throbber
PCT
`
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`International Bureau
`
`
`
`INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(51) International Patent Classification 5 :
`
`(11) International Publication Number:
`
`W0 91/ 16691
`
`
`
`G07F 7/10
`
`A1
`
`(43) International Publication Date:
`
`31 October 1991 (31.10.91)
`
`(21) International Application Number:
`
`PCT/GB91/00566
`
`(22) International Filing Date:
`
`10 April 1991 (10.04.91)
`
`(74) Agent: SMITH, Martin, Stanley; Stevens, Hewlett & Per-
`kins, 5 Quality Court, Chancery Lane, London WC2A
`lHZ (GB).
`
`(30) Priority data:
`90083627
`
`12 April 1990 (12.04.90)
`
`GB
`
`(71) Applicant (for all designated States except US): JONHIG LI-
`MITED [GB/GB}; 20 Old Broad Street, London EC2
`(GB).
`
`(72) Inventors; and
`(75) Inventors/Applicants (for US only) :JONES, Timothy, Lloyd
`[GB/GB]; 81 Wilbury Crescent, Hove, East Sussex BN3
`6FH (GB). HIGGINS, Graham, Robert, Leslie [GB/
`GB]; Flat 3, Abbeydale House, Bathampton Lane, Ba-
`thampton, Bath, Avon BA2 68] (GB).
`
`(81) Designated States: AT, AT (European patent), AU, BB, BE
`(European patent), BF (OAPI patent), BG, BJ (OAPI
`patent), BR, CA, CF (OAPI patent), CG (OAPI patent),
`CH, CH (European patent), CM (OAPI patent), DE,
`DE (European patent), DK, DK (European patent), ES,
`ES (European patent), FI, FR (European patent), GA
`(OAPI patent), GB, GB (European patent), GR (Euro-
`pean patent), HU, IT (European patent), JP, KP, KR,
`LK, LU, LU (European patent), MC, MG, ML (OAPI
`patent), MR (OAPI patent), MW, NL, NL (European
`patent), NO, PL, RO, SD, SE, SE (European patent),
`SN (OAPI patent), SU, TD (OAPI patent), TG (OAPI
`patent), US.
`
`Published
`With international search report.
`Before the expiration of the time limit for amending the
`claims and to be republished in the event of the receipt of
`amendments.
`
`
`
`(54) Title: VALUE TRANSFER SYSTEM
`
`(57) Abstract
`
`A value transfer system which allows value to be trans-
`ferred between electronic purses comprises computer which
`controls the loading of purses with value and the redemption of
`value from purses, a special bulk purse or purses and a value
`meter securely linked thereto which registers the total net value
`issued to the bulk purse or purses. Draw-down of value and re-
`demption of value transactions are effected with the bulk
`purses.
`
`
`
`lilllli
`
`
`
`i
`fl
`
`___l
`
`I.
`
`
`
`
`
`
`
`GROUPON - EXHIBIT 1004
`
`GROUPON - EXHIBIT 1004
`
`

`

`FOR THE PURPOSES OF INFORMATION ONLY
`
`Codes used to identify States party to the PCT on the front pages of pamphlets publishing international
`applications under the PCT.
`
`Monaco
`
`Spain
`Finland
`France
`Gabon
`United Kingdom
`Guinea
`Greece
`Hungary
`Italy
`Japan
`Democratic People's Republic
`of Korea
`Republic of Korea
`Liechtenstein
`Sri Lanlsa
`Luxembourg
`
`AT
`AU
`BB
`BE
`BF
`36
`BJ
`BR
`CA
`CF
`CG
`CH
`Cl
`CM
`CS
`DE
`DK
`
`Austria
`Australia
`Barbados
`Belgium
`Burkina Faso
`Bulgaria
`Benin
`Brazil
`Canada
`Central African Republic
`Congo
`Swiuerland
`(Sole d‘lvoire
`Cameroon
`(hechoslovakia
`Germany
`Denmark
`
`Madagascar
`Mali
`Mongolia
`Mauritania
`Malawi
`7
`Netherlands
`Norway
`Poland
`Romania
`Sudan
`Sweden
`Senegal
`Soviet Union
`(‘had
`Togo
`United States of America
`
`

`

`wo 91/1669]
`
`PCT/GB91/00566
`
`_
`
`1
`
`_
`
`VALUE IRANfiFER §Y§TEM
`
`The invention
`
`relates
`
`to
`
`a value transfer
`
`5
`
`system for cashless transactions.
`
`Several kinds of
`
`cashless financial transaction services are available.
`
`These include credit cards and debit cards which
`
`customers may use with a wide range of retailers.
`
`Each transaction is accompanied by the provision of
`customer account details required for the actual
`
`10
`
`transfer of funds between the specific customers and
`
`the specific retailers.
`
`Another form of cashless card system is the pre-
`
`payment card system, where a card is purchased prior
`to a series of
`transactions and a value record
`
`15
`
`recorded on it is appropriately decremented on each
`
`transaction.
`payment card.
`
`A 'phone card is an example of
`
`a pre-
`
`Such prior systems are inflexible and are no
`
`20
`
`general substitute for cash in low value high volume
`
`transactions. Various proposals have been put forward
`
`to allow the interchange of money values between
`
`"electronic purses".
`
`For example, United States
`
`Patent No 4839504 (Casio Computer Co Ltd) discloses a
`
`25
`
`system where a user is able to load money value on tc
`
`an integrated circuit
`
`(IC) card, etherWise known as a
`
`smart card, by communication with his bank.
`
`At
`
`the
`
`bank the same value is applied to a separate l
`
`account set up for the user.
`
`Purchases are able to be
`
`30
`
`made by transfer of money values from the IC card t:
`
`retailer equipment off-line from the bank.
`
`Each
`
`transaction requires transmiSSion to the retailer and
`
`retention by him of details which include the
`
`purchaser's identity. Ultimately,
`
`in claiming funds
`
`35
`
`from the bank the retailer presents a list cf
`
`

`

`W0 91/ 16691
`
`PCT/GB91/00566
`
`transaction details
`
`and'
`
`there
`
`is
`
`account
`
`reconciliation to allow the IC account of
`
`the
`
`appropriate purchaser to be adjusted.
`
`require ultimate
`Procedures which, as above,
`account reconciliation for every transaction are
`
`5
`
`attended by two disadvantages.
`
`The first is
`
`practical.
`
`The storing,
`
`transmitting and reconciling
`
`of purchaser details for every transaction places an
`
`impossible burden on equipment if all cash type
`transactions are contemplated.
`Processing all
`such
`
`10
`
`transactions efficiently in an acceptable time is not
`
`possible, even with the most modern equipment.
`
`The
`
`second objection is social.
`
`The anonymity of cash
`
`would be lost and potential would exist for details of
`
`15
`
`personal spending habits to be derived.
`
`The second of
`
`the above objections has been
`
`addressed by Chaum in "Controlling your
`
`Information
`
`with a Card Computer"
`
`("Concepts Applications
`
`Activities" published by TeleTrust March 1989).
`
`Chaum
`
`20
`
`proposes a system of "blind signatures" of money value
`
`items effected by an authorising entity such as a
`
`bank.
`
`This
`
`is
`
`a way
`
`of preventing ready
`
`identification of purchasers. However,
`
`a problem
`
`remains in that double payment by a purchaser must be
`
`25
`
`detectable and Chaum meets this difficulty by
`
`including,
`
`in the data transferred in an off-line
`
`transaction, encrypted information concerning the
`
`purchaser.
`
`This information is relayed to the bank
`
`when the retailer claims credit and is used a:
`
`the
`
`30
`
`bank to detect double use of
`
`the same ”electronic
`
`cash". Also, each Signed item is recorded at the bank
`
`to make possible ultimate reconciliation of claims
`
`against
`
`these items, albeit Without customer
`
`identification.
`
`The problems of storage,
`
`transmiSSion
`
`35
`
`and processing of individual
`
`transaction information
`
`

`

`wo 91/1669]
`
`PCT/GB91/00566
`
`remain. Additionally, Chaum introduces another
`
`difficulty. His system requires that each item of
`
`signed “electronic cash" should be treated as a unit
`
`that
`and is incapable of division. Again this means
`the system is inappropriate for small value high
`volume transactions.
`
`The present
`
`invention seeks to provide a
`
`practical solution to the problem of providing a
`
`10
`
`framework suitable for cashless small value high
`volume transactions.
`
`15
`
`20
`
`According to the invention there is provided a
`
`value transfer system having a computer;
`
`a plurality
`
`of electronic purses; exchange devices whereby purses
`
`may communicate with each other to transfer value in
`
`transactions which are off~line from the computer;
`
`draw-down means for loading purses with value under
`
`control of
`
`the computer;
`
`redemption means for
`
`redeeming value from purses under control of
`
`the
`
`computer;
`
`a value meter; one or more of said purses
`
`being bulk purses which are capable of having value
`
`loaded and redeemed via the value meter,
`
`the value
`
`meter recording one or more float value re-ords
`
`whereby the net value released to the bulk purse or
`
`purses may be derived,
`
`the net value being the
`
`25
`
`difference between the total of values drawn down to
`
`the bulk purse or purses and the total of values
`
`redeemed from the bulk purse or purses,
`
`the float
`
`value record being non—specific with regard tc
`
`individual draw—downs and redemptions.
`
`The value meter may have an interface whereby the
`
`float value record may be adjusted on command 5: as 2:
`
`create or destroy value within the bulk purse or
`
`purses.
`
`Preferably there 18 prov1ded,
`
`in each purse,
`
`storage means which stores a purse value record which
`
`3O
`
`35
`
`

`

`W0 91/ 1669]
`
`PCT/GB91/00566
`
`in eaCh purse or associated
`is accumulative and,
`exchange
`device,
`a microprocessor,
`transactions
`being conducted between purse pairs, one of which,
`the
`sending purse,
`sends value and the other of which,
`the
`receiving purse, receives value,
`the microprocessors
`being programmed so that in each off—line transaction
`the purse value record in the sending purse is
`decreased by a chosen and variable transaction value
`and the purse value record in the receiving purse is
`increased by the same transaction value.
`By providing a float value record which is non-
`specific anonymity is ensured and reconciliation with
`customer accounts for all subsequent purse to purse
`transactions is unnecessary.
`
`The above combination of features allows
`transactions to be effected and entirely completed
`without subsequent recourse or reference to any third
`party, and in particular without reference to the
`computer.
`The advantages in terms of anonymity and
`computer proceSSing time are clear.
`A retailer,
`for
`example, may make claims to redeem value from time to
`time,
`the nature and identity of all
`the off-line
`transactions which contribute to the retailer purse
`value record playing no part in the claim.
`Preferably the purses have means whereby a
`transaction between a pair of purses is given a unique
`identifier and the microprocessors are
`rogrammed to
`respond to the identifiers to prevent
`a given
`transaction being repeated.
`No reference 15 then
`required to the computer to determine whether the same
`"electronic cash" is being used thCE.
`In claiming to
`redeem value the computer is accessed and it Will be
`possible to determine whether the same claim is being
`made twice, either directly or, since a claim may be
`Simply another transaction, by means of
`a
`transaction
`
`U1
`
`10
`
`_.
`
`\Jl
`
`20
`
`25
`
`30
`
`35
`
`

`

`W0 91/1669]
`
`PCI‘/GB91 /00566
`
`The transaction identifier is preferably
`identifier.
`sent
`from the transmitting purse to the receiving
`purse, being conveniently derived from data
`
`identifying the receiving purse and a receiving purse
`transaction sequence number or electronic date/time
`stamp obtained from the receiving purse in a
`preliminary "hand-shaking" operation.
`In this way the
`receiving purse can monitor the transaction and any
`attempt
`to transmit
`the same value record twice will
`be foiled.
`
`Security of the system demands that cryptographic
`techniques be employed to prevent fraud.
`The most
`
`in
`effective cryptographic techniques are asymmetrical
`that
`they require different keys to encrypt and
`decrypt
`information.
`One well-known and suitable
`
`cryptographic technique is that attributed to Rivest,
`Shamir and Adleman, known as the RSA system.
`It is
`envisaged that both purses of a communicating pair may
`employ the RSA system equally in a balanced way for
`algorithmic processing. However, whereas RSA
`
`straight-forward, relatively powerful
`encryption is
`computing facilities are requ1red to execute RSA
`
`decryption conventionally in a short time.
`
`In order
`
`to overcome this difficulty,
`
`in the interests of
`
`economy and speed, it is proposed in accordance with a
`feature of the invention that an unbalanced system be
`used in which the processing capability required by
`consumer purses is Significantly less than that
`
`required by retailer purses.
`
`Each user of an asymmetrical key cryptographic
`system has a key pair, namely a public key and a
`secret key. Messages to another are encrypted uSing
`the other's (remote) public key which is made
`
`available, perhaps by a key exchange procedure.
`
`Received messages are decrypted uSing the local secret
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`35
`
`

`

`W0 91/ 1669]
`
`PCT/GB91/00566
`
`key. Use of a public key is far less demanding of
`computing power
`than use of a secret key so that
`conventionally encryption requires less computing
`overhead than decryption. Therefore,
`in implementing
`an unbalanced system of
`the kind described it is
`
`expedient
`
`to remove the requirement that the consumer
`
`purse performs conventional RSA decryption.
`
`A first way of reducing the cryptographic burden
`in the consumer purse is to provide it with a simpler,
`symmetrical, cryptographic system.
`Such a system uses
`the same key for encryption and decryption.
`An
`example is the DES cryptographic system (Data
`Encryption Standard - US FIPS 46,1976). Retailer
`
`purses retain the full power of the RSA system.
`
`A second method is to use the consumer purse's
`own public key / secret key system for
`the
`interchange of data.
`In an exchange of keys the
`consumer purse sends its secret key to the retailer
`
`purse.
`
`In the transmission of data to the retailer
`
`purse the consumer purse would encrypt using its own
`public key and the retailer purse would decrypt using
`the consumer purse's secret key.
`
`Security can be enhanced by using electronically
`certified data,
`for example digitally signed data,
`in
`the transaction process.
`Each purse on issue will be
`
`allocated a characteristic number and will have that
`
`global
`
`cryptographic system.
`
`The result will be a
`
`global signing of the number and this is stored in the
`
`the
`purse. All purses will carry the public key of
`global pair so that on receipt of another's globally
`signed number it will be possible to verify that it is
`valid. The numbers can be regarded as globally
`certified.
`Since transactions will require the
`exchange of encryption keys it is convenient, although
`
`10
`
`15
`
`2O
`
`3O
`
`35
`
`

`

`wo 91/1669]
`
`PCI'/GB91/00566
`
`not necessary,
`
`to arrange that the globally certified
`
`numbers are the encryption keys to be exchanged.
`
`The electronic purses may take a number of
`
`include computer processing
`They will
`physical forms.
`facilities which may be incorporated in IC or "smart"
`
`cards, key fobs, wallets or the like or built into
`
`electronic equipment such as point-of-sale equipment
`or calculators, for example.
`
`Communication with the computer will generally be
`established by
`telephone and purses may
`be
`incorporated in telephones or modems, since it is
`
`possible that desired transactions may be conducted
`
`entirely by telephone. However,
`
`a more generally
`
`convenient arrangement
`
`is to have a portable purse
`
`such as an IC card which is loaded via modem
`
`connection either by a device specific to the
`
`individual or by automatic teller machine,
`example.
`
`for
`
`Purses may communicate with each other for the
`
`transfer of values by means of communication devices.
`
`These may have slots for two purses or may each hold a
`
`purse and communicate with each other by infra-red
`
`light or electromagnetic radiation,
`
`for example.
`
`Reference was made above to the difficulty of
`
`providing fast asymmetrical cryptographic facilities
`
`in very small and inexpensive devices such as
`
`IC
`
`cards. Clearly,
`
`it is more readily possible to
`
`provide such facilities in a communication device or
`
`in a modem.
`
`Therefore,
`
`even though consumer purses
`
`may lack full computing power
`
`themselves,
`
`this may be
`
`provided by communication deVices which have access to
`
`the consumer purse memories and public keys.
`
`Thus,
`
`while it is readily possible to exchange value records
`
`person to person if all purses have full asymmetrical
`
`cryptographic facilities this is also possible if the
`
`10
`
`15
`
`20
`
`25
`
`3O
`
`35
`
`

`

`wo 91/1669]
`
`PCT/GB9l/00566
`
`purses are simple and intelligent communication
`devices are used.
`
`At least the retailers' equipment will generally
`have the capability to store transaction information.
`This may be in memory or on disk or on another card or
`by some other means.
`Indeed,
`the equipment may
`
`The
`the consumer's IC card to a retailer's IC card.
`storage capacity of the retailers' equipment need not
`be large since it is only an accumulated total which
`needs to be stored. However, it is envisaged that in
`addition to the transaction values, other information,
`for example about
`the identity of
`the consumer and/or
`retailer may be exchanged to allow a
`transaction
`print—out to be derived locally for analysis purposes.
`Codes for the goods may be included.
`
`As well as the usual point-of-sale terminals
`either attended or unattended,
`the retailers'
`equipment may include automatic vending machines,
`travel ticket dispensers, car parking machines,
`road
`toll booths, etc. Although security to use a purse
`may be provided by the requirement
`to key a PIN code,
`this is not essential and a preferred arrangement
`dispenses with this requirement
`to facilitate use.
`However, it is envisaged that each purse may have a
`PIN protected memory and an unprotected memory,
`the
`system being such that by use of a terminal or pocket
`exchange deVice, value records may be transferred by
`use of
`the PIN code from the protected to the
`unprotected part of the purse.
`
`As mentioned above,individuals may carry their
`own pocket exchange devices to allow interchanges of
`transaction values person to person. Refunds may be
`given or cheques "cashed" by retailers in an
`equivalent manner.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`

`

`W0 91/ 16691
`
`PCT/GB9l/00566
`
`Value records may be loaded on to the purses in
`selected currencies for use in appropriate countries.
`
`While it is possible that the system of
`
`the
`
`present invention could be run by a single financial
`institution it is envisaged that various financial
`
`institutions of a federal, national or international
`
`nature would have
`
`their own computers with
`
`value
`
`the
`the totality of
`meters and float value records,
`float value records representing the total value in
`
`the funds represented
`circulation (in all purses),
`thereby being apportioned between the participating
`institutions as agreed on the basis of
`their
`
`respective regulated float files.
`
`The invention will further be described with
`
`reference to the accompanying drawings, of which:
`
`a banking
`is a schematic drawing of
`Figure 1
`computer system in accordance with the invention;
`Figure 2
`is a diagram illustrating the value
`meter;
`
`is a diagram illustrating an example of'
`Figure 3
`a value transaction procedure using a full RSA
`cryptographic system;
`
`is a diagram illustrating an example of
`Figure 4
`a value transaction procedure using a secret key
`transmission technique;
`
`Figure 5 is a diagram illustrating an example of
`a value transaction procedure using a mixed RSA/DES
`cryptographic system;
`
`Figures 6 and 7 depict one possible embodiment of
`
`typical devices of the invention.
`
`Referring to Figure 1
`
`there are shown three
`
`2 and 3 with respective computers
`clearing banks 1,
`1a, 2a and 3a.
`The computers have files containing
`account details of
`the banks“
`consumer and retailer
`
`1O
`
`15
`
`2O
`
`25
`
`30
`
`35
`
`

`

`W0 91/1669]
`
`PCT/GB91/00566
`
`Each computer alSo has a value meter 1b,
`customers.
`2b, 3b which shows a float value record.
`The actual
`funds represented by the non-specific float value
`records may reside in one or more of banks 1,
`2 or 3,
`or elsewhere.
`
`Each bank has a bulk purse 1c, 2c, 3c which is
`connected to the respective value meter and which has
`a memory with a purse value record. Terminals 5 are
`
`These cards have microprocessors and
`cards 6.
`In the memory of each card is stored a
`memories.
`purse value record 7.
`The cards have contacts 8,
`whereby the cards can interact with terminals 5 via
`card readers 9.
`By making appropriate requests at the
`keyboard of
`the terminal,
`a consumer may be connected
`to the computer of his bank,
`1,
`2 or 3 and may request
`a value record to be loaded to his purse.
`If the bank
`authorises the request,
`the bulk purse is instructed
`to institute a draw-down of value to load purse value
`record 7 with the value requested.
`The card is now
`ready for use.
`
`Further electronic purses are contained in
`terminals 10,
`11 which are equipped with IC card
`readers 9,
`located at different
`points—of-sale.
`To
`use his card the consumer presents it tC the retailer
`where it is inserted into reader 9.
`The required
`value of
`the transaction is keyed in and by agreement
`the total held in the
`purse value record of
`the purse
`6
`is reduced by the amount of
`the transaction.
`The
`
`10
`
`_1 U]
`
`20
`
`25
`
`30
`
`35
`
`

`

`W0 91/ 16691
`
`PCI‘/GB9] /00566
`
`use the card up to the total held in the purse value
`
`record of his purse in other retailers' equipment.
`
`Periodically a retailer may redeem value
`
`represented by the purse value record held in the
`purse of his terminal
`10 or 11,
`irrespective of
`the
`consumers'
`identities and without presenting any
`details of the individual transactions that have given
`rise to the total accumulated value. This may be done
`by connecting the terminal
`10 or
`11
`to the retailer's
`bank 1,
`2 or
`3 as appropriate and requesting a
`redemption of value.
`The bank's computer
`then
`
`instructs a redemption transaction which accepts value
`from the terminal purse.
`The bank computer credits
`the retailer's account with funds.
`The value meters
`form the basis for allowing control of
`the total
`
`amount of value in circulation in all the purses and
`for apportioning,
`on
`an agreed basis,
`funds
`representing the total value.
`
`5
`
`10
`
`15
`
`The bulk purses 1c, 2c, 3c differ from the other
`purses in being capable of having value loaded and
`
`20
`
`redeemed via the value meter, as well as by purse to
`purse transactions.
`In all other respects the purses
`are technically similar,
`it being understood in
`
`the same cryptographic techniques for
`particular that
`bulk purse to other purse transactions (on-line)
`used
`
`25
`
`Figure 2
`are the same as for off-line transactions.
`shows
`the value meter as including an indicator 12
`
`which shows a float value record.
`
`This is,
`
`in this
`
`the net value released to the bulk purse 1c,
`case,
`being the difference between the total of values drawn
`
`30
`
`down via the meter and the total of values redeemed
`
`via the meter.
`
`It will be appreciated that
`
`the
`
`individual gross draw-down and redeemed values may be
`indicated as well as or instead of
`the net value, it
`being readily possible to derive the net value from
`
`35
`
`

`

`W0 91/ 1669]
`
`PCT/GB91/00566
`
`The
`the gross values, even if not directly indicated.
`link 13 between the value meter and that of each of
`its bulk purses is secure.
`The purse may be
`physically adjacent
`to the value meter and security
`ensured by physical
`locks etc. Alternatively,
`the
`bulk purse may be remote from the value meter and
`security is achieved by cryptographic techniques.
`It
`is important
`to ensure that the value meter always
`accurately represents the value released to the bulk
`purse and no fraudulent alteration can take place.
`Each value meter has an interface 14 which may be a
`link to the bank computing facility or a keyboard
`unit. Authorised personnel may enter values to be
`added to or subtracted from the float value record,
`representing a creation or destruction of value to be
`circulated.
`Thus, value to be circulated may be
`adjusted in bulk, perhaps daily,
`instead of on demand
`in response to individual draw-downs and claims.
`
`float value record in this way allows
`Using the
`off-line interchange of value, given suitable
`terminals, between consumers and retailers, retailers
`and consumers and consumers and consumers, without
`the
`need to maintain large numbers of accounts or detailed
`account to account reconciliations.
`
`purse value
`Consumers themselves may adjust the
`records in their purses by person to person
`interchange or by refunds etc from retailers.
`It is
`
`u1
`
`15
`
`m Ul
`
`30
`
`float value record in a similar manner as
`the
`retailers' claims.
`
`Purses may be used on an international basis by
`loading different currencies in them.
`It is envisaged
`that each country or group of countries will hold a
`float value record in the appropriate currency.
`
`(A) U!
`
`

`

`W0 91/ 16691
`
`PCI‘/GB91 /00566
`
`-13-
`
`Application by a consumer to load his purse with a
`foreign currency may result
`in his domestic account
`
`being debited by the appropriate amount
`
`in his own
`
`currency and the respective foreign currency float
`value record being increased.
`
`5
`
`A purse value record held in a purse may be
`converted to a different currency on request,
`the
`
`conversion being effected at
`
`the appropriate rate and
`
`float value
`resulting in a transfer of value from the
`record of one currency to that of another currency and
`a corresponding conversion of
`funds between the
`currencies.
`
`Figure 3
`
`shows the procedure during an off—line
`
`the invention.
`transaction in a first embodiment of
`Both purses have full RSA asymmetrical cryptographic
`capability.
`The sending purse has a store SS which
`
`holds an accumulative value record Svr and the
`
`following RSA keys: sender public and secret keys Pks
`and Sks and global public key Pkg.
`In addition there
`is a certified data message {Pks]*Skg.
`This is the
`
`sender purse‘s unique public key signed by the master
`
`The public
`computer with its global secret key Skg.
`key Pks is thus electronically certified as valid by
`the system.
`The receiver purse has a store RS which
`holds an accumulative value record er and the
`
`receiver purse's own RSA public and secret keys
`Pkr,Skr,
`the global public key Pkg and a certified
`
`public key data message [Pkr]*Skg.
`The first step of
`the transaction procedure 18
`for the receiving purse to issue a
`transaction
`
`identifier number R.
`
`This
`
`is derived from a
`
`combination of
`the receiving purse identity and a
`transaction sequence number for that purse.
`Two—way
`communication between the purses is established,
`perhaps locally by direct connection or by infra-red
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`

`

`W0 91/ 16691
`
`PCT/GB9l/00566
`
`-14_
`
`link or the like or remotely by modem and telephone.
`The following steps are followed:
`
`The receiving purse transmits a request
`1.
`message which is [Pkr]*Skg+[R]*Skr.
`2.
`The sending purse is able to check [Pkr]*Skg
`by use of the public global key Pkg. This gives the
`sending purse the authentic key Pkr
`to verify [R]*Skr
`and hence recover R.
`
`A value V which is required to be
`3.
`transferred is decremented from the purse value record
`Svr.
`
`4.
`
`The sending purse constructs a transaction
`
`value message VR from value V it wishes to transfer
`and from the request message R. This is signed with
`the sender's secret key and the following transaction
`value message is transmitted to the receiving purse:
`[Pks]*Skg+[VR]*Sks
`
`The receiving purse obtains the public key
`5.
`Pks by use of the public key Pkg thereby verifying the
`message [Pks]*Skg.
`
`6.
`
`Use of
`
`the public key Pks
`
`thus found
`
`verifies [VR]*Sks and hence recovers VR.
`
`7.
`R is checked to ensure that it carries the
`identity of
`the receiving purse and the appropriate
`transaction number.
`If not,
`the transaction is
`aborted.
`
`5
`
`10
`
`1:
`J
`
`20
`
`25
`
`8.
`
`If all is well,
`
`the value V is added to the
`
`purse value record of the receiving purse.
`
`A signed acknowledgement is sent
`9.
`sending purse.
`
`30
`
`to the
`
`Transaction logs Stl and Rtl are held by the
`sending and receiVing purse stores. The logs may carry
`such details as are required for analySis of
`transactions locally, but
`in the simplest
`form the
`
`logs carry records only of any transaction which has
`
`|l|
`
`LA)
`
`

`

`WO 91/1669]
`
`PCT/GB91/00566
`
`10
`
`failed for some reason. This can be used for checking
`
`in the event of a dispute.
`
`RSA encryption and decryption require calculation
`of the expression xy mod n where y is different for
`
`encryption and decryption.
`
`In particular the index y
`
`for encryption (embodied in the public key)
`
`is small
`
`and the corresponding index for decryption (embodied
`
`in the secret key)
`
`is very much larger.
`
`As
`
`a
`
`consequence, while modest computing power can handle
`
`encryption in an acceptably short
`
`time the same is not
`
`true for decryption.
`
`The creation of a certified (eg
`
`digitally signed) message has an equivalent processing
`
`overhead to decryption,
`
`the checking of such a message
`
`has an equivalent processing overhead to encryption.
`
`The embodiments illustrated in Figures 4 and 5 provide
`
`arrangements which allow one of
`
`the pair of
`
`communicating purses to be of lower computing power,
`
`and therefore less expensive,
`
`than the other.
`
`In
`
`these arrangements some purses of the system (retailer
`
`purses) have full RSA capability (encryption and
`
`decryption capability) whereas the remainder (consumer
`
`purses)
`
`include a symmetrical key cryptographic system
`
`for transmitting transaction value record messages.
`
`A
`
`suitable symmetrical key cryptographic system is the
`
`DES system.
`
`This requires for encryption and
`
`decryption a level of computing power similar to the
`
`power required for RSA encryption.
`
`Referring to Figure 4
`
`there is illustrated the
`
`30
`
`LA)
`
`\!'|
`
`transaction procedure between two purses where the
`
`sending purse is a consumer purse and the receiVing
`
`purse is a retailer purse.
`
`The retailer purse has
`
`full RSA capability whereas the consumer purse has a
`
`lower power computing facility.
`
`The sending purse has
`
`a store CS which holds an accumulative value record
`
`Cvr and the RSA global public key Pkg.
`
`In addition
`
`

`

`wo 91/1669]
`
`PCf/GB91/00566
`
`there is a
`
`DES key DES: and a certified data message
`
`[DESC]*Skg which is the sending purse's unique DES key
`
`signed by the master computer with its global secret
`
`5
`
`key Skg.
`The receiving purse has a store SR which is
`identical with the store SR of
`the Figure 3
`embodiment, holding Pkr,Skr,Pkg and [Pkr]*Skg.
`
`The first step in the transaction procedure is
`
`for the receiving purse to issue a
`
`transaction
`
`identifier R as in the embodiment of Figure 3. Then
`the following steps are taken:
`
`10
`
`1.. The receiving purse transmits its certified
`
`public key message [Pkr]*Skg.
`r‘
`The sending purse checks the signed message
`r.
`and derives Pkr.
`
`15
`
`3.
`
`The sending purse encrypts its certified
`
`message using Pkr.
`
`Since the index y of a public key
`
`such as Pkr
`
`is small, encryption with it is
`
`computationally easy.
`
`The message sent
`
`to the
`
`receiving purse is
`
`20
`
`m In
`
`[[DESC]*Skg]
`EPkr
`The receiving purse decrypts the message
`
`4.
`
`firstly with its secret key Sk:
`
`to derive [DESC]*Skg
`
`which itself is checked with Pkg to give verification
`and derive DESC.
`
`5.
`
`The receiving purse transmits the message
`
`[R]*DESc which is the transaction identifier R
`
`encrypted with a DES integrity algorithm.
`
`6.
`
`The receiving purse decrypts the message in
`
`DES, derives the transaction identifier R and
`constructs the transmission value message VR in the
`
`30
`
`same way as in the Figure 3 embodiment.
`
`7.
`
`The sending purse decrements the value V from
`
`its purse value record and sends the message [VR]*DESC
`
`to the receiving purse.
`
`35
`
`8.
`
`The receiving purse
`
`decrypts [VR]*DES and
`
`

`

`wo 91/161591
`
`PCT/GB91/00566
`
`-17..
`
`U1
`
`10
`
`checks that R is correct.
`
`If'not the transaction is
`
`aborted.
`
`9.
`
`If all is well
`
`the value V is added to the
`
`receiving purse's purse value record and an
`
`acknowledgement message is sent to the sending purse.
`
`Referring now to Figure 5
`
`there is shown a
`
`transaction procedure which allows the purses to have
`
`unbalanced computing power while using the keys of an
`
`the
`In Figure 5
`asymmetrical cryptographic system.
`store R8 of the receiving purse has the same keys as
`in the Figure 3 embodiment.
`The computing power of
`
`the sending purse is less than that of the receiVing
`
`purse and instead of
`
`the signed public key,
`
`the
`
`sending purse holds a signed secret key [Sks]*Skg
`(which also incorporates Pks).
`
`15
`
`A transaction procedure has the following steps:
`
`1.
`
`The receiving purse transmits the signed
`
`message [Pkr]*Skg.
`
`20
`
`25
`
`The sending purse checks the signed message
`2.
`with Pkg, verifying [Pkr]*Skg and hence recovering
`Pkr.
`
`3.
`
`The sending purse encrypts its Signed
`
`message with Pkr and sends EPkr [[Sks]*Skg].
`4.
`The receiving purse decrypts the message
`firstly with the use of its secret key Skr
`to give
`
`[Sks]*Skg and then uses the global public key Pkg to
`
`verify [Sks]*Skg,
`
`thereby recovering Sks.
`
`5.
`
`The receiving purse signs the transaction
`
`identifier R with Sks and sends [R}*Sks.
`6.
`The sending purse derives R by the use of
`
`30
`
`Pks.
`
`7.
`
`The sending purse decrements its purse value
`
`record by the required amount V,
`
`and constructs and
`
`[VR].
`sends a value message EPks
`8.
`The receiving purse decrypts the message with
`
`35
`
`

`

`W0 91/ 16691
`
`PCT/GB9l/00566
`
`R is checked and if
`the use of Sks to derive V and R.
`it is incorrect the transaction is aborted.
`
`9.
`If all is well
`the purse value record of the
`receiving purse is incremented by V,
`the key Sks
`in
`the
`receiving purse
`is
`discarded
`and
`an
`acknowledgement message is sent to the sending purse.
`Figure 6 shows one embodiment of the invention in
`the form the pocket exchange device referred to above.
`This device PED is

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket