WO2008004312A1 - Dispositif d'aide au règlement net - Google Patents

Dispositif d'aide au règlement net Download PDF

Info

Publication number
WO2008004312A1
WO2008004312A1 PCT/JP2006/313658 JP2006313658W WO2008004312A1 WO 2008004312 A1 WO2008004312 A1 WO 2008004312A1 JP 2006313658 W JP2006313658 W JP 2006313658W WO 2008004312 A1 WO2008004312 A1 WO 2008004312A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
card
authentication
time password
contractor
Prior art date
Application number
PCT/JP2006/313658
Other languages
English (en)
Japanese (ja)
Inventor
Shun Tanaka
Mitsuyuki Kawakatsu
Original Assignee
Jcb Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jcb Co., Ltd. filed Critical Jcb Co., Ltd.
Priority to KR1020087031300A priority Critical patent/KR101248058B1/ko
Priority to CN2006800552299A priority patent/CN101496024B/zh
Publication of WO2008004312A1 publication Critical patent/WO2008004312A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Definitions

  • the present invention relates to an online payment assistance device.
  • card identification information such as a credit card or a bank card and a personal identification number are stored in a cellular phone, and the personal identification number input to the cellular phone, the stored V, and personal identification number
  • card identification information card number
  • a mobile phone that also functions as a card by displaying a card number on the display of the mobile phone when it is accepted (see, for example, Patent Document 1).
  • Patent Document 1 Japanese Patent Application Laid-Open No. 2002-64597
  • the mobile phone may have the power of eliminating the above-mentioned wiretapping and tampering.
  • the present invention has been made in view of the above-described conventional problems, and the object of the present invention is the risk of eavesdropping or tampering with a card number or PIN by unauthorized access or the like.
  • the aim is to provide an online payment assistance device that enables safe and secure online commerce.
  • the card information including at least the identification information of the card contractor such as a credit card or debit force card is stored in advance in such a state that it cannot be read by an external force.
  • a card information storage unit, an authentication information storage unit stored in advance in such a state that authentication information for authenticating the subscriber's identity cannot be read by an external force, and the card information associated with the card information The OTP generation information unique to the online payment assistance device is stored in advance in such a state that the external force cannot be read, the OTP generation information storage unit stored in advance, the input means for inputting the authentication information, and the input means.
  • the operator of the online payment assisting device authenticates the identity of the contractor based on the input information and confirms the identity, at least a part of the card information is included.
  • Both the authentication means for reading the identification information and displaying it on the display, and the card information And a one-time password generating means for generating a one-time password based on the OTP generation information and displaying it on the display.
  • the one-time password is used to authenticate the subscriber and
  • the online payment assisting device is characterized in that the online commerce by the payment using the identification information is made possible.
  • a network settlement system in which a credit card or debit card or the like, a contractor terminal such as a cellular phone or personal computer, and an authentication server for authenticating the contractor are connected to each other via a network.
  • a portable online payment assistance device used when performing online commerce by payment using the contractor identification information, the internet payment assistance device comprising a display and the contractor identification information.
  • the card information storage unit that is stored in advance so that the card information including at least cannot be read from the outside, and the authentication information for authenticating the contractor cannot be read from the outside.
  • Authentication information storage unit stored in advance and the OTP generation information associated with the card information and unique to the online payment assisting device are externally read.
  • the OTP generation information storage unit stored in advance so as not to be output, the input means for inputting the authentication information, the operator of the online payment assisting device If the identity of the contractor is verified and the identity is confirmed, at least the identification information is read out of the card information and displayed on the display, and the card information is And a one-time password generating unit that generates a one-time password based on the OTP generation information and displays the one-time password on the display, and the contractor terminal transmits the one-time password to the authentication server. In this way, when the identity of the contractor is verified and the identity is confirmed, the online commerce is enabled. It is an online payment assisting device.
  • the online payment assisting device since the online payment assisting device is portable, it is possible to carry out secure online commerce using a mobile phone, a home personal computer, or a personal computer wherever the contractor is, Convenience increases.
  • the OTP generation information for one-time password generation is stored in a state that cannot be read from the outside, even the contractor himself cannot know the OTP generation information, and the online payment assistance Only the contractor operating the device can know the one-time passcode of the generation result. In other words, since a one-time password cannot be generated by a third party, the safety of online commerce is further guaranteed.
  • the one-time password is generated only after the card information is displayed on the online payment assisting device. Even if the three parties know only the identification information, they cannot generate a one-time password. In addition, even if a third party steals the online payment assistant device, the one-time password cannot be generated without the authentication information to be entered into the online payment assistant device.
  • the contractor after the contractor receives the personal authentication by the authentication means of the online payment assisting device, the contractor further receives the personal authentication by the authentication server, and finally the online commerce is possible. Without personal authentication based on different types of authentication information, spoofing by third parties is further prevented and the safety of online commerce is increased.
  • the authentication information is a personal identification number predetermined by the contractor, and the input means is a numeric keypad.
  • the input means and the authentication means can be configured at a relatively low cost, the use of the online payment assisting device can be promoted.
  • the authentication information quantifies the biometric features of the contractor's fingerprint, iris, vocal cord, facial photograph, etc.
  • This is a network settlement auxiliary device characterized in that it is biometric information.
  • the invention of claim 5 provides:
  • the OTP generation information is a common key
  • the one-time password generation means detects the pressing of a predetermined operation key, and encrypts date and time data including the date and time when the operation key is pressed with the common key.
  • This is an online payment assistance device characterized by generating a one-time password.
  • the OTP generation information is composed of a common key and usage count information that is updated each time the one-time password is generated, and the one-time password generation means detects pressing of a predetermined operation key, and
  • This is a network settlement auxiliary device that encrypts usage count information with a common key to generate a one-time password, and updates the usage count information in the OTP generation information storage after the one-time password is generated.
  • the one-time password generated here uses a common key to encrypt the date / time data consisting of the date and time when the predetermined key was pressed or the usage count information that is updated each time a one-time password is generated. Is. In other words, since it is a password that can only be created by a contractor operating the online payment assistant, it is not possible for a third party to carry out online commerce by impersonating a contractor in possession of the online payment assistant. Unable to improve the safety of online commerce.
  • the online payment assistance device is an online payment assistance device having tamper resistance.
  • the online payment assisting device since the online payment assisting device has tamper resistance, it is possible to further improve security against eavesdropping and tampering of card information, authentication information, and OTP generation information by a third party. It is done.
  • the online settlement assistant device of the present invention if the identity verification of the contractor is not performed by the online settlement assistant device, the card information cannot be obtained even by the contractor himself, Card information is stored in a state that cannot be read by an external force. Unlike conventional credit cards that expose card information, the card information is more confidential and unauthorized use of card information in online commerce. Is prevented.
  • the online payment assisting device is portable, it is possible to conduct safe online commerce using a mobile phone, a home personal computer, or a personal computer at a destination, wherever the contractor is. Convenience increases.
  • the OTP generation information for one-time password generation is stored in a state that cannot be read from the outside, even the contractor himself cannot know the OTP generation information, and the online payment assistance Only the contractor operating the device can know the one-time passcode of the generation result. In other words, since a one-time password cannot be generated by a third party, the safety of online commerce is further guaranteed.
  • the one-time password is generated only after the card information is displayed on the network settlement assistant device, the one-time password is not provided. Even if the three parties know only the identification information, they cannot generate a one-time password. In addition, even if a third party steals the online payment assistant device, the one-time password cannot be generated without the authentication information to be entered into the online payment assistant device.
  • the contractor after the contractor receives the personal authentication by the authentication means of the online payment assisting device, the contractor further receives the personal authentication by the authentication server, and finally the online commerce is possible. Without personal authentication based on different types of authentication information, spoofing by third parties is further prevented and the safety of online commerce is increased.
  • FIG. 1 (a) is an external view of the online payment assistant device 1
  • Fig. 1 (b) is an online payment assistant device.
  • FIG. 3 is a configuration diagram of electrical hardware of device 1;
  • the online payment assistance device 1 includes a cardholder's subscriber terminal (such as a mobile phone or personal computer) such as a credit card or a debit card, and an authentication server (usually owned by the card company). ) are mutually in a networked net settlement system, the settlement subscriber with identification information of the subscriber, which is used when performing a net transactions such Nettoshotsubi ring, FIG. 1 (a ), It has a shape that fits in the palm of your hand, and is composed of a thin and portable case 10. The display 11 and key operation unit 12 are exposed on the outer surface of the case 10. Yes.
  • a cardholder's subscriber terminal such as a mobile phone or personal computer
  • an authentication server usually owned by the card company
  • the display 11 of the present embodiment is an 8-digit display, and the key operation unit 12 includes a numeric keypad 12a from 0 to 9 and a start key 12b.
  • the inside of the housing 10 includes a display 11, a key operation unit 12, a force information storage unit 13, an authentication information storage unit 15, an authentication unit 14, and an OTP generation.
  • the casing 11 of the present embodiment is provided with a slot for incorporating an IC card such as a SIM in addition to the display 11, the key operation unit 12, the driving power source 19, and the IC card is provided in the slot. Insert and use.
  • the CPU and memory used in this IC card are used.
  • the card information storage unit 13 the authentication information storage unit 15, and the OTP generation information storage unit 17 store different information for each contractor, such information is stored in the memory of the IC card.
  • the case 11 itself can be used in common without relying on the contractor by inserting it into the slot. Also, since the case 11 itself does not hold personal information, the productivity of the case 11 can be reduced. And the handling and management of the housing 11 become easy.
  • the driving power source 19 of the present embodiment may be a force solar cell or a rechargeable battery that is a button battery.
  • the online payment assisting apparatus 1 may be in a power-off state during normal operation, and for example, the power may be activated when any key operation of the key operation unit 12 is performed.
  • the card information storage unit 13, the authentication information storage unit 15, and the OTP generation information storage unit 17 of the present embodiment is composed of memory that stores card information, authentication information, and OTP generation information, which will be described later, and the memory is physically a single memory that stores these information together. But you can have more than 2 memories! /.
  • the authentication means 14 and the OTP generation means 16 of the present embodiment are configured by a program stored in a memory, and the CPU power in the net settlement assistant device 1 reads the program from the memory. As a result, the functions of the authentication means 14 and the OTP generation means 16 are realized. It should be noted that in the online payment assisting device that does not include a CPU and a memory, the functions of the authentication means 14 and the OTP generation means 16 may be realized circuitically using electronic components.
  • the online payment assisting device 1 of this embodiment is an issuer that issues a credit card based on a license contract with a credit card brand (if it is a debit card, a bank or a card issuing company that issues the debit card). Distribution to individual cardholder subscribers with card information, authentication information, and OTP generation information that is unique to each subscriber at ISHIRE.
  • the contents stored in the memory cannot be read from the outside after distribution. It is composed of
  • the contractor himself / herself who has been distributed with the online payment assisting apparatus 1 cannot read out the recorded contents of the memory.
  • the contractor himself / herself can know only the card information by displaying the card information on the display 11 only when the identity of the contractor is verified and the identity of the contractor is confirmed. In this state, the card information is kept secret.
  • the contents stored in the memory cannot be read from the outside because the network settlement assistant device 1 has an interface connected to a network such as the Internet, and is not connected to the network. This is because it is a terminal.
  • the Internet payment assistance device 1 or the IC card such as SIM built in the internet payment assistance device 1 is tamper resistant (disassembled). Thus, if the recorded content is read directly from the memory, the recorded content in the memory may be erased or the program may not start. [0048] Details of each part of the online settlement assisting apparatus 1 will be described below.
  • the card information storage unit 13 is a memory in which card information including at least contractor identification information is stored in advance in a state in which it cannot be read by an external force.
  • the card information in this embodiment is unique to the contractor.
  • Identification information card number
  • expiry date a three-digit decimal number encrypted in advance by a predetermined method. Usually printed on the sign panel of a plastic credit card. The authenticity of the card can be confirmed.
  • the name of the holder may also be included.
  • the card information may be composed only of identification information.
  • the card information may be configured by combining one or more of the expiration date, security code, and the holder's name as appropriate.
  • the authentication information storage unit 15 authenticates the contractor, such as a personal identification number determined by the contractor, or biometric information obtained by quantifying the biometric characteristics of the contractor's fingerprint, iris, vocal cord, facial photograph, and the like. This is a memory in which authentication information is stored in advance in such a state that the external information cannot be read.
  • the authentication information stored in the authentication information storage unit 15 is different from the authentication information used by the authentication server in the online payment system for authenticating the contractor. This is authentication information necessary for performing Also, the authentication information in the authentication server and the authentication information in the network settlement assistant device 1 are of different types.
  • the OTP generation information storage unit 17 is a memory in which the OTP generation information unique to the online settlement assistant device 1 is stored in advance so that it cannot be read from the outside.
  • the OTP generation information of this embodiment is , Which is a common key unique to the network settlement assistant device 1, and the common key is a card information storage unit in a server (authentication server in the embodiment described later) that verifies the one-time password generated by the OTP generation means 16. It is associated with the identification information stored in 13.
  • the common key is a key stored only in the authentication server for authenticating the contractor's identity and the net settlement assistant device 1 in the net commerce.
  • the OTP generation means 16 described later is used. Used to generate a one-time password.
  • the authentication means 14 is stored in the card information storage unit 13 by the operator of the online payment assisting apparatus 1. Therefore, it is a means for authenticating the identity of the contractor (card member) who can use the identification information, and the input means (in this embodiment, the numeric keypad 12a).
  • the authentication information storage unit 15 checks whether it matches the authentication information stored in the authentication information storage unit 15, and if it matches, stores it in the card information storage unit 13 as if the operator of the online payment assisting device 1 is the contractor himself / herself. It is a means for reading out at least identification information from the displayed card information and displaying it on the display 11.
  • the authentication unit 14 is activated upon detection of pressing of the start key 12b by the operator pressing the start key 12b of the key operation unit 12. Thereafter, when the operator depresses the numeric keypad 12a corresponding to the input means and inputs a four-digit number, the authentication means 14 receives the code number stored in the authentication information storage unit 15 as the authentication number. If it matches, the card information is displayed on the display 11.
  • the authentication information is a personal identification number as in the present embodiment, it is sufficient if there is a numeric keypad as the input means, and the matching process between the input information and the authentication information can be easily performed. Payment device 1 is realized, and use of network payment device 1 is promoted.
  • the authentication information of the present embodiment is a 4-digit password, but the authentication method and authentication information are not limited to this, and a plurality of authentication methods may be used in which authentication means using a plurality of authentication methods may be appropriately combined. By adopting this method, the accuracy of authentication increases, and the abuse of the online payment assistance device by a third party is prevented.
  • the authentication information is the data obtained by quantifying the biometric features such as the nanometric information (fingerprint, iris, vocal cord, face photograph, etc.).
  • the input means is a scanner, a microphone, a digital camera, etc. for inputting these biometrics information.
  • the biometrics authentication method is a high-precision authentication method, even if the online payment assisting device 1 is stolen by a third party, it is not a contractor to whom the online payment assisting device 1 is distributed. The online payment assistance device 1 cannot be used, and misuse is prevented.
  • the personal identification number which is the authentication information of the present embodiment, may include alphabets in addition to numbers. In this case, it is necessary for the net settlement auxiliary device to include an alphabet key in addition to the numeric keypad. There is. [0061] After the card information is displayed by the authentication means 14, the OTP generation means 16 is based on the OTP generation information (common key in this embodiment) stored in the OTP generation information storage section 17. It is a means for generating a time password and displaying it on the display 11.
  • This one-time password is transmitted from the contractor terminal to the authentication server.
  • the authentication server authenticates the contractor
  • the one-time password is generated with the one-time password generated based on the OTP generation information by the authentication server. Used for verification. If the verification results of these one-time passwords match and the identity is verified by the authentication server, online commerce by settlement using the contractor's identification information becomes possible.
  • the OTP generation means 16 of the present embodiment is capable of generating a one-time password by a time synchronization method, which will be described in detail later.
  • Other generation methods such as a counter synchronization method, challenge & A one-time password may be generated by a response method.
  • the time measuring means 18 is a means necessary for the OTP generating means 16 of the present embodiment to generate a one-time password by the time synchronization method, and is a means for measuring time.
  • the clocking means 18 may be configured by a real-time clock, or stored in the clocking program force S memory, and the clocking program is read and executed by the CPU to realize the clocking function. May be.
  • the OTP generation means 16 generates a one-time password by a method other than the time synchronization method
  • the time measurement means 18 is not necessary, and instead, a means necessary for each generation method is added. Become.
  • the OTP generation unit 16 waits for detection of pressing of the start key 12b after the authentication unit 14 displays the card information on the display 11.
  • the OTP generating unit 16 transmits the pressing detection to the time measuring unit 18.
  • the time measuring means 18 measures the date and time when the start key 12b is detected to be pressed, and delivers the date and time data (year / month / day / hour / hour / minute / second, second is in units of 30 seconds) to the OTP generation means 16.
  • the OTP generation means 16 reads the common key from the OTP generation information storage unit 17,
  • the delivered date / time data is encrypted with the read common key, converted into a decimal number, and displayed on the display 11.
  • the encryption method of this embodiment employs a common key encryption method, but other encryption methods may be used.
  • the card information displayed by the authentication means 14 when the identity of the contractor is verified by the online settlement assistant device 1 and is confirmed as the principal After being entered on the card information input screen that is sent from the website of the merchant that accepts payment or from the authentication sano and displayed on the contractor's terminal, it can be sent to the website or the authentication server.
  • the identity of the contractor is authenticated by the net settlement assistant device 1, and if the identity of the contractor is not confirmed, that is, the inputted input information is stored in the net settlement assistant device and the authentication is performed. If it does not match the information, even the contractor cannot know the card information, and the card information is stored in a state that cannot be read by an external force, so the card information is exposed. Unlike conventional credit cards, the confidentiality of card information is enhanced, preventing unauthorized use of card information in online commerce.
  • the online payment assisting device is portable, it is possible to conduct secure online commerce using a mobile phone, a home personal computer, or a personal computer wherever a contractor is located. Convenience increases.
  • the one-time password displayed by the OTP generation means 16 is input from the authentication server that authenticates the contractor to the one-time password input screen displayed on the contractor terminal.
  • the identity server confirms the identity of the user by matching with the one-time password generated by the authentication server, and enables online commerce by settlement using the contractor's identification information.
  • the third party since the one-time password created based on the contractor-specific OTP generation information stored in the network payment assistant device is used for the authentication of the contractor, the third party temporarily assumes the one-time password. You cannot use it for the next online commerce.
  • the OTP generation information for generating a one-time password is stored in a state that cannot be read from the outside, even the contractor himself cannot know the OTP generation information and assists with online payment. Only the contractor who is operating the device generates a one-time pass You can know the mode. In other words, since a one-time password cannot be generated by a third party, the safety of online commerce is further guaranteed.
  • the one-time password is generated only after the card information is displayed on the network settlement assistant device, the one-time password is not provided. Even if the three parties know only the identification information, they cannot generate a one-time password. Even if a third party steals the online payment assistant, the one-time password cannot be generated without the authentication information to be entered into the online payment assistant.
  • the contractor is authenticated by the authentication means of the online payment assisting device, the contractor is further authenticated by the authentication server. Without personal authentication based on different types of authentication information, spoofing by third parties is further prevented and the safety of online commerce is increased.
  • the authentication information storage unit 15 re-inputs the input information when the input information and the authentication information do not match in the matching determination process performed by the authentication unit 14.
  • the number of times of acceptance may be stored in advance.
  • the net settlement assistant device 1 or the authentication unit 14 is configured to include a counting unit (counter).
  • the counting means counts up from 1, and the counted up number If the counted up number exceeds the allowable error count, then the authentication means 14 will not perform its own processing and generate OTP. Mean 16 is not activated, and the authentication flow and OTP generation flow are not performed.
  • the authentication means 14 displays the card information on the display 11 when the input information and the authentication information that the counted up number does not exceed the allowable number of errors match the authentication information. At this time, the counted up number is reset to 0 (initialized).
  • FIG. 5 shows an example of the operation procedure of the online payment assisting apparatus 1 and the screen transition of the display 11.
  • the display 11 of this embodiment is an 8-digit alphanumeric character display.
  • the one-time password is based on the OTP generation information stored in OTP generation information storage unit 17. Is generated and displayed on the display 11 (S315).
  • the start key 12b is pressed again (S320)
  • the power source of the online settlement assisting apparatus 1 is cut off.
  • the password entered in S240 and S305 is used for displaying card information and for generating a one-time passcode. In such a case, separate passwords may be used. These PINs are stored separately!
  • a one-time password may be generated simply by pressing the start key 12b of S310.
  • the input value is preferably not displayed on the display 11.
  • a credit card member (hereinafter referred to as a card member) who is a credit card contractor who is distributed with the online payment assisting device 1 shown in FIG.
  • a description will be given of an embodiment in which network commerce such as online shopping (hereinafter referred to as “net commerce”) is performed from a personal computer or mobile phone possessed by settlement using the card number of the card member.
  • FIG. 3 The system configuration and network connection relationship of the network payment system of the present embodiment are shown in the system configuration diagram of FIG.
  • the flowchart of Fig. 3 shows the flow of online commerce in the online payment system of this embodiment.
  • it is a credit card brand that provides an online commerce service in the online payment system.
  • the card member applies for a credit card in advance and receives a credit card issue, and the authentication information unique to each card member (registered by the card member when applying for the credit card) Distribution of the online payment assistance device 1 that stores biometric information such as personal identification number and fingerprint information), card information (card number and expiration date unique to each cardholder), and OTP generation information (common key). It shall be.
  • the configuration excluding the display 11, the key operation unit 12, and the driving power supply 19 is an IC such as a SIM.
  • the function of the network payment assisting device 1 is realized by inserting the IC card into the IC card slot (not shown) provided in the housing 10 and stored in the card in advance. If the online payment assistance device does not have an IC card, the online payment assistance device itself has only to have a CPU and memory.
  • the online payment assisting apparatus 1 of the present embodiment is used for online commerce using payment using card member identification information, that is, card payment. If you do not want real face-to-face transactions with a strong credit card, such as a conventional plastic-type magnetic card or IC card, you do not need to issue a credit card. [0102] In addition, in the case where the credit card brand power Ishiyua is also operated! /, The online payment assisting device 1 may be distributed from the credit card brand.
  • the member terminal 2 is a contractor's terminal, and a card member is a terminal for performing online commerce using the online payment assisting device 1, and is a personal computer having at least a communication function and a browser display function, A terminal such as a mobile phone.
  • the member store terminal 3 provides a virtual store (website) to the member terminal 2, accepts orders for products and services, and requests the cardholder to authenticate the ordered card member. After authenticating the customer, the authorization (acquisition of the merchant's contract / administration based on the license agreement with the credit card brand) is given to the customer (the amount of the ordered goods and services). This is a terminal that asks if the credit limit remains in the cardholder and asks if the credit limit remains!
  • the acquirer terminal 4 is a terminal that re-requests the authority request received from the member store terminal 3 to the issuer side.
  • the intermediary server 5 serves as an intermediary between the member store terminal 3 and an authentication server 7 described later, that is, a server that mediates the card member authentication service between the member terminal 2 and the member store terminal 3. It is.
  • the mediation server 5 is a server operated by the credit card brand in this embodiment, and the member store identification information for identifying the member store corresponding to the online commerce service using the online payment assisting device 1; Corresponding to the online commerce service using the online payment assisting device 1, issuance identification information for identifying the issuer is stored.
  • the mediation server 5 uses the net settlement assisting device 1. It is necessary to store the identification information of merchant stores and issuers that are not compatible with online commerce services separately from the above-mentioned member store identification information and issue identification information.
  • the issuer terminal 6 is a terminal that accepts an authorization request that has also received the power of the acquisition terminal 4 and performs authorization.
  • the authentication server 7 When performing online commerce, the cardholder A server that performs authentication.
  • the authentication server 7 is a server operated by Ishiure, connected to the Ishiure terminal 6, and a cardholder card that can perform online commerce using the online payment assistant device 1.
  • Information card number, expiration date
  • OTP generation information common key unique to the online payment assistant device 1 are stored in a mutually associated state. In other words, one card member, card information and OTP generation information are associated with each other and stored in the authentication server 7.
  • the storage of these pieces of information in the authentication server 7 is performed at the same time as or before or after the distribution of the online payment assisting device 1 to the card member.
  • the member terminal 2, the member store terminal 3, the mediation server 5, and the authentication server 7 are connected by a network 9a such as the Internet.
  • the issuer terminal 6 is connected by a dedicated line 9b.
  • the issuer terminal 6 and the authentication server 7 are prepared for each issuer, and are connected to the member terminal 2, the acquirer terminal 4, and the mediation server 5 through the network 9a and the dedicated line 9b. .
  • the member store terminal 3 is also prepared for each member store, and is connected to the member terminal 2, the mediation server 5, and the acquirer terminal 4 through the network 9a and the dedicated line 9b.
  • the card member accesses the member store terminal 3 which is a virtual store (Web site) from the member terminal 2 via the network 9a, and browses products and services.
  • the member terminal 2 transmits to the member store terminal 3 a request for online commerce by card settlement regarding the ordered product and the desired service.
  • the member store terminal 3 displays the card information input screen 100 as shown in FIG. 4 (a) on the member terminal 2, and inputs the card number and the card expiration date to the member terminal 2. Ask to send.
  • the authentication means 14 of the net settlement assisting apparatus 1 is activated, and the net settlement assisting apparatus 1 enters the authentication waiting state. Subsequently, the cardholder must enter the input information necessary for authentication (in this example, 4 Enter the digit password using the numeric keypad 12a.
  • the four-digit password entered here is determined in advance by the card member when applying for the card, and is already stored in the authentication information storage unit 15 in the online settlement assistant device 1.
  • the authentication unit 14 reads the authentication information stored in the authentication information storage unit 15 and confirms whether or not it matches the input information input from the numeric keypad 12a. If they match, the authentication means 14 reads the card number and the expiration date as card information from the card information storage unit 13 and displays them on the display 11.
  • the authentication unit 14 notifies the OTP generation unit 16 that the display has been completed. As a result, the OTP generation unit 16 enters a state of waiting for a one-time newsword generation to be described later.
  • the authentication means 14 sets the card number read from the card information storage unit 13 to the upper 8 digits and lower digits. After dividing into 8 digits, the first 8 digits of the card number are displayed on the display 11 first. Based on the display, the card member enters the first 8 digits of the card number in the card number input field 100a of the card information input screen 100.
  • the authentication means 14 Upon receiving the detection of the start key 12b being pressed, the authentication means 14 displays the last 8 digits of the card number on the display 11. Based on the display, the cardholder enters the last 8 digits of the card number in the card number input field 100a of the card information input screen 100.
  • the authentication means 14 Upon receiving the detection of pressing of the start key 12b, the authentication means 14 displays the expiration date in four digits (MM (month) Z YY (year)). Based on the display, the card member enters the expiration date in the expiration date input field 100b of the card information input screen 100.
  • the card number may be displayed on the display all at once, or the card number and the expiration date may be displayed. May all be displayed.
  • the authentication means 14 divides the card information read from the card information storage unit 13 in advance according to the number of displayable digits, and starts. Key 12b Other, any key The divided card information may be displayed sequentially by pressing detection.
  • the online settlement assistant device 1 displays the card information on the display 11 only when the input information that is input matches the authentication information stored in the authentication information storage unit 15. Therefore, if the authentication information is not known, even if a third party steals the online payment assisting device 1, the internal card information cannot be known. Therefore, there is no fear that the card information, which is safer than the conventional credit card on which the card information is printed, will be misused for online commerce.
  • the ordered product / service name, price, order date, membership Click the send button 100c in the card information input screen 100.
  • Information such as store name and product shipping address may be displayed on the same screen.
  • the send button 100c is clicked, the entered card information is sent to the member store terminal 3 (S10).
  • order information regarding the ordered product ⁇ service name, price, order date, member store name, merchandise delivery destination, etc., card number of the card used for settlement of the ordered product, expiration date, etc.
  • the member store terminal 3 Upon receiving the card information, the member store terminal 3 transmits the member store identification information given to each member store to the intermediary server 5 connected via the network 9a in addition to the received card information.
  • a request for confirmation of whether or not the member is a member who can receive the online commerce service using the settlement assistant device 1 (confirmation of whether or not authentication can be executed) is requested (S20).
  • the mediation server 5 confirms whether or not the received member store identification information matches the member store identification information held (member store authentication). If these pieces of information match, it means that the member store terminal 3 of the member store participating in the online commerce service using the online settlement auxiliary device 1 has also accessed the intermediary server 5. If they do not match, it is an unauthorized access from the member store terminal 3 that has not participated in the online commerce service using the online payment assisting device 1, and the subsequent flow does not proceed.
  • the intermediary server 5 issued the card number of the card member based on the card information of the card member received from the member store terminal 3 participating in the online commerce service using the online payment assisting device 1.
  • the issuer is identified, the force information is transmitted to the identified issuer authentication server 7, and the card member uses the online payment assistant device 1 to execute the online commerce service.
  • Requesting confirmation of whether or not the member is a member who can receive the service (authentication execution availability confirmation) (S30).
  • the mediation server 5 of this embodiment stores issue identification information for identifying the issue, and the mediation server 5 searches the issue identification information based on the received card information to identify the issue. .
  • the mediation server 5 of the present embodiment does not directly check whether or not the authentication can be performed, but performs member store authentication and based on the card information received from the member store terminal 3.
  • the issuer with the card number issued is identified, the card information is transferred to the authentication server 7 of the identified issuer, and the authentication execution confirmation result received from the authentication server 7 is transferred to the member store terminal 3.
  • the intermediary server 5 is a server operated by a credit card brand.
  • each member store terminal 3 may be provided directly.
  • the Karo affiliate store terminal 3 requests the authentication server 7 to confirm whether or not authentication can be executed.
  • merchant authentication may be performed on the authentication server 7! /.
  • the authentication server 7 confirms whether or not the card information received from the intermediary server 5 is registered in the authentication server 7, so that the card member having the card information uses the net settlement assistant device 1. After confirming whether or not the card member is able to receive the online commerce service (confirmation of whether or not authentication can be performed), the result is returned to the intermediary server 5 (S40). Note that the authentication execution result confirmation result is “OK” if the card information received from the intermediary server 5 is registered in the authentication server 7, and is “NO” if not registered.
  • the mediation server 5 that has received the authentication execution feasibility confirmation result transfers the result to the member store terminal 3 (S50).
  • step S60 the process proceeds to a flow for requesting authentication of the cardholder. Specifically, the member store terminal 3 transmits to the member terminal 2 the URL information of the authentication server 7 of the issuer that has previously confirmed whether or not the authentication can be executed together with the result of whether or not the authentication can be executed.
  • the member terminal 2 that has received the authentication request from the member store terminal 3 accesses the same authentication server 7 that the mediation server 5 previously accessed based on the received URL, and makes an authentication request. (S70).
  • the flow of S70 is carried out as a series of flow from S60, and can be realized by using a redirection function or the like generally provided in a personal computer or mobile phone browser used as the member terminal 2, and the card member is conscious of it. This is a flow that is automatically processed inside the member terminal 2 without having to do it.
  • the authentication server 7 prompts the member terminal 2 to transmit a one-time password, and authenticates the card member based on the one-time password received from the member terminal 2 (S80).
  • the authentication server 7 receives the card information and the order information from the accessing member terminal 2, and the card member having this card information mediates from the member store terminal 3 earlier. Via the server 5, it is confirmed whether or not the card member has received a request for confirmation of whether or not authentication can be executed. This confirmation is made by keeping a log of whether or not the card member's card information has been received from the intermediary server 5 a predetermined time before the card member's card information received from the member terminal 2 This is done by checking whether it matches the card information left in the log before time.
  • the order information may be transmitted from the member store terminal 3 to the authentication server 7 via the mediation server 5 in the flow of S20, 30 not from the member terminal 2, or the member store terminal 3 Even if the URL information of the authentication server 7 is transmitted from the user to the member terminal 2, it is transmitted together, and when the member terminal 2 accesses the authentication server 7, it is transferred to the authentication server 7. Good.
  • the authentication server 7 confirms whether or not the card member of the accessing member terminal 2 is the same as the card member who has received the request to confirm whether or not the member terminal terminal 3 can execute the authentication.
  • the order information may be received by both the member terminal 2 and the member store terminal 3 (directly the intermediary server 5), and these collations may be used together.
  • the authentication server 7 determines whether the access is based on the received order information. 4 Create the one-time password input screen 101 as shown in (b) and send it to the member terminal 2 that had access.
  • the one-time password entry screen 101 in Fig. 4 (b) shows the name of the merchant that the cardholder is engaged in online commerce, the amount of goods and services that they are trying to order, and the order date. It is displayed.
  • the card member presses the start key 12b of the network settlement assistant device 1.
  • the OTP generating means 16 of the online payment assisting device 1 shifts from the one-time password generation waiting state to the one-time password generation flow.
  • the OTP generation means 16 reads out the common key stored in the OTP generation information storage section 17, and is date / time data (year / month / day / second, A one-time password is generated by encrypting the second (in units of 30 seconds) using this common key, and this is converted to a decimal number and displayed on the display 11.
  • the encryption method of this embodiment employs a common key encryption method.
  • the display 11 of the present embodiment has 8 displayable digits, the display 11 displays the upper 6 to 8 digits of the generated one-time password.
  • the cardholder enters the one-time password displayed on the display 11 of the online payment assistant device 1 in the password input field 101a of the one-time password input screen 101 displayed on the member terminal 2, When the send button 101b is clicked, the entered one-time password is sent to the authentication server 7.
  • the cardholder re-presses the start key 12b of the online payment assisting device 1 to display it on the display 11 of the online payment assisting device 1. It is desirable from the security point of view to hide the one-time password. At the same time, the power is also turned off. This is desirable from the viewpoint of energy saving.
  • the authentication server 7 Upon receiving the one-time password from the member terminal 2, the authentication server 7 first confirms that the member terminal 2 is the other party who first requested transmission of the one-time password, such as the identification number of the member terminal 2. This is confirmed by confirming whether or not the response is for the one-time password input screen 101 generated and transmitted individually for the member terminal 2 concerned.
  • the authentication server 7 After confirmation, the authentication server 7 is registered in association with this card number from the OTP generation information based on the card information of the card member received before requesting the transmission of the one-time password.
  • the date / time data (year / month / day / second, second is in units of 30 seconds) consisting of the date and time when the authentication server 7 received the one-time password from the member terminal 2 It encrypts with the common key to generate a one-time password and converts it to a decimal number.
  • the encryption method of this embodiment adopts a common key encryption method.
  • the authentication server 7 confirms whether or not the one-time password generated by the authentication server 7 matches the one-time password received from the member terminal 2 earlier. If they match, this one-time password is certainly proved to be a one-time password created at almost the same time by the common key stored only in the net payment assistant device 1 and the authentication server 7.
  • the operator of the member terminal 2 that has transmitted the one-time password to the authentication server 7 stores the common key used to generate the one-time password and the card information associated with the common key.
  • the cardholder who is the operator of the online payment assistance device 1 and who can use the card information, has confirmed the identity of the cardholder who requested the online commerce. Become.
  • the date and time used by the net settlement auxiliary device 1 to generate the one-time password and the authentication server 7 are one.
  • the date and time used to generate the time password are not exactly the same. Therefore, after the authentication server 7 generates the one-time password, the card member presses the start key 12b of the online payment assisting device 1,
  • the second resolution of the date / time data is set to 30 seconds in this embodiment.
  • the card member does not accept the authenticity of the force member.
  • the card member presses the start key 12b of the online payment assisting device 1. If more than 30 seconds elapse between the time when the one-time password is generated and the time when the authentication server 7 receives the one-time password from the member terminal 2, the one-time password does not match. The number of unauthenticated cases will increase, and the convenience of online commerce will be impaired.
  • the authentication server 7 shifts the date and time when the one-time password is received from the member terminal 2 N times before and after X 30 seconds. , Generate a one-time password again on the authentication server 7 side, If it matches the one-time password generated by the customer, the identity of the cardholder is confirmed.
  • N is determined in advance in consideration of security accuracy. That is, if you want to increase the security accuracy, set N small, and if you want to reduce the security accuracy and give priority to the convenience of cardholders, set N large.
  • the authentication server 7 transmits the card member authentication result based on the one-time password verification to the member terminal 2 (S90). Specifically, the authentication server 7 transmits the URL information of the member store terminal 3 to the member terminal 2 in addition to the authentication result, and the authentication result is transferred from the member terminal 2 to the member store terminal 3. Keep it like that.
  • the member terminal 2 Upon receiving the authentication result, the member terminal 2 further transfers the authentication result (personal authentication OK, personal authentication NG) to the Karo Alliance store terminal 3 (S100).
  • the flow of S100 like S70, is performed as a series of flows from S90, and can be realized by the redirect function of the browser of the member terminal 2. In fact, the flow is performed inside the member terminal 2 without the card member being aware of it. It is a flow that is automatically processed.
  • the member store terminal 3 receives the authentication result from the member terminal 2, and if the identity of the card member is confirmed (authentication is OK) as a result of the authentication, the merchant terminal 3 authenticates the card member's authority. In order to make a request, the authentication data is sent to the acquirer terminal 4 and the authentication result is sent to the transaction data consisting of the card member's card information and the desired payment amount (the amount of the product / service the card member is trying to order) (S 110). Note that the transaction data already generated at the time when the order information and the card information are transmitted from the member terminal 2 and stored in the member store terminal 3 may be read in S10.
  • the acquirer terminal 4 Based on the transaction data received from the member store terminal 3 and the authentication result, the acquirer terminal 4 identifies and identifies the card issuer issuer based on the card number of the card member who has been authenticated. The transaction data and the authentication result are transferred to the issuer's issuer terminal 6 (S120).
  • the issuer terminal 6 Upon receiving the transaction data and the authentication result, the issuer terminal 6 determines whether the desired settlement amount included in the transaction data is correct based on the member information and credit information for each member stored in the member database (not shown). Confirm whether the requested cardholder credit limit is within the limits Admit. If the desired amount of payment is within the credit line, ZOOM OK is secured and a credit line equivalent to the desired amount of payment is secured.
  • the issuer terminal 6 transmits the authorization result (authorization OK, authorization NG) to the acquirer terminal 4 (S130), and the acquirer terminal 4 forwards the authorization result to the member store terminal 3. (S 140).
  • the member terminal 3 After the merchant terminal 4 receives the result of the authorization, the member terminal 3 notifies the member terminal 2 of the result (S150). Specifically, if the authorization result is OK, a screen to the effect that online commerce is established between the member store and the card member using the card number of the card member is sent to the member terminal 2. And displayed on member terminal 2. If the result is NG, the screen indicating that Internet commerce has not been established is sent to the member terminal 2 and displayed.
  • the identity authentication using the one-time password in the authentication server 7 is performed each time an online business transaction is performed between the member terminal 2 and the member store terminal 3.
  • the one-time password generated by the OTP generation means 16 of this embodiment is effective for one-time online commerce, a third party who does not have an online payment assistance device temporarily receives a one-time password. Even if eavesdropping, a third party cannot masquerade as a card member and carry out subsequent online commerce, further improving the safety of online commerce.
  • a card member who is distributed with the online payment assistant device la uses the online settlement assistant device la from the personal computer or mobile phone having a communication function to the card member.
  • online commerce is performed by settlement using a card number.
  • the difference between the first embodiment and the present embodiment is that the one-time password generation method of the OTP generation means 16 provided in the net settlement auxiliary device, the stored contents of the OTP generation information storage unit 17, and FIG. This is the contents of the authentication flow (S80, S90) between the member terminal 2 and the authentication server 7 (in this embodiment, the authentication server 7a).
  • the one-time password generation method is the time synchronization method, but in this embodiment, the usage frequency synchronization method is adopted.
  • the time measuring means 18 described in FIG. 1 is replaced with a counting means 18a (not shown).
  • the OTP generation information stored in the OTP generation information storage unit 17 of the present embodiment is composed of a common key unique to the network payment assistance apparatus la and usage count information.
  • the common key is stored in the OTP generation information storage unit 17 in a non-rewritable state, and the authentication server 7a that verifies the one-time password generated by the OTP generation unit 16 uses the card information. Associated with the card number stored in the storage unit 13.
  • the usage count information is stored in the card information storage unit 13 in the authentication server 7a and is associated with the card number.
  • these OTP generation information is stored in the authentication server 7a in a state associated with the card number, and when the authentication server 7a receives the one-time password from the member terminal 2, Like terminal 2, authentication server 7a also generates a one-time password and verifies whether they match, thereby verifying the validity of the one-time password and authenticating the cardholder.
  • the usage count information is information that can be rewritten only when a rewrite command is issued from the OTP generation means 16, and is incremented by 1 such as 0, 1, or 2 by the counting means 18a.
  • the number is added or subtracted one by one, such as 100, 99, 98, etc., and the numerical value after calorie calculation or subtraction is stored in the OTP generation information storage unit 17, and the usage count information is updated. Is done. Whether to add or subtract is determined in advance.
  • the counting means 18a may be included in the OTP generation means 16, or may be provided separately from the OTP generation means 16; in the latter case, the OTP generation means 16 is a counting means. It is necessary to rewrite the usage count information by controlling 18a.
  • the authentication server 7a first sends the one-time password to the member terminal 2.
  • the card member is authenticated based on the one-time password received from the member terminal 2.
  • the authentication server 7a receives the card information and the order information from the member terminal 2 that has accessed, and the card member having this card information has previously received the intermediary server 5 from the member store terminal 3. It is confirmed whether or not the card member has received a request for confirmation of whether or not authentication can be performed. This confirmation is made by keeping a log of whether or not the card member's card information has been received from the intermediary server 5 before a predetermined time, and the card member's card information received from the member terminal 2 is stored. This is done by checking whether or not it matches the card information left in the log a predetermined time ago.
  • the order information is sent from the member store terminal 3 to the authentication server 7a via the mediation server 5 in the flow of S20, 30 but not from the member terminal 2.
  • the URL information of the authentication server 7a is transmitted from the terminal 3 to the member terminal 2, it is transmitted together, and is transferred to the authentication server 7a when the member terminal 2 accesses the authentication server 7a. Also good.
  • the authentication server 7a checks whether the card member of the accessing member terminal 2 is the same as the card member who has received the request to confirm whether or not the member terminal terminal 3 can execute the authentication.
  • the order information may be received by both the member terminal 2 and the member store terminal 3 (directly the intermediary server 5), and these collations may be used together.
  • the authentication server 7a When the authentication server 7a confirms that the access is from the card payment assistant device 1 of the card member that has received the authentication execution feasibility confirmation request first, the authentication server 7a, based on the received order information, Create a one-time password entry screen 101 as shown in Fig. 4 (b), and send it to the member terminal 2 that had access.
  • the one-time password entry screen 101 in Fig. 4 (b) displays the name of the merchant that the card member is engaged in online commerce, the amount of the product / service that the customer is trying to order, and the order date. ing.
  • the card member presses the start key 12b of the net settlement assistant device 1.
  • the OTP generation means 16 of the online payment assistant device 1 detects that the start key 12b has been pressed, Shift to the one-time password generation flow.
  • the OTP generation means 16 reads the common key and usage count information stored in the OTP generation information storage section 17, and encrypts the usage count information with the common key to generate a one-time password. , Make this a decimal number and display on display 11.
  • the one-time password is generated by using a predetermined one-time password generation algorithm for the usage count information.
  • the display 11 of the present embodiment has 8 displayable digits, the display 11 displays the upper 6 to 8 digits of the generated one-time password.
  • the OTP generation information includes, in addition to the above-described usage count information and the common key, other arbitrary information (for example, a policy) that can only be known by both the online payment assistant device la and the authentication server 7a.
  • the usage count information and the arbitrary information may be encrypted with a common key, and a one-time password may be generated.
  • the OTP generation means 16 After generating the one-time password, the OTP generation means 16 causes the counting means 18a to add 1, or subtract the usage frequency information read earlier, and use the usage frequency information in the OTP generation information storage unit 17. Rewrite and update.
  • the card member enters the one-time password displayed on the display 11 of the online payment assistant device 1 in the password input field 101a of the one-time password input screen 101 displayed on the member terminal 2, When the send button 101b is clicked, the entered one-time password is sent to the authentication server 7a.
  • the card member After the one-time password has been entered, the card member re-depresses the start key 12b of the online payment assisting device 1 to display it on the display 11 of the online payment assisting device 1. It is desirable from the security point of view to hide the one-time password. At the same time, the power is also turned off. This is desirable from the viewpoint of energy saving.
  • the authentication server 7a Upon receiving the one-time password from the member terminal 2, the authentication server 7a first confirms that the member terminal 2 is the other party who previously requested the one-time password transmission, such as the identification number of the member terminal 2. This is confirmed by confirming whether or not the response is for the one-time password input screen 101 generated and transmitted individually for the member terminal 2 concerned.
  • the authentication server 7a After confirmation, the authentication server 7a has received it before requesting transmission of a one-time password. Based on the card information of the cardholder, the OTP generated information is registered in association with this card number, the common key and the usage count information are extracted, and the usage count information is encrypted with the common key. Generate a one-time password and convert it to a decimal number.
  • a one-time password is generated by using a predetermined one-time password generation algorithm as usage frequency information.
  • the OTP generation information includes arbitrary information, in addition to the usage count information, the arbitrary information is also encrypted with the common key.
  • the authentication server 7a checks whether or not the one-time password generated by the authentication server 7a matches the one-time password received from the member terminal 2 earlier. If they match, this one-time password is certainly proved to be a one-time password created by the usage count information and the common key stored only in the online payment assisting device 1 and the authentication server 7a.
  • the authentication server 7a sends the card member authentication result (personal authentication OK, personal authentication NG) based on the one-time password verification to the member terminal 2, and the usage count information used for the previous one-time password generation. Are added or subtracted by a predetermined calculation method, and the calculation result is rewritten and updated as use frequency information in the authentication server 7a (S90).
  • the one-time password generation method adopts the usage frequency synchronization method as in the present embodiment, it is assumed that the operator of the member terminal 2 and the net settlement assistant device la is a valid card member. However, the number-of-uses information used for the one-time password generation by the online payment assisting device la and the number-of-uses information used by the authentication server 7a for generating the one-time password may be different and the one-time password may not match.
  • the authentication server 7a sets the usage count information stored in the authentication server 7a to a predetermined range (for example, usage count information + N ), The authentication server 7a regenerates the one-time password, and if it matches the one-time password generated on the member terminal 2, the card member is confirmed.
  • N is determined in advance in consideration of security accuracy. That is, if you want to increase the security accuracy, set N small, and if you want to reduce the security accuracy and give priority to the convenience of cardholders, set N large.
  • the input information input to the online payment assistant device is If the card information does not match the authentication information stored in the payment assistant device, the card information cannot be obtained even by the card member itself. The confidentiality of is increased, and unauthorized use of card information in online commerce is prevented.
  • the online payment assistance device since the online payment assistance device is portable, it is possible to carry out secure online commerce using a mobile phone, a home PC, or a destination PC wherever a cardholder is. The convenience of commerce increases.
  • the card member's personal authentication when online commerce is conducted is based on whether the one-time password generated by the online payment assistant device matches the one-time password generated by the authentication server. It is done by [0200]
  • This one-time password is unique to the online payment assistant device, is stored only in the online payment assistant device and the authentication server, and uses a common key that cannot be known even by the cardholder itself. This is an encryption of date / time data consisting of the date / time when the pressing of the predetermined key is detected or the one-time password is generated and updated usage count information.
  • the one-time password is generated only after the card information is displayed on the network settlement assistant device, the one-time password is not provided.
  • the three parties cannot generate a one-time password even if they only know the card number. Even if a third party steals the online payment assistant, the one-time password cannot be generated without the authentication information to be entered into the online payment assistant. In other words, the safety of online commerce is guaranteed because a third party cannot perform online commerce pretending to be a card member regardless of whether or not an online payment assistance device is available.
  • the one-time password generation method is not limited to the time synchronization method of the above embodiment, and the identity of the cardholder who owns the net payment assistant device is connected between the network payment assistant device and the authentication server. If you can do this,
  • the online payment assistant device adopts a network non-connection type configuration, the card information, authentication information, and OTP generation information once stored in the online payment assistant device are fraudulent. The cardholders who have been distributed with the online payment assistance device cannot read it out by the accessor, etc.!
  • the online payment assistance device can be connected to a terminal such as a personal computer or a mobile phone, if any trouble occurs while connecting the online payment assistance device to the terminal, the cause of the failure is The point of responsibility disaggregation of whether it is on the side of the online payment assisting device or on the terminal side is unclear. Therefore, an online payment assistant device that employs a non-connection-type configuration is effective even in the sense that the point of responsibility resolution becomes clear.
  • FIG. 6 shows the system configuration and flow of pre-registration when a cardholder who does not have an online payment assisting device performs online commerce with the online payment system of the present embodiment.
  • the card member accesses the WEB site for the card member operated by the card company (credit card brand or Ishiyua) from the member PC, and the member information (birth date, telephone number, account number) that only the card member knows Etc.) and send it to the website ((1) in Fig. 6).
  • the website of the card company that received the member information accesses the core system of the card company where the member information is registered, and the received member information and the member information registered in the core system Request verification to the core system ((2) in Fig. 6).
  • the backbone system returns the verification result to the website ((3) in Fig. 6).
  • the website that received the password for the member PC also registers the password in the card server's authentication server 7 ((5) in Fig. 6).
  • the registered password is a fixed password, not a one-time password as generated by the online payment assistant.
  • the card member authentication method uses a fixed password and the card number and the fixed password that can be used by a third party. Once known, it becomes possible for a third party to pretend to be a cardholder and make online payments.
  • the online payment assisting device normally does not expose the card number and can be known only by the card member, or if the authentication information possessed only by the card member is not entered,
  • the password used to authenticate the cardholder during online payment is a one-time password that is not a fixed password, so a third party impersonates a cardholder. It is extremely difficult to conduct online commerce
  • the online payment assistance device of the present invention is limited to the online payment assistance device 1 having all of the configuration requirements described in the above embodiment.
  • various changes and modifications can be made, and the network settlement assistance device of the present invention can be configured by arbitrarily combining the constituent requirements necessary for realizing each purpose. It goes without saying that significant changes and modifications are also within the scope of the claims of the present invention.
  • the online payment using the card number of the credit card has been described.
  • the card can be used for at least the online payment by the card number.
  • An embodiment using a card such as a debit card also falls within the scope of the claims of the present invention.
  • the credit card is used for online commerce using card settlement.
  • a card member wishes only for online commerce and has a credit card that can use conventional plastic-type magnetic cards, IC cards, etc. If you do not wish to have a real face-to-face transaction with a card, you do not need to issue a credit card.
  • Owner of the Internet payment assistance device of the present invention 1S It is necessary to have a conventional plastic type credit card. Flower ,.
  • the card information storage unit 13 of one network payment assisting device 1 stores the card information of one card member having one type of card information
  • the authentication information storage unit 15 stores 1
  • a plurality of card numbers may be stored in the card information storage unit 13.
  • the authentication information in that case may be common authentication information to display multiple card numbers!
  • the card number and the authentication information may correspond to each other, and the card number displayed on the display 11 may be different depending on the input authentication information.
  • authentication information that differs for each person is stored in the authentication information storage unit 15. You can also store common authentication information.
  • the authentication server 7, 7a finally passes through the member store terminal 3, the intermediary service 3 ⁇ 4.
  • the authentication servers 7 and 7a convert the card number of the received card information into a unique number different from the card number and pass through the mediation server 5.
  • this unique number is transmitted from member store terminal 2 to member terminal 2, and transmitted through authentication terminal 7, 7a via member terminal 2 (in S60, 70).
  • the authentication servers 7 and 7a Upon receiving the unique number, the authentication servers 7 and 7a convert the unique number into the card number according to the reverse conversion rule of the card number first converted into the unique number.
  • the OTP generation information associated with the card number is used to generate a one-time password.
  • the unique number other than the card number and the OTP generation information are associated with each other, so that the network 9a except the card number is transmitted by S10, S20, and S30. Since the card number does not flow above, the possibility of eavesdropping on the card number is greatly reduced, which contributes to security improvement.
  • the member terminal 2 transmits card information to the member store terminal 3, and the authentication servers 7, 7a receive the card at S80 in FIG. 2 based on the request from the member store terminal 3.
  • the present invention is not necessarily limited to this.
  • the member terminal 2 accesses the authentication server 7 or 7a, and the authentication server 7 or 7a sends the card member-specific authentication information input screen to the member terminal 2, and is input to the authentication input screen. Based on the received card information and the one-time password, card member identity authentication is performed between the member terminal 2 and the authentication servers 7 and 7a. Within a predetermined time, a predetermined number of times, a predetermined member store, etc.) The website of the member store terminal 3 may be accessed to enable online commerce.
  • the online payment assisting device of the present invention is used for the authentication of the card member between the member terminal 2 and the authentication server 7 or 7a on the card company side. It is based on the fact that online commerce can be performed on the website of the company, and is not necessarily based on the request for authentication from the member terminal 2.
  • Each means and database in the present invention are only logically distinguished in function, and may be physically or virtually identical. Needless to say, a data file may be used instead of a database, and the description of a database includes a data file.
  • the terminal and server capabilities on the online payment system Credit card brand providing entity for online commerce services
  • Ishiyure acquisition of card members' card issuers to card members
  • Aquirer member stores
  • the quirer may be the same, and the turret card brand, issuer, and quirer may be the same.
  • the online payment assisting device 1, la is not limited to the distribution of the issue power. Also, it is not always necessary that the provider of the online payment system is a credit card brand.
  • the issuer terminal 6, the authentication servers 7, 7a, and the acquirer terminal 4 may be the same. Also, the mediation server 5 may be the same as any other terminal or server.
  • a storage medium recording a software program that implements the functions of the present embodiment is supplied to the system, and the computer of the system reads and executes the program stored in the storage medium. This is also realized.
  • the read program itself realizes the functions of the above-described embodiments, and the storage medium storing the program constitutes the present invention.
  • a storage medium for supplying the program for example, a magnetic disk, a hard disk, an optical disk, a magneto-optical disk, a magnetic tape, a nonvolatile memory card, or the like should be used. Can do.
  • the program power from which the storage medium power is read is also written to a nonvolatile or volatile storage means provided in a function expansion board inserted into the computer or a function expansion unit connected to the computer.
  • the processing unit provided in the function expansion board or function expansion unit may perform part or all of the actual processing, and the functions of the above-described embodiments may be realized by the processing. It is included in the present invention.
  • FIG. 1 A configuration diagram showing an external appearance and an electrical hardware configuration of the online settlement assistant device of the present invention.
  • FIG. 2 is a schematic connection configuration diagram of an internet settlement system using an internet settlement assistance device.
  • FIG. 3 is a diagram showing an example of a process flow of an online commerce in the online payment system.
  • FIG. 4 is a diagram showing an example of a screen displayed on a member terminal in the process flow of online commerce in the online payment system.
  • FIG. 5 is a diagram showing an operation procedure and display screen transition of the online settlement assisting device.
  • FIG. 6 Schematic connection configuration diagram of the system required to register a card member's password for authentication in advance when a cardholder uses an online payment system that does not use an online payment assistant. It is.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

[PROBLÈMES] Dispositif d'aide au règlement net sans risque d'espionnage ni de fausse modification d'un numéro de carte et d'un mot de passe et permettant une transaction commerciale nette plus sécurisée. [MOYENS DE RÉSOLUTION DES PROBLÈMES] Un dispositif d'aide au règlement net comprend un écran (11), une section de stockage d'informations de carte (13) où des informations de carte sur le détenteur d'une carte sont stockées au préalable de manière à éviter qu'elles soient lues depuis l'extérieur, une section de stockage d'informations d'authentification (15) où des informations d'authentification sur le détenteur sont stockées au préalable de manière à éviter qu'elles soient lues depuis l'extérieur, une section de stockage d'informations de création OTP (17) où des informations de création OTP sont stockées au préalable de manière à éviter qu'elles soient lues depuis l'extérieur, un clavier numérique (12a), des moyens d'authentification (14) destinés à authentifier l'opérateur sur la base des informations entrées à l'aide du clavier numérique (12a) et à afficher les informations de carte sur l'écran (11), et des moyens de création OTP (16) destinés à créer un mot de passe à usage unique selon les informations de création OTP une fois les informations de carte affichées et à afficher le mot de passe à usage unique sur l'écran (11). Le détenteur est authentifié avec le mot de passe à usage unique, permettant ainsi une transaction nette.
PCT/JP2006/313658 2006-07-07 2006-07-10 Dispositif d'aide au règlement net WO2008004312A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
KR1020087031300A KR101248058B1 (ko) 2006-07-07 2006-07-10 인터넷 결제 시스템
CN2006800552299A CN101496024B (zh) 2006-07-07 2006-07-10 网络结账辅助装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2006-188341 2006-07-07
JP2006188341A JP4388039B2 (ja) 2006-07-07 2006-07-07 ネット決済システム

Publications (1)

Publication Number Publication Date
WO2008004312A1 true WO2008004312A1 (fr) 2008-01-10

Family

ID=38894290

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2006/313658 WO2008004312A1 (fr) 2006-07-07 2006-07-10 Dispositif d'aide au règlement net

Country Status (5)

Country Link
JP (1) JP4388039B2 (fr)
KR (1) KR101248058B1 (fr)
CN (1) CN101496024B (fr)
TW (1) TW200805203A (fr)
WO (1) WO2008004312A1 (fr)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008263548A (ja) * 2007-04-13 2008-10-30 Toshiba Corp 通信端末装置、情報管理システムおよび情報管理方法
CN101789864B (zh) * 2010-02-05 2012-10-10 中国工商银行股份有限公司 一种网上银行后台身份认证方法、装置及***
CN104333555A (zh) * 2014-11-14 2015-02-04 中国建设银行股份有限公司 一种动态令牌工作方法及***
CN105208005A (zh) * 2015-08-25 2015-12-30 宇龙计算机通信科技(深圳)有限公司 一种指纹认证方法、连接设备和终端设备
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
CN104333555B (zh) * 2014-11-14 2018-02-09 中国建设银行股份有限公司 一种动态令牌工作方法及***
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
CN109426913A (zh) * 2017-08-31 2019-03-05 北京橙鑫数据科技有限公司 卡片的管理方法、管理装置和电子设备
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
JP2021533504A (ja) * 2018-08-09 2021-12-02 株式会社センストーンSsenstone Inc. 仮想コードを生成及び提供するスマートカードとその方法及びプログラム
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009078182A1 (fr) 2007-12-19 2009-06-25 Icon Corp. Dispositif serveur, procédé de fourniture d'informations et système de succession d'informations
US20090287603A1 (en) * 2008-05-15 2009-11-19 Bank Of America Corporation Actionable Alerts in Corporate Mobile Banking
JP5589471B2 (ja) * 2010-03-19 2014-09-17 大日本印刷株式会社 ロイヤリティ管理システム,ロイヤリティ管理方法及びトークン
FR2963191B1 (fr) * 2010-07-23 2012-12-07 Viaccess Sa Procede de detection d'une utilisation illicite d'un processeur de securite
KR101242024B1 (ko) * 2011-01-14 2013-03-11 시큐어플랫폼즈테크놀로지(주) 번호생성장치의 화면제어 방법 및 번호생성장치
KR101249587B1 (ko) * 2011-09-09 2013-04-01 아이리텍 잉크 홍채이미지 정보를 포함하는 일회용 비밀번호가 탑재된 스마트카드
KR20130100872A (ko) * 2012-02-22 2013-09-12 주식회사 엘지씨엔에스 일회용 응답코드를 통한 결제 방법, 이를 수행하는 결제 서버 및 사업자 단말
CN104715361A (zh) * 2013-12-17 2015-06-17 康迅数位整合股份有限公司 移动装置付费***及方法
KR101623710B1 (ko) * 2014-11-19 2016-05-24 주식회사 텔스카 무선 거래연동 일회용 패스워드 생성 시스템 및 방법
KR101663699B1 (ko) * 2015-07-20 2016-10-17 주식회사 비즈모델라인 생체 인식을 이용한 네트워크 형 오티피 제공 방법
KR101636068B1 (ko) * 2015-09-25 2016-07-06 주식회사 비즈모델라인 생체 인식을 이용한 오티피 운영 방법

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11316740A (ja) * 1998-05-06 1999-11-16 Meidensha Corp ワンタイムパスワード認証システム
JP2001312477A (ja) * 2000-04-28 2001-11-09 Nippon Yunishisu Kk 認証システム、並びに、認証装置およびその方法
JP2006072890A (ja) * 2004-09-06 2006-03-16 Seiko Epson Corp Icカード
JP2006146914A (ja) * 2004-11-15 2006-06-08 Agilent Technol Inc バイオセンサを有するidカード及びユーザー認証方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010025234A (ko) * 2000-11-09 2001-04-06 김진삼 지문정보를 이용한 카드거래 인증방법 및 그 시스템
KR100548638B1 (ko) * 2005-08-03 2006-02-02 주식회사 하이스마텍 스마트카드를 이용한 원 타임 패스워드 생성 및 인증방법그리고 이를 위한 스마트카드

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11316740A (ja) * 1998-05-06 1999-11-16 Meidensha Corp ワンタイムパスワード認証システム
JP2001312477A (ja) * 2000-04-28 2001-11-09 Nippon Yunishisu Kk 認証システム、並びに、認証装置およびその方法
JP2006072890A (ja) * 2004-09-06 2006-03-16 Seiko Epson Corp Icカード
JP2006146914A (ja) * 2004-11-15 2006-06-08 Agilent Technol Inc バイオセンサを有するidカード及びユーザー認証方法

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008263548A (ja) * 2007-04-13 2008-10-30 Toshiba Corp 通信端末装置、情報管理システムおよび情報管理方法
CN101789864B (zh) * 2010-02-05 2012-10-10 中国工商银行股份有限公司 一种网上银行后台身份认证方法、装置及***
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
CN104333555B (zh) * 2014-11-14 2018-02-09 中国建设银行股份有限公司 一种动态令牌工作方法及***
CN104333555A (zh) * 2014-11-14 2015-02-04 中国建设银行股份有限公司 一种动态令牌工作方法及***
CN105208005A (zh) * 2015-08-25 2015-12-30 宇龙计算机通信科技(深圳)有限公司 一种指纹认证方法、连接设备和终端设备
CN109426913A (zh) * 2017-08-31 2019-03-05 北京橙鑫数据科技有限公司 卡片的管理方法、管理装置和电子设备
JP7192089B2 (ja) 2018-08-09 2022-12-19 株式会社センストーン 仮想コードを生成及び提供するスマートカードとその方法及びプログラム
JP2021533504A (ja) * 2018-08-09 2021-12-02 株式会社センストーンSsenstone Inc. 仮想コードを生成及び提供するスマートカードとその方法及びプログラム
US11922411B2 (en) 2018-08-09 2024-03-05 SSenStone Inc. Smart card for generating and providing virtual code, and method and program therefor

Also Published As

Publication number Publication date
JP2008015924A (ja) 2008-01-24
TW200805203A (en) 2008-01-16
KR101248058B1 (ko) 2013-03-27
CN101496024A (zh) 2009-07-29
CN101496024B (zh) 2013-05-01
TWI304190B (fr) 2008-12-11
JP4388039B2 (ja) 2009-12-24
KR20090051147A (ko) 2009-05-21

Similar Documents

Publication Publication Date Title
JP4388039B2 (ja) ネット決済システム
US11349847B2 (en) Unified identity verification
CN106688004B (zh) 一种交易认证方法、装置、移动终端、pos终端及服务器
CN105243313B (zh) 用于对验证令牌的任何时候确认的方法
US9124433B2 (en) Remote authentication and transaction signatures
CN102057386B (zh) 可信服务管理器(tsm)体系架构和方法
US7694130B1 (en) System and method to authenticate a user utilizing a time-varying auxiliary code
US8667285B2 (en) Remote authentication and transaction signatures
US8661520B2 (en) Systems and methods for identification and authentication of a user
US20210224795A1 (en) Escrow non-face-to-face cryptocurrency transaction device and method using phone number
TW201741922A (zh) 一種基於生物特徵的安全認證方法及裝置
EP2733655A1 (fr) Procédé et dispositif de paiement électronique pour échanger de manière sécurisée des informations de paiement
US20110103586A1 (en) System, Method and Device To Authenticate Relationships By Electronic Means
US20030046237A1 (en) Method and system for enabling the issuance of biometrically secured online credit or other online payment transactions without tokens
TW201121280A (en) Network security verification method and device and handheld electronic device verification method.
JP2010170561A (ja) 携帯型電子的課金/認証デバイスとその方法
KR20210039920A (ko) 본인 인증을 수행하는 이동 통신 단말기, 본인 인증 시스템, 및 이동 통신 단말기를 이용한 본인 인증 방법
KR100968941B1 (ko) Otp를 이용한 금융거래 시스템
CA3154449C (fr) Autorisation d'acces electronique numerique, personnelle et securisee
KR20070029537A (ko) 무선단말기와 연동한 개인별고유코드를 활용한인증시스템과 그 방법
JP2002269052A (ja) 携帯端末認証システム、携帯端末認証方法ならびに携帯端末認証プログラムおよび該プログラムを記憶したコンピュータ読み取り可能な記録媒体
JP2009259297A (ja) ネット決済補助装置
TWI677842B (zh) 用於幫助持卡人首次設定金融卡密碼之系統及其方法
JP2017010246A (ja) 情報処理装置、情報処理システム、情報処理方法、及びプログラム
JP2003323599A (ja) スマートカード及びスマートカードシステム

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200680055229.9

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06768020

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 1020087031300

Country of ref document: KR

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 06768020

Country of ref document: EP

Kind code of ref document: A1