GB2332833A - Secure credit card transactions over the internet - Google Patents
Secure credit card transactions over the internet Download PDFInfo
- Publication number
- GB2332833A GB2332833A GB9727369A GB9727369A GB2332833A GB 2332833 A GB2332833 A GB 2332833A GB 9727369 A GB9727369 A GB 9727369A GB 9727369 A GB9727369 A GB 9727369A GB 2332833 A GB2332833 A GB 2332833A
- Authority
- GB
- United Kingdom
- Prior art keywords
- party
- message
- sending
- encryption device
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
- H04K1/10—Secret communication by using two signals transmitted simultaneously or successively
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A first party C wishing to make a purchase over the Internet splits a message containing confidential information such as credit card number, name etc into two parts. A first part is sent to the seller or second party B, and the other part is sent directly to a trusted third party A such as a credit card company. The seller processes its part of the information and forwards it on to the trusted third party who is then in possession of all the information necessary to process the transaction. Even if one part of the message is intercepted, the security of the whole message is not necessarily compromised. The individual parts of the message may be encrypted and may incorporate public/private key systems. For certain transactions, a password or PIN number may be sent off line to the third party.
Description
MESSAGE COMMUNICATION METHOD
This invention relates to a method of communicating a message and in particular to improvements in security such as in an electronic network.
One data transfer method currently used on the Internet is known as PGP (pretty good privacy) public key/private key method. For transmitting data between a sender and a receiver, the receiver first randomly generates a public enciphering key and a secret deciphering key. The enciphering key and transformation algorithm or software can be publicly disseminated. The transformation uses operations that are easily performed, but difficult to invert. When the sender wishes to transmit a message to the receiver, the message is encrypted using the public key and transformation before it is transmitted. The receiver can use his secret deciphering key to recover the original message. Such a system is disclosed in US 4,218,582.
Although perceived as relatively safe, this method has the drawback that if the enciphered message is intercepted, powerful computers can now in fact decipher it without first knowing the receiver's private key. The messages are even more vulnerable if the algorithms are restricted to short keys such as forty bits. Further problems are the limited availability and lack of public acceptance of this method.
It is an object of this invention to alleviate, at least partially, some or all of the above problems.
Accordingly the present invention provides a method of communicating a message from a first party comprising the steps of:
splitting into first and second parts the message to be communicated by the first party;
sending the first part of the split message from the first party to a second party;
sending the second part of the split message from the first party to a third party;
processing at the second party the data which comprises the first part of the message and sending that part of the message on to the third party;
receiving both parts of the message at the third party and uniting them to obtain the full message.
Splitting the data into two parts has the advantage that even if one part is intercepted the security of the whole message is not necessarily compromised. Sending the parts via different routes increases the security. The use of three parties encourages confidence in the method of communication since it is possible for each party to know at least one of the other parties in advance. The method also has the advantage that it enables a transaction to be performed with one of the parties never receiving the full transmitted data and permits a trusted third party to be involved for independent control and security.
Further optionally preferred features of the invention are included in the dependent claims. Advantages include increased security and the ability of a sender to transmit a secure message without itself previously holding a sophisticated encryption program.
Embodiments of the invention will now be described by way of example only, with reference to the accompanying drawings in which:
Fig. 1 shows an example of a communication involving three parties according to the invention; and
Fig. 2 shows stages of a method according to the invention.
Referring to Fig. 1, in a typical situation, a party C wants to perform a transaction with a party B which involves
C sending sensitive information. For example, C might be a customer and B might be offering goods or services for sale via the Internet. C wants to make a payment to B, however it is not desirable for C to send e.g. a credit card number to B for two reasons. Firstly, an electronic message containing the credit card number might be intercepted by third parties and is not secure even if encrypted, which might result in misuse of the credit card number, and secondly, C may not have established a relationship with B and might fear misuse of or insufficient security over its credit card number by B.
In addition, both parties might be wary of a transaction with an unknown party purely via e-mail with no authentification of the other party.
Consequently, the following method is used, which is an example according to the invention, and will be described as a sequence of stages which are summarised in Fig. 2.
Stage 1.
B obtains software which will be used to implement the method. The software includes encrypting algorithm < 1 > .
Another party referred to as A, holds a reference that software with unique algorithm < 1 > is used by B. In the present example, party A might be a credit card company. B may obtain the software from a network site, e.g. an
Internet; web or FTP site, or off-line e.g. by means of a CD
ROM. The software may be distributed directly by A or by another party, provided B is registered at A as user of that software and algorithm.
Stage 2.
C enters into correspondence with B. This could be by C visiting a World Wide Web site or other information source displaying opportunities available from B, and C then contacts B with the intent of exploring these opportunities.
The correspondence may be partially automated for example by the web site sending an application to C which might be in the form of a Java (trademark) applet. The Java applet, being platform independent, could command C's web browser to execute automatically a preformatted e-mail. C could enter information such as name, quantity of items it is interested in purchasing. The applet ensures that the e-mail is correctly addressed to B and addressed as emanating from C.
This avoids errors and falsifications of the address given by
C. As an alternative to C approaching B via a web site or similar, B may make direct contact with C.
Stage 3.
B activates the software received at stage 1 and processes the correspondence from C indicating C's interest.
The software randomly generates an encrypting algorithm < 2 > which might for example be expressed as a code comprising a sequence of numbers which represents operations to be performed on data to be encrypted. B retains the code for algorithm < 2 > and also registers a reference to the transaction with C. The software then sends an application, such as a Java applet from B to C. The application includes means for encoding according to the algorithm < 2 > and also the reference for the transaction. The references may be encrypted but identifiable as coming from B. The transmission from B to C may represent an offer in contractual terms.
Stage 4.
The application sent from B to C now runs on C's computer and may display the terms of the offer. There may be more than one offer available and there may be a time constraint such as a period for acceptance of the offer after which the offer expires. To accept the offer, in one version party C enters information into the application such as his name and credit card number and then activates an acceptance "button" provided by the application. The application then encrypts the entered information using a randomly generated algorithm < 3 > . The code defining algorithm < 3 > is appended to the encrypted message and the whole is then re-encrypted and split according to algorithm < 2 > . One part of the split message is sent to A and one part is sent to B, as indicated by arrows 10 and 20 in Fig. 1. In a simple form of splitting, the application transmits an encrypted acceptance to B and credit card details excluding name to A.
Further security measures could be taken to avoid the encryption algorithms from being cracked and hence the message being deciphered by an unauthorised party. One possibility is that the application that does the encrypting destroys itself after use or after the offer has expired, another is that the application has a built-in time delay each time it is used or significantly expands in file size on each use. A further enhancement is staggering the sending of data to A and B. For instance C might break off his dial-up connection to the internet having sent the part of the message to B and then establish a direct connection to A to send the other part of the message. Similarly, one part of the message could be sent via a different medium to the other.
Stage 5.
B receives the part of the message from C, appends the code for algorithm < 2 > and then re-encrypts the message using algorithm cl > and sends the results to A, as indicated by arrow 30 in Fig. 1. B may then await confirmation from A concerning the credit card transaction before supplying the goods or services to C. For security, B could also destroy the message from C and the reference to algorithm < 2 > .
Stage 6.
A receives the messages from B and C which include reference to each other, e.g. by the transaction reference number B has already registered with A as user of algorithm < 1 > , so A can decrypt the highest level of encryption of the message from B which will reveal the appended code for algorithm < 2 > . A can then decrypt the algorithm < 2 > coding of the resulting message from B and the message from C. The reverse of algorithm < 2 > also unites the two parts of the split message and yields the appended decrypted code for algorithm < 3 > . The united message can finally be decrypted by the reverse of algorithm < 3 > . A should have a high level of so-called "fire wall" security to protect the decrypted information and other sensitive data in its records.
Stage 7.
A acts on the instructions in the deciphered message for example by debiting C's credit card account and/or crediting
B's account. A might be an intermediary who instructs a financial institution over a secure means regarding the transfer of funds in relation to the transaction between B and C.
Some further variations and optional features of the invention will now be described.
C might send B part of the message (e.g. name) at an earlier time in the correspondence such as at stage 2 rather than stage 4. B sends this onto A, preferably with encryption. C and A then communicate to complete the transaction.
Responsibility over security could be transferred to a fourth party, for example B sends its part of the encrypted message to the fourth party instead of to A. A also forwards its part of the message from C to the fourth party. The fourth party then decrypts and unites the message.
The operations performed by B may be automated to some extent. For example the software associated with algorithm < 1 > could do one or more of the following:
recognise interest from C and send out the appropriate offer application and algorithm < 2,; securely reference the transaction to algorithm < 2 > ;
recognise returned acceptances, process them and update appropriate records;
send out encrypted messages to A; and
destroy the message received from C and references to algorithm < 2,.
For certain transactions, a password or personal identification number (PIN) may be used. A could send C a password or PIN off line by any safe medium other than that used for the transaction. For example, C could receive a PIN by post from a bank A. C would then include the PIN in the message that is encrypted and transmitted to A. On decryption, A would verify the PIN before effecting the transaction. The PIN can be changed off-line as often as required.
Some simple illustrative examples of the encrypting algorithms are as follows:
firstly the information entered by C, such as credit card number and name, is converted into a sequence of numbers, for example using those corresponding to a standard character set e.g. ASCII. Algorithm < 3 > , which is randomly generated by the application at C, is then applied to the sequence of numbers. An example might be: to each number add 9 and the previous result. (In these examples all arithmetic is done in modulo 256 or whatever the total number of character codes being used is). The operations of algorithm < 3 > can be represented compactly as a short sequence of digits which can be interpreted by deciphering software to reverse the algorithm. The short sequence of digits is referred to as the algorithm code.
Algorithm < 2 > is randomly generated at B in the embodiment described above, and is also representable by a code series of numbers, which are registered at B. Algorithm < 2 > can include both encrypting and splitting operations, for example:
Step 1:
Take the message encrypted according to algorithm < 3 > ; place the algorithm < 3 > code at the beginning; add 1 to the 1st number, 3 to the 2nd number and 7 to the 3rd and repeat for the 4th, 5th and 6th numbers and so on.
Step 2:
Split the resulting sequence of numbers by placing the 1st, 3rd, 5th and odd position numbers in message 1 and the numbers in the even positions in message 2; reverse the order of the numbers in messages 1 and 2; add a reference number to the transaction to the end of each message.
Message 1 is then sent to B and message 2 to A. B then performs algorithm < 1 > on message 1. Examples of the operations of algorithm < 1 > are: place the code for algorithm < 2 > in reverse order starting from position 6 in message 1 received from C. Add 12 to the first number 25 to the second number and repeat for every pair of numbers, place numbers representing the amount of money to be transferred at the end and include a code number indicating currency; add 26 to all values plus 6 for each place from the beginning; include a reference to the transaction and party B; finally send to A (A already knows algorithm < 1 > , for example by its algorithm code, and that B is registered as user of that algorithm).
Much more complex algorithms can of course be used for example including a public key/private key system.
Claims (12)
- CLAIMS 1. A method of communicating a message from a first party comprising the steps of: splitting into first and second parts the message to be communicated by the first party; sending the first part of the split message from the first party to a second party; sending the second part of the split message from the first party to a third party; processing at the second party the data which comprises the first part of the message and sending that part of the message on to the third party; receiving both parts of the message at the third party and uniting them to obtain the full message.
- 2. A method according to claim 1, further comprising the steps of: applying at the first party a first encryption device so that one or both parts of the split message are encrypted before being sent; sending a reference to the first encryption device to said third party; and applying the reverse of the first encryption device at the third party to produce a decrypted united message.
- 3. A method according to claim 1 or 2, wherein the step of processing comprises: applying at the second party a second encryption algorithm to said first part of the split message before sending that part on to the third party; and sending reference to the second encryption device to the third party, and wherein the method further comprises the step of applying the reverse of the second encryption device to said first part of the message received at the third party.
- 4. A method according to claim 2 or claim 3 when appendent to claim 2, further comprising the steps of: randomly generating the first encryption device at the second party; and sending the first encryption device from the second party to the first party.
- 5. A method according to claim 4, further comprising the step of: sending an offer with said first encrypting device, from said second party to said first party, wherein said first party has a limited period of time in which to respond to the offer.
- 6. A method according to claim 4 or 5, further comprising the step of: sending from the second party to the first party an application which includes the randomly generated first encryption device and also includes a device for splitting and sending the data.
- 7. A method according to claim 6, wherein said application is in the form of a non-platform specific computer program.
- 8. A method according to claim 6 or 7, further comprising the steps of: generating a random third encryption device by the application at the second party; and applying said third device to the message to be communicated before the message is encrypted by said first encryption device, split and sent.
- 9. A method according to any one of the claims 3 to 8, wherein said second encryption device forms part of an application which controls the sending, encrypting and splitting of messages, and wherein said second encryption device is referenced to the second party in records available to the third party.
- 10. A method according to any one of the preceding claims, wherein there is a time delay between sending the first and second parts of the message from the first party.
- 11. A method according to any one of the preceding claims, wherein said first party uses a password to authenticate transmissions, said password being known by said third party and being communicated to said first party by means other than those used for sending said message.
- 12. A method according to any one of the preceding claims, wherein said message is sent over an internet, extranet or intranet.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9727369A GB2332833A (en) | 1997-12-24 | 1997-12-24 | Secure credit card transactions over the internet |
PCT/GB1998/003899 WO1999034547A1 (en) | 1997-12-24 | 1998-12-23 | Secret communication method between three participants |
AU17750/99A AU1775099A (en) | 1997-12-24 | 1998-12-23 | Secret communication method between three participants |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9727369A GB2332833A (en) | 1997-12-24 | 1997-12-24 | Secure credit card transactions over the internet |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9727369D0 GB9727369D0 (en) | 1998-02-25 |
GB2332833A true GB2332833A (en) | 1999-06-30 |
Family
ID=10824248
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9727369A Withdrawn GB2332833A (en) | 1997-12-24 | 1997-12-24 | Secure credit card transactions over the internet |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU1775099A (en) |
GB (1) | GB2332833A (en) |
WO (1) | WO1999034547A1 (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2339125A (en) * | 1998-05-12 | 2000-01-12 | Ibm | A mechanism for secure tendering in an open electronic network |
WO2000018078A1 (en) * | 1998-09-17 | 2000-03-30 | Sopuch David J | Secure message exchange method using intermediaries |
NL1013370C2 (en) * | 1999-10-21 | 2000-10-03 | Ewout Timo Schuringa | Method for paying small amounts for goods, services or information obtained via the Internet, uses premium rate telephone calls to transfer funds |
DE10003180A1 (en) * | 2000-01-25 | 2001-07-26 | Eduard Seleny | Method for protecting against economic risks in e-commerce businesses uses telecommunications methods and telecommunications devices for automatic allocation of a registration number to protect against such risks. |
WO2001099379A1 (en) * | 2000-06-19 | 2001-12-27 | Martin Gilbert | Secure communications method |
EP1172776A2 (en) * | 2000-07-15 | 2002-01-16 | ED Vision (Holdings) Limited | Interactive authentication process |
WO2002021469A2 (en) * | 2000-09-05 | 2002-03-14 | Ed Vision (Holdings) Limited | Interactive authentication process |
EP1189180A2 (en) * | 2000-07-17 | 2002-03-20 | Pioneer Corporation | Information service providing method |
GB2370475A (en) * | 2000-12-22 | 2002-06-26 | Hewlett Packard Co | Secure online transaction where a buyer sends some information direct to a bank and some via a vendor |
EP1218838A1 (en) * | 1999-09-07 | 2002-07-03 | Epacific Inc. | Method of and system for authorizing purchases made over a computer network |
GB2372616A (en) * | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Transaction method and apparatus using two part tokens |
FR2828966A1 (en) * | 2001-08-23 | 2003-02-28 | Schlumberger Systems & Service | Secure communication of identification data for a limited use Internet transaction payment card, splits data into distinct packets and transmits each packet over distinct networks |
FR2843664A1 (en) * | 2002-08-16 | 2004-02-20 | Alain Deblock | System for the secure transmission of a confidential code over disjoint telecommunication networks having different protocols, used for commercial transactions over the internet, transmits information via neutral intermediary party |
EP1463011A3 (en) * | 2002-12-30 | 2006-05-10 | Luigi Cicione | Method for authorising mandates of payment, in particular for payments carried out on the internet by credit cards, and related system |
WO2006118535A2 (en) * | 2005-05-04 | 2006-11-09 | Ekonomi & Juridik Lars Waldenström | Method and device for transferring digital information |
WO2011141062A1 (en) * | 2010-05-12 | 2011-11-17 | Novelty Group Limited | Payment system, procedure for producing at least one code pair for authorizing a debit operation, and method for carrying out a payment operation |
EP2560101A3 (en) * | 2002-04-11 | 2013-08-14 | Splitlock Holdings Pty Ltd | Information storage system |
EP2991014A1 (en) * | 2014-08-25 | 2016-03-02 | Oberthur Technologies | Distributing tokens for token-based transactions |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI112417B (en) * | 1999-10-13 | 2003-11-28 | Helsingin Puhelin Oyj | Transmission of confidential information |
US6745231B1 (en) * | 2000-08-08 | 2004-06-01 | International Business Machines Corporation | System for securing electronic mail |
FI118619B (en) * | 2003-05-16 | 2008-01-15 | Jarmo Talvitie | Method and system for encrypting and storing information |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4802220A (en) * | 1985-03-20 | 1989-01-31 | American Telephone And Telegraph Company, At&T Bell Laboratories | Method and apparatus for multi-channel communication security |
WO1996029667A1 (en) * | 1995-03-20 | 1996-09-26 | Sandberg Diment Erik | Providing verification information for a transaction |
WO1996036025A2 (en) * | 1995-05-11 | 1996-11-14 | Mondex International Limited | Value transfer system |
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
EP0791901A2 (en) * | 1996-02-21 | 1997-08-27 | Card Call Service Co., Ltd. | Network transaction system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2222057B (en) * | 1988-04-19 | 1992-09-23 | Carridice Ltd | Electro-magnetic broadcast access control method |
DE4420970A1 (en) * | 1994-06-16 | 1995-12-21 | Esd Vermoegensverwaltungsgesel | Decryption device for decryption algorithms and method for performing the encryption and decryption thereof |
US5724423A (en) * | 1995-09-18 | 1998-03-03 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for user authentication |
-
1997
- 1997-12-24 GB GB9727369A patent/GB2332833A/en not_active Withdrawn
-
1998
- 1998-12-23 WO PCT/GB1998/003899 patent/WO1999034547A1/en active Application Filing
- 1998-12-23 AU AU17750/99A patent/AU1775099A/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4802220A (en) * | 1985-03-20 | 1989-01-31 | American Telephone And Telegraph Company, At&T Bell Laboratories | Method and apparatus for multi-channel communication security |
WO1996029667A1 (en) * | 1995-03-20 | 1996-09-26 | Sandberg Diment Erik | Providing verification information for a transaction |
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
WO1996036025A2 (en) * | 1995-05-11 | 1996-11-14 | Mondex International Limited | Value transfer system |
EP0791901A2 (en) * | 1996-02-21 | 1997-08-27 | Card Call Service Co., Ltd. | Network transaction system |
Non-Patent Citations (1)
Title |
---|
COMPUTER Abstract Accession No. 02112564 & Windows Sources Vol. 4, No. 11, November 1997, p193 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2339125A (en) * | 1998-05-12 | 2000-01-12 | Ibm | A mechanism for secure tendering in an open electronic network |
GB2339125B (en) * | 1998-05-12 | 2003-06-18 | Ibm | A mechanism for secure tendering in an open electronic network |
US6363365B1 (en) | 1998-05-12 | 2002-03-26 | International Business Machines Corp. | Mechanism for secure tendering in an open electronic network |
WO2000018078A1 (en) * | 1998-09-17 | 2000-03-30 | Sopuch David J | Secure message exchange method using intermediaries |
EP1218838A4 (en) * | 1999-09-07 | 2006-01-25 | Epacific Inc | Method of and system for authorizing purchases made over a computer network |
EP2851854A1 (en) * | 1999-09-07 | 2015-03-25 | Mastercard International Incorporated | Method of and system for making purchases over a computer network |
EP1218838A1 (en) * | 1999-09-07 | 2002-07-03 | Epacific Inc. | Method of and system for authorizing purchases made over a computer network |
EP1218837A1 (en) * | 1999-09-07 | 2002-07-03 | Epacific Inc. | Method of and system for making purchases over a computer network |
EP1218837A4 (en) * | 1999-09-07 | 2006-01-18 | Epacific Inc | Method of and system for making purchases over a computer network |
NL1013370C2 (en) * | 1999-10-21 | 2000-10-03 | Ewout Timo Schuringa | Method for paying small amounts for goods, services or information obtained via the Internet, uses premium rate telephone calls to transfer funds |
DE10003180A1 (en) * | 2000-01-25 | 2001-07-26 | Eduard Seleny | Method for protecting against economic risks in e-commerce businesses uses telecommunications methods and telecommunications devices for automatic allocation of a registration number to protect against such risks. |
WO2001099379A1 (en) * | 2000-06-19 | 2001-12-27 | Martin Gilbert | Secure communications method |
EP1172776A2 (en) * | 2000-07-15 | 2002-01-16 | ED Vision (Holdings) Limited | Interactive authentication process |
EP1172776A3 (en) * | 2000-07-15 | 2002-10-16 | ED Vision (Holdings) Limited | Interactive authentication process |
EP1189180A2 (en) * | 2000-07-17 | 2002-03-20 | Pioneer Corporation | Information service providing method |
EP1189180A3 (en) * | 2000-07-17 | 2003-12-17 | Pioneer Corporation | Information service providing method |
WO2002021469A3 (en) * | 2000-09-05 | 2002-11-28 | Ed Vision Holdings Ltd | Interactive authentication process |
WO2002021469A2 (en) * | 2000-09-05 | 2002-03-14 | Ed Vision (Holdings) Limited | Interactive authentication process |
GB2370475A (en) * | 2000-12-22 | 2002-06-26 | Hewlett Packard Co | Secure online transaction where a buyer sends some information direct to a bank and some via a vendor |
US7113930B2 (en) | 2001-02-23 | 2006-09-26 | Hewlett-Packard Development Company, L.P. | Conducting transactions |
GB2372616A (en) * | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Transaction method and apparatus using two part tokens |
FR2828966A1 (en) * | 2001-08-23 | 2003-02-28 | Schlumberger Systems & Service | Secure communication of identification data for a limited use Internet transaction payment card, splits data into distinct packets and transmits each packet over distinct networks |
EP2560101A3 (en) * | 2002-04-11 | 2013-08-14 | Splitlock Holdings Pty Ltd | Information storage system |
FR2843664A1 (en) * | 2002-08-16 | 2004-02-20 | Alain Deblock | System for the secure transmission of a confidential code over disjoint telecommunication networks having different protocols, used for commercial transactions over the internet, transmits information via neutral intermediary party |
WO2004017269A1 (en) * | 2002-08-16 | 2004-02-26 | Alain Deblock | Method and system for the secure transmission of a confidential code through a telecommunication network |
EP1463011A3 (en) * | 2002-12-30 | 2006-05-10 | Luigi Cicione | Method for authorising mandates of payment, in particular for payments carried out on the internet by credit cards, and related system |
WO2006118535A2 (en) * | 2005-05-04 | 2006-11-09 | Ekonomi & Juridik Lars Waldenström | Method and device for transferring digital information |
WO2006118535A3 (en) * | 2005-05-04 | 2007-01-04 | Ekonomi & Juridik Lars Waldens | Method and device for transferring digital information |
WO2011141062A1 (en) * | 2010-05-12 | 2011-11-17 | Novelty Group Limited | Payment system, procedure for producing at least one code pair for authorizing a debit operation, and method for carrying out a payment operation |
EP2991014A1 (en) * | 2014-08-25 | 2016-03-02 | Oberthur Technologies | Distributing tokens for token-based transactions |
Also Published As
Publication number | Publication date |
---|---|
GB9727369D0 (en) | 1998-02-25 |
AU1775099A (en) | 1999-07-19 |
WO1999034547A1 (en) | 1999-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2332833A (en) | Secure credit card transactions over the internet | |
JP2746352B2 (en) | Secure security communication system and method for communication by a remotely located computer | |
US7387240B2 (en) | System and method of secure information transfer | |
US6269445B1 (en) | Electronic shopping method, electronic shopping system and document authenticating method relating thereto | |
US4912762A (en) | Management of cryptographic keys | |
US6061791A (en) | Initial secret key establishment including facilities for verification of identity | |
US5784463A (en) | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method | |
EP1873960B1 (en) | Method for session key derivation in a IC card | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
JP2689383B2 (en) | Encrypted communication system | |
US6377688B1 (en) | Cryptographic communication method and system | |
US20100153273A1 (en) | Systems for performing transactions at a point-of-sale terminal using mutating identifiers | |
US7147157B2 (en) | Secure remote-control unit | |
WO2005045617A2 (en) | Portable security transaction protocol | |
EP0225010B1 (en) | A terminal for a system requiring secure access | |
JPH09233068A (en) | Electronic verification system | |
KR101110777B1 (en) | Method and terminal of preventing parameter from forging/alternating | |
KR19980048462A (en) | Credit card based electronic payment method | |
JPH09153014A (en) | Terminal equipment for electronic network | |
Djuric | IPS-secure Internet payment system | |
JPH04118777A (en) | Electronic signature method by ic card | |
JP2003309552A (en) | Control system for electronic certificate by portable telephone | |
JPH07297819A (en) | Method and means for processing combination of individual collation with encipherment of message authentication to network transmission | |
KR100323138B1 (en) | Electronic payment method for protecting trust information and computer-readable medium recording the method | |
WO2000067447A1 (en) | Improvements in and relating to secure data transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |