NZ501887A - Encrypting smart card transaction PIN by cryptogram derived from encrypted transaction data - Google Patents

Encrypting smart card transaction PIN by cryptogram derived from encrypted transaction data

Info

Publication number
NZ501887A
NZ501887A NZ501887A NZ50188798A NZ501887A NZ 501887 A NZ501887 A NZ 501887A NZ 501887 A NZ501887 A NZ 501887A NZ 50188798 A NZ50188798 A NZ 50188798A NZ 501887 A NZ501887 A NZ 501887A
Authority
NZ
New Zealand
Prior art keywords
cryptogram
card
transaction
pin
financial institution
Prior art date
Application number
NZ501887A
Inventor
John Charles Viner
David Barrington Everett
Original Assignee
Nat Westminster Bank Plc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nat Westminster Bank Plc filed Critical Nat Westminster Bank Plc
Publication of NZ501887A publication Critical patent/NZ501887A/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4093Monitoring of device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor

Abstract

In a payment process using a smart card, security of the communication with the financial institution is very important. The card is read in a terminal that is in two-way communication with the financial institution. As part of the payment process, a cryptogram of the transaction data is made by the smart card, using a cryptographic key known to or derivable by the financial institution, and used in the terminal as a key to encrypt the PIN, entered by the cardholder, for transmission to the financial institution. The financial institution also creates a cryptogram, using the transaction data sent to it by the terminal, and uses this cryptogram (which should be the same as that created by the smart card) to decrypt the encrypted PIN. In this way, the use of an expensive tamper-resistant encrypting PIN pad at the terminal is avoided, whilst maintaining security.

Description

<div class="application article clearfix" id="description"> <p class="printTableText" lang="en">WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 1 <br><br> "PAYMENT PROCESS AND SYSTEM" <br><br> This invention relates to a payment process and system particularly intended for use with financial transactions involving integrated 5 circuit cards (ICC's), or "smart cards". <br><br> As part of a financial transaction involving a credit card or a debit card, it is normally necessary that details of the transaction be communicated to the card issuer or other equivalent body for authorisation of the transaction. Where the credit card or debit card takes the form of a 10 smart card, the card will hold in its memory application software which is activated to carry out the credit card or debit card function, as appropriate. One card may hold both credit card and debit card applications, as well as .other financial functions, such as cash cards, or even non-financial functions. The present invention is concerned primarily with the use of 15 smart cards as debit and/or credit cards. <br><br> The major card issuers Europay, MasterCard and Visa have jointly developed standards (known as the EMV ICC Specifications for Payment Systems) for smart card based payment systems. Systems developed to these standards enable a card holder to pay for goods and 20 services by accessing a remote account at a bank or other financial institution. As part of such a payment process, the card holder may authenticate himself to the financial institution by entry of a PIN (personal identification number). Where this form of card holder authentication is used then a critical aspect of the system design is ensuring the secure 25 transport of the PIN to the account holding institution <br><br> Access to the remote account is achieved via a terminal into which the user inserts his or her card, usually at the start of the transaction. The terminal is coupled, or able to be coupled, in some way to the account holding institution so that messages can be exchanged between the two. It 30 is very attractive if the terminal used for managing the transaction with the smart card can be a low cost device which would, for example be suitable for home use. EMV compliant applications are not well suited to this <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> purpose. They are intended as part of a large infrastructure based round terminals with tamper resistant encrypting PIN pads. It is thus not appropriate to use the EMV standards in a normal way to fulfil the requirements for a payment application on a smart card. 5 Despite its unsuitability for the payment application for the purpose explained above, EMV compliant applications do have many of the required attributes, are well understood in the financial community, have been implemented, and have stable associated standards. There are significant benefits if a way can be found of using such applications, without 10 in any way introducing non-EMV compatible commands. The principle object of the present invention is thus to find a way of encrypting the PIN, without incurring the expense of a tamper resistant encrypting PIN pad at the terminal. PIN encryption is not a standard EMV function, as this function is assumed to be carried out by the PIN pad at the terminal. 15 This patent application seeks to provide a payment process and system capable of achieving the above object. A knowledge of the operation of the EMV standards as defined in the document "EMV'96 Integrated Circuit Card Specification for Payment Systems" Version 3.0 dated 30 June 1996 is advantageous for a full understanding of the present 20 invention. However, although the EMV standard and EMV-compliant applications are referenced throughout, the technique is, in principle, applicable to any smart card oriented payment system with similar commands. It is intended that this patent application covers all such implementations; EMV is used, as an example only, to clarify the 25 technique. <br><br> According to a first aspect of the invention there is provided a payment process enabling secure communication between a smart card and a financial institution, said process comprising placing the card in a card reader forming part of a terminal in communication with said financial 30 institution, entering details of the transaction and a PIN into a keypad, <br><br> creating a cryptogram of transaction data, including said transaction details, using a first cryptographic key known to or derivable by the financial <br><br> Printed from Mimosa <br><br> WO 99/00775 PCT/GB98/01865 <br><br> institution, thence using said cryptogram to encrypt the PIN for secure onward transmission to the financial institution. <br><br> The financial institution may be the card issuer, holding the account which corresponds with the card, or more likely will be an 5 intermediary, commonly known as an acquirer, which acts as a link between the terminal and the card issuer. Very likely the acquirer will act as agent for a number of card issuers and is thus responsible for ensuring that messages originating in any one particular issuer's card are properly routed to that issuer. <br><br> 10 The terminal is typically situated at a retail premises to enable the cardholder to purchase goods, using the card as a debit or credit card. To this end, the card is pre-loaded with an application program which enables it to function as required. This application is associated with a second cryptographic key, referred to herein as the card key, which card 15 key is downloaded to the card at the same time as the original application, and is known to the financial institution. <br><br> The card key may be the same key as the first key, but preferably the cryptographic key used to create the cryptogram (i.e. the first key) is derived from the card key by taking a function of a transaction 20 parameter, conveniently the transaction sequence number, encrypted by the card key. The transaction sequence number is any number which uniquely identifies the transaction. Conveniently, the transaction number is stored in the card and is sequenced by 1 at the start of each new transaction. The transaction number is transmitted to the financial 25 institution as part of the payment process so that, if necessary, the financial institution is able to derive the cryptographic key used to create the cryptogram. <br><br> The PIN is decrypted by the financial institution following transmission of the encrypted PIN to the institution. In a preferred 30 embodiment of the invention, this process is carried out by mirroring, at the financial institution, the creation of the cryptogram from the transaction data transmitted to it from the terminal. For this purpose, the financial institution <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 4 <br><br> needs to know, or be able to derive the aforesaid first key. The cryptogram thus created should thus be identical to that created at the card. <br><br> By transaction data is meant data relating to the transaction and includes some information entered at the keypad, such as the amount 5 of the transaction, and some information generated internally by the terminal, such as the transaction date (it being assumed that the terminal has a built-in calendar). A cryptogram is, in effect, a digest or summary of the transaction data. In the DES encryption system such cryptograms are sometimes referred to as Message Authentication Codes, or MAC'S. The io techniques for creating such cryptograms are known in the art. Briefly, the transaction data is divided into small units, for example of 8 bits length, and the units operated on one at a time, starting, for example, at the beginning. Each unit is thus encrypted, using the same key and the same function, <br><br> with the encrypted output of each unit being added to the next prior to 15 encryption. When all the units making up the transaction data have been cycled through, the resultant output will be derived from all of the units; any change, accidental or otherwise, in the transaction data during transmission will result in the generation of a cryptogram which is different from the first so the fact that a change has been made can be detected. 20 Preferably the cryptogram is used, in effect, as a cryptographic key to encrypt the PIN for onward transmission. In theory several encryption methods can be used; however, this is subject to the important caveat that, whatever method is used, it is not possible for an eavesdropper to reconstruct the PIN and cryptogram separately. In the 25 preferred embodiment the PIN and the cryptogram form respective inputs to an exclusive OR operation which produces code from which neither of the constituent parts can be derived without knowledge of the other. At the financial institution the cryptogram is re-created as mentioned above and therefore, assuming no transmission faults, the PIN can be derived. 30 Whether the PIN is correct for the account held by the issuer is still not, of course, known at this time. Once the PIN has been checked as correct, however, the transaction can proceed. <br><br> Printed from Mimosa <br><br> WO 99/00775 PCT/GB98/01865 <br><br> According to a second aspect of the invention there is provided a payment system for enabling secure communication between a smart card and a financial institution, said system comprising a terminal having a card reader for reading said smart card, and a keypad for enabling 5 entry of transaction details, said card being programmable to create, from transaction data including transaction details entered at the keypad, a cryptogram using a cryptographic key known to or derivable by said financial institution, said terminal further comprising means for using said cryptogram to encrypt a PIN entered at the keypad and means for 10 transmitting the encrypted PIN to the financial institution. <br><br> In order that the invention may be better understood, an embodiment thereof will now be described by way of example only and with reference to the accompanying drawings in which: <br><br> Figure 1 is a schematic diagram of a smart card for use in a 15 payment process and system according to the invention; <br><br> Figure 2 is a block diagram of a payment terminal suitable for use in the payment process and system according to the invention; and Figure 3 is a block diagram showing a generic system for remote payments using a smart card. <br><br> 20 Referring firstly to Figure 1 there is shown a smart card 1 <br><br> having on one surface a contact pad 2 carrying several separate electrical contacts whereby an external power source may be connected to power the card and a serial communication channel may be established to transmit messages and data to and from the card. The card further 25 comprises a microprocessor 3, a non-volatile memory 4, such as ROM (read-only memory) or EEPROM (electrically erasable programmable read-only memory), and a random access memory 5. <br><br> The memory 4 holds one or more applications, which define the function of the card, and their associated cryptographic keys. An 30 application is simply a program with associated data files and may, for example, be such as to give the card the functionality of a debit card or a credit card, or both. <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 6 <br><br> In order to use the card in a payment system, it is inserted into a card reader forming part of a payment terminal which can communicate with the card holder's account at a remote location. A simplified block diagram of a suitable payment terminal 6 is illustrated in 5 Figure 2. <br><br> Referring to Figure 2, the terminal 6 comprises a microprocessor 7 having non-volatile memory 8, such as ROM or EEPROM, random access memory 9 and, optionally, a display 10 connected via interface circuitry 11. User input is via a keypad 12 io connected to the microprocessor through interface circuitry 13. The aforementioned card reader is shown under reference 14 and makes contact with the card via the contact pad 2. A communications circuit 15 is provided to enable the terminal to establish two-way communication with the rest of the system, either on a permanent or as-needed basis, via an 15 input/output port 16. <br><br> Operation of the terminal 6 is primarily under the control of the microprocessor 7 and its associated circuitry, much of which is not shown for simplicity, but which is well known to those skilled in the art. The terminal forms part of a smart card payment system shown in block 20 diagram form in Figure 3. <br><br> In Figure 3, the terminal 6 is shown connected, via a two way communication channel 17, to an acquirer 18. The acquirer is the body which is responsible for managing the overall payment transaction and will probably act as an agent for several card issuers. The acquirer might, for 25 example, be a bank or other financial institution. <br><br> The acquirer is connected via a two-way communication channel 19 to a card issuer 20 who, for the purposes of the present explanation, is assumed to be the body who issued the card 6 and who holds the card holder's account. The acquirer 18 is responsible for routing 30 messages from the terminal 6 to the appropriate card issuer for payment authorisation. However, as will be explained below, it is possible for the terminal 6 to communicate directly with the card issuer, thus bypassing the <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 7 <br><br> acquirer; it is even possible, in the simplest system, for there to be no acquirer at all. <br><br> Configuration of the card 6 is carried out by a personalisation service (Pserv) 21 which is, in effect, part of the acquirer, but could be part 5 of the card issuer (see below). Configuration of the card is realised by preparing an instance of an application - namely code, associated data, and a cryptographic key - and downloading that instance and key to the card. The application and its associated cryptographic key is thence stored in the card's non-volatile memory 4, as discussed above. Configuration is 10 carried out on new cards, before they can be used, or may be carried out on existing cards in order to update or add functionality to the card. The cryptographic key, referred to hereafter as the card key is used with a cryptographic system to ensure secure transmission of data to and from the card. In payment systems of the type discussed herein, a symmetric 15 cryptographic system, such as the DES system, is conventionally used. <br><br> This uses a secret cryptographic key, known only to the card 6 and the acquirer 18 to enable encryption and decryption of data sent between the two. In practice, the card key is a function of cardholder identification data, such as account number, encrypted with the master key of the acquirer. 20 The card key is thus unique to the card and can be derived by the acquirer from the cardholder's identity and the master key held by the acquirer. <br><br> As part of the payment transaction, the user types his PIN into the keypad on the terminal 6. If the normal type of tamper resistant encrypting PIN pad is in use, the PIN will be encrypted, using a 25 cryptographic "terminal" key known only to the terminal and the acquirer. Meanwhile, the transaction data, including such details as the date and amount of the transaction, is passed to the card, and a cryptogram is created from this transaction data within the card itself, using a cryptographic transaction key to form a cryptogram. Once created, the 30 cryptogram is returned to the terminal 6. In an EMV-compliant application this cryptogram would be prepared by the card upon receiving a "Generate Application Cryptogram" command which is issued by the terminal. Details <br><br> Printed from Mimosa <br><br> WO 99/00775 PCT/GB98/01865 <br><br> of this EMV command, including its operation and parameters, are given in the EMV specification referred to above. In practice the transaction data is passed as a parameter of the "Generate Application Cryptogram-command which is issued by the terminal and the cryptogram is passed 5 back to the terminal as a return parameter of the command. <br><br> The transaction key used to create the cryptogram is derived in the card as a function of a transaction sequence number (which is different for each transaction) encrypted with the card key. The transaction sequence number is likewise passed back to the terminal as a return 10 parameter of the "Generate Application Cryptogram" command. <br><br> The cryptogram is next forwarded, together with the transaction data and encrypted PIN, to the acquirer 18. The acquirer checks the transaction data against the cryptogram, decrypts the PIN and then re-encrypts the PIN for onward transmission, with the transaction data, 15 to the appropriate issuer 20. The key used to re-encrypt the PIN is one known to the authorising issuer. <br><br> The cryptogram is, in effect an encrypted digest of the transaction data and is such that any tampering with the data, either deliberate or accidental, can be detected by the acquirer or issuer by 20 comparing the received transaction data with its cryptogram. The transaction data will usually be quite long whereas the encrypted digest, or cryptogram, will be much shorter, typically only 8 bits. The manner in which the cryptogram is prepared is well-known in the art and will not be described further. <br><br> 25 Once the transaction data and re-encrypted PIN arrives at the issuer 20 the issuer checks the PIN supplied by the cardholder and, if correct, checks that the account is in funds, or that any credit limit is not exceeded, and then returns a message authorising the transaction back to the terminal 6, via the acquirer 18. <br><br> 30 For the purpose of the present invention, it is assumed that the key pad in terminal 8 is not capable of encryption or, if it is, the encryption is not being used. In accordance with an embodiment of the <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 9 <br><br> invention PIN encryption is performed by the terminal after receiving the cryptogram back from the card by using the cryptogram as a cryptographic key. Thus the microprocessor 7 and its associated circuitry derives a function of the PIN encrypted with the cryptogram. An example of a simple 5 logic function which will achieve this is the exclusive OR function. In other words, PIN encryption is performed by creating, in the terminal circuitry, the exclusive OR of the cryptogram and PIN, and it is this data item which is transmitted to the acquirer 18, together with the transaction data, as before. At the acquirer 18 the PIN needs to be decrypted. To do this, the acquirer 10 essentially recreates the cryptogram from the transaction data which it has received from the terminal. It then uses this cryptogram to decrypt the PIN. The PIN is now re-encrypted, using a key known between acquirer and issuer, and is sent to the issuer, for checking of the PIN. Reincryption can be carried out at the acquirer within the confines of a tamper resistant is device so that the PIN never appears "in clear" outside the cryptographic domains established between the terminal 6 and issuer 20. If the PIN is correct, the transaction data is interrogated and the appropriate account checked. If all is well, an appropriate authorisation message is passed back to the terminal 6. If the PIN does not check out at the issuer, this may 20 mean that the PIN was not correctly entered at the keypad by the cardholder, or it may mean that the transaction data was corrupted in some way in its passage to the acquirer. Either way, the transaction proceeds no further. <br><br> In theory several methods can be used for encrypting the 25 PIN, using the cryptogram as a key. In practice however many possible methods are excluded because the data item which is transmitted from the terminal 6 to the acquirer 18 must not allow for an eavesdropper to reconstruct the PIN and cryptogram separately. <br><br> It will be seen that the above-described techniques enable the 30 PIN to be encrypted without using an encrypting PIN pad and in a way which is transparent to the EMV application on the card. Thus the terminal 6 makes the payment transaction appear to the EMV-compliant application <br><br> Printed from Mimosa <br><br> WO 99/00775 PCT/GB98/01865 <br><br> 10 <br><br> on the card as a standard EMV payment transaction. The present invention makes this approach possible by providing a way of encrypting the PIN for transmission to the issuer, via the acquirer, so that its confidentiality is totally assured in transit. No existing EMV-compliant 5 application function does this because, as mentioned above, PINs are conventionally encrypted by the terminal, not the card. <br><br> So far it has been assumed that the personalisation service (PServ) 21 is associated with the acquirer 18. However, the techniques which are the subject of this patent application are equally applicable when 10 PServ 21 is associated with the issuer 20. In this case the encrypted PIN message would pass through the acquirer without any translation. Indeed it would not be possible for the acquirer to decrypt the PIN message as only the application on the card 6 and the issuer 20 would have the requisite keying relationship. If it is important for current standard payment 15 authorisation message formats to be maintained, then a simple issuer based conversion utility could front end the issuer authorisation systems. <br><br> In this alternative model the personalisation service PServ could either be issuer specific, or could be supported by a service provider on behalf of several issuers. <br><br> Printed from Mimosa <br><br> WO 99/00775 <br><br> PCT/GB98/01865 <br><br> 11 <br><br></p> </div>

Claims (13)

<div class="application article clearfix printTableText" id="claims"> <p lang="en"> CLAIMS<br><br>
1. A payment process enabling secure communication between a smart card and a financial institution, said process comprising placing the<br><br> 5 card in a card reader forming part of a terminal in communication with said financial institution, entering details of the transaction and a PIN into a keypad, creating a cryptogram of transaction data, including said transaction details, using a first cryptographic key known to or derivable by the financial institution, thence using said cryptogram to encrypt the PIN for 10 secure onward transmission to the financial institution.<br><br>
2. A payment process according to claim 1 wherein said card stores a second cryptographic key associated with the card and known to the financial institution, and wherein the first cryptographic key is created during the payment process by encrypting a parameter of the transaction<br><br> 15 which is unique to the payment transaction in process, using the second cryptographic key.<br><br>
3. A payment process as claimed in claim 2 wherein the transaction parameter is a transaction sequence number, which is a number which identifies the transaction and is automatically sequenced<br><br> 20 between transactions.<br><br>
4. A payment process as claimed in any one of claims 1,2 or 3 wherein the PIN is encrypted using the cryptogram as a cryptographic key.<br><br>
5. A payment process as claimed in claim 4 wherein encryption of the PIN is performed by creating the exclusive OR of the cryptogram and<br><br> 25 the PIN.<br><br>
6. A payment process as claimed in any one of the preceding claims wherein the cryptogram is created within the card following receipt of a command from the terminal.<br><br>
7. A payment process as claimed in claim 6 wherein the<br><br> 30 transaction data is passed to the card as a parameter of the command, and the cryptogram is returned to the terminal as a return parameter of the command.<br><br> Printed from Mimosa<br><br> WO 99/00775<br><br> PCT/GB98/01865<br><br> 12<br><br>
8. A payment process as claimed in either one of claims 6 or 7<br><br> wherein the smart card holds at least one application program which gives the card its functionality, and wherein said applications program is EMV-compatible.<br><br> 5
9. A payment process as claimed in any one of the preceding claims wherein the encrypted PIN is decrypted at the financial institution by transmitting, with the encrypted PIN, said transaction data, creating in said financial institution a cryptogram of the transmitted transaction data using said first cryptographic key and decrypting the PIN using the just-created 10 cryptogram.<br><br>
10. A payment process as claimed in claims 2 and 9 wherein,<br><br> prior to creation of the cryptogram in the financial institution, said first cryptographic key is derived by decrypting the transaction number using the second cryptographic key.<br><br> 15
11. A payment system for enabling secure communication between a smart card and a financial institution, said system comprising a terminal having a card reader for reading said smart card, and a keypad for enabling entry of transaction details, said card being programmable to create, from transaction data including transaction details entered at the 20 keypad, a cryptogram using a cryptographic key known to or derivable by said financial institution, said terminal further comprising means for using said cryptogram to encrypt a PIN entered at the keypad and means for transmitting the encrypted PIN to the financial institution.<br><br>
12. A payment system as claimed in claim 11 wherein the 25 financial institution includes means for creating a cryptogram of the transaction data, transmitted from the terminal with the encrypted PIN, using said first cryptographic key.<br><br>
13. A payment system as claimed in claim 12 wherein said financial institution further comprises means for deriving said first<br><br> 30 cryptographic key by decrypting the transaction number using the second cryptographic key.<br><br> Printed from Mimosa<br><br> </p> </div>
NZ501887A 1997-06-27 1998-06-26 Encrypting smart card transaction PIN by cryptogram derived from encrypted transaction data NZ501887A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB9713743.4A GB9713743D0 (en) 1997-06-27 1997-06-27 A cryptographic authentication process
PCT/GB1998/001865 WO1999000775A1 (en) 1997-06-27 1998-06-26 Payment process and system

Publications (1)

Publication Number Publication Date
NZ501887A true NZ501887A (en) 2001-05-25

Family

ID=10815113

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ501887A NZ501887A (en) 1997-06-27 1998-06-26 Encrypting smart card transaction PIN by cryptogram derived from encrypted transaction data

Country Status (22)

Country Link
EP (1) EP0992026A1 (en)
JP (1) JP2002507297A (en)
KR (1) KR20010014257A (en)
CN (1) CN1260894A (en)
AU (1) AU8122598A (en)
BG (1) BG104041A (en)
BR (1) BR9810486A (en)
CA (1) CA2295032A1 (en)
EA (1) EA200000073A1 (en)
EE (1) EE9900598A (en)
GB (1) GB9713743D0 (en)
HU (1) HUP0003227A2 (en)
IS (1) IS5307A (en)
MX (1) MXPA99011836A (en)
NO (1) NO996488L (en)
NZ (1) NZ501887A (en)
PL (1) PL337533A1 (en)
SK (1) SK176199A3 (en)
TR (1) TR199903243T2 (en)
TW (1) TW411427B (en)
WO (1) WO1999000775A1 (en)
ZA (1) ZA985628B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8108307B1 (en) * 1998-03-30 2012-01-31 Citicorp Development Center, Inc. System, method and apparatus for value exchange utilizing value-storing applications
AUPQ556600A0 (en) * 2000-02-14 2000-03-02 Ong, Yong Kin (Michael) Electronic funds transfers-zipfund
US7103575B1 (en) 2000-08-31 2006-09-05 International Business Machines Corporation Enabling use of smart cards by consumer devices for internet commerce
KR100420600B1 (en) * 2001-11-02 2004-03-02 에스케이 텔레콤주식회사 METHOD FOR PROCESSING EMV PAYMENT BY USING IrFM
GB0305806D0 (en) * 2003-03-13 2003-04-16 Ecebs Ltd Smartcard based value transfer
US8407097B2 (en) 2004-04-15 2013-03-26 Hand Held Products, Inc. Proximity transaction apparatus and methods of use thereof
US8549592B2 (en) 2005-07-12 2013-10-01 International Business Machines Corporation Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform
GB2435951A (en) 2006-02-23 2007-09-12 Barclays Bank Plc System for PIN servicing
US7873835B2 (en) * 2006-03-31 2011-01-18 Emc Corporation Accessing data storage devices
CN102024288B (en) * 2009-09-11 2014-02-26 中国银联股份有限公司 Safe payment method and system using smart card
GB2476065A (en) * 2009-12-09 2011-06-15 Pol Nisenblat A multi-currency cash deposit and exchange method and system
CN102096968A (en) * 2009-12-09 2011-06-15 中国银联股份有限公司 Method for verifying accuracy of PIN (Personal Identification Number) in agent authorization service
EP2426652A1 (en) * 2010-09-06 2012-03-07 Gemalto SA Simplified method for customising a smart card and associated device
CN102968865B (en) * 2012-11-23 2016-08-31 易联支付有限公司 The authentication method of a kind of mobile payment and system
US10147087B2 (en) * 2015-03-06 2018-12-04 Mastercard International Incorporated Primary account number (PAN) length issuer identifier in payment account number data field of a transaction authorization request message
CN106991346A (en) * 2017-04-18 2017-07-28 东信和平科技股份有限公司 The method and device of a kind of smart card issuing

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0198384A3 (en) * 1985-04-09 1988-03-23 Siemens Aktiengesellschaft Berlin Und Munchen Method and device for enciphering data
US4965568A (en) * 1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key
NL1001659C2 (en) * 1995-11-15 1997-05-21 Nederland Ptt Method for writing down an electronic payment method.

Also Published As

Publication number Publication date
BR9810486A (en) 2000-09-12
NO996488L (en) 2000-02-28
EE9900598A (en) 2000-08-15
TW411427B (en) 2000-11-11
SK176199A3 (en) 2000-07-11
WO1999000775A1 (en) 1999-01-07
CA2295032A1 (en) 1999-01-07
EP0992026A1 (en) 2000-04-12
HUP0003227A2 (en) 2001-02-28
CN1260894A (en) 2000-07-19
BG104041A (en) 2000-05-31
JP2002507297A (en) 2002-03-05
IS5307A (en) 1999-12-17
NO996488D0 (en) 1999-12-27
EA200000073A1 (en) 2000-06-26
MXPA99011836A (en) 2002-04-19
GB9713743D0 (en) 1997-09-03
ZA985628B (en) 1999-01-26
AU8122598A (en) 1999-01-19
TR199903243T2 (en) 2000-04-21
PL337533A1 (en) 2000-08-28
KR20010014257A (en) 2001-02-26

Similar Documents

Publication Publication Date Title
EP0985203B1 (en) Key transformation unit for an ic card
US6230267B1 (en) IC card transportation key set
US7730311B2 (en) Key transformation unit for a tamper resistant module
US7917760B2 (en) Tamper resistant module having separate control of issuance and content delivery
CN1344396B (en) Portable electronic charge and authorization devices and methods therefor
US20220012718A1 (en) Provisioning to a digital payment device (dpd)
US7516884B2 (en) Method and system for private information exchange in smart card commerce
NZ501887A (en) Encrypting smart card transaction PIN by cryptogram derived from encrypted transaction data
EP0981807A2 (en) Integrated circuit card with application history list
CN101329786B (en) Method and system for acquiring bank card magnetic track information or payment application for mobile terminal
KR101316489B1 (en) Method for processing transaction using variable pan
KR101677803B1 (en) Card reader, terminal and method for processing payment information thereof
CN101330675A (en) Mobile payment terminal equipment
CN103839329B (en) Value Transfer based on smart card
WO1998029983A1 (en) Transaction key generation system
CZ472699A3 (en) Method of payment and apparatus for making the same
KR20010006006A (en) Rollup certification in a reader

Legal Events

Date Code Title Description
PSEA Patent sealed