throbber
(12) United States Patent
`Lee et al.
`
`USOO6367011B1
`(10) Patent No.:
`US 6,367,011 B1
`(45) Date of Patent:
`Apr. 2, 2002
`
`(54) PERSONALIZATION OF SMART CARDS
`(75) Inventors: Alson Lee, Inverness, IL (US); Mary
`L. Gorden, San Rafael, CA (US)
`
`(73) Assignee: Visa International Service
`Association, Foster City, CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days
`
`(*) Notice:
`
`a --
`
`7/1996
`12/1984
`8/1988
`4/1990
`8/1995
`10/1997
`3/1999
`
`O723251
`EP
`2575566
`FR
`2638002
`FR
`2638002
`FR
`952810
`WO
`9739424
`WO
`99.10848
`WO
`* cited by examiner
`Primary Examiner-Thomas R. PeSSO
`(74) Attorney, Agent, or Firm-Beyer Weaver & Thomas,
`
`LLP
`
`ABSTRACT
`(57)
`(21) Appl. No.: 09/172,722
`Smart card personalization includes a personalization prepa
`(22) Filed:
`Oct. 13, 1998
`ration process prior to the personalization Session at the
`personalization bureau. The personalization preparation pro
`Related U.S. Application Data
`ceSS derives the derived card keys for a single or for multiple
`(60) Provisional application No. 60/061,918, filed on Oct. 14,
`applications. The preparation process also generates issuer
`1997.
`and card public key pairs and certificates. Master keys are
`(51) Int. Cl. .................................................. G04L 9/00
`used in conjunction with the personalization preparation
`(52) U.S. Cl. ....................... 713,172. 712/165. 712/168;
`process rather than utilizing the master keys during the
`380/255
`remainder of the personalization process at the personaliza
`(58) Field of Search
`713/172, 164
`tion bureau. Because the personalization preparation process
`713/165, 168, 200, 201; 380/255, 33, 283
`does not require highly Specialized, expensive machinery, it
`is Straightforward for an issuer to derive the card keys at the
`References Cited
`issuer's location. Once the personalization preparation pro
`ceSS is complete, the derived card keys are Stored in an
`U.S. PATENT DOCUMENTS
`4,549,075 A 10/1985 Saada et al. .................. sos output file merged with other card personalization data. The
`531505 A * 5/1994 Bjerrum et al. ............... 380/25
`output file contains records of Secret and non-secret card
`5,473,690 A 12/1995 Grimonprez et al.
`data, each record corresponding to personalization informa
`5,534,857 A 7/1996 Laing et al.
`tion for a Single card to be personalized. The output file is
`5,557,679 A
`9/1996 Julin et al.
`Sent to the personalization bureau which process the file
`5,889,941 A 3/1999 Tushie et al.
`using Standard processing modules to personalize each Smart
`6,021,203 A
`2/2000 Douceur et al. .............. 380/49
`card. The preparation proceSS and the personalization pro
`FOREIGN PATENT DOCUMENTS
`ceSS may be performed at the same location or at different
`locations.
`
`(56)
`
`DE
`DE
`
`3927270
`3927270
`
`8/1989
`2/1991
`
`28 Claims, 5 Drawing Sheets
`
`
`
`
`
`54
`
`PREPARAION
`PROCESSING
`DEVICE
`
`
`
`HARDWARE
`SECURY
`MODUE
`
`OUTPU
`FILE
`
`170
`
`CARD
`SUPPLIER
`
`172
`
`PERSONAZATION
`DEVICE
`
`150
`N.
`
`\
`\
`
`180
`Y
`
`HARDWARE
`SECURITY
`MODULE
`
`152
`
`EE
`
`Personalized Cards
`
`SSUERLOCATION
`
`PERSONALZAION LOCATION
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 1 of 15
`
`

`

`U.S. Patent
`
`Apr. 2, 2002
`
`Sheet 1 of 5
`
`US 6,367,011 B1
`
`ZZ ).
`
`09 ].
`
`
`
`HH
`
`
`
`EITT GJOW A LIHT|0ES
`
`
`
`
`
`
`
`
`
`
`
`
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 2 of 15
`
`

