CA2241834C - Method and device for data communication - Google Patents

Method and device for data communication Download PDF

Info

Publication number
CA2241834C
CA2241834C CA002241834A CA2241834A CA2241834C CA 2241834 C CA2241834 C CA 2241834C CA 002241834 A CA002241834 A CA 002241834A CA 2241834 A CA2241834 A CA 2241834A CA 2241834 C CA2241834 C CA 2241834C
Authority
CA
Canada
Prior art keywords
card
terminal
unit
user unit
session key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002241834A
Other languages
French (fr)
Other versions
CA2241834A1 (en
Inventor
Anders Johansson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TDS TODOS DATA SYSTEMS AB
Original Assignee
TDS TODOS DATA SYSTEMS AB
TDS Todos Data System AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from SE9503841A external-priority patent/SE505353C2/en
Application filed by TDS TODOS DATA SYSTEMS AB, TDS Todos Data System AB filed Critical TDS TODOS DATA SYSTEMS AB
Publication of CA2241834A1 publication Critical patent/CA2241834A1/en
Application granted granted Critical
Publication of CA2241834C publication Critical patent/CA2241834C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)

Abstract

A method and a system for use for safe data transfer between a terminal which is controlled by an IC card (1), and a central unit (3), such as a central computer in a bank. The IC card (1) comprises card-specific program information which is used to control the interaction of the card with the terminal (2) in connection with adopting a safe system mode, and card-specific secret information which is used to cryptographically protect data transfers between the terminal (2) and the central unit (3) in a safe system mode. The card specific secret information is stored in such a manner that no read-out of it can be made from the card. The card-specific program information is transferred from the card to the termin al for the purpose of said control.

Description

METHOD AND DEVICE FOR DATA COMMUNICATION
Technical Field The present invention relates to a method and a sys-tem for data communication between a central unit or host, such as a central computer in a bank, and a user unit comprising an IC card that the user carries and uses when he intends to carry out transactions involving communications with the host, and a terminal capable of communicating with the IC card and the host and acting as an interconnection link between them.
Background It is presently known to use data transfer systems comprising IC card-controlled terminals and a host. It is likewise known to use, in these systems some kind of secret information to cryptographically protect transferred data.
Two principal disadvantages are found in the data transfer systems in use today. The first one relates to the fact that the terminals contain secret information which, on account of the physical availability of these terminals to the public, may be exposed to violation in the sense that an unauthorised person may try to read the secret information from the terminal. The second disad-vantage is that since present standards on the configuration of IC cards, with the exception of such basic features as signal levels and the like, allow considerable degrees of freedom regarding for instance the memory addresses to which the data are to be allocat-ed, the terminals normally are able to handle one type of card only.
Object of the Invention The object of the present invention is to provide a method and a system solving or to a considerable extent eliminating the problems outlined above, thus providing increased flexibility with respect to the cards that may be used in the system and increased safety in the managing of the secret information.
Summary of the Invention The purpose of the present invention is achieved by 1o a method and a system as defined in the appended claims.
A basic concept of the invention is that at least sensitive data transfers between the user unit and the host are carried out in a separate safe system mode and that program-controlled realisation of the safe system mode is carried out by using card-specific program infor-mation contained in the card. The safe system mode means that data transfers are carried out in such a manner that unauthorised persons cannot distort or manipulate trans-fered data without such interference being discovered.
2o For this purpose, secret information in the user unit and in the host is made use of. The initiation of communica-tion between the card and the terminal is carried out in so-called normal system mode.
Cards used in accordance with the invention contain card-specific program information transferred to and used by the terminal in connection with the establishment of a safe mode.
In accordance with the present invention the "resi-dent" information contents in the terminal is no more 3o extensive than is absolutely necessary. Each card carries program information which is specific to the individual card and which is transferred to the terminal. Since the card-specific program information is transferred to the terminal the latter need not contain "resident" program information that is specific to each individual card or card type.
This makes it possible to use in the system, cards that are configured in different ways without it being necessary for the terminal to contain considerable soft-ware, and for example several card issuers may use the same set of terminals without it being necessary that the terminal contains, or that the other card issuers have knowledge of, the software that a specific card issuer 1o uses in order that a safe system mode be adopted.
The system in accordance with the invention allows the terminal to be made both inexpensive and "flexible"
in the sense that without difficulties it is possible to adapt the unity card/terminal to include cards that are i5 configured differently without the terminal having to be changed or be provided with new "resident" program infor-mation.
Transfer of card-specific program information from the card to the terminal is effected, in accordance with 2o a preferred embodiment, under the control of the host the actions of which are based on card-identifying informati-on or a code transferred from the user unit. However, it is obviously possible that this may be effected by the terminal and the card without involving the host.
25 Cards used in accordance with the invention likewise contain card-specific secret information which is used to produce cryptographical protection of data transfers and which is stored in such a way that it cannot be read out from the card.
3o In accordance with a preferred embodiment the card-specific secret information is used to encrypt (in the widest sensey, by means of an algorithm, preferably the so-called DES algorithm, a generated session key, preferably in the form of a random number which is then 35 transferred to the host in encrypted form. This session key is then used to cryptographically protect data transferred between the user unit and the host in a safe system mode.
The above-mentioned session key is erased in the user unit at the latest the next time contact is established between an IC card and the terminal, although it is possible to effect such erasure, for instance in response to a specific command while contact is still being maintained, because it is desired to begin a new session, or when the contact between the card in question and the terminal is interrupted.
Obviously it is likewise possible to use card-speci-fic secret information as such in order to cryptographically protect data transferred between the host and the user unit in a safe system mode, i.e. that the secret information is used as a cryptographic key, either in an encryption algorithm or in an authentication algorithm.
In accordance with a preferred embodiment, the ter-minal comprises a keyboard which may be used only in a safe system mode.
In order to protect data transferred on an open line or in another medium accessible to unauthorised persons various different cryptographical techniques are used.
A common method is to first encrypt data which are then transferred and finally decrypted. The reverse order is also possible, i.e. to first decrypt data, then transfer them and finally encrypt the transferred data which are then retrieved in cleartext. Both these techniques obviously may be used in connection with the invention.
In the case of for instance a random number which is adopted to create an encryption key for an encryption algorithm it .is possible to instead transfer the random number in cleartext and to then encrypt/decrypt it and later use the result as an encryption key. Also this , technique may be used in connection with the invention, which thus is not limited to use in connection with the cryptographic technique described herein in detail.
Symmetrical as well as asymmetrical encryption systems may be used.
Brief Description of the Drawings ' 5 Fig. 1 is a schematic block diagram relating to one embodiment of a system in accordance with the present invention.
Fig. 2 illustrates a flow chart of measures to be taken in accordance with a preferred embodiment before initiation of data transfers between the user unit and a host in a safe system mode.
Fig. 3 illustrates the manner in which an encryption key is generated and encrypted in accordance with one embodiment of the present invention before the encryption key is transferred to the host.
Fig. 4 illustrates the authentication of messages (data) in accordance with a preferred embodiment of the present invention.
Fig. 5 contains a list of the different varieties of generation of code keys and transfer thereof to the host.
Figs 6a-6h are flow charts illustrating the varieties listed in Fig. 5.
Detailed Description of Embodiments of the Present Invention In the following a system will be described with reference to Fig. 1 which system is designed for safe data transfers and which comprises a user unit, comprising an IC card 1, a terminal 2, and a central unit (host) 3.
The IC card 1 comprises card communication means 4 that are placed in contact with terminal communication means 5 to establish a connection for data transfers between the IC card 1 and the terminal 2.

In addition, the IC card 1 comprises first card memory means 9 for storing card-specific program information to be transferred to the terminal 2; second card memory means 10 for storage of card-specific secret information in such a way that it cannot be read out from the card; a memory means 16 for storage of a card- , identifying code; and a processor 15 containing required program information to allow execution of the required cryptographic processing, in this case encryption, and generation of a session key before the latter is transferred to the host 3, as will be described further on.
The terminal 2 comprises a terminal communication unit 6 in communication with the central communication unit 7 associated with the host 3, in order to allow data transfers between the host 3 and the user unit, and a key generating means 13, in the form of a random number or pseudo random number generator for generation of a ses-sion key to be transferred to the host in an encrypted state and to be used for authentication of messages to be transferred between the user unit and the host 3, as will also be described later on. The terminal 2 comprises storage means 14 to store the session key.
In accordance with another preferred embodiment no key generating means is used in the terminal but the generation of the key instead takes place in the proces-sor 15 in the card.
The terminal 2 and the host 3 in addition comprise control means 8, 18 to control the transfer of the system to the safe system mode which in accordance with the preferred embodiment is considered to have been adopted once the session key has been transferred to the host. In this mode data transfers between the terminal 2 and the host 3 take place in such a manner that data that are being transfered are protected (cryptographic authentication) by means of the session key that has been transferred to the host. In addition, the terminal 2 comprises read-out means 11 for read-out of the card-spe-cific program information in said first card memory means 9, the read-out program information being stored in and used by program executing means 12 in the terminal 2 in order to control interaction between the terminal 2 and the IC card 1.
Fig. 2 illustrates in the form of a flow chart the manner in which the IC card, the terminal and the host cooperate in accordance with one embodiment before data transfer in a safe system mode is initiated, a process to be described in closer detail in the following with reference to Fig. 4.
In step 100, the IC card 1 is inserted in the termi nal 2, whereby contact is established between said termi nal communication means 5 and said card communication means 4. In step 101, an ID code stored in said memory means 16 is transferred via terminal 2 from the user unit IC card to the host 3. In step 102, on the basis of verification of the card type, i.e. the card configuration, the host 3 informs the terminal 2 on how its read-out means 11 are to proceed to read out the card-specific program information from said first card memory means 9. In accordance with a preferred embodiment, data transferred from the host contains information on the address where the read-out is to begin. In step 103, the card-specific program information is read from card 1 to terminal 2. In step 104, a random number is generated in said key generating means 13, said random number to be used as a session key in a sealing process while using a Message Authentication Algorithm (MAA). In step 105, the session key in the IC card is encrypter in said encryption means 15 using the secret information contained in the second card memory 10 of the ' IC card 1. In step 106, the session key is transferred in encrypted state to the host 3. Steps 104, 105 and 106 are - illustrated in closer detail in Fig. 3. In step 107, a keyboard associated with the terminal 2 is opened for use. In step 108, data transfer is begun in the now adopted safe system mode.
In the following, the description will be made with reference to Fig. 3. In accordance with the preferred embodiment a random number is generated in the terminal to be used as a key in an MAA process to authenticate .
messages (i.e. data) transferred from the user unit to the host and vice versa. This random number is then encrypted in the card in a DES encryption algorithm, 10 using the secret information (DES key) in said second card memory means 10 (Fig. 1) as the encryption key in order to be transferred in encrypted state (the encrypted random number is designated by eK) via the terminal to the host 3, wherein it is decrypted and used as a session key in an MAA.
In Fig. 4 is exemplified the manner in which data transfers and authentication of data are carried out in a safe system mode in accordance with the preferred embodiment. The encrypted random number eK, having been 20 transferred from the user unit, is decrypted in the host by means of a key stored in the host, said key depending on the card that is being used and being identical with the one in said card. The decrypted random number is then used as an MAA key together with a message to be 25 transferred to the user unit and a message serial number, in an MAA in order to generate a cryptographic check sum, Message Authentication Code (MAC), which is added to and used to authenticate the message. The MAC will have a different appearance in successive messages during one 30 and the same session (also when their contents are the same, since they have received different serial numbers).
Thus, a flow of data is transferred, containing the message, the serial number, in cleartext, and a MAC. , In the user unit an MAA check is carried out to 35 verify the message received while using the MAA key in , the terminal, i.e. the random number, or in other words, a check to verify whether the message has been manipulated on its way from the host to the user unit.
The check comprises a corresponding computation of a MAC
and a comparison thereof with the MAC received together with the message, to determine coincidence.
When the user unit is to transfer a response message to the host one proceeds in a corresponding manner, i.e.
on the basis of the random number, the response, and the serial number transferred from the host a new MAC is computed, which is added 'to the flow of data formed by the response from the user unit to the host and the latest serial number transferred from the host. The host then performs an MAA check of the transfered response in order to check that the response has not been manipulated on its way between the user unit and the host. Further message transfers may then be carried out in the same way.
Fig. 5 is an account of a number of possible modi-fications 1-8 of random number generation and protection of random numbers that may be used in connection with the present invention. Four cases (1,3,5,6) are shown in which the random number used as a session key is generat-ed in the terminal and four cases (2,4,7,8) wherein the random number is generated in the card. In addition, four different varieties are shown of the forms in which the corresponding session key is used for cryptographic protection respectively is transferred to the host.
Figs 6a-6h show the eight various cases accounted for in Fig. 5 in more detail. The various steps illu-strated for each case are indicated by numeral references placed inside white rectangular boxes. Each Figure illustrates the situation occurring when a user has inserted his card in the terminal and the system is about to accomplish a safe mode. It appears from the Figures that steps S1-S5 are identical for all eight varieties.
In step S1, the central unit (Host) commands the terminal (Terminal) to read out the identification number of the card to verify whether the card is associated with the host in question and, when the verification is positive, to supply the encryption key which is associated with the card and which is to be used in the host to encrypt or decrypt the random number (session key), depending on in 5 which form the key has been transferred to the host. In step S2, the terminal transfers the read-out card number to the host. In all eight cases, the host makes sure that the card has been issued by the user of the host, whereupon in step S3 it orders the terminal to begin to 10 assume a safe mode. In steps S4 and S5 the terminal executed the program sequence that is its resident program information, i.e. to read and fetch the card-specific program information from a file (SMIB) in the card. The rest of the steps to be executed in order for a safe mode to be assumed is governed by the contents of SMIB, i.e. the card-specific program information. This shows that a comparatively simple and thus inexpensive terminal (in principle capable only of reading out a file from an IC card), when used in a system in accordance with the present invention, may achieve an astonishing degree of flexibility with respect to its ability to interact with cards that are configured in different ways. The first case illustrated is the one shown in Fig.
3, i.e. the random number to be used as a session key is generated in the terminal and is encrypted in the card, in step S6 before being transferred to and stored in the terminal in step S7, the terminal finally, in step S8, sending the encrypted random number to the host, whereupon data transfer in safe system mode may be started in accordance with Fig. 4.
In accordance with the second case illustrated the following steps are performed, in addition to steps Sl-S5 already described, viz.: in step S62 the terminal orders , (in accordance with the contents of the corresponding SMIB) the card to generate a random number; the card .
generates and sends a random number to the terminal wherein it is stored, in step 572; in step S82 the termi-nal orders the card to encrypt the generated random num-ber; the card encrypts the random number and transmits it in encrypted state to the terminal: in step 5102, finally, the terminal transmits the encrypted random number to the host, whereupon data transfer in safe system mode may start in accordance with Fig. 4.
In the third case illustrated, the following steps are executed in addition to steps Sl-S5 already described, viz.: in step S63 the terminal generates and 1o stores a random number and orders the card to decrypt the random number: in step S73 the decrypted random number is transferred to the terminal; and in step S83 the decrypt-ed random number is transferred to the host. When the random number (session key) reaches the host it should not be decrypted before use but be encrypted in order to provide the key in cleartext, and otherwise data transfers are commenced in a safe system mode in same manner as illustrated in Fig. 4.
In the fourth case illustrated the following steps 2o are executed, in addition to steps S1-S5 already describ-ed, viz.: in step 564 the card is ordered to generate a random number; in step 74 this random number is transfer-red to and stored in the terminal; in step S84 the termi-nal orders the card to decrypt the random number; in step S94 the card sends the decrypted random number to the terminal; and in step 5104 the decrypted random number is sent to Host. When the random number (session key) reaches the host it should not be decrypted before use but be encrypted to provide the key in cleartext and otherwise the data transfer in a safe system mode commences in the same manner as illustrated in Fig. 4.
In the fifth case illustrated the following steps are executed, in addition to steps S1-S5 already described, viz.: the terminal generates a random number which is transmitted in step S85 to the host in cleartext and which in step S65 is encrypted by the card: in step S75 the encrypted random number is transferred to and stored in the terminal. Because there is an encrypted session key in the terminal and because the session key has been transferred to Host in cleartext it is neces-sary, in order to establish data transfer in safe system _ mode, to encrypt the session key in Host before it can be used.
The sixth case illustrated is distinguished from the fifth case only in the respect that whenever encrypting is effected in the fifth case decrypting now is to be performed.
In the seventh case illustrated the following steps are executed, in addition to steps Sl-S5 already described, viz.: in step S67 the terminal orders the card to generate a random number which in step S77 is 15 transferred to the terminal; in step 5107 this random number is transferred in cleartext to the terminal and in step S87 the card encrypts the random number; in step S97, finally, the encrypted random number is transferred to and stored in the terminal. Because there is an 20 encrypted session key in the terminal and because the session key has been transferred to Host in clear text it is necessary, in order to establish data transfer in safe system mode, to encrypt the session key in Host before it may be used.
25 The eighth case illustrated a.s distinguished from the seventh one only in the respect that whenever en-crypting is effected in the seventh case decrypting now is to be performed.
One example of a set of the card-specific program 30 information being transferred from the card to the termi-nal and producing the generation of a session key and transfer thereof to the host in accordance with variety 1 in Fig. 5 (Fig. 6a) may contain the following sequence of commands; OPEN (open up the file in the card containing 35 the card-specific secret information, allowing it to be used as an encryption key in an encryption algorithm), RANDOM (generate a random number in the key-generating means 13 of the terminal in accordance with the instructions contained in the command and storage of said number in the terminal storing means 14), CRYPT (read - over the random number to the card and encrypt the random number in the card using a conventional encryption algorithm defined in and executed by the processor 15, and the encryption key), READ (read out the encrypted random number to the terminal) and TRANS (transfer the encrypted random number to host).
It should be understood that the commands and func-Lions defined are only of an exemplifying nature and that they may be implemented in a large number of dif-ferent ways and in a large number of different program languages. The methods of implementation of the functions used in the embodiments in accordance with the present invention in program code must be considered self-evident to those skilled in the art when reading the present invention and therefore they will not be described in more detail herein.

Claims (22)

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A method of transferring data between a user unit comprising a terminal and an IC card which is placed in communication with the terminal, and a central unit, such as a central computer located at a producer of services, preferably a bank, secret information being used in the user unit and the central unit to protect data transferred between said units, wherein the user unit is made to operate in a safe system mode involving safe data transfer between the user unit and the central unit in the sense that it is possible to verify whether transferred data have been distorted or been replaced during the transfer, wherein card-specific program information in the card is used to control the terminal as the latter interacts with the card in connection with the user unit being made to operate in a safe system mode, the card-specific program information being transferred to the terminal to be utilised in connection with said control, and wherein safe data transfers are effected while making use of card-specific secret information in the IC card, the use of the card-specific secret information for cryptographic protection being effected in such a manner that the card-specific secret information never leaves the card.
2. A method as claimed in claim 1, wherein said safe system mode involving safe data transfer between the user unit and the central unit also means that unauthorized persons cannot gain knowledge of the transferred data.
3. A method as claimed in claim 1 or 2, wherein operations initially being carried out in a normal system mode in which communication is established between the terminal and the card and in which the card-specific program information is transferred to the terminal.
4. A method as claimed in any one of claims 1 to 3, wherein a card-identifying code being transferred from the user unit to the central unit, on the basis of which code said central unit instructs the user unit on the manner to be adopted for the transfer of the card- specific program information from the card to the terminal.
5. A method as claimed in any one of claims 1 to 3, wherein the transfer of the card-specific program information is carried out on the basis of information contained in the terminal before communication is established therebetween.
6. A method as claimed in any one of claims 1 to 3 or 5, wherein the transfer of the card-specific program information is carried out on the basis of information contained in the IC card before communication is established therebetween.
7. A method as claimed in any one of claims 1 to 6, wherein a session key is created in the user unit for use in the transfer of data in the safe system mode, said session key being encrypted or decrypted in the IC card, and wherein said session key is transferred to the central unit in an encrypted or decrypted form.
8. A method as claimed in any one of claims 1 to 6, wherein a session key is created in the user unit, said session key being transferred to the central processing unit in cleartext, whereupon said session key is encrypted or decrypted in the central processing unit and the IC card, to be used in an encrypted or decrypted form in the transfer of data in the safe system mode.
9. A method as claimed in claim 7 or 8, wherein the session key is a random number which preferably is generated in the terminal.
10. A method as claimed in any one of claims 7 to 9, wherein the session key in the user unit is erased as soon as connection between the card and the terminal is interrupted.
11. A method as claimed in any one of claims 7 to 9, wherein the session key in the user unit is erased as soon as a new connection is established between the terminal and an IC card.
12. A method as claimed in any one of claims 1 to 11, wherein input of information via a keyboard associated with the terminal may be effected only in a safe system-operational mode.
13. A system for transfer of data, comprising a user unit having an IC card and a terminal, and a central unit, said card comprising card communication means for communication with the terminal, the terminal comprising terminal communication means for communication with the card, and a terminal communication unit for communication with the central unit, said central unit comprising a central communication unit for communication with the terminal, and the user unit and the central processing unit comprising secret information that is used to cryptographically protect data transfers between said units, wherein the IC
card comprises first card memory means for storage of card-specific program information, and second card memory means for storage of card-specific secret information which is used to cryptographically protect data transferred between the user unit and the central unit in a safe system mode, said second card memory means being configured in such a manner that said secret information cannot be read out from the card, that the terminal comprises terminal read-out means for reading the contents of said first card memory means and program executing means arranged, while utilising the read-out card-specific program information, to control the interaction between the terminal and the IC card in order to establish the safe system mode.
14. A system as claimed in claim 13, wherein the user unit comprising key generating means arranged to generate a session key, and storage means for storing such a session key, and wherein the IC card comprises processing means arranged to cryptographically protect the session key which said terminal communication unit is arranged to transfer to the central unit.
15. A system as claimed in claim 14, wherein said key generating means being a random number generator or a pseudo random number generator.
16. A system as claimed in claim 14 or 15, wherein said key generating means are arranged in the terminal.
17. A system as claimed in claim 14 or 15, wherein said key generating means forms an integrated part of said processing means
18. A system as claimed in any one of claims 14 to 17, wherein the user unit is arranged to erase the session key in the user unit as soon as connection between said card communication means and said terminal communication means is interrupted.
19. A system as claimed in any one of claims 14 to 17, wherein said user unit is arranged to erase the session key in the user unit as soon as new connection is established between said card communication means and said terminal communication means.
20. A system as claimed in any one of claims 13 to 19, wherein the IC card comprises memory means for storage of card-identifying information arranged to be transferred to the central unit, said central unit being arranged, while being guided by said information, to instruct the user unit of the manner in which the contents of said first card memory means are to be read out.
21. A system as claimed in claim 20, wherein said card-identifying information is a card-identifying code.
22. A system as claimed in any one of claims 13 to 21, wherein the user unit comprises a keyboard for input of data into the system, said keyboard being arranged to be operative only when the system is in the safe system mode.
CA002241834A 1995-10-31 1996-10-31 Method and device for data communication Expired - Fee Related CA2241834C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
SE9503841-0 1995-10-31
SE9503841A SE505353C2 (en) 1995-10-31 1995-10-31 Procedure and apparatus for data communication
PCT/SE1996/001396 WO1997016904A1 (en) 1995-10-31 1996-10-31 Method and device for data communication

Publications (2)

Publication Number Publication Date
CA2241834A1 CA2241834A1 (en) 1997-05-09
CA2241834C true CA2241834C (en) 2006-08-08

Family

ID=36791762

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002241834A Expired - Fee Related CA2241834C (en) 1995-10-31 1996-10-31 Method and device for data communication

Country Status (1)

Country Link
CA (1) CA2241834C (en)

Also Published As

Publication number Publication date
CA2241834A1 (en) 1997-05-09

Similar Documents

Publication Publication Date Title
US4438824A (en) Apparatus and method for cryptographic identity verification
US4799258A (en) Apparatus and methods for granting access to computers
US5694471A (en) Counterfeit-proof identification card
JP4638990B2 (en) Secure distribution and protection of cryptographic key information
EP0005179B1 (en) Authenticating the identity of a user of an information system
JP2689383B2 (en) Encrypted communication system
US4747139A (en) Software security method and systems
EP0266044B1 (en) Telecommunication security system and key memory module therefor
US4969188A (en) Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
US5485519A (en) Enhanced security for a secure token code
JPS63229541A (en) Data exchange system
IL94633A (en) System for transferring key encrypted data between computers
JP2000222362A (en) Method and device for realizing multiple security check point
JPS61139878A (en) Safety protection module for electronic fund transfer
JPH0242261B2 (en)
AU711237B2 (en) Method and device for data communication
JPH09179951A (en) Portable information recording medium and its system
JP2003076611A (en) Memory card having security function
CA2241834C (en) Method and device for data communication
JP3549657B2 (en) Private key retention management method
JPH09106445A (en) Key changing method for information recording medium and information recording medium
EP0254565B1 (en) Methods of and apparatus for forming identification data
JP3797531B2 (en) System for preventing unauthorized copying of digital data
JPS60112176A (en) Pocket terminal and guaranteed banking business transaction method and system
JPH0664635B2 (en) IC card system

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed