throbber
US008118218B2
`
`United States Patent
`(12)
`(10) Patent No.:
`US 8,118,218 B2
`Kohet al.
`(45) Date of Patent:
`Feb. 21, 2012
`
`
`(54) METHOD AND APPARATUS FOR
`PROVIDING ELECTRONIC PURSE
`
`(56)
`
`References Cited
`
` U.S. PATENT DOCUMENTS
`
`(75)
`
`Inventors: Liang Seng Koh, Fremont, CA (US);
`Futong Cho, Milpitas, CA (US); Hsin
`Pan. Fremont. CA (US): Fuliang Cho
`San Jose, CA (US)
`
`(73) Assignees: Rich House Global Technology Ltd.,
`Shenzhen (CN); RFCyber Corp.,
`Fremont, CA (US)
`
`(*) Notice:
`
`Subject to anydisclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(0) by 1057 days.
`
`(21) Appl. No.: 11/534,653
`
`(22)
`
`Filed:
`
`Sep. 24, 2006
`
`(65)
`
`Prior Publication Data
`|
`US 2008/0073426 Al
`Mar. 27, 2008
`
`(51)
`
`Int. CL
`(2006.01)
`GO6K 5/00
`(52) U.S. CL.
`.......... 235/380; 235/451; 235/492; 705/26;
`705/39: 705/40; 705/41; 705/64
`(58) Field of Classification Search
`235/379
`235/380, 492
`See application file for complete search history.
`
`8/2003 Atsmonetal. 0.00 235/492
`6,607,136 BI*
`
`2002/0145632 Al* 10/2002 Shmwueli etal.
`...
`. 345/835
`2009/0313689 AL* 12/2009 Nystromet al. cscs. 726/9
`FOREIGN PATENT DOCUMENTS
`WO 2007068991 Al *
`6/2007
`WO
`* cited by examiner
`:
`Primary Examiner —'Vhien M. Le
`Assistant Examiner — Christopher Stanford
`(74) Attorney, Agent, or Firm — Joe Zheng
`(57)
`ABSTRACT
`‘lechniques for portable devices functioning as an electronic
`purse (e-purse) are disclosed. According to one aspect of the
`invention, a mechanism is provided to enable a portable
`device to conduct transactions over an open network with a
`payment server without compromising security.
`In one
`embodiment,a device is loaded with an e-purse manager. The
`e-purse manageris configuredto manage varioustransactions
`and functions as a mechanism to access an emulatortherein.
`The transactions may be conducted over a wired network ora
`wireless network. A three-tier security model is contemplated
`to support the security of the transactions from the e-purse.
`Thethree-tier security model includes a physical security, an
`e-purse security and a card managersecurity, concentrically
`encapsulating one with another. Security keys (either sym-
`metric or asymmetric) are personalized within the three-tier
`security model.
`18 Claims, 9 Drawing Sheets
`
`
`
`E Purse
`securit
`
`SAM
`Module
`
`212
`
`200
`
`
`
`We
` Payment network
`
`eb agent
`and servers 0
`on PC 14
`
`
`
`Existing hardware for
`
`land-based commerce
`
`
`(e.g., stores or
`
`transportation) in
`enclosed environment
`E-commerce
`
`
`
`
` ' Contactless interface
`
`
` ingle functional
`
`
`Smart card
`s
`protocol
`
`E-Purse
`
`
`applet built on
`
`GP wi
`th
`acces.
`S to MF
`password 206
`
`
`Cell phone with
`smart card
`module
`
`M-commerce
`
`RFID reader
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 1 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 1 of 15
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 1 of 9
`
`US 8,118,218 B2
`
`FIG.1A
`
`100
`
`>_—
`
`104
`
`— >o
`
`Oo7
`
`) o ©
`
`)
`
`©O
`
`
`
`E-Pursesecurity
`
`102
`
`
`
`Physicalsecurity
`
`© C
`
`c ©= O
`
`o_
`
`
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 2 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 2 of 15
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 2 of 9
`
`US 8,118,218 B2
`
`OLL
`
`OLL
`
`s6e]
`
`GbOl
`
`s6e]sse99e
`
`Jadeey
`
`a1e5
`
`VLL
`
`uolouN
`0]SPUBLULUOD
`sesjoe
`
`9|Buls
`
`a|Buis91nd8xy
`
`UOIOUNL
`esind-J
`
`NddvJOsouenbes
`
`peseq
`
`pue]
`
`
`
`asJnd-3JUSW9|CGUuI
`
`YOMSU
`
`©}SPUBLULUOD
`JOWVS
`
`
`
`seyonssuolesedo
`
`aseyoind‘peo|
`
`esund-9
`
`JOAIOS
`
`cL
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 3 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 3 of 15
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet3 of 9
`
`US 8,118,218 B2
`
`00¢
`
`CLSWYvS
`
`S|NpoYW|
`
`easingJ
`
`junoes
`
`
`
`
`
`bleOdUOOleSJOAJBSPUL
`
`
`
`
`
`JO]aaempleyHunsixy
`
`
`
`
`
`JUSLUUOJIAUSPSSO|OUSSIJOWILWUOS-F
`
`
`
`SOJEBLUWOSPeseq-pue|
`
`ul(UoNewodsued
`
`
`
`JOSau0}s‘"6°9)
`
`
`
`Jepeslgi4Ay
`
`
`
`9DPJJ3]UISSOOeyUOD|
`
`
`
`jooo}oldpueda1|090}01d
`
`esund-J
`
`¢Ud
`
`
`90zpsomssed
`
`80¢4W0}sseo0e
`
`COZ
`
`
`
`YIMBUOY||8D
`
`piedWeLUS
`
`ainpow
`
`Joyejnwa|YIMdO
`
`
`
`uoyingje\dde
`
`S0JOLULUOD-//|]
`
`aaa2D°3oO
`
`LLa>Oo
`
`i®2>Oo
`
`coNS©3OoO
`9=—°s®D©oO—ai°Oo
`
`
`
`juebegan,yiomyeujuaWAeg
`
`
`
`
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 4 of 15
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 4 of 9
`
`US 8,118,218 B2
`
`00&
`
`cOE
`
`|@UUOSJE0
`
`PaZouny
`
`
`
`80€)sodsuesy
`
`Bunsixy
`
`9iNpoVW
`
`UoNe}
`
`Vs
`
`vOE
`
`UONeZI|BUOSI3q
`
`uoieoddy
`
`90€
`
`-dMON
`
`asind
`
`sINpOyy
`
`Vs
`
`LLE
`
`
`
`Jebeuewpied
`
`VEDs
`
`CLE
`ja\ddy
`
`asJind-J
`
`Joyejnwe
`
`Jopeoy
`
`dlduy
`
`OLE
`
`aaa2D°3oO
`
`LLa>Oo
`
`i®2>Oo
`
`coNS©3OoO
`9=—°ifs)®D©oO—ai°Oo
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 5 of 15
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 5 of 9
`
`US 8,118,218 B2
`
`Gé‘Sls
`
`Joye|nwe
`
`LLe !clejalddy!!JeBeuewpied3
`
`asind-4
`
` COL-dMON
`
`Oe
`
`
`
`80]Jodsues)
`
`Buisixg
`
`9|Npo|
`
`UO!}2}
`
`VS
`
`
`
`pukeyJOM}EU
`
`yuauAed
`
`SIOAIOS
`
`
`
`
`
`
`
`asind
`
`VS
`
`g|NpoY
`
`J9/PIIAI
`
`aaa2D°3oO
`
`LLa>Oo
`
`i®2>Oo
`
`coNS©3OoO
`9=—°©®D©oO—ai°Oo
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 6 of 15
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet6 of 9
`
`US 8,118,218 B2
`
`
`
`
`
`osejauueyoAjNosseYSI|Qe}Se0}UIEWOPAjLINdasUOHeo|ddeesj
`
`OSE
`
`
`
`ZSEuolezijeuosisd9]eNU|
`
`bSepeday}Woy|He}eyopeey
`
`
`
`
`
`
`
`
`
`SdIASPBU}UlJa/ddeasund-suepuepYysasund-sMauUeUaaMjagq
`
`
`
`
`
`
`
`geYS8sund-3mau3u]UsamjaqsuIdpueSheyOIesadoasund-aayesausy
`
`SOlASpP9u]UlJa|ddeesund-98uepue
