EP1008101A2 - Kryptografisches medium - Google Patents

Kryptografisches medium

Info

Publication number
EP1008101A2
EP1008101A2 EP97953060A EP97953060A EP1008101A2 EP 1008101 A2 EP1008101 A2 EP 1008101A2 EP 97953060 A EP97953060 A EP 97953060A EP 97953060 A EP97953060 A EP 97953060A EP 1008101 A2 EP1008101 A2 EP 1008101A2
Authority
EP
European Patent Office
Prior art keywords
token
card
electronic module
information
medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP97953060A
Other languages
English (en)
French (fr)
Other versions
EP1008101A4 (de
Inventor
Carl J. Wack
Edward M. Scheidt
John H. Hershlow
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tecsec Inc
Original Assignee
Tecsec Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tecsec Inc filed Critical Tecsec Inc
Publication of EP1008101A2 publication Critical patent/EP1008101A2/de
Publication of EP1008101A4 publication Critical patent/EP1008101A4/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card

Definitions

  • the present invention relates in general to a medium used for performing transactions.
  • the present invention relates to a medium used for performing secure transactions, such as banking or other commercial transactions.
  • Plastic is inexpensive, allows for shaping, printing, embossing, and for the addition of a strip of magnetic tape.
  • all of these common characteristics also enable misuse when a plastic card is applied to a financial or credit application. Credit card fraud is a major problem precisely because of the ease of duplication of the plastic card.
  • the approach of using a small 25mm sq. hole in a card was defined by the physics of the semiconductor die.
  • the overall dimensions of a single memory die is measured in width, length, and height. The length and width are fixed and immutable. However, the average die is between 20 and 25 mils thick. And of that thickness, approximately 12 to 17 mils is occupied by the alumina substrate necessitated by the photoetching process of semiconductor manufacturing.
  • MCM multi-chip module
  • the flexible MCM is completely sealed from outside environmental contaminates.
  • the resultant module can be laminated within two outer layers of plastic and actually be reused if the outer housing should be damaged by accident or misuse.
  • the unprotected die of memory or processor functions is currently wire bonded to an ISO-specified metal contact material (see ISO Std. 7816-2 / Physical Specifications and -3 / Electrical Specifications). As such, the die is open to probing, attachments, or any other type of physical analysis. Further, when you flex the current industry standard card, the imbedded die jumps up and off of the card like a flea.
  • Fig. 1 a block diagram showing an exeplary use of the present invention.
  • Metallic material can be shaped into very small particles. Slivers of metal of varying lengths have a particular characteristic when used as an antenna for radio frequency. When the metal length and the wavelength of the radio frequency are the same, the metal material resonates, or more accurately reflects the signal in a very efficient manner.
  • This unique physical signature can be used to assure the physical integrity of the card as well as the unique identity of the card because the disturbance of the particles, not only as individual particles but also in relationship to each other particle as a whole entity (this is a 3 dimensional event), is detectable.
  • the card and its unique RF signature can be read at the time of insertion, very quickly, and the physical integrity and unique identification of the card is corroborated.
  • the frequency at which the card is read may also change or be varied at what ever periodicity is desired. For example, on the first day of manufacture, the card is read in a stripe fashion much the same as a common magnetic stripe is read today. However, this RF reading is made at an initial frequency of 10Ghz.
  • the reflected signal is characterized and stored in a database along with the account number and name of the recipient of the card.
  • the card can be read at another frequency to add to the initial characteristic database and can be used to check the same integrity and uniqueness.
  • the continuous use of the card would allow for check and counter-check against an immutable physical characteristic, assuring the issuer of the card that it had not been tampered with in any physical way.
  • the card of the present invention has two physical components, the plastic carrier or body of the card and the electronic module (approximately 1 square inch of semiconductor die, interconnected and embedded in plascon).
  • the RF signature can be read on the module as a separate entity and/or combined with the signature of the card itself, to assure the relationship of the two devices is as originally intended. Moreover, if the card body or carrier should be damaged beyond the toleration level of the issuer or holder, the original card can be destroyed and the electronic module portion can be embedded into another card body, at which time a new signature would be read and used for future RF validation processes. This would allow continuous use of the content of the electronics, and reduce the replacement cost to the issuer of the cost of the plastic body or card.
  • a token device is consistent with Federal Information Publication System Bulletin #140-1. It is within this document that the concept is expressed that identification of an individual to a system should be token-based. The idea is that individual information should reside off of the computer system that is used for information sharing and in a platform that is separate and isolated from access by others on that system. This means that the token may be represented by a floppy disk, a PCMCIA card, or a smartcard. The limitations of function and capacity of other cards have restricted the application of this type of a system. Tokens have been in use for a number of years. In fact, one of the problems in the security/access control market is the number of different tokens necessary in the day's events.
  • a token (swipe card) is used to enter a garage area, another permits entry into a building, a third allows for access to a special secured area, and yet another token is required for access to a computer terminal.
  • the number of tokens may exceed a dozen. This situation is caused primarily by the development of each of the various systems under different manufacturers, each of whom, in trying to get the most out of a sale, insists on their own token.
  • a common token for all functions has not been possible for lack of computational power and memory capacity.
  • the present invention with its 16-bit CPU and large (initially 1 Megabyte) memory capacity offers several significant parts to the overall solution set of problems associated with security and electronic transactions.
  • the 16-bit CPU offers the computational capability necessary not only to process large addressing schemes, but also to process a variety of protocols and the communications structures of different manufacturers.
  • the card of the present invention can support large memory transfers and more importantly, can support multiple applications on a single card.
  • the introduction of Constructive Key Management cryptography enables the card to enforce this application separation. Each functional owner of a memory segment or application can operate a completely different process of access and data storage, with the knowledge that it is not possible for any one else to have access to an inappropriate information object.
  • Such a card has been manufactured by Lockheed Martin, Sillcocks Plastics, and Secure Transaction Solutions using an Intel 80188EB CPU; 64k bytes of One Time Programmable processor instructions; 512k bytes of DRAM for memory buffer and scratchpad memory for CPU activity (program execution); 512k bytes of Electrically alterable program memory; and the associated latches and switches necessary to operate the card. Additional configurations may be utilized.
  • the CPU addressing scheme allows for direct memory addressing of 32 megabytes of memory in various configurations of RAM and ROM consistent with the requirements of the various applications.
  • the plastic stock material from which the card is cut is impregnated with the sub-micron chaff material necessary for the RF ID process to operate.
  • the RF Signature and ID process is thereby associated with the card (for example, the RF signature at various frequencies and various locations on the card).
  • the card is also capable of supporting magnetic stripe, printed information such as a 4-color photo, fingerprint, signature block, special symbols or logos, holograms, and other pieces of printed or attached information.
  • the basic operating system for the CPU may be installed in the EEPROM at the time of manufacture, or prior to manufacturing, at the EEPROM factory.
  • the card is assigned to a particular user, with a unique account number, and the RF ID is read and stored in non-volatile memory along with any other issuer / user-necessary information that might be desired, like a 4-color photo of the user (compressed and hashed), and a File Allocation Table (FAT) is created to allow the CPU to parse the memory sectors for later activation for additional applications.
  • FAT File Allocation Table
  • the user upon receipt, will activate the card if received remotely, much as one does with conventional cards, and consistent with security practice if access is granted under a separate channel of distribution, e.g., telephone, U.S. Mail, or courier.
  • the user can accept the offered Personal Identification Number (PIN) or select his/her own.
  • PIN Personal Identification Number
  • the card is presented to an ATM.
  • the RF ID is read from the card and its value is read into a register.
  • the CPU of the card and the ATM exchange a series of signals to establish a common protocol.
  • the card is capable of multiple protocols and therefore allows for a much greater degree of freedom of participation for the user.
  • the ATM requests the PIN of the user of the card, which is stored in an encrypted form in the memory sector appropriate to that type machine, for example a MOST, or Cirrus transaction.
  • the PIN is transmitted on-line to the respective clearing house via the dedicated SET- approved communications link, along with the previously-stored RF ID number. This information is sent to a clearing house firewall where the format of the information is screened for conformity.
  • the packet is allowed to continue onward to the decryption area, where the information packet is decrypted using the indexing information bits in the header of the sent information along with the RF ID data to create a user key, which when combined with the database-stored component of a user access table generates the key to decrypt the actual packet.
  • the credentials of the individual account the confirmation of the holder and card, and an audit of a predetermined number of past transactions which are relevant to this particular issuer. The past transactions are validated and the permission is sent to the ATM to proceed.
  • the validation of past transactions includes the performance of several functions, the obvious update or correction if necessary, and also the assurance offered to the issuer that the message or content of encrypted data is large enough to assure no tampering or partial changes have occurred.
  • the ATM then presents a list of actions which can be chosen by the user, and those selections are used as cryptographic splits to generate at the ATM an encrypted request/instruction which is sent to the clearing house.
  • the screening process is repeated and if appropriate, the transaction is allowed.
  • the updated (audit trail included) user packet is encrypted at the clearing house and sent back to the ATM to be entered on the user's card. No encryption occurred, on the card, in this particular transaction. In another protocol, or in a different application, encryption may be desired and desired to occur on the card.
  • the powerful 16-bit processor and memory configuration of the card supports the choice.
  • the card is offered to the merchant terminal.
  • the terminal reads the RF ID value and stores it in a register.
  • the card negotiates an exchange to determine correct protocol with the merchant device.
  • the card having a powerful 16-bit CPU, is capable of processing many different applications and protocols, and having achieved an acceptable communications link, also negotiates the highest baud rate that is mutually acceptable, up to 115,200 baud (currently).
  • the merchant terminal requests on-line status with the respective clearing house and the combined value of the RF ID and the merchant membership number, along with the terminal ID number, are used to generate a unique key which is used to communicate and build a session key with the clearing house.
  • the unique session key assures the participating merchant and the user of the card that the total transaction will be transmitted to the clearing house and the resulting answer will be encrypted using the identical components for key construction, assuring that the answer or acknowledgement can only be deciphered by the appropriate parties, i.e., the user and the merchant, at that particular device.
  • the information at the clearing house is decrypted and processed and the audited transaction is processed.
  • the card of the present invention may also be used to establish a secure Internet commerce relationship.
  • a user of the Internet selects a Web page of a particular vendor.
  • the page offers an opportunity to download transaction software.
  • a click of the mouse and the transfer is complete.
  • the software is sent as a serialized self-extracting executable file, which when selected will extract and install itself and present a screen that asks if now would be a good time to fill out the registration form for that particular vendor. This is also suggested to occur off-line.
  • the registration form is filled out and all significant data is entered, including the type of payment, credit card number, etc.
  • the software asks if the user wishes to take advantage of a Storage of Permissions Feature, which allows the user to store on the card, the permission/identifying splits that were generated by the vendor software.
  • the user agrees and the card is presented and the information stored.
  • the send button is selected and the automatically-encrypted bundle is sent back to the vendor of choice.
  • the vendor receives the encrypted bundle and opens it. Recognizing the form/structure of the bundle, the encryption is automatically keyed with the serial number of the copy of the downloaded software, and the vendor firewall allows the bundle to pass to the processing area.
  • the user having gone back to the Web page, is now looking at the vendor catalog and selecting items for purchase, each of which has a number. It is the combination of these numbers and the number of the serialized software that generates the selected components of the split key encryption. All messages are protected and all communications are unique between the vendor and the user.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)
  • Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
  • Preparation Of Compounds By Using Micro-Organisms (AREA)
  • Medicinal Preparation (AREA)
  • Laminated Bodies (AREA)
  • Casting Or Compression Moulding Of Plastics Or The Like (AREA)
EP97953060A 1996-11-20 1997-11-20 Kryptografisches medium Withdrawn EP1008101A4 (de)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US3128396P 1996-11-20 1996-11-20
US31283P 1996-11-20
PCT/US1997/021809 WO1998022914A2 (en) 1996-11-20 1997-11-20 Cryptographic medium

