys within the internal Flash of the processor, or in the internal SRAM of the process during operation: Once loaded, functions to read the key from the device will be removed in the supplied source code.
20. A system according to claim 1 , wherein all cryptographic keys used by the transaction device must be unique per reader, with the exception of public keys which must be signed by a commercially recognized Certificate Authority.
21. A system according to claim 1 , wherein all account data read from either the analog signal reader, or a digital signal reader, or a bar code reader, or a magnetic stripe reader, or an integrated circuit reader, or a smartcard reader and writer, or an EMV reader and writer, or a (Near-Field Communication) NFC controller, or a pin entry device (PED), or an optical scanner, or an alphanumeric keypad, or a crytopgraphic module or any combination thereof of the transaction device is encrypted immediately upon entry into the transaction device and processed within the secure controller of the transaction device.
22. A system according to claim 1, wherein data is output encrypted under approved encryption algorithms, such as but not limited to ANSI X9 and ISO algorithm.
23. A system according to claim 1, wherein Plaintext sensitive card information is protected from being available to the communication device.
24. A system according to claim 1, wherein the gateway processor stores a master key.
25. A system according to claim 1, wherein the master key generates a primary key.
26. A system according to claim 1 , wherein the primary key generates a secondary key.
27. A system according to claim 1 , wherein the secure message transmission process from the apparatus to the gateway processor comprises of:
(a) the secondary key is shared between the gateway processor and the transaction device.
(b) the shared secondary key generates one-off keys.
(c) the transaction device ID is shared between the transaction device and gateway processor.
(d) the card data captured by the transaction device is encrypted by one-off key.
(e) the encrypted data is encapsulated with the transaction device ID to become an encapsulated message for transmission to gateway processor.
(f) the encapsulated message is decapsulated through the transaction device ID's authentication present in the gateway processor.
(g) the encrypted message is further decrypted with the one-off key generated by the shared secondary key, present in the gateway processor.
28. A system according to claim 1 , wherein the secure message transmission process from the gateway processor to the apparatus comprises of:
(a) the secondary key is shared between the gateway processor and the transaction device.
(b) the shared secondary key generates one-off keys.
(c) the transaction device ID is shared between the transaction device and gateway processor.
(d) the data sent from bank is encrypted by one-off key.
(e) the encrypted data is encapsulated with the transaction device ID to become an encapsulated message for transmission to apparatus.
(f) the encapsulated message is decapsulated through the transaction device ID's authentication present in the apparatus.
(g) the encrypted message is further decrypted with the one-off key generated by the shared secondary key, present in the apparatus.
29. A system according to claim 16, wherein the said risk management module may check whether there is a decision to be made under transaction with special circumstances. Such circumstances may comprise, but not limited to transaction ceiling limit, a velocity check, a higher-than-normal frequency rate of faulty card fallback to magnetic swipe, and a check on unusual offline transaction.
30. A system according to claim 16, wherein the said system management module may periodically check for, and automatically install any security update for the system.
31. A system according to claim 16, wherein the said dynamic currency conversion (DCC) allows customers to see the exact amount their transaction card will be charged, expressed in their home currency.
32. A security system of claim 1 , wherein the enhanced security features comprising: the capture of geolocation of payment transaction through GPS already present in the communication device, to be displayed on the electronic receipt;
33. A security system of claim 1 , wherein the enhanced security features comprising: the capture of image on the person associated with the financial transaction through digital camera already present in commuincation device, to be displayed on the electronic receipt; and
34. A security system of claim 1 , wherein the enhanced security features comprising: the capture of fingerprint through biometric identification already present in the communication device, to be displayed on the electronic receipt; and
35. A security system of claim 1, wherein the enhanced security features comprising: the identity morphing detection.
36. A method for re-writing a store- value card having data stored on a IC chip incorporated into the card, the method comprising the steps of:
(a) providing a transaction device comprising a reader, for capturing transaction card data;
(b) card data is encrypted by one-off key; providing a keypad for capturing PIN;
(c) entered PIN information is encrypted by one-off key;
(d) encrypted transaction message and PIN are encapsulated, together with transaction device identification for transmission;
(e) Encapsulated message is transmitted to the gateway processor via the communication protocol;
(f) gateway processor decapsulates the message;
(g) gateway processor decrypts the transaction message;
(h) gateway processor sends the decrypted message to bank for transaction authorization;
(i) gateway processor receives the authorized message from bank;
(j) gateway processor encrypts the message;
(k) gateway processor encapsulates the message for transmission via the communication protocol;
(1) software application decapsulates the message;
(m) software application decypts the message;
(n) user to enter top-up amount via the software application;
(o) providing a transaction device comprising a writer to rewrite the data stored in the IC chip incorporated into the store-value card;
37. The method of claim 29 further comprising the step of user swiping a magnetic swipe transaction card to allow transaction device to capture the card information.
38. The method of claim 29 further comprising the step of user chipping EMV or IC smart transaction card to allow transaction device to capture the card information.
39. The method of claim 29 further comprising the step of user tapping NFC transaction card to allow transaction device to capture the card information.
40. A method of using the mobile financial payment via the system in claim 1 , relating to a plurality of selectable financial instruments for effecting the financial payment to a payee.
41. The nethod in claim 33, wherein user can make financial payment to the selected payee comprising: a recurring bill, a bill from a billing aggregator, a bill from an individual bill company, a "pay to anyone" payment.
PCT/SG2013/000491 2012-11-20 2013-11-20 Secure mobile financial transaction system and methods Ceased WO2014081390A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
SG2014008379A SG2014008379A (en) 2012-11-20 2013-11-20 Secure mobile financial transaction system and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG201208519-7 2012-11-20
SG201208519 2012-11-20

