WO2008002260A1 - Method for an identification system of a transaction location. - Google Patents
Method for an identification system of a transaction location. Download PDFInfo
- Publication number
- WO2008002260A1 WO2008002260A1 PCT/SE2007/050451 SE2007050451W WO2008002260A1 WO 2008002260 A1 WO2008002260 A1 WO 2008002260A1 SE 2007050451 W SE2007050451 W SE 2007050451W WO 2008002260 A1 WO2008002260 A1 WO 2008002260A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile telephone
- code
- caused
- transponder
- unique code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
Definitions
- the invention concerns a method for an identification system for a transaction location.
- the invention relates to a method for an identification sys ⁇ tem for a transaction location, such as a cash till for payment, or for a location at which an identification control or authority control takes place, such as companies, authorities, airports, etc., or for door-opening.
- Known automatic identification systems normally comprise ID tags to be carried by persons, and equipment to read these tags .
- RFID systems Radio Frequency Identifica ⁇ tion
- RFID systems contain at least one transponder and at least one communicator.
- One known type of transponder comprises an aerial, a modulator, a memory and a logic circuit to control the modulator.
- Such a known transponder has a design such that it can receive a signal sent by the communicator and reflect this signal in a modulated form.
- the communicator has a design such that it can receive and read the signal that has been reflected and modulated by the transponder.
- ID tags that are arranged to transmit information to a commu ⁇ nicator are also available.
- An ID tag that comprises a transponder can be applied to a person or an object that is to be identified.
- the information in the transponder can be read by a communicator at a certain limited distance, such as, for example, 5 metres.
- One problem with known identification systems is that when a transponder reflects or transmits a signal to a communicator, the information that is transmitted is liable to eavesdrop- ping.
- the code or the codes that a transponder transmits is or are permanently stored in the transponder. This means that a person can illicitly eavesdrop the information that is transferred to the communicator, and subsequently manufacture a transponder that provides the same information to the com ⁇ municator as that provided by the eavesdropped transponder.
- the information may, alternatively, be used for purposes of violating integrity. The person in this way can obtain unauthorised access to premises or to devices.
- the present invention relates to a method for identification systems in which a transponder or a mobile telephone can be read by a communicator or receiver, and where information transferred from the transponder or mobile telephone to the communicator or the receiver comprises a unique code, and it is characterised in that the said unique code is caused to be changed with time, in that the said mobile telephone is caused to receive the said unique code from the service pro- vider to which the SIM card of the mobile telephone is bound, in that the transponder or mobile telephone is caused to transfer the unique code to a transaction location, in that the transaction location is caused to query, directly or indirectly, the said service provider whether the unique code is valid for a mobile telephone number or for the IMSI of a SIM card, after which the transaction can be carried out if the code is valid, and in that the unique code is changed in association with the transaction.
- FIG. 2 shows a block diagram in order to illustrate the invention .
- Figure 1 shows a communication unit for the identification of objects or persons.
- the communication unit comprises a trans ⁇ ponder 1 and a communicator in the form of a receiver/transmitter unit 2.
- the communicator 2 is arranged to transmit an enquiry signal 3 to the transponder 1.
- the trans- ponder is arranged to receive the enquiry signal and thereby to reflect and modulate the enquiry signal.
- the communicator 2 is arranged to receive the reflected signal 4 and to decode its information content.
- the transponder 1 may instead be of a type in which the transponder receives the enquiry signal 3, after which the transponder actively transmits in return a response signal to the communicator 2 with an integral transmitter.
- FIG. 2 shows a block diagram in order to illustrate the present invention.
- the invention concerns a method for an identification system in which a transponder 1 or a mobile telephone 10 can be read by a communicator 2 or a receiver 12, and where information transferred from the transponder 1 or mobile telephone 10 to the communicator 2 or the receiver 12 comprises a unique code 15.
- the said unique code 15 is, according to the invention, caused to be changed with time. Furthermore, the said mobile telephone 10 is caused to receive the said unique code from the service provider 11 to which the SIM card of the mobile telephone 10 is bound. The transponder 1 or the mobile telephone 10 is caused to transfer the unique code to a transaction location 16. The transaction location 16 is subsequently caused to query, directly or indirectly, the said service provider 11 whether the unique code is valid for a mobile telephone number or for an IMSI of a SIM card, after which the transaction can be carried out if the code is valid. The unique code is changed in association with the transaction.
- the number 13 is used to denote a mobile telephone network.
- the transaction location 16 queries indirectly the said service provider 11 whether the unique code is valid for a mobile telephone number or the IMSI of a SIM card
- a service provider such as a payment card company or an organisation for the management of transactions such as finan ⁇ cial transactions.
- An example of such an organisation is the BABS organisation in Sweden, which manages payment card pay- ments independently of the particular payment card that is involved.
- a transponder 1 is caused to transfer the said ID 6 and authentication code 8 to the transaction location.
- the transponder 1 is integrated in this case into a mobile telephone 10.
- the mobile telephone 10 is in this case caused to transfer the authentication code 8
- the unique code is generated at the service provider 11 and it is paired with the telephone number of the mobile telephone 10 or with the IMSI of the SIM card.
- the said transaction location may be a cash till at a pur ⁇ chasing location.
- the mobile telephone can in this case be used as a means of payment, if the person has bound a payment card number to his or her telephone number or IMSI, in the database of the service provider. Such a binding may instead be present in the database of the payment card company. If the binding is present in the database of a payment card company, the unique code 15 may contain information concerning which payment card company is currently relevant.
- a customer transfers the said unique code to the transaction location via his or her mobile telephone or via an RFID circuit built into the mobile telephone.
- the transaction location subsequently que ⁇ ries the service provider whether the unique code is a valid unique code.
- the unique code may be constructed with so many positions that the probability that it is possible to guess the code is completely negligible. It is, therefore, not necessary for the validation of the transaction to pair, for example, the telephone number with the unique code. It is sufficient that the service provider confirms that the unique code has been issued and that it is correct for a certain mobile telephone number or IMSI.
- payment is carried out, in which the transaction location transmits the amount of the transaction and the unique code to the service provider, for forwarding to the payment card company, or alternatively, only to the payment card company. It must be possible in the latter case for the payment card company to pair the number of the mobile telephone with a person respon ⁇ sible for the payment, namely the owner of the mobile telephone .
- the transaction location may be, instead of a cash till, a location of authority control or identity control.
- a sound signal or a light signal can in this case be activated when the unique code has been found to be valid. It is thus possible for the service provider to store the information that a certain person has arrived at the transaction location in question, or the transaction location can store the unique code that has been received in order subsequently to present, if necessary, information about which persons have visited the transaction location.
- the present invention is not limited to any one type or any several types of transaction locations.
- transponders or the mobile telephones and the communica- tors or the receivers in the system do not need to be syn ⁇ chronised with respect to the authentication code, despite this code being changed with time.
- the information transferred from the transponder 1 or the mobile telephone to the communicator 2 or the receiver comprises an ID code 6 and a further code 8, such as an authentication code, where the ID code and the authentication code are comprised within the said unique code.
- the authentication code is caused to change with time.
- the transponder 1 or the mobile telephone 10 is caused to transfer the authentication code 8 and the ID of the transponder 1 or the mobile telephone 10 to a transaction location 16.
- the transaction location is caused to query, directly or indirectly, the service provider 11 whether the combination of authentication code 8 and the ID of the transponder or mobile telephone is correct, after which the transaction can be carried out.
- the ID of the mobile tele- phone is the mobile telephone number or the IMSI of the SIM card.
- the mobile telephone is caused to, after the said unique code has been transferred to the transaction location, receive a new unique code from the service provider, in that also the new code is transferred to the transaction location and that the transaction location is caused to query, directly or indirectly, the service provider whether both the first-named code and the new code are valid.
- an ID 6 and an authentication code 8 are present in the memory of the transponder 1 or the mobile telephone. Further information 9 may, however, be present, and it may be included in the unique code.
- the said ID provides, via a register which may be present, for example, at the service provider, unambiguous information about the person in question.
- the transponder is caused to reflect an enquiry signal from the communicator 2, where the said reflected signal, or a signal transmitted from a transponder to the communicator, has been modulated with information that comprises the said unique code.
- the said trans- ferral takes place by means of RFID or NFC (Near Field Commu- nication) .
- the said mobile telephone 10 is caused to transfer the said unique code to the transaction location 16.
- the transferral take place by means of bluetooth or W-Lan technology.
- the said unique code comprises the mobile telephone number of the mobile telephone.
- the said unique code comprises the IMSI of the SIM card.
- the service provider is caused to transmit to the mobile telephone a new unique code 15 that replaces the previous unique code, when a transaction location has transferred an ID and an authentica- tion code to the service provider.
- a further preferred embodiment is that in which the service provider is caused, during the transferral of a unique code
- ⁇ oc to the mobile telephone, to transmit a number of unique codes to the mobile telephone, which codes are stored in a memory that belongs to the mobile telephone or to the transponder, and that the unique codes that have been received are caused to be used consecutively.
- This embodiment means that the mobile telephone can be used for transactions when the mobile telephone lacks the radio coverage that is required to receive a unique code.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A method for an identification system in which a transponder (1) or a mobile telephone (10) can be read by a communicator (2) or a receiver (12), and in which information transferred from the transponder (1) or the mobile telephone (10) to the communicator (2) or the receiver (12) comprises a unique code (15). The invention is characterised in that the said unique code (15) is caused to change with time, in that the said mobile telephone (10) is caused to receive the said unique code from the service provider (11) to which the SIM card of the mobile telephone is bound, in that the transponder (1) or the mobile telephone (10) is caused to transfer the unique code (15) to a transaction location (16), in that the transaction location is caused to query, directly or indirectly, the said service provider (11) whether the unique code (15) is valid for a mobile telephone number or the IMSI of a SIM card, after which the transaction can be carried out if the code (15) is valid, and in that the unique code (15) is changed in asso¬ ciation with the transaction.
Description
Method for an identification system of a transaction location
The invention concerns a method for an identification system for a transaction location.
The invention relates to a method for an identification sys¬ tem for a transaction location, such as a cash till for payment, or for a location at which an identification control or authority control takes place, such as companies, authorities, airports, etc., or for door-opening.
Known automatic identification systems normally comprise ID tags to be carried by persons, and equipment to read these tags .
Known automatic identification systems that use radio fre- quencies, known as RFID systems (Radio Frequency Identifica¬ tion) , contain at least one transponder and at least one communicator. One known type of transponder comprises an aerial, a modulator, a memory and a logic circuit to control the modulator. Such a known transponder has a design such that it can receive a signal sent by the communicator and reflect this signal in a modulated form. The communicator has a design such that it can receive and read the signal that has been reflected and modulated by the transponder.
ID tags that are arranged to transmit information to a commu¬ nicator are also available.
An ID tag that comprises a transponder can be applied to a person or an object that is to be identified. The information in the transponder can be read by a communicator at a certain limited distance, such as, for example, 5 metres.
One problem with known identification systems is that when a transponder reflects or transmits a signal to a communicator, the information that is transmitted is liable to eavesdrop-
ping. The code or the codes that a transponder transmits is or are permanently stored in the transponder. This means that a person can illicitly eavesdrop the information that is transferred to the communicator, and subsequently manufacture a transponder that provides the same information to the com¬ municator as that provided by the eavesdropped transponder. The information may, alternatively, be used for purposes of violating integrity. The person in this way can obtain unauthorised access to premises or to devices.
