throbber
J
`
`
`
`E u r o p a , s c h e s P _
`European Patent Office
`*
`. .
`,
`Office europeen des brevets
`
`MM M M M MM I Ml Ml II II II I II
`o n n n »
`0 3 1 6 6 8 9 B 1
`
`© Publication number:
`
`EUROPEAN PATENT S P E C I F I C A T I O N
`
`© Date of publication of patent specification: 06.07.94 © Int. CI.5: G07F 7/10
`
`© Application number: 88118450.1
`
`@ Date of filing: 04.11.88
`
`© Portable electronic apparatus.
`
`
`
`© Priority: 13.11.87 JP 288120/87 ® Priority: 13.11.87 JP 288120/87
`
`
`@ Date of publication of application: @ Date of publication of application:
`24.05.89 Bulletin 89/21
`24.05.89 Bulletin 89/21
`
`© Publication of the grant of the patent:
`© Publication of the grant of the patent:
`06.07.94 Bulletin 94/27
`06.07.94 Bulletin 94/27
`
`© Designated Contracting States:
`© Designated Contracting States:
`DE FR GB
`DE FR GB
`
`© References cited:
`References cited:
`EP-A- 0 174 016
`EP-A- 0 174 016
`WO-A-86/03040
`WO-A-86/03040
`FR-A- 2 600 444
`FR-A- 2 600 444
`
`EP-A- 0 216 375
`EP-A- 0 216 375
`DE-A- 3 222 288
`DE-A- 3 222 288
`US-A- 4 443 027
`US-A- 4 443 027
`
`© Proprietor: KABUSHIKI KAISHA TOSHIBA
`72, Horlkawa-cho
`Salwal-ku
`Kawasakl-shl Kanagawa-ken 210(JP)
`
`© Inventor: Tamada, Masuo c/o Patent Division
`Kabushlkl Kalsha Toshiba
`1-1 Shlbaura 1-chome
`Mlnato-ku Tokyo 105(JP)
`Inventor: Matsuoka, Hideo c/o Patent Division
`Kabushlkl Kalsha Toshiba
`1-1 Shlbaura 1-chome
`Mlnato-ku Tokyo 105(JP)
`Inventor: Tanaka, Tsutomu c/o Patent Division
`Kabushlkl Kalsha Toshiba
`1-1 Shlbaura 1-chome
`Mlnato-ku Tokyo 105(JP)
`
`© Representative: Henkel, Feller, Hanzel & Part-
`ner
`Mohlstrasse 37
`D-81675 Munchen (DE)
`
`CO
`o>
`00
`CO
`CO
`oo
`Note: Within nine months from the publication of the mention of the grant of the European patent, any person
`® may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition
`shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee
`CL
`LU
`has been paid (Art. 99(1) European patent convention).
`Rank Xerox (UK) Business Services
`(3. 10/3.09/3.3.3)
`
`Page 1 of 12
`
`PNC-JP MORGAN EXHIBIT 1012
`
`

`
`1
`
`EP 0 316 689 B1
`
`2
`
`Description
`
`The present invention relates to an IC card
`used, for example, as a credit card, a cash card,
`and the like.
`The conventional magnetic card, having a mag-
`netic stripe for storing data, is in widespread use
`as a credit card or a cash card. Recently, however,
`an IC card incorporating a nonerasable nonvolatile
`memory controlled by a CPU built into an IC chip,
`has been receiving considerable attention as a re-
`placement for the magnetic card, since the greatly
`increased memory capacity of the IC card over that
`of the magnetic card makes it possible for the IC
`card to be used in a much wider range of applica-
`tions than is possible with a magnetic card. Re-
`cently, a multifunctional IC card has been devel-
`oped which incorporates a battery therein, as well
`as a keyboard and a display section. This particular
`IC card, moreover, can be operated in an off-line
`manner; i.e. without having to be connected to a
`terminal device or the like.
`When this IC card is used as a credit card or a
`cash card, a transaction valid date, representing a
`period for which transactions can be made, and a
`transaction limit amount, representing a maximum
`amount with which transactions can be made, are
`set and checked prior to the transactions. These
`transaction valid date data and transaction limit
`amount data are stored in a memory of the IC card,
`and can be externally updated, if desired.
`In the conventional case, when the transaction
`valid date data and the transaction limit amount
`data are updated, there is no means by which the
`validity of externally input data can be authen-
`ticated. Therefore, the possibility exists that inter-
`nally stored data may be updated, illegally, for
`fraudulent purposes. The transaction valid date
`data and the transaction limit amount data are
`particularly important data, and these data must not
`be illegally updated.
`Note that the related art for generating a sales
`approval number on the basis of an input PIN and
`total amount is disclosed in USP No. 4,697,072
`(Inventor: Shigeyuki Kawana, Title: "IDENTIFICA-
`TION CARD AND AUTHENTICATION SYSTEM
`THEREFOR").
`Prior art document WO-A-86/03040 discloses a
`portable electronic apparatus comprising data stor-
`ing means for storing transaction data, input means
`for inputting the transaction data to be stored in
`said data storing means, and control means for
`controlling said transaction data storing means and
`said input means. This known apparatus further
`comprises means for generating additional data in
`the form of a transaction key number differing from
`one another for every generation. This additional
`data is used together with the transaction data
`
`input from said input means to generate a transac-
`tion identification code which can be checked in a
`manner similar to a parity check to determine the
`validity of the transaction identification code, e.g.
`by entering it in an automatic teller machine.
`Further, prior art document DE-A-32 22 288
`discloses an identity card comprising a micropro-
`input means and display means. The
`cessor,
`microprocessor is connected to timer means. The
`data supplied to the display means can also be
`applied to external terminal means, and it is possi-
`ble to supply data to the microprocessor through
`the external terminal means.
`It is an object of the present invention to pro-
`vide a portable electronic apparatus which is ca-
`pable of authenticating the validity of externally
`input data and, in particular, an apparatus which
`can prevent illegal updating of important data, and
`the like.
`To solve this object the present invention pro-
`vides a portable electronic apparatus as specified
`in claim 1 .
`According to the portable electronic apparatus
`of the present invention, the validity of all externally
`input transaction data can be authenticated, with
`update processing being executed, only when the
`result of authentication is affirmative. In this way,
`important data stored in the memory is protected
`against illegal updating.
`Other objects and features of the present in-
`vention will be apparent from the following descrip-
`tion taken
`in connection with the accompanied
`drawings, of which:
`Fig. 1 is a view showing the outer appearance of
`a portable electronic apparatus according to an
`embodiment of the present invention;
`Fig. 2 is a block diagram showing a detailed
`arrangement of an integrated circuit shown in
`Fig. 1 ; and
`Fig. 3 is a flow chart for explaining update
`processing of the transaction limit amount and
`the transaction valid date in regard to the em-
`bodiment shown in Figs. 1 and 2.
`Fig. 1 shows the outer appearance of a mul-
`tifunctional IC card used, for instance, as a credit
`card, and being an example of a portable electronic
`apparatus according to the present invention. This
`IC card is designed such that it can be used both
`in on-line and off-line modes. For example, the IC
`card has a transaction function by means of which
`it can perform transactions in relation to a plurality
`of accounts (available as, e.g., a plurality of types
`of credit card and cash card), a time-piece function
`for displaying time-related data including the date
`and the time, a calculation function capable of
`executing at least four operations; and an electronic
`notebook function for storing and reading out ad-
`dresses, names, phone numbers, and the like.
`
`5
`
`io
`
`75
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`2
`
`Page 2 of 12
`
`

`
`3
`
`EP 0 316 689 B1
`
`4
`
`Fig. 1 shows card main body 1 which can be
`constituted by, for example, a thin plastic board of
`rectangular shape. Card main body 1 includes con-
`tact section 3, which is electrically connected to
`integrated circuit (IC) 2 buried in main body 1, for
`electrically communicating with a terminal device
`(not shown) in the on-line mode, liquid crystal
`display section 4 for displaying input/output data,
`time-related data, and the like, and keyboard 5, all
`of these units being arranged at predetermined
`positions on the front surface of main body 1 . Card
`main body 1 additionally contains battery 6 for
`supplying a power source voltage.
`Keyboard 5 includes account keys 7, 8, 9, and
`10 for designating an account; numeric keys 11;
`addition key 12, subtraction key 13, division key
`14, and multiplication key 15, these being the four-
`operation keys; decimal key 16; equal key 17; and
`the like.
`Account key 7 designates a first operation (pro-
`cessing) for a first account (e.g., account data of a
`first credit company), account key 8 designates a
`second operation for a second account (e.g., ac-
`count data of a second credit company), account
`key 9 designates a third operation for a third ac-
`count (e.g., account data of a first bank), and
`account key 10 designates a fourth operation for a
`fourth account (e.g., account data for a second
`bank).
`Addition key 12 is used as a "next" key for
`advancing the display state of liquid crystal display
`section 4, and for mode-selection; subtraction key
`13 is used as a "back" key for restoring display
`section 4 to its previous display state; and equal
`key 17 serves a dual purpose, being the used as
`"yes" key and also as the initialization key (power-
`on key).
`Embossed data (not shown) is formed at a
`predetermined position of the rear surface of card
`main body 1 as card holder data.
`Fig. 2 shows a circuit arrangement of the in-
`tegrated circuit shown in Fig. 1. Communication
`control circuit 21 , reset control circuit 22, and pow-
`er source control circuit 23 are connected to con-
`tact section 3. In addition, battery check circuit 24
`for checking whether the voltage of battery 6 is
`more than a predetermined value or not is con-
`nected to power source control circuit 23. Internal
`bus 38 is connected to program memory 28 for
`storing a control program, working memory 29
`used for arithmetic operations, data memory 30
`consisting of a nonvolatile memory such as an
`EEPROM for storing transaction data, timer circuit
`31 used when time is counted during program
`execution, and timer circuit section 32 for generat-
`ing time-piece data including time data and date
`data. This timer circuit section 32 includes timer
`circuits 322 and 323, and frequency divider 311.
`
`5
`
`io
`
`is
`
`20
`
`25
`
`Oscillator 33 having a frequency of 32.768 kHz is
`connected to timer circuit section 32.
`Display section 4 is connected to internal bus
`38 through display control circuit 34 and display
`driver 35. Keyboard 5 is also connected to internal
`bus 38 through keyboard interface 36. In addition,
`confirmation data generating circuit 37 for generat-
`ing the confirmation data of the input transaction
`data using key data based on DES (Data Encryp-
`tion Standard) and CPU (Central Processing Unit)
`27 for controlling the entire circuit shown in Fig. 2
`are connected to internal bus 38.
`Communication control circuit 21 is operated in
`the on-line mode. More specifically, serial data
`supplied from the terminal equipment (not shown)
`through contact section 3 is converted into parallel
`data and output to data bus 38. Otherwise, parallel
`data supplied from data bus 38 is converted into
`serial data and output to the terminal equipment
`through contact section 3.
`Reset control circuit 22 is operated in the on-
`line mode. This circuit 22 receives a reset signal
`supplied from the terminal equipment through con-
`tact section 3 to initialize CPU 27.
`After the predetermined time is elapsed in the
`on-line mode, power source control circuit 23 is
`switched to be driven by an external power source
`(supplied from the terminal equipment through con-
`tact section 3) in place of battery 6. In the off-line
`30 mode, i.e., when the voltage of the external power
`source is decreased, power source circuit 23 is
`switched to be driven by battery 6 in place of the
`external power source. When key input is not per-
`formed (in a stand-by state) in the off-line mode,
`clock control circuit 25 stops the operation of os-
`cillator 26 for generating a clock having a fre-
`quency of 1 MHz. In addition, the clock is not
`supplied to CPU 27, and the circuit is completely
`stopped. In this state, when initialization key 17 is
`turned on, oscillator 26 is operated. In addition, a
`time-piece clock of 32.768 kHz output from timer
`circuit section 32 is supplied to CPU 27. When the
`next key operation is performed after initialization
`key 17 is turned on, the clock of 1 MHz output
`from oscillator 26 is supplied to CPU 27. In the on-
`line mode, by supplying a reset signal from reset
`control circuit 22, the clock supplied from the ter-
`minal equipment through contact section 3 is input
`to CPU 27.
`A transaction function program, a time-piece
`function program, a calculation function program,
`an electronic memorandum notebook function pro-
`gram, and the like are stored in program memory
`28. CPU 27 selectively executes and processes
`these programs in program memory 28, so that the
`transaction function, the time-piece function, the
`calculation function, the electronic memorandum
`notebook function, and the like are selectively op-
`
`35
`
`40
`
`45
`
`50
`
`55
`
`3
`
`Page 3 of 12
`
`

`
`5
`
`EP 0 316 689 B1
`
`6
`
`erated.
`Account data (including transaction valid date
`data, transaction limit amount data, PIN, the re-
`newal number of the transaction valid date and
`transaction limit amount) corresponding to the first
`through fourth accounts as described above are
`stored in data memory 30. When one of the above
`account keys 7 through 10 is pushed, the cor-
`responding account data is selected and the cor-
`responding processing is executed in accordance
`with the account data. In an electronic memoran-
`dum notebook area in data memory 30, addresses,
`names, and phone numbers are stored.
`Timer circuit section 32 comprises frequency
`divider 321 which frequency-divides a clock of
`32.768 kHz output from oscillator 33, and gen-
`erates a one-second clock, and first and second
`timer circuits which generate time-piece data con-
`sisting of year-month-date data and time data by
`counting the clock generated from frequency di-
`vider 321. First timer circuit 322 is a display timer
`circuit which can freely set and change the time-
`piece data in accordance with the operation of
`keyboard 5 by a card holder. Second timer circuit
`323 is, e.g., a timer circuit in which time-piece data
`is set when the card is issued and which cannot
`change setting of the time-piece data unless the
`validity of the operation is proved by the predeter-
`mined procedures.
`Display control circuit 34 converts display data
`supplied from CPU 27 into a character pattern
`using a character generator (not shown) comprising
`an internal ROM, and displays the converted char-
`acter pattern on liquid crystal display section 4
`through display driver 35.
`Confirmation data generating circuit 37 gen-
`erates reference confirmation data for confirming
`the validity of input data. For example, as shown in
`Fig. 3, confirmation data generating circuit 37 gen-
`erates confirmation data encrypted using the pre-
`determined key data on the basis of the input data
`such as an account type, a supplementary amount
`of the transaction limit amount, and the transaction
`valid date (year, month, and day), and encryption
`generating data (inherent data) within the card such
`transaction
`limit
`as a renewal number of the
`amount and the transaction valid date stored in
`data memory 30.
`With this arrangement, the case where an IC
`card holder purchases a desired item using this IC
`card, e.g., in the off-line mode will be described
`hereinafter. At first, the card holder presents the IC
`card to a store clerk of a retail store. The store
`clerk receives the IC card, and imprints embossed
`data on the IC card in an emboss imprint section of
`a transaction slip by an emboss imprinter. Then,
`the store clerk returns the IC card to the card
`holder, and writes transaction data such as a trans-
`
`action amount and transaction date in the cor-
`responding space of the transaction slip.
`The card holder selects an account type by
`account keys 7 through 10 of keyboard 5. CPU 27
`reads out account data corresponding to the se-
`lected account type from data memory 30. CPU 27
`displays the account type on liquid crystal display
`section 4, and also displays a message for urging
`the card holder to input a PIN. Then, the card
`holder inputs the PIN by ten keys 11 of keyboard
`5. Therefore, CPU 27 compares and verifies the
`input PIN with the PIN in the account data which is
`read out from data memory 30, and the validity of
`the card holder is judged. As the result of the
`judgement, if the card holder is invalid, the mes-
`sage representing this fact is displayed on liquid
`crystal display section 4, and the transaction is
`ended. However, if the card holder is valid, CPU 27
`displays the message "Shopping?". When the card
`holder pushes "yes" key 17 of keyboard 5, CPU
`27 sets a "shopping" mode. In addition, CPU 27
`compares and verifies transaction valid date data in
`the account data read out from data memory 30
`with date data generated from second timer circuit
`323 to judge the valid date. As a result of the
`judgement, if the transaction date is not within the
`valid period of the IC card, the message represent-
`ing that the valid date is exceeded is displayed on
`liquid crystal display section 4, and this transaction
`is ended. As a result of the judgement, if the
`transaction data is within the valid period, CPU 27
`displays the message for urging the card holder to
`input the transaction amount.
`When the card holder, therefore, inputs the
`transaction amount by ten keys 11 of keyboard 5,
`CPU 27 compares and verifies the input transaction
`amount with the transaction limit amount data in
`the account data read out from data memory 30
`and judges whether the transaction is possible or
`impossible. As a result of the judgement, if the
`transaction is impossible, the message represent-
`ing that the transaction is impossible is displayed
`on liquid crystal display section, and this transac-
`tion is ended. On the contrary, if the transaction is
`possible, CPU 27 substracts the input transaction
`amount from the transaction limit amount data in
`the account data read out from data memory 30,
`and updates the transaction limit amount data in
`data memory 30 using the subtracted result as new
`transaction limit amount data.
`Then, the card holder presents the IC card to
`the store clerk. The store clerk receives the IC
`card, writes the displayed account type into the
`corresponding space of the transaction slip, and
`passes the transaction slip to the card holder. The
`card holder writes his or her name into the space
`for a signature of the transaction slip, and returns
`the transaction slip to the store clerk. Then, the
`
`5
`
`io
`
`is
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`4
`
`Page 4 of 12
`
`

`
`7
`
`EP 0 316 689 B1
`
`8
`
`shopping procedures are completed.
`limit
`the
`transaction
`Update processing of
`amount and the transaction valid date of the des-
`ignated account type as an example of the validity
`of the input data will be described below with
`reference to Fig. 3.
`The card holder selects the account type by
`account keys 7 through 10 of keyboard 5. Then,
`CPU 27 reads out the account data corresponding
`to the selected account type from data memory 30,
`displays the account data on liquid crystal display
`section 4, and displays the message for urging the
`card holder to input the PIN. When the card holder
`inputs the PIN by numeric keys 11 of keyboard 5,
`CPU 27 compares and verifies the input PIN with
`the PIN in the account data read out from data
`memory 30 and judges the validity of the card
`holder. As a result of the judgement, if the card
`holder is invalid, the message representing the
`invalidity of the card holder is displayed on liquid
`crystal display section 4, and the operation is end-
`ed. As the result of the above judgement, if the
`card holder is valid, CPU 27 displays the message
`"Shopping?" on liquid crystal display section 4. At
`this time, the card holder repeatedly pushes "next"
`key 12 of keyboard 5 to select a mode. When the
`message "Update?" is displayed on liquid crystal
`display section 4, pushing of "next" key 12 is
`stopped. When the card holder pushes "yes" key
`17 of keyboard 5, CPU 27 sets the update mode,
`and displays the message for urging the card hold-
`er to input the amount on liquid crystal display
`section 4.
`When the card holder, therefore, inputs the
`the
`transaction
`limit
`supplementary amount of
`amount to be updated by numeric keys 11 of
`keyboard 5, CPU 27 displays the message for
`urging the card holder to input the data on liquid
`crystal display section 4. The card holder inputs
`the confirmation data by keyboard 5. The confirma-
`tion data input from keyboard 5 is generated as
`follows. The card holder calls, e.g., a credit com-
`pany and informs the account type, and the trans-
`action amount and the transaction valid date which
`are to be updated to the company. As a result, the
`credit company encrypts a data string of the ac-
`count type, the transaction amount and transaction
`valid date to be updated, and the renewal number
`with key data based on DES, using a host system
`and the same algorithm as confirmation data gen-
`erating circuit 37. Then, the confirmation data is
`generated. The generated confirmation data is in-
`formed to the card holder by a phone call. The
`card holder inputs the confirmation data from key-
`board 5.
`When the input of the confirmation data is
`completed as described above, the card holder
`the
`transaction
`the account
`type, and
`inputs
`
`5
`
`io
`
`is
`
`amount and transaction valid date (year, month,
`and day) which are to be updated as the transac-
`tion data to be updated. CPU 27 receives these
`input data and supplies a renewal number (se-
`quence number) in the account data readout from
`data memory 30 to confirmation data generating
`circuit 37. Note that the renewal number is updated
`upon every updating of the transaction limit amount
`and transaction valid date. Confirmation data gen-
`erating circuit 37 encrypts the data string of the
`supplied account type, transaction amount and
`transaction valid date which are to be updated, and
`renewal number (stored in the predetermined re-
`gion of the data memory) using the key data in
`accordance with DES to generate reference con-
`firmation data. CPU 27 compares the input con-
`firmation data with the reference data. When these
`data coincide with each other, CPU 27 judges that
`input data and the input confirmation data are valid,
`and updates the transaction limit amount data and
`the transaction valid date data in the selected ac-
`count data on the basis of the input data. On the
`other hand, when the above data do not coincide
`with each other, CPU 27 judges that at least one of
`the input data and the input personal data is in-
`valid, and stops the update processing.
`When the transaction limit amount and the
`transaction valid date are updated as described
`above, by inputting the data for updating (account
`type, supplementary amount, date) from the key-
`board, the confirmation data encrypted using the
`predetermined key data is generated on the basis
`of the input data and the encryption generating
`data within the card such as a renewal number
`stored in the data memory. Then, the generated
`confirmation data is verified with the confirmation
`data which is input from the keyboard, and the
`validity of the above input data is judged. There-
`fore, the validity of the input data from the key-
`board can be judged. When the result of the judge-
`ment is negative, the update processing is stop-
`ped. Only when the result of the judgement is
`affirmative, the update processing is executed and
`the illegal updating of the transaction limit amount
`data and transaction valid date data which are
`stored in data memory 30 can be prevented.
`When the renewal number (sequence number)
`is used as the encryption generating data within
`the card, it can be controlled so that the encryption
`generating data which was once used cannot be
`used again. More specifically, the latest renewal
`number is input with the confirmation data at the
`next renewal. By comparing the input renewal num-
`ber with the renewal number in the data memory,
`55 when the same or smaller renewal number is input,
`the update processing can be prohibited.
`Note that, although the above-described em-
`bodiment is described with reference to the off-line
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`5
`
`Page 5 of 12
`
`

`
`9
`
`EP 0 316 689 B1
`
`10
`
`mode, the operation in the on-line mode is similar
`to that in the off-line mode. In this case, the data
`for updating (account type, supplementary amount,
`and date) and the confirmation data are input from
`the keyboard of the terminal equipment in which
`the IC card is set due to the on-line operation.
`Then, the data are input to CPU 27 through contact
`section 3 and communication control circuit 21 of
`the IC card.
`In the above embodiment, the transaction limit
`amount and the transaction valid date are simulta-
`neously updated. However, these data need not be
`updated simultaneously and may be updated sepa-
`rately. In addition, the updating data is not limited
`to the transaction limit amount and the transaction
`valid date, and other data can be updated or
`changed.
`In the above embodiment, although the renewal
`number is used as the encryption generating data
`within the card, the data is not limited to the
`renewal number. For example, time-piece data
`generated from second timer circuit 323, or trans-
`action number (updated upon every transaction and
`upon updating stored in data memory 30) may be
`used.
`
`Claims
`
`-
`
`1. A portable electronic apparatus comprising:
`- data storing means (30) for storing trans-
`action data including credit limit data and
`expiration valid date data;
`- control means (27, 28) for controlling
`said transaction data storing means (30);
`- additional data generating means (27, 28,
`30, 32) for generating data which differs
`one another for every generation of the
`additional data;
`internal confirmation data generating
`means (37) for generating internal con-
`firmation data from data which includes
`the additional data from said additional
`data generating means (27, 28, 30, 32)
`and the transaction data stored in said
`data storing means (30), the internal con-
`firmation data being used when one of
`the credit limit data and expiration valid
`date data is to be updated;
`input means (5) for inputting at least one
`of the credit limit data and the expiration
`valid date data to be updated in said
`data storing means (30); and
`- comparing means (27, 28) for comparing
`said internal confirmation data with refer-
`ence confirmation data;
`characterized in that
`receiving means (3, 21) receive external
`-
`confirmation data supplied from an exter-
`
`-
`
`nal device, the external confirmation data
`being used for confirming the renewal of
`at least one of the credit limit data and
`the expiration valid date data input from
`said input means (5) at said data storing
`means (30);
`- said comparing means (27, 28) compare
`the internal confirmation data generated
`by said internal confirmation data gen-
`erating means (37) with the external con-
`firmation data received from the external
`device so as to obtain a comparison re-
`sult; and
`- said control means (27, 28) update at
`least one of the credit limit data and
`expiration valid date data stored in said
`data storing means (30) by using those
`input from said input means (5), when
`the comparison result obtained from said
`comparing means (27, 28) represents a
`coincidence.
`
`2. An apparatus according to claim 1, character-
`ized in that the additional data includes a re-
`newal number of the transaction data.
`
`3. An apparatus according to claim 1, character-
`ized in that said internal confirmation data gen-
`erating means (37) generates the internal con-
`firmation data by encrypting a combination of
`the additional data and the transaction data,
`using a binary value on the basis of Data
`Encryption Standard.
`
`4. An apparatus according to any one of claims 1
`to 3, characterized in that said control means
`(27, 28) in

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket