Traitement en cours

Veuillez attendre...

Paramétrages

Paramétrages

Aller à Demande

1. WO2020112248 - COMMUNICATION DE CONFIANCE DANS DES TRANSACTIONS

Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

[ EN ]

CLAIMS

1. A method for a first computing device to establish trusted communication with a second computing device in a transaction process, the method comprising, during a transaction process:

the first computing device establishing a communication channel with the second computing device;

the first computing device providing a secure communication to the second computing device, the secure communication comprising cryptographic material encrypted by a public key of an asymmetric cryptographic method for the second computing device to decrypt using a private key of the asymmetric cryptographic method; and

the first computing device communicating with the second computing device for trusted communication using a further cryptographic method using the cryptographic material.

2. A method for a second computing device to establish trusted communication with a first communication device in a transaction process, the method comprising, during a transaction process:

the second computing device establishing a communication channel with the first computing device;

the second computing device receiving a secure communication from the first computing device, the secure communication comprising cryptographic material encrypted by a public key of an asymmetric cryptographic method;

the second computing device decrypting the cryptographic material using a private key of the asymmetric cryptographic method; and

the second computing device communicating with the first computing device for trusted communication using a further cryptographic method using the cryptographic material.

3. The method of claim 1 or claim 2, wherein the further cryptographic method is symmetric and trusted communication is provided by a secure channel using the symmetric further cryptographic method to protect privacy of information private to an owner or controller of at least the first computing device.

4. The method of claim 3, wherein the symmetric further cryptographic method is AES.

5. The method of claim 1 or claim 2, wherein the further cryptographic method is asymmetric and trusted communication is provided by using the asymmetric further cryptographic method to replace the asymmetric cryptographic method in one or more processes.

6. The method of claim 5, wherein the asymmetric cryptographic method is RSA and the further asymmetric cryptographic method is ECC, and wherein ECC is used instead of RSA for digital signatures provided by the first communication device.

7. The method of claim 1 or claim 2, wherein there is more than one further cryptographic method, wherein the more than one further cryptographic methods comprise a symmetric further cryptographic method and an asymmetric further cryptographic method.

8. The method of any preceding claim, wherein the first and second computing devices communicate to agree a transaction for authorisation over a transaction scheme.

9. The method of claim 7 or claim 8, wherein the transaction process is a contactless transaction.

10. A first computing device comprising a memory and a processor programmed to perform actions executed by the first computing device in the method of any of claims 1 and 3 to 9 where dependent on claim 1.

11. The first computing device according to claim 10, wherein the first computing device is a payment device adapted for use by a cardholder to make payments on behalf of the cardholder.

12. The first computing device according to claim 10, wherein the

23

payment device is a payment card.

13. The first computing device according to claim 10, wherein the payment card is a mobile telephone.

14. A second computing device comprising a memory and a processor programmed to perform actions executed by the second computing device in the method of any of claims 2 and 3 to 9 where dependent on claim 2.

15. The second computing device according to claim 14, wherein the second computing device is a point of sale terminal.