Publications (2)

Publication Number Publication Date
EP1008101A2 true EP1008101A2 (de) 2000-06-14
EP1008101A4 EP1008101A4 (de) 2003-03-26

Family

ID=21858590

Family Applications (1)

Application Number Title Priority Date Filing Date
EP97953060A Withdrawn EP1008101A4 (de) 1996-11-20 1997-11-20 Kryptografisches medium

Country Status (18)

Country Link
EP (1) EP1008101A4 (de)
JP (1) JP2001504617A (de)
KR (1) KR100372628B1 (de)
CN (1) CN1246188A (de)
AP (1) AP1098A (de)
AU (1) AU728517B2 (de)
BR (1) BR9713162A (de)
CA (1) CA2272383A1 (de)
CZ (1) CZ178599A3 (de)
EA (1) EA001552B1 (de)
HU (1) HUP0001638A3 (de)
NO (1) NO992416L (de)
NZ (1) NZ336338A (de)
OA (1) OA11120A (de)
PL (1) PL333506A1 (de)
TR (1) TR199901122T2 (de)
UA (1) UA43455C2 (de)
WO (1) WO1998022914A2 (de)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028493A1 (en) * 1998-11-10 2000-05-18 Kent Ridge Digital Labs A method of encryption and apparatus therefor
AUPQ556600A0 (en) * 2000-02-14 2000-03-02 Ong, Yong Kin (Michael) Electronic funds transfers-zipfund
CN1141680C (zh) * 2000-02-15 2004-03-10 史蒂夫·马格鲁 量子点安全装置和方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2590051B1 (fr) * 1985-11-08 1991-05-17 Eurotechnique Sa Carte comportant un composant et micromodule a contacts de flanc
JPH0517270Y2 (de) * 1986-07-03 1993-05-10
JPS6332658A (ja) * 1986-07-28 1988-02-12 Casio Comput Co Ltd Icカ−ドシステム
FR2620586A1 (fr) * 1987-09-14 1989-03-17 Em Microelectronic Marin Sa Procede de fabrication de modules electroniques, notamment pour cartes a microcircuits
US5049728A (en) * 1990-04-04 1991-09-17 Rovin George H IC card system with removable IC modules
EP0583709B1 (de) * 1992-08-17 1999-05-06 THOMSON multimedia Nichtfälschbare Identifizierungseinrichtung, Leser und Identifizierungsverfahren
JP2896031B2 (ja) * 1992-12-28 1999-05-31 三菱電機株式会社 非接触icカードの端末機および非接触icカードシステム
JPH07117385A (ja) * 1993-09-01 1995-05-09 Toshiba Corp 薄型icカードおよび薄型icカードの製造方法
JPH07271939A (ja) * 1994-03-30 1995-10-20 Mitsubishi Denki Semiconductor Software Kk 非接触icカード,カードリーダライタ及びカード装置
KR0137258B1 (ko) * 1994-08-03 1998-04-24 이용규 무선호출기를 이용한 전기밥솥 제어장치

Also Published As

Publication number Publication date
UA43455C2 (uk) 2001-12-17
NO992416L (no) 1999-07-07
CA2272383A1 (en) 1998-05-28
EA199900482A1 (ru) 1999-12-29
NZ336338A (en) 2000-02-28
CZ178599A3 (cs) 1999-11-17
BR9713162A (pt) 2002-01-22
TR199901122T2 (xx) 1999-08-23
AP9901571A0 (en) 1999-06-30
AU5688298A (en) 1998-06-10
KR20000057177A (ko) 2000-09-15
HUP0001638A3 (en) 2002-01-28
OA11120A (en) 2003-04-04
JP2001504617A (ja) 2001-04-03
KR100372628B1 (ko) 2003-02-17
WO1998022914A2 (en) 1998-05-28
AP1098A (en) 2002-08-29
EP1008101A4 (de) 2003-03-26
HUP0001638A2 (hu) 2000-09-28
NO992416D0 (no) 1999-05-20
EA001552B1 (ru) 2001-04-23
WO1998022914A3 (en) 1998-07-23
AU728517B2 (en) 2001-01-11
PL333506A1 (en) 1999-12-20
CN1246188A (zh) 2000-03-01

Similar Documents

Publication Publication Date Title
Jurgensen et al. Smart cards: the developer's toolkit
US7003501B2 (en) Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US7051205B1 (en) Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate
Fancher In your pocket: smartcards
DE69900169T2 (de) Kreditkartensystem und verfahren
US20060190412A1 (en) Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
JP2002512711A (ja) 携帯可能な身分証明要素でのトランザクション方法
CN104732379A (zh) 安全支付系统
CN104995648A (zh) 用于使用动态pan来处理交易的方法
US7159241B1 (en) Method for the determination of soundness of a sheet-shaped medium, and method for the verification of data of a sheet-shaped medium
AP1098A (en) Cryptographic medium.
CN108475374B (zh) 具有多种进行金融交易的模式的支付设备
WO1998022914A9 (en) Cryptographic medium
CN203799402U (zh) 电子身份证芯片卡、读卡器、电子身份证验证系统
CN111833176A (zh) 一种金融账户的开户方法、开户装置及开户系统
JP2001266088A (ja) カード及びその偽造防止方法
US20030191715A1 (en) Secured purchase transaction
KR100794275B1 (ko) Ic칩이 실장된 카드의 발급을 위한 카드 발급 시스템 및그 방법
EP1609122A1 (de) Auf chipkarten basierender wertetransfer
MXPA99004687A (en) Cryptographic medium
HK1026285A (en) Cryptographic medium
Mackinnon et al. Smart cards: A case study
WO2001054003A1 (en) Secure internet payment method
HK40030144A (en) An account opening method, an account opening device and an account opening system for a financial account
Furletti An overview of smart card technology and markets

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19990617

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: RO PAYMENT 19990617

A4 Supplementary search report drawn up and despatched

Effective date: 20030207

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 07F 7/10 B

Ipc: 7G 06K 19/073 B

Ipc: 7G 06K 19/06 A

17Q First examination report despatched

Effective date: 20030402

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20040323