NZ585446A - Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration - Google Patents

Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration

Info

Publication number
NZ585446A
NZ585446A NZ585446A NZ58544608A NZ585446A NZ 585446 A NZ585446 A NZ 585446A NZ 585446 A NZ585446 A NZ 585446A NZ 58544608 A NZ58544608 A NZ 58544608A NZ 585446 A NZ585446 A NZ 585446A
Authority
NZ
New Zealand
Prior art keywords
pos terminal
computer system
configuration
operating configuration
transaction
Prior art date
Application number
NZ585446A
Inventor
Jason Nigel Gill
Rajeshwar Dutt
Sanjay Magan Soma
Original Assignee
Paymark Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to NZ596483A priority Critical patent/NZ596483A/en
Priority to NZ563922A priority patent/NZ563922A/en
Priority claimed from NZ563922A external-priority patent/NZ563922A/en
Application filed by Paymark Ltd filed Critical Paymark Ltd
Priority to NZ585446A priority patent/NZ585446A/en
Publication of NZ585446A publication Critical patent/NZ585446A/en

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A payment system for transferring funds electronically between financial institutions (6) of a merchant and customer and a method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer are disclosed. The payment system (1) comprises a computer system (2) connected to or for connection to a plurality of POS terminals (3) and adapted to receive a transaction messages from the POS terminals, the computer system adapted to receive configuration data from a POS terminal indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages, check that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, provide from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration. Also disclosed is a method of reconfiguring a POS terminal comprising receiving at a computer system configuration data indicating operating configuration of a POS terminal, including the EMV tags used by the POS terminal for transaction messages, checking at the computer system that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, providing from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration. Also disclosed is a POS terminal (3) for transferring funds electronically between financial institutions of a merchant and customer. The terminal is adapted to transmit configuration data to a computer system indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages and the computer system being adapted to verify that the received operating configuration matches the required operating configuration of the POS terminal. If the POS terminal operating configuration does not match the required operating configuration, receive configuration data from the computer system to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration. Each POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration and the configuration data provided from the computer system triggers activation and/or de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration.

Description

Received by IPONZ on 17 November 2011 Divided out of NZ563922 dated 30 November 2007 NEW ZEALAND PATENTS ACT, 1953 COMPLETE SPECIFICATION PAYMENT SYSTEM AND METHOD OF OPERATION We, PAYMARK LIMITED, Level 23 ASB Bank Centre, 135 Albert Street, Auckland 1010, do hereby declare the invention for which we pray that a patent may be granted to us, and the method by which it is to be performed, to be particularly described in and by the following statement: Received by IPONZ on 17 November 2011 FIELD OF THE INVENTION The present specification relates to a payment system and method for electronic transactions. Claims to the inventions are found in the present specification and the specification of divisional application NZ 563922 and the specification of the child divisional application file from 5 the present application.
BACKGROUND TO THE INVENTION It is now common place for consumers to pay for their goods and services via electronic transactions. Typically, a merchant will have a point-of-sale (POS) terminal that is connected to a 10 payment system via a network, such as a telephony network. When a customer wishes to purchase goods or services, a debit, credit or payment card is inserted or swiped through the terminal and the cost for the goods or services is entered into the POS terminal by the retailer. The customer then authorises the payment either through entering a pin number or by signing an authorisation slip. Once authorisation is complete, the POS terminal sends a transaction message to the payment 15 system, which facilitates the transfer of funds from the customers account to the retailers account.
Due to changes in technology, the retailer POS terminals can become obsolete. This means that, in time, the POS terminals might not be able to function correctly with an upgraded payment system. Alternatively, the POS terminals might not be able to provide additional features and functionality as they become available.
SUMMARY OF THE INVENTION It is an object of the present invention to provide an improved method or system or computer or apparatus for facilitating the electronic transfer of funds in response to a purchase. An improved system of the invention can do one or more of: increasing security through 25 mutual authentication and/or message encryption, increasing the flexibility of POS terminals and their ability to be updated.
The payment system might relate to the computer systems that communicate with the terminals and financial institutions to facilitate electronic transactions. The payment system might also be considered to also comprise the terminals when connected to such a computer system, and 30 any other features (such as networks) that might from such a payment system.
In one aspect the present invention may be said to consist in a method of reconfiguring a POS terminal comprising: receiving at a computer system configuration data indicating operating configuration of a POS terminal, including the EMV tags used by the POS terminal for transaction messages, checking at the computer system that the operating configuration matches the required 35 operating configuration of the POS terminal, and if the configuration does not match, providing Received by IPONZ on 17 November 2011 from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration.
Preferably the POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the configuration data provided from the computer system triggers activation/de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration.
In another aspect the present invention may be said to consist in a method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer comprising: receiving at a computer system configuration data indicating operating configuration of a POS terminal, including the EMV tags used by the POS terminal for transaction messages, checking at the computer system that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, providing from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration, receiving at the computer system a transaction message indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, arranging transfer of the transaction amount from the payer's financial institution to the payee's institution using the computer system.
Preferably the POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the configuration data provided from the computer system triggers activation and/or de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration.
In another aspect the present invention may be said to consist in a POS terminal for transferring funds electronically between financial institutions of a merchant and customer, the terminal adapted to: transmit configuration data to a computer system indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages, the computer system being adapted to verify that the received operating configuration matches the required operating configuration of the POS terminal, and if the POS terminal operating configuration does not match the required operating configuration, receive configuration data from the computer system to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration.
Preferably the POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the POS terminal is further adapted to:reconfigure itself with the required operating configuration by activation and/or de-activation of the required EMV tags based on the configuration data received from the computer system.
In another aspect the present invention may be said to consist in a payment system for transferring funds electronically between financial institutions of a merchant and customer Received by IPONZ on 17 November 2011 comprising: a computer system connected to or for connection to a plurality of POS terminals and adapted to receive a transaction messages from the POS terminals, the computer system adapted to: receive configuration data from a POS terminal indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages, check that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, provide from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration.
Preferably each POS terminal comprises EMV tags that can be activated and de-activated to 10 configure the POS terminal's configuration, wherein the configuration data provided from the computer system triggers activation and/or de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration.
Described herein is a POS terminal connected or for connection to a computer system forming part of a payment system for transferring funds electronically between financial institutions 15 between a merchant and customer, the POS terminal being adapted to send transaction messages to the computer system, a transaction message having encrypted data fields and indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, wherein the POS terminal is adapted to do one or more of: a) prior to sending the transaction message, obtain a master key from the computer system using mutual authentication, b) prior to 20 sending the transaction message, transmit configuration data indicating operating configuration of the POS terminal, which is verified by the computer system against a database that the operating configuration matches the required operating configuration, and if not, receive configuration data from the computer system to reconfigure the POS terminal with the required operating configuration, c) encrypt the content in the message data fields using a transaction message key. 25 Described herein is a method of transferring a key to a POS terminal for transactions comprising: receiving from the POS terminal identification information and a first number, wherein at least the first number is signed and encrypted, unsigning and decrypting the first number, signing, encrypting and sending the first number, a secret number and one or more master keys to the POS terminal, the first number verifying to the POS terminal that source of the master key is legitimate 30 and the secret number being for subsequent use by the POS terminal to verify the source of data sent by the POS terminal.
Described herein is a method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer comprising: receiving from the POS terminal identification information and a first number, wherein at least the first 35 number is signed and encrypted, unsigning and decrypting the first number, signing, encrypting and sending the first number, a secret number and one or more master keys to the POS terminal, the Received by IPONZ on 17 November 2011 first number verifying to the POS terminal that source of the master key is legitimate and the secret number being for subsequent use by the POS terminal to verify the source of data sent by the POS terminal, receiving at the computer system a transaction message indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, arranging transfer of the transaction amount from the payer's financial institution to the payee's institution using the computer system.
Preferably the method further comprises: receiving an acknowledgement message MAC'ed with one of more of the master keys,verifying the message using the master key,sending a confirmation to the POS terminal.
Preferably the method further comprises: receiving at the computer system a request from the POS terminal to obtain a transaction message key, generating at the computer system a transaction message key and encrypting it with the master key, and providing from the computer system the encrypted transaction message key to the POS terminal, wherein the received transaction message is received from the POS terminal and is encrypted with the transaction key.
Described herein is in a payment system for transferring funds electronically between financial institutions of a merchant and customer comprising: a computer system connected to or for connection to a plurality of POS terminals and adapted to receive a transaction messages from the POS terminals, the computer system adapted to:receive from the POS terminal identification information and a first number, wherein at least the first number is signed and encrypted, unsign and decrypt the first number, sign, encrypt and send the first number, a secret number and one or more master keys to the POS terminal, the first number verifying to the POS terminal that source of the master key is legitimate and the secret number being for subsequent use by the POS terminal to verify the source of data sent by the POS terminal.
Preferably the computer system is further adapted to: receive a request from the POS terminal to obtain a transaction message key, generate a transaction message key and encrypt it with the master key, and provide the encrypted transaction message key to the POS terminal, wherein the received transaction message is encrypted with the transaction key.
Described herein is a POS terminal for transferring funds electronically between financial institutions of a merchant and customer, the terminal adapted to: receive from the POS terminal identification information and a first number, wherein at least the first number is signed and encrypted, unsign and decrypt the first number, sign, encrypt and send the first number, a secret number and one or more master keys to the POS terminal, the first number verifying to the POS terminal that source of the master key is legitimate and the secret number being for subsequent use by the POS terminal to verify the source of data sent by the POS terminal.
Received by IPONZ on 17 November 2011 Described herein is a method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer comprising: receiving at a computer system a transaction message indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, 5 arranging transfer of the transaction amount from the payer's financial institution to the payee's institution using the computer system, wherein the transaction message is comprises a header and message portion, the message portion having data fields with encrypted content.
Preferably the transaction message is received from a POS terminal over a non-secure 10 network.
Preferably prior to receiving the transaction message, the method further comprises: receiving at the computer system a request from a POS terminal that initiates a key exchange process, authenticating the POS terminal at the computer system, providing from the computer system signed data to the POS terminal to enable authentication of the computer system by the POS terminal, and providing from the computer system a master key to the POS terminal, wherein the master key can be utilised by the POS terminal for securing further key exchanges with the computer system.
Preferably the method further comprises: receiving at the computer system a request from the POS terminal to obtain a transaction message key, generating at the computer system a transaction message key and encrypting it with the master key, and providing from the computer system the encrypted transaction message key to the POS terminal, wherein the content of the data fields is encrypted with the transaction message key. Preferably prior to receiving the transaction message, the method comprises: receiving at the computer system configuration data indicating operating configuration of 30 the POS terminal, verifying at the computer system that the operating configuration matches the required operating configuration of the POS terminal, and if not, providing from the computer system different configuration data to the POS terminal to reconfigure the POS terminal with the required operating configuration.
Preferably the configuration data comprises EMV tags to specify at least some of the types of data provided in a transaction message.
Received by IPONZ on 17 November 2011 Described herein is a method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer comprising: receiving at a computer system a transaction message indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, 5 arranging transfer of the transaction amount from the payer's financial institution to the payee's institution, wherein the transaction message is comprises encrypted data fields.
Described herein is a payment system for transferring funds electronically between financial institutions of a merchant and customer comprising: a computer system connected to or for connection to a plurality of POS terminals and adapted to receive a transaction messages from the POS terminals, the computer system adapted to: receive a transaction message from a POS terminal indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, arrange transfer of the transaction amount from the payer's financial institution to the 15 payee's institution, wherein the transaction message is comprises a header and message portion, the message portion having data fields with encrypted content.
Preferably the payment system comprises a plurality of POS terminals connected to the computer system via one or more networks.
Preferably the computer system communicates with a plurality of financial institutions via one or more networks.
Preferably the computer system comprises a switch for arranging funds transfers and a server for exchanging keys with the POS terminals.
Described herein is a computer system for transferring funds electronically between financial 25 institutions of a merchant and customer, the computer system adapted to: receive a transaction message from a POS terminal indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, arrange transfer of the transaction amount from the payer's financial institution to the payee's institution, wherein the transaction message is comprises a header and message portion, the message portion having data fields with encrypted content.
Preferably the computer system communicates with a plurality of financial institutions via one or more networks.
Preferably the computer system comprises a switch for arranging funds transfers and a 35 server for exchanging keys with the POS terminals.
Received by IPONZ on 17 November 2011 In this specification where reference has been made to patent specifications, other external documents, or other sources of information, this is generally for the purpose of providing a context for discussing the features of the invention. Unless specifically stated otherwise, reference to such external documents is not to be construed as an admission that such documents, or such sources of 5 information, in any jurisdiction, are prior art, or form part of the common general knowledge in the art The term "comprising" as used in this specification means "consisting at least in part of'. Related terms such as "comprise" and "comprised" are to be interpreted in the same manner.
To those skilled in the art to which the invention relates, many changes in construction and 10 widely differing embodiments and applications of the invention will suggest themselves without departing from the scope of the invention as defined in the appended claims. The disclosures and the descriptions herein are purely illustrative and are not intended to be in any sense limiting BRIEF DESCRIPTION OF THE DRAWINGS Preferred embodiments of the invention will be described with reference to the following drawings, of which: Figure 1 is a block diagram showing an overview of a payment system according to one aspect, Figure 2 is a process diagram showing an overview of the payment system, 20 Figures 3a, 3b, 4 are flow diagrams showing the mutual authentication and master key exchange, Figure 5 is a table of example EMV tags, Figure 6 is a table of a message structure with EMV tags, Figure 7 is a flow diagram of an encryption process/data exchange process, 25 Figures 8, 9 are schematic diagrams of a message structure, Figure 10 is a process diagram of the EMV tag update process.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS Overall system Figure 1 shows a simplified overview of a payment system 1 according to one embodiment.
The payment system comprises a computer system 2 that facilitates electronic funds transfers. It comprises a switch 8 that independently communicates with a number of merchant POS terminals 3 and receives electronic transaction requests from them. The requests are received in the form of transaction messages e.g. 4 transmitted from the respective POS terminals 3. The switch 8 is also in 35 communication with a number of financial institutions 6, such as banks, via network 9. The switch Received by IPONZ on 17 November 2011 8 facilitates the transfer of funds between the financial institutions 6 of respective parties (merchant/customer or payee/payer) involved in the electronic transactions. The computer system 2 also comprises a server 8 for carrying out logon, key exchange and other system administration procedures. In particular, the server carries out POS terminal key loading services. These comprise 5 key generation, key loading, key management, key activation and key assignment. There is also security infrastructure. The switch 7 and server 8 might be located remotely from each other, or provided in the same location. The POS terminals 3 communicate with the central computer system 2 via a network 5, such as a telephony network. This could be a dial-up network, leased line, fixed IP, broadband IP, GPRS, CDMA or any other suitable telephony network. Each POS terminal 3 10 comprises a PIN entry device (PED) 3a and a card reader device 3b. The POS terminal has the ability to load terminal master keys. It also is pre-loaded with a manufacturer key. The payment system 1 might be considered to be the computer system alone, or some combination of one or more of the computer system, the POS terminals, the networks and other aspects that enable electronic transactions.
Briefly, the payment system 1 works in the following manner. A POS terminal 3 logs on to the system 1 upon installation in order to receive the required keys to operate. Then periodically, the POS terminal logs on to the computer system 2 to identify itself and to receive required session keys (including transaction message keys), updated configuration data, and other required data for operation. The POS terminal operates in the normal manner for a POS terminal 3 from a user 20 perspective. But, it can also operate in new ways in accordance with the received configuration and other data. In effect, the POS terminal is adapted to exploit the various new features of the system, including the ability to update its operation. The periodic logon can happen automatically or manually. It might, for example, occur every 24 hours or when a particular POS terminal is turned on, such as at the beginning of a retail day. . Each POS terminal 3 is adapted to work with the 25 payment system 1 and utilise the re-configuration features. When a customer approaches the retailer to purchase goods and/or services, the POS terminal is operated and a transaction message 4 is created. This is done by introducing the customer's card to the card reader, and entering transaction details into the unit via a keypad. The transaction message is sent to the computer system 2 (and more particularly the switch 8), which in turn arranges electronic transfer of funds 30 between the customer and the retailer's bank accounts 6. It then returns a transaction complete message to the POS terminal 3. The entire process is termed and "transaction" and comprises all or some of receiving card details to trigger a transaction, creating and sending a transaction message, arranging funds transfer, and providing confirmation.
The system contains a number of features that offer advantages over other specifications. 35 Private keys for use in sending transaction messages can be securely loaded remotely. EMV applications, public keys and transaction and other message tags can be remotely managed according Received by IPONZ on 17 November 2011 to POS terminal requirements. Transaction messages 4 can be more comprehensively encrypted, allowing them be sent over any network. Each POS terminal 3 in the payment system 1 is also designed to operate with all major card schemes and proprietary debit formats. Therefore, a POS terminal 3 can connect with minimal manual intervention, be re-configured remotely to behave in different ways and support the varied needs of multiple acquiring banks. As a result, the POS terminals 3 do not have to be returned to "base" for reconfiguration and a single POS terminal can accept local debit cards as well as other cards. The present system allows for POS terminals 3 to be remotely configured to function as either a full EMV POS terminal, a standard magnetic strip terminal, or a combination of both based on the card scheme, acquirer and merchant requirements. A merchant can use a single POS terminal adapted to be configured and reconfigured according to the embodiments described to carry out all these functionalities.
For example, a POS terminal 3 of the payment system 1 can be configured to behave in the following ways: 1. To act as magnetic stripe only POS terminal. 2. To act as a full EMV terminal. 3. To act as a mixed magnetic stripe or EMV terminal dependant on the card present. 4. To accept off-line transactions for any or all cards processed.
. To maintain EMV public keys as required for the EMV functions present.
Each POS terminal can be configured or re-configured with one or more of the above functionalities without any onsite reprogramming. The configuration is determined by the merchant/acquiring bank requirements or other local market features. It can have different requirements configured concurrently for each of the different card schemes it supports. These features are not limited to any particular POS terminal brand or proprietary POS terminal management system. All POS terminals 3 operating to the prescribed payment system 1 standard can operate in this manner. POS terminals require sufficient memory to store the flexible configuration. The functionality of the present inventions are implemented in software in the terminal.
The combination of remotely configurable POS terminal 3 behaviour and the ability to operate over any network (particularly IP based networks) offers a flexible POS terminal environment that can meet the needs of multiple merchants, card schemes, issuers and acquirers all driven from a single platform. Direct integration with the processing platform enables all POS terminals to be configured in the same way, to avoid mismatched configuration or need to re-enter data, which occurs if an existing standalone-type POS terminal management system is used for each terminal type.
The result is a flexible payment system that can be adapted to meet a variety of merchant and acquirer requirements. It is possible to configure POS terminals 3 for one acquirer to behave Received by IPONZ on 17 November 2011 quite differently from another and then re-configure their behaviour relatively easily. The flexibility of the system is based around the interactions that take place between the POS terminal 3 and the computer system 2.
Figure 2 shows in a general sense the nature of the interaction 26 that takes place between a 5 POS terminal 3 and the computer system 2 prior to and during a transaction. Initially, the POS terminal is preconfigured with the manufacturer key and serial number. This occurs during manufacture of the POS terminal. Once on-site at the merchant premises, the POS terminal 3 can be instaled and initialized. This first involves connecting the POS terminal to the computer system 2 in a way the merchant chooses through a variety of communications methods (dial, broadband, 10 GPRS, CDMA, specialist IP service) 5. As part of the installation/initialization process 26, the POS terminal checks whether it has a master key, step 21. If it does not, the POS terminal then logs on to the server and initiates a key exchange process. The POS terminal and server undergo key exchange process, which comprises a mutual authentication process, steps 20-21. As a result of this, a master key is downloaded from the computer system 2 to the POS terminal 3, for encrypting 15 subsequent transaction messages 4.
During the periodic log on, the POS terminal 3 provides configuration data indicating its operating configuration to the switch 8, step 22. This comprises version details of software being executed, and other data as appropriate. This information is sent in an 0800 message in accordance with the AS2805 specification for network management. In response, the switch 8 checks the 20 configuration data to see it matches the required configurations for that POS terminal 3. This information is stored in a database in the switch. The required configuration for a POS terminal 3 might change periodically, due to card issuer requirements, functionality updates and the like. If the configuration of the POS terminal 3 does not match the required configuration specified for that POS terminal, then the switch 8 provides (and the POS terminal downloads) various configuration 25 data that is used to configure operation of the POS terminal 3 as part of the overall payment/transaction system, step 23. This includes enabling support for optionally providing EMV transactions via the POS terminal. The configuration data also comprises data specifying the requirement to change the secure session keys after a defined period or number of transactions or both. The information is sent in a 0300 message in accordance with the AS2805 specification for 30 network management At this point, the POS terminal 3 is then ready to facilitate transactions, steps 24, 25 in response to purchase of merchant goods/services by a customer. These transactions proceed in a manner to be described later, although appear to proceed in the usual way from a user/customer perspective. For example, such a transaction could proceed by way of a card swipe or dip, step 24. 35 The POS terminal 3 then initiates a transaction using downloaded parameters from the previous steps to determine how the transaction occurs. A transaction message is sent to the switch, detailing Received by IPONZ on 17 November 2011 among other things, the value of the transaction and the merchant who has undertaken the transaction and to whom the funds should be transferred. Information relating to the purchaser's card is also sent. The merchant information and purchaser's card information provide information for identifying the respective payer's (purchaser) and payee's (merchant) financial institutions and corresponding accounts within those financial institutions. For example, the information is used by the switch 8 to identify the bank account numbers of the payer and payee in a table of such information. The information is sent as a 0100 or 0200 message to the switch 8 in accordance with the AS2805 specification for network management. The switch 8 actions the funds transfer in accordance with the transaction message.
The switch 8 responds with a 110 or 210 message in accordance with the AS2805 specification for network management, as appropriate and EMV processing scripts if required. If required, the host can force a logoff and initiate the sequence again at step 22 if parameters have been changed. That is, at any time, the POS terminal 3 can be centrally re-configured to support new operational and/or system features, such as a new bank acquirer, new card scheme, or to amend the merchant's trading parameters. This is by way of a manual or automatic update process, steps 22, 23.
The various functions of the system and method will now be described in further detail.
Mutual authentication and master key exchange process As shown in Figure 2 in steps 20 to 21, the POS terminal 3 undergoes an initialisation/installation process with the server of the computer system 2. First, the POS terminal 3 checks if it already has a master key from the computer system step 20, and if not undergoes a key exchange process to obtain a master key. This process is termed "remote key injection" (RKI). A mutual authentication process steps 21, 22, Figure 2 is undertaken to obtain the key. The master key is used for encrypting various communications between the POS terminal 3 and the server 7 or switch 8. In particular, it is used to encrypt the transaction message session keys (to be described later) when they are exchanged between the switch 8 and the POS terminal 3 during the periodic logon.
The RKI process carries out mutual authentication of both parties (server 7 and POS terminal 3) involved in the transaction to reduce the risk of compromise in the process. It also incorporates a secure communication method with equipment manufacturers that allows for the exchange of sensitive data that assists in securing the process. The long process differs from others in the field in that it uses strong mutual authentication of parties at all stages. The file received from POS terminal suppliers (the Key Data File) is signed with a public/private key pair and then not only does the PED device authenticate itself to the computer system 2, but the terminal verifies that the computer system 2 is the authorised source for the master key. The Key Data File from the Received by IPONZ on 17 November 2011 vendor contains records that match the PED serial number to the manufacturer's key for each device.
Figures 3a-4 show the flow diagrams of the RKI process, corresponding to steps 20, 21 of Figure 2. The process, comprises sign on (Figure 3a), master key exchange (Figure 3b) and sign off 5 (Figure 4). These processes take place as follows.
Referring to Figure 3a, first the sign on takes place. The POS terminal 3 initiates the key download process, step 30, by sending the computer system 2 (more particularly the server 7) a request that contains the POS terminal's PED's software version, manufacturer ID, vendor ID and unique serial number. The PED's unique serial number is digitally signed with the PED's private 10 key. This digital signature will be appended to field 60 of a network management request between the POS terminal and the server.
Next, the server 7 verifies the digital signature of the PED's unique serial number using the PED's public key, step 31. It then checks the PED's software version against a list of permitted software versions in an "allowed versions" database, step 32. If the PED's software version is a 15 permitted version, the computer system verifies the authenticity of the PED by verifying the manufacturer ID, vendor ID and unique serial number against the data provided by the vendor in the key data file, step 33.
The server then generates a statistically random public/private key pair Keyrk'-pcd and a randomly generated secret number Snrkl, step 34. The public/private key pair is then linked to the 20 PED's unique serial number by the computer system. The serial number is sent from the POS terminal to the computer system, but also contained in the Key Data File as a cross check. That is, the server can check authenticity of the POS terminal using the information it receives, plus by using the serial number in the Key Data File, to which it has access. Looking at the Key Data File provides a back-up to checking the received serial number. Both the public/private key and the 25 secret number (Keytkupcd and Snrkl ) are signed with the computer system's private key Keytki, step . The secret number Snrkl is encrypted using the PED's public key pubKeyped. The public/private key pair pubKeyrkl~pcd and the secret number Snrkl are returned to the POS terminal in a message, step 36.
Following a successful sign on, a master key is exchanged between the computer system 2 30 and the POS terminal 3 as follows, with reference to Figure 3b. First, the POS terminal verifies the server's signature with pubKeyrkl, step 37. If the key is valid, the POS terminal stores the bKeyrla-ped for later use. Then, the POS terminal 3 responds with a message that contains the Snrkl and the type of key it requires, step 38. The server 7 receives the message and confirms that the Snrkl associated with the PED unique serial number is same as the Snrkl received in the message. It does this by 35 checking the database, step 39. Then the computer system 2 responds with a message containing the type of POS terminal master key Keyrkutm requested by the POS terminal (this could also be a 3rd Received by IPONZ on 17 November 2011 party POS terminal master key). The KeyrkUm is encrypted with the pubKeypcd and signed using the prvKeyrk'~pcd, step 40. The POS terminal 3 verifies the signature of the encrypted Keytk,-tm using pubKeyrkupcd and decrypts the Keyrla-tm using prvKeyped, and loads Keylta_tm into the appropriate key slot, step 41. The master key Keytla-ttn is then ready for use in obtaining session keys. More particularly, it is used in the logon process to create the three session keys for encryption during the transaction process.
Following a successful master key exchange process, a sign off process is undertaken, as shown in Figure 4. On successful Keyrkum loading, the POS terminal then sends an acknowledgment message to the RKI server, MAC'ed with the master key Keyrk,-tm (symmetric key), step 42. This provides verification - if encryption is wrong then the MAC addresses do not match. On receipt of the acknowledgement, the server validates the message MAC using the master key Keyrk~tm, and sends an activation message for the merchant and terminal ID combination to server 7, step 43. The server 7 then sends back a message to the POS terminal 3 to confirm that the master key loading process is complete, step 44. The message contains a MAC from the computer system calculated using the master key Keyrki-tm. Unless multiple keys are required, the POS terminal is required to end communications session (i.e. close socket or hang up phone line) on receipt of the sign off message, step 35.
EMV tag download Once initialisation/installation is complete, then the device periodically logons to the switch, step 22, 23 of Figure 2. This might automatically happen every 24 hours, for example. During logon, transaction message session keys are obtained. These are transferred in an encrypted form using the master key. The transaction message session keys can be used to encrypt transaction messages communicated between the POS terminal and switch. During logon, PIN session keys and MAC keys are also generated and sent from the computer system to the POS terminal.
At each 24 hour log on, new session keys are generated by the switch 8, which returns the new session keys to the POS terminal encrypted under variants of the POS terminal master key.
Various configuration data can also be transferred from the switch to the POS terminal to update/reconfigure its functionality at this time. For example, activation of EMV tags can be updated.
The transaction message is created with fields in accordance with EMV tags where a smart "chip" card is used by a customer for a transaction. These tags are specified by the EMV standard. EMV has approximately 170 elements of "tag" data that can be required to be sent from a POS terminal to an acquiring network. These can be mandated by the card issuer so that they can specify the information that is received when conducting a transaction using their card. Each card issuer can stipulate different EMV tags to be used in relation to transactions involving their cards. Each Received by IPONZ on 17 November 2011 POS terminal 3 can be configured and reconfigured with different sets of EMV tags to alter the nature of the information contained in a transaction message. Those EMV tags can be activated and de-activated remotely to alter terminal functionality, as required.
For example, activation/de-activation any of the tags detailed in Figure 5 can be altered for 5 each card scheme application defined in the POS terminal to match the requirements of that particular card scheme. The requirements of the card scheme and how the POS terminal operates for that card is defined by the card issuer. Should these requirements change, the appropriate EMV tags used in the changed card scheme can be activated/de-activated remotely in the POS terminal, without the terminal application being reloaded and/or reconfigured manually by the terminal 10 owner or technician.
Therefore, a particular POS terminal 3 might have different "sets" of EMV tags for each respective card issuer. A particular transaction message 4 created in response to a transaction for a particular card type will have data relating to the EMV tags specified for that card type. Figure 5 shows some typical (although not all) EMV tags and a definition/description of their 15 data/functionality. A full set of EMV tags need not be described as these are published in the EMV specification and are known by those skilled in the art. Figure 6 shows an example of a transaction message 4 (such as that shown in Figure 9 later) with a number of field containing transaction data. The EMV tags are specified in the integrated chip card (ICC) data field 55. As can be seen in Figure 6, field 55 specifies the EMV tags in 5, along with content for those tags.
The EMV tag activation process is indicated in Figure 2, steps 22, 23. This forms part of the overall interaction process that takes place between the POS terminal 3 and computer system 2 (switch 8 and server 7). The requirements for this data can vary for each different card scheme and may change over time. The present embodiment proposes to keep POS terminals 3 deployed over several years hence has included a methodology to configure the EMV tags required remotely from 25 the switching platform. This allows POS terminals 3 to change the tag data sent as part of a transaction without the need to change the POS terminal application or undergo re-certification.
This has significant speed/flexibility implications when meeting future mandate or tag requirements.
Figure 7 shows the process in more detail. The POS terminal 3 is preloaded with the various EMV tags it may need to utilize. The POS terminal 3 then connects to the switch 8 during the 30 periodic logon, step 70. In doing so it supplies a version number for the currently enabled configuration/application file that it is operating with. The configuration/application file is a joint file that controls the configuration and applications available in the POS terminal. It also supplies the currently enabled public keys, which are the public keys for the particular chip cards the POS terminal will work with. Public keys are provided for each of the card schemes, such as VISA, 35 Mastercard and the like. Card prefix records are also supplied, which specify rules on how and when cards will be accepted for use. The switch 8 then verifies if the currently enabled application, public Received by IPONZ on 17 November 2011 keys and card prefix records match those held by the host, step 71. It does this by checking the database held by the switch 8. This database specifies the configuration parameters that the requesting POS terminal 3 should be configured with. These may have been updated since the POS terminal 3 was last reconfigured. The update might be due, for example, to changes in operation, 5 improved features, the requirements of a particular application changing, new cards being released, or other occurrence. For example, where a merchant has agreed to accept cards from a new card scheme, their EMV applications records and the operating parameters can be downloaded to the terminal. Similarly, should a new card scheme emerge, then keys, EMV application, and operating parameters can be attached to all terminals and downloaded. Activation and/or de-activation of 10 preloaded EMV tags can be triggered over download also.
If the records do not match, the switch 8 returns a new set of application, public key and card prefix records and downloads these to the POS terminal, step 72 in a message. These messages contain a record for each supported EMV application and the EMV tags required for that application. The acitivation/de-activation of the terminal EMV tags to implement the new 15 application is triggered as part of an 0300 message download sequence. This is in accordance with the AS2805 specification for network management. The POS terminal 3 uses the new application, public key, activated/de-activated EMV tags and card prefix records to specify the nature of the transaction message and how the transaction proceeds, step 73.
The EMV tags required for each card scheme application are held in a master application 20 record on the switch 8 for each acquiring bank 6 belonging to that scheme. For each EMV application the POS terminal 3 is triggered by a downloaded message from the system to activate/de-activate the EMV tags required. When an EMV transaction is initiated for that application the tags are requested from the Chip Card and later activated/de-activated in the transaction message. These are the EMV tags that are specified for transfer when using that card 25 scheme, and which have been activated/de-actived in the terminal during the download process. With the flexibility to vary tags to acquirer level, the terminal can ensure that it sends only tags that an acquirer can process but the same terminal can send a different set of tags if merchant changes to a different acquirer and retains the same equipment.
Enhanced message encryption (EME) Once authentication and key exchange has taken place, and the periodic logon has taken place, the POS terminal 3 can then initiate transactions 4 on the payment system 1 (step 24, Figure 2). This takes place by a merchant operating the POS terminal 3 to request an electronic transfer of funds, and the customer authorising that by using their card in the card reader and entering a PIN 35 number. Once operated, the POS terminal sends a transaction message 4 (such as that shown in Figure 6) to the switch 8 that contains information to trigger/facilitate the transfer. The message 4 Received by IPONZ on 17 November 2011 is encrypted in a manner termed "enhanced message encryption" (EME). Figures 8 and 9 show an example of a message structure and Figure 10 is a flow diagram showing the enhanced message encryption process. Messages are encrypted using standard financial encryption protocols allowing messages to be sent over any open network. However, the present embodiment is faster to establish 5 connections than other Internet based protocols and it also takes advantage of the secure master key loaded in each POS terminal 3 to enhance the encryption of the message to eliminate the risk of certain security attacks. The use of a mutual authentication process and master key dispenses with the need for a SSL secure session between the POS terminal 3 and the switch 8. This speeds up communication, allowing for the use of enhanced message encryption.
The transaction message 4 transferred from the POS terminal 3 to the switch 8 has a structure comprising a number of fields. Each field specifies certain information that is transferred to facilitate the transaction. An example of a transaction message, the fields it contains, and the type of information in those fields is shown in Figure 6. Figure 8 shows some other typical fields that could be used in the transaction message. The fields comprise field 55, which is an integrated circuit 15 card (ICC) data field. This field contains data relating to a number of EMV tags which specify operation functionality of the POS terminal 3 and the transaction message 4 as described above. The tags for field 55 can be different for different POS terminals and types of POS terminals, and the tags used in any particular POS terminal might change over time after reconfiguration in response to system/protocol updates. The updating of the EMV tags is described above, in respect 20 of Figures 5 and 6.
Figure 9 shows the actual structure of the message 90. All information is encrypted prior to sending the transaction message, except for fields used for routing the message through the network 5. It comprises a transport protocol data unit (TPDU) header 90a and routing fields 90b which form the header 91 A payload 90c is attached to the head comprising the message content. The 25 header 91 remains unencrypted, but the message field 90c is encrypted using the transaction message session keys. This creates the encrypted transaction message 92.
Figure 10 shows the encryption process. This is undertaken by? a computer program embedded in or downloaded into the hardware or firmware of the POS terminal 3. The EME process uses a separate data encryption (transaction) session key to take the transaction messages 30 and then encrypt it (including all data fields) them using a standard 3DES process. The resulting secure message can then be routed over any network. The use of 3DES to secure all the message fields in the message as part of a standard message process is different to other encryption processes and different from a 'privacy key' approach that secures card data fields only. Certain fields are not encrypted to assist with routing by third party nodes that will not be privy to the decryption keys. 35 This allows for routing of the transaction messages over a range of network types, where security is uncertain or cannot be controlled by the payment system administrator.
Received by IPONZ on 17 November 2011 Refemng to Figure 10, the encryption process contains the following steps. First, the POS terminal 3 receives the transaction request and the transaction message 4 is generated for sending to the computer system, step 100. The encryption process is triggered. The software then fetches the encryption transaction session key from its memory, step 101. This has been downloaded from the computer system 2 on a previous occasion, during the periodic logon process. The POS terminal 3 then determines if the transaction session key is still valid, step 102. The key is specified as being valid for a number of transactions, or a certain time period as configured by the computer system 2 for the POS terminal 3. If the session key is not still valid, the POS terminal 3 obtains another session key from the computer system 2 (more particularly, the switch 8) in the normal manner, using the periodic logon process, step 103. Once the POS terminal 3 has a valid session key, it encrypts the transaction message, step 104. The message is encrypted under triple DES in ECB mode (as per AS 2805.5.4 — 2000 and AS2805.5.2). To aid with routing the message through third party nodes, the following (header) fields are not encrypted: a. Encryption indicator b. A copy of field 41, Card Acceptor Terminal ID c. A copy of field 42, Card Acceptor ID Code d. A copy of field 11, STAN e. The Message Type Once encrypted, the transaction message can be sent to the computer system 2 for facilitating the funds transfer, step 105. The computer system 2 decrypts the message 4 using the private session key and the message 4 is processed as normal to effect funds transfer by the switch 8.
Effects of combination of features The POS terminal 3 and transaction features described above can be combined to provide an improved payment system 1. Private keys can be securely loaded remotely, EMV applications, public keys and tags can be remotely managed according to POS terminal requirements, and transaction messages are encrypted so they can be sent over any network. The POS terminal is adapted to operate with all major card schemes and proprietary debit formats. In summary, the system operates in the following manner. 1. The POS terminal is preconfigured with the manufacturer key and serial number. 2. The POS terminal is plugged in at the merchant site. The merchant can choose one or a number of communications methods such as dial-up, broadband, GPRS, CDMA, specialist IP service. 3. The private keys are download to the POS terminal 4. The POS terminal logs on to the network.
. The POS terminal then downloads Received by IPONZ on 17 November 2011 a. configuration records b. Application tables that determine how the POS terminal will behave for each card range and control: i. The application display text 5 ii. The EMV action codes for the POS terminal (in each mode) iii. Online PIN capability iv. Offline PIN capability v. Whether the PIN can be bypassed vi. Whether the cardholder verification can be disabled 10 vii. The EMV tags to be sent with the transaction c. Card tables that determine i. Accounts available ii. Purchase amounts (in various modes) iii. Cash amounts iv. Checking parameters v. Offline behavior vi. The pan truncation algorithm to be used on the receipt d. Public keys for supported EMV schemes 6. Downloaded are the requirements to change the secure session keys after a defined period or 20 number of transactions (or both). 7. EMV support can be only switched on for relevant schemes (or turned off entirely), offline operational parameters can are determined (and can be turned off) 8. The merchant can then transact a. Both magnetic stripe and EMV operation can be supported 25 b. EMV cards for the schemes the merchant belongs to are supported c. The transaction can be on-line or offline d. Stored transaction are encrypted under a storage key e. Messages when sent are fully encrypted f. If transactions cannot be sent an temporary electronic offline function is available 30 9. The POS terminal can be centrally re-configured at any point to support a new bank acquirer, new card scheme or to amend the merchant's trading parameters.
Received by IPONZ on 17 November 2011

Claims (12)

1. A method of reconfiguring a POS terminal comprising: receiving at a computer system configuration data indicating operating configuration of a POS terminal, including the EMV tags used by the POS terminal for transaction messages, 5 checking at the computer system that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, providing from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration. 10
2. A method according to claim 1 wherein the POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the configuration data provided from the computer system triggers activation/de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration. 15
3. A method of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer comprising: receiving at a computer system configuration data indicating operating configuration of a POS terminal, including the EMV tags used by the POS terminal for transaction messages, 20 checking at the computer system that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, providing from the computer system different configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration, 25 receiving at the computer system a transaction message indicating a transaction amount and containing information for identifying the payer's and payee's financial institutions, arranging transfer of the transaction amount from the payer's financial institution to the payee's institution using the computer system. 30
4. A method according to claim 3 wherein the POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the configuration data provided from the computer system triggers activation and/or de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration. 35
5. A POS terminal for transferring funds electronically between financial institutions of a merchant and customer, the terminal adapted to: Received by IPONZ on 17 November 2011 -21 - transmit configuration data to a computer system indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages, the computer system being adapted to verify that the received operating configuration matches the required operating configuration of the POS terminal, and 5 if the POS terminal operating configuration does not match the required operating configuration, receive configuration data from the computer system to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration.
6. A POS terminal according to claim 5 wherein the POS terminal comprises EMV tags that 10 can be activated and de-activated to configure the POS terminal's configuration, wherein the POS terminal is further adapted to: reconfigure itself with the required operating configuration by activation and/or deactivation of the required EMV tags based on the configuration data received from the computer system. 15
7. A payment system for transferring funds electronically between financial institutions of a merchant and customer comprising: a computer system connected to or for connection to a plurality of POS terminals and adapted to receive a transaction messages from the POS terminals, the computer system adapted to: 20 receive configuration data from a POS terminal indicating operating configuration of the POS terminal, including the EMV tags used by the POS terminal for transaction messages, check that the operating configuration matches the required operating configuration of the POS terminal, and if the configuration does not match, provide from the computer system different 25 configuration data to the POS terminal to reconfigure the POS terminal to use the EMV tags that provide the required operating configuration.
8. A payment system according to claim 7 wherein each POS terminal comprises EMV tags that can be activated and de-activated to configure the POS terminal's configuration, wherein the 30 configuration data provided from the computer system triggers activation and/or de-activation of the required EMV tags to reconfigure the POS terminal with the required operating configuration.
9. A payment system for transferring funds electronically between financial institutions of a merchant and customer substantially as hereinbefore described with reference to the accompanying 35 drawings. Received by IPONZ on 17 November 2011 -22-
10. A POS terminal for transferring funds electronically between financial institutions of a merchant and customer substantially as hereinbefore described with reference to the accompanying drawings.
11. A method of of transferring funds electronically between financial institutions in response to a transaction between a merchant and customer substantially as hereinbefore described with reference to the accompanying drawings.
12. A method of reconfiguring a POS terminal substantially as hereinbefore described with reference to the accompanying drawings.
NZ585446A 2007-11-30 2008-11-28 Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration NZ585446A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
NZ596483A NZ596483A (en) 2007-11-30 2007-11-30 Payment system and method of operation
NZ563922A NZ563922A (en) 2007-11-30 2007-11-30 Payment system
NZ585446A NZ585446A (en) 2007-11-30 2008-11-28 Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NZ563922A NZ563922A (en) 2007-11-30 2007-11-30 Payment system
NZ585446A NZ585446A (en) 2007-11-30 2008-11-28 Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration

Publications (1)

Publication Number Publication Date
NZ585446A true NZ585446A (en) 2011-12-22

Family

ID=45406909

Family Applications (1)

Application Number Title Priority Date Filing Date
NZ585446A NZ585446A (en) 2007-11-30 2008-11-28 Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration

Country Status (1)

Country Link
NZ (1) NZ585446A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3422274A1 (en) * 2017-06-29 2019-01-02 Feig Electronic GmbH Method for configuring or changing a configuration of a payment terminal and/or for allocating a payment terminal to an operator

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3422274A1 (en) * 2017-06-29 2019-01-02 Feig Electronic GmbH Method for configuring or changing a configuration of a payment terminal and/or for allocating a payment terminal to an operator
US20190005480A1 (en) * 2017-06-29 2019-01-03 Feig Electronic Gmbh Method of configuring or changing a configuration of a pos terminal and/or assignment of the pos terminal to an operator
US11514419B2 (en) 2017-06-29 2022-11-29 Feig Electronic Gmbh Method of configuring or changing a configuration of a POS terminal and/or assignment of the POS terminal to an operator

Similar Documents

Publication Publication Date Title
US20220366413A1 (en) Payment system
US7865431B2 (en) Private electronic value bank system
AU2012284047B2 (en) Mobile device with secure element
US6286099B1 (en) Determining point of interaction device security properties and ensuring secure transactions in an open networking environment
CA2676848C (en) Methods and a system for providing transaction related information
US11416857B2 (en) Terminal configuration apparatus for the remote configuration of terminals
AU2019355834B2 (en) Systems and methods for cryptographic authentication of contactless cards
US9098845B2 (en) Process of selling in electronic shop accessible from the mobile communication device
TW202105284A (en) Provisioning to a digital payment device
WO2009070041A2 (en) Payment system and method of operation
WO2006128215A1 (en) Method and system for secure authorisation of transactions
NZ585446A (en) Payment system and method of operation by reconfiguring a POS terminal to use the EMV tags that provide the required operating configuration
NZ563922A (en) Payment system
KR100901297B1 (en) System for Virtual Mechant Network Application
AU2007237260A1 (en) Payment system and method of operation
KR100928412B1 (en) Payment processing system using virtual merchant network
KR101145832B1 (en) Payment terminal and card payment method of a payment terminal via virtual merchant network
KR101704505B1 (en) System and Method for Providing Financial Transaction
KR20090016618A (en) Method for settlement process using virtual merchant network and program recording medium
KR20090001982A (en) System and method for managing virtual merchant network using relaying devices and program recording medium
KR20090016622A (en) Method for managing virtual merchant network using relaying devices and program recording medium

Legal Events

Date Code Title Description
PSEA Patent sealed
RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 3 YEARS UNTIL 28 NOV 2015 BY AJ PARK

Effective date: 20130515

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2016 BY AJ PARK

Effective date: 20151007

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2017 BY AJ PARK

Effective date: 20161007

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2018 BY AJ PARK

Effective date: 20171024

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2019 BY AJ PARK

Effective date: 20181005

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2020 BY AJ PARK

Effective date: 20191008

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2021 BY AJ PARK

Effective date: 20201007

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2022 BY AJ PARK

Effective date: 20211004

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2023 BY AJ PARK

Effective date: 20221017

RENW Renewal (renewal fees accepted)

Free format text: PATENT RENEWED FOR 1 YEAR UNTIL 28 NOV 2024 BY AJ PARK

Effective date: 20231011