throbber
United States Patent 1191
`Akiyama et al.
`
`llllllllllllllllllllllIllllllllllllllllllllllllllllllllllllllllllllllllllll
`5,428,684
`Jun. 27, 1995
`
`US005428684A
`[11] Patent Number:
`[45] Date of Patent:
`
`[54] ELECTRONIC CASHLESS TRANSACTION
`SYSTEM
`[75] Inventors: Ryota Akiyama; Takayuki Hasebe,
`both of Kawasaki, Japan
`[73] Assignee: Fujitsu Limited, Kawasaki, Japan
`[21] Appl. No.; 953,375
`[22] Filed:
`Sep. 30, 1992
`[30]
`Foreign Application Priority Data
`Sep. 30, 1991 [JP]
`Japan ................................ .. 3-278831
`
`[51] Int. 01.6 ............................................. .. H04K 1/00
`[52] US. Cl. ...................................... .. 380/25; 380/21;
`330/23; 235/330
`[53] Field of Search ..................... .. 235/379, 380, 3232;
`330/21, 23, 24, 25, 29, 49; 329/91, 97, 93
`References Cited
`U.S. PATENT DOCUMENTS
`
`[56]
`
`4,799,061 l/ 1989 Abraham et a1. ............... .. 380/23 X
`5,012,076 4/ 1991
`5,120,939 6/1992
`..
`5,175,416 12/1992
`5,224,162 6/1993 Okamoto et a1. ................... .. 380/24
`
`OTHER PUBLICATIONS
`Wwinstein, Stephen; IEEE Spectrum; “Smart credit
`cards: the answer to cashless shopping”; Feb. 1984; pp.
`43-49.
`Primary Examiner—Tod R. Swann
`
`Attorney, Agent, or Firm-Nikaid0, Marmelstein,
`Murray & Oram
`ABSTRACT
`[57]
`A key control method is for use in an electronic cashless
`transaction system including at least a bank center, a
`store transaction terminal and an IC card being used as
`an electronic cashless transaction medium. The key
`control method comprises a step of having the bank
`center generate and code a ?rst parameter for a trans
`mission to the IC card; a step of having the IC card
`receive and decode the coded ?rst parameter by using
`the ?rst key, thereby reconstructing the ?rst parameter
`issued by the bank center, perform a ?rst operation on
`the ?rst parameter and a password of a holder of the IC
`card, and store in a ?rst register; a step of having the
`store transaction terminal send to the IC card a second
`parameter coded by a second key, when the holder
`inserts the IC card 11 into the store transaction terminal;
`a step of having the IC card decode the coded second
`parameter by using the second key, thereby recon
`structing the second parameter received from the store
`transaction terminal, perform a second operation on the
`second parameter and the value stored in the ?rst regis
`ter, store a result of the second operation in the second
`register; and a step of decoding a value stored in the
`second register by using a coding session key stored in
`a memory of the IC card, thereby obtaining a key for an
`intended authentication.
`
`14 Claims, 21 Drawing Sheets
`
`"SWORD
`ENTRANCE
`[30
`\
`
`42 1C CARD
`
`1c CARD
`ACTIVATION
`
`\‘3'
`B5
`
`44 BANK CENTER
`m r]
`44A
`,5
`
`NUMBER
`moon ,
`
`I132
`
`loo-2
`(V
`I KEY-A
`}
`
`I
`
`m\_\ moon
`NUMBER
`
`~
`i H
`comm; b I
`|34~¢¥SESSION KEY
`__L
`come
`0
`
`|42\
`
`IOO-l
`(J
`KEY-A
`
`}
`
`133
`H
`[come 0
`134-!
`
`F- I43
`[w
`DECODING
`c
`
`145
`(\
`
`come 1]
`
`146
`(‘J
`commsou
`[as
`come
`mm
`T n
`an: no
`54
`\ °"
`r1
`1
`1c cm ACCESS
`ECOBINE F-J
`Pasta '“GATE
`.b_. t
`
`144
`C’
`
`CODIllGf -
`
`l
`
`13s
`1
`
`[I
`71100111011
`
`I
`
`T
`‘)3?
`income
`0
`
`139
`)
`some a
`
`55 TRANSFER AMOUNT
`
`PNC-JP MORGAN EXHIBIT 1014
`
`Page 1 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 1 0f 21
`
`5,428,684
`
`\L
`
`558 is u a
`
`25 $358 )2
`
`
`
`3.... 2: 2235s :2 .
`
`2 w 55.2.:
`
`
`
`582 3:55
`
`/~._ \
`
`
`
`
`22: 8:525 22523 $222 H m2 35.5
`v 5: Z3.
`
`2 CM 2.3 H a 21
`
`
`
`.55; 5.32 w
`8:5: 23 2 . __
`
`
`
`
`
`2582 we; E2 3255. 2:3 " 5 cs 3 x g m
`
`1 _ a @ .._
`
`A a Q z
`
`
`
`5: 3:. 22a 2
`
`.. :52: is <
`
`
`
`0 .552: xzg u
`
`. 522.22
`
`
`
`
`
`.2255.» 225525; mzohm “ EN
`
`Page 2 of 39
`
`

`

`US. Patent
`
`5my
`
`.m2
`
`n“
`
`5,428,684
`
`1.‘mm<h<a
`w555.58
`J.259:3:53
`muhm_ommm$53.2...mudm>5me358.5
`
`
`
`
`mm<zom=m
`
`hzaoz<
`
`nu
`
`
`
`
`
`4<z_xmmhzo_hu<mz<mpmachmuN.az<o0.":
`
`Page 3 0f 39
`
`Page 3 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 3 of 21
`
`5,428,684
`
`N
`
`N mm
`
`53A.
`
`$20 2 u :
`
`
`
`>8. 55.22 E euaou mo
`
`
`
`$58 .82
`
`wwé
`5.325:
`
`.5523
`
`Page 4 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 4 of 21
`
`5,428,684
`
`5.53 x55
`
`A
`
`A
`
`28.5
`
`we
`
`$20 2
`
`N
`‘A
`
`$20 2
`
`:2 :95
`
`Page 5 of 39
`
`

`

`US. Patent
`
`%m”m
`
`5
`
`95
`
`428,684
`
`zo_ho<mz<¢h
`
`4<z_z¢UH
`
`
`
`zumz=z4<_¢um.
`
`.._-~¢
`
`
`
`:35:nEnemamd_n.—nm<F<a
`m35.3,.5.553,.$2.8%5.:
`
`
`m.ha:2.a.J.:33:
`v.2:E5:83I:mE57$
`umohw,n-~¢
`
`<¢¢
`
`zmhzmu
`
`
`
`Page60f39
`
`Page 6 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 6 of 21
`
`5,428,684
`
`
`
`:52... 5..
`
`
`
`2.2.5. 5.5.3....
`
`
`
`
`
`$5.0.“ (TS. =8. \.....8. 3.8 .65.. £28.22. ...m m...‘
`
`
`
`
`
`
`
`
`
`
`
`.mgn?wmuwm /\ _....e...-.. 2..-... .28...
`
`
`
`
`
`
`
`
`
`:3... we. .. =8 5...... 2.. $5....
`
`
`
`
`
`2.8.... 3...... / , 2.... . 5.... (J
`
`
`
`
`
`
`
`
`lulmf?m. .Eil 1|1=§=<HE 5:: 5.8.2.68. / 38:... .~-~¢
`
`
`
`5:... .5... 3 8 2235s :2 <3 2.... Q. N.
`
`7. . .55.... .5... \L
`
`
`
`
`5.8.... 2.252..
`.._......3...._. a... U .28. Q 23.. a. i.
`
`$2225: I.
`
`.23... .. a.
`
`
`
`45:22: 258...???6 .3
`
`
`
`
`
`w a m h- / ....... (\/ 2-...
`
`
`
`mi. .3... 5......
`
`2-..?
`
`
`
`. .27 N. a:
`
`
`
`
`
`
`
`
`
`
`
`
`
`2... .52.... .5... 3.... .v?uwu _...5....._ ..<............. _ .25....
`
`
`
`/ B 5.-..‘ -7 9...: .28...
`
`
`
`
`
`
`
`. 5.8... 5.. ..m .2...
`
`
`§§=m=5< .2. . .22.... .2... ..._.§3.<
`
`
`
`1352.51.23 m3<> 2-: IM'NQJ $2
`
`
`
`
`3.5 .N.:=...<-e....... .58. $.22. 5...... E52...
`.51: E<lmv=z=zu : zzahum
`
`.5 .5...
`
`Page 7 of 39
`
`

`

`US. Patent
`
`em
`
`.ox.
`
`m.m
`
`5,428,684
`
`
`1,5:23v.552.5o.
`
`m3....58m:5:ES“:
`
`$22553&558V2:5.32
`75:35,5233m$22553
`
`:52:
`
`5.325....mm
`
`omaoo5:.szxx:8389.5o.
`
`
`
`.zuacumaxzuaoeSusan—Emacs
`
`
`
`$2.13:Edd»
`
`2.229551.2“<3
`
`
`
`muhzmoxz<m"ec5.5u.u~¢
`
`Page 8 0f 39
`
`Page 8 of 39
`
`
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 8 of 21
`
`5,428,684
`
`.
`42 - "3 CARD
`2
`
`54
`
`i
`|c CARD
`LEDGER FILE
`
`43 : STORE
`TRANSACHON
`TERMINAL
`
`i?
`
`8|
`‘\
`S#LEERTOTAL
`8 0R
`
`83 \A
`
`44 : BANK CENTER
`2
`
`A HOLDER
`i5 - AccouMT
`as
`r.’
`uMsETTLEo
`Eunos FlLE
`
`sETTLEMEMT <
`84
`REQUEST
`TRANSACTION
`‘K
`REGISTER!
`FRAUD-PROOF
`9° “KA CODER
`sETTLEMEMT
`82
`,
`5
`MAKER
`FRAUD M 87‘
`DETECTOR
`RETAILER
`ACCOUNT
`
`a?’
`TRANSACTION
`“gum
`
`Fig.8
`
`Page 9 of 39
`
`

`

`US. Patent
`
`..u.
`
`(cc
`
`J3.
`
`m.-a.:53:.d
`
`m9,528r1111111111J1,v.2:
`s_35.8”.E:
`
`.:
`
`_a_.hmm=omm
`
`E
`
`n,m
`
`5,428,684
`
`m352.sis."59:En
`
`w352.u
`
`_m-~¢
`
`ma_.._
`
`_-~¢
`
`zuaoomo
`
`
`
`«:03..m.
`
`.¢_
`
`«-me
`
`amcoo.
`
`.4>mx
`
`azoimmcm
`
`Pagel00f39
`
`Page 10 of 39
`
`
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 10 of 21
`
`5,428,684
`
`.:..n¢
`
`.Illl
`
`
`
`55.9%.azoumm.mun—coma:99:52m2.=3mm<mu_L
`
`.73
`
`225555mac;u3
`
`.2253...
`
`a32a$98.33Q.
`
`.7?N.2.32
`
`Page 11 0f 39
`
`452mm
`
`535:
`
`
`Yue93
`
`
`
`5:23:28%«éa.$53:5.:
`
`
`
`=1.=33..3.ua;.258¢
`
`.1:_3e
`
`
`
`.355.8,.Excfiozmz
`
`03:
`
`
`
` _m-~¢5.8.8:_1.559..SE79._
`
`
`
`$5.3”.:52:
`
`.59..33
`
`mg.l-8.ace:5%n
`
`
`
`_33:25.
`
`Page 11 of 39
`
`
`
`
`

`

`US. Patent
`
`June 27,1995
`
`Sheet 11 of 21
`
`5,428,684
`
`
`
`zmhzmo
`
`xz<m
`
`¢¢
`
`<¢¢
`
`J
`
`r.558”.22:.32::a.
`
`.:
`
`.._cmx._=_xm._4m
`
`..=amx._a_xu__4m
`
`:;a~¢
`
`az<ou.
`
`muncouc
`
`.4>mx
`
`Pag€120f39
`
`Page 12 of 39
`
`
`
`
`
`
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 12 0f 21
`
`5,428,684
`
`
`
`5.53 zz<m :
`
`Too
`
`1
`
`2.; " <3.
`1
`
`V
`AA‘ 238
`
`1 ~62
`a: u_ we
`I
`
`
`
`$833: muhzu
`
`2.2;
`
`Page 13 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 13 of 21
`
`5,428,684
`
`42 IC CARD
`PASSWORD J
`ENTRANCE
`130
`\
`
`24121!
`2
`
`Bl
`1c CARD
`ACTIVATION '\
`135
`
`'°°-2 \\
`KEY-A
`
`44 BANK CENTER
`(‘J
`132
`
`RANDOM
`B3 NUMBER
`100-1
`P:
`S
`came a -- KEY-A
`
`l
`—-coome b
`N I344
`SESSIWRZEY
`vm SESSION KEY
`m
`DECgDING N ‘a;
`
`'36
`
`_‘
`coolue c
`
`54
`
`'4°
`m <
`FILE
`TDECtLDING
`UPDATION
`
`ADDITlGN
`
`‘
`A mm d
`B95
`
`Fig.|4
`
`55 TRANSFER AIOUNT
`
`Page 14 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 14 0f 21
`
`5,428,684
`
`42 IC CARD
`F)
`
`PASSWORD
`ENTRANCE
`130 /
`\?'
`\
`1c cm
`I35
`ACTIVATION
`\
`l00-2
`‘ 2
`rv
`KEY-A P-comne b
`
`44 BANK CENTER
`m A
`44A
`(5
`
`[I32
`
`NUMBER
`RANDOM
`I33
`IOO-l
`,J
`r"
`come 0 - KEY-A
`
`l34-2\_ SESSION KEY
`I42\
`coome
`e
`
`\
`’
`
`I344
`
`I43
`\ DECODING__
`'
`c
`
`|4|\\ nmol
`NUMBER
`
`I45
`r~
`come 9
`
`14s
`r’
`common
`
`\
`’
`
`uncn
`
`‘
`
`k
`J
`
`136
`5
`A concme
`'47 GATE
`I40
`54
`\ °" 1
`1
`IC cm ACCESS DECODING
`IEIEBEGER "'GATE
`b
`
`I44
`r’
`CODINGf
`
`\
`L___
`
`'37
`oEcoome

