GB2332833A - Secure credit card transactions over the internet - Google Patents

Secure credit card transactions over the internet Download PDF

Info

Publication number
GB2332833A
GB2332833A GB9727369A GB9727369A GB2332833A GB 2332833 A GB2332833 A GB 2332833A GB 9727369 A GB9727369 A GB 9727369A GB 9727369 A GB9727369 A GB 9727369A GB 2332833 A GB2332833 A GB 2332833A
Authority
GB
United Kingdom
Prior art keywords
party
message
sending
encryption device
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9727369A
Other versions
GB9727369D0 (en
Inventor
Simon Hichens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INTERACTIVE MAGAZINES Ltd
Original Assignee
INTERACTIVE MAGAZINES Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by INTERACTIVE MAGAZINES Ltd filed Critical INTERACTIVE MAGAZINES Ltd
Priority to GB9727369A priority Critical patent/GB2332833A/en
Publication of GB9727369D0 publication Critical patent/GB9727369D0/en
Priority to PCT/GB1998/003899 priority patent/WO1999034547A1/en
Priority to AU17750/99A priority patent/AU1775099A/en
Publication of GB2332833A publication Critical patent/GB2332833A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • H04K1/10Secret communication by using two signals transmitted simultaneously or successively

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A first party C wishing to make a purchase over the Internet splits a message containing confidential information such as credit card number, name etc into two parts. A first part is sent to the seller or second party B, and the other part is sent directly to a trusted third party A such as a credit card company. The seller processes its part of the information and forwards it on to the trusted third party who is then in possession of all the information necessary to process the transaction. Even if one part of the message is intercepted, the security of the whole message is not necessarily compromised. The individual parts of the message may be encrypted and may incorporate public/private key systems. For certain transactions, a password or PIN number may be sent off line to the third party.

Description

MESSAGE COMMUNICATION METHOD This invention relates to a method of communicating a message and in particular to improvements in security such as in an electronic network.
One data transfer method currently used on the Internet is known as PGP (pretty good privacy) public key/private key method. For transmitting data between a sender and a receiver, the receiver first randomly generates a public enciphering key and a secret deciphering key. The enciphering key and transformation algorithm or software can be publicly disseminated. The transformation uses operations that are easily performed, but difficult to invert. When the sender wishes to transmit a message to the receiver, the message is encrypted using the public key and transformation before it is transmitted. The receiver can use his secret deciphering key to recover the original message. Such a system is disclosed in US 4,218,582.
Although perceived as relatively safe, this method has the drawback that if the enciphered message is intercepted, powerful computers can now in fact decipher it without first knowing the receiver's private key. The messages are even more vulnerable if the algorithms are restricted to short keys such as forty bits. Further problems are the limited availability and lack of public acceptance of this method.
It is an object of this invention to alleviate, at least partially, some or all of the above problems.
Accordingly the present invention provides a method of communicating a message from a first party comprising the steps of: splitting into first and second parts the message to be communicated by the first party; sending the first part of the split message from the first party to a second party; sending the second part of the split message from the first party to a third party; processing at the second party the data which comprises the first part of the message and sending that part of the message on to the third party; receiving both parts of the message at the third party and uniting them to obtain the full message.
Splitting the data into two parts has the advantage that even if one part is intercepted the security of the whole message is not necessarily compromised. Sending the parts via different routes increases the security. The use of three parties encourages confidence in the method of communication since it is possible for each party to know at least one of the other parties in advance. The method also has the advantage that it enables a transaction to be performed with one of the parties never receiving the full transmitted data and permits a trusted third party to be involved for independent control and security.
Further optionally preferred features of the invention are included in the dependent claims. Advantages include increased security and the ability of a sender to transmit a secure message without itself previously holding a sophisticated encryption program.
Embodiments of the invention will now be described by way of example only, with reference to the accompanying drawings in which: Fig. 1 shows an example of a communication involving three parties according to the invention; and Fig. 2 shows stages of a method according to the invention.
Referring to Fig. 1, in a typical situation, a party C wants to perform a transaction with a party B which involves C sending sensitive information. For example, C might be a customer and B might be offering goods or services for sale via the Internet. C wants to make a payment to B, however it is not desirable for C to send e.g. a credit card number to B for two reasons. Firstly, an electronic message containing the credit card number might be intercepted by third parties and is not secure even if encrypted, which might result in misuse of the credit card number, and secondly, C may not have established a relationship with B and might fear misuse of or insufficient security over its credit card number by B.
In addition, both parties might be wary of a transaction with an unknown party purely via e-mail with no authentification of the other party.
Consequently, the following method is used, which is an example according to the invention, and will be described as a sequence of stages which are summarised in Fig. 2.
Stage 1.
B obtains software which will be used to implement the method. The software includes encrypting algorithm < 1 > .
Another party referred to as A, holds a reference that software with unique algorithm < 1 > is used by B. In the present example, party A might be a credit card company. B may obtain the software from a network site, e.g. an Internet; web or FTP site, or off-line e.g. by means of a CD ROM. The software may be distributed directly by A or by another party, provided B is registered at A as user of that software and algorithm.
Stage 2.
C enters into correspondence with B. This could be by C visiting a World Wide Web site or other information source displaying opportunities available from B, and C then contacts B with the intent of exploring these opportunities.
The correspondence may be partially automated for example by the web site sending an application to C which might be in the form of a Java (trademark) applet. The Java applet, being platform independent, could command C's web browser to execute automatically a preformatted e-mail. C could enter information such as name, quantity of items it is interested in purchasing. The applet ensures that the e-mail is correctly addressed to B and addressed as emanating from C.
This avoids errors and falsifications of the address given by C. As an alternative to C approaching B via a web site or similar, B may make direct contact with C.
Stage 3.
B activates the software received at stage 1 and processes the correspondence from C indicating C's interest.
The software randomly generates an encrypting algorithm < 2 > which might for example be expressed as a code comprising a sequence of numbers which represents operations to be performed on data to be encrypted. B retains the code for algorithm < 2 > and also registers a reference to the transaction with C. The software then sends an application, such as a Java applet from B to C. The application includes means for encoding according to the algorithm < 2 > and also the reference for the transaction. The references may be encrypted but identifiable as coming from B. The transmission from B to C may represent an offer in contractual terms.
Stage 4.
The application sent from B to C now runs on C's computer and may display the terms of the offer. There may be more than one offer available and there may be a time constraint such as a period for acceptance of the offer after which the offer expires. To accept the offer, in one version party C enters information into the application such as his name and credit card number and then activates an acceptance "button" provided by the application. The application then encrypts the entered information using a randomly generated algorithm < 3 > . The code defining algorithm < 3 > is appended to the encrypted message and the whole is then re-encrypted and split according to algorithm < 2 > . One part of the split message is sent to A and one part is sent to B, as indicated by arrows 10 and 20 in Fig. 1. In a simple form of splitting, the application transmits an encrypted acceptance to B and credit card details excluding name to A.
Further security measures could be taken to avoid the encryption algorithms from being cracked and hence the message being deciphered by an unauthorised party. One possibility is that the application that does the encrypting destroys itself after use or after the offer has expired, another is that the application has a built-in time delay each time it is used or significantly expands in file size on each use. A further enhancement is staggering the sending of data to A and B. For instance C might break off his dial-up connection to the internet having sent the part of the message to B and then establish a direct connection to A to send the other part of the message. Similarly, one part of the message could be sent via a different medium to the other.
Stage 5.
B receives the part of the message from C, appends the code for algorithm < 2 > and then re-encrypts the message using algorithm cl > and sends the results to A, as indicated by arrow 30 in Fig. 1. B may then await confirmation from A concerning the credit card transaction before supplying the goods or services to C. For security, B could also destroy the message from C and the reference to algorithm < 2 > .
Stage 6.
A receives the messages from B and C which include reference to each other, e.g. by the transaction reference number B has already registered with A as user of algorithm < 1 > , so A can decrypt the highest level of encryption of the message from B which will reveal the appended code for algorithm < 2 > . A can then decrypt the algorithm < 2 > coding of the resulting message from B and the message from C. The reverse of algorithm < 2 > also unites the two parts of the split message and yields the appended decrypted code for algorithm < 3 > . The united message can finally be decrypted by the reverse of algorithm < 3 > . A should have a high level of so-called "fire wall" security to protect the decrypted information and other sensitive data in its records.
Stage 7.
A acts on the instructions in the deciphered message for example by debiting C's credit card account and/or crediting B's account. A might be an intermediary who instructs a financial institution over a secure means regarding the transfer of funds in relation to the transaction between B and C.
Some further variations and optional features of the invention will now be described.
C might send B part of the message (e.g. name) at an earlier time in the correspondence such as at stage 2 rather than stage 4. B sends this onto A, preferably with encryption. C and A then communicate to complete the transaction.
Responsibility over security could be transferred to a fourth party, for example B sends its part of the encrypted message to the fourth party instead of to A. A also forwards its part of the message from C to the fourth party. The fourth party then decrypts and unites the message.
The operations performed by B may be automated to some extent. For example the software associated with algorithm < 1 > could do one or more of the following: recognise interest from C and send out the appropriate offer application and algorithm < 2,; securely reference the transaction to algorithm < 2 > ; recognise returned acceptances, process them and update appropriate records; send out encrypted messages to A; and destroy the message received from C and references to algorithm < 2,.
For certain transactions, a password or personal identification number (PIN) may be used. A could send C a password or PIN off line by any safe medium other than that used for the transaction. For example, C could receive a PIN by post from a bank A. C would then include the PIN in the message that is encrypted and transmitted to A. On decryption, A would verify the PIN before effecting the transaction. The PIN can be changed off-line as often as required.
Some simple illustrative examples of the encrypting algorithms are as follows: firstly the information entered by C, such as credit card number and name, is converted into a sequence of numbers, for example using those corresponding to a standard character set e.g. ASCII. Algorithm < 3 > , which is randomly generated by the application at C, is then applied to the sequence of numbers. An example might be: to each number add 9 and the previous result. (In these examples all arithmetic is done in modulo 256 or whatever the total number of character codes being used is). The operations of algorithm < 3 > can be represented compactly as a short sequence of digits which can be interpreted by deciphering software to reverse the algorithm. The short sequence of digits is referred to as the algorithm code.
Algorithm < 2 > is randomly generated at B in the embodiment described above, and is also representable by a code series of numbers, which are registered at B. Algorithm < 2 > can include both encrypting and splitting operations, for example: Step 1: Take the message encrypted according to algorithm < 3 > ; place the algorithm < 3 > code at the beginning; add 1 to the 1st number, 3 to the 2nd number and 7 to the 3rd and repeat for the 4th, 5th and 6th numbers and so on.
Step 2: Split the resulting sequence of numbers by placing the 1st, 3rd, 5th and odd position numbers in message 1 and the numbers in the even positions in message 2; reverse the order of the numbers in messages 1 and 2; add a reference number to the transaction to the end of each message.
Message 1 is then sent to B and message 2 to A. B then performs algorithm < 1 > on message 1. Examples of the operations of algorithm < 1 > are: place the code for algorithm < 2 > in reverse order starting from position 6 in message 1 received from C. Add 12 to the first number 25 to the second number and repeat for every pair of numbers, place numbers representing the amount of money to be transferred at the end and include a code number indicating currency; add 26 to all values plus 6 for each place from the beginning; include a reference to the transaction and party B; finally send to A (A already knows algorithm < 1 > , for example by its algorithm code, and that B is registered as user of that algorithm).
Much more complex algorithms can of course be used for example including a public key/private key system.

Claims (12)

  1. CLAIMS 1. A method of communicating a message from a first party comprising the steps of: splitting into first and second parts the message to be communicated by the first party; sending the first part of the split message from the first party to a second party; sending the second part of the split message from the first party to a third party; processing at the second party the data which comprises the first part of the message and sending that part of the message on to the third party; receiving both parts of the message at the third party and uniting them to obtain the full message.
  2. 2. A method according to claim 1, further comprising the steps of: applying at the first party a first encryption device so that one or both parts of the split message are encrypted before being sent; sending a reference to the first encryption device to said third party; and applying the reverse of the first encryption device at the third party to produce a decrypted united message.
  3. 3. A method according to claim 1 or 2, wherein the step of processing comprises: applying at the second party a second encryption algorithm to said first part of the split message before sending that part on to the third party; and sending reference to the second encryption device to the third party, and wherein the method further comprises the step of applying the reverse of the second encryption device to said first part of the message received at the third party.
  4. 4. A method according to claim 2 or claim 3 when appendent to claim 2, further comprising the steps of: randomly generating the first encryption device at the second party; and sending the first encryption device from the second party to the first party.
  5. 5. A method according to claim 4, further comprising the step of: sending an offer with said first encrypting device, from said second party to said first party, wherein said first party has a limited period of time in which to respond to the offer.
  6. 6. A method according to claim 4 or 5, further comprising the step of: sending from the second party to the first party an application which includes the randomly generated first encryption device and also includes a device for splitting and sending the data.
  7. 7. A method according to claim 6, wherein said application is in the form of a non-platform specific computer program.
  8. 8. A method according to claim 6 or 7, further comprising the steps of: generating a random third encryption device by the application at the second party; and applying said third device to the message to be communicated before the message is encrypted by said first encryption device, split and sent.
  9. 9. A method according to any one of the claims 3 to 8, wherein said second encryption device forms part of an application which controls the sending, encrypting and splitting of messages, and wherein said second encryption device is referenced to the second party in records available to the third party.
  10. 10. A method according to any one of the preceding claims, wherein there is a time delay between sending the first and second parts of the message from the first party.
  11. 11. A method according to any one of the preceding claims, wherein said first party uses a password to authenticate transmissions, said password being known by said third party and being communicated to said first party by means other than those used for sending said message.
  12. 12. A method according to any one of the preceding claims, wherein said message is sent over an internet, extranet or intranet.
GB9727369A 1997-12-24 1997-12-24 Secure credit card transactions over the internet Withdrawn GB2332833A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB9727369A GB2332833A (en) 1997-12-24 1997-12-24 Secure credit card transactions over the internet
PCT/GB1998/003899 WO1999034547A1 (en) 1997-12-24 1998-12-23 Secret communication method between three participants
AU17750/99A AU1775099A (en) 1997-12-24 1998-12-23 Secret communication method between three participants

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9727369A GB2332833A (en) 1997-12-24 1997-12-24 Secure credit card transactions over the internet

Publications (2)

Publication Number Publication Date
GB9727369D0 GB9727369D0 (en) 1998-02-25
GB2332833A true GB2332833A (en) 1999-06-30

Family

ID=10824248

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9727369A Withdrawn GB2332833A (en) 1997-12-24 1997-12-24 Secure credit card transactions over the internet

Country Status (3)

Country Link
AU (1) AU1775099A (en)
GB (1) GB2332833A (en)
WO (1) WO1999034547A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2339125A (en) * 1998-05-12 2000-01-12 Ibm A mechanism for secure tendering in an open electronic network
WO2000018078A1 (en) * 1998-09-17 2000-03-30 Sopuch David J Secure message exchange method using intermediaries
NL1013370C2 (en) * 1999-10-21 2000-10-03 Ewout Timo Schuringa Method for paying small amounts for goods, services or information obtained via the Internet, uses premium rate telephone calls to transfer funds
DE10003180A1 (en) * 2000-01-25 2001-07-26 Eduard Seleny Method for protecting against economic risks in e-commerce businesses uses telecommunications methods and telecommunications devices for automatic allocation of a registration number to protect against such risks.
WO2001099379A1 (en) * 2000-06-19 2001-12-27 Martin Gilbert Secure communications method
EP1172776A2 (en) * 2000-07-15 2002-01-16 ED Vision (Holdings) Limited Interactive authentication process
WO2002021469A2 (en) * 2000-09-05 2002-03-14 Ed Vision (Holdings) Limited Interactive authentication process
EP1189180A2 (en) * 2000-07-17 2002-03-20 Pioneer Corporation Information service providing method
GB2370475A (en) * 2000-12-22 2002-06-26 Hewlett Packard Co Secure online transaction where a buyer sends some information direct to a bank and some via a vendor
EP1218838A1 (en) * 1999-09-07 2002-07-03 Epacific Inc. Method of and system for authorizing purchases made over a computer network
GB2372616A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Transaction method and apparatus using two part tokens
FR2828966A1 (en) * 2001-08-23 2003-02-28 Schlumberger Systems & Service Secure communication of identification data for a limited use Internet transaction payment card, splits data into distinct packets and transmits each packet over distinct networks
FR2843664A1 (en) * 2002-08-16 2004-02-20 Alain Deblock System for the secure transmission of a confidential code over disjoint telecommunication networks having different protocols, used for commercial transactions over the internet, transmits information via neutral intermediary party
EP1463011A3 (en) * 2002-12-30 2006-05-10 Luigi Cicione Method for authorising mandates of payment, in particular for payments carried out on the internet by credit cards, and related system
WO2006118535A2 (en) * 2005-05-04 2006-11-09 Ekonomi & Juridik Lars Waldenström Method and device for transferring digital information
WO2011141062A1 (en) * 2010-05-12 2011-11-17 Novelty Group Limited Payment system, procedure for producing at least one code pair for authorizing a debit operation, and method for carrying out a payment operation
EP2560101A3 (en) * 2002-04-11 2013-08-14 Splitlock Holdings Pty Ltd Information storage system
EP2991014A1 (en) * 2014-08-25 2016-03-02 Oberthur Technologies Distributing tokens for token-based transactions

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI112417B (en) * 1999-10-13 2003-11-28 Helsingin Puhelin Oyj Transmission of confidential information
US6745231B1 (en) * 2000-08-08 2004-06-01 International Business Machines Corporation System for securing electronic mail
FI118619B (en) * 2003-05-16 2008-01-15 Jarmo Talvitie Method and system for encrypting and storing information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4802220A (en) * 1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security
WO1996029667A1 (en) * 1995-03-20 1996-09-26 Sandberg Diment Erik Providing verification information for a transaction
WO1996036025A2 (en) * 1995-05-11 1996-11-14 Mondex International Limited Value transfer system
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
EP0791901A2 (en) * 1996-02-21 1997-08-27 Card Call Service Co., Ltd. Network transaction system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2222057B (en) * 1988-04-19 1992-09-23 Carridice Ltd Electro-magnetic broadcast access control method
DE4420970A1 (en) * 1994-06-16 1995-12-21 Esd Vermoegensverwaltungsgesel Decryption device for decryption algorithms and method for performing the encryption and decryption thereof
US5724423A (en) * 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4802220A (en) * 1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security
WO1996029667A1 (en) * 1995-03-20 1996-09-26 Sandberg Diment Erik Providing verification information for a transaction
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
WO1996036025A2 (en) * 1995-05-11 1996-11-14 Mondex International Limited Value transfer system
EP0791901A2 (en) * 1996-02-21 1997-08-27 Card Call Service Co., Ltd. Network transaction system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
COMPUTER Abstract Accession No. 02112564 & Windows Sources Vol. 4, No. 11, November 1997, p193 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2339125A (en) * 1998-05-12 2000-01-12 Ibm A mechanism for secure tendering in an open electronic network
GB2339125B (en) * 1998-05-12 2003-06-18 Ibm A mechanism for secure tendering in an open electronic network
US6363365B1 (en) 1998-05-12 2002-03-26 International Business Machines Corp. Mechanism for secure tendering in an open electronic network
WO2000018078A1 (en) * 1998-09-17 2000-03-30 Sopuch David J Secure message exchange method using intermediaries
EP1218838A4 (en) * 1999-09-07 2006-01-25 Epacific Inc Method of and system for authorizing purchases made over a computer network
EP2851854A1 (en) * 1999-09-07 2015-03-25 Mastercard International Incorporated Method of and system for making purchases over a computer network
EP1218838A1 (en) * 1999-09-07 2002-07-03 Epacific Inc. Method of and system for authorizing purchases made over a computer network
EP1218837A1 (en) * 1999-09-07 2002-07-03 Epacific Inc. Method of and system for making purchases over a computer network
EP1218837A4 (en) * 1999-09-07 2006-01-18 Epacific Inc Method of and system for making purchases over a computer network
NL1013370C2 (en) * 1999-10-21 2000-10-03 Ewout Timo Schuringa Method for paying small amounts for goods, services or information obtained via the Internet, uses premium rate telephone calls to transfer funds
DE10003180A1 (en) * 2000-01-25 2001-07-26 Eduard Seleny Method for protecting against economic risks in e-commerce businesses uses telecommunications methods and telecommunications devices for automatic allocation of a registration number to protect against such risks.
WO2001099379A1 (en) * 2000-06-19 2001-12-27 Martin Gilbert Secure communications method
EP1172776A2 (en) * 2000-07-15 2002-01-16 ED Vision (Holdings) Limited Interactive authentication process
EP1172776A3 (en) * 2000-07-15 2002-10-16 ED Vision (Holdings) Limited Interactive authentication process
EP1189180A2 (en) * 2000-07-17 2002-03-20 Pioneer Corporation Information service providing method
EP1189180A3 (en) * 2000-07-17 2003-12-17 Pioneer Corporation Information service providing method
WO2002021469A3 (en) * 2000-09-05 2002-11-28 Ed Vision Holdings Ltd Interactive authentication process
WO2002021469A2 (en) * 2000-09-05 2002-03-14 Ed Vision (Holdings) Limited Interactive authentication process
GB2370475A (en) * 2000-12-22 2002-06-26 Hewlett Packard Co Secure online transaction where a buyer sends some information direct to a bank and some via a vendor
US7113930B2 (en) 2001-02-23 2006-09-26 Hewlett-Packard Development Company, L.P. Conducting transactions
GB2372616A (en) * 2001-02-23 2002-08-28 Hewlett Packard Co Transaction method and apparatus using two part tokens
FR2828966A1 (en) * 2001-08-23 2003-02-28 Schlumberger Systems & Service Secure communication of identification data for a limited use Internet transaction payment card, splits data into distinct packets and transmits each packet over distinct networks
EP2560101A3 (en) * 2002-04-11 2013-08-14 Splitlock Holdings Pty Ltd Information storage system
FR2843664A1 (en) * 2002-08-16 2004-02-20 Alain Deblock System for the secure transmission of a confidential code over disjoint telecommunication networks having different protocols, used for commercial transactions over the internet, transmits information via neutral intermediary party
WO2004017269A1 (en) * 2002-08-16 2004-02-26 Alain Deblock Method and system for the secure transmission of a confidential code through a telecommunication network
EP1463011A3 (en) * 2002-12-30 2006-05-10 Luigi Cicione Method for authorising mandates of payment, in particular for payments carried out on the internet by credit cards, and related system
WO2006118535A2 (en) * 2005-05-04 2006-11-09 Ekonomi & Juridik Lars Waldenström Method and device for transferring digital information
WO2006118535A3 (en) * 2005-05-04 2007-01-04 Ekonomi & Juridik Lars Waldens Method and device for transferring digital information
WO2011141062A1 (en) * 2010-05-12 2011-11-17 Novelty Group Limited Payment system, procedure for producing at least one code pair for authorizing a debit operation, and method for carrying out a payment operation
EP2991014A1 (en) * 2014-08-25 2016-03-02 Oberthur Technologies Distributing tokens for token-based transactions

Also Published As

Publication number Publication date
GB9727369D0 (en) 1998-02-25
AU1775099A (en) 1999-07-19
WO1999034547A1 (en) 1999-07-08

Similar Documents

Publication Publication Date Title
GB2332833A (en) Secure credit card transactions over the internet
JP2746352B2 (en) Secure security communication system and method for communication by a remotely located computer
US7387240B2 (en) System and method of secure information transfer
US6269445B1 (en) Electronic shopping method, electronic shopping system and document authenticating method relating thereto
US4912762A (en) Management of cryptographic keys
US6061791A (en) Initial secret key establishment including facilities for verification of identity
US5784463A (en) Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
EP1873960B1 (en) Method for session key derivation in a IC card
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
JP2689383B2 (en) Encrypted communication system
US6377688B1 (en) Cryptographic communication method and system
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
US7147157B2 (en) Secure remote-control unit
WO2005045617A2 (en) Portable security transaction protocol
EP0225010B1 (en) A terminal for a system requiring secure access
JPH09233068A (en) Electronic verification system
KR101110777B1 (en) Method and terminal of preventing parameter from forging/alternating
KR19980048462A (en) Credit card based electronic payment method
JPH09153014A (en) Terminal equipment for electronic network
Djuric IPS-secure Internet payment system
JPH04118777A (en) Electronic signature method by ic card
JP2003309552A (en) Control system for electronic certificate by portable telephone
JPH07297819A (en) Method and means for processing combination of individual collation with encipherment of message authentication to network transmission
KR100323138B1 (en) Electronic payment method for protecting trust information and computer-readable medium recording the method
WO2000067447A1 (en) Improvements in and relating to secure data transmission

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)