Equivalent problems arise when a mobile telephone is used for identification .
The problem described above is solved by means of the present invention.
The present invention relates to a method for identification systems in which a transponder or a mobile telephone can be read by a communicator or receiver, and where information transferred from the transponder or mobile telephone to the communicator or the receiver comprises a unique code, and it is characterised in that the said unique code is caused to be changed with time, in that the said mobile telephone is caused to receive the said unique code from the service pro- vider to which the SIM card of the mobile telephone is bound, in that the transponder or mobile telephone is caused to transfer the unique code to a transaction location, in that the transaction location is caused to query, directly or indirectly, the said service provider whether the unique code is valid for a mobile telephone number or for the IMSI of a SIM card, after which the transaction can be carried out if the code is valid, and in that the unique code is changed in association with the transaction.
Ansokmngst^xtCKO i 6ObE doc
The invention will be described in more detail below, partly with reference to an embodiment of the invention shown in the attached drawing, where : - Figure 1 shows a sketch with a transponder and a communicator,
- Figure 2 shows a block diagram in order to illustrate the invention .
Figure 1 shows a communication unit for the identification of objects or persons. The communication unit comprises a trans¬ ponder 1 and a communicator in the form of a receiver/transmitter unit 2. The communicator 2 is arranged to transmit an enquiry signal 3 to the transponder 1. The trans- ponder is arranged to receive the enquiry signal and thereby to reflect and modulate the enquiry signal. The communicator 2 is arranged to receive the reflected signal 4 and to decode its information content.
The transponder 1 may instead be of a type in which the transponder receives the enquiry signal 3, after which the transponder actively transmits in return a response signal to the communicator 2 with an integral transmitter.
Figure 2 shows a block diagram in order to illustrate the present invention.
The invention concerns a method for an identification system in which a transponder 1 or a mobile telephone 10 can be read by a communicator 2 or a receiver 12, and where information transferred from the transponder 1 or mobile telephone 10 to the communicator 2 or the receiver 12 comprises a unique code 15.
Ansoknmgstext0401o0SE dec
The said unique code 15 is, according to the invention, caused to be changed with time. Furthermore, the said mobile telephone 10 is caused to receive the said unique code from the service provider 11 to which the SIM card of the mobile telephone 10 is bound. The transponder 1 or the mobile telephone 10 is caused to transfer the unique code to a transaction location 16. The transaction location 16 is subsequently caused to query, directly or indirectly, the said service provider 11 whether the unique code is valid for a mobile telephone number or for an IMSI of a SIM card, after which the transaction can be carried out if the code is valid. The unique code is changed in association with the transaction.
The number 13 is used to denote a mobile telephone network.
The description "the transaction location 16 queries indirectly the said service provider 11 whether the unique code is valid for a mobile telephone number or the IMSI of a SIM card" is used to denote the situation in which the transac- tion location may be connected to an operator other than a service provider, such as a payment card company or an organisation for the management of transactions such as finan¬ cial transactions. An example of such an organisation is the BABS organisation in Sweden, which manages payment card pay- ments independently of the particular payment card that is involved.
According to one preferred design, a transponder 1 is caused to transfer the said ID 6 and authentication code 8 to the transaction location. The transponder 1 is integrated in this case into a mobile telephone 10. The mobile telephone 10 is in this case caused to transfer the authentication code 8
^nsokningsrexKMO 63ςE doc
that has been transferred from the service provider 11 to a memory that belongs to the transponder 1.
The unique code is generated at the service provider 11 and it is paired with the telephone number of the mobile telephone 10 or with the IMSI of the SIM card.
The said transaction location may be a cash till at a pur¬ chasing location. The mobile telephone can in this case be used as a means of payment, if the person has bound a payment card number to his or her telephone number or IMSI, in the database of the service provider. Such a binding may instead be present in the database of the payment card company. If the binding is present in the database of a payment card company, the unique code 15 may contain information concerning which payment card company is currently relevant.
According to one design of the method, a customer transfers the said unique code to the transaction location via his or her mobile telephone or via an RFID circuit built into the mobile telephone. The transaction location subsequently que¬ ries the service provider whether the unique code is a valid unique code.
The unique code may be constructed with so many positions that the probability that it is possible to guess the code is completely negligible. It is, therefore, not necessary for the validation of the transaction to pair, for example, the telephone number with the unique code. It is sufficient that the service provider confirms that the unique code has been issued and that it is correct for a certain mobile telephone number or IMSI.
Ansokmngs t e\tC 40160SE . doc
Pairing can take place, in order to further increase the security.
If it is found that the unique code is valid, payment is carried out, in which the transaction location transmits the amount of the transaction and the unique code to the service provider, for forwarding to the payment card company, or alternatively, only to the payment card company. It must be possible in the latter case for the payment card company to pair the number of the mobile telephone with a person respon¬ sible for the payment, namely the owner of the mobile telephone .
The transaction location may be, instead of a cash till, a location of authority control or identity control. A sound signal or a light signal can in this case be activated when the unique code has been found to be valid. It is thus possible for the service provider to store the information that a certain person has arrived at the transaction location in question, or the transaction location can store the unique code that has been received in order subsequently to present, if necessary, information about which persons have visited the transaction location.
The present invention is not limited to any one type or any several types of transaction locations.
It is a common property of the present invention, thus, that the transponders or the mobile telephones and the communica- tors or the receivers in the system do not need to be syn¬ chronised with respect to the authentication code, despite this code being changed with time.
Ansokningstext04016OSE . doc
According to one highly preferred embodiment, the information transferred from the transponder 1 or the mobile telephone to the communicator 2 or the receiver comprises an ID code 6 and a further code 8, such as an authentication code, where the ID code and the authentication code are comprised within the said unique code. The authentication code is caused to change with time. The transponder 1 or the mobile telephone 10 is caused to transfer the authentication code 8 and the ID of the transponder 1 or the mobile telephone 10 to a transaction location 16. The transaction location is caused to query, directly or indirectly, the service provider 11 whether the combination of authentication code 8 and the ID of the transponder or mobile telephone is correct, after which the transaction can be carried out. The ID of the mobile tele- phone is the mobile telephone number or the IMSI of the SIM card.
According to one preferred design, the mobile telephone is caused to, after the said unique code has been transferred to the transaction location, receive a new unique code from the service provider, in that also the new code is transferred to the transaction location and that the transaction location is caused to query, directly or indirectly, the service provider whether both the first-named code and the new code are valid.
Thus, an ID 6 and an authentication code 8 are present in the memory of the transponder 1 or the mobile telephone. Further information 9 may, however, be present, and it may be included in the unique code.
Thus the said ID provides, via a register which may be present, for example, at the service provider, unambiguous information about the person in question.
Ansoknings~e\t040160SE.doc
According to a first preferred embodiment, the transponder is caused to reflect an enquiry signal from the communicator 2, where the said reflected signal, or a signal transmitted from a transponder to the communicator, has been modulated with information that comprises the said unique code.
According to a further preferred embodiment, the said trans- ferral takes place by means of RFID or NFC (Near Field Commu- nication) .
According to a second embodiment, described above, the said mobile telephone 10 is caused to transfer the said unique code to the transaction location 16.
It is in this case preferred that the transferral take place by means of bluetooth or W-Lan technology.
According to this embodiment, it is preferred that the said unique code comprises the mobile telephone number of the mobile telephone.
It is also preferred that the said unique code comprises the IMSI of the SIM card.
As has been described above, it is preferred that the service provider is caused to transmit to the mobile telephone a new unique code 15 that replaces the previous unique code, when a transaction location has transferred an ID and an authentica- tion code to the service provider.
A further preferred embodiment is that in which the service provider is caused, during the transferral of a unique code
αoc
to the mobile telephone, to transmit a number of unique codes to the mobile telephone, which codes are stored in a memory that belongs to the mobile telephone or to the transponder, and that the unique codes that have been received are caused to be used consecutively.
This embodiment means that the mobile telephone can be used for transactions when the mobile telephone lacks the radio coverage that is required to receive a unique code.
Thus, the problem described in the introduction has been solved.
A number of embodiments have been described above. It is obvious that the further code may be any suitable code.
Thus, the present invention is not to be considered to be limited to the embodiments specified above, since it can be varied within the scope of the attached patent claims.
Ansoλninqstext040160SE . αoc
Claims
1. A method for an identification system in which a transponder (1) or a mobile telephone (10) can be read by a commu-
5 nicator (2) or a receiver (12), and where information transferred from the transponder (1) or the mobile telephone (10) to the communicator (2) or the receiver (12) comprise a unique code (15) , characterised in that the said unique code (15) is caused to be changed with time, in that
W the said mobile telephone (10) is caused to receive the said unique code from the service provider (11) to which the SIM card of the mobile telephone is bound, in that the transponder (1) or the mobile telephone (10) is caused to transfer the unique code (15) to a transaction location (16) , in that
15 the transaction location is caused to query, directly or indirectly, the said service provider (11) whether the unique code (15) is valid for a mobile telephone number or the IMSI of a SIM card, after which the transaction can be carried out if the code (15) is valid, and in that the unique code (15)
20 is changed in association with the transaction.
2. A method according to claim 1, characterised in that information transferred from the transponder (1) or the mobile telephone (10) to the communicator (2) or the receiver
25 (12) comprises an ID code (6), in that the said information comprises a further code (8) , such as an authentication code (8), where the ID code and the authentication code are comprised within the said unique code (15), in that the authentication code is caused to be changed with time, in that the
30 transponder (1) or the mobile telephone (10) is caused to transfer the authentication code and the ID of the trans¬ ponder (1) or the mobile telephone (10) to a transaction location (16), and in that the transaction location is caused
Arso}mnqsteΛt04 OloOSE dec to query, directly or indirectly, the service provider (11) whether the combination of the authentication code (8) and the ID of the transponder (1) or the mobile telephone (10) is correct, after which the transaction can be carried out.
5
3. A method according to claim 1 or 2, characterised i n that the mobile telephone is caused to receive a new unique code from the service provider once the said code has been transferred to the transaction location, in that also w the new code is transferred to the transaction location, and that the transaction location is caused to query, directly or indirectly, the service provider whether both the first-named code and the new code are valid.
15 4. A method according to claim 2 or 3, characterised in that a transponder (1) is caused to transfer the said ID (6) and authentication code (8) to the transaction location (16), in that the transponder (1) is integrated into a mobile telephone (10) , and in that the mobile telephone is caused to
20 transfer the authentication code (8) that has been transferred from the service provider (11) to a memory that be¬ longs to the transponder (1) .
5. A method according to claim 1, 2, 3 or 4, c h a r a c - 25 terised in that the transponder (1) is caused to re¬ flect an enquiry signal from a communicator (2), where the said reflected signal, or a signal transmitted from a trans¬ ponder to the communicator, has been modulated with information that comprises the said unique code (15) .
30
6. A method according to claim 1, 2, 3, 4, or 5, charac¬ teri s ed in that the said transferral takes place by RFID or NFC technology.
Ansokniπgstext040150SE.doc
7. A method according to claim 1, 2, 3, 4, or 5, characteri sed in that the said mobile telephone (10) is caused to transfer the said unique code to the transaction location.
8. A method according to claim 7, characteri s ed in that the transferral takes place by means of bluetooth tech¬ nology.
9. A method according to claim 7 or 8, characterised in that the said unique code (15) comprises the mobile telephone number of the mobile telephone (10) .
10. A method according to claim 7 or 8, characterised i n that the said unique code (15) comprises the IMSI of a SIM card.
11. A method according to any one of the preceding claims, characterised in that the service provider is caused to transmit a new unique code (15) to the mobile telephone that replaces the previous unique code, once a transaction location (16) has transmitted ID (6) and authentication code (8) to the service provider (11) .
12. A method according to any one of the preceding claims, characterised in that the service provider (11) is caused to transmit a number of unique codes to the mobile telephone (10) during the transfer of a unique code (15) to the mobile telephone, which unique codes are stored in a memory that belongs to the mobile telephone or the transponder (1), and in that the unique codes (15) received are caused to be used consecutively.
Ar.sokningsteΛt040160SE. doc
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| SE0601434-4 | 2006-06-30 | ||
| SE0601434A SE531209C2 (en) | 2006-06-30 | 2006-06-30 | Procedure for identification system for a transaction site |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2008002260A1 true WO2008002260A1 (en) | 2008-01-03 |
Family
ID=38845903
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/SE2007/050451 Ceased WO2008002260A1 (en) | 2006-06-30 | 2007-06-21 | Method for an identification system of a transaction location. |
Country Status (2)
| Country | Link |
|---|---|
| SE (1) | SE531209C2 (en) |
| WO (1) | WO2008002260A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010126509A3 (en) * | 2009-04-30 | 2011-12-08 | Donald Michael Cardina | Systems and methods for randomized mobile payment |
| WO2011091036A3 (en) * | 2010-01-19 | 2011-12-22 | Where-Pro, Llc | Location based consumer interface for retail environment |
| WO2022155461A1 (en) * | 2021-01-15 | 2022-07-21 | Fastr Tech Inc. | Electronic receipt transmittal apparatus and method |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001052202A1 (en) * | 2000-01-12 | 2001-07-19 | Marconi Commerce Systems Inc. | Cellular telephone-based transactions |
| WO2001063568A2 (en) * | 2000-02-23 | 2001-08-30 | Nokia Corporation | System and method of secure payment and delivery of goods and services |
| WO2002031612A2 (en) * | 2000-10-12 | 2002-04-18 | Schlumberger Systemes | Method for carrying out a commercial transaction over a network |
| US20020152178A1 (en) * | 2001-04-12 | 2002-10-17 | M-Commerce Co., Ltd. | Credit card transaction authentication system and method using mobile terminal |
| US20040039709A1 (en) * | 2002-01-23 | 2004-02-26 | Petri Pirhonen | Method of payment |
| GB2393806A (en) * | 2002-10-05 | 2004-04-07 | Simos Symeou | Method for confirming authorisation of access to an account |
| US20040143521A1 (en) * | 2003-01-09 | 2004-07-22 | Dieter Barnard | Method and device for paying for services in networks with a single sign-on |
| WO2004090819A2 (en) * | 2003-04-14 | 2004-10-21 | Tagboard Limited | Payment apparatus and method |
| US20050050367A1 (en) * | 1999-09-28 | 2005-03-03 | Chameleon Network, Inc. | Portable electronic authorization system and method |
-
2006
- 2006-06-30 SE SE0601434A patent/SE531209C2/en unknown
-
2007
- 2007-06-21 WO PCT/SE2007/050451 patent/WO2008002260A1/en not_active Ceased
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050050367A1 (en) * | 1999-09-28 | 2005-03-03 | Chameleon Network, Inc. | Portable electronic authorization system and method |
| WO2001052202A1 (en) * | 2000-01-12 | 2001-07-19 | Marconi Commerce Systems Inc. | Cellular telephone-based transactions |
| WO2001063568A2 (en) * | 2000-02-23 | 2001-08-30 | Nokia Corporation | System and method of secure payment and delivery of goods and services |
| WO2002031612A2 (en) * | 2000-10-12 | 2002-04-18 | Schlumberger Systemes | Method for carrying out a commercial transaction over a network |
| US20020152178A1 (en) * | 2001-04-12 | 2002-10-17 | M-Commerce Co., Ltd. | Credit card transaction authentication system and method using mobile terminal |
| US20040039709A1 (en) * | 2002-01-23 | 2004-02-26 | Petri Pirhonen | Method of payment |
| GB2393806A (en) * | 2002-10-05 | 2004-04-07 | Simos Symeou | Method for confirming authorisation of access to an account |
| US20040143521A1 (en) * | 2003-01-09 | 2004-07-22 | Dieter Barnard | Method and device for paying for services in networks with a single sign-on |
| WO2004090819A2 (en) * | 2003-04-14 | 2004-10-21 | Tagboard Limited | Payment apparatus and method |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2010126509A3 (en) * | 2009-04-30 | 2011-12-08 | Donald Michael Cardina | Systems and methods for randomized mobile payment |
| US9117210B2 (en) | 2009-04-30 | 2015-08-25 | Donald Michael Cardina | Systems and methods for randomized mobile payment |
| WO2011091036A3 (en) * | 2010-01-19 | 2011-12-22 | Where-Pro, Llc | Location based consumer interface for retail environment |
| WO2022155461A1 (en) * | 2021-01-15 | 2022-07-21 | Fastr Tech Inc. | Electronic receipt transmittal apparatus and method |
| US12299647B2 (en) | 2021-01-15 | 2025-05-13 | Fastr Tech Inc. | Electronic receipt transmittal apparatus and method |
Also Published As
| Publication number | Publication date |
|---|---|
| SE0601434L (en) | 2007-12-31 |
| SE531209C2 (en) | 2009-01-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7253729B2 (en) | Wireless vending communication systems | |
| Peris-Lopez et al. | RFID systems: A survey on security threats and proposed solutions | |
| US7872567B2 (en) | Method for transponder access control | |
| CA2128596C (en) | Arrangement for simultaneously interrogating a plurality of portable radio frequency communication devices | |
| US7978082B2 (en) | RFID-based personnel tracking | |
| US20080061941A1 (en) | Method, transponder, and system for secure data exchange | |
| US20110109426A1 (en) | Method, device, and system for secured access to gated areas | |
| CA2382020A1 (en) | Remote ordering device | |
| PT1166238E (en) | PROCESS AND SYSTEM FOR ORDER LOADING AND USING ACCESS TICKETS | |
| EP1282044B1 (en) | Authenticating method | |
| EP1886260A2 (en) | Method of securely reading data from a transponder | |
| US8581729B2 (en) | Gateway radio frequency identification tag system | |
| US7232069B1 (en) | Methods and apparatus for disabling, enabling or setting the range of radio frequency identification devices | |
| US20020007291A1 (en) | Method for the automation of allocation processes for products and/or services | |
| WO2008002260A1 (en) | Method for an identification system of a transaction location. | |
| KR101325007B1 (en) | Method and system for confirming location of product within shelf using RFID | |
| MXPA06003097A (en) | Method for matching a mobile telephone with a personal card. | |
| US20080055085A1 (en) | System and a Method for Improving the Performance of Rfid Systems | |
| CA2101858C (en) | Non-contacting transaction system | |
| US20070165861A1 (en) | Method and electronic terminal for rfid tag type encryption | |
| US20050042986A1 (en) | Method and apparatus for access checking and access control | |
| US7259673B2 (en) | Anti-theft arrangement, method and program | |
| RU2246764C2 (en) | Method for tracking movement of objects and system for realization of said method | |
| US8183983B2 (en) | Method for the at least temporary activation of bidirectional communication and transponder | |
| US20070279189A1 (en) | Communication method between host and RFID reader, host device, RFID reader, and RFID communication system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07748611 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| NENP | Non-entry into the national phase |
Ref country code: RU |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 07748611 Country of ref document: EP Kind code of ref document: A1 |