WO2010022129A1 - Secure smart card system - Google Patents
Secure smart card system Download PDFInfo
- Publication number
- WO2010022129A1 WO2010022129A1 PCT/US2009/054275 US2009054275W WO2010022129A1 WO 2010022129 A1 WO2010022129 A1 WO 2010022129A1 US 2009054275 W US2009054275 W US 2009054275W WO 2010022129 A1 WO2010022129 A1 WO 2010022129A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- smart card
- transaction
- data
- magnetic stripe
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06187—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06187—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with magnetically detectable marking
- G06K19/06196—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0701—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
- G06K19/0702—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management the arrangement including a battery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0716—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor
- G06K19/0718—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor the sensor being of the biometric kind, e.g. fingerprint sensors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0719—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for application selection, e.g. an acceleration sensor or a set of radio buttons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07701—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
- G06K19/07703—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/352—Contactless payments by cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3574—Multiple applications on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0846—On-card display means
Definitions
- the present invention relates to transaction cards, and more particularly to smart cards and to transaction cards having magnetic stripe emulators.
- Fraud levels can be measured in the tens of billions of dollars each year or higher when the various stakeholders that are involved in the losses associated with fraudulent transactions measure their total costs.
- a merchant loses not only the revenue and profit related to a sale, but the product itself, and possibly higher transaction fees when fraud occurs frequently in its business.
- a merchant must also incur the costs associated with investigating certain types of fraudulent transactions.
- Credit card associations like the VISA® and MASTERCARD® associations cover some costs associated with fraud but the credit card issuers incur significantly more costs, including costs associated with refunding the amounts charged to a card holder account, investigating possible fraudulent transactions and issuing new plastic cards if a significant breach of security has been identified. When the total costs of fraud are measured among all the parties involved in financial transactions, the losses are staggering.
- Plastic card fraud has also opened up a market for all sorts of fraud detection and educational services. Neural network software to detect and hopefully prevent a fraudulent transaction from occurring costs card issuers and their processors millions of dollars to operate. Educational seminars to teach card issuers, merchants, and card holders on how to better safeguard the information that can be used to commit identity theft and plastic card fraud also cost card issuers millions of dollars.
- Existing security standards like the Payment Card Industry (PCI) Data Security Standard, while being excellent network and system security practices also require merchants to take extra measures to safeguard the information they possess and these measures cost merchants millions of dollars to implement.
- PCI Payment Card Industry
- An entire industry has been created to protect the static data used in today's plastic card transactions. All told, billions are spent and still fraud levels continue to increase.
- the card When a customer wishes to pay for goods using this system, the card is placed into a "PIN pad" terminal (often by the customer themselves) or a modified swipe-card reader, which accesses the chip on the card. Once the card has been verified as authentic, the customer enters a 4-digit PIN, which is checked against the PIN stored on the card; if the two match, the transaction completes.
- a smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of a standard transaction card includes a card body, which includes a magnetic stripe emulator for use with the transaction terminal, a smart card chip programmed with at least one transaction application for providing secured data for use in a transaction and dynamic card verification data, a power supply, and a card controller in communication with the magnetic stripe emulator.
- the card controller is configured to receive the dynamic card verification data and control the magnetic stripe emulator to emit a magnetic field encoded with at least a portion of the secured data and the dynamic card verification data.
- FIG. 1 is a block diagram of a smart card application management system
- FIGS. 2A and 2B illustrate a smart card according to one embodiment of the present invention
- FIGS. 3 A and 3B illustrate a smart card activation unit for use with the smart card of FIGS. 2A and 2B according to an embodiment of the present invention
- FIGS. 4A and 4B illustrate an alternative embodiment of the smart card of FIGS. 2A and 2B;
- FIGS. 5A and 5B illustrate an alternative embodiment of a smart card activation unit for use with the smart card of FIGS. 4A and 4B;
- FIG. 6 is a flow diagram illustrating a method of enrolling biometric information on a smart card
- FIG. 7 is a flow diagram illustrating a method of authenticating a user using biometrics
- FIG. 8 is a flow diagram illustrating a method of selecting and activating a transaction application on a smart card
- FIG. 9 illustrates a data format for Track 1 and Track 2 for a credit transaction
- FIG. 10 is a block diagram of controller of the activation unit of FIGS. 3 A and 3B;
- FIG. 11 is a block diagram of the controller of smart card of FIGS. 2A and 2B;
- FIG. 12 illustrates an embodiment of the present invention utilizing a cell phone/companion card combination for performing magnetic stripe transactions;
- FIGS. 13A and 13B illustrate an embodiment of a NFC enabled companion card for use in the combination of FIG. 12;
- FIG. 14 is a block diagram of the controller of the NFC enabled companion card of FIGS. 13A and l3B;
- FIG. 15 is a block diagram of the processing components of the cell phone illustrated in FIG. 12;
- FIG. 16 illustrates a transaction system using the companion card of FIGS. 13A and 13B;
- FIG. 17 is a flow diagram illustrating the use of the companion card and cell phone of FIG. 12 in a transaction
- FIG. 18 illustrates a system for programming the cell phone of FIG. 12.
- FIG. 19 illustrates an embodiment of the cell phone illustrated in FIG. 12.
- a smart card that can support all point of sale (POS) readers, i.e., contact smart card readers, contactless smart card readers and magnetic stripe readers, and deliver dynamic data content through not only the smart card readers but also the magnetic stripe point of sale devices.
- POS point of sale
- Existing smart card specifications for contactless and contact transactions call for the smart card chip to generate some dynamic data for inclusion in the transaction.
- Visa Inc.'s MSD contactless smart card specifications includes a code designated Dynamic Card Verification Value (dCVV) for each transaction.
- dCVV Dynamic Card Verification Value
- necessary information for performing secure card not present transactions can be displayed on the smart card display.
- This information can include the dCVV or CVC3 codes discussed above that are generated by the smart card for use in card present transactions, or other dynamic information, such as a onetime-password (OTP).
- OTP onetime-password
- Companies and organizations such as QSecure of Los Altos, CA, InCard Technologies of Los Angeles, CA, RSA Division of EMC Corporation of Bedford, Massachusetts, and OATH (Open AuTHentication) initiative and others have proposed various OTP schemes for inserting a dynamic code into the payment process.
- OTP Open AuTHentication
- FIG. 1 is a block diagram of a system 100 for managing applications on a smart card.
- the system 100 includes a smart card 200, a smart card activation unit 300, which communicates with smart card 200, and a personal computer (or other processor) 125, which is communicatively coupled through a network (such as Internet 150) to Smart Card Management System (SCMS) 175 and locally communicatively coupled to the smart card activation unit 300.
- SCMS Smart Card Management System
- a user can manage transaction applications stored on a smart card chip or processor within smart card 200. More specifically, standards exist for managing applications on smart cards.
- GlobalPlatform Card, Device and Systems standards promulgated by GlobalPlatform, which is an independent, not-for-profit organization concerned with a standardized infrastructure for development, deployment and management of smart cards.
- GlobalStandards was founded in 1999 to take responsibility for Visa Inc.'s Open Platform specification, which is one of a number of competing smart card standards including GSM, EMV and OCF.
- the GlobalPlatform Card Specification is a secure, dynamic card and application management specification that defines card components, command sets, transaction sequences and interfaces that are hardware-neutral, operating system neutral, vendor-neutral and application independent. The specifications are applicable to any type of application and industry, allowing any combination of applications from any industry on a single card - from mono-application to multi- application.
- the GlobalPlatform Card Security Requirements Specification provides guidance for selecting card configurations most appropriate to the security policies set up by the card issuer and application providers. Card vendors are also provided with guidance to implement security functions in a consistent manner. Most of the secure elements used in the Near Field Communication (NFC) context rely on GlobalPlatform card specification.
- NFC Near Field Communication
- GlobalPlatform also provides a number of specifications for device programming, with different profiles for different industries. The profiles are organized around a common core framework technology and share most of their detailed API's. There are a number of GlobalPlatform specifications relating to the system's infrastructure, developed to standardize back-end systems from personalization to security, key management and application loading.
- the GlobalPlatform Profile Specification standardizes the interface between the data preparation system and the personalization device utilizing a simple, cost effective, interoperable machine -independent mechanism.
- Key Management Systems Functional Requirements Specification standardizes the description, or key profile, and procedures around key management, providing an opportunity to deliver centralized key management across separate systems. Communication between various components of the system's infrastructure is standardized via the GlobalPlatform Messaging Specification, which defines all the roles and responsibilities of the actors, or systems, for a multi application smart card infrastructure.
- the smart card 200 is shown docked (or otherwise interfaced) with the smart card activation unit 300, which, as described in more detail below, preferably takes the form of a sleeve with a slot for receiving the smart card 200.
- the SCMS system 175 is a server based application that manages all information necessary to create a Load File.
- This Load File is the program code and data that are used to install applications on a GlobalPlatform compliant smart card like the Card 200.
- the user establishes a session to the SCMS System 175 over the Internet 150 and downloads the Load File to the smart card through the connection between the PC 125 and smart card activation unit 300.
- the smart card activation unit 300 acts as a PC/SC (Personal Computer/Smart Card) compliant device and delivers the Load File to the GlobalPlatform compliant Card Manager running in the Smart Card Chip operating system (e.g. Java Card, Multos, etc.).
- the Card Manager handles the steps involved in installing the application. All the steps involved in this process are defined by the GlobalPlatform System, Device, and Card standards.
- the PC/SC specification was developed to facilitate the interoperability necessary to allow Integrated Circuit Card (ICC) technology, also known as smart cards, to be effectively utilized in the PC environment.
- ICC Integrated Circuit Card
- the PC/SC specification is based on the ISO 7816 standard, and its formal name is "Interoperability Specification for ICCs and Personal Computer Systems.”
- SCMS system in managing smart card applications is familiar to artisans in the relevant art. Briefly, the user gains access to the SCMS system 175 either through their web banking software or directly by using username/password credentials.
- the SCMS system presents the user with a list of applications already installed on the user's smart card and a list of applications available for downloading to the smart card. This process is called Post Issuance Provisioning and provides the ability to add or change applications on a smart card after it has been issued to the card holder.
- the user can select to download a VISA® Credit Card application issued by their financial institution and the SCMS would use other related information to generate the load file, manage a secure communications channel with the smart card and download the load file to the smart card.
- the SCMS tracks all information about the smart card, e.g., chip identifier, OS, keys, issuer, card holder information and what changes have occurred to the applications on the card.
- the Global Platform System standard dictates the necessary functionality that is supported by a SCMS system.
- FIG. 2A is a front view of the smart card 200, more specifically the smart card body 202
- FIG. 2B is a schematic illustration of the internal and rear side components of the smart card 200 and smart card body 202.
- the smart card body 202 takes the shape of a standard plastic magnetic stripe card, as governed by applicable standards.
- the card 200 may include the logo 208 of the card issuer or other source indicia.
- the card 200 includes a display 204, such as a LCD display.
- the display 204 can take the form of electronic paper, also called e-paper or electronic ink display. This display technology is designed to mimic the appearance of ordinary ink on paper. Unlike a conventional flat panel display, which uses a backlight to illuminate its pixels, electronic paper reflects light like ordinary paper and is capable of holding text and images indefinitely without drawing electricity, while allowing the image to be changed later. Examples of e- paper displays include electrophoretic displays, bistable LCD and cholesteric LCD.
- Smart card contact pad 206 is provided on a surface of the card for contact-based communications between an embedded smart card chip and a smart card reader. Smart card contact pad 206 is used to perform transactions on devices supporting the ISO/IEC 7816 standards. In Europe and in Canada this would include the Chip & Pin devices used to perform payment transactions. Contact smart cards are also common in physical access control systems.
- the card 200 includes an internal power source
- the internal power source 212 is a thin film battery, such as the FLEXIONTM ultra-thin, flexible lithium polymer battery available from Solicore, Inc. or a lithium thin- film battery available from Varta Microbattery GmbH.
- a solar panel (not shown) may be provided. Solar cells are connected to a charger and can be used to extend the life of the card beyond that of a conventional battery and/or to recharge the battery.
- the card 200 includes a conventional smart card chip/processor 218 which communicates with an appropriately configured external smart card reader by way of the smart card contact pad 206 or wirelessly by way of integrated antenna 220 (i.e., contactless communication) .
- the smart card 200 also includes a smart card controller 216 (i.e.,
- ASIC processor in communication with an I/O port 210, for communicating with an external source such as the card activation unit 300 (as described in more detail below) and a magnetic stripe emulator 214.
- an external source such as the card activation unit 300 (as described in more detail below) and a magnetic stripe emulator 214.
- Various designs for magnetic stripe emulators are known in the art, some of which are described in, for example, U.S. Patent No. 4,701,601 to Francini et al., entitled “Transaction Card with Magnetic Stripe Emulator”, and U.S. Published Application Nos. 2007/0189581 and 2005/0194452 to Nordentoft et al., both entitled “Credit Card and Secured Data Activation System,” the entirety of each of which is hereby incorporated by reference herein.
- a typical magnetic stripe emulator will include a transducer coil for each magnetic strip track and including a number of coil windings wound around a strip of electromagnetically inducible core material.
- Each transducer coil is individually inducible by a driver circuit. Instead of an electromagnetic coil, the transducer can be formed from an integrated thin film head.
- the number of transducer coils may be chosen to three in order to induce secured data signals corresponding to conventional magnetic strip information, which lies in magnetic strips in three tracks, but may as an alternative be provided in numbers ranging from one to more than three. For most applications, data is only to be generated in two transducer coils as shown for emulator 214, corresponding to the first and second tracks of a conventional magnetic strip.
- the data is permanently magnetically presented to a credit card reader using a so-called F2F-format, or two frequency format, in which a "0" bit is formed by a magnet part of a predetermined length in the magnetic strip, and a "1" bit is two longitudinally, magnetically oppositely directed magnet parts, having a combined length equal to the length of the "0" bit magnet part.
- the transducer coils of the emulator 214 preferably emit and present data signals in the F2F-format to a reader, such as a credit card reader, which is to read information from the card 200 with a reader head.
- the transducers generate varying magnetic fields that extend beyond the carrier.
- the transducer coil preferably produce a homogenous and relatively strong magnetic field encoded with the desired data in order for it to be readable by a credit card reader.
- the nature of this magnetic field is heavily influenced by the transducer coil construction, such as choice of core material and core construction of the cores strips, number and position of the core windings upon the core strips.
- the design of the emulator 214 based on these factors is within the skill of the artisan in this field.
- Variations in the signals to a transducer coil generates a variable magnetic field along the strip that is identical to the magnetic field that a reader head is influenced by when a conventional magnetic strip credit card holding the same secured data is passed through the same reader.
- the material of the core strip is an electromagnetically inducible material, such as metal, preferably electromagnetic lamination, sheet iron or other sheet metal, either provided as a single or double foil on one or each side of the card body, advantageously having a width and a position corresponding to a conventional magnetic track in order to have a similar magnetic and physical appearance.
- the choice of core material of the core strips strongly influences the strength and distribution of the magnetic field produced and allows for an enhancement of the magnetic field being produced, resulting in the need for lower current in the core windings, which reduces the power consumption of the card.
- the transducer strips of the magnetic stripe emulator 214 are positioned on card 200 in a manner such that alignment with the read sensor of existing reader terminals is facilitated.
- Current specifications call for the magnetic stripe to be located 0.223 inches (5.66 mm) from the edge of the card, and to be 0.375 inches (9.52 mm) wide. Each track is 0.110 inches (2.79 mm) wide.
- the card controller 216 controls all aspects of the functionality of the card 200 that are not provided by the conventional smart card chip 218.
- the card controller is preferably a separate processor from the smart card chip, thereby enabling the use of the already standardized smart card chip 218.
- card controller 216 is shown as a single processor, its functions or operations could be distributed amongst two or more processors, controllers, drivers, chips or other devices (collectively referred to herein as "controller").
- the card controller 216 serves as a driver for managing the display 204. This functionality can be built into a central processor or provided in the form of a separate driver chip.
- the card controller 216 can have built in wireless capabilities for interfacing with antenna 220 to communicate with card activation unit 300, or include a separate wireless communications chip (shown as activation unit interface 210) for exchanging information with the unit 300.
- activation unit interface 210 is a wireless RS485 chip for implementing wireless communications with the activation unit 300.
- the interface 210 could be a wired communications interface, such as a RS232 chip. While it is possible to use the contact pad 206, antenna 220, and the smart card chip 218 as the means for communicating with the activation unit 300, this approach would also require that the smart card operating system (OS) be modified to indentify these non-standard communications and intercept and redirect the communications to the card controller 216.
- OS smart card operating system
- the card 200 can includes a peripheral communications controller (e.g., SPI bus) for passing information between various components.
- a peripheral communications controller e.g., SPI bus
- the card controller 216 controls the magnetic stripe emulator 214 for transmitting secure transaction data during a transaction, e.g., a credit card swipe transaction.
- this data includes not only standard secured data, such as the static transaction data called for by governing specifications (e.g., account holder name, account number, etc.) but also dynamic information. Using this dynamic information in authorizing transactions prevents fraudulent transactions since the static information alone cannot be used to perform a transaction.
- the smart card chip 218 is a dual interface smart card (contact and contactless) found in many of the multi-application smart cards available in the market today.
- the smart card activation unit 300 communicates with the smart card chip 218 to allow a user to select an active application, queries the application for any necessary information for performing a transaction, and pass some of this information back to the card, specifically the card controller 216 for use in the magnetic stripe emulator 214 and/or display on the card display 204.
- the smart card activation unit 300 is also used during transactions to authenticate that a valid user is performing the transaction and to select what type of card application (e.g., credit, debit, loyalty, access control, etc.) is going to be used in the transaction. These uses are described below but first various features of the smart card activation unit 300 are described in connection with FIGS. 3A and 3B.
- FIG. 3A is a front external view of the smart card activation unit 300.
- the activation unit 300 includes a biometric sensor 312, which is preferably a fingerprint reader, and a user interface.
- the user interface includes an input means 304 (e.g., keypad), including various input buttons or toggles, such as “scroll” button 306, “ok” button 308 and “on/off button 310, and a display 302, such as a LCD display.
- the on/off button 310 is used to turn the activation unit 300 on and off.
- the scroll button 306 is used to scroll through a list of applications stored on the smart card chip 218 of the smart card 200 and displayed on display 302. A list of names (e.g., "VISA", “MASTERCARD”, etc.) or other identifiers corresponding to these applications is displayed on the display 302.
- the user uses the button 308 to select an active application from the displayed list of applications.
- FIG. 3B illustrates the internal components of the activation unit 300.
- the activation unit includes an activation unit controller 320 that controls and interfaces with the other active components of the activation unit 300.
- the activation unit includes a smart card interface 322 for contact interfacing with the smart card chip 218 of the smart card 200.
- the smart card interface is a contact based solution (ISO/IEC 7816) and communicates with the smart card chip 218 through smart card contact 206 on the face of the smart card 200.
- the smart card contact pad 206 has eight contact areas to support the communications: cl is assigned to the supply voltage; c2 is assigned to a reset signal; c3 is assigned to a clock signal; c4 is not used; c5 is assigned to ground; c6 is not used; c7 is for I/O; and c8 is not used.
- the interface 322 corresponds to these electrical contacts, i.e., provides a physical connection to the pad 206 when the smart card and activation unit 300 are connected.
- the sleeve controller 320 can also use the contactless standard to communicate with the dual interface smart card chip 218 through the antenna 324. Contactless communication with the smart card chip 218 can be accomplished with either NFC or Standard ISO/IEC 14443 components.
- the activation unit also includes smart card controller interface 318 for wired (e.g., RS232) or wireless (RS485) wireless communications with the interface 210 of the smart card 200.
- smart card controller interface 318 for wired (e.g., RS232) or wireless (RS485) wireless communications with the interface 210 of the smart card 200.
- the activation unit 300 includes an internal power source represented as battery power source 314.
- the battery power source 314 can be a standard rechargeable lithium polymer battery commonly used in cell phones, PDA devices, hand held games and the like.
- An alternate or additional power source for the activation unit 300 is USB PC connection 316.
- This PC Connection 316 serves as the means by which PC and Internet based software download content and applications to the card 200 as described above in connection with FIG. 1.
- PC/SC is the standard for connection and interaction with a smart card acceptance device like activation unit 300.
- the activation unit 300 can both read and write content to the smart card 200 using established standards like PC/SC and GlobalPlatform Card and Device standards.
- the biometric sensor 312 is used to authenticate the user to the smart card 100.
- this authentication process is accomplished by a smart card application resident at smart card chip 218 referred to as "Match on Card.”
- the biometric sensor 312 captures a live image of a presented user's fingerprint. The live image is processed by software running on the controller 320 or by a separate processor (not shown) to generate a template from this image data.
- the sleeve controller communicates with the biometric sensor and transmits the template file through either smart card interface 322 or antenna 324 to the smart card chip 218, specifically to the Match on Card application running on the smart card chip 218.
- the Match on Card application compares this received live template file with one or more templates that have been previously stored in the smart card chip 218 (or associated memory). The result of the comparison is either a success or failure result. A Success results will allow the user to proceed, and a Failure result will stop any future use of the activation unit until a Success result is achieved. If the user cannot complete this authentication step, the user cannot use the smart card 100 for any transactions. That is, the smart card 200 is not unlocked.
- the smart card application that is selected by the user for use is unlocked until the card is placed back into the sleeve.
- the magnetic stripe 214 of the smart card is in active (transmit) mode until either the completion of a swipe or a timeout has occurred, or when the card is placed back into the sleeve.
- the timeout length is preferably user definable.
- the authentication means is shown as a biometric system, other authentication systems may be used.
- a secure PIN or password can be stored on the smart card chip 218. In this embodiment, the user inputs the PIN or password rather than present a finger to be authenticated.
- the activation unit 300 is shown as a stand-alone device, the activation unit 300 and its functionality can be incorporated into other devices, such as a personal digital assistant or other portable devices such as a cell phone. To the extent this device has Internet capabilities, the device could provide both the activation unit and computer aspects of the system of FIG. 1.
- the sleeve controller 320 uses a card Interface 318 to communicate any necessary information to the smart card for display on the card display 204 and for transmission through the magnetic stripe emulator 214. Application specific information can be displayed for visual verification or other typical plastic card risk management functions like comparing a displayed name against another form of identification.
- FIGS. 4 A and 4B illustrate an alternative embodiment of the smart card 400.
- the smart card body 402 includes a smart card contact pad 406, an optional logo 408, a biometric sensor 410, and a user interface including a display 404 and a user input keypad 412 including scroll button 414, OK button 416 and on/off button 418.
- the card 400 includes smart card controller 422, which is coupled to magnetic stripe emulator 430, smart card chip 424 and antenna 426.
- the card 400 includes an internal battery power source 420.
- the card 400 can be used with a simplified activation unit 500 illustrated in FIGS. 5 A and 5B.
- the activation unit 500 includes a sleeve controller 502 and a PC interface 504 and is operable only for managing applications on the smart card chip 424.
- the sleeve controller 502 communicates with the smart card chip 424 of the card 400 through either contact communications via smart card contact interface 506 (described above) or contactless communications using antenna 508.
- the activation unit is essentially a standard smart PC/SC card acceptance device for supporting smart cards, such as those devices sold by Advanced Card Systems Ltd. Of Hong Kong, Gemalto (formerly Gemplus) of the Netherlands, Fujitsu of Japan and others.
- the card controller 422 communicates directly with the smart card chip 424 through an interconnect with the smart card chip 424 rather than through the activation unit.
- the smart card chip 424 must support some form of bus design, like SPI, to communicate with an outside controller chip like the card controller 422.
- the user uses keypad 412 to turn on the card 400.
- the biometric sensor 410 captures a live image and it is converted to a template by appropriate software, which is provided to the Match on Card application resident on the smart card chip 424. A successful match against a previously stored template authenticates the user and activates the card for use.
- the controller 422 retrieves the secured static and dynamic data for the application and controls magnetic stripe emulator 430 to emulate this data, thus allowing the smart card 400 to be used with a conventional magnetic stripe reader but with the further advantages of enhanced security and fraud prevention provided by the use of the dynamic data.
- the card could also be used with conventional smart card readers.
- the controller 422 controls display 404 to display any necessary information for performing the transactions (e.g., dynamic card verification data such as a dynamic code or one time password or other data).
- FIG. 6 is a flow diagram of the biometric enrollment process for initializing the smart card 200 with a user's fingerprint template for later use in authenticating the user during transactions. While the method is described in connection with smart card 200, the method is equally applicable to modified smart card 400. This process determines what users can access applications stored on the smart card chip 218.
- step 600 the user docks the smart card 200 with the activation unit
- the user places a finger on the biometric sensor 312.
- this sensor can be a silicon based area sensor or a swipe sensor commonly found on many laptops.
- the biometric sensor 312 captures the fingerprint image, and at step 603 the image quality is checked to make sure enough relevant points are identified to enable accurate authentication using the fingerprint. [0053] At step 604, if the image quality is not sufficient the user is prompted to repeat the capture step (via display 302) and the process returns to repeat steps 601 to 603. [0054] At step 605, if the image is of sufficient quality (as determined at step
- the biometric sensor 312 processes the image into a template file of the representative data points.
- the template is stored in the secure memory of the smart card chip 218, which can be accessed in the future by the Match on Card application of the smart card chip 218.
- step 607 the user is asked if another image should be captured for future comparison. If another image is requested the process is repeated. If no additional images are to be captured the process terminates at step 508.
- FIG. 7 is a flow diagram of the user authentication process. Assuming biometrics are used for authentication, this process is only used after the user completes the biometric enrollment process described above in connection with FIG.
- step 700 the user docks the smart card 200 with the activation unit
- step 701 the user places a finger on the biometric sensor 312.
- the biometric system captures the live biometric image.
- the biometric system checks the image quality to determine if there are a sufficient number of data points for comparison.
- step 703 if quality is determined to be insufficient, the user is notified at step 704 (through display 302) that the image capture step must be repeated.
- the biometric system processes the image into a template file of the representative data points.
- the template file is submitted from the activation unit 300 to the Match on Card application of the smart card chip 218 for comparison to the template(s) that were stored during the biometric enrollment process (FIG. 6).
- the Match on Card application returns a value of success or failure.
- step 708 if a failure to match occurs the user is notified of the result
- step 709 if a successful match is determined the user is notified (via display 302) and the process ends (step 710) by sending the user to the application selection process defined in FIG. 8. At this point, the user has been authenticated and the card id active.
- FIG. 8 is a flow diagram illustrating an application selection process where an application is selected for use in a transaction and the magnetic stripe emulator of the smart card 200 (or 400) is primed for use in the transaction.
- the method FIG. 8 follows the user authentication process of FIG. 7.
- step 800 the user successfully activates the device using the method of FIG. 7.
- the activation unit 300 specifically the activation unit controller 320 through, for example, the smart card interface 322, performs a query of the smart card chip 218 to obtain a list of its installed applications.
- the activation unit controller 320 generates a list of applications and displays the list on the display unit 302.
- step 803 the user presses a key on the keypad 304.
- the activation 300 unit is turned off at step 804.
- the function to lock all applications on the smart card is called when the user turns off the card activation unit while card is in the activation unit or when a card is placed back into the card activation unit.
- step 805 if the user pressed the scroll key 306 at step 803, the next item on the list is highlighted. If the user had scrolled to the last application on the list the highlight is returned to the first application on the list and control is passed back to step 803 where the activation unit waits for the next key to be pressed.
- Step 806 if the user pressed the ok key 308, the life cycle status of the application selected is changed to "unlocked” and the other applications have their life cycle statuses changed to "locked” (step 807).
- Application lifecycles and the methods of changing them are defined in the GlobalPlatform Card and other standards discussed above.
- Steps 808 to 810 represents steps that enable the use of smart card dynamic card verification data in magnetic stripe transactions.
- the activation unit 300 through its controller 320 acting as a GlobalPlatform device (or other device if another standard is employed) queries the user-selected application from the smart card chip 218 and obtains the necessary data values to be used by the smart card 200 in constructing the magnetic stripe data and any data elements for display on the card display 302.
- any necessary keys are passed from the activation unit 300 to the smart card application to authenticate activation unit 300 as a valid GlobalPlatform (or other) device, according to the applicable industry standard.
- a mapping algorithm is used by the controller 320 to take the output from the query of the smart card application to format a data stream that is to be emulated by the magnetic stripe emulator 214.
- This algorithm maps the output of the smart card, which is a given number of data bits representing various data elements of a smart card transaction, to various data elements called for in the applicable magnetic stripe transaction specification for the given transaction application.
- the activation unit can then create a new data stream in accordance with the transaction application rules for the magnetic stripe transaction, including all of the necessary data elements plucked from the smart card data stream (e.g., user name, account number, etc.) but also including dynamic card verification data.
- the dynamic card verification data includes: (a) dynamic data code flag; (b) a dynamic data code (retrieved from the smart card data stream); and (c) an incremental transaction number (also retrieved from the smart card data stream).
- the controller also received any necessary data for display during card not present transactions.
- the activation unit 300 sends the newly created magnetic stripe data and any display data to the smart card controller 216.
- the card controller 216 then sends the display data to the display 204 and the magnetic stripe data to the magnetic stripe emulator 214.
- the activation unit 300 notifies the user through display 302 that the card can be removed from the activation unit and is ready for use with any card reader (i.e., contact or contactless smart card reader or standard magnetic stripe reader).
- any card reader i.e., contact or contactless smart card reader or standard magnetic stripe reader.
- step 812 if the smart card 200 is removed from the activation unit
- the activation unit 300 is turned off. If the smart card 200 is not removed from the activation unit 300, control is passed back to step 803 and the device waits for another key to be pressed.
- the removal of the smart card 200 at step 712 is a system level event meaning and at any time if this event occurs, the activation unit 300 is turned off.
- the magnetic stripe emulator will stay active for a user definable period of time or until the sensors that form part of the emulator sense a successful swipe past a magnetic read head.
- the smart card will stay active until the card is placed back into the sleeve.
- FIG. 9 is a table illustrating the generally applicable data format specifications for magnetic stripe credit card transactions defined in ISO/IEC 7813.
- FIG. 9 also illustrates how to change static magnetic stripe data to include some dynamic information for use in a transaction.
- Tracks 1 and 2 include many fields that are used to allow a card issuer or its agent to authorize a financial transaction.
- the typical DD segment includes the static CVV (VISA) or CVC (MASTERCARD) values, which are allotted three characters. Replacing the three character CVV or CVC data with a three digit dynamic code (dCW in Visa, Inc.
- CVC3 in MasterCard, Inc. terms including the dCW of CVC3 indicator character (e.g., a status flag indicating that dynamic data is present), and including a four character Application Transaction Counter value allows the card issuer to use a set of data unique to each transaction to authorize a transaction.
- the smart card chip application in use increments the transaction counter after each transaction from that particular smart card application (i.e., each smart card application maintains its own transaction counter). This value is passed to the transaction server (which is part of the credit card transaction infrastructure in place) during authorization and eliminates the need on the server side to stay in sync as is required by many of today's security tokens.
- This approach takes the dynamic code scheme already defined in the specifications for secure smart card transactions, but not for magnetic stripe transactions, and allows for it to be supported in traditional magnetic stripe transactions.
- Use of this dynamic information in a magnetic stripe transaction allows the same smart card verification algorithms already in place for use with smart card transactions to be reused for magnetic stripe transactions, thereby providing magnetic stripe transactions with the security of smart card transactions through existing magnetic stripe readers.
- This approach saves a tremendous amount of resources and money by implementing secure transactions through existing magnetic stripe readers already deployed in the field.
- Magnetic stripes following these specifications can typically be read by most point-of-sale hardware, which are simply general-purpose computers that can be programmed to perform specific tasks.
- cards adhering to these standards include ATM cards, bank cards (credit and debit cards including VISA and MasterCard), gift cards, loyalty cards, driver's licenses, telephone calling cards, membership cards, and electronic benefit transfer cards (e.g., food stamps).
- the approach described herein can be used in nearly any application in which value or secure information is stored on the card itself or even in remote storage. For example, health care information can be stored at a central provider. The user can be issued a smart card as described herein.
- the smart card would have some secured data, such as an identification of the user and an account number, as well as a smart card chip that can generate dynamic data (e.g., a code and/or transaction number).
- the user can use the smart card to authorize a doctor or other health care provider to access this secured data (i.e., a transaction) and the backend system would operate in the manner described above to use authorization algorithms with the dynamic data to authorize the transaction (i.e., release of the medical data).
- FIG. 10 is a more detailed block diagram view of the processing components of the card activation unit controller 320.
- the controller 320 includes a microprocessor 1 programmed with memory 2 containing its various operating instructions. Memory 2 includes instruction set 3 for enabling the controller 320 to act as a smart card acceptance device.
- Instruction set 4 includes instructions for allowing the controller 320 to communicate with a smart card controller 216 of smart card 200.
- Instruction set 5 is used by the controller 320 in performing the biometric scanning, template formation, etc. operations of the controller.
- Instruction set 6 includes the general operating instructions of the controller. These operating instructions form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like.
- Operating instructions 2 includes a set of instructions 11 for controlling the display information to the user on the activation unit display 302.
- the operating instructions include sets of transaction application specific instructions 7.
- the transaction specific instructions 7 can include a set of instructions 8 that are specific to Visa, Inc. transactions.
- Instructions 8 include a smart card transaction mapping algorithm that is used by the controller 320 to identify specific data elements in a VISA® smart card transaction data communication received from the smart card chip 218 as well as instructions for constructing a magnetic stripe transaction data structure in accordance the governing specification, including the necessary static data elements and the dynamic card verification data for the magnetic stripe transaction data structure.
- Other instruction sets such as instruction set 9, which is specific to Mastercard, Inc. transactions, and instruction set 10 specific to debit card transactions, etc. are also included.
- FIG. 11 is a block diagram of the processing components of smart card controller 216.
- Smart card controller 216 includes a microprocessor 20 programmed in accordance with operating instructions 21.
- the operating instructions can include, for example, instruction set 22 for managing communications with the activation unit 300.
- the operating instructions 21 also include an instructions set 23 relating to control of the magnetic stripe emulator 214.
- the operating instructions include a general set of operating instructions 24 for controlling the overall operation of the device. These operating instructions form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like.
- operating instructions 21 includes a set of instructions 25 for controlling the display of information to the user on the activation unit display 204.
- smart card controller 422 would incorporate many of the functions performed by activation unit controller 320. That is, in addition to the operating instruction sets described above for smart card controller 216 in FIG. 11, smart card controller 422 can include those instructions sets from FIG. 10 necessary for performing the operations described above in connection with smart card 400.
- FIGS. 12-20 illustrate an embodiment of a transaction system that utilizes a smart card transaction enabled cell phone or other portable wireless communication device.
- FIG. 12 shows a short-range communication enabled cell phone 950 in communication with a NFC enabled companion card 900.
- the short-range communication scheme is Near Field Communication or NFC, which is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10-20 centimeters (about 4-8 inches) distance.
- NFC is an extension of the ISO/IEC 14443 proximity-card standard (contactless card, RFID) that combines the interface of a smart card and a reader into a single device.
- An NFC device can communicate with both existing ISO/IEC 14443 smart cards and readers, as well as with other NFC devices, and is thereby compatible with the existing contactless RFID infrastructure already in use for, for example, public transportation and payment. While the transaction system is described herein in connection with NFC communications, it should be understood that NFC communication is only one possible embodiment and other protocol/approaches for short range communications can be used to communicate between devices.
- the phrase "near field communications" is used herein generically to refer to these short range communications while NFC as an acronym refers to the specific Near Field Communications standard.
- the cell phone 950 is configured for contactless transactions (e.g., contactless credit or debit transactions) using existing NFC techniques.
- existing contactless transaction enabled cell phones cannot be used for magnetic stripe transactions, which is the dominant technology presently in use.
- the cell phone 950 communicates with the NFC enabled companion card 900 by way of NFC communications.
- the cell phone 950 communicates transaction data to the NFC enabled companion card 900 for use in a magnetic stripe transaction using a magnetic stripe emulator.
- this transaction data preferably include any necessary static secured data for performing the transaction as well as dynamic card verification data for use in authorizing the transaction.
- FIG. 13A is a frontal view of the NFC enabled companion card 900 and FIG. 13B illustrates the internal and some rear components of the NFC enabled companion card 900.
- the NFC enabled companion card 900 has a smart card body 902 that is shaped like a conventional credit or transaction card.
- the smart card includes an on/off button 906 for powering the smart card on/off and a display 904 for displaying information to the user.
- the NFC enabled companion card 900 includes a smart card controller (i.e., ASIC) 908 in communication with a magnetic stripe emulator.
- ASIC smart card controller
- the NFC enabled companion card 900 also includes an internal battery power source 916 for powering at least the smart card controller 908 and the magnetic stripe emulator 914.
- the NFC enabled companion card 900 includes a NFC chip (i.e., contactless RF module) that is configured for RF communications via the antenna 912 with another NFC enabled device. While the NFC chip is shown as a separate chip set 910, the NFC functionality can be built into the ASIC that serves as the controller 908.
- the NFC enabled companion card 900 does not need to include a smart card chip, as the smart card application(s) is/are resident on the cell phone 950. [0092]
- FIG. 14 is a block diagram of the processing components of smart card controller 908.
- Smart card controller 908 includes a microprocessor 909 programmed in accordance with operating instructions 911.
- the operating instructions 911 include, for example, instruction set 913 relating to control of the magnetic stripe emulator 914 and instruction set 917 for engaging in NFC communications with another NFC enabled device.
- Instruction set 917 interfaces with NFC chip set 910 if the NFC chip set is a separate component from controller 908 or includes the NFC chip set functionality if the NFC communication functionality is incorporated into the controller 908.
- the operating instructions include a general set of operating instructions 915 for controlling the overall operation of the device. These operating instructions 915 form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like.
- FIG. 15 is block diagram of the relevant processing components of cell phone 950. It should be understood that only those portions of the processing capabilities pertinent to interacting with the NFC enabled companion card 900 for performing a transaction are described herein.
- the general processing capabilities of a cell phone, PDA or other wireless communication device for performing its standard operations e.g., placing a telephone call, communicating via the Internet, email, etc.
- the cell phone 950 includes a controller 960 that includes a microprocessor 962 programmed in accordance with operating instructions 963.
- the operating instructions 963 include a set of general operating instructions 964. These operating instructions 964 form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, the display of information to the user on display of the cell phone and the like.
- Instruction set 966 includes one or more smart card applications 966 for performing contactless smart card transactions, such as by way of NFC communications. These instructions correspond to the VISA® smart card transaction applications, MASTERCARD® smart card transaction applications, debit transaction application, information access transaction, etc. described above as being resident in secure memory of the smart card chips 218, 424 discussed above.
- These applications 966 initiate transactions using secured data stored in the device, generate dynamic card verification data (e.g., the dCVV code for VISA® transactions and transaction counters) and provide information for display to a user during a transaction.
- These smart card applications 966 are familiar to those artisans in this field.
- the operating instructions 963 also include one or more smart card reader applications 968 for communicating with the smart card applications 966. These instructions correspond to the smart card acceptance device instruction set 3 described above and allow the device to interface with and manage smart card applications 966.
- This application 968 enables the controller 960 to mimic a smart card acceptance device (e.g., a reader) to receive secure communications with the contactless smart card transaction data from the smart card transaction applications 966.
- this "reader” application 966 queries the selected application to return the Track 2 equivalent data.
- this Track 2 data would include the dCVV and the transaction counter data.
- the "reader” application can provide the data to the transaction application specific instructions 970 (described below) to derive Track 1 data for use in a magnetic stripe transaction.
- the magnetic stripe transaction data is passed to the NFC communication program 972, which establishes a peer-to-peer session with an in-range NFC enabled companion card 900.
- the operating instructions 963 include a set of transaction application specific instructions 970 similar to instruction set 7 discussed above in connection with FIG. 10.
- the transaction application specific instructions 970 can include a set of instructions 974 specific to Visa, Inc. transactions.
- Instructions 974 include a smart card transaction mapping algorithm that is used by the controller 960 to identify specific data elements in a VISA® smart card transaction contactless data communication from the smart card application 966 as well as instructions for constructing a magnetic stripe transaction data structure in accordance the governing specification, including the necessary static data elements and the dynamic card verification data for the magnetic stripe transaction data structure.
- Other instruction sets, such as instruction set 976, which is specific to MasterCard, Inc. transactions, and instruction set 978 specific to debit card transactions, etc. are also included.
- the operating instructions 963 can include an instruction set
- FIG. 16 illustrates the use of the NFC enabled companion card 900 in a transactions, specifically a credit transaction, after the magnetic stripe emulator 914 has been encoded with transaction information. Once the magnetic stripe emulator 914 is encoded with the proper transaction data, the NFC enabled companion card 900 is swiped through a standard magnetic stripe reader 1000 connected to a POS device, such as a cash register 1100. If dynamic card verification data is included in the encoded data, that data is used during the authorization process as discussed above. [0098] FIG.
- FIG. 17 is a basic flow diagram illustrating a method of using the NFC enabled companion card 900 and cell phone 950 in a transaction. The details of many of the individual steps shown in FIG. 17 are described above in more detail in connection with the flow diagrams of FIGS. 6-8.
- step 1200 the user turns on the NFC enabled companion card 900.
- the user uses the cell phone (or other wireless communication device) to bring up a list of transaction applications (e.g., debit, VISA, Inc., MasterCard Inc., etc.) and the user selects one of the transactions for use.
- the smart card reader application 968 can query the smart card applications for available applications and the processor 962 displays those applications on the display of the cell phone 950. The user scrolls through the listing and selects an application for use.
- the cell phone 950 can be programmed with a mobile wallet application that allows the user to select from among the installed applications (credit, debit, others) and enable or activate one for use in the next transaction.
- the user is authenticated, such as using biometrics if the cell phone (or smart card) has biometric capabilities or a PIN or password authentication scheme.
- the user brings the NFC enabled companion card 900 within NFC range of the cell phone 950 so that they can communicate with one another. Once in range of one another the NFC enabled mobile phone and the smart card establish a peer-to-peer session and pass data to each other.
- the NFC peer-to- peer session is governed by applicable standards.
- the cell phone 950 using transaction application specific instructions 970, prepares magnetic stripe transaction data for use by the NFC enabled companion card 900.
- the smart card reader application 968 obtains contactless smart card transaction data from the smart card application(s) 966 and provides that information to the transaction application specific instructions 970 to prepare the magnetic stripe transaction data.
- the cell phone 950 transmits the magnetic stripe transaction data to the smart card using NFC communication instructions 972. The transmission of data between the phone and the card can be encrypted according to the established standards covering NFC and ISO 14443 contactless smart cards.
- the NFC enabled companion card 900 receives the magnetic stripe transaction data and the smart card controller 908 controls the magnetic stripe emulator to encode the received magnetic stripe transaction data in its magnetic field.
- the user is notified (through the display 904 of the NFC enabled companion card 900 and/or the display of the cell phone 950) that the card is ready to use in a traditional magnetic stripe reader.
- the user uses the smart card with a standard magnetic stripe reader to perform a transaction.
- the NFC enabled companion card 900 After a successful transaction, at a predetermined time limit or when the user presses the on/off button 906, the NFC enabled companion card 900 deletes any transaction data and is available for use in the next transaction. For security purposes, the NFC enabled companion card 900 retains no useful information related to the transaction.
- the cell phone can also be used in conventional contactless smart card transactions. For the VISA® MSD and MASTERCARD® Magstripe smart card specifications this means that the cell phone returns Track 2 equivalent data.
- the contactless reader application takes Track 2 data and creates Track 1 data since a lot of the information is redundant on the Tracks. The only significant difference in the track data is that the card holder name is on Track 1 but including this information in payment information is sometimes not recommended. The contactless reader then sends this data to the POS system for use in authorizing the transaction.
- FIG. 18 illustrates a system for programming the cell phone 950 with transaction applications and managing those applications. The system operates in much the same manner as the system shown in FIG.
- the system includes Smart Card Managements System 175, which is described above.
- the issuer 173 (or its agent) takes standard account information and a SCMS system 175 and combines the account information with other data to create a load file that is downloaded to the cell phone 950 via the cellular data network 179 and Over the Air (OTA) Provisioning Service 177, such as the Trusted Service Provider service provided by Venyon of Helsinki, Finland.
- OTA Over the Air
- This service is responsible for, among other things, managing the cellular communications during the download of the Load File.
- the mobile phone 950 receives this load file it is routed to the card manager program resident on the phone 950 that controls the installation and activation of the smart card applications on the phone.
- FIG. 19 illustrates an option for storing and charging the NFC enabled companion card 900. More specifically, the NFC enabled companion card 900 is stored in a slot or pocket 951 behind the cell phone 950. A connection is provided to couple the cell phone 950 to the NFC enabled companion card 900 so that the internal battery 916 of the NFC enabled companion card 900 can be recharged by the internal battery of cell phone 950.
- the smart card system described herein provides particular advantages when used in connection with financial transactions, the system is not so limited.
- the smart card system can be used in connection with access to customer records, health records, financial records or other confidential information.
- the term "transaction” as used herein is not limited to financial transactions but rather more genetically refers to the provision of information by way of smart card or magnetic stripe for use in some form of authentication and/or authorization.
- the invention has been described in terms of exemplary embodiments, it is not limited thereto. Rather, the appended claims should be construed broadly to include other variants and embodiments of the invention that may be made by those skilled in the art without departing from the scope and range of equivalents of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Automation & Control Theory (AREA)
- Credit Cards Or The Like (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of a standard transaction card includes a card body, which includes a magnetic stripe emulator for use with the transaction terminal, a smart card chip programmed with at least one transaction application for providing secured data for use in a transaction and dynamic card verification data, a power supply, and a card controller in communication with the magnetic stripe emulator. The card controller is configured to receive the dynamic card verification data and control the magnetic stripe emulator to emit a magnetic field encoded with at least a portion of the secured data and the dynamic card verification data.
Description
SECURE SMART CARD SYSTEM
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Patent Application
No. 61/090,358, entitled "Biometrically Secured Powered Smart Card," filed August 20, 2008, the entirety of which is hereby incorporated by reference herein. [0002] This application also claims priority to U.S. Provisional Patent
Application No. 61/090,362, entitled "NFC Cellphone Companion Card," filed August 20, 2008, the entirety of which is hereby incorporated by reference herein.
FIELD OF THE INVENTION
[0003] The present invention relates to transaction cards, and more particularly to smart cards and to transaction cards having magnetic stripe emulators.
BACKGROUND OF THE INVENTION
[0004] Plastic card fraud has become a significant issue not only in the United
States but also worldwide. Fraud levels can be measured in the tens of billions of dollars each year or higher when the various stakeholders that are involved in the losses associated with fraudulent transactions measure their total costs. A merchant loses not only the revenue and profit related to a sale, but the product itself, and possibly higher transaction fees when fraud occurs frequently in its business. A merchant must also incur the costs associated with investigating certain types of fraudulent transactions. Credit card associations like the VISA® and MASTERCARD® associations cover some costs associated with fraud but the credit card issuers incur significantly more costs, including costs associated with refunding the amounts charged to a card holder account, investigating possible fraudulent transactions and issuing new plastic cards if a significant breach of security has been identified. When the total costs of fraud are measured among all the parties involved in financial transactions, the losses are staggering.
[0005] Plastic card fraud has also opened up a market for all sorts of fraud detection and educational services. Neural network software to detect and hopefully prevent a fraudulent transaction from occurring costs card issuers and their processors millions of dollars to operate. Educational seminars to teach card issuers, merchants,
and card holders on how to better safeguard the information that can be used to commit identity theft and plastic card fraud also cost card issuers millions of dollars. Existing security standards, like the Payment Card Industry (PCI) Data Security Standard, while being excellent network and system security practices also require merchants to take extra measures to safeguard the information they possess and these measures cost merchants millions of dollars to implement. An entire industry has been created to protect the static data used in today's plastic card transactions. All told, billions are spent and still fraud levels continue to increase. These increases are due not only to defective security; rather, plastic card programs continue to utilize static data that, if obtained, can be used to commit plastic card fraud. [0006] Over the years, the industry has continued to layer additional static data on credit, debit, and ATM transaction cards. Pin numbers and card security codes have been implemented to help address specific issues of security but criminals continue to adapt their schemes to steal this information. Social engineering attacks like "phishing" are successful because they can target large numbers of people to obtain this static data. The use of holograms and new logos to help prevent counterfeit cards from being used has added to the costs of plastic cards. The plastic card industry has focused on preventing the use of static data rather than adopting a means of implementing some level of dynamic information into these transactions. [0007] Some in the industry have viewed smart cards as one possible solution to this static data problem. The contact and contactless smart card standards and the hardware integrated into the smart card, the point of sale (POS) device, and the authorization process have adopted methods to include some dynamic data in the transaction authorization process. When implemented on a massive scale, for example the Chip and Pin systems common in Europe, these standards have been effective in the local prevention of fraud. For example, the Chip and PIN system in the United Kingdom is a government-backed initiative to implement the EMV standard for secure payments. In this initiative, banks and retailers replace traditional magnetic stripe equipment with smart card technology, where credit/debit cards contain an embedded microchip and are authenticated automatically using a PIN. When a customer wishes to pay for goods using this system, the card is placed into a "PIN pad" terminal (often by the customer themselves) or a modified swipe-card reader, which accesses the chip on the card. Once the card has been verified as
authentic, the customer enters a 4-digit PIN, which is checked against the PIN stored on the card; if the two match, the transaction completes.
[0008] This kind of smart card technology has been shown to decrease certain types of fraud, an example being fraud associated with counterfeit cards, but fraud in total has continued to rise. This is due to the fact that smart cards are only implemented on a scale necessary to affect fraud regionally. Criminals can target other regions that still rely on the static information common to the vast majority of plastic cards in circulation or they can perform more "card not present" transactions, as in internet purchases or mail order transactions. Smart cards also suffer from having to continue to support the predominate point of sale reader technology deployed worldwide, i.e., magnetic stripe.
[0009] Implementing smart cards on a scale necessary to significantly affect fraud levels requires billions of dollars to be spent by merchants or governments to add the new point of sale readers, update the point of sale software, and add the processing functionality for all stakeholders that deal with financial transactions. There are an estimated 20,000,000 magnetic stripe readers in the field today. Replacing these readers with smart card readers would be a huge investment. [0010] An improved and more cost-effective solution for preventing plastic card fraud is desired.
SUMMARY OF THE INVENTION
[0011] A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of a standard transaction card includes a card body, which includes a magnetic stripe emulator for use with the transaction terminal, a smart card chip programmed with at least one transaction application for providing secured data for use in a transaction and dynamic card verification data, a power supply, and a card controller in communication with the magnetic stripe emulator. The card controller is configured to receive the dynamic card verification data and control the magnetic stripe emulator to emit a magnetic field encoded with at least a portion of the secured data and the dynamic card verification data.
[0012] The above and other features of the present invention will be better understood from the following detailed description of the preferred embodiments of the invention that is provided in connection with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0013] The accompanying drawings illustrate preferred embodiments of the invention, as well as other information pertinent to the disclosure, in which:
FIG. 1 is a block diagram of a smart card application management system;
FIGS. 2A and 2B illustrate a smart card according to one embodiment of the present invention;
FIGS. 3 A and 3B illustrate a smart card activation unit for use with the smart card of FIGS. 2A and 2B according to an embodiment of the present invention;
FIGS. 4A and 4B illustrate an alternative embodiment of the smart card of FIGS. 2A and 2B;
FIGS. 5A and 5B illustrate an alternative embodiment of a smart card activation unit for use with the smart card of FIGS. 4A and 4B;
FIG. 6 is a flow diagram illustrating a method of enrolling biometric information on a smart card;
FIG. 7 is a flow diagram illustrating a method of authenticating a user using biometrics;
FIG. 8 is a flow diagram illustrating a method of selecting and activating a transaction application on a smart card;
FIG. 9 illustrates a data format for Track 1 and Track 2 for a credit transaction;
FIG. 10 is a block diagram of controller of the activation unit of FIGS. 3 A and 3B;
FIG. 11 is a block diagram of the controller of smart card of FIGS. 2A and 2B;
FIG. 12 illustrates an embodiment of the present invention utilizing a cell phone/companion card combination for performing magnetic stripe transactions;
FIGS. 13A and 13B illustrate an embodiment of a NFC enabled companion card for use in the combination of FIG. 12;
FIG. 14 is a block diagram of the controller of the NFC enabled companion card of FIGS. 13A and l3B;
FIG. 15 is a block diagram of the processing components of the cell phone illustrated in FIG. 12;
FIG. 16 illustrates a transaction system using the companion card of FIGS. 13A and 13B;
FIG. 17 is a flow diagram illustrating the use of the companion card and cell phone of FIG. 12 in a transaction;
FIG. 18 illustrates a system for programming the cell phone of FIG. 12; and
FIG. 19 illustrates an embodiment of the cell phone illustrated in FIG. 12.
DETAILED DESCRIPTION
[0014] This description of the exemplary embodiments is intended to be read in connection with the accompanying drawings, which are to be considered part of the entire written description. In the description, relative terms such as "lower," "upper," "horizontal," "vertical," "above," "below," "up," "down," "top" and "bottom" as well as derivative thereof (e.g., "horizontally," "downwardly," "upwardly," etc.) should be construed to refer to the orientation as then described or as shown in the drawing under discussion. These relative terms are for convenience of description and do not require that the apparatus be constructed or operated in a particular orientation. Terms concerning attachments, coupling and the like, such as "connected" and "interconnected," refer to a relationship wherein structures are secured or attached to one another either directly or indirectly through intervening structures, as well as both movable or rigid attachments or relationships, unless expressly described otherwise. [0015] In the following description, it is to be understood that aspects of the present invention may be implemented in various forms of hardware, software,
firmware, or a combination thereof. In particular, the device modules described herein are preferably implemented in software as an application program that is executable by any suitable microprocessor architecture. The microprocessor architecture includes hardware such as one or more central processing units (CPU), a random access memory (RAM), and input/output (I/O) interface(s), as well as an operating system and microinstruction code. The various processes and functions described herein may be either part of the microinstruction code or application programs which are executed via the operating system.
[0016] It is to be further understood that, because some of the constituent system components described herein are preferably implemented as software modules, the actual system connections shown in the Figures may differ depending upon the manner in which the systems are programmed. It is to be appreciated that special purpose microprocessors may be employed to implement the present invention. Given the teachings herein, one of ordinary skill in the related art will be able to contemplate these and similar implementations or configurations of the present invention.
[0017] As described in the Background section, massive investments have been made in the estimated 20,000,000 magnetic stripe readers in the field today. Replacing these readers with smart card readers would be a huge investment. Presented herein is are devices, systems and methods that perform secure transactions while making use of the existing magnetic stripe readers and all, or as much as possible, of the existing infrastructure for, for example, financial transactions. More specifically, the embodiments described herein make it possible to implement some dynamic data in transactions utilizing magnetic stripe readers while making it economical for card issuers to distribute this technology to their customers. This approach can serve as an effective safeguard for secured static credit card (or other) information and thus act as a significant tool against fraudulent transactions. The existing standards for magnetic stripe based financial transactions contain regions that can be requisitioned for use with dynamic data. In certain preferred embodiments, a smart card is provided that can support all point of sale (POS) readers, i.e., contact smart card readers, contactless smart card readers and magnetic stripe readers, and deliver dynamic data content through not only the smart card readers but also the magnetic stripe point of sale devices.
[0018] Existing smart card specifications for contactless and contact transactions call for the smart card chip to generate some dynamic data for inclusion in the transaction. By way of example only, Visa Inc.'s MSD contactless smart card specifications includes a code designated Dynamic Card Verification Value (dCVV) for each transaction. MasterCard Inc.'s PAYPASS® Magstripes smart card specification has a similar code designated the CVC3. These one-time (i.e., dynamic) codes are generated by the smart card chip and are unique to each transaction. Traditional magnetic stripe specifications for Track 1 and Track 2 contents require a specific static value called a CVV to be present. Replacing the static CVV value with the dynamic dCVV or CVC3 codes (in the embodiments where the data is formatted for VISA® and MASTERCARD® transactions, respectively) and including any other necessary data used to verify the dCVV or CVC3 codes (e.g., Application Transaction Counter (ATC) value and dynamic data presence flag) would provide sufficient information in the payment authorization process to eliminate both "card present" and "card not present" fraud. Dynamic data generated by a smart card chip for use in authorization of transactions (whether financial, information access or other) are genetically referred to herein sometimes as "dynamic card verification data."
[0019] As described herein, necessary information for performing secure card not present transactions can be displayed on the smart card display. This information can include the dCVV or CVC3 codes discussed above that are generated by the smart card for use in card present transactions, or other dynamic information, such as a onetime-password (OTP). Companies and organizations such as QSecure of Los Altos, CA, InCard Technologies of Los Angeles, CA, RSA Division of EMC Corporation of Bedford, Massachusetts, and OATH (Open AuTHentication) initiative and others have proposed various OTP schemes for inserting a dynamic code into the payment process. The device described below allows for existing smart card standards to be used in the generation and verification of OTP values rather than require card issues to support multiple OTP algorithms.
[0020] FIG. 1 is a block diagram of a system 100 for managing applications on a smart card. The system 100 includes a smart card 200, a smart card activation unit 300, which communicates with smart card 200, and a personal computer (or other processor) 125, which is communicatively coupled through a network (such as
Internet 150) to Smart Card Management System (SCMS) 175 and locally communicatively coupled to the smart card activation unit 300. Through system 100, a user can manage transaction applications stored on a smart card chip or processor within smart card 200. More specifically, standards exist for managing applications on smart cards. By way of example only, one set of standards is defined by the GlobalPlatform Card, Device and Systems standards promulgated by GlobalPlatform, which is an independent, not-for-profit organization concerned with a standardized infrastructure for development, deployment and management of smart cards. GlobalStandards was founded in 1999 to take responsibility for Visa Inc.'s Open Platform specification, which is one of a number of competing smart card standards including GSM, EMV and OCF.
[0021] The GlobalPlatform Card Specification is a secure, dynamic card and application management specification that defines card components, command sets, transaction sequences and interfaces that are hardware-neutral, operating system neutral, vendor-neutral and application independent. The specifications are applicable to any type of application and industry, allowing any combination of applications from any industry on a single card - from mono-application to multi- application. The GlobalPlatform Card Security Requirements Specification provides guidance for selecting card configurations most appropriate to the security policies set up by the card issuer and application providers. Card vendors are also provided with guidance to implement security functions in a consistent manner. Most of the secure elements used in the Near Field Communication (NFC) context rely on GlobalPlatform card specification.
[0022] GlobalPlatform also provides a number of specifications for device programming, with different profiles for different industries. The profiles are organized around a common core framework technology and share most of their detailed API's. There are a number of GlobalPlatform specifications relating to the system's infrastructure, developed to standardize back-end systems from personalization to security, key management and application loading. The GlobalPlatform Profile Specification standardizes the interface between the data preparation system and the personalization device utilizing a simple, cost effective, interoperable machine -independent mechanism. Key Management Systems Functional Requirements Specification standardizes the description, or key profile,
and procedures around key management, providing an opportunity to deliver centralized key management across separate systems. Communication between various components of the system's infrastructure is standardized via the GlobalPlatform Messaging Specification, which defines all the roles and responsibilities of the actors, or systems, for a multi application smart card infrastructure.
[0023] Referring again to FIG. 1, the smart card 200 is shown docked (or otherwise interfaced) with the smart card activation unit 300, which, as described in more detail below, preferably takes the form of a sleeve with a slot for receiving the smart card 200. The SCMS system 175 is a server based application that manages all information necessary to create a Load File. This Load File is the program code and data that are used to install applications on a GlobalPlatform compliant smart card like the Card 200. The user establishes a session to the SCMS System 175 over the Internet 150 and downloads the Load File to the smart card through the connection between the PC 125 and smart card activation unit 300. The smart card activation unit 300 acts as a PC/SC (Personal Computer/Smart Card) compliant device and delivers the Load File to the GlobalPlatform compliant Card Manager running in the Smart Card Chip operating system (e.g. Java Card, Multos, etc.). The Card Manager handles the steps involved in installing the application. All the steps involved in this process are defined by the GlobalPlatform System, Device, and Card standards. The PC/SC specification was developed to facilitate the interoperability necessary to allow Integrated Circuit Card (ICC) technology, also known as smart cards, to be effectively utilized in the PC environment. The PC/SC specification is based on the ISO 7816 standard, and its formal name is "Interoperability Specification for ICCs and Personal Computer Systems."
[0024] The use of SCMS system in managing smart card applications is familiar to artisans in the relevant art. Briefly, the user gains access to the SCMS system 175 either through their web banking software or directly by using username/password credentials. The SCMS system presents the user with a list of applications already installed on the user's smart card and a list of applications available for downloading to the smart card. This process is called Post Issuance Provisioning and provides the ability to add or change applications on a smart card after it has been issued to the card holder. The user can select to download a VISA®
Credit Card application issued by their financial institution and the SCMS would use other related information to generate the load file, manage a secure communications channel with the smart card and download the load file to the smart card. The SCMS tracks all information about the smart card, e.g., chip identifier, OS, keys, issuer, card holder information and what changes have occurred to the applications on the card. The Global Platform System standard dictates the necessary functionality that is supported by a SCMS system.
[0025] Further details regarding use of the smart card activation unit
300, besides its use in managing applications on the smart card 200, such as its use in authenticating that a valid user is performing a transaction and its use in selecting an application (credit, debit, loyalty, access control, etc.) for use in a transaction, are described below, along with additional details regarding the smart card 200. [0026] FIG. 2A is a front view of the smart card 200, more specifically the smart card body 202, and FIG. 2B is a schematic illustration of the internal and rear side components of the smart card 200 and smart card body 202. The smart card body 202 takes the shape of a standard plastic magnetic stripe card, as governed by applicable standards. The card 200 may include the logo 208 of the card issuer or other source indicia. In embodiments, the card 200 includes a display 204, such as a LCD display. In embodiments, the display 204 can take the form of electronic paper, also called e-paper or electronic ink display. This display technology is designed to mimic the appearance of ordinary ink on paper. Unlike a conventional flat panel display, which uses a backlight to illuminate its pixels, electronic paper reflects light like ordinary paper and is capable of holding text and images indefinitely without drawing electricity, while allowing the image to be changed later. Examples of e- paper displays include electrophoretic displays, bistable LCD and cholesteric LCD. Smart card contact pad 206 is provided on a surface of the card for contact-based communications between an embedded smart card chip and a smart card reader. Smart card contact pad 206 is used to perform transactions on devices supporting the ISO/IEC 7816 standards. In Europe and in Canada this would include the Chip & Pin devices used to perform payment transactions. Contact smart cards are also common in physical access control systems.
[0027] Turning to FIG. 2B, the card 200 includes an internal power source
212, such as a battery, for providing power to the various operable components of the
smart card 200. Suitable long life batteries for the low power requirements are available. In particular embodiments, the internal power source 212 is a thin film battery, such as the FLEXION™ ultra-thin, flexible lithium polymer battery available from Solicore, Inc. or a lithium thin- film battery available from Varta Microbattery GmbH. In embodiments, a solar panel (not shown) may be provided. Solar cells are connected to a charger and can be used to extend the life of the card beyond that of a conventional battery and/or to recharge the battery. The card 200 includes a conventional smart card chip/processor 218 which communicates with an appropriately configured external smart card reader by way of the smart card contact pad 206 or wirelessly by way of integrated antenna 220 (i.e., contactless communication) .
[0028] The smart card 200 also includes a smart card controller 216 (i.e.,
ASIC processor) in communication with an I/O port 210, for communicating with an external source such as the card activation unit 300 (as described in more detail below) and a magnetic stripe emulator 214. Various designs for magnetic stripe emulators are known in the art, some of which are described in, for example, U.S. Patent No. 4,701,601 to Francini et al., entitled "Transaction Card with Magnetic Stripe Emulator", and U.S. Published Application Nos. 2007/0189581 and 2005/0194452 to Nordentoft et al., both entitled "Credit Card and Secured Data Activation System," the entirety of each of which is hereby incorporated by reference herein. A typical magnetic stripe emulator will include a transducer coil for each magnetic strip track and including a number of coil windings wound around a strip of electromagnetically inducible core material. Each transducer coil is individually inducible by a driver circuit. Instead of an electromagnetic coil, the transducer can be formed from an integrated thin film head. The number of transducer coils may be chosen to three in order to induce secured data signals corresponding to conventional magnetic strip information, which lies in magnetic strips in three tracks, but may as an alternative be provided in numbers ranging from one to more than three. For most applications, data is only to be generated in two transducer coils as shown for emulator 214, corresponding to the first and second tracks of a conventional magnetic strip.
[0029] In conventional magnetic strips, the data is permanently magnetically presented to a credit card reader using a so-called F2F-format, or two frequency
format, in which a "0" bit is formed by a magnet part of a predetermined length in the magnetic strip, and a "1" bit is two longitudinally, magnetically oppositely directed magnet parts, having a combined length equal to the length of the "0" bit magnet part. Thus, the transducer coils of the emulator 214 preferably emit and present data signals in the F2F-format to a reader, such as a credit card reader, which is to read information from the card 200 with a reader head.
[0030] The transducers generate varying magnetic fields that extend beyond the carrier. The transducer coil preferably produce a homogenous and relatively strong magnetic field encoded with the desired data in order for it to be readable by a credit card reader. The nature of this magnetic field is heavily influenced by the transducer coil construction, such as choice of core material and core construction of the cores strips, number and position of the core windings upon the core strips. The design of the emulator 214 based on these factors is within the skill of the artisan in this field. Variations in the signals to a transducer coil generates a variable magnetic field along the strip that is identical to the magnetic field that a reader head is influenced by when a conventional magnetic strip credit card holding the same secured data is passed through the same reader.
[0031] The material of the core strip is an electromagnetically inducible material, such as metal, preferably electromagnetic lamination, sheet iron or other sheet metal, either provided as a single or double foil on one or each side of the card body, advantageously having a width and a position corresponding to a conventional magnetic track in order to have a similar magnetic and physical appearance. The choice of core material of the core strips strongly influences the strength and distribution of the magnetic field produced and allows for an enhancement of the magnetic field being produced, resulting in the need for lower current in the core windings, which reduces the power consumption of the card.
[0032] The transducer strips of the magnetic stripe emulator 214 are positioned on card 200 in a manner such that alignment with the read sensor of existing reader terminals is facilitated. Current specifications call for the magnetic stripe to be located 0.223 inches (5.66 mm) from the edge of the card, and to be 0.375 inches (9.52 mm) wide. Each track is 0.110 inches (2.79 mm) wide. [0033] The card controller 216 controls all aspects of the functionality of the card 200 that are not provided by the conventional smart card chip 218. The card
controller is preferably a separate processor from the smart card chip, thereby enabling the use of the already standardized smart card chip 218. While it is contemplated that in alternative embodiments the functions of the card controller 216 and smart card chip 218 could be merged, such a merged approach not preferred as it is more difficult to implement and would likely face difficulties in meeting EMV certification standards for the device. Further, it should be understood that although card controller 216 is shown as a single processor, its functions or operations could be distributed amongst two or more processors, controllers, drivers, chips or other devices (collectively referred to herein as "controller"). For example, the card controller 216 serves as a driver for managing the display 204. This functionality can be built into a central processor or provided in the form of a separate driver chip. Likewise, the card controller 216 can have built in wireless capabilities for interfacing with antenna 220 to communicate with card activation unit 300, or include a separate wireless communications chip (shown as activation unit interface 210) for exchanging information with the unit 300. In embodiments, activation unit interface 210 is a wireless RS485 chip for implementing wireless communications with the activation unit 300. Alternatively, the interface 210 could be a wired communications interface, such as a RS232 chip. While it is possible to use the contact pad 206, antenna 220, and the smart card chip 218 as the means for communicating with the activation unit 300, this approach would also require that the smart card operating system (OS) be modified to indentify these non-standard communications and intercept and redirect the communications to the card controller 216. This approach would likely be in violation of the EMV standards and thus prevent the device from being certified for use. Using a separate interface 210 for performing communications between the activation unit 300 and the smart card controller 216 leaves the smart card chip 218, smart card contact pad 206 and antenna 220 as a stand-alone system, allowing the smart card 200 to pass EMV certification testing. Although not shown, the card 200 can includes a peripheral communications controller (e.g., SPI bus) for passing information between various components.
[0034] The card controller 216 controls the magnetic stripe emulator 214 for transmitting secure transaction data during a transaction, e.g., a credit card swipe transaction. Importantly, this data includes not only standard secured data, such as the static transaction data called for by governing specifications (e.g., account holder
name, account number, etc.) but also dynamic information. Using this dynamic information in authorizing transactions prevents fraudulent transactions since the static information alone cannot be used to perform a transaction. [0035] As explained above, the smart card chip 218 is a dual interface smart card (contact and contactless) found in many of the multi-application smart cards available in the market today. There are established standards and standard bodies (e.g., ISO/IEC 7816, ISO/IEC 14443, GlobalPlatform (described above) to name a few) that define this component's functions. These standards provide for secure communications and access to installed applications and data stored in secure memory. As described below, the smart card activation unit 300 communicates with the smart card chip 218 to allow a user to select an active application, queries the application for any necessary information for performing a transaction, and pass some of this information back to the card, specifically the card controller 216 for use in the magnetic stripe emulator 214 and/or display on the card display 204. [0036] In addition to its use in managing applications on the smart card 200, the smart card activation unit 300 is also used during transactions to authenticate that a valid user is performing the transaction and to select what type of card application (e.g., credit, debit, loyalty, access control, etc.) is going to be used in the transaction. These uses are described below but first various features of the smart card activation unit 300 are described in connection with FIGS. 3A and 3B.
[0037] FIG. 3A is a front external view of the smart card activation unit 300.
The activation unit 300 includes a biometric sensor 312, which is preferably a fingerprint reader, and a user interface. In the illustrated embodiment, the user interface includes an input means 304 (e.g., keypad), including various input buttons or toggles, such as "scroll" button 306, "ok" button 308 and "on/off button 310, and a display 302, such as a LCD display. The on/off button 310 is used to turn the activation unit 300 on and off. The scroll button 306 is used to scroll through a list of applications stored on the smart card chip 218 of the smart card 200 and displayed on display 302. A list of names (e.g., "VISA", "MASTERCARD", etc.) or other identifiers corresponding to these applications is displayed on the display 302. The user uses the button 308 to select an active application from the displayed list of applications.
[0038] FIG. 3B illustrates the internal components of the activation unit 300.
The activation unit includes an activation unit controller 320 that controls and interfaces with the other active components of the activation unit 300. The activation unit includes a smart card interface 322 for contact interfacing with the smart card chip 218 of the smart card 200. In the illustrated embodiment, the smart card interface is a contact based solution (ISO/IEC 7816) and communicates with the smart card chip 218 through smart card contact 206 on the face of the smart card 200. As will be understood by those familiar with smart card communications, the smart card contact pad 206 has eight contact areas to support the communications: cl is assigned to the supply voltage; c2 is assigned to a reset signal; c3 is assigned to a clock signal; c4 is not used; c5 is assigned to ground; c6 is not used; c7 is for I/O; and c8 is not used. The interface 322 corresponds to these electrical contacts, i.e., provides a physical connection to the pad 206 when the smart card and activation unit 300 are connected. The sleeve controller 320 can also use the contactless standard to communicate with the dual interface smart card chip 218 through the antenna 324. Contactless communication with the smart card chip 218 can be accomplished with either NFC or Standard ISO/IEC 14443 components.
[0039] The activation unit also includes smart card controller interface 318 for wired (e.g., RS232) or wireless (RS485) wireless communications with the interface 210 of the smart card 200.
[0040] In embodiments, the activation unit 300 includes an internal power source represented as battery power source 314. The battery power source 314 can be a standard rechargeable lithium polymer battery commonly used in cell phones, PDA devices, hand held games and the like. An alternate or additional power source for the activation unit 300 is USB PC connection 316. This PC Connection 316 serves as the means by which PC and Internet based software download content and applications to the card 200 as described above in connection with FIG. 1. PC/SC is the standard for connection and interaction with a smart card acceptance device like activation unit 300. The activation unit 300 can both read and write content to the smart card 200 using established standards like PC/SC and GlobalPlatform Card and Device standards.
[0041] When the activation unit 300 is turned on and the smart card is docked with the activation unit 300 (as shown in FIG. 1, for example), the biometric sensor
312 is used to authenticate the user to the smart card 100. In one preferred embodiment, this authentication process is accomplished by a smart card application resident at smart card chip 218 referred to as "Match on Card." Various companies, such as Precise Biometrics of Sweden, Sagem Orga of Germany and others supply this type of application for smart cards for use in access control solutions. The biometric sensor 312 captures a live image of a presented user's fingerprint. The live image is processed by software running on the controller 320 or by a separate processor (not shown) to generate a template from this image data. The sleeve controller communicates with the biometric sensor and transmits the template file through either smart card interface 322 or antenna 324 to the smart card chip 218, specifically to the Match on Card application running on the smart card chip 218. The Match on Card application compares this received live template file with one or more templates that have been previously stored in the smart card chip 218 (or associated memory). The result of the comparison is either a success or failure result. A Success results will allow the user to proceed, and a Failure result will stop any future use of the activation unit until a Success result is achieved. If the user cannot complete this authentication step, the user cannot use the smart card 100 for any transactions. That is, the smart card 200 is not unlocked.
[0042] The smart card application that is selected by the user for use is unlocked until the card is placed back into the sleeve. When the sleeve senses the presence of the card it will perform the necessary functions to lock all resident applications. The magnetic stripe 214 of the smart card is in active (transmit) mode until either the completion of a swipe or a timeout has occurred, or when the card is placed back into the sleeve. The timeout length is preferably user definable. [0043] Although the authentication means is shown as a biometric system, other authentication systems may be used. For example, a secure PIN or password can be stored on the smart card chip 218. In this embodiment, the user inputs the PIN or password rather than present a finger to be authenticated.
[0044] While the activation unit 300 is shown as a stand-alone device, the activation unit 300 and its functionality can be incorporated into other devices, such as a personal digital assistant or other portable devices such as a cell phone. To the extent this device has Internet capabilities, the device could provide both the activation unit and computer aspects of the system of FIG. 1.
[0045] As described in more detail below in connection with the flow diagram of FIG. 8, the sleeve controller 320 uses a card Interface 318 to communicate any necessary information to the smart card for display on the card display 204 and for transmission through the magnetic stripe emulator 214. Application specific information can be displayed for visual verification or other typical plastic card risk management functions like comparing a displayed name against another form of identification. In preferred embodiments, the card interface 318 and card controller 216 communicate via wireless RS-485, but, as explained above, wired communications (e.g., RS-232) with interface I/O 210 can also be used. [0046] FIGS. 4 A and 4B illustrate an alternative embodiment of the smart card 400. In this embodiment, many of the components of the activation unit 300 are incorporated into the smart card 400. The smart card body 402 includes a smart card contact pad 406, an optional logo 408, a biometric sensor 410, and a user interface including a display 404 and a user input keypad 412 including scroll button 414, OK button 416 and on/off button 418. With reference to FIG. 4B, the card 400 includes smart card controller 422, which is coupled to magnetic stripe emulator 430, smart card chip 424 and antenna 426. The card 400 includes an internal battery power source 420.
[0047] The card 400 can be used with a simplified activation unit 500 illustrated in FIGS. 5 A and 5B. In this embodiment, the activation unit 500 includes a sleeve controller 502 and a PC interface 504 and is operable only for managing applications on the smart card chip 424. The sleeve controller 502 communicates with the smart card chip 424 of the card 400 through either contact communications via smart card contact interface 506 (described above) or contactless communications using antenna 508. The activation unit is essentially a standard smart PC/SC card acceptance device for supporting smart cards, such as those devices sold by Advanced Card Systems Ltd. Of Hong Kong, Gemalto (formerly Gemplus) of the Netherlands, Fujitsu of Japan and others. In this embodiment of the smart card 400, the card controller 422 communicates directly with the smart card chip 424 through an interconnect with the smart card chip 424 rather than through the activation unit. The smart card chip 424 must support some form of bus design, like SPI, to communicate with an outside controller chip like the card controller 422.
[0048] In use, the user uses keypad 412 to turn on the card 400. As described above in connection the embodiments of card 200 and activation unit 300, the biometric sensor 410 captures a live image and it is converted to a template by appropriate software, which is provided to the Match on Card application resident on the smart card chip 424. A successful match against a previously stored template authenticates the user and activates the card for use. The user then used keypad 412 to scroll through the available applications on the smart card chip 424 and to select one of the available applications for use. Once an application is selected, the controller 422 retrieves the secured static and dynamic data for the application and controls magnetic stripe emulator 430 to emulate this data, thus allowing the smart card 400 to be used with a conventional magnetic stripe reader but with the further advantages of enhanced security and fraud prevention provided by the use of the dynamic data. Of course, the card could also be used with conventional smart card readers. For card not present transactions, the controller 422 controls display 404 to display any necessary information for performing the transactions (e.g., dynamic card verification data such as a dynamic code or one time password or other data). [0049] FIG. 6 is a flow diagram of the biometric enrollment process for initializing the smart card 200 with a user's fingerprint template for later use in authenticating the user during transactions. While the method is described in connection with smart card 200, the method is equally applicable to modified smart card 400. This process determines what users can access applications stored on the smart card chip 218.
[0050] At step 600, the user docks the smart card 200 with the activation unit
300 and turns on the activation unit using on/off button 310 of the keypad 304. [0051] At step 601, the user places a finger on the biometric sensor 312. In embodiments, this sensor can be a silicon based area sensor or a swipe sensor commonly found on many laptops.
[0052] At step 602, the biometric sensor 312 captures the fingerprint image, and at step 603 the image quality is checked to make sure enough relevant points are identified to enable accurate authentication using the fingerprint. [0053] At step 604, if the image quality is not sufficient the user is prompted to repeat the capture step (via display 302) and the process returns to repeat steps 601 to 603.
[0054] At step 605, if the image is of sufficient quality (as determined at step
603), the biometric sensor 312 processes the image into a template file of the representative data points.
[0055] At step 606, the template is stored in the secure memory of the smart card chip 218, which can be accessed in the future by the Match on Card application of the smart card chip 218.
[0056] At step 607, the user is asked if another image should be captured for future comparison. If another image is requested the process is repeated. If no additional images are to be captured the process terminates at step 508.
[0057] FIG. 7 is a flow diagram of the user authentication process. Assuming biometrics are used for authentication, this process is only used after the user completes the biometric enrollment process described above in connection with FIG.
6.
[0058] At step 700, the user docks the smart card 200 with the activation unit
300 and turns on the activation unit using the on/off button 310 of keypad 304.
[0059] At step 701 , the user places a finger on the biometric sensor 312.
[0060] At step 702, the biometric system captures the live biometric image.
[0061] At step 703, the biometric system checks the image quality to determine if there are a sufficient number of data points for comparison.
[0062] At step 703, if quality is determined to be insufficient, the user is notified at step 704 (through display 302) that the image capture step must be repeated.
[0063] At step 705, if the image is of sufficient quality (as determined at step
703), the biometric system processes the image into a template file of the representative data points.
[0064] At step 706, the template file is submitted from the activation unit 300 to the Match on Card application of the smart card chip 218 for comparison to the template(s) that were stored during the biometric enrollment process (FIG. 6).
[0065] At step 707, the Match on Card application returns a value of success or failure.
[0066] At step 708, if a failure to match occurs the user is notified of the result
(via display 302), returned to step 701 and prompted to place a finger on the biometric sensor.
[0067] At step 709, if a successful match is determined the user is notified (via display 302) and the process ends (step 710) by sending the user to the application selection process defined in FIG. 8. At this point, the user has been authenticated and the card id active.
[0068] While the method of FIG. 7 is described in connection with smart card
200 and activation unit 300, the method is equally applicable to modified smart card
400. That is, the process is performed entirely within the smart card 400 rather than by using the activation unit 300.
[0069] FIG. 8 is a flow diagram illustrating an application selection process where an application is selected for use in a transaction and the magnetic stripe emulator of the smart card 200 (or 400) is primed for use in the transaction. The method FIG. 8 follows the user authentication process of FIG. 7.
[0070] At step 800, the user successfully activates the device using the method of FIG. 7.
[0071] At step 801, the activation unit 300, specifically the activation unit controller 320 through, for example, the smart card interface 322, performs a query of the smart card chip 218 to obtain a list of its installed applications.
[0072] At step 802, the activation unit controller 320 generates a list of applications and displays the list on the display unit 302.
[0073] At step 803, the user presses a key on the keypad 304.
[0074] If the user pressed the on/off key 310 at step 803, the activation 300 unit is turned off at step 804. The function to lock all applications on the smart card is called when the user turns off the card activation unit while card is in the activation unit or when a card is placed back into the card activation unit.
[0075] At step 805, if the user pressed the scroll key 306 at step 803, the next item on the list is highlighted. If the user had scrolled to the last application on the list the highlight is returned to the first application on the list and control is passed back to step 803 where the activation unit waits for the next key to be pressed.
[0076] At step 806, if the user pressed the ok key 308, the life cycle status of the application selected is changed to "unlocked" and the other applications have their life cycle statuses changed to "locked" (step 807). Application lifecycles and the methods of changing them are defined in the GlobalPlatform Card and other standards discussed above.
[0077] Steps 808 to 810 represents steps that enable the use of smart card dynamic card verification data in magnetic stripe transactions. At step 808, the activation unit 300, through its controller 320 acting as a GlobalPlatform device (or other device if another standard is employed) queries the user-selected application from the smart card chip 218 and obtains the necessary data values to be used by the smart card 200 in constructing the magnetic stripe data and any data elements for display on the card display 302. During step 708, any necessary keys are passed from the activation unit 300 to the smart card application to authenticate activation unit 300 as a valid GlobalPlatform (or other) device, according to the applicable industry standard.
[0078] At step 709, a mapping algorithm is used by the controller 320 to take the output from the query of the smart card application to format a data stream that is to be emulated by the magnetic stripe emulator 214. This algorithm maps the output of the smart card, which is a given number of data bits representing various data elements of a smart card transaction, to various data elements called for in the applicable magnetic stripe transaction specification for the given transaction application. The activation unit can then create a new data stream in accordance with the transaction application rules for the magnetic stripe transaction, including all of the necessary data elements plucked from the smart card data stream (e.g., user name, account number, etc.) but also including dynamic card verification data. In embodiments, the dynamic card verification data includes: (a) dynamic data code flag; (b) a dynamic data code (retrieved from the smart card data stream); and (c) an incremental transaction number (also retrieved from the smart card data stream). The controller also received any necessary data for display during card not present transactions.
[0079] At step 810, the activation unit 300 sends the newly created magnetic stripe data and any display data to the smart card controller 216. The card controller 216 then sends the display data to the display 204 and the magnetic stripe data to the magnetic stripe emulator 214.
[0080] At step 811, once all the information is obtained and properly communicated to the smart card from the activation unit 300, the activation unit 300 notifies the user through display 302 that the card can be removed from the activation
unit and is ready for use with any card reader (i.e., contact or contactless smart card reader or standard magnetic stripe reader).
[0081] At step 812, if the smart card 200 is removed from the activation unit
300 the activation unit 300 is turned off. If the smart card 200 is not removed from the activation unit 300, control is passed back to step 803 and the device waits for another key to be pressed. The removal of the smart card 200 at step 712 is a system level event meaning and at any time if this event occurs, the activation unit 300 is turned off.
[0082] The magnetic stripe emulator will stay active for a user definable period of time or until the sensors that form part of the emulator sense a successful swipe past a magnetic read head. The smart card will stay active until the card is placed back into the sleeve.
[0083] FIG. 9 is a table illustrating the generally applicable data format specifications for magnetic stripe credit card transactions defined in ISO/IEC 7813. FIG. 9 also illustrates how to change static magnetic stripe data to include some dynamic information for use in a transaction. Tracks 1 and 2 include many fields that are used to allow a card issuer or its agent to authorize a financial transaction. On each track there is a Discretionary Data(DD) segment that allows for the issuer to include some relevant information to use in the transaction authorization process. The typical DD segment includes the static CVV (VISA) or CVC (MASTERCARD) values, which are allotted three characters. Replacing the three character CVV or CVC data with a three digit dynamic code (dCW in Visa, Inc. terms, or CVC3 in MasterCard, Inc. terms), including the dCW of CVC3 indicator character (e.g., a status flag indicating that dynamic data is present), and including a four character Application Transaction Counter value allows the card issuer to use a set of data unique to each transaction to authorize a transaction. The smart card chip application in use increments the transaction counter after each transaction from that particular smart card application (i.e., each smart card application maintains its own transaction counter). This value is passed to the transaction server (which is part of the credit card transaction infrastructure in place) during authorization and eliminates the need on the server side to stay in sync as is required by many of today's security tokens.
[0084] This approach takes the dynamic code scheme already defined in the specifications for secure smart card transactions, but not for magnetic stripe transactions, and allows for it to be supported in traditional magnetic stripe transactions. Use of this dynamic information in a magnetic stripe transaction allows the same smart card verification algorithms already in place for use with smart card transactions to be reused for magnetic stripe transactions, thereby providing magnetic stripe transactions with the security of smart card transactions through existing magnetic stripe readers. This approach saves a tremendous amount of resources and money by implementing secure transactions through existing magnetic stripe readers already deployed in the field.
[0085] It should be understood that the specific scheme described above in connection with FIG. 9, where a CVV or CVC value is replaced with a dCVV or CVC3 value, is specific to only one data specification. The scheme (i.e., particular data format, location of dynamic data, selected dynamic data, etc.) can change according to the card issuer and transaction application. Modifications on data formats clearly fall within the spirit and scope of the present invention. Those familiar with transaction cards will recognize that a number of international organization for standardization standards have been promulgate, e.g., ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583, and ISO 4909, for defining the physical properties of the card, including size, flexibility, location of the magstripe, magnetic characteristics, and data formats. These standards also provide the standards for financial cards, including the allocation of card number ranges to different card issuing institutions. These standards will guide the artisan in formatting the secured data and dynamic card verification data for use in a magnetic stripe transaction.
[0086] Magnetic stripes following these specifications can typically be read by most point-of-sale hardware, which are simply general-purpose computers that can be programmed to perform specific tasks. Examples of cards adhering to these standards include ATM cards, bank cards (credit and debit cards including VISA and MasterCard), gift cards, loyalty cards, driver's licenses, telephone calling cards, membership cards, and electronic benefit transfer cards (e.g., food stamps). The approach described herein can be used in nearly any application in which value or secure information is stored on the card itself or even in remote storage. For
example, health care information can be stored at a central provider. The user can be issued a smart card as described herein. The smart card would have some secured data, such as an identification of the user and an account number, as well as a smart card chip that can generate dynamic data (e.g., a code and/or transaction number). The user can use the smart card to authorize a doctor or other health care provider to access this secured data (i.e., a transaction) and the backend system would operate in the manner described above to use authorization algorithms with the dynamic data to authorize the transaction (i.e., release of the medical data). FIG. 10 is a more detailed block diagram view of the processing components of the card activation unit controller 320. The controller 320 includes a microprocessor 1 programmed with memory 2 containing its various operating instructions. Memory 2 includes instruction set 3 for enabling the controller 320 to act as a smart card acceptance device. These instructions allow the device to interface with and manage applications on a smart card chip as described above. Instruction set 4 includes instructions for allowing the controller 320 to communicate with a smart card controller 216 of smart card 200. Instruction set 5 is used by the controller 320 in performing the biometric scanning, template formation, etc. operations of the controller. Instruction set 6 includes the general operating instructions of the controller. These operating instructions form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like. Operating instructions 2 includes a set of instructions 11 for controlling the display information to the user on the activation unit display 302. Finally, the operating instructions include sets of transaction application specific instructions 7. These instructions are used by the controller 320 in mapping/parsing the smart card transaction data received from the smart card, as described above, and formatting some or all of the data for use in a magnetic stripe transaction. For example, the transaction specific instructions 7 can include a set of instructions 8 that are specific to Visa, Inc. transactions. Instructions 8 include a smart card transaction mapping algorithm that is used by the controller 320 to identify specific data elements in a VISA® smart card transaction data communication received from the smart card chip 218 as well as instructions for constructing a magnetic stripe transaction data structure in accordance the governing specification, including the necessary static data elements and the dynamic card verification data for the magnetic stripe transaction
data structure. Other instruction sets, such as instruction set 9, which is specific to Mastercard, Inc. transactions, and instruction set 10 specific to debit card transactions, etc. are also included.
[0087] FIG. 11 is a block diagram of the processing components of smart card controller 216. Smart card controller 216 includes a microprocessor 20 programmed in accordance with operating instructions 21. The operating instructions can include, for example, instruction set 22 for managing communications with the activation unit 300. The operating instructions 21 also include an instructions set 23 relating to control of the magnetic stripe emulator 214. The operating instructions include a general set of operating instructions 24 for controlling the overall operation of the device. These operating instructions form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like. Finally, operating instructions 21 includes a set of instructions 25 for controlling the display of information to the user on the activation unit display 204.
[0088] As described above, smart card controller 422 would incorporate many of the functions performed by activation unit controller 320. That is, in addition to the operating instruction sets described above for smart card controller 216 in FIG. 11, smart card controller 422 can include those instructions sets from FIG. 10 necessary for performing the operations described above in connection with smart card 400.
[0089] FIGS. 12-20 illustrate an embodiment of a transaction system that utilizes a smart card transaction enabled cell phone or other portable wireless communication device. FIG. 12 shows a short-range communication enabled cell phone 950 in communication with a NFC enabled companion card 900. In embodiments, the short-range communication scheme is Near Field Communication or NFC, which is a short-range high frequency wireless communication technology that enables the exchange of data between devices over about a 10-20 centimeters (about 4-8 inches) distance. As such, the cell phone is enabled for both long range (e.g., cell communications) and short-range communications. NFC is an extension of the ISO/IEC 14443 proximity-card standard (contactless card, RFID) that combines the interface of a smart card and a reader into a single device. An NFC device can communicate with both existing ISO/IEC 14443 smart cards and readers, as well as
with other NFC devices, and is thereby compatible with the existing contactless RFID infrastructure already in use for, for example, public transportation and payment. While the transaction system is described herein in connection with NFC communications, it should be understood that NFC communication is only one possible embodiment and other protocol/approaches for short range communications can be used to communicate between devices. The phrase "near field communications" is used herein generically to refer to these short range communications while NFC as an acronym refers to the specific Near Field Communications standard.
[0090] In this embodiment, the cell phone 950 is configured for contactless transactions (e.g., contactless credit or debit transactions) using existing NFC techniques. However, existing contactless transaction enabled cell phones cannot be used for magnetic stripe transactions, which is the dominant technology presently in use. In the embodiment illustrated in FIG. 12, the cell phone 950 communicates with the NFC enabled companion card 900 by way of NFC communications. Specifically, in much the same manner described above in connection with the activation unit 300, the cell phone 950 communicates transaction data to the NFC enabled companion card 900 for use in a magnetic stripe transaction using a magnetic stripe emulator. In exemplary embodiments, this transaction data preferably include any necessary static secured data for performing the transaction as well as dynamic card verification data for use in authorizing the transaction. Any necessary data for display on the NFC enabled companion card 900 for use in the transaction can also be transmitted. [0091] Turning to FIGS. 13A and 13B, FIG. 13A is a frontal view of the NFC enabled companion card 900 and FIG. 13B illustrates the internal and some rear components of the NFC enabled companion card 900. The NFC enabled companion card 900 has a smart card body 902 that is shaped like a conventional credit or transaction card. The smart card includes an on/off button 906 for powering the smart card on/off and a display 904 for displaying information to the user. As with other embodiments of smart cards described herein, the NFC enabled companion card 900 includes a smart card controller (i.e., ASIC) 908 in communication with a magnetic stripe emulator. The NFC enabled companion card 900 also includes an internal battery power source 916 for powering at least the smart card controller 908 and the magnetic stripe emulator 914. The NFC enabled companion card 900 includes a NFC
chip (i.e., contactless RF module) that is configured for RF communications via the antenna 912 with another NFC enabled device. While the NFC chip is shown as a separate chip set 910, the NFC functionality can be built into the ASIC that serves as the controller 908. The NFC enabled companion card 900 does not need to include a smart card chip, as the smart card application(s) is/are resident on the cell phone 950. [0092] FIG. 14 is a block diagram of the processing components of smart card controller 908. Smart card controller 908 includes a microprocessor 909 programmed in accordance with operating instructions 911. The operating instructions 911 include, for example, instruction set 913 relating to control of the magnetic stripe emulator 914 and instruction set 917 for engaging in NFC communications with another NFC enabled device. Instruction set 917 interfaces with NFC chip set 910 if the NFC chip set is a separate component from controller 908 or includes the NFC chip set functionality if the NFC communication functionality is incorporated into the controller 908. The operating instructions include a general set of operating instructions 915 for controlling the overall operation of the device. These operating instructions 915 form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, and the like. Operating instructions 911 can also includes a set of instructions 919 for controlling the display of information to the user on the display 904. [0093] FIG. 15 is block diagram of the relevant processing components of cell phone 950. It should be understood that only those portions of the processing capabilities pertinent to interacting with the NFC enabled companion card 900 for performing a transaction are described herein. The general processing capabilities of a cell phone, PDA or other wireless communication device for performing its standard operations (e.g., placing a telephone call, communicating via the Internet, email, etc.) are familiar to those in the art of wireless communication devices and are not described herein so as to avoid obscuring the description of the present invention. The cell phone 950 includes a controller 960 that includes a microprocessor 962 programmed in accordance with operating instructions 963.
[0094] The operating instructions 963 include a set of general operating instructions 964. These operating instructions 964 form the operating framework for the device, including the use of the various other instruction sets in performing the operations and methods described herein, the display of information to the user on
display of the cell phone and the like. Instruction set 966 includes one or more smart card applications 966 for performing contactless smart card transactions, such as by way of NFC communications. These instructions correspond to the VISA® smart card transaction applications, MASTERCARD® smart card transaction applications, debit transaction application, information access transaction, etc. described above as being resident in secure memory of the smart card chips 218, 424 discussed above. These applications 966 initiate transactions using secured data stored in the device, generate dynamic card verification data (e.g., the dCVV code for VISA® transactions and transaction counters) and provide information for display to a user during a transaction. These smart card applications 966 are familiar to those artisans in this field. The operating instructions 963 also include one or more smart card reader applications 968 for communicating with the smart card applications 966. These instructions correspond to the smart card acceptance device instruction set 3 described above and allow the device to interface with and manage smart card applications 966. This application 968 enables the controller 960 to mimic a smart card acceptance device (e.g., a reader) to receive secure communications with the contactless smart card transaction data from the smart card transaction applications 966. By way of example and with specific reference to credit card applications, this "reader" application 966 queries the selected application to return the Track 2 equivalent data. In a Visa, Inc. application, this Track 2 data would include the dCVV and the transaction counter data. Once this data is obtained the "reader" application can provide the data to the transaction application specific instructions 970 (described below) to derive Track 1 data for use in a magnetic stripe transaction. The magnetic stripe transaction data is passed to the NFC communication program 972, which establishes a peer-to-peer session with an in-range NFC enabled companion card 900. [0095] The operating instructions 963 include a set of transaction application specific instructions 970 similar to instruction set 7 discussed above in connection with FIG. 10. These instructions are used by the controller 960 in mapping/parsing the smart card transaction data received from the smart card application(s) 966, as described above, and formatting some or all of the data for use in a magnetic stripe transaction. For example, the transaction application specific instructions 970 can include a set of instructions 974 specific to Visa, Inc. transactions. Instructions 974 include a smart card transaction mapping algorithm that is used by the controller 960
to identify specific data elements in a VISA® smart card transaction contactless data communication from the smart card application 966 as well as instructions for constructing a magnetic stripe transaction data structure in accordance the governing specification, including the necessary static data elements and the dynamic card verification data for the magnetic stripe transaction data structure. Other instruction sets, such as instruction set 976, which is specific to MasterCard, Inc. transactions, and instruction set 978 specific to debit card transactions, etc. are also included. [0096] Finally, the operating instructions 963 can include an instruction set
980 for performing user authentication for transactions. These instructions can be specific to biometric authentication (e.g., biometric scanning, template formation, etc.) or other kinds of authentication, such as user PIN or password authentication. [0097] FIG. 16 illustrates the use of the NFC enabled companion card 900 in a transactions, specifically a credit transaction, after the magnetic stripe emulator 914 has been encoded with transaction information. Once the magnetic stripe emulator 914 is encoded with the proper transaction data, the NFC enabled companion card 900 is swiped through a standard magnetic stripe reader 1000 connected to a POS device, such as a cash register 1100. If dynamic card verification data is included in the encoded data, that data is used during the authorization process as discussed above. [0098] FIG. 17 is a basic flow diagram illustrating a method of using the NFC enabled companion card 900 and cell phone 950 in a transaction. The details of many of the individual steps shown in FIG. 17 are described above in more detail in connection with the flow diagrams of FIGS. 6-8.
[0099] At step 1200, the user turns on the NFC enabled companion card 900.
[0100] At step 1202, the user uses the cell phone (or other wireless communication device) to bring up a list of transaction applications (e.g., debit, VISA, Inc., MasterCard Inc., etc.) and the user selects one of the transactions for use. During this step, the smart card reader application 968 can query the smart card applications for available applications and the processor 962 displays those applications on the display of the cell phone 950. The user scrolls through the listing and selects an application for use. The cell phone 950 can be programmed with a mobile wallet application that allows the user to select from among the installed applications (credit, debit, others) and enable or activate one for use in the next transaction.
[0101] At step 1204, the user is authenticated, such as using biometrics if the cell phone (or smart card) has biometric capabilities or a PIN or password authentication scheme.
[0102] At step 1206, the user brings the NFC enabled companion card 900 within NFC range of the cell phone 950 so that they can communicate with one another. Once in range of one another the NFC enabled mobile phone and the smart card establish a peer-to-peer session and pass data to each other. The NFC peer-to- peer session is governed by applicable standards.
[0103] At step 1208, the cell phone 950, using transaction application specific instructions 970, prepares magnetic stripe transaction data for use by the NFC enabled companion card 900. As will be understood from the foregoing description, the smart card reader application 968 obtains contactless smart card transaction data from the smart card application(s) 966 and provides that information to the transaction application specific instructions 970 to prepare the magnetic stripe transaction data. [0104] At step 1210, the cell phone 950 transmits the magnetic stripe transaction data to the smart card using NFC communication instructions 972. The transmission of data between the phone and the card can be encrypted according to the established standards covering NFC and ISO 14443 contactless smart cards. [0105] At step 1220, the NFC enabled companion card 900 receives the magnetic stripe transaction data and the smart card controller 908 controls the magnetic stripe emulator to encode the received magnetic stripe transaction data in its magnetic field.
[0106] At step 1230, the user is notified (through the display 904 of the NFC enabled companion card 900 and/or the display of the cell phone 950) that the card is ready to use in a traditional magnetic stripe reader. The user uses the smart card with a standard magnetic stripe reader to perform a transaction.
[0107] After a successful transaction, at a predetermined time limit or when the user presses the on/off button 906, the NFC enabled companion card 900 deletes any transaction data and is available for use in the next transaction. For security purposes, the NFC enabled companion card 900 retains no useful information related to the transaction.
[0108] The cell phone can also be used in conventional contactless smart card transactions. For the VISA® MSD and MASTERCARD® Magstripe smart card
specifications this means that the cell phone returns Track 2 equivalent data. The contactless reader application takes Track 2 data and creates Track 1 data since a lot of the information is redundant on the Tracks. The only significant difference in the track data is that the card holder name is on Track 1 but including this information in payment information is sometimes not recommended. The contactless reader then sends this data to the POS system for use in authorizing the transaction. [0109] FIG. 18 illustrates a system for programming the cell phone 950 with transaction applications and managing those applications. The system operates in much the same manner as the system shown in FIG. 1 and described above except that the programming occurs over-the-air via a cellular system. Of course, programming could also occur via wireless Internet communications. The system includes Smart Card Managements System 175, which is described above. The issuer 173 (or its agent) takes standard account information and a SCMS system 175 and combines the account information with other data to create a load file that is downloaded to the cell phone 950 via the cellular data network 179 and Over the Air (OTA) Provisioning Service 177, such as the Trusted Service Provider service provided by Venyon of Helsinki, Finland. This service is responsible for, among other things, managing the cellular communications during the download of the Load File. When the mobile phone 950 receives this load file it is routed to the card manager program resident on the phone 950 that controls the installation and activation of the smart card applications on the phone.
[0110] FIG. 19 illustrates an option for storing and charging the NFC enabled companion card 900. More specifically, the NFC enabled companion card 900 is stored in a slot or pocket 951 behind the cell phone 950. A connection is provided to couple the cell phone 950 to the NFC enabled companion card 900 so that the internal battery 916 of the NFC enabled companion card 900 can be recharged by the internal battery of cell phone 950.
[0111] While the smart card system described herein provides particular advantages when used in connection with financial transactions, the system is not so limited. The smart card system can be used in connection with access to customer records, health records, financial records or other confidential information. As such, the term "transaction" as used herein is not limited to financial transactions but rather
more genetically refers to the provision of information by way of smart card or magnetic stripe for use in some form of authentication and/or authorization. [0112] Although the invention has been described in terms of exemplary embodiments, it is not limited thereto. Rather, the appended claims should be construed broadly to include other variants and embodiments of the invention that may be made by those skilled in the art without departing from the scope and range of equivalents of the invention.
Claims
1. A smart card usable in magnetic stripe swipe transactions with a transaction terminal configured to read transaction information encoded on a magnetic stripe of a standard transaction card, the smart card comprising a card body, which comprises: a magnetic stripe emulator for use with the transaction terminal; a smart card chip programmed with at least one transaction application for providing secured data for use in a transaction and dynamic card verification data; a card controller in communication with the magnetic stripe emulator, wherein the card controller is configured to receive the dynamic card verification data and control the magnetic stripe emulator to emit a magnetic field encoded with at least a portion of the secured data and the dynamic card verification data; and a power supply.
2. The smart card of claim 1 , wherein the card body further comprises at least one of a smart card contact pad and a wireless interface for interfacing with a smart card reader.
3. The smart card of claim 1, wherein the card body comprises stored biometric data corresponding to an authorized user of the smart card.
4. The smart card of claim 3, wherein the smart card chip includes an authentication application for authenticating received biometric data against the stored biometric data.
5. The smart card of claim 4, wherein the received and stored biometric data comprise fingerprint data.
6. The smart card of claim 4, wherein the card body further comprises a biometric sensor on a face thereof.
7. The smart card of claim 1, wherein the smart card chip includes a plurality of transaction applications, each transaction application providing respective secured data for use in a transaction.
8. The smart card of claim 7, wherein the plurality of transaction applications correspond to two or more of a credit transaction application, a debit transaction application and an information access control application.
9. The smart card of claim 7, wherein the card body further comprises a user interface on a face thereof for enabling user selection among the plurality of transaction applications resident in the smart card chip for use.
10. The smart card of claim 1, wherein the card body further comprises a display in communication with the card controller.
11. The smart card of claim 10, wherein the card controller displays the dynamic card verification data on the display.
12. The smart card of claim 10, wherein the card controller displays on the display information for use in authorizing a card-not-present transaction.
13. The smart card of claim 1, wherein the magnetic stripe emulator includes two or more emulated magnetic stripe tracks.
14. The smart card of claim 1 , wherein an incremented transaction number is encoded with the secured data and the dynamic card verification data in the magnetic field.
15. The smart card of claim 1, wherein the card controller is configured to receive data for encoding with the magnetic stripe emulator from a source external to the smart card, wherein the card body further comprises a smart card interface in communication with the smart card chip for providing data to the source external to the smart card.
16. The smart card of claim 1, wherein the card controller communicates with the smart card chip to receive data, including the secured data and dynamic data code, wherein the smart card controller formats at least some of the data for use in a magnetic stripe transaction and provides the formatted data to the magnetic stripe emulator.
17. A smart card activation unit comprising: one or both of a contact and contactless interfaces for communicating with a smart card chip; an activation unit controller configured to receive from the smart chip through the interfaces smart card transaction data including secured data from the smart card chip for use in a transaction and a dynamic card verification data, and to format at least some of the secured data and the dynamic card verification data into magnetic stripe transaction data; and a card interface through which the activation unit controller provides magnetic stripe transaction data to the smart card for used in a magnetic stripe transaction.
18. The smart card activation unit of claim 17, further comprising: a display; and user input means operable with the display for selecting among transaction applications available on the smart card.
19. The smart card activation unit of claim 17, further comprising a biometric sensor for capturing biometric information from a presented user, wherein the activation unit controller provides a signal corresponding to the captured biometric information to the smart card for on-card comparison of the captured biometric information with stored biometric information.
20. The smart card activation unit of claim 17, wherein the activation unit controller controls the display to provide an indication to the presented user that the smart card is ready for use in a transaction.
21. The smart card activation unit of claim 17, wherein the smart card activation unit has a slot in which the smart card is received.
22. The smart card activation unit of claim 17, further comprising a battery power source.
23. A smart card usable in both magnetic stripe transactions and contact or contactless smart card transactions, comprising a smart card body, the smart card body comprising: a smart card chip programmed with at least one transaction application for performing smart card transactions, the smart card transactions involving transmission to a smart card reader of smart card transaction data including secured data and dynamic card verification data dynamically developed by the smart card chip, wherein the smart card chip is also programmed with a biometric match on card application for authenticating a use against pre -stored user biometric information; a smart card interface for interfacing the smart card chip with a smart card reader; a magnetic stripe emulator for interfacing the smart card with a magnetic stripe reader configured to read transaction information encoded on a magnetic stripe of a transaction card; an internal power supply; a card controller in communication with the magnetic stripe emulator, wherein the card controller controls the magnetic stripe emulator to emit a magnetic field encoded with magnetic stripe transaction data, wherein the magnetic stripe transaction data includes the dynamic card verification data and at least some of the secured data from the smart card transaction data; and a display under the control of the card controller.
24. The smart card of claim 23, wherein the card controller is configured to receive the magnetic stripe transaction data from a source external to the smart card.
25. The smart card of claim 23 , wherein the card body further comprises a biometric sensor on a face thereof for capturing biometric data, wherein the biometric data is provided to the match on card application for authentication of a presented user, and wherein the card controller communicates with the smart card chip to receive the smart card transaction data, formats the dynamic card verification data and at least some of the secured data from the smart card transaction data into the magnetic stripe transaction data, and provides the magnetic stripe transaction data to the magnetic stripe emulator.
26. A transaction system, comprising: a portable, personal wireless communication device enabled for near field communications with a similarly enabled device, the wireless communication device being programmed with at least one smart card application for use in contactless smart card transactions, wherein the wireless communication device is configured to format contactless smart card transaction data for magnetic stripe transactions and communicate magnetic stripe transaction data by near field communication; and a companion card enabled for near field communications with a similarly enabled device, the companion card including a card body which includes: a magnetic stripe emulator for use with a transaction terminal configured to read transaction information encoded on a magnetic stripe of a standard transaction card; a card controller in communication with the magnetic stripe emulator, wherein the card controller is configured to receive the magnetic stripe transaction data communicated to the companion card by near field communication and control the magnetic stripe emulator to emit a magnetic field encoded with the magnetic stripe transaction data; and a power supply.
27. The transaction system of claim 26, wherein the contactless smart card transaction data includes dynamic card verification data, wherein dynamic card verification data is included in the magnetic stripe transaction data.
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200980132605.3A CN102160061B (en) | 2008-08-20 | 2009-08-19 | Secure smart card system |
US13/059,433 US8814052B2 (en) | 2008-08-20 | 2009-08-19 | Secure smart card system |
EP09808756.2A EP2324445B1 (en) | 2008-08-20 | 2009-08-19 | Secure smart card system |
US13/216,919 US8594730B2 (en) | 2008-08-20 | 2011-08-24 | Secure smart card system |
US14/063,722 US9129280B2 (en) | 2008-08-20 | 2013-10-25 | Secure smart card system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US9035808P | 2008-08-20 | 2008-08-20 | |
US9036208P | 2008-08-20 | 2008-08-20 | |
US61/090,362 | 2008-08-20 | ||
US61/090,358 | 2008-08-20 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US61090362 Continuation | 2008-08-20 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/059,433 A-371-Of-International US8814052B2 (en) | 2008-08-20 | 2009-08-19 | Secure smart card system |
US13/216,919 Continuation US8594730B2 (en) | 2008-08-20 | 2011-08-24 | Secure smart card system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010022129A1 true WO2010022129A1 (en) | 2010-02-25 |
Family
ID=41707439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2009/054275 WO2010022129A1 (en) | 2008-08-20 | 2009-08-19 | Secure smart card system |
Country Status (4)
Country | Link |
---|---|
US (3) | US8814052B2 (en) |
EP (1) | EP2324445B1 (en) |
CN (1) | CN102160061B (en) |
WO (1) | WO2010022129A1 (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110191236A1 (en) * | 2010-01-27 | 2011-08-04 | Qsecure, Inc. | Virtual card |
CN102254259A (en) * | 2010-05-21 | 2011-11-23 | 英特尔公司 | Method and apparatus for conducting trusted remote payment transactions |
EP2390823A1 (en) * | 2010-05-31 | 2011-11-30 | Gemalto SA | Bank card with display screen |
WO2012101389A1 (en) | 2011-01-28 | 2012-08-02 | Spirtech | Biometric identity verification system using a success signal and interacting with a portable object |
EP2704064A1 (en) * | 2011-04-28 | 2014-03-05 | Prepaytrans Gestion Empresarial, S.L. | Telematic payment system using a multifunction card |
EP2705461A2 (en) * | 2011-05-03 | 2014-03-12 | Microsoft Corporation | Magnetic stripe-based transactions using mobile communication devices |
US8708232B2 (en) | 2010-06-04 | 2014-04-29 | Gemalto Sa | Bank card with display screen |
WO2015119834A1 (en) * | 2014-02-04 | 2015-08-13 | Microsoft Technology Licensing, Llc | Multi-use card and system |
CN104869534A (en) * | 2015-05-22 | 2015-08-26 | 东信和平科技股份有限公司 | Method based on mobile phone application remote detection smart card and system thereof |
EP2925035A1 (en) * | 2014-03-24 | 2015-09-30 | Gemalto SA | Method for activating and deactivating an application in a telecommunications terminal including a secure element and a biometric reader and corresponding server |
WO2016058709A1 (en) * | 2014-10-16 | 2016-04-21 | Gemalto Sa | A dual interface smartcard for loading a number of prepaid credits into a prepayment meter |
FR3028643A1 (en) * | 2014-11-13 | 2016-05-20 | Youen Puillandre | ELECTRONIC MULTICARTE |
EP3086272A1 (en) * | 2015-04-20 | 2016-10-26 | Oberthur Technologies | Selecting an application on a card |
EP3118798A1 (en) * | 2015-07-14 | 2017-01-18 | Samsung Electronics Co., Ltd. | Electronic device and payment method using the same |
KR20170008657A (en) * | 2015-07-14 | 2017-01-24 | 삼성전자주식회사 | Electronic device and payment method using the same |
FR3047826A1 (en) * | 2016-02-17 | 2017-08-18 | Morpho | METHOD AND DEVICE FOR PARAMETERING A DEVICE FOR PERFORMING BANKING OPERATIONS |
CN107309875A (en) * | 2017-07-03 | 2017-11-03 | 杭州酷哥教育科技有限公司 | The method and system for programming Control of swiping the card |
GB2550207A (en) * | 2016-05-13 | 2017-11-15 | Visa Europe Ltd | Extended data storage |
WO2018029582A1 (en) * | 2016-08-08 | 2018-02-15 | Ellipse World S.A. | Method for a prepaid, debit and credit card security code generation system |
US10032169B2 (en) | 2016-08-08 | 2018-07-24 | Ellipse World, Inc. | Prepaid, debit and credit card security code generation system |
EP3388974A1 (en) * | 2017-04-13 | 2018-10-17 | Istituto Poligrafico e Zecca dello Stato S.p.A. | New identification document |
EP3284067A4 (en) * | 2015-04-14 | 2018-12-05 | Capital One Services, LLC | Dynamic transaction card optimization |
EP3382599A3 (en) * | 2017-03-23 | 2019-01-23 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
US10210505B2 (en) | 2013-07-23 | 2019-02-19 | Capital One Services, Llc | Dynamic transaction card optimization |
US10235674B2 (en) | 2016-08-08 | 2019-03-19 | Ellipse World, Inc. | Method for a prepaid, debit and credit card security code generation system |
EP3537362A1 (en) * | 2015-09-09 | 2019-09-11 | Samsung Electronics Co., Ltd. | Method and apparatus for performing payment |
EP3567512A1 (en) * | 2015-04-14 | 2019-11-13 | Capital One Services, LLC | A system, method, and apparatus for a dynamic transaction card |
EP3608833A1 (en) * | 2018-08-07 | 2020-02-12 | Idemia Identity & Security France | Acquisition of a biometric fingerprint from a smart card |
EP3624075A1 (en) * | 2018-08-31 | 2020-03-18 | Capital One Services, LLC | Battery charger for a transaction card |
US10651897B2 (en) * | 2015-04-14 | 2020-05-12 | Samsung Electronics Co., Ltd | Near field communication package and portable device including the same |
WO2020115238A1 (en) * | 2018-12-07 | 2020-06-11 | Thales Dis France Sa | Method for manufacturing a device comprising a card-shaped body and an information area |
WO2020181150A1 (en) * | 2019-03-06 | 2020-09-10 | Ziaur Rahman | Biometric card with display |
US10775906B2 (en) | 2017-12-12 | 2020-09-15 | Idex Biometrics Asa | Power source for biometric enrollment with status indicators |
US11250307B2 (en) | 2017-03-23 | 2022-02-15 | Idex Biometrics Asa | Secure, remote biometric enrollment |
US11620631B2 (en) | 2017-06-13 | 2023-04-04 | Ingenico Group | Method for transmitting data to a magnetic reading head, method for processing received data, corresponding payment terminal and program |
Families Citing this family (311)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009038511A1 (en) * | 2007-09-21 | 2009-03-26 | Telefonaktiebolaget Lm Ericsson (Publ) | All in one card |
US8011577B2 (en) | 2007-12-24 | 2011-09-06 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
EP2192540A1 (en) * | 2008-11-28 | 2010-06-02 | Gemalto Canada Inc. | Tragbarer Gegenstand mit Display und Anwendung zum Durchführen von elektronischen Transaktionen |
EP2224376B1 (en) * | 2009-02-25 | 2014-12-31 | Vodafone Holding GmbH | Power supply for a chip card |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US8401964B2 (en) * | 2009-04-28 | 2013-03-19 | Mastercard International Incorporated | Apparatus, method, and computer program product for encoding enhanced issuer information in a card |
DE102009021011A1 (en) * | 2009-05-13 | 2010-11-18 | Siemens Aktiengesellschaft | Electronic key for authentication |
US8893967B2 (en) | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US9038886B2 (en) * | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US8167201B2 (en) * | 2009-10-07 | 2012-05-01 | Castles Technology Co., Ltd. | Composite chip card with a security protection interface and a method for controlling the same |
US8682390B2 (en) * | 2009-12-31 | 2014-03-25 | Cellco Partnership | Matching themes between accessories and associated electronic devices |
US8700909B2 (en) * | 2010-02-26 | 2014-04-15 | International Business Machines Corporation | Revocation of a biometric reference template |
US8671055B2 (en) | 2010-03-02 | 2014-03-11 | Digital Life Technologies, Llc | Portable E-wallet and universal card |
US9177241B2 (en) | 2010-03-02 | 2015-11-03 | Gonow Technologies, Llc | Portable e-wallet and universal card |
US8788418B2 (en) | 2010-03-02 | 2014-07-22 | Gonow Technologies, Llc | Portable E-wallet and universal card |
US9317018B2 (en) | 2010-03-02 | 2016-04-19 | Gonow Technologies, Llc | Portable e-wallet and universal card |
US9129199B2 (en) | 2010-03-02 | 2015-09-08 | Gonow Technologies, Llc | Portable E-wallet and universal card |
US9129270B2 (en) * | 2010-03-02 | 2015-09-08 | Gonow Technologies, Llc | Portable E-wallet and universal card |
US9195926B2 (en) | 2010-03-02 | 2015-11-24 | Gonow Technologies, Llc | Portable e-wallet and universal card |
US9218557B2 (en) | 2010-03-02 | 2015-12-22 | Gonow Technologies, Llc | Portable e-wallet and universal card |
US9681359B2 (en) | 2010-03-23 | 2017-06-13 | Amazon Technologies, Inc. | Transaction completion based on geolocation arrival |
US20110238476A1 (en) * | 2010-03-23 | 2011-09-29 | Michael Carr | Location-based Coupons and Mobile Devices |
US8473414B2 (en) * | 2010-04-09 | 2013-06-25 | Visa International Service Association | System and method including chip-based device processing for transaction |
US9558481B2 (en) * | 2010-09-28 | 2017-01-31 | Barclays Bank Plc | Secure account provisioning |
US20120266220A1 (en) * | 2010-11-17 | 2012-10-18 | Sequent Software Inc. | System and Method for Controlling Access to a Third-Party Application with Passwords Stored in a Secure Element |
US20120124659A1 (en) | 2010-11-17 | 2012-05-17 | Michael Craft | System and Method for Providing Diverse Secure Data Communication Permissions to Trusted Applications on a Portable Communication Device |
WO2012082795A1 (en) * | 2010-12-13 | 2012-06-21 | Magtek, Inc. | Systems and methods for conducting contactless payments using a mobile and a magstripe payment card |
US8988187B2 (en) * | 2011-01-13 | 2015-03-24 | Hong Kong Applied Science And Technology Research Institute Co., Ltd. | Proximity based biometric identification systems and methods |
EP2681701A4 (en) | 2011-03-04 | 2014-08-20 | Visa Int Service Ass | Integration of payment capability into secure elements of computers |
US8690051B1 (en) | 2011-04-07 | 2014-04-08 | Wells Fargo Bank, N.A. | System and method for receiving ATM deposits |
US9589256B1 (en) * | 2011-04-07 | 2017-03-07 | Wells Fargo Bank, N.A. | Smart chaining |
US9292840B1 (en) | 2011-04-07 | 2016-03-22 | Wells Fargo Bank, N.A. | ATM customer messaging systems and methods |
WO2012154915A1 (en) * | 2011-05-10 | 2012-11-15 | Dynamics Inc. | Systems, devices, and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms |
WO2012155005A1 (en) * | 2011-05-11 | 2012-11-15 | Sierchio Joseph | Universal interactive smart card device |
US9965768B1 (en) | 2011-05-19 | 2018-05-08 | Amazon Technologies, Inc. | Location-based mobile advertising |
US8628022B1 (en) | 2011-05-23 | 2014-01-14 | Dynamics Inc. | Systems and methods for sensor mechanisms for magnetic cards and devices |
US20130013490A1 (en) * | 2011-07-08 | 2013-01-10 | Bank Of America Corporation | Mobile apparatus with back-up payment system |
US8313037B1 (en) * | 2011-07-08 | 2012-11-20 | Thomas David Humphrey | Simulated magnetic stripe card system and method for use with magnetic stripe card reading terminals |
TW201303760A (en) * | 2011-07-15 | 2013-01-16 | Hon Hai Prec Ind Co Ltd | Electronic card having payment function |
US8827153B1 (en) * | 2011-07-18 | 2014-09-09 | Dynamics Inc. | Systems and methods for waveform generation for dynamic magnetic stripe communications devices |
US9495550B2 (en) * | 2011-08-04 | 2016-11-15 | J. Chance Anderson | System and method for sharing of data securely between electronic devices |
EP2751754A4 (en) * | 2011-08-30 | 2015-06-03 | C Douglas Yeager | Systems and methods for authorizing a transaction with an unexpected cryptogram |
WO2013034681A1 (en) * | 2011-09-08 | 2013-03-14 | Ehrensvaerd Jakob | Devices and methods for identification, authentication and signing purposes |
US10489774B2 (en) | 2011-10-17 | 2019-11-26 | Capital One Services, Llc | System, method, and apparatus for updating an existing dynamic transaction card |
US10332102B2 (en) * | 2011-10-17 | 2019-06-25 | Capital One Services, Llc | System, method, and apparatus for a dynamic transaction card |
US8918855B2 (en) * | 2011-12-09 | 2014-12-23 | Blackberry Limited | Transaction provisioning for mobile wireless communications devices and related methods |
US8880027B1 (en) * | 2011-12-29 | 2014-11-04 | Emc Corporation | Authenticating to a computing device with a near-field communications card |
US9986208B2 (en) * | 2012-01-27 | 2018-05-29 | Qualcomm Incorporated | System and method for determining location of a device using opposing cameras |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US9165293B2 (en) | 2012-03-30 | 2015-10-20 | Mastercard International Incorporated | Systems and methods for waveform transmission of transaction card data |
US9439334B2 (en) | 2012-04-03 | 2016-09-06 | X-Card Holdings, Llc | Information carrying card comprising crosslinked polymer composition, and method of making the same |
US9122968B2 (en) | 2012-04-03 | 2015-09-01 | X-Card Holdings, Llc | Information carrying card comprising a cross-linked polymer composition, and method of making the same |
CN102751309B (en) * | 2012-04-06 | 2015-01-14 | 信利工业(汕尾)有限公司 | Organic electroluminescent display of integrated NFC (Noise Feedback Coding) antenna |
US8990572B2 (en) * | 2012-04-24 | 2015-03-24 | Daon Holdings Limited | Methods and systems for conducting smart card transactions |
TWI630565B (en) * | 2012-05-08 | 2018-07-21 | 台灣積體電路製造股份有限公司 | Mobile phone with security code generatore |
US8870081B2 (en) | 2012-05-29 | 2014-10-28 | Protean Payment, Inc. | Payment card and methods |
US9406011B2 (en) | 2012-05-29 | 2016-08-02 | Stratos Technologies, Inc. | Virtual wallet |
US8857722B2 (en) | 2012-07-20 | 2014-10-14 | CPI Card Group—Colorado, Inc. | Weighted transaction card |
US10032099B2 (en) | 2012-07-20 | 2018-07-24 | CPI Card Group—Colorado, Inc. | Weighted transaction card |
US9084114B2 (en) | 2012-08-07 | 2015-07-14 | Genesys Telecommunications Laboratories, Inc. | Technique to authenticate in a mobile application using near-field communication |
KR101911315B1 (en) * | 2012-08-24 | 2018-10-24 | 삼성전자주식회사 | System and method for providing settlement information |
US10783426B2 (en) | 2012-08-30 | 2020-09-22 | David Finn | Dual-interface metal hybrid smartcard |
KR101329031B1 (en) * | 2012-08-30 | 2013-11-14 | 최택진 | Handphone case having card acceptance structure |
US9122966B2 (en) | 2012-09-07 | 2015-09-01 | Lawrence F. Glaser | Communication device |
US11593776B2 (en) | 2012-09-07 | 2023-02-28 | Studebaker & Brackett PC | Communication device to sense one or more biometric characteristics of a user |
AU2013312252B2 (en) | 2012-09-07 | 2017-09-28 | Lawrence F. Glaser | Credit card form factor secure mobile computer and methods |
US8955746B2 (en) | 2012-09-27 | 2015-02-17 | Intel Corporation | Providing a locking technique for electronic displays |
US8820649B2 (en) * | 2012-11-20 | 2014-09-02 | Omne Mobile Payments, Inc. | Electronic card with a programmable magnetic stripe |
US8971856B2 (en) | 2012-12-28 | 2015-03-03 | Cellco Partnership | Personalizing an accessory with digital content |
US8851370B2 (en) * | 2013-01-02 | 2014-10-07 | Jpmorgan Chase Bank, N.A. | System and method for secure card with on-board verification |
US11551051B2 (en) | 2013-01-18 | 2023-01-10 | Amatech Group Limiied | Coupling frames for smartcards with various module opening shapes |
TWI506562B (en) * | 2013-01-25 | 2015-11-01 | Ind Tech Res Inst | Ticket card, information rewritable apparatus and system thereof |
CA2903341A1 (en) * | 2013-01-29 | 2014-10-23 | Mary GRACE | Smart card and smart card system with enhanced security features |
US20140239068A1 (en) * | 2013-02-22 | 2014-08-28 | John Chowhan Park | Credit card with alterable id/security features |
US9022286B2 (en) | 2013-03-15 | 2015-05-05 | Virtual Electric, Inc. | Multi-functional credit card type portable electronic device |
CA2906872A1 (en) | 2013-03-15 | 2014-09-18 | Mastercard International Incorporated | Methods and apparatus for providing and operating an enhanced payment display card with network support |
US10906287B2 (en) | 2013-03-15 | 2021-02-02 | X-Card Holdings, Llc | Methods of making a core layer for an information carrying card, and resulting products |
US20140297389A1 (en) * | 2013-03-27 | 2014-10-02 | Lyudmyla Nikolaevna Brown | Loyalty points card |
US20140291406A1 (en) * | 2013-04-02 | 2014-10-02 | Tnt Partners, Llc | Programmable Electronic Card and Supporting Device |
US20140339315A1 (en) * | 2013-04-02 | 2014-11-20 | Tnt Partners, Llc | Programmable Electronic Card and Supporting Device |
US20140316873A1 (en) * | 2013-04-22 | 2014-10-23 | Codecard, Inc. | Apparatus, system and methods to issue a prize to a user of a credit account based on user purchase activities |
GB2514142A (en) * | 2013-05-14 | 2014-11-19 | Incorporated Mastercard International | System and method for mobile PIN synchronisation |
US9275386B2 (en) | 2013-05-29 | 2016-03-01 | Stratos Technologies, Inc. | Method for facilitating payment with a programmable payment card |
US20150069125A1 (en) * | 2013-09-09 | 2015-03-12 | Coatmen Technology Integration Limited | Active contact and near-field card reading device and method thereof |
US20150081447A1 (en) * | 2013-09-19 | 2015-03-19 | Cortex Mcp, Inc. | Track data point-of-sale platform |
US9516006B2 (en) * | 2013-10-23 | 2016-12-06 | Google Inc. | Re-programmable secure cryptographic device |
WO2015061780A1 (en) * | 2013-10-25 | 2015-04-30 | Greene Charles E | Bi-stable display tag |
US9070053B2 (en) | 2013-10-25 | 2015-06-30 | CPI Card Group—Colorado, Inc. | Multi-metal layered card |
WO2015073888A2 (en) | 2013-11-14 | 2015-05-21 | Protean Payment, Inc. | Method for remotely controlling a reprogrammable payment card |
CN103679447A (en) * | 2013-12-13 | 2014-03-26 | 苏州士丹尼信息技术有限公司 | Credit card transaction system |
CN105934788B (en) | 2014-01-31 | 2019-03-08 | 惠普发展公司,有限责任合伙企业 | Electric paper display Write |
US20150371234A1 (en) * | 2014-02-21 | 2015-12-24 | Looppay, Inc. | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data |
US9016570B1 (en) * | 2014-04-18 | 2015-04-28 | Adrian Gluck | Multi-purpose credit card reader apparatus |
EP3149627B1 (en) * | 2014-06-02 | 2021-08-04 | Schlage Lock Company LLC | Systems and methods for a credential including multiple access privileges |
US11410010B2 (en) | 2014-08-21 | 2022-08-09 | Amatech Group Limiied | Smartcard with a coupling frame and a wireless connection between modules |
US10453053B2 (en) | 2014-09-02 | 2019-10-22 | Fit Pay, Inc. | Systems and devices for wireless charging of a powered transaction card and embedding electronics in a wearable accessory |
EP2996299B1 (en) | 2014-09-15 | 2021-05-12 | Wincor Nixdorf International GmbH | Method and assembly for authorising an action on a self-service system |
US10496983B2 (en) | 2014-11-07 | 2019-12-03 | Maap Technology Inc. | Wireless to magnetic transition smart card |
US10867231B2 (en) | 2014-11-07 | 2020-12-15 | Maap Technology Inc. | Wireless to magnetic transition smart card |
US20160203471A1 (en) * | 2014-11-07 | 2016-07-14 | Madjid Zand | Wireless to magnetic transition smart card |
WO2016072799A1 (en) | 2014-11-08 | 2016-05-12 | Samsung Electronics Co., Ltd. | Electronic device including a plurality of payment modules |
KR102424286B1 (en) * | 2014-11-08 | 2022-07-25 | 삼성전자주식회사 | Electronic Device Including a Plurality of Payment Modules |
WO2016085019A1 (en) * | 2014-11-24 | 2016-06-02 | 주식회사지니 | Watch functioning as mobile payment device and payment method using same |
US11620654B2 (en) | 2014-12-04 | 2023-04-04 | Mastercard International Incorporated | Methods and apparatus for conducting secure magnetic stripe card transactions with a proximity payment device |
MX2017007192A (en) * | 2014-12-04 | 2018-01-30 | Mastercard International Inc | Methods and apparatus for conducting secure magnetic stripe card transactions with a proximity payment device. |
EP3238151A4 (en) * | 2014-12-22 | 2018-06-06 | Capital One Services, LLC | A system, method and apparatus for reprogramming a transaction card |
CA2971865A1 (en) * | 2014-12-22 | 2016-06-30 | Capital One Services, Llc | A system, method, and apparatus for locating a bluetooth enabled transaction card |
CN104539430B (en) * | 2014-12-30 | 2018-11-30 | 飞天诚信科技股份有限公司 | A kind of dynamic password formation method and equipment based on card |
KR101804182B1 (en) * | 2015-01-28 | 2017-12-04 | (주) 맑은생각 | Online financial transactions, identity authentication system and method using real cards |
CN105989399A (en) * | 2015-02-03 | 2016-10-05 | 天地融科技股份有限公司 | Simulation device |
CN105989400A (en) * | 2015-02-03 | 2016-10-05 | 天地融科技股份有限公司 | Simulation device |
US9436941B1 (en) * | 2015-02-18 | 2016-09-06 | Calay Venture S.à.r.l. | Smart payment instruments |
US10028120B2 (en) * | 2015-02-18 | 2018-07-17 | Global Life-Line, Inc. | Identification card holder with personal locator |
US20160267486A1 (en) * | 2015-03-13 | 2016-09-15 | Radiius Corp | Smartcard Payment System and Method |
WO2016160816A1 (en) * | 2015-03-30 | 2016-10-06 | Hendrick Chaya Coleena | Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match |
US10074888B2 (en) | 2015-04-03 | 2018-09-11 | NXT-ID, Inc. | Accordion antenna structure |
JP5920747B1 (en) * | 2015-04-07 | 2016-05-18 | エイピーエス.エスエイ | Application programs and cards |
US10474941B2 (en) | 2015-04-14 | 2019-11-12 | Capital One Services, Llc | Dynamic transaction card antenna mounting |
US10360557B2 (en) | 2015-04-14 | 2019-07-23 | Capital One Services, Llc | Dynamic transaction card protected by dropped card detection |
US10997588B2 (en) | 2015-04-14 | 2021-05-04 | Capital One Services, Llc | Dynamic transaction card protected by dropped card detection |
WO2016168438A1 (en) * | 2015-04-14 | 2016-10-20 | Capital One Services, Llc | A system, method, and apparatus for updating an existing dynamic transaction card |
US10482453B2 (en) * | 2015-04-14 | 2019-11-19 | Capital One Services, Llc | Dynamic transaction card protected by gesture and voice recognition |
WO2016172466A1 (en) * | 2015-04-22 | 2016-10-27 | Touchstone Id Corp. | Antenna decoupled from programmable smart card |
US9691012B2 (en) * | 2015-06-29 | 2017-06-27 | Cameros Bay Capital, LLC | Dynamic authentication system and methods for use with legacy terminals |
CN105678553A (en) * | 2015-08-05 | 2016-06-15 | 腾讯科技(深圳)有限公司 | Method, device and system for processing order information |
US9613306B2 (en) | 2015-08-31 | 2017-04-04 | American Express Travel Related Services Company, Inc. | Magnetic card swipe emulation systems and methods |
WO2017037913A1 (en) * | 2015-09-03 | 2017-03-09 | ブレイニー株式会社 | Multifunction card, card payment terminal, and card payment system |
EP3347866A1 (en) * | 2015-09-10 | 2018-07-18 | Verrency Holdings Limited | Proxy device for representing multiple credentials |
FR3042894B1 (en) * | 2015-10-27 | 2018-10-12 | Ingenico Group | METHOD FOR SECURING TRANSACTION DATA PROCESSING, TERMINAL AND CORRESPONDING COMPUTER PROGRAM |
KR102461325B1 (en) * | 2015-10-29 | 2022-10-31 | 삼성전자주식회사 | Portable biometric authentication device and terminal device using near field communication |
EP3391317A4 (en) * | 2015-12-16 | 2018-10-24 | ScramCard Holdings (Hong Kong) Limited | Multi-scheme payment integrated circuit card, payment system, and payment method |
US10095572B2 (en) | 2015-12-18 | 2018-10-09 | CPI Card Group—Colorado, Inc. | System and method for providing IC chip cards |
KR20170078415A (en) * | 2015-12-29 | 2017-07-07 | 삼성전자주식회사 | Apparatus and method of controlling a door lock |
US11734678B2 (en) * | 2016-01-25 | 2023-08-22 | Apple Inc. | Document importation into secure element |
EP3408812A4 (en) | 2016-01-29 | 2019-07-24 | Xard Group Pty Ltd | Biometric reader in card |
US12051058B2 (en) | 2016-01-29 | 2024-07-30 | Xard Group Pty Ltd | Validating transactions |
EP3408813A4 (en) * | 2016-01-29 | 2019-03-13 | Xard Group Pty Ltd | Transaction recording |
AU2017213238A1 (en) | 2016-01-29 | 2018-09-20 | Xard Group Pty Ltd | Apparatus and method for emulating transactional infrastructure with a digital transaction processing unit (DTPU) |
WO2017150924A1 (en) * | 2016-03-02 | 2017-09-08 | 주식회사 마늘랩 | Smart card for sequentially generating dynamic magnetic fields and method for controlling same |
US9773153B1 (en) * | 2016-03-24 | 2017-09-26 | Fingerprint Cards Ab | Fingerprint sensor module |
EP3455794A4 (en) | 2016-05-13 | 2019-04-24 | Entrust Datacard Corporation | Multi-protocol smart card programming |
FR3051581B1 (en) * | 2016-05-20 | 2018-10-05 | Paragon Id | DEVICE FOR GENERATING AND DYNAMIC SECURITY CODE DISPLAY |
WO2017210305A1 (en) | 2016-06-01 | 2017-12-07 | Cpi Card Group - Colorado, Inc. | Ic chip card with integrated biometric sensor pads |
US10339531B2 (en) | 2016-06-10 | 2019-07-02 | Bank Of America Corporation | Organic light emitting diode (“OLED”) security authentication system |
US9697388B1 (en) | 2016-06-14 | 2017-07-04 | Bank Of America Corporation | Unfoldable OLED reader/displays for the visually-impaired |
US20170364879A1 (en) * | 2016-06-15 | 2017-12-21 | Mastercard International Incorporated | Transaction flows and transaction processing for bridged payment systems |
US10163154B2 (en) | 2016-06-21 | 2018-12-25 | Bank Of America Corporation | OLED (“organic light emitting diode”) teller windows |
US9665818B1 (en) * | 2016-06-21 | 2017-05-30 | Bank Of America Corporation | Organic light emitting diode (“OLED”) universal plastic |
US10783336B2 (en) | 2016-06-21 | 2020-09-22 | Bank Of America Corporation | Reshape-able OLED device for positioning payment instrument |
US10970027B2 (en) | 2016-06-21 | 2021-04-06 | Bank Of America Corporation | Combination organic light emitting diode (“OLED”) device |
US9747539B1 (en) | 2016-06-21 | 2017-08-29 | Bank Of America Corporation | Organic light emitting diode (“OLED”) travel card |
US10460135B1 (en) | 2016-06-21 | 2019-10-29 | Bank Of America Corporation | Foldable organic light emitting diode (“OLED”) purchasing instrument reader |
FR3053504B1 (en) * | 2016-06-29 | 2018-08-17 | Idemia France | COMPONENT ELECTRONIC ENTITY SUPPLIED BY INTERNAL ELECTROMAGNETIC COUPLING |
US9858558B1 (en) | 2016-07-08 | 2018-01-02 | Bank Of America Corporation | Multi-screen automated teller machine (ATM)/automated teller assist (ATA) machines for use by wheelchair users |
US9760124B1 (en) | 2016-07-11 | 2017-09-12 | Bank Of America Corporation | Organic light emitting diode (“OLED”)-based displays |
US10580068B2 (en) | 2016-07-11 | 2020-03-03 | Bank Of America Corporation | OLED-based secure monitoring of valuables |
US20180039876A1 (en) * | 2016-08-08 | 2018-02-08 | Ellipse World S.A. | Prepaid, Debit and Credit Card Security Code Generation System |
US10783337B2 (en) | 2016-08-16 | 2020-09-22 | CPI Card Group—Colorado, Inc. | IC chip card |
US10043183B2 (en) | 2016-08-30 | 2018-08-07 | Bank Of America Corporation | Organic light emitting diode (“OLED”) visual authentication circuit board |
CN106226789A (en) * | 2016-08-31 | 2016-12-14 | 江苏艾倍科科技股份有限公司 | A kind of Big Dipper student card |
US10176676B2 (en) | 2016-09-23 | 2019-01-08 | Bank Of America Corporation | Organic light emitting diode (“OLED”) display with quick service terminal (“QST”) functionality |
SG10201608491QA (en) * | 2016-10-11 | 2018-05-30 | Mastercard Asia Pacific Pte Ltd | Method And Device For Digital Payment Transactions |
CN106529356B (en) * | 2016-10-28 | 2019-07-05 | 东信和平科技股份有限公司 | A kind of smart card creation data output method |
IT201600127809A1 (en) * | 2016-12-19 | 2018-06-19 | DEVICE FOR PAYMENT TRANSACTIONS WITH CONTACTLESS TECHNOLOGY (NFC), WITH GENERATING ALGORITHM OTP CODE UNIQUE INTEGRAL TEXT STRING TEMPLATE GENERATED BY BIOMETRIC SCANNING OF THE DIGITAL FOOTPRINT, WITH TOKEN OTP FUNCTION, RECOGNITION OF IDENTITY AND SUBSCRIPTION FEATURE PUBLIC AND RELATED PROCESSES OF OPERATION, ASSOCIATION AND USE | |
US20180189527A1 (en) * | 2017-01-03 | 2018-07-05 | Soo Hyang KANG | Method for activating multi-function device card |
USD855617S1 (en) * | 2017-01-17 | 2019-08-06 | David Williams | Smart card |
US10984304B2 (en) | 2017-02-02 | 2021-04-20 | Jonny B. Vu | Methods for placing an EMV chip onto a metal card |
EP3582973B1 (en) | 2017-02-14 | 2023-06-28 | CPI Card Group - Colorado, Inc. | Edge-to-edge metal card and production method |
KR101911747B1 (en) | 2017-03-20 | 2018-10-25 | 주식회사 하이딥 | Touch type distinguishing method and touch input device performing the same |
US11062312B2 (en) | 2017-07-14 | 2021-07-13 | The Toronto-Dominion Bank | Smart chip card with fraud alert and biometric reset |
US10460748B2 (en) | 2017-10-04 | 2019-10-29 | The Toronto-Dominion Bank | Conversational interface determining lexical personality score for response generation with synonym replacement |
US10339931B2 (en) | 2017-10-04 | 2019-07-02 | The Toronto-Dominion Bank | Persona-based conversational interface personalization using social network preferences |
US20190122140A1 (en) | 2017-10-20 | 2019-04-25 | STATGRAF Research LLP. | Data analysis and rendering |
US9990632B1 (en) | 2017-10-25 | 2018-06-05 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US20190172055A1 (en) * | 2017-11-03 | 2019-06-06 | Pap Investments, Ltd. | Transaction card with embedded premium content |
CN108090341A (en) * | 2017-12-15 | 2018-05-29 | 深圳市文鼎创数据科技有限公司 | Java card control method and java card |
JP7278968B2 (en) * | 2018-01-18 | 2023-05-22 | フェリカネットワークス株式会社 | Information processing device, information processing method, user terminal, service providing device and service providing method |
US11100492B2 (en) * | 2018-02-19 | 2021-08-24 | Peter Garrett | General purpose re-loadable card aggregation implementation |
EP3762871B1 (en) | 2018-03-07 | 2024-08-07 | X-Card Holdings, LLC | Metal card |
EP3570239A1 (en) * | 2018-05-15 | 2019-11-20 | Thales Dis France SA | Method and system of autonomous enrolment for biometric device holder |
US10546444B2 (en) | 2018-06-21 | 2020-01-28 | Capital One Services, Llc | Systems and methods for secure read-only authentication |
USD956760S1 (en) * | 2018-07-30 | 2022-07-05 | Lion Credit Card Inc. | Multi EMV chip card |
US11847650B2 (en) * | 2018-08-03 | 2023-12-19 | International Business Machines Corporation | Methods and systems for managing personal device security |
US11429704B2 (en) | 2018-09-18 | 2022-08-30 | Apple Inc. | Packaging with automatic authentication system for packaged product |
US10771254B2 (en) | 2018-10-02 | 2020-09-08 | Capital One Services, Llc | Systems and methods for email-based card activation |
WO2020072537A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10686603B2 (en) | 2018-10-02 | 2020-06-16 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10511443B1 (en) | 2018-10-02 | 2019-12-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10542036B1 (en) | 2018-10-02 | 2020-01-21 | Capital One Services, Llc | Systems and methods for signaling an attack on contactless cards |
US10581611B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US11210664B2 (en) | 2018-10-02 | 2021-12-28 | Capital One Services, Llc | Systems and methods for amplifying the strength of cryptographic algorithms |
US10565587B1 (en) | 2018-10-02 | 2020-02-18 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072670A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072474A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
KR20210068391A (en) | 2018-10-02 | 2021-06-09 | 캐피탈 원 서비시즈, 엘엘씨 | System and method for cryptographic authentication of contactless card |
US10554411B1 (en) | 2018-10-02 | 2020-02-04 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072694A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10582386B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10607214B1 (en) | 2018-10-02 | 2020-03-31 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10592710B1 (en) | 2018-10-02 | 2020-03-17 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10949520B2 (en) | 2018-10-02 | 2021-03-16 | Capital One Services, Llc | Systems and methods for cross coupling risk analytics and one-time-passcodes |
WO2020072552A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
CA3115084A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10579998B1 (en) | 2018-10-02 | 2020-03-03 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
JP2022511281A (en) | 2018-10-02 | 2022-01-31 | キャピタル・ワン・サービシーズ・リミテッド・ライアビリティ・カンパニー | Systems and methods for cryptographic authentication of non-contact cards |
US10733645B2 (en) | 2018-10-02 | 2020-08-04 | Capital One Services, Llc | Systems and methods for establishing identity for order pick up |
US10505738B1 (en) | 2018-10-02 | 2019-12-10 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
WO2020072626A1 (en) | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
AU2019351911A1 (en) | 2018-10-02 | 2021-02-25 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10489781B1 (en) | 2018-10-02 | 2019-11-26 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
KR20210068028A (en) | 2018-10-02 | 2021-06-08 | 캐피탈 원 서비시즈, 엘엘씨 | System and method for cryptographic authentication of contactless card |
US10909527B2 (en) | 2018-10-02 | 2021-02-02 | Capital One Services, Llc | Systems and methods for performing a reissue of a contactless card |
US10860814B2 (en) | 2018-10-02 | 2020-12-08 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
US10771253B2 (en) | 2018-10-02 | 2020-09-08 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
FR3090158B1 (en) * | 2018-12-18 | 2020-12-11 | Idemia France | Securing a transaction using a smart card and smart card |
US11361302B2 (en) | 2019-01-11 | 2022-06-14 | Capital One Services, Llc | Systems and methods for touch screen interface interaction using a card overlay |
JP6541120B1 (en) * | 2019-01-22 | 2019-07-10 | 株式会社Social Area Networks | Card type wireless device |
US11037136B2 (en) | 2019-01-24 | 2021-06-15 | Capital One Services, Llc | Tap to autofill card data |
US10467622B1 (en) | 2019-02-01 | 2019-11-05 | Capital One Services, Llc | Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms |
US11120453B2 (en) | 2019-02-01 | 2021-09-14 | Capital One Services, Llc | Tap card to securely generate card data to copy to clipboard |
US10510074B1 (en) | 2019-02-01 | 2019-12-17 | Capital One Services, Llc | One-tap payment using a contactless card |
US10425129B1 (en) | 2019-02-27 | 2019-09-24 | Capital One Services, Llc | Techniques to reduce power consumption in near field communication systems |
US10807766B2 (en) * | 2019-03-15 | 2020-10-20 | Apple Inc. | Packaging with radio-frequency authentication system for packaged product |
US10523708B1 (en) | 2019-03-18 | 2019-12-31 | Capital One Services, Llc | System and method for second factor authentication of customer support calls |
US10643420B1 (en) | 2019-03-20 | 2020-05-05 | Capital One Services, Llc | Contextual tapping engine |
US10438437B1 (en) | 2019-03-20 | 2019-10-08 | Capital One Services, Llc | Tap to copy data to clipboard via NFC |
US10984416B2 (en) | 2019-03-20 | 2021-04-20 | Capital One Services, Llc | NFC mobile currency transfer |
US10535062B1 (en) | 2019-03-20 | 2020-01-14 | Capital One Services, Llc | Using a contactless card to securely share personal data stored in a blockchain |
US10970712B2 (en) | 2019-03-21 | 2021-04-06 | Capital One Services, Llc | Delegated administration of permissions using a contactless card |
US10467445B1 (en) | 2019-03-28 | 2019-11-05 | Capital One Services, Llc | Devices and methods for contactless card alignment with a foldable mobile device |
CN111027369B (en) * | 2019-05-06 | 2023-11-07 | 义隆电子股份有限公司 | Smart card with fingerprint sensing system and control method thereof |
US11521262B2 (en) | 2019-05-28 | 2022-12-06 | Capital One Services, Llc | NFC enhanced augmented reality information overlays |
US10516447B1 (en) | 2019-06-17 | 2019-12-24 | Capital One Services, Llc | Dynamic power levels in NFC card communications |
US11392922B2 (en) * | 2019-06-20 | 2022-07-19 | Advanced New Technologies Co., Ltd. | Validating transactions using information transmitted through magnetic fields |
US11138488B2 (en) | 2019-06-26 | 2021-10-05 | Bank Of America Corporation | Organic light emitting diode (“OLED”) single-use payment instrument |
US11694187B2 (en) | 2019-07-03 | 2023-07-04 | Capital One Services, Llc | Constraining transactional capabilities for contactless cards |
US11392933B2 (en) | 2019-07-03 | 2022-07-19 | Capital One Services, Llc | Systems and methods for providing online and hybridcard interactions |
US10871958B1 (en) | 2019-07-03 | 2020-12-22 | Capital One Services, Llc | Techniques to perform applet programming |
US12086852B2 (en) | 2019-07-08 | 2024-09-10 | Capital One Services, Llc | Authenticating voice transactions with payment card |
US10713649B1 (en) | 2019-07-09 | 2020-07-14 | Capital One Services, Llc | System and method enabling mobile near-field communication to update display on a payment card |
US10498401B1 (en) | 2019-07-15 | 2019-12-03 | Capital One Services, Llc | System and method for guiding card positioning using phone sensors |
US10885514B1 (en) | 2019-07-15 | 2021-01-05 | Capital One Services, Llc | System and method for using image data to trigger contactless card transactions |
US10733601B1 (en) | 2019-07-17 | 2020-08-04 | Capital One Services, Llc | Body area network facilitated authentication or payment authorization |
US11182771B2 (en) | 2019-07-17 | 2021-11-23 | Capital One Services, Llc | System for value loading onto in-vehicle device |
US10832271B1 (en) | 2019-07-17 | 2020-11-10 | Capital One Services, Llc | Verified reviews using a contactless card |
US11521213B2 (en) | 2019-07-18 | 2022-12-06 | Capital One Services, Llc | Continuous authentication for digital services based on contactless card positioning |
US10506426B1 (en) | 2019-07-19 | 2019-12-10 | Capital One Services, Llc | Techniques for call authentication |
US10541995B1 (en) * | 2019-07-23 | 2020-01-21 | Capital One Services, Llc | First factor contactless card authentication system and method |
US20210035109A1 (en) * | 2019-07-31 | 2021-02-04 | Mastercard International Incorporated | Methods and systems for enrollment and use of biometric payment card |
CN110390530A (en) * | 2019-07-31 | 2019-10-29 | 中国工商银行股份有限公司 | The safe payment method and relevant apparatus of chip bank card |
US11468272B2 (en) * | 2019-08-15 | 2022-10-11 | Visa International Service Association | Method, system, and computer program product for detecting fraudulent interactions |
KR20220071211A (en) | 2019-10-02 | 2022-05-31 | 캐피탈 원 서비시즈, 엘엘씨 | Client Device Authentication Using Contactless Legacy Magnetic Stripe Data |
CN110866580B (en) * | 2019-10-31 | 2024-01-16 | 天星数科科技有限公司 | Preprocessing method and device for configuring NFC smart card |
US11410157B2 (en) * | 2019-11-25 | 2022-08-09 | Capital One Services, Llc | Programmable card for token payment and systems and methods for using programmable card |
US11615395B2 (en) | 2019-12-23 | 2023-03-28 | Capital One Services, Llc | Authentication for third party digital wallet provisioning |
US10657754B1 (en) | 2019-12-23 | 2020-05-19 | Capital One Services, Llc | Contactless card and personal identification system |
US11651361B2 (en) | 2019-12-23 | 2023-05-16 | Capital One Services, Llc | Secure authentication based on passport data stored in a contactless card |
US10862540B1 (en) | 2019-12-23 | 2020-12-08 | Capital One Services, Llc | Method for mapping NFC field strength and location on mobile devices |
US10885410B1 (en) | 2019-12-23 | 2021-01-05 | Capital One Services, Llc | Generating barcodes utilizing cryptographic techniques |
US10733283B1 (en) | 2019-12-23 | 2020-08-04 | Capital One Services, Llc | Secure password generation and management using NFC and contactless smart cards |
US11113685B2 (en) | 2019-12-23 | 2021-09-07 | Capital One Services, Llc | Card issuing with restricted virtual numbers |
US11200563B2 (en) | 2019-12-24 | 2021-12-14 | Capital One Services, Llc | Account registration using a contactless card |
US10664941B1 (en) | 2019-12-24 | 2020-05-26 | Capital One Services, Llc | Steganographic image encoding of biometric template information on a card |
US10853795B1 (en) | 2019-12-24 | 2020-12-01 | Capital One Services, Llc | Secure authentication based on identity data stored in a contactless card |
US10757574B1 (en) | 2019-12-26 | 2020-08-25 | Capital One Services, Llc | Multi-factor authentication providing a credential via a contactless card for secure messaging |
US10909544B1 (en) | 2019-12-26 | 2021-02-02 | Capital One Services, Llc | Accessing and utilizing multiple loyalty point accounts |
US11038688B1 (en) | 2019-12-30 | 2021-06-15 | Capital One Services, Llc | Techniques to control applets for contactless cards |
US11455620B2 (en) | 2019-12-31 | 2022-09-27 | Capital One Services, Llc | Tapping a contactless card to a computing device to provision a virtual number |
US10860914B1 (en) | 2019-12-31 | 2020-12-08 | Capital One Services, Llc | Contactless card and method of assembly |
US11531979B2 (en) * | 2020-03-24 | 2022-12-20 | Bank Of America Corporation | Stored-value card-to-card direct communication |
US11100379B1 (en) * | 2020-04-03 | 2021-08-24 | Sentrycard Technologies, Inc. | Multi-purpose smart card with user trusted bond |
US11210656B2 (en) | 2020-04-13 | 2021-12-28 | Capital One Services, Llc | Determining specific terms for contactless card activation |
US11030339B1 (en) | 2020-04-30 | 2021-06-08 | Capital One Services, Llc | Systems and methods for data access control of personal user data using a short-range transceiver |
US10915888B1 (en) | 2020-04-30 | 2021-02-09 | Capital One Services, Llc | Contactless card with multiple rotating security keys |
US11823175B2 (en) | 2020-04-30 | 2023-11-21 | Capital One Services, Llc | Intelligent card unlock |
US11222342B2 (en) | 2020-04-30 | 2022-01-11 | Capital One Services, Llc | Accurate images in graphical user interfaces to enable data transfer |
US10861006B1 (en) | 2020-04-30 | 2020-12-08 | Capital One Services, Llc | Systems and methods for data access control using a short-range transceiver |
US10963865B1 (en) | 2020-05-12 | 2021-03-30 | Capital One Services, Llc | Augmented reality card activation experience |
US11100511B1 (en) | 2020-05-18 | 2021-08-24 | Capital One Services, Llc | Application-based point of sale system in mobile operating systems |
US11063979B1 (en) | 2020-05-18 | 2021-07-13 | Capital One Services, Llc | Enabling communications between applications in a mobile operating system |
CN111800848B (en) * | 2020-07-02 | 2021-09-10 | 恒宝股份有限公司 | Smart card control method and device, terminal equipment and readable storage medium |
US11062098B1 (en) | 2020-08-11 | 2021-07-13 | Capital One Services, Llc | Augmented reality information display and interaction via NFC based authentication |
WO2022061437A1 (en) * | 2020-09-24 | 2022-03-31 | Orcelli Pavani Giuliano | Multifunctional data validation device and data validation method |
US20220108287A1 (en) * | 2020-10-01 | 2022-04-07 | Bank Of America Corporation | Smart card with reverse payment technology |
US11165586B1 (en) | 2020-10-30 | 2021-11-02 | Capital One Services, Llc | Call center web-based authentication using a contactless card |
US11482312B2 (en) | 2020-10-30 | 2022-10-25 | Capital One Services, Llc | Secure verification of medical status using a contactless card |
US11373169B2 (en) | 2020-11-03 | 2022-06-28 | Capital One Services, Llc | Web-based activation of contactless cards |
US11216799B1 (en) | 2021-01-04 | 2022-01-04 | Capital One Services, Llc | Secure generation of one-time passcodes using a contactless card |
US20220215221A1 (en) * | 2021-01-05 | 2022-07-07 | Peter Renteria | Biometric actuated balance-revealing debit card |
US11682012B2 (en) | 2021-01-27 | 2023-06-20 | Capital One Services, Llc | Contactless delivery systems and methods |
US11792001B2 (en) | 2021-01-28 | 2023-10-17 | Capital One Services, Llc | Systems and methods for secure reprovisioning |
US11562358B2 (en) | 2021-01-28 | 2023-01-24 | Capital One Services, Llc | Systems and methods for near field contactless card communication and cryptographic authentication |
US11687930B2 (en) | 2021-01-28 | 2023-06-27 | Capital One Services, Llc | Systems and methods for authentication of access tokens |
US11438329B2 (en) | 2021-01-29 | 2022-09-06 | Capital One Services, Llc | Systems and methods for authenticated peer-to-peer data transfer using resource locators |
US11777933B2 (en) | 2021-02-03 | 2023-10-03 | Capital One Services, Llc | URL-based authentication for payment cards |
US11637826B2 (en) | 2021-02-24 | 2023-04-25 | Capital One Services, Llc | Establishing authentication persistence |
US11245438B1 (en) | 2021-03-26 | 2022-02-08 | Capital One Services, Llc | Network-enabled smart apparatus and systems and methods for activating and provisioning same |
US11935035B2 (en) | 2021-04-20 | 2024-03-19 | Capital One Services, Llc | Techniques to utilize resource locators by a contactless card to perform a sequence of operations |
US11961089B2 (en) | 2021-04-20 | 2024-04-16 | Capital One Services, Llc | On-demand applications to extend web services |
US11902442B2 (en) | 2021-04-22 | 2024-02-13 | Capital One Services, Llc | Secure management of accounts on display devices using a contactless card |
US11354555B1 (en) | 2021-05-04 | 2022-06-07 | Capital One Services, Llc | Methods, mediums, and systems for applying a display to a transaction card |
US20240202727A1 (en) * | 2021-05-20 | 2024-06-20 | Idex Biometrics Asa | Transaction authorization using biometric identity verification |
US12041172B2 (en) | 2021-06-25 | 2024-07-16 | Capital One Services, Llc | Cryptographic authentication to control access to storage devices |
US12061682B2 (en) | 2021-07-19 | 2024-08-13 | Capital One Services, Llc | System and method to perform digital authentication using multiple channels of communication |
US12062258B2 (en) | 2021-09-16 | 2024-08-13 | Capital One Services, Llc | Use of a payment card to unlock a lock |
US12069173B2 (en) | 2021-12-15 | 2024-08-20 | Capital One Services, Llc | Key recovery based on contactless card authentication |
USD1025131S1 (en) * | 2022-05-05 | 2024-04-30 | Capital One Services, Llc | Display screen with graphical user interface for card communication |
US12106308B2 (en) * | 2022-07-08 | 2024-10-01 | Bank Of America Corporation | Auxiliary battery power authentication system for use with an EMV contactless secure transaction card |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040133787A1 (en) * | 2002-03-28 | 2004-07-08 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US6769607B1 (en) * | 1999-11-15 | 2004-08-03 | Satyan G. Pitroda | Point of sale and display adapter for electronic transaction device |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4701601A (en) * | 1985-04-26 | 1987-10-20 | Visa International Service Association | Transaction card with magnetic stripe emulator |
US5412192A (en) * | 1993-07-20 | 1995-05-02 | American Express Company | Radio frequency activated charge card |
US5623552A (en) * | 1994-01-21 | 1997-04-22 | Cardguard International, Inc. | Self-authenticating identification card with fingerprint identification |
US5748737A (en) * | 1994-11-14 | 1998-05-05 | Daggar; Robert N. | Multimedia electronic wallet with generic card |
TW428755U (en) * | 1999-06-03 | 2001-04-01 | Shen Ming Shiang | Fingerprint identification IC card |
US6325285B1 (en) * | 1999-11-12 | 2001-12-04 | At&T Corp. | Smart card with integrated fingerprint reader |
US8103881B2 (en) * | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US20020116330A1 (en) * | 2001-02-21 | 2002-08-22 | Hed Aharon Zeev | Wireless communicating credit card |
US9454752B2 (en) * | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US6811082B2 (en) * | 2001-09-18 | 2004-11-02 | Jacob Y. Wong | Advanced magnetic stripe bridge (AMSB) |
US8082575B2 (en) * | 2002-03-28 | 2011-12-20 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
CZ2005209A3 (en) * | 2002-09-10 | 2005-12-14 | Ivi Smart Technologies, Inc. | Safe biometric verification of identity |
TWI240212B (en) * | 2003-03-14 | 2005-09-21 | Lightuning Tech Inc | Card-type biometric identification device and method therefor |
US6983882B2 (en) * | 2003-03-31 | 2006-01-10 | Kepler, Ltd. | Personal biometric authentication and authorization device |
MXPA05013288A (en) * | 2003-06-16 | 2007-04-18 | Uru Technology Inc | Method and system for creating and operating biometrically enabled multi-purpose credential management devices. |
US20060259390A1 (en) * | 2003-06-19 | 2006-11-16 | Rosenberger Ronald J | Multiple account preset parameter method, apparatus and systems for financial transactions and accounts |
US20080148059A1 (en) * | 2003-07-25 | 2008-06-19 | Shapiro Michael F | Universal, Biometric, Self-Authenticating Identity Computer Having Multiple Communication Ports |
US20060287964A1 (en) * | 2003-12-17 | 2006-12-21 | Brown Kerry D | Contact/contactless and magnetic-stripe data collaboration in a payment card |
US7194438B2 (en) * | 2004-02-25 | 2007-03-20 | Nokia Corporation | Electronic payment schemes in a mobile environment for short-range transactions |
US7681232B2 (en) * | 2004-03-08 | 2010-03-16 | Cardlab Aps | Credit card and a secured data activation system |
US7270276B2 (en) * | 2004-09-29 | 2007-09-18 | Sap Ag | Multi-application smartcard |
US7581678B2 (en) * | 2005-02-22 | 2009-09-01 | Tyfone, Inc. | Electronic transaction card |
US20080035738A1 (en) * | 2005-05-09 | 2008-02-14 | Mullen Jeffrey D | Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card |
DK1913528T3 (en) * | 2005-07-01 | 2013-09-16 | Fabrizio Borracci | Universal chip card |
US8002193B2 (en) * | 2007-03-12 | 2011-08-23 | Visa U.S.A. Inc. | Payment card dynamically receiving power from external source |
US8733632B2 (en) * | 2007-06-22 | 2014-05-27 | Visa U.S.A. Inc. | Mobile subscriber device for financial transaction tokens |
US7819321B2 (en) * | 2007-06-22 | 2010-10-26 | Visa U.S.A. Inc. | Appliance for financial transaction tokens |
US8011577B2 (en) * | 2007-12-24 | 2011-09-06 | Dynamics Inc. | Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality |
US7961101B2 (en) * | 2008-08-08 | 2011-06-14 | Tyfone, Inc. | Small RFID card with integrated inductive element |
US20110280258A1 (en) * | 2010-05-17 | 2011-11-17 | Appsware Wireless, Llc | System and method for dynamic configuration of session layer retry logic based on signal quality |
-
2009
- 2009-08-19 EP EP09808756.2A patent/EP2324445B1/en active Active
- 2009-08-19 US US13/059,433 patent/US8814052B2/en active Active
- 2009-08-19 WO PCT/US2009/054275 patent/WO2010022129A1/en active Application Filing
- 2009-08-19 CN CN200980132605.3A patent/CN102160061B/en active Active
-
2011
- 2011-08-24 US US13/216,919 patent/US8594730B2/en active Active
-
2013
- 2013-10-25 US US14/063,722 patent/US9129280B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6769607B1 (en) * | 1999-11-15 | 2004-08-03 | Satyan G. Pitroda | Point of sale and display adapter for electronic transaction device |
US20040133787A1 (en) * | 2002-03-28 | 2004-07-08 | Innovation Connection Corporation | System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
Cited By (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110191236A1 (en) * | 2010-01-27 | 2011-08-04 | Qsecure, Inc. | Virtual card |
CN102254259A (en) * | 2010-05-21 | 2011-11-23 | 英特尔公司 | Method and apparatus for conducting trusted remote payment transactions |
EP2390823A1 (en) * | 2010-05-31 | 2011-11-30 | Gemalto SA | Bank card with display screen |
WO2011151309A1 (en) * | 2010-05-31 | 2011-12-08 | Gemalto Sa | Bank card with display screen |
CN103038785B (en) * | 2010-05-31 | 2016-11-09 | 金雅拓股份有限公司 | There is the bank card of indicator screen |
CN103038785A (en) * | 2010-05-31 | 2013-04-10 | 金雅拓股份有限公司 | Bank card with display screen |
US8794535B2 (en) | 2010-05-31 | 2014-08-05 | Gemalto Sa | Bank card with display screen |
US8708232B2 (en) | 2010-06-04 | 2014-04-29 | Gemalto Sa | Bank card with display screen |
FR2971109A1 (en) * | 2011-01-28 | 2012-08-03 | Spirtech | BIOMETRIC SYSTEM FOR VERIFYING IDENTITY WITH SUCCESS SIGNAL, COOPERATING WITH A PORTABLE OBJECT |
WO2012101389A1 (en) | 2011-01-28 | 2012-08-02 | Spirtech | Biometric identity verification system using a success signal and interacting with a portable object |
EP2704064A1 (en) * | 2011-04-28 | 2014-03-05 | Prepaytrans Gestion Empresarial, S.L. | Telematic payment system using a multifunction card |
EP2704064A4 (en) * | 2011-04-28 | 2014-12-03 | Prepaytrans Gestion Empresarial S L | Telematic payment system using a multifunction card |
EP2705461A2 (en) * | 2011-05-03 | 2014-03-12 | Microsoft Corporation | Magnetic stripe-based transactions using mobile communication devices |
EP2705461A4 (en) * | 2011-05-03 | 2014-10-01 | Microsoft Corp | Magnetic stripe-based transactions using mobile communication devices |
US8925826B2 (en) | 2011-05-03 | 2015-01-06 | Microsoft Corporation | Magnetic stripe-based transactions using mobile communication devices |
US10210505B2 (en) | 2013-07-23 | 2019-02-19 | Capital One Services, Llc | Dynamic transaction card optimization |
WO2015119834A1 (en) * | 2014-02-04 | 2015-08-13 | Microsoft Technology Licensing, Llc | Multi-use card and system |
EP2925035A1 (en) * | 2014-03-24 | 2015-09-30 | Gemalto SA | Method for activating and deactivating an application in a telecommunications terminal including a secure element and a biometric reader and corresponding server |
WO2015144635A3 (en) * | 2014-03-24 | 2015-11-19 | Gemalto Sa | An activation and deactivation method for an application in a telecommunications terminal comprising a secure element and a biometric reader, and corresponding server |
WO2016058709A1 (en) * | 2014-10-16 | 2016-04-21 | Gemalto Sa | A dual interface smartcard for loading a number of prepaid credits into a prepayment meter |
FR3028643A1 (en) * | 2014-11-13 | 2016-05-20 | Youen Puillandre | ELECTRONIC MULTICARTE |
EP3284067A4 (en) * | 2015-04-14 | 2018-12-05 | Capital One Services, LLC | Dynamic transaction card optimization |
US10579990B2 (en) | 2015-04-14 | 2020-03-03 | Capital One Services, Llc | Dynamic transaction card optimization |
EP3531334A1 (en) * | 2015-04-14 | 2019-08-28 | Capital One Services, LLC | Dynamic transaction card optimization |
US11164177B2 (en) | 2015-04-14 | 2021-11-02 | Capital One Services, Llc | Dynamic transaction card for visual impairment and methods thereof |
US10438191B2 (en) | 2015-04-14 | 2019-10-08 | Capital One Services, Llc | Dynamic transaction card optimization |
EP3567512A1 (en) * | 2015-04-14 | 2019-11-13 | Capital One Services, LLC | A system, method, and apparatus for a dynamic transaction card |
US10713648B2 (en) | 2015-04-14 | 2020-07-14 | Capital One Services, Llc | Dynamic transaction card for visual impairment and methods thereof |
US10651897B2 (en) * | 2015-04-14 | 2020-05-12 | Samsung Electronics Co., Ltd | Near field communication package and portable device including the same |
EP3086272A1 (en) * | 2015-04-20 | 2016-10-26 | Oberthur Technologies | Selecting an application on a card |
CN104869534A (en) * | 2015-05-22 | 2015-08-26 | 东信和平科技股份有限公司 | Method based on mobile phone application remote detection smart card and system thereof |
KR102435446B1 (en) | 2015-07-14 | 2022-08-24 | 삼성전자 주식회사 | Electronic device and payment method using the same |
US10423942B2 (en) | 2015-07-14 | 2019-09-24 | Samsung Electronics Co., Ltd. | Electronic device and payment method using the same |
KR101765140B1 (en) * | 2015-07-14 | 2017-08-07 | 삼성전자주식회사 | Electronic device and payment method using the same |
EP3118798A1 (en) * | 2015-07-14 | 2017-01-18 | Samsung Electronics Co., Ltd. | Electronic device and payment method using the same |
CN106355398A (en) * | 2015-07-14 | 2017-01-25 | 三星电子株式会社 | Electronic device and payment method using the same |
US10902390B2 (en) | 2015-07-14 | 2021-01-26 | Samsung Electronics Co., Ltd. | Electronic device and payment method using the same |
KR20170008657A (en) * | 2015-07-14 | 2017-01-24 | 삼성전자주식회사 | Electronic device and payment method using the same |
US10546291B2 (en) | 2015-09-09 | 2020-01-28 | Samsung Electronics Co., Ltd. | Method and apparatus for performing payment |
US10803452B2 (en) | 2015-09-09 | 2020-10-13 | Samsung Electronics Co., Ltd. | Method and apparatus for performing payment |
EP3537362A1 (en) * | 2015-09-09 | 2019-09-11 | Samsung Electronics Co., Ltd. | Method and apparatus for performing payment |
EP3208731A1 (en) * | 2016-02-17 | 2017-08-23 | Safran Identity & Security | Configuration process and configuration device for a device that carries out baking transactions |
US11195181B2 (en) | 2016-02-17 | 2021-12-07 | Safran Identity & Security | Method and device for parameterising a device for performing banking operations |
FR3047826A1 (en) * | 2016-02-17 | 2017-08-18 | Morpho | METHOD AND DEVICE FOR PARAMETERING A DEVICE FOR PERFORMING BANKING OPERATIONS |
GB2550207A (en) * | 2016-05-13 | 2017-11-15 | Visa Europe Ltd | Extended data storage |
US10839372B2 (en) | 2016-05-13 | 2020-11-17 | Visa Europe Limited | Extended data storage |
US10692070B2 (en) | 2016-05-13 | 2020-06-23 | Visa Europe Limited | Extended data storage |
US10235674B2 (en) | 2016-08-08 | 2019-03-19 | Ellipse World, Inc. | Method for a prepaid, debit and credit card security code generation system |
US10032169B2 (en) | 2016-08-08 | 2018-07-24 | Ellipse World, Inc. | Prepaid, debit and credit card security code generation system |
WO2018029582A1 (en) * | 2016-08-08 | 2018-02-15 | Ellipse World S.A. | Method for a prepaid, debit and credit card security code generation system |
EP3382599A3 (en) * | 2017-03-23 | 2019-01-23 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
US10546223B2 (en) | 2017-03-23 | 2020-01-28 | Idex Biometrics Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
US11250307B2 (en) | 2017-03-23 | 2022-02-15 | Idex Biometrics Asa | Secure, remote biometric enrollment |
US10248900B2 (en) | 2017-03-23 | 2019-04-02 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
US10282651B2 (en) | 2017-03-23 | 2019-05-07 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
US10769512B2 (en) | 2017-03-23 | 2020-09-08 | Idex Biometrics Asa | Device and method to facilitate enrollment of a biometric template |
EP3388974A1 (en) * | 2017-04-13 | 2018-10-17 | Istituto Poligrafico e Zecca dello Stato S.p.A. | New identification document |
US11620631B2 (en) | 2017-06-13 | 2023-04-04 | Ingenico Group | Method for transmitting data to a magnetic reading head, method for processing received data, corresponding payment terminal and program |
CN107309875A (en) * | 2017-07-03 | 2017-11-03 | 杭州酷哥教育科技有限公司 | The method and system for programming Control of swiping the card |
US10775906B2 (en) | 2017-12-12 | 2020-09-15 | Idex Biometrics Asa | Power source for biometric enrollment with status indicators |
US11216712B2 (en) | 2018-08-07 | 2022-01-04 | Idemia Identity & Security France | Acquiring a biometric print by means of a smartcard |
EP3608833A1 (en) * | 2018-08-07 | 2020-02-12 | Idemia Identity & Security France | Acquisition of a biometric fingerprint from a smart card |
FR3084942A1 (en) * | 2018-08-07 | 2020-02-14 | Idemia Identity & Security France | ACQUIRING A BIOMETRIC FOOTPRINT FROM A CHIP CARD |
CN110826674A (en) * | 2018-08-07 | 2020-02-21 | 伊迪米亚身份与安全法国公司 | Obtaining a biometric print via a smart card |
EP3624075A1 (en) * | 2018-08-31 | 2020-03-18 | Capital One Services, LLC | Battery charger for a transaction card |
US11106959B2 (en) | 2018-08-31 | 2021-08-31 | Capital One Services, Llc | Battery charger for a transaction card |
US11580343B2 (en) | 2018-08-31 | 2023-02-14 | Capital One Services, Llc | Battery charger for a transaction card |
US12008424B2 (en) | 2018-08-31 | 2024-06-11 | Capital One Services, Llc | Battery charger for a transaction card |
WO2020115238A1 (en) * | 2018-12-07 | 2020-06-11 | Thales Dis France Sa | Method for manufacturing a device comprising a card-shaped body and an information area |
WO2020181150A1 (en) * | 2019-03-06 | 2020-09-10 | Ziaur Rahman | Biometric card with display |
Also Published As
Publication number | Publication date |
---|---|
EP2324445A1 (en) | 2011-05-25 |
US20140052630A1 (en) | 2014-02-20 |
US8594730B2 (en) | 2013-11-26 |
US20120052800A1 (en) | 2012-03-01 |
CN102160061B (en) | 2014-04-09 |
CN102160061A (en) | 2011-08-17 |
US8814052B2 (en) | 2014-08-26 |
EP2324445A4 (en) | 2013-03-13 |
EP2324445B1 (en) | 2019-03-20 |
US20110140841A1 (en) | 2011-06-16 |
US9129280B2 (en) | 2015-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9129280B2 (en) | Secure smart card system | |
US12056684B2 (en) | Multi-function electronic payment card and device system | |
KR102416954B1 (en) | Methods for prepaid, debit and credit card security code generation systems | |
US10475025B2 (en) | System, method, and apparatus for updating an existing dynamic transaction card | |
US10380581B2 (en) | System, method, and apparatus for a dynamic transaction card | |
US10360557B2 (en) | Dynamic transaction card protected by dropped card detection | |
US9195926B2 (en) | Portable e-wallet and universal card | |
US20180039987A1 (en) | Multi-function transaction card | |
US8746553B2 (en) | Payment device updates using an authentication process | |
US20020153424A1 (en) | Method and apparatus of secure credit card transaction | |
EP3284025A1 (en) | A system, method, and apparatus for a dynamic transaction card | |
US20160189127A1 (en) | Systems And Methods For Creating Dynamic Programmable Credential and Security Cards | |
US11556917B2 (en) | Authorizing a payment with a multi-function transaction card | |
EP2807600A1 (en) | Portable e-wallet and universal card | |
RU2742347C2 (en) | System for generating a security code of a prepaid, a debit and a credit card | |
CN101872454A (en) | Sales terminal transaction processing method, equipment and mobile terminal transaction processing method | |
US20200090161A1 (en) | Payment devices using optical codes | |
US20190272531A1 (en) | Payment device with touch screen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980132605.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09808756 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13059433 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009808756 Country of ref document: EP |