`
`European Patent Office
`
`Office europeen des brevets
`
`I lllllll llllll Ill lllll lllll lllll lllll lllll 111111111111111111111111111111111
`@ Publication number: 0 379 333 81
`
`@
`
`EUROPEAN PATENT SPECIFICATION
`
`@ Date of publication of patent specification :
`12.07.95 Bulletin 95/28
`
`@) Int. Cl.6
`
`: G07F 7/10, G07F 7/08
`
`@ Application number : 90300442.2
`
`@ Date of filing: 16.01.90
`
`@) Secure data interchange system.
`
`@ Priority: 17.01.89 CA 588388
`
`@ Date of publication of application:
`25.07.90 Bulletin 90/30
`
`@ Publication of the grant of the patent :
`12.07.95 Bulletin 95/28
`
`@ Designated Contracting States:
`AT BE CH DE DK ES FR GB GR IT LI LU NL SE
`
`@ References cited :
`EP-A- 0 216 298
`EP-A- 0 220 703
`EP-A- 0 223 122
`EP-A- 0 243 873
`CA-A- 1 207 460
`
`@ References cited :
`GB-A- 1 504 196
`GB-A- 1 505 715
`GB-A- 2 181 582
`GB-A- 2 185 937
`US-A- 3 702 464
`US-A- 4 138 058
`
`@ Proprietor : Graves, Marcel Albert
`14008-80 Avenue
`Edmonton Alberta T4R 3J7 (US)
`
`@ Inventor : Graves, Marcel Albert
`14008-80 Avenue
`Edmonton Alberta T4R 3J7 (US)
`
`@ Representative : Howick, Nicholas Keith et al
`CARPMAELS & RANSFORD
`43 Bloomsbury Square
`London WC1A 2RA (GB)
`
`Note : Within nine months from the publication of the mention of the grant of the European patent, any
`person may give notice to the European Patent Office of opposition to the European patent granted.
`Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been
`filed until the opposition fee has been paid (Art. 99(1) European patent convention).
`
`Jouve, 18, rue Saint-Denis, 75001 PARIS
`
`IPR2017-00430
`UNIFIED EX1018
`
`
`
`EP 0 379 333 81
`
`Description
`
`FIELD OF THE INVENTION
`
`5
`
`This invention relates generally to a system of providing information and services to a population of persons
`through portable devices which can be used to access any of a number of terminals to make use of the services
`offered at the said terminals. The system in particular provides for security against unauthorized access. The
`invention has use in the fields of automatic banking, automatic credit and debit transactions, passport and trav(cid:173)
`el visa verification, health and medical records, security access, licensing and any other like field where fraud
`10 may pose a problem.
`
`BACKGROUND OF THE INVENTION
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`Data transfer systems using portable devices such as cards with some memory capability, for example,
`a magnetic strip, and terminals to which the portable devices can be connected are well known. Generally they
`are used to control access to some area or service. Usually the terminals are connected to a central processing
`unit or computer which controls access and is the ultimate storage facility for the information on the card.
`British Patent 1504196 to Moreno describes such a prior art system comprised of a portable device and
`a peripheral device or terminal which is connected to a central computer. Many of the portable devices referred
`to as prior art in Moreno used magnetic track memories which could easily be modified or the contents read.
`Also the memory storage capacity was quite low and the memory was susceptible of accidental modification.
`This left such systems vulnerable to abuse from fraudulent intervention.
`United States Patent 3702464 addressed the problem of lack of memory capacity and volatility by disclos(cid:173)
`ing a portable device containing an integrated circuit memory. The device still suffered from the problem that
`the memory could be read and the contents extracted or changed. Moreno advanced the art by adding inhib(cid:173)
`iting means to prevent the transfer of data out of or into prohibited areas of the memory of the portable device.
`Preferably the portable device contained its own inhibiting means but the inhibiting means could be contained
`in the peripheral device.
`In British Patent 1505715 to Moreno there is disclosed a system for interchanging information which is like
`those described above, but without the error prone direct connections from the peripheral devices connected
`to the central computer. The peripheral devices contained a write mechanism which could transfer the infor(cid:173)
`mation from the portable device to the peripheral device which could in turn write the information on a second
`portable device. These second portable devices would then be collected on some regular basis and taken to
`the central computer where the information would be transfered to the central computer's memory.
`Canadian Patent 1207460 to Ugon discloses a method and apparatus for authorizing access to a service
`offered by an authorizing entity. The system comprises a portable card with memory and a microprocessor,
`and an authorizing entity system capable of communicating with the card and also performing computer pro(cid:173)
`gram operations. The card and the system have the same algorithm to be executed and each has secret data
`upon which the algorithms operate to produce a result which can be compared to ensure that proper access
`is granted. This system is rather complicated and involves an operator at the authorizing entity end.
`It is also known to encode a fingerprint on a portable card to verify the identity of the user. UK Patent Ap(cid:173)
`plication GB 2185937 A of O'Shea et al discloses a credit or similar card which incorporates a computer gen(cid:173)
`erated image of the fingerprint of the authorized user. When a transaction is to be verified the user's finger
`print is scanned by a finger print reader and the result is compared with the information on the card. The user
`is authorized to have access if the prints match. Such devices are presently commercially available.
`EP-A-223122 discloses a secure component authentication system which carries out a "hand shaking" rou(cid:173)
`tine. The verification of the terminal, for example, takes place by the card transmitting an encrypted number
`(X) to the terminal. The terminal decrypts the number (X) using its key K2, to form a number (Y), which is then
`used as a key to encrypt the terminal key (K2) to form a number (Z). This number (Z) is transmitted to the card,
`where it is verified at the card that the number (Z) equals the encryption of the encryption key of the card using
`its number (RN) as the key, thereby to authenticate the terminal.
`EP-A-216298 describes a similar authentication system. An IC card, a data memory and a comparator as
`well as means capable of electrically communicating with the card terminal when the card is loaded thereon
`are provided. The terminal is verified by first transmitting to the terminal encrypted data which is read out from
`the data memory in the card. This data is acted on by the terminal and transmitted to the card. The terminal
`is then verified by the card by comparing this data received to data stored in its data memory. Should there
`be coincidence of this data received and data in memory, the card advances to the next step of the verification
`process.
`
`2
`
`
`
`EP 0 379 333 81
`
`The systems described above suffer from the problem of complexity or they are susceptible to fraudulent
`and unauthorized access and tampering with the information in the card or the terminal. The present invention
`provides a highly secure and highly fraudproof system for providing access to services of an authorizing entity.
`
`5
`
`SUMMARY OF THE INVENTION
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`According to the invention, there is provided a system for the secure interchange of information according
`to claim 1.
`In the preferred embodiments of the invention, the system comprises a portable device such as a card, a
`peripheral device such as a terminal, and optionally, a remote host computer in the case of large systems, al(cid:173)
`though it can be seen that the host computer is not necessary for an operational system. These components
`are connected via some communication medium such as electrical connectors or optics or radio transmission.
`The terminal contains a microprocessor or some such logic device and memory, a card reading device and a
`finger print scanner. The card contains a microprocessor or some such logic device and memory, which can
`be connected to the terminal via electronic or some other means such as optics or radio transmission. The
`card and terminal each have their own data and programs. Upon insertion of the card into the reader a process
`of verification is carried out by means of the microprocessors or logic units, the programs and data in the mem(cid:173)
`ories. The card verifies that the terminal is valid, the terminal verifies that the card is valid and the user is veri(cid:173)
`fied by means of a finger print scan and comparison with finger print data previously recorded in the card. This
`is not to say that some other form of physical characteristic could not be used such as retinal or DNA scan.
`Where data is being transmitted between components of the system encoding and decoding is used to further
`enhance the security of the system.
