WO2003001733A1 - Selected cascaded encryption for communication and transactions - Google Patents

Selected cascaded encryption for communication and transactions Download PDF

Info

Publication number
WO2003001733A1
WO2003001733A1 PCT/ZA2002/000076 ZA0200076W WO03001733A1 WO 2003001733 A1 WO2003001733 A1 WO 2003001733A1 ZA 0200076 W ZA0200076 W ZA 0200076W WO 03001733 A1 WO03001733 A1 WO 03001733A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
encryption
application
security
parties
Prior art date
Application number
PCT/ZA2002/000076
Other languages
French (fr)
Inventor
Valentin Kisimov
Original Assignee
Valentin Kisimov
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Valentin Kisimov filed Critical Valentin Kisimov
Publication of WO2003001733A1 publication Critical patent/WO2003001733A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption

Definitions

  • This invention relates to security systems for digital communications and transactions particularly, though not exclusively for financial transactions conducted over a public network, such as the Internet.
  • Digital financial transactions are known, such as ordering and paying for products over the Internet, paying suppliers using credit or debit cards, transferring money between accounts, etc.
  • Security protocols such as SSL, are implemented in certain transactions, such as banking transactions over the Internet, but these protocols are of a relatively low level.
  • In other transactions notably credit card payments, no special security measures are used and there is no authentication of the card and a transaction other than a check through the credit card issuer's "hot file". These checks are limited, because further checks on account balances, authorisation of payment, etc. are non-trivial i.e. involve considerable time/computational power.
  • smart devices can be used for increasing security and authentication for transactions over public networks.
  • the term “smart devices” means smart cards, SIM cards or other secure integrated circuits - chips in pervasive computing devices and like that include a processor, nonvolatile memory (e.g. Rom, EEPROM, mini-disk), optional volatile memory (RAM), and an operating system, that can store and process data.
  • Smart devices while being capable of being used for more functions and on a wider scale, ace currently used to a limited extend for identification, authorisation and storing information.
  • Security algorithms provide security protocols, where the security protocol is an established communication with a dialog between the communicating parties, using one or more security algorithm.
  • the major security algorithms are symmetrical or asymmetrical.
  • a symmetrical encryption algorithm such as 3DES and Blowfish, uses the same encryption key for sender and receiver of a message.
  • An asymmetrical encryption algorithm e.g. RSA, uses public and private keys where for each security operation the sender and receiver use different keys.
  • RSA e.g. RSA
  • This invention seeks to provide a security method, using cascaded encryption from unbreakable algorithms, applicable selectively, depending of the content of the message, the content of its data portions and the defined business rules established for the message portions and/or for the entire message.
  • One aspect of the invention provides a method for creating suitable high security protocols for transmission of messages between two parties communicating over a public network, such as the Internet, using a base communication protocol, including the steps of:
  • the base communication protocol may be any accepted communication protocol, such as TCP/IP, though preferable it is a secure protocol, such as SSL or another accepted security protocol, which provides a first low level of security.
  • the conditions for implementation of different encryption algorithms on the message portions may be selected from any desired criteria, such as value of money coded in a message portion, importance of the data concerned with the message, nature of the transaction concerned with the message and the like. Examples are: message concerned stock and bond trades, account payments and inter account transfers; message portions as card/account/PLN numbers, passwords and so on. For instance, in a stock trade instruction the stock symbol of shares may be encrypted with one application level security algorithm, while the prices and number of shares may be encrypted with another application level security algorithm.
  • the method may also apply selected further cascaded encryption levels to the message when other predetermined conditions have been fulfilled.
  • the applied cascaded application encryption algorithms define a chain of application level security algorithms, used in the security protocol.
  • the encryption mechanism of the base communication protocol if any, can be accepted as zero level of the cascading encryption.
  • the other application level encryption algorithms add additional levels in the cascaded encryption.
  • the preferred minimum level of application cascading is at least two - zero level and first level, including at least one application level cascading encryption.
  • the first cascaded application level security in the security protocol may use symmetrical or asymmetrical algorithms as desired.
  • the use of symmetrical encryption algorithms is preferred based on their relatively quicker performance.
  • asymmetrical algorithms are able to add higher level of security features, such as non-repudiation, digital signature etc.
  • at least when there are three application cascading security levels, one of them is symmetrical and another is asymmetrical.
  • the application level encryption is based on the concatenation of selected portions of two numbers, one of which is generated by one of the parties and the other is generated by the other of the parties to a communication.
  • the keys for the selected cascading protocols differ from one another, if same types of security algorithms are used in the cascaded path of algorithms.
  • the application level encryptions are performed using keys and functions allocated only in a smart device and in the communication partner - the secure server, without executing any security application encryption algorithms outside of these processors.
  • Figure 1 shows a system for achieving cascaded application encryption
  • Figure 2 shows a sub-system of the system of Figure 1 for creation an application level encryption symmetrical key.
  • Figures 1 and 2 illustrate a system for cascading transaction encryption that can be a few levels deep.
  • FIG. 1 shows an application architecture 10 comprising a base communication protocol 12, e.g. SSL, a first level application symmetrical transaction encryption 14 (e.g. 3DES), a second level asymmetrical encryption 16, a third application level symmetrical encryption 17, and plain data 18 that is to be encrypted and transmitted.
  • the level of security of the SSL encryption can be very low, but is sufficient to prevent causal observation of the content of transmitted messages.
  • Figure 2 illustrates an application structure 20 for creating a symmetrical key 32 for application level symmetrical encryption for data transmitted between a smart device - smart card 22 and a secure bank server 24.
  • the key 32 is created by: generating a random number RandNumbl in the smart card 22; generating another random number RandNumb2 in the bank server 24; defining the parts 26 and 28 of, respectively, RandNumbl and RandNumb2 to be concatenated; concatenating different parts of the random numbers 26 and 28; and generating a symmetrical key 32 that will be used as symmetrical application level encryption.
  • the parts of the random numbers participating in the concatenation vary in each concatenation process, depending of the transaction history between the sender and receiver or depending of some algorithm for dynamic concatenation.
  • the dynamics of the concatenation process adds another dependency and increases the level of security.
  • the concatenated values are dependent on: content of the previous transmitted message; rules in the smart card and in the bank server determining the specific smart card behaviour; historical and current conditions for initiation of the transaction; dependencies between the current and previous transactions; and so on.
  • the cascading transaction encryption is an encryption mechanism, the cascading depth of which depends of the value represented by the data to be transmitted and the type of the data.
  • the level of depth is selected for each data item in a message in accordance with the value of the item and the triggered condition for cascading encryption for that item.
  • the first application level cascading encryption in figure 1 (used over the zero level cascaded encryption provided by the base communication protocol) is a symmetrical encryption, such as 3DES or Blowfish, has a key that is different than the used in the base communication protocol and this key is created by concatenation of two random numbers as set out above.
  • the cascaded encryption level uses supporting encryption operations provided inside the customer's smart card and inside the bank server.
  • the second level application cascading encryption in figure 1 can be asymmetrical encryption, such as RSA, or a symmetrical encryption, executed inside the customer's smart card and inside the bank server.
  • the third level of application cascading encryption in figure 1 can be also symmetrical or asymmetrical encryption and it is executed inside the customer's smart card and inside the bank server.
  • a data item determined to warrant four levels of cascaded encryption can be encrypted by 3DES algorithm on a zero level - base communication protocol, after that by Blowfish algorithm on a first level, after that by RSA algorithm on a second level and after that 3DES algorithm on a third level.
  • the order of cascading the encryption algorithms is not predefined, but is preferably symmetrical, then asymmetrical, then symmetrical, or vice versa.
  • the depth of the cascading is not predefined.

Abstract

The invention provides a method for creating high security protocols for transmission of messages between two parties communicating over a public network with dynamic content suitability of the security. Over the base communication protocol providing the messaging exchange, a cascaded application encryption can be build, offering different levels of security and different encryption algorithms connected in a cascaded way, using application coding and application programming interface with the base communication protocol. Different portions of the message may be encrypted with different cascading encryptions depending on predetermined conditions. The conditions may be selected from any desired criteria, such as value of the message portion, importance of the data concerned with the message, nature of the transaction and the like. The security cascading depth depends on the condition for applying the application level encryption for a particular portion of the message and is selected for each potion of the message.

Description

SELECTED CASCADED ENCRYPTION FOR COMMUNICATION AND TRANSACTIONS
TECHNICAL FIELD:
This invention relates to security systems for digital communications and transactions particularly, though not exclusively for financial transactions conducted over a public network, such as the Internet.
BACKGROUND ART:
Digital financial transactions are known, such as ordering and paying for products over the Internet, paying suppliers using credit or debit cards, transferring money between accounts, etc. Security protocols, such as SSL, are implemented in certain transactions, such as banking transactions over the Internet, but these protocols are of a relatively low level. In other transactions, notably credit card payments, no special security measures are used and there is no authentication of the card and a transaction other than a check through the credit card issuer's "hot file". These checks are limited, because further checks on account balances, authorisation of payment, etc. are non-trivial i.e. involve considerable time/computational power.
It is known that so called "smart devices" can be used for increasing security and authentication for transactions over public networks. The term "smart devices" means smart cards, SIM cards or other secure integrated circuits - chips in pervasive computing devices and like that include a processor, nonvolatile memory (e.g. Rom, EEPROM, mini-disk), optional volatile memory (RAM), and an operating system, that can store and process data. Smart devices, while being capable of being used for more functions and on a wider scale, ace currently used to a limited extend for identification, authorisation and storing information.
Security algorithms provide security protocols, where the security protocol is an established communication with a dialog between the communicating parties, using one or more security algorithm. Generally, the major security algorithms are symmetrical or asymmetrical. A symmetrical encryption algorithm, such as 3DES and Blowfish, uses the same encryption key for sender and receiver of a message. Currently there are symmetrical algorithms with appropriate key lengths, which are not breakable. An asymmetrical encryption algorithm, e.g. RSA, uses public and private keys where for each security operation the sender and receiver use different keys. Currently there are asymmetrical algorithms with appropriate key lengths, which are not breakable.
This invention seeks to provide a security method, using cascaded encryption from unbreakable algorithms, applicable selectively, depending of the content of the message, the content of its data portions and the defined business rules established for the message portions and/or for the entire message.
DISCLOSURE OF THE INVENTION
One aspect of the invention provides a method for creating suitable high security protocols for transmission of messages between two parties communicating over a public network, such as the Internet, using a base communication protocol, including the steps of:
• setting at least one condition for which a security level higher than the security level of the base communication protocol must be implemented; • assessing each portion of the message to be transmitted to determine if a condition has been fulfilled for any portion of the message for separate encryption of each portion or for the entire message; and
• initiating an application (programming level) protocol to encrypt each portion of the message for which a condition has been fulfilled with the higher level encryption prior to submission of the message for transmission using the base communication protocol.
The base communication protocol may be any accepted communication protocol, such as TCP/IP, though preferable it is a secure protocol, such as SSL or another accepted security protocol, which provides a first low level of security.
Over the base communication protocol, different levels of security can be added including different encryption algorithms connected in a cascaded way, using application coding and application programming interface with the base communication protocol, building different cascaded application encryptions. Different portions of the message may be encrypted with different application level encryptions depending on predetermined conditions. For each application level encryption, the "application code" can involve smart devices. All applied application encryptions define the application level of the security protocol. The application level security protocol provides higher security capabilities that the base communication protocol.
The conditions for implementation of different encryption algorithms on the message portions may be selected from any desired criteria, such as value of money coded in a message portion, importance of the data concerned with the message, nature of the transaction concerned with the message and the like. Examples are: message concerned stock and bond trades, account payments and inter account transfers; message portions as card/account/PLN numbers, passwords and so on. For instance, in a stock trade instruction the stock symbol of shares may be encrypted with one application level security algorithm, while the prices and number of shares may be encrypted with another application level security algorithm.
The method may also apply selected further cascaded encryption levels to the message when other predetermined conditions have been fulfilled. The applied cascaded application encryption algorithms define a chain of application level security algorithms, used in the security protocol. The encryption mechanism of the base communication protocol, if any, can be accepted as zero level of the cascading encryption. The other application level encryption algorithms add additional levels in the cascaded encryption. The preferred minimum level of application cascading is at least two - zero level and first level, including at least one application level cascading encryption.
The first cascaded application level security in the security protocol (used over the zero level cascaded encryption provided by the base communication protocol) may use symmetrical or asymmetrical algorithms as desired. The use of symmetrical encryption algorithms is preferred based on their relatively quicker performance. On the other hand asymmetrical algorithms are able to add higher level of security features, such as non-repudiation, digital signature etc. Thus it is preferred that at least when there are three application cascading security levels, one of them is symmetrical and another is asymmetrical. Where one of the application level of the security protocol uses symmetrical algorithm, then it is preferred that the application level encryption is based on the concatenation of selected portions of two numbers, one of which is generated by one of the parties and the other is generated by the other of the parties to a communication.
Preferable the keys for the selected cascading protocols differ from one another, if same types of security algorithms are used in the cascaded path of algorithms.
All used security algorithms in the cascade are unbreakable algorithms with similar level of unbreakability.
Further application levels of encryption may be applied if desired.
Preferably the application level encryptions are performed using keys and functions allocated only in a smart device and in the communication partner - the secure server, without executing any security application encryption algorithms outside of these processors.
Further features, variants and/or advantages of aspects of the invention will emerge from the following non-limiting description of examples of the invention made with reference to the accompanying schematic drawings.
BRIEF DESCRIPTION OF THE DRAWINGS:
Figure 1 shows a system for achieving cascaded application encryption; Figure 2 shows a sub-system of the system of Figure 1 for creation an application level encryption symmetrical key.
BEST KNOWN MODE FOR CARRYING OUT THE INVENTION:
Figures 1 and 2 illustrate a system for cascading transaction encryption that can be a few levels deep.
Figure 1 shows an application architecture 10 comprising a base communication protocol 12, e.g. SSL, a first level application symmetrical transaction encryption 14 (e.g. 3DES), a second level asymmetrical encryption 16, a third application level symmetrical encryption 17, and plain data 18 that is to be encrypted and transmitted. The level of security of the SSL encryption can be very low, but is sufficient to prevent causal observation of the content of transmitted messages.
Figure 2 illustrates an application structure 20 for creating a symmetrical key 32 for application level symmetrical encryption for data transmitted between a smart device - smart card 22 and a secure bank server 24. The key 32 is created by: generating a random number RandNumbl in the smart card 22; generating another random number RandNumb2 in the bank server 24; defining the parts 26 and 28 of, respectively, RandNumbl and RandNumb2 to be concatenated; concatenating different parts of the random numbers 26 and 28; and generating a symmetrical key 32 that will be used as symmetrical application level encryption. The parts of the random numbers participating in the concatenation vary in each concatenation process, depending of the transaction history between the sender and receiver or depending of some algorithm for dynamic concatenation. The dynamics of the concatenation process adds another dependency and increases the level of security.
The concatenated values (how many bits from the first random number and how many bits from the second random number will participate in creation of the symmetrical key) are dependent on: content of the previous transmitted message; rules in the smart card and in the bank server determining the specific smart card behaviour; historical and current conditions for initiation of the transaction; dependencies between the current and previous transactions; and so on.
The cascading transaction encryption is an encryption mechanism, the cascading depth of which depends of the value represented by the data to be transmitted and the type of the data. The level of depth is selected for each data item in a message in accordance with the value of the item and the triggered condition for cascading encryption for that item.
The first application level cascading encryption in figure 1 (used over the zero level cascaded encryption provided by the base communication protocol) is a symmetrical encryption, such as 3DES or Blowfish, has a key that is different than the used in the base communication protocol and this key is created by concatenation of two random numbers as set out above. The cascaded encryption level uses supporting encryption operations provided inside the customer's smart card and inside the bank server.
The second level application cascading encryption in figure 1 can be asymmetrical encryption, such as RSA, or a symmetrical encryption, executed inside the customer's smart card and inside the bank server.
The third level of application cascading encryption in figure 1 can be also symmetrical or asymmetrical encryption and it is executed inside the customer's smart card and inside the bank server.
In user-to-system secure communication, from all cascaded encryptions in the user's part, only the lowest one - from the base communication protocol can be executed outside the user's smart device (smart card), all higher level cascaded encryption - application level cascaded encryption should be executed inside the smart device. In system-to-system secure communication, all cascaded encryptions will be executed inside the systems, where for the application cascaded encryptions each system preferable will have a smart device for at least keeping the security keys or for execution of the entire security algorithms.
Thus, in this way, a data item determined to warrant four levels of cascaded encryption can be encrypted by 3DES algorithm on a zero level - base communication protocol, after that by Blowfish algorithm on a first level, after that by RSA algorithm on a second level and after that 3DES algorithm on a third level.
The order of cascading the encryption algorithms is not predefined, but is preferably symmetrical, then asymmetrical, then symmetrical, or vice versa. The depth of the cascading is not predefined.
The invention is not limited to the precise details described above and shows in the drawings. Modifications may be made and other embodiments developed without departing from the scope of the invention are set out in the claim.

Claims

CLAIMS:
1. A method for creating suitably high secure protocols for transmission of messages between two parties communication over a public network using a base communication protocol, including the steps:
• setting an application (programmable) level encryption using application programming interface to the base communication protocol and application coding for providing higher level security and encryption algorithms than the base communication protocol;
• setting at least one condition for which the application level encryption must be used with a security level higher than the base communication protocol;
• assessing each portion of the message to be transmitted to determine if the condition has been fulfilled for any portion of the message; and
• initiating the application level encryption for each portion of the message for which a condition has been fulfilled prior to submission of the message for transmission using the base communication protocol.
2. The method of claim 1, wherein different portions of the message are encrypted with different application level encryption depending on predetermined conditions for the portions.
3. The method of either 1 or 2, wherein the conditions for applying the application level encryption for a particular portion of the message are defined based on the content of that portion of the message, importance of that portion of the message, nature and history of the transaction, natures of the receiver and sender, the content of the previous transmitted message between the same communication parties; dependencies between the current and previous transactions; historical and current conditions for initiation of the transmission; the content of the identities of at least one of the communication parties; behaviour of the communication parties, rules for triggering of the condition and of the nature of the rules.
4. The method of any one of claims 1 to 3, including applying a selected number of application encryption levels to at least one selected portion of the message when preset conditions have been fulfilled for that portion of the message.
5. The method of any of claims 1 to 4, wherein the base communication protocol is a protocol with any level of security.
6. The method of any of claims 1 to 4, wherein the application level encryption consists of a chain of at least one application level security algorithms, defining a cascaded application encryption, where the order of the algorithms in the cascade sequence depth are preferably alternating - symmetrical after asymmetrical and vice versa.
7. The method of any of claims 1 to 6, wherein the cascading depth is not predefined and depends on the condition for applying the application level encryption for a particular portion of the message and is selected for each potion of the message.
8. The method of any of claims 1 to 7, wherein one of the cascaded application level protocols is symmetrical and the security key is based on the concatenation of selected portions of two numbers, one of which is generated by one of the parties and the other of which is generated by the other of the parties to a communication.
9. The method of claim 8, wherein the selected portions of concatenation are dependent on at least one of: the content of the previous transmitted message between same parties; dependencies between the current and previous transactions; historical and current conditions for initiation of the transmission; the content of the identities of at least one of the parties; rules established by the parties with flexibility for modification of the portions for concatenation based on the messages content, behaviour of the communication parties and of the nature of the rules.
PCT/ZA2002/000076 2001-06-26 2002-05-16 Selected cascaded encryption for communication and transactions WO2003001733A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA200105247 2001-06-26
ZA2001/5247 2001-06-26

Publications (1)

Publication Number Publication Date
WO2003001733A1 true WO2003001733A1 (en) 2003-01-03

Family

ID=25589214

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/ZA2002/000076 WO2003001733A1 (en) 2001-06-26 2002-05-16 Selected cascaded encryption for communication and transactions

Country Status (1)

Country Link
WO (1) WO2003001733A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210438A1 (en) * 2011-02-15 2012-08-16 Guobiao Zhang Secure Three-Dimensional Mask-Programmed Read-Only Memory
US20150317255A1 (en) * 2011-02-15 2015-11-05 Chengdu Haicun Ip Technology Llc Secure Printed Memory
CN116566714A (en) * 2023-05-29 2023-08-08 深圳感臻智能股份有限公司 Intelligent house data transmission method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5933501A (en) * 1996-08-01 1999-08-03 Harris Corporation `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
WO2000077972A1 (en) * 1999-06-11 2000-12-21 General Instrument Corporation Configurable encryption/decryption for multiple services support

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5933501A (en) * 1996-08-01 1999-08-03 Harris Corporation `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
WO2000077972A1 (en) * 1999-06-11 2000-12-21 General Instrument Corporation Configurable encryption/decryption for multiple services support

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120210438A1 (en) * 2011-02-15 2012-08-16 Guobiao Zhang Secure Three-Dimensional Mask-Programmed Read-Only Memory
US20130311790A1 (en) * 2011-02-15 2013-11-21 Chengdu Haicun Ip Technology Llc Secure Three-Dimensional Mask-Programmed Read-Only Memory
US20150317255A1 (en) * 2011-02-15 2015-11-05 Chengdu Haicun Ip Technology Llc Secure Printed Memory
US20170024330A1 (en) * 2011-02-15 2017-01-26 Chengdu Haicun Ip Technology Llc Secure Printed Memory
CN116566714A (en) * 2023-05-29 2023-08-08 深圳感臻智能股份有限公司 Intelligent house data transmission method and system

Similar Documents

Publication Publication Date Title
CA2678101C (en) Authentication device and method
US6328217B1 (en) Integrated circuit card with application history list
CA2256009C (en) System with and method of cryptographically protecting communications
US20050138364A1 (en) Digital certificate proxy
US6182900B1 (en) Network-supported chip card transaction method
WO2019005968A1 (en) Secure account creation
CN107210912B (en) Authorized access to application libraries
EP1791292B1 (en) Personalisation of an electronic circuit
AU4307599A (en) A cryptographic system and method for electronic transactions
CN110458545A (en) Electronic transaction processing method, server, transaction terminal and system
EP1791291A1 (en) Personalization of a bankcard for other applications
WO2007055675A1 (en) System and method for making cashless payments
Urien et al. A breakthrough for prepaid payment: End to end token exchange and management using secure SSL channels created by EAP-TLS smart cards
Ward EMV card payments–An update
WO2003001733A1 (en) Selected cascaded encryption for communication and transactions
JP2002170063A (en) Electronic value transaction system, method, terminal device, and center device
US20040107353A1 (en) Cryptographic method of protecting an electronic chip against fraud
WO2020174072A1 (en) Change of reference pin code value of smart card by a mobile device and a distinct telecommunication device
Polyakov et al. Security of user authentication in payment systems in the agricultural value chain
EP3113408B1 (en) Method and system for authentication
WO1998032260A1 (en) Secure messaging table system
Hanáček Security of electronic money
EP0811282B1 (en) Electronic transaction system and method
EP3145116B1 (en) Method and system for terminal to secure element communication
de Jong Cash: The once and future king

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP