WO1998022914A2 - Cryptographic medium - Google Patents

Cryptographic medium Download PDF

Info

Publication number
WO1998022914A2
WO1998022914A2 PCT/US1997/021809 US9721809W WO9822914A2 WO 1998022914 A2 WO1998022914 A2 WO 1998022914A2 US 9721809 W US9721809 W US 9721809W WO 9822914 A2 WO9822914 A2 WO 9822914A2
Authority
WO
WIPO (PCT)
Prior art keywords
token
card
electronic module
information
medium
Prior art date
Application number
PCT/US1997/021809
Other languages
French (fr)
Other versions
WO1998022914A9 (en
WO1998022914A3 (en
Inventor
Carl J. Wack
Edward M. Scheidt
John H. Hershlow
Original Assignee
Tecsec, Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to UA99063444A priority Critical patent/UA43455C2/en
Priority to HU0001638A priority patent/HUP0001638A3/en
Priority to CA002272383A priority patent/CA2272383A1/en
Priority to BR9713162-8A priority patent/BR9713162A/en
Application filed by Tecsec, Incorporated filed Critical Tecsec, Incorporated
Priority to EP97953060A priority patent/EP1008101A4/en
Priority to PL97333506A priority patent/PL333506A1/en
Priority to AU56882/98A priority patent/AU728517B2/en
Priority to NZ336338A priority patent/NZ336338A/en
Priority to APAP/P/1999/001571A priority patent/AP1098A/en
Priority to JP52400198A priority patent/JP2001504617A/en
Priority to EA199900482A priority patent/EA001552B1/en
Publication of WO1998022914A2 publication Critical patent/WO1998022914A2/en
Publication of WO1998022914A3 publication Critical patent/WO1998022914A3/en
Publication of WO1998022914A9 publication Critical patent/WO1998022914A9/en
Priority to NO992416A priority patent/NO992416L/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card

Definitions

  • the present invention relates in general to a medium used for performing transactions.
  • the present invention relates to a medium used for performing secure transactions, such as banking or other commercial transactions.
  • MCM multi-chip module
  • a token device is consistent with Federal Information Publication System Bulletin #140-1. It is within this document that the concept is expressed that identification of an individual to a system should be token-based. The idea is that individual information should reside off of the computer system that is used for information sharing and in a platform that is separate and isolated from access by others on that system. This means that the token may be represented by a floppy disk, a PCMCIA card, or a smartcard. The limitations of function and capacity of other cards have restricted the application of this type of a system. Tokens have been in use for a number of years. In fact, one of the problems in the security/access control market is the number of different tokens necessary in the day's events.
  • the present invention with its 16-bit CPU and large (initially 1 Megabyte) memory capacity offers several significant parts to the overall solution set of problems associated with security and electronic transactions.
  • the 16-bit CPU offers the computational capability necessary not only to process large addressing schemes, but also to process a variety of protocols and the communications structures of different manufacturers.
  • the card of the present invention can support large memory transfers and more importantly, can support multiple applications on a single card.
  • the introduction of Constructive Key Management cryptography enables the card to enforce this application separation. Each functional owner of a memory segment or application can operate a completely different process of access and data storage, with the knowledge that it is not possible for any one else to have access to an inappropriate information object.
  • the ATM requests the PIN of the user of the card, which is stored in an encrypted form in the memory sector appropriate to that type machine, for example a MOST, or Cirrus transaction.
  • the PIN is transmitted on-line to the respective clearing house via the dedicated SET- approved communications link, along with the previously-stored RF ID number. This information is sent to a clearing house firewall where the format of the information is screened for conformity.
  • the validation of past transactions includes the performance of several functions, the obvious update or correction if necessary, and also the assurance offered to the issuer that the message or content of encrypted data is large enough to assure no tampering or partial changes have occurred.
  • the ATM then presents a list of actions which can be chosen by the user, and those selections are used as cryptographic splits to generate at the ATM an encrypted request/instruction which is sent to the clearing house.
  • the screening process is repeated and if appropriate, the transaction is allowed.
  • the updated (audit trail included) user packet is encrypted at the clearing house and sent back to the ATM to be entered on the user's card. No encryption occurred, on the card, in this particular transaction. In another protocol, or in a different application, encryption may be desired and desired to occur on the card.
  • the powerful 16-bit processor and memory configuration of the card supports the choice.
  • the unique session key assures the participating merchant and the user of the card that the total transaction will be transmitted to the clearing house and the resulting answer will be encrypted using the identical components for key construction, assuring that the answer or acknowledgement can only be deciphered by the appropriate parties, i.e., the user and the merchant, at that particular device.
  • the information at the clearing house is decrypted and processed and the audited transaction is processed.
  • the card of the present invention may also be used to establish a secure Internet commerce relationship.
  • a user of the Internet selects a Web page of a particular vendor.
  • the page offers an opportunity to download transaction software.
  • a click of the mouse and the transfer is complete.
  • the software is sent as a serialized self-extracting executable file, which when selected will extract and install itself and present a screen that asks if now would be a good time to fill out the registration form for that particular vendor. This is also suggested to occur off-line.
  • the registration form is filled out and all significant data is entered, including the type of payment, credit card number, etc.