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`asind-auepue;wYysHulsixe9u]UeaMmieqoF"E)/4B9E,.PEzI|euosied,JOa]e}s&0}asuNd-9ay]18Sf@dlA8p3ujulJe|dde
`
`
`
`
`
`09€jauueUDAjUuNnd—aseYSsI|qe]se0]UlBWWOpAndesUuolealddeasp
`
`
`
`
`
`
`
`c9eQ|62)ou)pueWYSBunsixeoy)BIAJo}e/NWAUeJoShayPSUOJsUeI)9}2JBUaS)
`
`
`
`
`
`
`
`
`
`Joye|Nwaay}pueIVSBunsixeau)Usemjeq
`
`Q|5e}8u)pueWSBunsixeueelASouOmMssed4a}e18Uas)
`
`
`
`801Aapau}U!Jaj\ddeasund-3uepueWyySUOneLodsuedBurysixeueUsaMjaq
`
`
`
`
`
`CNA
`
`Lea>oO--2Da°°°Oo
`
`a2>Oo
`
`coNS©3OoO
`wo=—°-ooD©a—ar=°oO
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 7 of 15
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 7 of 9
`
`US 8,118,218 B2
`
`00V
`
`
`
`vOvpleaBulja]UdJayeJe|pIwWeBIASONbale9yeNIU]
`
`
`
`
`
`
`
`
`
`90}8|PILUBU)0}BSUOdSsaleCSeSodWOdssund-y
`
`
`
`asuodsalau}
`
`éPalla
`
`
`
`
`
`ja|ddeasind-a0}ysanbelespuasje/pI\
`
`
`
`
`
`JaBeuewasindau}sseo9e0}Nid
`
`VySid
`
`yuegaU}WOBsuodsasBSAIGDOyY
`
`
`
`clyJaJSUBAPUN]eBsleliulpuejUNODDeBulpuodseiooeALA
`
`
`
`PSIJIBAJ‘yUueqBullosuodse0}Isanbe.
`
`
`
`aaa2D°3oO
`
`LLa>Oo
`
`i®2>Oo
`
`coNS©3OoO
`9=—°©®D©oO—ai°Oo
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 8 of 15
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 8 of 9
`
`US 8,118,218 B2
`
`GySls
`
`glyasund-994}0}Way)puespueSPUBWLUODNGdY192.1xepuediusJ9/pI|\y
`
`
`
`
`
`22JaAjesjuawAed3y}0}JSaNbssYOMaUBUI
`
`
`
`8U}PUBIC
`asuodselNGdYVUeSO}EINWUO}JEU}]S/PILUBU}0}JOY]BSayBISUaD
`
`
`
`
`SPUBWLUODSpUsspUeAIONUBUINEAGdYSu}Sayeasund-y
`
`
`
`
`UOIJEIIJIBA9]JOLpoulejesSIasuOdsedAdagy9u)veye
`
`abessowYOMISUBUlPeppsequeesUOdSe
`
`
`
`
`
`
`JQ|pllusO,oBessowsnjejsjnysseoonseo}es9Ues
`
`
`
`Bo}uonoesue.)eseyepdnpueJoyejnwa9au}0}
`
`CNA
`
`Lea>oO--2Da°°°Oo
`
`a2>Oo
`
`coNS©3OoO
`wo=—°oooD©a—ar=°oO
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 9 of 15
`
`
`

`

`U.S. Patent
`
`Feb. 21, 2012
`
`Sheet 9 of 9
`
`US 8,118,218 B2
`
`Buloueuls
`
`INNVS
`
`sINPo|
`
`CVV
`
`vrV
`
`O14
`Ils
`
`}8|PIUU|sdBeueW
`
`asund
`
`aaa2D°3oO
`
`LLa>Oo
`
`i®2>Oo
`
`coNS©3OoO
`re)=—3Oo=®D©oO~ai3Oo
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 10 of 15
`
`
`
`

`

`
`
`mB wu
`
`1. Technical Field
`The present invention is generally related to commerce
`over networks. Particularly, the present inventionis related to
`electronic purses that can be advantageouslyused in portable
`devices configured for both electronic commerce (a.k.a.,
`e-commerce) and mobile commerce(a.k.a., m-commerce).
`2. Description of the Related Art
`Single functional cards have been successfully used in
`enclosed environments such as transportation systems. One
`example of such single functional cards is MIFAREthatis the
`most widely installed contactless smart card technology in
`the world. With more than 500 million smart card ICs and 5
`million reader components sold, MIFARE has been selected
`as the most successful contactless smart card technology.
`n> D
`MIFAREis the perfect solution for applications like loyalty 2
`and vending cards, road tolling, city cards, access control and
`gaming.
`It is noticed that such enclosed systemsare difficult to be
`expanded into other areas such as e-commerce and m-com-
`merce becausestored values and transaction information are :
`stored in data storage of each tag that is protected bya set of
`keys. The nature ofthe tag is that the keys need to be delivered
`to the card for authentication before data can be accessed
`during a transaction. This constraint makes systems using
`such technology difficult to be expanded to an open environ-
`ment such as the Internet for e-commerce and cellular net-
`works for m-commerce as the key delivery over a public
`domain network causes security concerns.
`‘There is, thus, a need for a mechanism in devices, espe-
`cially portable devices, functioning as an electronic purse
`(e-purse) to be able to conduct transactions over an open
`network with a payment server without compromising secu-
`rity.
`
`35
`
`40
`
`50
`
`2
`tion with a paymentserver. In one embodiment, the essential
`data to be personalized into an e-purse include one or more
`operation keys(e.g., a load key and a purchase key), default
`PINs, administration keys (c.g., an unblock PIN key and a
`reload PIN key). and passwords (e.g., from Mifare). During a
`transaction, the security keys are used to establish a secured
`channel between an embedded e-purse and an SAM (Security
`Authentication Module) or backend server.
`The invention may be implemented in numerous ways,
`including a method, system, and device. In one embodiment,
`the present invention is a methodfor providing an e-purse, the
`method comprises providing a portable device embedded
`with a smart card module pre-loaded with an emulator, the
`portable device including a memoryspace loaded with a
`midlet that is configured to facilitate communication between
`ane-purse applet therein and a paymentserver over a wireless
`network, wherein the portable device further includes a con-
`tactless interface that facilitates communication between the
`e-purse applet therein and the paymentserver, and personal-
`izing the e-purse applet by reading off data from the smart
`card to generate one or more operation keys that are subse-
`quently used to establish a secured channel between the
`e-purse and. a SAM or a paymentserver.
`According, to another embodiment, the present inventionis
`a system for providing an e-purse, the system comprises a
`portable device embedded with a smart card module pre-
`loaded with an emulator,
`the portable device including a
`memory space loaded with a midlet that is configured to
`facilitate wireless communication between an e-purse applet
`therein and a payment server over a wireless network, the
`portable device further including a contactless interface that
`facilitates communication between the e-purse applet therein
`and the paymentserver, the payment server associated with
`an issuer of the e-purse, and a SAM module configured to
`enable the e-purse, wherein the SAM module is behind the
`payment server when the e-purse is caused to communicate
`with the payment server via the midlet over a wireless net-
`work (M-commercein FIG.2) or via the agent on a PC over
`a wired network (E-commerce in FIG.2).
`Accordinglyonc of the objects ofthe present inventions is
`to provide a mechanismto be embedded in devices, especially
`portable devices, to function as an electronic purse (e-purse)
`to be able to conduct transactions over an open network with
`a paymentserver without compromising security.
`Other objects, features, and advantages of the present
`invention will become apparent upon examining the follow-
`ing detailed description of an embodimentthereof, taken in
`conjunction with the attached drawings.
`
`
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`US 8,118,218 B2
`
`1
`METHOD AND APPARATUS FOR
`PROVIDING ELECTRONIC PURSE
`
`BACKGROUND
`
`SUMMARY
`
`This section is for the purpose of summarizing some
`aspects ofembodimentsofthe present invention andto briefly
`introduce some preferred embodiments. Simplifications or
`omissions in this section as well as the title and the abstract of
`this disclosure may be made to avoid obscuring the purpose of
`the section, the title and the abstract. Such simplifications or
`omissions are not intended to limit the scope of the present
`invention.
`Broadly speaking, the inventionis related to a mechanism
`provided to devices, especially portable devices, functioning
`as an electronic purse (e-purse) to be able to conduct trans-
`actions over an open network with a payment server without
`compromising security. According to one aspect of the
`present invention, a device is loaded with an e-purse manager.
`The e-purse manageris configured to manage varioustrans-
`actions and functions as a mechanismto access an cmulator
`therein. The transactions may be conducted over a wired
`network or a wireless network.
`According to another aspect of the present invention, a
`three-tier security model is proposed, based on which the
`present invention is contemplated to operate. The three-tier
`security model includes a physical security, an e-purse secu-
`rity anda card managersecurity, concentrically encapsulating
`one with another. Security keys (either symmetric or asym-
`metric) are personalized withinthe three-tier security model
`so as to personalize an e-purse and perform secured transac-
`
`55
`
`The invention will be readily understood by the following
`detailed description in conjunction with the accompanying
`drawings, wherein like reference numerals designate like
`structural clements, and in which:
`FIG. 1A showsa three-tier security model based on which
`the present invention is contemplated to operate according to
`) one embodimentthereof;
`FIG. 1B showsa data flow in accordance withthethree-tier
`securily model amongthree enlilies;
`FIG. 2 shows an exemplary architecture diagramaccording
`to one embodiment ofthe present invention;
`FIG. 3A a block diagramofrelated modules interacting
`with eachotherto achieve whatis referred to herein as e-purse
`2
`personalization by an authorized person as shown in ['IG.2;
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 11 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 11 of 15
`
`

`

`US 8,118,218 B2
`
`3
`FIG. 3B showsa block diagram of related modules inter-
`acting with each other to achieve whatis referred to herein as
`e-purse personalization by a user of the e-purse as shown in
`FIG. 2;
`FIG. 3C showsa flowchart or process of personalizing an
`e-purse according to one embodimentof the present inven-
`tion:
`FIG. 4A and FIG. 4B showtogether a flowchart or process
`offinancing, an e-purse according to one embodiment ofthe
`present invention; and
`FIG. 4C shows an exemplary block diagram of related
`blocks interacting with each other to achieve the process FIG.
`4A.
`
`
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`
`
`
`36
`
`35
`
`
`
`4
`in order to secure the message channel betweenthe purse and
`the SAM or backendservers. For a single functional card, the
`e-purse security 104 will act as gates to protect actual opera-
`tions performed ona single functional card. During person-
`alization, the single functional card access keys(or its trans-
`formation) are personalized into the purse with the purse
`transaction keys.
`Card ManagerSecurity 106, referring to a general security
`framework of a preload operating system in a smart card,
`provides a platform for PIN management and security chan-
`nels (security domains) for card personalization. This plat-
`form via a card managercan be used to personalize a purse in
`one embodiment. One example of the card managersecurity
`106 is what is referred to as a Global Platform (GP) thatis
`created by a cross-industry membership organization to
`advancestandards for smart card growth. A GP combines the
`interests of smart card issuers, vendors, industry groups, pub-
`lic entities and technology companiesto define requirements
`and technology standards for multiple application smart
`cards. In one embodiment, a global platform security is used
`to personalize a smart card. As a result, both c-purse keys and
`card access keys are personalized into thetarget tag.
`FIG. 1B showsa data flow in accordance withthe three-tier
`security model amongthree entities a land-based SAM or a
`network e-purse server 112, e-purse 114 acting as a gate
`keeper, and a single function lag 116. According to one
`embodiment of the present
`invention, communications
`betweenthe land-based SAM orthe network e-purse server
`112 and the e-purse 114 are conducted in sequence of a type
`of commands(e.g.,APDU) while communications between
`the e-purse 114 andthe single function tag 116 are conducted
`in sequence of another type of commands, wherein the
`e-purse 114 acts as the gate keeper to ensure only secured and
`authorized data transactions could happen.
`In reference to FIG. 1A,the physical securityis realized in
`an emulator. As used herein, an emulator means a hardware
`device or a program that pretends to be another particular
`device or program that other components expect lo interact
`with. The e-purse securily is realized between one or more
`applets configured to provide e-purse functioning and a pay-
`mentserver. ‘he card managersecurity (e.g., global platform
`security) is realized via a card manager to update security
`keys to establish appropriate channels for
`interactions
`between the server and the applets, wherein the e-purse
`applet(s) acts as a gatekeeper to regulate or control the data
`exchange.
`According to one embodiment, a smart card has a pre-
`loaded smart card operation system that provides security
`framework to control the access to the smart card (e.g., an
`installation of external applications into the smart card). In
`order to manage the life cycle of an external application, a
`card manager module is configured by using the smart card
`security framework. For instance, a Java based smart card,
`SmartMX,is preloaded with an operating system JCOP4.1.
`The Global Platform 2.1 installed on the SmartMX performs
`the card managerfunctionality.
`Referring now to FIG. 2, there shows an exemplary archi-
`tecture diagram 200 according to one embodiment of the
`present invention. The diagram 200 includes a cellphone 202
`embedded with a smart card module. An example of such a
`cell phone is a near field communication (NFC) enabled
`cellphone that includes a Smarl MX (SMX) module. The
`SMX is pre-loaded with a Mifare emulator 208 (which is a
`single functional card) for storing values. The cellphoneis
`equipped with a RFID interface (e.g., ISO 144443) that
`allowsthe cellphoneto act as a tag. In addition, the SMX is a
`JavaCard that can run Java applets. According to one embodi-
`
`45
`
`50
`
`55
`
`60
`
`65
`
`In the following description, numerousspecific details are
`set forth to provide a thorough understanding of the present
`invention. The present invention may be practiced without
`n> D
`these specific details. The description and representation 2
`herein are the means used bythose experienced or skilled in
`the art to effectively convey the substance of their work to
`others skilled in the art. In other instances, well-known meth-
`ods, procedures, components, and circuitry have not been
`described in detail since theyare already well understood and :
`to avoid unnecessarily obscuring aspects of the present inven-
`tion.
`Reference herein to “one embodiment” or “an embodi-
`ment” meansthat a particular feature, structure, or character-
`istic described in connection with the embodiment can be
`includedin at least one implementation ofthe invention. The
`appearances of the phrase “in one embodiment” in various
`places in the specification are not necessarily all referring to
`the same embodiment,nor are separate oralternative embodi-
`ments mutually exclusive of other embodiments. Further,the
`order of blocks in process, flowcharts or functional diagrams
`representing one or more embodiments do not inherently
`indicate any particular order nor imply limitations in the
`invention.
`Embodimentsofthe present invention are discussed herein
`with reference to FIGS. 1A-4C. However, those skilled in the
`art will readily appreciate that the detailed description given
`herein with respect to these figures is for explanatory pur-
`poses only as the invention extends beyond these limited
`embodiments.
`FIG. 1A showsa three-tier security model 100 based on
`which the present
`invention is contemplated to operate
`according to one embodimentthereof. The three-tier security
`model 100 includes physical security 102, e-purse security
`104 and card managersecurity 106.
`Physical securily 102 refers to a security mechanism pro-
`vided by a single functional card to protect data stored on the
`card. ‘he card may be hardware implemented or software
`emulated running on a type of media. Data on a single func-
`tion card is protected by a set of access keys. These keys are
`configured onto the card when the card is issued. To avoid
`obscuring aspectsofthe present invention, the process ofhow
`the keys are configured onto the cards is to be omitted. For
`accessing the data, related keys are delivered to a reader for
`authentication.
`
`E-purse security 104 defines a set of protocols that enable
`micro paymenttransactions to be carried out in both wired
`and wireless environments. With anelectronic purse (a.k.a.,
`e-purse) stored on a smart card, a set ofkeys (either symmet-
`ric or asymmetric) is personalized into the purse when the
`purse is being issued. During a transaction, the purse uses a
`set of respective keys for encryption and MACcomputation
`
`40
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 12 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 12 of 15
`
`

`

`US 8,118,218 B2
`
`5
`ment, an e-purse is built on top of the global platform and
`implementedas an applet in SMX. The e-purseis configured
`to be able to access the Mifare data structures with appropri-
`ate transformed passwords based onthe access keys.
`In the cellphone 202, a purse manager midlet 204 is pro-
`vided. For M-commerce, the midlet 204 acts as an agent to
`facilitate communications between an e-purse applet 206 and
`one or more payment network and servers 210 to conduct
`transactions therebetween. As used herein, a midletis a soft-
`ware component suitable for being executed on a portable
`device. The purse manager midlet 204 is implemented as a
`“midlet” on a Java cellphone, or an “executable application”
`ona PDA device. Oneofthe functions this software compo-
`nent provides is to connect to a wireless network and com-
`municate with an e-purse applet whichcan reside on eitherthe
`same device or an external smart card. Inaddition, it is con-
`figured to provide administrative functions such as changing
`a PIN, viewing a purse balance and a history log. In one
`application in which a card issuer provides a SA module 212
`n> D
`that
`is used to enable and authenticate any transactions 2
`between a card and a correspondingserver(also referred to as
`a payment server). As shown in FIG. 2, APDU commandsare
`constructed by the servers 210 having access to aSA module
`212, where the APDUstands for Application Protocol Data
`Unit that isa communication unit between a reader andacard.
`The structure of an APDUis defined by the ISO 7816 stan-
`dards. Typically, anAPDU commandis embedded in network
`messagesand delivered to the server 210 or the e-purse applet
`206 for processing.
`Tor e-commerce, a web agent 214 on a computing device
`(not shown)is responsible for interacting with a RI'ID reader
`and the network server 210. In operation, the agent 214 sends
`the APDU commandsorreccives responses thereto through
`the RFID reader 216 to/from the e-purse applet 206 residing
`in the cellphone 202. On the other hand, the agent 214 com-
`poses network requests
`(such as HTTP) and receives
`responses thereto from the paymentserver 210.
`To personalize the cellphone 202, FIG. 3A showsa block
`diagram 300 ofrelated modules interacting with eachother to
`achieve whatis referred to herein as e-purse personalization
`byanauthorized person as shown in FIG. 2. FIG. 3B shows a
`block diagram 320 of related modules interacting with each
`other to achieve what is referred to herein as e-purse person-
`alization bya user of the e-purse as shown in FIG.2.
`FIG. 3C showsa flowchart or process 350 of personalizing
`an e-purse according to one embodimentofthe present inven-
`tion. FIG. 3C is suggested to be understood in conjunction
`with FIG, 3A and FIG. 3B. The process 350 may be imple-
`mented in software, hardware or a combination of both.
`As described above, an e-purse is built on Lop of a global
`platform to provide a security mechanism necessary to per-
`sonalize applets designed therefor. In operation, a security
`domainis used for establishing a secured channel between a
`personalization application and the e-purse. According to one
`embodiment, the essential data to be personalized into the
`purse include one or more operation keys(c.g.. a load key and
`a purchase key), default PINs, administration keys (c.g., an
`unblock PIN key and a reload PIN key), and passwords (c.g.,
`from Mifare).
`Tt is assumedthat a user desires to personalize an e-purse
`embeddedin a device (e.g., a cellphone). At 352 of FIG. 3C,
`a personalization process is inilialed. Depending on imple-
`mentation, the personalization process may be implemented
`in a module inthe device and activated manuallyor automati-
`cally, or a physical process initiated by an authorized person
`(typically associated with a care issuer). As shown in FIG. 3A,
`an authorized personal initiates a personalization process 304
`
`:
`
`36
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`to personalize the e-purse for a user thereof via new e-purse
`SA module 306 and an existing SA module 308 with the
`RFID reader 310 as the interface. The card manager 311
`performs at least two functions: 1. establishing a security
`channel, via a security domain, to install and personalize an
`external application (e.g., e-purse applet) in the card person-
`alization; and 2. creating security means (e.g., PINs) to pro-
`tect the application during subsequentoperations. As a result
`ofthe personalization process 304, the c-purse applet 312 and
`the emulator 314 are personalized.
`Similarly, as shownin FIG. 3B, a user ofan e-purse desires
`to initiate a personalization process to personalizethe e-purse
`wirelessly(e.g., via the m-commerce path of FIG.2). Differ-
`ent from FIG. 3A, FIG. 3B allows the personalization process
`to be activated manually or automatically. For example, there
`is a mechanismona cellphonethat, if pressed, activates the
`personalization process. Alternatively, a status of “non-per-
`sonalized” may promptto the userto start the personalization
`process. As described above, a midlet 322 in a device acts as
`an agentto facilitate the communication between a payment
`server 324 and the e-purse 312 as well as the emulator 314,
`wherein the payment server 324 has the access to the new
`e-purse SA module 306 and anexisting SA module 308. As a
`result of the personalization process, the e-purse applet 312
`and the emulator 314 are personalized.
`Referring nowback to FIG. 3C, afler the personalization
`process is started, in view of FIG. 3A, the RFID reader 310 is
`activated to read the tag ID andessential data from a card in
`the device at 354. With an application security domain (e.g.,
`a default security setting by a card issuer), a security channel
`is then established at 356 between a new e-purse SAM(e.g.,
`the SAM 306 of FIG. 3A) and an e-purse applet (e.g., the
`e-purse applet 312 of FIG. 3A) in the device.
`Each application security domain of a global platform
`includes three 3DES keys. For example:
`Keyl:
`404142434445464748494a4b4c4d4e4f
`Key2:
`404142434445464748494a4b4c4d4e4l
`Key3:
`404142434445464748494a4b4c4d4e4f
`A security domain is used to generate session keys for a
`secured session between twoentities, such as the card man-
`ager applet and a host application, in which case the host
`application may be cither a desktop personalization applica-
`tion or a networked personalization service provided by a
`backendserver.
`A default application domain can be installed by a card
`issuer and assigned to various application/service providers.
`Therespective application owner can changethe value of the
`key sets before the personalization process(orat the initial of
`the process). Then the application can use the newset to
`create a security channel for performing the personalization
`process.
`With the security channelis established using the applica-
`tion provider’s application security domain, the first sct of
`data can be personalized to the purse applet. The secondsct of
`data can also be personalized with the same channel, too.
`However, ifthe data are in separate SAM,then a new security
`channel with the same keyset (or different key sets) can be
`used to personalize the second set of data.
`Via the new purse SAM 306, a set ofe-purse operation keys
`and pins are generated for data transactions betweenthe new
`e-purse SAMandthe e-purse applet to essentially personalize
`the e-purse applet at 358.
`is then established at 360
`A second security channel
`between an existing SAM(e.g., the SAM 308 of PIG. 3A) and
`
`255/1/DES-ECB/
`
`255/2/DES-ECB/
`
`255/3/DES-ECB/
`
`
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 13 of 15
`
`GOOG-1028
`Google LLC v. RFCyber Corp. / Page 13 of 15
`
`

`

`US 8,118,218 B2
`
`2
`
`mB wu
`
`7
`the e-purse applet(e.g., the e-purse applet 312 of FIG. 3A) in
`the device. Al 362, a set of transformed keys is generated
`using the existing SAM andthe tag ID. The generated keys are
`stored in the emulator for subsequent data access authentica-
`tion. At 358, a set of MF passwords is generated using the
`existing SAM and the tag ID, then is stored into the e-purse
`applet for future data access authentication. After it is done,
`the e-purse including the e-purse applet and the correspond-
`ing emulatoris set to a state of “personalized”.
`FIG. 4A and FIG. 4B showtogethera flowchart or process
`400 of financing an e-purse according to one embodiment of
`the present invention. The process 400 is conducted via the
`m-commerce path of FIG. 2. To better understand the process
`400, FIG. 4C shows an exemplary block diagram 450 of
`related blocks interacting with each other to achieve the pro-
`cess 400. Depending onan actual application ofthe present
`invention, the process 400 may be implemented in software,
`hardware or a combinationof both.
`A useris assumed to have obtained a portable device(e.¢.,
`n> D
`a cellphone) that is configured to include an e-purse. The user 2
`desires to fund the e-purse from an accountassociated with a
`bank. At 402, the user enters a set of personal identification
`numbers (PIN). Assumingthe PIN is valid, a purse manger in
`the deviceis activated and initiates a request(also referred to
`Nea
`an OTA top off request) at 404. The midlet inthe device sends :
`a request to the e-purse applet al 406, which is illustrated in
`FIG. 4C where the e-purse manager midlet 434 communi-
`cates with the e-purse applet 436.
`At 408, the e-purse applet composesa response in respond-
`ing to the request from the midlet. Upon receiving the
`response, the midlet sends the response to a payment network
`and server over a wireless network. As shown in FIG. 4C, the
`c-purse manager midlict 434 communicates with the e-purse
`applet 436 for a response that is then sent to the payment
`network and server 440. At 410, the process 400 needs to
`verify the validity of the response.If the response can not be
`verified, the process 400 stops. Ifthe response can beverified,
`the process 400 moveslo 412 where a corresponding account
`ata bank is verified. If the account does exist. a fund transler
`requestis initiated. At 414, the bank receives the request and
`responds to the request by returning a response. In general,
`the messages exchanged between the payment network and
`server and. the bank are compliant with a network protocol
`(e.g., HTTP for the Internet).
`At 416, the response from the bank is transported to the
`payment network and server. The midlet strips and extracts
`the APDU commands from the response and forward the
`commandsthe e-purse at 418. The e-purse verifies the com-
`mands at 420 and, provided they are authorized, send the
`commandsto the emulator at 420 and, meanwhile updating a
`transaction log. At 422, a lickel is generated to formulate a
`response (e.g., in APDU format) for payment server. As a
`result, the payment server is updated with a successful status
`message for the midlet, where the APDU response1s retained
`for subsequent verification at 424.
`As shownin FIG. 4C, the payment network and server 440
`receives a response from the purse manager midlet 434 and
`verifies that the responseis from an authorized e-purseorigi-
`nally issued therefrom with a SAM module 444. After the
`response is verified, the payment network and server 440
`sends a request to the financing bank 442 with which the user
`432 is assumed to maintain an account. The bank will verily
`the request, authorize the r

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket