GB2369800A - Cash card with scratch off surfaces - Google Patents

Cash card with scratch off surfaces Download PDF

Info

Publication number
GB2369800A
GB2369800A GB0030056A GB0030056A GB2369800A GB 2369800 A GB2369800 A GB 2369800A GB 0030056 A GB0030056 A GB 0030056A GB 0030056 A GB0030056 A GB 0030056A GB 2369800 A GB2369800 A GB 2369800A
Authority
GB
United Kingdom
Prior art keywords
card
unique identification
unique
identification number
cash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0030056A
Other versions
GB2369800B (en
GB0030056D0 (en
Inventor
Virginia Kate Pitts
James Ballantyne
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Post Office
Royal Mail Group Ltd
Original Assignee
Post Office
Consignia PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Post Office, Consignia PLC filed Critical Post Office
Priority to GB0030056A priority Critical patent/GB2369800B/en
Publication of GB0030056D0 publication Critical patent/GB0030056D0/en
Publication of GB2369800A publication Critical patent/GB2369800A/en
Application granted granted Critical
Publication of GB2369800B publication Critical patent/GB2369800B/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/347Passive cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1058PIN is checked locally
    • G07F7/1066PIN data being compared to data on card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1075PIN is checked remotely
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A cash card 10 that is representative of a cash amount bears a unique identification number 14 and a unique validation number 18 that are concealed by removable scratch off surfaces 12,16. The validation number may be generated from the identification number using a one time pad. The card may be validated by a vendor of goods or services by checking the identification number with a computer database in which case a voice response unit provides the vendor with the validation number which can be checked with that on the card.

Description

A CASH CARD AND A SYSTEM AND METHOD USING SUCH A CARD This invention relates to a cash card, in particular a face value scratch card, and a system and method for using such a card as a means for paying for goods and/or services.
Many methods of payment are available at present, including credit and debit cards. These are convenient and easy for customers to use and allow them to pay for goods and services either at a cash desk in a shop or equally over the telephone or internet.
In addition to well established methods of payment, a number of new methods are emerging, some of which relate to internet and digital payment services and others that are for more general use. One example is"Digicash", which is a means for paying for goods and services on the internet using an encrypted token. In this method, the buyer and seller are linked directly for the Digicash transaction. Settlement is a complex arrangement where the seller is reimbursed by the Digicash service owner, who is paid by the customer using a credit or debit card or any other conventional payment transaction.
A problem with Digicash is, however, that it is anticipated that only a small number of consumers will use the service. This is due to the underlying perception that transactions on the internet are inherently insecure, because given time and resources is it generally possible to crack any practical cipher code. Un-crackable codes are of course possible at present, but suffer from
disadvantages that make then unusable for practical applications. A further disadvantage is that the Digicash system is dependent on the customer having some form of bank or credit card account. Many people, however, do not have access to this type of facility and so are excluded from internet or digital shopping.
An alternative system that is at a relatively early stage of development is known as Mondex, in which a smart card is loaded with encrypted information from an owner's bank account, which information is essentially a credit from the owner's bank account and represents a cash amount. The owner can then use the Mondex smart card bearing the information as if it were cash, at retail outlets that have card readers capable of reading the Mondex card.
Early indications suggest that the Mondex system is moderately successful. A disadvantage is, however, that to make its implementation widespread, it is necessary for a substantial investment in technology, both for smart cards and terminal equipment. At present, there is no drive to make the necessary investment and so the availability of Mondex is limited. In addition, as with Digicash, the Mondex system is dependent on the customer having some form of bank or credit card account. However, as noted above, many people do not have access to these.
An object of the present invention is to provide a system and method of noncash payment that is simple and can be used widely by consumers, regardless of whether or not they have a credit card or a bank account.
According to one aspect of the present invention there is provided a cash card
that represents a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer and a unique validation number that is concealed by a removable layer.
An advantage of this is that customers can buy the card and use it to purchase goods and services in the same way as if they were using money and without the need for a bank or credit card account. To do so, the unique number is exposed by removing the removable layer, which unique number can be verified by the goods or service provider to confirm that the card is authentic.
The goods or services provider settles payment with the provider of the card at a later time.
The removable layer that covers the unique identification number may be removed by scratching it from the card. The removable layer that covers the unique validation number may be removed by scratching it from the card. In either case, the removable layer may comprise a thin layer of aluminium.
Preferably, the validation number is generated using the unique identification number. The validation number may be generated using a one time pad.
According to another aspect of the present invention, there is provided a cash card authentication system comprising a plurality of cash cards that are each representative of a money amount, wherein each card bears a unique identification number that is concealed by a removable layer and a central facility that includes a record of each unique identification number, thereby to provide a means for authenticating each card, when the removable layer is removed to expose the unique identification number.
The card may be a scratch card, wherein the removable layer that covers the unique identification number can be removed by scratching it from the card.
The removable layer may comprise a thin layer of aluminium.
Preferably, the card bears a unique validation number for allowing the card holder to validate that the goods or service provider is able to exchange the card for goods or services, wherein the unique validation number is concealed by a removable layer. The card may be a scratch card, wherein the removable layer that covers the unique validation number can be removed by scratching it from the card. The validation number may be generated using the unique identification number. The validation number may be generated using a one time pad.
Preferably, an accounting facility is provided to settle payment with goods and services providers.
According to yet another aspect of the present invention, there is provided a cash card security and authentication system comprising: a plurality of cash cards that are each representative of a cash amount, wherein each card bears a unique identification number that is concealed by a removable layer; means for entering a unique number into a computer system when the removable layer is removed to expose the unique identification number; a central facility, remote from the means for entering the unique number, with a memory that includes a record of each unique identification number and a data processor that is operable to search the memory for the entered unique
number, means for transmitting the entered unique identification number to the data processor, the data processor being operable to search the memory on receipt of the unique number, means for generating a signal indicative of the authenticity of the card, when there is a match between the entered number and a number listed in the memory, thereby to provide a means for authenticating each card.
Preferably, the card bears a unique validation number for allowing the card holder to validate that the goods or service provider is able to exchange the card for goods or services, wherein the unique validation number is concealed by a removable layer. The card may be a scratch card, wherein the removable layer that covers the unique validation number can be removed by scratching it from the card. The validation number may be generated using the unique identification number. The validation number may be generated using a one time pad.
An automated voice response unit may be connected to the data processor, the automated voice response unit being operable to generate a voice message indicative of the authenticity of the card, when there is a match between the entered number and a number listed in the memory.
