Unlock instant, AI-driven research and patent intelligence for your innovation.

Security token, transaction execution system and transaction execution method

A security token and transaction execution technology, applied in computer security devices, payment systems, payment architecture, etc., can solve problems such as increasing the cost of the bill of materials and increasing the size of the token

Inactive Publication Date: 2015-08-19
NXP BV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such UI elements increase the size of tokens and for tokens increase the cost of the bill of materials

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security token, transaction execution system and transaction execution method
  • Security token, transaction execution system and transaction execution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] According to the present specification, there is provided a security token that receives and processes transaction verification input from an external user interface device, such as a smartphone. The security token may be in the form of a secure hardware token. The token also sends the corresponding transaction verification results to the host device to which the token is connected. In an exemplary implementation, a token may include a secure element that interfaces to a host device via a USB connection and to a mobile phone via NFC. According to the present specification, a user can visually verify transaction data and securely enter a PIN or password, for example, via a mobile phone, which can serve as a trusted UI companion for the token.

[0039] Therefore, security tokens do not need to be equipped with a rich user interface. That is, for example, the functionality of a token can be reduced to a security function. The token can receive transaction verification i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

There is disclosed a security token for use in a transaction execution system, the security token being connectable to a user interface device and to a host device, the security token being arranged to: receive a transaction verification input from the user interface device; process the transaction verification input and generate a corresponding transaction verification result; transmit the transaction verification result to the host device, and the security token comprising a secure element which is arranged to facilitate processing of the transaction verification input. Furthermore, a method for executing a transaction using a security token is disclosed, as well as a corresponding computer program product.

Description

technical field [0001] This specification relates to security tokens for use in trade execution systems. In addition, the present specification relates to methods of performing transactions using security tokens. Background technique [0002] Today, security plays an important role when executing transactions. Many of the services currently available that require security measures to protect user accounts, data, and online transactions use secure element-based hardware tokens. These tokens typically consist of a secure element attached to a secure or trusted user interface (UI), embodied as a simple display and keypad. Additionally, these tokens often include batteries that are used to provide power to other components that operate the token. Known examples of such tokens are RSA tokens (such as RSA token), which is used to establish a virtual private network (VPN) connection. A trusted UI allows users to securely confirm transactions by having them visually verify tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q20/42G06F21/34
CPCG06F21/85G06F21/645G06F7/10G06Q20/3226G06Q20/405
Inventor 彼得·波拉克让·勒内·布兰茨蒂莫图斯·亚瑟·范雷蒙德
Owner NXP BV