Method for authenticating result of instruction in token
A token, command technology, applied in the direction of coinless or similar devices, payment architecture, coded identification card or credit card activation, etc., can solve the problem of sufficient guarantee, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The present description relates to examples of transactions via the Internet. However, it is clear that the invention applies generally to any other application that requires checking the execution of commands when the terminal is not secured.
[0034] figure 1 Represents a token TOKEN and a terminal T. The terminal is connected to the network NET and includes a communication device S for sending information to the user and an application program P or software program for providing one or more services. The token is connected to an interface I comprising an information input device K. In order to perform a service, a command CD is sent by the application P in the token to execute, eg check the signature of the transaction involved. The command CD includes the input parameter PAR. For example, the signature check command includes parameters such as:
[0035] - the signature to check,
[0036] - signed transaction data.
[0037] In order to verify in a first step t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 