throbber
Europaisches Patentamt
`European Patent Office
`Office europeen des brevets
`
`@ Publication
`
`number:
`
`0 1 94 839
`A2
`
`@
`@ Application
`@ Date of filing: 10.03.86
`
`number: 86301704.2
`
`EUROPEAN PATENT APPLICATION
`@ lnt.CI.": G 07 F 7/10
`
`08.03.85 JP 46012/85
`
`@) Priority:
`@) Date of publication
`of application:
`17.09.86 Bulletin 86/38
`@ Designated Contracting
`DE FR GB
`
`States:
`
`72, Horikawa-cho Saiwai-ku
`
`
`Kawasaki-shi Kanagawa-ken 210(JP)
`
`@ Applicant: Kabushikl Kaisha Toshiba
`@ Inventor: Kamitake, Takashl clo Patent Division
`@ Inventor: Mizutani, Hiroyukl clo Patent Division
`@ Inventor: Kawamura, Shln-ichl
`@ Representative:
`Freed, Arthur Woolf et al,
`MARKS & CLERK 57-60 Lincoln's
`Inn Fields
`London WC2A 3LSIGB)
`
`Kabushiki Kaisha Toshiba 1-1 Shlbaura 1-chome
`Minato-ku Tokyo 105(JP)
`
`Kabushlki Kalsha Toshiba 1·1 Shlbaura 1-chome
`Minato-ku Tokyo 105IJP)
`
`clo Patent Division
`Kabushiki Kaisha Toshiba 1·1 Shibaura1-c:home
`Minato-ku Tokyo 105{JP)
`
`F I G. l
`
`CUSTOMERS
`
`@ Communications network using
`IC cards.
`@ A communication network has a plurality
`
`of customer
`terminals {111 � 11nl and a single center terminal (12) which
`
`are coupled through communication lines (131 • 13nl· A large
`
`scale integrated circuit (IC card 141 • 14n; 15) is operatively
`
`coupled to each terminal. The integrated circuit device has
`
`
`enciphering and deciphering functions and has a recording
`device (33). When a transaction
`request message is sent
`from one customer terminal to the center, the transaction
`request message is enciphered by the integrated circuit
`
`device, and the enciphered message is sent to the center. In
`
`
`
`order to increase the transaction verification capability, the
`transmission message is recorded, in association with
`
`encryption of the transmission message, in an area of the
`recording device which can be accessed from outside only
`for readout. In order to further improve the transaction
`
`
`
`verification capability, the response message is enciphered
`
`
`by the integrated circuit device in the center. The enciphered
`
`response message is deciphered by the integrated circuit
`
`device in the customer terminal. The response message is
`recorded in the area of the recording device such that the
`
`encrypted message and decrypted message can be distin­
`guished from each other.
`
`Croydon Prinllng Company ltd
`
`0
`D.
`w
`
`Page 376 of 544
`
`UNITED SERVICES AUTOMOBILE ASSOCIATION
`Exhibit 1008
`
`

`
`01 94839
`
`- 1 -
`
`Communications network using IC cards
`
`The present invention relates to a communications
`network and, more particularly , to a communications
`network that enables transactions based on encrypted
`messages between terminals.
`Recently , with developments i n electronic technol -
`ogy , there have been innovations i n communications
`network systems such as home banking and home shopping ,
`and office banking systems . A vital concern regarding
`communications networ k systems for handling f i nancial
`t r ansactions i s guaranteeing secrecy and security for
`It i s necessary to increase the
`these transactions.
`verifiability of a transactor ' s identity or a message
`which is transmitted and received between transactors
`through the communications network.
`The classical types of irregularities that can
`occur in the transmission of transactions or messages
`
`are as follows:
`( 1 ) False reports: A sender reports not sending
`to the receiver a lthough a transmission was i n fact
`made , o r the sender reports sending although n o trans­
`mission was made .
`( 2 ) Forgery of documents : A receiver rewrites
`a communication message that has been recorded on the
`�eceiving side , or forges a communication message.
`These irregularities make embez z lement possible.
`
`5
`
`1 0
`
`15
`
`2 0
`
`25
`
`Page 377 of 544
`
`

`
`- 2 -
`
`01 9 48 39
`
`I n a prior art system, in order to prevent such
`irregularities , an enciphering program such as DES ( Data
`Encryption Standard) is stored in each network terminal
`to prevent the forging of communication messages. This
`
`means that a n enciphering/dec iphering circuit i s provid­
`ed i n each terminal and that a sender, using h i s own
`key, enciphers a message according to this enciphering
`program. The enciphered message is transmitted to a
`receiver terminal through a communications network . On
`
`the receiver side, the received enc iphered message i s
`deciphered in the deciphering circuit using a key word
`which i s stored i n a key memory and i s peculiar to the
`sender and then recorded . Accordingly, assuming that
`
`the key word stored i n the key memory on the receiver
`s i de h a s not been leaked to the outside, and that the
`receiver has not forged the message, there i s no one
`other than the sender who knows the key word who can
`make the enciphered message. Accordingly, the verifi­
`abi l ity of the enciphered message stored on the receiver
`side i s very high. Therefore, a digital signature can
`be made on the communication document . However , when
`the receiver changes his terminal operat ion mode from
`the decryption mode to the encryption mode, he can make
`
`an enciphered message using the sender ' s key word.
`Therefore, i n a communciation network system based on an
`
`encryption/decryption scheme, irregularities between the
`sender and the receiver cannot be perfectly prevented,
`thus f a i l i ng to guarantee the security of transactions .
`European Patent Appl ication Serial N o . 8 5 30 3817 , 2
`f iled o n May 3 0 , 1 9 8 5 ; entitled " COMMUNICATIONS NETWORK
`USING AN ENCIPHERING AND DECIPHERING DEVICE" ; and
`assigned to the same assignee as this application dis­
`closes a communication network with LSI devices, such as
`
`IC cards, for enciphering/deciphering messages using a
`plurality of key words.
`It i s a n object of the present invention to provide
`a communications network for performing commu nications
`
`5
`
`10
`
`1 5
`
`2 0
`
`2 5
`
`3 0
`
`3 5
`
`Page 378 of 544
`
`

`
`- 3 -
`
`01 9 4 8 3 9
`between terminals using enciphered messages, which
`guarantees transaction secur ity.
`It i s another object of the present invention to
`provide a communications network system for performing
`communications between terminals u s ing enciphered
`messages which enables a safe digital signature .
`In a communications network system according to the
`present invention, f irst and second communication termi­
`nals are coupled via a commu� ications network . First
`and second integrated circuit devices having a semicon­
`ductor large scale integrated circuit sealed therein are
`operatively coupled to the f i rst and second termina l s ,
`resp�ctively. The f i rst IC dev i c e has at least a func­
`tion for enciphering a_ f i rst kind of messages input from
`the f i rst terminal . The second IC device has a t least a
`function for deciphering an enciphered message input
`from the second terminal . The f i r s t k i nd of messages
`enciphered by the f i rst IC device i s sent from the f irst
`terminal to the second terminal via the communi cations
`network.
`According to the present invention, the f i rst IC
`device has recording means . Together with encryption of
`the f i rst kind of messages input from the fi rst termi­
`nal , the f i rst IC device i s arranged to automatically
`( to be sent to the
`record the f i rst ki.nd o f messag�s
`second terminal ) in an area of the recording means, the
`area being accessible from outside of the IC device only
`for readout .
`Furthermore , according to the present invention,
`
`the second IC device has a function for enciphering a
`second kind of messages ( to be sent to the f i rst
`termina l ) i nput from the second term�nal in response to
`the f i rst k i nd of message s . The f i rst IC device has a
`function for deciphering the second kind of messages
`sent from the second terminal to the f i rst terminal and
`then i nput to the IC devic e . Together with decryption
`of the enci phered message the f i rst IC device i s
`
`5
`
`10
`
`1 5
`
`20
`
`2 5
`
`30
`
`35
`
`Page 379 of 544
`
`

`
`- 4 -
`
`01 9 4 8 39
`
`arranged to automatically record the second kind of
`
`messages in the area of the recording means that is
`
`accessible from outside only for readout .
`
`I n the first IC devi c e , the first and second kinds
`
`5
`
`o f messages are recorded i n the area of the recording
`
`means i n such a way that the distinction between the
`
`f irst kind of messages to be enciphered and the second
`
`kind of messages which has been deciphered can be made .
`
`This invention can be more fully understood from
`
`10
`
`the following detailed description when taken in
`
`conj unction wi�h the accompanying drawings , in which:
`
`Fig . 1 is a schematic diagram o f a communication
`
`system to which the present invention is applied;
`
`Fig. 2 is a block diagram of terminals in Fig. 1 ;
`Fig . 3 i s a block diagram of IC cards used i n the
`system in Fig . 1 ;
`Fig . 4 is a diagram for explaining memory areas of
`a data memory in the IC card o f Fig . 3 ;
`Fig. 5 is a table for explaining access enable
`conditions o f the memory areas;
`Fig . 6 shows an access enable condition table of
`
`the data memory;
`Fig. 7 i s a format of a message applied to the IC
`
`card from the terminal;
`
`Fig . 8 is a flow chart for explaining a communica-
`
`tion transaction according to a first embodiment of the
`
`present invention ;
`Fig. 9 is a flow chart for explaining a communica­
`
`tion transaction according to a second embodiment of the
`
`present invention;
`Fig. 10 is a block diagram of a terminal suitable
`f o r detecting communications network failures;
`Figs . 11 and 12 are diagrams for explaining
`recording methods for recording a transaction requesc
`
`message which is t o b e enciphered and a response message
`
`which has been deciphered in a data memory area i n a
`
`distinguishable manner ;
`
`1 5
`
`20
`
`25
`
`30
`
`35
`
`Page 380 of 544
`
`

`
`- 5 -
`
`01 94839
`
`F i g . 13 i s a flow chart for explaining a communica­
`tion transaction according ·to another embodiment oi the
`present invention;
`Fig s . 1 4A to 14E are diagrams for explaining de-
`tecting methods of communications network failur e s ; ana
`Fig . 1 5 i s a flow chart for explaining a communica­
`tion transaction according to s t i l l another embodiment
`of the present invention.
`Fig . 1 schematically shows a communications net-
`wor k , which is used for home banking and shoppi ng , and
`office banking systems , and uses IC ( i ntegrated circui t >
`cards having an encryption/decryption function. This
`communications networ� is an n
`: 1 system. A plurality
`, . . . l l
`, 112
`of customer terminals 11 1
`n ' installed i n
`homes or office s , are connected to a s ingle center ter­
`min�l 1 2 , installed i n a bank or department store , via
`communication l i nes 131 , 132 , . . • l 3
`In this embodi­
`.
`n
`ment , a transaction request message M i s sent from
`customer terminal 1 1 to center terminal 1 2 . Terminals
`111 t o l l
`n a r e equipped with insertable IC cards 14
`1
`to 14 which are enciphering devi ces , respectively.
`n
`Central terminal 12 i s equfpped with an insertable IC
`card 15 which is a deciphering device .
`Fig . 2 shows an arrangement of a customer or center
`terminal . The terminal is basically consti tuted by
`an information processing device such as a personal
`computer . To a central proces sing unit
`C CPU ) 2 1 are
`coupled a memory 22 for storing a control program, a
`keyboard 23 as an input device , CRT display 24 and
`printer 2 5 which constitute a n output device , and f loppy
`d i s k drive 26 a s i n existing personal computer s . A card
`reader/writer 27 i s coupled to CPU 2 1 . The IC card i s
`loaded i nto reader/writer 2 7 . Reader/writer 27 suppl ies
`information from CPU 21 to card 14
`( 1 5 ) or from card 14
`{ 1 5 ) t o CPU 2 1 . CPU 21 i s coupled t o a communication
`l ine through a modem 2 8 . A random . number generator 2 9
`i s equipped i n central terminal 1 2 , which sends to CPU
`
`S
`
`1 0
`
`15
`
`20
`
`2 5
`
`3 0
`
`3 5
`
`Page 381 of 544
`
`

`
`- 6 -
`
`01 94839
`
`2 1 random data R specifying a sending time of a trans­
`action message or a transaction number, or authentica­
`tion random number RN.
`
`A semiconductor LSI circuit � s sealed in IC card,
`which i s arranged such that only specific information
`can be read out from the IC card. The IC card used in
`the system of the present invention has the same basic
`arrangement as a conventional IC card. As shown in
`F i g . 3 , the IC card comprises a microprocessor unit
`<MPU: one-chip microprocessor > 3 1 , a program memory 3 2
`< preferably a mask ROM o r EPROM > for storing a n encryp­
`
`tion (decryptio n > program and an operation program, a
`data memory 3 3 < preferably permanent memory type PROM) ,
`an I/O interface 3 4 and contacts 3 5 . When the IC card
`is loaded into reader/writer 2 7 , an operat ion power
`source voltage, operation clock pulses , various function
`command codes and data are supplied to the IC card
`�hrough contacts 3 5 . MPU 3 1 i ncorporates a RAM
`( random
`access memory> 3 l a .
`Program memory 3 2 stores various programs for
`executing basic functions of the IC card. The basic
`functions of the IC card include a function for reading
`from or writing into memory 3 3 , an encipheri ng/decipher­
`ing function for enciphering a message, to prevent
`leakage o r forgery thereof, when sending the message
`from one terminal t o another terminal through a communi­
`cation line, and deciphering an enciphered message
`received from another termina l , and a password setting/
`verification function for storing a password set by a
`user in the data memory and verifying a n i nput password
`with the stored password. MPU 3 1 translates a function
`command, with or without data, input from CPU 21 through
`reader/writer 27 and performs a necessary one of the
`basic function s .
`Memory 3 3 i s divided into a plurality o f areas,
`e . g . , an area accessible for external readout only, an
`area accessible for writing only, an area accessible for
`
`5
`
`1 0
`
`15
`
`2 0
`
`2 5
`
`3 0
`
`3 5
`
`Page 382 of 544
`
`

`
`- 7 -
`
`01 94839
`
`reading and writing , an area which permits no reading
`
`and writing and an area accessible for wr iting and
`reading only after password verification. These memory
`
`areas are assigned with area numbers . The designation
`of memory addresses i s performed by specifying an area
`number . The access permit conditions for the data
`memory are determined in units of areas . The access
`permit conditions depend on accessor ' s qualif ication
`levels and access types ( i . e . , the writing and reading ) .
`
`The qualification levels include an IC card manufac­
`turer, an IC card i ssuer and an IC card use r . The
`
`qua l i f i cation level of the IC card is detected by a
`signal input by an IC card holder. Memory access is
`inhibited or permitted in accordance with subsequent
`command s .
`Reader/writer 2 7 l i nks card 14 < 15 ) with CPU 21
`for communication of functional command codes and data
`therebetween, and translates macroinstructions from CPU
`2 1 into commands for the IC card.
`Fig . 4 shows an arrangement of memory 33 in card
`1 4 . Memory 33 has five areas I , I I , I I I , IV and v. An
`access control table for determining access permit con-
`.
`ditions for other areas II
`to V is stored in area I .
`The secret key word S , personal key word ( account number )
`I and passwords of user and issuer are respectively
`stored in areas I I , III and IV at the i s suance stage of
`the IC card. A user ' s transaction message M to be sent
`to the center and a center response message M ' are
`stored in area V such that the discrimination between
`the transaction request message M from the user and the
`response message M ' from the center i s made possible.
`Fig . 5 is a table showing access permit conditions
`for areas II to v. The area II can be accessed only by
`the issuer for reading and writing . Thi s access permit
`condition i s defined a s type 1 . The area I I I can be
`accessed by users for readout only, but can be accessed
`by the issuer for reading and writing both. This access
`
`5
`
`10
`
`1 5
`
`2 0
`
`2 5
`
`30
`
`3 5
`
`Page 383 of 544
`
`

`
`- 8 -
`
`01 94839
`
`permit condition is defined as type 2 . The area I V has,
`l ike area II, the access permit condition of type 1.
`The area V has access permit condition of type 3 , in
`which the users and issuer can gain access for reading
`only .
`Fig. 6 shows the access permit condition table
`.stor·ed in area I . Area number s , the access permit
`condition types, and the respective start addresses of
`areas are registered i n this tabl e .
`A function command and data are supplied t o the IC
`card in such a format as shown in Fig. 7 . Only the
`function command may be supplied to the IC card. The
`function command includes a command code for sepcifying
`writing or reading and area number data specifying an
`area of memory 3 3 . Upon reception of a message shown in
`Fig . 7 , the I C card separates the message into the
`command code and the area number data. The IC card then
`references the access control table in the data memory
`area to read out the access-permit condition type infor-
`mation for a designated memory area. At the same time,
`the .command code is translated to distinguish between
`writing and reading . After the IC card is loaded into
`the card reader/writer, password identification is per­
`formed at the f i rst stage of processing . When an input
`password coincides with the user or issuer pa-ssword
`registered in area IV in memory 3 3 , a person using the
`IC card is determined to be the user or issuer. The
`user/issuer distinction data is then stored in RAM 3 la
`in MPU 3L A determination is made as to whether a
`command is executed or not for a specified memory area
`in accordance with the user/issuer distinction data
`and the access permit condition data for the specified
`memory area. As _a result, for example, even i f the user
`wants to write a message in area V in memory 33 without
`sending t o the center, the corresponding command i s not
`executed and thus the message is not written in area V ,
`as shown in Fig . 5 .
`
`5
`
`1 0
`
`is
`
`20
`
`25
`
`30
`
`3 5
`
`Page 384 of 544
`
`

`
`- 9 -
`
`01 94839
`In order to perform a transaction, a transaction
`request message M to be sent from a customer terminal to
`the center must be enciphered in the terminal , and an
`enciphered message C must be sent onto a communication
`line. As keys for enciphering the transaction message
`are used a key word such as an account number I set by
`the card user or issuer, a number ( secret key word) S
`common to the communication network, and random number
`data R representing a transaction number and generated
`at the center side. MPU 31 performs an exclusive OR
`operation, i . e . , I (? S (± R to produce an enciphering key
`word K . The key word may be obtained by any other
`method than the exclusive OR operation . By way of
`example, the key word may be obtained by concatenating I
`and R, and then enciphering the concatenated I and R
`with the key word S . MPU 31 enciphers message M using
`the enciphering key word K and in accordance with an
`encryption algorithm such as the DES. When the
`encryption algorithm i s defined as f, message C is
`defined as follows:
`C = fK(M) = f s , I , R(M)
`As described above, K = S (?: I (±:, R. The key word I
`inherent to a card user is stored in the predetermined
`area III which can be accessed by the user for reading
`only. The common key word S is stored in area II of
`data memory 33 such that it cannot be read out to the
`outside. The key word S is public only to a minority
`such as the card issuer . The key word R representing
`a transaction number is sent from a center terminal when
`a transaction is requested by the user and is stored in
`RAM 3la in MPU 31.
`The enciphered message C and personal key word I
`are sent from a customer terminal to the center termi­
`nal . According to the present invention, whenever MPU
`31 enciphers a message M, MPU 31 automatically records
`the message M in the predetermined area V i n memory 33
`such that the message M can be externally read out but
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 385 of 544
`
`

`
`- 10 -
`
`01 9 4 8 3 9
`
`cannot be externally rewritten or erased .
`The center terminal 12 deciphers the enciphered
`message C sent from the customer terminal i n accordance
`with a decryption algorithm to recover the original
`transaction message M. Terminal 12 sends the key word
`I sent from the customer terminal together with the
`message C to IC card 15 . The center IC card 15 uses key
`words I , R and S to produce a decrypting key word K.
`The MPU deciphers the enciphered message C i n accordance
`with the decryption algorithm using the key word K.
`If the decryption algorithm is defined as f-1, the
`deciphered message M i s given by:
`-1
`-1
`M = f K C C ) = f S , I , R( C )
`where K = S '2 I 3 R.
`The deciphered message M is output from card 15 to
`be printed out by printer 2 5 . In center terminal 1 2 ,
`key words I and S are stored i n the predetermined areas
`in memory 33 in the same manner as in customer terminal
`11 . Key word R is stored in RAM 3la in MPU 31.
`In the center terminal the enciphered message C
`is deciphered, and then a responding message M ' i s
`produced, which is input t o card 1 5 . The message M ' i s
`enciphered t o produce enciphered message c • i n accord­
`ance with the same encryption algorithm as in card 14.
`Enciphered response message M' is sent back to the
`customer terminal which transmitted original message M .
`The general description of transactions using the
`communications network of the present invention will be
`described with reference to a flow chart of Fig . 8 .
`When a customer possessing card ·14 sends message M
`to the center , he f irst loads his IC card into reader/
`writer 27 in his terminal ( step 8 1 ) . The customer is
`instructed to i nput his password . When the customer
`enters h i s password through keyboard 2 3 , an input
`message with a format shown in Fig. 7 i s sent from CPU
`21 to card 14 through reader/writer 27. MPU 31 i n card
`14 translates the message and accesses memory 33 to read
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Page 386 of 544
`
`

`
`- 11 -
`
`01 94839
`
`out a password from area IV. MPU 31 then compares the
`input password with the password read out from memory 3 3
`( step 8 2 ) . A comparison result t o sent t o CPU 2 1 . When
`ident i f i cation of the customer i s confirmed, CPU 2 1
`sends a transaction request signal to terminal 12
`through line 1 3 . Terminal 12 receives random number
`data R from generator 2 9 in response to the transaction
`request signal and sends data R to the customer terminal
`( step 8 3 ) . The customer terminal supplies random number
`data R to IC card 1 4 . Data R is stored i n RAM 3 la in
`MPU 3 1 in card 1 4 , as previously described. Random
`number data R is also stored in card 15 on the center
`side.
`Upon reception of data R, CPU 2 1 instructs entry of
`an input message to the customer. The customer types
`message M on keyboard 2 3 ( step 8 4 ) . CPU 2 1 suppl ies
`message M with a function command code in a format as
`shown in F i g . 7 to IC card 14 through reader/writer 2 7 .
`MPU 3 1 i n card 1 4 enciphers message M i n accordance with
`the encryption algorithm of C = f K ( M ) . MPU 31 writes
`message M i n area V in memory 3 3 . Message c , and key
`word I stored in area I I I in memory 3 3 are read out
`under the control of MPU 3 1 . CpU 2 1 in terminal 1 1
`sends t o terminal 1 2 through l i ne 1 3 the enciphered
`message C and key word I
`( account number > output from
`card 14 ( step 8 5 ) .
`Upon receiving message C and key word I , terminal
`12 suppl ies them to card 15 . Card 15 deciphers message
`C in accordance with the . decryption algorithm of
`M = f-lK ( C ) as described above . Deciphered message M
`i s thus output from card 15
`( step 8 6 ) . CPU 2 1 causes
`printer 2 5 to print out message M supplied from card
`15
`( step 87 > . Subsequently, message M' responding to
`message M is typed on keyboard 2 3 i n the center ( step
`8 8 ) . The responding message M' may be produced by a
`computer according to a constant rout i n e . Center
`terminal 12 sends message M' to customer terminal 11
`
`5
`
`10
`
`15
`
`20
`
`2 5
`
`30
`
`3 5
`
`Page 387 of 544
`
`

`
`- 12 -
`
`01 94839
`
`t�rough line 1 3 . Message M ' from terminal 1 1 is
`visually output by printer 25 or CRT d i s play 2 4 ( step
`89 ) . The customer con f i rms whether message M ' i s
`If acceptable, the transaction is
`acceptable o r not.
`completed < step 90 ) .
`According to the way o f transactions, t�e irregu­
`larities can be prevented as described later .
`As described above, the encryption o f message M at
`each customer terminal i s performed i n association with
`the recording of the message i n the data memory . As
`previously described, message M i s recorded in area V in
`memory 33 so as to permit external readout but prohibit
`external rewr iting.
`In other words , the transaction
`If the center can confirm
`message M cannot be forged .
`that the received enciphered message C has been properly
`enciphered, that i s , a meaningful message has been
`obtained by the decryption of message C, then it can be
`confirmed that the message M has been r ecorded i n non­
`rewritable manner on the customer side .
`Since message M
`i s recorded and preserved at the customer side, the
`transaction cannot be denied afterwards and therefore,
`the customer cannot report a false transaction .
`The possibility o f forging of message M at the
`center will be considered.
`In this case, a commqnica-
`t i o n of message M i s not performed i n practice. There­
`for e , message M representing a transaction content i s
`not recorded i n the I C card o f a custome r . Therefore,
`a false report of the center can be denied by the fact
`that message M i s not recorded in the customer IC card.
`However, the transaction way described above
`involves a sl ight problem i n transaction security. When
`a customer interrupts transmission o f message M to the
`center after message M i s recorded i n h i s IC card, or
`when transmi ssion i s not performed due. to a communica-
`tion l i ne failure, a false report can be made using
`message M recorded i n card 14 . Thi s problem can be
`solved by enciphering response message M ' at the center
`
`5
`
`10
`
`1 5
`
`2 0
`
`2 5
`
`30
`
`35
`
`Page 388 of 544
`
`

`
`- 13 -
`
`01 94839
`
`and recording the enciphered response message C ' or
`deciphered response message M ' in data memory 33 in
`customer ' s IC card 1 4 .
`
`A sequence for preventing such inconvenience i s
`shown i n Fig . 9 . Message M ' i s typed and then input into
`card 15 . Message C ' is enciphered in accordance with
`the encryption algor ithm of C ' = f K ( M ) and enciphered
`message C ' is output from the IC card ( step 9 1 ) . Message
`C ' is sent to the customer termina l . Message C ' is
`input into card 14 and deciphered in accordance with the
`-1
`decryption algori thm of M ' = f K < C ' ) , thereby reproduc-
`ing message M ' . Message M ' is recorded in memory 33 and
`output from the IC card ( step 92 > . Message M ' from the
`IC card i s printed out by printer 2 5 ( step 9 3 ) . The
`customer confirms message M ' and, i f acceptable, causes
`CPU 2 1 to send back message M ' to center terminal 12.
`However, when the response message i s not acceptable,
`CPU 21 sends a response message retransmission request
`instruction to center termi nal 12 ( step 9 4 ) .
`The center terminal determines whether o r not the
`response from th� customer terminal is the retrans­
`mission request for message M ' ( step 95 ) . When message
`M ' i s sent back, a determinat i on i s made as to whether
`or not the received message M ' coincides with the
`( step 9 6 ) . This can be done by
`transmitted message M '
`vi sually di splaying the recieved message M ' at printer
`2 5 or CRT display 2 4 . When the coincidence i s confi rm-
`ed, the transaction i s executed ( step 97 ) . However,
`when the retransmission of the response message is
`requested in step 95 or when the coincidence has not
`been established i n step 9 6 , the center terminal re­
`transmits message M ' to the customer terminal without
`executing the transaction.
`As stated above, the recording of the response
`message from the center terminal at the customer termi­
`na l di sables a false report of the customer .
`Another embodiment of the present invention will be
`
`5
`
`10
`
`15
`
`2 0
`
`2 5
`
`30
`
`3 5
`
`Page 389 of 544
`
`

`
`- 14 -
`
`01 94839
`
`described.
`Referring to Fig . �0, the arrangement of custome�
`terminal 11 and center terminal 12 used in this embodi­
`ment is shown which is basically the same as that in
`Fig. 2 . A timer C or counter) 101 is coupled to CPO 21
`to detect an abnormal state, such as a failure in the
`communication line between the customer and center
`terminals . In this embodiment , message M from the
`customer to the center and response message M ' from the
`center to the customer are stored in data memory 33 in
`IC card 14 in such a way that the distinguishment
`bet�een encryption and decription of messages is made.
`For this purpose , as shown in Fig. 11, area V of memory
`33 may be divided into subareas Vl and V2 . Message M
`from the customer to the center is automatically record­
`ed in subarea Vl in association with its enccyption.
`Message M' from the center to the customer is automati-
`cally recorded in subarea V2 in association with decryp­
`tion of message C ' . Otherwise , as shown in Fig. 12,
`di scinction information such as "1" or "0" may be added
`ahead of messages M and M ' so as to distinguish message
`M from message M' . With such a distinguishable record­
`ing of messages M and M ' , the customer cannot make a
`false report that a transmitted message is a received
`one.
`
`With reference to the flow chart shown in Fig . 1 3 ,
`the portions different from Fig . 8 will be described.
`Steps 81 to 88 up to production of message M' at the
`center are the same as those in Fig . 8 .
`In this embodiment, message M ' i s produced and at
`the same time a random number RN used for an authentica­
`tion of the transaction is supplied to CPU 21 in the
`center ( step 130 > . Message M ' and authentication random
`number RN are input to card 15. Authentication infor-
`mation RN is stored in RAM 3la in MPU 31 of card 15 . A
`concatenation M' //RN of message M' and number RN is
`enciphered in card 15 in accordance with the encryption
`
`5
`
`10
`
`15
`
`20
`
`2 5
`
`30
`
`35
`
`Page 390 of 544
`
`

`
`- 15 -
`
`01 94839
`
`algorithm of C ' K f K < M ' //RN ) , and enciphered message C '
`i s output from card 1 5 ( step 13 1 > . Thus, M ' //RN repre­
`sents a message in which M ' i s di sposed on the side of
`upper signif icant bits and RN on the side of lower sig-
`n i f i cant bits . Message C ' i s sent to the customer ter­
`minal through the communication line. At the c�stomer
`termi nal , message C ' is input to card 1 4 , M ' //RN i s
`deciphered in accordance with the decryption algorithm
`of M ' //RN = f- 1K < C > , and M' and RN are automat ically
`recorded in memory 3 3 . Message M ' and number RN are
`then output from card 14 ( step 13 2 ) . Message M ' i s
`printed out i n step 1 3 3 .
`In the subsequent step 1 3 4 ,
`authentication data RN i s sent back to the ce�ter termi­
`na l . The transmitted authent ication data RN i s compared
`in the center terminal with the received authenticacion
`data ( step 135 ) . The confirmation as to whet�er or not
`the coincidence i s found between the transmitted and
`received authent ication data may be made by displaying
`them on the CRT display or printing at the printer.
`Alternatively, the confirmation may be made in the
`routine in the CPU. Upon conf i rmation of the coinci­
`dence, the content of the transaction request is execut­
`ed with the result that the transaction communication i s
`completed ( step 136 ) .
`When all procedures are completed normally, as
`described above, the transaction and response messages
`are always stored in a pair in memory 33 of card 1 4 .
`S i nce the content of these messages coincides with the
`actual transaction content, a transaction ver i f i cation
`is realized. However, an unexpected interruption of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket