[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO1999056520A2 - A method of storing and retrieving personal codes - Google Patents

A method of storing and retrieving personal codes Download PDF

Info

Publication number
WO1999056520A2
WO1999056520A2 PCT/SE1999/000656 SE9900656W WO9956520A2 WO 1999056520 A2 WO1999056520 A2 WO 1999056520A2 SE 9900656 W SE9900656 W SE 9900656W WO 9956520 A2 WO9956520 A2 WO 9956520A2
Authority
WO
WIPO (PCT)
Prior art keywords
codes
computer
database
personal
person
Prior art date
Application number
PCT/SE1999/000656
Other languages
French (fr)
Other versions
WO1999056520A3 (en
Inventor
Johan Sarskog
Original Assignee
House Of Added Value Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by House Of Added Value Ab filed Critical House Of Added Value Ab
Priority to EP99948537A priority Critical patent/EP1073961A2/en
Priority to AU43001/99A priority patent/AU4300199A/en
Publication of WO1999056520A2 publication Critical patent/WO1999056520A2/en
Publication of WO1999056520A3 publication Critical patent/WO1999056520A3/en
Priority to NO20005192A priority patent/NO20005192L/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components

Definitions

  • the present invention relates to a method of storing and retrieving personal codes, such as door codes, automatic teller codes, bank account numbers, etc..
  • a serious problem in modern-day society is that a large number of people must be able to remember a large number of codes in order to be able to use a large number of different services, such as cash card and switch card services, automatic teller services, etc.. It is also necessary to be able to memorise other codes, such as door opening codes, computer passwords and so on. Many people also require access to bank account numbers, cash card numbers, insurance numbers, etc., in order to be able to block an account or to carry out different transactions.
  • the present invention thus relates to a method of storing and retrieving personal codes, such as door codes, cash card codes, bank account numbers, and so on, and is characterised by using a central computer with an associated database in which one or more personal codes can be inserted and stored together with a unique code belonging to a specific person, by retrieving one or more personal codes from the database by entering the unique code of said specific person into said computer, wherewith the computer is caused to open the database with respect to the personal codes belonging to said specific person, and causing the computer to transfer one or more requested codes .
  • personal codes such as door codes, cash card codes, bank account numbers, and so on
  • the present invention is not restricted to the storage and retrieval of personal codes, such as door codes, automatic teller or cashpoint codes, bank account numbers, etc., but can be applied in respect of all manner of sensitive information.
  • the data concerned may relate to telephone numbers, dates at which different events take place, etc.
  • central computer 1 and associated database 2 in which one or more personal codes are. entered and stored together with a code which is unique to a specific person.
  • the codes can be entered into the database 2 via the computer 1, in different ways.
  • a first way is via a PC 2 , in which the person concerned connects the PC to the computer 1 and transfers thereto information which is stored in the computer memory 2.
  • a second way is one where the person concerned fills in a form 4 and sends the form to the database operator. The operator then enters the information shown on the form 4.
  • a third way is to insert information by means of an SMS-message via a mobile telephone 5, by connecting the mobile telephone to the computer 1 via a telephone network.
  • a mailbox which is personal to the person concerned.
  • the address of the mailbox in the database may be the identification number of said person or some corresponding person specific number.
  • the mailbox is, in fact, a data file.
  • the computer In establishing a mailbox, i.e. subsequent to a person signing a subscription for an existing service, the computer is caused to generate a personal identification number, a PIN code or the like, which is sent to the person concerned in a manner corresponding to the manner in which PIN codes are generated in respect, of switch cards, cash cards and the like.
  • the PIN code is stored in the database 2 and coupled to the personal identification number. It will preferably not be possible to extract the PIN code from the system without first going through special procedures.
  • data is entered into the database in the following way:
  • the person concerned connects his/her mobile telephone to the operator of the database 2.
  • the person then enters a number of data items, where each item relates to a code.
  • Personal number, item and code are suitably entered in sequence and the input transaction terminated with a character input, such as a # sign on the telephone.
  • the next data item is then entered in the same way, and so on.
  • the items can be likened to positions for so-called card numbers on a telephone.
  • the information is stored together with the PIN-code.
  • one or more personal codes is/are retrieved from the database, by causing the unique code of the specific person concerned to be entered into the computer, wherewith the computer is caused to open the database with regard to the personal codes belonging to said specific person, and the computer therewith caused to transmit one or more requested codes.
  • the person fetches information relating to a code
  • he/she connects his/her mobile telephone for instance to the computer 1, via a telephone network, and then enters his/her personal identification number followed by the PIN-code.
  • the computer checks that the personal number belongs together with the entered PIN code.
  • the computer opens the mailbox belonging to said person in the database.
  • the person concerned could retrieve the code requested.
  • One method is for the computer to inform the person that access to the mailbox has been granted, for instance by a voice message or by a telephone display message, whereafter the person is asked to enter the number of the data item under which the code is stored. For instance, the person may wish to know the automatic teller code. The person will then press digit 1 on the telephone, followed for instance by the character * on the telephone.
  • the computer therewith reads data record number 1 in the mailbox having number 600101-0034 and sends the information under this entry to the telephone, i.e. "5334", either in the form of a voice message or by printing 5334 on the telephone display.
  • the person can scan or scroll between different items, by pressing down keys on his/her telephone, i.e. in the same way as it is possible to skim through different card numbers on a mobile telephone and have these numbers shown on the display.
  • the computer it is appropriate for the computer to send certain text, which discloses the code concerned, to the telephone, said text being shown on the telephone display.
  • the database 2 person specific data which is solely in the form of said personal number or corresponding information.
  • the PIN code is thus not entered in this case, but is generated by the database.
  • the PIN code cannot be read from the system without following special routines, as before mentioned. This means that no one is able to read both personal number and PIN code from the database in order to open the mailbox of a given person without being authorised to do so, and therewith obtain access to the personal codes.
  • a second computer 6 and associated database 7 in which person specific data, such as name, address and personal number is stored, although not the entire person specific code and at least not the secret part of the person specific code, wherewith said second database 7 is separate from the first- mentioned computer 1 and associated database 2.
  • the second computer 6 and associated database 7 are used to keep a register of those who subscribe to existing services and to bill the subscribers by writing out invoices on a writer 8 and dispatching the invoices.
  • the second computer 6 is also adapted to send intermittently to the first computer records that include the current subscribers that can thus utilise the service provided by the first computer 1 and its associated database 2.
  • information concerning the name, address, etc., of the subscriber is stored in a database 7, while information concerning the subscriber's person specific code is stored in the first database 2. This makes unlawful entry still more difficult to achieve.
  • the first computer 1 and its database 2 will preferably be managed by a well-established security company, whereas the second computer 6 and its database 7 can be managed by an administrative company without the same high security requirement .
  • Each of the two aforesaid companies may have a respective secret key which must be used together in the first computer 1 in order to obtain access thereto, such as to enable a person who has forgotten his/her PIN code or who finds it necessary for other reasons to go into the first database 2 and therewith obtain his/her personal number and associated PIN code to do so.
  • the mailbox is coupled to a certain mobile telephone subscription such that the mobile telephone number will be included as part of the personal code.
  • the mobile telephone is coupled to the first-mentioned computer 1, whereafter the person concerned enters his/her unique code.
  • the computer 1 is herewith caused to sense the calling telephone number and compare this number with the unique code belonging to said specific person so as to verify access to the stored codes of the person concerned.
  • SIM card or the like mounted in a mobile telephone.
  • the way in which information is fed into and out of the database 2 can be varied to suit different, desired procedures.
  • the method in which data is stored in the database can also be varied.
  • personal code also includes numbers, and text parts other than codes in the true meaning of the word. For instance, important data or important addresses, etc., can be entered in the form of a personal code in the present meaning .

Landscapes

  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method of storing and retrieving personal codes, such as door codes, codes relating to automatic cash dispensers/automatic teller machines, bank account numbers, etc. The invention is characterised by entering and storing one or more personal codes in the database (2) of a central computer (1) together with a unique code belonging to a specific person; causing one or more personal codes to be retrieved from the database (2) by causing the unique code belonging to said specific person to be entered into said computer (1), wherewith the computer is caused to open the database (2) with respect to the personal codes belonging to said specific person; and therewith causing the computer (1) to send one or more requested codes.

Description

A METHOD OF STORING AND RETRIEVING PERSONAL CODES
The present invention relates to a method of storing and retrieving personal codes, such as door codes, automatic teller codes, bank account numbers, etc..
A serious problem in modern-day society is that a large number of people must be able to remember a large number of codes in order to be able to use a large number of different services, such as cash card and switch card services, automatic teller services, etc.. It is also necessary to be able to memorise other codes, such as door opening codes, computer passwords and so on. Many people also require access to bank account numbers, cash card numbers, insurance numbers, etc., in order to be able to block an account or to carry out different transactions.
The large number of codes and numbers that must be memorised by an individual may often lead to the person concerned recording the codes and numbers in a manner that provides easy access to such data when the data shall be used. However, the level of security with respect to said individual, or person, is greatly reduced when the codes and numbers are recorded, e.g., on a piece of paper kept in a wallet or diary, since misuse of a switch card or cash withdrawal card or the like will be relatively easy if a wallet or a handbag is stolen, for instance.
This problem is resolved by the present invention.
The present invention thus relates to a method of storing and retrieving personal codes, such as door codes, cash card codes, bank account numbers, and so on, and is characterised by using a central computer with an associated database in which one or more personal codes can be inserted and stored together with a unique code belonging to a specific person, by retrieving one or more personal codes from the database by entering the unique code of said specific person into said computer, wherewith the computer is caused to open the database with respect to the personal codes belonging to said specific person, and causing the computer to transfer one or more requested codes .
The invention will now be described in more detail partly with reference to an exemplifying embodiment of the invention shown in the accompanying drawing, in which Figure 1 is a block schematic.
The present invention is not restricted to the storage and retrieval of personal codes, such as door codes, automatic teller or cashpoint codes, bank account numbers, etc., but can be applied in respect of all manner of sensitive information. For instance, the data concerned may relate to telephone numbers, dates at which different events take place, etc.
There is used in accordance with the invention a central computer 1 and associated database 2 in which one or more personal codes are. entered and stored together with a code which is unique to a specific person.
In the following description of the invention, there is given, by way of example, the storage of four personal codes, namely an automatic cash dispenser or teller code, a door code, a bank account number and a car registration number.
The codes can be entered into the database 2 via the computer 1, in different ways. A first way is via a PC 2 , in which the person concerned connects the PC to the computer 1 and transfers thereto information which is stored in the computer memory 2. A second way is one where the person concerned fills in a form 4 and sends the form to the database operator. The operator then enters the information shown on the form 4. A third way is to insert information by means of an SMS-message via a mobile telephone 5, by connecting the mobile telephone to the computer 1 via a telephone network.
Preferably, there is opened in the database 2 of the operator a mailbox which is personal to the person concerned. For instance, the address of the mailbox in the database may be the identification number of said person or some corresponding person specific number. The mailbox is, in fact, a data file. In establishing a mailbox, i.e. subsequent to a person signing a subscription for an existing service, the computer is caused to generate a personal identification number, a PIN code or the like, which is sent to the person concerned in a manner corresponding to the manner in which PIN codes are generated in respect, of switch cards, cash cards and the like. The PIN code is stored in the database 2 and coupled to the personal identification number. It will preferably not be possible to extract the PIN code from the system without first going through special procedures.
For example, data is entered into the database in the following way:
The person concerned connects his/her mobile telephone to the operator of the database 2. The person then enters a number of data items, where each item relates to a code. Personal number, item and code are suitably entered in sequence and the input transaction terminated with a character input, such as a # sign on the telephone. The next data item is then entered in the same way, and so on. The items can be likened to positions for so-called card numbers on a telephone.
When acting in the aforedescribed manner, the following exemplifying information will be stored in the database, i.e. personal number, data item and code together with any text associated with the code in sequence:
600101- -0034 1 5334 (AUTOMATIC TELLER MACHINE)
660000110011-- -00003344 22 9556 (DOOR)
600101- -0034 2 1111 34 165 65 (BANK)
600101- -0034 4 MER 777 (CAR)
As before mentioned, the information is stored together with the PIN-code.
In accordance with the invention, one or more personal codes is/are retrieved from the database, by causing the unique code of the specific person concerned to be entered into the computer, wherewith the computer is caused to open the database with regard to the personal codes belonging to said specific person, and the computer therewith caused to transmit one or more requested codes.
When the person fetches information relating to a code, he/she connects his/her mobile telephone for instance to the computer 1, via a telephone network, and then enters his/her personal identification number followed by the PIN-code. The computer checks that the personal number belongs together with the entered PIN code. When the personal number and the
PIN code are found to belong together, the computer opens the mailbox belonging to said person in the database. There are a number of conceivable ways in which the person concerned could retrieve the code requested. One method is for the computer to inform the person that access to the mailbox has been granted, for instance by a voice message or by a telephone display message, whereafter the person is asked to enter the number of the data item under which the code is stored. For instance, the person may wish to know the automatic teller code. The person will then press digit 1 on the telephone, followed for instance by the character * on the telephone. The computer therewith reads data record number 1 in the mailbox having number 600101-0034 and sends the information under this entry to the telephone, i.e. "5334", either in the form of a voice message or by printing 5334 on the telephone display.
It will be obvious that the degree and type of interactivity between the person and the computer may be varied greatly.
Instead of the person being asked to enter the number of the data item under which the code is stored, the person can scan or scroll between different items, by pressing down keys on his/her telephone, i.e. in the same way as it is possible to skim through different card numbers on a mobile telephone and have these numbers shown on the display. In this regard, it is appropriate for the computer to send certain text, which discloses the code concerned, to the telephone, said text being shown on the telephone display.
When the person has received his/her personal code, he/she will switch-off the telephone and therewith release the connection, therewith making it necessary for the person to reopen his/her mailbox by entering his/her personal number and PIN code . It will be understood that the above exemplified procedure carried out with a mobile telephone can also be carried out with a computer and its computer screen.
According to one highly preferred embodiment, there is entered into the database 2 person specific data which is solely in the form of said personal number or corresponding information. The PIN code is thus not entered in this case, but is generated by the database.
In this regard, it is preferred that the PIN code cannot be read from the system without following special routines, as before mentioned. This means that no one is able to read both personal number and PIN code from the database in order to open the mailbox of a given person without being authorised to do so, and therewith obtain access to the personal codes.
In a further embodiment of the invention, there is used a second computer 6 and associated database 7 in which person specific data, such as name, address and personal number is stored, although not the entire person specific code and at least not the secret part of the person specific code, wherewith said second database 7 is separate from the first- mentioned computer 1 and associated database 2.
In this embodiment of the invention, the second computer 6 and associated database 7 are used to keep a register of those who subscribe to existing services and to bill the subscribers by writing out invoices on a writer 8 and dispatching the invoices. The second computer 6 is also adapted to send intermittently to the first computer records that include the current subscribers that can thus utilise the service provided by the first computer 1 and its associated database 2. In this embodiment information concerning the name, address, etc., of the subscriber is stored in a database 7, while information concerning the subscriber's person specific code is stored in the first database 2. This makes unlawful entry still more difficult to achieve.
The first computer 1 and its database 2 will preferably be managed by a well-established security company, whereas the second computer 6 and its database 7 can be managed by an administrative company without the same high security requirement .
Each of the two aforesaid companies may have a respective secret key which must be used together in the first computer 1 in order to obtain access thereto, such as to enable a person who has forgotten his/her PIN code or who finds it necessary for other reasons to go into the first database 2 and therewith obtain his/her personal number and associated PIN code to do so.
In one particular embodiment, the mailbox is coupled to a certain mobile telephone subscription such that the mobile telephone number will be included as part of the personal code. In this embodiment, the mobile telephone is coupled to the first-mentioned computer 1, whereafter the person concerned enters his/her unique code. The computer 1 is herewith caused to sense the calling telephone number and compare this number with the unique code belonging to said specific person so as to verify access to the stored codes of the person concerned. This means that the personal codes can only be reached via a certain so called SIM card or the like mounted in a mobile telephone. Although the invention has been described above with reference to a number of exemplifying embodiments thereof it will be understood that modifications and variations can be made. For instance, the way in which information is fed into and out of the database 2 can be varied to suit different, desired procedures. The method in which data is stored in the database can also be varied. The term "personal code" also includes numbers, and text parts other than codes in the true meaning of the word. For instance, important data or important addresses, etc., can be entered in the form of a personal code in the present meaning .
The present invention shall not therefore be considered to be restricted to the aforedescribed embodiments thereof, since variations can be made within the scope of the following Claims .

Claims

1. A method of storing and retrieving personal codes, such as door codes, codes relating to automatic cash dispensers/automatic teller machines, bank account numbers, etc., characterised by entering and storing one or more personal codes in the database (2) of a central computer (1) together with a unique code belonging to a specific person; causing one or more personal codes to be retrieved from the database (2) by causing the unique code belonging to said specific person to be entered into said computer (1) , wherewith the computer is caused to open the database (2) with respect to the personal codes belonging to said specific person; and therewith causing the computer (1) to send one or more requested codes.
2. A method according to Claim 1, characterised in that the unique code includes an open part, such as the personal number of the person, and a secret part, such as a PIN code.
3. A method according to Claim 1 or 2 , characterised by causing person specific data to be entered into said database (2) solely in the form of said personal number or the like.
4. A method according to Claim 2 or 3 , characterised by causing person specific data, such as name, address and personal number, but not the secret code, to be stored in the database (7) of a second computer (6) , said second database
(7) being separate from the first computer (1) and its associated database (2) .
5. A method according to Claim 1, 2, 3 or 4, characterised by causing a mobile telephone (5) to be coupled to said first mentioned computer (1) ; and by causing the computer (1) to sense a calling telephone number and to compare this number with the unique code belonging to said specific person, in order to verify right of access to the stored codes belonging to the person concerned.
6. A method according to Claim 1, 2, 3, 4 or 5, characterised by causing each personal code to be stored as a data item.
PCT/SE1999/000656 1998-04-23 1999-04-22 A method of storing and retrieving personal codes WO1999056520A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP99948537A EP1073961A2 (en) 1998-04-23 1999-04-22 A method of storing and retrieving personal codes
AU43001/99A AU4300199A (en) 1998-04-23 1999-04-22 A method of storing and retrieving personal codes
NO20005192A NO20005192L (en) 1998-04-23 2000-10-16 Procedure for storing and retrieving personal codes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9801441-8 1998-04-23
SE9801441A SE512671C3 (en) 1998-04-23 1998-04-23 Proceed to store and retrieve personal codes

Publications (2)

Publication Number Publication Date
WO1999056520A2 true WO1999056520A2 (en) 1999-11-11
WO1999056520A3 WO1999056520A3 (en) 1999-12-16

Family

ID=20411076

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1999/000656 WO1999056520A2 (en) 1998-04-23 1999-04-22 A method of storing and retrieving personal codes

Country Status (5)

Country Link
EP (1) EP1073961A2 (en)
AU (1) AU4300199A (en)
NO (1) NO20005192L (en)
SE (1) SE512671C3 (en)
WO (1) WO1999056520A2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000074003A2 (en) * 1999-05-27 2000-12-07 Giesecke & Devrient Gmbh Method and device for saving and retrieving pin codes
EP1111556A2 (en) * 1999-12-20 2001-06-27 Iwaki Electronics Co., Ltd. Encryption display card
WO2001057469A2 (en) * 2000-02-03 2001-08-09 Tele Atlas N.V. System for securing data on a data carrier
WO2001057814A1 (en) * 2000-02-07 2001-08-09 Aztak Technology Corporation Password storage apparatus and method
WO2002021764A1 (en) 2000-09-05 2002-03-14 Smarttrust Systems Oy Method for transmitting, storing and accessing a secret
WO2002089400A1 (en) * 2001-04-26 2002-11-07 Nokia Corporation Method and device for authenticating a user on a remote server
DE10123384A1 (en) * 2001-05-14 2002-11-21 Giesecke & Devrient Gmbh Transmitting transaction data relating to paying cash in or out involves transmitting data from cash machine to device for processing data over mobile radio telephone connection
US7240363B1 (en) * 1999-10-06 2007-07-03 Ellingson Robert E System and method for thwarting identity theft and other identity misrepresentations

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995019593A1 (en) * 1994-01-14 1995-07-20 Michael Jeremy Kew A computer security system
WO1996000485A2 (en) * 1994-06-24 1996-01-04 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
WO1997031306A1 (en) * 1996-02-23 1997-08-28 Nokia Mobile Phones Ltd. Method for obtaining at least one item of user authentication data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995019593A1 (en) * 1994-01-14 1995-07-20 Michael Jeremy Kew A computer security system
WO1996000485A2 (en) * 1994-06-24 1996-01-04 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
WO1997031306A1 (en) * 1996-02-23 1997-08-28 Nokia Mobile Phones Ltd. Method for obtaining at least one item of user authentication data

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000074003A3 (en) * 1999-05-27 2001-06-28 Giesecke & Devrient Gmbh Method and device for saving and retrieving pin codes
WO2000074003A2 (en) * 1999-05-27 2000-12-07 Giesecke & Devrient Gmbh Method and device for saving and retrieving pin codes
US7080781B1 (en) 1999-05-27 2006-07-25 Giesecke & Devrient Gmbh Method and device for saving and retrieving pin codes
US7240363B1 (en) * 1999-10-06 2007-07-03 Ellingson Robert E System and method for thwarting identity theft and other identity misrepresentations
EP1111556A3 (en) * 1999-12-20 2004-03-10 Iwaki Electronics Co., Ltd. Encryption display card
EP1111556A2 (en) * 1999-12-20 2001-06-27 Iwaki Electronics Co., Ltd. Encryption display card
WO2001057469A2 (en) * 2000-02-03 2001-08-09 Tele Atlas N.V. System for securing data on a data carrier
US6883052B2 (en) 2000-02-03 2005-04-19 Tele Atlas N.V. System for securing data on a data carrier
WO2001057469A3 (en) * 2000-02-03 2002-02-14 Tele Atlas Bv System for securing data on a data carrier
WO2001057814A1 (en) * 2000-02-07 2001-08-09 Aztak Technology Corporation Password storage apparatus and method
WO2002021764A1 (en) 2000-09-05 2002-03-14 Smarttrust Systems Oy Method for transmitting, storing and accessing a secret
WO2002089400A1 (en) * 2001-04-26 2002-11-07 Nokia Corporation Method and device for authenticating a user on a remote server
US7502931B2 (en) 2001-04-26 2009-03-10 Nokia Corporation Method and device for authenticating a user on a remote server
DE10123384A1 (en) * 2001-05-14 2002-11-21 Giesecke & Devrient Gmbh Transmitting transaction data relating to paying cash in or out involves transmitting data from cash machine to device for processing data over mobile radio telephone connection

Also Published As

Publication number Publication date
AU4300199A (en) 1999-11-23
WO1999056520A3 (en) 1999-12-16
NO20005192D0 (en) 2000-10-16
NO20005192L (en) 2000-12-22
SE512671C2 (en) 2000-04-17
SE9801441D0 (en) 1998-04-23
SE512671C3 (en) 2000-05-15
SE9801441L (en) 1999-10-24
EP1073961A2 (en) 2001-02-07

Similar Documents

Publication Publication Date Title
US7010701B1 (en) Network arrangement for smart card applications
US4707592A (en) Personal universal identity card system for failsafe interactive financial transactions
AU2007217172B2 (en) Pin servicing
US5513272A (en) System for verifying use of a credit/identification card including recording of physical attributes of unauthorized users
EP0219880B1 (en) Data processing terminal device
EP0962071B1 (en) Method for authorization check
US20060261152A1 (en) Banking computer account system with lock for secure payment via telephone
US20100325046A1 (en) Transaction Security Method and Apparatus
US20070187482A1 (en) Point of Sale Transaction Method and System
WO1999064999A2 (en) Secure check processing system and method
JP2001028038A (en) Method for simplifying use of plural cards
JPH09330458A (en) Locker system
EP1073961A2 (en) A method of storing and retrieving personal codes
GB2273629A (en) Method for visual authentication by images transmitted over a telecommunication system
JP4890774B2 (en) Financial transaction system
JP2003085483A (en) Card issuing system
US6983485B1 (en) Method and apparatus for authentication for a multiplicity of services
WO2001041026A1 (en) Method and system for point of transaction credit card access validation
CN1952987A (en) Automatic transaction device
JP2002041813A (en) Personal identification system
KR20000024353A (en) Method and process for unifying the use of multiple subscriber cards or identification tools
JP3010152B2 (en) Communication fraud interception prevention system
JP2006031444A (en) Unfair transaction prevention system
JPH045227B2 (en)
WO2001099069A2 (en) An account

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A3

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SL SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 1999948537

Country of ref document: EP

NENP Non-entry into the national phase in:

Ref country code: KR

WWP Wipo information: published in national office

Ref document number: 1999948537

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 09673802

Country of ref document: US

WWW Wipo information: withdrawn in national office

Ref document number: 1999948537

Country of ref document: EP