Means may be provided for removing the number listed in the memory, when there is a match between it and the entered number. Means may be provided for marking or highlighting a number or entry listed in the memory, when there is a match between it and the entered number. Means may be provided for generating a signal indicative of the invalidity of the card, when there is a match
between the entered number and a number that is marked or highlighted in the memory.
According to yet another aspect of the present invention, there is provided a cash card security and authentication system for authenticating a plurality of cash cards that are each representative of a cash amount and bear a unique identification number that is concealed by a removable layer, the system comprising : means for entering a unique number into a computer system when the removable layer is removed to expose the unique identification number; means for transmitting the entered unique identification number to a remote central facility that has a memory that includes a record of each unique identification number associated with the plurality of cash cards and a data processor that is operable to search the memory for the entered unique number and generate a signal indicative of the authenticity of the card when there is a match between the entered number and a number listed in the memory, and means for receiving the signal indicative of the authenticity of the card, thereby to provide a means for authenticating each card.
Preferably, the system further includes means for receiving and displaying a unique validation code associated with the card.
According to yet a further aspect of the present invention, there is provided a payment method comprising: providing a card that is representative of a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer; removing the removable layer to expose the unique identification
number, and authenticating the card by checking the validity of the unique identification number with a central data facility that includes a record of authentic such unique identification numbers.
Preferably, the method further involves removing the unique identification number from the record of authentic such unique identification numbers in the central facility, when the unique identification number has been authenticated.
An advantage of this is that a card bearing a unique identification number can be used only once. After the identification number is removed from the record in the central facility, subsequent attempts to use the card cannot be authenticated. Alternatively, the method may involve marking or highlighting the unique identification in the record of authentic, when the unique identification number has been authenticated.
According to a still further aspect of the present invention, there is provided a payment method that uses a cash card that is representative of a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer, the method comprising: receiving the unique identification number when it is exposed, authenticating the card by checking the validity of the unique number with a central facility that includes a record of authentic such unique identification numbers, and on authentication of the card, accepting the card as at least part payment for goods or services.
Various aspects of the invention will now be described, by way of example
only, and with reference to the following drawings, of which : Figure 1 is an example of a face value scratch card in which card information is obscured with removable opaque surfaces; Figure 2 is an example of the face value card of Figure 1, in which the removable opaque surfaces are removed; Figure 3 is an example of a database that includes identification and associated validation numbers; Figure 4 is a block diagram of a first payment system that uses the card of Figures 1 and 2, and Figure 5 is a block diagram of a second payment system.
Figure 1 shows a face value scratch card 10 that is representative of a cash amount, in this case f5. 00, which amount is written on the card 10 in human readable text. At an upper portion of the scratch card 10, there is provided a unique identification number that is concealed by an opaque surface 12, which can be removed, typically by scratching, to expose the unique number as and when desired by the user. Figure 2 shows a card 10 in which the unique identification number 14 is exposed, in this case 12345678901234567890. The unique identification number 14 for each card 10 is generated at random and typically includes a code that is indicative of the cash value of the card.
Also provided on the card 10 is a unique validation number. As with the unique identification number 14, this is concealed by an opaque surface 16 that can be removed, again typically by scratching, to expose the validation number as and when desired by the user. Figure 2 shows a card 10 in which the unique validation number 18 is exposed, in this case 123456.
The validation number 18 is typically generated using the unique identification number 14 as a cipher seed. For example, the validation number 18 can be generated using a one-time pad. In this method, the coding is only ever used once so that even if an attack were made and the code cracked it is of no use as it is not used again. This method is well known and described in an article titled"Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications"by J. Amer, Inst. Elec. Eng. , vol. 45. Pages 109- 115,1926.
In order to use a one time pad for encoding a message the key code must be longer than the message. For example, if a one time pad of 1 3 5 2 17 5 9 10 8 20 1 6 were used to code a message"TORATORATORA", the alphabet would be stepped through as follows: To T add 1 to get the next letter in the alphabet to become U, To 0 step forward 3 letters in the alphabet to get R and so on.
The resulting coded message is"URWCKTAKBISG", with the original and the coded message being related only through the one time pad. Provided a copy of the pad is available, discovering the original message is simply a matter of subtracting the pad numbers to find the original letters. However, in the absence of the pad, it is not possible to decode the message.
In order to construct a series of one time pads, there are certain mathematical rules that should be followed: 1. Each pad must have more bits than that of a character, e. g. at least 8 bits for ASCII.
2. Each pad must be completely different from the ones before it.
3. Each pad should be a function of a single changing variable that authorised parties can keep track of.
Using modulo arithmetic these characteristics can be satisfied. For example, using the"mod"allows a one time pad to operate as follows: If p and q are constants, prime and of size larger than 8 bits, the following equation can be used: pad=pnmodq, where n is the nth character of the message. To avoid pads of 0's, p must be larger than q, otherwise pad=plmodq=O. Similarly, n should not be set to 0. If these rules are met, a pseudo random number is generated having bits that can be either added or subtracted, (or any other function performed) on each character of the message. If exclusive OR (XOR-0) is used, the number of bits remains the same and the repetition of the XOR gives
the original message, i. e AB==C, C < BB=A. Thus, msgOPad = cyphmsg and cyphmsg ( pad = msg. This particular method of encryption is called a hash algorithm, where two elements are combined to form a third unique element.
In the present example, the"message"to be coded using a one time pad is the unique identification number 14. The resultant coded message is then used as the unique validation number 18.
Generation of the unique identification and validation numbers 14 and 18 respectively is done when the cards are manufactured. All the unique identification numbers 14 applied to the cards are stored in a database 20 in a central data facility 22, as shown in Figure 3. The central database 20 is typically provided and maintained by a trusted third party. Also stored with the unique identification numbers 14 are either the corresponding validation numbers 18 or the one time pad that was used to generate the corresponding
validation number 18. An advantage of storing the one time pad as opposed to the validation number 18 itself is that the validation number 18 is not stored in clear text, other than on the card on which it is printed. Optionally stored with the identification and validation numbers 14 and 18 respectively is an indication of the cash value of each card 10. This is not, however, essential when the identification number 14 includes a code that is indicative of the cash value.
The cards 10 bearing the unique numbers are sold for the cash value indicated on the card 10. Hence, the card 10 of Figures 1 and 2 would be sold for E5. The cards 10 can be exchanged for goods and services provided by goods and service vendors who have agreed to accept the cards 10 as payment, provided the unique identification number 14 on the card 10 is authenticated by the trusted third party. Payment is settled by the provider of the cards 10, which may be the trusted third party that maintains the central data facility or indeed another party.
Figure 4 shows a system that allows a plurality of vendors to authenticate the face value cards 10 of Figures 1 and 2. This system includes a central data facility, which has a memory 19 that includes the database 20 that stores all of the unique identification number 14 and the validation numbers 18 or one time pads, as appropriate. Connected to the memory 19 is a data processor 22 that is in turn connected to each of an accounting unit 24, which stores and processes each of the participating vendor's accounts, and an automated voice response unit 26. The technology for implementing the automated voice response unit 26 is well known and so will not be described here in detail. As is standard, the automated voice response unit 26 can be accessed by dialling a pre-determined telephone number.
The voice response unit 26 is adapted to request a vendor to identify a card 10 identification number 14 and transmit the identified number to the data processor 22, which is operable to search the database 20 for a match. If there is a match, a positive return signal indicative of the authenticity of the identification number 14 is generated by the processor 22 and sent to the automated voice response unit 26. Also generated and sent to the unit 26 is an indication of the validation number 18 associated with the identification number 14. This is done either by extracting the validation number 18 from the database 20 or by using the one-time pad stored in the database 20 to generate the validation number 18. At the same time, the unique identification number 14 recorded in the database 20 is deleted or suitably marked or highlighted by the processor to prevent it from being used again. In addition, a signal is sent to the accounting processor 24 to credit the vendor's account by the cash value associated with the card 10.
Receipt o''e positive rcl-am. sLr-L LLl Receipt of the positive return signal triggers the voice unit 26 to transmit an automated voice response notifying the vendor that the entered identification number 14 is valid. The response unit 26 also provides the vendor with the validation number 18 that corresponds to the identification number 14, which can be read out to the card user.
In the event that there is no match between the entered number and the numbers in the central database 20, a negative return signal is generated by the processor and sent to the automated voice response unit 26, in this case the signal indicating that the number is invalid. Receipt of the negative return signal triggers the voice unit 26 to transmit an automated voice response notifying the
vendor that the entered identification number 14 is invalid. In this case the transaction is terminated. The system of Figure 4 can be used when a customer wishes to purchase something either in person at a point of sales terminal in a shop or by telephone.
In the case of a telephone purchase, the user calls the vendor's tele-sales service, identifies the desired product or service and explains the proposed method of payment. The user then scratches off the opaque surface on his cash card 10 to expose the unique identification number 14, which he reads out to the vendor, who records it. The vendor then dials the pre-determined telephone number to connect to the automated voice response unit.
Once connected, the voice response unit 26 asks the vendor to read out the unique identification number 14. This number is then recorded and the database 20 is searched to identify whether there is a match between the received identification number 14 and any of the recorded unique identification numbers 14. If there is, an automated voice response is provided notifying the vendor that the number is valid. The unique number 14 then either deleted from the database 20 or the database 20 is marked in some way to show that the number 14 has been used. This confirms for the vendor that the card 10 is authentic and that payment for the goods requested will be settled by the card provider. The response unit 26 also provides the vendor with the validation number 18 that corresponds to the identification number 14. This is then read out to the card user, who can check the number with that on the card 10. If the validation number 18 is correct, the user has confirmation that the vendor is party to the overall system. This provides the user with security.
In the event that the returned validation number 18 is not correct, there are several possible explanations, including: (a) the validation number 18 may be incorrectly printed on the scratch card 10; (b) the validation number 18 could have been corrupted in retrieval and or communications ; (c) the scratch card 10 could be a forgery; (d) the vendor may not be authorised.
In the case of (a) and (b), if the vendor is bone fide, the unique number 14 on the card 10 will have been used and is no longer valid. However, until the validation number 18 is received the transaction may not be assumed complete and the card holder has no positive assurance that the remote organisation is bone fide. In this case, as in the case of (d), the holder has to take action that seems appropriate at the time. For example, the card holder may take the matter up with the card supplier by reporting the error. In this case the party running the system could check to see whether the vendor is authorised and if the unique card number 14 has been marked as having been used. If the vendor is authorised the card holder is then provided with a degree of assurance.
An alternative approach would be to try an alternative supplier with the same card 10. If, in this second or subsequent attempt, the unique number 14 results in a returned validation code 18 that matches the code on the card 10, then this confirms that the second supplier is bone fide and the first was bogus. If in this second attempt the number is refused, this is suggests that the original company contacted was in fact bone fide and they may provide services. It should, however, be noted that the refusal of the card 10 in a second attempt is not
absolute confirmation that the original company was bone fide, because the unique number 14 (which of course is given to the original company) could have been used by the original company to purchase goods or services from an authorised vendor, in which case the card 10 could not be used by the actual card holder. In view of this, card holders will be encouraged to notify the card supplier of bogus vendors or problems with validation number matching as soon as possible, so that the integrity of the system can be maintained.
When the identification and validation numbers 14 and 18 respectively are correctly authenticated, the transaction is completed in the same manner as for a credit card transaction, with the card holder being sent the goods requested and the vendor settling payment for the goods with a trusted third party. If the goods and services ordered do not arrive, the holder can contact the card issuer for a refund or advice on other alternatives. This provides the card holder with the assurance that his transaction will be honoured as the vendor has been credited against the unique number 14. Where the goods and services still do not arrive after a reasonable delivery time interval, then the card holder can expect a refund from the card supplier, provided certain criteria are met.
As an alternative to the system of Figure 4, rather than reading the unique identification number 14 into a voice response unit, a pc or other electronic terminal could be provided with software for sending a message to the central facility. A suitable example is shown in Figure 5, in which each of the cooperating vendors has a sales terminal 28 that has dedicated scratch card computer software installed on it and is connected, typically via the POTS, to the central data facility. In this case, when a vendor wishes to authenticate a unique identification number 14, the number is merely typed into a data entry
field in the sales terminal 28 and an electronic message requesting authentication is sent to the central data facility. As before, when the request signal is received, the database 20 is searched to identify whether the entered unique identification number 14 is listed. If it is, a message is returned to the sales terminal authenticating the unique identification number 14 and the vendor's account is credited by the cash value associated with the card 10. Receipt of the authentication signal confirms for the vendor that the card 10 is valid. If the entered number 14 is not matched with an identification number in the database 20, a message is returned to the sales terminal indicating that the unique identification number 14 is invalid. When this happens, the transaction is terminated.
At the same time as returning the confirmation message, the central data facility sends the validation number 18 that corresponds to the identification number 14 to the sales terminal 28. This is presented on the screen of the sales terminal 28 so that the sales person can read that validation number 18 out to the customer, who then exposes the validation number 18 on their card 10 and checks if it is the same as that provided by the sales person. If it is, the user is provided with confirmation that the seller is an authorised seller. In this way, there is a two level authentication process for providing a security for firstly the sales person and secondly the customer.
In addition, or as an alternative, to the system of Figure 5, the vendor may provide a web site or interactive television or digital site that includes software for allowing a consumer to purchase goods or services therefrom using the cards 10 of Figures 1 and 2. In this case the software is operable to provide a purchase page having a data entry field that allows a user to enter the unique
identification number 14 of their card 10 in the same way as would be done for a credit card. Once the card identification number 14 is entered, the authentication process is substantially as described in relation to Figure 5.
The card 10 of Figures I and 2 may optionally be provided with a magnetic strip that carries a machine-readable version of the unique code, which machine-readable code is perfectly encrypted. The use of such a strip, however, does not offer the user the assurance that no one else knows the unique number and may be regarded as less secure.
Whilst in the specific examples described the unique identification number 14 is in human readable form, this number could be provided in a coded format, for example a bar code, that can be read using equipment provided at retailer's premises or even with a user's pc. In this case, rather than reading the card 10 visually and entering the read identification number 14 manually, the bar code would be scanned and the number automatically entered by the scanning equipment.
In addition, although the card 10 shown in Figures 1 and 2 only bears a single unique identification number 14, each card 10 could carry a plurality of such numbers, each being associated with a pre-determined cash amount. In this case, each of the identification numbers 14 is concealed by a removable surface and each is separately exposable and usable by the card holder to purchase goods and services.
In order to limit the number of unique identification numbers 14 that have to be stored in the central data facility, each cash card 10 may be set to be valid only
for a pre-determined period, for example six months. After expiry of that period, the unique identification number 14 stored in the database 20 would either be removed or marked to show that is has passed its expiry date. In this case, the card 10 would not be authenticated and any transaction would be terminated.
The security of the system described herein is provided by requirement that the cash cards 10 are authenticated using the unique identification number 14 prior to a transaction. As will be appreciated, the level of security on an unused card itself is zero, because anyone finding and using the card 10 would be in the same position as they would be had they found cash.
A skilled person will appreciate that variations of the disclosed arrangements are possible without departing from the invention. Accordingly, the above description of several embodiments is made by way of example and not for the purposes of limitation. It will be clear to the skilled person that minor
modifications can be made without significant changes to the operation I III alit 11 described above.

Claims (21)

Claims
1. A cash card that represents a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer and a unique validation number that is also concealed by a removable layer.
2. A cash card as claimed in claim 1, wherein the removable layer that covers the unique identification number is removable by scratching it from the card.
3. A cash card as claimed in claim 1 or claim 2, wherein the removable layer that covers the unique validation number is removable by scratching it from the card.
4. A cash card as claimed in any of the preceding claims, wherein the validation number is generated using the unique identification number.
5. A cash card as claimed in any one of the preceding claims, wherein the validation number is generated using a one time pad.
6. A cash card security and authentication system for authenticating a plurality of cash cards that are each representative of a cash amount and each bear a unique identification number that is concealed by a removable layer, the system comprising: means for entering an identification number into a computer system when the removable layer is removed to expose the unique identification number; a central facility, remote from the means for entering the unique number,
with a memory that includes a record of each unique identification number and a data processor that is operable to search the memory for the entered unique number; means for transmitting the entered unique identification number to the data processor, the data processor being operable to search the memory on receipt of the unique number, and means for generating a signal indicative of the authenticity of the card, when there is a match between the entered number and a number listed in the memory, thereby to provide a means for authenticating each card.
7. A system as claimed in claim 6, wherein the removable layer that covers the unique identification number is removable by scratching it from the card.
8. A system as claimed in claim 6 or claim 7, wherein the card bears a unique validation number, the unique validation number being concealed by a removable layer.
9. A system as claimed in claim 8, wherein the removable layer that covers the unique validation number is removable by scratching it from the card.
10. A system as claimed in claim 8 or claim 9, wherein the validation number is generated using the unique identification number.
11. A system as claimed in any one of the claims 8 to 10, wherein the validation number is generated using a one time pad.
12. A system as claimed in any one of claims 6 to 11, wherein connected to the
data processor is an automated voice response unit that is operable to generate a voice message indicative of the authenticity of the card, when there is a match between the entered number and a number listed in the memory.
13. A system as claimed in any one of claims 6 to 12, wherein means are provided for removing the number listed in the memory, when there is a match between it and the entered number.
14. A system as claimed in any one of claims 6 to 12, wherein means are provided for marking or highlighting a number or entry listed in the memory, when there is a match between it and the entered number.
15. A system as claimed in claim 14, comprising means for generating a signal indicative of the invalidity of the card, when there is a match between the entered number and a number that is marked or highlighted in the memory.
16. A cash card security and authentication system for authenticating a plurality of cash cards that are each representative of a cash amount and bear a unique identification number that is concealed by a removable layer, the system comprising : means for entering a unique number into a computer system when the removable layer is removed to expose the unique identification number; means for transmitting the entered unique identification number to a remote central facility that has a memory that includes a record of each unique identification number associated with the plurality of cash cards and a data processor that is operable to search the memory for the entered unique number
and generate a signal indicative of the authenticity of the card when there is a match between the entered number and a number listed in the memory, and means for receiving the signal indicative of the authenticity of the card, thereby to provide a means for authenticating each card.
17. A system as claimed in claim 16, comprising means for receiving and displaying a unique validation code associated with the card.
18. A payment method comprising providing a card that is representative of a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer; removing the removable layer to expose the unique identification number, and authenticating the card by checking the validity of the unique identification number with a central facility that includes a record of authentic such unique identification numbers.
19. A payment method as claimed in claim 18 further involving removing the unique identification number from the record of authentic such unique identification numbers in the central facility, when the unique identification number has been authenticated.
20. A payment method as claimed in claim 18 further involving marking or highlighting the unique identification in the record of authentic numbers, when the unique identification number has been authenticated.
21. A payment method that uses a cash card that is representative of a cash amount, wherein the card bears a unique identification number that is concealed by a removable layer, the method comprising receiving the unique identification number when it is exposed; authenticating the card by checking the validity of the unique number with a central facility that includes a record of authentic such unique identification numbers, and on authentication of the card, accepting the card as at least part payment for goods or services.
GB0030056A 2000-12-08 2000-12-08 A cash card and a system and method using such a card Expired - Lifetime GB2369800B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0030056A GB2369800B (en) 2000-12-08 2000-12-08 A cash card and a system and method using such a card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0030056A GB2369800B (en) 2000-12-08 2000-12-08 A cash card and a system and method using such a card

Publications (3)

Publication Number Publication Date
GB0030056D0 GB0030056D0 (en) 2001-01-24
GB2369800A true GB2369800A (en) 2002-06-12
GB2369800B GB2369800B (en) 2005-07-06

Family

ID=9904767

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0030056A Expired - Lifetime GB2369800B (en) 2000-12-08 2000-12-08 A cash card and a system and method using such a card

Country Status (1)

Country Link
GB (1) GB2369800B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003075231A1 (en) * 2002-02-22 2003-09-12 Handcash As Payment card and method
EP1359549A3 (en) * 2002-04-29 2004-08-18 General Technology Services Company s.a.l Prepaid credit card
EP1717766A1 (en) * 2005-04-27 2006-11-02 Hewlett-Packard Development Company, L.P. Card kit, card system and validation method
WO2007025954A2 (en) * 2005-08-31 2007-03-08 Nagracard S.A. Method for generating a plurality of unique secure numbers and card comprising such a number
WO2009031912A1 (en) * 2007-09-04 2009-03-12 Mircea Pantelie On-line payment system
EP1973081A3 (en) * 2007-03-19 2009-10-14 Progressive Gaming International Corporation Gaming token verification
DE102004039899B4 (en) * 2004-08-17 2010-07-22 Dimitri Prof. Dr.-Ing. Korobkov encryption method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2252270A (en) * 1991-01-30 1992-08-05 Wren Hilton Giles Martin Credit or phone card
US5577109A (en) * 1994-06-06 1996-11-19 Call Processing, Inc. Pre-paid card system and method
GB2314527A (en) * 1996-06-28 1998-01-07 Transfer Technologies Telephone card with scratch-off layers
WO1998043825A1 (en) * 1997-04-02 1998-10-08 Aaron Ittah Payment instrument on all types of networks and particularly on internet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2252270A (en) * 1991-01-30 1992-08-05 Wren Hilton Giles Martin Credit or phone card
US5577109A (en) * 1994-06-06 1996-11-19 Call Processing, Inc. Pre-paid card system and method
GB2314527A (en) * 1996-06-28 1998-01-07 Transfer Technologies Telephone card with scratch-off layers
WO1998043825A1 (en) * 1997-04-02 1998-10-08 Aaron Ittah Payment instrument on all types of networks and particularly on internet

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003075231A1 (en) * 2002-02-22 2003-09-12 Handcash As Payment card and method
EP1359549A3 (en) * 2002-04-29 2004-08-18 General Technology Services Company s.a.l Prepaid credit card
DE102004039899B4 (en) * 2004-08-17 2010-07-22 Dimitri Prof. Dr.-Ing. Korobkov encryption method
EP1717766A1 (en) * 2005-04-27 2006-11-02 Hewlett-Packard Development Company, L.P. Card kit, card system and validation method
WO2007025954A2 (en) * 2005-08-31 2007-03-08 Nagracard S.A. Method for generating a plurality of unique secure numbers and card comprising such a number
WO2007025954A3 (en) * 2005-08-31 2007-04-19 Nagracard Sa Method for generating a plurality of unique secure numbers and card comprising such a number
US8117647B2 (en) 2005-08-31 2012-02-14 Nagravision S.A. Method for generating a plurality of unique secure numbers and card comprising such a number
EP1973081A3 (en) * 2007-03-19 2009-10-14 Progressive Gaming International Corporation Gaming token verification
WO2009031912A1 (en) * 2007-09-04 2009-03-12 Mircea Pantelie On-line payment system

Also Published As

Publication number Publication date
GB2369800B (en) 2005-07-06
GB0030056D0 (en) 2001-01-24

Similar Documents

Publication Publication Date Title
US5937394A (en) System and method for pseudo cash transactions with credit back
US6847816B1 (en) Method for making a payment secure
US5850442A (en) Secure world wide electronic commerce over an open network
RU2438172C2 (en) Method and system for performing two-factor authentication in mail order and telephone order transactions
AU2001257280C1 (en) Online payer authentication service
US7416115B2 (en) Method and system for automated value transfer
US7269256B2 (en) Electronic-monetary system
EP0796480B1 (en) Method and apparatus for conducting computerized commerce
US6311171B1 (en) Symmetrically-secured electronic communication system
US20020046092A1 (en) Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US20060190412A1 (en) Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
EA006395B1 (en) System and method for secure credit and debit card transactions
US20020152180A1 (en) System and method for performing secure remote real-time financial transactions over a public communications infrastructure with strong authentication
US20080210754A1 (en) Account payment using barcode information exchange
US20070174208A1 (en) System and Method for Global Automated Address Verification
US20040034597A1 (en) System and method for managing micropayment transactions, corresponding client terminal and trader equipment
JP2004500671A (en) Improved method and system for making secure payments over a computer network
RU2144695C1 (en) Method for claiming liability for card-related action by client and for accepting the claim by issuer
US20030130961A1 (en) System and method for making secure data transmissions
JP5093957B2 (en) Improved method and system for making secure payments over a computer network
US20020013900A1 (en) User authentication device and electric commerce system using the device
GB2369800A (en) Cash card with scratch off surfaces
US20020073315A1 (en) Placing a cryptogram on the magnetic stripe of a personal transaction card
JP3328937B2 (en) Transaction processing system and method, and terminal device used in transaction processing system and method
Peters Emerging ecommerce credit and debit card protocols

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application
PE20 Patent expired after termination of 20 years

Expiry date: 20201207