CA1266326A - Ic card system - Google Patents
Ic card systemInfo
- Publication number
- CA1266326A CA1266326A CA000503166A CA503166A CA1266326A CA 1266326 A CA1266326 A CA 1266326A CA 000503166 A CA000503166 A CA 000503166A CA 503166 A CA503166 A CA 503166A CA 1266326 A CA1266326 A CA 1266326A
- Authority
- CA
- Canada
- Prior art keywords
- card
- data
- customer
- terminal
- comparing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/229—Hierarchy of users of accounts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
Abstract
Abstract of the Disclosure Application program data is sent with decryption key code data from an initializing IC card to an appli-cation program RAM arranged in an IC card terminal.
The terminal is then initialized, and customer IC card reception preparation is completed.
The terminal is then initialized, and customer IC card reception preparation is completed.
Description
~26~3;~6 The present invention relates to an IC (integrated circuit) card system which includes an integrated circuit ~ chip in the IC card, with an IC card terminal.
; When cash handling equipment such as an electronic cash register is used, a mechanical key lock mechanism is arranged to prevent a third party other than an authorized operator from using the equipment. In other words, electronic cash register will not operate unless the authorized operator releases the key lock using a master key, thus 1~ preventing illegal use of the register.
A conventional key lock system of this type can also be applied to an IC card terminal which is used with an IC
card. .
The conventional key lock system, however, has the `,':' :
following drawbacks:
1. Since the key lock mechanism is a mechanical ~ ~ one, the key can be easily copied.
- ; 2. A key lock mechanism must be arranged independently of the mechanism inherent in the system, and thus the overall system becomes expensive.
3. Since the lcey must be held in a correspondin,$ key slot:to continuou:sly rele&se the key lock.s~ta~e while the sy~stem is being operated, the~key may be stolen. In addition, the number of keys needed is the same as that of the IC
25;~;car~d~terminals. ;
In an IC~card system,~co~untermeasures agalnst~ :
illegal use must be provided in the same way as for the ~1 '' . ~
i326
; When cash handling equipment such as an electronic cash register is used, a mechanical key lock mechanism is arranged to prevent a third party other than an authorized operator from using the equipment. In other words, electronic cash register will not operate unless the authorized operator releases the key lock using a master key, thus 1~ preventing illegal use of the register.
A conventional key lock system of this type can also be applied to an IC card terminal which is used with an IC
card. .
The conventional key lock system, however, has the `,':' :
following drawbacks:
1. Since the key lock mechanism is a mechanical ~ ~ one, the key can be easily copied.
- ; 2. A key lock mechanism must be arranged independently of the mechanism inherent in the system, and thus the overall system becomes expensive.
3. Since the lcey must be held in a correspondin,$ key slot:to continuou:sly rele&se the key lock.s~ta~e while the sy~stem is being operated, the~key may be stolen. In addition, the number of keys needed is the same as that of the IC
25;~;car~d~terminals. ;
In an IC~card system,~co~untermeasures agalnst~ :
illegal use must be provided in the same way as for the ~1 '' . ~
i326
2 -electronic cash register. However, an effective countermeasure has not, so far, been realized.
It is an object of the present invention to provide an IC card system with an IC card terminal, which pre-vents a third party other than an a~lthorized operatorfrom making illegal use thereof and which is operated with security.
With a view to overcoming the aforesaid drawbacks of a conventional key lock system and achieving the aforementioned object, there is provided according to one aspect of the invention, an IC card system comprising an IC card terminal, an initializing means for supplying data defining an operation of the IC card terminal and a customer IC card used with the IC card terminal, in which the ,, ~ initializing means includes:
:, ~` 1. An IC card system comprising an IC card terminal, an initializing means for supplying data defining an operation of said IC card terminal, and a customer IC card used with said IC card terminal, wherein said initializing means includes;
first memory for storing administrator ~j~ identification number (AIN) data, ~ ~ second memory means for storing decryption ; ~ ~ key code data, ; ~ ~ first comparing means for comparing the AIN
data in said irst memory means with an AIN' data entered at said IC card terminal, and ~ ~, ~ 1,``.~ .''';
~: ~, :.............. .
.; .
, ;3~
- 2h -means for supplying the decryption key code data from said second memory means to said IC card terminal when said first comparing means detects a coincidence, said customer IC card includes;
third memory means for storing predetermined data and encrypted data, and said IC card terminal includes decryption means for decrypting the encrypted data of said customer IC card by the decryption key code data supplied from said initializing means, second comparing means for comparing decryption result data by said decryption means wi~h the predetermined data of said customer IC card, and means for performing transation process using said customer IC card when said second comparing means detects a coincidence.
According to another aspect of the present invention, there is provided a method of using an IC card terminal with a customer IC card for preventing illegal use, com-prising the steps of:
providîng a terminal administrator with an initializing ;~
IC card~storing decryption key code data;
providing a customer wlth a customer IC card storlng predetermined data and encrypted data of the predetermined data;:
supplying the:decryption key code data to the :: B
, ~ .
6~3~;
IC card terminal after establishing the terminal administrator's identity;
decrypting the encrypted data stored in the customer IC card, by the decryption key code data supplied from the initializing IC card, in the IC card terminal;
comparing a decryption result with the predetermined data stored in the custom IC card; and performing transac-tion process between the IC card terminal and the customer ; IC card when the comparison result makes a coincidence The method of the invention may also advantageously include the steps of comparing personal identification number (PIN) data entered from a keyboard on the IC card terminal with PIN data stored in the customer IC card and permitting the IC card terminal to read out the pre-determined data an~ the encrypted, the data from the ; customer IC card.
: 25 This invention can be more fully understood from the following detailed description when taken In conlunction with the accompanying drawings, in which:
Fig. 1 i.s a perspective view showing an overall configura~ion of an IC card system according to an ~ embodiment of the present invention;
., ~
,; .
'.:
~: :
:
, .: . ' . .
It is an object of the present invention to provide an IC card system with an IC card terminal, which pre-vents a third party other than an a~lthorized operatorfrom making illegal use thereof and which is operated with security.
With a view to overcoming the aforesaid drawbacks of a conventional key lock system and achieving the aforementioned object, there is provided according to one aspect of the invention, an IC card system comprising an IC card terminal, an initializing means for supplying data defining an operation of the IC card terminal and a customer IC card used with the IC card terminal, in which the ,, ~ initializing means includes:
:, ~` 1. An IC card system comprising an IC card terminal, an initializing means for supplying data defining an operation of said IC card terminal, and a customer IC card used with said IC card terminal, wherein said initializing means includes;
first memory for storing administrator ~j~ identification number (AIN) data, ~ ~ second memory means for storing decryption ; ~ ~ key code data, ; ~ ~ first comparing means for comparing the AIN
data in said irst memory means with an AIN' data entered at said IC card terminal, and ~ ~, ~ 1,``.~ .''';
~: ~, :.............. .
.; .
, ;3~
- 2h -means for supplying the decryption key code data from said second memory means to said IC card terminal when said first comparing means detects a coincidence, said customer IC card includes;
third memory means for storing predetermined data and encrypted data, and said IC card terminal includes decryption means for decrypting the encrypted data of said customer IC card by the decryption key code data supplied from said initializing means, second comparing means for comparing decryption result data by said decryption means wi~h the predetermined data of said customer IC card, and means for performing transation process using said customer IC card when said second comparing means detects a coincidence.
According to another aspect of the present invention, there is provided a method of using an IC card terminal with a customer IC card for preventing illegal use, com-prising the steps of:
providîng a terminal administrator with an initializing ;~
IC card~storing decryption key code data;
providing a customer wlth a customer IC card storlng predetermined data and encrypted data of the predetermined data;:
supplying the:decryption key code data to the :: B
, ~ .
6~3~;
IC card terminal after establishing the terminal administrator's identity;
decrypting the encrypted data stored in the customer IC card, by the decryption key code data supplied from the initializing IC card, in the IC card terminal;
comparing a decryption result with the predetermined data stored in the custom IC card; and performing transac-tion process between the IC card terminal and the customer ; IC card when the comparison result makes a coincidence The method of the invention may also advantageously include the steps of comparing personal identification number (PIN) data entered from a keyboard on the IC card terminal with PIN data stored in the customer IC card and permitting the IC card terminal to read out the pre-determined data an~ the encrypted, the data from the ; customer IC card.
: 25 This invention can be more fully understood from the following detailed description when taken In conlunction with the accompanying drawings, in which:
Fig. 1 i.s a perspective view showing an overall configura~ion of an IC card system according to an ~ embodiment of the present invention;
., ~
,; .
'.:
~: :
:
, .: . ' . .
3~6 Fig. 2A is a block diagram showing a circuit ar-rangement of a terminal in Fig. l;
Fig. 2B is an address data format of a memory in Fig. 2A;
Fig. 3 is a block diagram showing a circuit ar-rangement of an initialiæing IC card in Fig. l;
Fig. 4 is a block diagram showing a circuit ar-rangement of a customer IC card in Fig. l; and Figs,~5 to 8 are flow charts for explaining the operations of the LC card system in Fig. l.
An IC card system according to an embocliment of the present invention will be described in detail with reference to the accompanying drawings. In the follow-ing embodiment, application program data including system software and decryption code data is statically stored in an initializing memory arranged in an ini-tializing IC card. At the time of system initializa-~; 20 tion, application program data is loaded in an IC card terminal. A transaction can then be performed using the customer IC card with the IC card terminal.
Fig. 1 is a perspective view showing an overallconfiguration of an IC card system according to an embodi-ment of the present invention. Referring to Fig. 17 IC
~~ :
card terminal 1 is divided into terminal body 2 and key input~section 3. Body 2 is electrically connec~ed to '' ~
, ~ ~
~ i : . ."
x~
~. ;,,,,, ,",..
, ... ,. : . ~ ~
, ~ , ~ ' -~26~3~
section 3 through cable 4. Keyboard 5 and display section 6 are arranged in section 3.
Body 2 has IC card insertion slot 7. Initializing IC card 8 and customer IC card 9 are selectively insert-ed in slot 7. Fig. 1 shows a state wherein card 8 is inserted in slot 7. Caution lamps A, B and C for indi-cating abnormal operations, and normal operation indi-cator lamp D are arranged on body 2. In this embodi-ment, assume that terminal 1 is installed in a store and that a customer with IC card 9 makes a credit purchase.
Since body 2 is connected to section 3 through cable ~, the customer can input his personal identiEication number ~PIN) without being watched by a store clerk standing near body 2. Connectors lOa and lOb are lS arranged on the surfaces of cards 8 and 9, respectively.
When cards 8 and 9 are selectively inserted in slot 7, ` connectors lOa and lOb are electrically connected to :~ :
connec-tors arranged in body 2, so that they are selec-tively coupled to an electronic circuit inside body 2.
Section 3 also includes an alphanumeric input keyboard for entering transaction data, e.g., a total amount, an item name, the date of purchase, etc.
The electrical circuit arrangements of body 2 and ~; cards 8 and 9 will be described with reference to the accompanying drawings.
~`~ The circuit arrangement of body 2 will be described :
~ with reference to Fig. 2A. Referring to Fig 2A, `,; :~
::
. ', '"
~6~32~6 interface section 11 has connectors which are to be connected to connectors 10a and 10b of cards 8 and 9.
Section 11 is connected to system bus 12. Bus 12 is connected to card loading mechanism 13, for conveying card 8 or 9 inserted in slot 7 to a predetermined posi-tion in body 2 or for ejecting it from slot 7; main program ROM 14; application program data storage vola-tile RAM 15; lamp drivers 16a, 16b, 16c and 16d for driving lamps A to D; control circuit 17; registers 18, 19 and 20; keyboard 5 of section 3; and display section 6. Circuit 17 includes ROM 17a, RAM 17b and comparator 17c, These circuits discriminate whether the IC card inserted in slot 7 is card 8 or 9. For example, in ROM
17a is prestored code data representing the type of IC
card. The corresponding code data is stored in cards 8 and 9. The code data read out from cards 8 and 9 is temporarily stored in RAM 17b, and is then compared with the data from ROM 17a by comparator 17c. When a coinci-dence between them is established, circuit 17 determines ; ~ 20 the type of IC card inserted in slot 7.
:
All the access program for card 9 is loaded from card 8 into RAM 15 of terminal 1. But,~a part of the access program may be preset in ROM 14. In this case, the~remaining~part of the~card access program is loaded .in RAM 15 from card 8, and circuit 17 performs address-ing through ROM 14 and RAM 15. Fig. 2B shows an address ; data format fcr addressing ROM 14 and RAM 15 by ci~rcuit : :
, . :
: . ~ ~ ' :
, . . : :: : .:
.
~6~3;~6 17. The ROM section corresponds to ROM 14, and the RAM
section corresponds to RAM 15.
A primary account number (PAN) and encrypted data PAN' read out from card 9 are stored in registers 18 and 19, respectively. Decryption key code data is read out from card 8 and is stored in register 20. Data PAN' and the decryption key code data, respectively stored in registers 19 and 20, is supplied to decryption block 21.
Block 21 decrypts data PAN' in accordance with the decryption key code data to obtain data PAN. The decrypted data PAN is stored in register 22 and is supplied to one input terminal of comparator 23. Data PAN stored in register 18 is supplied to the other input terminal of comparator 23 wherein data PAN from register 22 is compared with data PAN from register 18 by comparator 23. A comparison result is supplied to circuit 17. The connectors arranged in ; section 11 and mechanism 13 can be constituted by those ; described in U.S. Patent No. 4,684,791.
Fig. 3 shows the circuit arrangement of card 8 of :
Fig. 1. Interface section 31 has connector 10a. Section ~: 31 is connected to other circuits through system bus 32.
:i ~;~ Bus 32 is connected to a ROM 33 storing system program data, a control circuit 34 iDcluding a CPU, and a register 35. Register 35 stores an administration identi-fication number (AIN) entered at key input section 3.
:~ Input data AIN is supplied to one input terminal of ,;:
:
~, , ~ , 32~
comparator 36. Prestored data AIN is supplied from AIN
memory 37 to the other input terminal of comparator 36.
Memory 37 is constituted by, for example, a PROM such as EPROM or EEPROM. The PROM stores any AIN data entered by an administrator, i.e., an authorized store clerk, for -terminal 1. Comparator 36 then compares the content of register 35 with that of memory 37. A comparison result is supplied to circuit 34 and to one input ~ terminal of AND gate 38. Application program data and ; 10 decryption key code da-ta are prestored in data ROM 39.
