CA1147863A - Method and apparatus for secure message transmission for use in electronic funds transfer systems - Google Patents

Method and apparatus for secure message transmission for use in electronic funds transfer systems

Info

Publication number
CA1147863A
CA1147863A CA000363344A CA363344A CA1147863A CA 1147863 A CA1147863 A CA 1147863A CA 000363344 A CA000363344 A CA 000363344A CA 363344 A CA363344 A CA 363344A CA 1147863 A CA1147863 A CA 1147863A
Authority
CA
Canada
Prior art keywords
message
transaction
key
data
under
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
CA000363344A
Other languages
French (fr)
Inventor
Willard G. Bouricius
Paul E. Stuckert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Application granted granted Critical
Publication of CA1147863A publication Critical patent/CA1147863A/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • G06Q20/0855Payment architectures involving remote charge determination or related payment systems involving a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

METHOD AND APPARATUS FOR SECURE MESSAGE
TRANSMISSION FOR USE IN ELECTRONIC FUNDS
TRANSFER SYSTEMS
Abstract An electronic funds transfer system wherein it is required that a bank be reasonably guaranteed that the two parties to a retail transaction (i.e., a person and a retailer), agree on the transaction before the funds transfer takes place.
The message including the transaction information is encryp-ted by the person using a unique encryption key (Kp) stored in a highly secure storage location in his own personal portable transaction device (XATR) and his data storage and transfer card (DSTC) and this first encrypted message is sent to the retailer who doubly encrypts the initially received encrypted message from P under his own unique encryption key (KR) and this doubly encrypted message is sent to the bank. The person also sends the transaction message to the retailer in clear, and the retailer first verifies the message and then, utilizing his own encryption key (KR), encrypts same and similarly sends it to the bank.
The bank utilizing unique retailer and customer identifica-tion data sent with the message, accesses a "key" file and first extracts the retailer's key (KR) and decrypts a first portion of the message, extracts the person's key (Kp) and decrypts a second portion of the received message. The bank then compares a predetermined portion of the transaction message originating with the person with a similar portion received from the retailer and if identical, it is presumed that both the person and the retailer agreed to the trans-action and the appropriate funds transfer is made. If the messages do not agree, some sort of default procedure occurs.

Description

METHOD AND APPARATUS FOR
:- SECURE MESSAGE TRANSMISSION FOR USE IN
EL.ECTRONIC FUNDS TRANSFER 6YSTEMS
: .
Description :. . .
Technical FieLd .',' ' ' ' ,,, :
-~ To a large extent modern business practices in many sectors : of our economy have made unnecessary the physical handling - of actual cash with its inherent dangexs of theft and , loss.. Such sectors.include banking, large retail stores, .. , ~ . .
and a great variety of other businesses where articles are ; charged to an account, the purchaser billed, and the bills ( sukfsequently paid by checks. In such transactions the deta~l~ ara often recorded in computer data banks in which customer accounts arff~f maintained and where the necessary 5 detfltlng and crcditing is done on a timely bass- $he next Logical extension to such automated electronic record ~ keep~ng systems employing computers, credit carf~s and the '~' like, l~i8 Electronic Funds Transfer Systems, specifically "~ the.direct transfer of funds from, for example, a Person's account to a Retailer's account upon the purchase of an ~'" item in a retail e3tablishment. Such systems greatly '' roduce the paper wor~ required of both the customers and .. ,, ~ . , . ' the retail establishment.

, . . .
.. In order for an ELectronic Funds Transfer system to achieve wide public accéptance it must possess at least the ,. . .

..

following attributes. It must be possible for the Retailer ~or other selling business entity) to adequately identify the Person seeking to make a purchase. Next, procedures must be established so that the Host system ~typically a bank, a savings ~ loan institution, or a network of similar entities) which performs the funds transfer is certain that both the Person and the Retailer have agreed on the details of a particular purchase.

Further, the system procedures must be so structured that neither of the involved parties can repudiate ~he final funds transfer. Secure information transmissions must be provided between the Retailer and the Host system, whereby an eavesdropper on a communication link would not be able to obtain any information. Finally: sufficient inormation must be transmitted to the Host system to allow it to prepare periodic statements to be sent to the Person and the ~etailer. Various other features or attributes may also be included in such a system as will be apparent from the subsequent description of the presently disclosed embodimént of the invention.

Thus, although the basic concepts of Electronic Funds Transfer systems are obvious, the lack of the above safeguards has to date prevented their wide commercial acceptance. However, the devising in recent years of secure and economical cryptographic methods for both communication and storag- of (iinary) data makes it's ~47863 unauthorized decryption and use impossible as long as the encryption .~eys are not com~romised. To establish a standard for government and industry use, the National Bureau of Standards has recently recommended a particular encryption algorithm. This recommendation- is contained in the publication, "Data Encryption Standard," Federal Information. Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Depar.tment of Commerce, January 1977. It describes a key-controlled block-cipher.
system. Such systems require the use of an encryption key consisting of a predetermined number of bits (e.g. 56) which key is employed for both the encryption and the decryption process and hence must be known to both the sender and receiver of enciphered transmissions. Any eavesdroppers w~ll presumably no~ know the keys ~nd will therefore not be able to decrypt the transmissions.

It is accordingly a primary object of the present invention to provide a secure message transmission system for use in an Electronic Funds Transfer-system which communicates with 20 a Host .system. The system utilizes cryptographic technigues whereby any eavesdropper on the transmission .- ,line i3 unable to obtain any information which could later by uséd ~or fraudulent, illegal, or any other purposes.

It ig another object of the invention to provide a message transmission system for use in the Electronic Funds Transfer environment whereby the two parties to a .

1~47863 1 transaction may be assured that only the agreed upon transfer of funds will occur It is a still further object of the invention to provide such a method and apparatus utilizing state-of-the-art electronic hardware and cryptographic methods. The message is first encrypted by the customer using a unique encryption key (Kc) located in his own personal portable transaction device and his data storage and transfer card (DSTC) and this first encrypted message is sent to the bank doubly encrypted. Next the retailer utilizing, in turn, his own unique encryption key (Kr), different from the customers, encrypts the same message and similarly sends it to the bank. The bank utilizing unique retailer, and customer identification data sent with the messages accesses a 'key' file and extracts both the customer's and the retailer's key and decrypts both messages and compares them for identity.
If they are identical in certain required respects, it is presumed that both the customer and retailer agree to the transaction and the appropriate funds transfer is made.
If they do not agree, some sort of default procedure occurs.

~7863 ~

1 In summary, it has been found, that a secure message transmission system for use in Electronic Funds Transfer systems may be effected by utilizing currently available ~key-controlled block-cipher cryptographic methods in conjunction with electronic funds transfer cards and portable transaction terminal devices. Utilizing this system, the Host system which performs the electronic funds transfer may be assured that the Person presenting himself for a particul~r purchase and the Retailer both agree on the terms of the transaction. The Host is protected from the possibility of the Person and Retailer later disagree~ng about some factual details of the transaction and one or the other seekinq to repudiate the transaction.
Further, all three parties to the system, may be certain that no one is capable of intercepting and decoding the messages. Further, the Person may be assured that the Retailer cannot gain access to his personal data and each party is protected against the other party reneging on a transaction or alleging that data was erroneously transmitted. These and other objects, features and advantages of the system will be apparent from the YO977-070 4a .47~
. s following description of the preferred embodiment of the invention.

Background Art ' For a description of the operation of a typical block-cipher ¢ryptographic system, reference is hereby made to U. S. Patent No. 4,798,359 entitled, "~lock-Cipher Cr~-ptographic System", U. S. Patent No. 3,796,830, entitled, "Recirculating Block-Cipher Cryptographic System"; and U. S. Patent No. 3,95a,081, entitled, "310ck-Cipher System for Data Security", all assigned to the same assignee as the present application. These patents geherally describe the concepts involved with 90phisticated, Rey-Controlled Block-Cipher Cryptographic System~ currently known in the art. The later U. S. Patent .
No. 3,958,081 relates to i specific implementation of such a ~lock-Cipher Cryptographic System and much more particularly, a Cryptographic System which conforms to the previously specified Federal Information Processing Standard currentiy in efect in the procurement regulations o the United States Government.

For a descrlption of a personal portable transaction terminal device (XATR~ suitable or use with the presently dis¢losed invention which interfaces with a retailer's point o sale terminal tposT) on the one hand and with the ~ . .

1 Person's data storage and transfer card (DSTC) on the other, reference is made to Canadian Patent No. 1,111,567, issued October 27, 1981, to Paul E. Stuckert, entitled "Personal Portable Terminal For Financial Transactions". Reference to this patent will illustrate a device suitable for usein the present invention wherein the Person has his own keyboard for entering confidential data which he may not wish to pass to the Retailer. Also provided in the XATR device is a display on which data can be selectively displayed.

For a description of a data storage and transfer card (DSTC) suitable for use with the present secure message transmission system, and, further, specifically adapted for use with a personal portable terminal device ~XATR), such as described above, reference is hereby made to U.S. Patent No, 4,295,039, issued October 13, 1981, of Paul E. Stuckert, entitled "Method and Apparatus For Achieving Secure Password Verification". In this patent, a DSTC is disclosed which together with a suitably designed XATR, can store a person's secret encryption key Kp and further incorporates a complete ke~y-controlled block-cipher encryption device therein for encrypting a message. There is further disclosed the use of the XATR for the private entry of data via its self-contained keyboard and the viewing of data on the self-contained display, wherein neither the content of the keyboard entered data nor the displayed data need pass into _.,~

~.47863 the Retaileris POST.

Brief Description of the Drawings .~ .

FIG. 1 is a high level block diagram of a secure message transmission system for use in Electronic Funds Transfer systems.

FIG. 2 is a detalled functional block diagram of a preerred embodiment of the present secure message transmission system illustrating the configur~tion of the sy~tem in a irst mode of operation.

FIG. 3 is a detailed functional block diagram similar to FIG. 2 lllustratiny a second mode of operation.

FIG. ~ is a ~etailed unCtional block diagram similar to FIGS. 2 and 3 illustrating a third mode of operation of the 3ystem.

FIG. SA illustrates the data content of a complete message received at the }lost.

FIG. 5B illustrates the same total message shown in FIG. 5A
in a first phase of message processing performed by the Host.

YOg77-070 - 1~47863 FIG. 5C is similar to FIG. 5B and illustrates a second phase of message processing performed by the Host.

Disclosure of Invention The present invention comprises a method and apparatus for effecting the secure transmission to a Host machine or system (H) of a transaction message (TM) which describes a financial transactlon between a Person (P), and a Retailer (R) in an Electronic Funds Transfer (EFT) environment.

In its broadest aspect the invention comprises a method wherein P and R first agree on the contents of the TM which is to be sent to H where an EFT is to be effected. Next P
sends the common data part of TM to R whose terminal can compare the two texts to assure detailed bit by bit agreement. Then P, employing encryption key Kp encrypts both the common part of TM and other auxiliary information termed Person's Data and communicates them to R. R also receives unencrypted, Person's card number. To all this R
catenates his own version of the common data and information termed Retailer's Data. R, employing encryption ~ey KR, encrypts all of these pieces to form the encrypted portion of TM that is sent to H. As Fig. SA
illustrates, part of the received message is doubly encrypted, part is singly encrypted, and part is i.n the clear. H can decrypt everything and compare the common 3~147,3863 data. Only if the comparison is exact does H transfer funds.

As will be understood, once aNything is Pncrypted under P's key, the contents cannot be altered by R prior to transmittal to H. Without knowledge of P's key, R cannot either decrypt P's message or form a message which is acceptable to H. With the protection afforded by the system, R may store many TM's, involving many different cu~tomers, for subsequent batch transmission to H without any compromise to the security of the individual customers.

Any key-controlled block-cipher Gryptographic communication system assumes the absolute security of the individual enciphermertt keys. There is no way to derive the keys, lS v-n knowing a plethora of clear texts and their paired encry~tlons. ~n c~tvcsdropp~r would hQvc to ol)tall~ ~oth key~ from P, R, or H by some method in order to initiate a ~raudulent EFT by H.

Having thus described the salient features of the present invention there will now follow a description of further details o the data communication protocol of the present systent and subsequently a description of the presently disclosed preferred embodiment.

In order for the overall operating characteristics of the ~1478~3 1(~

present message transmlssion system to be understood, it is first necessary to understand the format and contents of an indiv~dual TM. The content of such a message for use with , the present system is as follows:

(1) Each TM contains the date of the transaction and the time to the nearest second so that every TM will be unique even though it could be the same in all other respects.
ThiS prevents the multiple use of the same message.

~2) The specific amount of money involved in the " 10 transaction.

~3) A specification as to whose account ~P's or R's) shall be debited and whose credited.

.

~4) A post date, if any, may be specified. In the course o~ the transaction P and R may, by mutual consent, agree agree on a post date, or it may be agreed upon in advance, e.g., the last day of any month.

~5) The unique number of P's Data Storage and Transfer Card (DSTC,) must be specified. This information is necessary in order ~or the Host to,obtain the encryption key Kp from its own key storage files. The way this particular number is formatted in the TM and sent to H, and the way H
utilizes the same will be set ~orth subsequently.

Yo977-070 ~47863 (6) The type of account (e.g., credit, charge, bank, debit, etc.) may be specified by P. This, of course, presumes that the system 'includes different account types.
Normally, the account type designation would specify a p~rticular H. Presumably, both the P and R would have accounts with a particular H in order for the fund transfer to be effected. Alternatively, Hosts with clearing house functions could be involved.

~7) The retailer R's business number.

,, .
It should be understood that P's DSTC number and Rls business number may be utilized by H to determine account and equipment identification information. Alternatively, this information could be transmitted by P and R. This type of information might include types of accounts (mentioned above) and hardware identity informatian such as the type DSTC ~assuming diffexent models might exi~t), the type o~ XATR used by P, and the type of Point of Sale Terminal ~POST), storage, and other equipment used by R.

Additional items could be included within a TM which would come under the heading of'Person's Data and Retailer's Data as 3hown' in FIGS. SA through 5C. Items such as account balances, description of merchandise purchased, whether or not the item was on sale, and other pieces of information could be included. However, it is believed that such additional information should be properly' tailored to the - Yo977-070 ~478~3 needs of the particular R and H and, as such, form no part of the present invention.

Referring now to FIG. 1, a high level block diagram of an EFT system as it would be configured for the presently disclosed secure message transmission system is shown.
Three distinct entities are specified, the Person (P), the Retailer (R) and the Host system (H). Shown also i9 a communication link (COMM) link for interconnecting the retailer's point of sale terminal with the Host system.
Vertical dashed lines represent interfaces between the entlties, the most significant one be m g that between P and R. The R's POST is connected to P's XATR device by any auitable means such as described in the previously referenced copending application. Similarly, P's DSTC is ~hcwn in data transer relationship with the XATR. For purposes o description P 1 9 DSTC and XATR may be considered as one functional unit wherein the XATR contains a keyboard and a display. The operation of the DSTC will be explained subsequently with re~pect to FIGS. 2 through 4. The mlnimum requirements of P's DSTC/XATR combination are a keyboard, a display, means for storing all or part of P's unique encryption key Xp, means for storing the unique number of the DSTC and encryption circuit means for performing the appropriate key-controlled block-cipher encryption of a given TM. Optionally the DSTC should have tran~action storage for storing the TM for each transaction entered into by P, said storage being capable of being 1~7863 subsequently read out for P's personal use or to check any account statement received.from H. Additionally, registers must be provided in both P's ,DSTC and R's POST for storing the e}ements of.a given TM. ~'s POST must also have a keyboard and display .for R's sales personnel to appropriately enter transaction data and should also ~,. include a clock for entering the aforementioned date and time of day into' the TM.
' e structure of H forms no part of the present invention and the various functions required of H may be readily , performed by known programming techniques or dedicated hardware. These functions include: given P's card number and P's additïonal account information, H can by table loo~-up determine the specific number of any account de,glgnated by P and P's encryption key Kp. Similarly, glven R'~ bu~iness number and various account identifying info;rmation H can by table look-up determine the number of the account designated by R and R's encryption key KR.

With the two encryption keys Kp and KR, as will be explained subsequently, H can decrypt the singly and doubly encrypted portions o~ the T~l received from R and, having done thi~, can compare certain portions of the received TM
for identity.

H can also determine if two message~ involving the same P
, 25 and bearing the same date and time are received b~ H, in ~4786;~
, 1~

which event the redundant or stale second message is rejected.

Further, H is assumed to have the necessary accounting routines for debitlny a specific account of P and crediting the specified account of R. Conversely, an account of P
can be credited, and an account of R can be debited in the case of a "credit" transaction between P and R.

H is also assumed to have the ability to store properly authenticated TMs for funds transfer operations on a future date specified by a post date in the TM.

It should be noted that in FIG. 1 R is shown having a Local Host. A local Host gathers TMs prepared by POSTs within a given retail establishment or group Qf e~tablishments.
The~e TMs would be temporarily stored and subsequently sent to the overall system ~lost in a batch. The disadvantage of thig mode of operation is that a mistake or attempted fraud on the part of either P or R would not be detected until some time after the actual purchase.

Before proceeding with a detailed description of the preferred embodiment of the invention as set forth in FIGS.
2, 3 and 4, there will first follow a general description of the operation of the system as set forth in FIGS. 5A, 5B
and SC.

~1478~;3 _ 15 Referring to FIG. 5A, the whole TM format is clearly shown insofar as the data content is concerned. This is the minimal data content which must be ultimately received from R by H, wherein said TM is a catenation of clear, singly encrypted, and doubly encrypted portions. From right to left in the figure, it will be noticed that R's business number is clear and it is with this portion of the message that H is able to obtain R's encryption key KR, with which the remainder of the TM is decrypted. It will be noted that the singly encrypted portion of the message includes the person's DSTC card number, the transmission message common data (TM1) and an additional section denoted as retailer's data, which is comprised of 'v~rious account pointers, equipment data, etc., unique to the ~etailer.

Similarly, the doubly encrypted portion of the original transmission mes~age includes that portion of the transmission message encrypted by P's DSTC and XATR, and communLcated to R. It will also be noted that a portlon of the transmission message labeled as the person's data which, like the retailer's data, would further identify the account, the equipment types of both the DSTC and the XATR, and possibly additional financial data such as account balances, etc., may al~o be included in the TM but need not form a part'of the common data. It is termed TM2.

P's DSTC number is transmitted to R in the clear and retransmitted to H in singly encrypted form so that the ~78t;3 person's DSTC number may be employed by H af~er step 2.
With this number P's encryption key Kp may be obtained by H from'its appropriate key file. FIG. 5B'illustrates step 2 in the process. During this operation, as is apparent from the figure, the singly encrypted portion of the transmission message is decrypted and the items indicated as the P's DSTC card number, Transmission Message Common Data, and the Retailer's Data is now available to H in clear form. Similarly, the portion~ of the transmission message indicated as Transmission Message Common Data of P
and the Person's Data is now only singly encrypted.

FIG. 5C illustrates step 3 at H, wherein it is assumed that H has obtained the Person's encryption key Kp utilizing P' 8 ~STC card number made available via step 2, and decrypt8 the now singly encrypted portion of the message u~ing Kp. The result i8 shown in FIG. 5C, wherein all portion~ o the received TM are in clear form.

At this point, H examines the two portions of the TM common data and compares them for identity. If they are identical, the Host performs whatever operation or transaction ha~ been specified. If there is a non-compare, both partie~ involved are notified so that they may initiate corrective measures.

Best Mode for Carrying out the Invention ~47863 !7 Referrinq now to FIGS. 2, 3 and 4, the functional units and data flow are illustrated for the three different operating modes which occur during the formation of the composite transaction message which is ultimately sent from R to H.
It will be noted that all three figures show identical hardware components, the difference being in the data flow in P's and R's equipment employed in the formatlon of the various portions of the message.

Assume that P and R have reached a purchase agreement relative to some item of merchandise. P connects his XATR, with his personal DSTC mounted therein, to R's point of sale terminal (POST). In the first mode of operation illu~trated in Fig. 2, P's and R's equipment form a loop TM
as a result o~ ke~board entries by P or R or by both. In thls mode P's DSTC number is inserted into the message str~am by P's XATR, and R's POST automatically in9erts the date, time, ~'g business number, and R's account type. The amount, debit person, credit person, and post-date, if any, ars ~hown on P's and R's displays.

By the keyboard 14 on his XATR, P specifies an account pointer, if desired, which would be placed into the personal data portion for P of the TM shown in FIGS 5A
through 5C.

Singly or jointly P and/or R, by appropriate entries on ~147~63 keyboards 14 and 24, cause the transaction data and the post date (if any) to be inserted in the Loop TM. At this point, the Loop TM mode is complete and P and R both inspect their displays for concurrence.

If the displays define the transaction satisfactorily, P
and R each depress "execute" buttons on ~heir equipment, causing the following sequential actions to occur. P's XATR stores in register 12 located in P's DSTC, the data consisting of the date, time, amount, debit person, credit person, post date (if any), business number, and account type. R's POST stores the same data in r0gister 22. This data 90 stored is the "common data" that must match, first for any transmission to H, and secondly witllin ll to initiate a funds transfer.

It should be noted that by proper operation of Switch S6, R
may add certain dcscriptive h~rdware data to TM1, l'his is indicated by the block entitled Retailer's Data in FIGS. 5A
through 5C. Although, the Retailer's Business Number' is transmitted in clear form, it will be noted that this is part of the common transmission message data which will be utilized in the ultimate comparison at the Host, Similarly, referring to FIG. 5A, the block entitled 'Person's Card ~DSTC) Number' is shown singly encrypted.

This data also forms part of the common transmission 25 message data of TM2 and is subsequently used in the comparison process.

.

1~47863 , Next the switches S1, S4, and SS reconfigure the circuitry of the XATR and the POST. P then transmits his copy of all this common data to R and switch 8 routes it to a comparator for a bit by bit comparison and validation. If this data compares with that already stored in the POST, R
encrypts it, together with other Retailer's data and sends it to the host along with R's business number in the clear, with switches as as shown by Figure 4. Following this P
singly encrypts, using his key Kp the common data, together with any other desired Person's data, adds his XATR card number in the clear, and transmits all this to R. At R this data i~ further encrypted by R, employing ~ey XR, and transmitted to H. Figure A shows the format of all this data as it is received by H. Figure 1 summarizes the data components of TM.
, ~47~ti3 TRANSACTION MESSAGE COMPONEN_S

1. RETAILER'S BUSINESS NVMBER

2. PERSON'S CARD NUMBER

DATE
. TIME
POST DATE (if any) AMOUNT
3. LOOP TM DE~IT PERSON (RETAILER) CREDIT PERSON (RETAILER) MERCHANDISE DESCRIPTION (optional) PERSON'S ACCOUNT TYPE (optional) RETAILER'S ACCOUNT TYPE (optional) ACCO~NT POINTER
4. RETAILER'S TERMINAL MAKE ~ND MODEL

SECURITY INFORMATION

ACCOUNT POINTER
5. PERSON'S TRANSACTOR MAKE AND MODEL
DATA CARD MAKE AND MODEL

~47863 As stated previously, as an alternative to R's sending the just completed transaction message to H he may either store it in local storage within his POST or within a local ~ost until a suitable number of transactions are accummulated.
At this point, they may all be forwarded to H in a batch for processing. As stated previously, such option has the disadvantage. of not allowing R to reconcile any discrepancies with P if subsequently such discr.epancies are detected by H.

Upon completion of the transmission of the message to ~, the transaction is completed insofar as P and R are concerned unless some sort of mismatch occur~ and'they are notified by H of some discrepancy. In such events R would initiate a retry or take some other corrective measure.

,The operation of H described.in detail in the Disclosure of the Invention section de6crlbos, the operatlons performed by the Host in sequentially accessing the keys KR and Kp for decrypting,the, received messages and making the required comparison of the common data prior to acceptance. of the transaction.

, It should be clearly understood that the herein disclosed system constitutes a Best Mode, however, many changes in form and deta~l could readily be made without departing from the essential features of the invention.

11~7863 Also, as stated previously, some of the data stored in the registers 16 and 26 may be either deleted or expanded, depending upon the particular installation, and the fineness of control desired.

Additional transaction storage could also be provided in Pis DSTC as mentioned previously (and illustrated in FIG. 1) so that the data for all transactions entered into by P would be stored. This data could then be printed or displayed at an appropriate terminal at a time chosen by P.

The disclosed embodiment of FIGS~ 2 to 5 is essentially functional in nature. It will be appreciated that the actual control circuitry would consist of high speed electronic switches having appropriate microprocessor con,trollers for the actuation thereof. The provision of ~uch hardware details would be obvious to those skilled in the art ~rom the herein disclosed functional block diagrams and the detalled description of their operations.

Industrial APplicability The present securé , message transmission system has particular applicability to the retail sales and banking fields wherein point of sale terminals located in retail establishments are connected over low security public communication links to a central Host computer located, for 3~147863 example, in a bank where an electronic funds transfer operation is to take place.

The system renders practical the concept of electronic funds transfer utilizing currently available equipment. It allows the parties to such a funds transfer operation to have a high degree of confidence in the integrity of the system.
'' "' .' .

The use of the key-controlled block-cipher cryptographic systems currently available assures all three parties, P, R
and H, that there is substantially no risk of the unauthorized interception and raudulent use of any data contained in the transaction messayes passing over public communication lin~s. Furthermore, transmiss.ion errors are always detected because in such events the decryptions are garbled.

The Host, due to the protocol of the system is assured that lf the common message data in the messages, TM1 and TM2, are the same, that he may proceed with the electronic funds tra~sfer operation. He is further assured that neither of the parties ~ or R will be able to later repudiate the tran~action, since it would be virtually impossible to forge either TM1 or TM2 without knowledge of the requisite encryption keys which would assumedly not be available to a fraudulent party.

R may have ultimate faith in the reliability of the system YO977-0~0 since the message TMl is singly encrypted under his own key KR and that key is not available to P for any possible alteration.

Similarly, P is as.sured that there is no possibility.of R' 5 altering P's message TM2 which is transmitted to R in encrypted form since there is assumedly no way that R could have possession of P's encryption key Kp. This is because key Xp never.passes into the possession of R at any time.

While the system is believed to have primary applicability in the retail merchandise fie.ld as described hereinabove, it is submitted tha.t certain of the underlying principles could be adapted to somewhat different business situations. For example, such a sys`tem could be installed in a stock broke~age office where it was desired to purchase stock via 15 30mo sort of identification card 3uch as a DSTC in the pos~ession of the person. In this case, the retailer would be the qtockbroker, who would communicate the transaction to a common banking institution where both P and the stockbroker had.accounts. A further application might be in the banking.industry where the retailer would be replaced by either a cash issuing terminal, or a remote teller location in a large bank system.

It will also be noted .that the present system does not mention the additional security measures would in all probability be utilized in many installations, however, they YO977-070 . .

~ 7863 ~5 would be add-on features to the system herein disclosed and do not directly relate to the present invention.

Claims (12)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A method for effecting the secure transmission to a Host machine or system (H) of a transaction message (TM) which describes a financial transaction between a Person (P) and a Retailer (R) in an Electronic Funds Transfer (EFT) environment, said method comprising the Person (P) and the retailer (R) agreeing on at least a predetermined portion of the contents of the transaction message (TM) which is to be sent to a Host (H) where the Electronic Funds Transfer is to be effected, separately encrypting the message (TM) under the two respective secret encryption keys Kp and KR to form messages (TM, Kp) and (TM, KR), communicating the message (TM, Kp) to R, R further encrypting same under the key KR to form a doubly encrypted message ((TM, Kp), KR), transmitting the complete message [((TM, Kp), KR,) + (TM, KR)] to H, H accessing the two private keys Kp and KR from its own secret files and decrypting the message received from R to recover the two originally encrypted transaction messages (TM), H then comparing portions of the two separately decrypted transaction messages (TM) for identity and if identical, completing the transaction.
2. A secure message transmission method as set forth in claim 1 including P and R separately constructing predetermined portions of said transaction original message (TM) prior to encryption and comparing said separately constructed portions for identity.
3. A secure message transmission method as set forth in claim 1 including R first constructing the predetermined portion of said transaction message (TM) and then commuting same to P, P displaying and examining same and if satisfactory encrypting. the approved TM under his encryption key Kp, P then forwarding the so encrypted message (TM, Kp) to R, and R further encrypting same under his key KR and forwarding same to H.
4. A secure message transmission method as set forth in claim 3 including P transferring the message TM to R
in the clear after approval of same, and R encrypting same under his key KR to form the message segment (TM, KR) to form part of said transmission message being forwarded to H.
5. A secure message transmission method as set forth in claim 1 including R inserting a time value in the predetermined portion of said transmission message indicating the time of day and the date and H, upon receiving the transmission from R, checking the time of day and date to make certain it agrees with his own clock value within predetermined limits before approving said transaction message.
6, A method for the secure transmission of messages in Electronic Funds Transfer systems wherein it is required that a Host (H) be reasonably guaranteed that a Person (P) and a Retailer (R) agree on the transaction before the funds transfer takes place, said method comprising P encrypting first, his version, of a predetermined portion of a transaction message (TM) using a unique encryption key (Kp) stored in a secure storage location in his own Personal portable terminal equipment, to form an encrypted message (TM, Kp), P transferring said predetermined portion of the encrypted message to R's terminal, R who further encrypting the message received from P under his own key KR to form the doubly encrypted message ((TM, Kp), KR) and transmitting same to H, R substantially concurrently also encrypting his version of the predetermined portion of said transaction message TM under his key KR to form the message (TM, KR) and transmitting same to H, H upon receipt of said two transmissions from R first accessing the two unique encryption keys of P and R, Kp and KR, H decrypting both said singly encrypted and doubly encrypted messages and comparing the two versions of the predetermined portions of the transaction message TM for identity and if equal, accepting the transaction for entry.
7. A secure message transmission method as set forth in claim 6 including R transmitting identification data for P to H in singly encrypted form under his key KR
and his own identification data, and H utilizing this identification data to sequentially access the two keys KR and Kp from a secure storage location.
8. A secure message transmission method as set forth in claim 7 including the step of R transmitting all of said messages to H encrypted under a transmission key KT in addition to the aforementioned encryptions and H upon receipt of messages from R first decrypting said messages under said transmission key KT.
9. A secure message transmission method for use in an Electronic Funds Transfer system wherein a Host entity (H) must be assured that a Person (P) and a Retailer (R) agree on the details of an Electronic Funds Transfer (EFT) transaction that is to be performed by H, said method comprising, P and R agreeing on and cooperatively forming a common transaction message (TM) with a portable transaction terminal unit in the possession and under complete control of P and with a point of sale terminal under the control of R, said agreed transaction message including time and date information to be utilized in subsequent validation operations, both P and R storing their own respective copies of said agreed upon transaction message in their own terminal equipment, P encrypting said common transaction message (TM) under his Personal encryption key Kp to form a singly encrypted message, (TM, Kp) and transferring same to R, R further encrypting said received message under his key KR to form a doubly encrypted message ((TM, Kp), KR)) and transmitting same to the Host, as a first message segment, P next transmitting the common transaction message of TM to R in the clear, R comparing said common transaction message of TM to R with the previously agreed upon transaction message stored in his terminal and if there is agreement R encrypting the common message of TM under his key KR to form a second message segment (TM, KR) and R transmitting this message segment to H, R also sending to H
together with said first and second message segments a third message segment containing P's identification data singly encrypted under R's key KR and R's identification number in the clear, H, upon recelpt of said three message segments first accessing KR using R's identification number, and. then decrypting the message segment containing P's identification number utilizing the accessed key KR, accessing P's encryption key Kp using P's identification number, decrypting the singly encrypted message (TM, Kp) and the doubly encrypted message ((TM, Kp), KR) using said two keys KR and Kp respectively and comparing the two common transaction message portions of TM
contained in said two message segments and, if equal, approving said transaction.
10. A secure message transmission apparatus for use in an electronic funds transfer system wherein it is required that a Host (H) be reasonably guaranteed that a Person (P) and a Retailer (R) agree on the transaction details before the funds transfer takes place, said apparatus comprising in combination:
a terminal under control of R including; a keyboard for entering transaction data by R, a display for visually observing and checking data entered, secure storage means for storing part of all of a unique encryption key KR, a key-controlled block-cipher encryption unit operable under the key KR for encrypting transaction messages to be sent to H, clock means for inserting time and date data into the transaction message and means for transmitting R's identification number to H, a portable transaction terminal device uniquely under the control of P, adaptable for interfacing with R's terminal in a data exchange relationship, said device including; display means for displaying predetermined transaction message data to be sent to H, keyboard means for selectively entering data and commands into the device, storage means for storing account data unique to P, secure storage means for storing P's unique encryption key Kp, and a key-controlled block-cipher cryptographic unit identical to or compatible with that in R's terminal for encrypting transaction data under control of said stored key Kp, a Host computer (H's CPU) connected to R's terminal adapted to receive encrypted' messages therefrom, H's CPU including a key-controlled block-cipher cryptographic unit identical to or compatible with those in R's terminal and P's portable terminal device for decrypting messages received from R, secure storage means for storing the unique encryption keys Kx's of all Retailers (R) using the system and of all the Persons (P) using the system, means to access specific encryption keys from said secure storage means utilizing special identification data transmitted to H from R together with the transaction message, said combination further including control means in P's and R's terminals for entering common transaction message data and for displaying same on the display means in both terminals for approval by P and R and, if satisfactory, means in R's terminal for encrypting said common transaction data message under R's encryption key KR and sending same to H, control means in P's terminal device for first encrypting said common transaction data message under P's encryption Kp to form a message (TM, Kp) and transmitting same to R, and means in K's terminal for further encrypting the singly encrypted message received from P to form a message ((TM, Kp) KR) and sending same to H, means in R's terminal for transmitting to H
both P's and R's identification data, means in H's CPU
for extracting the two keys, Kp and KR from the secure storage means, utilizing the two identification data received from R, and first decrypting the two transaction messages received from R, encrypted under the key KR and next decrypting that portion of the transaction message which was additionally encrypted under the key Kp and comparing the common portions of the transaction messages for identity, and if identical performing the requested transaction.

11. An electronic funds transfer system as set forth in
claim 11 wherein the data and control lines between R's terminal and P's portable terminal device prevent P's unique encryption key Kp from even being readable from P's terminal device and control means in P's device whereby only transaction data first approved by P may be encrypted by P's encryption unit.

12. An electronic funds transfer system as set forth in
claim 12 wherein P's Personal portable terminal device includes a first unit, including a display means, a keyboard means for entering both data and commands, arithmetic and logic circuitry and required storage registers for performing predetermined arithmetic operations on data entered into said device, and a second unit physically associatable with said first unit in data exchange relationship therewith comprising a data storage and transfer card containing storage means for storing Personal data unique to P
including account information, P's account identification number, and part or all of P's unique encryption key Kp.
CA000363344A 1979-12-28 1980-10-27 Method and apparatus for secure message transmission for use in electronic funds transfer systems Expired CA1147863A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US108,071 1979-12-28
US06/108,071 US4302810A (en) 1979-12-28 1979-12-28 Method and apparatus for secure message transmission for use in electronic funds transfer systems

Publications (1)

Publication Number Publication Date
CA1147863A true CA1147863A (en) 1983-06-07

Family

ID=22320127

Family Applications (1)

Application Number Title Priority Date Filing Date
CA000363344A Expired CA1147863A (en) 1979-12-28 1980-10-27 Method and apparatus for secure message transmission for use in electronic funds transfer systems

Country Status (8)

Country Link
US (1) US4302810A (en)
EP (1) EP0032193B1 (en)
JP (1) JPS601628B2 (en)
AU (1) AU533865B2 (en)
BR (1) BR8008516A (en)
CA (1) CA1147863A (en)
DE (1) DE3065401D1 (en)
ES (1) ES498164A0 (en)

Families Citing this family (124)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE426128B (en) * 1981-04-08 1982-12-06 Philips Svenska Ab METHOD FOR TRANSFER OF DATA MESSAGES BETWEEN TWO STATIONS, AND TRANSFER PLANT FOR EXECUTING THE METHOD
IE820411L (en) * 1982-02-25 1983-08-25 L M Ericsson Ltd Portable device for storing and transferring data
EP0118995A1 (en) * 1983-02-22 1984-09-19 BRITISH TELECOMMUNICATIONS public limited company Generation of identification keys
CA1235224A (en) * 1983-08-19 1988-04-12 Eiji Okamoto Device for calculating a charge for a charged information signal with errors avoided in a report of the charge
GB2146814A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
GB2146815A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
US4630201A (en) * 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
DE3412663A1 (en) * 1984-04-04 1985-10-17 Siemens AG, 1000 Berlin und 8000 München CHIP CARD SYSTEM
US4691355A (en) * 1984-11-09 1987-09-01 Pirmasafe, Inc. Interactive security control system for computer communications and the like
US4694492A (en) * 1984-11-09 1987-09-15 Pirmasafe, Inc. Computer communications security control system
US5367572A (en) * 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US4720860A (en) * 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
US4998279A (en) * 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5168520A (en) * 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
US4679236A (en) * 1984-12-21 1987-07-07 Davies Richard E Identification verification method and system
US4650978A (en) * 1985-01-23 1987-03-17 Rmh Systems, Inc. Off line cash card system and method
US4888798A (en) * 1985-04-19 1989-12-19 Oms, Inc. Modular software security
US5898762A (en) * 1985-07-10 1999-04-27 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system
US6678360B1 (en) 1985-07-10 2004-01-13 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system
US5828734A (en) 1985-07-10 1998-10-27 Ronald A. Katz Technology Licensing, Lp Telephone interface call processing system with call selectivity
US20040071278A1 (en) * 1985-07-10 2004-04-15 Ronald A. Katz Multiple format telephonic interface control system
US6449346B1 (en) 1985-07-10 2002-09-10 Ronald A. Katz Technology Licensing, L.P. Telephone-television interface statistical analysis system
US5359645A (en) 1985-07-10 1994-10-25 First Data Corporation Inc. Voice-data telephonic interface control system
US5218631A (en) * 1985-07-10 1993-06-08 First Data Resources Inc. Telephonic-interface game control system
US5835576A (en) * 1985-07-10 1998-11-10 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface lottery device
US5255309A (en) * 1985-07-10 1993-10-19 First Data Resources Inc. Telephonic-interface statistical analysis system
US4845739A (en) 1985-07-10 1989-07-04 Fdr Interactive Technologies Telephonic-interface statistical analysis system
US5365575A (en) * 1985-07-10 1994-11-15 First Data Resources Inc. Telephonic-interface lottery system
US5793846A (en) 1985-07-10 1998-08-11 Ronald A. Katz Technology Licensing, Lp Telephonic-interface game control system
US4760532A (en) * 1985-12-26 1988-07-26 Pitney Bowes Inc. Mailing system with postage value transfer and accounting capability
US4855920A (en) * 1985-12-26 1989-08-08 Pitney Bowes, Inc. Postage accounting device
FR2592510B1 (en) * 1985-12-31 1988-02-12 Bull Cp8 METHOD AND APPARATUS FOR CERTIFYING SERVICES OBTAINED USING A PORTABLE MEDIUM SUCH AS A MEMORY CARD
EP0246823A3 (en) * 1986-05-22 1989-10-04 Racal-Guardata Limited Data communication systems and methods
US5375172A (en) * 1986-07-07 1994-12-20 Chrosny; Wojciech M. Postage payment system employing encryption techniques and accounting for postage payment at a time subsequent to the printing of postage
JP2667818B2 (en) * 1986-10-09 1997-10-27 株式会社日立製作所 Transaction processing method
US4797920A (en) * 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
NL8702012A (en) * 1987-08-28 1989-03-16 Philips Nv TRANSACTION SYSTEM CONTAINING ONE OR MORE HOST STATIONS AND A NUMBER OF DISTRIBUTED ENTRY STATIONS, WHICH ARE LINKABLE THROUGH A NETWORK SYSTEM WITH ANY HOST STATION, AS A CONSTRUCTION STATION AND END STATION SUITABLE FOR THE USE OF USE.
US4837422A (en) * 1987-09-08 1989-06-06 Juergen Dethloff Multi-user card system
US5025373A (en) * 1988-06-30 1991-06-18 Jml Communications, Inc. Portable personal-banking system
JPH03288297A (en) * 1990-04-03 1991-12-18 Omron Corp Transaction processor
US5623547A (en) * 1990-04-12 1997-04-22 Jonhig Limited Value transfer system
DE4027735A1 (en) * 1990-09-01 1992-03-12 Schreiber Hans METHOD AND DEVICE FOR SECURE REMOTE DATA TRANSMISSION
US5163098A (en) * 1990-09-06 1992-11-10 Dahbura Abbud S System for preventing fraudulent use of credit card
GB9027249D0 (en) * 1990-12-17 1991-02-06 Reuters Ltd Offer matching system
US5293319A (en) * 1990-12-24 1994-03-08 Pitney Bowes Inc. Postage meter system
US6486876B1 (en) * 1991-01-29 2002-11-26 Honda Giken Kogyo Kabushiki Kaisha Paperless accounting system
US5657388A (en) * 1993-05-25 1997-08-12 Security Dynamics Technologies, Inc. Method and apparatus for utilizing a token for resource access
US5557518A (en) * 1994-04-28 1996-09-17 Citibank, N.A. Trusted agents for open electronic commerce
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
GB9211648D0 (en) * 1992-06-02 1992-07-15 Racal Datacom Ltd Data communication system
CA2078020C (en) * 1992-09-11 2000-12-12 Rodney G. Denno Combination pin pad and terminal
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
US6868408B1 (en) 1994-04-28 2005-03-15 Citibank, N.A. Security systems and methods applicable to an electronic monetary system
US5799087A (en) * 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
AUPM616994A0 (en) * 1994-06-09 1994-07-07 Reilly, Chris Security system for eft using magnetic strip cards
AU699491B2 (en) * 1994-06-09 1998-12-03 Chris Reilly Security system for EFT using magnetic strip cards
US5907597A (en) * 1994-08-05 1999-05-25 Smart Tone Authentication, Inc. Method and system for the secure communication of data
US5583933A (en) * 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
US5915023A (en) * 1997-01-06 1999-06-22 Bernstein; Robert Automatic portable account controller for remotely arranging for transfer of value to a recipient
US5694472A (en) * 1995-02-13 1997-12-02 Eta Technologies Corporation Personal access management system
US5610980A (en) * 1995-02-13 1997-03-11 Eta Technologies Corporation Method and apparatus for re-initializing a processing device and a storage device
US5682428A (en) * 1995-02-13 1997-10-28 Eta Technologies Corporation Personal access management system
US5619574A (en) * 1995-02-13 1997-04-08 Eta Technologies Corporation Personal access management system
US5778068A (en) * 1995-02-13 1998-07-07 Eta Technologies Corporation Personal access management system
US5689564A (en) * 1995-02-13 1997-11-18 Eta Technologies Corporation Personal access management system
US5692049A (en) * 1995-02-13 1997-11-25 Eta Technologies Corporation Personal access management system
US5696825A (en) * 1995-02-13 1997-12-09 Eta Technologies Corporation Personal access management system
US5677955A (en) * 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
US5671271A (en) * 1995-05-25 1997-09-23 Henderson; Daniel A. Dialer programming system and device with integrated printing process
US5692132A (en) * 1995-06-07 1997-11-25 Mastercard International, Inc. System and method for conducting cashless transactions on a computer network
AUPO201196A0 (en) 1996-08-29 1996-09-19 Xcellink Corporation Funds transfer system and method
EP0956673A4 (en) 1996-12-20 2005-04-06 Financial Services Technology Method and system for processing electronic documents
US6317832B1 (en) 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
US6575372B1 (en) 1997-02-21 2003-06-10 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
WO1998040982A1 (en) 1997-03-12 1998-09-17 Visa International Secure electronic commerce employing integrated circuit cards
US6041411A (en) * 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6385723B1 (en) 1997-05-15 2002-05-07 Mondex International Limited Key transformation unit for an IC card
US6328217B1 (en) 1997-05-15 2001-12-11 Mondex International Limited Integrated circuit card with application history list
US6164549A (en) * 1997-05-15 2000-12-26 Mondex International Limited IC card with shell feature
US6220510B1 (en) 1997-05-15 2001-04-24 Mondex International Limited Multi-application IC card with delegation feature
US6488211B1 (en) 1997-05-15 2002-12-03 Mondex International Limited System and method for flexibly loading in IC card
US6030288A (en) * 1997-09-02 2000-02-29 Quixotic Solutions Inc. Apparatus and process for verifying honest gaming transactions over a communications network
US6357665B1 (en) 1998-01-22 2002-03-19 Mondex International Limited Configuration of IC card
US6736325B1 (en) 1998-01-22 2004-05-18 Mondex International Limited Codelets
US6742120B1 (en) 1998-02-03 2004-05-25 Mondex International Limited System and method for controlling access to computer code in an IC card
JP3545620B2 (en) * 1998-11-13 2004-07-21 株式会社東芝 Paid broadcast viewing information collection method, information collection method, broadcast receiver, transmission method
AU1983300A (en) * 1998-12-30 2000-07-24 Koninklijke Kpn N.V. Method and device for cryptographically processing data
US6823068B1 (en) * 1999-02-01 2004-11-23 Gideon Samid Denial cryptography based on graph theory
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
FI20000194A0 (en) * 2000-01-31 2000-01-31 Jarkko Valtanen The method of trading
AU3259101A (en) * 2000-02-18 2001-08-27 Cypak Ab Method and device for identification and authentication
US7272572B1 (en) * 2000-03-20 2007-09-18 Innovaport Llc Method and system for facilitating the transfer of intellectual property
WO2001095078A1 (en) * 2000-06-06 2001-12-13 Ingeo Systems, Inc. Creating and verifying electronic documents
US7487364B2 (en) * 2001-01-16 2009-02-03 Nagracard S.A. Method to store encrypted data
US20020123935A1 (en) * 2001-03-02 2002-09-05 Nader Asghari-Kamrani Secure commerce system and method
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
WO2002099598A2 (en) 2001-06-07 2002-12-12 First Usa Bank, N.A. System and method for rapid updating of credit information
US7266839B2 (en) 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US20180165441A1 (en) 2002-03-25 2018-06-14 Glenn Cobourn Everhart Systems and methods for multifactor authentication
US20030204741A1 (en) * 2002-04-26 2003-10-30 Isadore Schoen Secure PKI proxy and method for instant messaging clients
FR2841020A1 (en) * 2002-06-13 2003-12-19 St Microelectronics Sa AUTHENTICATION OF AN ELECTRONIC LABEL
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
US9064281B2 (en) 2002-10-31 2015-06-23 Mastercard Mobile Transactions Solutions, Inc. Multi-panel user interface
US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US20040230534A1 (en) * 2003-05-12 2004-11-18 Digital Matrix Systems, Inc. Encrypted credit application processing system and method
US20050144128A1 (en) * 2003-12-30 2005-06-30 Mccoppin Phillip A. Mechanism and process for processing financial transactions
US8127137B2 (en) 2004-03-18 2012-02-28 Digimarc Corporation Watermark payload encryption for media including multiple watermarks
JP2006033326A (en) * 2004-07-15 2006-02-02 Toshiba Corp Storage medium processing method, storage medium processor, and program
US20080288410A1 (en) * 2004-10-06 2008-11-20 Yuichi Nino Content Distribution System
US20080282331A1 (en) * 2004-10-08 2008-11-13 Advanced Network Technology Laboratories Pte Ltd User Provisioning With Multi-Factor Authentication
WO2006124841A2 (en) * 2005-05-17 2006-11-23 Telcordia Technologies, Inc. Secure virtual point of service for 3g wireless networks
US20070050303A1 (en) * 2005-08-24 2007-03-01 Schroeder Dale W Biometric identification device
US20130332343A1 (en) 2005-10-06 2013-12-12 C-Sam, Inc. Multi-tiered, secure mobile transactions ecosystem enabling platform comprising a personalization tier, a service tier, and an enabling tier
EP2024921A4 (en) 2005-10-06 2010-09-29 C Sam Inc Transactional services
US20140089120A1 (en) 2005-10-06 2014-03-27 C-Sam, Inc. Aggregating multiple transaction protocols for transacting between a plurality of distinct payment acquiring devices and a transaction acquirer
EP1804220A1 (en) * 2005-12-29 2007-07-04 AXSionics AG Method for authorised provision of a service and portable device for the implementation thereof
GB0601700D0 (en) * 2006-01-27 2006-03-08 Claricom Ltd Printing Method
WO2008054512A2 (en) 2006-04-19 2008-05-08 Stepnexus Holdings Methods and systems for ic card application loading
US10664815B2 (en) * 2007-09-17 2020-05-26 Catalina Marketing Corporation Secure customer relationship marketing system and method
US20160210491A9 (en) * 2008-09-30 2016-07-21 Apple Inc. Systems and methods for secure wireless financial transactions
FR2945144B1 (en) * 2009-04-29 2011-07-08 Parkeon METHOD FOR MANAGING A CENTRALIZED PARKING PAYMENT SYSTEM AND CENTRALIZED PARKING PAYMENT SYSTEM
EP2767110A4 (en) 2011-10-12 2015-01-28 C Sam Inc A multi-tiered secure mobile transactions enabling platform
US9794392B2 (en) 2014-07-10 2017-10-17 Hand Held Products, Inc. Mobile-phone adapter for electronic transactions

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3544769A (en) * 1967-04-05 1970-12-01 Digital Identification Systems Electronic identification and credit card system
US3636520A (en) * 1970-02-05 1972-01-18 Charles Donald Berteau Computer system for improved data transmission
US3852571A (en) * 1970-05-18 1974-12-03 Hempstead Bank System of transferral of funds
US4198619A (en) * 1976-10-28 1980-04-15 Atalla Technovations Corporation Programmable security system and method
GB1561482A (en) * 1976-11-18 1980-02-20 Ibm Protection of data processing system against unauthorised programmes
GB1576463A (en) * 1977-02-04 1980-10-08 Diebold Inc System and method for verifying authorized holders of identification cards
FR2394131A1 (en) * 1977-06-07 1979-01-05 Cii Honeywell Bull INFORMATION PROCESSING SYSTEM PROTECTING THE SECRET OF CONFIDENTIAL INFORMATION
US4138057A (en) * 1977-07-08 1979-02-06 Atalla Technovations Card, system and method for securing user identification data
CA1111567A (en) * 1977-12-30 1981-10-27 Paul E. Stuckert Personal portable terminal for financial transactions
FR2417141A1 (en) * 1978-02-09 1979-09-07 Travaux Indls Pour Electricite Card reading control system - interrogates card using security code which is deciphered by card circuit, then transmits coded reply to system

Also Published As

Publication number Publication date
DE3065401D1 (en) 1983-11-24
JPS56123589A (en) 1981-09-28
ES8202168A1 (en) 1982-01-01
AU533865B2 (en) 1983-12-15
ES498164A0 (en) 1982-01-01
US4302810A (en) 1981-11-24
EP0032193B1 (en) 1983-10-19
EP0032193A1 (en) 1981-07-22
JPS601628B2 (en) 1985-01-16
AU6410080A (en) 1981-08-20
BR8008516A (en) 1981-07-21

Similar Documents

Publication Publication Date Title
CA1147863A (en) Method and apparatus for secure message transmission for use in electronic funds transfer systems
US4386266A (en) Method for operating a transaction execution system having improved verification of personal identification
EP0047285B1 (en) A system for authenticating users and devices in on-line transaction networks
US9836745B2 (en) Secure payment card transactions
US7853529B1 (en) Method and device for generating a single-use financial account number
US7844550B2 (en) Method and device for generating a single-use financial account number
EP0068805B1 (en) End-to-end encryption system and method of operation
US4295039A (en) Method and apparatus for achieving secure password verification
US4259720A (en) Security system for electronic funds transfer system
EP0385400B1 (en) Multilevel security apparatus and method with personal key
US4536647A (en) Pocket banking terminal, method and system
JPH0334641A (en) Method of encrypting transmission data using special key
JP2003519420A (en) Trading system with security
EP0798657B1 (en) Virtual shop computer network system which displays member shops and member shop certification method
JPS59123968A (en) Validity testing method and apparatus for identification code
JP4903346B2 (en) Improved method and system for processing secure payments across computer networks without pseudo or proxy account numbers
CA1165445A (en) Method for operating a transaction execution system having improved verification of personal identification
KR20010100473A (en) Financial exchange method with secret code being secured by encryption on the internet and recording material for that
GB2079504A (en) Security system for electronic funds transfer system
JP2002169959A (en) Financial system
Kemp Security in information systems: the identification of risks in selected electronic banking applications: a thesis presented in partial fulfilment of the requirements for the degree of Master of Business Studies in Information Systems at Massey University
Kemp Security in Information Systems: The identification of risks in selected electronic banking applications
IE49937B1 (en) Security system for electronic funds transfer system

Legal Events

Date Code Title Description
MKEX Expiry