摘要 |
<p>#CMT# #/CMT# The method has a request (5) for a user identification authorization provided by the user (1) transmitted to an identification module (2) via a short message service, with generation of an action code (6) by the identification module, transmitted to both the user and a third party terminal (3), e.g. a supermarket, an entrance lock, a bank, or an election authority. #CMT# : #/CMT# Also included are Independent claims for the following: (a) an application of a terminal user identification authorization method for E-banking; (b) a polling method using terminal user identification authorization; (c) a polling system using mobile terminal user identification authorization; (d) a mobile terminal allowing user identification authorization; (e) an identification module for mobile terminal user identification authorization; (f) a polling terminal; (g) a software program for mobile terminal user identification authorization #CMT#USE : #/CMT# The method is used for authorization of a mobile terminal user identification, e.g. for E-commerce, E-banking or polling etc. #CMT#ADVANTAGE : #/CMT# Identification authorization if effected by identification module independent of user and third party. #CMT#DESCRIPTION OF DRAWINGS : #/CMT# The figure shows a schematic representation of a mobile terminal user identification authorization system. 1 : User 2 : Identification module 3 : Third party terminal 5 : Identification authorization request 6 : Action code generation #CMT#INDUSTRIAL STANDARDS : #/CMT# The transmission between the mobile terminal and the identification module can be coded according to a Triple Data Encryption Standard.</p> |