Publications (1)

Publication Number Publication Date
WO2014081390A1 true WO2014081390A1 (en) 2014-05-30

Family

ID=50776424

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2013/000491 Ceased WO2014081390A1 (en) 2012-11-20 2013-11-20 Secure mobile financial transaction system and methods

Country Status (1)

Country Link
WO (1) WO2014081390A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107993062A (en) * 2017-11-27 2018-05-04 百富计算机技术(深圳)有限公司 POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
CN108028675A (en) * 2015-09-10 2018-05-11 凯瑟雷恩工厂两合公司 For launching and receiving the device of mobile radio signal by fixed antenna
WO2020009770A1 (en) * 2018-07-06 2020-01-09 Mastercard International Incorporated Systems and methods for authenticating users in connection with mobile operations

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1286285A1 (en) * 2000-05-15 2003-02-26 NTT DoCoMo, Inc. Authentication system and method
US20040127256A1 (en) * 2002-07-30 2004-07-01 Scott Goldthwaite Mobile device equipped with a contactless smart card reader/writer
US7290141B2 (en) * 2002-06-27 2007-10-30 Nokia, Inc. Authentication of remotely originating network messages
US20080040265A1 (en) * 2006-07-06 2008-02-14 Firethorn Holdings, Llc Methods and Systems For Making a Payment Via A Stored Value Card in a Mobile Environment
US20100332400A1 (en) * 2009-06-24 2010-12-30 Craig Stephen Etchegoyen Use of Fingerprint with an On-Line or Networked Payment Authorization System

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1286285A1 (en) * 2000-05-15 2003-02-26 NTT DoCoMo, Inc. Authentication system and method
US7290141B2 (en) * 2002-06-27 2007-10-30 Nokia, Inc. Authentication of remotely originating network messages
US20040127256A1 (en) * 2002-07-30 2004-07-01 Scott Goldthwaite Mobile device equipped with a contactless smart card reader/writer
US20080040265A1 (en) * 2006-07-06 2008-02-14 Firethorn Holdings, Llc Methods and Systems For Making a Payment Via A Stored Value Card in a Mobile Environment
US20100332400A1 (en) * 2009-06-24 2010-12-30 Craig Stephen Etchegoyen Use of Fingerprint with an On-Line or Networked Payment Authorization System

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108028675A (en) * 2015-09-10 2018-05-11 凯瑟雷恩工厂两合公司 For launching and receiving the device of mobile radio signal by fixed antenna
CN108028675B (en) * 2015-09-10 2020-05-08 凯瑟雷恩欧洲股份公司 Device for transmitting and receiving mobile radio signals by means of a fixed antenna
CN107993062A (en) * 2017-11-27 2018-05-04 百富计算机技术(深圳)有限公司 POS terminal method of commerce, device, computer equipment and readable storage medium storing program for executing
WO2020009770A1 (en) * 2018-07-06 2020-01-09 Mastercard International Incorporated Systems and methods for authenticating users in connection with mobile operations
US10810585B2 (en) 2018-07-06 2020-10-20 Mastercard International Incorporated Systems and methods for authenticating users in connection with mobile operations

Similar Documents

Publication Publication Date Title
US11238431B2 (en) Credit payment method and apparatus based on card emulation of mobile terminal
US8025223B2 (en) System and method for mass transit merchant payment
US11210650B2 (en) Credit payment method and apparatus based on mobile terminal embedded secure element
JP5940176B2 (en) Hub and spoke PIN confirmation
US9547861B2 (en) System and method for wireless communication with an IC chip for submission of pin data
US20130226800A1 (en) System and Method for Authenticating a Payment Transaction
US20090132424A1 (en) Secure payment capture processes
KR20180108647A (en) Data interaction method and apparatus, and offline credit payment method and apparatus
CN105590199A (en) Payment method and payment system based on dynamic two-dimensional code
CN111371835A (en) Mobile phone digital currency wallet based payment method and device and mobile terminal
US9996830B2 (en) Split message initiated payment system, method and apparatus
CN105339965A (en) Self authentication
KR20110084865A (en) Mobile credit card payment method and device using mobile ID and contact / contactless communication
US20250053964A1 (en) Secure contactless credential exchange
US12399758B2 (en) Mobile application integration
US10121038B2 (en) Dynamic barcode ticketing carrying encrypted validation transactions
WO2014081390A1 (en) Secure mobile financial transaction system and methods
US20190097803A1 (en) Encrypted reverse biometric token validation
US20160217453A1 (en) System and method for authentication
CN117999567A (en) Device security with one-way functions
US20140201014A1 (en) Process for payment by cell phone to a merchant object of the invention
KR20090091893A (en) Method for settling affiliated store, van server, settlement process server and recording medium
KR20080114651A (en) Prepaid Card Charging System
TWM654281U (en) Electronic payment system for vehicle
KR101757762B1 (en) Server for accumulating small change and method of providing service for accumulating small change using the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13856118

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28.09.2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13856118

Country of ref document: EP

Kind code of ref document: A1