CN1088872C - 认证可进行事务处理或存取的数据载体的方法和装置 - Google Patents
认证可进行事务处理或存取的数据载体的方法和装置 Download PDFInfo
- Publication number
- CN1088872C CN1088872C CN95103259A CN95103259A CN1088872C CN 1088872 C CN1088872 C CN 1088872C CN 95103259 A CN95103259 A CN 95103259A CN 95103259 A CN95103259 A CN 95103259A CN 1088872 C CN1088872 C CN 1088872C
- Authority
- CN
- China
- Prior art keywords
- carrier
- information
- data carrier
- particular number
- authentication value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4093—Monitoring of device authentication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/082—Features insuring the integrity of the data on or in the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Cash Registers Or Receiving Machines (AREA)
- Radar Systems Or Details Thereof (AREA)
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Abstract
认证数据载体的方法及装置,该载体能在某一服务部门或某一地点进行事务处理或存取。有两种认证方法。其一是常用的与专门机构脱开的方法,其二是周期联机的方法。按脱开方式,将与非对称算法(F)相关的并使用公共关键词(Kp)的算法(G)用于载体上读出的认证值(VA),以便一方面检查认证值(VA)是否与固有序列号(Ns)和信息(I)相容,另一方面检查事务处理或所请求的服务是否与信息(I)相容。按联机方式,还可另外改变载体的认证值。
Description
本发明涉及的是用于认证数据载体或装置是否出自专门(授权)机构的方法,该载体或装置用于在与所述机构相连(联网)的分配器附近的服务部门或场所进行事务处理或存取,该机构的一个文件中包括装在每个载体中的当前权利的内容,本方法在于将某一固有(特有)号码(Ns)分配给所述载体,该号码可以将此载体从所述机构生产的一批载体中区分开,本方法还在于把该号码装到所述载体上。
本发明的目的在于提供这样一种方法,即在载体本身中和在与载体相配合的销售商可选终端中采用一些尽可能简单的装置。例如当载体为电子载体时,希望除了所连接的计算电路外,它仅由一个存储器构成,而且希望该存储器的体积尽可能小。还希望载体和所连的终端都没有秘密密钥,因为这种密钥可能被作弊发现。
根据本发明,这些目的是用开头所述的方法完成的,此外,该方法还在于,在所述机构内启动所述载体或装置,与此同时将信息(I)分配给了载体,该信息根据所述文件的内容限定附到该载体上的权利,并根据固有号码(Ns)及信息(I)用非对称算法(F)和秘密关键词(Ks)计算认证值(VA),同时将此认证值加到载体上,在每次使用所述载体时,通过对与所述秘密密钥(Ks)关联的公共密钥(Kp)以及从载体读出的当前认证值(VA)应用与所述非对称算法(F)相关的算法(G),进行计算,由所述销售商在一种不连接于授权机构的方式下执行对载体的认证,以验证认证值(VA)是否与特定号码(Ns)和信息(I)相容,并且验证所请求的交易或服务是否与信息(I)相容;
周期性地或视事务处理或服务部门的类型而由分配器以与专门机构相连的方式对该载体进行认证,同时首先由分配器或专门机构认证该载体,所述专门机构检查该载体上读到的认证值(VA)是否与固有号码(Ns)和信息(I)相容,如果认证肯定,则由专门机构根据所述文件的当前状态证实该载体还具有权利,在证实过程中,如果有必要改变信息(I)来表示其当前的权利状态,则根据固有号码(Ns)和新的信息(I)用非对称算法(F)及保密关键词(Ks)计算新的认证值(VA′),并将该新的数值加到载体上。使用非对称算法可以在只有作认证值(VA)的记录时才要求用保密关键词,而该值的常规检查只需要公共关键词。
但通过采用与专门机构周期性相连的方法可以对装入各载体中的权利进行更完全的检查,如有必要可对载体进行当天处理。
本发明还涉及与上述方法相关的各种装置。
本发明的其它细节和优点将结合唯一的一幅附图在对非限定的较佳实施例的描述中显示出来,该图用图解的方法示出了与专门机构的终端相配合的便携式信息目标以及装在销售处的终端。
在图中,用1表示便携式的信息目标,该信息目标主要是指装有EEPROM存储器2的电子卡(插件),该存储器由接口3与外部连接。电子卡没有微处理器那种处理回路。存储器2中主要有两个信息,即一个电子卡的序列号(Ns),制造时该序列号就给了电子卡,还有一个就是用于证实电子卡是否来自专门机构的认证值(VA),下面将描述(VA)值的计算。
用4表示能传输或整理当天电子卡的专门机构的中心计算机。它主要包括处理回路5和连通各回路之间并与接口7进行连接的存储器6。存储器6中装有加密的非对称算法F的程序,这种算法为公知技术,它要求使用存储式的保密关键词(Ks)来对数据进行编码(译成密码)而译码只要求用对应的公共关键词(Kp)。在存储器6中还有一个包括被安装到每个来自专门机构的载体上的当前权利的文件。重要的是计算认证值(VA),并将该值送入电子卡中,需要使用两个数据,即该电子卡的序列号(Ns)以及确定装到该电子卡上的权利的信息I。信息I根据文件所含内容进行设计。例如它可以采用下面的任一种形式:
1.能够算出限定权利日期的参考日期:尤其在所涉及的日期中,电子卡持有人在限定的期限内确定所给出的服务项目,也可以直接确定在该服务部门进行存取的限定日期;
2.如下消息(启示):“不接受任何超过100法郎金额的事务处理”;
3.消息:“至今某先生的权利有效”;
4. 1至10之间的数据,它确定该机构在电子卡持有人中所具有的信任程度,信息I不保密,但最好用数字编码形式表示,以便保住某些秘密。
因此可以写成:
VA=F(Ns,I,Ks)
注意:VA可以认为是由序列号Ns和信息I构成的非对称消息标记。
此外,序列号Ns可以由其它能够单独认证电子卡1的号码构成。
用8表示销售处的终端,用以分配利益或服务项目或者付服务报酬。它包括处理回路9和在各回路之间与接口11通过合适的连接法进行配合的存储器10。该存储器包括与上述算法F相结合的算法G的程序以及与保密关键词Ks相结合的公共关键词Kp。
根据第一种实施形式,采用“具有消息补偿”式的程序(即能够补偿消息内容),在此情况下,算法F的基础在于因子分解问题。而终端所包括的算法G是由算法F的倒数的算法(F-1)构成的。为确保VA计算的保密性,电子卡1的存储器2中的VA的维数最好至少等于512比特。
因此,用下面的方法终端就能得到一对值Ns,1:
(Ns,I)=F-1(VA,Kp)
n表示公共关键词Kp;n=p×q,p和q是构成保密关键词Ks的前两个保密数值。在该情况中,F1表示为:
(Ns,I)=VA3模数n,
认证电子卡的方法首先包括在专门机构中的初始化阶段,在该阶段,专门机构的中心计算机4算出该电子卡的第一个值VA,并将该值返送到电子卡的存储器2中。
在使用时,并入专门机构的各个销售处的终端8以相对于该机构的中心计算机4脱开的方法对同一电子卡1连续进行一定次数的检查,这种检查次数对应于要求进行事务处理的次数。在每次检查过程中,由应用于电子卡存储器中读到的VA值的算法F-1来反复计算Ns和I这两个数。这样一方面可以检查电子卡存储器中读到的序列号Ns是否对应于计算的序列号,另一方面又可以检查计算的信息I是否完全为它本身的相关信息,也就是说该信息是否构成可以理解的信号,以及它是否与请求的事务处理相容。如果答案肯定,则销售处的终端可以允许进行事务处理。
通过参照上述给定的信息I实例的编号,相容性检查例如可以确保;
1.在事务处理的那一天,不超过限定的权利日期;
2.事务处理的金额不超100法郎;
3.考虑到原先的核准已经过时,某先生的权利不要求由专门机构重新核准;
4.根据所给出的数目,确定事务处理的性质。
反之,所读的Ns和计算的Ns之间的差或计算出的信息I的不相关性表示电子卡并不出自专门的机构,以便销售处的终端拒绝事务处理。
例如每月一次的总结算时,销售处的终端与专门机构的中心计算机“连接”进行检查。在第一阶段要保证电子卡受到很好的认证。这可以用两种方法进行。或由销售处的终端如上述那样以脱开方式对VA值进行检查,或由专门机构从事这一工作:具有所有单元的专门机构允许终端把认证值VA给予电子卡,通过与文件中的内容进行直接比较,它就很容易对电子卡上读到的数值VA进行检查,在所述文件中,它将记录认证值VA,序列号Ns和信息1。对前面所述情况,也可以通过与反复计算的值VA进行比较对电子卡上读到的数值进行检查。
在第二阶段,在任何情况的运行都是“连接”运行,在查阅文件时,机构的中心计算机检查带有经反复计算的序列号Ns的电子卡是否还有权利。例如它检查:
---没有异议提出后启用电子卡:
---电子卡显示出有权利的银行帐户并不透支;等等。
在第三阶段,根据需要,所述机构“修正”认证值VA,以便根据电子卡所具有的权利或根据最后接触所签署的新权利而延长有效限定期。为此,机构的中心计算机根据新的信息I计算新的VA值,该新信息考虑到了权利的这一变化:
VA′=F(Ns,I′,Ks)
再把该值VA′记录在电子卡存储器2的当前值VA的地方,这样就停止了程序。
根据本发明的第二种实施方式,采用“无消息补偿”(即不能补偿消息内容)式的程序。在此情况下,算法F例如是基于不连续对数的问题,而终端中所包括的算法G并不是由F的倒数F-1的算法构成,而仅仅是与F有关的算法,从而使它能够检查认证值VA是否根据序列号Ns和信息I进行过正确计算。例如G算法可以是公知的DSS(Digital Signature Standard)算法,该算法可以根据认证值VA,公共关键词Kp,也可以根据序列号Ns和信息I来检查VA与Ns及I是否相容。此外,不可能由终端再算出Ns和I。反之,电子卡1的存储器2中的VA值最好至少等于320比特,这样就足以保证VA的安全性能。
在该第二种实施方案中,终端进行的相容性计算要求该终端认出序列号Ns和信息I。至于序列号可由终端的电子卡1读出。而对于信息I,可有两种情况:
-该信息存在电子卡的存储器2中,而由终端读该信息;
-终端暗含地认出该信息,这是因为对于顾客给出的整个范畴来说此信息是唯一的;可以涉及如下形式的信息:“所从事的事务处理达1000法郎”。
在使用过程中,每个销售点的终端8可以以脱开的方式连续检查同一电子卡1。一旦用G算法检查了值VA与值Ns、I之间的相容性,这三个值就由电子卡读出,或对于信息I,则由终端隐含地认出。对于肯定的情况,就可以进行事务处理。正如第一个实施方式那样,终端可以检查信息I与所请求的事务处理的相容性。
以连接方式进行的运行类似于第一个实施方式所描述的运行,唯一的差别在于,如果对电子卡检查其可靠性的第一阶段是由销售点的终端完成,则所考虑的值NS和I就是电子卡上读到的值,而不再是重新计算的值。如果被装到电子卡中的权利应当进行改变。专门机构的中心计算机就记录新的认证值VA′,如有必要,还要在当前数据的位置记录新的信息I′。
本发明不仅实用于认证存储器卡,而且更普遍地适用于认证所有电子或非电子式的数据载体(上面登记了序列号Ns和认证值VA的身分证或资格证明)。
数据载体也可以由加有序列号Ns或认证值VA的便携计算机这样的装置构成
Claims (15)
1.一种对确实由授权机构发行的数据载体进行认证的方法,可以在所述机构的附属销售商处操作所述载体以便进行交易或者使得能够获得某种服务或进入某个场所,该机构具有一个限定赋予所述载体的当前权利的文件,该方法的特征在于包括以下步骤:
为所述载体分配一个特定号码(Ns),该号码使得所述载体区别于所述机构生产的一组载体;
将所述特定号码输入该载体;
通过向所述载体分配一种信息(I)、利用非对称算法(F)和秘密密钥(Ks)根据所述特定号码(Ns)和所述信息(I)计算一个当前认证值(VA)并将所述当前认证值输入所述载体,在该机构初始化所述载体,其中信息(I)是所述文件内容的函数并且限定了赋予所述载体的当前权利;
在每次使用所述载体时,通过对与所述秘密密钥(Ks)关联的公共密钥(Kp)以及从载体读出的当前认证值(VA)应用与所述非对称算法(F)相关的算法(G),进行计算,由所述附属销售商在一种不连接于授权机构的方式下执行对载体的认证,以验证认证值(VA)是否与特定号码(Ns)和信息(I)相容,并且验证所请求的交易或服务是否与信息(I)相容;
根据限定何时必须在将终端连接于授权机构的方式下对数据载体进行认证的预定条件,在所述连接于授权机构的方式下有选择地执行对数据载体的认证,首先由销售商或授权机构对载体进行认证,这验证了从载体读出的当前认证值(VA)与特定号码(Ns)和信息(I)相容,并且如果认证是确实的,则由授权机构确认载体仍然拥有作为所述文件当前状态的函数的权利,然后如果确认是肯定的并且为了变换当前权利状态需要改变信息(I)时,利用非对称算法(F)和秘密密钥(Ks)根据特定号码(Ns)和更新的信息(I’)计算更新的认证值(VA’),并且将这个更新的值输入载体。
2.根据权利要求1的方法,其特征在于与非对称算法(F)相关的算法(G)包括一个是非对称算法的逆算法的算法(F-1),每次使用载体时,这样来执行认证:使用从所述载体读出的当前认证值(VA)利用所述算法(F-1)计算与载体相关的特定号码(Ns)和信息(I)、并且然后验证所读的特定号码(Ns)与所计算的特定号码相同并且验证所计算的信息(I)构成可理解的消息并且与所请求的交易或服务相容。
3.根据权利要求1的方法,其特征在于与非对称算法(F)相关的算法(G)使得所述认证需要了解信息(I)和特定号码(Ns),信息(I)或者是输入在载体中的或者是销售商已知的,并且每次使用载体时,通过进一步向该相关的算法(G)施加信息(I)和从载体读出的特定号码(Ns)来进行所述计算。
4.根据权利要求1的方法,其特征在于所述信息(I)包括一个参考日期,使得能够计算赋予载体的权利的到期日期,并且在每次认证时,在所请求的交易或服务的日期,验证权利的到期日期是否已过。
5.根据权利要求1的方法,其特征在于所述预定条件限定必须在将终端连接于授权机构的方式下周期性地对数据载体进行认证。
6.根据权利要求1的方法,其特征在于所述预定条件限定作为某类交易或服务的功能必须在将终端连接于授权机构的方式下对数据载体进行认证。
7.一种数据载体,包括:
一个存储在其中的特定号码(Ns),使得所述数据载体区别于授权机构生产的一组载体;
一个存储在其中的当前认证值(VA),它是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述认证值(VA)在修改了赋予所述数据载体的所述当前权利后由所述授权机构更新。
8.根据权利要求7的载体,其特征在于非对称算法(F)使得认证载体需要了解信息(I)以及特定号码(Ns),该信息(I)对于每个载体是特定的并且输入于载体中。
9.根据权利要求8的载体,其特征在于所述载体是一个装备有电子EEPROM存储器的便携式物体,其中存储有所述当前认证值(VA)。
10.根据权利要求7的载体,其特征在于所述载体是一个装备有电子EEPROM存储器的便携式物体,其中存储有所述当前认证值(VA)。
11.一种用于与数据载体配合以便提供交易或服务的终端,所述数据载体存储有一个特定号码(Ns)和一个当前认证值(VA),该特定号码(Ns)使得所述数据载体区别于授权机构生产的一组载体,当前认证值(VA)是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述终端的特征在于包括:
用于存储一个与所述非对称算法(F)相关的算法(G)、与秘密密钥(Ks)相关联的公共密钥(Kp)以及一个预定条件的装置,该预定条件限定何时必须在将终端连接于授权机构的方式下对数据载体进行认证;
用于利用算法(G)、公共密钥(Kp)以及读自数据载体的当前认证值(VA)进行计算以便验证当前认证值(VA)与特定号码(Ns)和信息(I)相容并验证所请求的交易或服务与信息(I)相容的装置;
用于在考虑所述预定条件时判定是否必须在将终端连接于授权机构的方式下对数据载体进行认证的装置;以及
用于如果必须在所述方式下进行认证则请求授权机构检查当前认证值(VA)的装置。
12.根据权利要求11的终端,其特征在于所述预定条件限定必须在将终端连接于授权机构的方式下周期性地对数据载体进行认证。
13.根据权利要求11的终端,其特征在于所述预定条件限定作为某类交易或服务的功能必须在将终端连接于授权机构的方式下对数据载体进行认证。
14.授权机构中用于与数据载体进行配合的中央装置,数据载体具有用于存储有一个特定号码(Ns)和一个当前认证值(VA)的装置,该特定号码(Ns)使得所述数据载体区别于所述授权机构生产的一组载体,当前认证值(VA)是通过非对称算法(F)根据秘密密钥(Ks)、所述特定号码(Ns)和一种信息(I)计算得到的,信息(I)是所述授权机构拥有的一个文件的内容的函数,该文件限定赋予所述数据载体的当前权利,所述中央装置的特征在于包括:
用于存储所述文件、所述非对称算法(F)以及所述秘密密钥(Ks)的装置;
用于检查数据载体是否仍然具有权利以及作为所述文件当前状态的函数是否必须更新数据载体上的所述当前认证值(VA)的装置;
用于利用非对称算法(F)和秘密密钥(Ks)根据读自所述文件的更新的信息(I’)和特定号码(Ns)计算更新的认证值(VA’)的装置;以及
用于将所述更新的认证值(VA’)输入所述数据载体的装置。
15.根据权利要求14的中央装置,该中央装置通过一个终端与所述数据载体配合,所述终端与所述中央装置远程连接,所述数据载体与所述终端本地连接。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9402717 | 1994-03-09 | ||
FR9402717A FR2717286B1 (fr) | 1994-03-09 | 1994-03-09 | Procédé et dispositif pour authentifier un support de données destiné à permettre une transaction ou l'accès à un service ou à un lieu, et support correspondant. |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1121221A CN1121221A (zh) | 1996-04-24 |
CN1088872C true CN1088872C (zh) | 2002-08-07 |
Family
ID=9460842
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN95103259A Expired - Fee Related CN1088872C (zh) | 1994-03-09 | 1995-03-08 | 认证可进行事务处理或存取的数据载体的方法和装置 |
Country Status (12)
Country | Link |
---|---|
US (1) | US5867577A (zh) |
EP (1) | EP0671712B1 (zh) |
JP (1) | JP3326040B2 (zh) |
KR (1) | KR0168481B1 (zh) |
CN (1) | CN1088872C (zh) |
AT (1) | ATE223094T1 (zh) |
AU (1) | AU1470795A (zh) |
CA (1) | CA2144124C (zh) |
DE (1) | DE69527867T2 (zh) |
FR (1) | FR2717286B1 (zh) |
NO (1) | NO309345B1 (zh) |
TW (1) | TW301095B (zh) |
Families Citing this family (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7690043B2 (en) | 1994-12-19 | 2010-03-30 | Legal Igaming, Inc. | System and method for connecting gaming devices to a network for remote play |
US7260834B1 (en) | 1999-10-26 | 2007-08-21 | Legal Igaming, Inc. | Cryptography and certificate authorities in gaming machines |
US6272223B1 (en) * | 1997-10-28 | 2001-08-07 | Rolf Carlson | System for supplying screened random numbers for use in recreational gaming in a casino or over the internet |
DE19514084C1 (de) * | 1995-04-13 | 1996-07-11 | Siemens Ag | Verfahren zum rechnergestützten Austausch kryptographischer Schlüssel zwischen einer Benutzercomputereinheit U und einer Netzcomputereinheit N |
US5832090A (en) * | 1995-08-10 | 1998-11-03 | Hid Corporation | Radio frequency transponder stored value system employing a secure encryption protocol |
FR2745406B1 (fr) * | 1996-02-23 | 1998-06-26 | Sligos | Carte de gestion de comptes multiples et procede de mise en oeuvre |
FR2750274B1 (fr) * | 1996-06-21 | 1998-07-24 | Arditti David | Procede de prise en compte d'une demande d'utilisation d'une carte prepayee virtuelle permettant la reutilisation de son numero de serie |
FR2751104B1 (fr) | 1996-07-11 | 1998-12-31 | Stoffel Laurent | Procede de controle de transactions securisees independantes utilisant un dispositif physique unique |
JPH1063722A (ja) * | 1996-08-14 | 1998-03-06 | Toshiba Corp | カード取引システム及びカード取引方法 |
EP0851396A1 (en) * | 1996-12-23 | 1998-07-01 | Koninklijke KPN N.V. | System for increasing a value of an electronic payment card |
HUP0001504A3 (en) * | 1997-03-06 | 2001-01-29 | Deutsche Telekom Ag | Data carrier, especially a chip card |
AUPO799197A0 (en) * | 1997-07-15 | 1997-08-07 | Silverbrook Research Pty Ltd | Image processing method and apparatus (ART01) |
FR2761840B1 (fr) * | 1997-04-03 | 2000-04-07 | Gemplus Card Int | Procede de certification d'un cumul dans un lecteur |
DE19716068A1 (de) * | 1997-04-17 | 1998-10-22 | Giesecke & Devrient Gmbh | Verfahren zur Erzeugung eines Guthabens mittels eines vorausbezahlten Wertgutscheins |
FR2771528B1 (fr) * | 1997-11-25 | 2000-01-14 | Gemplus Card Int | Procede de gestion des donnees dans une carte a puce |
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
DE19757501C1 (de) * | 1997-12-23 | 1999-09-16 | Ibm | Verfahren zum Schutz von Transaktionsdaten |
JP4176181B2 (ja) * | 1998-03-13 | 2008-11-05 | 富士通株式会社 | 電子財布管理システム、端末装置及び電子財布管理プログラムを記録したコンピュータ読み取り可能な記録媒体 |
DE19913931B4 (de) * | 1999-03-26 | 2010-12-30 | Scheuermann, Carl H. | Überprüfungsverfahren und elektromechanisches Schließsystem |
DE19920744A1 (de) * | 1999-05-05 | 2000-11-16 | Siemens Ag | Verfahren zur Sicherung der Echtheit von Produkten |
US8397058B1 (en) | 1999-07-28 | 2013-03-12 | Mondex International Limited | System and method for communication between smart cards |
US6708049B1 (en) | 1999-09-28 | 2004-03-16 | Nellcor Puritan Bennett Incorporated | Sensor with signature of data relating to sensor |
FR2800220B1 (fr) * | 1999-10-26 | 2002-02-15 | France Telecom | Procede de transaction electronique securisee |
FI107769B (fi) * | 1999-12-23 | 2001-09-28 | Setec Oy | Salaisen avaimen käsittely |
US6571276B1 (en) | 2000-02-23 | 2003-05-27 | International Business Machines Corporation | System for managing asset access in a distributed storage system |
US7194634B2 (en) * | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
US6760441B1 (en) | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
US6934817B2 (en) * | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US6769058B1 (en) | 2000-03-31 | 2004-07-27 | Intel Corporation | Resetting a processor in an isolated execution environment |
US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US6754815B1 (en) | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
US7089418B1 (en) | 2000-03-31 | 2006-08-08 | Intel Corporation | Managing accesses in a processor for isolated execution |
US7043642B1 (en) | 2000-05-22 | 2006-05-09 | Gemplus | Process to manage data in a chip card |
US6976162B1 (en) * | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
US7389427B1 (en) | 2000-09-28 | 2008-06-17 | Intel Corporation | Mechanism to secure computer output from software attack using isolated execution |
US7793111B1 (en) | 2000-09-28 | 2010-09-07 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
FR2815747A1 (fr) * | 2000-10-19 | 2002-04-26 | Sequoias | Procede pour garantir l'authenticite d'un article pourvu d'un element d'enregistrement et de stockage d'informations |
US7215781B2 (en) | 2000-12-22 | 2007-05-08 | Intel Corporation | Creation and distribution of a secret value between two devices |
US7818808B1 (en) | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
US7035963B2 (en) * | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
US7225441B2 (en) * | 2000-12-27 | 2007-05-29 | Intel Corporation | Mechanism for providing power management through virtualization |
US7272831B2 (en) | 2001-03-30 | 2007-09-18 | Intel Corporation | Method and apparatus for constructing host processor soft devices independent of the host processor operating system |
US7191440B2 (en) | 2001-08-15 | 2007-03-13 | Intel Corporation | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
US7024555B2 (en) * | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7103771B2 (en) * | 2001-12-17 | 2006-09-05 | Intel Corporation | Connecting a virtual token to a physical token |
US7308576B2 (en) | 2001-12-31 | 2007-12-11 | Intel Corporation | Authenticated code module |
FR2835636A1 (fr) * | 2002-02-07 | 2003-08-08 | Carmel Giacopino | Systeme permettant d'effectuer des echanges d'information et des transactions |
US7480806B2 (en) | 2002-02-22 | 2009-01-20 | Intel Corporation | Multi-token seal and unseal |
US7631196B2 (en) * | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
US7124273B2 (en) * | 2002-02-25 | 2006-10-17 | Intel Corporation | Method and apparatus for translating guest physical addresses in a virtual machine environment |
US7028149B2 (en) | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US7127548B2 (en) | 2002-04-16 | 2006-10-24 | Intel Corporation | Control register access virtualization performance improvement in the virtual-machine architecture |
JP4326189B2 (ja) * | 2002-06-10 | 2009-09-02 | 健 坂村 | 自律型icカード及び通信システム |
US7142674B2 (en) * | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
US7124327B2 (en) | 2002-06-29 | 2006-10-17 | Intel Corporation | Control over faults occurring during the operation of guest software in the virtual-machine architecture |
US6996748B2 (en) | 2002-06-29 | 2006-02-07 | Intel Corporation | Handling faults associated with operation of guest software in the virtual-machine architecture |
US7296267B2 (en) | 2002-07-12 | 2007-11-13 | Intel Corporation | System and method for binding virtual machines to hardware contexts |
US9251649B2 (en) | 2002-10-09 | 2016-02-02 | Zynga Inc. | System and method for connecting gaming devices to a network for remote play |
US7165181B2 (en) * | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
US20040117532A1 (en) * | 2002-12-11 | 2004-06-17 | Bennett Steven M. | Mechanism for controlling external interrupts in a virtual machine system |
US7073042B2 (en) | 2002-12-12 | 2006-07-04 | Intel Corporation | Reclaiming existing fields in address translation data structures to extend control over memory accesses |
US7900017B2 (en) | 2002-12-27 | 2011-03-01 | Intel Corporation | Mechanism for remapping post virtual machine memory pages |
US20040128345A1 (en) * | 2002-12-27 | 2004-07-01 | Robinson Scott H. | Dynamic service registry |
US20040128465A1 (en) * | 2002-12-30 | 2004-07-01 | Lee Micheil J. | Configurable memory bus width |
JP2004234641A (ja) * | 2003-01-08 | 2004-08-19 | Kddi Corp | コンテンツファイル制作者の認証方式およびそのプログラム |
FR2850479B1 (fr) * | 2003-01-24 | 2005-04-29 | France Telecom | Procede cryptographique a cle publique pour la protection d'une puce contre la fraude |
US7415708B2 (en) * | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
US20050044292A1 (en) * | 2003-08-19 | 2005-02-24 | Mckeen Francis X. | Method and apparatus to retain system control when a buffer overflow attack occurs |
US7287197B2 (en) * | 2003-09-15 | 2007-10-23 | Intel Corporation | Vectoring an interrupt or exception upon resuming operation of a virtual machine |
US7424709B2 (en) | 2003-09-15 | 2008-09-09 | Intel Corporation | Use of multiple virtual machine monitors to handle privileged events |
US7739521B2 (en) * | 2003-09-18 | 2010-06-15 | Intel Corporation | Method of obscuring cryptographic computations |
US7610611B2 (en) * | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
US7237051B2 (en) | 2003-09-30 | 2007-06-26 | Intel Corporation | Mechanism to control hardware interrupt acknowledgement in a virtual machine system |
US20050080934A1 (en) | 2003-09-30 | 2005-04-14 | Cota-Robles Erik C. | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
US7177967B2 (en) * | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
US7636844B2 (en) * | 2003-11-17 | 2009-12-22 | Intel Corporation | Method and system to provide a trusted channel within a computer system for a SIM device |
US20050108171A1 (en) * | 2003-11-19 | 2005-05-19 | Bajikar Sundeep M. | Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform |
US20050108534A1 (en) * | 2003-11-19 | 2005-05-19 | Bajikar Sundeep M. | Providing services to an open platform implementing subscriber identity module (SIM) capabilities |
US8156343B2 (en) | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
US8037314B2 (en) | 2003-12-22 | 2011-10-11 | Intel Corporation | Replacing blinded authentication authority |
US20050152539A1 (en) * | 2004-01-12 | 2005-07-14 | Brickell Ernie F. | Method of protecting cryptographic operations from side channel attacks |
US7299974B2 (en) * | 2004-01-23 | 2007-11-27 | Mastercard International Incorporated | System and method for generating collision-free identifiers for financial transaction cards |
US7802085B2 (en) | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
US20050216920A1 (en) * | 2004-03-24 | 2005-09-29 | Vijay Tewari | Use of a virtual machine to emulate a hardware device |
US7356735B2 (en) * | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
US7620949B2 (en) * | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
US20050288056A1 (en) * | 2004-06-29 | 2005-12-29 | Bajikar Sundeep M | System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module |
US7305592B2 (en) * | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
DE102004045978A1 (de) * | 2004-09-22 | 2006-03-30 | Siemens Ag | Verfahren und System zur Überprüfung und Einräumung einer Zugangsberechtigung für einen Benutzer |
US7840962B2 (en) * | 2004-09-30 | 2010-11-23 | Intel Corporation | System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time |
US8146078B2 (en) | 2004-10-29 | 2012-03-27 | Intel Corporation | Timer offsetting mechanism in a virtual machine environment |
US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US7739510B2 (en) * | 2005-05-12 | 2010-06-15 | The Invention Science Fund I, Inc | Alert options for electronic-paper verification |
US8063878B2 (en) | 2005-01-20 | 2011-11-22 | The Invention Science Fund I, Llc | Permanent electronic paper |
US8640259B2 (en) * | 2005-01-20 | 2014-01-28 | The Invention Science Fund I, Llc | Notarizable electronic paper |
US7643005B2 (en) * | 2005-01-20 | 2010-01-05 | Searete, Llc | Semi-permanent electronic paper |
US7865734B2 (en) * | 2005-05-12 | 2011-01-04 | The Invention Science Fund I, Llc | Write accessibility for electronic paper |
US7669245B2 (en) * | 2005-06-08 | 2010-02-23 | Searete, Llc | User accessibility to electronic paper |
US8281142B2 (en) * | 2005-01-20 | 2012-10-02 | The Invention Science Fund I, Llc | Notarizable electronic paper |
US7856555B2 (en) * | 2005-01-20 | 2010-12-21 | The Invention Science Fund I, Llc | Write accessibility for electronic paper |
US7774606B2 (en) | 2005-01-20 | 2010-08-10 | The Invention Science Fund I, Inc | Write accessibility for electronic paper |
US7395405B2 (en) | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
WO2006120364A2 (fr) * | 2005-05-12 | 2006-11-16 | France Telecom | Transfert d'un code de carte prepayee vers un serveur d'operateur de cartes |
US8219829B2 (en) * | 2005-12-08 | 2012-07-10 | Intel Corporation | Scheme for securing locally generated data with authenticated write operations |
US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
US20080132222A1 (en) * | 2006-11-30 | 2008-06-05 | Brady Colin P | Wireless communication using a picocell station having its own phone number |
DE102010010950A1 (de) * | 2010-03-10 | 2011-09-15 | Giesecke & Devrient Gmbh | Verfahren zum Authentisieren eines portablen Datenträgers |
DE102011015710A1 (de) * | 2011-03-31 | 2012-10-04 | Giesecke & Devrient Gmbh | Verfahren zum Aktualisieren eines Datenträgers |
DE102011054637A1 (de) | 2011-10-20 | 2013-04-25 | Marc Gaston Zacher | Verfahren zum Konfigurieren eines elektromechanischen Schlosses |
US10546293B2 (en) * | 2014-05-29 | 2020-01-28 | Apple Inc. | Apparatuses and methods for using a random authorization number to provide enhanced security for a secure element |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4453074A (en) * | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2350418A1 (de) * | 1973-10-08 | 1975-04-10 | Gretag Ag | Verfahren und einrichtung zur erstellung und auswertung von faelschungssicheren maschinell lesbaren zahlungsbelegen |
GB2078410A (en) * | 1980-06-19 | 1982-01-06 | Racal Transcom Ltd | Card transaction verification |
ATE22498T1 (de) * | 1980-06-20 | 1986-10-15 | Plessey Overseas | Verfahren und einrichtung zum pruefen von muenzen. |
US4626669A (en) * | 1983-12-28 | 1986-12-02 | Fairview Partners | Intercept system for intercepting stolen, lost and fraudulent cards |
US4748668A (en) * | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
FR2618002B1 (fr) * | 1987-07-10 | 1991-07-05 | Schlumberger Ind Sa | Procede et systeme d'authentification de cartes a memoire electronique |
WO1992013321A1 (en) * | 1991-01-18 | 1992-08-06 | Thomson Consumer Electronics S.A. | Method and apparatus for access control and/or identification |
-
1994
- 1994-03-09 FR FR9402717A patent/FR2717286B1/fr not_active Expired - Fee Related
-
1995
- 1995-03-07 CA CA002144124A patent/CA2144124C/fr not_active Expired - Fee Related
- 1995-03-08 CN CN95103259A patent/CN1088872C/zh not_active Expired - Fee Related
- 1995-03-08 NO NO950896A patent/NO309345B1/no not_active IP Right Cessation
- 1995-03-09 AT AT95400505T patent/ATE223094T1/de not_active IP Right Cessation
- 1995-03-09 US US08/402,063 patent/US5867577A/en not_active Expired - Lifetime
- 1995-03-09 JP JP4996295A patent/JP3326040B2/ja not_active Expired - Fee Related
- 1995-03-09 AU AU14707/95A patent/AU1470795A/en not_active Abandoned
- 1995-03-09 DE DE69527867T patent/DE69527867T2/de not_active Expired - Lifetime
- 1995-03-09 EP EP95400505A patent/EP0671712B1/fr not_active Expired - Lifetime
- 1995-03-09 KR KR1019950005175A patent/KR0168481B1/ko not_active IP Right Cessation
- 1995-03-22 TW TW084102777A patent/TW301095B/zh not_active IP Right Cessation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4453074A (en) * | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
Also Published As
Publication number | Publication date |
---|---|
DE69527867T2 (de) | 2003-02-13 |
ATE223094T1 (de) | 2002-09-15 |
DE69527867D1 (de) | 2002-10-02 |
CN1121221A (zh) | 1996-04-24 |
KR0168481B1 (ko) | 1999-01-15 |
TW301095B (zh) | 1997-03-21 |
KR950033921A (ko) | 1995-12-26 |
US5867577A (en) | 1999-02-02 |
NO950896D0 (no) | 1995-03-08 |
FR2717286A1 (fr) | 1995-09-15 |
CA2144124A1 (fr) | 1995-09-10 |
EP0671712B1 (fr) | 2002-08-28 |
NO309345B1 (no) | 2001-01-15 |
AU1470795A (en) | 1995-10-05 |
JP3326040B2 (ja) | 2002-09-17 |
EP0671712A1 (fr) | 1995-09-13 |
JPH0879238A (ja) | 1996-03-22 |
CA2144124C (fr) | 1999-11-30 |
NO950896L (no) | 1995-09-11 |
FR2717286B1 (fr) | 1996-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1088872C (zh) | 认证可进行事务处理或存取的数据载体的方法和装置 | |
KR102636102B1 (ko) | 블록체인 기반의 암호화폐를 위한 토큰을 검증하는 컴퓨터로 구현된 방법 및 시스템 | |
JP4543364B2 (ja) | 識別情報発行装置及び方法、認証装置及び方法、プログラム、並びに記録媒体 | |
US20190280875A1 (en) | Systems and methods for blockchain-based digital lottery ticket generation and distribution | |
US6904416B2 (en) | Signature verification using a third party authenticator via a paperless electronic document platform | |
US6434238B1 (en) | Multi-purpose transaction card system | |
US6957336B2 (en) | Establishing initial PuK-linked account database | |
US6983368B2 (en) | Linking public key of device to information during manufacture | |
GB2597592A (en) | Computer-implemented control system and method | |
US20020026578A1 (en) | Secure usage of digital certificates and related keys on a security token | |
JPH0622030B2 (ja) | 取引の正当性確認方式 | |
CN1266521A (zh) | 验证数据载体真实性的方法 | |
JP4234916B2 (ja) | 独立型本人認証装置におけるメモリレンタルサービスシステム | |
CN111369338A (zh) | 基于区块链的数据处理方法及装置 | |
CN111641631A (zh) | 基于区块链仓单平台的仓单验证方法与*** | |
US20040249765A1 (en) | Use of a kiosk to provide verifiable identification using cryptographic identifiers | |
US20060193475A1 (en) | Method for signing a dataset in a public key system and data processing system for carrying out said method | |
US8631475B1 (en) | Ordering inputs for order dependent processing | |
WO2022261649A2 (en) | Composite cryptographic systems with variable configuration parameters and memory bound functions | |
CN111277407A (zh) | 基于秘密共享的抗量子计算联盟链投票***及方法 | |
WO2000008610A1 (en) | Offline verification of integrated circuit card using hashed revocation list | |
JP4334021B2 (ja) | 読取り装置内の累積の証明方法 | |
JP2000251050A (ja) | Icカード、icカード情報読取装置、icカード情報集中管理装置、icカードの不正記録情報検知方法及びシステム | |
JP2007065727A (ja) | Icカード利用システム | |
CN117786766A (zh) | 一种带时间有效性验证的自动化信息审核方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: CP8 TECHNOLOGY CO.,LTD. Free format text: FORMER OWNER: BULL CP8 Effective date: 20050819 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20050819 Address after: French Rowan F Nass Patentee after: CP & Technologies Address before: France's Louvre Patentee before: Bull CP8 |
|
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20020807 Termination date: 20140308 |