EP3394812A1 - Authentication method - Google Patents
Authentication methodInfo
- Publication number
- EP3394812A1 EP3394812A1 EP16829414.8A EP16829414A EP3394812A1 EP 3394812 A1 EP3394812 A1 EP 3394812A1 EP 16829414 A EP16829414 A EP 16829414A EP 3394812 A1 EP3394812 A1 EP 3394812A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- authentication
- server
- transaction data
- dcw
- security code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 claims abstract description 44
- 238000004590 computer program Methods 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 3
- 230000000903 blocking effect Effects 0.000 claims 1
- 230000007246 mechanism Effects 0.000 description 15
- 230000003068 static effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 102100028043 Fibroblast growth factor 3 Human genes 0.000 description 1
- 101001128138 Homo sapiens NACHT, LRR and PYD domains-containing protein 2 Proteins 0.000 description 1
- 101001128135 Homo sapiens NACHT, LRR and PYD domains-containing protein 4 Proteins 0.000 description 1
- 101001109455 Homo sapiens NACHT, LRR and PYD domains-containing protein 6 Proteins 0.000 description 1
- 101000982939 Homo sapiens PAN2-PAN3 deadenylation complex catalytic subunit PAN2 Proteins 0.000 description 1
- 101001113056 Homo sapiens PAN2-PAN3 deadenylation complex subunit PAN3 Proteins 0.000 description 1
- 101000742934 Homo sapiens Retinol dehydrogenase 14 Proteins 0.000 description 1
- 102100024061 Integrator complex subunit 1 Human genes 0.000 description 1
- 101710092857 Integrator complex subunit 1 Proteins 0.000 description 1
- 108050002021 Integrator complex subunit 2 Proteins 0.000 description 1
- 102100031897 NACHT, LRR and PYD domains-containing protein 2 Human genes 0.000 description 1
- 102100031898 NACHT, LRR and PYD domains-containing protein 4 Human genes 0.000 description 1
- 102100022696 NACHT, LRR and PYD domains-containing protein 6 Human genes 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
Definitions
- the present invention is in the field of authentication mechanisms and more particularly relates to an authentication from a security code of a smart card.
- the invention may in particular be used to control a user's access to an online service accessible via a telecommunications network such as the Internet for example.
- 3DS authentication protocol for "3-D Secure” has been developed. This protocol provides for the sending of a secret code to the user, via for example an email or an SMS, in order to authenticate the user when the latter attempts to perform a transaction remotely with his credit card.
- the 3DS authentication protocol well known to those skilled in the art reduces the risk of fraud in a remote financial transaction, but this protocol also has certain disadvantages.
- a window usually opens in the user's Internet browser to invite the user to enter the secret code that he has just received by SMS or email.
- This phase sometimes disturbs the user who can in some cases lose trust and abandon the current transaction, especially if there is any doubt about the authenticity of this invitation window.
- the user is not always able to receive the secret code that has been sent to him as part of the 3DS protocol, or does not have the time or the desire to enter this secret code when the invitation is made to him.
- the present invention relates to an authentication method implemented by an authentication server, comprising:
- the present invention is advantageous in that it makes it possible to dispense with the authentication mechanism according to the 3DS protocol when it is possible to authenticate the user of the transaction by verifying a dynamic security code DCW generated by the card. user's smart card (when said card is of DCW type).
- the authentication according to the 3DS protocol has certain disadvantages, in particular in that it can cause discomfort for some users sometimes leading to the abandonment of the current transaction.
- the invention makes it possible to inhibit the 3DS mechanism while maintaining a high level of security by verifying, where possible, a DCW code. Thanks to the invention, it is possible to facilitate the authentication of a user, and therefore his access to a service.
- the authentication method comprises sending, to the access server, a positive authentication message transaction data if the validity of the DCW code is verified successfully during said cooperation.
- the authentication method is such that: the authentication server determines whether the smart card is of the DCW type from a PAN identifier included in the received transaction data; and
- the authentication server determines that the security code is DCW.
- the authentication server prevents the realization of a 3DS authentication of said smart card.
- the authentication server if the security code is of CW type and if the authentication server determines, from the transaction data, that it is authorized to perform a 3DS authentication, the authentication server authorizes performing a 3DS authentication of said smart card.