`
`1
`
`I38
`
`)
`
`r ADDITION
`
`I39
`)
`A mm d
`
`55 TRANSFER AMOUNT
`
`Page 15 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 15 of 21
`
`5,428,684
`
`29.
`
`f 1
`
`
`
`
`
`.2552. zoiugzgb. “.295 " me
`
`~ 1 f KN em
`Ev EN 5: E3 /
`
`mum A
`
`mg 5 3:
`
`
`
`<5: .53 :52: E3 2
`
`
`
`2.52: E83
`
`
`
`223525; 23 o- u we
`
`
`
`is 5%: >55 1 585 .2255:
`
`m 558
`
`/8~
`
`h 55:55 was 5%: £5
`
`$25.28 < 5:8 mm org
`a » $25 23 2
`
`w _ .0 _ .._
`
`Page 16 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 16 of 21
`
`5,428,684
`
`
`
`£5.53”-8“as2Eva:E5Ea525:225::35:$835:$85zezgzg3:8
`
`
`
`
`5:225:E85.5.35EcuwwuE.v.2:
`
`
`.225525.285:3szgnaw"53..2.595
`
`
`
`
`a£22522m:32253.2503mm<N._.UE
`
`
`<2:.22:<2:.22:$23.
`:52:E—E:§Ea._225325:
`
`
`Exam<5:20.5325..—_SN.22:mmm<zom=m:¢<ou.nemu
`
`.2255...22.5325:mac;“3:5:u.uwe
`:34:8,v2:
`
`n..53:$238<5:
`
`
`
`
`<2:22.53::<2:3:8"mvu
`
`
`
`8:23.5:05<h<:225525....”mfimu
`
`
`
`:2.22:9522835::was
`
`
`
`2252.5845:25:.
`
`.|_$25.
`
`«-3323:2.32..3
`
`_:¢<uo.in.
`
`E:25:...
`
`
`
`Page 17 0f 39
`
`><._n_m_:
`
`
`
`hz=o2<ammo;
`
`«25.5.28N._9“—:¢<ou.
`
`Page 17 of 39
`
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 17 of 21
`
`5,428,684
`
`
`
`
`
`C228352.5:02...._.2=c2<22.5335u>:<._=z=u.3mm=m<
`
`
`
`
`
`E..E
`
`.3ch2052
`
`
`
`
`
`
`
`
`
`92:552.“.2o...23322a.xomV852C2233m.522:22-8
`
`
`
`
`
`.85.3225325.....8mm=m<¢2_.p2u>m2._20...305
`
`
`
`.305@2322$23.22
`
`
`
`...2=o:<225323:
`
`55.5233
`
`
`
`
`
`$2322.822232328295amhzmzmzuz.w.23222452mm
`
`532.98
`III!!!.
`
`II
`
`22.5325..—
`
`:2.4:2.
`
`Page 18 0f 39
`
`Page 18 of 39
`
`
`

`

`US. Patent
`
`J
`
`1n,
`
`6e
`
`5,428,684
`
`m«25.558
`1:23.«83:55.:.5822552::na:
`
`52.88,:noEaw2.3;2.58
`$$53V2:3zemufiumfl
`000NNN“.3:n:33:3ng
`.23.83xm_3n—E22.5.3:
`5.53xz<m322.8535.mac;me
`39.xz<m$30I.28...225325:
`
`
`2.3;.88.8.w::3
`
`mop<u§zmx§<8868..um.<53
`
`am22:52::
`«mu”3:3.3
`
`.2255»
`
`Page 19 0f 39
`
`<P<=
`
`Us:
`
`mac;3
`
`Page 19 of 39
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 19 of 21
`
`5,428,684
`
`
`
`muhzmoxz<m3
`
`5:58:35EN
`
`
`
`5.558xumzu
`
`«23:35.:8°8°._x.2.353-:
`
`_..2.338°8°__+«83.553x._z:23:
`
`26:
`
`am“
`
`mo...<o_...zu:._.=<
`
`@238.I5.3.22:
`
`22.5325:_mung:453m
`
`20.5525:
`
`5....<53
`
`«mm
`
`Page 20 0f 39
`
`Page 20 of 39
`
`
`
`
`
`
`
`
`

`

`US. Patent
`
`June 27, 1995
`
`Sheet 20 of 21
`
`5,428,684
`
`0 N 2
`
`...
`
`«85.5.58
`
`
`
`mmhzmoxz<m¢¢
`
`.3
`
`<29wz_._.=m
`
`a45:23.?
`
`
`
`no<53$5.38”95:8
`
`22552;...#85
`
`<.2255...
`
`
`
`2255—25.$8.8«-3.
`
`a52.3.5
`
`
`
`<5:225323:
`
`3%a“3:
`
`mozzgxcu
`
`8068..w«
`
`op37:35.
`
`.532253.25 <._<z_:muh
`22852::..
`
`5.53:588.8.m::3was“5$5.55352225535
`E2»..5«85:35.:4.3%hcumbfimufim
`
`
`
`
`3...szxz<m3.
`
`22535;:H8572‘
`
`SK
`
`
`
`5.2..$5.38
`
`<.2255:
`
`2%«a3:
`
`Page 21 0f 39
`
`Page 21 of 39
`
`

`

`US. Patent
`
`J
`
`%m
`
`ae
`
`n,m
`
`5,428,684
`
`
`
`$25:3.5.”:E
`
`n,£58£3.3m2.38
`
`aNN
`
`
`
`«23:35:zesgzét
`
`«:3.28:
`
`
`n.3252.32.sz
`
`%520.55325.83mm“
`ooodoc;um.
`
`mczofizuzha
`
`__
`
`22.5525:
`
`e.2255...
`
`map—b
`
`22.5525:
`
`m5:<53
`
`mum
`
`Page 22 0f 39
`
`.2:
`
`
`
`225525....HEP—w
`
`<.2253...
`
`22532:...was;
`
`m.2255...
`
`Page 22 of 39
`
`
`
`
`
`

`

`1
`
`5,428,684
`
`ELECTRONIC CASI-ILESS TRANSACTION
`SYSTEM
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`
`This invention pertains to a security enhancement for
`an electronic cashless transaction system comprising
`elements such as a bank center, a bank ATM (automatic
`teller machine) [e.g. a modified CD (cash dispenSer)L an
`IC (Integrated Circuit) card [e.g. an IC smart card or an
`IC memory card] and a store transaction terminal [e.g.
`a modified POS (point of sales) terminal]. [A store is
`defined as a retailer, a wholesaler, a shop storage area or
`the like.] More specifically, it relates first to a system for
`controlling a key necessary for authenticating elements
`in proper operations of the electronic cashless transac-
`tion system and second to a money transfer system for
`enhancing the security of transferring money stored in
`the IC card.
`2. Description of the Related Arts
`Recently, a variety of debit cards have been offered
`for sales, which shed or reduce the necessity for carry-
`ing or using changes, and improve cash flows of the
`issuers. In Japan, those cards are used for paying a tele-
`phone charge for a call from a public phone booth, a
`transportation fare at a train station or even aboard a
`bus, and a food voucher at a restaurant.
`However, most debit cards are currently good only
`for specific goods or services offered by the issuers,
`they are not valid for merchandise transactions in gen-
`eral. Besides, most debit cards offered for sales in Japan
`are of a disposable type, i.e. good only for the use of
`their stated values, unlike fare cards offered for sales
`e.g. by the BART in San Francisco, which allow addi-
`tional fares to be supplemented for storage.
`Therefore, an all-in-one card is awaited as an power-
`ful electronic cashless transaction medium, whereby a
`financial institution, e.g. a bank, issues an IC card to its
`customer such that he asks his bank to credit a desired
`amount to his IC card, e.g. by transferring from his
`other accounts, and a participating store to debit a pur-
`chase amount to the card and credits the same to the
`store’s account, thereby consummating a transaction
`without an actual exchange of cash. In the following
`description, debits and credits are defined as being from
`the ledger entries of the issuers of the all-in-one cards,
`and are exactly the opposite for the holders of such
`cards.
`
`Such an all-in-one card system has an advantage in
`safety and efficiency in that the customers need not
`carry cash and stores and banks need not physically
`transport printed bills and coins accumulated as sales
`proceeds.
`However, such an advantage is premised on an
`wholeness of an ATM, an IC card, and a store’s POS
`system.
`FIG. 1 is a block diagram of a conventional elec-
`tronic cashless transaction system using an all-in-one
`card, based on an IC card 11.
`The conventional cashless system comprises an IC
`card 11, a store transaction terminal (POS terminal) 12
`provided at a participating store allowing a holder of
`the IC card 11 to make a purchase, and a bank center 13.
`The bank center 13 has a customer account 14 of the
`holder of the IC card 11, a customer card balance log
`file 15 for storing data on an amount a holder transfers
`to his card, an unsettled funds file 16 for storing the sum
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`4O
`
`45
`
`50
`
`55
`
`65
`
`Page 23 0f 39
`
`2
`total of amounts a user transfers to a plurality of cards,
`a store account 17 of a participating store into which the
`sales proceeds are transferred from the unsettled funds
`file 16. A bank center 13 has at least one [1] unsettled
`funds file 16. A customer account 14 and a customer
`card balance file 15 exist for each holder of the 1C card
`
`11. A store account 17 exists for each participating
`store.
`
`The 10 card 11 has a balance storage register 18 for
`registering the amount expendable with the IC card 11.
`Also, the store transaction terminal 12 has a sales data
`file 19 for storing the total amount of the sales and the
`total amount of the sales returns and allowances.
`A holder of the IC card 11 transfers money to his
`card before using it. He enters his PW (password) from
`a keypad on the IC card 11. After activating the IC card
`11, he accesses the bank center 13 via a finance terminal
`or a money transfer terminal such as an ATM 20. On
`determining that the amount the holder wishes to trans-
`fer to the IC card 11 of his own is within the funds
`balance or a predetermined revolving limit of the cus—
`tomer account 14, the bank center 13 instructs the ATM
`20 to credit the transferred amount (a card transfer
`amount 21) to the balance storage register 18 in the IC
`card 11 and to debit the same to the customer account
`14 of his own. That is, at the same time, the bank center
`13 stores the card balance in the customer card balance
`log file 15.
`The customer card balance log file 15 operates as a
`first check in preventing a fraud using the 1C card 11.
`This is because, since the amount stored in the balance
`storage register 18 of the IC card 11 cannot be more
`than the amount stored in the customer card balance log
`file 15, an amount stored in the balance storage register
`18 of the IC card 11 which is more than the amount
`stored in the customer card balance log file 15 can be
`construed as a possible falsification of the IC card 11.
`Also, the amount stored in the customer card balance
`log file 15 can be used as a basis for calculating an in-
`sured value for the holder of the IC card 11 for compen—
`sating a damage to or a loss of the IC card 11.
`When a store has the store transaction terminal 12
`credit to the IC card 11 an amount of a sales return and
`allowance, the bank center 13 has the customer card
`balance log file 15 control an amount credited by a store
`due to a sales return and allowance separately from an
`amount credited by a holder of the IC card 11 due to a
`transfer-in from his other account, thereby limiting the
`amount a store can credit a customer on the IC card 11
`as a sales return and allowance, e.g. to the credit balance
`posted in the unsettled funds file 16.
`The holder of the IC card 11 wishing to make a pur-
`chase at a participating store inserts the IC card 11 into
`the store transaction terminal 12 indicating a sales
`amount or an amount of sales returns and allowances,
`and enters his PW on the keypad of the IC card 11,
`thereby performing a purchase activation 22 of the IC
`card 11. The store transaction terminal 12 updates the
`fund balance stored in the balance storage register 18 of
`the IC card 11 by debiting the sales amount or crediting
`the amount of sales returns and allowances,
`thereby
`performing a balance adjustment 23, and credits the
`sales amount or debits the amount of sales returns and
`allowances to the sales data file 19. More specifically,
`when the holder of the IC card 11 has an account in a
`bank A,
`the store transaction terminal 12 updates
`
`Page 23 of 39
`
`

