METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION
First Claim
Patent Images
1. A method for generating a code (108), characterized in that it comprises the steps of:
- a.—
providing a first character string (101) of W characters,b.—
encrypting (110) the first character string (101) by means of an encrypting method, obtaining an encrypted string (102),c.—
encoding (111) the first encrypted string (102) by means of an encoding method, obtaining an encrypted and encoded string of Y characters (103),d.—
splitting (112) the string of Y characters (103) into;
a public string of M characters (104), anda private string of Y-M characters (105),e.—
concatenating (113) at least;
the public string of M characters (104), andadditional information (106),obtaining a second character string (107),f.—
encoding (114) the second character string (107) with an encoding method, obtaining the code (108).
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an authorization code according to an encoding method is involved in the authorization. The operations can be transactions, access to a web page, user-to-user payments, user-to-business payments, online user-to-business payments, cash withdrawal in automated teller machines, etc.
23 Citations
20 Claims
-
1. A method for generating a code (108), characterized in that it comprises the steps of:
-
a.—
providing a first character string (101) of W characters,b.—
encrypting (110) the first character string (101) by means of an encrypting method, obtaining an encrypted string (102),c.—
encoding (111) the first encrypted string (102) by means of an encoding method, obtaining an encrypted and encoded string of Y characters (103),d.—
splitting (112) the string of Y characters (103) into;a public string of M characters (104), and a private string of Y-M characters (105), e.—
concatenating (113) at least;the public string of M characters (104), and additional information (106), obtaining a second character string (107), f.—
encoding (114) the second character string (107) with an encoding method, obtaining the code (108). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification