WO1982002446A1 - Security method and device for three-party communication of confidential data - Google Patents

Security method and device for three-party communication of confidential data Download PDF

Info

Publication number
WO1982002446A1
WO1982002446A1 PCT/FR1981/000173 FR8100173W WO8202446A1 WO 1982002446 A1 WO1982002446 A1 WO 1982002446A1 FR 8100173 W FR8100173 W FR 8100173W WO 8202446 A1 WO8202446 A1 WO 8202446A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
flow
terminal
transaction
data
Prior art date
Application number
PCT/FR1981/000173
Other languages
French (fr)
Inventor
Alcatel Transac
Original Assignee
Decavele Dominique
Fournier Jean Pierre
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Decavele Dominique, Fournier Jean Pierre filed Critical Decavele Dominique
Publication of WO1982002446A1 publication Critical patent/WO1982002446A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present invention relates to security methods and devices for tripartite communication of confidential data in digital form, it applies to systems allowing the exchange of information between holders of flow-through devices and centralized processing machines via specific independent terminals, not monitored. More particularly, the invention makes it possible to identify, authenticate and possibly encrypt the data exchanges between a legitimate bearer of a flow-through device and a centralized, remote processing machine, through a specific independent terminal, so to preserve the confidentiality of private information when risks of indiscretion are possible.
  • flow-through devices are used as means of authorization of access, a known example is the credit card bank which authorizes the withdrawal of money at certain distributing terminals and the payment at other specific terminals.
  • any communication between a flow-through device holder and a centralized processing machine comprises the following steps:
  • FIG. 1 shows the essential elements of a system for communicating confidential data between holders of flow-through devices and centralized processing machines by means of specific terminals, according to the invention.
  • FIG. 2 shows the essential elements of a confidential data communication system with encryption, according to the invention.
  • FIG. 3 shows the essential elements of a deferred communication system for confidential data according to the invention.
  • the system shown in FIG. 1 is made up of a plurality of flow-through devices capable of being connected to specific terminals to allow their holders to exchange information with centralized processing machines; a flow-through device 1, a terminal 2, and a processing machine 3 are succinctly represented in FIG. 1 by their elements necessary for understanding the invention.
  • each flow-through device, such as 1 is assigned to a particular holder for his own needs.
  • This holder is conventionally authorized to exchange information with a centralized processing machine, such as 3, from the moment when he finds a specific terminal, such as 2, in order to connect the flow-through device 1 which he holds and where he is able to justify that it is well qualified to use this flow-through device 1 by providing the proof that it knows the confidential code by governing the use.
  • each flow-through device 1 which is preferably of the card type, comprises an identity data memory 10; this memory 10 is a permanent memory accessible for reading by the specific terminals 2 and it contains binary data which differentiates the flow-through device 1 which comprises it, from all the others.
  • This memory 10 is for example a magnetic memory, a targeted memory or an electronic memory readable and not erasable by conventional means.
  • the identity data contained in the memory 10 of a flow-through device 1 is transmitted to the centralized processing machine 3 connected to the specific terminal 2 to which the flow-through device 1 is connected for a transaction.
  • the specific terminal 2 can be designed to store this identity data in connection with the transaction in progress and to transmit a card identity recognition signal, in order to authorize the rest of the communication process.
  • a. keyboard 11 is provided on each flow-through device 1, it is possibly simplified compared to conventional keyboards; this keyboard 11 allows the bearer of the flow-through device to tabulate the chosen confidential code, which has been determined by the holder of the flow-through device 1 and which has possibly been communicated to him by the holder, if he is not this holder.
  • the keyboard 11 is connected to a first temporary register 12 allowing the memorization of the confidential code tabulated by the carrier, for the duration of the transaction.
  • the register 12 is linked by its outputs to a first group of inputs of an individualization key generation logic 14, a second group of inputs of which is connected to a key base memory 17.
  • the base memory key 17 is a permanent memory normally inaccessible from the outside after first registration, it contains a long series of binary data, for example a series of 5 ⁇ binary elements, which combines with the confidential code tabulated in the key generation logic 14. This combination is carried out using conventional doors, for example on the basis of exclusive OR circuits.
  • the individualization key obtained is known to centralized processing machines 3 and to them alone; it is it which is associated with the card identity data in the file 32 of the holders of flow-through devices in memory of these 3 * 2n machines consequently the centralized processing machine 3, which is connected to the specific terminal 2 to which the credential device 1 considered, is able to find in file 32 the individualization key corresponding to the identification data received, this is done by means of a conventional address céccceur 3 activated by the identification data put stored in a temporary register 30.
  • the confidential code chosen by a credential device holder is not transmitted to terminals and processing machines and therefore does not have to be known by anyone other than the holder and those whom he authorizes to use your credentials.
  • the bearer of the flow-through device 1 personally tabulates the transaction data which concern him, for example the amount to be paid, it being understood that depending on the chosen operation certain data such as the time data can be entered either at the flow-through device 1, either at terminal 2, in particular when it is a point of sale terminal.
  • the transaction data entered by the bearer of the accrediting device 1 using the keyboard 11, are temporarily stored in a register 13 of this device 1.
  • the outputs of the register 13 are connected in parallel to a first group of inputs of logic for generating a key figure 15 and at least one connection terminal 313 for a terminal so as to allow the transmission of this data in series outside the flow-through device 1.
  • the key figure generation logic 15 ensures the combination according to a conventional structure algorithm, of the transaction data, with the individualization key which comprises for example 56 binary elements so that the key figure presents a great complexity.
  • the generation logic 15 is constituted from a microprocessor, also performing other tasks not mentioned here since they are not related to the invention.
  • the key figure obtained is transmitted to the centralized processing machine 1 via the specific terminal 2, as are the transaction data contained in the register 13 and the identification and transaction data specific to the holder of the terminal who are previously stored in a storage unit 22 conventionally comprising at least one permanent memory for identity information and a writable and erasable memory for transaction information.
  • the non-confidential transaction data of the register 13 can be recorded and displayed in the terminal by a conventional recording device 21, for control before transmission and generation of the key figure.
  • the centralized processing machine 3 receives the transaction data from the carrier transmitted in clear in digital form as well as the key figure and the identification and transaction data specific to the terminal.
  • the transaction data of the bearer are temporarily stored in a register 33, the outputs of which are linked to a key figure determination logic 34 having an operation analogous to that of logic 15.
  • the output of the file 32 is also connected to the determination logic 34 so that the latter is able to determine a key figure from the key defined by the content of the register 30 and the transaction data contained in the register 33 .
  • the key figure produced by the determination logic 34 is transmitted to a comparator 36 which also receives the key figure transmitted by the flow-through device 1 which is stored in a register 35. If the two key figures are identical, the comparator issues an order of validation on the one hand towards a validation signaling device 23 of the terminal 2 and on the other hand towards the activation input of an input register 37 of transaction memory, so as to allow data recording supplied by the file 32, and the registers 33 and 39 the latter receiving the data from the storage unit 22.
  • the validation signaling device 23 is of conventional type, it allows in particular the resetting to zero of the registers of the terminal 2 and of the flow-through device 1 as well as the withdrawal of the latter.
  • the exemplary embodiment presented in FIG. 2 includes an encryption arrangement intended to avoid the collection of information without authorization by third parties using input systems connected to the transmission links.
  • the encryption is carried out in each terminal by an encryption member 27 which receives the data to be coded and an encryption key.
  • the encryption key is obtained by identical processing, by flow-through devices 1 and by centralized processing machines 3, of binary numbers generated by one or the other.
  • identity data are temporarily stored in a register 30 which controls the addressing of the file 32 via the address decoder 31; the file 32 generates the individualization key which corresponds to the identity data and supplies it on the one hand to the logic 34 and on the other hand to a controller 53 responsible for verifying its compliance with the standards.
  • the controller 53 is a conventional logic which performs, for example, a parity check and which verifies that the key 'indeed corresponds to a key in service.
  • the processing machine 3 also includes a generator of binary encryption numbers 51 capable of producing many different combinations in a random order so as to be able to assign an unpredictable number for each new transaction processed, this number being chosen to be different from any number already assigned to a transaction in progress.
  • the centralized processing machines are processors of the usual type, the production and the programs of which will not be described here, insofar as this does not come within the scope of the invention.
  • the controller 53 Upon receipt of a correct individualization key, the controller 53 activates a buffer register 52 located at the output of the encryption binary number generator 51 so as to allow the storage in memory 54 of a binary number determined at the address that determines the individualization key received and this number is also transmitted to an encryption input B16 of the flow-through device 1 concerned via a transfer register 55 of the centralized processing machinery, link 4 and terminal 2.
  • the encryption key is then applied to an encryption circuit 25 of the conventional type which works, according to its own algorithm, on the information to be transmitted by the link 4.
  • this information symbolically applied to an OR 24, are constituted by the transaction data provided by the flow-through device 1, by the key figure obtained as previously by combining the individualization key with the transaction data according to the coding algorithm in the key figure generation logic. 15, as well as by the identification and transaction data specific to the specific terminal 2.
  • this encrypted data is transmitted by the link 4 to a decryptor 56, the latter also receives a decryption key which is supplied to it by the determination logic 34 from the individualization key recorded in a buffer memory 57 and of the corresponding encryption number in memory 54.
  • this decryption key can be either identical to the encryption key or different having been generated at the same time as the latter.
  • the processing of information after decryption is identical in all respects to that described in relation to FIG. 1 and will therefore not be repeated here.
  • the invention is also applicable to systems in which the flow-through devices connect to specific terminals which temporarily store the transaction data because they do not feel continuously connected to the processing machines. centralized; such a system is shown in Figure 3.
  • the flow-through device 1 presented in FIG. 3 is similar to those presented in the previous figures, however it does not necessarily have a keyboard 11, which can then be attached to the specific terminals 2 and these do not have permanent transmission links with the machines centralized processing 3.
  • terminals 2 and machines 3 are carried out either in packets via a temporary transmission link, or by means of transportable storage means and the central processing machines do not provide any verification during the exchange of flow-through devices.
  • 1-specific terminals 2 2.
  • each flow-through device 1 comprises a permanent memory 10 for its own identity data, a register 12 of confidential code data and a register of transaction data, these two registers being connected to the keyboard 11, directly if this keyboard 11 is on the flow-through device 1 itself, or via connection terminals if it is on the specific terminal 20.
  • control logic 14A connected to the register 12 and to a confidential code memory 18, makes it possible to verify that the confidential code introduced by the bearer of the accrediting device 1 is the same as that which is permanently stored in the memory 18 .
  • the memory 18 preferably of the same type as the memory 10 is a permanent memory inaccessible from the outside to the device after entering the confidential code chosen by the holder of the accrediting device.
  • the control logic 14A is for example of the NAND type; it authorizes access to a management logic 153, which is connected to the register 12 of transaction data and to a memory of this transaction 19 by its inputs.
  • the management logic 153 can possibly be a conventional wired logic, in a preferred variant of implementation it is combined with a logic for generating a key figure 15A and 3rd present in the form of a microprocessor.
  • the transaction memory 19 is a classic readable and writable memory for controlling the management logic 153, it allows for example to memorize the number, the amount and the order of the bank transactions carried out using the flow-through device which behaves.
  • the generation logic 15A is linked to an individualization key memory 17, which is permanent and inaccessible from outside the flow-through device, it receives the transaction data entered by the bearer of the flow-through device 1 as well as the number of transaction as defined from transaction memory 19.
  • the key generation logic 15A combines according to a given algorithm the key from the individualization key memory 17 with the data and the transaction number; the key figure is transmitted to the specific terminal 2 via a connection 315.
  • the specific terminal 2 stores the identity of the flow-through device, the transaction data and the key-figure, as supplied by the flow-through device 1, with the data d identification and transaction generated by this specific terminal 2, in the example chosen this is symbolized by four memories 20, 21, 22 and 26. The content of these four memories is transferred at the desired time to a centralized processing machine 1 for exploitation.
  • the processing machine 1 is very similar to that presented in FIG. 1, it has four memories 30, 33, 35, 39 corresponding respectively to memories 20, 21, 26 and 22.
  • Memory 30 makes it possible to store the identification data of the flow-through devices and to find the corresponding individualization keys in file 32 via an addressing decoder 31.
  • Each group of identification data corresponds to a key in file 12, a group of transaction data in memories 33 and 39 and a key figure in memory 35.
  • the algorithmic combination of an individualization key and the corresponding content in memory of transaction data 33 makes it possible to produce the expected key figure, which is compared with the key figure corresponding to the content in memory 35.
  • the comparator 36A responsible for the comparison of the key figures produced either a memory signal in transaction memory 38A or a memory signal in error memory 38B depending on whether the result of the comparison is satisfactory or not.
  • This memorization signal is transmitted to a buffer recording set 37 inserted at the input of 3 memories 38.
  • the representation of the registers and other components of the processing machine 1 is symbolic and corresponds more to the functions fulfilled than to the real circuits which are those of a specialized processor whose constitution is defined according to all the criteria of the system.
  • the holder, and a fortiori the non-holder, of a flow-through device 1 does not have access to the individualization key of his flow-through device; neither does the holder of a specific terminal 2 when the flow-through device has a keyboard nor the processing machine 3 have knowledge or access to the confidential codes chosen by the holders of flow-through devices, which limits the risks of fraud at different levels .

Abstract

Method and devices allowing the identification, authentication and optionally the encryption of information exchanges between legitimate carriers of credit devices (1) and remote centralized processing machines (), via specific terminals (2). The information produced by a carrier of a credit device (1), after connection of the device (1) to a terminal (2) and sending the identity of such device (1), is authenticated by a key-digit produced by a generating logic (15) of the device (1) from an individualization key and transaction data. The invention applies to the exchange of information in an unsecure environment and more particularly to banking systems with credit cards.

Description

Procédé et dispositif de sécurité pour communication tripartite de données confidentielles . Security method and device for tripartite communication of confidential data.
La présente invention concerne les procédés et dispositifs de sécurité pour communication tripartite de données confidentielles sous forme numérique, elle s'applique aux systèmes permettant l'échange d'informations entre des porteurs de dispositifs accréditifs et des machines de traitement centralisé par l'intermédiaire de terminaux spécifiques indépendants, non surveillés. Plus particulièrement l'invention permet d'identifier, d'authentifier et éventuellement de crypter les échanges de données entre un porteur légitime de dispositif accréditif et une machine de traitement centralisé, distante, par l'intermédiaire d'un terminal spécifique indépendant, de manière à préserver la confidentialité des informations privatives lorsque des risques d'indiscrétion sont envisageables. Oe manière connue, de tels dispositifs accréditifs sont employés comme moyen d'autorisation d'accès, un exemple connu en est la carte accréditive bancaire qui autorise le retrait d'argent à certains terminaux distributeurs et le paiement à d'autres terminaux spécifiques. Dans l'exemple évoqué ci-dessus il est classique que certains terminaux soient pratiquement hor3 de la surveillance des banques qui détiennent les machines de traitement centralisé des transactions et aussi hors de la surveillance des détenteurs de dispositifs accréditifs. Etant donné que ds tels dispositifs ont pour but de réserver les accès qu'ils contrôlent aux seuls utilisateurs autorisés, il est à craindre que des tiers malintentionnés ne cherchent à profiter frauduleusement des possibilités offertes, en se faisant passer pour un utilisateur autorisé ou en falsifiant des données.The present invention relates to security methods and devices for tripartite communication of confidential data in digital form, it applies to systems allowing the exchange of information between holders of flow-through devices and centralized processing machines via specific independent terminals, not monitored. More particularly, the invention makes it possible to identify, authenticate and possibly encrypt the data exchanges between a legitimate bearer of a flow-through device and a centralized, remote processing machine, through a specific independent terminal, so to preserve the confidentiality of private information when risks of indiscretion are possible. Oe known manner, such flow-through devices are used as means of authorization of access, a known example is the credit card bank which authorizes the withdrawal of money at certain distributing terminals and the payment at other specific terminals. In the example mentioned above, it is conventional for certain terminals to be practically hor3 from the surveillance of the banks which hold the centralized transaction processing machines and also from the surveillance of the holders of flow-through devices. Given that the purpose of such devices is to reserve the access they control only to authorized users, it is to be feared that malicious third parties will seek fraudulently to take advantage of the possibilities offered, by posing as an authorized user or by falsifying Datas.
Ceci à conduit à vérifier l'identité des porteurs de dispositifs accréditifs par l'intermédiaire des terminaux en comparant des données numériques confidentielles enregistrées sur les dispositifs accréditifs avec des données confidentielles tabulées par les porteurs . Toutefois, l'on peut craindre une éventuelle possibilité de prise de connaissance de ces données confidentielles au niveau des terminaux et leur utilisation peur modifier eu créer des informations. De même on crypte souvent les données transmises par des liaisons sur des distances imperzances pour éviter la saisie frauduleuse d'informations confidentielles car branchement d'un disnosirif de dérivation sur les liaisons et la transcission de fausses informations. Or dans le cas de communications entre deux parties par l'intermédiaire d'une troisième, cette troisième est particulièrement bien placée pour modifier à son profit les informa-ions échangées par les deux autres.This has led to verifying the identity of the holders of flow-through devices via the terminals by comparing confidential digital data recorded on the flow-through devices with confidential data tabulated by the holders. However, one can fear a possible possibility of acquaintance with this confidential data at the level of the terminals and their use can modify or create information. Similarly, the data transmitted by links over imperzance distances is often encrypted to avoid the fraudulent entry of confidential information because a disnosirif is connected of derivation on the links and the transcission of false information. However, in the case of communications between two parties via a third, this third is particularly well placed to modify for its benefit the information exchanged by the other two.
Pour remédier à ces inconvénients la présenta invention propose un procédé et des dispositifs tendant à éviter la communication des informations privatives de chacune des parties et à authentifier les informations émises. Selon l'invention toute communication entre un porteur de dispositif accréditif et une machine de traitement centralisé comporte les étapes suivantes :To remedy these drawbacks, the present invention proposes a method and devices tending to avoid the communication of the private information of each of the parties and to authenticate the information transmitted. According to the invention, any communication between a flow-through device holder and a centralized processing machine comprises the following steps:
- communication de l'identité du dispositif accréditif utilisé par le porteur à la machine de traitement centralisé par connexion dudit dispositif accréditif dans un terminal spécifique,communication of the identity of the flow-through device used by the bearer to the centralized processing machine by connection of said flow-through device in a specific terminal,
- communication du code confidentiel spécifique du'-porteur au système par introduction manuelle de ce code par le porteur au niveau dispositif accréditif-terminal,- communication of the specific confidential code of the carrier to the system by manual introduction of this code by the carrier at the level of the credit-terminal device,
- détermination par le dispositif accréditif, d'un chiffre-clé d'identification du porteur et d'authentification de la transaction par combinaison des données de transaction du porteur avec une clé d'individualisation fournie par le dispositif accréditif à réception du code confidentiel du porteur- determination by the flow-through device, of a key figure identifying the bearer and authenticating the transaction by combining the transaction data of the bearer with an individualization key provided by the flow-through device upon receipt of the confidential code of the carrier
- commun!cation du chiffre-clé, des données de transaction et de l'identité du terminal spécifique à la machine de traitement centralisé par ce terminal spécifique sur la base des données reçues du dispositif accréditif et de données qui lui sont propres.- communication of the key figure, the transaction data and the identity of the terminal specific to the centralized processing machine by this specific terminal on the basis of the data received from the flow-through device and of data which are specific to it.
D'autres caractéristiques et avantages de l'invention seront évoqués au cours de la description et en relation avec les figures mentionnées ci-dessous.Other characteristics and advantages of the invention will be mentioned during the description and in connection with the figures mentioned below.
La figure 1 présente les éléments essentiels d'un systàme de communication de données confidentielles entre porteurs de dispositifs accréditifs et machines de traitement centralisé par l'intermédiaire de terminaux spécifiques, selon l'invention.FIG. 1 shows the essential elements of a system for communicating confidential data between holders of flow-through devices and centralized processing machines by means of specific terminals, according to the invention.
La figure 2 présente les éléments essentiels d'un système de communication de données confidentielles avec cryptage, selon l'invention. La figure 3 présente les éléments essentiels d'un système de communication différé de données confidentielles selon l'invention.Figure 2 shows the essential elements of a confidential data communication system with encryption, according to the invention. FIG. 3 shows the essential elements of a deferred communication system for confidential data according to the invention.
Le système schématisé figure 1 est constitué d'une pluralité de dispositifs accréditifs susceptibles d'être connectés à des terminaux spécifiques pour permettre à leurs titulaires d'échanger des informations avec des machines de traitement centralisé ; un dispositif accréditif 1, un terminal 2, et une machine de traitement 3 sont succinctement représentés sur la figure 1 par leurs éléments nécessaires à la compréhension de l'invention. De manière connue et évoquée plus haut chaque dispositif accréditif, tel que 1, est attribué à un titulaire particulier pour ses besoins propres. Ce titulaire est classiquement autorisé à échanger des informations avec une machine de traitement centralisée, telle que 3, à partir du moment où il trouve un terminal spécifique, tel que 2, pour y connecter le dispositif accréditif 1 qu'il détient et où il est capable de justifier qu'il est bien habilité à utiliser ce dispositif accréditif 1 en fournissant la preuve qu'il connaît le code confidentiel en régissant l'usage.The system shown in FIG. 1 is made up of a plurality of flow-through devices capable of being connected to specific terminals to allow their holders to exchange information with centralized processing machines; a flow-through device 1, a terminal 2, and a processing machine 3 are succinctly represented in FIG. 1 by their elements necessary for understanding the invention. As is known and mentioned above, each flow-through device, such as 1, is assigned to a particular holder for his own needs. This holder is conventionally authorized to exchange information with a centralized processing machine, such as 3, from the moment when he finds a specific terminal, such as 2, in order to connect the flow-through device 1 which he holds and where he is able to justify that it is well qualified to use this flow-through device 1 by providing the proof that it knows the confidential code by governing the use.
En ce but et de manière classique, chaque dispositif accréditif 1 , qui est préférablement du type carte, comporte une mémoire de données d'identité 10 ; cette mémoire 10 est une mémoire permanente accessible en lecture par les terminaux spécifiques 2 et elle contient des données binaires qui différencient le dispositif accréditif 1 qui la comporte, de tous les autres. Cette mémoire 10 est par exemple une mémoire magnétique, une mémoire ciblée ou une mémoire électronique lisible et non effaçable par les moyens classiques.For this purpose and in a conventional manner, each flow-through device 1, which is preferably of the card type, comprises an identity data memory 10; this memory 10 is a permanent memory accessible for reading by the specific terminals 2 and it contains binary data which differentiates the flow-through device 1 which comprises it, from all the others. This memory 10 is for example a magnetic memory, a targeted memory or an electronic memory readable and not erasable by conventional means.
Dans l'exemple de réalisation présenté à la figure 1 on a supposé que les terminaux spécifiques 2 étaient reliés aux machines de traitement centralisé 3 par des liaisons de transmission symbolisées par 4 qui sont établies au moins pour la durée de chaque transaction.In the embodiment presented in FIG. 1, it has been assumed that the specific terminals 2 were connected to the central processing machines 3 by transmission links symbolized by 4 which are established at least for the duration of each transaction.
Les données d'identité contenues dans la mémoire 10 d'un dispositif accréditif 1 sont transmises à la machine de traitement centralisé 3 reliée au terminal spécifique 2 auquel le dispositif accréditif 1 est connecté pour une transaction. De manière connue le terminal spécifique 2 peut être conçu pour mettre en mémoire 20 ces données d'identité en liaison avec la transaction en cours et pour transmettre un signal de reconnaissance d'identité de carte, afin d'autoriser la suite du processus de communication. Selon une variante préférée de l'invention, un. clavier 11 est prévu sur chaque dispositif accréditif 1, il est éventuellement simplifié par rapport aux claviers classiques ; ce clavier 11 permet au porteur du dispositif accréditif de tabuler le code confidentiel choisi, qui a été déterminé par le titulaire du dispositif accréditif 1 et qui lui a été éventuellement communiqué par le titulaire, s'il n 'est pas ce titulaire.The identity data contained in the memory 10 of a flow-through device 1 is transmitted to the centralized processing machine 3 connected to the specific terminal 2 to which the flow-through device 1 is connected for a transaction. In a known way the specific terminal 2 can be designed to store this identity data in connection with the transaction in progress and to transmit a card identity recognition signal, in order to authorize the rest of the communication process. According to a preferred variant of the invention, a. keyboard 11 is provided on each flow-through device 1, it is possibly simplified compared to conventional keyboards; this keyboard 11 allows the bearer of the flow-through device to tabulate the chosen confidential code, which has been determined by the holder of the flow-through device 1 and which has possibly been communicated to him by the holder, if he is not this holder.
Le clavier 11 est relié à un premier registre temporaire 12 permettant la mémorisation du code confidentiel tabulé par le porteur, pour la durée de la transaction. Le registre 12 est relié par ses sorties à un prerier groupe d'entrées d'une logique de génération de clé d'individualisation 14, dont un second groupe d'entrées est relié à une mémoire de base de clé 17. La mémoire de base de clé 17 est une mémoire permanente normalement inacessible de l'extérieur après première inscription, elle contient une longue suite de données binaires, par exemple une suite de 5β éléments binaires, qui se combine avec le code confidentiel tabulé dans la logique de génération de clé 14. Cette combinaison s'effectue à l'aide de portes classiques, pa r exemple sur la base de circuits OU exclusif. La clé d'individualisation obtenue est connue des machines de traitement centralisé 3 et d'elles seules ; c'est elle qui est associée aux données d'identité de carte dans la fichier 32 des titulaires de dispositifs accréditifs en mémoire de ces machines 3* 2n conséquence la machine de traitement centralisé 3, qui est reliée au terminal spécifique 2 auquel est connecté le dispositif accréditif 1 considéré, est apte à trouver en fichier 32 la clé d'individualisation correspondant aux données d'identification reçues, ceci s'effectue par l'intermédiaire d'un classique céccceur d'adresse 3 activé par les données d'identification mises en mémoire dans un registre temporaire 30. Il est à noter que le code confidentiel choisi par un titulaire de dispositif accréditif n'est pas transmis aux terminaux et aux machines de traitement et n'a donc pas à être connu par d'autres que le titulaire et ceux qu'il autorise à utiliser son dispositif accréditif.The keyboard 11 is connected to a first temporary register 12 allowing the memorization of the confidential code tabulated by the carrier, for the duration of the transaction. The register 12 is linked by its outputs to a first group of inputs of an individualization key generation logic 14, a second group of inputs of which is connected to a key base memory 17. The base memory key 17 is a permanent memory normally inaccessible from the outside after first registration, it contains a long series of binary data, for example a series of 5β binary elements, which combines with the confidential code tabulated in the key generation logic 14. This combination is carried out using conventional doors, for example on the basis of exclusive OR circuits. The individualization key obtained is known to centralized processing machines 3 and to them alone; it is it which is associated with the card identity data in the file 32 of the holders of flow-through devices in memory of these 3 * 2n machines consequently the centralized processing machine 3, which is connected to the specific terminal 2 to which the credential device 1 considered, is able to find in file 32 the individualization key corresponding to the identification data received, this is done by means of a conventional address céccceur 3 activated by the identification data put stored in a temporary register 30. It should be noted that the confidential code chosen by a credential device holder is not transmitted to terminals and processing machines and therefore does not have to be known by anyone other than the holder and those whom he authorizes to use your credentials.
Le porteur du dispositif accréditif 1 tabule personnellement les données de la transaction qui le concernent, par exemple la somme à payer, étant entendu que suivant l'exploitation choisie certaines données telles les données de temps peuvent être introduites soit au niveau du dispositif accréditif 1, soit au niveau du terminal 2, en particulier lorsque celui-ci est un terminal de point de vente.The bearer of the flow-through device 1 personally tabulates the transaction data which concern him, for example the amount to be paid, it being understood that depending on the chosen operation certain data such as the time data can be entered either at the flow-through device 1, either at terminal 2, in particular when it is a point of sale terminal.
Les données de transaction introduites par le porteur du dispositif accréditif 1 à l'aide du clavier 11, sont temporairement mémorisées dans un registre 13 de ce dispositif 1. Les sorties du registre 13 sont reliées en parallèle à un premier groupe d'entrées d'une logique de génération de chiffre-clé 15 et à au moins une borne de connexion 313 pour terminal de manière à permettre la transmission de ces données en série à l'extérieur du dispositif accréditif 1.The transaction data entered by the bearer of the accrediting device 1 using the keyboard 11, are temporarily stored in a register 13 of this device 1. The outputs of the register 13 are connected in parallel to a first group of inputs of logic for generating a key figure 15 and at least one connection terminal 313 for a terminal so as to allow the transmission of this data in series outside the flow-through device 1.
La logique de génération de chiffre-clé 15 assure la combinaison selon un algorithme de structure classique, des données de transaction, avec la clé d'invidualisation qui comporte par exemple 56 éléments binaires de manière que le chiffre-clé présente une grande complexité. Dans l'exemple de réalisation choisi, la logique de génération 15 est constituée à partir d'un microprocesseur, assurant également d'autres tâches non mentionnées ici car sans rapport avec l'invention.The key figure generation logic 15 ensures the combination according to a conventional structure algorithm, of the transaction data, with the individualization key which comprises for example 56 binary elements so that the key figure presents a great complexity. In the chosen embodiment, the generation logic 15 is constituted from a microprocessor, also performing other tasks not mentioned here since they are not related to the invention.
Le chiffre-clé obtenu est transmis à la machine de traitement centralisé 1 par l'intermédiaire du terminal spécifique 2, de même que les données de transaction contenues dans le registre 13 et les données d'identification et de transaction propres au titulaire du terminal qui sont préalablement mémorisées dans un ensemble de mémorisation 22 comprenant classiquement au moins une mémoire permanente d'informations d'identité et une mémoire inscriptibie et effaçable d'informations de transaction. De manière connue les données de transaction non confidentielles du registre 13 peuvent être enregistrées et affichées dans le terminal par un dispositif classique d'enregistrement 21, pour contrôle avant émission et génération du chiffre-clé. La machine de traitement centralisé 3 reçoit les données de transaction du porteur transmises en clair sous forme numérique ainsi que le chiffre-clé et les données d'identification et de transaction propres au terminal. Les données de transaction du porteur sont mémorisées temporairement dans un registre 33 dont les sorties sont reliées à une logique de détermination de chiffre clé 34 ayant un fonctionnement analogue à celui de la logique 15.The key figure obtained is transmitted to the centralized processing machine 1 via the specific terminal 2, as are the transaction data contained in the register 13 and the identification and transaction data specific to the holder of the terminal who are previously stored in a storage unit 22 conventionally comprising at least one permanent memory for identity information and a writable and erasable memory for transaction information. In known manner, the non-confidential transaction data of the register 13 can be recorded and displayed in the terminal by a conventional recording device 21, for control before transmission and generation of the key figure. The centralized processing machine 3 receives the transaction data from the carrier transmitted in clear in digital form as well as the key figure and the identification and transaction data specific to the terminal. The transaction data of the bearer are temporarily stored in a register 33, the outputs of which are linked to a key figure determination logic 34 having an operation analogous to that of logic 15.
La sortie du fichier 32 est également reliée à la logique de détermination 34 de manière que celle-ci soit apte à déterminer un chiffre-clé à partir de la clé définie par le contenu du registre 30 et des données de transaction contenues dans le registre 33.The output of the file 32 is also connected to the determination logic 34 so that the latter is able to determine a key figure from the key defined by the content of the register 30 and the transaction data contained in the register 33 .
Le chiffre-clé produit par la logique de détermination 34 est transmis à un comparateur 36 qui reçoit également le chiffreclé transmis par le dispositif accréditif 1 qui est mémorisé dans un registre 35. Si les deux chiffres clés sont identiques, le comparateur émet un ordre de validation d'une part vers un dispositif de signalisation de validation 23 du terminal 2 et d'autre part vers l'entrée d'activation d'un registre d'entrée 37 de mémoire de transaction, de manière à permettre l'enregistrement des données fournies par la fichier 32, et les registres 33 et 39 ce dernier recevant les données de l'ensemble de mémorisation 22.The key figure produced by the determination logic 34 is transmitted to a comparator 36 which also receives the key figure transmitted by the flow-through device 1 which is stored in a register 35. If the two key figures are identical, the comparator issues an order of validation on the one hand towards a validation signaling device 23 of the terminal 2 and on the other hand towards the activation input of an input register 37 of transaction memory, so as to allow data recording supplied by the file 32, and the registers 33 and 39 the latter receiving the data from the storage unit 22.
Le dispositif de signalisation de validation 23 est de type classique, il permet notamment la remise à zéro des registres du terminal 2 et du dispositif accréditif 1 ainsi que le retrait de ce dernier. L'exemple de réalisation présenté à la figure 2 comporte un agencement de cryptage destiné à éviter la collecte d'informations sans autorisation par des tiers à l'aide de systèmes de saisie branchés sur les liaisons de transmissions. Selon l'invention, le cryptage est effectué dans chaque terminal par un organe de cryptage 27 qui reçoit les données à coder et une clé de cryptage. Selon l'invention la clé de cryptage est obtenue par traitement identique, par les dispositifs accréditifs 1 et par les machines de traitement centralisé 3, de nombres binaires générés par les uns ou par les autres. Dans l'exemple de réalisation présenté, à connexion d'un dispositif accréditif 1 dans un terminal spécifique 2, les données d'identité contenues dans la mémoire 10 d'un dispositif accréditif 1 sont transmises à la machine de traitement centralisé 3 chargée de traiter la transaction, cette transmission s'effectuant bien entendu par le terminal spécifique 2 auquel le dispositif accréditif 1 est connecté.The validation signaling device 23 is of conventional type, it allows in particular the resetting to zero of the registers of the terminal 2 and of the flow-through device 1 as well as the withdrawal of the latter. The exemplary embodiment presented in FIG. 2 includes an encryption arrangement intended to avoid the collection of information without authorization by third parties using input systems connected to the transmission links. According to the invention, the encryption is carried out in each terminal by an encryption member 27 which receives the data to be coded and an encryption key. According to the invention, the encryption key is obtained by identical processing, by flow-through devices 1 and by centralized processing machines 3, of binary numbers generated by one or the other. In the exemplary embodiment presented, when a flow-through device 1 is connected to a specific terminal 2, the identity data contained in the memory 10 of a flow-through device 1 are transmitted to the centralized processing machine 3 responsible for processing the transaction, this transmission taking place of course by the specific terminal 2 to which the flow-through device 1 is connected.
Ces données d'identité sont temporairement mémorisées dans un registre 30 qui commande l'adressage du fichier 32 via le décodeur d'adresse 31 ; le fichier 32 génère la clé d'individualisation qui correspond aux données d'identité et la fournit d'une part à la logique 34 et d'autre part à un contrôleur 53 chargé de vérifier sa conformité aux normes.These identity data are temporarily stored in a register 30 which controls the addressing of the file 32 via the address decoder 31; the file 32 generates the individualization key which corresponds to the identity data and supplies it on the one hand to the logic 34 and on the other hand to a controller 53 responsible for verifying its compliance with the standards.
Le contrôleur 53 est une classique logique qui effectue par exemple un contrôle de parité et qui vérifie que la clé' correspond bien à une clé en service. Selon l'invention la machine de traitement 3 comporte aussi un générateur de nombres binaires de cryptage 51 apte à produire de nombreuses combinaisons différentes dans un ordre aléatoire de manière à pouvoir attribuer un nombre imprévisible pour chaque nouvelle transaction traitée, ce nombre étant choisi différent de tout nombre déjà attribué à une transaction en cours.The controller 53 is a conventional logic which performs, for example, a parity check and which verifies that the key 'indeed corresponds to a key in service. According to the invention, the processing machine 3 also includes a generator of binary encryption numbers 51 capable of producing many different combinations in a random order so as to be able to assign an unpredictable number for each new transaction processed, this number being chosen to be different from any number already assigned to a transaction in progress.
A cette occasion il est rappelé que les machines de traitement centralisés sont des processeurs de type usuel dont la réalisation et les programmes ne seront pas décrits ici, dans la mesure où ceci n'entre pas dans le cadre de l'invention. A réception d'une clé d'individualisation correcte, le contrôleur 53 active un registre tampon 52 situé en sortie du générateur de nombres binaires de cryptage 51 de manière à permettre la aise en mémoire 54 d'un nombre binaire déterminé à l'adresse que détermine la clé d'individualisation reçue et ce nombre est également transmis à une entrée de cryptage B16 du dispositif accréditif 1 concerné via un registre de transfert 55 de la machins de traitement centralisé, la liaison 4 et le terminal 2.On this occasion, it is recalled that the centralized processing machines are processors of the usual type, the production and the programs of which will not be described here, insofar as this does not come within the scope of the invention. Upon receipt of a correct individualization key, the controller 53 activates a buffer register 52 located at the output of the encryption binary number generator 51 so as to allow the storage in memory 54 of a binary number determined at the address that determines the individualization key received and this number is also transmitted to an encryption input B16 of the flow-through device 1 concerned via a transfer register 55 of the centralized processing machinery, link 4 and terminal 2.
Le nombre de cryptage reçu qui est mémorisé dans un registre 16, et la clé d'individualisation, qui a été fournie par la logique de génération de clé 14, sont combinés selon l'algorithme de codage dans la logique de génération de chiffre-clé 15 de manière à produire une clé de cryptage pour le terminal spécifique 2.The number of encryption received which is stored in a register 16, and the individualization key, which was provided by the key generation logic 14, are combined according to the coding algorithm in the key figure generation logic 15 so as to produce an encryption key for the specific terminal 2.
La clé de cryptage est ensuite appliquée à un circuit de cryptage 25 de type classique qui travaille, selon un algorithme qui lui est propre, sur les informations à transmettre par la liaison 4. Daris l'exemple choisi ces informations, symboliquement appliquées à un OU 24, sont constituées par les données de transaction fournies par le dispositif accréditif 1, par le chiffre-clé obtenu comme précédemment en combinant la clé d'individualisation avec les données de transaction selon l'algorithme de codage dans la logique de génération de chiffre clé 15, ainsi que par les données d'identification et de transaction propres au terminal spécifique 2.The encryption key is then applied to an encryption circuit 25 of the conventional type which works, according to its own algorithm, on the information to be transmitted by the link 4. Daris the example chosen this information, symbolically applied to an OR 24, are constituted by the transaction data provided by the flow-through device 1, by the key figure obtained as previously by combining the individualization key with the transaction data according to the coding algorithm in the key figure generation logic. 15, as well as by the identification and transaction data specific to the specific terminal 2.
L'ensemble de ces données cryptées est transmis par la liaison 4 à un décrypteur 56, ce dernier reçoit aussi une clé de décryptage qui lui est fournie par la logique de détermination 34 à partir de la clé d'individualisation enregistrée dans une mémoire tampon 57 et du nombre de cryptage correspondant en mémoire 54. De manière connue cette clé de décryptage peut être soit identique à la clé de cryptage soit différente ayant été générée en même temps que cette dernière. Le traitement des informations après décryptage est en tout point identique à celui décrit en relation avec la figure 1 et ne sera donc pas repris ici.All of this encrypted data is transmitted by the link 4 to a decryptor 56, the latter also receives a decryption key which is supplied to it by the determination logic 34 from the individualization key recorded in a buffer memory 57 and of the corresponding encryption number in memory 54. In a known manner, this decryption key can be either identical to the encryption key or different having been generated at the same time as the latter. The processing of information after decryption is identical in all respects to that described in relation to FIG. 1 and will therefore not be repeated here.
Il doit être compris que la représentation des logiques 15 et 34 est symbolique de manière à mieux faire saisir le fonctionnement da ces logiques, étant entendu que généralement les processeurs mis en oeuvre dans ces logiques ne comportent pas d'entrées et de sorties en double, le fonctionnement correspondant étant obtenu par production successive de données en deux étapes distinctes.It should be understood that the representation of the logics 15 and 34 is symbolic so as to better understand the operation of these logics, it being understood that generally the processors implemented in these logics do not have duplicate inputs and outputs, the corresponding operation being obtained by successive production of data in two distinct stages.
L'invention est également applicable à des systèmes dans lesquels les dispositifs accréditifs se connectent à des terminaux spécifiques qui conservent temporairement les données de transaction car ils ne sent pas continûment reliés aux machines de traitement centralisé ; un tel système est présenté figure 3.The invention is also applicable to systems in which the flow-through devices connect to specific terminals which temporarily store the transaction data because they do not feel continuously connected to the processing machines. centralized; such a system is shown in Figure 3.
Le dispositif accréditif 1 présenté figure 3 est voisin de ceux présentés aux figures précédentes toutefois il ne présente pas nécessairement de clavier 11, celui ci pouvant être alors rattaché aux terminaux spécifiques 2 et ceux-ci ne possèdent pas de liaisons de transmission permanente avec les machines de traitement centralisé 3.The flow-through device 1 presented in FIG. 3 is similar to those presented in the previous figures, however it does not necessarily have a keyboard 11, which can then be attached to the specific terminals 2 and these do not have permanent transmission links with the machines centralized processing 3.
En conséquence les informations entre terminaux 2 et machines 3 s'effectuent soit par paquets via une liaison de transmission temporaire, soit par l'intermédiaire de moyens de mémorisation transportables et les machines de traitement centralisé n'assurent aucune vérification au cours des échanges dispositifs accréditifs 1-terminaux spécifiques 2.Consequently, the information between terminals 2 and machines 3 is carried out either in packets via a temporary transmission link, or by means of transportable storage means and the central processing machines do not provide any verification during the exchange of flow-through devices. 1-specific terminals 2.
De même que précédemment chaque dispositif accréditif 1 comporte une mémoire permanente 10 pour ies données d'identité qui lui sont propres, un registre 12 de données de code confidentiel et un registre de données de transaction, ces deux registres étant reliés au clavier 11, directement si ce clavier 11 est sur le dispositif accréditif 1 lui même, ou par des bornes de connexion s'il est sur le terminal spécifique 20.As previously, each flow-through device 1 comprises a permanent memory 10 for its own identity data, a register 12 of confidential code data and a register of transaction data, these two registers being connected to the keyboard 11, directly if this keyboard 11 is on the flow-through device 1 itself, or via connection terminals if it is on the specific terminal 20.
Classiquement une logique de contrôle 14A, reliée au registre 12 et à une mémoire de code confidentiel 18, permet de vérifier que le code confidentiel introduit par le porteur du dispositif accréditif 1 est le même que celui qui est mémorisé de manière permanente dans la mémoire 18.Conventionally a control logic 14A, connected to the register 12 and to a confidential code memory 18, makes it possible to verify that the confidential code introduced by the bearer of the accrediting device 1 is the same as that which is permanently stored in the memory 18 .
La mémoire 18 préférablement de même type que la mémoire 10 est une mémoire permanente inaccessible de l'extérieur eu dispositif après inscription du code confidentiei choisi par le titulaire du dispositif accréditif. La logique de contrôle 14A est par exemple de type NAND elle autorise l'accès à une logique de gestion 153, qui est reliée au registre 12 de données de transaction et à une mémoire ce transaction 19 par ses entrées. La logique de gestion 153 peut éventuellement être une logique câblée classique, dans une variante préférée de réalisation elle est combinée avec une logique de génération de chiffre-clé 15A et 3e présente sous forme d'un microprocesseur.The memory 18 preferably of the same type as the memory 10 is a permanent memory inaccessible from the outside to the device after entering the confidential code chosen by the holder of the accrediting device. The control logic 14A is for example of the NAND type; it authorizes access to a management logic 153, which is connected to the register 12 of transaction data and to a memory of this transaction 19 by its inputs. The management logic 153 can possibly be a conventional wired logic, in a preferred variant of implementation it is combined with a logic for generating a key figure 15A and 3rd present in the form of a microprocessor.
La mémoire de transaction 19 est une classique mémoire lisible et inscriptible scus le contrôle de la logique de gestion 153, elle permet par exemple de mémoriser le nombre, le montant et l'ordre des transactions bancaires effectuées à l'aide du dispositif accréditif qui la comporte.The transaction memory 19 is a classic readable and writable memory for controlling the management logic 153, it allows for example to memorize the number, the amount and the order of the bank transactions carried out using the flow-through device which behaves.
La logique de génération 15A, est reliée à une mémoire de clé d'individualisation 17, qui est permanence et inaccessible de l'extérieur du dispositif accréditif, elle reçoit les données de transaction entrées par le porteur du dispositif accréditif 1 ainsi que le numéro de transaction tel que défini à partir de la mémoire de transaction 19.The generation logic 15A is linked to an individualization key memory 17, which is permanent and inaccessible from outside the flow-through device, it receives the transaction data entered by the bearer of the flow-through device 1 as well as the number of transaction as defined from transaction memory 19.
De même que précédemment, la logique de génération de chiffreclé 15A combine selon un algorithme donné la clé issue de la mémoire de clé d'individualisation 17 avec les données et le numéro de transaction ; le chiffre clé est transmis au terminal spécifique 2 via une connexion 315. Le terminal spécifique 2 mémorise l'identité du dispositif accréditif, les données de la transaction et le chiffre-clé, tels que fournis par le dispositif accréditif 1, avec les données d'identification et de transaction générées par ce terminal spécifique 2, dans l'exemple choisi ceci est symbolisé par quatre mémoires 20, 21, 22 et 26. Le contenu de ces quatre mémoires est transféré au moment voulu à une machine de traitement centralisé 1 pour exploitation.As previously, the key generation logic 15A combines according to a given algorithm the key from the individualization key memory 17 with the data and the transaction number; the key figure is transmitted to the specific terminal 2 via a connection 315. The specific terminal 2 stores the identity of the flow-through device, the transaction data and the key-figure, as supplied by the flow-through device 1, with the data d identification and transaction generated by this specific terminal 2, in the example chosen this is symbolized by four memories 20, 21, 22 and 26. The content of these four memories is transferred at the desired time to a centralized processing machine 1 for exploitation.
La machine de traitement 1 est très voisine de celle présentée à la figure 1 elle comporte quatre mémoires 30, 33, 35, 39 correspondant respectivement aux mémoires 20, 21, 26 et 22. La mémoire 30 permet de mémoriser ies données d'identification des dispositifs accréditifs et de retrouver les clés d'individualisation correspondantes en fichier 32 par l'intermédiaire d'un décodeur d'adressage 31. A chaque groupe de données d'identification correspond une clé en fichier 12, un groupe de données de transaction en mémoires 33 et 39 et un chiffre-clé en mémoire 35. La combinaison algorithmique d'une clé d'individualisation et du contenu correspondant en mémoire de données de transaction 33 permet de produire le chiffre-clé attendu, qui est comparé avec le chiffre clé correspondant au contenu en mémoire 35. Le comparateur 36A chargé de la comparaison des chiffresclé produit soit un signal de mémorisation en mémoire de transaction 38A soit un signal de mémorisation en mémoire d'erreur 38B suivant que le résultat de la comparaison est satisfaisant ou non. Ce signai de mémorisation est transmis à un ensemble d'enregistrement tampon 37 inséré en entrée de3 mémoires 38.The processing machine 1 is very similar to that presented in FIG. 1, it has four memories 30, 33, 35, 39 corresponding respectively to memories 20, 21, 26 and 22. Memory 30 makes it possible to store the identification data of the flow-through devices and to find the corresponding individualization keys in file 32 via an addressing decoder 31. Each group of identification data corresponds to a key in file 12, a group of transaction data in memories 33 and 39 and a key figure in memory 35. The algorithmic combination of an individualization key and the corresponding content in memory of transaction data 33 makes it possible to produce the expected key figure, which is compared with the key figure corresponding to the content in memory 35. The comparator 36A responsible for the comparison of the key figures produced either a memory signal in transaction memory 38A or a memory signal in error memory 38B depending on whether the result of the comparison is satisfactory or not. This memorization signal is transmitted to a buffer recording set 37 inserted at the input of 3 memories 38.
Bien entendu, ainsi qu'il a été dit plus haut la représentation des registres et autres composants de la machine de traitement 1 est symbolique et correspond plus aux fonctions remplies qu'aux circuits réels qui sont ceux d'un processeur spécialisé dont la constitution est définie en fonction de l'ensemble des critères du système.Of course, as has been said above, the representation of the registers and other components of the processing machine 1 is symbolic and corresponds more to the functions fulfilled than to the real circuits which are those of a specialized processor whose constitution is defined according to all the criteria of the system.
De même que dans les cas précédents le titulaire, et à fortiori le porteur non titulaire, d'un dispositif accréditif 1 n'a pas accès à la clé d'individualisation de son dispositif accréditif ; de même ni le détenteur d'un terminal spécifique 2 lorsque le dispositif accréditif comporta un clavier ni la machine de traitement 3 n'ont connaissante ou accès aux codes confidentiels choisis par les titulaires de dispositifs accréditifs ce qui limite les risques de fraude aux différents niveaux. II doit également être compris que l'on peut éventuellement adopter une disposition de confidentialité au niveau des terminaux spécifiques qui soit analogue à celle adoptée pour les dispositifs accréditifs, en prévoyant une mémoire d'identité de terminal et des codes confidentiels différents, si différents individus peuvent être amenés à s'occuper d'un terminal spécifique en tant que détenteurs ou surveillants, étant entendu que ces derniers ne sont normalement ni titulaires, ni porteurs de dispositifs accréditifs 1, tels que décrits. As in the previous cases, the holder, and a fortiori the non-holder, of a flow-through device 1 does not have access to the individualization key of his flow-through device; neither does the holder of a specific terminal 2 when the flow-through device has a keyboard nor the processing machine 3 have knowledge or access to the confidential codes chosen by the holders of flow-through devices, which limits the risks of fraud at different levels . It should also be understood that it is possible to adopt a confidentiality provision at the level of the specific terminals which is analogous to that adopted for the flow-through devices, by providing a terminal identity memory and different confidential codes, if different individuals may have to deal with a specific terminal as holders or supervisors, it being understood that the latter are normally neither holders nor bearers of credentials 1, as described.

Claims

REVENDICATIONS
1/ Procédé de sécurité pour communication tripartite de données confidentielles sous forme numérique dans un système permettant l'échange d'informations entre des porteurs de dispositifs accréditifs (1) et des machines de traitement centralisé (3) par l'intermédiaire de terminaux spécifiques (2) non surveillés, dans lequel toute communication entre un porteur et une machine de traitement implique la communication de l'identité du dispositif accréditif utilisé par le porteur à la machine de traitement centralisé par connexion dudit dispositif accréditif dans un terminal spécifique et la communication du code confidentiel spécifique du porteur au système par introduction manuelle de ce code par le porteur au niveau dispositif accréditifterminal, caractérisé en ce qu'il comporte de plus les étapes suivantes : - détermination par le dispositif accréditif, d'un chiffre-clé d'identification du porteur et d'authentification de la transaction par combinaison des données de transaction du porteur avec une clé d'individualisation fournie par le dispositif accréditif à réception du code confidentiel du porteur - communication du chiffre-clé, des données de transaction et de l'identité du terminal spécifique à la machine de traitement centralisé par ce terminal spécifique sur la base des données reçues du dispositif accréditif et de données qui lui sont propres. 2/ Procédé 3elon la revendication 1, caractérisé en ce que la clé d'individualisation fournie par un dispositif accréditif est obtenu par combinaison du code confidentiel, introduit dans le dispositif accréditif après connexion de ce dernier dans un terminal spécifique, avec une base-clé mémorisée de manière permanente dans ledit dispositif accréditif. 3/ Procédé selon la revendication 1, caractérisé en ce que le code confidentiel introduit par le porteur, après connexion du dispositif accréditif qu'il utilise dans un terminal spécifique, est comparé au code confidentiel mémorisé de manière permanente dans la carte et en ce que le chiffre-clé est obtenu par combinaison d'une clé d'individuali sation mémorisée de manière permanente dans la carte avec des données de transaction introduites par le porteur, si le code confidentiel introduit correspond au code confidentiel mémorisé. 4/ Procédé selon la revendication 2, caractérisé en ce qu'il comporte les étapes supplémentaires suivantes :1 / Security method for tripartite communication of confidential data in digital form in a system allowing the exchange of information between holders of flow-through devices (1) and centralized processing machines (3) via specific terminals ( 2) unsupervised, in which any communication between a carrier and a processing machine involves the communication of the identity of the flow-through device used by the carrier to the centralized processing machine by connection of said flow-through device in a specific terminal and the communication of the confidential code specific to the bearer in the system by manual introduction of this code by the bearer at the terminal accreditif device level, characterized in that it further comprises the following steps: - determination by the accrediting device, of an identification key figure of the bearer and authentication of the transaction by combination of the do bearer transaction years with an individualization key provided by the flow-through device upon receipt of the bearer's confidential code - communication of the key figure, transaction data and identity of the terminal specific to the centralized processing machine by this specific terminal based on data received from the flow-through device and data specific to it. 2 / Method 3 according to claim 1, characterized in that the individualization key provided by a flow-through device is obtained by combination of the confidential code, introduced into the flow-through device after connection of the latter in a specific terminal, with a key base permanently stored in said flow-through device. 3 / A method according to claim 1, characterized in that the confidential code entered by the holder, after connection of the flow-through device which he uses in a specific terminal, is compared to the confidential code permanently stored in the card and in that the key figure is obtained by combination of an individuali key sation permanently stored in the card with transaction data entered by the holder, if the confidential code entered corresponds to the stored confidential code. 4 / A method according to claim 2, characterized in that it comprises the following additional steps:
- communication d'un nombre de cryptage de transaction au dispositif accréditif, connecté à un terminal spécifique, par la machine de traitement centralisé auquel est relié ce terminal, à réception de l'identité de ce dispositif accréditif par ladite machine,communication of a transaction encryption number to the flow-through device, connected to a specific terminal, by the centralized processing machine to which this terminal is connected, upon receipt of the identity of this flow-through device by said machine,
- génération d'une clé de cryptage par combinaison par le dispositif accréditif du nombre de cryptage avec la clé d'individualisation que fournit ce dispositif accréditif,- generation of an encryption key by combination by the accrediting device of the number of encryption with the individualization key provided by this accrediting device,
- cryptage du chiffre-clé 'et des données de transaction par ledit terminal spécifique à l'aide de la clé de cryptage fournie par le dispositif accréditif pour..la transaction, de manière à transmettre des données cryptées à la machine de traitement centralisé concernée. 5/ Dispositif accréditif pour mise en oeuvre du procédé selon les revendications 1 et 2, caractérisé en ce qu'il comporte - une mémoire permanente de données d'identité (10), accessible en lecture à partir d'un terminal (2) spécifique après connexion à ce dernier,- encryption of the key figure 'and the transaction data by said specific terminal using the encryption key provided by the flow-through device for the transaction, so as to transmit encrypted data to the centralized processing machine concerned . 5 / Flow-through device for implementing the method according to claims 1 and 2, characterized in that it comprises - a permanent identity data memory (10), accessible for reading from a specific terminal (2) after connection to it,
- une mémoire permanente de base-clé (17) inaccessible de l'extérieur dudit dispositif accréditif (1) - une logique de génération de clé (14) reliée en sortie de clavier (11) et de mémoire de base-clé (17),- a permanent key base memory (17) inaccessible from outside of said flow-through device (1) - a key generation logic (14) connected at the output of the keyboard (11) and of the key base memory (17) ,
- une logique de génération de chiffre-clé (15) par combinaison de la clé d'individualisation avec les données de transaction introduites au clavier, cette logique de génération de chiffre-clé étant reliée en ce but par ses entrées en sortie de clavier ( 1 1 ) et de logique de génération de clé d'individualisation (14) et par sa sortie à au moins une borne externe de connexion (B13) pour terminal (2) en vue de la transmission du chiffre-clé généré à une machine de traitement centralisé (3). 6/ Dispositif accréditif selon la revendication 5, caractérisé en ce que la logique de génération de chiffre-clé (15) comporte de plus une entrée de cryptage (B16) accessible de l'extérieur à partir d'une machine de traitement centralisé (3), via un terminal spécifique (2) auquel le dispositif accréditif est relié, de manière à générer une clé de cryptage à destination de ce terminal spécifique par combinaison de la clé d'individualisation du dispositif accréditif avec un nombre de cryptage reçu via l'entrée de cryptage (B16). 7/ Dispositif accréditif pour la mise en oeuvre du procédé selon les revendications 1 et 3, comportant classiquement des mémoires d'identité du dispositif, de code confidentiel et de transactions (10, 18, 19), ainsi que des logiques de gestion des transactions et de comparaison (15B, 14A) du code confidentiel mémorisé avec le code introduit à chaque transaction, ledit dispositif étant caractérisé en ce qu'il comporte de plus :a logic for generating a key figure (15) by combining the individualization key with the transaction data entered on the keyboard, this logic for generating a key figure being connected for this purpose by its inputs at the keyboard output ( 1 1) and of the logic for generating an individualization key (14) and by its output to at least one external connection terminal (B13) for terminal (2) for the transmission of the generated key figure to a machine centralized processing (3). 6 / Flow-through device according to claim 5, characterized in that the key-figure generation logic (15) further comprises an encryption input (B16) accessible from the outside from a centralized processing machine (3 ), via a specific terminal (2) to which the flow-through device is connected, so as to generate an encryption key for this specific terminal by combining the individualization key of the flow-through device with an encryption number received via the encryption input (B16). 7 / Flow-through device for implementing the method according to claims 1 and 3, conventionally comprising memories of device identity, confidential code and transactions (10, 18, 19), as well as transaction management logic and comparing (15B, 14A) the confidential code stored with the code entered for each transaction, said device being characterized in that it further comprises:
- une mémoire permanente de clé d'individualisation (17), inaccessible de l'extérieur du .dispositif accréditif,- a permanent memory of the individualization key (17), inaccessible from outside the flow-through device,
- une logique de génération de chiffre-clé (15A) par combinaison de la clé d'individualisation du dispositif (1) avec les données introduites au clavier (11) et le numéro de transaction, cette logique de génération étant reliée en ce but par ses entrées en sortie de la logique de gestion des transactions (153) et de la mémoire de clé d'individualisation (17) et par sa sortie à au moins une borne externe de connexion (315) pour terminal en vue de la transmission du chiffreclé ainsi généré au terminal spécifique 2 auquel ce dispositif accréditif 1 est connecté.a logic for generating a key figure (15A) by combining the device individualization key (1) with the data entered on the keyboard (11) and the transaction number, this generation logic being linked for this purpose by its inputs at the output of the transaction management logic (153) and the individualization key memory (17) and by its output at at least one external connection terminal (315) for a terminal for the transmission of the encrypted key thus generated at the specific terminal 2 to which this flow-through device 1 is connected.
8/ Dispositif accréditif selon la revendication 7, dans lequel la logique de génération de chiffre-clé (15A) et la logique de gestion (153) sont confondues. 8 / Flow-through device according to claim 7, in which the logic for generating a key figure (15A) and the management logic (153) are combined.
PCT/FR1981/000173 1981-01-07 1981-12-30 Security method and device for three-party communication of confidential data WO1982002446A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR8100128810107 1981-01-07
FR8100128A FR2497617B1 (en) 1981-01-07 1981-01-07 SECURITY METHOD AND DEVICE FOR TRIPARTITY COMMUNICATION OF CONFIDENTIAL DATA

Publications (1)

Publication Number Publication Date
WO1982002446A1 true WO1982002446A1 (en) 1982-07-22

Family

ID=9253913

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR1981/000173 WO1982002446A1 (en) 1981-01-07 1981-12-30 Security method and device for three-party communication of confidential data

Country Status (8)

Country Link
US (1) US4498000A (en)
EP (1) EP0055986B1 (en)
JP (1) JPH0315786B2 (en)
AT (1) ATE19704T1 (en)
CA (1) CA1169564A (en)
DE (1) DE3270913D1 (en)
FR (1) FR2497617B1 (en)
WO (1) WO1982002446A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1983003018A1 (en) * 1982-02-25 1983-09-01 Ericsson Telefon Ab L M A portable device for storing and transferring data
EP0112944A1 (en) * 1982-12-30 1984-07-11 International Business Machines Corporation Testing the validity of identification codes
EP0114368A2 (en) * 1982-12-28 1984-08-01 Kabushiki Kaisha Toshiba Data protection system
EP0131906A2 (en) * 1983-07-15 1985-01-23 Tandem Computers Incorporated Pocket banking terminal, method and system
EP0134109A2 (en) 1983-08-01 1985-03-13 Oki Electric Industry Company, Limited Automatic transaction system
EP0148960A1 (en) * 1983-12-21 1985-07-24 International Business Machines Corporation Security in data communication systems
EP0375386A2 (en) * 1988-12-23 1990-06-27 Hitachi Maxell Ltd. Portable electronic device and its secret information collation method

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS5923261A (en) * 1982-07-29 1984-02-06 Toshiba Corp Electric power load survey device
FR2539897B1 (en) * 1983-01-20 1988-12-30 Cii Honeywell Bull METHOD AND DEVICE FOR ENABLING THE HOLDER OF A PORTABLE OBJECT SUCH AS A CARD, TO BE ACCESSED BY THIS CARD TO AT LEAST ONE SERVICE PROVIDED BY AT LEAST ONE AUTHORIZING ORGANIZATION
US4906828A (en) * 1983-02-28 1990-03-06 Paperless Accounting, Inc. Electronic money purse and fund transfer system
FR2549989B1 (en) * 1983-07-29 1985-09-13 Philips Ind Commerciale AUTHENTICATION SYSTEM BETWEEN A CARD READER AND A PAYMENT CARD EXCHANGING INFORMATION
GB2146814A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
GB2146815A (en) * 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
JPS6084686A (en) * 1983-10-17 1985-05-14 Toshiba Corp Recording system of information recording medium
JPS60176186A (en) * 1984-02-23 1985-09-10 Omron Tateisi Electronics Co Ic card system
IL72802A (en) * 1984-08-29 1990-01-18 N T E Parkulator Time metering device particularly useful as a parking card
JPS6198476A (en) * 1984-10-19 1986-05-16 Casio Comput Co Ltd Card terminal and its certifying system
US4864109A (en) * 1984-11-12 1989-09-05 Nobuo Minematsu Electronic bankbook and transaction system for use therewith
US4736419A (en) * 1984-12-24 1988-04-05 American Telephone And Telegraph Company, At&T Bell Laboratories Electronic lock system
US4689478A (en) * 1984-12-24 1987-08-25 Ncr Corporation System for handling transactions including a portable personal terminal
US4701601A (en) * 1985-04-26 1987-10-20 Visa International Service Association Transaction card with magnetic stripe emulator
FR2582421B1 (en) * 1985-05-24 1987-07-17 Lefevre Jean Pierre IDENTITY AUTHENTICATION APPARATUS
US4879455A (en) * 1985-06-17 1989-11-07 Butterworth Nathan I Self-verifying transaction cards
FR2592502B1 (en) * 1985-12-26 1990-03-30 Lefevre Jean Pierre SEQUENTIAL STORAGE CERTIFIER
US4874935A (en) * 1986-03-10 1989-10-17 Data Card Coprporation Smart card apparatus and method of programming same
WO1987005420A1 (en) * 1986-03-10 1987-09-11 Data Card Corporation Smart card apparatus and method of programming same
GB2188180A (en) * 1986-03-21 1987-09-23 Eft Pos Uk Limited EFT-POS terminal apparatus
USRE38419E1 (en) 1986-05-13 2004-02-10 Ncr Corporation Computer interface device
FR2600190B1 (en) * 1986-06-16 1988-08-26 Bull Cp8 METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND IMPLEMENTATION SYSTEM
FR2601795B1 (en) * 1986-07-17 1988-10-07 Bull Cp8 METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND SYSTEM FOR IMPLEMENTING IT
DE3638505C2 (en) * 1986-11-11 1995-09-07 Gao Ges Automation Org Data carrier with integrated circuit
US4908521A (en) * 1987-01-06 1990-03-13 Visa International Service Association Transaction approval system
US4969188A (en) * 1987-02-17 1990-11-06 Gretag Aktiengesellschaft Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
DE3889481D1 (en) * 1987-03-04 1994-06-16 Siemens Nixdorf Inf Syst Circuit arrangement for securing access to a data processing system using a chip card.
US6309440B1 (en) 1998-08-25 2001-10-30 Thomas T. Yamashita Method and composition for promoting and controlling growth of plants
GB2227111B (en) * 1989-01-17 1993-05-19 Toshiba Kk Certification system
US5227613A (en) * 1989-01-24 1993-07-13 Matsushita Electric Industrial Co., Ltd. Secure encrypted data communication system having physically secure ic cards and session key generation based on card identifying information
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
FR2693334B1 (en) * 1992-07-01 1994-09-23 Trt Telecom Radio Electr Protected communication process between three protagonists, and devices involved in its implementation.
US5267314A (en) * 1992-11-17 1993-11-30 Leon Stambler Secure transaction system and method utilized therein
FR2704341B1 (en) * 1993-04-22 1995-06-02 Bull Cp8 Device for protecting the keys of a smart card.
US6868408B1 (en) 1994-04-28 2005-03-15 Citibank, N.A. Security systems and methods applicable to an electronic monetary system
US5799087A (en) * 1994-04-28 1998-08-25 Citibank, N.A. Electronic-monetary system
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US5692132A (en) * 1995-06-07 1997-11-25 Mastercard International, Inc. System and method for conducting cashless transactions on a computer network
US5825003A (en) * 1995-07-24 1998-10-20 Citicorp Development Center Customer-directed, automated process for transferring funds between accounts using a holding account and local processing
US5659165A (en) * 1995-07-24 1997-08-19 Citibank. N.A. Customer-directed, automated process for transferring funds between accounts via a communications network
US20050012023A1 (en) * 1996-02-12 2005-01-20 Vock Curtis A. Ball tracking in three-dimensions
US5963647A (en) * 1997-02-14 1999-10-05 Citicorp Development Center, Inc. Method and system for transferring funds from an account to an individual
US10719814B1 (en) 1997-02-14 2020-07-21 Citicorp Credit Services, Inc. (Usa) Method and system for transferring funds from an account to an individual
US6317832B1 (en) * 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
US6575372B1 (en) 1997-02-21 2003-06-10 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
WO1998040982A1 (en) 1997-03-12 1998-09-17 Visa International Secure electronic commerce employing integrated circuit cards
US6385723B1 (en) 1997-05-15 2002-05-07 Mondex International Limited Key transformation unit for an IC card
US6220510B1 (en) 1997-05-15 2001-04-24 Mondex International Limited Multi-application IC card with delegation feature
DE19720431A1 (en) * 1997-05-15 1998-11-19 Beta Research Ges Fuer Entwick Device and method for personalizing chip cards
US6164549A (en) * 1997-05-15 2000-12-26 Mondex International Limited IC card with shell feature
US6328217B1 (en) 1997-05-15 2001-12-11 Mondex International Limited Integrated circuit card with application history list
US6488211B1 (en) * 1997-05-15 2002-12-03 Mondex International Limited System and method for flexibly loading in IC card
US6095413A (en) * 1997-11-17 2000-08-01 Automated Transaction Corporation System and method for enhanced fraud detection in automated electronic credit card processing
US6357665B1 (en) 1998-01-22 2002-03-19 Mondex International Limited Configuration of IC card
US6736325B1 (en) 1998-01-22 2004-05-18 Mondex International Limited Codelets
US6742120B1 (en) 1998-02-03 2004-05-25 Mondex International Limited System and method for controlling access to computer code in an IC card
US6122624A (en) * 1998-05-28 2000-09-19 Automated Transaction Corp. System and method for enhanced fraud detection in automated electronic purchases
DE19850293A1 (en) * 1998-10-30 2000-05-04 Koninkl Philips Electronics Nv Media with protection against compromise
US7376583B1 (en) 1999-08-10 2008-05-20 Gofigure, L.L.C. Device for making a transaction via a communications link
US7720762B1 (en) 2002-10-03 2010-05-18 Gofigure Payments, Llc System and method for electronically processing commercial transactions based upon threshold amount
US7254666B2 (en) * 2000-01-12 2007-08-07 Memory Medallion, Inc. System and method for delivering information at inaccessible locations
AU2001277033A1 (en) 2000-07-20 2002-02-05 Citicorp Development Center, Inc. Method and system for performing a cash transaction with a self-service financial transaction terminal
US20020156689A1 (en) * 2001-04-18 2002-10-24 Far Soft, Inc. System and method for securing transactions between buyer and credit authorizer
US7069250B2 (en) * 2001-10-15 2006-06-27 Payformance Corporation Check based online payment and verification system and method
US6715672B1 (en) 2002-10-23 2004-04-06 Donald Tetro System and method for enhanced fraud detection in automated electronic credit card processing
US7627125B2 (en) * 2005-06-23 2009-12-01 Efunds Corporation Key loading systems and methods
WO2008054512A2 (en) * 2006-04-19 2008-05-08 Stepnexus Holdings Methods and systems for ic card application loading
DE602007012538D1 (en) * 2007-07-27 2011-03-31 Ntt Docomo Inc Method and apparatus for performing delegated transactions
US9235831B2 (en) 2009-04-22 2016-01-12 Gofigure Payments, Llc Mobile payment systems and methods

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806874A (en) * 1972-04-11 1974-04-23 Gretag Ag Identification system for individuals
US4001550A (en) * 1975-12-04 1977-01-04 Schatz Vernon L Universal funds transfer and identification card
FR2394131A1 (en) * 1977-06-07 1979-01-05 Cii Honeywell Bull INFORMATION PROCESSING SYSTEM PROTECTING THE SECRET OF CONFIDENTIAL INFORMATION
GB2019060A (en) * 1978-03-31 1979-10-24 Pitney Bowes Inc Computer accessing system
EP0007002A1 (en) * 1978-06-30 1980-01-23 International Business Machines Corporation Transaction terminal systems provided with potential user authentication
US4214230A (en) * 1978-01-19 1980-07-22 Rolf Blom Personal identification system
EP0029894A2 (en) * 1979-12-03 1981-06-10 International Business Machines Corporation A system for achieving secure password verification

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3941160A (en) * 1974-02-08 1976-03-02 The Babcock & Wilcox Company Interlocking ceramic tile for covering an insulated water cooled pipe structure
US4048475A (en) * 1974-03-07 1977-09-13 Omron Tateisi Electronics Company Apparatus for checking the user of a card in card-actuated machines
DE2505130A1 (en) * 1975-02-07 1976-08-19 Koppers Wistra Ofenbau Gmbh SUPPORT RAIL FOR HEATER STOVES
DE2505179A1 (en) * 1975-02-07 1976-08-19 Koppers Wistra Ofenbau Gmbh SUPPORT ELEMENT FOR HEATER STOVES
US4016405A (en) * 1975-06-09 1977-04-05 Diebold, Incorporated Card validation, method and system
US4023013A (en) * 1975-12-29 1977-05-10 Diebold, Incorporated On-line verification system for identification card or the like
DE2949351C2 (en) * 1979-12-07 1982-04-15 The Grey Lab. Establishment, 9490 Vaduz Method and device for generating and checking documents and the document used therewith

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806874A (en) * 1972-04-11 1974-04-23 Gretag Ag Identification system for individuals
US4001550A (en) * 1975-12-04 1977-01-04 Schatz Vernon L Universal funds transfer and identification card
US4001550B1 (en) * 1975-12-04 1988-12-13
FR2394131A1 (en) * 1977-06-07 1979-01-05 Cii Honeywell Bull INFORMATION PROCESSING SYSTEM PROTECTING THE SECRET OF CONFIDENTIAL INFORMATION
US4214230A (en) * 1978-01-19 1980-07-22 Rolf Blom Personal identification system
GB2019060A (en) * 1978-03-31 1979-10-24 Pitney Bowes Inc Computer accessing system
EP0007002A1 (en) * 1978-06-30 1980-01-23 International Business Machines Corporation Transaction terminal systems provided with potential user authentication
EP0029894A2 (en) * 1979-12-03 1981-06-10 International Business Machines Corporation A system for achieving secure password verification

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1983003018A1 (en) * 1982-02-25 1983-09-01 Ericsson Telefon Ab L M A portable device for storing and transferring data
EP0114368A2 (en) * 1982-12-28 1984-08-01 Kabushiki Kaisha Toshiba Data protection system
EP0114368A3 (en) * 1982-12-28 1987-05-06 Kabushiki Kaisha Toshiba Data protection system
EP0112944A1 (en) * 1982-12-30 1984-07-11 International Business Machines Corporation Testing the validity of identification codes
EP0131906A2 (en) * 1983-07-15 1985-01-23 Tandem Computers Incorporated Pocket banking terminal, method and system
EP0131906A3 (en) * 1983-07-15 1987-10-14 Atalla Corporation Pocket banking terminal, method and system
EP0134109A2 (en) 1983-08-01 1985-03-13 Oki Electric Industry Company, Limited Automatic transaction system
EP0134109B1 (en) * 1983-08-01 1990-01-17 Oki Electric Industry Company, Limited Automatic transaction system
EP0148960A1 (en) * 1983-12-21 1985-07-24 International Business Machines Corporation Security in data communication systems
EP0375386A2 (en) * 1988-12-23 1990-06-27 Hitachi Maxell Ltd. Portable electronic device and its secret information collation method
EP0375386A3 (en) * 1988-12-23 1990-12-27 Hitachi Maxell Ltd. Portable electronic device and its secret information collation method

Also Published As

Publication number Publication date
EP0055986A3 (en) 1982-08-04
FR2497617B1 (en) 1989-08-18
FR2497617A1 (en) 1982-07-09
EP0055986A2 (en) 1982-07-14
EP0055986B1 (en) 1986-05-07
ATE19704T1 (en) 1986-05-15
US4498000A (en) 1985-02-05
JPH0315786B2 (en) 1991-03-01
JPS57502083A (en) 1982-11-18
DE3270913D1 (en) 1986-06-12
CA1169564A (en) 1984-06-19

Similar Documents

Publication Publication Date Title
EP0055986B1 (en) Security system and apparatus for the three-way communication of confidential data
EP0941525B1 (en) Authenticating system with microcircuit card
EP0100260B1 (en) Method to establish the origin of at least one bit of information stored in a memory of a first electronical device and transmitted to a second electronical device
CA1289240C (en) Method to authentify external validation data by means of a portable device such as a memory card
EP0998731B1 (en) Method and system for payment by electronic cheque
FR2546646A1 (en) SYSTEM FOR THE HOLDER OF A SMART CARD TO EXECUTE TRANSACTIONS BY MEANS OF A TRANSACTION TERMINAL, INTELLIGENT CARD INITIALIZATION TERMINAL, AND PORTABLE INTELLIGENT CARD FOR USE WITH SUCH A SYSTEM
EP1791292B1 (en) Personalisation of an electronic circuit
FR2738934A1 (en) ANONYMOUS ACCOUNTING SYSTEM FOR INFORMATION FOR STATISTICAL PURPOSES, IN PARTICULAR FOR ELECTRONIC VOTING OPERATIONS OR PERIODIC CONSUMPTION RECORDS
FR2922396A1 (en) BIOMETRIC AUTHENTICATION METHOD, COMPUTER PROGRAM, AUTHENTICATION SERVER, CORRESPONDING TERMINAL AND PORTABLE OBJECT
EP1442557A2 (en) System and method for creating a secure network using identity credentials of batches of devices
EP1055203B1 (en) Protocol between an electronic key and a lock
FR2893797A1 (en) CUSTOMIZING A BANK CARD FOR OTHER APPLICATIONS
FR2507359A1 (en) METHOD AND DEVICE FOR SECURING AND CONTROLLING THE AUTHENTICITY OF DOCUMENTS AND DOCUMENTS THEREFOR
EP0891611B1 (en) Function access control system with encryption using a plurality of dynamic variables
EP3262553B1 (en) Method of transaction without physical support of a security identifier and without token, secured by the structural decoupling of the personal and service identifiers
WO2019092327A1 (en) Method for obtaining a digital id with a high level of security
FR2608338A1 (en) Device for exchanging confidential data between a series of terminals and a concentrator
WO2003060841A1 (en) Cryptographic revocation method using a chip card
FR2730076A1 (en) Authentication by server of holder of object incorporating microprocessor
EP1269431B1 (en) Method for protecting an electronic chip against fraud
EP0595720B1 (en) Process and system for recording information on a data carrier enabling to later certify the originality of this information
FR2566155A1 (en) METHOD AND SYSTEM FOR ENCRYPTING AND DESCRIBING INFORMATION TRANSMITTED BETWEEN A TRANSCEIVER DEVICE AND A RECEIVER DEVICE
WO2005050419A1 (en) Method for securing an image of a biometric authentication feature and method for authentication of a user with an image of a biometric authentication feature
WO2002065411A2 (en) Method and system for making secure a commercial transaction with a smart card
FR2790854A1 (en) Device for securing computer data exchanges of payment or remote payment has inaccessible area in secret memory in which primary codes of list may be used as preference for secure exchange

Legal Events

Date Code Title Description
AK Designated states

Designated state(s): JP US