- the smart card is a credit card
- the transaction data comprises a PAN identifier and an expiration date of said bank card.
- said cooperation comprises:
- the smart card is a bank card and the authentication server is an access control server,
- the access control server performs the following steps:
- the smart card is a bank card and the authentication server is a 3DS directory server,
- the 3DS directory server performs the following steps:
- the authentication server configures itself, only if a parameter received from the access server with the transaction data is in a predefined state, to detect that no 3DS authentication must be performed if a code security included in the transaction data is of the DCVV type.
- the invention also relates to a control method implemented by a server for access to a service, comprising:
- the access server determines that the authentication is performed successfully on reception, from the control server, of a positive verification message of a security code DCW included in the data of transaction.
- the access server sends, to the authentication server, a parameter with the transaction data, said parameter being in a predefined state to indicate that no 3DS authentication should be performed if a code of Security included in the transaction data is DCVV type.
- the different steps of the authentication method implemented by the authentication server as defined above are determined by instructions of computer programs.
- the different steps of the control method implemented by the access server as defined above are determined by instructions of computer programs.
- the invention also relates to a computer program on an information carrier (or recording medium), this program being capable of being implemented in a server, or more generally in a computer, this program comprising instructions adapted to the implementation of the steps of at least one of the methods as defined above.
- the invention also relates to a recording medium (or information carrier) readable by a computer, and including instructions of a computer program as mentioned above.
- programs mentioned in this presentation may use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form , or in any other desirable form.
- the recording media mentioned above can be any entity or device capable of storing the program.
- the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or a magnetic recording medium, for example a floppy disk or a disk. hard.
- the recording media may correspond to a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means.
- the program according to the invention can be downloaded in particular on an Internet type network.
- the recording media may correspond to an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question.
- FIG. 1A schematically represents a system comprising a terminal, a service access server, a 3DS directory server, an ACS server and a DCW verification server, according to a particular embodiment of the invention
- FIG. 1B schematically shows a smart card according to a particular embodiment of the invention
- FIG. 2 diagrammatically represents the structure of an access server according to a particular embodiment of the invention
- - Figure 3 schematically shows modules implemented in the access server shown in Figure 1A and 2, according to a particular embodiment of the invention
- FIG. 4 schematically represents the structure of an ACS server according to a particular embodiment of the invention.
- FIG. 5 schematically shows modules implemented in the ACS server shown in Figures 1A and 4, according to a particular embodiment of the invention
- FIG. 6 represents an example of a table stored in a memory of the server ACS represented in FIGS. 1A and 4, according to a particular embodiment of the invention
- FIG. 7 represents, in the form of a diagram, the steps implemented in particular by the access server, the directory server 3DS and the server ACS, according to a particular embodiment of the invention
- FIG. 8 represents, in the form of a diagram, the steps implemented in particular by the access server, the directory server 3DS and the server ACS, according to a variant of the embodiment illustrated in FIG. 7.
- the present invention relates to the authentication mechanisms and relates more particularly to an authentication from a security code of a smart card.
- a dynamic security code (called DCW) that changes over the life of the card.
- the computer processing system of the financial service of the transaction is able to check the validity of this dynamic security code, depending for example on a time parameter, to validate or not the transaction.
- the use of such a dynamic security code makes it possible to ensure that the user actually has in his possession the bank card concerned at the time of the transaction. If it is stolen, the dynamic security code has a limited usefulness since the validity of this code is only temporary.
- a smart card DCW (or DCW card) will be called a smart card capable of generating dynamic security codes DCW.
- DCW codes are known to those skilled in the art and will therefore not be described in more detail in this presentation.
- the invention proposes to improve the existing authentication mechanisms by inhibiting the 3DS authentication protocol when it is possible to authenticate an ongoing transaction from a dynamic security code DCVV (for "Dynamic Card Verification Value”). "), In the case where such a dynamic code can be is generated by the user's smart card.
- DCVV Dynamic Card Verification Value
- transaction is understood here in a broad sense and includes, for example, in the banking field, any type of financial transaction, such as for example a payment transaction, a transfer transaction, or a consultation of 'a bank account.
- the invention implements, for example, an authentication server able to receive, from a service access server, an authentication request comprising transaction data associated with an authentication server. Smartcard ; determining whether a security code included in the transaction data is of the DCVV type; and if so, detecting that no 3DS authentication must be performed to authenticate said card and to cooperate with a verification server to check the validity of the security code DCW.
- the invention also relates to an access server adapted to receive transaction data associated with a smart card during a transaction with the access server; transmitting the transaction data to an authentication server to request authentication of the transaction according to the 3DS protocol; and to determine, from a message received from the authentication server, that no authentication according to the 3DS protocol must be performed if the smart card is of DCVV type.
- the access server may for example determine that the transaction data is authentic from a message received from the authentication server, indicating that a DCW code included in the transaction data has been verified successfully.
- FIG. 1A schematically represents a system SY according to one particular embodiment of the invention.
- the SY system comprises in this example a terminal T, an access server SW, a directory server 3DS (or "3DS Directory Server” in English) here denoted SDIR, an access control server ACS (for "Access Control Server And a verification server SV, according to a particular embodiment of the invention.
- a directory server 3DS or "3DS Directory Server” in English
- SDIR an access control server ACS (for "Access Control Server And a verification server SV, according to a particular embodiment of the invention.
- the SY system allows in this example to control the access of a user to a service S.
- a user tries to use the service S, using a smart card C shown in Figure 1B.
- the smart card C is here a bank card including credit card data, namely a bank identifier PAN (for "Primary Account Number”). "), An EXP expiry date, and a CSC card security code.
- the security code CSC can be a static code (CW code for "Card Verification Value") on the card or a dynamic code (DCW for "Dynamic Card Verification Value”) that can be generated by the card.
- the bank card C is for example in accordance with the EMV protocol. Other types of smart cards can be envisaged within the scope of the invention.
- the user of the terminal T represented in FIG. 1A is here able to communicate, via an RI communications network such as the Internet for example, with an access server SW controlling access to the service S.
- an access server SW controlling access to the service S.
- the terminal T is able to send, to the access server SW, transaction data DT associated with the smart card C, for example to carry out a financial transaction (purchase %) with the service S.
- the data of DT transactions include, for example, the PAN ID, the exp expiration date, and the CSC security code.
- the server SW is for example a web server, walking or other type, able to manage the access of users to the web server S in question.
- the service S can be any.
- the service S is a marching service.
- the access server SW is able to cooperate with a directory server 3DS SDIR to trigger if possible authentication according to the 3DS protocol of the user during a transaction. To do this, the access server SW is able to transmit, to the directory server 3DS SDIR, the transaction data DT to request authentication of the current transaction.
- the access control server ACS is able, from the transaction data DT received, to determine whether a 3DS authentication of the transaction must be performed.
- the ACS control server determines whether this 3DS authentication must be performed from the transaction data DT transmitted by the directory server 3DS SDIR.
- the ACS server is configured to detect that no 3DS authentication must be performed if the security code CSC included in the transaction data DT is of the DCVV type.
- the ACS server is further configured to cooperate with the verification server SV to check the validity of the DCVV type CSC security code. If the authentication of the security code CSC is positive, the server ACS then sends to the access server SW, via the directory server 3DS SDIR, a message of positive authentication of the transaction data DT. According to a particular example, this positive authentication message further indicates to the access server SW that no 3DS authentication is performed, for example by means of a parameter provided for this purpose in said message.
- the ACS server is configured to detect that a 3DS authentication must be performed in association with the received transaction data DT.
- the ACS access control server then performs the 3DS authentication according to the 3DS protocol well known to those skilled in the art.
- FIG. 2 schematically shows the structure of the access server S according to a particular embodiment of the invention.
- the access server SW comprises a processor 10, a non-volatile memory MR1 and a communication interface INT1.
- the memory M RI is a rewritable non-volatile memory or a read only memory (ROM), this memory constituting a recording medium (or information carrier) according to a particular embodiment, readable by the access server SW, and on which is recorded a computer program PG1 according to a particular embodiment.
- This computer program PG1 includes instructions for carrying out the steps of a control method according to a particular embodiment.
- the processor 10 controlled by the computer program PG1 here implements a number of modules shown in FIG. 3, namely: a reception module M2, a transmission module M4 and a determination module M6.
- the reception module M2 is able to receive the transaction data DT associated with the smart card C during a transaction with the access server SW.
- the transmission module M4 is able to transmit the transaction data DT to the directory server 3DS SDIR to request authentication of the transaction according to the 3DS protocol.
- the determination module M6 is able to determine, from a message received from the authentication server, that no authentication according to the 3DS protocol must be performed if the smart card is of the DCVV type.
- FIG. 4 diagrammatically represents the structure of the ACS access control server according to a particular embodiment of the invention.
- the server ACS comprises a processor 20, a nonvolatile memory MR2, a communication interface INT2 and a nonvolatile memory MR4 comprising a table TB.
- the memory MR2 is a rewritable non-volatile memory or a read only memory (ROM), this memory constituting a recording medium (or information carrier) according to a particular embodiment, readable by the ACS server, and on which is recorded a PG2 computer program according to a particular embodiment.
- This computer program PG2 includes instructions for performing the steps of an authentication method according to a particular embodiment.
- the table TB comprises at least one correspondence between a PAN identifier and a DN data, said DN data indicating whether the bank card C associated with said PAN is DCW type.
- the server ACS is able, from said data DN, to determine if the bank card C is of the DCVV type.
- the server ACS can thus determine, from the table TB, whether the security code CSC included in the transaction data DT is of type DCVV. It is assumed here that the table TB identifies, for example, DN data in association with three identifiers PAN1, PAN2 and PAN3.
- each data DN can take two distinct states indicating that the corresponding PAN identifier is respectively associated with a bank card type DCW and CW.
- the processor 20 controlled by the computer program PG2 here implements a number of modules shown in FIG. 5, namely: a reception module M20, a determination module M22, a detection module M24 and a module of verification M 26.
- the reception module M20 is able to receive, from the access server SW, an authentication request comprising transaction data DT associated with the smart card C.
- the determination module M22 is configured to determine whether the security code CSC included in the transaction data DT is of type DCVV. If the security code CSC is determined to be of type DCW:
- the detection module M24 is configured to detect that no 3DS authentication must be performed.
- the M26 verification module is configured to cooperate with the SV verification server to check the validity of the DCW security code.
- modules M2 to M6 illustrated in FIG. 3 and the modules M20 to M26 illustrated in FIG. 5 is only a non-limiting example of embodiment of the invention, other implementations being conceivable in the context of FIG. of the invention.
- the access server SW implements a control method by executing the computer program PG1, and the server ACS. hereby implements an authentication method by executing the computer program PG2.
- the transaction is a financial transaction, corresponding by example to a payment. It will be understood that other implementations are conceivable within the scope of the invention.
- the terminal T of the user sends the access server SW transaction data DT associated with the bank card C.
- the transaction data DT comprises the identifier PAN, the CSC access code and EXP expiration date of the card C.
- the user firstly enter all or part of the transaction data DT on his terminal T in response to an invitation from the services.
- the access server SW receives the transaction data DT during a reception step B2.
- the access server SW then sends (B4) the transaction data DT to the directory server 3DS SDIR in an authentication request RQ1.
- the authentication request RQ1 requires authentication according to the 3DS protocol.
- the directory server 3DS SDIR determines (C6), from all or part of the transaction data DT (for example from the identifier PAN), if it is authorized to perform a 3DS authentication for the current transaction.
- the SDIR server performs the C6 determination from a list of PAN identifiers excluded from the 3DS mechanism or from a list of PAN identifiers authorized to use the 3DS mechanism.
- the SDIR server may optionally send a 3DS authentication refusal message to the access server SW.
- the 3DS directory server SDIR determines (C10) that it is authorized to perform a 3DS authentication in association with the received transaction data DT, said SDIR server sends (C10) to the ACS server an authentication request RQ2 comprising the transaction data DT.
- the access control server ACS receives the transaction data DT included in the authentication request RQ2 during a reception step D10.
- the ACS server determines (DU), from the transaction data DT, whether the security code CSC is of DCW type. In a particular example, the ACS server determines (DU) whether the security code CSC is a DCW code from the identifier PAN included in the transaction data DT. According to one particular example, the server ACS uses the table TB to determine, from the identifier PAN, if the security code is of type DCW.
- the authentication method of the invention ends (D12).
- the ACS server can perform a 3DS authentication of the transaction (if this is possible), or send a refusal message of a 3DS transaction (if authentication according to the 3DS protocol is not possible ).
- the ACS server authorizes (D12) performing a 3DS authentication of said bank card.
- the user can receive via an SMS or email a secret code on a terminal (T or other), and be invited on his terminal T to enter this secret code to be authenticated by the ACS server.
- the 3DS protocol is well known to those skilled in the art, it will not be described in more detail in this presentation for the sake of simplicity. If, on the other hand, it is determined in DU that the security code CSC is of type DCW, the server ACS:
- the ACS server prevents the realization of a 3DS authentication of the bank card C.
- the ACS server is configured to block performing a 3DS authentication for the transaction being authenticated.
- the server ACS sends (D14) to the verification server SV, the transaction data DT comprising the security code CSC of the DCW type, the banking identifier PAN and the date EXP expiration.
- the verification server verifies (E16) the validity of the dynamic security code CSC.
- the verification server checks, for example, the validity of the dynamic security code CSC by generating a second DCW code and comparing it with the dynamic security code CSC received at E14.
- the verification server SV obtains this second DCW code by applying a cryptographic function to the identifier PAN, EXP expiration date and a time data.
- Other examples of verification of a DCW type dynamic security code are conceivable. Since the calculation and verification of the validity of a DCW security code are known per se, they will not be described in more detail in this disclosure.
- the verification server SV then sends (E18) the result of the verification E16 (here in a message M2) to the server ACS.
- the server ACS receives the result M2 of the validity check of the security code CSC during a reception step D20.
- the server ACS then sends (D22) to the directory server 3DS SDIR, a message M4 positive authentication of the transaction data DT if the verification E16 of validity of the security code CSC has been passed successfully.
- the server ACS sends (D22) a message M4 of negative authentication to the directory server 3DS SDIR.
- the message M4 specifies whether the security code DCW present in the transaction data DT has been verified or not successfully.
- the directory server 3DS SDIR transfers (C24) to the access server SW the message M4 indicating whether the authentication based on the dynamic security code CSC has been passed successfully.
- the access server SW determines (B26) whether the authentication of the transaction is successfully passed from the message M4 received prior to the reception step B24. It will be understood that the access server SW may be configured to perform any appropriate processing depending on the result of the authentication.
- the access server SW authorizes (B26) the current transaction with the user. In the opposite case, the access server SW refuses (B26) the transaction.
- the present invention is advantageous in that it makes it possible to dispense with the authentication mechanism according to the 3DS protocol when it is possible to authenticate the user of the transaction by verifying a dynamic security code DCW generated by the card. user's smart card (when said card is of DCW type).
- the authentication according to the 3DS protocol has certain disadvantages, in particular in that it can cause discomfort for some users sometimes leading to the abandonment of the current transaction.
- the invention makes it possible to inhibit the 3DS mechanism while maintaining a high level of security by verifying, where possible, a DCW code. Thanks to the invention, it is possible to facilitate the authentication of a user, and therefore access to a service.
- the verification server SV (or one of the server ACS, the directory server 3DS SDIR and the access server SW) sends (E18) in addition to an M6 message to the terminal T (or another terminal) of the user. From the received message M6 (A30), the user is then able to determine the result of the authentication of the security code CSC (DCW type) by the verification server SV.
- the security code CSC DCW type
- the ACS server includes in its positive authentication message M4 a parameter indicating to the access server SW that no authentication according to the 3DS protocol has been performed. From this parameter, the access server SW can thus deduce that the authentication mechanism 3DS has been blocked, but the authentication has nevertheless been successfully carried out thanks to a verification of a DCW security code.
- FIG. 8 differs from the previous embodiment in that it is this time the 3DS directory server SDIR which determines (C50), from the transaction data DT, whether the bank card C is of DCW type. and, if so, which detects (C51) that no authentication according to the 3DS protocol is to be performed and which then cooperates (C52) with the ACS server, or directly with the verification server SV, to check the validity of the CSC dynamic security code.
- the determination step C50 and the detection step C51 are carried out analogously to the respective steps D1 and D13 described above with reference to FIG. 7.
- the 3DS directory server SDIR sends (C52) to the verification server SV a verification request RQ10 comprising the transaction data DT.
- the 3DS directory server SDIR sends (C52) the verification request RQ10 to the server ACS which transmits (D52) it to the verification server SV.
- the verification server SV checks (E16) the validity of the dynamic security code CSC as already described with reference to FIG. 7.
- the verification server SV then sends a message M8 of positive or negative authentication (according to the result of E16) of the transaction data DT to the directory server 3DS SDIR, possibly via of the ACS server which transfers (D54) then said message.
- the 3DS directory server SDIR or the ACS server which determines, from the transaction data DT, whether the bank card C is DCW type and, if so, which detects that no authentication according to the 3DS protocol should be performed and which causes the verification of the validity of the CSC dynamic security code of the C card.
- the 3DS directory server SDIR and the server ACS can each constitute an authentication server within the meaning of the invention.
- the authentication server of the invention is configured, only if a parameter received from the access server SW with the transaction data DT is in a predefined state, to detect that no 3DS authentication shall only be performed when a security code included in the transaction data is of the DCVV type.
- the authentication server of the invention ie the 3DS directory server SDIR or the ACS server as the case may be
- the authentication server of the invention is able to determine whether it should implement the inhibition mechanism of the 3DS authentication mechanism according to the invention.
- the authentication server systematically attempts to trigger a 3DS authentication, and if said parameter is in a second predetermined state, the authentication server inhibits the 3DS mechanism if a authentication based on a DCW security code is possible.
- the authentication server of the invention determines, based on historical data (banking for example) recorded in association with the PAN identifier, if it must implement the inhibition mechanism of the 3DS authentication in accordance with the invention.
- the authentication server can thus judge, for the current transaction, a level of risk and deduce whether it is necessary to perform a 3DS authentication (possibly in addition to a verification of a security code DCW, according to the chosen configuration).
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1563034A FR3045877B1 (en) | 2015-12-22 | 2015-12-22 | AUTHENTICATION METHOD |
PCT/FR2016/053604 WO2017109405A1 (en) | 2015-12-22 | 2016-12-21 | Authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3394812A1 true EP3394812A1 (en) | 2018-10-31 |
Family
ID=56068985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16829414.8A Withdrawn EP3394812A1 (en) | 2015-12-22 | 2016-12-21 | Authentication method |
Country Status (5)
Country | Link |
---|---|
US (1) | US10909530B2 (en) |
EP (1) | EP3394812A1 (en) |
CN (1) | CN108701304B (en) |
FR (1) | FR3045877B1 (en) |
WO (1) | WO2017109405A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102017222434A1 (en) * | 2017-12-12 | 2019-06-13 | Audi Ag | Method for authenticating a motor vehicle |
US11704632B2 (en) | 2020-12-17 | 2023-07-18 | Marqeta, Inc. | Computer transaction security with delegated decisions |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7740168B2 (en) * | 2003-08-18 | 2010-06-22 | Visa U.S.A. Inc. | Method and system for generating a dynamic verification value |
US7761374B2 (en) * | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
US9251637B2 (en) * | 2006-11-15 | 2016-02-02 | Bank Of America Corporation | Method and apparatus for using at least a portion of a one-time password as a dynamic card verification value |
FR2914763B1 (en) * | 2007-04-06 | 2013-02-15 | Grp Des Cartes Bancaires | DYNAMIC CRYPTOGRAM |
US8359630B2 (en) * | 2007-08-20 | 2013-01-22 | Visa U.S.A. Inc. | Method and system for implementing a dynamic verification value |
US20100179909A1 (en) * | 2009-01-14 | 2010-07-15 | Jubin Dana | User defined udk |
US9105027B2 (en) * | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US10255601B2 (en) * | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
BR112014008941A2 (en) * | 2011-10-12 | 2017-05-02 | C-Sam Inc | platform that enables secure multilayer mobile transactions |
EP2997532A4 (en) * | 2013-05-15 | 2016-05-11 | Visa Int Service Ass | Mobile tokenization hub |
WO2015013522A1 (en) * | 2013-07-24 | 2015-01-29 | Visa International Service Association | Systems and methods for communicating risk using token assurance data |
US10496986B2 (en) * | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
US10223694B2 (en) * | 2013-09-10 | 2019-03-05 | Visa International Service Association | Mobile payment application provisioning and personalization on a mobile device |
US20150161612A1 (en) * | 2013-12-05 | 2015-06-11 | Mastercard International Incorporated | Method and system for network based dynamic cvc authentication |
US20150371234A1 (en) * | 2014-02-21 | 2015-12-24 | Looppay, Inc. | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data |
US10102529B2 (en) * | 2014-03-05 | 2018-10-16 | Mastercard International Incorporated | Method and system for secure consumer identification |
SG11201609220YA (en) * | 2014-05-07 | 2016-12-29 | Visa Int Service Ass | Enhanced data interface for contactless communications |
US10360558B2 (en) * | 2015-03-17 | 2019-07-23 | Ca, Inc. | Simplified two factor authentication for mobile payments |
EP3073429A1 (en) * | 2015-03-26 | 2016-09-28 | Gemalto Sa | A method to validate a dynamic security code in a payment transaction |
-
2015
- 2015-12-22 FR FR1563034A patent/FR3045877B1/en active Active
-
2016
- 2016-12-21 WO PCT/FR2016/053604 patent/WO2017109405A1/en active Application Filing
- 2016-12-21 US US16/064,940 patent/US10909530B2/en active Active
- 2016-12-21 EP EP16829414.8A patent/EP3394812A1/en not_active Withdrawn
- 2016-12-21 CN CN201680081572.4A patent/CN108701304B/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10909530B2 (en) | 2021-02-02 |
CN108701304B (en) | 2021-09-03 |
CN108701304A (en) | 2018-10-23 |
FR3045877A1 (en) | 2017-06-23 |
US20190005490A1 (en) | 2019-01-03 |
WO2017109405A1 (en) | 2017-06-29 |
FR3045877B1 (en) | 2018-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3113099B1 (en) | Payment container, creation method, processing method, devices and programs therefor | |
EP3455812B1 (en) | Method for securing an electronic device, and corresponding electronic device | |
EP3446436B1 (en) | Method for obtaining a security token by a mobile terminal | |
EP3189485A1 (en) | Electronic ticket management | |
WO2020064890A1 (en) | Method for processing a transaction, device, system and corresponding program | |
EP3465584A1 (en) | Method for securing an electronic device and corresponding electronic device | |
WO2001086601A1 (en) | Method for authenticating a portable object, corresponding portable object, and apparatus therefor | |
WO2017109405A1 (en) | Authentication method | |
EP3234848B1 (en) | Method of dispatching an item of security information and electronic device able to implement such a method | |
EP3588418A1 (en) | Method for conducting a transaction, terminal, server and corresponding computer program | |
WO2020128240A1 (en) | Processing of an electronic ticket service | |
FR3061586A1 (en) | METHOD FOR CONTROLLING USE HABITS AND ELECTRONIC DEVICE CAPABLE OF IMPLEMENTING SUCH A METHOD | |
FR3052895A1 (en) | METHOD FOR SENDING SECURITY INFORMATION | |
EP3395042B1 (en) | Authentication server for controlling access to a service | |
EP3570238B1 (en) | Method for conducting a transaction, terminal, server and corresponding computer program | |
WO2008053095A1 (en) | Portable electronic entity and method for remotely blocking a functionality of said portable electronic entity | |
FR3055761A1 (en) | METHOD FOR CONTROLLING AN ELECTRONIC DEVICE AND CORRESPONDING ELECTRONIC DEVICE | |
WO2017005644A1 (en) | Method and system for controlling access to a service via a mobile media without a trusted intermediary | |
WO2018011514A1 (en) | Method for controlling an electronic device for processing a transaction | |
EP3912065A1 (en) | Authorization for the loading of an application onto a security element | |
FR3076027A1 (en) | SECURING THE PROCESSING OF A TRANSACTION | |
FR2857135A1 (en) | Electronic payment system, has chip card readers for transferring electronic currency from chip card transmitter towards chip card receiver based on predetermined distribution rule that is stored in storing unit | |
FR2998398A1 (en) | Method for activating on-line payment service from e.g. near field communication integrated tablet personal computer, involves starting subscription process by administration server from unique identifier if checking of sign is positive |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20180618 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20200318 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20230301 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20230712 |