throbber
(12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(19) World Intellectual Property Organization
`International Bureau
`
`1111111111111111 IIIIII 1111111111111111111111111111111111111111111111111111111111
`
`(43) International Publication Date
`8 March 2001 (08.03.2001)
`
`PCT
`
`(JO) International Publication Number
`WO 01/16899 A2
`
`(51) International Patent Classification 7:
`
`G07F 7/10
`
`(21) International Application Number: PCT/GB00/03148
`
`(22) International Filing Date: 17 August 2000 (17.08.2000)
`
`(25) Filing Language:
`
`(26) Publication Language:
`
`English
`
`English
`
`(30) Priority Data:
`9920502.3
`
`1 September 1999 (01.09.1999) GB
`
`(71) Applicant (for all designated States except US): NCR IN(cid:173)
`TERNATIONAL, INC. [US/US]; 1700 South Patterson
`Boulevard, Dayton, OH 45479 (US).
`
`(74) Agent: WILLIAMSON, Brian; International Patent
`Dept., NCR Limited, 206 Marylebone Road, London NWl
`6LY (GB).
`
`(81) Designated States (national): AE, AL, AM, AT, AU, AZ,
`BA, BB, BG, BR, BY, CA, CH, CN, CU, CZ, DE, DK, EE,
`ES, FI, GB, GD, GE, GH, GM, HR, HU, ID, IL, IN, IS, JP,
`KE, KG, KP, KR, KZ, LC, LK, LR, LS, LT, LU, LV, MD,
`MG, MK, MN, MW, MX, NO, NZ, PL, PT, RO, RU, SD,
`SE, SG, SI, SK, SL, TJ, TM, TR, TT, UA, UG, US, UZ,
`VN, YU, ZA, ZW.
`
`(84) Designated States (regional): ARIPO patent (GH, GM,
`KE, LS, MW, MZ, SD, SL, SZ, TZ, UG, ZW), Eurasian
`patent (AM, AZ, BY, KG, KZ, MD, RU, TJ, TM), European
`patent (AT, BE, CH, CY, DE, DK, ES, FI, FR, GB, GR, IE,
`IT, LU, MC, NL, PT, SE), OAPI patent (BF, BJ, CF, CG,
`CI, CM, GA, GN, GW, ML, MR, NE, SN, TD, TG).
`
`(72) Inventor;and
`(75) Inventor/Applicant (for US only): SHIELDS, Adrian
`[GB/GB]; 6 Crathes Close, Glenrothes Street, Fife KY7
`4SS (GB).
`
`Published:
`Without international search report and to be republished
`upon receipt of that report.
`
`[Continued on next page]
`
`56
`
`58
`
`52
`
`10
`
`0--,
`0--,
`Q0
`\,0
`~
`-.... (57) Abstract: A portable terminal (10) for encrypting information is described. The terminal (10) generates a new key for each
`
`variable and may include the history of usage of the terminal, and/or the date and time settings. The terminal (10) may generate a
`
`22
`S transaction, where the new key is generated using one or more properties of the terminal (10). The one or more properties are
`0 unique challenge in addition to the new key so that a unique challenge can be issued for each transaction. A method of encrypting
`> information in a portable terminal, a method of communicating encrypted information between a portable terminal and a self-service
`
`;;,-,- terminal, and a transaction system comprising a self-service terminal (52) and a portable terminal (10) are also described.
`
`---iiiiiiiiiiiii
`-!!!!!!!!!!!
`==-----------------------------------------
`!!!!!!!!!!! -==
`iiiiiiiiiiiii --==
`iiiiiiiiiiiii -iiiiiiiiiiiii
`iiiiiiiiiiiii -iiiiiiiiiiiii
`
`(54) Title: PORTABLE TERMINAL
`
`50
`
`~
`
`iiiiiiiiiiiii
`
`iiiiiiiiiiiii
`
`iiiiiiiiiiiii
`
`!!!!!!!!!!!
