WO2017039539A1 - Method and system for secure online transaction using integrated circuit card - Google Patents

Method and system for secure online transaction using integrated circuit card Download PDF

Info

Publication number
WO2017039539A1
WO2017039539A1 PCT/SG2016/050418 SG2016050418W WO2017039539A1 WO 2017039539 A1 WO2017039539 A1 WO 2017039539A1 SG 2016050418 W SG2016050418 W SG 2016050418W WO 2017039539 A1 WO2017039539 A1 WO 2017039539A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
transaction data
communications device
data
integrated circuit
Prior art date
Application number
PCT/SG2016/050418
Other languages
French (fr)
Inventor
Guohua Sun
Shuming Wu
Original Assignee
Jing King Tech Holdings Pte. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jing King Tech Holdings Pte. Ltd. filed Critical Jing King Tech Holdings Pte. Ltd.
Publication of WO2017039539A1 publication Critical patent/WO2017039539A1/en
Priority to PH12018500444A priority Critical patent/PH12018500444A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards

Definitions

  • the present invention relates to a method and a system for secure online transaction using an integrated circuit (IC) card, in particular but not exclusively, to a method and a system for performing transaction signing and encryption transmission by means of an IC card.
  • IC integrated circuit
  • IC cards With advancement in technology in the area of integrated circuit (IC) cards, financial cards that are issued by banks have progressed from financial cards in the form of magnetic stripe cards to IC cards.
  • the advantages of having financial cards in the form of an IC card include the card being copy-proof and tamper-proof, and the card having a built-it key which helps to achieve the encryption of data, etc.
  • financial IC cards advantageously resolve the many problems related to security of offline transactions.
  • the switch from financial magnetic stripe cards to financial IC cards do not require users such as service providers to add additional devices or change the way or process of how they would handle a payment to accommodate the switch in the type of card.
  • Data may be encrypted in the card and decrypted by background or back-end servers, and hence has the potential to perform a function similar to that of existing hardware security devices such as U key, token or any other hardware security devices or modules that are currently used in conjunction with performing online transactions.
  • existing hardware security devices such as U key, token or any other hardware security devices or modules that are currently used in conjunction with performing online transactions.
  • a financial IC card provided by a user for a transaction is used in conjunction with a dedicated card reading device provided by a merchant or service provider which has been authenticated and is compatible with the financial IC card.
  • signing of the transaction data is performed in the IC card itself and the card reading device encrypts the transaction data, where both the IC card and the card reading device each having its own built-in key.
  • a user conducts such a transaction with a merchant or a bank via the Internet without a card reading device as it is difficult and impractical for the user to have on hand a dedicated card reading device to be used with the financial IC card so as to perform an online transaction that is secure. It is also inconvenient for a user having to carry around additional hardware devices such as an audio key to ensure the security of transactions made online.
  • the problem to be resolved by the present invention is to provide a method and a system for secure online transaction, which includes performing transaction signing, encryption of transaction data and encryption transmission by means of an integrated circuit (IC) card, such as a financial IC card, and using the IC card and a communications device, such as a general-purpose card reading device, to realize secure transaction signing and transaction encryption.
  • IC integrated circuit
  • a method for performing secure online transaction between an integrated circuit card, a communications device and a server comprising:
  • step (d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in step (a) for identification during decryption of the encrypted transaction data.
  • a method for performing secure online transaction between an integrated circuit card, a communications device and a server comprising:
  • step (d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in step (b) for identification during decryption of the encrypted transaction data.
  • the step of generating a dynamic encryption key comprises:
  • the step of signing of the transaction data comprises:
  • step (b) populating the one or more fields of the transaction data according to the grouping of the step (a) by the communications device and requesting the integrated circuit card to generate an application cryptogram (AC 2 );
  • step (c) repeating the step (b) until all the transaction data is communicated to the integrated circuit card, and the integrated circuit card generates the application cryptogram AC 2 to AC n+1 , verification result CVR 2 to CVR n+ i and corresponding application transaction counters and transmits the same to the communications device to complete the signing of the transaction data.
  • the step of transmitting the encrypted transaction data and signature comprising transmitting the encrypted transaction data, the transaction signature (AC 2 to AC n+ i), the application transaction counter (ATC) and all the verification results (CVRi to CVR n+1 ) from the communications device to the server via the communications means.
  • the step of decrypting the encrypted transaction data by the server comprising: (a) deriving a key and an application interchange profile (AIP) corresponding to the integrated circuit card from a database having information relating to the integrated circuit card holder;
  • AIP application interchange profile
  • step (f) repeating the step (e) until all the calculated application cryptogram is compared with all AC n+ i, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
  • the application cryptogram is an eight-byte application cryptogram.
  • the one or more fields of the transaction data comprise(s) a transaction type, an authorized amount, an unpredictable number and an account number.
  • the communications device is a mobile computing device.
  • the mobile computing device is one of a mobile phone, tablet, laptop and personal digital assistant.
  • the communications means is one of the Internet, an intranet, a dedicated network and any network suitable for connecting the communications device and the server.
  • the prescribed size is four bytes.
  • the integer multiple is an integer multiple of four.
  • the tag is in the form an ordinal.
  • the tag is in the form of a timestamp.
  • the method for performing secure online transaction between an integrated circuit card, a communications device and a server is substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
  • a system for performing secure online transaction comprising:
  • a server wherein the integrated circuit card and the communications device communicate via near field communication; and the communications device and the server communicate via a communications means; and wherein the integrated circuit card is operable to generate a dynamic encryption key for transaction data; the communications device is operable to encrypt the transaction data using the encryption key; the integrated circuit card is further operable to sign the transaction data to obtain transaction signature and send the transaction signature to the communications device; and transmit the encrypted transaction data and transaction signature from the communications device to the server via the communications means; the server further operates to decrypt the encrypted transaction data and authenticate the transaction signature in which a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data.
  • a server for use in a system for performing secure online transaction wherein the server is operable to receive an encrypted transaction data and transaction signature from a communications device; and is further operable to decrypt the encrypted transaction data and authenticate the transaction signature; the server further comprises:
  • (b) means for calculating an application ciphertext (ACi) according to an application transaction counter (ATC) and an integrated circuit card verification result (CVR , the key and the AIP derived from the step (a) above, and a prescribed value of the transaction data;
  • ATC application transaction counter
  • CVR integrated circuit card verification result
  • (c) means for decrypting the encrypted transaction data by using the calculated ACi and a prescribed algorithm
  • (d) means for dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
  • step (e) means for adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVR n , and comparing the calculated application cryptogram data with AC n ;
  • step (f) means for repeating the step (e) until all the calculated application cryptogram is compared with all AC n +i, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
  • the server for use in a system for performing secure online transaction is substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
  • EMV specifications which define a set requirements to ensure worldwide interoperability and acceptance of secure payment transactions, by way of rationally utilizing the transaction methods and flows stipulated by EMV
  • an online transaction the signing for transaction data by an integrated circuit (IC) card, such as a financial IC card, and encryption transmission for the transaction data by the card cooperating with a communications device, such as a general-purpose card reading device, are realized.
  • IC card such as a financial IC card
  • a cardholder ensures the transmission security of online transaction data, and realizes both convenience (consistent with use habits of an offline transaction) and security (using this hardware device of the IC card to ensure security).
  • the EMV specifications is fully met, the method of the present invention is efficient and effective, and the signing for transaction data and encryption transmission for the transaction data performed by an IC card are completed without increasing hardware cost, thereby reducing the cost and challenges faced in promoting online transactions.
  • Fig. 1 shows a system for performing secure online transaction in accordance with an embodiment of the present invention.
  • the system comprises an integrated circuit (IC) card in the form of a financial IC card which is in line with the EMV specifications, a communications device in the form of a mobile or cell phone with near field communication function (NFC), and a server.
  • IC integrated circuit
  • NFC near field communication function
  • Fig. 2 shows the financial IC card and cell phone of the system of Fig. 1 , in which a default data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the first time.
  • Fig. 3 shows the financial IC card and cell phone of the system of Fig. 1 , in which a first part of transaction data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the second time.
  • Fig. 4 shows the financial IC card and cell phone of the system of Fig. 1, in which a second part of transaction data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the third time.
  • Fig. 5 shows the process of encrypting plaintext of transaction data by the cell phone of the system of Fig. 1.
  • Fig. 6 shows the process of decrypting the encrypted transaction data by the server of the system of Fig. 1.
  • Fig. 7 shows a system for performing secure online transaction in accordance with another embodiment of the present invention.
  • a system for performing secure online transactions comprising an integrated circuit (IC) card, a communications device and a server (or background server).
  • the IC card and the communications device communicate via near field communication, and the communications device and the server communicate via a communications means.
  • the IC card is operable to generate a dynamic encryption key for transaction data.
  • the communications device is operable to encrypt the transaction data using the encryption key.
  • the integrated circuit card is further operable to sign the transaction data to obtain transaction signature and send the transaction signature to the communications device.
  • the encrypted transaction data and transaction signature is transmitted from the communications device to the server via the communications means.
  • the server further operates to decrypt the encrypted transaction data and authenticate the transaction signature in which a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data (see Fig. 7).
  • the IC card is typically in the form of a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications.
  • the server may be hosted by an IC card-issuing entity such as a bank or financial institution.
  • the communications device is typically in the form of a general-purpose card reader or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like.
  • the communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
  • a method for performing secure online transaction by means of an integrated circuit(IC) card generally comprising the following steps:
  • a first step generating a dynamic encryption key for transaction data, and using the key to encrypt the transaction data;
  • a second step signing of the transaction data
  • a third step transmitting the encrypted transaction data and signature; and A fourth step: decrypting the encrypted transaction data.
  • the method is for performing secure online transaction between an integrated circuit card, a communications device and a server and the method comprises the following steps:
  • ACi application cryptogram
  • CVRi integrated circuit card verification result
  • ATC application transaction counter
  • the method comprises the following steps: Step (a): Processing the transaction data by dividing at least one field of the transaction data into n groups by the communications device if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the server to the remaining data length that is not divided into one or more groups, to make up the prescribed size to form a group;
  • the method comprises transmitting the encrypted transaction data, the transaction signature (AC 2 to ACn + i), the application transaction counter (ATC) and all the verification results (CVRi to CVR n+ i) from the communications device to the server via the communications means.
  • the method comprises the following steps:
  • AIP application interchange profile
  • the application cryptogram is typically in the form of an eight-byte application cryptogram.
  • the one or more fields of the transaction data described above comprise(s) one or more a transaction type, an authorized amount, an unpredictable number and an account number.
  • the IC card is typically in the form of a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications.
  • the server may be hosted by an IC card-issuing entity such as a bank or financial institution.
  • the communications device is typically in the form of a general-purpose card reader or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like.
  • the communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
  • the prescribed size of the data length described is four bytes.
  • the integer multiple of the data length is an integer multiple of four.
  • the tag that is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data is unique and can be in the form of an ordinal, a timestamp of the like.
  • the step of signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication takes place before the steps of generating a dynamic encryption key for transaction data in the IC card, and transmitting the dynamic encryption key from the IC card to the communications device via near field communication, and encrypting the transaction data using the dynamic encryption key in the communications device.
  • the method for performing secure online transaction by means of an integrated circuit(IC) card generally comprises the following steps:
  • a first step signing of the transaction data
  • a second step generating a dynamic encryption key for transaction data, and using the key to encrypt the transaction data
  • a third step transmitting the encrypted transaction data and signature; and A fourth step: decrypting the encrypted transaction data.
  • the method is for performing secure online transaction between an integrated circuit card, a communications device and a server and the method comprises the following steps:
  • a server for use in a system for performing secure online transaction wherein the server is operable to receive an encrypted transaction data and transaction signature from a communications device, and is further operable to decrypt the encrypted transaction data and authenticate the transaction signature.
  • the server further comprises the following features:
  • (b) means for calculating an application ciphertext (AC according to an application transaction counter (ATC) and an integrated circuit card verification result (CVRi), the key and the AIP derived from the step (a) above, and a prescribed value of the transaction data;
  • ATC application transaction counter
  • CVRi integrated circuit card verification result
  • (c) means for decrypting the encrypted transaction data by using the calculated AC ⁇ and a prescribed algorithm
  • (d) means for dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
  • step (e) means for adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVR n , and comparing the calculated application cryptogram data with AC n ;
  • step (f) means for repeating the step (e) until all the calculated application cryptogram is compared with all AC n+1 , wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
  • the server may be hosted by an IC card-issuing entity such as a bank or financial institution.
  • IC card-issuing entity such as a bank or financial institution.
  • a communications device such as a general-purpose card reading device or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like, sends transaction data (the one or more fields of the transaction data includes a "transaction type", an "authorized amount” and an “unpredictable number”, etc.) to a financial IC card, and requests a "generate application cryptogram" operation in accordance with the EMV specifications, so as to realize signing of the transaction data by an IC card, such as a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications, by obtaining a transaction ciphertext or an application cryptogram (AC).
  • IC card such as a financial IC card issued by a bank or financial institution
  • the operation relating to "generate application cryptogram” can be in the form of three types: (i) approving transaction or transaction certificate (TC); (ii) requesting online authorisation or authorisation request cryptogram (ARQC); and (iii) request application authentication or application authentication cryptogram (AAC). Any one of the above-mentioned types can be used.
  • the IC card will perform risk management according to relevant parameters when receiving a ciphertext request, and the IC card may change a request for approving transaction to requesting online authorisation or application authentication, and may also change requesting online authorisation to the application authentication; and only when receiving the application authentication request, the IC card will return the cryptogram for application authentication.
  • Plaintext of the transaction data will be transmitted via a communications means such as a network after being encrypted, and the solution adopted in the present invention as to how to negotiate an encryption key with a server is described as follows:
  • a communications device such as a general-purpose card reading device or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like, uses fields of a "transaction type", an "authorized amount” and an "unpredictable number", etc.
  • a server can restore this encryption key according to a transaction counter or application transaction counter (ATC) and an integrated circuit card verification result (CVR) of the IC card, a key and an application interchange profile (AIP) of the IC card, and a default value of the transaction data.
  • ATC transaction counter or application transaction counter
  • CVR integrated circuit card verification result
  • AIP application interchange profile
  • a communications device such as a general-purpose card reading device (like a cell phone with a near field communication (NFC) function) does not have the security module on a dedicated card reading machine tool, performing encryption on such a device is not secure enough.
  • the present invention uses an IC card which generates a one-time AC as an encryption key, and the encryption key is different every time, i.e. "one key one time", and therefore, the security thereof is also guaranteed.
  • the communications device and the server are faced with the problems in which the encryption and decryption keys change dynamically and the length of the transaction data is uncertain, etc. when performing transaction encryption and decryption operations.
  • the preferable method during implementation is first determining a dynamic key of such a transaction when transaction signing and data encryption transmission are performed by means of an IC card, followed by signing up transaction data, then using the dynamic key of this transaction by the communications device to encrypt the transaction data, and finally sending the encrypted transaction data together with the transaction signature, etc. by the communications device to a server, and decryption is then performed by the server.
  • a "transaction ciphertext” or an "application cryptogram” operation is applied, and a "refuse transaction” type is selected.
  • a communications device will apply several times of "refuse transaction" ciphertext or cryptogram for an IC card.
  • the entire transaction process is described as follows by using a transfer transaction in which a cell phone is used as a communications device to perform non-contact or contactless communication with a financial IC card through a cell phone NFC signal:
  • a cell phone executes a command of "application selection" based on the EMV specifications and selecting a debit or credit application in a financial IC card.
  • the cell phone executes commands of "application initialization" and reading application data based on the EMV specifications.
  • the cell phone uses a default data element to request "refusing transaction ciphertext" or "application authentication cryptogram” (AAC) for the financial IC card.
  • AAC is a collective term of ciphertext or cryptogram, comprising approving transaction ciphertext or transaction certificate (TC), requesting online authorization ciphertext or authorisation request cryptogram (ARQC) and refusing transaction ciphertext or application authentication cryptogram (AAC)).
  • the financial IC card response data comprises ATCi
  • the cell phone converts a 19-bit payee account number or receivables account number of this transaction into eight-byte hexadecimal data.
  • a fifth step the steps one and two described above are repeated, and the financial IC card is allowed to consider restarting a transaction.
  • the cell phone sends the transfer amount, transaction type and first four bytes of the payee account number or receivables account number into the financial IC card to apply for a second "offline transaction refuse" operation.
  • the financial IC card response data comprises ATC 2
  • a seventh step the steps one and two described above are repeated, and the financial IC card is allowed to consider restarting a transaction.
  • the cell phone sends the transfer amount, transaction type and last four bytes of the payee account number or receivables account number into the financial IC card to apply for a third "offline transaction refuse" operation.
  • the financial IC card response data comprises ATC3IAAC3I CVR 3 .
  • the cell phone uses the AACi as an encryption key to encrypt sensitive transaction information in relation to a transferred in/transferred out account number, and transfer amount and type, etc. of this transaction, so as to obtain an encrypted transaction data.
  • the cell phone sends the ATCi
  • the communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
  • the server derives a key and an application interchange profile (AIP) corresponding to the financial IC card from a database according to cardholder information.
  • AIP application interchange profile
  • the server calculates AACi according to the ATCi
  • the AACi is used to decrypt the transaction information in relation to the account number, amount and type, etc. of this transaction.
  • a fourth step one is added to the ATCi, and application ciphertext or application cryptogram data is calculated according to the first four bytes of the account number, amount, transaction type, and data of CVR 2 , etc. and the application ciphertext or application cryptogram data is compared with the AAC 2 . The values compared must be identical in order that the authenticity is verified and the integrity of the online transaction is preserved.
  • another one is added to the ATCi, and application ciphertext or application cryptogram data is calculated according to the last four bytes of the account number, amount, transaction type, and data of CVR 3 , etc. and the application ciphertext or application cryptogram data is compared with the AAC 3 . The values compared must be identical in order that the authenticity is verified and the integrity of the online transaction is preserved.
  • a sixth step if the AAC 2 and the AAC 3 are compared successfully (in other words, the values compared are identical), it shows that the signing for the transaction data by the financial IC card of the cardholder is genuine and believable, the authenticity is verified and the integrity of the online transaction is preserved.
  • the advantages of the present invention include the following:
  • Both the transaction signing and the generation of a dynamic encryption key are performed by the IC card, whilst the encryption of transaction data using the dynamic encryption key generated by the IC card is performed by a separate communications device, hence enabling or realising secure transaction signing and transaction encryption for an online transaction.
  • Each dynamic encryption key generated is assigned a tag that is unique, meaning to say that each dynamic encryption key generated is unique; hence the encrypted transaction data which is communicated to the server can only be decrypted if the assigned tag matches a corresponding tag which the server has on its system. This provides for identification during decryption of the encrypted transaction data at the server and hence prevents the processing of online transactions that are being intercepted or hacked into by third parties at the server which facilitates the overall online transaction to be secure.
  • the communications device being in the form of a general -purposes card reader or a mobile computing device eliminates the need for a dedicated card reading device provided by a merchant or service provider which has been authenticated and is compatible with the IC card, hence providing the convenience when performing online transactions that are secure. It also eliminates the need for a user to have on hand a dedicated card reading device such as an audio key to be used with the IC card so as to perform an online transaction that is secured, adding to the convenience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A method for performing secure online transaction between an integrated circuit card, a communications device and a server, comprising, in the integrated circuit card, generating a dynamic encryption key for transaction data, and transmitting the dynamic encryption key to the communications device via near field communication; in the communications device, encrypting the transaction data using the dynamic encryption key; in the integrated circuit card, signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication; and transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data

Description

METHOD AND SYSTEM FOR SECURE ONLINE TRANSACTION USING
INTEGRATED CIRCUIT CARD
FIELD OF THE INVENTION
The present invention relates to a method and a system for secure online transaction using an integrated circuit (IC) card, in particular but not exclusively, to a method and a system for performing transaction signing and encryption transmission by means of an IC card.
BACKGROUND TO THE INVENTION
The following discussion of the background to the invention is intended to facilitate an understanding of the present invention. However, it should be appreciated that the discussion is not an acknowledgment or admission that any of the material referred to was published, known or part of the common general knowledge in any jurisdiction as at the priority date of the application
With advancement in technology in the area of integrated circuit (IC) cards, financial cards that are issued by banks have progressed from financial cards in the form of magnetic stripe cards to IC cards. In comparison with magnetic stripe cards, the advantages of having financial cards in the form of an IC card include the card being copy-proof and tamper-proof, and the card having a built-it key which helps to achieve the encryption of data, etc. As such, financial IC cards advantageously resolve the many problems related to security of offline transactions. At the same time, the switch from financial magnetic stripe cards to financial IC cards do not require users such as service providers to add additional devices or change the way or process of how they would handle a payment to accommodate the switch in the type of card.
However, for online transactions at present, in order to ensure the security thereof, the transactions are performed via online banking and with a hardware device, such as a U key or a token. Mobile banking or mobile payment similarly relies on a hardware device, such as an audio key or mPOS, so as to ensure the security of transactions made online via a mobile device. Whilst it may be inconvenient for a user having to carry around a hardware device, a certain degree of security is compromised if such a device is not used
i while mobile banking or mobile payment is performed by a user. As such, performing online transactions at present are either secure but inconvenient, or convenient but insecure.
Generally in most countries, there are certain requirements imposed on banks or financial institutions in relation to the issuance of financial cards so as to ensure that these cards issued meet a certain level of security, for example, the EMVCo global standard for credit and debit payment cards; and the People's Bank of China (PBOC) standard for financial cards issued in China. Such a financial IC card is able to securely store a cardholder's key inside the card, and a built-in CPU in the card can realize multiple symmetric and asymmetric encryption and decryption algorithms which typically complies with both international and national standards. Data may be encrypted in the card and decrypted by background or back-end servers, and hence has the potential to perform a function similar to that of existing hardware security devices such as U key, token or any other hardware security devices or modules that are currently used in conjunction with performing online transactions. However, there is no such application at present.
Typically, to enable a secure offline transaction, a financial IC card provided by a user for a transaction is used in conjunction with a dedicated card reading device provided by a merchant or service provider which has been authenticated and is compatible with the financial IC card. In particular, signing of the transaction data is performed in the IC card itself and the card reading device encrypts the transaction data, where both the IC card and the card reading device each having its own built-in key. However, for online transactions, a user conducts such a transaction with a merchant or a bank via the Internet without a card reading device as it is difficult and impractical for the user to have on hand a dedicated card reading device to be used with the financial IC card so as to perform an online transaction that is secure. It is also inconvenient for a user having to carry around additional hardware devices such as an audio key to ensure the security of transactions made online.
Therefore, the present invention attempts to overcome at least in part some of the aforementioned disadvantages. SUMMARY OF THE INVENTION
Throughout this document, unless otherwise indicated to the contrary, the terms "comprising", "consisting of, and the like, are to be construed as non-exhaustive, or in other words, as meaning "including, but not limited to". The problem to be resolved by the present invention is to provide a method and a system for secure online transaction, which includes performing transaction signing, encryption of transaction data and encryption transmission by means of an integrated circuit (IC) card, such as a financial IC card, and using the IC card and a communications device, such as a general-purpose card reading device, to realize secure transaction signing and transaction encryption.
In accordance with a first aspect of the present invention, there is provided a method for performing secure online transaction between an integrated circuit card, a communications device and a server, comprising:
(a) in the integrated circuit card, generating a dynamic encryption key for transaction data, and transmitting the dynamic encryption key to the communications device via near field communication;
(b) in the communications device, encrypting the transaction data using the dynamic encryption key;
(c) in the integrated circuit card, signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication; and
(d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in step (a) for identification during decryption of the encrypted transaction data.
In accordance with a second aspect of the present invention, there is provided a method for performing secure online transaction between an integrated circuit card, a communications device and a server, comprising:
(a) in the integrated circuit card, signing transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication;
(b) in the integrated circuit card, generating a dynamic encryption key for the transaction data, and transmitting the dynamic encryption key to a communications device via near field communication;
(c) in the communications device, encrypting the transaction data using the dynamic encryption key; and
(d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in step (b) for identification during decryption of the encrypted transaction data.
Preferably, the step of generating a dynamic encryption key comprises:
(a) executing an application for the online transaction by the communications device;
(b) requesting the integrated circuit card to generate an application cryptogram (ACi) and setting all fields of the transaction data to a prescribed value by the communications device; and
(c) generating the application cryptogram (ACi), an integrated circuit card verification result (CVRi) and an application transaction counter (ATC) by the integrated circuit card and transmitting the generated ACi, CVRj and ATC to the communications device, wherein the generated ACi is the encryption key used for encrypting the transaction data. Preferably, the step of signing of the transaction data comprises:
(a) processing the transaction data by dividing at least one field of the transaction data into n groups by the communications device if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the server to the remaining data length that is not divided into one or more groups, to make up the prescribed size to form a group;
(b) populating the one or more fields of the transaction data according to the grouping of the step (a) by the communications device and requesting the integrated circuit card to generate an application cryptogram (AC2); and
(c) repeating the step (b) until all the transaction data is communicated to the integrated circuit card, and the integrated circuit card generates the application cryptogram AC2 to ACn+1, verification result CVR2 to CVRn+i and corresponding application transaction counters and transmits the same to the communications device to complete the signing of the transaction data.
Preferably, the step of transmitting the encrypted transaction data and signature comprising transmitting the encrypted transaction data, the transaction signature (AC2 to ACn+i), the application transaction counter (ATC) and all the verification results (CVRi to CVRn+1) from the communications device to the server via the communications means.
Preferably, the step of decrypting the encrypted transaction data by the server comprising: (a) deriving a key and an application interchange profile (AIP) corresponding to the integrated circuit card from a database having information relating to the integrated circuit card holder;
(b) calculating the ACi according to the received ATC and CVRi, the key and the AIP derived from the step (a) above, and the prescribed value of the transaction data;
(c) decrypting the encrypted transaction data by using the calculated AQ and a prescribed algorithm;
(d) dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
(e) adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
(f) repeating the step (e) until all the calculated application cryptogram is compared with all ACn+i, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
Preferably, the application cryptogram is an eight-byte application cryptogram.
Preferably, the one or more fields of the transaction data comprise(s) a transaction type, an authorized amount, an unpredictable number and an account number.
Preferably, the communications device is a mobile computing device.
Preferably, the mobile computing device is one of a mobile phone, tablet, laptop and personal digital assistant.
Preferably, the communications means is one of the Internet, an intranet, a dedicated network and any network suitable for connecting the communications device and the server.
Preferably, the prescribed size is four bytes. Preferably, the integer multiple is an integer multiple of four. Preferably, the tag is in the form an ordinal. Preferably, the tag is in the form of a timestamp.
Preferably, the method for performing secure online transaction between an integrated circuit card, a communications device and a server is substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
In accordance with a third aspect of the present invention, there is provided a system for performing secure online transaction comprising:
(a) an integrated circuit card; (b) a communications device; and
(c) a server, wherein the integrated circuit card and the communications device communicate via near field communication; and the communications device and the server communicate via a communications means; and wherein the integrated circuit card is operable to generate a dynamic encryption key for transaction data; the communications device is operable to encrypt the transaction data using the encryption key; the integrated circuit card is further operable to sign the transaction data to obtain transaction signature and send the transaction signature to the communications device; and transmit the encrypted transaction data and transaction signature from the communications device to the server via the communications means; the server further operates to decrypt the encrypted transaction data and authenticate the transaction signature in which a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data. Preferably, the system for performing secure online transaction is substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate. In accordance with a fourth aspect of the present invention, there is provided a server for use in a system for performing secure online transaction wherein the server is operable to receive an encrypted transaction data and transaction signature from a communications device; and is further operable to decrypt the encrypted transaction data and authenticate the transaction signature; the server further comprises:
(a) means for deriving a key and an application interchange profile (AIP) corresponding to an integrated circuit card from a database having information relating to the integrated circuit card holder;
(b) means for calculating an application ciphertext (ACi) according to an application transaction counter (ATC) and an integrated circuit card verification result (CVR , the key and the AIP derived from the step (a) above, and a prescribed value of the transaction data;
(c) means for decrypting the encrypted transaction data by using the calculated ACi and a prescribed algorithm;
(d) means for dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
(e) means for adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
(f) means for repeating the step (e) until all the calculated application cryptogram is compared with all ACn+i, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
Preferably, the server for use in a system for performing secure online transaction is substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
The technical effect of the present invention comprises the following:
In accordance with EMV specifications, which define a set requirements to ensure worldwide interoperability and acceptance of secure payment transactions, by way of rationally utilizing the transaction methods and flows stipulated by EMV, in an online transaction, the signing for transaction data by an integrated circuit (IC) card, such as a financial IC card, and encryption transmission for the transaction data by the card cooperating with a communications device, such as a general-purpose card reading device, are realized. Using an IC card, such as a financial IC card, held by a cardholder ensures the transmission security of online transaction data, and realizes both convenience (consistent with use habits of an offline transaction) and security (using this hardware device of the IC card to ensure security). The EMV specifications is fully met, the method of the present invention is efficient and effective, and the signing for transaction data and encryption transmission for the transaction data performed by an IC card are completed without increasing hardware cost, thereby reducing the cost and challenges faced in promoting online transactions.
Other aspects and advantages of the invention will become apparent to those skilled in the art from a review of the ensuing description, which proceeds with reference to the following illustrative drawings of various embodiments of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 shows a system for performing secure online transaction in accordance with an embodiment of the present invention. The system comprises an integrated circuit (IC) card in the form of a financial IC card which is in line with the EMV specifications, a communications device in the form of a mobile or cell phone with near field communication function (NFC), and a server.
Fig. 2 shows the financial IC card and cell phone of the system of Fig. 1 , in which a default data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the first time. Fig. 3 shows the financial IC card and cell phone of the system of Fig. 1 , in which a first part of transaction data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the second time. Fig. 4 shows the financial IC card and cell phone of the system of Fig. 1, in which a second part of transaction data element and financial IC card response data used when the cell phone sends an instruction of "generate application cryptogram" to a financial IC card for the third time.
Fig. 5 shows the process of encrypting plaintext of transaction data by the cell phone of the system of Fig. 1.
Fig. 6 shows the process of decrypting the encrypted transaction data by the server of the system of Fig. 1.
Fig. 7 shows a system for performing secure online transaction in accordance with another embodiment of the present invention. DETAILED DESCRIPTION OF THE INVENTION
Particular embodiments of the present invention will now be described with reference to the accompanying drawings. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present invention. Additionally, unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art to which this invention belongs.
With reference to Figs. 1 to 7, there is described hereinafter a system and a method for performing secure online transaction using an integrated circuit (IC) card.
In accordance with an embodiment of an aspect of the present invention, there is a system for performing secure online transactions comprising an integrated circuit (IC) card, a communications device and a server (or background server). The IC card and the communications device communicate via near field communication, and the communications device and the server communicate via a communications means. The IC card is operable to generate a dynamic encryption key for transaction data. The communications device is operable to encrypt the transaction data using the encryption key. The integrated circuit card is further operable to sign the transaction data to obtain transaction signature and send the transaction signature to the communications device. The encrypted transaction data and transaction signature is transmitted from the communications device to the server via the communications means. The server further operates to decrypt the encrypted transaction data and authenticate the transaction signature in which a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data (see Fig. 7). The IC card is typically in the form of a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications. The server may be hosted by an IC card-issuing entity such as a bank or financial institution. The communications device is typically in the form of a general-purpose card reader or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like. The communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
In accordance with an embodiment of another aspect of the present invention, there is a method for performing secure online transaction by means of an integrated circuit(IC) card generally comprising the following steps:
A first step: generating a dynamic encryption key for transaction data, and using the key to encrypt the transaction data;
A second step: signing of the transaction data;
A third step: transmitting the encrypted transaction data and signature; and A fourth step: decrypting the encrypted transaction data.
In particular, the method is for performing secure online transaction between an integrated circuit card, a communications device and a server and the method comprises the following steps:
Step (a): In the IC card, generating a dynamic encryption key for transaction data, and transmitting the dynamic encryption key from the IC card to the communications device via near field communication;
Step (b): In the communications device, encrypting the transaction data using the dynamic encryption key; Step (c): In the IC card, signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication; and
Step (d): Transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in the step (a) for identification during decryption of the encrypted transaction data.
In the step of generating a dynamic encryption key, the method comprises the following steps: Step (a): Executing an application for the online transaction by the communications device;
Step (b): Requesting the IC card to generate an application cryptogram (ACi) and setting all fields of the transaction data to a prescribed value by the communications device; and
Step (c): Generating the application cryptogram (ACi), an integrated circuit card verification result (CVRi) and an application transaction counter (ATC) by the integrated circuit card and transmitting the generated AQ, CVRi and ATC to the communications device, wherein the generated ACi is the encryption key used for encrypting the transaction data.
In the step of signing of the transaction data, the method comprises the following steps: Step (a): Processing the transaction data by dividing at least one field of the transaction data into n groups by the communications device if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the server to the remaining data length that is not divided into one or more groups, to make up the prescribed size to form a group;
Step (b): Populating the one or more fields of the transaction data according to the grouping of the step (a) by the communications device and requesting the integrated circuit card to generate an application cryptogram (AC2); and
Step (c): Repeating the step (b) until all the transaction data is communicated to the integrated circuit card, and the integrated circuit card generates the application cryptogram AC2 to ACn+i, verification result CVR2 to CVRn+i and corresponding application transaction counters and transmits the same to the communications device to complete the signing of the transaction data.
In the step of transmitting the encrypted transaction data and signature, the method comprises transmitting the encrypted transaction data, the transaction signature (AC2 to ACn+i), the application transaction counter (ATC) and all the verification results (CVRi to CVRn+i) from the communications device to the server via the communications means. In the step of decrypting the encrypted transaction data by the server, the method comprises the following steps:
Step (a): Deriving a key and an application interchange profile (AIP) corresponding to the integi'ated circuit card from a database having information relating to the integrated circuit card holder; Step (b): Calculating the ACi according to the received ATC and CVR the key and the AIP derived from the step (a) above, and the prescribed value of the transaction data;
Step (c): Decrypting the encrypted transaction data by using the calculated ACi and a prescribed algorithm;
Step (d): Dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group; Step (e): Adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
Step (f): Repeating the step (e) until all the calculated application cryptogram is compared with all ACn+i, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
Following from the above, the application cryptogram is typically in the form of an eight-byte application cryptogram.
The one or more fields of the transaction data described above comprise(s) one or more a transaction type, an authorized amount, an unpredictable number and an account number.
The IC card is typically in the form of a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications. The server may be hosted by an IC card-issuing entity such as a bank or financial institution. The communications device is typically in the form of a general-purpose card reader or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like. The communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
The prescribed size of the data length described is four bytes. The integer multiple of the data length is an integer multiple of four.
The tag that is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data is unique and can be in the form of an ordinal, a timestamp of the like.
In accordance with another embodiment, the step of signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication takes place before the steps of generating a dynamic encryption key for transaction data in the IC card, and transmitting the dynamic encryption key from the IC card to the communications device via near field communication, and encrypting the transaction data using the dynamic encryption key in the communications device. In other words, the method for performing secure online transaction by means of an integrated circuit(IC) card generally comprises the following steps:
A first step: signing of the transaction data; A second step: generating a dynamic encryption key for transaction data, and using the key to encrypt the transaction data;
A third step: transmitting the encrypted transaction data and signature; and A fourth step: decrypting the encrypted transaction data.
In particular, the method is for performing secure online transaction between an integrated circuit card, a communications device and a server and the method comprises the following steps:
Step (a): In the IC card, signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication; Step (b): In the IC card, generating a dynamic encryption key for transaction data, and transmitting the dynamic encryption key from the IC card to the communications device via near field communication;
Step (c): In the communications device, encrypting the transaction data using the dynamic encryption key; and Step (d): Transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server, wherein a tag is assigned to the dynamic encryption key in the step (b) for identification during decryption of the encrypted transaction data. In accordance with an embodiment of another aspect of the present invention, there is a server for use in a system for performing secure online transaction wherein the server is operable to receive an encrypted transaction data and transaction signature from a communications device, and is further operable to decrypt the encrypted transaction data and authenticate the transaction signature. The server further comprises the following features:
(a) means for deriving a key and an application interchange profile (AIP) corresponding to an integrated circuit card from a database having information relating to the integrated circuit card holder;
(b) means for calculating an application ciphertext (AC according to an application transaction counter (ATC) and an integrated circuit card verification result (CVRi), the key and the AIP derived from the step (a) above, and a prescribed value of the transaction data;
(c) means for decrypting the encrypted transaction data by using the calculated AC\ and a prescribed algorithm;
(d) means for dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
(e) means for adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
(f) means for repeating the step (e) until all the calculated application cryptogram is compared with all ACn+1, wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
The server may be hosted by an IC card-issuing entity such as a bank or financial institution. The implementing process of the present invention will now be described as follows:
When performing transaction signing, a communications device such as a general-purpose card reading device or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like, sends transaction data (the one or more fields of the transaction data includes a "transaction type", an "authorized amount" and an "unpredictable number", etc.) to a financial IC card, and requests a "generate application cryptogram" operation in accordance with the EMV specifications, so as to realize signing of the transaction data by an IC card, such as a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications, by obtaining a transaction ciphertext or an application cryptogram (AC).
The operation relating to "generate application cryptogram" can be in the form of three types: (i) approving transaction or transaction certificate (TC); (ii) requesting online authorisation or authorisation request cryptogram (ARQC); and (iii) request application authentication or application authentication cryptogram (AAC). Any one of the above-mentioned types can be used. However, the IC card will perform risk management according to relevant parameters when receiving a ciphertext request, and the IC card may change a request for approving transaction to requesting online authorisation or application authentication, and may also change requesting online authorisation to the application authentication; and only when receiving the application authentication request, the IC card will return the cryptogram for application authentication. Therefore, during implementation, applying for "application authentication ciphertext" or "application authentication cryptogram" (AAC) enables the logic to be simpler without having to influence the normal offline transaction of the IC card. In an online transaction, except for the field "authorized amount", there is also typically a need for the transaction data to comprise other information, such as "transferred in account number". Whilst an instruction of requesting "transaction ciphertext" or "application cryptogram" does not contain fields, such as "transferred in account number", an "unpredictable number" field with four bytes can be set arbitrarily. Transaction fields of "transferred in account number", etc. which are not contained in an instruction of applying for "transaction ciphertext" or "application cryptogram" are segmented into groups with every four bytes being one group, the above-mentioned data comprising the transaction fields, with four bytes being one group, of "transferred in account number", etc. are successively placed into an "unpredictable number" field of the instruction by requesting a "transaction ciphertext" or "application cryptogram" operation for an IC card several times, and all the data are successively sent into the IC card, thereby realizing signing of the entire transaction data by the IC card.
Plaintext of the transaction data will be transmitted via a communications means such as a network after being encrypted, and the solution adopted in the present invention as to how to negotiate an encryption key with a server is described as follows: When transaction encryption is performed, a communications device such as a general-purpose card reading device or a mobile computing device which includes a mobile or cell phone, a tablet, a laptop, a personal digital assistant and the like, uses fields of a "transaction type", an "authorized amount" and an "unpredictable number", etc. with a group of default data elements (for example, all is "zero") to request a "transaction ciphertext" or an "application cryptogram" operation for an IC card, such as a financial IC card issued by a bank or financial institution, and the card meets the requirements of the EMV specifications, uses the transaction ciphertext or application cryptogram (AC) returned by the IC card as an encryption key, and then encrypts plaintext of the transaction data on the communications device; and a server can restore this encryption key according to a transaction counter or application transaction counter (ATC) and an integrated circuit card verification result (CVR) of the IC card, a key and an application interchange profile (AIP) of the IC card, and a default value of the transaction data. In this way, the problem of encryption of transmission of transaction data is resolved. Since a communications device such as a general-purpose card reading device (like a cell phone with a near field communication (NFC) function) does not have the security module on a dedicated card reading machine tool, performing encryption on such a device is not secure enough. However, the present invention uses an IC card which generates a one-time AC as an encryption key, and the encryption key is different every time, i.e. "one key one time", and therefore, the security thereof is also guaranteed. During implementation under certain circumstances, the communications device and the server are faced with the problems in which the encryption and decryption keys change dynamically and the length of the transaction data is uncertain, etc. when performing transaction encryption and decryption operations. In this regard, the preferable method during implementation is first determining a dynamic key of such a transaction when transaction signing and data encryption transmission are performed by means of an IC card, followed by signing up transaction data, then using the dynamic key of this transaction by the communications device to encrypt the transaction data, and finally sending the encrypted transaction data together with the transaction signature, etc. by the communications device to a server, and decryption is then performed by the server. A "transaction ciphertext" or an "application cryptogram" operation is applied, and a "refuse transaction" type is selected.
With reference to the figures, the following particular embodiments of the present invention are described based on the preferred method described above:
In the process of an entire online transaction, a communications device will apply several times of "refuse transaction" ciphertext or cryptogram for an IC card. The entire transaction process is described as follows by using a transfer transaction in which a cell phone is used as a communications device to perform non-contact or contactless communication with a financial IC card through a cell phone NFC signal:
1. Signing and Encryption of Transaction Data by a Cell Phone:
In a first step, a cell phone executes a command of "application selection" based on the EMV specifications and selecting a debit or credit application in a financial IC card.
In a second step, the cell phone executes commands of "application initialization" and reading application data based on the EMV specifications.
In a third step, as shown in Fig. 2, the cell phone uses a default data element to request "refusing transaction ciphertext" or "application authentication cryptogram" (AAC) for the financial IC card. (AC is a collective term of ciphertext or cryptogram, comprising approving transaction ciphertext or transaction certificate (TC), requesting online authorization ciphertext or authorisation request cryptogram (ARQC) and refusing transaction ciphertext or application authentication cryptogram (AAC)). The financial IC card response data comprises ATCi|AACi|CVR]. In a fourth step, the cell phone converts a 19-bit payee account number or receivables account number of this transaction into eight-byte hexadecimal data.
In a fifth step, the steps one and two described above are repeated, and the financial IC card is allowed to consider restarting a transaction. In a sixth step, as shown in Fig. 3, the cell phone sends the transfer amount, transaction type and first four bytes of the payee account number or receivables account number into the financial IC card to apply for a second "offline transaction refuse" operation. The financial IC card response data comprises ATC2|AAC2| CVR2.
In a seventh step, the steps one and two described above are repeated, and the financial IC card is allowed to consider restarting a transaction.
In an eighth step, as shown in Fig. 4, the cell phone sends the transfer amount, transaction type and last four bytes of the payee account number or receivables account number into the financial IC card to apply for a third "offline transaction refuse" operation. The financial IC card response data comprises ATC3IAAC3I CVR3. In a ninth step, as shown in Fig. 5, the cell phone uses the AACi as an encryption key to encrypt sensitive transaction information in relation to a transferred in/transferred out account number, and transfer amount and type, etc. of this transaction, so as to obtain an encrypted transaction data.
In a tenth step, the cell phone sends the ATCi|CVRi|encrypted transaction data|AAC2|CVR2|AAC3|CVR3 to a server (or background server) via a communications means such as an open network. The communications means can be one of the Internet, an intranet, a dedicated network or any network that is suitable for connecting the communications device and the server.
2. Decrypting the Transaction Data by the Server for Background Server): In a first step, the server derives a key and an application interchange profile (AIP) corresponding to the financial IC card from a database according to cardholder information.
In a second step, the server calculates AACi according to the ATCi|CVRi|AIP and financial IC card key as well as a transaction data default value.
In a third step, as shown in Fig. 6, the AACi is used to decrypt the transaction information in relation to the account number, amount and type, etc. of this transaction.
In a fourth step, one is added to the ATCi, and application ciphertext or application cryptogram data is calculated according to the first four bytes of the account number, amount, transaction type, and data of CVR2, etc. and the application ciphertext or application cryptogram data is compared with the AAC2. The values compared must be identical in order that the authenticity is verified and the integrity of the online transaction is preserved. In a fifth step, another one is added to the ATCi, and application ciphertext or application cryptogram data is calculated according to the last four bytes of the account number, amount, transaction type, and data of CVR3, etc. and the application ciphertext or application cryptogram data is compared with the AAC3. The values compared must be identical in order that the authenticity is verified and the integrity of the online transaction is preserved.
In a sixth step, if the AAC2 and the AAC3 are compared successfully (in other words, the values compared are identical), it shows that the signing for the transaction data by the financial IC card of the cardholder is genuine and believable, the authenticity is verified and the integrity of the online transaction is preserved. The advantages of the present invention include the following:
1. Both the transaction signing and the generation of a dynamic encryption key are performed by the IC card, whilst the encryption of transaction data using the dynamic encryption key generated by the IC card is performed by a separate communications device, hence enabling or realising secure transaction signing and transaction encryption for an online transaction.
2. Each dynamic encryption key generated is assigned a tag that is unique, meaning to say that each dynamic encryption key generated is unique; hence the encrypted transaction data which is communicated to the server can only be decrypted if the assigned tag matches a corresponding tag which the server has on its system. This provides for identification during decryption of the encrypted transaction data at the server and hence prevents the processing of online transactions that are being intercepted or hacked into by third parties at the server which facilitates the overall online transaction to be secure. 3. The communications device being in the form of a general -purposes card reader or a mobile computing device eliminates the need for a dedicated card reading device provided by a merchant or service provider which has been authenticated and is compatible with the IC card, hence providing the convenience when performing online transactions that are secure. It also eliminates the need for a user to have on hand a dedicated card reading device such as an audio key to be used with the IC card so as to perform an online transaction that is secured, adding to the convenience.
It is to be understood that the above embodiments have been provided only by way of exemplification of this invention, and that further modifications and improvements thereto, as would be apparent to persons skilled in the relevant art, are deemed to fall within the broad scope and ambit of the present invention described herein. It is further to be understood that features from one or more of the described embodiments may be combined to form further embodiments.

Claims

A method for performing secure online transaction between an integrated circuit card, a communications device and a server, comprising:
(a) in the integrated circuit card, generating a dynamic encryption key for transaction data, and transmitting the dynamic encryption key to the communications device via near field communication;
(b) in the communications device, encrypting the transaction data using the dynamic encryption key;
(c) in the integrated circuit card, signing the transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication; and
(d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server,
wherein a tag is assigned to the dynamic encryption key in step (a) for identification during decryption of the encrypted transaction data.
A method for performing secure online transaction between an integrated circuit card, a communications device and a server, comprising:
(a) in the integrated circuit card, signing transaction data to obtain transaction signature and sending the transaction signature to the communications device via near field communication;
(b) in the integrated circuit card, generating a dynamic encryption key for the transaction data, and transmitting the dynamic encryption key to a communications device via near field communication;
(c) in the communications device, encrypting the transaction data using the dynamic encryption key; and
(d) transmitting the encrypted transaction data and transaction signature from the communications device to the server via a communications means for decryption of the encrypted transaction data and authentication of the transaction signature by the server,
wherein a tag is assigned to the dynamic encryption key in step (b) for identification during decryption of the encrypted transaction data.
3. The method according to claim 1 or 2, wherein the step of generating a dynamic encryption key comprises:
(a) executing an application for the online transaction by the communications device;
(b) requesting the integrated circuit card to generate an application cryptogram (AQ) and setting all fields of the transaction data to a prescribed value by the communications device; and
(c) generating the application cryptogram (ACi), an integrated circuit card verification result (CVRi) and an application transaction counter (ATC) by the integrated circuit card and transmitting the generated ACl5 CVRi and ATC to the communications device, wherein the generated ACi is the encryption key used for encrypting the transaction data.
4. The method according to claim 3, wherein the step of signing of the transaction data comprises:
(a) processing the transaction data by dividing at least one field of the transaction data into n groups by the communications device if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the server to the remaining data length that is not divided into one or more groups, to make up the prescribed size to form a group;
(b) populating the one or more fields of the transaction data according to the grouping of the step (a) by the communications device and requesting the integrated circuit card to generate an application cryptogram (AC2); and
(c) repeating the step (b) until all the transaction data is communicated to the integrated circuit card, and the integrated circuit card generates the application cryptogram AC2 to ACn+i, verification result CVR2 to CVRn+i and corresponding application transaction counters and transmits the same to the communications device to complete the signing of the transaction data.
5. The method according to claim 4, wherein the step of transmitting the encrypted transaction data and signature comprising transmitting the encrypted transaction data, the transaction signature (AC2 to ACn+i), the application transaction counter (ATC) and all the verification results (CVRi to CVRn+i) from the communications device to the server via the communications means.
6. The method according to claim 5, wherein the step of decrypting the encrypted transaction data by the server comprising:
(a) deriving a key and an application interchange profile (AIP) corresponding to the integrated circuit card from a database having information relating to the integrated circuit card holder;
(b) calculating the ACi according to the received ATC and CVRi, the key and the AIP derived from the step (a) above, and the prescribed value of the transaction data;
(c) decrypting the encrypted transaction data by using the calculated AQ and a prescribed algorithm;
(d) dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group;
(e) adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
(f) repeating the step (e) until all the calculated application cryptogram is compared with all ACn+i,
wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
7. The method according to any of claims 3 to 6, wherein the application cryptogram is an eight-byte application cryptogram.
8. The method according to any preceding claim, wherein the one or more fields of the transaction data comprises a transaction type, an authorized amount, an unpredictable number and an account number.
9. The method according to any preceding claim, wherein the communications device is a mobile computing device.
10. The method according to claim 8, wherein the mobile computing device is one of a mobile phone, tablet, laptop and personal digital assistant.
11. The method according to any preceding claim, wherein the communications means is one of the Internet, an intranet, a dedicated network and any network suitable for connecting the communications device and the server.
12. The method according to any preceding claim, wherein the prescribed size is four bytes.
13. The method according to any preceding claim, wherein the integer multiple is an integer multiple of four.
14. The method according to any preceding claim, wherein the tag is in the form an ordinal.
15. The method according to any of claims 1 to 13, wherein the tag is in the form of a timestamp.
16. A system for performing secure online transaction comprising:
(a) an integrated circuit card;
(b) a communications device; and
(c) a server,
wherein the integrated circuit card and the communications device communicate via near field communication; and the communications device and the server communicate via a communications means; and
wherein the integrated circuit card is operable to generate a dynamic encryption key for transaction data; the communications device is operable to encrypt the transaction data using the encryption key; the integrated circuit card is further operable to sign the transaction data to obtain transaction signature and send the transaction signature to the communications device; and transmit the encrypted transaction data and transaction signature from the communications device to the server via the communications means; the server further operates to decrypt the encrypted transaction data and authenticate the transaction signature in which a tag is assigned to the dynamic encryption key for identification during decryption of the encrypted transaction data.
17. A server for use in a system for performing secure online transaction wherein the server is operable to receive an encrypted transaction data and transaction signature from a communications device; and is further operable to decrypt the encrypted transaction data and authenticate the transaction signature; the server further comprises:
(a) means for deriving a key and an application interchange profile (AIP) corresponding to an integrated circuit card from a database having information relating to the integrated circuit card holder;
(b) means for calculating an application ciphertext (ACi) according to an application transaction counter (ATC) and an integrated circuit card verification result (CVRi), the key and the AIP derived from the step (a) above, and a prescribed value of the transaction data;
(c) means for decrypting the encrypted transaction data by using the calculated AC and a prescribed algorithm;
(d) means for dividing the at least one field of the transaction data into n groups if the data length thereof is greater than a prescribed size, with the prescribed size being one group; if the data length is not an integer multiple of a prescribed number, adding data pre-determined by the communications device to the remaining data length that is not divided into one or more groups, to make up the prescribed number to form a group; (e) means for adding one to the ATC, and calculating an application cryptogram data using each group in the step (d), the AIP and CVRn, and comparing the calculated application cryptogram data with ACn; and
(f) means for repeating the step (e) until all the calculated application cryptogram is compared with all ACn+i,
wherein when the values compared are identical, the authenticity is verified and the integrity of the online transaction is preserved.
18. A method for performing secure online transaction between an integrated circuit card, a communications device and a server substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
19. A system for performing secure online transaction substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
20. A server for use in a system for performing secure online transaction substantially as hereinbefore described with reference to any one of the accompanying drawings as appropriate.
PCT/SG2016/050418 2015-09-01 2016-08-26 Method and system for secure online transaction using integrated circuit card WO2017039539A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PH12018500444A PH12018500444A1 (en) 2015-09-01 2018-02-28 Method and system for secure online transaction using integrated circuit card

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510549975 2015-09-01
CN201510549975.4A CN105245339B (en) 2015-09-01 2015-09-01 A method of signature and encrypted transmission are traded by financial IC card

Publications (1)

Publication Number Publication Date
WO2017039539A1 true WO2017039539A1 (en) 2017-03-09

Family

ID=55042851

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2016/050418 WO2017039539A1 (en) 2015-09-01 2016-08-26 Method and system for secure online transaction using integrated circuit card

Country Status (3)

Country Link
CN (1) CN105245339B (en)
PH (1) PH12018500444A1 (en)
WO (1) WO2017039539A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461728B (en) * 2020-03-31 2023-03-10 支付宝(杭州)信息技术有限公司 Risk identification method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140019367A1 (en) * 2012-07-13 2014-01-16 Apple Inc. Method to send payment data through various air interfaces without compromising user data
US20140236842A1 (en) * 2011-09-28 2014-08-21 Onsun Oy Payment system
US20140324698A1 (en) * 2012-02-29 2014-10-30 Mobeewave, Inc. Method, device, add-on and secure element for conducting a secured financial transaction on a device
US20150006407A1 (en) * 2012-01-13 2015-01-01 Ebay Inc. Systems, methods, and computer program products providing payment in cooperation with emv card readers

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778713B (en) * 2012-10-24 2016-08-17 航天信息股份有限公司 Financial ic card system
CN103905388A (en) * 2012-12-26 2014-07-02 中国移动通信集团广东有限公司 Authentication method, authentication device, smart card, and server
CN103095456B (en) * 2013-01-10 2016-07-06 天地融科技股份有限公司 The processing method of transaction message and system
JP6551850B2 (en) * 2013-12-19 2019-07-31 ビザ インターナショナル サービス アソシエーション Cloud-based transaction method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140236842A1 (en) * 2011-09-28 2014-08-21 Onsun Oy Payment system
US20150006407A1 (en) * 2012-01-13 2015-01-01 Ebay Inc. Systems, methods, and computer program products providing payment in cooperation with emv card readers
US20140324698A1 (en) * 2012-02-29 2014-10-30 Mobeewave, Inc. Method, device, add-on and secure element for conducting a secured financial transaction on a device
US20140019367A1 (en) * 2012-07-13 2014-01-16 Apple Inc. Method to send payment data through various air interfaces without compromising user data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
RADU, C.: "Implementing Electronic Card Payment Systems", 2003, ISBN: 1-58053-305-1, article RADU, C., XP055369353 *

Also Published As

Publication number Publication date
CN105245339B (en) 2018-09-11
PH12018500444A1 (en) 2018-08-29
CN105245339A (en) 2016-01-13

Similar Documents

Publication Publication Date Title
JP6889967B2 (en) Methods and systems for generating advanced storage keys on mobile devices without secure elements
CN106031207B (en) method and system for secure delivery of remote notification service messages to mobile devices without secure elements
KR101809221B1 (en) Method and system for secure authentication of user and mobile device without secure elements
CN102118251B (en) Security authentication method for internet banking remote payment based on multi-interface intelligent safety card
US20140279555A1 (en) Dynamically allocated security code system for smart debt and credit cards
AU2015259162A1 (en) Master applet for secure remote payment processing
GB2549118A (en) Electronic payment system using identity-based public key cryptography
JP2019525645A (en) Cryptographic authentication and tokenized transactions
AU2023201327B2 (en) Techniques for secure channel communications
CN105162607A (en) Authentication method and system of payment bill voucher
US11070378B1 (en) Signcrypted biometric electronic signature tokens
US9973926B2 (en) Secure multi-channel communication system and method
EP2787475A2 (en) Dynamically generated security code system for smart, debit and credit cards
US20180083952A1 (en) Systems and methods for providing single sign-on authentication services
WO2017039539A1 (en) Method and system for secure online transaction using integrated circuit card
CN201947283U (en) Security certificate device of Internet banking remote payment based on multi-interface safety smart card
GB2373616A (en) Remote cardholder verification process
CN105306201B (en) A method of transmission is encrypted to data
CN115310976A (en) Non-contact transaction processing method, device and system
Nithyanand Securing plastic money using an rfid based protocol stack

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16842431

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 11201801472P

Country of ref document: SG

WWE Wipo information: entry into national phase

Ref document number: 12018500444

Country of ref document: PH

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16842431

Country of ref document: EP

Kind code of ref document: A1