WO1996026505A1 - Free-roaming remote hand-held point-of-sale terminal - Google Patents

Free-roaming remote hand-held point-of-sale terminal Download PDF

Info

Publication number
WO1996026505A1
WO1996026505A1 PCT/CA1996/000104 CA9600104W WO9626505A1 WO 1996026505 A1 WO1996026505 A1 WO 1996026505A1 CA 9600104 W CA9600104 W CA 9600104W WO 9626505 A1 WO9626505 A1 WO 9626505A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
financial transaction
transaction
data
network controller
Prior art date
Application number
PCT/CA1996/000104
Other languages
French (fr)
Inventor
Michael Coveley
Original Assignee
Omega Digital Data Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Omega Digital Data Inc. filed Critical Omega Digital Data Inc.
Priority to EP96902198A priority Critical patent/EP0811210A1/en
Priority to BR9607426A priority patent/BR9607426A/en
Priority to AU46613/96A priority patent/AU4661396A/en
Priority to JP8524497A priority patent/JPH11500550A/en
Publication of WO1996026505A1 publication Critical patent/WO1996026505A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/343Cards including a counter
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0873Details of the card reader
    • G07F7/088Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
    • G07F7/0886Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • G07G1/14Systems including one or more distant stations co-operating with a central processing unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G5/00Receipt-giving machines

Definitions

  • the present invention relates in general to financial transaction recording systems, and more particularly to a portable hand-held financial transaction terminal and to a financial transaction system including a plurality of portable radio frequency (RF) financial transaction terminals operable to establish a radio frequency communications link with a central network controller to transmit financial transaction data thereto.
  • RF radio frequency
  • a portable radio frequency financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a radio frequency transmitter to transmit said transaction and card data to a remote site whereat a transaction can be processed.
  • a financial transaction system comprising: a plurality of portable radio frequency financial transaction terminals to receive transaction and debit, credit or smart card data; and a central network controller in communication with each of said portable radio frequency financial transaction terminals via a RF communications link, said central network controller receiving said transaction and card data transmitted by said portable radio frequency financial transaction terminals and conveying said transaction and card data to a financial institution whereat transactions can be processed.
  • a financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and shock absorbing means acting between said card reader and said housing to inhibit shocks from being applied to said card reader.
  • a financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a pistol grip depending from said housing to facilitate carrying of said terminal, said pistol grip being movable between extended and retracted positions.
  • a financial transaction system is provided in which the user is given a portable RF financial transaction terminal with which to enter transaction data via a keypad or read a UPC bar code on merchandise via a CCD scanner, read their credit, debit or smart card, and obtain a printed receipt of the transaction. All of this may be done while the RF financial transaction terminal and the user's card remain in the total custody of the user. The user is therefore relieved from having to proceed to an ABM, retail platform, cashier's desk, etc.
  • each RF financial transaction terminal includes a motherboard with a main CPU module controlling four input/output interfaces capable of communicating with a bar code reader, a printer, a card reader interface and a radio frequency transmitter/receiver interface.
  • the main CPU module also communicates with a secure module for providing cryptographic security control via a secure chip which interfaces with an RS-232 interface, a speaker, a display and a keypad.
  • a battery backup is provided along with SRAM and flash memory containing start-up routines and system download routines.
  • the RF financial transaction terminal is designed for easy use and includes a simple user card insertion device for reading credit, debit and courtesy cards, as well as read/write sensing for smart card applications.
  • the printer consumes low power and is designed for quiet operation and easy loading of paper.
  • the display preferably comprises an LCD screen incorporating a split screen feature for portraying not only encrypted/driven information via prompting, but also predetermined application software for tracking daily sales, adjusting inventories and audit trails, scheduling, daily accruals, etc.
  • the casing for the RF financial transaction terminal is designed to be convertible from an ergonomic pistol grip shape to a palm grip shape.
  • the present invention provides advantages in that transactions can be carried out at the location of a user without requiring the user to travel to an ABM, retail platform etc. and without requiring the user to give up custody of their card. Also, transactions entered into the RF financial transaction terminals are processed and verified in real-time since the transaction data is forwarded to host computers at a financial institution via a RF communications link and a central network controller where the transaction data is verified and processed. Confirmation that the transaction has been verified and processed is sent back to the RF financial transaction terminal by the financial institution via the central network controller and RF communications link. BRIEF DESCRIPTION OF THE DRAWING
  • Figure la is a block diagram of a portable radio frequency financial transaction terminal for a financial transaction system in accordance with the present invention.
  • Figure lb is a block diagram of a secure chip forming part of the portable radio frequency financial transaction terminal of Figure la;
  • FIG 2 is a block diagram of a central network controller for a financial transaction system in accordance with the present invention
  • Figure 3a is a schematic representation of the financial transaction system in accordance with the present invention
  • Figure 3b is a schematic representation of a communications protocol utilized between the portable radio frequency financial transaction terminals and the central network controller;
  • Figures 4 and 5 are flow charts illustrating the method by which the communications protocol of Figure 3b is implemented;
  • Figure 6a is a partly exploded perspective view of the portable radio frequency financial transaction terminal of Figure la;
  • Figures 6b to 6e are perspective views of the components constituting a handle forming part of the portable radio frequency financial transaction terminal of Figure 6a;
  • Figure 7 are perspective views of the handle of Figures 6b to 6e in various positions
  • Figure 8 is an exploded perspective cut-away view of a portion of the portable radio frequency financial transaction terminal of Figure 6a;
  • Figure 9 is a partly exploded perspective view of an alternative embodiment of a portable radio frequency financial transaction terminal in accordance with the present invention.
  • Figure 10 is a partial perspective view of the portable radio frequency financial transaction terminal of Figure 6a in combination with a power supply charging dock;
  • Figure 11 is a partially cut-away perspective view of a charging and carrying nest for the portable radio frequency financial transaction terminal of Figure 6a;
  • Figures 12a and 12b are exploded top plan and side elevational views, respectively, of components of the portable radio frequency financial transaction terminal of Figure 6a; and
  • Figure 13 is a partly exploded perspective view of another embodiment of a portable radio frequency financial transaction terminal in accordance with the present invention.
  • Financial transaction system 10 includes a central network controller 12 and a plurality of portable hand-held radio frequency (RF) financial transaction terminals 20.
  • RF radio frequency
  • the financial transaction system 10 supports up to thirty-two (32) RF financial transaction terminals.
  • the central network controller 12 and the RF financial transaction terminals 20 communicate via a wireless RF communications link.
  • the central network controller 12 also communicates with host computers at financial institutions (not shown) via DATAPAC services or via an ISDN interface as will be described to provide real-time transaction processing with the host computers.
  • Each RF financial transaction terminal 20 includes a financial transaction data module (DTE) 20a for collecting financial transaction data and a RF transceiver, in this particular example a RF modem 20b for transmitting financial transaction data to the central network controller 12 and for receiving transaction verification data from the central network controller 12.
  • the RF modem 20b includes an internal microcontroller unit (MCU) and an antenna 20c.
  • Financial transactions are carried out by bringing a RF financial transaction terminal 20 to the location of a user.
  • Transaction data is entered into the DTE 20a of the RF financial transaction terminal either via an input keypad or a bar code reader.
  • the user's debit or credit card is read by the RF financial transaction terminal 20 in the presence of the user.
  • the user is required to enter a PIN or password via the input keypad.
  • the RF financial transaction terminal 20 does not display the entered PIN or password data and encrypts the data to inhibit the data from being accessed by unauthorized parties as the data is communicated between the RF financial transaction terminal 20, the central network controller 12 and the host computers.
  • the RF modem 20b of the RF financial transaction terminal 20 transmits the encrypted data to the central network controller 12 which in turn conveys the information to a financial institution so that the transaction can be verified and processed.
  • the central network controller 12 transmits verification data received from the host computer to the RF financial transaction terminal 20 to inform the user that the transaction has been verified and processed.
  • the RF team financial transaction terminal in turn prints a receipt confirming that the transaction has been verified and processed. Further details of the financial transaction system 10 will now be described.
  • the RF financial transaction terminal 20 includes an outer casing 22 which accommodates the various components of the DTE 20a and RF modem 20b.
  • a retractable handle 24 depends from the undersurface 22a of the casing 22 to facilitate carrying of the RF financial transaction terminal 20.
  • On the upper top surface of the casing 22 are an LCD display 50, an input keypad 52 and a printer 30 having a spindle carrying a paper roll.
  • a cover is positioned over the printer 30 and has a triangular window on one side (not shown) to allow the condition of the paper roll to be visually determined.
  • the input keypad 52 in this particular example includes a plurality of keys arranged in an array.
  • a card reader 38 is partially housed by the casing 22 and has a card reading slot accessible from the rear end of the casing 22.
  • antenna 20c is also mounted on the outer casing 22 and is electrically connected to the RF modem 20b within the casing 22.
  • the internal components within the casing 22 are best illustrated in Figures la, lb, 12a and 12b.
  • the internal electronic components of the RF financial transaction terminal 20 are mounted on a motherboard 600 and include a main central processing unit (CPU) module 26 which communicates with a secure module 28.
  • the functional division of the internal components into the main CPU module 26 and the secure module 28 is required to provide security, as will be discussed in greater detail herein.
  • the main CPU module 26 includes a printer interface 32, an RF Tx-Rx interface 36, a card reader interface 40 and a bar code reader interface 44.
  • the main CPU module 26 is also equipped with a main CPU 62 connected to the interfaces 32, 36, 40 and 44 allowing the CPU 62 to control operation of the printer 30, the RF modem 20b, the card reader 38 and the bar code reader 42 (see Figure 9).
  • the CPU 62 is also connected to flash memory 64 and static random access memory (SRAM)
  • the flash memory 64 contains start-up software incorporating a set of routines for initializing the RF financial transaction terminal 20 at power-up.
  • the flash memory 64 also contains a system software loader comprising a routine for downloading system software into the SRAM 66.
  • SRAM 66 contains the system software (eg. interrupt handlers, I/O routines, an application software loader, device drivers etc.), and an applications program area or memory space where a secure prompt table and different applications programs can be downloaded (eg. transaction verification, application specific services, etc.).
  • a solar battery 68 is also provided in the main CPU module 26 for security purposes as will be described and is connected to the main CPU 62.
  • the secure module 28 provides cryptographic services and security measures to protect the RF financial transaction terminal from software tampering that could result in debit or credit card PIN or passwords from being accessed.
  • the secure module 28 includes a microcontroller unit in the form of a secure chip 48 which controls the operation of the display 50, the keypad 52, a speaker 54, an auxiliary RS-232 port 56 and an interface 58 to the main CPU module 26.
  • the main CPU module 26 and the secure module 28 receive power from an on-board rechargeable power supply 60 in the usual manner.
  • secure chip 48 includes a CPU 48a, read only memory (ROM) 48b, random access memory (RAM) 48c and interfaces 48d, 48e, 48f, 48g and 56 for the keypad
  • the ROM 48b contains a secure chip operating system comprising cryptographic security services, auxiliary RS-232 port control, display control, control of communications to the main CPU module 26 (eg. via MCPUM interface 48d), keypad control and speaker (eg. buzzer) control functions.
  • the RAM 48c is used for cryptographic key storage, password storage, and secure chip operating system working space.
  • the secure chip 48 is preferably in the form of a physically encapsulated secure integrated circuit programmed with the operating system necessary to perform the functions discussed above.
  • the secure module 28 controls the LCD display 50 in a split-screen fashion dividing the LCD display into unsecured and secure display areas. The information displayed in the secure display area is controlled solely by the secure module 28 while the information displayed in the unsecured display area is controlled by the secure module 28 in conjunction with the main CPU module 26 as will be described.
  • a battery backup 70 (see Figure la) is provided to protect against inadvertent power loss and consequent loss of data stored in SRAM 66 and RAM 48c in which the cryptographic keys are stored. Furthermore, ROM 48b is designed so as to prevent unauthorized reading of its content.
  • the solar battery 68 since the solar battery 68 is within the casing 22, it is typically isolated from light and does not develop any charge. However, if the integrity of the casing 22 is compromised and the interior of the casing is exposed to light, the solar battery 68 charges. The charge developed by the solar battery 68 is sensed by the main CPU 62 which in turn clears the cryptographic keys stored in the RAM 48c to prevent an intruder from acquiring the cryptographic keys.
  • Figure 6a shows the RF financial transaction terminal 20 in perspective and as can be seen, the handle 24 is received in a recess 100 formed in the underside 22a of the casing 22. Fasteners in the form of screws 102 secure the handle to the casing 22 allowing the handle 24 to be removed from the casing 22.
  • the battery 60 is received in a pocket (not shown) formed in the underside 22a of casing 22.
  • a multi-pin electrical connector 104 forming part of the bar code reader interface 44 is hidden by a cover 106 and is also located on the underside 22a of casing 22.
  • FIGS 6b to 6e and 7 better illustrate the handle 24.
  • the handle 24 includes upper and lower handle sections 140 and 142 respectively which are rotatable relative to one another to allow the handle to move between an extended pistol grip position and a retracted palm grip position (see Figure 7).
  • the lower handle section 140 is hollow and is constituted by a pair of mating halves 144 and 146 respectively retained together by fasteners 148 (only one of which is shown).
  • the lower handle section has an oblique obround surface 150 in which a square recess 152 is formed.
  • a circular aperture 154 is provided in the center of the bottom surface 156 of the recess 152 while a pair of diametrically opposed stops 160 project upwardly from the bottom surface 156. Beneath the recess 152 and adjacent opposed interior side walls of the lower handle section 140 are U-shaped retainers 158.
  • rotating mechanism 162 includes a support 164 through which one of the fasteners 148 passes to secure its position within the lower handle section 140.
  • a cylinder 166 projects from the support 164 and passes through the apertures formed in the bottom surface 156 and obround surface 150 respectively.
  • On the cylinder 166 adjacent the support are a pair of spaced annulets 168 and 170 respectively.
  • the annulet 168 closest to the support 164 is positioned below the bottom surface 156 and has a pair of diametrically opposed projecting tabs 172 formed on it. The tabs 172 are received by the retainers 158 to inhibit relative rotation of the handle rotating mechanism 162 and the lower handle section 140.
  • the other annulet 170 is positioned above the bottom surface 156 and is accommodated within the recess 152.
  • the annulets 168 and 170 have diameters greater than that of the aperture 154.
  • the upper handle section 142 (best seen in Figures 6d and 6e) is also hollow and is constituted by a pair of mating halves 180 and 182 retained together by fasteners 183.
  • the upper handle section also has an oblique obround surface 184 which overlies obround surface 150.
  • a sleeve 186 depends from surface 184 and accommodates a portion of cylinder 166.
  • the sleeve 186 extends into the recess 152 and has a projecting tab 188 on it which abuts the stops 160 to limit relative rotation of the two handle sections 140 and 142 respectively to 180 degrees.
  • the sleeve 186 also extends into the upper handle section 142 and has a surface 190 in which an aperture 192 is provided to allow the cylinder 166 to pass.
  • An annulet 194 is formed at the distal end of the cylinder 166 and has a diameter greater than that of the aperture 192.
  • the annulet 194 has a pair of diametrically opposed notches 195 formed in it which communicate with a latch 196 to retain the handle 24 in one of the extended pistol grip or retracted palm grip positions.
  • the latch has trunnions 197 on it which are accommodated by hollow cylinders 198 extending from the side walls of the upper handle section 142.
  • the latch 196 includes a manually operable release 200 which projects through an opening 202 in the upper handle section 142 as well as a retaining arm 204.
  • a spring 206 biases the retaining arm 204 of latch 196 to urge it against the annulet 194.
  • a pair of inwardly projecting posts 208 inhibit lateral movement of the latch 196 within the upper handle section 142.
  • An attachment plate 210 is secured to the upper handle section 142 by fasteners 212 (only one of which is shown) which are accommodated in threaded receptacles 214.
  • the plate 210 is accommodated by the recess 100 in the casing 22 and is secured to the casing 22 by the fasteners 102.
  • the release 200 can be released.
  • the retaining arm 204 is urged by the spring 206 toward the annulet 194 but because the retaining arm 204 runs along the outside surface of the annulet 194 it does not prevent the lower handle section 140 from rotating.
  • the other notch 195 becomes aligned with the retaining arm 204 and the retaining arm snaps into the notch 195 inhibiting any further relative rotation of the upper and lower handle sections.
  • the upper and lower handle sections 142 and 140 can be moved back to their previous positions by pivoting the retaining arm 204 once again by actuating the release 200 and rotating the lower handle section 140 relative to the upper handle section 142 in the opposite direction.
  • the casing 22 has an interior support surface 220 with four generally rectangular openings 222 provided in it which are aligned with the fasteners 102 extending through the attachment plate 210.
  • the support surface 220 has four generally rectangular openings 222 provided in it which are aligned with the fasteners 102 extending through the attachment plate 210.
  • the 220 supports a card reader mounting frame 224.
  • the mounting frame 224 has a base plate 226 which overlies the support surface 220.
  • the base plate 226 has four punches 228 in it adjacent its corners which are received in complimentary openings 222 formed in the support surface 220.
  • the fasteners 102 pass through the openings 222 and threadably engage with apertures 230 in the punches 228.
  • Fasteners 232 also pass through apertures 233 in the base plate 226 and engage with apertures 234 in the support surface 220.
  • Sidewalls 240 extend along opposed majors sides of the base plate 226.
  • a bridge 242 spans the sidewalls 240 and is spaced above the base plate 226.
  • the card reader 38 is accommodated between the sidewalls and is supported by the sidewalls 240 and bridge 242.
  • Fasteners 244 pass through apertures 246 in the sidewalls 240 and are accommodated by apertures 248 in the card reader 38 to secure the card reader to the mounting frame 224.
  • the sidewalls 240 and bridge 242 are designed to inhibit shocks from being applied to the card reader 38 in the event that the RF financial transaction terminal 20 is dropped or collides with another object.
  • the sidewalls 240 and bridge 242 are formed of aluminum and are dimensioned so that they are able to flex approximately 1.2mm due to the extensile structure of the sidewalls 240. Therefore, in the event of a shock being applied to the RF financial transaction terminal 20, the sidewalls 240 and bridge 242 flex and act as a shock absorber for the card reader 38 so that the card reader floats within the casing 22.
  • the secure module 28 operates in conjunction with the main CPU 62 in the CPU module 26 as the main CPU 62 executes the applications program to allow transactions to be entered at the location of a user and conveyed over the RF communications link to the central network controller 12 as well as to receive transaction verification data from the host computers at the financial institution via the central network controller
  • the main CPU 62 executes the applications program, the CPU 62 must request the services of the secure module 28 via interface 58 whenever data needs to be displayed on the LCD display 50 or entered via the input keypad 58.
  • the secure module 28 recognizes three different types of requests generated by the main CPU 62, namely a "display only” request, a "display prompt” request and a “display secure prompt” request.
  • the display only and display prompt requests are typically generated by the main CPU 62 when the RF financial transaction terminal is used in normal operation and transactions are being carried out at user locations.
  • Display secure prompts are generated by the host computers at financial institutions and are the most sensitive due to the fact that keyboard entries are passed to the main CPU module 26 in clear text form.
  • the secure module 28 When the secure module 28 receives a display only request from the main CPU 62, the secure module 28 causes the word "UNSECURED" to flash in the secure display area of the LCD display 50 and displays keypad entries on the unsecured display area without checking the data. The keypad entries are not forwarded to the main CPU module 26. Presses of the entry key of the keypad 52 are however passed to the main CPU 62 by the secure module 28 to signal the main CPU to proceed with the applications program.
  • the secure module 28 When the secure module 28 receives a display prompt request from the main CPU 62, the secure module causes the word "SECURE” to be continuously displayed in the secure display area of the LCD display 50 and displays the appropriate prompt such as "Enter PIN” on the unsecured display area of the LCD display 50.
  • Keypad entries are encrypted by the secure chip 48 in the secure module 28 before being conveyed to the main CPU 62 and are not displayed.
  • transaction data which is to be forwarded to the host computers at the financial institution is not displayed on the LCD display 50 when entered and is encrypted prior to being transmitted over the RF communications link to provide proper security.
  • the secure module 28 When the secure module 28 receives a display secure prompt request from the main CPU 62, the secure module requests the main CPU to provide a prompt authentication code (PAC) associated with the secure prompt being requested.
  • the PACs are generated by the host computers in the financial institutions using a cryptographic algorithm for each secure prompt and are transmitted to the RF financial transaction terminals by the host computers when the RF financial transaction terminal is physically connected to the central network controller 12 as will be described.
  • the secure chip 48 compares the PAC with the content of a secure prompt table in RAM 48c. If the results of the comparison are proper, the secure module 28 passes entries made using the keypad 52 directly to the main CPU 62 in clear text form. If the results of the comparison are not correct, the secure module 28 denies the secure prompt request.
  • Central Network Controller
  • the central network controller 12 is better illustrated.
  • the network central controller 12 is typically located in a retailer's premises and is powered by a power supply 80 connected to AC mains.
  • the central network controller is also connected to a dial-up or leased-line phone cable.
  • the central network controller 12 includes a CPU motherboard with a main microprocessor 82 and associated memory 84.
  • the main microprocessor 82 is connected to a RF transceiver 86 in the form of a RF modem having an antenna 88 for establishing a RF communications link with the various RF financial transaction terminals 20 using a wireless data communications network.
  • a DATAPAC interface 90 is provided with DATAPAC 3101 and 3201 surface interfaces.
  • An ISDN interface board may also optionally be provided.
  • a serial RS-232 interface 92 is included in the central network controller 12 to allow updates to data and software used by the RF financial transaction terminals 20 and central network controller 12 to be downloaded.
  • a serial RS-485 interface 94 is also provided for optional connection of the central network controller 12 to the retailer's existing point-of sale platforms.
  • the central network controller 12 functions as a gateway between the RF financial transaction terminals 20 and the standard interfaces (ie. DATAPAC) leading to the host computers at financial institutions.
  • the central network controller 12 forms a transparent link for all transaction requests generated by the RF financial transaction terminals that are conveyed to financial institutions as well as for all replies generated by financial institutions that are conveyed to the RF financial transaction terminals 20 in response to received transaction requests.
  • the memory 84 stores software which is executed by the main microprocessor 82 allowing the central network controller 12 to perform a number of functions. Specifically, the central network controller 12 effects wireless data communication network control using a communications protocol, discussed in greater detail below.
  • the central network controller 12 also controls message exchange between the RF financial transaction terminals and the financial institutions. Specifically, the central network controller 12 collects transaction requests from the individual RF financial transaction terminals 20 and forwards them to the host computers at the appropriate financial institutions in order the transaction requests are received. In addition, the central network controller 12 controls message exchange between the central network controller 12 and the host computers at financial institutions using DATAPAC 3101 or DATAPAC 3201 services.
  • the central network controller 12 supports existing data communications protocol as defined by Telecom Canada. However, if desired an ISDN interface can be used instead of the DATAPAC 3101 and 3201 services.
  • the central network controller 12 also receives and stores new RF financial transaction terminal software releases and new RF financial transaction terminal secure prompt tables provided by the financial institution for use in the RF financial transaction terminals. For example, a financial institution can download the new RF financial transaction terminal software to the central network controller 12 via the RS-232 interface 92 for storage in memory 84. The central network controller 12 can then download the updated software to the RF financial transaction terminals to update them by way of a physical serial cable connection established between the RS-232 interface 92 of the central network controller 12 and the RS-232 interfaces
  • the central network controller 12 also controls communication with the existing point-of-sale platforms at the retailer location via the serial RS-485 interface 94. This allows a retailer to use existing cash registers to exchange data such as prices, totals, etc. to the central network controller 12.
  • the central network controller 12 Prior to operation of the financial transaction system 10, the central network controller 12 is put through an initialization routine to establish several configuration parameters.
  • the initialization routine will now be described.
  • one of the RF financial transaction devices is physically connected to the central network controller 12 by way of a serial cable connected to the RS-232 interfaces 56 and 92 respectively to allow the keypad 52 of the RF financial transaction device to be used to enter data into the central network controller 12.
  • the keypad 52 is used to enter or select the following: i) The current time and date; ii) The type of communications format to be used to communicate with the host computers at the financial institution; iii) The type of point-of-sale platform at the retailer's location to be connected to the RS-485 interface 94; iv) The telephone number of the modem at the financial institution that should be dialled to request download of new RF financial transaction terminal software; v) The telephone number of the modem at the financial institution that should be dialled to request download of a new RF financial transaction terminal secure prompt table; vi) Telephone numbers and network addresses for credit and debit transactions; and vii) The destination addresses of the RF financial transaction terminals in the financial transaction system 10.
  • the RF financial transaction terminal software and secure prompt table must be downloaded to the central network controller 12 from the financial institution.
  • the host computer at the financial institution contacts the central network controller 12 using a dial-up modem and transmits a message indicating the type of data to be downloaded to the central network controller 12 ie. the RF financial transaction terminal software or the secure prompt table.
  • the connection is terminated.
  • the central network controller 12 then establishes a connection to the financial institution by dialling the appropriate modem number initialized at either step iv or v above. Once the connection is established, the RF financial transaction terminal software or secure prompt table is downloaded into the memory 84 of the central network controller 12.
  • each RF financial transaction terminal 20 is connected to the central network controller 12 via a serial cable connected between the RS-232 interfaces 56 and 94 respectively so that the RF financial transaction terminal software or secure prompt table can be downloaded into the RF financial transaction terminal.
  • the download procedure is initiated using the keypad on the RF financial transaction terminal.
  • the RF financial transaction terminal software or secure prompt table has been downloaded, the RF financial transaction terminal is prompted by the financial institution to generate a Download Request-Terminal Initialization transaction which is conveyed to the financial institution by way of the central network controller
  • the financial institution may pass an instruction to the RF financial transaction terminal which causes the main CPU 62 to generate a secure prompt request.
  • the RF financial transaction terminals 20 and the central network controller 12 use a communications protocol to exchange data over the RF communications link.
  • the communications protocol will now be described. Messages and Packets
  • a number of types of messages are generated either by the MCU in the RF modem 20b or 86 or by the DTE 20a.
  • the messages generated in the communications protocol of the present invention are information messages (i_messages), command messages (comm.msg), error messages
  • Information and command messages are generated by a DTE 20a and are conveyed to the MCU in the RF modem.
  • Information messages are messages which are to be transmitted on the RF communications link and are addressed to a particular RF financial transaction terminal 20 or to the central network controller 12.
  • a RF modem When a RF modem receives an information message it adds a data link (DLL) layer to it to create an information packet (i_packet) before transmitting the i_packet on the DLL layer
  • DLL data link
  • a command message is a message which is to be used by the RF modem for internal purposes to reset command parameters therein.
  • a command message is not put in the form of an i_packet by the RF modem and therefore, is not transmitted on the RF communications link.
  • Error messages are generated by the MCU in a RF modem in the event that proper communications cannot be established over the RF communications link. Error messages generated by the MCU are conveyed to the DTE.
  • Acknowledgment messages are generated by the MCU of a RF modem after an i_packet has been properly received.
  • the MCU then adds a DLL layer to the acknowledgement message to create an acknowledgement packet (ack_packet) before transmitting the ack_packet on the RF communications link addressed to the RF financial transaction terminal or central network controller that sent the received i_packet.
  • ack_packet There are two types of incoming packets that a MCU can receive on the RF communications link, namely, an i_packet and an ack_packet.
  • An i_packet received by a RF modem is forwarded to the DTE in the form of an ...message (after stripping the DLL header from it) if it is error free, and if the destination address of the i_packet is valid.
  • An ack_packet received by a RF modem is not forwarded to the DTE. Appendix A better illustrates the form of the various packets and messages generated using the communications protocol. Messaging
  • the communications protocol provides for three modes of operation, namely an idle mode, a transmit (Tx) mode and a receive (Rx) mode.
  • an idle mode namely an idle mode
  • a transmit (Tx) mode namely an transmit (Tx) mode
  • a receive (Rx) mode namely an receive (Tx) mode
  • Tx transmit
  • Rx receive
  • the following is a description of the idle, receive and transmit modes of operation of the RF financial transaction terminals 20 and the central network controller 12 with reference to Figures 4 and 5.
  • the MCU of the RF modem When a RF financial transaction terminal 20 or the central network controller 12 is powered up or reset (block 700), the MCU of the RF modem initiates a startup procedure (block 702). During this procedure, the MCU resets an acknowledge flag (ack_ok_flg) to 0 and sets an acknowledge timer (ack_timer) to an initial value (ack_a_init). At this stage, the acknowledge timer starts counting down and when the acknowledge timer expires, the acknowledge flag (ack_ok_flg) is set to 1. Once the startup procedure 702 has been completed, the MCU of the RF modem enters an idle mode (block 704).
  • the MCU of the RF modem waits to be interrupted by either an RTS signal received from the DTE, an incoming packet received on the RF communications link or an expired timer signal.
  • the MCU removes the DLL header from the incoming packet and calculates a cyclic redundancy check (CRC) value (block 712). The calculated CRC value is then checked to determine if it is valid (block 714). If the CRC value is not valid, the MCU resets the acknowledge timer to the initial value (ack_a_init) and sets the acknowledge flag (ack_ok_flg) to 0 (block 716) before returning to the idle mode (block 718). If at block 714 the CRC value is determined to be valid, the destination address (dest_id) of the incoming packet is checked (block 720). If the destination address is not valid, the MCU proceeds to block 716.
  • CRC cyclic redundancy check
  • the incoming packet is checked to determine if it is an i_packet (block 722). If the incoming packet is determined not to be an i_packet, then it is then checked to determine if it is an ack_packet (block 724). If the incoming packet is determined not to be an ack_packet, the MCU proceeds to block 716. If the incoming packet is an ack_packet, the MCU sets the
  • a financial transaction system in which a user is given a portable RF financial transaction terminal with which to enter transaction data via a keypad or read a UPC bar code on merchandise via a CCD scanner and read their credit, debit or smart card.
  • the RF financial transaction terminal transmits the transaction and card data to a central network controller via a RF communications link.
  • the central network controller in turn conveys the transaction and card data to the host computers at a financial institution where the transaction is processed in real ⁇ time.
  • the financial institutions return verification data to the central network controller which is passed back to the RF financial transaction terminal via the RF communications link.
  • the RF financial transaction terminal then generates a printed receipt of the transaction for the user.
  • acknowledge flag (ack_ok_flg) to 1 (block 725) before proceeding to block 718.
  • the MCU forwards the i_message to the DTE (block 726).
  • the MCU then causes the RF modem to generate and transmit an ack_packet on the RF communications link addressed to the RF modem of the RF financial transaction terminal or central network controller that sent the i_message to confirm receipt of the i_message (block 728).
  • the MCU proceeds to block 718 and enters the idle mode.
  • the MCU receives an RTS signal (block 730)
  • the MCU is conditioned to the transmit mode and awaits receipt of a message from the DTE (block 732).
  • the MCU checks the message to determine if it is a comm_message (block 734). If the message is a comm_message, the MCU resets the communications parameters (comm.params) therein in accordance with the comm_message (block 736) before returning to the idle mode (block 738).
  • the message is assumed to be an i_message.
  • the MCU in tum calculates and adds the DLL header to the i_message to create an i_packet (block 740). Once the i_packet has been created, die MCU checks to determine if the acknowledge flag (ack_ok_flg) is set to 1 (block 742). If the acknowledge flag is not set, the MCU returns to an idle mode (block 744) and waits for the acknowledge flag (ack_ok_flg) to be set to 1.
  • the MCU calculates a random number k (block 746), sets a network access denied timer (nad_timer) to an initial value equal to k * nad_d where nad_d is equal to 8.5ms ( block 748) before returning to an idle mode (block 750) waiting for the nad_timer to expire.
  • the MCU waits for the acknowledge flag (ack_ok_flg) to be set to 1 as shown at block 752, and then proceeds to block 746.
  • the generated random number k is of the form k € 16,31 if the ijnessage is being originally transmitted and is of the form k €0,15 if the i_message is being retransmitted.
  • the nad_timer is used to provide randomization of RF communications link channel occupation attempts.
  • the MCU sets a transmission counter (R_Tx_CNT) to an initial value (R_Tx_NMB) representing the number of times the RF modem will attempt to transmit a packet (block 756).
  • the RF modem transmits the packet on the RF communications link, decrements the transmission counter (R_Tx_CNT) by one and sets an acknowledge response timer (R_Tx_Timer) to an initial value (R_Tx_D) (block 758).
  • the initial value (R_Tx_D) is equal to the initial value of the acknowledge timer, namely ack_a_init.
  • the MCU enters an idle mode (block 760). After the packet is transmitted on the RF communications link, the
  • the MCU awaits receipt of an ack_packet from the RF financial transaction terminal 20 or central network controller 12 to which the packet was addressed to confirm that the packet was properly received. If the acknowledge response timer (R_Tx_Timer) expires before the ack_packet is received (block 762), the MCU checks the value of the transmission counter (R_Tx_CNT) (block 764). If the value of the transmission counter is equal to zero, the MCU sends an error message to the DTE 20a to inform that DTE 20a that the packet was not successfully transmitted (block 766) and the MCU returns to the idle mode (block 768). If at block 764 the value of the transmission counter is determined to be greater than zero, the MCU proceeds to block 746 and the following steps are performed again in order to retransmit the packet.
  • R_Tx_Timer acknowledge response timer
  • acknowledge and acknowledge response timers (ack.timers and R_Tx_Timers) in all RF modems to a predetermined initial value (ack_a_init) after an incoming packet with a valid CRC and destination address (dest_id) is received.
  • the ack_a_init value must be large enough to ensure that a RF modem will have sufficient time to receive the packet, check the CRC value, remove the DLL header, forward the i_message to the DTE, create an ack_ packet and send it to the transmitting MCU before the timers expire.
  • the ack_a_init value is given by:
  • prop.delay is the packet transmission propagation delay and is assumed to be approximately equal to 0;
  • MCU_Rx_pr is the time needed for the MCU to process the received packet
  • RF modem_to_DTE_transf is the time needed for the MCU to transfer the i_message to the DTE;
  • MCU_ack_pr is the time needed for the MCU to generate the ack_packet
  • ACK_xmit is the ack_packet transmission time
  • T_ambg is ambiguity time added to the ack_a_init value to provide a buffer.
  • die bar code reader 42 includes a body 300 with a plate 302 on it which is basically the same size as plate 210 and which is received by tiie recess 100 formed in the casing 22.
  • Fasteners 102 pass through apertures 304 in the body 300 and threadably engage the apertures 230 in the punches 228.
  • a pair of wings 310 extend from the sides of die body 300.
  • Fasteners 312 pass through apertures 314 in the wings 310 and threadably engage apertures 315 in die underside 22a of the casing 22.
  • a conventional CCD scanner (not shown) is housed witi in the body.
  • the front of the body includes a pane 316 through which the laser beam generated by the CCD scanner can pass so that bar codes can be read.
  • On the upper surface of the body 300 is a multi-pin electrical connector (not shown) which mates with the complimentary electrical connector 104 on the underside 22a.
  • a pistol grip handle 318 depends from the body 300 and has a manually operable trigger 320 on it which when actuated operates the CCD scanner.
  • the fasteners 102 attaching the handle 24 to the casing 22 are loosened and the handle 24 is removed.
  • the cover 106 over the electrical connector 104 on the radio terminal 20 is also removed to expose it.
  • the bar code reader 42 is then attached to the casing 22 via fasteners 102 and 312.
  • the electrical connectors mate and power is supplied to the bar code reader 42 by the battery 60.
  • Logic in the bar code reader 42 detects when the bar code reader is connected to the battery and automatically powers the bar code reader so that it becomes operative.
  • the bar code reader then operates in a conventional manner with the CCD scanner generating a laser beam which passes through the pane 316 when the trigger 320 is actuated. When the laser beam is scanned across a bar code, the CCD scanner reads the scanned bar code and conveys the information to the RF financial transaction terminal 20 via interface 44 in a conventional manner to record the transaction data.
  • a charging dock 400 is shown for receiving the RF financial transaction terminal 20 when the handle 24 is in the retracted position.
  • a non-contact charger unit is accommodated by a charging dock cavity 401 within the dock 400 for charging the power supply 60.
  • FIG 11 shows a charging and carrying nest 500 for carrying the RF financial transaction terminal 20 when the handle 24 is in the extended pistol grip position.
  • the charging and carrying nest 500 also includes a charging stud 402 to register with the charging receptacle 404 formed in the undersurface of the casing 22.
  • FIG. 13 shows yet another embodiment of a handle for the RF financial transaction terminal 20.
  • the handle 24 is connected to the undersurface 22a of casing 22 by means of a tongue 650 cooperating with an internal slot 652 formed in the undersurface 22a of casing 22, and a pair of one-way screws 654.
  • the handle 24 is formed in a single piece construction and therefore, remains in the extended pistol grip position.
  • the card reader has been described to read credit or debit cards, it should be apparent to those of skill in the art tiiat a smart card reader having read/ write functions may be incorporated into the RF financial transaction terminal.
  • i_message starts at 'STX' and ends at 'ETX' or 'ETB';
  • DLL header consists of 16 bit cyclic redundancy check value (synch CRC) and a DLL control byte (DLL_ctrl).
  • i_message i) the position of the destination and source identifications (dest_id and source_id) are fixed; ii) the maximum number of data bytes is set at 123; and iii) STX and ETX or ETB bytes only appear at beginning and end of i_message.
  • the DLL control byte has the following format: -QQQQSSSS where: QQQQ is request type: 1000 for information and 0111 for ack_packet

Abstract

A financial transaction system (10) is provided in which a user is given a portable RF financial transaction terminal (20) with which to enter transaction data via a keypad (52) or read a UPC bar code on merchandise via a CCD scanner (42) and read their credit, debit or smart card. The RF financial transaction terminal (20) transmits the transaction and card data to a central network controller (12) via a RF communications link. The central network controller (12) in turn conveys the transaction and card data to the host computers at a financial institution where the transaction is processed in real-time. The financial institutions return verification data to the central network controller which is passed back to the RF financial transaction terminal via the RF communications link. The RF financial transaction terminal then generates a printed receipt of the transaction for the user. All of this may be done while the RF financial transaction terminal and the user's credit, debit or smart card remains in the total custody of the user. The user is therefore relieved from having to proceed to an ABM, retail platform, cashier's desk, etc.

Description

FREE-ROAMING REMOTE HAND-HELD POUVT-OF-SALE TERMINAL
TECHNICAL FIELD The present invention relates in general to financial transaction recording systems, and more particularly to a portable hand-held financial transaction terminal and to a financial transaction system including a plurality of portable radio frequency (RF) financial transaction terminals operable to establish a radio frequency communications link with a central network controller to transmit financial transaction data thereto.
BACKGROUND ART
Financial transaction devices to read data stored on credit, debit and/or smart cards to complete a financial transaction are known. Existing systems, such as automated banking machines (ABMs) require users to walk to and from an often far-off central retail transaction platform to complete a financial transaction. More recently, debit-card systems have been provided at retail transaction platforms which allow a user to remotely enter his or her personal identification number (PIN) to directly withdraw funds from a financial institution to complete a financial transaction. Both the ABM and debit-card systems suffer from the disadvantage of requiring the user to proceed to a particular retail transaction platform to complete a financial transaction. Also, these systems require the user to loose custody of their credit or debit card to a sales person, or in the case of ABMs to the machine itself.
It is therefore an object of the present invention to obviate or mitigate at least one of the aforesaid disadvantages.
DISCLOSURE OF THE INVENTION
According to one aspect of the present invention there is provided a portable radio frequency financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a radio frequency transmitter to transmit said transaction and card data to a remote site whereat a transaction can be processed. According to another aspect of the present invention there is provided a financial transaction system comprising: a plurality of portable radio frequency financial transaction terminals to receive transaction and debit, credit or smart card data; and a central network controller in communication with each of said portable radio frequency financial transaction terminals via a RF communications link, said central network controller receiving said transaction and card data transmitted by said portable radio frequency financial transaction terminals and conveying said transaction and card data to a financial institution whereat transactions can be processed. In still yet another aspect of the present invention there is provided a financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and shock absorbing means acting between said card reader and said housing to inhibit shocks from being applied to said card reader.
In still yet another aspect of the present invention there is provided a financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a pistol grip depending from said housing to facilitate carrying of said terminal, said pistol grip being movable between extended and retracted positions. According to one embodiment of the present invention, a financial transaction system is provided in which the user is given a portable RF financial transaction terminal with which to enter transaction data via a keypad or read a UPC bar code on merchandise via a CCD scanner, read their credit, debit or smart card, and obtain a printed receipt of the transaction. All of this may be done while the RF financial transaction terminal and the user's card remain in the total custody of the user. The user is therefore relieved from having to proceed to an ABM, retail platform, cashier's desk, etc.
Preferably, each RF financial transaction terminal includes a motherboard with a main CPU module controlling four input/output interfaces capable of communicating with a bar code reader, a printer, a card reader interface and a radio frequency transmitter/receiver interface. The main CPU module also communicates with a secure module for providing cryptographic security control via a secure chip which interfaces with an RS-232 interface, a speaker, a display and a keypad. A battery backup is provided along with SRAM and flash memory containing start-up routines and system download routines.
The RF financial transaction terminal is designed for easy use and includes a simple user card insertion device for reading credit, debit and courtesy cards, as well as read/write sensing for smart card applications. The printer consumes low power and is designed for quiet operation and easy loading of paper.
The display preferably comprises an LCD screen incorporating a split screen feature for portraying not only encrypted/driven information via prompting, but also predetermined application software for tracking daily sales, adjusting inventories and audit trails, scheduling, daily accruals, etc. The casing for the RF financial transaction terminal is designed to be convertible from an ergonomic pistol grip shape to a palm grip shape.
The present invention provides advantages in that transactions can be carried out at the location of a user without requiring the user to travel to an ABM, retail platform etc. and without requiring the user to give up custody of their card. Also, transactions entered into the RF financial transaction terminals are processed and verified in real-time since the transaction data is forwarded to host computers at a financial institution via a RF communications link and a central network controller where the transaction data is verified and processed. Confirmation that the transaction has been verified and processed is sent back to the RF financial transaction terminal by the financial institution via the central network controller and RF communications link. BRIEF DESCRIPTION OF THE DRAWING
Embodiments of the present invention will now be described more fully with reference to the following drawings, in which:
Figure la is a block diagram of a portable radio frequency financial transaction terminal for a financial transaction system in accordance with the present invention;
Figure lb is a block diagram of a secure chip forming part of the portable radio frequency financial transaction terminal of Figure la;
Figure 2 is a block diagram of a central network controller for a financial transaction system in accordance with the present invention; Figure 3a is a schematic representation of the financial transaction system in accordance with the present invention;
Figure 3b is a schematic representation of a communications protocol utilized between the portable radio frequency financial transaction terminals and the central network controller; Figures 4 and 5 are flow charts illustrating the method by which the communications protocol of Figure 3b is implemented;
Figure 6a is a partly exploded perspective view of the portable radio frequency financial transaction terminal of Figure la;
Figures 6b to 6e are perspective views of the components constituting a handle forming part of the portable radio frequency financial transaction terminal of Figure 6a;
Figure 7 are perspective views of the handle of Figures 6b to 6e in various positions;
Figure 8 is an exploded perspective cut-away view of a portion of the portable radio frequency financial transaction terminal of Figure 6a; Figure 9 is a partly exploded perspective view of an alternative embodiment of a portable radio frequency financial transaction terminal in accordance with the present invention;
Figure 10 is a partial perspective view of the portable radio frequency financial transaction terminal of Figure 6a in combination with a power supply charging dock;
Figure 11 is a partially cut-away perspective view of a charging and carrying nest for the portable radio frequency financial transaction terminal of Figure 6a; Figures 12a and 12b are exploded top plan and side elevational views, respectively, of components of the portable radio frequency financial transaction terminal of Figure 6a; and
Figure 13 is a partly exploded perspective view of another embodiment of a portable radio frequency financial transaction terminal in accordance with the present invention.
BESTMODEFOR CARRYINGOUTTHEINVENTION
Referring now to Figure 3, a financial transaction system is shown and is generally indicated to by reference numeral 10. Financial transaction system 10 includes a central network controller 12 and a plurality of portable hand-held radio frequency (RF) financial transaction terminals 20. In this particular example, the financial transaction system 10 supports up to thirty-two (32) RF financial transaction terminals. The central network controller 12 and the RF financial transaction terminals 20 communicate via a wireless RF communications link. The central network controller 12 also communicates with host computers at financial institutions (not shown) via DATAPAC services or via an ISDN interface as will be described to provide real-time transaction processing with the host computers. Each RF financial transaction terminal 20 includes a financial transaction data module (DTE) 20a for collecting financial transaction data and a RF transceiver, in this particular example a RF modem 20b for transmitting financial transaction data to the central network controller 12 and for receiving transaction verification data from the central network controller 12. The RF modem 20b includes an internal microcontroller unit (MCU) and an antenna 20c. Financial transactions are carried out by bringing a RF financial transaction terminal 20 to the location of a user. Transaction data is entered into the DTE 20a of the RF financial transaction terminal either via an input keypad or a bar code reader. The user's debit or credit card is read by the RF financial transaction terminal 20 in the presence of the user. The user is required to enter a PIN or password via the input keypad. The RF financial transaction terminal 20 does not display the entered PIN or password data and encrypts the data to inhibit the data from being accessed by unauthorized parties as the data is communicated between the RF financial transaction terminal 20, the central network controller 12 and the host computers. The RF modem 20b of the RF financial transaction terminal 20 transmits the encrypted data to the central network controller 12 which in turn conveys the information to a financial institution so that the transaction can be verified and processed. Once processed, the central network controller 12 transmits verification data received from the host computer to the RF financial transaction terminal 20 to inform the user that the transaction has been verified and processed. The RF team financial transaction terminal in turn prints a receipt confirming that the transaction has been verified and processed. Further details of the financial transaction system 10 will now be described.
RF Financial Transaction Terminal Referring to Figures 6a, 12a and 12b an embodiment of a RF financial transaction terminal 20 is shown. The RF financial transaction terminal 20 includes an outer casing 22 which accommodates the various components of the DTE 20a and RF modem 20b. A retractable handle 24 depends from the undersurface 22a of the casing 22 to facilitate carrying of the RF financial transaction terminal 20. On the upper top surface of the casing 22 are an LCD display 50, an input keypad 52 and a printer 30 having a spindle carrying a paper roll. A cover is positioned over the printer 30 and has a triangular window on one side (not shown) to allow the condition of the paper roll to be visually determined. The input keypad 52 in this particular example includes a plurality of keys arranged in an array. The rows and columns of the array of keys are scanned in a random order to inhibit false keypad entries and to provide a high tapping resistance. A card reader 38 is partially housed by the casing 22 and has a card reading slot accessible from the rear end of the casing 22. Although not illustrated, antenna 20c is also mounted on the outer casing 22 and is electrically connected to the RF modem 20b within the casing 22.
The internal components within the casing 22 are best illustrated in Figures la, lb, 12a and 12b. The internal electronic components of the RF financial transaction terminal 20 are mounted on a motherboard 600 and include a main central processing unit (CPU) module 26 which communicates with a secure module 28. The functional division of the internal components into the main CPU module 26 and the secure module 28 is required to provide security, as will be discussed in greater detail herein. The main CPU module 26 includes a printer interface 32, an RF Tx-Rx interface 36, a card reader interface 40 and a bar code reader interface 44. The main CPU module 26 is also equipped with a main CPU 62 connected to the interfaces 32, 36, 40 and 44 allowing the CPU 62 to control operation of the printer 30, the RF modem 20b, the card reader 38 and the bar code reader 42 (see Figure 9). The CPU 62 is also connected to flash memory 64 and static random access memory (SRAM)
66. The flash memory 64 contains start-up software incorporating a set of routines for initializing the RF financial transaction terminal 20 at power-up. The flash memory 64 also contains a system software loader comprising a routine for downloading system software into the SRAM 66. SRAM 66 contains the system software (eg. interrupt handlers, I/O routines, an application software loader, device drivers etc.), and an applications program area or memory space where a secure prompt table and different applications programs can be downloaded (eg. transaction verification, application specific services, etc.). A solar battery 68 is also provided in the main CPU module 26 for security purposes as will be described and is connected to the main CPU 62.
The secure module 28 provides cryptographic services and security measures to protect the RF financial transaction terminal from software tampering that could result in debit or credit card PIN or passwords from being accessed. The secure module 28 includes a microcontroller unit in the form of a secure chip 48 which controls the operation of the display 50, the keypad 52, a speaker 54, an auxiliary RS-232 port 56 and an interface 58 to the main CPU module 26. The main CPU module 26 and the secure module 28 receive power from an on-board rechargeable power supply 60 in the usual manner.
Turning to Figure lb, the secure chip 48 is better illustrated. As can be seen, secure chip 48 includes a CPU 48a, read only memory (ROM) 48b, random access memory (RAM) 48c and interfaces 48d, 48e, 48f, 48g and 56 for the keypad
52, display 50, speaker 54 and auxiliary RS-232 port 56 respectively. The ROM 48b contains a secure chip operating system comprising cryptographic security services, auxiliary RS-232 port control, display control, control of communications to the main CPU module 26 (eg. via MCPUM interface 48d), keypad control and speaker (eg. buzzer) control functions. The RAM 48c is used for cryptographic key storage, password storage, and secure chip operating system working space. The secure chip 48 is preferably in the form of a physically encapsulated secure integrated circuit programmed with the operating system necessary to perform the functions discussed above. The secure module 28 controls the LCD display 50 in a split-screen fashion dividing the LCD display into unsecured and secure display areas. The information displayed in the secure display area is controlled solely by the secure module 28 while the information displayed in the unsecured display area is controlled by the secure module 28 in conjunction with the main CPU module 26 as will be described.
A battery backup 70 (see Figure la) is provided to protect against inadvertent power loss and consequent loss of data stored in SRAM 66 and RAM 48c in which the cryptographic keys are stored. Furthermore, ROM 48b is designed so as to prevent unauthorized reading of its content. In addition, since the solar battery 68 is within the casing 22, it is typically isolated from light and does not develop any charge. However, if the integrity of the casing 22 is compromised and the interior of the casing is exposed to light, the solar battery 68 charges. The charge developed by the solar battery 68 is sensed by the main CPU 62 which in turn clears the cryptographic keys stored in the RAM 48c to prevent an intruder from acquiring the cryptographic keys.
Turning now to Figures 6a to 13, mechanical aspects of the RF financial transaction terminal 20 will now be discussed. Figure 6a shows the RF financial transaction terminal 20 in perspective and as can be seen, the handle 24 is received in a recess 100 formed in the underside 22a of the casing 22. Fasteners in the form of screws 102 secure the handle to the casing 22 allowing the handle 24 to be removed from the casing 22. The battery 60 is received in a pocket (not shown) formed in the underside 22a of casing 22. A multi-pin electrical connector 104 forming part of the bar code reader interface 44 is hidden by a cover 106 and is also located on the underside 22a of casing 22.
Figures 6b to 6e and 7 better illustrate the handle 24. As can be seen, the handle 24 includes upper and lower handle sections 140 and 142 respectively which are rotatable relative to one another to allow the handle to move between an extended pistol grip position and a retracted palm grip position (see Figure 7). The lower handle section 140 is hollow and is constituted by a pair of mating halves 144 and 146 respectively retained together by fasteners 148 (only one of which is shown). The lower handle section has an oblique obround surface 150 in which a square recess 152 is formed. A circular aperture 154 is provided in the center of the bottom surface 156 of the recess 152 while a pair of diametrically opposed stops 160 project upwardly from the bottom surface 156. Beneath the recess 152 and adjacent opposed interior side walls of the lower handle section 140 are U-shaped retainers 158.
Within the lower handle section 140 is part of a handle rotating mechanism 162. As is best seen in Figure 6c, rotating mechanism 162 includes a support 164 through which one of the fasteners 148 passes to secure its position within the lower handle section 140. A cylinder 166 projects from the support 164 and passes through the apertures formed in the bottom surface 156 and obround surface 150 respectively. On the cylinder 166 adjacent the support are a pair of spaced annulets 168 and 170 respectively. The annulet 168 closest to the support 164 is positioned below the bottom surface 156 and has a pair of diametrically opposed projecting tabs 172 formed on it. The tabs 172 are received by the retainers 158 to inhibit relative rotation of the handle rotating mechanism 162 and the lower handle section 140. The other annulet 170 is positioned above the bottom surface 156 and is accommodated within the recess 152. The annulets 168 and 170 have diameters greater than that of the aperture 154. The upper handle section 142 (best seen in Figures 6d and 6e) is also hollow and is constituted by a pair of mating halves 180 and 182 retained together by fasteners 183. The upper handle section also has an oblique obround surface 184 which overlies obround surface 150. A sleeve 186 depends from surface 184 and accommodates a portion of cylinder 166. The sleeve 186 extends into the recess 152 and has a projecting tab 188 on it which abuts the stops 160 to limit relative rotation of the two handle sections 140 and 142 respectively to 180 degrees. The sleeve 186 also extends into the upper handle section 142 and has a surface 190 in which an aperture 192 is provided to allow the cylinder 166 to pass. An annulet 194 is formed at the distal end of the cylinder 166 and has a diameter greater than that of the aperture 192. The annulet 194 has a pair of diametrically opposed notches 195 formed in it which communicate with a latch 196 to retain the handle 24 in one of the extended pistol grip or retracted palm grip positions. The latch has trunnions 197 on it which are accommodated by hollow cylinders 198 extending from the side walls of the upper handle section 142. The latch 196 includes a manually operable release 200 which projects through an opening 202 in the upper handle section 142 as well as a retaining arm 204. A spring 206 biases the retaining arm 204 of latch 196 to urge it against the annulet 194. A pair of inwardly projecting posts 208 inhibit lateral movement of the latch 196 within the upper handle section 142.
An attachment plate 210 is secured to the upper handle section 142 by fasteners 212 (only one of which is shown) which are accommodated in threaded receptacles 214. The plate 210 is accommodated by the recess 100 in the casing 22 and is secured to the casing 22 by the fasteners 102.
In use, when the handle 24 is in either the pistol grip or retracted palm grip position, the retaining arm 204 of latch 196 is urged into one of the notches 195 formed in the annulet 194. Rotation of the lower handle section relative to the upper handle section is inhibited. When the manually operated release 200 is pushed, the retaining arm 204 pivots against the bias of the spring 206 to bring the retaining arm 204 out of the notch 195. Rotation of the lower handle section 140 relative to the upper handle section 142 is then permitted but only in one direction due to the fact that the projecting tab 188 on the sleeve 186 abuts one of the stops 160. Once the lower handle section 140 has been rotated to bring the retaining arm 204 out of alignment with the notch 195, the release 200 can be released. The retaining arm 204 is urged by the spring 206 toward the annulet 194 but because the retaining arm 204 runs along the outside surface of the annulet 194 it does not prevent the lower handle section 140 from rotating. As the lower handle section 140 is further rotated, the other notch 195 becomes aligned with the retaining arm 204 and the retaining arm snaps into the notch 195 inhibiting any further relative rotation of the upper and lower handle sections. If the release 200 is held, continued relative rotation of the upper and lower handle sections in the same direction is inhibited due to the fact that the projecting tab 188 on the sleeve 186 will abut the other stop 160. The upper and lower handle sections 142 and 140 can be moved back to their previous positions by pivoting the retaining arm 204 once again by actuating the release 200 and rotating the lower handle section 140 relative to the upper handle section 142 in the opposite direction.
Referring now to Figure 8, a portion of the interior of the casing 22 is better illustrated. As can be seen, the casing 22 has an interior support surface 220 with four generally rectangular openings 222 provided in it which are aligned with the fasteners 102 extending through the attachment plate 210. The support surface
220 supports a card reader mounting frame 224. The mounting frame 224 has a base plate 226 which overlies the support surface 220. The base plate 226 has four punches 228 in it adjacent its corners which are received in complimentary openings 222 formed in the support surface 220. The fasteners 102 pass through the openings 222 and threadably engage with apertures 230 in the punches 228. Fasteners 232 also pass through apertures 233 in the base plate 226 and engage with apertures 234 in the support surface 220.
Sidewalls 240 extend along opposed majors sides of the base plate 226. A bridge 242 spans the sidewalls 240 and is spaced above the base plate 226. The card reader 38 is accommodated between the sidewalls and is supported by the sidewalls 240 and bridge 242. Fasteners 244 pass through apertures 246 in the sidewalls 240 and are accommodated by apertures 248 in the card reader 38 to secure the card reader to the mounting frame 224.
The sidewalls 240 and bridge 242 are designed to inhibit shocks from being applied to the card reader 38 in the event that the RF financial transaction terminal 20 is dropped or collides with another object. Specifically, the sidewalls 240 and bridge 242 are formed of aluminum and are dimensioned so that they are able to flex approximately 1.2mm due to the extensile structure of the sidewalls 240. Therefore, in the event of a shock being applied to the RF financial transaction terminal 20, the sidewalls 240 and bridge 242 flex and act as a shock absorber for the card reader 38 so that the card reader floats within the casing 22. In normal operation of the RF financial transaction terminal, the secure module 28 operates in conjunction with the main CPU 62 in the CPU module 26 as the main CPU 62 executes the applications program to allow transactions to be entered at the location of a user and conveyed over the RF communications link to the central network controller 12 as well as to receive transaction verification data from the host computers at the financial institution via the central network controller
12 and the RF communications link.
During this operation, as the main CPU 62 executes the applications program, the CPU 62 must request the services of the secure module 28 via interface 58 whenever data needs to be displayed on the LCD display 50 or entered via the input keypad 58. The secure module 28 recognizes three different types of requests generated by the main CPU 62, namely a "display only" request, a "display prompt" request and a "display secure prompt" request.
The display only and display prompt requests are typically generated by the main CPU 62 when the RF financial transaction terminal is used in normal operation and transactions are being carried out at user locations. Display secure prompts are generated by the host computers at financial institutions and are the most sensitive due to the fact that keyboard entries are passed to the main CPU module 26 in clear text form.
When the secure module 28 receives a display only request from the main CPU 62, the secure module 28 causes the word "UNSECURED" to flash in the secure display area of the LCD display 50 and displays keypad entries on the unsecured display area without checking the data. The keypad entries are not forwarded to the main CPU module 26. Presses of the entry key of the keypad 52 are however passed to the main CPU 62 by the secure module 28 to signal the main CPU to proceed with the applications program.
When the secure module 28 receives a display prompt request from the main CPU 62, the secure module causes the word "SECURE" to be continuously displayed in the secure display area of the LCD display 50 and displays the appropriate prompt such as "Enter PIN" on the unsecured display area of the LCD display 50. Keypad entries are encrypted by the secure chip 48 in the secure module 28 before being conveyed to the main CPU 62 and are not displayed. Thus, during normal operation transaction data which is to be forwarded to the host computers at the financial institution is not displayed on the LCD display 50 when entered and is encrypted prior to being transmitted over the RF communications link to provide proper security.
When the secure module 28 receives a display secure prompt request from the main CPU 62, the secure module requests the main CPU to provide a prompt authentication code (PAC) associated with the secure prompt being requested. The PACs are generated by the host computers in the financial institutions using a cryptographic algorithm for each secure prompt and are transmitted to the RF financial transaction terminals by the host computers when the RF financial transaction terminal is physically connected to the central network controller 12 as will be described.
When the secure module receives the secure prompt request together with the PAC, the secure chip 48 compares the PAC with the content of a secure prompt table in RAM 48c. If the results of the comparison are proper, the secure module 28 passes entries made using the keypad 52 directly to the main CPU 62 in clear text form. If the results of the comparison are not correct, the secure module 28 denies the secure prompt request. Central Network Controller
Referring now to Figure 2, the central network controller 12 is better illustrated. The network central controller 12 is typically located in a retailer's premises and is powered by a power supply 80 connected to AC mains. The central network controller is also connected to a dial-up or leased-line phone cable. The central network controller 12 includes a CPU motherboard with a main microprocessor 82 and associated memory 84. The main microprocessor 82 is connected to a RF transceiver 86 in the form of a RF modem having an antenna 88 for establishing a RF communications link with the various RF financial transaction terminals 20 using a wireless data communications network. A DATAPAC interface 90 is provided with DATAPAC 3101 and 3201 surface interfaces. An ISDN interface board may also optionally be provided. A serial RS-232 interface 92 is included in the central network controller 12 to allow updates to data and software used by the RF financial transaction terminals 20 and central network controller 12 to be downloaded. A serial RS-485 interface 94 is also provided for optional connection of the central network controller 12 to the retailer's existing point-of sale platforms. The central network controller 12 functions as a gateway between the RF financial transaction terminals 20 and the standard interfaces (ie. DATAPAC) leading to the host computers at financial institutions. The central network controller 12 forms a transparent link for all transaction requests generated by the RF financial transaction terminals that are conveyed to financial institutions as well as for all replies generated by financial institutions that are conveyed to the RF financial transaction terminals 20 in response to received transaction requests.
The memory 84 stores software which is executed by the main microprocessor 82 allowing the central network controller 12 to perform a number of functions. Specifically, the central network controller 12 effects wireless data communication network control using a communications protocol, discussed in greater detail below. The central network controller 12 also controls message exchange between the RF financial transaction terminals and the financial institutions. Specifically, the central network controller 12 collects transaction requests from the individual RF financial transaction terminals 20 and forwards them to the host computers at the appropriate financial institutions in order the transaction requests are received. In addition, the central network controller 12 controls message exchange between the central network controller 12 and the host computers at financial institutions using DATAPAC 3101 or DATAPAC 3201 services. The central network controller 12 supports existing data communications protocol as defined by Telecom Canada. However, if desired an ISDN interface can be used instead of the DATAPAC 3101 and 3201 services.
The central network controller 12 also receives and stores new RF financial transaction terminal software releases and new RF financial transaction terminal secure prompt tables provided by the financial institution for use in the RF financial transaction terminals. For example, a financial institution can download the new RF financial transaction terminal software to the central network controller 12 via the RS-232 interface 92 for storage in memory 84. The central network controller 12 can then download the updated software to the RF financial transaction terminals to update them by way of a physical serial cable connection established between the RS-232 interface 92 of the central network controller 12 and the RS-232 interfaces
56 on the RF financial transaction terminals 20. When the software in all of the RF financial transaction terminals has been updated, the new RF financial transaction terminal software can be deleted from the memory 84. The central network controller 12 also controls communication with the existing point-of-sale platforms at the retailer location via the serial RS-485 interface 94. This allows a retailer to use existing cash registers to exchange data such as prices, totals, etc. to the central network controller 12.
Prior to operation of the financial transaction system 10, the central network controller 12 is put through an initialization routine to establish several configuration parameters. The initialization routine will now be described.
Central Network Controller Initialization
During initialization, one of the RF financial transaction devices is physically connected to the central network controller 12 by way of a serial cable connected to the RS-232 interfaces 56 and 92 respectively to allow the keypad 52 of the RF financial transaction device to be used to enter data into the central network controller 12. The keypad 52 is used to enter or select the following: i) The current time and date; ii) The type of communications format to be used to communicate with the host computers at the financial institution; iii) The type of point-of-sale platform at the retailer's location to be connected to the RS-485 interface 94; iv) The telephone number of the modem at the financial institution that should be dialled to request download of new RF financial transaction terminal software; v) The telephone number of the modem at the financial institution that should be dialled to request download of a new RF financial transaction terminal secure prompt table; vi) Telephone numbers and network addresses for credit and debit transactions; and vii) The destination addresses of the RF financial transaction terminals in the financial transaction system 10. Following this, the RF financial transaction terminal software and secure prompt table must be downloaded to the central network controller 12 from the financial institution. During this stage of the initialization, the host computer at the financial institution contacts the central network controller 12 using a dial-up modem and transmits a message indicating the type of data to be downloaded to the central network controller 12 ie. the RF financial transaction terminal software or the secure prompt table. Once the message has been transmitted to the central network controller, the connection is terminated. The central network controller 12 then establishes a connection to the financial institution by dialling the appropriate modem number initialized at either step iv or v above. Once the connection is established, the RF financial transaction terminal software or secure prompt table is downloaded into the memory 84 of the central network controller 12.
Following this, each RF financial transaction terminal 20 is connected to the central network controller 12 via a serial cable connected between the RS-232 interfaces 56 and 94 respectively so that the RF financial transaction terminal software or secure prompt table can be downloaded into the RF financial transaction terminal.
The download procedure is initiated using the keypad on the RF financial transaction terminal. After the RF financial transaction terminal software or secure prompt table has been downloaded, the RF financial transaction terminal is prompted by the financial institution to generate a Download Request-Terminal Initialization transaction which is conveyed to the financial institution by way of the central network controller
12 in order to synchronize the cryptographic keys stored therein and to receive operational parameters from the financial institution. Also, depending on information required by the financial institution, the financial institution may pass an instruction to the RF financial transaction terminal which causes the main CPU 62 to generate a secure prompt request.
Once the above has been done, the connection between the central network controller and the host computer at the financial institution can be terminated. As should be appreciated, the above steps are performed separately in order to initiate download of the RF financial transaction terminal software and secure prompt table and are performed for each RF financial transaction terminal 20 in the financial transaction system 10. Communications Protocol
As mentioned previously, the RF financial transaction terminals 20 and the central network controller 12 use a communications protocol to exchange data over the RF communications link. The communications protocol will now be described. Messages and Packets
In the communications protocol, a number of types of messages are generated either by the MCU in the RF modem 20b or 86 or by the DTE 20a.
Depending on the type of message, different operations are performed. The messages generated in the communications protocol of the present invention are information messages (i_messages), command messages (comm.msg), error messages
(error message) and acknowledgement messages (ack_messages).
Information and command messages are generated by a DTE 20a and are conveyed to the MCU in the RF modem. Information messages are messages which are to be transmitted on the RF communications link and are addressed to a particular RF financial transaction terminal 20 or to the central network controller 12.
When a RF modem receives an information message it adds a data link (DLL) layer to it to create an information packet (i_packet) before transmitting the i_packet on the
RF communications link.
A command message is a message which is to be used by the RF modem for internal purposes to reset command parameters therein. A command message is not put in the form of an i_packet by the RF modem and therefore, is not transmitted on the RF communications link.
Error messages are generated by the MCU in a RF modem in the event that proper communications cannot be established over the RF communications link. Error messages generated by the MCU are conveyed to the DTE.
Acknowledgment messages are generated by the MCU of a RF modem after an i_packet has been properly received. The MCU then adds a DLL layer to the acknowledgement message to create an acknowledgement packet (ack_packet) before transmitting the ack_packet on the RF communications link addressed to the RF financial transaction terminal or central network controller that sent the received i_packet. There are two types of incoming packets that a MCU can receive on the RF communications link, namely, an i_packet and an ack_packet. An i_packet received by a RF modem is forwarded to the DTE in the form of an ...message (after stripping the DLL header from it) if it is error free, and if the destination address of the i_packet is valid. An ack_packet received by a RF modem is not forwarded to the DTE. Appendix A better illustrates the form of the various packets and messages generated using the communications protocol. Messaging
The communications protocol provides for three modes of operation, namely an idle mode, a transmit (Tx) mode and a receive (Rx) mode. The following is a description of the idle, receive and transmit modes of operation of the RF financial transaction terminals 20 and the central network controller 12 with reference to Figures 4 and 5.
RF modem Initialization
When a RF financial transaction terminal 20 or the central network controller 12 is powered up or reset (block 700), the MCU of the RF modem initiates a startup procedure (block 702). During this procedure, the MCU resets an acknowledge flag (ack_ok_flg) to 0 and sets an acknowledge timer (ack_timer) to an initial value (ack_a_init). At this stage, the acknowledge timer starts counting down and when the acknowledge timer expires, the acknowledge flag (ack_ok_flg) is set to 1. Once the startup procedure 702 has been completed, the MCU of the RF modem enters an idle mode (block 704).
Idle mode
In the idle mode, the MCU of the RF modem waits to be interrupted by either an RTS signal received from the DTE, an incoming packet received on the RF communications link or an expired timer signal. R mode
If an incoming packet is received by the RF modem on the RF communications link (block 710), the MCU removes the DLL header from the incoming packet and calculates a cyclic redundancy check (CRC) value (block 712). The calculated CRC value is then checked to determine if it is valid (block 714). If the CRC value is not valid, the MCU resets the acknowledge timer to the initial value (ack_a_init) and sets the acknowledge flag (ack_ok_flg) to 0 (block 716) before returning to the idle mode (block 718). If at block 714 the CRC value is determined to be valid, the destination address (dest_id) of the incoming packet is checked (block 720). If the destination address is not valid, the MCU proceeds to block 716.
If the destination address is valid, the incoming packet is checked to determine if it is an i_packet (block 722). If the incoming packet is determined not to be an i_packet, then it is then checked to determine if it is an ack_packet (block 724). If the incoming packet is determined not to be an ack_packet, the MCU proceeds to block 716. If the incoming packet is an ack_packet, the MCU sets the
A financial transaction system is provided in which a user is given a portable RF financial transaction terminal with which to enter transaction data via a keypad or read a UPC bar code on merchandise via a CCD scanner and read their credit, debit or smart card. The RF financial transaction terminal transmits the transaction and card data to a central network controller via a RF communications link. The central network controller in turn conveys the transaction and card data to the host computers at a financial institution where the transaction is processed in real¬ time. The financial institutions return verification data to the central network controller which is passed back to the RF financial transaction terminal via the RF communications link. The RF financial transaction terminal then generates a printed receipt of the transaction for the user. All of this may be done while the RF financial transaction terminal and the user's credit, debit or smart card remains in the total custody of the user. The user is therefore relieved from having to proceed to an ABM, retail platform, cashier's desk, etc. acknowledge flag (ack_ok_flg) to 1 (block 725) before proceeding to block 718.
If at block 722 the incoming packet is determined to be an i_packet, the MCU forwards the i_message to the DTE (block 726). The MCU then causes the RF modem to generate and transmit an ack_packet on the RF communications link addressed to the RF modem of the RF financial transaction terminal or central network controller that sent the i_message to confirm receipt of the i_message (block 728). Following this, the MCU proceeds to block 718 and enters the idle mode. Tx mode
If the MCU receives an RTS signal (block 730), the MCU is conditioned to the transmit mode and awaits receipt of a message from the DTE (block 732). When the message is received from the DTE, the MCU checks the message to determine if it is a comm_message (block 734). If the message is a comm_message, the MCU resets the communications parameters (comm.params) therein in accordance with the comm_message (block 736) before returning to the idle mode (block 738).
If at block 734 the message is determined not to be a comm_message, the message is assumed to be an i_message. The MCU in tum calculates and adds the DLL header to the i_message to create an i_packet (block 740). Once the i_packet has been created, die MCU checks to determine if the acknowledge flag (ack_ok_flg) is set to 1 (block 742). If the acknowledge flag is not set, the MCU returns to an idle mode (block 744) and waits for the acknowledge flag (ack_ok_flg) to be set to 1. At block 742 if the acknowledge flag is set, the MCU calculates a random number k (block 746), sets a network access denied timer (nad_timer) to an initial value equal to k * nad_d where nad_d is equal to 8.5ms ( block 748) before returning to an idle mode (block 750) waiting for the nad_timer to expire. In the idle mode at block 744, the MCU waits for the acknowledge flag (ack_ok_flg) to be set to 1 as shown at block 752, and then proceeds to block 746. The generated random number k is of the form k€ 16,31 if the ijnessage is being originally transmitted and is of the form k€0,15 if the i_message is being retransmitted. The nad_timer is used to provide randomization of RF communications link channel occupation attempts.
When the nad_timer expires (block 754), the MCU sets a transmission counter (R_Tx_CNT) to an initial value (R_Tx_NMB) representing the number of times the RF modem will attempt to transmit a packet (block 756). Once the transmission counter has been set, the RF modem transmits the packet on the RF communications link, decrements the transmission counter (R_Tx_CNT) by one and sets an acknowledge response timer (R_Tx_Timer) to an initial value (R_Tx_D) (block 758). In this particular example, the initial value (R_Tx_D) is equal to the initial value of the acknowledge timer, namely ack_a_init. Following this, the MCU enters an idle mode (block 760). After the packet is transmitted on the RF communications link, the
MCU awaits receipt of an ack_packet from the RF financial transaction terminal 20 or central network controller 12 to which the packet was addressed to confirm that the packet was properly received. If the acknowledge response timer (R_Tx_Timer) expires before the ack_packet is received (block 762), the MCU checks the value of the transmission counter (R_Tx_CNT) (block 764). If the value of the transmission counter is equal to zero, the MCU sends an error message to the DTE 20a to inform that DTE 20a that the packet was not successfully transmitted (block 766) and the MCU returns to the idle mode (block 768). If at block 764 the value of the transmission counter is determined to be greater than zero, the MCU proceeds to block 746 and the following steps are performed again in order to retransmit the packet.
Acknowledge and Acknowledge Response Timers
After transmission of a packet on the RF communications link, it is necessary for the MCU to allow the RF financial transaction terminal or central network controller to which the packet was sent sufficient time to respond with an ack_packet without interruption by other MCUs. This is done by setting the acknowledge and acknowledge response timers (ack.timers and R_Tx_Timers) in all RF modems to a predetermined initial value (ack_a_init) after an incoming packet with a valid CRC and destination address (dest_id) is received. The ack_a_init value must be large enough to ensure that a RF modem will have sufficient time to receive the packet, check the CRC value, remove the DLL header, forward the i_message to the DTE, create an ack_ packet and send it to the transmitting MCU before the timers expire.
In the present financial transaction system 10, the ack_a_init value is given by:
2 x prop_delay+MCU_Rx_ρr-l-RF modem_TO_DTE_transf+MCU ack_pr
+ ACK_xmit + T_ambg where: prop.delay is the packet transmission propagation delay and is assumed to be approximately equal to 0;
MCU_Rx_pr is the time needed for the MCU to process the received packet;
RF modem_to_DTE_transf is the time needed for the MCU to transfer the i_message to the DTE;
MCU_ack_pr: is the time needed for the MCU to generate the ack_packet;
ACK_xmit is the ack_packet transmission time; and
T_ambg is ambiguity time added to the ack_a_init value to provide a buffer.
Referring now to Figure 9, another embodiment of the RF financial transaction terminal 20 is shown. In this embodiment, the handle 24 is replaced with a CCD unit bar code reader 42. As can be seen, die bar code reader 42 includes a body 300 with a plate 302 on it which is basically the same size as plate 210 and which is received by tiie recess 100 formed in the casing 22. Fasteners 102 pass through apertures 304 in the body 300 and threadably engage the apertures 230 in the punches 228. A pair of wings 310 extend from the sides of die body 300. Fasteners 312 pass through apertures 314 in the wings 310 and threadably engage apertures 315 in die underside 22a of the casing 22. A conventional CCD scanner (not shown) is housed witi in the body. The front of the body includes a pane 316 through which the laser beam generated by the CCD scanner can pass so that bar codes can be read. On the upper surface of the body 300 is a multi-pin electrical connector (not shown) which mates with the complimentary electrical connector 104 on the underside 22a. A pistol grip handle 318 depends from the body 300 and has a manually operable trigger 320 on it which when actuated operates the CCD scanner.
When the bar code reader 42 is to be used, the fasteners 102 attaching the handle 24 to the casing 22 are loosened and the handle 24 is removed. The cover 106 over the electrical connector 104 on the radio terminal 20 is also removed to expose it. The bar code reader 42 is then attached to the casing 22 via fasteners 102 and 312. At tiiis time, the electrical connectors mate and power is supplied to the bar code reader 42 by the battery 60. Logic in the bar code reader 42 detects when the bar code reader is connected to the battery and automatically powers the bar code reader so that it becomes operative. The bar code reader then operates in a conventional manner with the CCD scanner generating a laser beam which passes through the pane 316 when the trigger 320 is actuated. When the laser beam is scanned across a bar code, the CCD scanner reads the scanned bar code and conveys the information to the RF financial transaction terminal 20 via interface 44 in a conventional manner to record the transaction data.
With reference to Figure 10, a charging dock 400 is shown for receiving the RF financial transaction terminal 20 when the handle 24 is in the retracted position. A non-contact charger unit is accommodated by a charging dock cavity 401 within the dock 400 for charging the power supply 60. A charging stud
402 on the dock is received by a charging receptacle 404 formed in the undersurface 22a of casing 22 to properly position the RF financial transaction terminal 20 within the dock so that charging of the power supply can occur.
Figure 11 shows a charging and carrying nest 500 for carrying the RF financial transaction terminal 20 when the handle 24 is in the extended pistol grip position. The charging and carrying nest 500 also includes a charging stud 402 to register with the charging receptacle 404 formed in the undersurface of the casing 22.
In both the charging dock 400 and charging nest 500, the rear case of the dock or nest is built-up. This is done to prevent the RF financial transaction terminal 20 from being placed in the dock or nest when a card is positioned in the card reader or from trying to insert a card into the card reader when the RF financial transaction terminal is being charged. This design helps to inhibit the erasure of data recorded on the magnetic strip of a credit or debit card by the fields created by the dock or nest. Figure 13 shows yet another embodiment of a handle for the RF financial transaction terminal 20. In this embodiment, the handle 24 is connected to the undersurface 22a of casing 22 by means of a tongue 650 cooperating with an internal slot 652 formed in the undersurface 22a of casing 22, and a pair of one-way screws 654. The handle 24 is formed in a single piece construction and therefore, remains in the extended pistol grip position. Although the card reader has been described to read credit or debit cards, it should be apparent to those of skill in the art tiiat a smart card reader having read/ write functions may be incorporated into the RF financial transaction terminal.
Although various embodiments of RF financial transaction terminals have been described for use in a financial transaction system, those of skill in the art will appreciate that variations and modifications may be made to the present invention without departing from the scope thereof as defined by the appended claims.
APPENDΓX A
The following is a description of the various message and packet formats:
i_packet
I synch | CRC[2] | DLL_ctrl[l] | 'STX' | msg_type[l] | dest_id[l] | source_id[l] | data [123] | 'ETX' or ΕTB' |
where: i_message starts at 'STX' and ends at 'ETX' or 'ETB'; and
DLL header consists of 16 bit cyclic redundancy check value (synch CRC) and a DLL control byte (DLL_ctrl).
In the i_message: i) the position of the destination and source identifications (dest_id and source_id) are fixed; ii) the maximum number of data bytes is set at 123; and iii) STX and ETX or ETB bytes only appear at beginning and end of i_message.
The DLL control byte has the following format: -QQQQSSSS where: QQQQ is request type: 1000 for information and 0111 for ack_packet
SSSS is presently unused
ack_packet
I synch | CRC[2] | DLL_ctrl[l] | 'STX' | msg_type[l] | dest_ID[l] | source_ID[l] |
'ETX' I APPENDDC A - CON'T
Control message
'STX' I msg_type[l] | dest_ID[l] | source_ID[l] | 'ETX' |
Error message
'STX' I msg_type[l] | dest_ID[l] | source_ID[l]error_code[l] | 'ETX' |

Claims

What is claimed is:
1. A portable radio frequency financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart card; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a radio frequency transmitter to transmit said transaction and card data to a remote site whereat a transaction can be processed.
2. A terminal as defined in claim 1 further comprising a radio frequency receiver to receive verification data from said remote site that said transaction has been verified and processed.
3. A terminal as defined in claim 2 further comprising a printer to generate a printed receipt of said transaction.
4. A terminal as defined in claim 3 wherein said printer is inhibited from generating said receipt until said receiver has received said verification data.
5. A terminal as defined in claim 4 wherein said input means includes a keypad and/or a bar code reader to allow said transaction data to be entered.
6. A terminal as defined in claim 1 wherein said processing means includes cryptographic security to encrypt said transaction and card data prior to transmission.
7. A terminal as defined in claim 6 further comprising tamper proof means to inhibit access to cryptographic data used by said cryptographic security.
8. A terminal as defined in claim 7 wherein said tamper-proof means includes a solar battery within said housing, said solar battery developing a charge when exposed to light signifying unauthorized access into said housing, said processor detecting charge developed by said solar battery and deleting said cryptographic data to inhibit unautiiorized access thereto.
9. A terminal as defined in claim 1 wherein said housing has a pistol grip to facilitate carrying thereof.
10. A terminal as defined in claim 9 wherein said pistol grip is movable between extended and retracted positions.
11. A terminal as defined in claim 10 wherein said pistol grip includes a locking mechanism to maintain said pistol grip in one of said extended and retracted positions and a release to release said locking mechanism to allow said pistol grip to be moved between said extended and retracted positions.
12. A terminal as defined in claim 5 wherein said bar code reader is removably attachable to said housing.
13. A terminal as defined in claim 1 further comprising shock absorbing means acting between said card reader and said housing to inhibit shocks from being applied to said card reader.
14. A financial transaction system comprising: a plurality of portable radio frequency financial transaction terminals to receive transaction and debit, credit or smart card data; and a central network controller in communication with each of said portable radio frequency financial transaction terminals via a RF communications link, said central network controller receiving said transaction and card data transmitted by said portable radio frequency financial transaction terminals and conveying said transaction and card data to a financial institution whereat transactions can be processed.
15. A system as defined in claim 14 wherein said central network controller receives verification data from said financial institution that said transactions are valid, said central network controller transmitting said verification data to said portable radio frequency financial transaction terminals via said RF communications link to confirm valid transactions.
16. A system as defined in claim 15 wherein data transmitted over said RF communications link is encrypted.
17. A financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and shock absorbing means acting between said card reader and said housing to inhibit shocks from being applied to said card reader.
18. A terminal as defined in claim 17 wherein said shock absorbing means includes a frame having a pair of flexible, laterally spaced walls and a flexible transverse bridge extending between said walls, said card reader resting on said bridge and being positioned between said walls; and fastening means to secure said card reader to said walls.
19. A financial transaction terminal comprising: a housing; input means to allow transaction data to be entered therein; a card reader to receive and read credit, debit or smart cards; a processor in communication with said input means and said card reader to receive and process transaction and card data; and a pistol grip depending from said housing to facilitate carrying of said terminal, said pistol grip being movable between extended and retracted positions.
20. A terminal as defined in claim 19 wherein said pistol grip includes a locking mechanism to maintain said pistol grip in one of said extended and retracted positions and a release to release said locking mechanism to allow said pistol grip to be moved between said extended and retracted positions.
PCT/CA1996/000104 1995-02-23 1996-02-22 Free-roaming remote hand-held point-of-sale terminal WO1996026505A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP96902198A EP0811210A1 (en) 1995-02-23 1996-02-22 Free-roaming remote hand-held point-of-sale terminal
BR9607426A BR9607426A (en) 1995-02-23 1996-02-22 Free-moving remote portable point of sale terminal
AU46613/96A AU4661396A (en) 1995-02-23 1996-02-22 Free-roaming remote hand-held point-of-sale terminal
JP8524497A JPH11500550A (en) 1995-02-23 1996-02-22 Mobile and mobile remote operation point of sale terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9503662.0A GB9503662D0 (en) 1995-02-23 1995-02-23 Free-roaming remote hand-held point-of-sale terminal
GB9503662.0 1995-02-23

Publications (1)

Publication Number Publication Date
WO1996026505A1 true WO1996026505A1 (en) 1996-08-29

Family

ID=10770151

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA1996/000104 WO1996026505A1 (en) 1995-02-23 1996-02-22 Free-roaming remote hand-held point-of-sale terminal

Country Status (12)

Country Link
EP (1) EP0811210A1 (en)
JP (1) JPH11500550A (en)
KR (1) KR19980702437A (en)
CN (1) CN1176011A (en)
AR (1) AR015099A1 (en)
AU (1) AU4661396A (en)
BR (1) BR9607426A (en)
CA (1) CA2213336A1 (en)
GB (1) GB9503662D0 (en)
TW (1) TW286464B (en)
WO (1) WO1996026505A1 (en)
ZA (1) ZA961429B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2310069A (en) * 1996-02-07 1997-08-13 Nec Corp Banking system
WO1998044462A2 (en) * 1997-04-01 1998-10-08 Michael Coveley Cashierless shopping store and components for use therein
EP0930590A1 (en) * 1998-01-16 1999-07-21 Mobil Oil Corporation Portable point-of-sale terminal with device for inputting security code access key
WO2000046959A1 (en) * 1999-02-05 2000-08-10 Telefonaktiebolaget Lm Ericsson Service card transactions over a wireless lan
EP1042879A1 (en) * 1997-12-22 2000-10-11 Motorola, Inc. Secure messaging system overlay for a selective call signaling system
EP1042743A2 (en) * 1997-12-22 2000-10-11 Motorola, Inc. Single account portable wireless financial messaging unit
EP0940783A3 (en) * 1998-03-05 2001-05-02 Keycorp Limited Mobile electronic payment terminal
WO2001037229A1 (en) * 1999-11-18 2001-05-25 Wildcard Communications Canada Inc. Electronic system having variable functions
EP1120071A1 (en) * 2000-01-27 2001-08-01 PSC Scanning, Inc. Customer-operated merchandise checkout system for supermarkets
WO2001057818A1 (en) * 2000-02-07 2001-08-09 Cardtech S.R.L. A method, system and device for remote commercial transactions
WO2001077931A1 (en) * 2000-04-11 2001-10-18 Joseph Mckenna Electronic wallet
WO2002005223A2 (en) * 2000-07-11 2002-01-17 Newt Limited Improvements relating to the security of payment transactions
EP1315132A2 (en) * 2001-11-26 2003-05-28 Siemens Aktiengesellschaft Automatic payment request via contactless reader
EP1329825A1 (en) * 2000-08-24 2003-07-23 Sagawa Express Co., Ltd. Card payment method for service charge concerning to physical distribution or transportation
EP1563697A2 (en) * 2002-10-30 2005-08-17 Way Systems, Inc. Mobile communication device equipped with a magnetic stripe reader
US7209889B1 (en) 1998-12-24 2007-04-24 Henry Whitfield Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
EP2110768A1 (en) * 2000-03-03 2009-10-21 Kabushiki Kaisha Eighting Individual certification method using bar code
US8967468B2 (en) 2002-01-11 2015-03-03 Hand Held Products, Inc. Terminal including imaging assembly

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10240883A (en) 1997-02-24 1998-09-11 Toshiba Corp Ic card system, and security method therefor
JP2002055960A (en) 2000-08-10 2002-02-20 Nec Corp System and method for card authentication
TWI295115B (en) 2006-02-13 2008-03-21 Ind Tech Res Inst Encapsulation and methods thereof
TWI342625B (en) 2007-02-14 2011-05-21 Neobulb Technologies Inc Light-emitting diode illuminating equipment
CN109409463A (en) * 2018-10-31 2019-03-01 深圳市联合智能物联科技有限公司 A kind of method and its system of the nearest gateway of automatic identification

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2151061A (en) * 1983-12-09 1985-07-10 Ticketshop Limited Credit and charge card processing systems
EP0456548A1 (en) * 1990-05-10 1991-11-13 Dassault Automatismes Et Telecommunications Device for treating high-security data with two operational states
EP0484198A1 (en) * 1990-10-30 1992-05-06 Societe D'applications Generales D'electricite Et De Mecanique Sagem Portable payment terminals and network of such terminals
US5208446A (en) * 1991-09-19 1993-05-04 Martinez Jerry R Method and apparatus for validating credit information during home delivery of order
WO1994011849A1 (en) * 1992-11-11 1994-05-26 Telecom Finland Oy Mobile telephone systems and a method for carrying out financial transactions by means of a mobile telephone system
US5359182A (en) * 1992-10-06 1994-10-25 Interdigital Technology Corporation Wireless telephone debit card system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2151061A (en) * 1983-12-09 1985-07-10 Ticketshop Limited Credit and charge card processing systems
EP0456548A1 (en) * 1990-05-10 1991-11-13 Dassault Automatismes Et Telecommunications Device for treating high-security data with two operational states
EP0484198A1 (en) * 1990-10-30 1992-05-06 Societe D'applications Generales D'electricite Et De Mecanique Sagem Portable payment terminals and network of such terminals
US5208446A (en) * 1991-09-19 1993-05-04 Martinez Jerry R Method and apparatus for validating credit information during home delivery of order
US5359182A (en) * 1992-10-06 1994-10-25 Interdigital Technology Corporation Wireless telephone debit card system and method
WO1994011849A1 (en) * 1992-11-11 1994-05-26 Telecom Finland Oy Mobile telephone systems and a method for carrying out financial transactions by means of a mobile telephone system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"PORTABLE SELF-CHECKOUT RETAIL SYSTEM", IBM TECHNICAL DISCLOSURE BULLETIN, vol. 35, no. 1A, June 1992 (1992-06-01), NEW YORK US, pages 315 - 318, XP000308880 *

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2310069A (en) * 1996-02-07 1997-08-13 Nec Corp Banking system
GB2310069B (en) * 1996-02-07 1999-11-10 Nec Corp Apparatus for drawing an amount from and/or depositing an amount to an account and a banking system using the same
US6098055A (en) * 1996-02-07 2000-08-01 Nec Corporation Banking system equipped with a radio linked portable terminal
WO1998044462A2 (en) * 1997-04-01 1998-10-08 Michael Coveley Cashierless shopping store and components for use therein
WO1998044462A3 (en) * 1997-04-01 1999-02-11 Michael Coveley Cashierless shopping store and components for use therein
US6725206B1 (en) 1997-04-01 2004-04-20 Solbyung Coveley Cashierless shopping store and components for use therein
EP1042743A4 (en) * 1997-12-22 2003-05-07 Motorola Inc Single account portable wireless financial messaging unit
EP1042743A2 (en) * 1997-12-22 2000-10-11 Motorola, Inc. Single account portable wireless financial messaging unit
EP1042879A4 (en) * 1997-12-22 2005-08-10 Motorola Inc Secure messaging system overlay for a selective call signaling system
EP1042879A1 (en) * 1997-12-22 2000-10-11 Motorola, Inc. Secure messaging system overlay for a selective call signaling system
EP0930590A1 (en) * 1998-01-16 1999-07-21 Mobil Oil Corporation Portable point-of-sale terminal with device for inputting security code access key
EP0940783A3 (en) * 1998-03-05 2001-05-02 Keycorp Limited Mobile electronic payment terminal
US7899755B2 (en) 1998-12-24 2011-03-01 S.F. Ip Properties 59 Llc Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
US7209889B1 (en) 1998-12-24 2007-04-24 Henry Whitfield Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
WO2000046959A1 (en) * 1999-02-05 2000-08-10 Telefonaktiebolaget Lm Ericsson Service card transactions over a wireless lan
WO2001037229A1 (en) * 1999-11-18 2001-05-25 Wildcard Communications Canada Inc. Electronic system having variable functions
EP1120071A1 (en) * 2000-01-27 2001-08-01 PSC Scanning, Inc. Customer-operated merchandise checkout system for supermarkets
US7114656B1 (en) 2000-01-27 2006-10-03 Ecr Software Corporation Fixed self-checkout station with cradle for communicating with portable self-scanning units
WO2001057818A1 (en) * 2000-02-07 2001-08-09 Cardtech S.R.L. A method, system and device for remote commercial transactions
EP2110768A1 (en) * 2000-03-03 2009-10-21 Kabushiki Kaisha Eighting Individual certification method using bar code
WO2001077931A1 (en) * 2000-04-11 2001-10-18 Joseph Mckenna Electronic wallet
US6848613B2 (en) 2000-07-11 2005-02-01 Newt Limited System and method for the security of payment transactions
WO2002005223A3 (en) * 2000-07-11 2002-07-18 Newt Ltd Improvements relating to the security of payment transactions
WO2002005223A2 (en) * 2000-07-11 2002-01-17 Newt Limited Improvements relating to the security of payment transactions
EP1329825A4 (en) * 2000-08-24 2006-03-22 Sagawa Express Co Ltd Card payment method for service charge concerning to physical distribution or transportation
EP1329825A1 (en) * 2000-08-24 2003-07-23 Sagawa Express Co., Ltd. Card payment method for service charge concerning to physical distribution or transportation
EP1315132A3 (en) * 2001-11-26 2004-06-30 Siemens Aktiengesellschaft Automatic payment request via contactless reader
EP1315132A2 (en) * 2001-11-26 2003-05-28 Siemens Aktiengesellschaft Automatic payment request via contactless reader
US8967468B2 (en) 2002-01-11 2015-03-03 Hand Held Products, Inc. Terminal including imaging assembly
US9734493B2 (en) 2002-01-11 2017-08-15 Hand Held Products, Inc. Terminal including imaging assembly
EP1563697A2 (en) * 2002-10-30 2005-08-17 Way Systems, Inc. Mobile communication device equipped with a magnetic stripe reader
EP1563697A4 (en) * 2002-10-30 2006-07-05 Way Systems Inc Mobile communication device equipped with a magnetic stripe reader
US7336973B2 (en) 2002-10-30 2008-02-26 Way Systems, Inc Mobile communication device equipped with a magnetic stripe reader

Also Published As

Publication number Publication date
KR19980702437A (en) 1998-07-15
EP0811210A1 (en) 1997-12-10
AU4661396A (en) 1996-09-11
BR9607426A (en) 1998-11-17
ZA961429B (en) 1996-08-27
GB9503662D0 (en) 1995-04-12
MX9706482A (en) 1998-06-28
CN1176011A (en) 1998-03-11
TW286464B (en) 1996-09-21
JPH11500550A (en) 1999-01-12
CA2213336A1 (en) 1996-08-29
AR015099A1 (en) 2001-04-18

Similar Documents

Publication Publication Date Title
WO1996026505A1 (en) Free-roaming remote hand-held point-of-sale terminal
US6859650B1 (en) Mobile device, chip card and method of communication
US4523087A (en) Transaction verification system using optical coupling data communication link
US5811770A (en) Device for conducting transactions using smart cards and method for conducting a transaction with said device
US7293717B1 (en) Method for recovering information stored in a smart card
US5754655A (en) System for remote purchase payment and remote bill payment transactions
US6662020B1 (en) Arrangement for effecting secure transactions in a communication device
US6010067A (en) Mobile funds transaction device for transferring funds between remote banking facilities
AU675550B2 (en) System and method for revaluation of stored tokens in IC cards
US4454414A (en) Funds transfer system using optically coupled, portable modules
US20030075610A1 (en) Electronic credit card-ecc
JPH0823905B2 (en) IC card transaction processing device
GB2317488A (en) Electronic payment terminal
GB2274523A (en) Portable electronic fund transfer device
WO1983003694A1 (en) Funds transfer system using optically coupled, portable modules
JPH08101875A (en) Financing-transaction processing system and financing-service remote distribution method
WO1996004618A1 (en) System for remote purchase payment and remote bill payment transactions
US5949378A (en) Rotatable antenna for financial transaction terminal
JP4672225B2 (en) Self-service terminal device
JPH1125233A (en) Method and device for ic card
CA2261187C (en) Communications system for transmitting accounting instructions
JP2001357464A (en) Transaction terminal device
MXPA97006482A (en) Terminal manual remote sale point, free displacement
EP0635774B1 (en) Hand-held terminal for performing purchasing, debit, credit and drawing operations
WO1998014915A2 (en) A method of assembling and programming a secure personal identification number entry device

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 96192109.9

Country of ref document: CN

AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 2213336

Country of ref document: CA

Ref document number: 2213336

Country of ref document: CA

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 301238

Country of ref document: NZ

ENP Entry into the national phase

Ref document number: 1997 894586

Country of ref document: US

Date of ref document: 19970822

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 1019970705836

Country of ref document: KR

ENP Entry into the national phase

Ref document number: 1996 524497

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: PA/a/1997/006482

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 1996902198

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1996902198

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1019970705836

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1996902198

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 1019970705836

Country of ref document: KR