`The system of the invention may be used in a method of preventing unauthorized access wherein, when
`the said terminal is connected to the said portable device and power is supplied to the said portable device
`the terminal device queries the portable device to determine if it is a valid portable device, if not the portable
`device is retained or rejected by the terminal, in turn the portable device queries the terminal to determine if
`the terminal is a valid terminal, if not the portable device erases its memory and becomes harmless, the ter(cid:173)
`minal in turn scans a physical characteristic of the user and compares that information with stored information
`on the portable device to determine if that user is authorized to use the portable device and the terminal, if
`the portable device and terminal are valid and the user is authorized access is allowed to the service, if not
`the card is retained or rejected; when the power to the terminal is interrupted the terminal programs and data
`are lost and can only be reloaded by authorized personnel with their access portable devices or from the host
`computer; encryption is used at the portable device and terminal interface as well as at the terminal and host
`computer interface.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`In drawings which illustrate embodiments of the inventions,
`is a pictorial representation of the basic system components, including an optional host computer
`Figure 1
`Figure 2
`is a flow chart depicting the dialog between the card and the terminal,
`Figure 3
`is a block diagram illustrating hardware configuration.
`
`DESCRIPTION OF THE PREFERRED EMBODIMENT
`
`The combining of the capability of an intelligent card co-operating with an intelligent terminal, a finger print
`scanning device, and optionally interfacing with a host computer to ensure maximum possible protection for
`a card user and a card issuer, is very desirable. In Figure 1 the basic hardware configuration needed to im(cid:173)
`plement such an idea is set out in pictorial form. The host computer system 1 can be a personal computer,
`mini-computer, mainframe or any suitable computer configuration depending upon the particular application.
`The host computer system is connected to terminal 3 by suitable linkages such as a telephone line through a
`modem. It is also possible to utilize other linkages such as radio transmission, or direct cable or optics. Terminal
`3 is described as an intelligent terminal and comprises an output device such as a display 5, or a voice syn(cid:173)
`thesizer or other means of communication with the user, a card reader 6 for reading or writing information from
`or to the card 4. It also contains an input device 8 such as a keyboard or other means of inputting information
`to the terminal and a finger print scanning device 7 or some other device to obtain physical information about
`the user.
`When a user wishes to utilize a card to gain access to a service from a terminal, the system requires a
`unique verification procedure to be implemented. Upon insertion of the card into the terminal, the terminal itself
`
`3
`
`
`
`EP 0 379 333 81
`
`5
`
`10
`
`15
`
`20
`
`25
`
`40
`
`45
`
`50
`
`is verified by the card. The card is then verified by the terminal and then the user's finger print which has been
`digitized into the card at the time of issue is compared with the finger print which is submitted via the finger
`print scanning device at the time of use. Additional user identification such as a personal identification number
`can also be included.
`If the terminal into which the card is inserted is not a valid terminal the card will erase its memory rendering
`itself useless to any would-be unauthorized user.
`An invalid card will be retained by the terminal and retrieved by authorized personnel. If the finger prints
`don't match the card is retained, otherwise access is granted to the service offered by the terminal.
`Figure 2 is a detailed flow chart depicting the above sequence of verification. In the preferred embodiment
`the card is an "intelligent card" with its own microprocessor or logic unit, memory, data and programs. In the
`preferred embodiment it is envisaged that the card will not carry its own power supply but will be connected
`to the terminal's power supply when the card is inserted. However, it may be preferable in some cases for the
`card to have its own power supply.
`The whole process will start with the card's insertion into the terminal reader.
`The verification process, then, shall start on the terminal side by generating a question directed to the card.
`On the card side, the checkout is accomplished by simply waiting for a certain period of time for the terminal's
`question. lfthe question does not arrive, the card will destroy all information in its memory and become useless.
`If one assumes that the card and the terminal are the correct ones, the parallel processing of the input
`question must proceed on both the terminal and card sides. On the terminal side, the checking of the card is
`achieved similarly to the card's check by waiting for the answer for a certain period of time. If the answer does
`not arrive, the terminal can withhold the card or reject it. If the answer does arrive it will process it.
`The invention can be configured to use different types of cards for different applications. For example:
`1) Passport cards
`2) Credit cards
`3) Security access cards
`4) Licence cards
`5) Debit cards
`Different types of cards would produce different answers to the initial question. This would be the way
`the terminal recognizes the type of card it is dealing with. If the answer from the card arrives on time, the ter-
`30 minal would sort the answer to the proper application and proceed by checking if the answer is correct. In the
`negative case, it would, again, withhold or reject the card.
`The next stage is the verification process in which identity of the card user is verified. This is done through
`a process of finger print checkout, in which the terminal transmits a user identification request to the card.
`The person's finger prints are scanned and compared with the template received from that stored on the card.
`Again, if any attempt is made to read the data from the card memory before the finger print verification process
`is completed, the card will destroy its data.
`The card will only allow access to its memory after confirmation from the terminal that the user is permitted
`to use it.
`It is unlikely that the whole verification process will take any longer than approximately 25 seconds al-
`though the timing is not critical.
`It is possible that someone could try to gain access to the data or the software itself by tampering with
`the terminal. To prevent this, all terminal software could be placed on RAM memory only. This way it would
`be lost immediately if the power to the terminal is disrupted. Only a licensed technician with his own access
`portable device would be able to download new software either from his portable device or from the host com-
`puter, and bring the terminal up again.
`The block diagram of Figure 3 shows the hardware configuration of a preferred embodiment of a simple
`system comprised of only one terminal. The host computer system 1 is remotely located from the terminal 3.
`The two are connected by way of a telephone line 2 and modems 10a and 10b. The terminal 3 is composed
`of a PC-type motherboard 9, which includes a microprocessor or other logic device and memory, an "intelligent
`card" reader 6, a finger print scanner 7, a custom keyboard 8 and a display 5. The card reader 6 is adapted to
`receive and communicate with the "intelligent card" 4. The "intelligent card" typically contains a microprocessor
`or some other logic device and memory. Appropriate software and data are stored in the terminal 3 and in the
`"intelligent card" 4 to enable the verification procedures represented by the flow chart of Figure 2 to be carried
`out.
`"Intelligent cards" are a unique technology utilizing plastic or some other media in which to embed micro-
`processor or some such logic unit and memory chips. The cards accordingly have both memory and processing
`capabilities. Essentially they are pocket sized computer systems with a wide range of application possibilities.
`A number of off-the-shelf items can be used in the system. The terminal could use an IBM PCtm mother-
`
`35
`
`55
`
`4
`
`
`
`EP 0 379 333 81
`
`board, a Toshibatm FZ1318 card reader and an IDENTIX Touchsavetm T5-500 finger print scanner. The "intel(cid:173)
`ligent card" could be a Toshiba TOSMAR"ftm CZ-3000. Typically an IBM PCtm could be used as the host com(cid:173)
`puter but larger more complex systems using many terminals may require a larger computer such as a main(cid:173)
`frame.
`Interconnections other than telephone lines and modems are possible. For example a security system for
`a building may have dedicated communication cables connecting the various terminals to the host computer
`without the use of modems. Also radio and optical interconnections are possible.
`Finally to further enhance security an encryption technique could be used to encode data before trans(cid:173)
`mitting between the host computer and the terminal, and decoding upon receipt. Similarily encoding and de-
`coding could be used when reading and writing from and to the "intelligent card".
`A number of changes and modifications apparent to one skilled in the art can be made without departing
`from the invention as defined by the accompanying claims.
`
`5
`
`10
`
`15
`
`Claims
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`1. A system for the secure interchange of information comprising:
`at least one portable electronic card (4) having a memory for storing program algorithms and data
`therein including valid terminal verification data and valid user identification request data;
`at least one terminal device (3) adapted to receive and communicate with said portable electronic
`
`card;
`
`said card (4) including:
`means for communicating with said terminal (3);
`means for monitoring, for a predetermined period of time, immediately following insertion of said
`card (4) in said terminal (3), an output from said terminal (3) for a terminal verification message and being
`operable to erase said memory when said terminal verification message is not received within said pre(cid:173)
`determined period of time, and being responsive to said terminal verification message received within said
`predetermined period of time, by comparing said received terminal verification message to said stored
`valid terminal verification message and being operable to erase said memory when said received terminal
`verification message is not valid; and
`means for monitoring, following receipt of a valid terminal verification message, the output from
`said terminal (3) for a user identification request and being responsive to said user identification request
`by comparing said received user identification request to said stored valid user identification request and
`being operable to erase said memory when said user identification request is not valid;
`said terminal device (3) including:
`means for transmitting to said card (4) said terminal verification message, upon insertion of said
`card (4) in said terminal (3);
`means for monitoring, for a second predetermined period of time a card output for receipt of a card
`verification message and being operable to reject said card (4) when said card verification message is
`not received within said second predetermined period of time, and being responsive to said card verifi(cid:173)
`cation message received within said second predetermined period of time by comparing said received
`card verification message to a stored valid card verification message, and being operable to reject said
`card (4) when said received card verification message is invalid;
`means for reading a user identification from said user following receipt of a valid card verification
`message;
`means for transmitting to said output a user identification request; and
`means for monitoring said card output for receipt of said predetermined user information and being
`responsive to said predetermined user information for comparing said received predetermined user infor(cid:173)
`mation to said read user identification, and being operable to reject said card (4) when said predetermined
`user information is invalid.
`
`2. A system as defined in claim 1, wherein said means for reading is a scanning device (7) for scanning a
`physical characteristic of said user.
`
`3. A system as defined in claim 2, wherein said physical characteristic is a finger print pattern.
`
`4. A system as defined in any preceding claim, said card including means for transmitting to said terminal,
`following receipt of valid terminal verification message a card verification message.
`
`5
`
`
`
`EP 0 379 333 81
`
`Patentanspruche
`
`1. System zum sicheren lnformationsaustausch, welches umfaP..t:
`zumindest eine tragbare elektronische Karte (4) mit einem Speicher zum Speichern darin von Programm-
`Algorithmen und Oaten, welche Oberprufungsdaten eines gUltigen Terminals bzw. Datenendstation bzw.
`Endgliedes und gUltige Benutzer-ldentifikationsnachfragedaten umfassen;
`zumindest eine Terminal-Einrichtung (3), welche angepar..t ist, um die tragbare elektronische Karte auf(cid:173)
`zunehmen und mit dieser zu kommunizieren;
`wobei die Karte (4) umfaP..t:
`eine Einrichtung zum Kommunizieren mit dem Terminal (3);
`eine Einrichtung zum Oberwachen bzw. Kontrollieren, wahrend einervorbestimmten Zeitperiode, welche
`unmittelbar der EinfUhrung der Karte (4) in das Terminal (3) folgt, einer Ausgabe bzw. eines Ausganges
`von dem Terminal (3) fUr eine Terminal-Oberprufungsnachricht, welche betriebsbereit ist zum Losch en des
`Speichers, wenn die Terminal-Oberprufungsnachricht nicht innerhalb der vorbestimmten Zeitperiode
`empfangen wird, und welche auf die innerhalb der vorbestimmten Zeitperiode empfangene Terminal(cid:173)
`Oberprufungsnachricht anspricht, und zwar durch Vergleichen der empfangenen Terminal-Oberprufungs(cid:173)
`nachricht mit der gespeicherten gUltigen Terminal-Oberprufungsnachricht und welche betriebsbereit ist,
`um den Speicher zu loschen, wenn die empfangene Terminal-Oberprufungsnachricht nicht gUltig ist; und
`eine Einrichtung zum Oberwachen bzw. Kontrollieren der Ausgabe von dem Terminal (3) fUr eine Benut-
`zeridentifikationsnachfrage im Anschlur.. auf den Empfang einer gUltigen Terminal-Oberprufungsnach(cid:173)
`richt bzw. -Information, welche empfindlich ist auf die Benutzeridentifikationsnachfrage durch Verglei(cid:173)
`chen der empfangenen Benutzeridentifi kationsnachfrage mit der gespeicherten gUltigen Benutzer-lden(cid:173)
`tifikationsnachfrage und betriebsbereit ist, um den Speicher zu loschen, wenn die Benutzeridentifikati(cid:173)
`onsnachfrage nicht gUltig ist;
`wobei die Terminal-Einrichtung (3) umfaP..t:
`eine Einrichtung zum Obertragen an die Karte (4) der Terminal-Oberprufungsnachricht, und zwar beim
`EinfUhren der Karte (4) in das Terminal (3);
`eine Einrichtung zum Oberwachen wahrend einer zweiten vorbestimmten Zeitperiode eines Kartenaus(cid:173)
`ganges zum Erhalt einer Kartenuberprufungsnachricht, welche betriebsbereit ist, um die Karte (4) zuruck-
`zuweisen bzw. zu sperren, wenn die Kartenuberprufungsnachricht nicht innerhalb der zweiten vorbe(cid:173)
`stimmten Zeitperiode empfangen wird und empfindlich ist auf die innerhalb der zweiten vorbestimmten
`Zeitperiode empfangene Kartenuberprufungsnachricht durch Vergleichen der empfangenen Kartenuber(cid:173)
`prufungsnachricht mit einer gespeicherten gUltigen Karten-Oberprufungsnachricht und betriebsbereit ist,
`um die Karte (4) zuruckzuweisen, wenn die empfangene Kartenuberprufungsnachricht ungUltig ist;
`eine Einrichtung zum Lesen einer Benutzeridentifikation von dem Benutzer infolge des Erhaltes einer
`gUltigen Karten-Oberprufungsnachricht;
`eine Einrichtung zum Obertragen einer Benutzeridentifikationsnachfrage an den Ausgang; und
`eine Einrichtung zum Oberwachen des Kartenausganges fUr den Erhalt der vorbestimmten Benutzerin(cid:173)
`formation, welche empfindlich ist auf die vorbestimmte Benutzerinformation zum Vergleichen der emp-
`fangenen vorbestimmten Benutzerinformation mit der gelesenen Benutzeridentifikation und betriebsbe(cid:173)
`reit ist, um die Karte (4) zuruckzuweisen, wenn die vorbestimmte Benutzerinformation ungUltig ist.
`
`2. System gemar.. Anspruch 1, wobei die Einrichtung zum Lesen eine Abtasteinrichtung (7) ist zum Abtasten
`einer physischen bzw. physikalischen Charakteristik bzw. Eigenschaft des Benutzers.
`
`3. System gemar.. Anspruch 2, wobei die physikalische Charakteristik ein Fingerabdruckmuster ist.
`
`4. System gemar.. einem der vorangegangenen Anspruche, wobei die Karte eine Einrichtung umfar..t zum
`Obertragen einer Kartenuberprufungsnachricht an das Terminal infolge des Empfanges einer gUltigen Ter(cid:173)
`minal-Oberprufungsnachricht.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`Revendications
`
`55
`
`1. Systeme pour la securite d'un echange d'informations comprenant:
`au mo ins une carte electronique portative ( 4) ayant u ne memo ire pour y memoriser des algorithmes
`de programme et des donnees incluant des donnees de verification de terminal valide et des donnees
`de demande d'identification d'utilisateur valide;
`
`6
`
`
`
`EP 0 379 333 81
`
`au mains un dispositif formant terminal (3) adapte pour recevoir et communiquer avec ladite carte
`electronique portative;
`ladite carte (4) incluant:
`des moyens pour communiquer avec ledit terminal (3);
`des moyens pour surveiller, pendant une periode de temps predeterminee, immediatement a la sui-
`te d'une insertion de ladite carte (4) dans ledit terminal (3), une sortie provenant dud it terminal (3) et re(cid:173)
`lative a un message de verification de terminal et pouvantfonctionner de maniere a effacer ladite memo ire
`lorsque ledit message de verification de terminal n'est pas re9u a l'interieur de ladite periode de temps
`predeterminee, et repondant audit message de verification de terminal re9u a l'interieur de ladite periode
`de temps predeterminee, par une comparaison dudit message de verification de terminal re9u audit mes(cid:173)
`sage de verification de terminal valide memorise et pouvant fonctionner de maniere a effacer ladite me(cid:173)
`moire lorsque ledit message de verification de terminal re9u n'est pas valide; et
`des moyens pour surveiller, a la suite de la reception d'un message de verification de terminal va(cid:173)
`lide, la sortie provenant dud it terminal (3) et relative a une demande d'identification d'utilisateur et repon-
`dant a ladite demande d'identification d'utilisateur par une comparaison de ladite demande d'identifica(cid:173)
`tion d'utilisateur re9ue a ladite demande d'identification d'utilisateur valide memorisee et pouvant fonc(cid:173)
`tionner de maniere a effacer ladite memoire lorsque ladite demande d'identification d'utilisateur n'est pas
`valide;
`led it dispositif formant terminal (3) incluant:
`des moyens pour transmettre a ladite carte (4) led it message de verification de terminal, lors de
`!'insertion de ladite carte (4) dans ledit terminal (3);
`des moyens pour surveiller, pendant une seconde periode de temps predeterminee, une sortie de
`la carte relative a la reception d'un message de verification de carte et pouvant fonctionner de maniere
`a rejeter ladite carte (4) lorsque ledit message de verification de carte n'est pas re9u a l'interieur de ladi-
`te seconde periode de temps predeterminee, et repondant audit message de verification de carte qui est
`re9u a l'interieur de ladite seconde periode de temps predeterminee par une comparaison dud it message
`de verification de carte re9u a un message de verification de carte valide memorise, et pouvant fonction(cid:173)
`ner de maniere a rejeter ladite carte (4) lorsque ledit message de verification de carte re9u est invalide;
`des moyens pour lire une identification d'utilisateur provenant dudit utilisateur a la suite de la re-
`ception d'un message de verification de carte valide;
`des moyens pour transmettre vers ladite sortie une demande d'identification d'utilisateur; et
`des moyens pour surveiller ladite sortie de la carte relativement a la reception de ladite information
`d'utilisateur predeterminee et repondant a ladite information d'utilisateur predeterminee pour comparer
`ladite information d'utilisateur predeterminee re9ue a ladite identification d'utilisateur re9ue, et pouvant
`fonctionner de maniere a rejeter ladite carte (4) lorsque ladite information d'utilisateur predeterminee est
`invalide.
`
`2. Systeme selon la revendication 1, dans lequel lesdits moyens pour lire sont constitues par un dispositif
`de balayage (7) pour balayer une caracteristique physique dudit utilisateur.
`
`3. Systeme selon la revendication 2, dans lequel ladite caracteristique physique est un motif d'empreinte
`digitale.
`
`4. Systeme selon l'une quelconque des revendications precedentes, dans lequel ladite carte inclut des
`moyens pourtransmettre auditterminal, a la suite de la reception d'un message de verification de terminal
`valide, un message de verification de carte.
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`7
`
`
`
`B
`
`DODD
`Cl CJD
`DODD
`DD CJ CJ
`
`6--t-tc::::==-1
`
`0
`0
`4~b
`
`EP 0 379 333 81
`
`2
`
`FIG. I
`
`FIG. 3
`
`8
`
`
`
`EP 0 379 333 81
`
`TERMINAL
`
`SMART CARO
`
`APPLY POWER
`TO CARD
`
`ASK CARO
`A QUESTION
`
`---~--...,
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`INPUT
`QUESTION
`
`YES
`
`I "'--
`ANSWER QUEST10N
`r---•--
`
`1
`I
`I
`---~
`
`CHECK
`FINGERPRINTS
`
`INPUT FING:R(cid:173)
`PRINTS DATA
`
`SUPPLY FlNGER(cid:173)
`PRINTS DATA
`
`NO
`
`NO
`
`NO
`
`YES _ _ _ _ _ _ _ _ _
`
`ACCESS TO CARO
`MEMORY GRANTED
`
`ACCESS
`GRANTED
`
`FIG. 2
`
`9