EP3831010A1 - Sicheres verfahren zur datenübertragung zwischen einem zahlungsendgerät und einem drahtlosen drucker - Google Patents

Sicheres verfahren zur datenübertragung zwischen einem zahlungsendgerät und einem drahtlosen drucker

Info

Publication number
EP3831010A1
EP3831010A1 EP19742239.7A EP19742239A EP3831010A1 EP 3831010 A1 EP3831010 A1 EP 3831010A1 EP 19742239 A EP19742239 A EP 19742239A EP 3831010 A1 EP3831010 A1 EP 3831010A1
Authority
EP
European Patent Office
Prior art keywords
payment terminal
cryptographic key
reception device
data
data reception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP19742239.7A
Other languages
English (en)
French (fr)
Inventor
Jean-Christophe POMMARET
Dominique Testu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banks and Acquirers International Holding SAS
Original Assignee
Banks and Acquirers International Holding SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Banks and Acquirers International Holding SAS filed Critical Banks and Acquirers International Holding SAS
Publication of EP3831010A1 publication Critical patent/EP3831010A1/de
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1203Improving or facilitating administration, e.g. print management
    • G06F3/1209Improving or facilitating administration, e.g. print management resulting in adapted or bridged legacy communication protocols, e.g. emulation, protocol extension
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1236Connection management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/204Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/209Specified transaction journal output feature, e.g. printed receipt or voice output
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • G06Q20/425Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1278Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
    • G06F3/1292Mobile client, e.g. wireless printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the field of the invention is that of the secure transmission of data between a payment terminal and a and a device for receiving data, such as a printer.
  • Payment terminals are now mainly used in shops to pay for purchases. Merchants favor these payment terminals because they offer a higher degree of transaction security than other means of payment, such as checks, and because they avoid the inconvenience of having too much cash. cash. Thus, the payment terminal has become the preferred accessory for the merchant.
  • Such payment terminals can take the form of a touch pad accepting all means of payment and offering business services necessary for managing a business.
  • Such a tablet embedding an operating system, such as the Android operating system for example, it is possible to integrate simply and quickly business applications, such as billing applications for example, in such intelligent payment terminals , and thus improve the merchant experience.
  • Communication between a merchant and a user is an essential element for making a purchase.
  • the trader must first communicate his offer, a product and a price.
  • the user gives his acceptance and makes the payment, for example by using his bank card.
  • the merchant provides a receipt in the form of a ticket which indicates the amount of the payment and the product or service purchased.
  • This receipt allows, on the one hand, to confirm the amount actually invoiced and to justify the purchase, and on the other hand allows the merchant to give the user information on the product actually purchased.
  • the receipt is an information medium which can be in paper form.
  • Payment terminals do not systematically integrate a printer, this allows the merchant to pool one or more printers between a plurality of payment terminals in order to reduce costs.
  • the payment terminals and the shared printer can, for example, communicate through radio connections, such as for example Wi-Fi connections established in accordance with IEEE 802.11 protocols (Institute of Electrical and Electronics Engineers or Institute of Electrical Engineers and electronics engineers), or Bluetooth® or BLE® connections (for Bluetooth Low Energy, or Bluetooth low consumption)
  • the data shown on a receipt is sensitive and it is important that the data is secure before it is transmitted to the printer. To do this, there are many solutions for encrypting information before it is transmitted. However, the techniques used to encrypt the data transmitted from the payment terminal to a printer suffer from a lack of security. For example, it is theoretically possible to install, without the merchant's knowledge, a device for recording the information transmitted by the payment terminal.
  • the fraudster who took care to record the encrypted information transmitted by the payment terminal can then theoretically access the information contained in the receipt, such as bank information from the merchant or the customer who made the purchase.
  • this type of attack is possible when certain conditions are met, in particular when the fraudster is able to identify the encryption protocol used.
  • the invention meets this need by proposing a method for the secure reception of data relating to a transaction carried out by a payment terminal, the reception method being implemented by a data reception device and comprising:
  • a phase of obtaining a shared cryptographic key comprising the following steps of:
  • a secure data reception phase comprising the following steps
  • the payment terminal and the data reception device exchange messages relating to obtaining a cryptographic key shared between these two devices through a near field connection, such as that for example an NFC (Near Field Communication) connection.
  • a near field connection such as that for example an NFC (Near Field Communication) connection.
  • NFC Near Field Communication
  • Such a near field connection requires that the two devices be located close to each other, typically a few tens of centimeters, which reduces the risk of interception of the information exchanged during the exchanges.
  • the data reception device and the payment terminal each determine the cryptographic key shared by means of the information contained in the messages exchanged.
  • the data relating to a transaction carried out by the payment terminal are then encrypted by the payment terminal using the shared cryptographic key and transmitted to the data reception device via a short distance radio connection.
  • the transmission of data relating to a transaction carried out by the payment terminal through the short-distance radio connection makes it possible to increase the security level of the exchanges carried out between the payment terminal and the device for receiving the data because if the connection near field is compromised, the short distance radio connection may not be.
  • the short distance radio connection having a greater range, it offers more flexibility to the merchant who can move the payment terminal away from the data reception device without taking the risk of reducing the security of exchanges between the two equipment.
  • the shared cryptographic key is obtained, by the data reception device, from a temporary public cryptographic key from the payment terminal transmitted through the near-field connection and from a temporary private cryptographic key from the reception device of data.
  • this third party would not be able to obtain the shared cryptographic key because it would not be aware of the temporary private cryptographic key of the data reception device and the intercepted cryptographic keys would no longer be valid because their validity period had expired.
  • the message transmitted through the near-field connection also includes an address of a short-distance radio interface from the payment terminal.
  • the short-distance radio connection is established in accordance with the low-power Bluetooth protocol.
  • Bluetooth low consumption offers a flow of the same order of magnitude for less energy consumption.
  • the short distance radio connection is established in accordance with the Wi-Fi protocol.
  • a Wi-Fi connection offers a greater range than Bluetooth, which can be useful in premises with a large area.
  • the data reception device is a wireless printer.
  • the reception method further comprises a step of deleting the shared cryptographic key when a period of validity of the shared cryptographic key expires.
  • the cryptographic key is renewed periodically. This limits the risk of usurpation of a valid cryptographic key by a malicious third party.
  • the reception method further comprises a step of deleting the shared cryptographic key when a number of times the shared cryptographic key is used to encrypt data relating to a transaction carried out by the terminal payment is reached.
  • the data reception device is a wireless printer.
  • the invention also relates to a method for the secure transmission of data relating to a transaction carried out by a payment terminal, intended for at least one data reception device, the transmission method being implemented by the payment terminal. payment and including:
  • a phase of obtaining a shared cryptographic key comprising the following steps of:
  • a secure data reception phase comprising the following steps
  • the reception method further comprises a step of deleting the shared cryptographic key when a period of validity of the shared cryptographic key expires. According to one embodiment of the invention, the reception method further comprises a step of deleting the shared cryptographic key when a number of times the shared cryptographic key is used to encrypt data relating to a transaction carried out by the terminal payment is reached.
  • the invention also relates to a data reception device adapted to securely receive data relating to a transaction carried out by a payment terminal, the data reception device comprising means for:
  • the invention also relates to a payment terminal suitable for securely transmitting data relating to a transaction carried out by the payment terminal intended for at least one data reception device, the payment terminal comprising means for :
  • the invention relates to computer program products comprising program code instructions for implementing the methods as described above, when executed by a processor.
  • the invention also relates to computer-readable recording media on which computer programs are recorded comprising program code instructions for executing the steps of the reception and transmission methods according to the invention.
  • Such recording media can be any entity or device capable of storing the program.
  • the supports may include a storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or else a magnetic recording means, for example a USB key or a hard disk.
  • Such recording media can be transmissible media such as an electrical or optical signal, which can be routed via an electrical or optical cable, by radio or by other means, so that the program computer they contain is executable remotely.
  • the programs according to the invention can in particular be downloaded from a network, for example the Internet network.
  • the recording media can be an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the aforementioned transmission and reception methods.
  • FIG. 1 schematically represents a system in which the invention is implemented
  • FIG. 2 represents a sequence diagram of the data transmission method according to an embodiment of the invention
  • FIG. 3 represents a device for receiving data according to an embodiment of the invention
  • FIG. 4 represents a payment terminal according to an embodiment of the invention.
  • This technique solves the problem of transmitting information to a consumer who has made a purchase when the payment terminal which is used to making a purchase does not have a built-in printer to attest to the materiality of the purchase on the one hand and the amount paid on the other.
  • FIG. 1 schematically represents a system 1 in which the invention is implemented.
  • the system 1 includes a data reception device 10 and a payment terminal 11.
  • the data reception device 10 and the payment terminal 11 exchange data for editing by the data reception device. This data exchange between the data reception device 10 and the payment terminal 10 is indicated by the arrows 12.
  • the data reception device 10 is, in one embodiment of the invention, a wireless printer allowing the printing of a receipt comprising data relating to a transaction carried out by the payment terminal 11.
  • the data reception device 10 is provided with a screen (not shown in FIG. 1) making it possible to edit the data relating to a transaction carried out by the payment terminal 11 in particular in the form of a code- two-dimensional bars or QR-code.
  • FIG. 2 represents a sequence diagram of the data transmission method according to an embodiment of the invention.
  • the transmission method comprises two phases: a first phase of pairing the payment terminal 11 with the data reception device 10 and a second phase of secure transmission of data relating to transactions carried out by the payment terminal 11.
  • the first pairing phase includes steps E1 to E12. Such a pairing phase is for example implemented every morning when the merchant switches on the payment terminal 11 and the data reception device 10.
  • the second phase of secure transmission includes steps E13 to E18. Such a secure transmission phase is implemented with each transaction carried out by the payment terminal 11.
  • a step E1 in order to be able to edit receipts comprising data relating to transactions carried out, such as the number of items purchased, their price, etc., the payment terminal 11 is positioned close to the device reception of data 10 by the merchant.
  • the payment terminal 11 randomly generates a pair of temporary cryptographic keys consisting of a public cryptographic key KPubll and a private cryptographic key KPrivll.
  • the validity period of this pair of keys is limited in time. Thus, when a certain duration has passed, the cryptographic keys are no longer valid. In one embodiment, once the validity period has elapsed, the cryptographic keys are deleted.
  • the data reception device 10 randomly generates a pair of cryptographic keys consisting of a public cryptographic key KPublO and a private cryptographic key KPriv10.
  • the validity period of this pair of cryptographic keys is limited in time. Thus, when a certain duration has passed, the cryptographic keys are no longer valid. In one embodiment, once the validity period has elapsed, the cryptographic keys are deleted.
  • the payment terminal 11 sends a message MSG1 through the near-field connection to the data reception device 10.
  • the message MSG1 notably includes the temporary public cryptographic key KPubll of the payment terminal 11.
  • the message MGS1 also includes an identifier of the payment terminal 11, such as a serial number, and an address of a short distance radio communication interface, such as the address of a low-consumption Bluetooth interface or the address of a Wi-Fi interface of the payment terminal 11.
  • the data reception device 10 sends a message MSG2 through the near-field connection to the payment terminal 10.
  • the message MSG2 notably includes the temporary public cryptographic key KPublO of the reception device 10.
  • the MGS2 message also includes an address of a short distance radio communication interface, such as the address of a low power Bluetooth interface or the address of a Wi-Fi interface of the data receiving device 10.
  • step E5 is executed before step E6. In another embodiment of the invention, steps E5 and E6 are carried out concomitantly.
  • the steps E7 and E8 of obtaining a temporary shared cryptographic key KPart are executed by the payment terminal 11 and by the data reception device 10. Each of these two pieces of equipment determines its copy of the temporary shared cryptographic key KPart.
  • the temporary shared key KPart is obtained in accordance with the protocol on the exchange of Diifie-Hellman keys based on elliptical curves.
  • a protocol allows an anonymous cryptographic key exchange which allows two peers, each with a private / public cryptographic key pair to establish a shared secret over an insecure connection.
  • the data reception device 10 obtains, by applying the cryptography of the elliptical curves, a master cryptographic key KMast which is a function of the temporary private cryptographic key KPriv10 of the data reception device 10 and of the temporary public cryptographic key KPubll of the payment terminal 11.
  • the payment terminal 11 obtains, by applying the cryptography of the elliptical curves, the master cryptographic key KMast which is a function of the temporary private cryptographic key KPrivll of the payment terminal 11 and of the temporary public cryptographic key KPublO of the data reception device 10.
  • a step E8 the data reception device 10 applies a key derivation function to the master cryptographic key KMast obtained during the step E7.
  • a bypass function is a hash function.
  • the result of the derivation of the KMast master cryptographic key is the KPart temporary shared cryptographic key.
  • step E8 the payment terminal 11 applies the same key derivation function as the data reception device 10 to the master cryptographic key KMast obtained during step E5.
  • the result of the derivation of the KMast master cryptographic key is the KPart temporary shared cryptographic key.
  • the payment terminal 11 encrypts data by means of the shared cryptographic key KPart which it obtained in step E8.
  • data is test data which has no link with data relating to a transaction carried out by the payment terminal 11.
  • a step E10 the payment terminal 11 sends a message MSG3 to the data reception device 10 through the near-field connection.
  • the message MSG3 includes the data encrypted during step E9.
  • the data reception device 10 decrypts the encrypted data included in the message MSG3 by means of the temporary shared cryptographic key KPart that it obtained during the step E8.
  • the data reception device 10 fails to decrypt the encrypted data received using the temporary shared cryptographic key KPart which it obtained during step E8, the temporary shared cryptographic key KPart is not functional . In this case, the near field connection between the data reception device 10 and the payment terminal 11 is interrupted.
  • the data reception device 10 decrypts the encrypted data received using the temporary shared cryptographic key KPart which it obtained during step E6, the temporary shared cryptographic key KPart is functional.
  • the data reception device 10 transmits, through the near-field connection and intended for the payment terminal, a confirmation message MSG4.
  • a step E13 the payment terminal 11 performs a transaction, such as a payment transaction following the purchase of a product by a consumer.
  • a short distance radio connection is established between the data reception device 10 and the payment terminal 11 by means of the data exchanged in the messages MSG1 and MSG2 exchanged during the steps E5 and E6.
  • the establishment of the short distance radio connection is initiated by the payment terminal 11 and is triggered by the generation of data relating to a transaction carried out by the payment terminal 11.
  • the payment terminal 11 encrypts the data relating to the transaction carried out by the payment terminal 11 using the temporary shared cryptographic key KPart in a step E15.
  • a step E16 the data relating to the transaction carried out by the encrypted payment terminal 11 are transmitted to the data reception device 10 in a message MSG5 through the short distance radio connection.
  • a step E17 the data reception device 10 decrypts, by means of the temporary shared cryptographic key KPart, the data relating to the transaction carried out by the encrypted payment terminal 11 received.
  • the data reception device 10 edits the data relating to the transaction carried out by the payment terminal 11 decrypted during the step E17.
  • the edition of the data relating to the transaction carried out by the payment terminal 11 takes the form of printing a paper receipt.
  • the KPart temporary shared cryptographic key has limited validity in order to limit the risk of fraudulent use.
  • the temporary shared cryptographic key KPart has a limited period of validity, for example 12 hours or 24 hours.
  • the payment terminal 11 and the data reception device 10 delete the temporary shared cryptographic key KPart.
  • the temporary shared cryptographic key KPart can only be used to encrypt data relating to transactions carried out by the payment terminal 11 only a certain number of times, for example about twenty times .
  • the payment terminal 11 and the data reception device 10 implement a counter in order to determine the number of uses of the temporary shared cryptographic key KPart.
  • the payment terminal 11 and the data reception device 10 delete the temporary shared cryptographic key KPart.
  • a merchant When a merchant carries out a transaction with a consumer, the latter makes a payment by means of the merchant's payment terminal 11.
  • the merchant triggers the transmission of data relating to the transaction made by the payment terminal 11 to a data reception device 10, such as a wireless printer, for example by activating a key on a keyboard or by activating an icon on a touch screen of the payment terminal 11.
  • the data reception device 10 then edits the data relating to the transaction carried out by the payment terminal payment 11 in the form of a paper receipt.
  • the merchant Prior to any transaction with the payment terminal 11, the merchant proceeds to pair the payment terminal 11 with the data reception device by approaching the payment terminal 11 of the data reception device 10, by example by placing it close to the data reception device 10. During this pairing, the payment terminal 11 and the data reception device 10 establish a near field connection through which they exchange cryptographic data. Once the pairing has been carried out, data relating to a purchase made by a consumer may be transmitted by the payment terminal 11 to the data reception device 10 through a short distance radio connection established between the payment terminal 11 established for the occasion. The pairing of the payment terminal 11 with the data reception device 10 is transparent to the merchant and lasts only a few seconds. Once the payment terminal 11 and the data reception device 10 have been paired, the merchant can at any time initiate a transfer of secure data between the payment terminal 11 and the data reception device 10.
  • FIG. 3 represents a device for receiving data 10 according to an embodiment of the invention.
  • the data reception device 10 can comprise at least one hardware processor 101, a storage unit 102, an input device 103, a display device 104, an interface 105, and a network interface 106 which are connected together. through a bus 107.
  • the components of the data reception device 10 can be connected by means of a connection other than a bus.
  • the processor 101 controls the operations of the data reception device 10.
  • the storage unit 102 stores at least one program for obtaining the temporary shared cryptographic key KPart and at least one program for exchanging data with the payment terminal 11, at executed by processor 101, and various data, such as parameters used for calculations made by processor 101, intermediate data for calculations made by processor 101, etc.
  • the processor 101 can be formed by any known and appropriate hardware or software, or by a combination of hardware and software.
  • the processor 101 can be formed by dedicated hardware such as a processing circuit, or by a programmable processing unit such as a central processing unit (Central Processing Unit) which executes a program stored in a memory of this one.
  • Central Processing Unit central Processing Unit
  • the storage unit 102 can be formed by any suitable means capable of storing the program or programs and data in a manner readable by a computer. Examples of storage unit 102 include non-transient computer readable storage media such as semiconductor memory devices, and magnetic, optical or magneto-optical recording media loaded into a read and write unit. 'writing.
  • the program causes the processor 101 to execute a method for the secure reception of data according to an embodiment of the invention.
  • the input device 103 can be formed by a keyboard, a pointing device such as a mouse to be used by a user to enter commands.
  • the display device 104 is a printing module intended to print the data relating to the transaction carried out by the payment terminal 11 on a paper receipt.
  • the display device 104 can also be formed by a display module, such as for example a graphical user interface (GU I).
  • GUI I graphical user interface
  • the input device 103 and the display device 104 can be formed integrally by means of a touch screen, for example.
  • the interface 105 provides an interface between the data reception device 10 and an external device. Interface 105 can communicate with the external device via a connection wired or wireless. The interface 105 allows the establishment of the near field connection and the short radio connection with the payment terminal 11.
  • a network interface 106 provides a connection between the data reception device 10 and an equipment via a communication network, such as the Internet.
  • the network interface 106 can provide, depending on its nature, a wired or wireless connection to the network.
  • FIG. 4 represents a payment terminal 11 according to an embodiment of the invention.
  • the payment terminal 11 may include at least one hardware processor 111, a storage unit 112, an input device 113, a display device 114, an interface 115, and a network interface 116 which are connected to each other through of a bus 117.
  • the constituent elements of the payment terminal 11 can be connected by means of a connection other than a bus.
  • the processor 111 controls the operations of the payment terminal 11.
  • the storage unit 112 stores at least one program for obtaining the temporary shared cryptographic key KPart, at least one program for exchanging data with the data reception device 10, and at least one program relating to the execution of payment transactions, to be executed by the processor 111, and various data, such as parameters used for calculations carried out by the processor 111, intermediate data for calculations carried out by the processor 111, etc.
  • the processor 111 can be formed by any known and appropriate hardware or software, or by a combination of hardware and software.
  • the processor 111 can be formed by dedicated hardware such as a processing circuit, or by a programmable processing unit such as a central processing unit (Central Processing Unit) which executes a program stored in a memory of this one.
  • Central Processing Unit central Processing Unit
  • the storage unit 112 can be formed by any suitable means capable of storing the program or programs and data in a manner readable by a computer. Examples of storage unit 112 include non-transient computer readable storage media such as semiconductor memory devices, and magnetic, optical or magneto-optical recording media loaded into a read and write unit. 'writing.
  • the program causes the processor 111 to execute a method for the secure reception of data according to an embodiment of the invention.
  • the input device 113 can be formed by a keyboard, a pointing device such as a mouse to be used by a user to enter commands.
  • the display device 114 can also be formed by a display module, such as for example a graphical user interface (GUI).
  • GUI graphical user interface
  • the input device 113 and the display device 114 can be formed integrally by means of a touch screen, for example.
  • the interface 115 provides an interface between the payment terminal 11 and an external device.
  • the interface 115 can communicate with the external device via a wired or wireless connection.
  • the interface 115 allows the establishment of the near field connection and the short radio connection with the data reception device 10.
  • a network interface 116 provides a connection between the payment terminal 11 and an item of equipment via a communication network, such as the Internet.
  • the network interface 116 can provide, depending on its nature, a wired or wireless connection to the network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Cash Registers Or Receiving Machines (AREA)
EP19742239.7A 2018-07-30 2019-07-25 Sicheres verfahren zur datenübertragung zwischen einem zahlungsendgerät und einem drahtlosen drucker Pending EP3831010A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1857092A FR3084554B1 (fr) 2018-07-30 2018-07-30 Procede de transmission securisee de donnees entre un terminal de paiement et une imprimante sans fil
PCT/EP2019/070084 WO2020025451A1 (fr) 2018-07-30 2019-07-25 Procédé de transmission sécurisée de données entre un terminal de paiement et une imprimante sans fil

Publications (1)

Publication Number Publication Date
EP3831010A1 true EP3831010A1 (de) 2021-06-09

Family

ID=65685446

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19742239.7A Pending EP3831010A1 (de) 2018-07-30 2019-07-25 Sicheres verfahren zur datenübertragung zwischen einem zahlungsendgerät und einem drahtlosen drucker

Country Status (5)

Country Link
US (1) US20210350364A1 (de)
EP (1) EP3831010A1 (de)
CA (1) CA3103850A1 (de)
FR (1) FR3084554B1 (de)
WO (1) WO2020025451A1 (de)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140279479A1 (en) * 2011-10-12 2014-09-18 C-Sam, Inc. Nfc paired bluetooth e-commerce
US9749134B2 (en) * 2013-06-20 2017-08-29 Qualcomm Incorporated Wireless configuration using passive near field communication
WO2016069775A1 (en) * 2014-10-29 2016-05-06 Clover Network, Inc. Secure extensible point of sale platform
US10645577B2 (en) * 2016-07-15 2020-05-05 Avago Technologies International Sales Pte. Limited Enhanced secure provisioning for hotspots
CN111585749B (zh) * 2016-10-26 2023-04-07 创新先进技术有限公司 数据传输方法、装置、***及设备
JP6801921B2 (ja) * 2017-05-25 2020-12-16 Necネットワーク・センサ株式会社 暗号通信方法、情報処理装置及びプログラム
JP7115027B2 (ja) * 2018-05-22 2022-08-09 ブラザー工業株式会社 通信装置と通信装置のためのコンピュータプログラム

Also Published As

Publication number Publication date
FR3084554B1 (fr) 2022-02-18
WO2020025451A1 (fr) 2020-02-06
FR3084554A1 (fr) 2020-01-31
US20210350364A1 (en) 2021-11-11
CA3103850A1 (en) 2020-02-06

Similar Documents

Publication Publication Date Title
EP2715631B1 (de) Verfahren für fernzahlung eines einkaufswagens von einem benutzergerät aus auf einem e-commerce-server und entsprechendes system
JP2011517354A (ja) ファイルの配信および購入を行うためのシステムおよび方法
TW201710969A (zh) 綁定可穿戴設備的方法和裝置、電子支付方法和裝置
Raina Overview of mobile payment: technologies and security
EP1771827A1 (de) Elektronisches mehrzweck-bezahlungsverfahren und -system
US20150363774A1 (en) Methods and systems for permissions management with enhanced security
FR3028639A1 (fr) Procede de securisation d'un jeton de paiement
WO2015059389A1 (fr) Procede d'execution d'une transaction entre un premier terminal et un deuxieme terminal
FR2923635A1 (fr) Systeme pour des transactions de commerce electronique, dispositif electronique portatif, reseau de communication, produit programme d'ordinateur et methode correspondants.
EP3991381A1 (de) Verfahren und system zur erzeugung von verschlüsselungsschlüsseln für transaktions- oder verbindungsdaten
WO2020076234A1 (en) Apparatus and method for controlling data access
CN110995775B (zh) 一种业务数据处理方法、装置以及***
CN113822664A (zh) 用于开通离线支付的方法、装置、***、终端、服务器和介质
EP3831010A1 (de) Sicheres verfahren zur datenübertragung zwischen einem zahlungsendgerät und einem drahtlosen drucker
EP4012972A1 (de) Methode zur selektiven weitergabe von daten über eine blockchain
Mantoro et al. Online payment procedure involving mobile phone network infrastructure and devices
EP4074005A1 (de) Transaktionsauthentifizierungsverfahren, server und system mit zwei kommunikationskanälen
FR3054055A1 (fr) Procede de traitement d'au moins une donnee de moyen de paiement, terminal de paiement et programme d'ordinateur correspondant
EP3411823B1 (de) Verfahren zur herstellung einer sicheren kommunikation zwischen einem zahlungsendgerät und einer abrechnungsvorrichtung
EP3528464A1 (de) Pairing-verfahren von elektronischen endgeräten, pairing-vorrichtungen, endgeräte und entsprechendes programm
EP3868069B1 (de) Verfahren und vorrichtung zum schutz von daten, die über eine unsichere benutzeroberfläche eingegeben wurden
EP2911365B1 (de) Verfahren und System zur Sicherung von Transaktionen, die von einer Vielzahl von Diensten zwischen einem Mobilgerät eines Benutzers und einer Akzeptanzstelle angeboten werden
Hussain et al. Technical Evaluation of the Functionality of Popular Mobile Payment Protocols
WO2012127025A2 (fr) Procede de generation et d'utilisation d'un titre dematerialise dans un dispositif portable et systeme de gestion de titres correspondant
WO2016034812A1 (fr) Sécurisation de clés de cryptage pour transaction sur un dispositif dépourvu de module sécurisé

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20201210

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20240208