`
`BANK OF AMERICA ET AL. EXHIBIT 1020
`
`Page 1 of 22
`
`

`

`WO 01/16899 A2
`
`I lllll llllllll II llllll IIIII IIII I II Ill lllll lllll lllll lllll llll lllllll llll llll llll
`
`For two-letter codes and other abbreviations, refer to the "Guid(cid:173)
`ance Notes on Codes and Abbreviations" appearing at the begin(cid:173)
`ning of each regular issue of the PCT Gazette.
`
`Page 2 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`PORTABLE TERMINAL
`
`The present invention relates to a portable terminal.
`
`In particular, the invention relates to a portable terminal
`
`for encrypting information and to a method of encrypting
`
`information in a portable terminal, such as a personal
`
`digital assistant (PDA).
`
`PDAs are used for storing personal information and for
`
`transferring stored personal information between computer
`
`systems.
`
`It is also possible to use a PDA to prepare and
`
`store highly confidential personal information such as
`
`transaction information for execution at a self-service
`
`terminal (SST) such as an automated teller machine (ATM).
`
`To provide some security for the transaction
`
`information it would be desirable to encrypt the transaction
`
`information that is stored on and transmitted from the PDA.
`
`However, a conventional PDA is not an inherently secure
`
`device; it has minimal tamper resistance, which means that
`
`there is no secure area for storing a secret cryptographic
`
`key. The lack of secure storage means that industry(cid:173)
`
`standard cryptographic techniques cannot be used with a
`
`conventional PDA.
`
`According to a first aspect of the invention there is
`
`provided a portable terminal for encrypting information
`
`characterised in that the terminal generates a new key for
`
`each transaction, where the new key is gen~rated using one
`
`or more properties of the portable terminal.
`
`It will be appreciated that the one o~ more properties
`
`of the portable terminal are properties that vary with usage
`
`of the terminal or with time; that is, the properties are
`
`Page 3 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`2-
`
`variable. This ensures that the new key is unique and
`
`unpredictable.
`
`The new key is generated from an unsecure area of
`
`memory. Thus, no dedicated security module is required.
`
`The new key may be generated when the transaction is
`
`prepared; that is, when the new transaction is entered into
`
`the portable terminal. Alternatively, and more preferably,
`
`the new key is generated when the transaction is executed;
`
`that is, immediately prior to communicating the new
`
`transaction from the portable terminal to a self service
`
`terminal.
`
`Preferably, the new key is a symmetric key. Using a
`
`symmetric key provides improved performance and ensures
`
`compatibility with existing financial systems that generally
`
`use symmetric key technology.
`
`A user may enter an identification during preparation
`
`of a transaction. Alternatively, the user may enter an
`
`identification a short period of time prior to executing the
`
`transaction; that is, a short period of time, such as ten
`
`seconds, prior to communicating the transaction from the
`
`portable terminal to an SST. The idenfification may be a
`
`PIN (personal identification number), or it may be
`
`biometrics-based.
`
`Preferably, the one or more properties of the portable
`
`terminal include the history of usage of the terminal and/or
`
`the date and time settings. The history of usage may
`
`include: button selections, pointer movements, data entered,
`
`and such like.
`
`In some terminals, these properties are
`
`stored in system memory. Thus, the system memory is used as
`
`Page 4 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`-3-
`
`the seed (the starting value used by a pseudo-random number
`
`generating routine) from which the new key is generated. As
`
`the system memory changes with each keystroke, a unique key
`
`is generated for each transaction.
`
`Preferably, the portable terminal generates a unique
`
`challenge in addition to the new key so that a unique
`
`challenge can be issued for each transaction.
`
`Preferably, the new key and .the unique challenge are
`
`encrypted using a public key issued by a host.
`
`By virtue of this aspect of the invention a portable
`
`terminal uses unpredictable data to generate a new key for
`
`each transaction. This new key can be used in association
`
`with a public key issued by an ATM owner to provide a secure
`
`communications channel between the portable terminal and the
`
`ATM. One advantage of this aspect of the invention is that
`
`no assumptions are made regarding protected storage areas
`
`within the portable terminal.
`
`The portable terminal may be a PDA. Alternatively, the
`
`portable terminal may be a portable computer such as a
`
`laptop computer, or the terminal may be a portable
`
`communication device such as a cellular telephone.
`
`According to a second aspect of the invention there is
`
`provided a method of encrypting information in a portable
`
`terminal, the method being characterised by the steps of:
`
`using one or more properties of the portable terminal to
`
`obtain a sequence of values, and generating a new key based
`
`on the sequence of values.
`
`Page 5 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`-4-
`
`Preferably, the method includes the further step of
`
`generating a unique challenge value based on the sequence of
`
`values.
`
`Preferably, the method includes the further steps of
`
`encrypting the new key and the challenge value using a
`
`public key issued by a host, and transmitting the encrypted
`
`new key and challenge value to the host.
`
`Preferably, the step of gen~rating a new key based on
`
`the sequence of values uses standard cryptographic
`"
`techniques, such as generating a hash value of the sequence
`
`of values using MD4, or MDS, or SHA-1, or such like hashing
`
`algorithm. A typical hashing algorithm (such as MDS)
`
`generally takes a sequence of values and converts it into a
`
`fixed string of digits.
`
`In one embodiment the hash value is split into two
`
`halves, left and right. The right half being used as an
`
`intermediate key to encrypt the left half, which, after
`
`encryption, becomes the new key. The original left half
`
`being used as an intermediate key to encrypt the original
`
`right half, which, after encryption, becomes the challenge
`
`value.
`
`It will be appreciated that splitting the hash value
`
`into a left and a right component is just one convenient
`
`method of generating a new key and a challenge value.
`
`According to a third aspect of the invention there is
`
`provided a method of communicating encrypted information
`
`between a portable terminal and a self-service terminal, the
`
`method being characterised by the steps of: using one or
`
`more properties of the portable terminal to obtain a
`
`sequence of values, generating a new key based on the
`
`sequence of values, generating a challenge value based on
`
`Page 6 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-5-
`
`the sequence of values, encrypting the new key and the
`
`challenge value using a public key, and transmitting the
`
`encrypted key and challenge value to the self-service
`
`terminal.
`
`Preferably, the method further comprises the steps of
`
`the SST: generating a new challenge value, encrypting the
`
`generated challenge value using the new key, transmitting
`
`the encrypted challenge value to the portable terminal, and
`
`awaiting a correct response to the transmitted challenge
`
`value being transmitted by the portable terminal before
`
`accepting any subsequent transaction.
`
`As a unique challenge is issued by the portable
`
`terminal and also by the self service terminal, replay
`
`attacks (whereby a third party intercepts, records, and
`
`attempts to repeat a transmission from a portable terminal
`
`to an SST) can be avoided because the third party will not
`
`be able to respond correctly to the new challenge issued by
`
`the SST. This is because a third party does not know the
`
`new key so the third party cannot decrypt the challenge
`
`value issued by the SST.
`
`According to a fourth aspect of the invention there is
`
`provided a transaction system comprising a self-service
`
`terminal and a portable terminal characterised in that the
`
`portable terminal is operable to use one or more properties
`
`of the portable terminal for obtaining a sequence of values,
`
`and to generate a new key based on this sequence of values,
`
`and the portable terminal and the self-service terminal are
`
`adapted for intercommunicating using the new key.
`
`According to a fifth aspect of the invention there is
`
`provided a method of conducting a transaction at a self-
`
`Page 7 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03 I 48
`
`-6-
`
`service terminal, the method comprising the steps of: using
`
`a portable terminal to prepare an incomplete transaction,
`
`conveying the portable terminal to the self-service
`
`terminal, completing the incomplete transaction, and
`
`executing the completed transaction by the portable terminal
`
`generating a new encryption key for that transaction using
`
`one or more properties of the portable terminal.
`
`The step of compreting the transaction may comprise the
`
`step of a user entering an identifier. The identifier may
`
`be a PIN.
`
`By virtue of this aspect of the invention, the
`
`incomplete transaction does not include the user's
`
`identifier so that if the incomplete transaction is copied
`
`or read by a third party the user's identifier will not be
`
`disclosed.
`
`According to a sixth aspect of the invention there is
`
`provided a method of determining if a self-service terminal
`
`is an authentic terminal, the method comprising the steps
`
`of: using one or more properties of a portable terminal to
`
`obtain a sequence of values, generating a new key based on
`
`the sequence of values, generating a challenge value based
`
`on the sequence of values, encrypting the new key and
`
`challenge value using a public key provided by an
`
`institution, transmitting the encrypted key and challenge to
`
`the self-service terminal, receiving a response from the
`
`self-service terminal, decrypting the response using the new
`
`key, and halting any further transmission unless the
`
`decrypted response includes a correct reply to the challenge
`
`value.
`
`Page 8 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-7-
`
`It will be appreciated that this invention has
`
`particular advantages when associated with portable
`
`terminals that do not have secure storage areas for storing
`
`one or more encryption keys.
`
`As a new key is generated for each transaction, and as
`
`the seed that is used to generate the new key is
`
`unpredictable (it may be based on the time of creating
`
`and/or executing the transaction and/or the terminal usage),
`
`a third party cannot predict what the new key will be, even
`
`if the third party knows the algorithm used to generate the
`
`new key, thereby greatly reducing the possibility of fraud.
`
`As there is no requirement for secure storage within
`
`the portable terminal, data can be uploaded to and
`
`downloaded from a personal computer (PC) without affecting
`
`the ability of the portable terminal to communicate securely
`
`with self-service terminals. This is important for portable
`
`terminals that require to synchronise their data, for
`
`example, with personal computers.
`
`In one embodiment the portable terminal may be a 3Com
`
`(trade mark) Palm IIIx (trade mark) PDA, and the SST may be
`
`an ATM having an IrDA (Infra-red Data Association) compliant
`
`infra-red port in the user interface.
`
`These and other aspects of the invention will become
`
`apparent from the following specific description, given by
`
`way of example, with reference to the acco~panying drawings,
`
`in which:
`
`Fig 1 is a block diagram of a portabl~ terminal
`
`according to one embodiment of the present invention;
`
`Page 9 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`-8-
`
`Fig 2 is a block diagram illustrating some of the
`
`contents of a memory in the terminal of Fig l;
`
`Figs 3a to 3d illustrate some of the screens displayed
`
`by the portable terminal of Fig 1 during operation of the
`
`terminal;
`
`Fig 4 is a block diagram of a transaction system
`
`comprising the portable terminal of Fig 1 in communication
`
`with a self service terminal; and
`
`Fig 5 is a flowchart
`
`lustrating the steps involved in
`
`communicating secure information between the terminals shown
`
`in Fig 4.
`
`Referring to Fig 1, the portable terminal 10 is a 3Com
`
`(trade mark) Palm IIIx (trade mark) PDA.
`
`PDA 10 comprises a
`
`controller 12 and associated volatile memory 14 and non(cid:173)
`
`volatile memory 16, a touch-sensitive display 18, a serial
`
`communication port 20 for receiving a communication cable,
`
`and a communication port 22 in the form of an IrDA-compliant
`
`infra-red port for wireless transmission and reception of
`
`information.
`
`The non-volatile memory 16 is FLASH EPROM and contains
`
`the BIOS for booting-up the PDA 10. The FLASH EPROM 16 also
`
`stores the applications that are pre-programmed into the PDA
`
`10, such as a calendar application, a notepad application,
`
`and such like.
`
`The volatile memory 14 is logically split into two
`
`parts: a dynamic heap 26 and a storage area 28.
`
`The dynamic heap 26 is used for storing dynamic data
`
`such as global variables, system dynamic allocations
`
`(TCP/IP, IrDA, and such like), application stacks, and
`
`Page 10 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-9
`
`temporary memory allocations. The keystrokes entered into
`
`the PDA 10 are all stored in the dynamic heap 26. The
`
`dynamic heap 26 is cleared when the PDA 10 is reset.
`
`The storage area 28 is used for data and application
`
`storage, and is analogous to disk storage in a desktop
`
`personal computer. The storage area 28 is powered by the
`
`PDA batteries (not shown) and by a large capacitor, so that
`
`the storage area 28 re-tains data even when the PDA 10 is
`
`reset or the batteries are replaced.
`
`As the PDA 10 is being used, the contents of the
`
`dynamic heap 26 are constantly changing. Thus, two
`
`identical PDAs, storing identical applications, will have
`
`different contents on their respective dynamic heaps.
`
`Referring to Fig 2, there is shown a block diagram
`
`illustrating the contents of the storage area 28. Area 28
`
`contains account data 30 for a financial institution, an ATM
`
`program 32 for enabling a user to prepare an ATM transaction
`
`using the PDA, and an encryption program 34 for generating a
`
`new key for encrypting a prepared ATM transaction.
`
`The account data 30 is data that is retained for use by
`
`the ATM program 32. There are no specfal security
`
`requirements for storing the account data 30. The account
`
`data includes details of the user's bank account number, a
`
`bank identification number, and a public key issued by the
`
`financial institution. For increased security, the public
`
`key is obtained directly from the financial institution by
`
`the PDA user attending a branch of the institution in person
`
`and downloading the public key. Updates to the public key
`
`may be obtained by secure remote downloading if the new
`
`Page 11 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`10-
`
`public key has the necessary authentication, such as a
`
`certificate, digital signature, or such like.
`
`Referring to Figs 3, in use, the ATM program 32
`
`provides the user with a series of screens that are similar
`
`to the screens used in a typical ATM.
`
`In this embodiment,
`
`the first screen 40 requests the user to type in his/her
`
`PIN. The second screen 42 provides the user with one or
`
`more transaction options, such as withdraw cash, print
`
`account balance, transfer funds, and such like. Subsequent
`
`screens will depend on the transaction option selected.
`
`If
`
`the withdraw cash option is selected, the third screen will
`
`invite the user to enter the amount to be withdrawn.
`
`Once the transaction details have been entered, the ATM
`
`program 32 displays a screen 44 for prompting the user to
`
`enter a transaction lifetime. This lifetime determines how
`
`long the transaction will remain valid for: that is, the
`
`latest time by which the transaction must be executed.
`
`Once the lifetime has been entered, the ATM program 32
`
`displays an icon 46 to remind the PDA user that a
`
`transaction is awaiting execution. The user (or a trusted
`
`third party) then conveys the PDA 10 to an ATM, as described
`
`with reference to Fig 4.
`
`Fig 4 is a block diagram of a transaction system 50
`
`comprising a PDA 10 in communication with a self-service
`
`terminal in the form of an ATM 52. ATM 52,has a
`
`communication interface 54 in the form of an IR to
`
`electrical signal converter. ATM 52 also has a conventional
`
`user interface 56 (which may be a touchscreen, a keypad, a
`
`loudspeaker and microphone interface, or such like) to allow
`
`a user to input transaction details manually.
`
`Page 12 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-11-
`
`When at ATM 52, the user of the PDA 10 aligns the IR
`
`port 22 with IR converter 54 located in the ATM 52 and
`
`selects the 'Execute transaction' icon 46 on the display 18.
`
`Fig 5 illustrates the steps involved in communicating
`
`secure information between PDA 10 and ATM 52.
`
`On detecting (step 100) selection of icon 46, the
`
`controller 12 invokes the encryption program 34 (Fig 2) to
`
`ensure secure communication between the PDA 10 and the ATM
`
`52.
`
`The encryption program 34 generates a new key for this
`
`transaction by obtaining a seed, and then applying a hashing
`
`algorithm (step 102), in this embodiment MD5, to the seed.
`
`The seed is obtained by the program 34 reading the contents
`
`of the dynamic heap 26 (Fig 1), requesting the current date
`
`and time from the operating system, and appending the date
`
`and time settings to the read contents.
`
`In some
`
`embodiments, only a portion of the dynamic heap 26 may be
`
`used, for example, several hundred bytes of the dynamic heap
`
`may be used.
`
`The hashed value is then split into two halves (step
`
`104): left and right. Two operations are then performed on
`
`the left half and the right half to generate a unique
`
`session key and a unique challenge value (step 106).
`
`In the first operation, the left half is used as a
`
`first intermediate key and the right half is used as first
`
`intermediate data. The first intermediate key is used to
`
`encrypt the first intermediate data to produce the new key
`
`(which is a symmetric session key).
`
`In the second
`
`operation, the right half is used as a second intermediate
`
`Page 13 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-12-
`
`key and the left half is used as second intermediate data.
`
`The second intermediate key is used to encrypt the second
`
`intermediate data to produce a challenge value. The
`
`intermediate keys and intermediate data are then discarded
`
`(they may be deleted or retained in memory until more memory
`
`is required). Thus, a unique key and a unique challenge
`
`value have been produced using the hashed value of the
`
`contents of the dynamic heap 26.
`
`PDA 10 then uses the public key stored in the account
`
`data 30 (Fig 2) to encrypt the new key and challenge value
`
`(step 108). The encrypted key and challenge value are then
`
`transmitted (step 110) from IR port 22 to IR converter 54.
`
`IR converter 54 receives the encrypted transmission and
`
`conveys the transmission to a controller 58. Controller 58
`
`decrypts (using the private key counterpart to the public
`
`key) the encrypted transmission to recover the new (unique)
`
`session key and challenge value. Controller 58 responds to
`
`the original challenge value sent by the PDA 10 and prepares
`
`a new challenge value. Controller 58 conveys to the PDA 10
`
`the new challenge and the original challenge using the new
`
`session key to encrypt the transmission.
`
`PDA 10 receives (step 112) the encrypted challenges and
`
`verifies (step 114) that the ATM 52 has correctly responded
`
`to the original challenge.
`
`If the ATM 52 has correctly responded,to the original
`
`challenge then the PDA 10 responds to the ATMs challenge
`
`(step 116) and the ATM 52 verifies this response;
`
`thereafter, secure communication can take place between the
`
`PDA 10 and the ATM 52, and the prepared transaction can be
`
`executed.
`
`Page 14 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`13
`
`If the ATM 52 has not correctly responded to the
`
`original challenge, then the communication between the PDA
`
`10 and the ATM 52 is terminated (step 120) and the PDA 10
`
`requests (step 122) if the user wishes to delete the
`
`prepared transaction.
`
`If the user wishes to delete the
`
`transaction, for example to avoid a possible security
`
`violation, then the transaction is deleted (step 124). The
`
`communication is then-halted (step 126) so that if the
`
`transaction is to be executed then the PDA 10 must revert to
`
`step 100 where a new session key and challenge value is
`
`generated.
`
`Various modifications may be made to the above
`
`described embodiment within the scope of the invention, for
`
`example, the portable terminal may be a communications
`
`device such as a cellular telephone. The ATM program 32 may
`
`not use a transaction lifetime.
`
`In other embodiments, a
`
`completed transaction may be stored in the PDA in encrypted
`
`form.
`
`In other embodiments, different hashing algorithms
`
`may be used. Different methods for generating a session key
`
`and a challenge value may be used to that described above.
`
`Page 15 of 22
`
`

`

`WO 01/16899
`
`Claims
`
`PCT /G B00/03148
`
`-14-
`
`1.
`
`A portable terminal (10) for encrypting information
`
`characterised in that the terminal (10) generates a new key
`
`for each transaction, where the new key is generated using
`
`one or more properties of the portable terminal (10).
`
`2.
`
`A terminal according to claim 1, wherein the new key
`
`is generated when the transaction is executed.
`
`3.
`
`A terminal according to claim 1 or 2, wherein the
`
`one or more properties of the portable terminal include the
`
`date and time settings.
`
`4.
`
`A terminal according to any preceding claim, wherein
`
`the portable terminal generates a unique challenge in
`
`addition to the new key so that a unique challenge can be
`
`issued for each transaction.
`
`5.
`
`A method of encrypting information in a portable
`
`terminal, the method being characterised by the steps of:
`
`using one or more properties of the portable terminal to
`
`obtain a sequence of values (102,104), and generating (106)
`
`a new key based on the sequence of values.
`
`6.
`
`A method according to claim 5, wherein the method
`
`includes the further step of generating a unique challenge
`
`value based on the sequence of values.
`
`7.
`
`A method according to claim 5 or 6, wherein the
`
`method includes the further steps of encrypting the new key
`
`and the challenge value (108) using a public key issued by
`
`a host, and transmitting (110) the encrypted new key and
`
`challenge value to the host.
`
`Page 16 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`-15-
`
`8.
`
`A method of communicating encrypted information
`
`between a portable terminal (10) and a self-service
`
`terminal (52), the method being characterised by the steps
`
`of: using one or more properties of the portable terminal
`
`to obtain a sequence of values, generating a new key based
`
`on the sequence of values, generating a challenge value
`
`based on the sequence of values, encrypting the new key and
`
`the challenge value using a public key, and transmitting
`
`the encrypted key and challenge va1ue to the self-service
`
`terminal.
`
`9.
`
`A method of communicating information according to
`
`claim 8, wherein the method further comprises the steps of
`
`the SST: generating a new challenge value, encrypting the
`
`generated challenge value using the new key, transmitting
`
`the encrypted challenge value to the portable terminal, and
`
`awaiting a correct response to the transmitted challenge
`
`value being transmitted by the portable terminal before
`
`accepting any subsequent transaction.
`
`10. A transaction system comprising a self-service
`
`terminal (52) and a portable terminal (10) characterised in
`
`that the portable terminal (10) is operable to use one or
`
`more properties of the portable terminal (10) for obtaining
`
`a sequence of values, and to generate a new key based on
`
`this sequence of values, and the portable terminal (10) and
`
`the self-service terminal (52) are adapted for
`
`intercommunicating using the new key.
`
`11. A method of determining if a self-service terminal
`
`{52) is an authentic terminal, the method comprising the
`
`steps of: using one or more properties of a portable
`
`Page 17 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`16
`
`terminal to obtain a sequence of values, generating a new
`
`key based on the sequence of values, generating a challenge
`
`value based on the sequence of values, encrypting the new
`
`key and challenge value using a public key provided by an
`
`institution, transmitting the encrypted key and challenge
`
`to the self-service terminal, receiving a response from the
`
`self-service terminal, decrypting the response using the
`
`new key, and halting any further transmission unless the
`
`decrypted response includes a correct reply to the
`
`challenge value.
`
`Page 18 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`1/4
`
`DISPLAY
`18 -
`
`--
`
`-
`
`....---
`
`CPU
`12
`-
`
`cl]
`
`17
`IR PORT
`22 -
`
`10
`~
`
`I 26 I
`I 28 I IC- 14
`
`1--
`
`SERIAL
`PORT
`
`~ 20
`
`Fig 1
`
`50
`
`~
`
`56
`
`58
`
`52
`
`22
`
`Fig4
`
`Page 19 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`2/4
`
`34
`
`32
`
`Fig2
`
`/
`
`28
`
`Page 20 of 22
`
`

`

`WO 01/16899
`
`PCT/GB00/03148
`
`3/4
`
`WELCOME
`
`Please enter your identification number
`
`~ 1 8
`
`Fig 3a
`
`42
`
`Please Select a Transaction
`
`Fig 3b
`
`•WITHDRAW CASH
`
`TRANSFER FUNDS •
`
`• PRINT BALANCE
`
`DEPOSIT CHEQUE•
`
`44
`
`Please Set Lifetime for Transaction
`
`Fig 3c
`
`• l Week
`
`• I Day
`
`4Hours •
`
`1 Hour•
`
`18
`
`18
`
`l*XTransl~46
`
`Fig 3d
`
`Page 21 of 22
`
`

`

`WO 01/16899
`
`PCT /GB00/03148
`
`4/4
`
`- - - - - - -
`
`I
`
`100
`
`102
`
`( DETECT EXECUTION r
`[ HASH DYNAMIC HEAP r
`
`I
`r
`[-------,-----1 _.,- I 04
`SPLIT HASH
`
`_
`
`GENERA TE SESSION
`KEY+ CHALLENGE
`
`ENCRYPT SESSION
`KEY+ CHALLENGE
`
`[
`
`TRANSMIT
`
`RECEIVE
`
`106
`
`108
`
`rllO
`r 112
`
`114
`
`116
`
`118
`
`120
`
`TERMINATE?
`
`NO
`
`RESPOND TO
`CHALLENGE
`
`COMMUNICATE
`
`)
`~
`124
`
`Fig 5
`
`(
`
`DELETE
`
`STOP ' 126
`
`Page 22 of 22
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket