EP0138320B1 - System zum Verteilen von kryptografischen Schlüsseln - Google Patents
System zum Verteilen von kryptografischen Schlüsseln Download PDFInfo
- Publication number
- EP0138320B1 EP0138320B1 EP19840305480 EP84305480A EP0138320B1 EP 0138320 B1 EP0138320 B1 EP 0138320B1 EP 19840305480 EP19840305480 EP 19840305480 EP 84305480 A EP84305480 A EP 84305480A EP 0138320 B1 EP0138320 B1 EP 0138320B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- card
- terminal
- information
- encrypted
- personal identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
- 238000013475 authorization Methods 0.000 claims description 45
- 238000000034 method Methods 0.000 claims description 37
- 238000004458 analytical method Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 4
- 238000013459 approach Methods 0.000 description 31
- 238000004891 communication Methods 0.000 description 16
- 239000002131 composite material Substances 0.000 description 4
- 238000009826 distribution Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000007943 implant Substances 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/206—Software aspects at ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
Definitions
- the invention relates to a method for distributing cryptographic keys in a system having a plurality of issuing institutions and a plurality of transaction terminals and a central host, said method allowing the off-line verification of the authenticity of a financial transaction card at a terminal on the basis of authorisation information placed on the card by the issuing institution, said authorisation information being encrypted using an encrypting key.
- Financial transaction cards are commonly used as a replacement for cash. These cards, which can either be credit cards or debit cards, can be used instead of cash to purchase goods or services from a merchant. Many cards can also be utilized to obtain cash or traveller's checks from financial institutions or merchants, including through the use of automatic teller machines (ATM's).
- ATM's automatic teller machines
- transaction card fraud There are many types of transaction card fraud. For example, criminals have used lost or stolen cards to purchase goods or services. criminals have also duplicated or counterfeited cards using valid account numbers.
- Another approach which overcomes many of the shortcomings of card lists, includes on-line authorization terminals.
- merchants are provided with electronic terminals that are connected to the issuer of the cards, possibly through a central processor.
- information encoded on the card is read into the terminal.
- the terminal communicates this information over transmission lines to a host computer having information on the card holder. If the card is valid and the transaction does not exceed a specified limit, the host computer will return an approval to the merchant.
- One method which the applicant has developed, includes placing a secret, encrypted code on the card to guard against counterfeiting.
- anticounterfeiting check digits are derived by encrypting the personal account number (PAN) associated with the card.
- PAN personal account number
- These cryptographic check digits are encoded onto the magnetic stripe of the card.
- the central processor receives the information on the magnetic stripe, which includes the PAN and the check digits.
- the transmitted PAN is encrypted in a manner similar to the generation of the cryptographic check digits. If the two results compare favorably, the card can be authorized.
- the counterfeiter merely having a valid personal account number, could not generate valid check digits.
- PIN personal identification numbers
- a particular PIN is assigned to each card holder.
- the PIN may be either selected by the card holder or issued by the financial institution. This approach is utilized today in many banks having automatic teller machines.
- the central host compares the transmitted PIN with the associated PIN stored at the central location. If these numbers match, the card holder is identified as the authorized user of the card.
- the latter approach is effective to reduce the unauthorized use of lost or stolen credit cards.
- One example includes the comparison of at least a portion of a cardholder's PIN, at the terminal.
- a portion of the PIN is encrypted and encoded onto the magnetic stripe of the card.
- the key which is used to encrypt the partial PIN values is supplied to the transaction terminals.
- the encrypted information is read from the magnetic stripe and compared with the PIN entered by the card holder, utilizing the secret key stored at the terminal.
- the partial PIN check can be used to authorize low value transactions. If a higher level transaction needs to be authorized, the remainder of the PIN can be verified through the communication network in an on-line manner.
- the offline approach can also be adapted for use with the anticounterfeiting scheme outlined above.
- each of the institutions could be provided with their own encrypting key.
- the rest of the institutions in the system could still operate.
- the latter approach would require that each terminal be provided with the encrypting keys of each and every institution. Because of the number of institutions, this approach is deemed unfeasible as a long term solution. Therefore, it would be desirable to provide a key management system which would overcome the shortcomings described above.
- An alternative, compromise approach would include supplying the terminals with a portion of the encrypting keys used by the card issuers. In this manner, some of the transactions could be approved in an off-line manner.
- Such a system is disclosed in EP-A- 0 003 756.
- authorisation information is encoded on each card by the card issuer.
- the authorisation information is enciphered under a key used by that issuer.
- Each of the remote terminals is provided with a partial list of the keys used by the various issuers.
- the user initiates a transaction request by inserting his card into the terminal.
- the issuer identification number is read from the card and used to search the table in the terminal for the proper encryption key data. If the encryption key data is found, the card can be authorised off-line. If the data is not found in the table, the card data is sent to the central host which accesses the key data from a master table. This information is communicated back to the terminal.
- This system has some obvious drawbacks. First, it is necessary to distribute keys from each of the issuers to the remote terminals. This process is very inefficient and requires significant storage capabilities at the local terminal. Moreover, since only a fraction of the keys are distributed, many transactions still must be authorised in an on-line manner, that, is by connection to the host which has the master table of key data.
- the present invention overcomes these disadvantages by allowing the terminal to derive the encrypting key from information found on the card. This result is achieved by having the central host supply key data to the various issuers which is related to a system master key. Only the system master key is stored in the local terminals. The system master key is used by the terminals to derive the encrypting key permitting full off-line authentication.
- the invention also provides a corresponding system which is defined in claim 11 hereinafter.
- the issuing institutions are connected by communication lines to the host, and the terminals are also connected by communication lines to the host.
- some transactions may be authorized in a typical on-line manner utilizing the communication lines.
- the system also permits security and fraud analysis to take place in an off-line manner.
- the terminals are designed such that if someone tampers with the terminal, the master key is erased or destroyed.
- Each issuing institution will typically have some form of identification number (i.e. Bank Identification Number, BIN).
- BIN Bank Identification Number
- the encryption key sent to the institution is derived by encrypting the BIN, associated with the bank, under the master key.
- BIN Bank Identification Number
- the institution's identification number (BIN) The institution also places the authorisation information on the card and, as discussed more fully hereinbelow, this authorisation information can include anticounter f eiting data, personal identification numbers or even dynamic signature information. In any case the authorisation information is placed on the card in encrypted form. Furthermore, the authorisation information is encrypted under the secondary key associated with the institution.
- the secondary key When a card holder initiates a transaction, the information from the card is read by the terminal. In order to authorise the transaction, the secondary key must be derived by the terminal. The secondary key is derived by utilizing the master key stored in the terminal to encrypt, in this example, the BIN placed on the card. Once the secondary key has been derived, it can be used to permit the analysis of the encrypted authorisation information placed on the card.
- the above approach solves the shortcomings found in the prior art. More specifically, it permits off-line authorisation of transaction cards at a terminal. Furthermore, since each individual issuing institution is provided with unique encrypting keys, the compromise of any single issuer's secondary key will not affect the security of the entire system. From a commerical standpoint, it is necessary to have each individual institution responsible for its own security. This result is achieved with the key management approach of the invention. In addition, while each individual bank is given its own unique key, there is no requirement for each terminal to be provided with all of the keys. Rather, the terminal derives the necessary secondary key utilizing the master key supplied by the central host and the bank identification number. Thus, the terminal does not require large storage capacity but only needs to be provided with one secure master key.
- a central host 20 which acts as a network switch, routing information between a plurality of transaction terminals 22 and issuing institutions 24.
- the issuing institutions can be banks or other service organizations which distribute transaction cards, such as credit cards or debit cards. These cards may be used at various merchants or institutions to purchase goods or services or to obtain cash.
- a terminal typically includes a reader for receiving information encoded on the magnetic stripe of the card.
- the terminal may include a PIN pad to permit a customer to enter their personal identification number (PIN).
- the terminal will also include an encryption apparatus which may be provided in the main portion of the terminal or separately in the PIN pad. The location of the encryption apparatus will depend on the particular technique being selected.
- Each of the terminals is connected to the host along communication lines 30.
- the host is also connected to the issuers along communications lines 32.
- information about the card holder and the purchase are transmitted from the terminal, along communication lines 30, to the host.
- the central host will make the approval or denial decision.
- the information is routed along lines 32, to the institution which issued the card.
- the authorization decision made by the institution is retransmitted to the merchant along the same communication lines.
