WO2002003341A1 - Monetary system having public key infrastructure - Google Patents
Monetary system having public key infrastructure Download PDFInfo
- Publication number
- WO2002003341A1 WO2002003341A1 PCT/AU2001/000790 AU0100790W WO0203341A1 WO 2002003341 A1 WO2002003341 A1 WO 2002003341A1 AU 0100790 W AU0100790 W AU 0100790W WO 0203341 A1 WO0203341 A1 WO 0203341A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data storage
- electronic data
- public key
- arrangement
- central server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Definitions
- This invention relates to payment systems.
- this is achieved by providing that there is a central server which provide one of the keys of a key pair such as a public key and private key in a public key infrastructure arrangement, and as well, authorises the use by users of individual members each of which contain a user's private key and otherwise contains an operating system and other programs which are open.
- the application can be considered with relation to a smart card, but it is to be understood that any device which has inbuilt electronic logic can be applicable.
- PKI public-private key infrastructure
- a private key may be used for the following: to compute the corresponding public key; to make a digital signature which may be verified by the corresponding public key; to decrypt the message encrypted by corresponding public key; or, together with other information to compute a piece of common shared secret information.
- Public Key cryptography is based on the principal that: you can create two keys which are related you cannot in practice get either key from the other data encrypted with either key can be decrypted with the other one key you keep secret, and the other you make public
- Public key encryption is based on a certain type of mathematical algorithm that provides one way encryption/decryption. That is, a public key algorithm allows you to encrypt a message with a special key that has some very special properties.
- Encrypted messages can only be unencrypted with a single private key. 2. It would be beyond the realm of probability to break the secret key through possession of the public key and an encoded message.
- Any sender can encrypt their message with your public key and that message will only be able to be unencrypted with your private key.
- Private keys also have the added benefit that a portion of text which has been encrypted with the private key, can be verified through the use of the public key to have been encrypted by the holder of the private key. This is called a digital signature and can provide message authenticity because only the holder of the private key could encrypt such a message.
- the same method can be used to verify message integrity because a hash digest may be created by the sender representing the pre-transmission file state.
- each member of a community for instance those constrained on board a boat are provided with a smart card which has on board logic including an arrangement to effect its use with respect to a central server and to any reader to which a user might apply the card.
- a central server for instance on board a boat is simply then programmed to authorise to provide a selected credit for each user at each of selected times during a day, week, month or year and each user can then by use of a card simply access such credit associated with that unique authentication of a particular user from time to time.
- This in this case uses the public-private key encryption technique.
- the private key is exclusive to a specific user.
- the member being a smart card When the member being a smart card is first loaded it is loaded with an open system in this case Windows Powered Smart Card. Such a card can also have as an option a PIN access constraint. If a PIN is used then there is less chance of the card being misused if stolen from an authorised user.
- the card has embedded both a private key and a public key pair.
- the central server will have means to identify the source of a signal and as appropriate use a public key appropriate to that user to de-encrypt a message.
- a plurality of smart cards that are each loaded with an open operating system and they are each able to interconnect with one or more smart card readers on board the vessel.
- Each smart card reader allows each user to communicate with a server that is also able to communicate with other computers, for instance by satellite to a base station perhaps located in Washington.
- the communication itself is conducted safely by the PKI system and in this way the user, let us say, a navy employee, may from time to time and securely download any "value” that is available in the relevant account for that user. Alternatively, the user can return cash “value” as a credit to the account or simply check the available "values”.
- various services can be provided on board the ship where for instance the user wishes to purchase a bottle of beverage from a machine.
- This "machine” will include a smart card reader and will have a global key and may then check the smart card to ensure that there is a valid private key but does not have means to read the private key.
- the machine can then "extract" the value of the purchase from the smart card data base and it can then itself communicate with the central server from time to time to reconcile "values”.
- the government itself create the asset means that a record of the transactions, the velocity of transactions, and other useful data for managing the economy can be directly gained rather than indirectly through the facility of banks or other credit institutions.
- Governments then can apply common rules which apply to currency in general or to the monetary system in general and can institute furthermore, personal monitoring, and can make various decisions in relation to taxation or other control of transfer of currency.
- the invention in one form could be said to reside in an arrangement where there is a government controlling a central server which holds one of a key pair of a public key infrastructure and that there are a plurality of readers of members disbursed through an area of interest, and a plurality of members such as smart cards or the like, contain an openly accessible operating system and have security in relation to retained information on credit or debit values where the security to such information is again through the public key infrastructure arrangement and the system is arranged such that a member can from time to time be used to effect communication with a central server where allocated debits and credits as far as the value accessible by the user can be made available or can be effected for transfer.
- PKI Public Key Infrastructure
- PLCs Public Key Certificates
- PLC Public Key Certificate
- CA Certification Authority
- CA Certification Authority
- the CA may create the user's keys
- a PKI consists of five types of components [MISPC]: Certification authorities (CAs) that issue and revoke PKCs;
- ORAs Organizational Registration authorities
- PKC holders that are issued certificates and can sign digital documents and encrypt documents
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MXPA02012849A MXPA02012849A (en) | 2000-07-03 | 2001-07-03 | Monetary system having public key infrastructure. |
AU2001268830A AU2001268830A1 (en) | 2000-07-03 | 2001-07-03 | Monetary system having public key infrastructure |
EP01947035A EP1305780A1 (en) | 2000-07-03 | 2001-07-03 | Monetary system having public key infrastructure |
JP2002507332A JP2004532535A (en) | 2000-07-03 | 2001-07-03 | Financial system with public key infrastructure |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPQ8543A AUPQ854300A0 (en) | 2000-07-03 | 2000-07-03 | Payment systems improvements |
AUPQ8543 | 2000-07-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002003341A1 true WO2002003341A1 (en) | 2002-01-10 |
Family
ID=3822610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2001/000790 WO2002003341A1 (en) | 2000-07-03 | 2001-07-03 | Monetary system having public key infrastructure |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1305780A1 (en) |
JP (1) | JP2004532535A (en) |
CN (1) | CN1447956A (en) |
AU (2) | AUPQ854300A0 (en) |
MX (1) | MXPA02012849A (en) |
WO (1) | WO2002003341A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100409245C (en) * | 2006-04-29 | 2008-08-06 | 北京飞天诚信科技有限公司 | Method for implementing PKI application of bank card on computer |
US9177313B1 (en) | 2007-10-18 | 2015-11-03 | Jpmorgan Chase Bank, N.A. | System and method for issuing, circulating and trading financial instruments with smart features |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5832089A (en) * | 1995-06-07 | 1998-11-03 | Sandia Corporation | Off-line compatible electronic cash method and system |
WO1998052163A2 (en) * | 1997-05-15 | 1998-11-19 | Mondex International Limited | Ic card transportation key set |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5926548A (en) * | 1996-05-29 | 1999-07-20 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing hierarchical electronic cash |
US5974146A (en) * | 1997-07-30 | 1999-10-26 | Huntington Bancshares Incorporated | Real time bank-centric universal payment system |
US6012049A (en) * | 1998-02-04 | 2000-01-04 | Citicorp Development Center, Inc. | System for performing financial transactions using a smartcard |
-
2000
- 2000-07-03 AU AUPQ8543A patent/AUPQ854300A0/en not_active Abandoned
-
2001
- 2001-07-03 AU AU2001268830A patent/AU2001268830A1/en not_active Abandoned
- 2001-07-03 WO PCT/AU2001/000790 patent/WO2002003341A1/en not_active Application Discontinuation
- 2001-07-03 CN CN01814286A patent/CN1447956A/en active Pending
- 2001-07-03 EP EP01947035A patent/EP1305780A1/en not_active Withdrawn
- 2001-07-03 JP JP2002507332A patent/JP2004532535A/en not_active Withdrawn
- 2001-07-03 MX MXPA02012849A patent/MXPA02012849A/en unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5832089A (en) * | 1995-06-07 | 1998-11-03 | Sandia Corporation | Off-line compatible electronic cash method and system |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5926548A (en) * | 1996-05-29 | 1999-07-20 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing hierarchical electronic cash |
WO1998052163A2 (en) * | 1997-05-15 | 1998-11-19 | Mondex International Limited | Ic card transportation key set |
US5974146A (en) * | 1997-07-30 | 1999-10-26 | Huntington Bancshares Incorporated | Real time bank-centric universal payment system |
US6012049A (en) * | 1998-02-04 | 2000-01-04 | Citicorp Development Center, Inc. | System for performing financial transactions using a smartcard |
Also Published As
Publication number | Publication date |
---|---|
AUPQ854300A0 (en) | 2000-07-27 |
CN1447956A (en) | 2003-10-08 |
JP2004532535A (en) | 2004-10-21 |
EP1305780A1 (en) | 2003-05-02 |
MXPA02012849A (en) | 2003-10-24 |
AU2001268830A1 (en) | 2002-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673632B2 (en) | Method for managing a trusted identity | |
EP0771499B1 (en) | Method for securely using digital signatures in a commercial cryptographic system | |
US7904722B2 (en) | Method for securely using digital signatures in a commercial cryptographic system | |
US5590197A (en) | Electronic payment system and method | |
RU2448365C2 (en) | Apparatus and method for secure data transmission | |
Medvinsky et al. | NetCash: A design for practical electronic currency on the Internet | |
US7500272B2 (en) | Manufacturing unique devices that generate digital signatures | |
US6038551A (en) | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer | |
US8630421B2 (en) | Cryptographic key backup and escrow system | |
US5615268A (en) | System and method for electronic transmission storage and retrieval of authenticated documents | |
US6983368B2 (en) | Linking public key of device to information during manufacture | |
US7870998B2 (en) | Private information exchange in smart card commerce | |
WO1996002993A9 (en) | Method for securely using digital signatures in a commercial cryptographic system | |
CN101388095A (en) | Method and apparatus for performing delegated transactions | |
Yang | The security of electronic banking | |
JPH09223210A (en) | Portable information storage medium and authentication method and authentication system using the same | |
KR100675423B1 (en) | IC Card contained with Electronic Bankbooks and Public Certificates and Processing Machine for the IC Card and Server for issuing the IC Card | |
EP1305780A1 (en) | Monetary system having public key infrastructure | |
Camenisch et al. | Cryptographic mechanisms for privacy | |
Baker | International Developments Affecting Digital Signatures | |
Rihaczek | TeleTrusT-OSIS and communication security | |
Price | Sesigning the Legal Infrastructure for Cuberspace Commerce: How Much Regulation Is too Much | |
Blain | Cryptography and electronic commerce; the role of the Canadian government in facilitating a domestic and global electronic marketplace. | |
KR20050101153A (en) | The structure of electric-prepaid card which is very secure and for user easy to use and the structure of the system to use the electric-prepaid card and operation method | |
Ponka | Legal Aspects of Digital Signatures and Non Repudiation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2002/012849 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037000088 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001268830 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001947035 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 018142869 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2001947035 Country of ref document: EP |
|
WWR | Wipo information: refused in national office |
Ref document number: 1020037000088 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020037000088 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2001947035 Country of ref document: EP |