Method for verifying the identity of a user of a communicating terminal and associated system
First Claim
1. A method for verifying identity of a user of a communicating terminal, the method comprising:
- performing a preliminary operation, and thereafter, performing a current operation,wherein the preliminary operation comprises;
communicating, via a reader, a first piece of identity data of the user to at least one server;
generating at the server a second piece of identity data of the user, the second piece of identity data being derived, at least in part, from the first piece of identity data;
transmitting the second piece of data from the server to the reader, and then from the reader to the terminal; and
storing the second piece of identity data in a secure memory of the terminal; and
wherein the current operation for identity verification comprises;
transmitting a token for encryption, from the server to the terminal without transiting through the reader;
using the second piece of data at the terminal at least to generate an encryption of the token, the encrypted token being transmitted to the server and verified by the server without transiting through the reader; and
in a case of positive verification of the encrypted token by the server, validating, by the server, the identity verification of the user of the terminal,and wherein said reader, said server and said terminal are distinct.
9 Assignments
0 Petitions
Accused Products
Abstract
A method for verifying identity of a user of a communicating terminal, including: a preliminary operation including: communicating a first piece of identity data of a user to at least one server, generating a second piece of identity data of the user from the server, the second piece of data defining a derived identity of the user, and storing the second piece of identity data in a secure memory of the terminal; an operation for identity verification, including: transmitting a token for encryption from the server to the terminal, using the second piece of data at the terminal at least to generate an encryption of the token, the encrypted token being transmitted to the server and verified by the server, and in a case of positive verification of the encrypted token by the server, the server validates the identity verification of the user of the terminal.
-
Citations
13 Claims
-
1. A method for verifying identity of a user of a communicating terminal, the method comprising:
-
performing a preliminary operation, and thereafter, performing a current operation, wherein the preliminary operation comprises; communicating, via a reader, a first piece of identity data of the user to at least one server; generating at the server a second piece of identity data of the user, the second piece of identity data being derived, at least in part, from the first piece of identity data; transmitting the second piece of data from the server to the reader, and then from the reader to the terminal; and storing the second piece of identity data in a secure memory of the terminal; and wherein the current operation for identity verification comprises; transmitting a token for encryption, from the server to the terminal without transiting through the reader; using the second piece of data at the terminal at least to generate an encryption of the token, the encrypted token being transmitted to the server and verified by the server without transiting through the reader; and in a case of positive verification of the encrypted token by the server, validating, by the server, the identity verification of the user of the terminal, and wherein said reader, said server and said terminal are distinct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for verifying the identity of a user, the system comprising:
-
a terminal; a reader; and a server, wherein the reader comprises a first communication module configured to communicate a first piece of identity data of the user to a second communication module of the server, wherein the server is configured to generate a second piece of identity data of the user, the second piece of identity data being derived, at least in part, from the first piece of identity data, and is configured to transmit the second piece of data to the reader, wherein the terminal comprises a third communication module configured to receive the second piece of data from the reader, wherein the terminal comprises a secure memory that stores the second piece of identity data, and wherein the second communication module is configured to transmit a token for encryption to the third communication module of the terminal without transiting through the reader, wherein the terminal is configured to use the second piece of data at least to generate an encryption of the token, wherein the third communication module is configured to transmit the encrypted token to the second communication module of the server without transiting through the reader, wherein the server is configured to verify the encrypted token and validate, in case of positive verification of the encrypted token, the identity verification of the user of the terminal; wherein said reader, said server and said terminal are distinct.
-
Specification