WO1999033033A2 - Card activation at point of distribution - Google Patents

Card activation at point of distribution Download PDF

Info

Publication number
WO1999033033A2
WO1999033033A2 PCT/US1998/027073 US9827073W WO9933033A2 WO 1999033033 A2 WO1999033033 A2 WO 1999033033A2 US 9827073 W US9827073 W US 9827073W WO 9933033 A2 WO9933033 A2 WO 9933033A2
Authority
WO
WIPO (PCT)
Prior art keywords
card
activation
stored value
key
secure module
Prior art date
Application number
PCT/US1998/027073
Other languages
French (fr)
Other versions
WO1999033033A3 (en
WO1999033033A8 (en
Inventor
Virgil M. Davis
Janet R. Roth
Original Assignee
Visa International Service Association
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa International Service Association filed Critical Visa International Service Association
Priority to EP19980964134 priority Critical patent/EP1040456B1/en
Priority to AU19324/99A priority patent/AU758710B2/en
Priority to DE69826318T priority patent/DE69826318T2/en
Priority to CA002315656A priority patent/CA2315656C/en
Publication of WO1999033033A2 publication Critical patent/WO1999033033A2/en
Publication of WO1999033033A3 publication Critical patent/WO1999033033A3/en
Publication of WO1999033033A8 publication Critical patent/WO1999033033A8/en
Priority to HK01102350A priority patent/HK1031942A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3558Preliminary personalisation for transfer to user
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/0826Embedded security module
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data

Definitions

  • the present invention relates generally to smart cards. More specifically, the present invention relates to a technique for activating smart cards at a point of distribution or some time thereafter.
  • Stored value cards Smart cards that have the ability to store value within memory on the card are often referred to as "stored value cards”.
  • Stored value cards may be either disposable or reloadable. Disposable stored value cards in particular are subject to theft because of the value they hold. Once a disposable card has been loaded with value it can be used as cash in many locations; therefore, there is a concern that the cards would be stolen once they are loaded with value.
  • cards are loaded with value and personalized by a card supplier. Once personalized and loaded with value they are "live” and are vulnerable from theft from that point on. For example, these cards are vulnerable to theft during shipment from the supplier to the issuer, while being stored at an issuer location, while present in a card dispensing machine, or at any other time before the cards are legitimately sold to a customer. If cards are sold over-the-counter rather than in a machine, they are also at risk of theft before being sold. Previous techniques to combat card theft are both expensive and time consuming.
  • While loaded stored value cards may be sold over-the-counter by an entity instead of being sold in a card dispensing machine, the control and inventory issues with over-the-counter sales can also be quite expensive. Selling cards from a machine would appear to be a cleaner and simpler solution, although expensive, secure machines are required for stored value cards that are already loaded with value. Moreover, a card dispensing machine holding hundreds of stored value cards is a temptation for a thief as each card may hold hundreds of dollars worth of value. In certain countries, stored value cards for use in telephones are sold openly on the street in machines that are particularly prone to theft.
  • a technique is desirable that would not only help prevent the theft of stored value cards, but also would minimize the loss to an issuer should a card be stolen. It would further be desirable for such a technique to reduce the costs associated with stored value card security.
  • each card has a standard user mode and a security user mode.
  • the standard user mode the card is activated and ready for use.
  • the security user mode the card is not active and cannot be used in a payment terminal to make a purchase.
  • Cards are personalized by a card supplier in either the standard user mode or in the security user mode.
  • the card If shipped by the card supplier in the security user mode, the card cannot be used until it is legitimately activated in a card dispensing machine immediately prior to its sale to a purchasing customer.
  • the card if cards are lost or stolen during any point in the transport or storage before they are activated, the card cannot be used and no loss in value occurs.
  • a security code must be presented to the card before the card becomes activated.
  • the security code is generated in a secure manner by a card dispensing machine or other device only under authorization by an issuer prior to the sale of the card to a customer. It is believed that cost savings per card using this technique is between $0.05 and $0.75 per card.
  • an activation control counter is stored within an activation secure application module (ASAM) within the card dispensing machine.
  • the ACC is decremented for every attempt at activation of a card, successful or otherwise.
  • the ACC limits exposure to fraud and to theft by limiting the number of times that cards may be attempted to be activated.
  • ASAMs are maintained in the field (i.e., within card dispensing machines) obviating the need to return an ASAM to a central location for maintenance, or the need to bring a computer to a dispensing machine.
  • a field secure application module (FSAM) is created at the activation manager and is able to update a limited number of ASAMs.
  • FSAM field secure application module
  • a hierarchy of keys is used within a control secure application module (CSAM), the FSAMs and ASAMs to ensure security.
  • CCM control secure application module
  • FIG. 1 illustrates symbolically a stored value card activation system according to one embodiment of the invention.
  • FIG. 2 illustrates an example of contents of a memory of a stored value card useful for implementing an embodiment of the present invention.
  • FIG. 3 is a flowchart describing how a card is produced according to one embodiment of the invention.
  • FIG. 4 illustrates an arrangement for the creation of an activation secure application module (ASAM).
  • ASAM activation secure application module
  • FIG. 5 is a flowchart describing one technique for the creation of an ASAM.
  • FIG. 6 is a flowchart describing one technique for performing maintenance of an ASAM.
  • FIG. 7 illustrates in greater detail a card dispensing machine.
  • FIGS. 8 A and 8B are flowcharts describing a process by which a card is activated within a machine using an ASAM.
  • FIG. 9 illustrates a scenario in which a card is activated remotely using an
  • FIG. 10 illustrates a scenario in which field maintenance is performed upon an ASAM.
  • FIG. 11 illustrates a key hierarchy by which FSAMs perform maintenance on a subset of all ASAMs in the field.
  • FIG. 12 presents one possible security embodiment illustrating the information contained within an activation manager (AM) and a CSAM.
  • AM activation manager
  • CSAM CSAM
  • FIGS. 13 and 14 illustrate a computer system suitable for implementing embodiments of the present invention. DETAILED DESCRIPTION OF THE INVENTION
  • a smart card is typically a credit card-sized plastic card that includes one or more semiconductor integrated circuits.
  • a smart card can interface with a point-of-sale terminal, an ATM, or with a card reader integrated with a computer, telephone, vending machine, or a variety of other devices.
  • the smart card may be programmed with various types of functionality such as a stored-value application (a "stored value card"), a credit or debit application, a loyalty application, cardholder information, etc.
  • a plastic card is currently the medium of choice for smart cards, it is contemplated that a smart card may also be implemented in a smaller form factor, for example, it may attach to a key chain or be as small as a chip module.
  • a smart card may also be implemented as part of a personal digital assistant, telephone, or take a different form.
  • the below description provides an example of the possible elements of a smart card, although the present invention is applicable to a wide range of types of smart cards, and especially to stored value cards.
  • a smart card may include a microprocessor, random access memory (RAM), read-only memory (ROM), non-volatile memory, an encryption module (or arithmetic unit), and a card reader (or terminal) interface.
  • RAM random access memory
  • ROM read-only memory
  • non-volatile memory non-volatile memory
  • encryption module or arithmetic unit
  • card reader or terminal
  • Other features may be present such as optical storage, flash EEPROM, FRAM, a clock, a random number generator, interrupt control, control logic, a charge pump, power connections, and interface contacts that allow the card to communicate with the outside world.
  • a smart card may be implemented in many ways, and need not necessarily include a microprocessor or other features.
  • the microprocessor is any suitable central processing unit for executing commands and controlling the device.
  • RAM serves as temporary storage for calculated results and as stack memory.
  • ROM stores the operating system, fixed data, standard routines, look up tables and other permanent information.
  • Non-volatile memory (such as EPROM or EEPROM) serves to store information that must not be lost when the card is disconnected from a power source, but that must also be alterable to accommodate data specific to individual cards or changes possible over the card lifetime. This information includes a card identification number, a personal identification number, authorization levels, cash balances, credit limits, and other information that may need to change over time.
  • An encryption module is an optional hardware module used for performing a variety of encryption algorithms. Of course, encryption may also be performed in software. Applied Cryptography, Bruce Schneier, John Wiley & Sons, Inc., 1996 discusses suitable encryption algorithms and is hereby incorporated by reference.
  • the card reader interface includes the software and hardware necessary for communication with the outside world.
  • a wide variety of interfaces are possible.
  • the interface may provide a contact interface, a close-coupled interface, a remote-coupled interface, or a variety of other interfaces.
  • a contact interface signals from the integrated circuit are routed to a number of metal contacts on the outside of the card which come in physical contact with similar contacts of a card reader device.
  • a smart card may include a traditional magnetic stripe to provide compatibility with traditional card reader devices and applications, and may also provide a copy of the magnetic stripe information within the integrated circuit itself for compatibility.
  • FIG. 1 illustrates symbolically a stored value card activation system 10 according to one embodiment of the invention. Included within system 10 are an issuer 20, a card supplier 22 and a card dispensing machine 24. A stored value card 30 is eventually activated using an activation key 40 and dispensed to customer 26 by machine 24.
  • Issuer 20 receives cards from card supplier 22 and then issues these cards to customers.
  • Issuer 20 may be any suitable issuing entity such as a bank, financial institution, a service association, a merchant or other organization, or even an agent acting for an issuer.
  • Stored value card supplier 22 may be any suitable supplier of stored value cards.
  • a card supplier may be any of a variety of card manufacturers such as Gemplus, Schlumberger, Bull, G&D, etc. The supplier often performs card initialization and perhaps personalization, depending upon the card.
  • Card dispensing machine 24 may be any suitable device arranged to hold stored value cards and to dispense the cards to customers. An embodiment of the invention is used to activate the cards while in the machine.
  • card dispensing machine (CDM) 24 is any suitable dispensing machine known in the art such as those made by G&D and Schlumberger. Such dispensing machines automatically vend stored value cards of various denominations to customers who deposit money into the machine. Stored value cards may be purchased at a card dispensing machine using cash, a credit card, a debit card or other suitable means of payment. Dispensing machines are also able to go on-line using any suitable communications network to verify funds, perform a credit transaction, debit an account, etc.
  • machine 24 may also be handled by a human teller using a card terminal.
  • customer 26 purchases a stored value card from the teller rather than from the automatic machine.
  • the teller inserts the purchased stored value card into the card terminal, the card is activated using an embodiment of the invention described herein, and the card is then handed from the teller to the customer.
  • CDM 24 may also take the form of an enhanced POS terminal or a batch personalization machine.
  • a card dispensing machine may also be associated with another device such as an ATM.
  • Card dispensing machine 24 may also include other functionality in addition to the ability to activate and dispense stored value cards, such as the ability to reload reloadable cards and to sell merchandise.
  • card dispensing machine 24 may be broken into various pieces.
  • a simple dispensing machine or other means may be used to dispense unactivated cards to a customer who would then take the card to another card terminal to have a card activated.
  • a customer may receive an unactivated stored value card by purchase from a machine, by distribution from a bank or merchant, or through the mail. The customer may then insert the unactivated card into a card reader attached to a personal computer which then performs activation of the card using an embodiment of the invention over the Internet or other communications network. The customer may have prepaid for the card, or the card may be activated over the Internet only upon suitable payment by the customer. A customer may also take an unactivated card received from elsewhere to card dispensing machine which is then able to activate the card.
  • stored value card 30 When first produced by card supplier 22, stored value card 30 is not activated, even though it may be loaded with value. (Of course, supplier 22 may also produce cards that are activated.). In conjunction with issuer activation key 40, supplier 22 produces a security code which is stored on card 30. Issuer activation key 40 is also relayed to dispensing machine 24. Card 30 may then be transported to issuer 20, stored and eventually held within machine 24 without substantial risk of theft because the card is not activated and cannot be used to make a purchase. When customer 26 interacts with machine 24 to purchase card 30, issuer activation key 40 is used within machine 24 to reproduce the security code and to activate card 30 so that the value loaded upon it is available for use. Card 30 is then dispensed to customer 26 in exchange for payment.
  • Stored value card 30 is any suitable smart card capable of storing value.
  • card 30 is a memory card, although the card may also be a processor card having other functionality in addition to memory for storing value.
  • card 30 is a disposable stored value card.
  • Other details for a specific embodiment of the invention are provided in "Visa International CAD/Service Payment Terminal Specification" available from Visa International, Foster City, California.
  • FIG. 2 illustrates an example of a memory 50 for stored value card 30 useful for implementing an embodiment of the present invention.
  • Memory 50 is representative of the possible contents of memory 50; the contents shown may be represented in other orders and forms while still encompassing the present invention.
  • Other hardware implementations and implementations using software are also possible for memory storage.
  • various flags, codes, versions, etc. are used to control the mode of the card for safe transport.
  • Other secure techniques and use of keys may also be used to protect the value on a card while it is being transported and stored.
  • ISO byte HI 60 and ISO byte H2 62 are two standard bytes of information used to identify the type of card. For example, bytes 60 and 62 may be used to identify card 30 as having a particular chip. For processor and other cards, these ISO bytes are not required.
  • An issuer identifier 64 identifies the issuer of the card.
  • Supplier identifier 68 uniquely identifies the card supplier.
  • Card serial number 69 is an identifying number for the card itself.
  • Error counter 70 is a counter that counts how many times the card is presented with a security code for comparison. In one embodiment, only a certain number of tries are allowed at presenting the correct security code to the card. After these attempts are exhausted, the card will no longer accept a security code for comparison. This feature prevents an unscrupulous individual from repeatedly attempting to crack the security code of the card using automatic means such as a computer program.
  • Security code 72 is any suitable code stored on the card that prevents the card from being activated except by an authorized entity. If an authorized entity presents the co ⁇ ect security code to the card that matches with security code 72 of memory 50, then the card may become activated.
  • Security code 72 may have any suitable value and format. By way of example, code 72 may be a predefined constant value which is the same for all cards, or may be a value derived from card specific data that produces a unique value per card.
  • Security code version 74 is a value assigned to issuer activation key 40 by issuer 20. This data element is provided to card supplier 22 by issuer 20 along with issuer activation key 40 to be used in the generation of security codes for cards.
  • Security code version 74 indicates a particular version for activation key 40 and is useful when more than one version of an activation key is in use within the system. For example, issuer 20 may start using a new activation key, but cards based upon the older activation key may still be within the system waiting to be dispensed. In this scenario, security code version 74 is useful for distinguishing from amongst the various activation keys which is the appropriate key for use with card 30.
  • Issuer flag 76 indicates whether or not data within memory 50 may be modified. Initially set to 0 (indicating "issuer mode"), card supplier 22 is free to write data to memory 50. Issuer mode may be used to safely transport a card from a chip manufacturer to a card manufacturer (if needed). Once issuer flag 76 is set to 1, various regions within memory 50 may no longer be modified. For example, security code 72 and version 74 may not be modified once issuer flag 76 has been set to 1.
  • Security flag 78 indicates a mode of the card. In this example, when security flag 78 is set to 0, the card is in standard user mode and may be used for purchases. When security flag 78 is set to 1, the card is in security user mode and its value may not be used. Region 80 is used for the storage of value on card 30.
  • a card may include the following modes.
  • issuer mode access to memory is secured by a 4-byte transport code.
  • a 4-byte security code protects memory while in security user mode
  • a 2-byte access code protects memory while in standard user mode. Access to particular regions of memory is allowed only after the chip has verified the code presented. For example, while in issuer mode the security code is used as a secret transport code and access is only allowed to the error counter and selected data areas. While in security user mode the issuer flag has been set and further programming of the card identification areas is not allowed.
  • the user code In normal use when the card is in standard user mode (issuer and security flags set), the user code must be presented before value may be decremented from the card.
  • various regions of memory are either ROM, PROM or EEPROM depending upon the mode.
  • personalization data is PROM while in issuer mode, but is ROM in other modes.
  • the issuer and security flags are PROM in all modes.
  • the memory card includes a control unit (providing an interface to the card contacts), various flags, a memory access control unit (including an error counter, security code and user code), an authentication unit (including an authentication key and response counter), a memory unit (with EEPROM, user memory and an erase counter), and a programming unit.
  • the authentication unit is a high security cryptology unit allowing authentication with challenge and response and an individual key.
  • FIG. 3 is a flowchart describing how a card is produced according to one embodiment of the invention.
  • the card manufacturer embeds a chip into a smart card.
  • the chip embedded into the smart card is any suitable integrated circuit and is preferably a memory chip. Examples of chips that may be used are those manufactured by Siemens. Most preferably, the embedded chip includes at least card memory map 50 of FIG. 2.
  • Step 104 initializes and personalizes the card. Unlike a credit card which is personalized for a particular individual, a stored value card is typically personalized by the addition of graphics to the card. Also, various data regions within memory 50 of the card are initialized. For example, regions 60 and 62 are initialized to identify the type of chip on the card, region 64 is initialized with the issuer identifier, a supplier identifier is written to region 68, and error counter 70 is initialized to 0.
  • security flag 78 is set to a 1 indicating that the card is in security user mode and may not be used until activated. This feature prevents a card thief from using a card that has been stolen.
  • the card supplier stores into region 80 the particular value to be associated with the stored value card.
  • a security code 72 may be installed on the card to allow only an authorized party to activate the card.
  • Generation of a security code, its particular value and its installation on the card may be performed in a wide variety of manners. By way of example, the following steps provide one technique for the generation and installation of a security code.
  • the issuer In step 106, the issuer generates an issuer activation key 40.
  • the key may be generated by any party, generation of the key by the issuer allows the issuer to keep control over which parties have access to the key and which cards may be activated using the key.
  • Key 40 may be any suitable encryption key useful for generating a security code.
  • key 40 is a double-length data encryption standard (DES) key.
  • DES data encryption standard
  • Also generated at this time by the issuer is a version number of the key.
  • any number of activation keys may be generated by an issuer, preferably one activation key is generated per card supplier. In another embodiment of the invention, an activation key is generated for each batch of cards that will be produced by a card supplier.
  • the issuer provides the activation key and its version number to the card supplier.
  • the card supplier generates a security code for the card using the activation key and version number received from the issuer.
  • a security code may be generated from an activation key in a wide variety of manners. Any data may be combined with the key using any suitable encryption algorithm under any suitable encryption standard to produce a security code.
  • the security code may be the same for all cards from an issuer, may be the same for all cards received from a particular supplier, may differ only amongst batches of cards from a particular supplier, or may even be a unique value for each card produced by a card supplier.
  • one specific embodiment of the present invention uses the following formula for generation of a unique security code for each stored value card produced.
  • the first data elements 60-69 of memory 50 of a stored value card are encrypted under a triple-DES algorithm in Electronic Code Book (ECB) mode using the issuer activation key.
  • EBC Electronic Code Book
  • the four most significant bytes from the result of this encryption are kept and used as the security code for the card. In this fashion, a security code unique to this card is produced.
  • the security code may be generated from other information on the card and/or may use other keys.
  • this newly generated security code is installed on the card in data region 72 of memory 50.
  • the activation key version number received from the issuer is also stored as security code version 74 in memory 50.
  • a hardware implementation of the stored value card prevents changing the card from security user mode to standard user mode unless the security code is presented to the card. In this fashion, the card cannot be used until an authorized entity is able to generate and provide the security code to the card.
  • This security measure may also be performed in software for cards having that capability.
  • issuer flag 76 is set to a value 1 to indicate that sensitive data within memory 50 of the card may no longer be modified. Through hardware implementation, setting this flag prevents the later modification of sensitive data on the card such as security code 72, version 74, etc. A software implementation may also be used to monitor flag 76. Data that needs to be changed for the use of the card such as value 80 may still be modified. At this point, the stored value card has been loaded with value that is the equivalent of cash, but the card has not yet been activated so it may be safely transported to the issuer and stored. In step 116, cards produced by the card supplier are delivered to the issuer for distribution to customers. A stored value card may be implemented using a variety of techniques to protect or otherwise prevent access to the value on the card.
  • Card authentication of the terminal may be required before value may be decremented. In some situations, authentication is not required. Under normal usage when authentication is required, a card access code (or user code) is supplied to the stored value card in order to decrement value on the card (i.e., use the card).
  • a card access code or user code
  • hardwired logic of the integrated circuit on the card is used to perform this function. Hardwired logic on the card accepts the card access code, verifies it is correct and then allows access to the value on the card. Such hardwired logic that processes a card access code is well known in the art. Software within a card may also be used to verify a user code. For processor cards, it is also possible that this step of authentication be performed using cryptographic signatures instead of a user code.
  • value may not be decremented if the card is in security user mode (i.e., if security flag 78 is set).
  • the card must be placed in standard user mode (i.e., reset security flag 78) before value can be decremented.
  • security flag 76 must be reset to place the card into standard user mode before the card access code can be allowed to decrement value on the card.
  • the above functionality is implemented in hardware on the integrated circuit, this functionality could also be implemented in software.
  • software contained within the memory of a memory card or within a processor card may also perform the functions of determining whether a card is in security user mode, and then receiving and comparing a card access code.
  • FIG. 4 illustrates an arrangement 200 for the creation of an activation secure application module (ASAM).
  • An ASAM will be used by a card dispensing machine to activate cards in a secure manner.
  • ASAM creation uses a process described in FIG. 5 that initializes and personalizes the ASAM.
  • Arrangement 200 illustrates an activation manager 202 under control of a user 204 which is in communication with both control secure application module (CSAM) 206 and an activation secure application module (ASAM) 208.
  • CSAM control secure application module
  • ASAM activation secure application module
  • Activation manager 202 may be any suitable controlling device arranged to securely initialize and personalize ASAM 208.
  • application manager 202 is implemented as a software application running on a personal computer or other host device.
  • activation manager 202 may be implemented on a laptop computer for portability, or may even be implemented inside a card dispensing machine or other activation device that would allow user 204 to create and/or perform creation and maintenance of an ASAM from a remote site using a communications link.
  • CSAM 206 is a secure module used by activation manager 202 for the creation of ASAM 208.
  • CSAM 206 may be implemented in a variety of manners including as a smart card based secure application module (SAM) or as a hardware security module (HSM).
  • a hardware security module (HSM) is used to facilitate cryptographic processing and typically stores secret keys and encryption algorithms, performs cryptographic functions on secret data and generates session keys and signatures.
  • SAM smart card based secure application module
  • HSM hardware security module
  • a hardware security module (HSM) is used to facilitate cryptographic processing and typically stores secret keys and encryption algorithms, performs cryptographic functions on secret data and generates session keys and signatures.
  • an HSM is generally a tamper proof device, which uses some level of physical security measures to protect the sensitive information inside.
  • An HSM may be any security module used in the industry, such as a RACAL HSM Model RG7000, or the security box attached to automatic teller machines.
  • HSM 130 may be implemented on a smart card within a card reader, on a series of smart cards, may be implemented on any suitably secure computer, or may be implemented in software.
  • a variety of data is managed by activation manager 202 for the creation of ASAM 208. Included is a system master key 212 used to derive a zone key for each ASAM, user passwords 214 that allow initiation of ASAM maintenance, a table of all current issuer activation keys 216, along with their identifying indices, and a table of all active ASAMs 218. Each entry in the table provides the ASAM identifier and the desired maximum value for the ACC. Preferably, these keys and passwords are stored securely.
  • sensitive keys and passwords are stored within CSAM 206, while in another embodiment, this information is stored within database 210 accessible by CSAM 206 and is in encrypted under a local master key (LMK) of CSAM 206.
  • Database 210 may also be located within activation manager 202, at a remote site or in any other suitable location.
  • system master key 212 has an associated version number and is changed periodically. More preferably, activation manager 202 is able to maintain at least two system master keys. System master key 212 is used to derive a zone key for secure communication with an ASAM. Based upon the version number, an ASAM maintenance process (as described below in FIG. 6) is able to determine whether the zone key in the ASAM should be replaced. Activation manager 202 also has the ability to generate new activation keys when required and to delete keys. In one embodiment, activation keys are double-length DES keys that are stored securely. Furthermore, activation manager 202 preferably exports activation keys to a card supplier in a secure manner.
  • ASAM 208 is preferably implemented on a smart card for affordability, but may also be implemented as an HSM. It has the functionality as described below.
  • FIG. 5 is a flowchart describing one technique for the creation of ASAM 208.
  • Creation of an ASAM refers to the initialization and personalization of the ASAM. Once an ASAM has been created, it is ready to be used within a card dispensing machine to activate cards within the machine when sold.
  • ASAM 208 is initialized with any parts of the software application needed for its operation within a card dispensing machine; preferably the software is loaded into an EEPROM within the ASAM. Additionally, any data and/or file structures needed by the ASAM are also loaded at this time.
  • the ASAM is loaded with an initialization key.
  • This initialization key will be used to encrypt the zone key to be loaded into the ASAM subsequently.
  • the initialization key may be loaded using any suitable technique and use any encryption standard. In a cu ⁇ ently-preferred embodiment, DES is used. Although the initialization key may be different for each ASAM for an issuer, preferably all ASAMs for an issuer use the same initialization key.
  • the initialization key is loaded by providing multiple portions of data to the ASAM. Once inside the ASAM, an XOR is performed on these multiple portions of data with the result forming the initialization key. The key is then stored within the ASAM within a secure location. Using an initialization key to encrypt the zone key allows the zone key to be transmitted and loaded in a secure fashion.
  • ASAM 208 may be loaded with activation data using, for example, the process described in FIG. 7.
  • ASAM 208 is assigned a unique identifier.
  • activation manager 202 determines a unique ASAM identifier which is assigned and loaded into ASAM 208.
  • ASAM 208 is assigned a maximum allowed value for its application control counter (ACC).
  • the ACC limits the amounts of times that ASAM 208 may attempt to activate the stored value card.
  • Use of the ACC thwarts unscrupulous individuals who are either trying to break the security code on a card using an ASAM, or who have illegally acquired a card dispensing machine and are attempting to activate a large number of cards using a single ASAM. This maximum allowed value for the ACC is loaded into ASAM 208.
  • a zone key is installed on ASAM 208.
  • a zone key is a cryptographic key used to secure communications between two nodes.
  • the zone key to be installed on ASAM 208 permits future secure communications between ASAM 208 and CSAM 206.
  • the zone key may be installed and derived using a wide variety of techniques.
  • the following steps are used.
  • Activation manager 202 first requests the zone key from CSAM 206; this request includes the user password and the ASAM identifier.
  • CSAM 206 Upon validation of the user password by CSAM 206, CSAM 206 generates the zone key for ASAM 208.
  • the zone key is then encrypted under the initialization key and provided to activation manager 202 in response to its request.
  • Activation manager 202 then sends a "LOAD ZONE KEY" command to ASAM 208 along with the encrypted zone key.
  • ASAM 208 then decrypts the zone key and replaces the initialization key with the zone key.
  • the zone key may be derived in any manner.
  • the zone key is a double-length DES key shared between ASAM 208 and CSAM 206 that is unique to ASAM 208.
  • the zone key may be derived using the following algorithm.
  • a first key is produced by encrypting the ASAM identifier (padded with zeroes) using the system master key under a triple DES algorithm.
  • a second key is produced by encrypting the ones complement of the ASAM identifier (padded with zeroes) using the system master key under a triple DES algorithm.
  • the zone key is then constructed using a concatenation of the first key and the second key.
  • FIG. 6 is a flowchart describing one technique for performing maintenance of ASAM 208.
  • maintenance of ASAM 208 is performed under the control of activation manager 202 while in communication with CSAM 206. Maintenance may occur using a dial-up connection between the card dispensing machine that incorporates ASAM 208 and the computer hosting activation manager 202, or by physically bringing ASAM 208 to activation manager 202 and placing it in a card reader locally attached to the activation manager. Alternatively, it is possible to bring a portable computer hosting activation manager 202 along with CSAM 206 to the site of a card dispensing machine to perform maintenance of ASAM 208.
  • ASAM 208 contains data that is preferably updated from time to time including: a zone key used for secure communication with activation manager 202, a set of issuer activation keys, and an activation control counter (ACC).
  • ACC activation control counter
  • ASAM 208 is used for the first time, a procedure similar to that described in FIG. 6 is used to install a zone key, install a set of issuer activation keys, and to set the activation control counter to a particular value.
  • the procedures of FIGS. 5 and 6 may be performed to prepare ASAM 208 for the activation of stored value cards in a card dispensing machine.
  • the procedure of FIG. 6 may be used to perform this maintenance.
  • step 270 user 204 supplies the appropriate password to allow ASAM maintenance to occur.
  • step 272 data from ASAM 208 is retrieved to allow for proper maintenance. This data includes the ASAM identifier, a list of issuer activation keys, the current value of the activation control counter, its maximum value, and the current zone key version number.
  • Step 274 determines whether a new zone key is required by inspecting the current zone key version retrieved from ASAM 208. If a new key is required (or if this is first time maintenance) then step 276 updates the zone key. Step 276 may be performed in many ways.
  • an update command to replace the ASAM zone key is used that includes a new zone key version number, a new double-length zone key and a zone key check value.
  • the entire command data is encrypted.
  • the response from ASAM 208 is the new zone key version number and the zone key check value both in the clear.
  • the new zone key is encrypted under the old zone key.
  • Step 278 determines whether any issuer activation keys are obsolete and may need to be deleted. If so, step 280 updates the issuer keys in ASAM 208. Step 280 may be performed in many ways. In one specific embodiment, an update command to delete various issuer activation keys is provided to ASAM 208. This command includes a variable length list of key indices indicating which keys to delete. Step 282 determines whether new issuer activation keys should be added to ASAM 208. New keys might need to be added if the issuer has come out with new versions or if ASAM 208 is being maintained for the first time. If so, step 284 adds a new issuer key or keys to ASAM 208. Step 284 may be performed in many ways.
  • an update command to add an issuer activation key is performed for each key to add.
  • This command uses a block for each key being added that includes a new issuer activation key version number, a new double-length issuer activation key and an activation key check value.
  • the entire command data is encrypted.
  • the response received from ASAM 208 is one block for each key successfully added and includes both the key version number and the key check value in the clear.
  • the new activation keys and associated information are encrypted under the current zone key.
  • Step 286 determines whether the activation control counter (ACC) should be updated. For example, before ASAM 208 is released to the field, it will need to have its ACC value set. Also, if a card dispensing machine using ASAM 208 has been activating a great deal of cards, it is possible that its ACC value is approaching the maximum ACC value allowed for ASAM 208. If so, it may be desirable to update the ACC value to a new value.
  • the ACC value can be set to a particular value depending upon the environment in which the card dispensing machine is located. For example, for the interior of a rapid transit station that has good security and may sell an extremely large quantity of low- value cards, it may be desirable to set the ACC value to a fairly high number.
  • the risk is less and the ACC may be set higher.
  • step 288 loads a new ACC value into ASAM 208.
  • Step 288 may be performed in many ways.
  • an update command to load a new ACC value is used. This command includes the new ACC value and the current ACC value.
  • ASAM 208 is complete.
  • Communication of commands and responses between Activation Manager (AM) 202 and ASAM 208 may be performed using many different protocols.
  • the update of steps 276, 280, 284 and 288 begins with an initialize update command from AM 202 to ASAM 208.
  • this command sends the CSAM identifier and in turn return receives the ASAM identifier, the update transaction counter (NTU), and the zone key version number (VKZ).
  • ASAM 208 uses the internal update transaction counter to keep track of how many updates are being requested. This feature provides additional security.
  • the internal counter is incremented for each requested update; once its maximum value is reached, a response code indicating that fact is returned to AM 202 instead of the normal response to an initialize update command.
  • the internal update transaction counter is implemented so that it does not roll over when it reaches its maximum value.
  • AM 202 Once AM 202 receives a response to its initialize update command, it sends an update command (as described above) along with a message authentication code (MAC) and receives in return response data and a completion code from ASAM 208. Once the update command is received by ASAM 208, it copies its internal update transaction counter to permanent storage and verifies the MAC. It then performs the requested update (of issuer keys, ACC value or zone key) and returns a response to the command as has been described above. If any error occurs during MAC verification or during the update, an appropriate response is returned to AM 202. Once AM 202 has received a response to its update command, it validates this received response data. Any errors occurring during any of the initialize update, update command or validate commands result in an error condition code being set.
  • MAC message authentication code
  • MAC message authentication code
  • the MAC is generating using the ASAM zone key using a block cipher algorithm often referred to as CBC mode. In a currently-preferred embodiment, generation is performed as described in the reference “ISO/IEC 9797,” second edition, or may be performed as described in the reference ANSI X9.19, 1996.
  • the data and commands that update keys may be encrypted in a variety of ways.
  • encryption is performed using DES in ECB mode with a single-length session key as defined in the reference "ANSI X3.92," although other techniques may also be used.
  • the session key is derived from the ASAM zone key using the following algorithm.
  • the CSAM identifier, ASAM identifier and internal transaction update counter are concatenated together and encrypted using the zone key under the triple DES encryption algorithm to obtain the session key.
  • a check value is included in the encrypted data.
  • the check value is calculated by using triple DES to encrypt an 8- byte block of binary zeroes.
  • the check value in the clear is returned to the activation manager to validate that the data was received and decrypted correctly.
  • Check values may be calculated in other ways as well.
  • ASAM 208 Once ASAM 208 has been maintained properly for the first time and is present within a card dispensing machine, it is ready to begin activation of stored value cards within the machine.
  • FIG. 7 illustrates card dispensing machine 24 in greater detail. Included within machine 24 are an ASAM 208 and any number of stored value cards 30 ready to be activated and dispensed to customers. For ease of explanation, ASAM 208 and card 30 are shown enlarged outside machine 24. Machine 24 controls the card activation process using ASAM 208 to store issuer activation keys and to calculate card security codes necessary to activate stored value cards. In a typical situation, a customer purchasing a card at machine 24 receives a card dispensed from the machine once the card has been activated using ASAM 208.
  • FIGS. 8 A and 8B are a flowchart describing a process by which card 30 is activated within machine 24 using ASAM 208.
  • the process of FIGS. 8 A and 8B is initiated when a customer makes a purchase of a stored value card from machine 24.
  • machine 24 reads card type data from card 30.
  • type information is stored in the memory 50 of card 30, namely byte HI 60 and byte H2 62.
  • These bytes indicate the type of chip used within card 30 and indicate whether or not this card is suitable for activation. For processor and other types of cards, these bytes may not be required; step 302 would then not be required or another technique may be used to determine the type of the chip.
  • step 304 determines whether this card is suitable to be activated. In this specific embodiment, step 304 determines whether card 30 has embedded within it a particular type of chip. If so, this indicates that the card may be either in a security user mode or a standard user mode. If the card is not the co ⁇ ect type, then in step 314 the card is simply dispensed to the customer, assuming that payment has been made. A card that is not suitable for activation is presumably already activated and may be dispensed straight away.
  • Step 306 reads additional relevant data from card 30 useful for activating the card.
  • This additional data includes the issuer identifier, the card supplier identifier, the version number of the issuer activation key and the security flag.
  • Step 308 determines whether the card is in security user mode by checking the retrieved security flag. If not in security user mode, then the card is already in standard user mode and need not be activated. The card is then dispensed to the customer in step 314.
  • card 30 is in security user mode, then the appropriate security code for card 30 is retrieved from ASAM 208.
  • the security code retrieved from ASAM 208 will be used to activate card 30.
  • the security code may be retrieved from ASAM 208 or other suitable secure device in a wide variety of manners.
  • FIG. 8B describes one technique for retrieving the security code.
  • step 312 the retrieved security code is presented to card 30 to activate the card.
  • Verification by card 30 that the security code presented to it is the same security code present within the memory of the card may be performed using different techniques.
  • the chip on card 30 is implemented to compare a presented security code with the security code already stored on the card. Implementation of this comparison in hardware can be performed by those skilled in the art of chip implementation.
  • software resident on card 30 may perform the comparison and the activation of the card, or another secure device (such as ASAM 208 or machine 24) may compare the security codes and activate card 30 upon success.
  • the security code is verified and the card activated using the following procedure. First an address reset of the card is performed. Next, the error counter is incremented by one by setting the next free bit in error counter 70. For example, if e ⁇ or counter 70 has 4 bits only 4 tries are allowed to activate card 30. This feature prevents unauthorized attempts to activate a card over and over again using automatic means. Next, the security code retrieved from ASAM 208 is presented to card 30. The security code is presented at the I/O pin of the card bit-by- bit. The card compares the received security code bit-by-bit to that stored in its memory. If successful, the next step is to erase the e ⁇ or counter.
  • Successfully erasing error counter 70 indicates that the presented security code has been verified by card 30.
  • an erase operation is applied to the error counter bits in memory. If the security code has been correctly entered the e ⁇ or counter is allowed to be erased. A successful erase operation can be used as an indication of a successful security code verification. If the comparison was unsuccessful, the chip does not allow the error counter to be erased; the error counter then indicates how many unsuccessful comparisons have been tried (up to four).
  • security flag 78 on card 30 is set to 0 to indicate regular user mode. Setting the security flag will not be possible unless the presented code has been verified.
  • card 30 is now activated and ready for use. Finally, security code 72 on card 30 is erased. This erasure prevents an unscrupulous party from later reading the security code.
  • the card is dispensed to the customer in step 314. If activation is unsuccessful, the card is rejected and flagged as unusable within machine 24.
  • FIG. 8B is a flowchart describing one technique by which step 310 of FIG. 8 A may be performed.
  • machine 24 requests the security code from ASAM 208.
  • ASAM 208 manages security for the activation process.
  • ASAM 208 also provides the activation control counter (ACC) that limits exposure to fraud and theft by limiting the number of cards that ASAM 208 may activate.
  • ACC activation control counter
  • Step 320 determines whether the ACC is equal to 0. If so, this indicates that the maximum number of cards has already been activated by ASAM 208 and no more cards may be activated. Accordingly, step 322 returns a negative response indicating that card 30 will not be activated and step 310 is done. If, however, the maximum number has not yet been reached, then step 324 subtracts 1 from the ACC.
  • step 326 selects the appropriate issuer activation key with which to derive the card security code.
  • a key index based upon the issuer identifier, the card supplier identifier, and the activation key version number is used to select the appropriate activation key.
  • Such an index is useful as there may be numerous activation keys available with an ASAM 208 for use. For example, each issuer may use a different activation key, and may use different activation keys for different suppliers as well as different keys for different batches from the same supplier. Furthermore, there may be different versions of an activation key.
  • card 30 may be dispensed from a machine or received by a customer in another fashion while still in security user mode.
  • the customer may later present card 30 to a suitable activation device including ASAM 208 and have the card activated at that point using a similar process as shown in FIGS. 8 A and 8B.
  • activation could take place at a merchant location, kiosk or other public site where an activation device is located, or it could take place using any suitable computing device with a network connection.
  • the functionality of machine 24 could be split over the Internet.
  • a customer inserts an unactivated card into a card reader attached to a personal computer in the home or office.
  • card 30 communicates through the personal computer over the Internet to ASAM 208 located in a remote location. Commands and communication may still flow between card 30 and ASAM 208 in a similar fashion as described above, except that the two devices would be remote from one another. Other scenarios in which card 30 may be activated are also possible.
  • FIG. 9 illustrates a scenario 400 in which card 30 is activated remotely using ASAM 208.
  • Scenario 400 shows user computer 402 in communication with any suitable computing device 404 over any suitable telecommunications link 406 such as the Internet.
  • card 30 present in a card reader device attached to computer 402.
  • ASAM 208 is either located in a card reader device attached to computing device 404, or is implemented within a card dispensing machine 24 or other device having similar functionality.
  • FIG. 10 illustrates a scenario 500 in which field maintenance is performed upon ASAM 208.
  • field secure application module (FSAM) 502 is present within card dispensing machine 24 and is able to perform maintenance of ASAM 208 in the field.
  • FIGS. 4 and 6 illustrates maintenance of
  • ASAM 208 performed by activation manager 202 under control of CSAM 206.
  • This embodiment contemplates either that ASAM 208 be physically present in a card reader device attached to AM 202, or that there is a telecommunications link between AM 202 and a card dispensing machine in which ASAM 208 is present. In other scenarios, however, it may be desirable to maintain ASAM 208 in the field without the need for a telecommunications link back to AM 202 or requiring that ASAM 208 be physically transported back to AM 202. For example, many card dispensing machines may not have the functionality to communicate with AM 202 over a secure link to perform ASAM maintenance and/or it may be difficult or expensive to return ASAM 208. Because a card dispensing machine is visited regularly by a service technician for physical maintenance (for removing cash and/or replenishing stored value cards) it would be advantageous to perform maintenance of the ASAM at the same time.
  • FSAM 502 can be carried by a service technician to card dispensing machine 24 when it is serviced and inserted into a card reader device attached to machine 24.
  • the maintenance process of ASAM 208 is then controlled by code within FSAM 502.
  • FSAM 502 may be any suitable device similar to CSAM 206 for performing maintenance of an ASAM.
  • FSAM 502 could be a hardware security module, although preferably it is implemented on a smart card.
  • AM 202 will now be responsible for the creation and maintenance of FSAMs, as well as the creation of ASAMs. With the exception of the differences noted below, the creation and maintenance of an FSAM may be performed in a similar manner to that previously described in FIGS. 4-6 above.
  • FSAM creation and maintenance includes the following differences from that of ASAM creation and maintenance.
  • the FSAM When a zone key is first loaded or replaced in an FSAM, the FSAM will maintain both the new zone key and the old zone key to insure it can still communicate with ASAMs using the previous zone key. Additionally, each FSAM will carry a maximum ACC value and a current ACC value similar to those carried by ASAMs. Each time an FSAM loads a new ACC value into an ASAM, it will decrement its own current ACC value by a corresponding amount. When its own ACC current value is 0, it can no longer perform maintenance on ASAMs. This added level of security limits the number of cards that an FSAM can permit an ASAM to activate.
  • One of the advantages of using an FSAM to perform field maintenance is that functionality normally controlled by CSAM 206 may be delegated to various FSAMs such that ASAMs may be maintained more efficiently in the field. Nevertheless, delegation of this authority comes with additional risk. To reduce the risk involved with allowing FSAMs to perform maintenance in the field, it is preferable to delimit the scope of maintenance that a single FSAM may perform. This limiting of scope may be performed in different ways.
  • FIG. 11 illustrates a scenario 600 by which FSAMs are only able to perform maintenance on a subset of all ASAMs in the field.
  • Scenario 600 illustrates CSAM 601 having created FSAMs 602-606.
  • FSAM 602 is considered the parent of and is responsible for the maintenance of any number of ASAMs 610.
  • FSAMs 604 and 606 are responsible for any number of ASAMs 612 and 614 respectively.
  • Associated with CSAM 601 is a master zone derivation key 620 used for deriving zone keys for FSAMs and ASAMs. Using the appropriate FSAM identifier, master key 620 is used to derive the field zone keys 630, one per FSAM.
  • Each FSAM field zone key in turn is used to derive the zone keys 640 for each ASAM of which it is the parent.
  • the ASAM identifier of each ASAM 610 is used in conjunction with the field zone key for FSAM 602 to derive the unique zone key for each ASAM 610.
  • this zone key is used for secure communication between one of the ASAMs 610 and FSAM 602.
  • the field zone key for FSAM 602 is used for secure communication between FSAM 602 and CSAM 601.
  • AM 202 When AM 202 is creating a particular ASAM, it performs extra steps. It first assigns a particular ASAM to one FSAM. It then derives the FSAM zone key, and from that derives the appropriate ASAM zone key. In this fashion, CSAM 601 delegates authority for maintaining ASAMs in the field, but does so for each FSAM with a limited scope.
  • an FSAM is now maintaining an ASAM in the field inside a card dispensing machine, it is preferable that a card dispensing machine include a subset of the software previously implemented on AM 202 to assist with maintenance of the ASAM.
  • an FSAM may be a sophisticated processor card that includes all of the control logic and software for controlling maintenance of an ASAM.
  • FIG. 12 presents one possible security embodiment illustrating the information contained within AM 202 and CSAM 206.
  • Scenario 700 illustrates activation manager 202 having associated information 701 and in communication with CSAM 206.
  • Local master key (LMK) 702 is stored securely within CSAM 206 providing a secure location for this important key.
  • CSAM 206 is a secure module or card with which it is necessary to create and maintain ASAMs and FSAMs.
  • information 701 associated with activation manager 202 may be stored within CSAM 206 or in a secure database that is accessible only with authorization from CSAM 206, such as by using local master key 702.
  • User passwords 710 are required for individuals wishing to use AM 202 to perform creation and maintenance.
  • Activation keys 712 are stored in conjunction with an activation key index 714 that includes as indices the issuer identifier, the card supplier identifier and the activation key version number.
  • Master zone derivation keys 716 are used to derive field zone keys for any number of FSAMs. There may be one master zone key, or there may be many.
  • ASAM table 718 includes a list of all active ASAMs along with each ASAM identifier, its maximum permitted ACC value, and its associated parent FSAM. In this fashion, AM 202 has all relevant information at its disposal for the creation and maintenance of ASAMs and FSAMs.
  • FIGS. 13 and 14 illustrate a computer system 900 suitable for implementing embodiments of the present invention.
  • FIG. 13 shows one possible physical form of the computer system.
  • the computer system may have many physical forms ranging from an integrated circuit, a printed circuit board and a small handheld device up to a huge super computer.
  • Computer system 900 includes a monitor 902, a display 904, a housing 906, a disk drive 908, a keyboard 910 and a mouse 912.
  • Disk 914 is a computer-readable medium used to transfer data to and from computer system 900.
  • FIG. 14 is an example of a block diagram for computer system 900. Attached to system bus 920 are a wide variety of subsystems. Processor(s) 922 (also refe ⁇ ed to as central processing units, or CPUs) are coupled to storage devices including memory 924. Memory 924 includes random access memory (RAM) and read-only memory (ROM). As is well known in the art, ROM acts to transfer data and instructions uni-directionally to the CPU and RAM is used typically to transfer data and instructions in a bi-directional manner. Both of these types of memories may include any suitable of the computer-readable media described below. A fixed disk 926 is also coupled bi-directionally to CPU 922; it provides additional data storage capacity and may also include any of the computer-readable media described below.
  • RAM random access memory
  • ROM read-only memory
  • Fixed disk 926 may be used to store programs, data and the like and is typically a secondary storage medium (such as a hard disk) that is slower than primary storage. It will be appreciated that the information retained within fixed disk 926, may, in appropriate cases, be incorporated in standard fashion as virtual memory in memory 924.
  • Removable disk 914 may take the form of any of the computer-readable media described below.
  • CPU 922 is also coupled to a variety of input/output devices such as display 904, keyboard 910, mouse 912 and speakers 930.
  • an input/output device may be any of: video displays, track balls, mice, keyboards, microphones, touch- sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, biometrics readers, or other computers.
  • CPU 922 optionally may be coupled to another computer or telecommunications network using network interface 940. With such a network interface, it is contemplated that the CPU might receive information from the network, or might output information to the network in the course of performing the above-described method steps.
  • method embodiments of the present invention may execute solely upon CPU 922 or may execute over a network such as the Internet in conjunction with a remote CPU that shares a portion of the processing.
  • embodiments of the present invention further relate to computer storage products with a computer-readable medium that have computer code thereon for performing various computer-implemented operations.
  • the media and computer code may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well known and available to those having skill in the computer software arts.
  • Examples of computer-readable media include, but are not limited to: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROMs and holographic devices; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and execute program code, such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs) and ROM and RAM devices.
  • Examples of computer code include machine code, such as produced by a compiler, and files containing higher level code that are executed by a computer using an interpreter.
  • the activation key can be used directly or in combination with other codes and/or encryption algorithms to provide a security code for a card.
  • Any entity may perform the roles of supplier and/or issuer.
  • the card dispensing machine may form part of a larger machine, or may be functionally divided over a computer network.
  • any suitable smart card capable of being placed into a security mode may be used.
  • a security code may be generated by an ASAM during activation or by another secure hardware device, or also in software. A security code may even be allowed to be entered manually in order to activate a card. Therefore, the described embodiments should be taken as illustrative and not restrictive, and the invention should not be limited to the details given herein but should be defined by the following claims and their full scope of equivalents.

Abstract

Secure activation of stored value cards (30) at a point of distribution uses a portable activation secure application module (ASAM) (208) within the card dispensing machine (24) to activate each card. Each card has a standard user mode and a security user mode. In the standard user mode the card is activated and ready for use. In the security user mode the card is not active and cannot be used to make a purchase. An issuer (20) supplies an issuer activation key (40) to a card supplier (22) who produces a security code (72) which is stored on a stored value card (30). Cards are supplied to the issuer (20) in security user mode, and stored in a dispensing machine (24). The issuer activation key (40) is also relayed to the dispensing machine and stored on the ASAM (208). Upon purchase by a customer (26), the issuer activation key (40) is used within the machine (24) by the ASAM (208) to reproduce the security code (72) and to activate a card. An activation control counter (ACC) is stored within the ASAM and is decremented for every attempt at activation of a card. ASAMs are maintained in the field using a dial-up connection to a central computer (202) with a control secure application module (CSAM) (206), or using a field secure application module (FSAM) (502) that is created at a central location using the CSAM (206). Each FSAM is able to update a limited number of ASAMs. A hierarchy of keys (600) is used by the CSAM, the FSAMs and ASAMs to ensure security.

Description

CARD ACTIVATION AT POINT OF DISTRIBUTION
This application claims priority of U.S. provisional patent application No. 60/068, 196, filed December 19, 1997, entitled "Card Activation At Point Of Distribution," which is hereby incorporated by reference.
FIELD OF THE INVENTION
The present invention relates generally to smart cards. More specifically, the present invention relates to a technique for activating smart cards at a point of distribution or some time thereafter.
BACKGROUND OF THE INVENTION
Smart cards that have the ability to store value within memory on the card are often referred to as "stored value cards". Stored value cards may be either disposable or reloadable. Disposable stored value cards in particular are subject to theft because of the value they hold. Once a disposable card has been loaded with value it can be used as cash in many locations; therefore, there is a concern that the cards would be stolen once they are loaded with value.
In one scenario, cards are loaded with value and personalized by a card supplier. Once personalized and loaded with value they are "live" and are vulnerable from theft from that point on. For example, these cards are vulnerable to theft during shipment from the supplier to the issuer, while being stored at an issuer location, while present in a card dispensing machine, or at any other time before the cards are legitimately sold to a customer. If cards are sold over-the-counter rather than in a machine, they are also at risk of theft before being sold. Previous techniques to combat card theft are both expensive and time consuming.
Many card suppliers and issuers rely upon insurance to cover the costs of stolen cards. This additional insurance against card theft can be expensive and is a cost a card issuer would rather do without. To directly prevent card theft, physical security techniques have been used to protect loaded stored value cards from being stolen. For example, loaded cards might be transported in armored trucks, stored in locked vaults, etc., while making their way from a card supplier to an issuer and eventually to a legitimate customer. The costs associated with this secure transport and storage can be quite high. Further increasing these costs is the fact that there are relatively few card manufacturers in existence. Thus, loaded cards must often be transported long distances (overseas or across continents) before reaching a final region for distribution. Aside from the direct costs for the secure equipment needed to transport these cards, there are also costs associated with the manpower needed to guard these cards while being transported or stored.
While loaded stored value cards may be sold over-the-counter by an entity instead of being sold in a card dispensing machine, the control and inventory issues with over-the-counter sales can also be quite expensive. Selling cards from a machine would appear to be a cleaner and simpler solution, although expensive, secure machines are required for stored value cards that are already loaded with value. Moreover, a card dispensing machine holding hundreds of stored value cards is a temptation for a thief as each card may hold hundreds of dollars worth of value. In certain countries, stored value cards for use in telephones are sold openly on the street in machines that are particularly prone to theft.
Therefore, a technique is desirable that would not only help prevent the theft of stored value cards, but also would minimize the loss to an issuer should a card be stolen. It would further be desirable for such a technique to reduce the costs associated with stored value card security.
SUMMARY OF THE INVENTION To achieve the foregoing, and in accordance with the purpose of the present invention, a system for the secure activation of stored value cards at a point of distribution to customers is disclosed that provides greater security for stored value cards and reduces the costs associated with protecting these cards. In one embodiment of the invention, each card has a standard user mode and a security user mode. In the standard user mode the card is activated and ready for use. In the security user mode the card is not active and cannot be used in a payment terminal to make a purchase. Cards are personalized by a card supplier in either the standard user mode or in the security user mode. If shipped by the card supplier in the security user mode, the card cannot be used until it is legitimately activated in a card dispensing machine immediately prior to its sale to a purchasing customer. Advantageously, if cards are lost or stolen during any point in the transport or storage before they are activated, the card cannot be used and no loss in value occurs.
In a particular embodiment of the invention, a security code must be presented to the card before the card becomes activated. Advantageously, the security code is generated in a secure manner by a card dispensing machine or other device only under authorization by an issuer prior to the sale of the card to a customer. It is believed that cost savings per card using this technique is between $0.05 and $0.75 per card.
In another embodiment of the invention, an activation control counter (ACC) is stored within an activation secure application module (ASAM) within the card dispensing machine. The ACC is decremented for every attempt at activation of a card, successful or otherwise. The ACC limits exposure to fraud and to theft by limiting the number of times that cards may be attempted to be activated.
In a further embodiment, ASAMs are maintained in the field (i.e., within card dispensing machines) obviating the need to return an ASAM to a central location for maintenance, or the need to bring a computer to a dispensing machine. A field secure application module (FSAM) is created at the activation manager and is able to update a limited number of ASAMs. Preferably, a hierarchy of keys is used within a control secure application module (CSAM), the FSAMs and ASAMs to ensure security.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention, together with further advantages thereof, may best be understood by reference to the following description taken in conjunction with the accompanying drawings in which: FIG. 1 illustrates symbolically a stored value card activation system according to one embodiment of the invention.
FIG. 2 illustrates an example of contents of a memory of a stored value card useful for implementing an embodiment of the present invention.
FIG. 3 is a flowchart describing how a card is produced according to one embodiment of the invention.
FIG. 4 illustrates an arrangement for the creation of an activation secure application module (ASAM).
FIG. 5 is a flowchart describing one technique for the creation of an ASAM.
FIG. 6 is a flowchart describing one technique for performing maintenance of an ASAM.
FIG. 7 illustrates in greater detail a card dispensing machine.
FIGS. 8 A and 8B are flowcharts describing a process by which a card is activated within a machine using an ASAM.
FIG. 9 illustrates a scenario in which a card is activated remotely using an
ASAM.
FIG. 10 illustrates a scenario in which field maintenance is performed upon an ASAM.
FIG. 11 illustrates a key hierarchy by which FSAMs perform maintenance on a subset of all ASAMs in the field.
FIG. 12 presents one possible security embodiment illustrating the information contained within an activation manager (AM) and a CSAM.
FIGS. 13 and 14 illustrate a computer system suitable for implementing embodiments of the present invention. DETAILED DESCRIPTION OF THE INVENTION
SMART CARD BACKGROUND
The present invention is applicable to smart cards. Also termed chip cards, integrated circuit cards, memory cards or processor cards, a smart card is typically a credit card-sized plastic card that includes one or more semiconductor integrated circuits. A smart card can interface with a point-of-sale terminal, an ATM, or with a card reader integrated with a computer, telephone, vending machine, or a variety of other devices. The smart card may be programmed with various types of functionality such as a stored-value application (a "stored value card"), a credit or debit application, a loyalty application, cardholder information, etc. Although a plastic card is currently the medium of choice for smart cards, it is contemplated that a smart card may also be implemented in a smaller form factor, for example, it may attach to a key chain or be as small as a chip module. A smart card may also be implemented as part of a personal digital assistant, telephone, or take a different form. The below description provides an example of the possible elements of a smart card, although the present invention is applicable to a wide range of types of smart cards, and especially to stored value cards.
A smart card may include a microprocessor, random access memory (RAM), read-only memory (ROM), non-volatile memory, an encryption module (or arithmetic unit), and a card reader (or terminal) interface. Other features may be present such as optical storage, flash EEPROM, FRAM, a clock, a random number generator, interrupt control, control logic, a charge pump, power connections, and interface contacts that allow the card to communicate with the outside world. Of course, a smart card may be implemented in many ways, and need not necessarily include a microprocessor or other features.
The microprocessor is any suitable central processing unit for executing commands and controlling the device. RAM serves as temporary storage for calculated results and as stack memory. ROM stores the operating system, fixed data, standard routines, look up tables and other permanent information. Non-volatile memory (such as EPROM or EEPROM) serves to store information that must not be lost when the card is disconnected from a power source, but that must also be alterable to accommodate data specific to individual cards or changes possible over the card lifetime. This information includes a card identification number, a personal identification number, authorization levels, cash balances, credit limits, and other information that may need to change over time. An encryption module is an optional hardware module used for performing a variety of encryption algorithms. Of course, encryption may also be performed in software. Applied Cryptography, Bruce Schneier, John Wiley & Sons, Inc., 1996 discusses suitable encryption algorithms and is hereby incorporated by reference.
The card reader interface includes the software and hardware necessary for communication with the outside world. A wide variety of interfaces are possible. By way of example, the interface may provide a contact interface, a close-coupled interface, a remote-coupled interface, or a variety of other interfaces. With a contact interface, signals from the integrated circuit are routed to a number of metal contacts on the outside of the card which come in physical contact with similar contacts of a card reader device. A smart card may include a traditional magnetic stripe to provide compatibility with traditional card reader devices and applications, and may also provide a copy of the magnetic stripe information within the integrated circuit itself for compatibility.
Various mechanical and electrical characteristics of a smart card and aspects of its interaction with a card reader device are described in Smart Card Handbook, W. Rankl and W. Effing, John Wiley & Sons, Ltd., 1997, and are defined by the following specifications, all of which are incorporated herein by reference: Visa Integrated Circuit Card Specification, Visa International Service Association, 1996; EMV Integrated Circuit Card Specification for Payment Systems, EMV Integrated Circuit Card Terminal Specification for Payment Systems, EMV Integrated Circuit Card Application Specification for Payment Systems, Visa International, Mastercard, Europay, 1996; and International Standard; Identification Cards - Integrated Circuit(s) Cards with Contacts, Parts 1-6, International Standards Organization 1987- 1995. SYSTEM OVERVIEW
FIG. 1 illustrates symbolically a stored value card activation system 10 according to one embodiment of the invention. Included within system 10 are an issuer 20, a card supplier 22 and a card dispensing machine 24. A stored value card 30 is eventually activated using an activation key 40 and dispensed to customer 26 by machine 24.
Issuer 20 receives cards from card supplier 22 and then issues these cards to customers. Issuer 20 may be any suitable issuing entity such as a bank, financial institution, a service association, a merchant or other organization, or even an agent acting for an issuer.
Stored value card supplier 22 may be any suitable supplier of stored value cards. A card supplier may be any of a variety of card manufacturers such as Gemplus, Schlumberger, Bull, G&D, etc. The supplier often performs card initialization and perhaps personalization, depending upon the card.
Card dispensing machine 24 may be any suitable device arranged to hold stored value cards and to dispense the cards to customers. An embodiment of the invention is used to activate the cards while in the machine. By way of example, card dispensing machine (CDM) 24 is any suitable dispensing machine known in the art such as those made by G&D and Schlumberger. Such dispensing machines automatically vend stored value cards of various denominations to customers who deposit money into the machine. Stored value cards may be purchased at a card dispensing machine using cash, a credit card, a debit card or other suitable means of payment. Dispensing machines are also able to go on-line using any suitable communications network to verify funds, perform a credit transaction, debit an account, etc.
The functions of machine 24 may also be handled by a human teller using a card terminal. In this scenario, customer 26 purchases a stored value card from the teller rather than from the automatic machine. In exchange for payment from the customer, the teller inserts the purchased stored value card into the card terminal, the card is activated using an embodiment of the invention described herein, and the card is then handed from the teller to the customer. CDM 24 may also take the form of an enhanced POS terminal or a batch personalization machine. A card dispensing machine may also be associated with another device such as an ATM. Card dispensing machine 24 may also include other functionality in addition to the ability to activate and dispense stored value cards, such as the ability to reload reloadable cards and to sell merchandise.
It is also contemplated that the functionality of card dispensing machine 24 may be broken into various pieces. A simple dispensing machine or other means may be used to dispense unactivated cards to a customer who would then take the card to another card terminal to have a card activated. For example, a customer may receive an unactivated stored value card by purchase from a machine, by distribution from a bank or merchant, or through the mail. The customer may then insert the unactivated card into a card reader attached to a personal computer which then performs activation of the card using an embodiment of the invention over the Internet or other communications network. The customer may have prepaid for the card, or the card may be activated over the Internet only upon suitable payment by the customer. A customer may also take an unactivated card received from elsewhere to card dispensing machine which is then able to activate the card.
When first produced by card supplier 22, stored value card 30 is not activated, even though it may be loaded with value. (Of course, supplier 22 may also produce cards that are activated.). In conjunction with issuer activation key 40, supplier 22 produces a security code which is stored on card 30. Issuer activation key 40 is also relayed to dispensing machine 24. Card 30 may then be transported to issuer 20, stored and eventually held within machine 24 without substantial risk of theft because the card is not activated and cannot be used to make a purchase. When customer 26 interacts with machine 24 to purchase card 30, issuer activation key 40 is used within machine 24 to reproduce the security code and to activate card 30 so that the value loaded upon it is available for use. Card 30 is then dispensed to customer 26 in exchange for payment. Stored value card 30 is any suitable smart card capable of storing value. Preferably, card 30 is a memory card, although the card may also be a processor card having other functionality in addition to memory for storing value. In one specific embodiment of the invention, card 30 is a disposable stored value card. Other details for a specific embodiment of the invention are provided in "Visa International CAD/Service Payment Terminal Specification" available from Visa International, Foster City, California.
The below embodiments describe particular security implementations using certain cryptographic algorithms. In general, any suitable cryptographic technique that meets security needs may be used for the generation of keys and encryption of secret information. The below specifics are provided as one example.
CARD MEMORY EXAMPLE
FIG. 2 illustrates an example of a memory 50 for stored value card 30 useful for implementing an embodiment of the present invention. Memory 50 is representative of the possible contents of memory 50; the contents shown may be represented in other orders and forms while still encompassing the present invention. Other hardware implementations and implementations using software are also possible for memory storage. In this example, various flags, codes, versions, etc., are used to control the mode of the card for safe transport. Other secure techniques and use of keys may also be used to protect the value on a card while it is being transported and stored.
For memory cards, ISO byte HI 60 and ISO byte H2 62 are two standard bytes of information used to identify the type of card. For example, bytes 60 and 62 may be used to identify card 30 as having a particular chip. For processor and other cards, these ISO bytes are not required. An issuer identifier 64 identifies the issuer of the card. Supplier identifier 68 uniquely identifies the card supplier. Card serial number 69 is an identifying number for the card itself. Error counter 70 is a counter that counts how many times the card is presented with a security code for comparison. In one embodiment, only a certain number of tries are allowed at presenting the correct security code to the card. After these attempts are exhausted, the card will no longer accept a security code for comparison. This feature prevents an unscrupulous individual from repeatedly attempting to crack the security code of the card using automatic means such as a computer program.
Security code 72 is any suitable code stored on the card that prevents the card from being activated except by an authorized entity. If an authorized entity presents the coπect security code to the card that matches with security code 72 of memory 50, then the card may become activated. Security code 72 may have any suitable value and format. By way of example, code 72 may be a predefined constant value which is the same for all cards, or may be a value derived from card specific data that produces a unique value per card. Security code version 74 is a value assigned to issuer activation key 40 by issuer 20. This data element is provided to card supplier 22 by issuer 20 along with issuer activation key 40 to be used in the generation of security codes for cards. Security code version 74 indicates a particular version for activation key 40 and is useful when more than one version of an activation key is in use within the system. For example, issuer 20 may start using a new activation key, but cards based upon the older activation key may still be within the system waiting to be dispensed. In this scenario, security code version 74 is useful for distinguishing from amongst the various activation keys which is the appropriate key for use with card 30.
Issuer flag 76 indicates whether or not data within memory 50 may be modified. Initially set to 0 (indicating "issuer mode"), card supplier 22 is free to write data to memory 50. Issuer mode may be used to safely transport a card from a chip manufacturer to a card manufacturer (if needed). Once issuer flag 76 is set to 1, various regions within memory 50 may no longer be modified. For example, security code 72 and version 74 may not be modified once issuer flag 76 has been set to 1. Security flag 78 indicates a mode of the card. In this example, when security flag 78 is set to 0, the card is in standard user mode and may be used for purchases. When security flag 78 is set to 1, the card is in security user mode and its value may not be used. Region 80 is used for the storage of value on card 30. Other regions 82 may be used for other purposes such as additional personalization data, other codes, an authentication key, a response counter, and other data and flags. In one specific embodiment of the invention, a card may include the following modes. In issuer mode access to memory is secured by a 4-byte transport code. As discussed above, a 4-byte security code protects memory while in security user mode, and a 2-byte access code (user code) protects memory while in standard user mode. Access to particular regions of memory is allowed only after the chip has verified the code presented. For example, while in issuer mode the security code is used as a secret transport code and access is only allowed to the error counter and selected data areas. While in security user mode the issuer flag has been set and further programming of the card identification areas is not allowed. In normal use when the card is in standard user mode (issuer and security flags set), the user code must be presented before value may be decremented from the card. Preferably, various regions of memory are either ROM, PROM or EEPROM depending upon the mode. For example, personalization data is PROM while in issuer mode, but is ROM in other modes. Preferably, the issuer and security flags are PROM in all modes.
When the present invention is used with prepaid payment applications a memory card performs well. In one embodiment, the memory card includes a control unit (providing an interface to the card contacts), various flags, a memory access control unit (including an error counter, security code and user code), an authentication unit (including an authentication key and response counter), a memory unit (with EEPROM, user memory and an erase counter), and a programming unit. The authentication unit is a high security cryptology unit allowing authentication with challenge and response and an individual key.
CARDPRODUCTIONFLOWCHART
FIG. 3 is a flowchart describing how a card is produced according to one embodiment of the invention. The production of multiple cards would use the same procedure. In step 102 the card manufacturer embeds a chip into a smart card. Those of skill in the art will appreciate that this step can be performed by any suitable card manufacturer using any of a variety of chips and in many different ways. By way of example, the chip embedded into the smart card is any suitable integrated circuit and is preferably a memory chip. Examples of chips that may be used are those manufactured by Siemens. Most preferably, the embedded chip includes at least card memory map 50 of FIG. 2.
Step 104 initializes and personalizes the card. Unlike a credit card which is personalized for a particular individual, a stored value card is typically personalized by the addition of graphics to the card. Also, various data regions within memory 50 of the card are initialized. For example, regions 60 and 62 are initialized to identify the type of chip on the card, region 64 is initialized with the issuer identifier, a supplier identifier is written to region 68, and error counter 70 is initialized to 0. Preferably, at this point, security flag 78 is set to a 1 indicating that the card is in security user mode and may not be used until activated. This feature prevents a card thief from using a card that has been stolen. In addition, the card supplier stores into region 80 the particular value to be associated with the stored value card.
At this point, a security code 72 may be installed on the card to allow only an authorized party to activate the card. Generation of a security code, its particular value and its installation on the card may be performed in a wide variety of manners. By way of example, the following steps provide one technique for the generation and installation of a security code.
In step 106, the issuer generates an issuer activation key 40. Although the key may be generated by any party, generation of the key by the issuer allows the issuer to keep control over which parties have access to the key and which cards may be activated using the key. Key 40 may be any suitable encryption key useful for generating a security code. By way of example, key 40 is a double-length data encryption standard (DES) key. Also generated at this time by the issuer is a version number of the key. Although any number of activation keys may be generated by an issuer, preferably one activation key is generated per card supplier. In another embodiment of the invention, an activation key is generated for each batch of cards that will be produced by a card supplier. In step 108, the issuer provides the activation key and its version number to the card supplier.
In step 110, the card supplier generates a security code for the card using the activation key and version number received from the issuer. A security code may be generated from an activation key in a wide variety of manners. Any data may be combined with the key using any suitable encryption algorithm under any suitable encryption standard to produce a security code. Furthermore, the security code may be the same for all cards from an issuer, may be the same for all cards received from a particular supplier, may differ only amongst batches of cards from a particular supplier, or may even be a unique value for each card produced by a card supplier. By way of example, one specific embodiment of the present invention uses the following formula for generation of a unique security code for each stored value card produced. The first data elements 60-69 of memory 50 of a stored value card are encrypted under a triple-DES algorithm in Electronic Code Book (ECB) mode using the issuer activation key. The four most significant bytes from the result of this encryption are kept and used as the security code for the card. In this fashion, a security code unique to this card is produced. Of course, the security code may be generated from other information on the card and/or may use other keys.
In step 112, this newly generated security code is installed on the card in data region 72 of memory 50. In addition, the activation key version number received from the issuer is also stored as security code version 74 in memory 50. A hardware implementation of the stored value card prevents changing the card from security user mode to standard user mode unless the security code is presented to the card. In this fashion, the card cannot be used until an authorized entity is able to generate and provide the security code to the card. This security measure may also be performed in software for cards having that capability.
In step 114, issuer flag 76 is set to a value 1 to indicate that sensitive data within memory 50 of the card may no longer be modified. Through hardware implementation, setting this flag prevents the later modification of sensitive data on the card such as security code 72, version 74, etc. A software implementation may also be used to monitor flag 76. Data that needs to be changed for the use of the card such as value 80 may still be modified. At this point, the stored value card has been loaded with value that is the equivalent of cash, but the card has not yet been activated so it may be safely transported to the issuer and stored. In step 116, cards produced by the card supplier are delivered to the issuer for distribution to customers. A stored value card may be implemented using a variety of techniques to protect or otherwise prevent access to the value on the card. Card authentication of the terminal may be required before value may be decremented. In some situations, authentication is not required. Under normal usage when authentication is required, a card access code (or user code) is supplied to the stored value card in order to decrement value on the card (i.e., use the card). In one embodiment of the invention, hardwired logic of the integrated circuit on the card is used to perform this function. Hardwired logic on the card accepts the card access code, verifies it is correct and then allows access to the value on the card. Such hardwired logic that processes a card access code is well known in the art. Software within a card may also be used to verify a user code. For processor cards, it is also possible that this step of authentication be performed using cryptographic signatures instead of a user code.
In an embodiment of the present invention, value may not be decremented if the card is in security user mode (i.e., if security flag 78 is set). The card must be placed in standard user mode (i.e., reset security flag 78) before value can be decremented. In other words, security flag 76 must be reset to place the card into standard user mode before the card access code can be allowed to decrement value on the card. Although in this embodiment, the above functionality is implemented in hardware on the integrated circuit, this functionality could also be implemented in software. For example, software contained within the memory of a memory card or within a processor card may also perform the functions of determining whether a card is in security user mode, and then receiving and comparing a card access code.
Those of skill in the art will be able to implement this functionality using any of a variety of types of software upon many types of integrated circuits. This functionality could also be implemented outside the card within a card terminal or computer in communication with the card. In this scenario, software outside the card would perform the functions of comparing, setting, resetting, allowing access, etc., and would determine when it is appropriate to allow the value on the card to be accessed. ASAM CREATION AND MAINTENANCE
FIG. 4 illustrates an arrangement 200 for the creation of an activation secure application module (ASAM). An ASAM will be used by a card dispensing machine to activate cards in a secure manner. ASAM creation uses a process described in FIG. 5 that initializes and personalizes the ASAM. Arrangement 200 illustrates an activation manager 202 under control of a user 204 which is in communication with both control secure application module (CSAM) 206 and an activation secure application module (ASAM) 208.
Activation manager 202 may be any suitable controlling device arranged to securely initialize and personalize ASAM 208. By way of example, application manager 202 is implemented as a software application running on a personal computer or other host device. Alternatively, activation manager 202 may be implemented on a laptop computer for portability, or may even be implemented inside a card dispensing machine or other activation device that would allow user 204 to create and/or perform creation and maintenance of an ASAM from a remote site using a communications link.
CSAM 206 is a secure module used by activation manager 202 for the creation of ASAM 208. CSAM 206 may be implemented in a variety of manners including as a smart card based secure application module (SAM) or as a hardware security module (HSM). A hardware security module (HSM) is used to facilitate cryptographic processing and typically stores secret keys and encryption algorithms, performs cryptographic functions on secret data and generates session keys and signatures. As is known in the art, an HSM is generally a tamper proof device, which uses some level of physical security measures to protect the sensitive information inside. An HSM may be any security module used in the industry, such as a RACAL HSM Model RG7000, or the security box attached to automatic teller machines. In alternative embodiments, HSM 130 may be implemented on a smart card within a card reader, on a series of smart cards, may be implemented on any suitably secure computer, or may be implemented in software. A variety of data is managed by activation manager 202 for the creation of ASAM 208. Included is a system master key 212 used to derive a zone key for each ASAM, user passwords 214 that allow initiation of ASAM maintenance, a table of all current issuer activation keys 216, along with their identifying indices, and a table of all active ASAMs 218. Each entry in the table provides the ASAM identifier and the desired maximum value for the ACC. Preferably, these keys and passwords are stored securely. In one embodiment, sensitive keys and passwords are stored within CSAM 206, while in another embodiment, this information is stored within database 210 accessible by CSAM 206 and is in encrypted under a local master key (LMK) of CSAM 206. Database 210 may also be located within activation manager 202, at a remote site or in any other suitable location.
Preferably, system master key 212 has an associated version number and is changed periodically. More preferably, activation manager 202 is able to maintain at least two system master keys. System master key 212 is used to derive a zone key for secure communication with an ASAM. Based upon the version number, an ASAM maintenance process (as described below in FIG. 6) is able to determine whether the zone key in the ASAM should be replaced. Activation manager 202 also has the ability to generate new activation keys when required and to delete keys. In one embodiment, activation keys are double-length DES keys that are stored securely. Furthermore, activation manager 202 preferably exports activation keys to a card supplier in a secure manner.
ASAM 208 is preferably implemented on a smart card for affordability, but may also be implemented as an HSM. It has the functionality as described below.
FIG. 5 is a flowchart describing one technique for the creation of ASAM 208. Creation of an ASAM refers to the initialization and personalization of the ASAM. Once an ASAM has been created, it is ready to be used within a card dispensing machine to activate cards within the machine when sold.
In step 252, ASAM 208 is initialized with any parts of the software application needed for its operation within a card dispensing machine; preferably the software is loaded into an EEPROM within the ASAM. Additionally, any data and/or file structures needed by the ASAM are also loaded at this time.
In step 254, the ASAM is loaded with an initialization key. This initialization key will be used to encrypt the zone key to be loaded into the ASAM subsequently. The initialization key may be loaded using any suitable technique and use any encryption standard. In a cuπently-preferred embodiment, DES is used. Although the initialization key may be different for each ASAM for an issuer, preferably all ASAMs for an issuer use the same initialization key. In one specific embodiment, the initialization key is loaded by providing multiple portions of data to the ASAM. Once inside the ASAM, an XOR is performed on these multiple portions of data with the result forming the initialization key. The key is then stored within the ASAM within a secure location. Using an initialization key to encrypt the zone key allows the zone key to be transmitted and loaded in a secure fashion.
At this point, initialization is complete and personalization of the ASAM may begin. In a preferred embodiment, before personalization can begin user 204 is required to provide a password to activation manager 202. Once personalized, ASAM 208 may be loaded with activation data using, for example, the process described in FIG. 7.
In step 256, ASAM 208 is assigned a unique identifier. Preferably, activation manager 202 determines a unique ASAM identifier which is assigned and loaded into ASAM 208. In step 258, ASAM 208 is assigned a maximum allowed value for its application control counter (ACC). The ACC limits the amounts of times that ASAM 208 may attempt to activate the stored value card. Use of the ACC thwarts unscrupulous individuals who are either trying to break the security code on a card using an ASAM, or who have illegally acquired a card dispensing machine and are attempting to activate a large number of cards using a single ASAM. This maximum allowed value for the ACC is loaded into ASAM 208.
In step 260, a zone key is installed on ASAM 208. As mentioned previously, a zone key is a cryptographic key used to secure communications between two nodes. In this embodiment, the zone key to be installed on ASAM 208 permits future secure communications between ASAM 208 and CSAM 206. The zone key may be installed and derived using a wide variety of techniques. In a preferred embodiment of the invention, the following steps are used. Activation manager 202 first requests the zone key from CSAM 206; this request includes the user password and the ASAM identifier. Upon validation of the user password by CSAM 206, CSAM 206 generates the zone key for ASAM 208. The zone key is then encrypted under the initialization key and provided to activation manager 202 in response to its request. Activation manager 202 then sends a "LOAD ZONE KEY" command to ASAM 208 along with the encrypted zone key. ASAM 208 then decrypts the zone key and replaces the initialization key with the zone key.
It will be appreciated that the zone key may be derived in any manner. By way of example, the zone key is a double-length DES key shared between ASAM 208 and CSAM 206 that is unique to ASAM 208. The zone key may be derived using the following algorithm. A first key is produced by encrypting the ASAM identifier (padded with zeroes) using the system master key under a triple DES algorithm. A second key is produced by encrypting the ones complement of the ASAM identifier (padded with zeroes) using the system master key under a triple DES algorithm. The zone key is then constructed using a concatenation of the first key and the second key. Once ASAM 208 has been initialized and personalized (ASAM creation), maintenance of ASAM 208 may be performed.
FIG. 6 is a flowchart describing one technique for performing maintenance of ASAM 208. In one embodiment of the invention, maintenance of ASAM 208 is performed under the control of activation manager 202 while in communication with CSAM 206. Maintenance may occur using a dial-up connection between the card dispensing machine that incorporates ASAM 208 and the computer hosting activation manager 202, or by physically bringing ASAM 208 to activation manager 202 and placing it in a card reader locally attached to the activation manager. Alternatively, it is possible to bring a portable computer hosting activation manager 202 along with CSAM 206 to the site of a card dispensing machine to perform maintenance of ASAM 208. ASAM 208 contains data that is preferably updated from time to time including: a zone key used for secure communication with activation manager 202, a set of issuer activation keys, and an activation control counter (ACC). Of course, before ASAM 208 is used for the first time, a procedure similar to that described in FIG. 6 is used to install a zone key, install a set of issuer activation keys, and to set the activation control counter to a particular value. For example, when ASAM 208 is readied to be placed in the field, the procedures of FIGS. 5 and 6 may be performed to prepare ASAM 208 for the activation of stored value cards in a card dispensing machine. Once ASAM 208 is being used in the field and maintenance is desired, the procedure of FIG. 6 may be used to perform this maintenance.
In step 270, user 204 supplies the appropriate password to allow ASAM maintenance to occur. In step 272, data from ASAM 208 is retrieved to allow for proper maintenance. This data includes the ASAM identifier, a list of issuer activation keys, the current value of the activation control counter, its maximum value, and the current zone key version number.
Step 274 determines whether a new zone key is required by inspecting the current zone key version retrieved from ASAM 208. If a new key is required (or if this is first time maintenance) then step 276 updates the zone key. Step 276 may be performed in many ways. In one specific embodiment, an update command to replace the ASAM zone key is used that includes a new zone key version number, a new double-length zone key and a zone key check value. Preferably the entire command data is encrypted. The response from ASAM 208 is the new zone key version number and the zone key check value both in the clear. Preferably, the new zone key is encrypted under the old zone key.
Step 278 determines whether any issuer activation keys are obsolete and may need to be deleted. If so, step 280 updates the issuer keys in ASAM 208. Step 280 may be performed in many ways. In one specific embodiment, an update command to delete various issuer activation keys is provided to ASAM 208. This command includes a variable length list of key indices indicating which keys to delete. Step 282 determines whether new issuer activation keys should be added to ASAM 208. New keys might need to be added if the issuer has come out with new versions or if ASAM 208 is being maintained for the first time. If so, step 284 adds a new issuer key or keys to ASAM 208. Step 284 may be performed in many ways. In one specific embodiment, an update command to add an issuer activation key is performed for each key to add. This command uses a block for each key being added that includes a new issuer activation key version number, a new double-length issuer activation key and an activation key check value. Preferably the entire command data is encrypted. The response received from ASAM 208 is one block for each key successfully added and includes both the key version number and the key check value in the clear. Preferably the new activation keys and associated information are encrypted under the current zone key.
Step 286 determines whether the activation control counter (ACC) should be updated. For example, before ASAM 208 is released to the field, it will need to have its ACC value set. Also, if a card dispensing machine using ASAM 208 has been activating a great deal of cards, it is possible that its ACC value is approaching the maximum ACC value allowed for ASAM 208. If so, it may be desirable to update the ACC value to a new value. Advantageously, the ACC value can be set to a particular value depending upon the environment in which the card dispensing machine is located. For example, for the interior of a rapid transit station that has good security and may sell an extremely large quantity of low- value cards, it may be desirable to set the ACC value to a fairly high number. Because the cards have lower value and the machine is located in a secure area, the risk is less and the ACC may be set higher. For a card dispensing machine located on the street, however, it may be desirable to set the ACC to a lower value due to the increased risk of theft of the machine.
If the ACC value is to be updated, step 288 loads a new ACC value into ASAM 208. Step 288 may be performed in many ways. In one specific embodiment an update command to load a new ACC value is used. This command includes the new ACC value and the current ACC value. At this point, maintenance of ASAM 208 is complete. Communication of commands and responses between Activation Manager (AM) 202 and ASAM 208 may be performed using many different protocols. In one embodiment of the invention, the update of steps 276, 280, 284 and 288 begins with an initialize update command from AM 202 to ASAM 208. Preferably this command sends the CSAM identifier and in turn return receives the ASAM identifier, the update transaction counter (NTU), and the zone key version number (VKZ).
When processing the initialize update commands, preferably ASAM 208 uses the internal update transaction counter to keep track of how many updates are being requested. This feature provides additional security. The internal counter is incremented for each requested update; once its maximum value is reached, a response code indicating that fact is returned to AM 202 instead of the normal response to an initialize update command. Preferably the internal update transaction counter is implemented so that it does not roll over when it reaches its maximum value.
Once AM 202 receives a response to its initialize update command, it sends an update command (as described above) along with a message authentication code (MAC) and receives in return response data and a completion code from ASAM 208. Once the update command is received by ASAM 208, it copies its internal update transaction counter to permanent storage and verifies the MAC. It then performs the requested update (of issuer keys, ACC value or zone key) and returns a response to the command as has been described above. If any error occurs during MAC verification or during the update, an appropriate response is returned to AM 202. Once AM 202 has received a response to its update command, it validates this received response data. Any errors occurring during any of the initialize update, update command or validate commands result in an error condition code being set.
Although the data integrity of each update command may be protected in many ways, preferably a message authentication code (MAC) is used. The MAC is generating using the ASAM zone key using a block cipher algorithm often referred to as CBC mode. In a currently-preferred embodiment, generation is performed as described in the reference "ISO/IEC 9797," second edition, or may be performed as described in the reference ANSI X9.19, 1996.
Similarly, the data and commands that update keys may be encrypted in a variety of ways. In a currently-preferred embodiment, encryption is performed using DES in ECB mode with a single-length session key as defined in the reference "ANSI X3.92," although other techniques may also be used. The session key is derived from the ASAM zone key using the following algorithm. The CSAM identifier, ASAM identifier and internal transaction update counter are concatenated together and encrypted using the zone key under the triple DES encryption algorithm to obtain the session key. Furthermore, for every key that is updated, a check value is included in the encrypted data. The check value is calculated by using triple DES to encrypt an 8- byte block of binary zeroes. The check value in the clear is returned to the activation manager to validate that the data was received and decrypted correctly. Check values may be calculated in other ways as well.
Once ASAM 208 has been maintained properly for the first time and is present within a card dispensing machine, it is ready to begin activation of stored value cards within the machine.
CARD ACTIVATION
FIG. 7 illustrates card dispensing machine 24 in greater detail. Included within machine 24 are an ASAM 208 and any number of stored value cards 30 ready to be activated and dispensed to customers. For ease of explanation, ASAM 208 and card 30 are shown enlarged outside machine 24. Machine 24 controls the card activation process using ASAM 208 to store issuer activation keys and to calculate card security codes necessary to activate stored value cards. In a typical situation, a customer purchasing a card at machine 24 receives a card dispensed from the machine once the card has been activated using ASAM 208.
FIGS. 8 A and 8B are a flowchart describing a process by which card 30 is activated within machine 24 using ASAM 208. The process of FIGS. 8 A and 8B is initiated when a customer makes a purchase of a stored value card from machine 24. In step 302 machine 24 reads card type data from card 30. In this particular embodiment, type information is stored in the memory 50 of card 30, namely byte HI 60 and byte H2 62. These bytes indicate the type of chip used within card 30 and indicate whether or not this card is suitable for activation. For processor and other types of cards, these bytes may not be required; step 302 would then not be required or another technique may be used to determine the type of the chip.
Based upon the card type data, step 304 determines whether this card is suitable to be activated. In this specific embodiment, step 304 determines whether card 30 has embedded within it a particular type of chip. If so, this indicates that the card may be either in a security user mode or a standard user mode. If the card is not the coπect type, then in step 314 the card is simply dispensed to the customer, assuming that payment has been made. A card that is not suitable for activation is presumably already activated and may be dispensed straight away.
Step 306 reads additional relevant data from card 30 useful for activating the card. This additional data includes the issuer identifier, the card supplier identifier, the version number of the issuer activation key and the security flag. Step 308 determines whether the card is in security user mode by checking the retrieved security flag. If not in security user mode, then the card is already in standard user mode and need not be activated. The card is then dispensed to the customer in step 314.
If, however, card 30 is in security user mode, then the appropriate security code for card 30 is retrieved from ASAM 208. The security code retrieved from ASAM 208 will be used to activate card 30. The security code may be retrieved from ASAM 208 or other suitable secure device in a wide variety of manners. By way of example, FIG. 8B describes one technique for retrieving the security code. In step 312 the retrieved security code is presented to card 30 to activate the card.
Verification by card 30 that the security code presented to it is the same security code present within the memory of the card may be performed using different techniques. In a preferred embodiment of the invention, as described above, the chip on card 30 is implemented to compare a presented security code with the security code already stored on the card. Implementation of this comparison in hardware can be performed by those skilled in the art of chip implementation. In other embodiments, software resident on card 30 may perform the comparison and the activation of the card, or another secure device (such as ASAM 208 or machine 24) may compare the security codes and activate card 30 upon success.
In a prefeπed embodiment, the security code is verified and the card activated using the following procedure. First an address reset of the card is performed. Next, the error counter is incremented by one by setting the next free bit in error counter 70. For example, if eπor counter 70 has 4 bits only 4 tries are allowed to activate card 30. This feature prevents unauthorized attempts to activate a card over and over again using automatic means. Next, the security code retrieved from ASAM 208 is presented to card 30. The security code is presented at the I/O pin of the card bit-by- bit. The card compares the received security code bit-by-bit to that stored in its memory. If successful, the next step is to erase the eπor counter. Successfully erasing error counter 70 indicates that the presented security code has been verified by card 30. Preferably an erase operation is applied to the error counter bits in memory. If the security code has been correctly entered the eπor counter is allowed to be erased. A successful erase operation can be used as an indication of a successful security code verification. If the comparison was unsuccessful, the chip does not allow the error counter to be erased; the error counter then indicates how many unsuccessful comparisons have been tried (up to four). Next, security flag 78 on card 30 is set to 0 to indicate regular user mode. Setting the security flag will not be possible unless the presented code has been verified.
At this point, card 30 is now activated and ready for use. Finally, security code 72 on card 30 is erased. This erasure prevents an unscrupulous party from later reading the security code. Once card 30 has been activated, the card is dispensed to the customer in step 314. If activation is unsuccessful, the card is rejected and flagged as unusable within machine 24.
FIG. 8B is a flowchart describing one technique by which step 310 of FIG. 8 A may be performed. In step 310, machine 24 requests the security code from ASAM 208. ASAM 208 manages security for the activation process. In addition to providing secure key management, ASAM 208 also provides the activation control counter (ACC) that limits exposure to fraud and theft by limiting the number of cards that ASAM 208 may activate.
Step 320 determines whether the ACC is equal to 0. If so, this indicates that the maximum number of cards has already been activated by ASAM 208 and no more cards may be activated. Accordingly, step 322 returns a negative response indicating that card 30 will not be activated and step 310 is done. If, however, the maximum number has not yet been reached, then step 324 subtracts 1 from the ACC.
Using data previously read from card 30, step 326 selects the appropriate issuer activation key with which to derive the card security code. Preferably, a key index based upon the issuer identifier, the card supplier identifier, and the activation key version number is used to select the appropriate activation key. Such an index is useful as there may be numerous activation keys available with an ASAM 208 for use. For example, each issuer may use a different activation key, and may use different activation keys for different suppliers as well as different keys for different batches from the same supplier. Furthermore, there may be different versions of an activation key. Once the appropriate issuer activation key has been selected, step 328 derives the card security code in the same manner and using the same information as in step 110 of FIG. 3. Because the same activation key is used, along with the same information for the card, an identical security code will be derived. Finally, step 330 returns this derived security code back to machine 24 for presentation to card 30.
Other embodiments are also suitable for activating card 30 using ASAM 208. For example, card 30 may be dispensed from a machine or received by a customer in another fashion while still in security user mode. The customer may later present card 30 to a suitable activation device including ASAM 208 and have the card activated at that point using a similar process as shown in FIGS. 8 A and 8B. Furthermore, such activation could take place at a merchant location, kiosk or other public site where an activation device is located, or it could take place using any suitable computing device with a network connection. For example, the functionality of machine 24 could be split over the Internet. In this example, a customer inserts an unactivated card into a card reader attached to a personal computer in the home or office. From this location, card 30 communicates through the personal computer over the Internet to ASAM 208 located in a remote location. Commands and communication may still flow between card 30 and ASAM 208 in a similar fashion as described above, except that the two devices would be remote from one another. Other scenarios in which card 30 may be activated are also possible.
FIG. 9 illustrates a scenario 400 in which card 30 is activated remotely using ASAM 208. Scenario 400 shows user computer 402 in communication with any suitable computing device 404 over any suitable telecommunications link 406 such as the Internet. Associated with user computer 402 is card 30 present in a card reader device attached to computer 402. In a similar fashion, ASAM 208 is either located in a card reader device attached to computing device 404, or is implemented within a card dispensing machine 24 or other device having similar functionality.
FIELD MAINTENANCE OF ASAM
FIG. 10 illustrates a scenario 500 in which field maintenance is performed upon ASAM 208. In this embodiment, field secure application module (FSAM) 502 is present within card dispensing machine 24 and is able to perform maintenance of ASAM 208 in the field.
The previous embodiment of FIGS. 4 and 6 illustrates maintenance of
ASAM 208 performed by activation manager 202 under control of CSAM 206. This embodiment contemplates either that ASAM 208 be physically present in a card reader device attached to AM 202, or that there is a telecommunications link between AM 202 and a card dispensing machine in which ASAM 208 is present. In other scenarios, however, it may be desirable to maintain ASAM 208 in the field without the need for a telecommunications link back to AM 202 or requiring that ASAM 208 be physically transported back to AM 202. For example, many card dispensing machines may not have the functionality to communicate with AM 202 over a secure link to perform ASAM maintenance and/or it may be difficult or expensive to return ASAM 208. Because a card dispensing machine is visited regularly by a service technician for physical maintenance (for removing cash and/or replenishing stored value cards) it would be advantageous to perform maintenance of the ASAM at the same time.
To these ends, FSAM 502 can be carried by a service technician to card dispensing machine 24 when it is serviced and inserted into a card reader device attached to machine 24. The maintenance process of ASAM 208 is then controlled by code within FSAM 502. FSAM 502 may be any suitable device similar to CSAM 206 for performing maintenance of an ASAM. For example, FSAM 502 could be a hardware security module, although preferably it is implemented on a smart card.
From the ASAM's point of view, the maintenance process remains the same. AM 202 will now be responsible for the creation and maintenance of FSAMs, as well as the creation of ASAMs. With the exception of the differences noted below, the creation and maintenance of an FSAM may be performed in a similar manner to that previously described in FIGS. 4-6 above.
In one embodiment, FSAM creation and maintenance includes the following differences from that of ASAM creation and maintenance. When a zone key is first loaded or replaced in an FSAM, the FSAM will maintain both the new zone key and the old zone key to insure it can still communicate with ASAMs using the previous zone key. Additionally, each FSAM will carry a maximum ACC value and a current ACC value similar to those carried by ASAMs. Each time an FSAM loads a new ACC value into an ASAM, it will decrement its own current ACC value by a corresponding amount. When its own ACC current value is 0, it can no longer perform maintenance on ASAMs. This added level of security limits the number of cards that an FSAM can permit an ASAM to activate.
One of the advantages of using an FSAM to perform field maintenance is that functionality normally controlled by CSAM 206 may be delegated to various FSAMs such that ASAMs may be maintained more efficiently in the field. Nevertheless, delegation of this authority comes with additional risk. To reduce the risk involved with allowing FSAMs to perform maintenance in the field, it is preferable to delimit the scope of maintenance that a single FSAM may perform. This limiting of scope may be performed in different ways.
By way of example, FIG. 11 illustrates a scenario 600 by which FSAMs are only able to perform maintenance on a subset of all ASAMs in the field. Scenario 600 illustrates CSAM 601 having created FSAMs 602-606. FSAM 602 is considered the parent of and is responsible for the maintenance of any number of ASAMs 610. In a similar fashion, FSAMs 604 and 606 are responsible for any number of ASAMs 612 and 614 respectively. Associated with CSAM 601 is a master zone derivation key 620 used for deriving zone keys for FSAMs and ASAMs. Using the appropriate FSAM identifier, master key 620 is used to derive the field zone keys 630, one per FSAM. Each FSAM field zone key in turn is used to derive the zone keys 640 for each ASAM of which it is the parent. For example, the ASAM identifier of each ASAM 610 is used in conjunction with the field zone key for FSAM 602 to derive the unique zone key for each ASAM 610. As previously described, this zone key is used for secure communication between one of the ASAMs 610 and FSAM 602. In a similar fashion, the field zone key for FSAM 602 is used for secure communication between FSAM 602 and CSAM 601. When AM 202 is creating a particular ASAM, it performs extra steps. It first assigns a particular ASAM to one FSAM. It then derives the FSAM zone key, and from that derives the appropriate ASAM zone key. In this fashion, CSAM 601 delegates authority for maintaining ASAMs in the field, but does so for each FSAM with a limited scope.
As an FSAM is now maintaining an ASAM in the field inside a card dispensing machine, it is preferable that a card dispensing machine include a subset of the software previously implemented on AM 202 to assist with maintenance of the ASAM. Alternatively, an FSAM may be a sophisticated processor card that includes all of the control logic and software for controlling maintenance of an ASAM.
SECURITY EMBODIMENT
FIG. 12 presents one possible security embodiment illustrating the information contained within AM 202 and CSAM 206. Scenario 700 illustrates activation manager 202 having associated information 701 and in communication with CSAM 206. Local master key (LMK) 702 is stored securely within CSAM 206 providing a secure location for this important key. As will be appreciated, CSAM 206 is a secure module or card with which it is necessary to create and maintain ASAMs and FSAMs.
As mentioned previously in FIG. 4, information 701 associated with activation manager 202 may be stored within CSAM 206 or in a secure database that is accessible only with authorization from CSAM 206, such as by using local master key 702. User passwords 710 are required for individuals wishing to use AM 202 to perform creation and maintenance. Activation keys 712 are stored in conjunction with an activation key index 714 that includes as indices the issuer identifier, the card supplier identifier and the activation key version number. Master zone derivation keys 716 are used to derive field zone keys for any number of FSAMs. There may be one master zone key, or there may be many. ASAM table 718 includes a list of all active ASAMs along with each ASAM identifier, its maximum permitted ACC value, and its associated parent FSAM. In this fashion, AM 202 has all relevant information at its disposal for the creation and maintenance of ASAMs and FSAMs.
COMPUTER SYSTEM EMBODIMENT
FIGS. 13 and 14 illustrate a computer system 900 suitable for implementing embodiments of the present invention. FIG. 13 shows one possible physical form of the computer system. Of course, the computer system may have many physical forms ranging from an integrated circuit, a printed circuit board and a small handheld device up to a huge super computer. Computer system 900 includes a monitor 902, a display 904, a housing 906, a disk drive 908, a keyboard 910 and a mouse 912. Disk 914 is a computer-readable medium used to transfer data to and from computer system 900.
FIG. 14 is an example of a block diagram for computer system 900. Attached to system bus 920 are a wide variety of subsystems. Processor(s) 922 (also refeπed to as central processing units, or CPUs) are coupled to storage devices including memory 924. Memory 924 includes random access memory (RAM) and read-only memory (ROM). As is well known in the art, ROM acts to transfer data and instructions uni-directionally to the CPU and RAM is used typically to transfer data and instructions in a bi-directional manner. Both of these types of memories may include any suitable of the computer-readable media described below. A fixed disk 926 is also coupled bi-directionally to CPU 922; it provides additional data storage capacity and may also include any of the computer-readable media described below. Fixed disk 926 may be used to store programs, data and the like and is typically a secondary storage medium (such as a hard disk) that is slower than primary storage. It will be appreciated that the information retained within fixed disk 926, may, in appropriate cases, be incorporated in standard fashion as virtual memory in memory 924. Removable disk 914 may take the form of any of the computer-readable media described below.
CPU 922 is also coupled to a variety of input/output devices such as display 904, keyboard 910, mouse 912 and speakers 930. In general, an input/output device may be any of: video displays, track balls, mice, keyboards, microphones, touch- sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, biometrics readers, or other computers. CPU 922 optionally may be coupled to another computer or telecommunications network using network interface 940. With such a network interface, it is contemplated that the CPU might receive information from the network, or might output information to the network in the course of performing the above-described method steps. Furthermore, method embodiments of the present invention may execute solely upon CPU 922 or may execute over a network such as the Internet in conjunction with a remote CPU that shares a portion of the processing.
In addition, embodiments of the present invention further relate to computer storage products with a computer-readable medium that have computer code thereon for performing various computer-implemented operations. The media and computer code may be those specially designed and constructed for the purposes of the present invention, or they may be of the kind well known and available to those having skill in the computer software arts. Examples of computer-readable media include, but are not limited to: magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROMs and holographic devices; magneto-optical media such as floptical disks; and hardware devices that are specially configured to store and execute program code, such as application-specific integrated circuits (ASICs), programmable logic devices (PLDs) and ROM and RAM devices. Examples of computer code include machine code, such as produced by a compiler, and files containing higher level code that are executed by a computer using an interpreter.
Although the foregoing invention has been described in some detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims. For instance, the activation key can be used directly or in combination with other codes and/or encryption algorithms to provide a security code for a card. Any entity may perform the roles of supplier and/or issuer. Also, the card dispensing machine may form part of a larger machine, or may be functionally divided over a computer network. In addition, any suitable smart card capable of being placed into a security mode may be used. A security code may be generated by an ASAM during activation or by another secure hardware device, or also in software. A security code may even be allowed to be entered manually in order to activate a card. Therefore, the described embodiments should be taken as illustrative and not restrictive, and the invention should not be limited to the details given herein but should be defined by the following claims and their full scope of equivalents.

Claims

1. A system for securely activating a stored value card at a point of distribution, said system comprising:
a card dispensing machine that holds stored value cards from an issuer;
a stored value card contained within said card dispensing machine, said stored value card including
a stored value, and
a card security code arranged to prevent access to said stored value on said card, said card security code being derived from an issuer key;
a secure application module that includes
said issuer key, and
an encryption module used to derive said card security code from said issuer key;
whereby said card dispensing machine is arranged to retrieve said card security code from said secure application module for presentation to said stored value card, said stored value card then being activated.
2. A system as recited in claim 1 wherein said stored value card further includes unique information to said stored value card, and wherein said encryption module of said secure application module is arranged to derive said card security code from said issuer key and said unique information.
3. A method for securely activating a stored value card contained within a card holding device, said method comprising: determining whether said stored value card is in a security mode, said stored value card including a card security code;
deriving said card security code using a secure application module and an issuer key;
presenting said derived card security code to said stored value card;
activating said stored value card such that value on said stored value card is available for use; and
dispensing said stored value card from said card holding device.
4. A method as recited in claim 3 further comprising:
reading unique information from said stored value card; and
deriving said card security code using said unique information and said issuer key.
A method as recited in claim 3 further comprising:
determining whether an activation control counter of said secure application module has reached a limit; and
wherein when it is determined that said activation control counter has reached said limit, aborting said method to activate said stored value card.
6. A system for securely activating stored value cards at a point of distribution, said system comprising:
an issuer of stored value cards, said issuer producing a secret activation key;
a card supplier that receives said secret activation key from said issuer, said card supplier deriving a plurality of card security codes based upon said secret activation key; a batch of stored value cards produced by said card supplier, each stored value card of said batch having written upon it one of said card security codes derived from said secret activation key, each stored value card further being placed in a security mode such that a value of each card is unavailable for use; and
a secure application module that includes said secret activation key from said issuer, said secure application module being arranged to derive said card security codes using said secret activation key; and
a card dispensing machine that stores said batch of stored value cards and includes said secure application module, said card dispensing machine being arranged to query said secure application module for one of said card security codes and to present said card security code to one of said stored value cards, whereby said stored value card is taken out of said security mode and is available for use.
7. A system as recited in claim 6 wherein each stored value card further includes unique information, and wherein each card security code on each card is derived from said secret activation key and said unique information from each card.
8. A method for producing a stored value card that may be activated at a point of distribution, said method comprising:
producing a stored value card having a value stored thereon;
receiving an activation key from an issuing entity;
generating a security code for said stored value card using said received activation key;
installing said generated security code on said stored value card;
placing said stored value card into a security mode such that said value is unavailable for use; and
delivering said stored value card to said issuing entity, whereby said stored value card is delivered in a secure fashion as said value is unavailable for use.
9. A method as recited in claim 8 wherein said element of generating further includes:
reading unique information from said stored value card; and
deriving said security code using said unique information and said received activation key.
10. A system for creating an activation secure module for activating stored value cards, each stored value card being unusable unless presented with a card security code, said system comprising:
a database that securely stores an activation key, said activation key being necessary for activating said stored value cards;
a control secure module arranged to securely access said activation key;
an activation secure module aπanged to store securely said activation key, and including an encryption module for deriving said card security codes from said activation key;
an activation manager computer in communication with said database, said control secure module and said activation secure module, said activation manager computer being aπanged to transfer said activation key from said database via said control secure module to said activation secure module, whereby said activation secure module is capable of producing said card security codes using said activation key.
11. A system as recited in claim 10 wherein said activation secure module further includes:
an activation control counter that limits the number of stored value cards that said activation secure module may activate.
12. A system as recited in claim 10 wherein said activation secure module further includes: a zone key that allows secure communication between said activation secure module and said control secure module.
13. A method for creating an activation secure module useful for activating stored value cards, said stored value cards each requiring a card security code before their value is accessible, said method comprising:
placing an activation manager computer into communication with a control secure module and said activation secure module;
retrieving an activation key from a database using said control secure module, said activation key being necessary for activating said stored value cards;
loading encryption software into said activation secure module to allow said activation secure module to produce said card security codes using said activation key;
transferring said retrieved activation key to said activation secure module, whereby said activation secure module is capable of producing said card security codes using said activation key.
14. A method as recited in claim 13 further comprising:
loading a maximum value for an activation control counter into said activation secure module, said activation control counter limiting the number of stored value cards that said activation secure module may activate.
15. A method as recited in claim 13 further comprising:
loading a zone key into said activation secure module, said zone key allowing secure communication between said activation secure module and said control secure module.
16. A system for maintaining in the field an activation secure module useful for activating stored value cards, each stored value card being unusable unless presented with a card security code, said system comprising: a field secure module storing an activation key, said activation key being necessary for activating said stored value cards;
an activation secure module arranged to store securely said activation key, and including an encryption module for deriving said card security codes from said activation key;
a card dispensing machine arranged for storing said stored value cards, said card dispensing machine including said activation secure module, said card dispensing machine being arranged to transfer said activation key from said field secure module to said activation secure module, whereby said activation secure module is capable of producing said card security codes using said activation key.
17. A system as recited in claim 16 wherein said activation secure module further includes an activation control counter that limits the number of stored value cards that said activation secure module may activate, and wherein said field secure module includes a new maximum value with which to update said activation control counter of said activation secure module.
18. A system as recited in claim 16 further comprising:
a control secure module having a master zone key;
a plurality of field secure modules, said control secure module communicating with said field secure modules using field zone keys derived from said master zone key; and
a plurality of sets of activation secure modules, each set of activation secure modules communicating with one of said field secure modules using a zone key derived from one of said field zone keys.
19. An invention as recited in any of claims 1-7, 10-12, and 16-18 wherein said field secure module is a smart card or a hardware security module.
20. A method for maintaining in the field an activation secure module useful for activating stored value cards, said method comprising: placing a plurality of stored value cards into a card dispensing machine, said stored value cards each requiring a card security code before their value is accessible, said card dispensing machine including an activation secure module;
placing a field secure module into communication with said card dispensing machine, said field secure module including an activation key necessary for activating said stored value cards;
retrieving said activation key from said field secure module; and
transferring said retrieved activation key to said activation secure module, whereby said activation secure module is now able to produce said card security codes using said activation key.
21. A method as recited in claim 20 further comprising:
retrieving a new maximum value for an activation control counter from said field secure module; and
resetting said activation control counter of said activation secure module using said retrieved new maximum value, said activation control counter limiting the number of stored value cards that said activation secure module may activate.
22. A method for maintaining in the field an activation secure module useful for activating stored value cards, said method comprising:
initiating a connection over a communications network between an activation computer having a control secure module and a card dispensing machine, said card dispensing machine including a plurality of stored value cards, said stored value cards each requiring a card security code before their value is accessible;
placing said control secure module into communication with an activation secure module of said card dispensing machine, said control secure module including an activation key necessary for activating said stored value cards;
retrieving said activation key from said control secure module; and transferring said retrieved activation key to said activation secure module over said communications network, whereby said activation secure module is now able to produce said card security codes using said activation key.
23. A method as recited in claim 22 further comprising:
retrieving a new maximum value for an activation control counter from said control secure module; and
resetting said activation control counter of said activation secure module using said retrieved new maximum value, said activation control counter limiting the number of stored value cards that said activation secure module may activate.
PCT/US1998/027073 1997-12-19 1998-12-18 Card activation at point of distribution WO1999033033A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
EP19980964134 EP1040456B1 (en) 1997-12-19 1998-12-18 Card activation at point of distribution
AU19324/99A AU758710B2 (en) 1997-12-19 1998-12-18 Card activation at point of distribution
DE69826318T DE69826318T2 (en) 1997-12-19 1998-12-18 CARD ACTIVATION AT THE DISTRIBUTION AGENCY
CA002315656A CA2315656C (en) 1997-12-19 1998-12-18 Card activation at point of distribution
HK01102350A HK1031942A1 (en) 1997-12-19 2001-03-31 Card activation at point of distribution.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US6819697P 1997-12-19 1997-12-19
US60/068,196 1997-12-19

Publications (3)

Publication Number Publication Date
WO1999033033A2 true WO1999033033A2 (en) 1999-07-01
WO1999033033A3 WO1999033033A3 (en) 1999-10-07
WO1999033033A8 WO1999033033A8 (en) 2000-02-03

Family

ID=22081037

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/027073 WO1999033033A2 (en) 1997-12-19 1998-12-18 Card activation at point of distribution

Country Status (7)

Country Link
US (1) US6298336B1 (en)
EP (1) EP1040456B1 (en)
AU (1) AU758710B2 (en)
CA (1) CA2315656C (en)
DE (1) DE69826318T2 (en)
HK (1) HK1031942A1 (en)
WO (1) WO1999033033A2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000067216A1 (en) * 1999-05-03 2000-11-09 The Chase Manhattan Bank A banking card associated with a cash account
EP1100056A2 (en) * 1999-11-11 2001-05-16 Threecodex S.r.l. Online payment transaction method using a prepaid card, and associated card
EP1115099A2 (en) * 2000-01-04 2001-07-11 Arpa S.R.L. Dispensing system for distributing access codes for computer and/or telecommunications services
FR2804810A1 (en) * 2000-02-09 2001-08-10 France Telecom ACTIVATION OF SERVICE BY VIRTUAL PRE-PAID CARD
WO2001067402A2 (en) * 2000-03-07 2001-09-13 Infinia Ip Ltd Issuing and distribution of tokens
WO2001095274A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
WO2002011080A1 (en) * 2000-07-27 2002-02-07 Lajtner Tamas Procedure for the operation of a system working with the use of pay data carriers, and a system for this purpose
EP1226540A1 (en) * 1999-10-22 2002-07-31 Efunds Corporation Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations
EP1416454A2 (en) * 2002-10-29 2004-05-06 Hewlett-Packard Development Company, L.P. Apparatus and method for creating negotiable items
NL1024547C2 (en) * 2003-03-31 2004-10-01 Koninkl Kpn Nv Method for using an electromagnetic scratch card for providing services.
NL1023058C2 (en) * 2003-03-31 2004-10-01 Koninkl Kpn Nv Service provision method e.g. for telephony service using electromagnetic scratch card e.g. prepaid chip card, involves using activation code in scratch card to activate card balance of scratch card through server
EP1880342A2 (en) * 2005-05-11 2008-01-23 First Data Corporation Security systems for a payment instrument
EP1913514A2 (en) * 2005-07-15 2008-04-23 Revolution Money, Inc. System and method for immediate issuance of transaction cards
EP2278515A1 (en) * 2009-07-16 2011-01-26 Giesecke & Devrient GmbH Method for activating a runtime environment of a microprocessor unit
EP2234030A3 (en) * 2009-03-25 2011-08-17 Bundesdruckerei GmbH Chip card, computer system, method for activating a chip card and method for personalising a chip card
EP2927858A1 (en) * 2014-04-02 2015-10-07 Oberthur Technologies Method for manufacturing a security device

Families Citing this family (182)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6422459B1 (en) * 1997-10-15 2002-07-23 Citicorp Development Center, Inc. Method and system for off-line loading of stored value cards using a batch-load terminal
CH693024A5 (en) * 1998-05-06 2003-01-31 Flytec Ag Multifunctional tool.
US6615189B1 (en) 1998-06-22 2003-09-02 Bank One, Delaware, National Association Debit purchasing of stored value card for use by and/or delivery to others
US7809642B1 (en) 1998-06-22 2010-10-05 Jpmorgan Chase Bank, N.A. Debit purchasing of stored value card for use by and/or delivery to others
US6549912B1 (en) * 1998-09-23 2003-04-15 Visa International Service Association Loyalty file structure for smart card
US6473500B1 (en) * 1998-10-28 2002-10-29 Mastercard International Incorporated System and method for using a prepaid card
US6999569B2 (en) * 1998-10-28 2006-02-14 Mastercard International Incorporated System and method for using a prepaid card
US7660763B1 (en) 1998-11-17 2010-02-09 Jpmorgan Chase Bank, N.A. Customer activated multi-value (CAM) card
US6032136A (en) 1998-11-17 2000-02-29 First Usa Bank, N.A. Customer activated multi-value (CAM) card
US6898711B1 (en) * 1999-01-13 2005-05-24 International Business Machines Corporation User authentication system and method for multiple process applications
US6694884B2 (en) * 1999-01-25 2004-02-24 Fargo Electronics, Inc. Method and apparatus for communicating between printer and card supply
US6832866B2 (en) * 1999-01-25 2004-12-21 Fargo Electronics, Inc. Printer or laminator supply
US6882984B1 (en) 1999-06-04 2005-04-19 Bank One, Delaware, National Association Credit instrument and system with automated payment of club, merchant, and service provider fees
AU6500400A (en) * 1999-07-29 2001-02-19 Privacash.Com, Inc. Method and system for transacting an anoymous purchase over the internet
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
US7370004B1 (en) 1999-11-15 2008-05-06 The Chase Manhattan Bank Personalized interactive network architecture
US8793160B2 (en) 1999-12-07 2014-07-29 Steve Sorem System and method for processing transactions
US7720754B1 (en) * 2000-01-05 2010-05-18 Uniteller Financial Services, Inc. Money-transfer techniques
JP4501197B2 (en) * 2000-01-07 2010-07-14 ソニー株式会社 Information portable processing system, information portable device access device and information portable device
US6758616B2 (en) * 2000-01-21 2004-07-06 Fargo Electronics, Inc. Identification card printer
US6941279B1 (en) 2000-02-23 2005-09-06 Banke One Corporation Mutual fund card method and system
WO2001069556A2 (en) 2000-03-15 2001-09-20 Mastercard International Incorporated Method and system for secure payments over a computer network
JP2003529160A (en) * 2000-03-24 2003-09-30 アクセス ビジネス グループ インターナショナル リミテッド ライアビリティ カンパニー System and method for detecting fraudulent transactions
US6813716B1 (en) * 2000-04-24 2004-11-02 At&T Corp. Secure calling card and authentication process
AU2001267188A1 (en) * 2000-06-06 2001-12-17 Albert D. March System and method for transferring funds
US20090150294A1 (en) * 2000-06-06 2009-06-11 March Albert D Systems and methods for authenticating financial transactions involving financial cards
US20050149759A1 (en) * 2000-06-15 2005-07-07 Movemoney, Inc. User/product authentication and piracy management system
WO2002011019A1 (en) 2000-08-01 2002-02-07 First Usa Bank, N.A. System and method for transponder-enabled account transactions
US20030028491A1 (en) * 2000-08-25 2003-02-06 Cooper Jonathan D. Improved money transfer system and method with added security features
US20050240518A1 (en) * 2000-11-30 2005-10-27 Ricoh Company Ltd. Method and system for on-line communication based on an off-line transaction
US7290364B2 (en) * 2000-12-08 2007-11-06 Discover Financial Services Llc Non-rectangular shaped credit card with case
US6985873B2 (en) 2001-01-18 2006-01-10 First Usa Bank, N.A. System and method for administering a brokerage rebate card program
FR2823330B1 (en) * 2001-04-10 2004-08-20 Gemplus Card Int METHOD AND SYSTEM FOR MANAGING DATA TO BE STORED IN A MEMORY, FOR EXAMPLE OF THE CODE OF AN APPLICATION LOADED IN A PROGRAMMABLE CHIP CARD
US7313546B2 (en) * 2001-05-23 2007-12-25 Jp Morgan Chase Bank, N.A. System and method for currency selectable stored value instrument
WO2003010701A1 (en) 2001-07-24 2003-02-06 First Usa Bank, N.A. Multiple account card and transaction routing
US7809641B2 (en) 2001-07-26 2010-10-05 Jpmorgan Chase Bank, National Association System and method for funding a collective account
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
US8800857B1 (en) 2001-08-13 2014-08-12 Jpmorgan Chase Bank, N.A. System and method for crediting loyalty program points and providing loyalty rewards by use of an electronic tag
US7311244B1 (en) 2001-08-13 2007-12-25 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
PT1442404E (en) * 2001-09-24 2014-03-06 E2Interactive Inc System and method for supplying communication service
US6726232B2 (en) * 2001-10-01 2004-04-27 Honda Giken Kogyo Kabushiki Kaisha Steering damper for saddle-type vehicle
US7925878B2 (en) * 2001-10-03 2011-04-12 Gemalto Sa System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials
US7054842B2 (en) * 2001-10-03 2006-05-30 First Data Corporation Stored value cards and methods for their issuance
US7177844B2 (en) * 2002-01-16 2007-02-13 General Instrument Corporation Apparatus and method for activation of a security module in a set-top retail environment
US20030144910A1 (en) * 2002-01-30 2003-07-31 Flaherty Stephen C. System and method for distributing inventory for point-of-sale activation services
US7430762B2 (en) 2002-03-01 2008-09-30 Fargo Electronics, Inc. Identification card manufacturing security
US7756896B1 (en) 2002-03-11 2010-07-13 Jp Morgan Chase Bank System and method for multi-dimensional risk analysis
US20180165441A1 (en) 2002-03-25 2018-06-14 Glenn Cobourn Everhart Systems and methods for multifactor authentication
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US20040210498A1 (en) 2002-03-29 2004-10-21 Bank One, National Association Method and system for performing purchase and other transactions using tokens with multiple chips
US7424973B2 (en) * 2002-04-29 2008-09-16 Datawave Systems, Inc. Prepaid broadband internet and software service method and apparatus
EP1504320A4 (en) * 2002-05-09 2007-07-04 Kestrel Wireless Inc Method and system for enabling electronic transactions via a personal device
US6877657B2 (en) * 2002-06-28 2005-04-12 First Data Corporation Methods and systems for production of transaction cards
US7069251B1 (en) 2002-07-08 2006-06-27 Accelitec, Inc. RFID transponder dispenser and authorizer
US20040015543A1 (en) * 2002-07-19 2004-01-22 Martin Schmidt Manufacturing data access
US20040024697A1 (en) * 2002-07-24 2004-02-05 Landa Pedro Enrique Method and system for transferring money
US8239304B1 (en) 2002-07-29 2012-08-07 Jpmorgan Chase Bank, N.A. Method and system for providing pre-approved targeted products
US7227445B2 (en) * 2002-07-31 2007-06-05 Kestrel Wireless, Inc. Wireless activation system and method
US6805287B2 (en) * 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US9852437B2 (en) * 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US7809595B2 (en) 2002-09-17 2010-10-05 Jpmorgan Chase Bank, Na System and method for managing risks associated with outside service providers
US7069244B2 (en) * 2002-09-17 2006-06-27 First Data Corporation Method and system for merchant processing of purchase card transactions with expanded card type acceptance
US7424455B2 (en) * 2002-09-17 2008-09-09 First Data Corporation Method and systems for providing merchant services with right-time creation and updating of merchant accounts
US7319977B2 (en) * 2002-10-08 2008-01-15 First Data Corporation Discount-instrument methods and systems
US7083081B2 (en) * 2002-10-08 2006-08-01 First Data Corporation Electronic card and ticket and methods for their use
US20040122736A1 (en) 2002-10-11 2004-06-24 Bank One, Delaware, N.A. System and method for granting promotional rewards to credit account holders
DE10259270A1 (en) * 2002-12-17 2004-07-15 Wincor Nixdorf International Gmbh Personalization of security modules
JP2004220756A (en) * 2002-12-27 2004-08-05 Konica Minolta Holdings Inc Data recording program, information recording medium and data recording terminal, data recording system, and data recording method
US20040199454A1 (en) * 2003-01-08 2004-10-07 Jungen Michael G. Dynamic advance purchase admission to a venue
US7882021B2 (en) * 2003-01-30 2011-02-01 First Data Corporation Financial settlement systems and methods
US8271380B2 (en) * 2003-01-30 2012-09-18 First Data Corporation Decentralized guaranteed stored value transfer system and method
US7409358B2 (en) * 2003-02-21 2008-08-05 First Data Corporation Methods and systems for coordinating a change in status of stored-value cards
US7328191B2 (en) * 2003-03-31 2008-02-05 First Data Corporation Methods and systems for processing unrestricted stored-value instruments
WO2004091170A2 (en) 2003-03-31 2004-10-21 Visa U.S.A. Inc. Method and system for secure authentication
US20040205023A1 (en) * 2003-04-08 2004-10-14 First Data Corporation Money transfer convenience card, systems and methods
US7316350B2 (en) * 2003-04-22 2008-01-08 First Data Corporation Multi-purse card system and methods
US7380125B2 (en) * 2003-05-22 2008-05-27 International Business Machines Corporation Smart card data transaction system and methods for providing high levels of storage and transmission security
CA2430456C (en) * 2003-05-30 2012-10-09 Coinamatic Canada Inc. Offline code based reloading system
US8306907B2 (en) 2003-05-30 2012-11-06 Jpmorgan Chase Bank N.A. System and method for offering risk-based interest rates in a credit instrument
US20040254833A1 (en) * 2003-06-12 2004-12-16 First Data Corporation Presentation instrument production systems and methods
US20050116027A1 (en) * 2003-06-12 2005-06-02 First Data Corp. Personalized presentation instrument production systems and methods
CA2530368A1 (en) * 2003-06-23 2005-01-06 Kestrel Wireless, Inc. Method and apparatus for activating optical media
US7761374B2 (en) 2003-08-18 2010-07-20 Visa International Service Association Method and system for generating a dynamic verification value
US7740168B2 (en) 2003-08-18 2010-06-22 Visa U.S.A. Inc. Method and system for generating a dynamic verification value
US7953663B1 (en) 2003-09-04 2011-05-31 Jpmorgan Chase Bank, N.A. System and method for financial instrument pre-qualification and offering
US8239323B2 (en) 2003-09-23 2012-08-07 Jpmorgan Chase Bank, N.A. Method and system for distribution of unactivated bank account cards
WO2005038627A2 (en) * 2003-10-17 2005-04-28 Nexxo Financial Corporation Systems and methods for banking transactions using a stored-value card
US8793187B2 (en) * 2003-10-17 2014-07-29 Nexxo Financial Corporation Self-service money remittance with an access card
US20050108130A1 (en) * 2003-10-27 2005-05-19 First Data Corporation Methods and systems for managing integrated credit and stored-value programs
US7769689B2 (en) * 2003-10-27 2010-08-03 First Data Corporation Methods and systems for processing transactions for integrated credit and stored-value programs
US20050091153A1 (en) * 2003-10-27 2005-04-28 First Data Corporation Methods and systems for managing integrated credit and stored-value programs
US8655309B2 (en) * 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20050192895A1 (en) 2004-02-10 2005-09-01 First Data Corporation Methods and systems for processing transactions
US20050192897A1 (en) * 2004-02-10 2005-09-01 First Data Corporation Methods and systems for payment-network enrollment
US7243839B2 (en) 2004-03-12 2007-07-17 American Express Travel Related Services Company, Inc. Systems, methods, and devices for selling transaction instruments
US7281653B2 (en) * 2004-03-12 2007-10-16 American Express Travel Related Services Company, Inc. Transaction instrument inventory management system and method
US7191939B2 (en) * 2004-03-12 2007-03-20 American Express Travel Related Services Company, Inc. Systems, methods, and devices for selling transaction instruments via web-based tool
GB0410861D0 (en) * 2004-05-14 2004-06-16 Ecebs Ltd Improved ticketing system
US7979351B1 (en) 2004-05-25 2011-07-12 American Express Travel Related Services Company, Inc. Prepaid transaction card activation system and method
US20060200362A1 (en) * 2004-05-26 2006-09-07 First Data Corporation Presentation instrument insert systems and methods
US20060074767A1 (en) * 2004-10-05 2006-04-06 First Data Corporation Selective inclusion of stored value cards in mailings
US7303121B2 (en) * 2004-05-26 2007-12-04 First Data Corporation System and method for initializing financial presentation instruments
US7392222B1 (en) 2004-08-03 2008-06-24 Jpmorgan Chase Bank, N.A. System and method for providing promotional pricing
US7870071B2 (en) 2004-09-08 2011-01-11 American Express Travel Related Services Company, Inc. Systems, methods, and devices for combined credit card and stored value transaction accounts
US20060095385A1 (en) * 2004-10-26 2006-05-04 Paul Atkinson Method and network for selectively controlling the utility a target
KR20070111453A (en) * 2004-12-07 2007-11-21 케스트럴 와이어리스 인코포레이티드 Device and method for selectively controlling the utility of a target
US20060192653A1 (en) * 2005-02-18 2006-08-31 Paul Atkinson Device and method for selectively controlling the utility of an integrated circuit device
US7614548B2 (en) * 2005-02-22 2009-11-10 Target Brands, Inc. Stored-value card assembly with a plurality of stored-value cards
US8630898B1 (en) 2005-02-22 2014-01-14 Jpmorgan Chase Bank, N.A. Stored value card provided with merchandise as rebate
US8474694B2 (en) * 2005-03-23 2013-07-02 E2Interactive, Inc. Radio frequency identification purchase transactions
US7401731B1 (en) 2005-05-27 2008-07-22 Jpmorgan Chase Bank, Na Method and system for implementing a card product with multiple customized relationships
US20070228179A1 (en) * 2005-07-06 2007-10-04 Paul Atkinson System and Method for Loading an Embedded Device to Authenticate and Secure Transactions
WO2007008916A2 (en) * 2005-07-11 2007-01-18 Kestrel Wireless Inc. A radio frequency activated integrated circuit and method of disabling the same
US20070140072A1 (en) * 2005-07-29 2007-06-21 Anoop Agrawal Electro-Optic Device and Process for Optical Media
US8099187B2 (en) 2005-08-18 2012-01-17 Hid Global Corporation Securely processing and tracking consumable supplies and consumable material
US7258274B2 (en) * 2005-10-06 2007-08-21 Micash, Inc Money remittance method
WO2007047841A2 (en) * 2005-10-18 2007-04-26 Kestrel Wireless Inc. Activation confirmation feedback circuits and methods
US7896241B2 (en) 2006-01-03 2011-03-01 Sandisk Il Ltd. Automated card customization machine
US9397837B2 (en) * 2006-01-06 2016-07-19 Sicpa Holding Sa Secure access to information associated with a value item
WO2007085016A2 (en) * 2006-01-20 2007-07-26 Kestrel Wireless Inc. Optical media with reduced areal-sized optical shutters
US7784682B2 (en) 2006-02-08 2010-08-31 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US8408455B1 (en) 2006-02-08 2013-04-02 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US7753259B1 (en) 2006-04-13 2010-07-13 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to both customers and non-customers
US7967194B2 (en) * 2006-05-17 2011-06-28 Mastercard International Incorporated Centralized issuer hub for transaction card customization
US8464938B2 (en) 2007-06-22 2013-06-18 Intelispend Prepaid Solutions, Llc Client customized virtual or physical card for use with selected merchants
US20080203157A1 (en) * 2006-09-07 2008-08-28 Datacard Corporation Storage and transport mechanism for a self-service card kiosk with return and reissue capability
US7698220B2 (en) 2006-09-14 2010-04-13 E2Interactive, Inc. Virtual terminal for payment processing
US7822973B2 (en) * 2006-12-28 2010-10-26 Motorola Mobility, Inc. Authentication key device having media content storage and rendering capabilities
US8606670B2 (en) 2007-01-02 2013-12-10 First Data Corporation Integrated communication solution
US8818904B2 (en) 2007-01-17 2014-08-26 The Western Union Company Generation systems and methods for transaction identifiers having biometric keys associated therewith
US7933835B2 (en) 2007-01-17 2011-04-26 The Western Union Company Secure money transfer systems and methods using biometric keys associated therewith
US7866551B2 (en) * 2007-02-15 2011-01-11 Visa U.S.A. Inc. Dynamic payment device characteristics
FR2913511B1 (en) * 2007-03-06 2009-04-24 Thales Sa METHOD FOR MODIFYING SECRETS INCLUDED IN A CRYPTOGRAPHIC MODULE, IN PARTICULAR IN AN UN-PROTECTED ENVIRONMENT
US8504473B2 (en) 2007-03-28 2013-08-06 The Western Union Company Money transfer system and messaging system
WO2008131021A1 (en) * 2007-04-17 2008-10-30 Visa U.S.A. Inc. Method and system for authenticating a party to a transaction
US7783571B2 (en) * 2007-05-31 2010-08-24 First Data Corporation ATM system for receiving cash deposits from non-networked clients
US8290832B2 (en) * 2007-06-04 2012-10-16 Visa U.S.A. Inc. Method and system for handling returned prepaid payment cards
US8676642B1 (en) 2007-07-05 2014-03-18 Jpmorgan Chase Bank, N.A. System and method for granting promotional rewards to financial account holders
US20090048924A1 (en) * 2007-08-14 2009-02-19 Wiborg Elizabeth E Apparatuses, Systems and Methods for Loading, Activating and Redeeming an Investment Gift Card
WO2009038774A1 (en) * 2007-09-20 2009-03-26 Corporate Business Systems, Inc. Stored-value card management method and system
US8417601B1 (en) 2007-10-18 2013-04-09 Jpmorgan Chase Bank, N.A. Variable rate payment card
US8255318B2 (en) * 2007-10-18 2012-08-28 First Data Corporation Applicant authentication
US20090112767A1 (en) 2007-10-25 2009-04-30 Ayman Hammad Escrow system and method
US7979894B2 (en) * 2008-01-08 2011-07-12 First Data Corporation Electronic verification service systems and methods
US20100027786A1 (en) * 2008-02-14 2010-02-04 Patrick Faith Dynamic encryption authentication
US9208485B2 (en) 2008-03-24 2015-12-08 American Express Travel Related Services Company, Inc. System and method for facilitating online transactions
US8700446B2 (en) * 2008-03-28 2014-04-15 First Data Corporation Methods and systems for dynamically generating coupons associated with presentation instruments
EP2124199A1 (en) * 2008-05-19 2009-11-25 Ergotrans B.V. Assembly for the issue of a document
US7885878B2 (en) 2008-05-28 2011-02-08 First Data Corporation Systems and methods of payment account activation
WO2009155023A2 (en) * 2008-05-30 2009-12-23 Visa U.S.A. Inc. Graduation function for stored value card
US10008067B2 (en) 2008-06-16 2018-06-26 Visa U.S.A. Inc. System and method for authorizing financial transactions with online merchants
US8707319B2 (en) * 2008-06-26 2014-04-22 Visa International Service Association Resource location verification by comparing and updating resource location with a location of a consumer device after a threshold of location mismatches is exceeded
US20090327067A1 (en) * 2008-06-26 2009-12-31 First Data Corporation Systems and Methods for Distributing Incentives to Consumers to Encourage Subsequent Action
US20090327135A1 (en) * 2008-06-26 2009-12-31 Loc Duc Nguyen Credit card paired with location identifiable device for point of service fraud detection
USD636021S1 (en) 2008-07-17 2011-04-12 Jpmorgan Chase Bank, N.A. Eco-friendly transaction device
US20100179909A1 (en) * 2009-01-14 2010-07-15 Jubin Dana User defined udk
USD620975S1 (en) 2009-02-12 2010-08-03 Jpmorgan Chase Bank, N.A. Transaction device
USD617378S1 (en) 2009-02-12 2010-06-08 Jpmorgan Chase Bank, N.A. Transaction device with a gem-like surface appearance
US8672216B2 (en) 2009-04-14 2014-03-18 First Data Corporation Flat card production systems and methods
WO2010126994A1 (en) * 2009-04-28 2010-11-04 Mastercard International Incorporated Apparatus, method, and computer program product for recovering torn smart payment device transactions
US8725589B1 (en) 2009-07-30 2014-05-13 Jpmorgan Chase Bank, N.A. Methods for personalizing multi-layer transaction cards
US20110055077A1 (en) * 2009-09-02 2011-03-03 Susan French Portable consumer device with funds transfer processing
US8533451B2 (en) 2009-09-29 2013-09-10 Zamtec Ltd Method of encrypted communication with limited number of stored encryption key retrievals
US20110137740A1 (en) 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
US20110153441A1 (en) * 2009-12-23 2011-06-23 Merrill Brooks Smith Systems and Methods for Authorizing Use of Validly Sold Merchandise
US8868458B1 (en) 2010-02-12 2014-10-21 Jpmorgan Chase Bank, N.A. Remote account control system and method
USD623690S1 (en) 2010-03-05 2010-09-14 Jpmorgan Chase Bank, N.A. Metal transaction device with gem-like surface
US9846872B2 (en) 2010-04-06 2017-12-19 American Express Travel Related Services Company, Inc. Secure exchange of indicia of value and associated information
WO2011129887A2 (en) * 2010-04-13 2011-10-20 Mastercard International Incorporated Method and apparatus for global replacement card services
JP5577881B2 (en) * 2010-06-23 2014-08-27 セイコーエプソン株式会社 Prepaid card processing device and processing method of prepaid card processing device
USD643064S1 (en) 2010-07-29 2011-08-09 Jpmorgan Chase Bank, N.A. Metal transaction device with gem-like surface
US9224274B1 (en) 2013-02-14 2015-12-29 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
USD854083S1 (en) 2013-03-27 2019-07-16 Jpmorgan Chase Bank, N.A. Hybrid transaction device
US9811824B2 (en) * 2013-07-24 2017-11-07 Adobe Systems Incorporated Method and apparatus for version independent point of sale activation (POSA) product download
US10402819B2 (en) * 2014-04-22 2019-09-03 Mastercard International Incorporated Systems and methods for use in inhibiting theft of payment cards
US10671996B2 (en) * 2014-07-11 2020-06-02 The Toronto-Dominion Bank Systems and methods for providing pre-paid multicards
US11252150B2 (en) 2016-12-08 2022-02-15 Mastercard International Incorporated Systems and methods for smartcard biometric enrollment
US11392935B2 (en) * 2019-08-05 2022-07-19 Apple Inc. Automatic activation of a physical payment card
US11610188B2 (en) 2020-04-15 2023-03-21 Capital One Services, Llc Systems and methods for ATM integrated card fabricator

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1991001538A1 (en) * 1989-07-20 1991-02-07 Cash Card Systems Limited Improvements in and relating to non-cash payment means
EP0440800A1 (en) * 1989-06-05 1991-08-14 Ntt Data Communications Systems Corporation Ic card for security attestation and ic card service system using said ic card
US5350907A (en) * 1990-01-15 1994-09-27 Utvecklings Ab Jonic Handling system for information carriers
EP0671703A1 (en) * 1994-02-11 1995-09-13 SOLAIC (société anonyme) Method for protecting memory and components against fraudulent use
WO1996028796A1 (en) * 1995-03-10 1996-09-19 Schlumberger Industries S.A. Method for securely inputting data into a portable medium
EP0768628A2 (en) * 1989-09-06 1997-04-16 Fujitsu Limited An electronic cashless system
WO1997022919A1 (en) * 1995-12-20 1997-06-26 Intellicard Systems L.P. Apparatus for encoding and dispensing integrated circuit chip cards
US5696908A (en) * 1995-06-07 1997-12-09 Southeast Phonecard, Inc. Telephone debit card dispenser and method
US5868236A (en) * 1996-11-27 1999-02-09 Darrell G. Rademacher Pin vending dispenser

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4984270A (en) * 1987-06-19 1991-01-08 The Exchange System Method and system for transmission of financial data
US4968873A (en) * 1987-09-08 1990-11-06 Juergen Dethloff Smart card issuing and receiving apparatus
US5104084A (en) 1989-03-16 1992-04-14 Shiroki Corporation Seat-sliding device for front seat of vehicle
CA2035697A1 (en) * 1991-02-05 1992-08-06 Brian James Smyth Encryption apparatus for computer device
US5440108A (en) * 1991-10-11 1995-08-08 Verifone, Inc. System and method for dispensing and revalung cash cards
US5633930A (en) * 1994-09-30 1997-05-27 Electronic Payment Services, Inc. Common cryptographic key verification in a transaction network
US5650604A (en) * 1995-02-22 1997-07-22 Electronic Data Systems Corporation System and method for electronic transfer of funds using an automated teller machine to dispense the transferred funds
US5903633A (en) * 1995-03-27 1999-05-11 Smarttalk Teleservices, Inc. Method and apparatus for prepaid phone card activation and billing
US5907142A (en) * 1995-12-12 1999-05-25 Kelsey; Craig E. Fraud resistant personally activated transaction card
US5777305A (en) * 1996-01-24 1998-07-07 Incomm Package assembly and method for activating prepaid debit cards

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0440800A1 (en) * 1989-06-05 1991-08-14 Ntt Data Communications Systems Corporation Ic card for security attestation and ic card service system using said ic card
WO1991001538A1 (en) * 1989-07-20 1991-02-07 Cash Card Systems Limited Improvements in and relating to non-cash payment means
EP0768628A2 (en) * 1989-09-06 1997-04-16 Fujitsu Limited An electronic cashless system
US5350907A (en) * 1990-01-15 1994-09-27 Utvecklings Ab Jonic Handling system for information carriers
EP0671703A1 (en) * 1994-02-11 1995-09-13 SOLAIC (société anonyme) Method for protecting memory and components against fraudulent use
WO1996028796A1 (en) * 1995-03-10 1996-09-19 Schlumberger Industries S.A. Method for securely inputting data into a portable medium
US5696908A (en) * 1995-06-07 1997-12-09 Southeast Phonecard, Inc. Telephone debit card dispenser and method
WO1997022919A1 (en) * 1995-12-20 1997-06-26 Intellicard Systems L.P. Apparatus for encoding and dispensing integrated circuit chip cards
US5868236A (en) * 1996-11-27 1999-02-09 Darrell G. Rademacher Pin vending dispenser

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000067216A1 (en) * 1999-05-03 2000-11-09 The Chase Manhattan Bank A banking card associated with a cash account
EP1226540A4 (en) * 1999-10-22 2006-03-15 Efunds Corp Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations
EP1226540A1 (en) * 1999-10-22 2002-07-31 Efunds Corporation Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations
EP1100056A3 (en) * 1999-11-11 2002-07-03 Threecodex S.r.l. Online payment transaction method using a prepaid card, and associated card
EP1100056A2 (en) * 1999-11-11 2001-05-16 Threecodex S.r.l. Online payment transaction method using a prepaid card, and associated card
EP1115099A2 (en) * 2000-01-04 2001-07-11 Arpa S.R.L. Dispensing system for distributing access codes for computer and/or telecommunications services
EP1115099A3 (en) * 2000-01-04 2004-04-14 Arpa S.R.L. Dispensing system for distributing access codes for computer and/or telecommunications services
WO2001059726A1 (en) * 2000-02-09 2001-08-16 France Telecom Service activation by virtual prepaid card
US7003499B2 (en) 2000-02-09 2006-02-21 France Telecom Sa Service activation by virtual prepaid card
FR2804810A1 (en) * 2000-02-09 2001-08-10 France Telecom ACTIVATION OF SERVICE BY VIRTUAL PRE-PAID CARD
WO2001067402A3 (en) * 2000-03-07 2002-01-31 Infinia Ip Ltd Issuing and distribution of tokens
WO2001067402A2 (en) * 2000-03-07 2001-09-13 Infinia Ip Ltd Issuing and distribution of tokens
FR2810139A1 (en) * 2000-06-08 2001-12-14 Bull Cp8 Method and integrated system for making secure the pre- initialization phase of a silicon chip integrated system, such as a smart card, uses symmetric secret key and asymmetric public key and associated algorithms
WO2001095274A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
US7602920B2 (en) 2000-06-08 2009-10-13 Cp8 Technologies Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
WO2002011080A1 (en) * 2000-07-27 2002-02-07 Lajtner Tamas Procedure for the operation of a system working with the use of pay data carriers, and a system for this purpose
EP1416454A2 (en) * 2002-10-29 2004-05-06 Hewlett-Packard Development Company, L.P. Apparatus and method for creating negotiable items
EP1416454A3 (en) * 2002-10-29 2005-11-02 Hewlett-Packard Development Company, L.P. Apparatus and method for creating negotiable items
NL1024547C2 (en) * 2003-03-31 2004-10-01 Koninkl Kpn Nv Method for using an electromagnetic scratch card for providing services.
WO2004088602A1 (en) * 2003-03-31 2004-10-14 Koninklijke Kpn N.V. Method for using an electromagnetic scratchcard to provide services
NL1023058C2 (en) * 2003-03-31 2004-10-01 Koninkl Kpn Nv Service provision method e.g. for telephony service using electromagnetic scratch card e.g. prepaid chip card, involves using activation code in scratch card to activate card balance of scratch card through server
CN100555345C (en) * 2003-03-31 2009-10-28 皇家Kpn公司 Use electromagnetic scratch card that service method is provided
EP1880342A2 (en) * 2005-05-11 2008-01-23 First Data Corporation Security systems for a payment instrument
EP1880342A4 (en) * 2005-05-11 2011-02-09 First Data Corp Security systems for a payment instrument
EP1913514A2 (en) * 2005-07-15 2008-04-23 Revolution Money, Inc. System and method for immediate issuance of transaction cards
EP1913514A4 (en) * 2005-07-15 2013-09-25 Serve Virtual Entpr Inc System and method for immediate issuance of transaction cards
EP2234030A3 (en) * 2009-03-25 2011-08-17 Bundesdruckerei GmbH Chip card, computer system, method for activating a chip card and method for personalising a chip card
EP3671506A1 (en) 2009-03-25 2020-06-24 Bundesdruckerei GmbH Chip card, computer system, method for activating a chip card and method for personalising a chip card
EP2278515A1 (en) * 2009-07-16 2011-01-26 Giesecke & Devrient GmbH Method for activating a runtime environment of a microprocessor unit
EP2927858A1 (en) * 2014-04-02 2015-10-07 Oberthur Technologies Method for manufacturing a security device
FR3019672A1 (en) * 2014-04-02 2015-10-09 Oberthur Technologies METHOD OF MAKING A SECURITY DEVICE

Also Published As

Publication number Publication date
EP1040456B1 (en) 2004-09-15
CA2315656A1 (en) 1999-07-01
DE69826318T2 (en) 2005-10-13
EP1040456A2 (en) 2000-10-04
WO1999033033A3 (en) 1999-10-07
WO1999033033A8 (en) 2000-02-03
HK1031942A1 (en) 2001-06-29
AU758710B2 (en) 2003-03-27
DE69826318D1 (en) 2004-10-21
AU1932499A (en) 1999-07-12
US6298336B1 (en) 2001-10-02
CA2315656C (en) 2008-04-29

Similar Documents

Publication Publication Date Title
EP1040456B1 (en) Card activation at point of distribution
JP4327261B2 (en) Secure multi-application card system and process
EP0858644B1 (en) A system and method for loading applications onto a smart card
EP0981807B1 (en) Integrated circuit card with application history list
EP1060459B1 (en) A system and method for locking and unlocking an application in a smart card
AU770396B2 (en) Delegated management of smart card applications
US6659354B2 (en) Secure multi-application IC card system having selective loading and deleting capability
US10147077B2 (en) Financial transaction method and system having an update mechanism
CA2624758C (en) System and method for creating activation secure module

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: C1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

WR Later publication of a revised version of an international search report
ENP Entry into the national phase

Ref document number: 2315656

Country of ref document: CA

Ref country code: CA

Ref document number: 2315656

Kind code of ref document: A

Format of ref document f/p: F

NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: 19324/99

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 1998964134

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1998964134

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 19324/99

Country of ref document: AU

WWG Wipo information: grant in national office

Ref document number: 1998964134

Country of ref document: EP