`

`5,428,684
`
`3
`amounts a related to accounts for bank A in the sales
`data file 19.
`The store transaction terminal 12 thus credits the
`total amount of sales or debits the total amount of the
`sales returns and allowances to the sales data file 19,
`then sends their sum totals to the bank center 13 by
`coding these amounts in the sales data file 19 after a
`lapse of a predetermined period. That is, the store trans-
`action terminal 12 sends to the bank center 13 of bank A
`sales (billing) data 24 by coding the amounts a, compris-
`ing the amount of sales and the amount of sales returns
`and allowances. The bank center 13 decodes the sales
`(billing) data 24 and transfers the amounts from the
`unsettled funds file 16 to the store account 17.
`FIG. 2 is a block diagram for explaining conventional
`updations of sales tallying data and a fund balance
`stored in the IC card 11 by the store transaction termi-
`nal 12.
`
`As explained in the description of FIG. 1, a holder
`wishing to make a purchase inserts the IC card 11 into
`the store transaction terminal 12 after activating it by
`entering his PW, and allows the store transaction termi-
`nal 12 to debit a purchase amount 25. The purchase
`amount 25 is an input to an adder 26 of
`the store transaction terminal 12 and a subtracter 27
`of the IC card 11, which is outputted to an amount
`display 28 of the IC card 11. This allows the holder of
`the IC card 11 to judge whether or not the purchase
`amount 25 is appropriate.
`The other input to the adder 26 of the store transac-
`tion terminal 12 is sales tallying data 29. On receiving an
`input of the purchase amount 25, the adder 26 adds to
`the sales tallying data 29 data on the purchase amount
`25, thereby updating the sales tallying data 29. Mean-
`while, the other input to the subtracter 27 of the IC card
`11 is the value of the balance storage register 18. On
`receiving an input of the purchase amount 25, the sub-
`tracter 27 subtracts the purchase amount 25 from the
`value of the balance storage register 18, and re-stores
`the difference in the balance storage register 18, thereby
`updating the balance.
`As described above, a conventional all-in-one card
`system takes security measures, e.g. an access control
`for disabling the abuse by an inappropriate holder and a
`coding to prevent eavesdropping of line between a store
`and the bank center 13.
`
`However, the conventional system such as described
`above has a security problem in that it has no defense
`against a fraud via the store transaction terminal 12.
`FIG. 3 is a block diagram of a conventional process
`for transferring a replenishing amount to an all-in-one
`card, such as the IC card 11.
`The system shown in FIG. 3 comprises the IC card
`11, the ATM 20 for handling a money transfer from or
`to another account, and the bank center 13 of the issuer
`of the IC card 11.
`
`The holder of the IC card 11 wishing to transfer
`money to or from the 10 card 11 inserts the IC card 11
`into the ATM 20 after activating the IC card 11 by
`entering his PW for the IC card 11 e.g. from the keypad
`of the IC card 11. Alternatively, the holder may acti-
`vate the IC card 11 by entering his PW e.g. from the
`touch sensor panel of the ATM 20 after inserting the IC
`card 11 into the ATM 20. This allows a communications
`link to be established between the IC card 11 and the
`bank center 13 via the ATM 20.
`
`Then, the holder of the IC card 11 inputs a transfer
`amount 34 (which is defined as being positive for a
`
`Page 24 0f 39
`
`4
`transfer-in to the IC card 11 and being negative for a
`transfer-out from the IC card 11) e.g. from the keyboard
`of the ATM 20. Alternatively, the holder of the IC card
`11 can input the transfer amount 34 from the keypad of
`the IC card 11 before he inserts his card to the ATM 20.
`Thereafter, the ATM 20 reads the balance stored in
`the IC card 11 (from the balance storage register 18)
`and sends to the bank center 13 data on the stored bal-
`ance and on the transfer amount 34, asking for an autho-
`rization to credit or debit the transfer amount 34 to the
`IC card 11 and to debit or credit to the customer ac-
`count 14.
`The bank center 13 determines whether it can autho-
`rize the transfer-in to or transfer-out from the IC card
`11, calculates a new balance by adding the transfer
`amount 34 to the hitherto stored balance, and sends the
`new balance to the ATM 20. The ATM 20 in turn stores
`the new balance to the IC card 11.
`The above processes allow the IC card 11 to have a
`new balance, thereby completing a transfer-in or trans-
`fer-out.
`the IC card 11 and the ATM 20
`Conventionally,
`share a key-A 35 for coding communications between
`the IC card 11.and the ATM 20, thereby masking a
`protocol for a money transfer. However, in most cases,
`the communications between the ATM 20 and the bank
`center 13 are not coded. When they are in fact coded,
`the bank center 13 and the ATM 20 share a same key for
`coding and decoding the communications between
`them.
`
`However, a conventional system such as this has a
`security problem with respect
`to an unauthorized
`money transfer due to its openness to eavesdropping.
`That is, the communications between the ATM 20 and
`the bank center 13, unless coded, are vulnerable to un-
`wanted interceptions, which may allow one of skill to
`detect and analyze the data flow between the ATM 20
`and the bank center 13 and transmit phony data that
`enable money to be transferred without a proper ap-
`proval, or even bogus account data to be created.
`Besides, even when the communications between the
`bank center 13 and the ATM 20 are coded, the key
`needs to be changed every time, for a defense against
`the possibility that a hacker can somehow log on to the
`ATM 20 and interpret the communications between the
`bank center 13 and the ATM 20 for the purpose of
`interfering with the system e.g. by destroying data.
`SUMMARY OF THE INVENTION
`
`This invention is conceived based on the above back-
`ground. It aims at enhancing the security of an elec-
`tronic cashless transaction system,
`thereby allowing
`versatile uses of an IC card as an almighty medium for
`commercial transactions in general.
`A feature of this invention resides in a key control
`method for use in an electronic cashless transaction
`system including at least a bank center, a store transac-
`tion terminal and an IC card being used as an electronic
`cashless transaction medium. The key control method
`comprises a step of having the bank center generate and
`code a first parameter for a transmission to the IC card;
`a step of having the IC card receive and decode the
`coded first parameter by using the first key, thereby
`reconstructing the first parameter issued by the bank
`center, perform a first operation on the first parameter
`and a password of a holder of the IC card, and store in
`a first register; a step of having the store transaction
`terminal send to the IC card a second parameter cod'ed
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`Page 24 of 39
`
`

`

`5
`by a second key, when the holder inserts the IC card 11
`into the store transaction terminal; a step of having the
`IC card decode the coded second parameter by using
`the second key, thereby reconstructing the second pa-
`rameter received from the store transaction terminal,
`perform a second operation on the second parameter
`and the value stored in the first register, store a result of
`the second operation in the second register; and a step
`of decoding a value stored in the second register by
`using a coding session key stored in a memory of the IC
`card, thereby obtaining a key for an intended authenti—
`cation.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`One of skill in the art can easily understand additional
`features and objects of this invention from the descrip-
`tion of the preferred embodiments and some of the
`attached drawings. In the drawings:
`FIG. 1 is a block diagram of a conventional elec-
`tronic cashless transaction system using an all-in-one
`card, based on an IC card;
`FIG. 2 is a block diagram for explaining conventional
`updations of sales tallying data and a fund balance
`stored in the IC card 11 by the store transaction termi-
`nal 12;
`FIG. 3 is a block diagram of a conventional process
`for transferring a replenishing amount to an all-in-one
`card, such as the IC card 11;
`FIG. 4 is a block diagram of a first embodiment of an
`electronic cashless transaction system;
`FIG. 5 is a block diagram outlining key control oper-
`ations of this invention;
`FIG. 6 shows in further detail the processes for con—
`trolling coding session keys;
`FIG. 7 is a block diagram of a money transfer to or
`from the IC card 42;
`FIG. 8 is a block diagram illustrating a sales data
`updation and a sales billing;
`FIG. 9 shows a process of supplying via the ATM
`44A to the IC card 42 the first parameter Kcent neces-
`sary for creating a key KIDi for decoding a variable
`bank key KB;
`FIG. 10 shows processes between the IC card 42 and
`the store transaction terminal 43 executed when a
`holder and a participating store executes a transaction;
`FIG. 11 shows processes between the IC card 42 and
`the bank center 44 when the bank center 44 supplies to
`a holder a key for transferring money;
`FIG. 12 shows exemplary cycles of changing a series
`of coding session keys KBal through KBan supplied to
`a holder;
`FIG. 13 is a sketch of a second embodiment of this
`invention;
`FIG. 14 is a block diagram of the second embodiment
`of this invention;
`FIG. 15 is a block diagram of the second embodiment
`modified for preventing a fraud;
`FIG. 16 is a block diagram of a third embodiment of
`this invention;
`FIG. 17 is a block diagram of a fourth embodiment of
`this invention;
`FIG. 18 is an explanatory chart illustrating a data
`falsification incidental to transaction data stored in the
`store transaction terminal 43 pursuant to the third and
`fourth embodiments of this invention;
`FIG. 19 is an explanatory chart for a system configu-
`ration of a fifth embodiment of this invention in which
`a serial number is assigned to a transaction data file 222;
`
`Page 25 0f 39
`
`5,428,684
`
`6
`
`FIG. 20 is an explanatory chart illustrating a data
`falsification incidental to transaction data stored in the
`store transaction terminal 43 pursuant to the fifth em-
`bodiment of this invention; and
`FIG. 21 is an explanatory chart for a system configu-
`ration of a sixth embodiment of this invention in which
`a store transaction terminal
`identification number is
`assigned to a transaction data file 222.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`FIG. 4 is a block diagram of a first embodiment of an
`electronic cashless transaction system.
`The transaction system using an electronic cashless
`medium of the first embodiment comprises a bank cen-
`ter 44, an ATM 44A, an IC card 42 and a store transac-
`tion terminal 43. The ATM 44A can be a CD (cash
`dispenser), with necessary functions, e.g. a data ex-
`change function, attached. The store transaction termi-
`nal can be a POS terminal with necessary functions, e.g.
`a card reading function, attached. As described before,
`the IC card can be an IC smart card or IC memory card.
`The IC smart card comprises a CPO and a memory, and
`can be an IC memory card with necessary function, e.g.
`an access control function attached.
`Although the transaction system of the first embodi—
`ment of this invention basically operates in a manner
`similar to the conventional transaction system, it has
`differences in (1) a key control, including a control of a
`bank key, (2) an amount replenishment to the IC card
`11, (3) an updation of sales data and (4) a sales billing.
`Described below are these principles.
`FIG. Sis a block diagram outlining key control oper-
`ations of this invention.
`
`The first principle of this invention comprises a step
`(STl) of procedures between the ATM 44A and the IC
`card 42, a step (5T2) of procedures between the IC card
`42 and the store transaction terminal 43, and a step
`(ST3) of assigning a coding key to the IC card 42.
`STl
`
`Step STl represents procedures between the IC card
`42 and the bank center 44 via the ATM 44A. The bank
`center 44 randomly generates a first parameter, codes it
`by using a master key L, and supplies the coded first
`parameter to the IC card 42 via the ATM 44A.
`After receiving the coded first parameter supplied via
`the ATM 44A, the IC card 42 has its decoder 42-1
`decode the coded first parameter by using the master
`key L it shares with the bank center 44, thereby recon-
`structing the first parameter generated by the bank
`center 44. Then, the IC card 42 has its adder 42-2 add
`the first parameter thus decoded to a number converted
`from the PW entered by its holder, and has its first
`register 42-3 store the sum.
`The IC card 42 may cause corresponding digits of the
`decoded first parameter and the number converted
`from the PW to undergo some other operations (e.g. a
`multiplication, a division, a subtraction, a disjunction, a
`conjunction, an exclusive disjunction or any combina-
`tion thereof) instead of a simple addition by the adder
`42-2, by incorporating a substitute operator. To summa— '
`rize, the IC card 42 has the first register 42-3 store the
`result of operating a function whose variables comprise
`the decoded first parameter and the PW.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`6O
`
`65
`
`Page 25 of 39
`
`

`

`7
`
`8T2
`
`5,428,684
`
`8
`The bank center 44 generates a first parameter, codes
`the first parameter, and supplies the coded first parame-
`ter to the IC card 42 via the ATM 44A. On receiving
`the coded first parameter supplied via the ATM 44A,
`the IC card 42 has its decoder 42-1 decode the coded
`first parameter by using its master key L it shares with
`the bank center 44, thereby reconstructing the first
`parameter issued by the bank center 44. Then, the IC
`card 42 has its adder 42-2 add the first parameter thus
`decoded to the PW controlled by the holder, and has its
`first register 42-3 store the sum. (Refer to step STl.)
`Then, the holder of the IC memory card 42 wishing
`to make a purchase at a participating store inserts the IC
`card 42 into a card reader of the store transaction termi-
`nal 43. The store transaction terminal 43 sends to the IC
`card 42 a second parameter coded in advance by the
`master key L of the bank center 44. On receiving a
`coded second parameter, the IC card 42 has its decoder
`42-1’ decode the coded second parameter by using its
`master key L it shares with the bank center 44, has its
`adder 42-2’ add the second parameter thus decoded to
`the value stored in the first register 42—3, and has the
`second register 424 store the sum. Then, the IC card 42
`has its decoder 42~1” decode the sum stored in the sec-
`25 ond register 424 by using one [1] of coding session keys
`stored in its memory 42-5, thereby obtaining key KB-Ai
`for an intended authentication. (Refer to step ST2.)
`To be more specific, the IC card 42 has its memory
`42-5 store a plurality of coding session keys, and re-
`ceives serial number data including address data of the
`memory 42-5, on receiving the coded second parameter
`from the s

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket