Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020112249 - IMPROVEMENTS RELATING TO SECURITY AND AUTHENTICATION OF INTERACTION DATA

Publication Number WO/2020/112249
Publication Date 04.06.2020
International Application No. PCT/US2019/054632
International Filing Date 04.10.2019
IPC
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
G06F 21/31 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
CPC
G06Q 20/08
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
08Payment architectures
G06Q 20/3227
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
30characterised by the use of specific devices
32using wireless devices
322Aspects of commerce using mobile devices [M-devices]
3227Use of a security embedded in M-devices
G06Q 20/382
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
20Payment architectures, schemes or protocols
38Payment protocols; Details thereof
382insuring higher security of transaction
H04L 63/0272
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
02for separating internal from external traffic, e.g. firewalls
0272Virtual private networks
H04L 63/08
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
08for supporting authentication of entities communicating through a packet data network
H04W 12/06
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
06Authentication
Applicants
  • MASTERCARD INTERNATIONAL INCORPORATED [US]/[US]
Inventors
  • MADDOCKS, Ian
  • JOHNSON, Alan
  • ROBERTS, David, Anthony
Agents
  • DOBBYN, Colm, J.
Priority Data
18208994.628.11.2018EP
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) IMPROVEMENTS RELATING TO SECURITY AND AUTHENTICATION OF INTERACTION DATA
(FR) AMÉLIORATIONS LIÉES À LA SÉCURITÉ ET À L’AUTHENTIFICATION DE DONNÉES D’INTERACTION
Abstract
(EN)
There is provided a computer-implemented method of authenticating an interaction carried out between a mobile device and a gateway, the method being carried out by an authentication system remote from the mobile device and the gateway. The method comprises the steps of : receiving one or more first data items from the gateway, the one or more first data items including dynamic data corresponding to one or more second data items uniquely identifying the interaction, wherein one of the second data items corresponds to a portion of a counter value associated with the interaction; and extracting the counter value portion from the dynamic data. The method further comprises calculating one or more candidate counter values which could correspond to the counter value associated with the interaction; generating, for each of the one or more candidate counter values, a piece of corresponding candidate dynamic data based on one or more of the other first data items; and comparing each of the candidate dynamic data to the received dynamic data to ascertain whether a match is obtained.
(FR)
La présente invention concerne un procédé mis en œuvre par ordinateur pour authentifier une interaction exécutée entre un dispositif mobile et une passerelle, le procédé étant exécuté par un système d’authentification distant du dispositif mobile et de la passerelle. Le procédé comprend les étapes consistant à : recevoir un ou plusieurs premiers éléments de données depuis la passerelle, le ou les premiers éléments de données incluant des données dynamiques correspondant à un ou plusieurs seconds éléments de données identifiant de manière unique l’interaction, un des seconds éléments de données correspondant à une partie d’une valeur de compteur associée à l’interaction ; et extraire, des données dynamiques, la partie de la valeur de compteur. Le procédé comprend en outre les étapes consistant à : calculer une ou plusieurs valeurs de compteur candidates qui pourraient correspondre à la valeur de compteur associée à l’interaction ; générer, pour chacune de la ou des valeurs de compteur candidates, un élément de données dynamiques candidates correspondantes sur la base d’un ou de plusieurs éléments parmi les autres premiers éléments de données ; et comparer chacune des données dynamiques candidates aux données dynamiques reçues pour établir si une concordance est obtenue.
Also published as
Latest bibliographic data on file with the International Bureau