The application program data is data to be preset in terminal 1 to execute various transaction operations for card 9. The contents of the application program will be described below. The decryption key code data is the code data for decrypting the encrypted data read out from card 9. When a coincidence signal is generated by ~ ,:
compara-tor 36, the data from ROM 39 is supplied to interface section 31 through gate 38 and system bus 32, and to terminal 1 through section 31.
The application program is defined as a program for :~ e~ecuting customer IC card processing such as a custom-~:.
er's arbitrary PIN registration at the time of issuance of a new customer IC~card, re-registration of the : registered PI~, a transaction data check operation, . 25 a card check operation, and the like.
Fig~. 4 shows the circuit arrangement of card 9.
: Referring to Fig. 4,~interface section 41~has connector ~ .
' '` '-"'' . ~
' , ,;' ;;~ ~ : ~
3~
10b of Fig. 1. Section 41 is connected to an internal electronic circuits in card 9 through system bus 42.
Bus 42 is connected to system program ROM 43, control circuit 44 and register 45. Customer PIN entered at keyboard 5 is stored in register 45. This PIN data is supplied to one input terminal of cornparator 46. Data PIN from memory 47 is supplied to the other input termi-nal of comparator 46. Memory 47 comprises, for example, a PROM such as EPROM or EEPROM. Comparator 46 compares the input PIN data Erom register 45 with the PIN data readout Erom memory 47. A comparison result is supplied to control circuit 44.
PAN memory 48 and data memory 49 are also coupled to bus 42. Me~ory 48 comprises, for example, a PROM
such a EPROM or EEPROM. Memory 48 stores customer account number PAN and data PAN' obtained by encrypting data PAN according to the RSA encryption method. Memory 49 also comprises a PROM such as EPROM or EEPROM.
Memory 49 sequentially stores a date (DT) data of purchase and total amount AMT.
The operation of the arrangements shown in Figs. 1 to 4 will be described with reference to flow charts of ~ : :
Figs. 5 to 8. When a terminal power switch (not shown) in the terminal in Fig. l is turned on, circuit 17 is operated in accordance with the main program stored in :-' : :
ROM 14 in Fig. 2A, and processing shown io the ~low chart of Fig. 5 is executed. At the time of power ON, the `: :
.
i3Z~;
storage contents of RAM 15 are lost, and terminal 1 thus does not have a processing function for card 9.
Circuit 17 determines in step Al of Fig. 5 whether or not an IC card is inserted in slot 7. If NO in step Al, circuit 17 waits until an IC card is inserted in slot 7. However, if YES in step Al, the flow advances to step A2 and circuit 17 awaits a key input. When data PIN is entered at keyboard 5 of section 3, the input PIN
data is transmitted to the IC card in step A3. Circuit 17 then awaits data from the IC card in step A4. When signal data is sent back from the IC card, the flow advances to step ~5. Circuit 17 checks in step A5 whether the signal from the IC card is an OK signal.
In a store, card 8 is inserted in slot 7 in step Bl of Fig. 6 after a power switch of terminal 1 is turned on. In step B2, the AIN data is entered at section 3.
The input AIN data from section 11 is supplied to sec-tion 31 of card 8 in step A3 of Fig. 5 and is set in register 35. When the AIN data is sen-t from terminal 1 to card 8, comparator 36 compares in step B3 of Fig. 6 ; the data set in register 35 with the AIN data prestored in memory 37 to check whether a coincldence therebetween is established. In other words/ comparator 36 checks whether or not the user of card 8 is an authorized~user.
If YES in step B3, a coincidence signal from comparator 36 enables ga~te 38. In step B4, the application program data and the decryption key code data are sequentially .
~, , , ,: :.. ~; ~ ~';
ii3~
read ou-t from ROM 39. Both oE the data from ROM 39 is supplied to terminal 1 -through section 31. When OK data is transmitted from card 8 to terminal 1, the flow advances to step A6 in Fig. 5 to check whether the reception data is data from card 8. If YES in step A6r the flow advances to step A7. The reception data is stored in memory 15. In terminal 1, the application program data from card 8 is stored in RAM 15, and the decryption key code data is set in register 20. There-after, as shown in step A8 of Fig. 5 and step B5 of Fig. 6, card 8 is ejected Erom slot 7, and terminal initialization is completed.
When initialization of terminal 1 is completed, processing for card 9 can be performed. If NO in step A5 of Fig. 5, the flow advances to step A9, and caution lamp B is turned on by driver 16b to indicate that the input AIN does not coincide with the pres-tored AIN.
Thereater, card 8 is returned in step A10, and abnormal processing is completed.
As described above, after the application program data is stored in RAM 15, and the decryption key code data 1s written in register 20, processing Eor card 9 can be performed. In this state, when the customer inserts his card 9 through slot 7 and enters his own PIN, the PIN comparison is performed and the validity of ; ~ card g is checked as will be described later. If the OK
.
~ signal cannot be obtained, the flow advances from step ", ' ~` ` ' ,"" ' ,, :, A5 to step A9 in Fig. 5. However, if the OR signal is detected, the Elow advances to step All through step ~6.
Circuit 17 checks in step All whether the application program data is already wri-tten in RAM 15. When card 9 is used without setting the application program data in card 8 upon energization of terminal 1, the decision step All is determined to be NO. The flow advances to step A12, and driver 16a is driven to turn on lamp A, thereby signalling to the customer that the data is not set in card 8. In step A10, card 9 is ejected Erom slot 7 and is returned to the customer.
However, when circuit 17 determines in step All ; that the application program data and the decryption code data are set in RAM 15, the flow advances from step All to step Al3. The application program processing is - designatedr and item purchase processing tapplication `~ ~ program processing in Fig. 8 to be described later) in step Al4 is performed. Thereafter, the flow advances to step A8, and card 9 is returned to the customer.
Finally, the flow returns to step Al.
When the customer purchases an item, he inserts card 9 in slot 7 of terminal l installed in a store and enters his own PIN at section 3, as shown in step Cl of Fig~ 7. The input PIN is transmitted Erom section ll to card 9 and IS set ln register 45 through se~tion 41 and bus 42. When the PIN is set in register 45, the flow advances to step C2, and comparator 46 in card 9 ;~ ., ~ . .
:: .
3;~:~
compares the input PIN set in register 45 with the pre-stored PIN read out from memory 47. When a coincidence signal is generated by comparator 46, the QK signal is transmitted from circuit 44 to terminal 1 through section 41. When the OK signal from card 9 is received by terminal 1, terminal 1 checks validity of card 9 in step C3. In order to check the validity, terminal 1 reads out the personal account number PAN from memory 48 oE card 9 and encrypted personal account number PAN' in step Dl in Fig. 8. The PAN data and the PAN' data are stored in registers 18 and 19, respectively. The flow advances to step D2. Encrypted personal account number PAN' is supplied from register 19 to block 21. Encrypt-ed PAN' is decrypted in accordance with the decryption key code set in register 20. The decrypted personal account number (PAN) is stored in register 22. In step D3, the decrypted personal account number (PAN) written in register 22 is compared by comparator 23 with the ; personal account number PAN held in register 18. A
comparison result is supplied to circuit 17. Circùit 17 discriminates in step D3 whether the PAN from register 22 coincides with that from register 18. If NO in step D3, the flow advances to step D4. Driver 16c is operat-ed to turn on lamp C, thereby indicating that card 9 , is invalid. In step D5, card 9 is returned to the customer, and abnormal processing is thus completed.
When the coincidence signal is generated by comparator : ` :
,: :: . . , :
i3~
23, the flow advances from step D3 to step D6, and driver 16d i5 driven to turn on OK lamp D. Subsequent-ly, as shown in step D7 of Fig. 8 and step C4 of Fig. 7, application processing is performed. Date DT data of purchase and total amount AMT data are recorded in memory 49 in card 9. At the same time, the registration number of card 9 and the total amount are stored in terminal 1. The contents of memory 49 can be read out and displayed on display section 6, as needed. Thus, processing for card 9 is completed.
In the above embodiment, the IC card is exempli-~ied by a credit card. However, the IC card can also be used in other card systems such as a bank card.
In the embodiment of Fig. 1, cards 8 and 9 are inserted in the same slot 7. The slot 7, however, can be used for only receive the customer card 9. In this case, the card 8 may be inserted in another slot (not shown) formed on the body 2 of terminal 1.
Since, customer card 9 may be formed in accordance with the ISO standard, the slot 7 of Fig. 1 should also be formed in accordance with the ISO standard. The card ` 8 and the slot for receive the card 8, however, need not be formed in accordanae wlth the ISO.
According to the present invention as described abovej a terminal initialization IC card is prepared.
System software and/or personal identification data are ; supplied from the IC card to the terminal at the time oE
~:~
': , ' :.
, ,, " . -, .:
.. .. . ..
3~;
initialization of the IC card terminal. In this state, the IC card terminal can communicate with the cus-tomer IC card. The initialization IC card and the customer IC
card can be operated by the same interface, thus elimi-nating a special locking mechanism. Furthermore, sincethe initialization IC card is used only for initializa-tion, only one initialization IC card is required for a plurality of terminals. Since the personal identifica-tion data or the like is supplied to the initialization IC card, secrecy and security can be assured even if the terminal is stolen. Since the personal identification data is ~upplied to the terminal using the initializa-tion IC card, the identification data can be easily added or modified. As is apparent from the above de-scription, illegal use of IC cards and IC card terminalsby third parties other than authorized operators can be prevented, thus providing high security.
: :; : : :
~ ':
: , .. ~ :
, ~ . , -. . - :. , ,.:.
Fig. 2B is an address data format of a memory in Fig. 2A;
Fig. 3 is a block diagram showing a circuit ar-rangement of an initialiæing IC card in Fig. l;
Fig. 4 is a block diagram showing a circuit ar-rangement of a customer IC card in Fig. l; and Figs,~5 to 8 are flow charts for explaining the operations of the LC card system in Fig. l.
An IC card system according to an embocliment of the present invention will be described in detail with reference to the accompanying drawings. In the follow-ing embodiment, application program data including system software and decryption code data is statically stored in an initializing memory arranged in an ini-tializing IC card. At the time of system initializa-~; 20 tion, application program data is loaded in an IC card terminal. A transaction can then be performed using the customer IC card with the IC card terminal.
Fig. 1 is a perspective view showing an overallconfiguration of an IC card system according to an embodi-ment of the present invention. Referring to Fig. 17 IC
~~ :
card terminal 1 is divided into terminal body 2 and key input~section 3. Body 2 is electrically connec~ed to '' ~
, ~ ~
~ i : . ."
x~
~. ;,,,,, ,",..
, ... ,. : . ~ ~
, ~ , ~ ' -~26~3~
section 3 through cable 4. Keyboard 5 and display section 6 are arranged in section 3.
Body 2 has IC card insertion slot 7. Initializing IC card 8 and customer IC card 9 are selectively insert-ed in slot 7. Fig. 1 shows a state wherein card 8 is inserted in slot 7. Caution lamps A, B and C for indi-cating abnormal operations, and normal operation indi-cator lamp D are arranged on body 2. In this embodi-ment, assume that terminal 1 is installed in a store and that a customer with IC card 9 makes a credit purchase.
Since body 2 is connected to section 3 through cable ~, the customer can input his personal identiEication number ~PIN) without being watched by a store clerk standing near body 2. Connectors lOa and lOb are lS arranged on the surfaces of cards 8 and 9, respectively.
When cards 8 and 9 are selectively inserted in slot 7, ` connectors lOa and lOb are electrically connected to :~ :
connec-tors arranged in body 2, so that they are selec-tively coupled to an electronic circuit inside body 2.
Section 3 also includes an alphanumeric input keyboard for entering transaction data, e.g., a total amount, an item name, the date of purchase, etc.
The electrical circuit arrangements of body 2 and ~; cards 8 and 9 will be described with reference to the accompanying drawings.
~`~ The circuit arrangement of body 2 will be described :
~ with reference to Fig. 2A. Referring to Fig 2A, `,; :~
::
. ', '"
~6~32~6 interface section 11 has connectors which are to be connected to connectors 10a and 10b of cards 8 and 9.
Section 11 is connected to system bus 12. Bus 12 is connected to card loading mechanism 13, for conveying card 8 or 9 inserted in slot 7 to a predetermined posi-tion in body 2 or for ejecting it from slot 7; main program ROM 14; application program data storage vola-tile RAM 15; lamp drivers 16a, 16b, 16c and 16d for driving lamps A to D; control circuit 17; registers 18, 19 and 20; keyboard 5 of section 3; and display section 6. Circuit 17 includes ROM 17a, RAM 17b and comparator 17c, These circuits discriminate whether the IC card inserted in slot 7 is card 8 or 9. For example, in ROM
17a is prestored code data representing the type of IC
card. The corresponding code data is stored in cards 8 and 9. The code data read out from cards 8 and 9 is temporarily stored in RAM 17b, and is then compared with the data from ROM 17a by comparator 17c. When a coinci-dence between them is established, circuit 17 determines ; ~ 20 the type of IC card inserted in slot 7.
:
All the access program for card 9 is loaded from card 8 into RAM 15 of terminal 1. But,~a part of the access program may be preset in ROM 14. In this case, the~remaining~part of the~card access program is loaded .in RAM 15 from card 8, and circuit 17 performs address-ing through ROM 14 and RAM 15. Fig. 2B shows an address ; data format fcr addressing ROM 14 and RAM 15 by ci~rcuit : :
, . :
: . ~ ~ ' :
, . . : :: : .:
.
~6~3;~6 17. The ROM section corresponds to ROM 14, and the RAM
section corresponds to RAM 15.
A primary account number (PAN) and encrypted data PAN' read out from card 9 are stored in registers 18 and 19, respectively. Decryption key code data is read out from card 8 and is stored in register 20. Data PAN' and the decryption key code data, respectively stored in registers 19 and 20, is supplied to decryption block 21.
Block 21 decrypts data PAN' in accordance with the decryption key code data to obtain data PAN. The decrypted data PAN is stored in register 22 and is supplied to one input terminal of comparator 23. Data PAN stored in register 18 is supplied to the other input terminal of comparator 23 wherein data PAN from register 22 is compared with data PAN from register 18 by comparator 23. A comparison result is supplied to circuit 17. The connectors arranged in ; section 11 and mechanism 13 can be constituted by those ; described in U.S. Patent No. 4,684,791.
Fig. 3 shows the circuit arrangement of card 8 of :
Fig. 1. Interface section 31 has connector 10a. Section ~: 31 is connected to other circuits through system bus 32.
:i ~;~ Bus 32 is connected to a ROM 33 storing system program data, a control circuit 34 iDcluding a CPU, and a register 35. Register 35 stores an administration identi-fication number (AIN) entered at key input section 3.
:~ Input data AIN is supplied to one input terminal of ,;:
:
~, , ~ , 32~
comparator 36. Prestored data AIN is supplied from AIN
memory 37 to the other input terminal of comparator 36.
Memory 37 is constituted by, for example, a PROM such as EPROM or EEPROM. The PROM stores any AIN data entered by an administrator, i.e., an authorized store clerk, for -terminal 1. Comparator 36 then compares the content of register 35 with that of memory 37. A comparison result is supplied to circuit 34 and to one input ~ terminal of AND gate 38. Application program data and ; 10 decryption key code da-ta are prestored in data ROM 39.
The application program data is data to be preset in terminal 1 to execute various transaction operations for card 9. The contents of the application program will be described below. The decryption key code data is the code data for decrypting the encrypted data read out from card 9. When a coincidence signal is generated by ~ ,:
compara-tor 36, the data from ROM 39 is supplied to interface section 31 through gate 38 and system bus 32, and to terminal 1 through section 31.
The application program is defined as a program for :~ e~ecuting customer IC card processing such as a custom-~:.
er's arbitrary PIN registration at the time of issuance of a new customer IC~card, re-registration of the : registered PI~, a transaction data check operation, . 25 a card check operation, and the like.
Fig~. 4 shows the circuit arrangement of card 9.
: Referring to Fig. 4,~interface section 41~has connector ~ .
' '` '-"'' . ~
' , ,;' ;;~ ~ : ~
3~
10b of Fig. 1. Section 41 is connected to an internal electronic circuits in card 9 through system bus 42.
Bus 42 is connected to system program ROM 43, control circuit 44 and register 45. Customer PIN entered at keyboard 5 is stored in register 45. This PIN data is supplied to one input terminal of cornparator 46. Data PIN from memory 47 is supplied to the other input termi-nal of comparator 46. Memory 47 comprises, for example, a PROM such as EPROM or EEPROM. Comparator 46 compares the input PIN data Erom register 45 with the PIN data readout Erom memory 47. A comparison result is supplied to control circuit 44.
PAN memory 48 and data memory 49 are also coupled to bus 42. Me~ory 48 comprises, for example, a PROM
such a EPROM or EEPROM. Memory 48 stores customer account number PAN and data PAN' obtained by encrypting data PAN according to the RSA encryption method. Memory 49 also comprises a PROM such as EPROM or EEPROM.
Memory 49 sequentially stores a date (DT) data of purchase and total amount AMT.
The operation of the arrangements shown in Figs. 1 to 4 will be described with reference to flow charts of ~ : :
Figs. 5 to 8. When a terminal power switch (not shown) in the terminal in Fig. l is turned on, circuit 17 is operated in accordance with the main program stored in :-' : :
ROM 14 in Fig. 2A, and processing shown io the ~low chart of Fig. 5 is executed. At the time of power ON, the `: :
.
i3Z~;
storage contents of RAM 15 are lost, and terminal 1 thus does not have a processing function for card 9.
Circuit 17 determines in step Al of Fig. 5 whether or not an IC card is inserted in slot 7. If NO in step Al, circuit 17 waits until an IC card is inserted in slot 7. However, if YES in step Al, the flow advances to step A2 and circuit 17 awaits a key input. When data PIN is entered at keyboard 5 of section 3, the input PIN
data is transmitted to the IC card in step A3. Circuit 17 then awaits data from the IC card in step A4. When signal data is sent back from the IC card, the flow advances to step ~5. Circuit 17 checks in step A5 whether the signal from the IC card is an OK signal.
In a store, card 8 is inserted in slot 7 in step Bl of Fig. 6 after a power switch of terminal 1 is turned on. In step B2, the AIN data is entered at section 3.
The input AIN data from section 11 is supplied to sec-tion 31 of card 8 in step A3 of Fig. 5 and is set in register 35. When the AIN data is sen-t from terminal 1 to card 8, comparator 36 compares in step B3 of Fig. 6 ; the data set in register 35 with the AIN data prestored in memory 37 to check whether a coincldence therebetween is established. In other words/ comparator 36 checks whether or not the user of card 8 is an authorized~user.
If YES in step B3, a coincidence signal from comparator 36 enables ga~te 38. In step B4, the application program data and the decryption key code data are sequentially .
~, , , ,: :.. ~; ~ ~';
ii3~
read ou-t from ROM 39. Both oE the data from ROM 39 is supplied to terminal 1 -through section 31. When OK data is transmitted from card 8 to terminal 1, the flow advances to step A6 in Fig. 5 to check whether the reception data is data from card 8. If YES in step A6r the flow advances to step A7. The reception data is stored in memory 15. In terminal 1, the application program data from card 8 is stored in RAM 15, and the decryption key code data is set in register 20. There-after, as shown in step A8 of Fig. 5 and step B5 of Fig. 6, card 8 is ejected Erom slot 7, and terminal initialization is completed.
When initialization of terminal 1 is completed, processing for card 9 can be performed. If NO in step A5 of Fig. 5, the flow advances to step A9, and caution lamp B is turned on by driver 16b to indicate that the input AIN does not coincide with the pres-tored AIN.
Thereater, card 8 is returned in step A10, and abnormal processing is completed.
As described above, after the application program data is stored in RAM 15, and the decryption key code data 1s written in register 20, processing Eor card 9 can be performed. In this state, when the customer inserts his card 9 through slot 7 and enters his own PIN, the PIN comparison is performed and the validity of ; ~ card g is checked as will be described later. If the OK
.
~ signal cannot be obtained, the flow advances from step ", ' ~` ` ' ,"" ' ,, :, A5 to step A9 in Fig. 5. However, if the OR signal is detected, the Elow advances to step All through step ~6.
Circuit 17 checks in step All whether the application program data is already wri-tten in RAM 15. When card 9 is used without setting the application program data in card 8 upon energization of terminal 1, the decision step All is determined to be NO. The flow advances to step A12, and driver 16a is driven to turn on lamp A, thereby signalling to the customer that the data is not set in card 8. In step A10, card 9 is ejected Erom slot 7 and is returned to the customer.
However, when circuit 17 determines in step All ; that the application program data and the decryption code data are set in RAM 15, the flow advances from step All to step Al3. The application program processing is - designatedr and item purchase processing tapplication `~ ~ program processing in Fig. 8 to be described later) in step Al4 is performed. Thereafter, the flow advances to step A8, and card 9 is returned to the customer.
Finally, the flow returns to step Al.
When the customer purchases an item, he inserts card 9 in slot 7 of terminal l installed in a store and enters his own PIN at section 3, as shown in step Cl of Fig~ 7. The input PIN is transmitted Erom section ll to card 9 and IS set ln register 45 through se~tion 41 and bus 42. When the PIN is set in register 45, the flow advances to step C2, and comparator 46 in card 9 ;~ ., ~ . .
:: .
3;~:~
compares the input PIN set in register 45 with the pre-stored PIN read out from memory 47. When a coincidence signal is generated by comparator 46, the QK signal is transmitted from circuit 44 to terminal 1 through section 41. When the OK signal from card 9 is received by terminal 1, terminal 1 checks validity of card 9 in step C3. In order to check the validity, terminal 1 reads out the personal account number PAN from memory 48 oE card 9 and encrypted personal account number PAN' in step Dl in Fig. 8. The PAN data and the PAN' data are stored in registers 18 and 19, respectively. The flow advances to step D2. Encrypted personal account number PAN' is supplied from register 19 to block 21. Encrypt-ed PAN' is decrypted in accordance with the decryption key code set in register 20. The decrypted personal account number (PAN) is stored in register 22. In step D3, the decrypted personal account number (PAN) written in register 22 is compared by comparator 23 with the ; personal account number PAN held in register 18. A
comparison result is supplied to circuit 17. Circùit 17 discriminates in step D3 whether the PAN from register 22 coincides with that from register 18. If NO in step D3, the flow advances to step D4. Driver 16c is operat-ed to turn on lamp C, thereby indicating that card 9 , is invalid. In step D5, card 9 is returned to the customer, and abnormal processing is thus completed.
When the coincidence signal is generated by comparator : ` :
,: :: . . , :
i3~
23, the flow advances from step D3 to step D6, and driver 16d i5 driven to turn on OK lamp D. Subsequent-ly, as shown in step D7 of Fig. 8 and step C4 of Fig. 7, application processing is performed. Date DT data of purchase and total amount AMT data are recorded in memory 49 in card 9. At the same time, the registration number of card 9 and the total amount are stored in terminal 1. The contents of memory 49 can be read out and displayed on display section 6, as needed. Thus, processing for card 9 is completed.
In the above embodiment, the IC card is exempli-~ied by a credit card. However, the IC card can also be used in other card systems such as a bank card.
In the embodiment of Fig. 1, cards 8 and 9 are inserted in the same slot 7. The slot 7, however, can be used for only receive the customer card 9. In this case, the card 8 may be inserted in another slot (not shown) formed on the body 2 of terminal 1.
Since, customer card 9 may be formed in accordance with the ISO standard, the slot 7 of Fig. 1 should also be formed in accordance with the ISO standard. The card ` 8 and the slot for receive the card 8, however, need not be formed in accordanae wlth the ISO.
According to the present invention as described abovej a terminal initialization IC card is prepared.
System software and/or personal identification data are ; supplied from the IC card to the terminal at the time oE
~:~
': , ' :.
, ,, " . -, .:
.. .. . ..
3~;
initialization of the IC card terminal. In this state, the IC card terminal can communicate with the cus-tomer IC card. The initialization IC card and the customer IC
card can be operated by the same interface, thus elimi-nating a special locking mechanism. Furthermore, sincethe initialization IC card is used only for initializa-tion, only one initialization IC card is required for a plurality of terminals. Since the personal identifica-tion data or the like is supplied to the initialization IC card, secrecy and security can be assured even if the terminal is stolen. Since the personal identification data is ~upplied to the terminal using the initializa-tion IC card, the identification data can be easily added or modified. As is apparent from the above de-scription, illegal use of IC cards and IC card terminalsby third parties other than authorized operators can be prevented, thus providing high security.
: :; : : :
~ ':
: , .. ~ :
, ~ . , -. . - :. , ,.:.
Claims (8)
PROPERTY OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:
1. An IC card system comprising an IC card terminal, an initializing means for supplying data defining an operation of said IC card terminal, and a customer IC card used with said IC card terminal, wherein said initializing means includes;
first memory means for storing administrator identification number (AIN) data, second memory means for storing decryption key code data, first comparing means for storing decryption key code data, first comparing means for comparing the AIN data in said first memory means with an AlN'data entered at said IC card terminal, and means for supplying the decryption key code data from said second memory means to said IC card terminal when said first comparing means detects a coincidence, said customer IC card includes;
third memory means for storing predetermined data and encrypted data, and said IC card terminal includes decryption means for decrypting the encrypted data of said customer IC card by the decryption key code data supplied from said initializing means, second comparing means for comparing decryption result data by said decryption means with the predetermined data of said customer IC card, and means for performing transation process using said customer IC card when said second comparing means _ 16 -detects a coincidence.
first memory means for storing administrator identification number (AIN) data, second memory means for storing decryption key code data, first comparing means for storing decryption key code data, first comparing means for comparing the AIN data in said first memory means with an AlN'data entered at said IC card terminal, and means for supplying the decryption key code data from said second memory means to said IC card terminal when said first comparing means detects a coincidence, said customer IC card includes;
third memory means for storing predetermined data and encrypted data, and said IC card terminal includes decryption means for decrypting the encrypted data of said customer IC card by the decryption key code data supplied from said initializing means, second comparing means for comparing decryption result data by said decryption means with the predetermined data of said customer IC card, and means for performing transation process using said customer IC card when said second comparing means _ 16 -detects a coincidence.
2. An IC card system according to claim 1, wherein further includes means for supplying application program data to said IC card terminal.
3. An IC card system according to calim 2, wherein said initializing means comprises an initializing IC card.
4. An IC card system according to claim 3, wherein said IC card terminal includes means for distinguishing said customer IC card from said initializing IC card.
5. An IC card system according to claim 2, wherein said customer IC card dfurther includes:
fourth memory means for storing personal identification number (PIN) data, third comparing means for comparing the PIN data in said fourth memory means with PIN' data entered at said IC card terminal, and means for permitting said IC card terminal to read out the predetermined data and the encrypted data stored in said third memory means.
fourth memory means for storing personal identification number (PIN) data, third comparing means for comparing the PIN data in said fourth memory means with PIN' data entered at said IC card terminal, and means for permitting said IC card terminal to read out the predetermined data and the encrypted data stored in said third memory means.
6. An IC card system according to claim 5, wherein the predetermined data in said third memory means is a personal account number (PAN) data, and the encrypted data in said third memory means is data is obtained by encrypting PAN according to the RSA encryption method.
7. A method of using an IC card terminal with a customer IC card for preventing illegal use comprising the steps of:
providing a terminal administrator with an initializing IC card storing decryption key code data;
providing a customer with a customer IC card storing predetermined data and encrypted data of the predetermined data;
supplying the decryption key code data to the IC card terminal after establishing the terminal administrator's identity;
decrypting the encrypted data stored in the customer IC
card, by the decryption key code data supplied from the initializing IC card, in the IC card terminal;
comparing a decryption result with the predetermined data stored in the customer IC card; and performing transaction process between the IC card termninal and the customer IC card when the comparison result makes a coincidence.
providing a terminal administrator with an initializing IC card storing decryption key code data;
providing a customer with a customer IC card storing predetermined data and encrypted data of the predetermined data;
supplying the decryption key code data to the IC card terminal after establishing the terminal administrator's identity;
decrypting the encrypted data stored in the customer IC
card, by the decryption key code data supplied from the initializing IC card, in the IC card terminal;
comparing a decryption result with the predetermined data stored in the customer IC card; and performing transaction process between the IC card termninal and the customer IC card when the comparison result makes a coincidence.
8. A method according to claim 7, further comprising the step of:
comparing personal identification number (PIN) data entered from a keyboard on the IC card terminal with PIN data stored in the customer IC card; and permitting the IC card terminal to read out the predetermined data and the encrypted data from the customer IC card.
comparing personal identification number (PIN) data entered from a keyboard on the IC card terminal with PIN data stored in the customer IC card; and permitting the IC card terminal to read out the predetermined data and the encrypted data from the customer IC card.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP43386/85 | 1985-03-05 | ||
JP4338685A JPH0762854B2 (en) | 1985-03-05 | 1985-03-05 | IC card system |
Publications (1)
Publication Number | Publication Date |
---|---|
CA1266326A true CA1266326A (en) | 1990-02-27 |
Family
ID=12662361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA000503166A Expired - Lifetime CA1266326A (en) | 1985-03-05 | 1986-03-03 | Ic card system |
Country Status (6)
Country | Link |
---|---|
US (1) | US4809326A (en) |
EP (1) | EP0193920B1 (en) |
JP (1) | JPH0762854B2 (en) |
CA (1) | CA1266326A (en) |
DE (1) | DE3682790D1 (en) |
HK (1) | HK58196A (en) |
Families Citing this family (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63236186A (en) * | 1987-03-24 | 1988-10-03 | Mitsubishi Electric Corp | Card issuing device |
JPS63241692A (en) * | 1987-03-30 | 1988-10-06 | アンリツ株式会社 | Card-operated fare settling apparatus |
GB2204973A (en) * | 1987-05-19 | 1988-11-23 | Gen Electric Co Plc | Data processing system |
NL8702012A (en) * | 1987-08-28 | 1989-03-16 | Philips Nv | TRANSACTION SYSTEM CONTAINING ONE OR MORE HOST STATIONS AND A NUMBER OF DISTRIBUTED ENTRY STATIONS, WHICH ARE LINKABLE THROUGH A NETWORK SYSTEM WITH ANY HOST STATION, AS A CONSTRUCTION STATION AND END STATION SUITABLE FOR THE USE OF USE. |
ES2069553T3 (en) * | 1988-07-20 | 1995-05-16 | Syspatronic Ag Spa | TERMINAL CONTROLLED BY DATA SUPPORT IN A DATA EXCHANGE SYSTEM. |
DE68928170T2 (en) * | 1988-10-18 | 1998-02-19 | Oki Electric Ind Co Ltd | CLASSIFICATION SYSTEM FOR PERSONAL SECRET NUMBERS |
FR2650097B1 (en) * | 1989-07-19 | 1992-12-31 | Pailles Jean Claude | CABLE MICROCIRCUIT CARD AND TRANSACTION METHOD BETWEEN A CORRESPONDING CABLE MICROCIRCUIT CARD AND A TERMINAL |
US5067155A (en) * | 1990-05-09 | 1991-11-19 | Control Module Inc. | Method and means to limit access to computer systems |
JPH04205694A (en) * | 1990-11-30 | 1992-07-27 | Toshiba Corp | Electronic device provided with information storage device |
FR2680901A1 (en) * | 1991-09-03 | 1993-03-05 | Hello Sa | ELECTRONIC SYSTEM WITH ACCESS CONTROL. |
DE4134922C1 (en) * | 1991-10-23 | 1992-12-03 | Anatoli 3013 Barsinghausen De Stobbe | |
FR2692385B1 (en) * | 1992-06-16 | 1999-12-31 | Gemplus Card Int | AUTOMATIC MEDICAL ADMINISTRATIVE FORM PRINTING SYSTEM. |
US7137011B1 (en) * | 1993-09-01 | 2006-11-14 | Sandisk Corporation | Removable mother/daughter peripheral card |
US5887145A (en) * | 1993-09-01 | 1999-03-23 | Sandisk Corporation | Removable mother/daughter peripheral card |
US5577121A (en) * | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US5619574A (en) * | 1995-02-13 | 1997-04-08 | Eta Technologies Corporation | Personal access management system |
US5778068A (en) * | 1995-02-13 | 1998-07-07 | Eta Technologies Corporation | Personal access management system |
US5610980A (en) * | 1995-02-13 | 1997-03-11 | Eta Technologies Corporation | Method and apparatus for re-initializing a processing device and a storage device |
US5689564A (en) * | 1995-02-13 | 1997-11-18 | Eta Technologies Corporation | Personal access management system |
US5696825A (en) * | 1995-02-13 | 1997-12-09 | Eta Technologies Corporation | Personal access management system |
US5694472A (en) * | 1995-02-13 | 1997-12-02 | Eta Technologies Corporation | Personal access management system |
US5682428A (en) * | 1995-02-13 | 1997-10-28 | Eta Technologies Corporation | Personal access management system |
FR2734937B1 (en) * | 1995-05-30 | 1997-07-25 | Syseca | INTELLIGENT CHIP CARD SYSTEM |
US5835689A (en) * | 1995-12-19 | 1998-11-10 | Pitney Bowes Inc. | Transaction evidencing system and method including post printing and batch processing |
US6157919A (en) * | 1995-12-19 | 2000-12-05 | Pitney Bowes Inc. | PC-based open metering system and method |
EP0792044B1 (en) * | 1996-02-23 | 2001-05-02 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources according to the Challenge-Response principle |
EP0910841B1 (en) * | 1996-06-19 | 2000-03-15 | Tresor TV Produktions GmbH | Information transmission system |
DE19632197A1 (en) * | 1996-08-09 | 1998-02-12 | Bosch Gmbh Robert | Method for programming an electrical device, chip card and device |
WO1998009256A1 (en) * | 1996-08-30 | 1998-03-05 | Siemens Aktiengesellschaft | Method for the preparation of a chip card application and device for the execution of this method |
KR100213188B1 (en) * | 1996-10-05 | 1999-08-02 | 윤종용 | Apparatus and method for user authentication |
NL1004658C2 (en) * | 1996-12-02 | 1998-06-03 | Clewits Beheer B V R | System and method for selectively activating one or more software and / or hardware functions of an electronic device. |
NL1007504C2 (en) * | 1997-11-10 | 1999-05-27 | Mic O Data B V | Electronic clock-card and registration system - uses smart cards and readers in place of conventional time clocks and cards or time sheets |
GB9816504D0 (en) * | 1998-07-30 | 1998-09-23 | Ncr Int Inc | Data processing and method |
FR2786298B1 (en) * | 1998-11-20 | 2001-04-20 | Sagem | ELECTRONIC INFORMATION PROCESSING AND PAYMENT TERMINAL |
US6651149B1 (en) * | 1998-12-10 | 2003-11-18 | Kabushiki Kaisha Toshiba | Data storage medium with certification data |
CA2373233A1 (en) * | 1999-05-19 | 2000-11-23 | Mastercard International Incorporated | System and process for conducting a financial transaction |
AU1223901A (en) * | 1999-10-20 | 2001-04-30 | Spyrus, Inc. | Method and system for an integrated circuit card interface device with multiple modes of operation |
EP1128342B1 (en) * | 2000-02-21 | 2008-08-13 | IRIS CORPORATION BERHAD, Iris Smart Technology Complex | System for providing access to secured data |
US6438638B1 (en) | 2000-07-06 | 2002-08-20 | Onspec Electronic, Inc. | Flashtoaster for reading several types of flash-memory cards with or without a PC |
US7295443B2 (en) | 2000-07-06 | 2007-11-13 | Onspec Electronic, Inc. | Smartconnect universal flash media card adapters |
EP1233383A1 (en) * | 2001-02-14 | 2002-08-21 | Banksys S.A. | Method and device for the management of IC-card applications |
KR20030043405A (en) * | 2001-11-28 | 2003-06-02 | 주식회사 에스원 | Card re-initializing system and method thereof |
US7748620B2 (en) | 2002-01-11 | 2010-07-06 | Hand Held Products, Inc. | Transaction terminal including imaging module |
US7479946B2 (en) * | 2002-01-11 | 2009-01-20 | Hand Held Products, Inc. | Ergonomically designed multifunctional transaction terminal |
US7451917B2 (en) | 2002-01-11 | 2008-11-18 | Hand Held Products, Inc. | Transaction terminal comprising imaging module |
US7472825B2 (en) * | 2002-01-11 | 2009-01-06 | Hand Held Products, Inc. | Transaction terminal |
US20030132293A1 (en) * | 2002-01-11 | 2003-07-17 | Hand Held Products, Inc. | Transaction terminal including raised surface peripheral to touch screen |
US8396809B1 (en) | 2002-05-14 | 2013-03-12 | Hewlett-Packard Development Company, L.P. | Method for reducing purchase time |
US6934664B1 (en) | 2002-05-20 | 2005-08-23 | Palm, Inc. | System and method for monitoring a security state of an electronic device |
US20060206677A1 (en) * | 2003-07-03 | 2006-09-14 | Electronics And Telecommunications Research Institute | System and method of an efficient snapshot for shared large storage |
US20050015612A1 (en) * | 2003-07-14 | 2005-01-20 | Jing-Lung You | Parent-children interactive intelligent management system |
US7761591B2 (en) | 2005-12-16 | 2010-07-20 | Jean A. Graham | Central work-product management system for coordinated collaboration with remote users |
US7896233B2 (en) * | 2007-12-27 | 2011-03-01 | Mastercard International, Inc. | Methods and apparatus for personalizing merchant device for receiving contactless payments |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US29259A (en) * | 1860-07-24 | Machine for making friction-wires | ||
US3571799A (en) * | 1969-08-21 | 1971-03-23 | Ibm | Data transmission terminal |
US3821704A (en) * | 1972-03-13 | 1974-06-28 | D Sabsay | Self re keying security device with coded key |
CA1101513A (en) * | 1976-11-08 | 1981-05-19 | Leonard J. Genest | Security system |
US4186871A (en) * | 1978-03-01 | 1980-02-05 | International Business Machines Corporation | Transaction execution system with secure encryption key storage and communications |
US4218738A (en) * | 1978-05-05 | 1980-08-19 | International Business Machines Corporation | Method for authenticating the identity of a user of an information system |
US4304990A (en) * | 1979-12-11 | 1981-12-08 | Atalla Technovations | Multilevel security apparatus and method |
DE3003998A1 (en) * | 1980-02-04 | 1981-09-24 | Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt | DATA ENCRYPTION AND DECRYLING SYSTEM |
US4529870A (en) * | 1980-03-10 | 1985-07-16 | David Chaum | Cryptographic identification, financial transaction, and credential device |
FR2483657B1 (en) * | 1980-05-30 | 1986-11-21 | Bull Sa | PORTABLE MACHINE FOR CALCULATING OR PROCESSING INFORMATION |
FR2492135B1 (en) * | 1980-09-16 | 1988-01-22 | Cii Honeywell Bull | APPARATUS FOR DISTRIBUTING OBJECTS AND ACQUIRING SERVICES |
US4453074A (en) * | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
JPS58132859A (en) * | 1982-02-02 | 1983-08-08 | Omron Tateisi Electronics Co | Magnetic card producing device |
FR2526977B1 (en) * | 1982-05-14 | 1988-06-10 | Cii Honeywell Bull | METHOD AND DEVICE FOR AUTHENTICATING OR CERTIFYING AT LEAST INFORMATION CONTAINED IN A MEMORY OF AN ELECTRONIC MEDIUM IN PARTICULAR REMOVABLE AND PORTABLE SUCH AS A CARD |
JPH0642244B2 (en) * | 1982-07-09 | 1994-06-01 | オムロン株式会社 | Margin transaction processing device |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
FR2536928B1 (en) * | 1982-11-30 | 1989-10-06 | France Etat | SYSTEM FOR ENCRYPTING AND DECIPHERING INFORMATION, OF THE TYPE USING A PUBLIC KEY DECRYPTION SYSTEM |
JPS60221870A (en) * | 1984-04-18 | 1985-11-06 | Omron Tateisi Electronics Co | Ic card system |
JPS61278989A (en) * | 1985-06-04 | 1986-12-09 | Toppan Moore Co Ltd | Reader/writer of ic card |
US4650475A (en) * | 1985-07-18 | 1987-03-17 | Carol Smith | Method and apparatus for the injection of pharmaceuticals |
US4742215A (en) * | 1986-05-07 | 1988-05-03 | Personal Computer Card Corporation | IC card system |
-
1985
- 1985-03-05 JP JP4338685A patent/JPH0762854B2/en not_active Expired - Fee Related
-
1986
- 1986-03-03 CA CA000503166A patent/CA1266326A/en not_active Expired - Lifetime
- 1986-03-04 DE DE8686102789T patent/DE3682790D1/en not_active Expired - Lifetime
- 1986-03-04 EP EP86102789A patent/EP0193920B1/en not_active Expired - Lifetime
-
1987
- 1987-11-16 US US07/120,773 patent/US4809326A/en not_active Expired - Lifetime
-
1996
- 1996-04-03 HK HK58196A patent/HK58196A/en not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
EP0193920A3 (en) | 1988-08-03 |
JPS61202280A (en) | 1986-09-08 |
DE3682790D1 (en) | 1992-01-23 |
EP0193920A2 (en) | 1986-09-10 |
HK58196A (en) | 1996-04-12 |
EP0193920B1 (en) | 1991-12-11 |
JPH0762854B2 (en) | 1995-07-05 |
US4809326A (en) | 1989-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA1266326A (en) | Ic card system | |
EP0216298B1 (en) | Identification system | |
US5521362A (en) | Electronic purse card having multiple storage memories to prevent fraudulent usage and method therefor | |
US4839506A (en) | IC card identification system including pin-check time means | |
US4961142A (en) | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer | |
EP0696016B1 (en) | Method for managing security for card type storage medium and a card type storage medium | |
US5036461A (en) | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device | |
US6957338B1 (en) | Individual authentication system performing authentication in multiple steps | |
US5379344A (en) | Smart card validation device and method | |
US5280527A (en) | Biometric token for authorizing access to a host system | |
US6669100B1 (en) | Serviceable tamper resistant PIN entry apparatus | |
US20070255955A1 (en) | Tamper resistant module certification authority | |
EP0437616A1 (en) | Ic card system having function of confirming destroyed data | |
WO1998052158A2 (en) | Integrated circuit card with application history list | |
Sherman et al. | Secure network access using multiple applications of AT&T's smart card | |
EP0985203A1 (en) | Key transformation unit for an ic card | |
WO1994007219A1 (en) | Combination pin pad and terminal | |
US20040098590A1 (en) | Message authentication device | |
EP1053535A1 (en) | Configuration of ic card | |
JPH0750665A (en) | Identity confirming device and its method | |
JPH0822517A (en) | Forgery preventing system for hybrid card | |
EP1638057A1 (en) | Method and system for maintenance of a point of sales terminal | |
JPS60181892A (en) | Preventing device of illegal access of ic card | |
KR960005111B1 (en) | Outside admit data identification method by portable thing as memory card | |
WO2000008610A1 (en) | Offline verification of integrated circuit card using hashed revocation list |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MKEX | Expiry |