- off-line is defined to mean operations which can be performed at the terminal without any communication to the host.
- FIG 2 the general key management system of the subject invention is illustrated. This approach can be utilized to provide both an off-line anticounterfeit check and PIN verification.
- the flow chart is broken into three segments where Figure 2A shows the operations performed at the central host, Figure 2B shows the operations performed by the issuer and Figure 2C shows the actions taken at the terminal.
- the central host or control 20 initially generates a system master key 40.
- This master key is supplied to all of the terminals 42. Since the security of the master key is of utmost importance, this distribution should be handled in a highly secure manner.
- the terminals are physically connected to the host permitting initial loading of the master key. After this time, the terminals are kept under high security until they are installed at merchant locations.
- a key loading device is connected to the host and has the master key loaded therein. The key loading device is then brought to each terminal and physically connected to load the key.
- the terminal should be designed such that any tampering will erase or otherwise destroy the master key, such that it can never be extracted from the terminal.
- the host then generates a plurality of secondary keys 44. These secondary keys are derived utilizing the bank identification number (BIN). As pointed out above, each institution is generally associated with an unique identification number. This identification number is encrypted using the master key. The resulting secondary keys are then distributed to the associated issuers. Again, a number of methods can be used to distribute the keys. Typically, secure encrypted communication lines are already established between the issuers and the host and therefore it is possible to transmit these keys over communication lines. The key may also be physically delivered using a key loading device as discussed above.
- BIN bank identification number
- the issuer is now capable of generating transaction cards. Initially, the issuer will place its BIN number on each card 50. Typically, this information is placed on the card by encoding the information on a magnetic stripe. While this approach is fairly common, there many other ways of encoding data on the cards, all of which are within the scope of the subject invention.
- the issuer will then generate authorizaton information 52. As discussed below, this authorization information can be anticounterfeiting digits, PIN information or any other suitable identifier.
- the authorization information is then encrypted, using the secondary key supplied by the host 54.
- the encrypted authorization information is then placed on the card 56 in the manner described above.
- the card can now be authorized in an off-line manner at the terminals.
- the card is initially read by the terminal at 60.
- the terminal will typically have a card reader capable of deciphering the encoded information on the magnetic stripe.
- the terminal should have compatible reading equipment.
- the information which is read includes the BIN number of the institution, as well as the encrypted authorization information.
- the terminal will then derive the secondary key, utilizing the master key stored at the terminal to encrypt the BIN number of the institution 62. Once the secondary key has been derived, it can be used to analyze encrypted authorization information on the card 64.
- the analysis can be handled in a number of ways. The particular approach will depend on the system design and a few examples will be discussed in detail hereinbelow.
- the transaction can be authorized. If the information does not match, the transaction can be denied.
- Figure 3 a more specific approach is shown for use in an anticounterfeiting scheme.
- Figure 3A illustrates the actions taken at the issuer, while Figure 3B describes the events at the terminal.
- Figures 3 through 6 the activities of the central host are identical with those described in Figure 2 and will not be further discussed.
- the issuer will again place the BIN number on the card 70.
- the issuer will also generate a personal account number (PAN) which is unique for each card.
- PAN personal account number
- This account number or (PAN) is placed on the card 72.
- the issuer will then encrypt the PAN with the secondary key 74.
- the result of this encryption is placed on the card 76. While the above discussion is limited to the use of a PAN, this number may be combined with any other information normally on the card, such as the card expiration date. Further, the entire encrypted information need not be placed on the card but only a subset thereof. By choosing only a specific subset, the information which must fit on the card can be economized.
- the card will be read at the terminal 80.
- both the BIN number and the encrypted PAN information will be received.
- the terminal will then derive the secondary key, utilizing the master key to encrypt the BIN 82.
- the secondary key is then used to encrypt the account number placed on the card at 84.
- the result of this encryption (or at least a portion thereof) can then be compared with the encrypted account information on the card. If these match, the transaction can be authorized.
- the issuer will again place the BIN on the card 90.
- the PAN is also placed on the card 92.
- the secure card property such as the Watermark is placed on the card. Because of the manufacturing sophistication necessary to implant a secure property, this step will typically be initially handled by an entity other than the issuer. The cards with the secured property placed thereon will then be supplied to the issuer. Thus, it is not intended that the order of the placement of the information on the card restrict the scope of the subject invention.
- the secure property which would provide some form of numeric information, is then combined with the account number and encrypted, using a secondary key 96. The result of this encryption is then encoded on the card 98.
- the information on the card including the secure property, is read by the terminal 100.
- the secondary key is derived, utilizing the master key to encrypt the BIN 102.
- the PAN and secure property are combined and are encrypted using the secondary key 104.
- the result of this encryption is then compared with the encrypted information encoded on the card 106. As in the previous cases, if the information matches, the transaction can be approved. However, if the information does not match, the transaction can be denied.
- the use of the key management system is illustrated for use with information particularly associated with the card holder, such as a PIN.
- the identical system can be used for any other information associated with a specific card holder, such as dynamic signature analysis information.
- the handwriting analysis information unique to the cardholder, would be encoded in numeric form and encrypted, using the proper key.
- the remainder of discussion of Figures 5 and 6 will be restricted to the use of PINs.
- the issuer will once again place its BIN number on the card 110.
- a PIN will then be generated to be associated with the customer.
- the bank generates this PIN.
- the PIN may also be supplied to the issuer by the cardholder.
- the particular approach taken can be left to the discretion of the issuing institution as there are various advantages and disadvantages with both techniques. The benefits of each technique is discussed in detail in a bulletin by the American National Standards Committee (ANSI) publication on Pin Management and Security, ANSI-X9.8 (1982). If the PIN has been generated by the institution, it must be supplied to the cardholder.
- ANSI American National Standards Committee
- the PIN which has been selected is then encrypted using the secondary key 114.
- the result of this encryption is then placed on the card 116.
- this system is probably best utilized using only a partial PIN value. For example, where four digits constitute the PIN, only two digits are encrypted and placed on the card. The remaining two digits are utilized for higher value, on-line authorization.
- the partial PIN digits may also be derived using the full PIN. All or only a portion of these derived digits may be placed on the card. The details of implementing a partial PIN system are known in the prior art and need not be discussed in detail.
- the card to be used is read by the terminal 120.
- the secondary key is derived by encrypting the BIN utilizing the master key stored at the terminal 122.
- the card holder will then enter his PIN.
- the PIN may be entered through the PIN pad of the terminal 124.
- the secondary key is then utilized to compare the encrypted PIN information on the card with the PIN entered by the card holder 126. This comparison may be carried out either by encrypting the PIN entered by the card holder or by decrypting the encrypted PIN on the card such that both PINS are in clear text.
- the issuer places the BIN number on the card 130.
- the PAN is placed on the card 132.
- a PIN is generated 134 in a manner described above.
- the PAN is encrypted 136.
- the resulting encryption is then combined with the PIN to define a coded value 138.
- the card is read at the terminal 150.
- the PIN is received from the cardholder 152.
- the secondary key is then derived utilizing the master key to encrypt the BIN 154.
- the PAN is then encrypted under the secondary key 156.
- the encrypted PAN is then compared with the information placed on the card. This can conveniently be done in two ways, as shown at 158 and 160. More specifically, the encrypted PAN (or a portion thereof) is combined with the coded value and then compared with the PIN entered by the card holder. Where the original combination at 138 was by addition, the encrypted PAN is subtracted from the coded value, which should yield the PIN.
- Another alternative (160) is to combine the newly encrypted PAN (or a portion thereof) with the PIN entered by the card holder. This result should generate the coded value which has been placed on the card. In either case, if the comparison matches, the transaction can be authorized.
- a new and improved key management system for use in an EFT environment, which permits off-line authorization of a transaction card.
- a central host generates a master key which is then supplied to all the terminals in the system.
- the host then derives a secondary key for each issuing institution by encrypting the BIN number of the issuing institution under the master key.
- the secondary keys are then supplied to the issuing institution.
- the institution When the institution issues a card, it places its BIN number on the card.
- authorization information is placed on the card in encrypted form. This information is encrypted under the secondary key associated with the institution. This information may include anticounterfeiting digits or PIN information.
- the information on the card is read.
- the terminal then derives the secondary key, utilizing the master key stored at the terminal to encrypt the BIN of the institution.
- the secondary key is then used to permit analysis of the encrypted authorization information which has been placed on the card.
- off-line authorization can be carried out to enhance the security of the transaction card network.
- each of the issuing institutions is given a different cryptographic key, thereby further enhancing overall system security.
- the disclosure has included a description of a number of different security approaches which can utilize the subject key management system. These techniques can be used alone or in combination. If used in combination, it could be beneficial to have the issuing institutions use a different secondary key for each technique. This could be accomplished in a number of ways. For example, a different master key could be generated for each technique, or the BIN could be modified in a set way before it is encrypted.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Claims (17)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US52916183A | 1983-09-02 | 1983-09-02 | |
| US529161 | 1983-09-02 |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| EP0138320A2 EP0138320A2 (de) | 1985-04-24 |
| EP0138320A3 EP0138320A3 (en) | 1986-02-19 |
| EP0138320B1 true EP0138320B1 (de) | 1989-03-15 |
Family
ID=24108779
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP19840305480 Expired EP0138320B1 (de) | 1983-09-02 | 1984-08-10 | System zum Verteilen von kryptografischen Schlüsseln |
Country Status (3)
| Country | Link |
|---|---|
| EP (1) | EP0138320B1 (de) |
| JP (1) | JPS6061863A (de) |
| DE (1) | DE3477331D1 (de) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9947001B2 (en) | 2013-03-15 | 2018-04-17 | Mastercard International Incorporated | System and method for using multiple payment accounts using a single payment device |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4650978A (en) * | 1985-01-23 | 1987-03-17 | Rmh Systems, Inc. | Off line cash card system and method |
| FR2829332B1 (fr) * | 1986-04-30 | 2004-09-03 | Thomson Csf | Procede de gestion d'elements secrets relatifs a des postes disperses et systeme destine a la mise en oeuvre d'un tel procede |
| FR2600190B1 (fr) * | 1986-06-16 | 1988-08-26 | Bull Cp8 | Procede pour diversifier une cle de base et pour authentifier une cle ainsi diversifiee comme ayant ete elaboree a partir d'une cle de base predeterminee, et systeme de mise en oeuvre |
| DE3889481D1 (de) * | 1987-03-04 | 1994-06-16 | Siemens Nixdorf Inf Syst | Schaltungsanordnung zur Sicherung des Zugangs zu einem Datenverarbeitungssystem mit Hilfe einer Chipkarte. |
| US5396558A (en) * | 1992-09-18 | 1995-03-07 | Nippon Telegraph And Telephone Corporation | Method and apparatus for settlement of accounts by IC cards |
| FR2697361B1 (fr) * | 1992-10-27 | 1994-12-16 | Bull Cp8 | Procédé et système d'inscription d'une information sur un support permettant de certifier ultérieurement l'originalité de cette information. |
| US5796835A (en) * | 1992-10-27 | 1998-08-18 | Bull Cp8 | Method and system for writing information in a data carrier making it possible to later certify the originality of this information |
| FR2719925B1 (fr) * | 1994-05-10 | 1996-06-07 | Bull Cp8 | Procédé pour produire une clé commune dans deux dispositifs en vue de mettre en Óoeuvre une procédure cryptographique commune, et appareil associé. |
| SE511507C2 (sv) * | 1997-06-10 | 1999-10-11 | Digital Equipment Bcfi Ab | Säkerhetsmodul för transaktionsstation samt transaktionsstation |
| US6831982B1 (en) | 1999-11-19 | 2004-12-14 | Storage Technology Corporation | Encryption key management system using multiple smart cards |
| US7159114B1 (en) | 2001-04-23 | 2007-01-02 | Diebold, Incorporated | System and method of securely installing a terminal master key on an automated banking machine |
| US7110986B1 (en) | 2001-04-23 | 2006-09-19 | Diebold, Incorporated | Automated banking machine system and method |
| US7328337B2 (en) | 2001-05-25 | 2008-02-05 | America Online, Incorporated | Trust grant and revocation from a master key to secondary keys |
| JP2003141432A (ja) * | 2001-11-02 | 2003-05-16 | Sony Corp | 電子商取引システム、電子商取引サーバ、電子商取引方法 |
| US8548926B2 (en) * | 2010-04-13 | 2013-10-01 | Mastercard International Incorporated | Method and apparatus for global replacement card services |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4186871A (en) * | 1978-03-01 | 1980-02-05 | International Business Machines Corporation | Transaction execution system with secure encryption key storage and communications |
| US4317957A (en) * | 1980-03-10 | 1982-03-02 | Marvin Sendrow | System for authenticating users and devices in on-line transaction networks |
| US4423287A (en) * | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
-
1984
- 1984-08-10 EP EP19840305480 patent/EP0138320B1/de not_active Expired
- 1984-08-10 DE DE8484305480T patent/DE3477331D1/de not_active Expired
- 1984-08-10 JP JP59168734A patent/JPS6061863A/ja active Pending
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9947001B2 (en) | 2013-03-15 | 2018-04-17 | Mastercard International Incorporated | System and method for using multiple payment accounts using a single payment device |
Also Published As
| Publication number | Publication date |
|---|---|
| JPS6061863A (ja) | 1985-04-09 |
| DE3477331D1 (en) | 1989-04-20 |
| EP0138320A3 (en) | 1986-02-19 |
| EP0138320A2 (de) | 1985-04-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP0138320B1 (de) | System zum Verteilen von kryptografischen Schlüsseln | |
| EP0385400B1 (de) | Mehrebenen-Sicherheitsvorrichtung und -verfahren mit persönlichem Schlüssel | |
| US4357529A (en) | Multilevel security apparatus and method | |
| EP0047285B1 (de) | System zum authentisieren von benutzern und einrichtungen in direkt prozessgekoppelten transaktionsnetzen | |
| CA1162306A (en) | Multilevel security apparatus and method | |
| US4328414A (en) | Multilevel security apparatus and method | |
| US5036461A (en) | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device | |
| US4386266A (en) | Method for operating a transaction execution system having improved verification of personal identification | |
| US6816058B2 (en) | Bio-metric smart card, bio-metric smart card reader and method of use | |
| US5892211A (en) | Transaction system comprising a first transportable integrated circuit device, a terminal, and a security device | |
| US7818812B2 (en) | Article and system for decentralized creation, distribution, verification and transfer of valuable documents | |
| KR100389229B1 (ko) | 거래처리시스템 및 거래처리방법 | |
| US5596643A (en) | Network settlement performed on consolidated information | |
| US4961142A (en) | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer | |
| US6510983B2 (en) | System and method for transferring value to a magnetic stripe on a transaction card | |
| US4924514A (en) | Personal identification number processing using control vectors | |
| US5621796A (en) | Transferring information between transaction networks | |
| JPH0334641A (ja) | 特殊キーを用いた転送データの暗号化方法 | |
| WO1997010560A1 (en) | Stored value transaction system and method using anonymous account numbers | |
| WO2000010068A2 (en) | Apparatus for and method of electronic currency generation, transfer and redemption | |
| JP2000507380A (ja) | 安全モジュール | |
| Rihaczek | TeleTrusT-OSIS and communication security | |
| Caelli | Financial and Banking Networks | |
| MXPA01001407A (en) | Apparatus for and method of electronic currency generation, transfer and redemption | |
| AU2002308486A1 (en) | A bio-metric smart card, bio-metric smart card reader, and method of use |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Designated state(s): DE FR GB SE |
|
| PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
| AK | Designated contracting states |
Designated state(s): DE FR GB SE |
|
| 17P | Request for examination filed |
Effective date: 19860731 |
|
| 17Q | First examination report despatched |
Effective date: 19870814 |
|
| GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
| AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FR GB SE |
|
| REF | Corresponds to: |
Ref document number: 3477331 Country of ref document: DE Date of ref document: 19890420 |
|
| ET | Fr: translation filed | ||
| PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
| 26N | No opposition filed | ||
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19930729 Year of fee payment: 10 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Effective date: 19940810 |
|
| EAL | Se: european patent in force in sweden |
Ref document number: 84305480.0 |
|
| GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 19940810 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 19950713 Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 19950717 Year of fee payment: 12 |
|
| PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19950725 Year of fee payment: 12 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Effective date: 19960811 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Effective date: 19970430 |
|
| PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Effective date: 19970501 |
|
| EUG | Se: european patent has lapsed |
Ref document number: 84305480.0 |
|
| REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST |