MXPA96004129A - Method and apparatus for forming the unmodulo interface to put in key with a computer - Google Patents

Method and apparatus for forming the unmodulo interface to put in key with a computer

Info

Publication number
MXPA96004129A
MXPA96004129A MXPA/A/1996/004129A MX9604129A MXPA96004129A MX PA96004129 A MXPA96004129 A MX PA96004129A MX 9604129 A MX9604129 A MX 9604129A MX PA96004129 A MXPA96004129 A MX PA96004129A
Authority
MX
Mexico
Prior art keywords
data
module
remote processing
processor
board
Prior art date
Application number
MXPA/A/1996/004129A
Other languages
Spanish (es)
Other versions
MX9604129A (en
Inventor
B Clark Dereck
Original Assignee
B Clark Dereck
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/210,200 external-priority patent/US5517569A/en
Application filed by B Clark Dereck filed Critical B Clark Dereck
Publication of MX9604129A publication Critical patent/MX9604129A/en
Publication of MXPA96004129A publication Critical patent/MXPA96004129A/en

Links

Abstract

The present invention relates to a remote processing system, located in a first site to form an interface with a host or host computer system located in a second site, which is away from the first site, the host computer system is of the type which includes a host modem and which is configured to facilitate financial transactions by receiving from the remote processing system a data packet that includes a data field in code or encrypted, the remote processing system is characterized because it comprises: a. a PC, comprising: (I) a first memory sector configured to store an interactive software program; (II) a first processor configured to run the software program; (III) a port or access port configured to communicate with the first processor, and (IV) a second modem configured to transmit the data packet from the PC to the host modem according to the software program; an input device, and c. an encrypting or coding module connected in series between the input device and the input port comprising: (I) a numeric keypad, (II) a second processor configured to encrypt the data entered with the numeric keypad, and (III) a data link configured to maintain communication between the encryption module and the input port of the

Description

METHOD AND APPARATUS TO FORM THE INTERFACE OF A MODULE TO PUT IN KEY WITH A PERSONAL COMPUTER TECHNICAL FIELD The present invention relates in general to methods and apparatus for remotely conducting a financial transaction and more particularly, to a technique for transmitting data in code to a central computer from a remote personal computer. BACKGROUND OF TECHNICAL AND TECHNICAL PROBLEMS Systems for conducting financial transactions from a remote location, for example, the home, office, or retail equipment, are becoming increasingly popular. The proliferation of personal computers, and particularly together with the modem (demodulator modulator). , allows a customer to pay an invoice, retail purchases, bank shares and other business transactions remotely, thus avoiding the need to travel to attend routine business matters. Currently known systems typically consist of a central computer located in a central data processing site, which is configured to communicate with a large number of remote personal computers (PCs). When an individual wishes to make a financial transaction, for example to order goods and pay for the goods with a credit card, the user builds a data link between his PC and the central computer through the PC modem. By ordering the appropriate merchandise, the user can enter a credit card number corresponding to the account to which the merchandise will be loaded. The purchase request is then transmitted from the PC to the central computer, so the transaction is verified by the central computer. Currently known systems are limited, for example in their ability to effect real-time transfer of funds, due to various problems associated with the transmission of key data. More particularly, real-time background transfers are typically effected by the use of an automatic teller machine (ATM). In a typical ATM transaction, the user enters an account number on a numeric keypad or alternatively inserts a bank card into the ATM so the account information is "read" from the magnetic strip located on the back of the ATM. the bank card. Then, the user enters a personal identification number (PIN) on the numeric keypad to allow the transaction. By properly entering the PIN associated with the bank card, the fraudulent use of such cards is greatly reduced. The extension of the ATM paradigm mentioned in the foregoing for home use is problematic, however, in that currently known systems for the transmission of key data (for example PINs) are not satisfactory. More particularly, although the techniques to code PINs and other confidential information and information are generally well known, the regulations of current banks and other financial industries are calculated to limit the extent to which confidential data can be transmitted in a form without being in code or encrypted. In the context of a PC used to remotely conduct a business transaction, it is possible to encrypt the confidential data on the PC and then transmit the data in code to the central computer. However, currently known systems usually require that confidential data (eg PIN) be entered into the computer via the keyboard associated with the PC, so the PC processor controls the encryption process . In this way, the data is transmitted essentially from the keyboard to the mother keyboard or mother of the PC in physical wires that connect the board to the PC box. Then, the data that is not in key is to say before completing the process of coded, necessarily reside in the motherboard, for example before and during the process of coded. It is believed that sophisticated electronic "listening" devices could thus be used to detect confidential data between the time the user enters the dashboard and the time in which the coded is completed. This form requires a system in which it overcomes the disadvantages of the prior art. BRIEF DESCRIPTION OF THE INVENTION The present invention provides methods and apparatus for transmitting data in code, which overcomes the disadvantages of the prior art. According to one aspect of the present invention, the system for transmitting data in code comprises a central computer connected to a remote data processing device (for example, PC), which includes or another suitable mechanism for entering the data confidential information within the remote device. According to a first embodiment of the invention, the remote processing device comprises a conventional PC having an alphanumeric keyboard connected to it, by means of a conventional electronic wire, so that a coded or encrypted module interposed between the keyboard and motherboard or mother PC. According to this first method, the code module comprises a numeric keypad which allows the user to enter confidential data (for example, PIN) directly into the code module. The encryption module then encrypts the confidential data and transmits the encrypted data to the PC so that the encrypted data can be transmitted to the central computer through the modem. In this way, the data does not need to reside on the PC in a non-encrypted form; In addition, data is transmitted from the module to encrypt the PC in a coded form, thereby reducing the risk that electronic "listening" devices may intercept data that is not in code. According to the second embodiment of the present invention, the coded circuitry is integrated in a keyboard associated with a PC, in such a way that the confidential data can be coded on the same board, in such a way that the confidential data they are transmitted to the PC and manipulated by the PC in a code form. According to the third embodiment of the present invention, a single-placed, self-contained transaction module comprises a processor having associated therewith an integral numeric keypad, in such a way that confidential data can be entered into the numeric keypad and opposite ciphers in key within a single integral unit, thus avoiding the need for transmission wires between a remote numeric keypad and the encryption processing circuitry. According to another aspect of the invention, the coded module can be equipped with several peripheral devices useful in entering data and information, for example readers of a magnetic head card, "smart card" or readers of a integrated circuit card (ICC), bar code readers, speech recognition devices, browsers and the like. In this way, confidential data in virtually any medium can be entered into the encryption module and coded before subsequent processing and transmission, in such a way that the potential for unauthorized detection of data that is not the key is reduced to a minimum. BRIEF DESCRIPTION OF THE DRAWINGS The present invention will be described in the following along with the accompanying drawings, in which similar numbers designate similar elements, and Figure 1 is a schematic block diagram of a transaction authorization system in accordance with with the present invention; Figure 2 is a front elevational view of a PC having a key or encryption module integrated therein; Figure 3 is a schematic block diagram of an integral coded module; Figures 4 and 6-10 are flowcharts that establish the operation of an exemplary application program, executed by the PC of Figure 2 according to the present invention; Figure 5 is a display of several useful icons together with the software shown in Figure 4; Figure 11 is an alternative embodiment of the coded module shown in Figure 2; Fig. 12 is a schematic, block diagram of the functional aspects of the keying module of Fig. 2; Figure 13 is a schematic circuit diagram of the processor contemplated in the keying module of Figure 2; Figure 14 is a schematic circuit diagram of the numeric keypad shown in Figure 2; Fig. 15 is a schematic circuit diagram of an analog switch, used in the keying module of the present invention; Figures 16 and 17 are schematic circuit diagrams of a magnetic strip reading circuit; Figures 18-20 are schematic memory maps of various memory sectors associated with the processor of Figure 13; and Figures 21-36, are flowcharts that establish various functional characteristics of the keying module of the present invention. DETAILED DESCRIPTION OF THE EXEMPLARY MODALITIES PREFERRED Now with reference to Figure 1, a remote transaction system 100, suitably comprises a central computer system 102, which may be in interface with one or more transaction networks, for example a network 104 to pay an invoice, a network 106 of a banking system and various other network systems 108, for example networks to buy state lottery, networks to buy retail sales, networks to buy mail orders and the like. The remote transaction system 100 further comprises a plurality of terminals HOa-11On that process the remote data, for example a PC of the type normally used by a customer in the home. The remote transaction system 100 may also consist of several diagnostic and maintenance apparatuses, for example a test system 112 for transmitting on the network and a network transmission reception system 114, suitably used to periodically test the operation of the central computer system 102 and an intervention system 116, which allows the system operator 100 to periodically intervene the resident data and information within the central computer 102. As discussed in more detail in the following, several networks 104- 108 are suitably operated by independent entities, which wish to conduct business and / or other transactions with several clients by means of the central computer 102, for example in which each of the respective PCs 110A-110N are conveniently placed inside the house of the customer, office, retail sales outlet and the like. According to a preferred embodiment of the present invention, the data, including confidential data, can be entered into one of the respective PCs 110 and keyed as discussed in more detail in the following, the code data is then transmitted from the PC to the central computer 102 along an appropriate data link 118. According to one aspect of the invention, the data link 118 may consist of a transmission wire (e.g., a telephone line, an optical fiber cable, or the like) or alternatively, it may consist of a wireless link, e.g. microwave, radiofrequency (RF) or other suitable means of data transmission.
Now with reference to Figure 2, in accordance with the preferred embodiment of the present invention, an exemplary PC 110, suitably comprises a display 202, a housing 204 for housing, inter alia, the computing circuitry associated with the PC 110, a board 206 connected to the box 204 by means of the connector 210 and a mouse 208 useful in executing the interactive programs. In a first preferred embodiment of the present invention, a keying module 214 may be conveniently interposed between the board 206 and the box 204, for example in series with the connector 210. In the illustrated embodiment, the module 214 suitably comprises a connector module 212 configured to allow ease of installation of the module 214. More particularly, a distal end 216 of the connection 210 is normally connected in a mating connector (not shown) in the case 204 during normal operation of the PC. When it is desired to install the module 214, the connector end 216 can be simply detached from the housing 204 and a distal end 218 of the connector 212 connected to the housing 204 at the same site the connector end 216 of the connector 210 is suitably connected to the module 214 , for example in such a way that the distal end 216 could in any other way be connected to the box 204. In this form, the module 214 can conveniently be interposed between the board 206 and the box 204 without opening the box 204, a procedure not easily acceptable to most computer users. In an alternative embodiment of the subject invention, the co-ordinating circuitry and various peripheral devices discussed herein, associated with the module 214 can be conveniently incorporated into the board 206 during manufacture or, retroconversion thereby avoiding the need for minus the keypad portion of the module 214. With momentary reference to Figure 3, yet another alternative embodiment suitably comprises a self-contained integral module 300 that includes a screen 306, a computer 304, a keyboard 302, a modem connection 308 and an accessory connector 310 for the interface module 300 with various preferred devices, for example bar code readers, smart card readers, magnetic strip readers and the like. According to the embodiment of Figure 3, only those components necessary to perform the specific functions discussed need to be incorporated into the module 300 which results in substantial cost savings in the PC mode shown in Figure 2. However, it will be appreciated that for those consumers who already have their own PC, the embodiment illustrated in Figure 2 may be preferable since a conventional PC can be easily adapted according to the present invention, by the incorporation of module 214 in PC 110. Now with reference to Figures 4-10, a remote exemplary transaction application program useful in accordance with the present invention will now be described. With particular reference to Figure 4, a suitable application program can be executed using a format (WINDOWS), which presents the user with various menu selections. Those skilled in the art will appreciate that the user can select several options using a keyboard 206 or a mouse 208 (see Figure 2) as is known in the art. Although the object application program is described herein in the context of the WINDOWS mode, it will be appreciated that the object of the invention can be implemented in the context of any improvement of the convenient requests. With continued reference to Figure 4, by the activation of the WINDOWS capability of the PC 110 (step 402), the user can select one of a plurality of menu options 406-416, for example by double-clicking the mouse 208 (step 404). More particularly and with momentary reference to Figure 5, the user can select the banking operation 406 corresponding to the icon 506, an operation to pay an invoice 408 represented by the icon 508, the operation of nearby purchases 410 represented by the icon 510, a mail order operation 412 represented by the icon 512, a state lottery operation 414 represented by the icon 514, file operations 416 corresponding to 516, in the operation of setting up the PC 418 corresponding to the icon 518, a hardware test operation 420 corresponding to the icon 520, a display time operation 422 corresponding to the icon 522, or a tutorial operation 424 expressed by the icon 524. Although the illustrated icons, shown in Figure 5 are useful in the In the context of the illustrated modality, it will be appreciated that any icon or other mechanism for selecting various program options can be used in the text of the present invention. In addition, the menu options set forth in Figures 4 and 5 are only exemplary: • various combinations of menu options shown in the figures alone or in combination with other menu options not set forth herein may also be employed in the context of the present invention. With continued reference to Figure 4, the tutorial operation 424 is adequately related to an explanation of the various menu options and an explanation of how to use the options. The display time option 422 adequately displays the system time in any desired format. The test operation of the hardware 420 is suitably configured to allow the user to verify the integrity of the various components of the hardware and preferably the devices useful in the context of the present invention. The establishment of operation 418 appropriately allows the user to configure various parameters associated with the operation of the system and methods discussed therein. The file operation 416 suitably allows the user to manipulate various useful data structures in the context of the present invention. The lottery operation 414 can be configured to allow the user to purchase lottery tickets for example, via modem from their state of residence or from any other state or municipality, depending on the government regulation of the sale of such tickets. The operation 412 of ordering the mail appropriately supposes procedures for ordering goods from the PC 110, for example from an order catalog by mail. In this regard, the module 214 (see Figure 2) or alternatively, the box 204 may be suitably equipped with a bar code reader, such that the goods can be selected automatically by scanning the bar code associated with the goods. . The same bar code technique can also be used in the context of the shopping operation 410, which suitably involves procedures to allow the user to order several products (eg, grocery products) by entering the ordered article into the PC 110. According to another aspect of the invention, operation 410 of nearby purchases can be implemented with the use of a barcode reader in the following manner. Several customer products are commonly equipped with a UPC brand, bar code or other brands that represent the particular product. A bar code reader assembly (not shown), for example a manual bar, can be properly used by the customer to enter a memory arrangement associated with the products of the bar code reader, which the consumer wishes to buy, for example from a grocery store. After accumulating the products which the consumer wishes to purchase over a period of time, the digit of the product stored in the barcode reader memory can be "emptied" into an appropriate memory location on the PC 110 during the operation, for example, of the operation of purchases 410. In this form, the consumer can select the products that are going to be bought during a period of time, analogous to the construction of the list of groceries. When it is desired to purchase the articles, the marks of the accumulated list can be transmitted via the data link 118 (see Figure 1) to the central computer 102, whereby the grocery network 108 retrieves the data and collects the groceries for the consumer. If desired, the grocery store cooperating with the grocery network 108, can supply the grocery items to the consumer's residence, with the grocery products g paid in accordance with, inter alia, the principles set forth in step 408. of payment of the invoice or banking operation 406 as described in greater detail in the following. Now with reference to Figures 4 and 6, banking operations 406 adequately allow the user to select one or more of the. banking options, for example a 602 transfer of funds transaction and the 604 application for account operation, or 606 transfer of smart card funds. In addition to bank operation 406, it may also allow the user to output the main menu 400 (step 608). Now with reference to Figures 6 and 7, the fund transfer operation 602 suitably assumes a selection from a particular bank account (step 610), for example a savings account, a checking account, a stock market account and similar. When the account which the user wants to load is selected, the system appropriately prompts the user to enter an amount which is to be transferred or paid (step 702), for example by entering an amount in PC 110 through the board 206 (704). If no quantity is entered after a predetermined time or if an incorrect quantity (for example "zero", a negative quantity, or an amount which exceeds the predetermined threshold), the system can resume its previous processing path (stage 706). If a correct amount of funds is to be paid or transferred is entered by the user, the user can be advised to select the payment method (step 708), whereby a transaction request is properly transmitted from PC 110 to the module 214 (step 710), as discussed in more detail in the following. In accordance with one aspect of the present invention, it may be advantageous to allow particular transactions, for example transactions involving the transfer of money, only for the satisfaction of certain threshold conditions. For example, it may be advantageous to allow the transfer of funds only if a receipt evidencing the transaction can be printed on a printer which is located next to PC 110.
More particularly and continuing with reference to Figure 7, the system can be appropriately configured to confirm: (1) whether the PC 110 is equipped with or has access in any other way to a local printer; and (2) that the mentioned printer is equipped with paper by which a receipt can be printed (step 712). If the PC 110 does not have a printer associated with it or if it has a printer, but the printer lacks paper, the system can warn the user to install an appropriate printer and / or paper (step 714), so the system again check to confirm the presence of a functional printer (step 718). If the functional printer is not yet detected, an appropriate error message is generated. If it is determined that the PC 110 has a working printer associated with it, the PC 110 is suitably configured to transmit a command or command to the module 214, which causes the module 214 to enter a "reader" mode of operation (step 716). ), discussed in more detail in the following along with Figures 27 and 28. The user can then enter the appropriate account data, for example by reading a transaction card by means of a magnetic card reader, which enters a smart card inside a smart card reader associated with the PC 110 that enters the account data via board 206, or any other convenient mechanism for entering the data account associated with the PC 110 or the modem 214 ( stage 720). Now with reference to Figure 8, once the account data is entered, the PC 110 can be properly configured to display the account data on the screen 202 (step 802). The particular transaction that is performed by the user is of the type which does not require the transmission of confidential data (for example, PIN), the account data and the funds transfer / bill payment data discussed in the above, may be assembled and transmitted to the central computer 102 via the data link 118 for processing (step 812). If on the other hand, the particular transaction requires the entry of confidential information, the system can be properly configured to warn the user to enter such confidential information (step 804). More particularly, to facilitate the entry, key conversion and transmission of confidential data in key, the PC 110 can be suitably configured to send an order or command signal to the module 214 to place the module 214 in a "scan" mode (step 806), as discussed in greater detail in the following with Figures 21 and 25. In accordance with the embodiment shown in Figure 2, the user can then enter such confidential information by means of the numeric keypad associated with the module 214 or in the context of the modality shown in Figure 3, by means of the numeric keypad 302. In the alternative mode, discussed in the foregoing, in which the co-ordinating circuitry and / or software is integrated in the board 106, the user can enter confidential information directly via board 206. In any case, the form in which module 214 (or module 300 according to the modality ad shown in Figure 3) receives, encrypts and transmits the data in key is discussed more fully together with Figures 21-29. By entering all the necessary information to reflect a particular transaction, the system can adequately warn the user to determine if the user wants to enter another transaction. If so, the system returns to step 702; if no further transactions are desired, the PC 110 appropriately packages and transmits the transaction data to the central computer 102 via the data link 118. In this regard, any suitable mechanism for data transmission can be employed, for example a modem connected to box 204 or, alternatively, a modem connected directly to module 214 as discussed in more detail in the following (step 812).
Once the central computer 102 has confirmed the transaction (step 814), the printer (not shown) associated with the PC 110 and discussed in the above suitably, prints a transaction record (receipt) (step 816) and the system again returns to main menu 400 (step 818). Returning now to Figure 6, if the user wishes to inquire as to an account balance and / or status (step 604), the system can be appropriately configured to warn the user to select - a particular account object to ask (steps 612), so that the system returns appropriately to step 712 (see Figure 7). If the user selects the smart card funds transfer operation 606, the system can be properly configured to advise the user to insert a smart card into an appropriate smart card reader module (step 614) (not shown). More particularly with reference to Figure 9, those skilled in the art will appreciate that integrated circuit cards (ICC), also known as smart cards, typically comprise a microprocessor embedded in the card, as well as an electronic mechanism to allow the transfer of data to and from the card. This being the case, the information of the account and in fact, the funds can be "added" electronically to or "subtracted" from the card making the appropriate modification for the resident data on the card. Continuing with the reference to Figure 9, if the user wishes to add funds to the smart card (step 902), the system can be appropriately configured to perform a process analogous to that established in Figure 7; namely, the user can select an account from which the funds will be withdrawn and applied to the smart card, as well as the amount of funds that will be applied. The user can then be advised to enter the smart card into a reader / smart card writing module (not shown) affiliated with either the PC 110 or the. module 214 to carry out the electronic update of the resident data on the smart card. In addition, the system can be configured to require a functioning printer as a prerequisite to perform the update function of the said smart card, as desired. If, on the other hand, the user wishes to "remove" funds from the smart card (step 904), the system can notify the user to select the destination of the funds extracted from the smart card (step 906) and to request the user to enter a PIN or other confidential data (step 908). In this regard, the entry of such confidential information is suitably performed in a manner analogous to that described in the following together with Figures 11, 14 and 25-28. By entering the PIN, the transaction of the smart card can be adequately affected by means of the read / write circuit of the smart card (not shown) associated either with the PC 110 or the module 214. With reference again to the Figure 4, by the selection of the invoice payment operation 408, the system can be configured to notify the user to add a new invoice to the invoice payment operation (step 1002). More particularly, * the invoice payment function of the object system suitably attempts a method of keeping track of several invoices, for example in department of invoice storage, credit card invoices, utility invoices and the like together with the PC 110. If the user wishes to add a new identity to the invoicing to the billing operation, for example a new account account storage department, the data corresponding to the new account can be entered into the PC 110 by the user ( step 1008), for example by means of board 206. The system may also be configured to display various invoices comprising the billing operation 408 (step 1004), which allows the user either to exit to the main menu (step 1010) or, alternatively, to select a particular invoice for payment (step 1006). Once a particular invoice is selected for the payment, the system is suitably configured to effect the payment of the invoice in accordance with the steps described together with Figure 7. It will be appreciated that at various times during the execution of the application program Previous, users are required to enter several accounts, for example PIN and other information and / or data within the system, for example by means of the module 214. In this way, according to one aspect of the present invention, the module 214 may be configured properly to assume a plurality of different modes, depending on the particular function that is being performed. The circuitry comprises the module 214, the / which allows module 214 to assume these various operational states that will be described now, followed by a functional description of the various operational modes associated with the module 214. With momentary reference to Figure 11, the module 214 can suitably assume any desired configuration, for example the slope, contoured mode shown in Figure 11. In particular, the module 214 The device comprises a housing 1100, for example an injection molded plastic housing, similar to the conventional "ouse" typically used in conjunction with personal computers. According to the modality shown in Figure 11, the module 214 suitably comprises a numeric keypad 1102, for example corresponding to the numbers 0-9 and which also includes inter alia, several functions, for example an input button (E) and cancel (C). The module 214 further comprises a card reader slot 1104 configured to receive the transaction of the cards of the type carrying a magnetic strip and a slot 1106 ICC (smart card) configured to accept a smart card in reading the data and / or writing to / from the smart card. Referring now to Figure 12, the module 214 suitably comprises a keypad circuit 1204 associated with the numeric keypad 1102 (Figure 11), a magnetic strip reader circuit 1206 associated with the magnetic strip reader 1104, a 1212 microcontroller , a modem 1202, a smart card reading circuit 1208 associated with the ICC slot 1106 and a clock / data 1218 configured to effect communication between the microcontroller 1212 and the box 204 via the connector 212 as well as the microcontroller and the board 206 via the connector 210. In addition, the module 214 suitably comprises a control gate 1222 to selectively establish communication between the module 214 and the PC 110. Continuing with the reference to Figure 12 and further with reference to Figure 13, the microprocessor 1212 suitably comprises a microprocessor model MC68HC11E9 by Motorola, Inc. The processor 1212 performs a a suitable interface with a power circuit 1302 configured to apply 5 volts of power to V ^ and an oscillator circuit 1304 configured to apply a predetermined clock pulse to a clock gate 1308, for example, at a frequency in the range of 4 MHZ at 12 MHZ and when much preferred at 8 MHZ. The processor 1212 further comprises a reset circuit 1306 configured to selectively apply a reset signal to a reset gate 1310 of the processor 1212. In addition, the processor 1212 is suitably equipped with the following input / output gateways which, in the illustrated mode, are configured as follows: Gate No. Function to insert the input / output card (channel 1) pal insert the input / output card (channel 2) pa2 modem interrupt pa3 read / write • pa4 ale pa5 cs pa6 output to the "validation system" LED pa7 read / write data (smart card) pbO numeric keypad row 1 pbl numeric keypad row 2 pb2 numeric keypad row 3 pb3 numeric keypad row 4 pb4 enable buffer pb5 smart card clock pb6 control of the smart card pcO dO parallel data from interface to modem pcl di parallel data from interface to modem pc2 d2 parallel data from interface to modem pc3 d3 parallel data from interface to modem pc4 d4 parallel data from interface to modem pc5 d5 parallel data from interface to modem pc6 d6 parallel data from interface to modem pc7 d7 parallel data from interface to modem pdO, pdl interface to read bar code pentec data reader pd2 clock pe pd3 data pe pd4 pd5 board clock pd data board column 1 of the numeric keypad pei column 2 of the numeric keypad pe2 column 3 of the numeric keypad Now with reference to the Figures 12-14, the numeric keypad 1102 is suitably connected to the various gates associated with the processor 1212 as set forth in Figure 14. Now with reference to Figures 12-13 and 15, the control gate 1222 suitably comprises a switch analog, for example a module No. 74HC4066 manufactured by Motorola, Inc. The switch 1222 suitably comprises four internal switches ad, which are controlled simultaneously by the output of the gate pb4, such that the ad internal switches are either all open or all closed according to the logical output value of the gate output pb4. Generally speaking, in essentially all of the operational states of the module 214, the internal switches ad will remain open, effectively isolating the board 206 from the box 204. During the transparent mode (discussed in the following), the internal switches ad will typically remain closed , allowing normal communication between the board and the PC. With continued reference to Figures 12-13 and 15, the buffer enables the gate signal pb4 of the processor 1212 which is suitably applied to the control gate 1222. In addition, the board clock and the board data signals are transmitted between the gates pd4 and pd5, respectively, of the microprocessor 1212 to the common data connection 1219 that extends from the switch 1222 to the board 206 via the connector 210. Similarly, the PC clock and the PC data signals are transmitted between the gates pd2 and pd3, of the microcontroller 1212 to a common data connection 1218 that extend between the control gate 1222 and the box 204 (FIG. 1) via the connector 212. Now with reference to FIGS. 12, 13 and 16, a first embodiment of the magnetic strip reader circuit 1206, associated with the reader of magnetic strip 1104 (Figure 11) suitably comprises a magnetic read head 1602, for example an inductor coil of 1.6 microhenry, first and second respective amplifiers 1604 and 1606, for example the operational amplifiers model No. LM324a, the respective comparators 1608 and 1610, by example model No. LM393 and an investment schmidt 1612 activator, for example part No. 74HC14. More particularly and with continued reference to Figure 16, a transaction card of the type carrying a magnetic strip, is suitably slid through a magnetic strip reader 1104 of the module 214 (Figure 11) in such a way that the magnetic strip couples magnetically to the head 1602 reader. The output of the coil 1602 is suitably applied to the inverting output of the amplifier 1606, which suitably presents a gain in the order of 20. The output of the amplifier 1604 is suitably applied to the non-inverting input of the amplifier 1606. The output of the amplifier 1606 is suitably applied to the non-reversing input of the comparator 1608 and to the reversing input of the comparator 1610. Applying a given threshold voltage to the inverting input of the amplifier 1608 and also applying a predetermined threshold voltage to the non-inverting input of the 1610 amplifier, a series of high logic and low logic pulses are applied to the input of the schmidt 1612 actuator, which inputs are effectively rectified, squared and sharpened in a binary square wave. by the combination of the schmidt activator / comparator . The output of trigger 1612 schmidt is a function of the output of coil 1602 and corresponds to the data, which are magnetically encoded on the magnetic strip, which is removed by means of magnetic card reader 1104. The output of the schmidt trigger 1612 corresponds to the channel 1 of logic data applied to the gate pO of the processor 1212. The reading circuit of the magnetic head of FIG. 16 is particularly useful in the context of the cards carrying magnetic strips, which comprise a single "track", or an individual column of magnetically encoded information. Alternatively, many magnetic strips of the type typically found in transaction cards comprise two or more separate magnetic columns embedded within the magnetic strip. In such cases, it may be advantageous to employ dual magnetic reading coils in the context of the card reader slot 1104. More particularly with reference now to Figure 17, an alternate embodiment of the circuit 1206 suitably comprises first and second 1603a reading coils. and 1603b respectively, which are suitably configured to read the first and second corresponding magnetic rails (not shown) comprising the double rail magnetic strip with a transaction card. In the alternative embodiment shown in Figure 17, the circuit essentially comprises two of the circuits shown in Figure 16, configured to generate the respective outputs 1702 and 1704, which are suitably applied to the respective paO and pal gates of the processor. 1212. Now with reference to Figures 18-20 and with momentary reference to Figure 12, the microcontroller 1212 suitably comprises a random access memory (RAM) 1802, a read-only memory (ROM) 1902 and a memory of electronically programmable, erasable, read only (EEPROM) 2002. More particularly, RAM 1802 suitably comprises, inter alia, the respective memory sectors 1804-1836 corresponding to various addresses in RAM 1802. As discussed in FIG. the following, together with the operational states of the module 214, various predetermined data are suitable stored and retrieved in the data sectors 1804-1836 during the operation of module 214. Continuing with the reference to Figure 19, the operation code (operational program) which controls the operation of the module 214, is stored appropriately in a first sector 1904 in the ROM 1902. In addition, several interruption sectors, useful in the operation of the module 214 are stored properly in a second sector 1906 within the ROM 1902. Now with reference to Figure 20, the EEPROM memory map 2002, suitably comprises non-volatile memory for use in storing the encrypted keys associated with the encryption algorithm employed in the context of the present invention, to key confidential data. More particularly, the EEPROM 2002 adequately comprises a first sector 2004 corresponding to future encrypted keys, a second sector 2006 corresponding to the serial number of the initial encrypted key and a third sector 2008 corresponding to a key counter. In accordance with one aspect of the present invention, any suitable key algorithm can be employed by module 214, module 300, or PC 110 in the context of the present invention, which provides adequate security against unauthorized data detection. Underlying confidential Now with reference to Figures 21-38, the operation of the system 100 and particularly the operational states of the module 214 will now be described. With particular reference to Figure 21, upon activation of the module 214, a reset signal is applied to re-establish the gate 1310 of the processor 1212 (step 2102). By entering the reset condition, the initialization of the system is executed (step 2104). More particularly and with momentary reference to Figure 22, the initialization step of the system 2104 suitably assumes several initialization steps (2104b), including, inter alia: 1. Initialization of the current mode to the transparent mode, for example by adjusting the current mode, recorder 1804 (see Figure 18) to the condition of transparent mode, as discussed in more detail in the following; 2. Initialization of the recorder from previous mode 1806 to "without mode"; 3. Initialize the system instructions to the appropriate activation features; 4. Enable connection interruptions common PC interface (for example, connector 212); and 5. Initialize the temporary interface buffer PC 1808 for "empty". The importance of the above initialization steps are discussed in greater detail in the following along with the proper description of the operation of the module 214. Upon completion of the initialization system, the system enters a redirection state of the seventh (step 2106), so the system then enters the appropriate operational mode; in the context of the initial system, the system will fail for the transparent mode, as established in the above, together with the initialization stage of the system 2104 (b). More particularly, a preferred embodiment of the present invention employs an interruption processing scheme within the module 214. In this way, as the system flows through the main operational circuit established in FIG. 21, the system of from time to time it will receive interrupts from the PC 110. Upon receipt of a "mode change" interrupt command from the PC 110, the processor 1212 causes the module 214 to terminate then the current mode and enter the redirected system (step 2106), from which the new appropriate operational mode can be entered. The main control circuit that governs the operation of the module 214 shown in Figure 21, the seventh to enter any of many operational states as a result of a predicted instruction number. Particularly, the system can enter certain operational states as controlled by the executable code resident within sector 1204 of ROM 1902. In addition, the system can enter certain operational states as a result of the commands received from PC 110, as ee set out in greater detail in conjunction with Figure 23. Now with reference to Figure 23, PC 110 from time to time sends interrupt command to module 214 via connector 212 (step 2302). Upon receipt of a PC interrupt, the interrupted data packet received from PC 110 is suitably stored in sector 1808 of RAM 1802 (step 2304). The system then determines whether the complete message (interrupt data packet) was received from PC 110; and, no, the system returns to the main circuit 2100. If a complete message was received in the module 214, the system determines whether the data corresponds to an order instruction or whether the message corresponds to another order instruction (step 2308). If the message corresponds to the data instead of a command command, the message is appropriately stored in the data output buffer 1810 of the RAM 1802 (step 2310), for further processing, for example, transmission of data. modem to the central computer 102. Afterwards, the contents of the temporary memory of the PC interface 1808 are reset to empty it (step 2320), then the seventh returns back to its pre-interrupted state (step 2322). Returning now to step 2308 of Figure 23, the data is received with a command or command, the system determines whether the instruction of the command corresponds to a change in the mode (step 2312). If not, the data is stored in the command register 1812 of the RAM 1802 for possible subsequent use within the current mode (step 2316); then the seventh proceeds to step 2320, as it was prescribed in the foregoing. If the shake received from the PC 110 corresponds to a mode change command (derivation "ei" of step 2312), then the current mode is written in the previous mode register 1806 (step 2314), and the mode just received it is written in the current mode register 1804 of RAM 1802) step 2318). Then the system proceeds to step 2320, as described in the above. With continued reference to Figure 21, upon receipt of a message from PC 110, processor 1212 interrogates the current mode recorder 1804 and according to the contents of register 1804, responds to the appropriate operational mode of main circuit 2100. In the context of the initial or startup operation, the system is appropriately configured to enter the transparent mode (step 2110). Now with reference to Figure 24, the trailing mode 2110, as with the other various operational modes described below, determines whether a subsequent mode change has been received since the transparent mode 2110 is entered (step 2402). If the change of mode was received, the seventh brings in the effect of redirecting the eietem (step 2106); (See also Figure 21) and enter the newly selected mode. If a mode change has not occurred, the processor 2112 interrogates the previously made region 1806, to determine the previous mode corresponding to the traneparent mode (step 2404). If the previous mode corresponds to the transparent mode, the system proceeds to step 1410. If the previous mode was not the transparent mode, the system instructs the keyboard or board to clear its internal buffers and set the register 1086 in the previous mode to transparent (step 2408). Particularly, in the previous mode it was not the traneparent mode, it is possible that false keys may have entered the board 206, which data of the board may be stored in the internal intermediate memory for board 206 and are not shown in the table. Figure 2. In order to avoid the data corresponding to these false keystrokes being transmitted to the PC 110, internal internal buffers of the keyboard are erased (step 2408). Then, the system enables the interface between board 206 and PC 110 (step 2410). More particularly and with reference to Figures 12, 13 and 15, step 2410 of Figure 24 appropriately causes the processor 1212 to generate a signal that enables the buffer in gate pb4 and transmit the enabled memory signal. intermediate to the control gate (switch) 1222. In response, the internal switchgears of the switch 1222 are closed, establishing direct communication between the PC 110 and the board 206 through the connector 212, the common connection 1218, the switch 1222 , the common connection 1219 and the connector 210. After that, the system continues the cycle through the transparent mode 2110, allowing the normal operation of the keyboard 206 with respect to the PC 110. The seventh will continue the cycle through the traneparent 2110d mode, haeta which received the subsequent maneuver from PC 110. Returning now to Figure 21, the system can also receive an order to enter the scan mode ( step 2112), for example in response to the request for the scan mode of the PC 110 (see step 806, FIG. 8), whereby the processor 1212 causes the module 214 to enter the operation scan mode (step 2114). ). Particularly and with reference now to the Figure 25 (scan mode 2114) generally involves "scanning" the circuitry associated with the numeric keypad 1102 (Figure 14) to detect data (eg PIN) that enter the numeric keypad 1102 by the user. With continued reference to Figure 25, the operation scan mode involves, inter alia, initializing PIN entries in buffer 18014 to empty (step 2502), to prepare the PIN buffer to receive the data which they are close to make it enter the numeric keypad 1102 by the user. The system detects a subsequent mode change command has been received (step 2504); if so, the system returns to step 2104 to redirect the seventh. If no change has occurred in the mode, the module 214 has already detected a pre-emitted key (step 2506) or, alternatively, until a mode change is detected (step 2504). Particularly, the processor 1212 scans gates pb0-pb3 and gates pe0-pe2 (see Figure 13) which corresponds to rows 1-4 and columns 1-3 of keypad 1102, respectively (see Figure 14) . When a depressed key is detected, the system determines whether the key pressed corresponds to one of the numbers 0-9 (step 2508); if so, the module 214 appropriately sends a signal to the PC 110 to cause "false" marks of the key pressed to the screen 202 (Figure 2). More particularly, the operational program stored in sector 1904 of ROM 1902 (Figure 19) of processor 1212 suitably includes an operation code, which allows module 214 to communicate with PC 110, in a manner which simulates the way in which conventional boards (eg board 206) typically communicate with box 204. In a preferred embodiment of the present invention, the operation code that governs the operation of module 214, is appropriately configured in accordance with any suitable protocol, for example the protocol used by IBM in their PCs or any other suitable derivative or variant thereof, by which it allows the module 214 to communicate with the box 204 in a manner which simulates conventional communication between the board 206 and box 204, data processing and other communication between module 214 and box 204 can be conveniently and efficiently carried in a manner which is essentially transparent to the box 204; that is, when the box 204 receives the data and / or information from the module 214, the box 204 interprets the data just as if the box 204 had received them from the board 206. Similarly, when the board 204 transmits data and / or information, which received by the module 214, the box 204 configures the data / information packets in the same way, in which the box 204 would normally configure the data for the reception by the board 206. Leveling the traffic data protocol currently known in this form, the module 214 can be conventionally interposed in series between the board and the board gate in the PC of essentially all the PCs, which behave with a pattern of the protocol recognized by the company. Continuing with the reference to Figure 25, if the key pressed corresponds to a 0 to 9, the system waits until the key is released (step 2518) before capturing the data. In this way, the system advantageously avoids capturing repetitive data, which can often be generated by numeric keypads, which are specifically configured to continually generate data by the repetitive key stroke when a particular key is held down by the user. Returning now to step 2508, if the pressed key was not 0 to 9, the system determines whether the key pressed corresponds to an "Enter" (step 2512); if so, a message corresponding to an "Enter" command is transmitted from module 214 to PC 110 (step 2514), indicating that the entry of confidential data (for example, PIN) was completed. If on the other hand, the key pressed does not correspond to an "Enter", the system determines the identity of the key pressed. In the context of the illustrated mode, if the key pressed does not correspond to a 0 to 9, and also does not correspond to an "Enter", the seventh concludes that the key corresponds to "Cancel" (step 2516). In this way, the module 214 transmits a message to the PC 110 indicating that the entry of confidential data has been canceled by the user. Upon release of the key pressed by the user (step 2518), the system determines whether the key pressed corresponds to a 0 to 9 (step 2520); if so, the particular numeric pressed key is suitably stored in the PIN 1814 entry buffer of RAM 1802 (step 2524), and the system returns to step 2504 to wait for the next key pressed.
If the key pressed corresponds to "Cancel" (step 2522), the systems reset the PIN 1814 entry memory to empty (step 2528) and return to the stage 2504 to wait for either a mode change or a subsequent key press. If the key pressed corresponds to an "Enter" ("yes" in the branch of step 2522), the module 214 appropriately encodes the data stored in the PIN 1814 buffer (step 2526), as discussed in more detail in the following along with Figure 26. Although the illustrated mode is described in the context of numeric PIN datae (ie, "0" to "9"), it will be appreciated that the confidential data that is entered into the module 214 can be in any suitable form, for example numerical, alpha, a-lphanumeric, ASCII, binary or any other suitable modality. Now with reference to Figure 26, operation 2526 to properly code or encrypt proceeds as follows. Once the confidential data (for example, the PIN) is entered into the numeric keypad 1102 by the user, the processor 1212 retrieves the registration data of a personal account number 1818 of the RAM 1802 and the memory PIN. intermediate 1814 (step 2602). These data, alone or together with other data, are suitably combined and encoded in any suitable way (step 2602). In a preferred embodiment, these data can be combined appropriately according to the specification ANSI X9.24 -1992. The data is suitably encoded in accordance with the ANSI X3.92-1981 standard or any other desired coding technique. More particularly, the above combination and coding algorithms are advantageously resident in the sector of the 1904 operational program of the ROM 1902 and function in conjunction with the coding key of the information properly stored in the EEPROM 2002 (see Figures 19 and 20) . By storing the key data of the encoding in the non-volatile memory (ie EEPROM), the integrity and security of the seventh is increased. Continuing with the reference to Figure 26, in encoding the data according to step 2602, the encoded data is suitably written to the next successive location in the PIN sector 1816 of the RAM 1802 (step 2604). Afterwards, the address corresponding to the location in sector 1816, in which the encoded data is written, is transmitted to the PC 110 (step 2606). More particularly and with momentary reference to Figure 2, once the data is encoded within the module 214, the location of the encoded data is transmitted to the PC 110 via the connector 212, such that the confidential data is uncoded they do not need to be transmitted from module 214 to PC 110 to effect a transaction. After encoding the data, the processor 1212 appropriately creates a new unique key to be used in the subsequent encoding process and stores the new key in the 2004 future encoding key sector of the EEPROM 2002 (step 2608). According to one aspect of the present invention, the new coding key can be generated according to any suitable scheme, which is compatible with the coding algorithm executed in step 2602. According to a preferred embodiment, a key Unique, new coding can be generated in accordance with ANSI X9.24-1992. By transmitting the coded data marks of the module 214 to the PC 110, the PC 110 continues to execute the application program remitted thereto, as described in the foregoing in detail in connection with Figures 4-10. Returning now to the main control circuit 2100 of the module 214 (Figure 21), the module 214 can also choose to enter a mode of inserting the card 2118 (step 2116). More particularly and with momentary reference to Figure 7, PC 110 can request module 214 to enter the operational mode of inserting the card, for example at a point where the execution of the application software resident on the PC 110, where such application software warns the user to insert his transaction card through the card insertion slot 1104 of the module 214 (Figure 11 ), for example as described in the above in relation to step 716. Now with reference to Figure 27, by entering the operational mode of inert, the processor 212 appropriately initializes (clears) the data entry buffer insert 1820, 1822 of RAM 1802 (step 2702). Then the system seeks a mode change (step 2704) and returns to the step of redirecting the 2106 system, if a change in mode was detected. In any other form, the system establishes a time counter out of the slot at a predetermined maximum time during which the transaction should be coupled to the card reader (step 2706). In a preferred embodiment, the predetermined value of this maximum time, in the order of 15 seconds, is suitably stored in the time recorder outside the slot 1824, of the RAM 1802. The time counter is successively decreased (step 2708). ) until the e-synchronizer of the software resident in sector 1824 reaches zero (stage 2710), so then the data resident in the intermediate memories 1820, 1822 are transmitted to the PC 110 (step 2714). Alternatively, instead of eepera haeta that the maximum time counter counts down to zero, the "inserted" data may be transmitted to the PC 110 when the processor 1212 determines which respective input buffers 1820, 1822 are full (step 2712). ). So that the time out of this time synchronizer outside the slot first occurs (step 2710) or a detection that the slot input buffers are full (step 2712), the data within the buffers insert the card 1820, 1822 are transmitted to PC 110 (step 2714). With momentary reference to Figures 12 and 16-17, it is recalled that the reading circuit of the magnetic strip 1206"reads" the magnetic strip data on a transaction card, by means of the magnetic head reader 1602 (or readers). magnetic head 1603 (a), 1603 (b) in Figure 17) so the 1206 selector circuit applies an output signal (corresponding to one or both of "ch 1 swipe" and "ch 2 ewipe") to the gates paO and pal of the processor 1212, respectively, as discussed in detail in the foregoing. More particularly and with reference to Figures 16 and 28, as a transaction card carrying the magnetic strip is removed through the card reader slot 1104 (see Figure 11), the magnetic read head 1602 outputs levels of high and alternating low voltage, which correspond to the data encoded in the magnetic strip. By detecting a first output level of the schmidt trigger 1612, for example a high logical value, a hardware synchronizer (not shown) resident in the processor 1212 is stopped and the time in which this synchronizer is stopped, saved properly in slot synchronizer register 1826 of RAM 1802 (see Figure 18) (step 2802). The card insert synchronizer is again reset to zero and restarted, awaiting the detection of a next predetermined voltage level of the schmidt trigger 1612 (step 2802). Together with the synchronizer data retrieved in step 2802, the processor 1212 determines, if the output of the schmidt trigger 1612 corresponds to a predetermined logical state (e.g., a zero or a one) (step 2804). This logical data can then be stored in overridable bit locations in the appropriate slot input buffer (e.g. buffer 1820, 1822) (step 2804). Then the system determines whether the memory or slot entry buffer is full (step 2806). If the slot input buffer is full, a buffer memory full indicator is properly set in the buffer memory gauge filled with slot 1828 of RAM 1802 (FIG. 18) (step 2808), which allows the processor to 1212 determine when the memory or input buffers of the slot is full (see step 2712, Figure 27). Returning now to step 2806 of Figure 28, if the slot input memory or memories are not filled, the software synchronizer mentioned in the above is re-established at a maximum bit interval value (step 2810) and proceeding regreea (step 2812) to the point at which he left the procedure established in Figure 27, so that the process of Figure 28 is repeated on a bit-by-bit interruption basis until all the appropriate data is "read" from the Magnetic strip on the traficacción card. Note, however, that the complete process of accumulating the data of the card in the slot occurs in a very short period of time, for example, ten milli-seconds to one second, as a card is removed through a slot 1104. card reader (Figure 11). Returning now to Figure 21, the module 214 is also configured to enter the print mode 2122 of the main circuit 2100 (step 2120) for example, by the request to do so from the PC 110 (see step 816, FIG. 8). Now with reference to Figure 29, the printing operation mode 2122, properly causes the initialization of the printer (step 2902), for example to set various hardware and software parameters associated with the printing process. In this regard and as discussed briefly in the foregoing, the printer may be affiliated with the PC 110, for example by connecting a printer directly to the box 204 or connecting the printer to the PC 110 by means of a suitable network configuration. Alternatively, the printer can interface directly with the coding module, for example a connector 310 of the module 300 (Figure 3 or alternatively, a peripheral device module 1200 of the module 214 as shown in Figure 12). Continuing with reference to Figure 29, the system determines whether a mode change has occurred (step 2904) and if it is ae, reverts to the step of redirecting the 2906 system. Then the system determines whether the data to be printed is currently available, for example interrogating the data output buffer 1810 (Figure 18) (step 2908). If the data is not available, the system returns to step 2902 to wait for the data to be impreeoe. If the data is available (branch "ei" of step 2908), the system determines whether the printer is ready (step 2930). In this regard, the printer is to be verified, which is probably connected to the module 214, while it might not typically be necessary to execute the printing operation 2122, if the printer was connected to the PC 110. Established in another form, if the PC 110 is equipped with a printer, the printing operation can be directly controlled by the PC 110, while the printing operation as set forth in Figure 29, is appropriately controlled by the module 214 if the printer used in the context of the present invention is forming an interface with the module 214. With continuous reference to Figure 29, if the printer is not ready, the module 214 appropriately sends a command to the PC indicating that the printer associated with the module 214 does not she is ready. In this regard, the PC 110 can advise the user to correct the status of the printer, for example as described above along with Figure 7. If the printer associated with the module 214 is ready, the data resident in the memory intermediate data output 1810 are transmitted to the printer, for example by means of the common serial connection 1211 (see Figure 12). According to the preferred mode, the data that is going to be impreeoe is transmitted to the printer in serial form; therefore, the process set forth in Figure 29 is advantageously repeated until the data present in the data output buffer 1810 is sequentially transmitted to the printer.
Returning now to the main circuit 2100 (Figure 21) and with reference to Figure 30, the module 214 is suitably configured to enter mode mode 2126 (step 2124), for example, in response to a request to do so from the PC 110 (see step 710, Figure 7). As briefly discussed in the foregoing, the present invention may be configured to transmit data in formation from the PC 110 to the main computer 102 in any convenient way, for example by means of a modem associated with the PC 110 or alternatively, the modem 1202 associated with the module 214 (or the modem connector 308 associated with the module 300; Figure 3). If the data is transmitted from the PC 110 by means of the modem associated with the PC 110, it would not generally be necessary for the module 214 to execute the operation of the modem 2126; on the contrary, modem operation can be carried out effectively by PC 110. If, on the other hand, the operation of the modem is carried out by means of a modem in interface with module 214, it can be particularly advantageous for the processor 1212 control the operation of the modem. Continuing with reference to Figure 30, the operation of the modem 2126 suitably (causes a modem utilization 1202 (step 3002) the module 214 then determines whether a mode change has occurred (step 3004) and if so, the seventh returns to redirect the system 2106. If a mode change has not occurred, the system determines whether the data output buffer 1810 contains the data to be transmitted by means of the modem (step 3006). residing in the buffer 1810, the system returns to step 3004 and continues the cycle between steps 3004 and 3006 until the data is written to the buffer 1810 or until the mode change occurs. data 1810 contains the appropriate data to be transmitted via modem, the processor 1212 retrieves the output data 1810 and transmits the data via modem to the central computer 102 (step 3008). the module 214 receives data via modem, for example from the central computer 102, the processor 1212 can be properly configured to retrieve the data from the modem 1202, for example a gate pa2 for modem interruption. Now with reference to Figure 31, the PC 110 appropriately transmits a request for the module 214 to transmit the data via the modem connected to the module 214. In particular, a modem interruption maneuver is applied to the gate pa2 of the module 1212 by the modem 1202. The module 214 then determines whether the message corresponds to the interruption of "received data" (step 3102) or a modem transmission interruption (step 1304). If the interruption of received data occurs ("if" branch of step 3102) indicating that the data has been received in modem 1202, the data received in modem 1202 is retrieved by the 1212 processor and transmitted to the PC by means of the connector 2112 (step 3106). If the modem interrupt message corresponds to a request for modem tranemission (step 3104), the processor 1212 retrieves the data to be transmitted from the buffer 1810 and applies the data, for example on a byte-by-byte basis , to modem 1202 (step 3108). If the modem interrupt corresponds to none of the data received or the message of transmitting the data, an error message is sent appropriately to the PC (step 3110). After the data which were received in modem 1202 ee recovered and sent to PC 110 (stage 3106), after the data is sent by the processor 1212 of the buffer 1810 to the modem 1202 (step 3108), the system returns (step 3112) to the lower-level process of FIG. 30 and the procedure is repeated for each successive interrupt generated by the modem 1202. Now with reference to FIGS. 31 and 32, the module 214 can be suitably configured to enter the bar code 2130 operational mode (step 2128), for example in response to a request to do so from the PC 110. The operation of the bar code 2130 appropriately causes the determination of whether a mode change has occurred (step 3102) and ii is thus, regree to step 2106 of redirecting the system. If a mode change has not occurred, the data can be input from a general purpose module 1210, for example a bar code reader (step 3204). Once the bar code or other data is received by the module 214, it can be transmitted appropriately to the PC 110 as desired (step 3206). Now with reference to Figures 21 and 33, module 214 can be suitably configured to execute an intelligent card operation 2134 (step 2132), for example in response to the request of PC 110 to do so. In this regard, although many of the various functional characteristics associated with the module 214 (for example, the operation of the modem 2126, the printing operation 2122, the insert operation 2118 and the like) are initiated in response to a request from the PC 110 according to the embodiment described herein, it will be appreciated that the various operational features of the module 214 can be suitably performed in any desired manner, for example by entering the appropriate commands or commands directly into the module 214. Continued with reference to the Figure 33, smart card mode 2134 suitably causes the determination of whether a mode change has occurred (step 33029 and, if so, return to step 2106 of redirecting the system.) If a change in mode has not occurred, The system determines whether the data will be read from an intelligent card 5 (step 3304.) In this respect and as stated briefly in the foregoing, ca The request may come from the PC 110 or may be performed in any other way by the user, for example by entering a particular code or pressing other buttons (not shown) on the 10-key pad 1102 (Figure 11). If the data is to be read from a smart card (branch "si" of step 3304), the data is retrieved by the processor 1212, for example by means of the reader of the smart card 1208 (Figure 512). By the recovery of the data of the smart card, the data can be transmitted to the PC 110 (step 3306). As discussed in the above, the module 214 can also be configured to write data to a smart card. In this case, the appropriate data will be eecribed on the smart card, can be properly recovered from the output buffer of datoe 1810 and applied to a smart card circuit 1208 (steps 3308, 3310). Now with reference to Figures 21 and 34, the module 214 in the PC application software discussed above, together with Figure 410, can be appropriately configured in such a way that the recent software on the PC should first validate the module 214 before allowing the transmission of the code data or performing the functions described in the preedent in any other way. Particularly, in view of the importance of maintaining security in the context of real-time fund transfer authorization, it may be advantageous to allow PC 110 (for example, through software) to confirm that module 214 covers the security feature before the transactions are made. Continuing with reference to Figures 21 and 34, the module 214 can be suitably configured to enter a validation mode of the system 2138 (step 2136), for example in response to a request from the user or the PC 110 to do so. The validation mode of the system 2138 causes inter alia, a determination of whether a mode change has occurred (step 3402) and if so, the system can be configured to return to step 2106 to redirect the system. The module 214 can then be configured to receive and / or retrieve validation data from the PC 110 which validation data either confirms that the running of the application software on the PC 110 is compatible with the module 214; alternatively, the validation data may allow the module 214 to run a self-check, to determine whether the appropriate security mechanisms are in place. The module 214 can then confirm that it is compatible with the software resident on the PC 110 (step 3406). If the system determines that either the module 214 or the shift of the application program on the PC 110 are not "valid" according to the predetermined validation criteria, the module 214 can be configured either to disable itself or to disable the running of the software on PC 110 (step 3408). Now with reference to Figures 21 and 35, the module 214 can be suitably configured to execute a bit operation 2142 (step 2140), for example in response to a request from the PC 110 or the user to do so. Operation bit 2142 suitably determines whether a mode change has occurred (step 3506) and, if so, the seventh returns to the step of redirecting the seventh 2106 (no mode change has occurred, module 214 can execute any number (bite) test (stage 3504) for example testing various data transfer and retrieval processes, testing the preemption and / or functionality of various peripheral devices run the various cyclic reset and / or hearing accessories set in Figure 1. From time to time during the operation of the PC 110, it may be advantageous to transmit encoded data from the module 214 to the PC 110. Continuing with reference to Figure 21 and also with reference to Figure 36, the module 214 may be configured in this manner to selectively enter the recovery mode 2146 (step 2144), for example in response to a request to do so from the user or from PC 110. The mode of Recovery 2146 causes suitably, inter alia, to determine whether a mode change has occurred (step 3602) and if so, to return the system to the redirecting step of the seventh 2106 if a change in mode has not occurred indicating that the system remains in recovery mode, module 214 waits for an application of PC 110 for encrypted or encoded data, which request may include the address in sector 1816 of RAM 1802 (Figure 18), where the encoded data is stored in storage (step 3604). Upon receipt of an application of the PC 110 to transmit the encoded data, the module 214 retrieves the encoded data from an appropriate location in the memory (e.g., the area holding the encoded PIN 1816), and sends the encoded data to it. the PC 110 (step 3606). By doing so, the processor 1212 can properly reset the secure area of the encrypted PIN 1816 back to empty it. Although the subject application has been described herein with reference to the accompanying drawings, it will be appreciated that the scope of the invention is not limited. Various modifications in the design and implementation of various components and steps of the method discussed herein may be made departing from the spirit and scope of the invention, as set forth in the appended claims.

Claims (21)

  1. CLAIMS 1. A remote processing system, located in a first site to form an interface with a main computer system located in a second site, which is far from the first site, the central computer system which is of the type which includes a main modem and which is configured to facilitate financial transactions by restricting the remote processing of a data packet that includes a data field in code or encrypted, the remote processing system is characterized in that it comprises: a. a PC, comprising: (I) a first memory module configured to store an interactive software program; (II) a first processor configured to execute the software program; (III) an input opening configured to communicate with the first processor; and (IV) a second modem configured to transmit the data packet from the PC to the main modem according to the software program; b. an input device; and c. an encrypting or coding module connected in series between the input device and the input opening comprising: (I) a numeric keypad; (II) a second processor configured to encrypt the data entering the numeric keypad; and (III) a data link configured to maintain communication between the encryption module and the input gate of the PC.
  2. 2. The remote processing strip according to claim 1, characterized in that the input gate comprises a board input gate.
  3. 3. The remote processing procedure according to claim 1, characterized in that the input gate comprises a mouse gate.
  4. 4. The remote proceeamiento eietema according to claim 2, wherein the second processor is configured to transmit the encrypted data to the input gate in a shape which simulates loe trasmieión of data input board.
  5. 5. The remote processing procedure according to claim 1, characterized in that the data entering the numerical keypad corresponds to a PIN.
  6. 6. The remote processing system according to claim 1, characterized in that the PC further comprises a screen and the first processor is configured to generate input data presented on the screen according to the software program.
  7. 7. The remote processing system according to claim 1, characterized in that the encryption or coding module further comprises a peripheral device useful in the data that electronically enters the encryption or coding module.
  8. 8. The remote processing system according to claim 7, characterized in that the peripheral diepoeitive comprises a magnetic head card reader.
  9. 9. The remote processing system according to claim 7, characterized in that the peripheral device comprises an integrated circuit card reader.
  10. 10. The remote processing method according to claim 7, characterized in that the peripheral device comprises a barcode reader.
  11. 11. The remote processing system according to claim 3, characterized in that the remote processing system further comprises a mouse and the encryption module is connected in the middle between the mouse and the PC.
  12. 12. The remote processing system according to claim 1, further characterized in that it comprises a magnetic card reader, the magnetic card reader formed integrally with the encryption or coding module.
  13. 13. The remote processing system according to claim 1, further characterized in that it comprises a smart card reader formed integrally with the encryption or coding module.
  14. 14. The remote processing system according to claim 1, characterized in that the second processor of the encryption module comprises a random access memory, a read-only memory and an electronically programmable read-only memory to provide additional security for the encryption module.
  15. 15. The data encryption module configured for connection to a PC, the PC is of the type which includes a board, a board entry gate and a connector that has a first end connected to the board and a second end configured for the connection to the input gate of the board, the module is characterized in that it comprises: a. a numeric keypad; b. a processor adapted to input coded or encrypted data on the numeric keypad; c. an interface connector extending from the receiving module within the board entry gate; and d. a gateway of an interface configured to receive the second end of the connector
  16. 16. The encryption or coding module according to claim 15, further characterized in that it comprises an input data transducer for entering the data into the module through the numeric keyboard.
  17. 17. The module according to claim 16, characterized in that the transducer comprises at least one of a magnetic head card reader, an integrated circuit card reader, a barcode reader, a recognition device, and voice and an explorer.
  18. 18. The module according to claim 15, further characterized in that it comprises a housing within which the processor is located, and wherein the numeric keypad is substantially integral with a surface of the housing.
  19. 19. A remote processing system for the interface with a main computer system that includes a main modem, the main computer system is configured to facilitate financial transactions by receiving the remote processing of a data package that includes a Encrypted data field, the remote processing system is characterized by comprising: a. a PC comprising: (I) a hosting for the PC; (II) a first processor, placed inside the PC housing, configured to execute a software program, (III) an input gate accessible from outside the housing of the PC and configured to communicate with the first processor; and (IV) a modem PC configured to transmit the data packet from the PC to the main modem according to the software program; and b. an encryption or coding module; comprising: (I) a module housing; (II) a numeric keypad accessible from the outside of the module housing; (III) a second processor placed inside the module housing and configured to input the encrypted data on the numeric keypad; (IV) a data link configured to maintain communication between the encryption or encoding module and the input gate of the PC; and (V) a second input gate configured to receive an input from a PC board.
  20. 20. The remote processing method according to claim 19, characterized in that: a. the input gate comprises a board entry gate; b. the PC further comprises a board and the encryption module is connected in series between the board and the board entry gate; and c. the second processor is configured to transmit encrypted data to the input gate, in a manner which mimics the tranemission of the input data of the board.
  21. 21. A method for transmitting confidential data between a PC in a first eitio and a main computer located in a remote site of the first site, the method is characterized in that it comprises the steps of: providing a PC comprising a first processor configured to execute a software program and a PC modem configured to transmit data from the PC to the main computer according to the software program; provide a board or mouse, for communication with the PC; provide a self-contained encryption module, independent of the PC and connected in the eerie between the PC and the board or mouse, the module includes a numeric keypad to enter confidential data directly into the encryption module and a second processor to encrypt confidential data within the module; transmit the encrypted data to the first processor inside the PC; and transmit the encrypted data from the PC to the main computer by means of the PC modem.
MXPA/A/1996/004129A 1994-03-18 1995-03-20 Method and apparatus for forming the unmodulo interface to put in key with a computer MXPA96004129A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US08210200 1994-03-18
US08/210,200 US5517569A (en) 1994-03-18 1994-03-18 Methods and apparatus for interfacing an encryption module with a personal computer
PCT/US1995/003578 WO1995026085A1 (en) 1994-03-18 1995-03-20 Methods and apparatus for interfacing an encryption module with a personal computer

Publications (2)

Publication Number Publication Date
MX9604129A MX9604129A (en) 1997-12-31
MXPA96004129A true MXPA96004129A (en) 1998-09-18

Family

ID=

Similar Documents

Publication Publication Date Title
CA2185697C (en) Methods and apparatus for interfacing an encryption module with a personal computer
CA2283832C (en) Methods and apparatus for securely encrypting data in conjunction with a personal computer
US6056194A (en) System and method for networking and controlling vending machines
US5790410A (en) Fuel dispenser controller with data packet transfer command
CA2163365C (en) System and method for revaluation of stored tokens in ic cards
CA2010450C (en) Method for encrypting transmitted data using a unique key
US5679945A (en) Intelligent card reader having emulation features
US4511970A (en) Portable terminal device
US6687346B1 (en) Cellular telephone for acquiring data encoded in bar code indicia
US6243447B1 (en) Self-service checkout system utilizing portable communications terminal
US6032135A (en) Electronic purse card value system terminal programming system and method
JPH07182426A (en) Smart card system
CN1118482A (en) Remote financial transaction system
CN101145263B (en) Financial POS supervisor and its management method
US6145740A (en) Electronic purse card value system
KR20010007791A (en) Card reader for integrated financial works and operating method thereof
JP2000268239A (en) Product selection device
JP2001188937A (en) Value body transaction system
CN1968092B (en) Method for realizing data interaction between digital signature device and opposite-end device
US7036724B2 (en) System for enhancing the data storage security of cash-free transactions in vending machines
MXPA96004129A (en) Method and apparatus for forming the unmodulo interface to put in key with a computer
US20030182243A1 (en) Method and apparatus for remote control of electronically activated tasks
JP2005135297A (en) Electronic money settlement method, electronic money processing device, and electronic money processing system
WO1996007134A1 (en) System and method for networking and controlling vending machines
KR100366852B1 (en) Remote management system of automatic vending machine