Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for authenticating result of instruction in token

A token, command technology, applied in the direction of coinless or similar devices, payment architecture, coded identification card or credit card activation, etc., can solve the problem of sufficient guarantee, etc.

Inactive Publication Date: 2004-07-28
GEMPLU
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Although, with this method, the supplier can check the signature of the transaction request, this method does not fully guarantee the s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating result of instruction in token
  • Method for authenticating result of instruction in token
  • Method for authenticating result of instruction in token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present description relates to examples of transactions via the Internet. However, it is clear that the invention applies generally to any other application that requires checking the execution of commands when the terminal is not secured.

[0034] figure 1 Represents a token TOKEN and a terminal T. The terminal is connected to the network NET and includes a communication device S for sending information to the user and an application program P or software program for providing one or more services. The token is connected to an interface I comprising an information input device K. In order to perform a service, a command CD is sent by the application P in the token to execute, eg check the signature of the transaction involved. The command CD includes the input parameter PAR. For example, the signature check command includes parameters such as:

[0035] - the signature to check,

[0036] - signed transaction data.

[0037] In order to verify in a first step t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for authenticating a result of the execution of an instruction in a token which is connected to a terminal, said terminal comprising a device for communicating information to a user of the token and said token transmitting a result to the terminal when the instruction has been executed. The invention is characterised in that the method comprises the following steps: checking whether the instruction has a sensitive character and if the instruction does have a sensitive character, carrying out the following steps; inputting digitizable information using an interface which comprises an inputting device that is linked to said token, for each sensitive potential result of the instruction, and transmitting said digitizable information to said token; executing the instruction; transmitting a response from the token to the terminal, said response containing the associated digitizable information for a sensitive result, this digitizable information being associated with said result; and if the result is sensitive, checking that the response actually contains the input information using the communications device of said terminal.

Description

technical field [0001] The invention relates to a method and a system for verifying the result of the execution of a command in a token connected to a terminal, said terminal comprising a means of informing the user and sending said command back to said token, said The token sends the result to the terminal after said execution. Background technique [0002] A particularly advantageous application of the invention is in fields such as banking, telephony and health care, which require verification of the results of order execution, for example during a transaction over the Internet between a buyer of a service and a provider of said service . The provider is for example a car dealer, and the provider of the calling user has a token connected to a terminal linked to the communication network. The purchaser has a certificate as defined by the standard X509 published by ISO. This certificate is unique and unique to one purchaser. It is public facing....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07F7/10
CPCG07F7/082G07F7/084G06Q20/367G06Q20/341G07F7/1008
Inventor 卢卡茨·洛达齐克
Owner GEMPLU