Abstract

A cryptographic medium including embedded metallic particles. The particles provide a unique signature when the card is exposed to a radio frequency signal. The medium includes programming and storage capability, so that protocols for different types of transactions may be stored on the medium, along with personal information associated with the user of the token. The token may take the form of a plastic card, which includes an electronic module fabricated using a multi-chip module design and including the programming and storage capability. The design allows greater computing and storage capacity on the card. At least the electronic module is encapsulated in a plascon material, giving the overall card a more physically secure construction.

Description

CRYPTOGRAPHIC MEDIUM
FIELD OF THE INVENTION
The present invention relates in general to a medium used for performing transactions. In particular, the present invention relates to a medium used for performing secure transactions, such as banking or other commercial transactions.
BACKGROUND OF THE INVENTION Currently, activity in the area of smart cards has been driven primarily by the need to protect the telephone industry. Cellular telephones in particular are subject to fraudulent billing, at worst, and refusal to pay problems at best; in any event, the losses are measured in the millions of dollars per day in N.Y. City alone. In Europe, the GSM cellular system took action and instituted the telephone card system, which required the use of a card to prepay the call or cash debit a prepaid account. This approach corrected the problems with the telephone charge system to some degree. However, the criminal element moved its attentions to different methods, from cloning (counterfeiting) the telephone to the attacking (fraudulent use) the prepaid cards. These cards, designed for telephone use, are for the most part decrement-only cards, or prepaid cards which are used and then thrown away. This type of card represents approximately 90% of the total number of "smart" cards generated in the world.
Industry standard cards, having been developed with the phone card application in mind, took advantage of the ready accessibility of semiconductor memory chips, and the card manufacturers, seeing a disposable market as being ideal, decided to make the "smart card" as an inexpensive throwaway. By making as few changes in existing products as possible, a method of billing phone calls only required the insertion of a small semiconductor die, which was then connected by wire to the minimum of contact points, into a card (paper or plastic). The very requirements which were necessary for the one application drove the rest of the industry. The poor physical security of a die embedded into a 25mm sq. well milled in the plastic card also meant that the lifetime of the card could be measured in days. Still, this continued to be suitable for the telephone industry.
Security as a whole, has been under review at all levels of the information infrastructure. Computers, which are used to access control to information, to physical locations, and to special areas are also under review. All software solutions for security are all too easily compromised. A token device to be held by the individual user was required.
Currently, the widespread adoption of these concepts is evident by the need for an average individual to carry a half-dozen cards, or more. What was once a simple need and requirement, has over time developed into an accepted practice. The downside of the widespread adoption of cards is the sheer number of cards required by an individual.
Also involved is the relationship of each individual with the computer-aided environment. Microsoft, and others in the computer software business, have gone to great lengths to encourage each person to rely, to an ever-greater degree, with a computer at home and the computer in the workplace. Industry has also invested great sums of money to take advantage of the efficiencies and workflow improvements provided by the computer.
Available computer software includes hundreds of applications, which would at first glance seem benign, but may render users vulnerable and even whole industries are now blurred with respect to the computer. For example, where or what is a "virtual point of presence"? Banking in particular, which as an industry has traditionally made its profit margins on services and the need for customers to visit, or at least exchange paper (money, stocks, bonds, etc.), have a serious problem with the provision of these traditional banking services using software, through on-line companies like Microsoft and Intuit.
In recent years security of information within the banking community has been deemed as only necessary during the transmission of information over special leased "private network" lines. The banks have placed cryptographic link devices between one point of communications and another, e.g., bank to bank.
In the original scheme of things this worked. Banks were primarily paper houses and the only transfer of information was in the form of messages or specific types of information, having format and structure, but still just between the banks and ultimately to the Federal Reserve or Treasury Department.
As computers reached the desktop in size and capability, the banks, eager to become efficient, began to connect more and more employees and service groups together. The interoffice connection was considered "safe" largely because all of the connectivity was internal to the bank and relatively isolated.
As the banks branched out to reacn customers so did the banks network facility reach out and expand the ability of the bank employees and executives to communicate with one another. Still, the security solution was defined as only being necessary for those transactions between facilities, and this requirement could be satisfied by the communications link equipment. However, the growth of the intra-bank communications paths reached a degree of complexity and completeness which was not entirely expected. The hardware engineers had succeeded, everyone could talk electronically to everyone else about anything. However, all information is not equal and something must be done to control the flow of information proportional to the need to know access of the various individuals within the bank. Customer data needed to be protected from those employees who did not need to know about account balances. Merger and acquisition trader information could not be allowed to be available to the teller at the computer-based drive in window.
Moreover, as the interconnectivity of the bank as an institution increased, the availability of information became more and more accessible to more and more people. Encryption of the links between facilities, while still necessary to protect the information being sent from one location to another, did not provide the separation of information required. Other examples of the need for the separation of information were established with the passage of the Privacy Act of 1974. This law made it mandatory for the confidential information acquired either by employers, or banks or doctors and the like, be held in confidence and protected from unauthorized or inappropriate access. To further complicate the information distribution pool, is the rising demand to provide banking services and products to the customer via EDI or the Internet. Current use of hardware link devices does not allow for protection of the information moving from address to address or person to person within the network of a given bank or organization. Nor does the process of protecting the link of communications provide any confidentiality to the information moving within the link.
The same situation is true for information moving from an Automated Teller Machine (ATM) to a bank or clearinghouse. The industry as a whole has been trying to resolve this and has submiited a specification: "The Secure Electronic Transaction Specification" or SET. This specification provides for the protection of information in transmission from one EDI position to another, that is, from merchant to bank or ATM to clearinghouse. This specification, however, is not intended to protect the information itself, just the path. It is up to the functional owner of the information to provide security to the information. To this problem is offered this solution.
It is the parallel needs of these circumstances which demands an overall solution. The deficiencies present in conventional cards which make them unsuitable as a solution are many. For example, each has a small die size defined by the 25mm well or hole in the card. Further, the practice of mounting the die in a drop of epoxy exposes it to environmental, logical, and physical abuse. This type of product offers limited physical and logical security. The result is minimal functionality and memory capacity available if the semiconductor industry is bound by the 25mm square definition imposed by the card industry. An additional limitation is the dependence of the industry on existing solutions in cryptographic security, and the overall misapplication of these generic solutions to a very specific task.
On the logical issue, conventional cards have, on the whole, tried to use a public/private key approach for controlling access to the card information. This has had its limitations for several reasons. First, the public/private key process requires a separate co-processor to accomplish the actual computations, and this co-processor can take up to 40% of the total die size and also of the limited space in the card well. Further, the computations of public/private key are time consuming and each effort provides an unwelcomed delay in performance. The issue of protection of an individual's private key is often overlooked, that is, the entire security scheme is dependent on the private half of the key remaining a secret. Plastic cards have been in use for a number of years. Plastic is inexpensive, allows for shaping, printing, embossing, and for the addition of a strip of magnetic tape. However, all of these common characteristics also enable misuse when a plastic card is applied to a financial or credit application. Credit card fraud is a major problem precisely because of the ease of duplication of the plastic card.
What is required is a method or process to provide a unique characteristic to the plastic card/material which is also inexpensive so as to not impact the ubiquitous use of the product, and at the same time defeat the misuse of the device in financial applications.
SUMMARY OF THE INVENTION
The approach of using a small 25mm sq. hole in a card was defined by the physics of the semiconductor die. The overall dimensions of a single memory die is measured in width, length, and height. The length and width are fixed and immutable. However, the average die is between 20 and 25 mils thick. And of that thickness, approximately 12 to 17 mils is occupied by the alumina substrate necessitated by the photoetching process of semiconductor manufacturing. By putting together a multi-chip module (MCM) design which provides a high degree of density and capability, and then encapsulating the MCM in a plascon material, similar to the material currently used in the standard semiconductor manufacturing process, to provide stability, a thinning process can be executed which renders the thickness of the entire module to between 6 and 10 mils in thickness. This very thin product also takes on a very high degree of flexibility, analogous to aluminum foil and aluminum plate. This thinning removes the need for the 25mm limitation found in all other industry products. In fact, 80% of the area of the plastic card can be used to house electronic components.
Because of the plascon, the flexible MCM is completely sealed from outside environmental contaminates. The resultant module can be laminated within two outer layers of plastic and actually be reused if the outer housing should be damaged by accident or misuse.
This provides an improvement in security, which in existing cards is minimal in the physical sense. The unprotected die of memory or processor functions is currently wire bonded to an ISO-specified metal contact material (see ISO Std. 7816-2 / Physical Specifications and -3 / Electrical Specifications). As such, the die is open to probing, attachments, or any other type of physical analysis. Further, when you flex the current industry standard card, the imbedded die jumps up and off of the card like a flea.
BRIEF DESCRIPTION OF THE DRAWING
Fig. 1 a block diagram showing an exeplary use of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
Metallic material can be shaped into very small particles. Slivers of metal of varying lengths have a particular characteristic when used as an antenna for radio frequency. When the metal length and the wavelength of the radio frequency are the same, the metal material resonates, or more accurately reflects the signal in a very efficient manner. The mixing of very small, sub-micron bipolar antennas, that is, metal particles in the plastic slurry at the time of manufacturing, would generate a naturally random disbursement of the metal particles in the resultant plastic card. This random placement of particles can then be illuminated with a very low level RF signal which reflects a unique pattern based on the physical position of the particles suspended in the material. This reflected pattern is unique for each card, unique to the frequency used to illuminate the card, and different depending on which portion of the card is used to compare patterns.
This unique physical signature can be used to assure the physical integrity of the card as well as the unique identity of the card because the disturbance of the particles, not only as individual particles but also in relationship to each other particle as a whole entity (this is a 3 dimensional event), is detectable. In the case of credit cards or Automatic Teller Machines (ATM) applications, the card and its unique RF signature can be read at the time of insertion, very quickly, and the physical integrity and unique identification of the card is corroborated. The frequency at which the card is read may also change or be varied at what ever periodicity is desired. For example, on the first day of manufacture, the card is read in a stripe fashion much the same as a common magnetic stripe is read today. However, this RF reading is made at an initial frequency of 10Ghz. The reflected signal is characterized and stored in a database along with the account number and name of the recipient of the card. At each reading of the card thereafter, not only can the initial reading be confirmed, the card can be read at another frequency to add to the initial characteristic database and can be used to check the same integrity and uniqueness. In a matter of days, the continuous use of the card would allow for check and counter-check against an immutable physical characteristic, assuring the issuer of the card that it had not been tampered with in any physical way. The card of the present invention has two physical components, the plastic carrier or body of the card and the electronic module (approximately 1 square inch of semiconductor die, interconnected and embedded in plascon). The RF signature can be read on the module as a separate entity and/or combined with the signature of the card itself, to assure the relationship of the two devices is as originally intended. Moreover, if the card body or carrier should be damaged beyond the toleration level of the issuer or holder, the original card can be destroyed and the electronic module portion can be embedded into another card body, at which time a new signature would be read and used for future RF validation processes. This would allow continuous use of the content of the electronics, and reduce the replacement cost to the issuer of the cost of the plastic body or card.
A token device is consistent with Federal Information Publication System Bulletin #140-1. It is within this document that the concept is expressed that identification of an individual to a system should be token-based. The idea is that individual information should reside off of the computer system that is used for information sharing and in a platform that is separate and isolated from access by others on that system. This means that the token may be represented by a floppy disk, a PCMCIA card, or a smartcard. The limitations of function and capacity of other cards have restricted the application of this type of a system. Tokens have been in use for a number of years. In fact, one of the problems in the security/access control market is the number of different tokens necessary in the day's events. A token (swipe card) is used to enter a garage area, another permits entry into a building, a third allows for access to a special secured area, and yet another token is required for access to a computer terminal. In certain environments, the number of tokens may exceed a dozen. This situation is caused primarily by the development of each of the various systems under different manufacturers, each of whom, in trying to get the most out of a sale, insists on their own token. A common token for all functions has not been possible for lack of computational power and memory capacity.
The present invention with its 16-bit CPU and large (initially 1 Megabyte) memory capacity offers several significant parts to the overall solution set of problems associated with security and electronic transactions. The 16-bit CPU offers the computational capability necessary not only to process large addressing schemes, but also to process a variety of protocols and the communications structures of different manufacturers. The card of the present invention can support large memory transfers and more importantly, can support multiple applications on a single card. The introduction of Constructive Key Management cryptography enables the card to enforce this application separation. Each functional owner of a memory segment or application can operate a completely different process of access and data storage, with the knowledge that it is not possible for any one else to have access to an inappropriate information object. Such a card has been manufactured by Lockheed Martin, Sillcocks Plastics, and Secure Transaction Solutions using an Intel 80188EB CPU; 64k bytes of One Time Programmable processor instructions; 512k bytes of DRAM for memory buffer and scratchpad memory for CPU activity (program execution); 512k bytes of Electrically alterable program memory; and the associated latches and switches necessary to operate the card. Additional configurations may be utilized. The CPU addressing scheme allows for direct memory addressing of 32 megabytes of memory in various configurations of RAM and ROM consistent with the requirements of the various applications.
The plastic stock material from which the card is cut is impregnated with the sub-micron chaff material necessary for the RF ID process to operate. The RF Signature and ID process is thereby associated with the card (for example, the RF signature at various frequencies and various locations on the card). The card is also capable of supporting magnetic stripe, printed information such as a 4-color photo, fingerprint, signature block, special symbols or logos, holograms, and other pieces of printed or attached information.
The basic operating system for the CPU may be installed in the EEPROM at the time of manufacture, or prior to manufacturing, at the EEPROM factory.
The card is assigned to a particular user, with a unique account number, and the RF ID is read and stored in non-volatile memory along with any other issuer / user-necessary information that might be desired, like a 4-color photo of the user (compressed and hashed), and a File Allocation Table (FAT) is created to allow the CPU to parse the memory sectors for later activation for additional applications. The user, upon receipt, will activate the card if received remotely, much as one does with conventional cards, and consistent with security practice if access is granted under a separate channel of distribution, e.g., telephone, U.S. Mail, or courier. The user can accept the offered Personal Identification Number (PIN) or select his/her own.
An exemplary use of the card of the invention is now illustrated, with reference to Fig. 1. The card is presented to an ATM. The RF ID is read from the card and its value is read into a register. The CPU of the card and the ATM exchange a series of signals to establish a common protocol. The card is capable of multiple protocols and therefore allows for a much greater degree of freedom of participation for the user.
Having achieved a common communications base, the ATM requests the PIN of the user of the card, which is stored in an encrypted form in the memory sector appropriate to that type machine, for example a MOST, or Cirrus transaction. The PIN is transmitted on-line to the respective clearing house via the dedicated SET- approved communications link, along with the previously-stored RF ID number. This information is sent to a clearing house firewall where the format of the information is screened for conformity. If it is acceptable, the packet is allowed to continue onward to the decryption area, where the information packet is decrypted using the indexing information bits in the header of the sent information along with the RF ID data to create a user key, which when combined with the database-stored component of a user access table generates the key to decrypt the actual packet. Within the packet are the credentials of the individual account, the confirmation of the holder and card, and an audit of a predetermined number of past transactions which are relevant to this particular issuer. The past transactions are validated and the permission is sent to the ATM to proceed. The validation of past transactions includes the performance of several functions, the obvious update or correction if necessary, and also the assurance offered to the issuer that the message or content of encrypted data is large enough to assure no tampering or partial changes have occurred. The ATM then presents a list of actions which can be chosen by the user, and those selections are used as cryptographic splits to generate at the ATM an encrypted request/instruction which is sent to the clearing house. The screening process is repeated and if appropriate, the transaction is allowed. The updated (audit trail included) user packet is encrypted at the clearing house and sent back to the ATM to be entered on the user's card. No encryption occurred, on the card, in this particular transaction. In another protocol, or in a different application, encryption may be desired and desired to occur on the card. The powerful 16-bit processor and memory configuration of the card supports the choice.
Use of the card of the present invention in making a credit card transaction is now described. The card is offered to the merchant terminal. The terminal reads the RF ID value and stores it in a register. The card negotiates an exchange to determine correct protocol with the merchant device. The card, having a powerful 16-bit CPU, is capable of processing many different applications and protocols, and having achieved an acceptable communications link, also negotiates the highest baud rate that is mutually acceptable, up to 115,200 baud (currently). The merchant terminal requests on-line status with the respective clearing house and the combined value of the RF ID and the merchant membership number, along with the terminal ID number, are used to generate a unique key which is used to communicate and build a session key with the clearing house. The unique session key assures the participating merchant and the user of the card that the total transaction will be transmitted to the clearing house and the resulting answer will be encrypted using the identical components for key construction, assuring that the answer or acknowledgement can only be deciphered by the appropriate parties, i.e., the user and the merchant, at that particular device. The information at the clearing house is decrypted and processed and the audited transaction is processed.
The card of the present invention may also be used to establish a secure Internet commerce relationship. A user of the Internet selects a Web page of a particular vendor. The page offers an opportunity to download transaction software. A click of the mouse and the transfer is complete. The software is sent as a serialized self-extracting executable file, which when selected will extract and install itself and present a screen that asks if now would be a good time to fill out the registration form for that particular vendor. This is also suggested to occur off-line. The registration form is filled out and all significant data is entered, including the type of payment, credit card number, etc. The software asks if the user wishes to take advantage of a Storage of Permissions Feature, which allows the user to store on the card, the permission/identifying splits that were generated by the vendor software. The user agrees and the card is presented and the information stored. The send button is selected and the automatically-encrypted bundle is sent back to the vendor of choice. The vendor receives the encrypted bundle and opens it. Recognizing the form/structure of the bundle, the encryption is automatically keyed with the serial number of the copy of the downloaded software, and the vendor firewall allows the bundle to pass to the processing area. The user, having gone back to the Web page, is now looking at the vendor catalog and selecting items for purchase, each of which has a number. It is the combination of these numbers and the number of the serialized software that generates the selected components of the split key encryption. All messages are protected and all communications are unique between the vendor and the user.

Claims

What is claimed is:
1. A cryptographic medium, comprising: a plastic base; metallic slivers embedded in random locations in the plastic base for providing a unique RF signature; and an electronic module coupled to the plastic base, comprising processing means, and storage means.
2. The cryptographic medium of claim 1, wherein the plastic base includes a plascon material encapsulating at least the electronic module.
3. The cryptographic medium of claim 1, wherein the metallic slivers are formed in random sizes.
4. The cryptographic medium of claim 1, wherein the metallic slivers are formed in random, submicron sizes.
5. The cryptographic medium of claim 1, wherein the electronic module includes a central processing unit.
6. The cryptographic medium of claim 5, wherein the central processing unit is a 16-bit central processing unit.
7. The cryptographic medium of claim 1, wherein the electronic module includes storage memory.
8. The cryptographic medium of claim 7, wherein the storage memory includes user identification data.
9. The cryptographic medium of claim 8, wherein the user identification number is suitable for providing access to a financial account through use of an automated teller machine.
10. A method of forming a cryptographic medium, comprising: a) forming a plastic base having a void therein, and metallic slivers embedded therein; b) fabricating an electronic module using a multi-chip module design; c) placing the electronic module within the void; and d) encapsulating at least the electronic module in a plascon material.
11. The method of claim 10, wherein fabricating an electronic module includes fabricating a central processing unit.
12. The method of claim 11 , wherein fabricating a central processing unit includes fabricating a 16-bit central processing unit
13. The method of claim 10, wherein fabricating an electronic module includes fabricating a storage memory.
14. A method of using a cryptographic medium in a transaction, comprising: a) presenting a token at a transaction point; b) reading physical characteristics of the token to obtain a signature of the token; c) interpreting the signature to extract information; and d) determining whether the transaction will proceed based on the extracted information.
15. The method of claim 14, wherein the physical characteristics of the token include the presence of metallic slivers included in the token.
16. The method of claim 15, wherein the signature of the token is a radio frequency signature.
17. The method of claim 14, wherein the extracted information is security information.
18. The method of claim 14, wherein the information is token user identification information.
19. The method of claim 14, further comprising reading data from the token.
20. The method of claim 19, wherein reading data from the token includes communicating with a processing unit disposed on the token to read the data stored in memory disposed on the token.
PCT/US1997/021809 1996-11-20 1997-11-20 Cryptographic medium WO1998022914A2 (en)

Priority Applications (12)

Application Number Priority Date Filing Date Title
PL97333506A PL333506A1 (en) 1996-11-20 1997-11-20 Encoding device
CA002272383A CA2272383A1 (en) 1996-11-20 1997-11-20 Cryptographic medium
BR9713162-8A BR9713162A (en) 1996-11-20 1997-11-20 Cryptographic Medium
NZ336338A NZ336338A (en) 1996-11-20 1997-11-20 Cryptographic medium containing a plastic base with metallic slivers embedded within, processing means and storage means
EP97953060A EP1008101A4 (en) 1996-11-20 1997-11-20 Cryptographic medium
HU0001638A HUP0001638A3 (en) 1996-11-20 1997-11-20 Cryptographic medium, method of forming it and method of using it in a transaction
AU56882/98A AU728517B2 (en) 1996-11-20 1997-11-20 Cryptographic medium
UA99063444A UA43455C2 (en) 1996-11-20 1997-11-20 Cryptografic information carrier, method for composition of cryptografic information carrier and method for cryptografic information carrier application at transaction
APAP/P/1999/001571A AP1098A (en) 1996-11-20 1997-11-20 Cryptographic medium.
JP52400198A JP2001504617A (en) 1996-11-20 1997-11-20 Encryption media
EA199900482A EA001552B1 (en) 1996-11-20 1997-11-20 Cryptographic medium
NO992416A NO992416L (en) 1996-11-20 1999-05-20 Cryptographic medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US3128396P 1996-11-20 1996-11-20
US60/031,283 1996-11-20

Publications (3)

Publication Number Publication Date
WO1998022914A2 true WO1998022914A2 (en) 1998-05-28
WO1998022914A3 WO1998022914A3 (en) 1998-07-23
WO1998022914A9 WO1998022914A9 (en) 1998-09-11

Family

ID=21858590

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/021809 WO1998022914A2 (en) 1996-11-20 1997-11-20 Cryptographic medium

Country Status (18)

Country Link
EP (1) EP1008101A4 (en)
JP (1) JP2001504617A (en)
KR (1) KR100372628B1 (en)
CN (1) CN1246188A (en)
AP (1) AP1098A (en)
AU (1) AU728517B2 (en)
BR (1) BR9713162A (en)
CA (1) CA2272383A1 (en)
CZ (1) CZ178599A3 (en)
EA (1) EA001552B1 (en)
HU (1) HUP0001638A3 (en)
NO (1) NO992416L (en)
NZ (1) NZ336338A (en)
OA (1) OA11120A (en)
PL (1) PL333506A1 (en)
TR (1) TR199901122T2 (en)
UA (1) UA43455C2 (en)
WO (1) WO1998022914A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028493A1 (en) * 1998-11-10 2000-05-18 Kent Ridge Digital Labs A method of encryption and apparatus therefor
SG130035A1 (en) * 2000-02-14 2007-03-20 Yong Kin Michael Ong Increased security for electronic transactions
CN100401337C (en) * 2000-02-15 2008-07-09 史蒂夫·马格鲁 Quantum point safety device and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4822988A (en) * 1985-11-08 1989-04-18 Eurotechnique Card containing a component and a micromodule having side contacts
US4825283A (en) * 1986-07-03 1989-04-25 Sharp Kabushiki Kaisha IC card
US4835846A (en) * 1987-09-14 1989-06-06 Em Microelectronic Marin Sa Method of manufacture of electronic modules for cards with microcircuits
US4839504A (en) * 1986-07-28 1989-06-13 Casio Computer Co., Ltd. IC card system compatible with bank account system
US5049728A (en) * 1990-04-04 1991-09-17 Rovin George H IC card system with removable IC modules
US5444222A (en) * 1992-12-28 1995-08-22 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card, terminal for use with the non-contact IC card and non-contact IC card system having the non-contact IC card and the terminal
US5612532A (en) * 1993-09-01 1997-03-18 Kabushiki Kaisha Toshiba Thin IC card and method for producing the same

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0583709B1 (en) * 1992-08-17 1999-05-06 THOMSON multimedia Unforgeable identification device, identification device reader and method of identification
JPH07271939A (en) * 1994-03-30 1995-10-20 Mitsubishi Denki Semiconductor Software Kk Non-contact ic card, card reader/writer and card device
KR0137258B1 (en) * 1994-08-03 1998-04-24 이용규 Control apparatus of rice cooker using remote control

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4822988A (en) * 1985-11-08 1989-04-18 Eurotechnique Card containing a component and a micromodule having side contacts
US4825283A (en) * 1986-07-03 1989-04-25 Sharp Kabushiki Kaisha IC card
US4839504A (en) * 1986-07-28 1989-06-13 Casio Computer Co., Ltd. IC card system compatible with bank account system
US4835846A (en) * 1987-09-14 1989-06-06 Em Microelectronic Marin Sa Method of manufacture of electronic modules for cards with microcircuits
US5049728A (en) * 1990-04-04 1991-09-17 Rovin George H IC card system with removable IC modules
US5444222A (en) * 1992-12-28 1995-08-22 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card, terminal for use with the non-contact IC card and non-contact IC card system having the non-contact IC card and the terminal
US5612532A (en) * 1993-09-01 1997-03-18 Kabushiki Kaisha Toshiba Thin IC card and method for producing the same

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1008101A2 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000028493A1 (en) * 1998-11-10 2000-05-18 Kent Ridge Digital Labs A method of encryption and apparatus therefor
SG130035A1 (en) * 2000-02-14 2007-03-20 Yong Kin Michael Ong Increased security for electronic transactions
US7849005B2 (en) 2000-02-14 2010-12-07 Yong Kin Ong Electronic funds transfer method
CN100401337C (en) * 2000-02-15 2008-07-09 史蒂夫·马格鲁 Quantum point safety device and method

Also Published As

Publication number Publication date
JP2001504617A (en) 2001-04-03
AU5688298A (en) 1998-06-10
EA199900482A1 (en) 1999-12-29
NO992416L (en) 1999-07-07
KR20000057177A (en) 2000-09-15
NZ336338A (en) 2000-02-28
PL333506A1 (en) 1999-12-20
WO1998022914A3 (en) 1998-07-23
EA001552B1 (en) 2001-04-23
EP1008101A2 (en) 2000-06-14
AP1098A (en) 2002-08-29
NO992416D0 (en) 1999-05-20
HUP0001638A2 (en) 2000-09-28
CA2272383A1 (en) 1998-05-28
AU728517B2 (en) 2001-01-11
AP9901571A0 (en) 1999-06-30
EP1008101A4 (en) 2003-03-26
OA11120A (en) 2003-04-04
BR9713162A (en) 2002-01-22
TR199901122T2 (en) 1999-08-23
UA43455C2 (en) 2001-12-17
HUP0001638A3 (en) 2002-01-28
CZ178599A3 (en) 1999-11-17
KR100372628B1 (en) 2003-02-17
CN1246188A (en) 2000-03-01

Similar Documents

Publication Publication Date Title
Jurgensen et al. Smart cards: the developer's toolkit
US7003501B2 (en) Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US7051205B1 (en) Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate
Fancher In your pocket: smartcards
CA2322356C (en) Credit card system and method
US20060190412A1 (en) Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
JP2002512711A (en) Transaction method with portable identification element
JP2002537619A (en) Credit card system and method
CN104732379A (en) Secure Payment System
US7159241B1 (en) Method for the determination of soundness of a sheet-shaped medium, and method for the verification of data of a sheet-shaped medium
CN102945334A (en) Safety equipment with virtual on-chip operating system, safety device with virtual on-chip operating system, systems and methods
AP1098A (en) Cryptographic medium.
WO1998022914A9 (en) Cryptographic medium
JP2001266088A (en) Card and its forger-preventing method
Farrell Smartcards become an international technology
JP2004287805A (en) Slave card issuance system and slave card utilization system
US20030191715A1 (en) Secured purchase transaction
KR100794275B1 (en) System and method for issuing intergrated circuit chip card
EP1609122A1 (en) Smartcard-based value transfer
MXPA99004687A (en) Cryptographic medium
Mackinnon et al. Smart cards: A case study
WO2001054003A1 (en) Secure internet payment method
CN111833176A (en) Financial account opening method, financial account opening device and financial account opening system
Furletti An overview of smart card technology and markets
Karahasan Performance and security issues in e-payment systems: pay on-line case

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 97181207.1

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CZ DE DK EE ES FI GB GE HU IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH KE LS MW SD SZ UG ZW AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA

COP Corrected version of pamphlet

Free format text: PAGES 1-11, DESCRIPTION, REPLACED BY NEW PAGES 1-11; PAGES 12-14, CLAIMS, REPLACED BY NEW PAGES 12-14; PAGE 1/1, DRAWINGS, REPLACED BY A NEW PAGE 1/1; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: PV1999-1785

Country of ref document: CZ

ENP Entry into the national phase

Ref document number: 1998 524001

Country of ref document: JP

Kind code of ref document: A

Ref document number: 2272383

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: PA/a/1999/004687

Country of ref document: MX

Ref document number: 1019997004483

Country of ref document: KR

Ref document number: 1999/01122

Country of ref document: TR

WWE Wipo information: entry into national phase

Ref document number: 56882/98

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 336338

Country of ref document: NZ

Ref document number: 1997953060

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 199900482

Country of ref document: EA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: PV1999-1785

Country of ref document: CZ

WWP Wipo information: published in national office

Ref document number: 1997953060

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1019997004483

Country of ref document: KR

WWG Wipo information: grant in national office

Ref document number: 56882/98

Country of ref document: AU

WWR Wipo information: refused in national office

Ref document number: 1019997004483

Country of ref document: KR

WWW Wipo information: withdrawn in national office

Ref document number: 1997953060

Country of ref document: EP

WWR Wipo information: refused in national office

Ref document number: PV1999-1785

Country of ref document: CZ