`

`U.S. Patent
`
`Apr. 2, 2002
`
`Sheet 2 of 5
`
`US 6,367,011 B1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Begin
`Preparation
`Process
`
`Supply Card
`Personalization
`Data
`
`300
`
`Retrieve List of
`Applications to Process
`
`
`
`301
`
`302
`
`or Current Applicatio
`in Current Record
`
`304
`-Ns ls
`
`-( their Derivation Data
`in Record
`
`
`
`NO
`
`YES
`
`Retrieve Derivation
`Data
`
`306
`
`Derive Keys
`(FIGS. 3 or 4)
`
`Place Derived
`Keys & Derivation
`Data into Record
`
`308
`
`31 O
`
`312
`
`there another
`Application
`
`
`
`
`
`Write Current
`Record to Output
`File
`
`
`
`Retrieve Derivation
`Data
`
`318
`
`Derive Keys
`(FIGS. 3 or 4)
`
`Merge Derived Keys &
`Derivation Data with input
`Data in Record
`
`32O
`
`--O End
`
`FIG. 2
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 3 of 15
`
`

`

`U.S. Patent
`
`Apr. 2, 2002
`
`Sheet 3 of 5
`
`US 6,367,011 B1
`
`Begin Step 308 or 318
`
`Begin Step 308 or 318
`
`ldentify Master Key
`
`ldentify Derivation Data
`
`402
`
`404
`
`Generate issuer Key
`Pair
`
`500
`
`Generate SSuer
`Certificate
`
`501
`
`
`
`
`
`
`
`
`
`
`
`Encrypt Derivation Data With
`Master Key to Produce Card
`Derived Key
`
`406
`
`Generate Card Key
`Pair
`
`5O2
`
`
`
`
`
`
`
`Generate Card
`Certificate
`
`
`
`504
`
`Assemble Car
`Key issuer Certificate,
`and Card Certificiate
`
`
`
`506
`
`O End
`
`FIG. 4
`
`End
`
`FIG. 3
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 4 of 15
`
`

`

`U.S. Patent
`
`Apr. 2, 2002
`
`Sheet 4 of 5
`
`US 6,367,011 B1
`
`
`
`
`
`
`
`Card 1 Record
`
`Card 2 Record
`
`Card 3 Record
`
`602
`
`604
`
`606
`
`608
`
`
`
`F.G. 5A
`-- 160
`
`610 612
`2
`MC Data
`1 Length
`
`614
`
`
`
`616 618
`
`620
`
`622
`
`Data for MC 1
`
`Data for MC 2
`
`-- 602
`
`Card 1 input Record
`
`FIG. 5B
`
`630 632, 634
`
`636
`
`64
`O
`
`642 644
`
`646
`
`650
`
`Appl. Data KEK Application 1
`ld. Length id.
`1
`
`
`
`Appl.
`KEK Applic
`ation 2
`Data
`ld. Length
`Data
`ld.
`2
`
`Data for MIC 2 (Chip Data)
`
`F.G. 5C
`
`670
`
`672
`
`674
`
`680
`
`682
`
`
`
`684
`
`to or VALUE to or VALUE
`
`O. O. O.
`
`-- 636
`
`Application 1 Data
`
`FIG. 5D
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 5 of 15
`
`

`

`U.S. Patent
`
`Apr. 2, 2002
`
`Sheet 5 of 5
`
`US 6,367,011 B1
`
`900
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`NetWork
`Connection
`
`
`
`912
`
`-90
`
`interface
`
`Primary
`Storage
`
`Primary
`Storage
`
`
`
`Processor(s)
`
`FIG. 6
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 6 of 15
`
`

`

`US 6,367,011 B1
`
`1
`PERSONALIZATION OF SMART CARDS
`
`This application claims priority of U.S. provisional appli
`cation No. 60/061,918, filed Oct. 14, 1997, which is incor
`porated herein by reference.
`FIELD OF THE INVENTION
`The present invention relates generally to Smart cards.
`More Specifically, the present invention relates to a System
`and method for personalization of Smart cards having mul
`tiple applications.
`
`2
`other while the terminal only needs to hold a small number
`of master keys to communicate with a large number of cards
`in a System.
`There can be a potential problem with security when
`using this conventional method of personalization and
`derived keys. Since all card keys are typically derived at the
`time of personalization, all of the master keys are required
`at the personalization device within the personalization
`bureau. A Security issue can arise when the master keys are
`placed within a third party's control, Such as at the perSon
`alization bureau. Every additional party who has access to
`the master keys is a potential breach of Security.
`Another common problem with conventional personal
`ization is that the personalization proceSS can take a Sub
`Stantial amount of time. In addition to the cost of contracting
`with third parties to perform the personalization process, the
`time needed to perform the personalization process adds an
`additional amount to the total cost of personalization. This
`results in higher priced cards and Systems.
`In fact, a major challenge in the implementation of
`encryption technology (and especially public key
`technology) in chip cards is in how to achieve significant
`throughput in the personalization process. It is interesting to
`note that because personalization is seen as a bottleneck in
`the overall process, Special and costly personalization
`machines are used that are able to personalize multiple cards
`at once. With banks having a requirement to issue millions
`of cards per year, it is imperative that the proceSS be fully
`optimized. For example, as mentioned briefly above, certain
`chip card applications require not only a card Secret key (for
`example, the Secret key of a card public key pair), but also
`public key certificates and derived keys that are placed onto
`the card. Creating Such card keys and public key certificates
`at the point of personalization could Severely degrade
`throughput. For example, a Stored value application may
`require that a Smart card be loaded with a card Secret key, a
`card certificate, an issuer certificate, at least three DES keys
`and other card data. Creating card key pairs at the point of
`personalization would inhibit throughput.
`Furthermore, it is conceivable that one Smart card may
`contain multiple applications. Each application is likely to
`require its own Set of keys, data and algorithms. Personal
`ization throughput would be dramatically affected should
`each Smart card have to be run through a separate perSon
`alization proceSS for each application that it contains.
`Requiring each card to be personalized multiple times is not
`cost effective.
`It would therefore be desirable to provide a system and
`method for personalizing a Smart card Such that the issuer's
`master keys and other Secret information can remain Secure.
`It would also be desirable to provide a system and method
`for personalizing a card Such that the time required for the
`personalization process at the personalization bureau is
`decreased. It would be further desirable to efficiently per
`Sonalize Smart cards that may have multiple applications
`Stored thereon. The present invention addresses Such needs.
`SUMMARY OF THE INVENTION
`To achieve the foregoing, and in accordance with the
`purpose of the present invention, a preparation proceSS is
`disclosed that Speeds up the personalization process for
`Smart cards. The proceSS may be used to personalize Single
`or multiple application Smart cards. Derived card keys,
`public key pairs (if any) and public key certificates (if any)
`are generated in advance. The preparation process creates an
`output file by merging the generated Secret data with card
`
`BACKGROUND OF THE INVENTION
`Before a Smart card is issued to a cardholder, the card goes
`through an initialization and a personalization process. Dur
`ing the initialization process, a manufacturer or other card
`Supplier embeds an integrated circuit chip into the plastic
`card body. The chip is loaded with at least one application
`program, Such as a credit or a Stored value application. In
`addition, a file structure may be initialized with default
`values, and initial cryptographic keys may be Stored for
`transport Security. After a card is initialized, it is then
`typically personalized. During personalization, the Smart
`card is generally loaded with data that uniquely identifies the
`card, and with data that allows the card to be used in a
`payment System, for example. Personalization data may
`include file information, application information, a maxi
`mum value for an application or of the card and a personal
`identification number (PIN) or other cardholder information.
`Also included may be the currency in which the card or
`application is valid, the expiration date of the card or
`application, and a variety of cryptographic keys and algo
`rithm information for the card or applications on the card.
`For certain applications, cryptographic information to be
`loaded during personalization can include not only a Secret
`card key and derived keys, but also public key certificates.
`Card life cycle is described in Financial transaction cards
`Security architecture of financial transaction Systems using
`integrated circuit cards, Part 1. Card life cycle, Interna
`tional Organization for Standardization, ISO 10202-1, 1991,
`which is incorporated by reference.
`Conventionally, the Smart card is personalized at a per
`Sonalization bureau, often a third party contracted by a Smart
`card issuer to personalize their Smart cards. The personal
`ization bureau may be in a separate physical location from
`the location of the Smart card issuer or from the location of
`the entity that performs Smart card initialization. During
`personalization, a personalization device located at the per
`Sonalization bureau is coupled to a Security module. The
`personalization device generally provides data which, when
`installed on a card, gives the card the ability to run appli
`cation programs.
`During personalization, cryptographic keys (Such as
`derived card keys) are stored in a memory of the initialized
`card. These keys are used for a variety of cryptographic
`purposes. Derived card keys are derived from master keys
`Stored in the Security module (of the personalization bureau)
`using derivation data unique to each card. The derivation
`data is encrypted with a Suitable algorithm using a master
`key to produce a derived card key for a particular card. The
`use of the master key to produce derived card keys obviates
`the need to have a unique key for every card in the System
`Stored in terminals where applications are used. Instead, the
`master key can be used with derivation data from the card to
`independently regenerate the derived card key. This allows
`a terminal and a card to Securely communicate with each
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 7 of 15
`
`

`

`US 6,367,011 B1
`
`3
`data from other issuer cardholder Systems. Advantageously,
`chip card data is interspersed with other personalization data
`in a flexible format in the output file. The file is input to the
`personalization process. Advantageously, the entity per
`forming personalization may then use the output file to
`personalize all applications on a Smart card in one process.
`An embodiment of the present invention speeds up the
`personalization process performed at the personalization
`bureau by deriving any needed derived card keys prior to the
`time of personalization at the bureau. Additionally, the
`present invention provides greater overall Security by allow
`ing the issuer to maintain the master keys (or other Secret
`information) at the issuer's location without the need to give
`the master keys to a personalization bureau or other third
`party. The present invention is applicable to a wide variety
`of Secret information that an issuer may not wish to divulge
`to outside parties. By using the Secret information at the
`issuer location to help produce the output file, the Secret
`information need not be divulged to a third party Such as a
`personalizer.
`This embodiment of the present invention provides a
`modified personalization process, which includes a prepa
`ration proceSS accomplished after initialization, but prior to
`the Standard personalization Session (typically, but not
`necessarily, occurring at a personalization bureau). The
`preparation proceSS will generally be carried out at the issuer
`location, but may be carried out at any location trusted by the
`issuer. Furthermore, it is contemplated that the preparation
`proceSS and the personalization Session may be performed at
`the same location. Among other tasks, the preparation pro
`ceSS is used to derive the derived card keys for one or more
`applications to be installed on a card. In this manner, an
`issuer's master keys are used during the preparation proceSS
`rather than during the remainder of the Standard personal
`ization Session at a personalization bureau. Since the prepa
`ration proceSS does not require highly specialized, expensive
`machinery (Such as the personalization device) it is rela
`tively simple for an issuer to derive the card keys at the
`issuer's location. Once the preparation proceSS is complete,
`the derived card keys may be Stored in a file, which can later
`be sent to the personalization bureau for the remainder of the
`personalization process.
`According to a further embodiment of the present
`invention, applications in addition to those applications that
`need derived card keys can also be included in the file to be
`Sent to the personalization bureau. An example of an appli
`cation that may not need derived card keys is a loyalty
`application. Loyalty applications are used to keep track of
`purchases by a cardholder for the purpose of rewarding the
`cardholder for being a particularly loyal customer. Embodi
`ments of the invention allow data related to multiple appli
`cations to be combined in a single file, which can then be
`Sent to the personalization bureau or other entity responsible
`for personalizing the card. Advantageously, use of a Single
`file to personalize a Smart card having multiple applications
`is efficient and obviates the need for the card to be person
`alized once for each application.
`One embodiment of the present invention for personaliz
`ing a Smart card includes performing a first portion of a
`personalization process at a first location (e.g., at a card
`issuer), including an output of the first portion of the
`personalization proceSS in an output file, and Sending the
`output file to a Second location. The Second portion of the
`personalization proceSS may then be performed at the Second
`location (e.g., at a personalization bureau).
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a block diagram of a System for personalization
`of a Smart card according to one embodiment of the present
`invention.
`
`1O
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`FIG. 2 is a flowchart of one method for performing a
`preparation process to produce an output file at a preparation
`processing device.
`FIG. 3 is a flowchart describing one method for deriving
`keys using Symmetric cryptography.
`FIG. 4 is a flowchart describing another method for
`deriving keys using asymmetric cryptography.
`FIGS. 5A-5D illustrate one possible embodiment of a
`format for an output file.
`FIG. 6 is a block diagram of a typical computer System
`Suitable for implementing an embodiment of the present
`invention.
`
`DETAILED DESCRIPTION
`AS mentioned above, the life cycle of a Smart card begins
`with the manufacture of the chip, and its mounting into a
`card body by a card manufacturer or card Supplier. Once
`initialized, a batch of cards is shipped to a personalizing
`entity who performs personalization of the cards. Data is
`received from the card issuer for use in personalizing each
`card. Personalization of each card depends upon the appli
`cation for which the card is intended, but may include:
`addition of Secret keys, addition of application Specific data
`and parameters, embossing, addition of graphic images,
`addition of magnetic Stripe data, etc. The present invention
`is directed toward the interaction between the issuer and
`personalization entity, and addresses a need to Streamline the
`personalization process for high Volumes of cards, and
`especially when multiple applications are in use. By way of
`background, Smart cards are first discussed in general.
`
`Smart Cards
`The present invention is applicable to Smart cards. Also
`termed chip cards, integrated circuit cards, memory cards or
`processor cards, a Smart card is typically a credit card-sized
`plastic card that includes one or more Semiconductor inte
`grated circuits. A Smart card can interface with a point-of
`Sale terminal, an ATM, or with a card reader integrated with
`a computer, telephone, Vending machine, or a variety of
`other devices. The Smart card may be programmed with
`various types of functionality Such as a Stored-value
`application, a credit or debit application, a loyalty
`application, cardholder information, etc. Although a plastic
`card is currently the medium of choice for Smart cards, it is
`contemplated that a Smart card may also be implemented in
`a Smaller form factor, for example, it may attach to a key
`chain or be as Small as a chip module. A Smart card may also
`be implemented as part of a personal digital assistant,
`telephone, or take a different form. The below description
`provides an example of the possible elements of a Smart
`card, although the present invention is applicable to a wide
`range of types of Smart cards.
`A Smart card may include a microprocessor, random
`access memory (RAM), read-only memory (ROM), non
`volatile memory, an encryption module (or arithmetic unit),
`and a card reader (or terminal) interface. Other features may
`be present such as optical storage, flash EEPROM, FRAM,
`a clock, a random number generator, interrupt control,
`control logic, a charge pump, power connections, and inter
`face contacts that allow the card to communicate with the
`outside world. Of course, a Smart card may be implemented
`in many ways, and need not necessarily include a micro
`processor or other features.
`The microprocessor is any Suitable central processing unit
`for executing commands and controlling the device. RAM
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 8 of 15
`
`

`

`US 6,367,011 B1
`
`S
`Serves as temporary Storage for calculated results and as
`Stack memory. ROM Stores the operating System, fixed data,
`Standard routines, look up tables and other permanent infor
`mation. Non-volatile memory (such as EPROM or
`EEPROM) serves to store information that must not be lost
`when the card is disconnected from a power Source, but that
`must also be alterable to accommodate data Specific to
`individual cards or changes possible over the card lifetime.
`This information includes a card identification number, a
`personal identification number, authorization levels, cash
`balances, credit limits, and other information that may need
`to change over time. An encryption module is an optional
`hardware module used for performing a variety of encryp
`tion algorithms. Of course, encryption may also be per
`formed in Software. Applied Cryptography, Bruce Schneier,
`John Wiley & Sons, Inc., 1996 discusses suitable encryption
`algorithms and is hereby incorporated by reference.
`The card reader interface includes the Software and hard
`ware necessary for communication with the outside world.
`A wide variety of interfaces are possible. By way of
`example, the interface may provide a contact interface, a
`close-coupled interface, a remote-coupled interface, or a
`variety of other interfaces. With a contact interface, Signals
`from the integrated circuit are routed to a number of metal
`contacts on the outside of the card which come in physical
`contact with Similar contacts of a card reader device. A Smart
`card may include a traditional magnetic Stripe to provide
`compatibility with traditional card reader devices and
`applications, and may also provide a copy of the magnetic
`Stripe information within the integrated circuit itself for
`compatibility.
`Various mechanical and electrical characteristics of a
`Smart card and aspects of its interaction with a card reader
`device are described in Smart Card Handbook, W. Rankland
`W. Effing, John Wiley & Sons, Ltd., 1997, and are defined
`by the following Specifications, all of which are incorporated
`herein by reference: Visa Integrated Circuit Card
`Specification, EMV Integrated Circuit Card Specification for
`Payment Systems, EMV Integrated Circuit Card Terminal
`Specification for Payment Systems, EMV Integrated Circuit
`Card Application Specification for Payment Systems, Visa
`International Service Association 1996; and International
`Standard. Identification Cards Integrated Circuit(s) Cards
`with Contacts, Parts 1-6, International Standards Organiza
`tion 1987-1995.
`
`Smart Card Personalization
`FIG. 1 shows a block diagram of a system 100 for
`personalization of a Smart card according to an embodiment
`of the present invention. At the issuer location, hardware
`security module (HSM) 130 is coupled to a preparation
`processing device 154, which receives an input file 159. At
`the personalization location, a personalization device 150 is
`coupled to a hardware security module (HSM) 152. Output
`file 160 is transferred from the issuer location via transport
`mechanism 158 to be input to device 150. Card supplier 170
`is one of many well known card Suppliers that provides
`initialized Smart cards 172 to personalization device 150.
`Once personalized by device 150 using file 160, personal
`ized cards 180 are available for use by cardholders. It is
`possible for the issuer location and the personalization
`location to be the same location.
`Hardware security module (HSM) 130 is used to facilitate
`cryptographic processing. HSM 130 typically Stores Secret
`keys and encryption algorithms, performs cryptographic
`functions on Secret data and generates Session keys and
`
`6
`signatures. As is known in the art, HSM 130 is generally a
`tamper proof device, which uses Some level of physical
`Security measures to protect the Sensitive information inside.
`HSM 130 may be any security module used in the industry,
`such as a RACALHSM Model RG7000, or the security box
`attached to an automatic teller machines (ATM). In alterna
`tive embodiments, HSM 130 may be implemented on a
`Smart card within a card reader, on a Series of Smart cards,
`may be implemented on any Suitably Secure computer, or
`may be implemented in Software.
`HSM 130 is used either to generate or to store imported
`master keys Such as a master update key, a master load key,
`a Supplier update key, a key encryption key, a key exchange
`key, the issuer public and Secret keys, and the issuer public
`key certificate. HSM 130 also uses the master keys to
`generate card Specific keyS Such as a derived load key for
`each card, a derived update key for each card, the card public
`and Secret keys, and generates the card public key certificate.
`HSM 152 is a Similar device to HSM 130. HSM 152 is used
`to decrypt Secret data in output file 160 using a key encryp
`tion key, and to encrypt the Secret data under a key known
`to the card (for example, a Session key) prior to sending it
`to the card for personalization. HSM 152 also uses a supplier
`update key to unlock cards received from the card Supplier.
`Further use of HSM 130 and HSM 152 will be described
`below.
`Preparation processing device 154 may be implemented
`upon any Suitable computer System. By way of example, a
`suitable computer system is shown in FIG. 6 below. In one
`Specific embodiment, device 154 is implemented upon a
`personal computer. Device 154, as will be described in more
`detail below, is used to manipulate and Store cardholder data,
`application data, and other data Such as parameter data. The
`cardholder data includes data Such as the identification of the
`cardholder and the credit limit of the cardholder. The appli
`cation data includes data related to a credit application, a
`Stored value application, or other applications that may or
`may not require cryptography, Such as loyalty applications.
`A variety of other applications may be available for use on
`a Smart card to be personalized, including debit, dedicated
`funding Source applications, etc. The parameter data
`includes data not uniquely related to the particular
`cardholder, Such as the number of the card and the location
`of the issuer.
`Transport mechanism 158 may use any of the numerous,
`well-known file transfer methods for transferring file 160.
`By way of example, transfer via a floppy disk or over a
`Secure network connection may be used. Personalization
`device 150 may be any suitable personalization machine
`Such as are known in the art. By way of example, those
`machines made and used by Datacard, Inc. may be used. AS
`is known in the art, device 150 includes any number of
`processing modules for personalizing various aspects of a
`Smart card. Module identifier codes embedded in output file
`160 indicate following data which is to be used by the
`appropriate processing module to personalize a Smart card.
`According to one embodiment of the invention, prior to
`undergoing the Standard personalization process at the per
`Sonalization location, input data for each Smart card to be
`personalized is processed using preparation processing
`device 154 at the issuer's location. FIGS. 2, 3 and 4 describe
`one embodiment by which input data for a Smart card is
`processed using device 154. Preparation processing device
`154 produces output file 160, which includes data to be used
`in the personalization proceSS for all cards to be personal
`ized. File 160 is described in greater detail below in FIGS.
`5A-5D. Data in output file 160 may include: data for any of
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`GOOG-1010
`GOOGLE LLC v. RFCYBER CORP. / Page 9 of 15
`
`

`

`US 6,367,011 B1
`
`7
`a variety of applications Such as credit, Stored value, loyalty,
`etc., derived card keys and derivation data for particular
`applications, public key certificates, and other data. Result
`ing output file 160 is then transferred to personalization
`device 150 via transport mechanism 158.
`In one embodiment of the invention, input file 159 has the
`format of output file 160, although not all needed informa
`tion is yet present in the file. For example, as noted earlier,
`a wide variety of information is passed to the personalization
`location. Data destined for the magnetic Stripe of a card, for
`embossing on a card, and for graphics on a card may already
`be present and complete in input file 159 in the format
`described in FIGS. 5A-5D. Nevertheless, data for a particu
`lar application or applications, destined for the chip on the
`card, may not be entirely complete in input file 159. For
`example, derived keys, a card Secret key, an issuer certificate
`and a card certificate may not be present in input file 159. As
`described in FIGS. 2-4, this information is added to output
`file 160 during the preparation process. Furthermore, an
`issuer may have different Systems (Such as an on-line
`System, a cardholder System, a load System, etc.) from which
`input data destined for output file 160 is retrieved. For
`example, data for different applications on the chip card may
`come from different sources. Thus, output file 160 may be
`run through the process of FIG. 2 multiple times, each pass
`generating and adding information to records in the file for
`different applications.
`Once file 160 reaches the personalization location, device
`150 processes file 160 using Standard processing techniques
`to personalize the Smart cards whose personalization data is
`represented in file 160. In one embodiment, module identi
`fier codes in file 160 indicate which processing modules are
`to operate on which data. In particular, non-Secret data and
`Secret data (Such as derived keys, public key pairs and
`certificates) for each application available on a Smart card is
`read from file 160 by device 150 and transferred to each
`Smart card being personalized.
`Accordingly, when the remainder of the personalization
`proceSS is performed at the personalization location, perSon
`alization device 150 no longer needs to derive card keys, or
`to generate card key pairs which is typically very time
`consuming. A further advantage is that the present invention
`allows an increase in Security Since the master keys never
`need to leave the issuer's location or control.
`
`Security Embodiment
`Those of skill in the art will appreciate that a wide variety
`of keys and encryption algorithms may be used by the card
`Supplier, issuer, personalizer, and by the card itself to
`provide Security during card manufacture, transport and
`personalization. The following presents one possible
`embodiment for use of a variety of keys to provide Security
`in various aspects of the invention. Of course, a wide variety
`of other forms of keys may also be used. In this embodiment,
`the issuer generates various keys to provide Security. For
`example, the issuer may generate: a master load key (KML)
`used to create a derived unique load key (KDL) for each
`personalized card; a master update key (KMU) used to
`create a derived unique update key (KDU) for each person
`alized card; an issuer transport key (ZCMK); a Supplier
`update key (KMC) used to create a derived unique Supplier
`update key (KDC) for each personalized card; a key version
`update (VKUiep) which is initialized to the key version of
`the KMC used to create the initial diversified key for update
`transactions for a card; and a key encryption key (KEK) for
`Sending other keys to the personalization location. KDC is
`
`8
`preferably placed on each card by the card Supplier for use
`as a transport key to Secure the cards prior to personaliza
`tion. Key KMC is sent to the Supplier and to the personal
`ization location.
`HSM 130 is used either to generate or to store imported
`master keys such as KMU, KML, KMC, KEK, a key
`eXchange key, the issuer public and Secret keys, and the
`issuer public key certificate. HSM 130 also uses the master
`keys to generate card Specific keyS. Such as KDL, KDU, the
`card public and Secret keys, and generates the card

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket