Unlock instant, AI-driven research and patent intelligence for your innovation.

Authorisation of a transaction

A transaction and user authorization technology, applied in the direction of protocol authorization, user identity/authority verification, coin-free or similar appliances, etc., can solve the problem of inability to decrypt encrypted code words, and achieve the effect of increasing acceptance.

Inactive Publication Date: 2007-01-10
GIESECKE & DEVRIENT GMBH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem here, however, is that users usually do not have a reliable option for assuring themselves of the integrity of the terminal
According to the display of the correct password, the user can know that this is a trusted terminal, because the fake terminal cannot decrypt the encrypted codeword
[0005] However, the system described above presupposes that the user carries with him a chip card or some other data carrier on which an encrypted password is stored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorisation of a transaction
  • Authorisation of a transaction
  • Authorisation of a transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 A backend system 10 with a server 12 and a database 14 is shown. The server 12 is realized in the form of a high-efficiency computer, which is controlled by a program according to the method described below. Background system 10 serves multiple terminals on network 16, figure 1 One of the terminals 18 is shown as an example in . The network 16 may have multiple subsections, which may be implemented, for example, as a local area network and / or a data packet network (such as the Internet) and / or an analog or digital telephone network.

[0025] In this exemplary embodiment, the terminal 18 is designed as a small stand-alone device with operating means such as a keyboard or keypad 20, display means such as a graphic display 22 and means for calculating biometric features. In this exemplary embodiment, a fingerprint sensor 24 and a camera 26 are provided for the latter purpose. In alternative embodiments, more or fewer or other biometric sensors may be provided....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a method for authorizing a transaction by a user with the aid of a terminal which can communicate with a background system, a secret, which is known to the user and to the background system but not to an unauthorized attacker, is used. The background system transmits secret data, which indicate the secret, only to the terminal if the terminal has successfully authenticated itself at the background system. Because, as a rule, secret data of several users are stored in the background system, the terminal detects in advance identification information which identifies the user, and transmits corresponding user identification data to the background system. When the terminal displays the secret to the user, the user can be certain that the terminal is trustworthy. A device and a computer program product comprise corresponding features. The invention provides a technique for authorizing a transaction by a user with the aid of a terminal which enables the user to recognize a falsified terminal.

Description

technical field [0001] The present invention relates generally to the field of electronic execution of transactions, and more particularly to the field of authorizing user transactions. In the terms of the present document, "transaction" should be understood as referring in particular to a legal or factual process, the authorization of which by an authorized user must be verifiable beyond doubt. The transaction may be, for example, an electronic payment or some other financial transaction or electronic statement of intent. Background technique [0002] For the electronic authorization of transactions, it is customary to use a personal characteristic of the authorized user, which is known only to the user and / or can be given only through the cooperation of the user. In the past, principal secret numbers (PIN=Personal Identification Number) were used as these personal characteristics, but the use of biometric characteristics is becoming increasingly important. Such biometric...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/31G06Q20/34G06Q20/40G07F7/10
CPCG06F21/31G06Q20/40975G06Q20/40145G07F7/1008G06Q20/341
Inventor 迪特尔·韦斯沃尔夫冈·兰克尔
Owner GIESECKE & DEVRIENT GMBH