EP1579396A1 - Method and system for transmission of data - Google Patents
Method and system for transmission of dataInfo
- Publication number
- EP1579396A1 EP1579396A1 EP03781215A EP03781215A EP1579396A1 EP 1579396 A1 EP1579396 A1 EP 1579396A1 EP 03781215 A EP03781215 A EP 03781215A EP 03781215 A EP03781215 A EP 03781215A EP 1579396 A1 EP1579396 A1 EP 1579396A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- signature
- smart card
- receiver
- card
- procedure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
Definitions
- the present invention relates to a system and a method to, at a wireless telecommunication and data communication network, make earnings possible for a card issuer in a system which is based on open, standardized interfaces.
- the card issuer which is the mobile telephone operator, has full control over the signing process and all communication is executed via the operator's OTA-platform.
- the operator has all possibilities to charge participants (that is, service providers, for instance banks) which want to use the signature function.
- the operator has for the same reason possibility to charge a CA (Certificate Authority) which wants to issue certificate based on keys on the smart card.
- CA Certificate Authority
- the interfaces are standardized by WAP (Wireless Application Protocol) forum and is often considered to be the solution which will be the most successful.
- WAP Wireless Application Protocol
- the interfaces are standardized, and the operator is transparent in communication sense to the participants which want to use the signing function.
- the card issuer to-day has no technical possibility to charge participants which are using the signing function.
- CA CA to issue certificate based on keys on the smart card, without the card issuer's knowledge, and therefore neither earnings related to this are secured by the card issuer.
- To-day's system to secure card issuer earnings at digital signatures is based on that the communication between the smart card in the mobile telephone and the service provider/CA is executed via some form of operator gateway, where billing data is generated (frequently based on so called SAT-technology (SIM Application Toolkit) + OTA platform) .
- SAT-technology SIM Application Toolkit + OTA platform
- CA card issuer
- CA card issuer
- US " 2002/0032860 shows a system in which an encrypted digital signature is transmitted from a customer, via a tradesman, to a financial institution.
- the financial institution decrypts the signature and transmits the decrypted signature (+ account information) to the tradesman .
- WO 99/00775 shows a system for payment.
- a terminal is a "smart card”.
- an "acquirer” there is a two-way communication channel.
- This two-way communication channel connects the card issuer with the "acquirer", where the "acquirer” acts as an agent for the majority of card issuers and can, for instance, be a bank.
- a PIN-code is encrypted and is transmitted via an "acquirer” to the card issuer.
- the "acquirer” can not decrypt the PIN-code.
- WO 01/45056 shows a system to perform card transactions.
- the buyer's computer creates an encrypting number, which at least to some extent/part agrees with the card number.
- the encrypted number is given to a tradesman who forwards it to the card issuer, the computer of which can decrypt, the number.
- Identification of the buyer is made via a separate link from the buyer to the card issuer.
- WO 00/79724 shows a WIM-card containing the card manufacturer's private key. By this, certificate is signed. Verification of the signature is made by the card issuer.
- US 2002/00056079 shows a method to load an application on a "smart card".
- the one which provides the application (the service provider) cannot decrypt "card attribute data", but has to transmit these (and ID for the application) further to the card issuer.
- the card issuer decrypts "card attribute data” and identifies the card.
- the card issuer decides if the loading of the application shall be allowed or not, and informs about this to the service provider.
- WO 01/22374 shows a method and system for secure payment. The idea of the method is that the card issuer is responsible for "authentication" of the card owner/holder and "authorization" of the card purchase. At a purchase an inquiry/request about payment is transmitted from the tradesman to the card holder.
- the card holder opens a link to the card issuer, (authenticated by the card issuer) , and transmits information about the purchase and the tradesman via the link to the card issuer.
- the card issuer answers/ responds by transmitting payment information to the tradesman via the cardholder's computer.
- the tradesman's computer confirms the purchase.
- the card issuer confirms the payment when the card holder has been authenticated. All data which are transmitted are decrypted.
- the cardholder's computer can be a mobile telephone.
- the card issuer has control over the information flow to the card holder during the transfer of the payments.
- the present invention relates to a system and a method to create digital signatures by means of a mobile telephone, which system is based on keys in so called smart cards in a mobile telephone and PKI .
- Today's system for securing card issuer earnings at digital signatures is based on that the communication between the smart card in the mobile telephone and the service provider is executed via some form of operator interface where the debiting data is generated.
- the invention results in that a standardized system with open solutions instead can be used, that is, in the whole interaction between the service provider and the user.
- a distinctive feature of the invention is that when a digital signature has been created on a smart card in a mobile unit, the digital signature is encrypted (not the signed amount of data) with/by a key which belongs to the card issuer before the signature leaves the smart card.
- the encrypted signature is transmitted/transferred to the receiver in the same way as if it had not been encrypted by /with the card issuer's key.
- the receiver transmits the signature to the card issuer, which is the only one that can decrypt the signature.
- the card issuer decrypts the signature, debits the signature receiver and transmits the decrypted signature to the signature receiver. Only after that, the signature receiver can evaluate/check the decrypted signature.
- One advantage with/of the invention is that verification of the digital signature is made in a standardized system with open solutions, that is, in the whole interaction between service provider/CA and user.
- Another advantage with/of the invention is that the digital signature is encrypted after it has been created, so that only the card issuer can decrypt it.
- FIG. 1 shows a survey of a mobile system which verifies signatures on smart cards
- Figure 2 shows verification system/systems of how a digital signature can be verified
- Figure 3 shows a signal diagram of how the signature can be verified
- Figure 4 shows a flow chart of how the signature is verified.
- the invention aims at securing the card issuer's earnings for systems which are based on WIM or other future systems with open interfaces.
- FIG. 1 shows a survey of a system 100 for mobile communication, the mobile system, which can verify signatures on smart cards .
- the mobile system 100 consists of a smart card SK 102 which contains/includes a function A. to create a digital signature DS on an amount of data, and a function B which encrypts the digital signature by/with a card issuer's key KN and gets an encrypted digital signature.
- a mobile communication network 106 via which communication between mobile terminal/smart card and a signature receiver SM 112 is executed.
- the mobile communication network includes typically base stations, transmission, exchanges and databases.
- the mobile communication network also can be a short distance communication network (based on, for instance, Blue Tooth) .
- a gateway or proxy 108 which connects the mobile communication network with an Internet 110.
- Internet data communication network
- Such a data communication network also can be used for communication between the signature receiver and a card issuer server 118.
- Certificate Authority 114 certificate-issuer
- Service Provider 116 service- provider
- Figure 2 shows a verification system 200 of how a signature can be verified
- Figure 3 shows a signal diagram 300 over how the signature can be verified.
- the signal diagram shows examples of which type of signal management that is applied between the different units in the verification system.
- a smart card module SKM 202 to create digital signatures (WIM)
- WIM digital signatures
- ME 106 some type of mobile communication network ME 106, for instance GSM + possible WAP-gateway
- the signature receiver SM 112 the signature receiver SM 112
- card issuer KU 210 which provides the card issuer server 118.
- Step 1 The signature receiver SM 112 transmits 302 a signing enquiry/request to the mobile terminal ME 104.
- Step 2 The mobile terminal ME 104 attends to the signing enquiry/request. After that, the mobile terminal ME request 304 that a smart card module SKM 202 shall create a digital signature.
- Step 3 The smart card module SKM 202 makes use of the function A, which creates a digital signature DS and the function B, which encrypts the digital signature and then will have an encrypted digital signature KDS . After that, the encrypted digital signature is transmitted 306 to the mobile terminal ME 104.
- Step 4 The mobile terminal ME 104 transmits 308 with the encrypted digital signature KDS to the signature receiver SM 112.
- Step 6 The card issuer KU 210 decrypts the encrypted digital signature KDS and gets a decrypted digital signature DDS, debits the signature receiver for this, and transmits 312 the decrypted signature to the signature receiver 112.
- FIG 4 a flow chart 400 over how the signature is verified is shown, consequently a more detailed procedure than has earlier been described.
- the service provider 116 which also is the signature receiver SM 112, transmits 402 a signing enquiry/request to the user' s mobile terminal ME 104, which, for instance, includes/contains the data which shall be signed.
- the mobile terminal ME 104 starts 404 a dialog with a user.
- the user decides 406 to sign the content and enters 408 information (most often a PIN-code) which is required to unlock the signing key SN .
- the mobile terminal requests 410 that the smart card module SKM 202 shall create a digital signature DS for the content, by one of the private keys PN for signing on the card.
- the function A creates 412 a digital signature DS for the content in the smart card module SKM 202.
- the function B encrypts 414 the digital signature DS by the card issuer's key KN . After that, the encrypted digital signature KDS is transmitted 416 to the mobile terminal ME 104.
- the mobile terminal ME 104 formats/creates 418 an answer to the signature inquiry/request and encloses 420 the encrypted digital signature KDS to the signature receiver SM 112. Information about which party the card issuer is, is also enclosed.
- the signature receiver SM 112 transmits 422 the encrypted digital signature KDS to the card issuer KU 210.
- the card issuer KU 210 decrypts 424 the encrypted digital signature, debits 426 the signature receiver SM 112 for this, and transmits 428 the decrypted digital signature DDS to the signature receiver SM 112.
- the invention is not limited to use with any/some specific protocols or frameworks, but since it is in the first phase is expected to be used together with WIM and WPKI according to WAP forum, here follows a (somewhat simplified of the steps 1-5) description of what this case can look like:
- the service provider transmits a signing inquiry/ request to the user's mobile terminal by means of the function "signText".
- a description of "signText” is to be found in "WMLScript Crypto Library” WAP-161- WMLScriptCrypto-20010620-a, WAP forum.
- the mobile terminal starts a dialog towards the user, and the user decides to sign the content and enters information (most often a PIN-code) which is required to unlock the signing key.
- the mobile terminal request that WIM shall create a digital signature for the content by transmitting the command "Compute Digital Signature" to
- WIM see “Wireless Identity Module” WAP-260-WIM-20010712-a, WAP forum.
- the WIM-application creates a signature for/to the content.
- An additional function on the smart card encrypts the signature with/by the card issuer's key. After that, the encrypted signature is transmitted to the mobile terminal in the command answer to "Compute Digital Signature" .
- the mobile terminal formats/creates a result of
- signalText where the encrypted signature is enclosed as the object "Signature”.
- a certificate or a certificate-ULR is also added, where the certificate includes additional information about which party the card issuer is.
- the result of "signText” is transmitted from the mobile terminal to the signature receiver.
- the signature receiver transmits the encrypted signature to the card issuer.
- the card issuer decrypts the signature, debits the signature receiver for this, and transmits the decrypted signature to the signature receiver.
- Step 5 Note that it is only the signature, not the signed content, that is encrypted in Step 3, and which is transmitted to the card issuer in Step 5. Because the signature is based on a one-way function of the signed content, it is insensitive information from a security point of view, even if the signed content is of confidential nature .
- the signature receiver must get to know that the signature is encrypted, and where to turn to get it decrypted. The best way probably is to let the information exist explicitly or implicitly in the user- or device certificate (sometimes a URL is transmitted instead which point at the certificate) which, according to Step 4, is transmitted to the service provider, even if there are other possibilities.
- WAP WAP
- signtext the encrypted signature is transmitted transparently as a non-encrypted signature.
- the adjustments are made in WIM (however not in the interface towards the mobile terminal) and in origin server/PKI-portal (however not in the interface towards WAP GW) .
- the method can be used both with symmetric and asymmetric card issuer encryption of the digital signature.
- the secret key which has been placed on the smart card to encrypt the signatures is only known by/to the card issuer.
- the signature is encrypted by a public key, the corresponding private key of which only is known by the card issuer.
- a service provider/signature receiver buys "permanent" access to the card issuer key of certain cards, and is allowed to use it under an agreement. In that case the communication with the card issuer in Step 5 and 6 is not needed for each signature.
- the method also can be used where digital signatures created on a smart card are used in any step to create a secure data transport, for instance WTLS (Wireless Transport Layer Security) or SSL (Secure Sockets Layer) .
- WTLS Wireless Transport Layer Security
- SSL Secure Sockets Layer
- SWIM SIM with WIM
- SWIM does not hold the public key
- RSA-keys a device certificate
- the operator's idea partly is based on the principle that the party who wants to issue a certificate based on keys on SWIM shall pay a fee to the operator for this .
- One method for this is that the operator creates a database with device certificates and charges the one who requests a device certificate as basis to create a user certificate. In principle anybody can issue a user certificate if the above invention is not used.
- two signatures of/by users inquire/request (in that way the public key can be calculated, device certificate is not necessary) .
- the invention prevents this, by only parties having agreements with the operator being allowed to have signatures decrypted.
- SWIM SIM with WIM
- public public in this context means that the user will have full access to his/her certificate and it is invention, the operator can get possibility to create earnings at each signature which is made by means of the SWIM.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Finance (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0203877A SE524514C2 (en) | 2002-12-23 | 2002-12-23 | Method and system for transmitting data |
SE0203877 | 2002-12-23 | ||
PCT/SE2003/001980 WO2004057547A1 (en) | 2002-12-23 | 2003-12-17 | Method and system for transmission of data |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1579396A1 true EP1579396A1 (en) | 2005-09-28 |
Family
ID=20290023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP03781215A Ceased EP1579396A1 (en) | 2002-12-23 | 2003-12-17 | Method and system for transmission of data |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1579396A1 (en) |
AU (1) | AU2003288840A1 (en) |
NO (1) | NO336856B1 (en) |
SE (1) | SE524514C2 (en) |
WO (1) | WO2004057547A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011102489A1 (en) | 2011-05-24 | 2012-11-29 | Vodafone Holding Gmbh | Method and device for providing an identification identifier of an electronic terminal |
DE102011122874B4 (en) | 2011-09-27 | 2021-10-14 | Vodafone Gmbh | Method for carrying out a transaction, as well as terminal device |
DE102011115154B3 (en) | 2011-09-27 | 2013-03-28 | Vodafone Holding Gmbh | Method for initializing and / or activating at least one user account |
CN105205666B (en) * | 2014-06-17 | 2019-10-25 | 中国银联股份有限公司 | Face-to-face method of payment and system based on bluetooth |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5903882A (en) * | 1996-12-13 | 1999-05-11 | Certco, Llc | Reliance server for electronic transaction system |
SE512748C2 (en) * | 1997-05-15 | 2000-05-08 | Access Security Sweden Ab | Procedure, active card, system and use of active card to carry out an electronic transaction |
US6223291B1 (en) * | 1999-03-26 | 2001-04-24 | Motorola, Inc. | Secure wireless electronic-commerce system with digital product certificates and digital license certificates |
US20020077993A1 (en) * | 2000-12-18 | 2002-06-20 | Nokia Corporation | Method and system for conducting wireless payments |
GB2398668B (en) * | 2001-05-22 | 2004-10-06 | Vodafone Plc | Electronic transaction systems and methods |
-
2002
- 2002-12-23 SE SE0203877A patent/SE524514C2/en unknown
-
2003
- 2003-12-17 EP EP03781215A patent/EP1579396A1/en not_active Ceased
- 2003-12-17 AU AU2003288840A patent/AU2003288840A1/en not_active Abandoned
- 2003-12-17 WO PCT/SE2003/001980 patent/WO2004057547A1/en not_active Application Discontinuation
-
2005
- 2005-04-06 NO NO20051700A patent/NO336856B1/en not_active IP Right Cessation
Non-Patent Citations (1)
Title |
---|
See references of WO2004057547A1 * |
Also Published As
Publication number | Publication date |
---|---|
NO336856B1 (en) | 2015-11-16 |
SE0203877L (en) | 2004-06-24 |
SE524514C2 (en) | 2004-08-17 |
NO20051700D0 (en) | 2005-04-06 |
WO2004057547A1 (en) | 2004-07-08 |
SE0203877D0 (en) | 2002-12-23 |
NO20051700L (en) | 2005-07-20 |
AU2003288840A1 (en) | 2004-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8145899B2 (en) | Creation of user digital certificate for portable consumer payment device | |
US7925878B2 (en) | System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials | |
US7979353B2 (en) | Electronic transaction method using an electronic coupon | |
EP1669955B1 (en) | System and method of bootstrapping a temporary public-key infrastructure from a cellular telecommunication authentication and billing infrastructure | |
US20030069792A1 (en) | System and method for effecting secure online payment using a client payment card | |
US20100010932A1 (en) | Secure wireless deposit system and method | |
EP2369545A1 (en) | System and method of secure authentication and billing for goods and services using a cellular telecommunication and an authorization infrastructure | |
US20020098830A1 (en) | Method for verifying in a mobile device the authenticity of electronic certificates issued by a certification authority and corresponding identification module | |
US20090182676A1 (en) | Remote Electronic Payment System | |
US20070118749A1 (en) | Method for providing services in a data transmission network and associated components | |
US20100049655A1 (en) | Method and system for securely executing a charge transaction | |
WO2008052592A1 (en) | High security use of bank cards and system therefore | |
EP1176844A2 (en) | Telecommunication systems and methods | |
KR100349888B1 (en) | PKI system for and method of using micro explorer on mobile terminals | |
EP1579396A1 (en) | Method and system for transmission of data | |
KR20020010160A (en) | System & Method for Wireless Electronic Commerce Payment service | |
WO2002091144A1 (en) | Method of secure transactions by means of two public networks | |
KR20040055843A (en) | System and Method for Payment by Using Authorized Authentication Information | |
KR100458526B1 (en) | System and Method for the wire·wireless complex electronic payment | |
KR100837301B1 (en) | System and method for providing cash advance service in mobile station payment portal service | |
KR20020083195A (en) | System and Method for the electronic billing process and authentication using the synchronized wire-wireless complex system | |
KR20080003303A (en) | System for payment by using authorized authentication information | |
KR100836883B1 (en) | Method and Apparatus for Transit Pass Card using Mobile Communication | |
Pisko | Enhancing Security of Terminal Payment with Mobile Electronic Signatures | |
KR20020078994A (en) | Apparatus and method for paying the price using wireless communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050725 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
RAX | Requested extension states of the european patent have changed |
Extension state: LV Payment date: 20050725 Extension state: LT Payment date: 20050725 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: KAWE, ROLF Inventor name: ERIKSSON, JONAS |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: TELIASONERA AB |
|
17Q | First examination report despatched |
Effective date: 20110909 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 20/04 20120101AFI20150918BHEP Ipc: G07F 7/10 20060101ALI20150918BHEP Ipc: G06Q 20/40 20120101ALI20150918BHEP Ipc: G06Q 20/34 20120101ALI20150918BHEP Ipc: H04L 29/06 20060101ALI20150918BHEP Ipc: H04W 12/10 20090101ALI20150918BHEP |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20160512 |