[go: up one dir, main page]

CN1672180A - System and method for credit and debit card transactions - Google Patents

System and method for credit and debit card transactions Download PDF

Info

Publication number
CN1672180A
CN1672180A CN03807792.2A CN03807792A CN1672180A CN 1672180 A CN1672180 A CN 1672180A CN 03807792 A CN03807792 A CN 03807792A CN 1672180 A CN1672180 A CN 1672180A
Authority
CN
China
Prior art keywords
code
main frame
customer
pin
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN03807792.2A
Other languages
Chinese (zh)
Inventor
温思顿·唐纳德·基齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Swivel Secure Ltd
Original Assignee
Swivel Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB0207705A external-priority patent/GB2387253B/en
Application filed by Swivel Technologies Ltd filed Critical Swivel Technologies Ltd
Publication of CN1672180A publication Critical patent/CN1672180A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/023Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] the neutral party being a clearing house
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/388Payment protocols; Details thereof using mutual authentication without cards, e.g. challenge-response
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

A method and system for conducting secure credit and debit card transactions between a customer and a merchant. The customer is issued with a pseudorandom security string by a host computer, the security string being sent to the customer's mobile telephone. A cryptographic algorithm running in a SIM card of the mobile telephone performs a hash on the security string or the One Time Code extracted from the security string, a customer PIN and a transaction amount, these last two items being entered by way of a keypad of the mobile telephone. A three-digit response code is generated by the algorithm and then passed to the merchant. The merchant then transmits the response code, transaction amount and a customer account number (card number) to the host computer, where the pseudorandom security string and PIN are retrieved from memory. The host computer then applies the same algorithm to the security string, PIN and transaction amount so as to generate a check code, and if the check code matches the response code transmitted by the merchant, the transaction is authorised. Embodiments of the present invention make use of existing CVV2 security infrastructure, but provide a significantly greater degree of security. Embodiments of the present invention may be used with ordinary face-to-face or telephone transactions, and also in e-commerce (web-based) and m-commerce (mobile telephone-based) transactions.

Description

用于信用和借记卡交易的系统与方法Systems and methods for credit and debit card transactions

本发明涉及一种用于在信用和借记卡等交易中提高安全性能的系统与方法。The present invention relates to a system and method for improving security performance in transactions such as credit and debit cards.

信用和借记卡诈骗(在下文中称作“卡欺诈”)的问题日益增多,尤其是在线(“电子商务”)交易方面。在更加高深尖端的方法被开发出来之前,金融银行业对此的对策是利用短期的解决方案去抵制欺诈。这种短期的解决方案就是公知的“CVV2”方法,其相对来说比较简单。CVV2编码是三位十进制数字码,通常由卡的发行者在信用卡的背面或信用卡上印制,并和卡号分开(“PAN”或“付款人账号”)以及没有被以磁条或嵌入芯片的方式电子地编码到所述卡内(这有助于防止欺诈者“偷撇”的CVV2编码)。CVV2编码被印制在卡上,但不能从磁条读取。通过从在线源点获得卡号进行认证后,对其进行检测以判断所给予的CVV2编码是否正确。处理持卡人非现场交易(例如,在线或电话交易)的商业机(merchant)需要持卡人的CVV2编码、PAN、卡的到期日期和送货地址。接着,商业机进行在线检测以确认上述CVV2编码和给定的持卡人送货地址与卡的发行者和与给定PAN的相关卡共同所拥有的详细信息是否一致,这样,企图进行欺诈交易的用户需要PAN,持卡人地址,卡的到期日期和CCV2编码,因此CCV2方法的前提是假设欺诈者在最初不知道怎样偷取这些信息。缺点是,CCV2的方法相对容易被攻破,这是因为盗取PAN的许多技术可以一般地延伸到盗取CCV2编码和持卡人地址。所以充其量,CVV2是延缓欺诈的一种临时措施。Credit and debit card fraud (hereinafter "card fraud") is a growing problem, especially with respect to online ("e-commerce") transactions. Until more sophisticated methods are developed, the financial banking industry's response to this is to use short-term solutions to fend off fraud. This short-term solution is known as the "CVV2" method, which is relatively simple. The CVV2 code is a three-digit decimal number, usually printed on the back or on the credit card by the card issuer, separate from the card number ("PAN" or "Payer Account Number") and not stamped on a magnetic strip or embedded in a chip. The mode is electronically coded into the card (this helps prevent fraudsters from "skimming" the CVV2 code). The CVV2 code is printed on the card but cannot be read from the magnetic strip. After authentication by obtaining the card number from an online source, it is tested to determine if the given CVV2 code is correct. A merchant that processes cardholder off-site transactions (eg, online or telephone transactions) requires the cardholder's CVV2 number, PAN, card's expiration date, and shipping address. The merchant then conducts an on-line check to confirm that the above CVV2 code and the given cardholder shipping address are consistent with the details shared by the issuer of the card and the associated card with the given PAN so that a fraudulent transaction is attempted A user needs a PAN, cardholder address, card expiration date, and CCV2 code, so the CCV2 approach assumes that fraudsters don't know how to steal this information in the first place. The downside is that the CCV2 method is relatively easy to break because many of the techniques used to steal a PAN can generally be extended to steal CCV2 codes and cardholder addresses. So at best, CVV2 is a temporary measure to delay fraud.

需要用来支持CCV2方法的基础架构已经被安装并运行。这意味着商业机设备(例如,EPOS和EFTPOS终端等)和计算机(“IT”)系统已经被设计出来并且适用于要求三位十进制号码作为附加的安全措施。本发明的实施方案适合于使用这些现有的基础实施以提供比基于使用新的智能卡的方法更高层次的反欺诈安全措施。The infrastructure needed to support the CCV2 approach is up and running. This means that business machine equipment (eg, EPOS and EFTPOS terminals, etc.) and computer ("IT") systems have been designed and adapted to require a three-digit decimal number as an additional security measure. Embodiments of the present invention are adapted to use these existing infrastructures to provide a higher level of anti-fraud security than approaches based on the use of new smart cards.

用于检验和识别用户(例如信用和借记卡的持有者)的改进方法和系统在本申请人的共同未决英国专利申请No.0021964.2、国际专利申请No.PCT/GB01/04024以及美国专利申请No.09/663,281和09/915,271中得到了披露。这些方法和系统涉及到在进行卡交易之前发送伪随机字符串到用户的移动电话。接着,以预定的方式,用户以个人身份号码(PIN)的形式将掩码应用到伪随机字符串,以达到产生可变的一次性交易识别码的目的,该可变的一次性交易识别码被传递到商业机之后被转到认证服务器,在认证服务器核对独立计算的可变一次性识别号码以确认持卡人的身份。Improved methods and systems for verifying and identifying users, such as holders of credit and debit cards, are described in the applicant's co-pending UK Patent Application No. 0021964.2, International Patent Application No. PCT/GB01/04024 and U.S. Disclosed in Patent Application Nos. 09/663,281 and 09/915,271. These methods and systems involve sending a pseudo-random character string to a user's mobile phone prior to conducting a card transaction. Next, in a predetermined manner, the user applies a mask to a pseudo-random string of characters in the form of a personal identification number (PIN) for the purpose of generating a variable one-time transaction identifier that After being passed to the merchant machine, it is forwarded to the authentication server where it is checked against an independently calculated variable one-time identification number to confirm the cardholder's identity.

按照本发明的第一个方面,提供了一种为客户与商业机之间的安全交易进行授权方法,所述方法包括如下步骤:According to a first aspect of the present invention, there is provided a method for authorizing a secure transaction between a customer and a business machine, said method comprising the steps of:

i)在计算机主机中存储包括客户账号和相关的个人身份号码(PIN)的客户信息;i) storing customer information including customer account numbers and related personal identification numbers (PINs) in the computer host;

ii)在所述计算机主机中产生伪随机安全字符串;ii) generating a pseudo-random security character string in the host computer;

iii)从所述计算机主机中发送所述伪随机安全字符串到至少一个由客户操作的远端电子装置;iii) sending said pseudo-random security string from said host computer to at least one remote electronic device operated by a client;

iv)在客户与商业机之间进行交易时,将所述PIN和交易金额输入到所述电子装置;iv) entering said PIN and transaction amount into said electronic device when conducting a transaction between a customer and a merchant machine;

v)通过把预定加密算法运用于所述伪随机安全字符串、PIN和交易金额,在所述电子装置中产生响应码;v) generating a response code in said electronic device by applying a predetermined encryption algorithm to said pseudo-random security string, PIN and transaction amount;

vi)传输所述响应码,交易金额和客户账号到所述计算机主机;vi) transmitting the response code, transaction amount and customer account number to the computer host;

vii)在所述计算机主机中,利用客户账号检索出所述PIN和所述伪随机安全字符串,接着,将预定加密算法运用于所述伪随机安全字符串、PIN和交易金额,以产生检验码;vii) In the host computer, retrieve the PIN and the pseudo-random security string using the customer account number, and then apply a predetermined encryption algorithm to the pseudo-random security string, PIN and transaction amount to generate a verification code;

viii)在所述计算机主机中,比较所述检验码与所述响应码,如果他们相互匹配则授权交易。viii) In said host computer, comparing said verification code with said response code and authorizing the transaction if they match each other.

按照本发明的第二个方面,提供了一种用于对客户与商业机之间的交易进行授权的安全交易系统,所述系统包括计算机主机和至少一个由客户操作的电子装置,其特征在于:According to a second aspect of the present invention, there is provided a secure transaction system for authorizing transactions between a client and a business machine, said system comprising a host computer and at least one electronic device operated by a client, characterized in that :

i)在所述计算机主机中存储包括客户账号和相关个人身份号码(PIN)的客户信息;i) storing customer information including customer account number and related personal identification number (PIN) in the computer mainframe;

ii)所述计算机主机产生伪随机安全字符串,并发送所述伪随机安全字符串到所述至少一个由客户操作的电子装置;ii) the host computer generates a pseudo-random security string, and sends the pseudo-random security string to the at least one electronic device operated by the client;

iii)在客户在与商业机进行交易时,所述电子装置接收来自客户的输入,所述输入包括所述PIN和交易金额。iii) When the customer is conducting a transaction with the merchant, the electronic device receives input from the customer, the input including the PIN and a transaction amount.

iv)通过将预定加密算法运用于所述伪随机安全字符串,PIN和交易金额,所述电子装置产生响应码;iv) said electronic device generates a response code by applying a predetermined encryption algorithm to said pseudo-random security string, PIN and transaction amount;

v)传输所述响应码,交易金额和客户账号到所述计算机主机;v) transmitting the response code, transaction amount and customer account number to the computer host;

vi)所述计算机主机利用客户账号检索出所述PIN和所述伪随机安全字符串,接着,将预定加密算法运用于所述伪随机安全字符串、PIN和交易金额,以产生检验码;vi) The host computer uses the customer account to retrieve the PIN and the pseudo-random security string, and then applies a predetermined encryption algorithm to the pseudo-random security string, PIN and transaction amount to generate a check code;

viii)所述计算机主机比较所述检验码与所述响应码,如果它们相互匹配则交易授权。viii) The computer host compares the verification code with the response code, and if they match each other, the transaction is authorized.

优选地,由所述电子装置产生的响应码被显示在所述电子装置的显示器上,并且以口头或其它方式发送给客户所正在进行交易的商业机。作为一种选择,上述响应码能够通过任何适宜的技术(例如,蓝牙或其它通常使用调制电磁辐射信号的标准的通讯技术)直接从容户操作的电子装置发送给由商业机操作的电子装置(例如,EPOS或EFTPOS终端)。在通过商业机网站等进行交易的情况下,响应码被在网站的适当地方输入,以用于传输给商业机。Preferably, the response code generated by the electronic device is displayed on the display of the electronic device and sent verbally or otherwise to the merchant with which the customer is transacting. Alternatively, the above response codes can be sent directly from the electronic device operated by the user to the electronic device operated by the merchant via any suitable technology (e.g., Bluetooth® or other standard communication technology that typically uses modulated electromagnetic radiation signals). For example, EPOS or EFTPOS terminals). In the case of a transaction through a merchant machine website or the like, the response code is entered at an appropriate place on the website for transmission to the merchant machine.

为了授权(authorisation),上述响应码,交易金额和客户账号通常由商业机(而不是客户)发送给上述计算机主机,可以是经由EPOS或EFTPOS终端或任何适当的计算机装置。For authorization, the above-mentioned response code, transaction amount and customer account number are usually sent by the business machine (not the customer) to the above-mentioned computer host, which can be via EPOS or EFTPOS terminal or any suitable computer device.

优选地,上述电子装置是移动电话、个人数字助理(PDA)、寻呼机或类似的电子通讯装置。通过短消息服务(SMS)协议或者其它适当的通讯协议,包括语音消息传送,e-mail或其它方式,伪随机安全字符串可以被从计算机主机发送到上述电子装置。Preferably, the aforementioned electronic device is a mobile phone, personal digital assistant (PDA), pager or similar electronic communication device. The pseudo-random security string can be sent from the host computer to the electronic device via Short Message Service (SMS) protocol or other suitable communication protocols, including voice messaging, e-mail or otherwise.

为了使用本发明的系统和方法,客户首先以平常的方式被指定和分配一张信用卡或借记卡。卡上印制有对客户唯一的账号。所述客户向维护计算机主机的授权中心注册所述卡,并且注册卡号,用于客户电子装置的通讯地址(例如,客户移动电话或PDA号码,e-mail地址等等)和PIN。上述PIN可以由客户选择或由计算机主机指配给他或她,但是上述PIN不会泄露给第三方。上述PIN通常是十进制号码,常常是4位的长度,但还可以是其它的长度或者可以是字母数字串。上述客户账号,通讯地址和PIN被相互关联地存储在计算机主机中。一旦完成上述操作,计算机主机发送伪随机安全字符串到客户的电子装置,例如,利用SMS协议发送伪随机安全字符串到客户的移动电话。上述伪随机安全字符串可以是n位数字的随机产生的十进制号码或是字母数字串等。To use the system and method of the present invention, a customer is first designated and assigned a credit or debit card in the usual manner. The account number unique to the customer is printed on the card. The customer registers the card with the authorized center maintaining the computer host, and registers the card number, mailing address (eg, customer mobile phone or PDA number, e-mail address, etc.) and PIN for the customer's electronic device. The above-mentioned PIN may be selected by the customer or assigned to him or her by the computer host, but the above-mentioned PIN will not be disclosed to a third party. The above-mentioned PIN is usually a decimal number, usually 4 digits in length, but can be of other lengths or can be an alphanumeric string. The above-mentioned customer account number, mailing address and PIN are stored in the computer host in an interrelated manner. Once the above operations are completed, the host computer sends the pseudo-random security string to the customer's electronic device, for example, sends the pseudo-random security string to the customer's mobile phone using the SMS protocol. The aforementioned pseudo-random security character string may be a randomly generated decimal number or alphanumeric string of n digits.

本发明的系统和方法可被用于电子商务场所或较传统的购物场所。The systems and methods of the present invention can be used in e-commerce locations or more traditional shopping locations.

在电子商务场所,客户以通常的方式从商业机网站选择货物和/或服务。当到达网站上的付款网页时,客户输入或提供他或她的卡号(客户账号)并且确定付账总额。然后,客户付账总额与他或她的PIN一起输入到上述电子装置,它们通过预定的加密算法被与伪随机安全字符串混杂在一起,或者通过预定的加密算法被与从所述伪随机安全字符串提取的一次性编码混杂在一起,用以产生响应码。在具体的优选实施方案中,所述响应码是三位十进制号码,上述三位十进制号码与印制在公知的信用和借记卡背面的现有CVV2类型编码格式相同。然而,所述响应码可以是任意长度和非十进制或字母数字串,这依赖与所用的加密算法的本质。为了产生适当的响应码,存在许多种能够执行对三位输入混杂功能的适当算法,这对于本领域的技术人员来说是显而易见的,所以对那些算法的细节不作详细的关注。然而通过实施方案,标准公知的SHA-1加密哈西[FIPS PUB 180-1]算法可以用来产生160位的值,余数则可通过用上述160位的值除以1000来确定。In an electronic commerce location, a customer selects goods and/or services from a merchant website in the usual manner. When arriving at the payment page on the website, the customer enters or provides his or her card number (customer account number) and determines the total amount to be paid. The total amount of the customer's bill is then entered into the above-mentioned electronic device together with his or her PIN, which is mixed with a pseudo-random security character string by a predetermined encryption algorithm, or is mixed with a pseudo-random security character string from the pseudo-random security character by a predetermined encryption algorithm The one-time codes extracted from the string are mixed together to generate the response code. In a specific preferred embodiment, the response code is a three-digit decimal number, which is in the same format as the existing CVV2-type coding format printed on the back of known credit and debit cards. However, the response code may be of any length and non-decimal or alphanumeric string, depending on the nature of the encryption algorithm used. It will be apparent to those skilled in the art that there are many suitable algorithms capable of performing the hashing function on the three-bit input in order to generate the appropriate response code, so no detailed attention is paid to the details of those algorithms. By way of implementation, however, the standard well-known SHA-1 cryptographic hash [FIPS PUB 180-1] algorithm can be used to generate a 160-bit value, and the remainder can be determined by dividing the above 160-bit value by 1000.

当电子装置为移动电话时,所述的加密算法可被存储在电话的SIM(用户接口模块)卡中,或者可以存储在形成移动电话的一部分的存储装置中。优选地,在所述SIM卡内加密算法作为applet(小应用程序)运行,它将由电话接收的所述伪随机安全字符作为一个输入,将上述付账总金额作为第二输入,将上述PIN作为第三输入。所述第二和第三输入可以是以平常方式通过移动电话的键盘区手动地输入。显然,加密算法可以在任何适当的电子装置上(例如,PDA,寻呼机,个人计算机等)使用标准的存储和处理装置以相似的方式运行。When the electronic device is a mobile phone, said encryption algorithm may be stored in a SIM (Subscriber Interface Module) card of the phone, or may be stored in memory means forming part of the mobile phone. Preferably, the encryption algorithm is run as an applet in the SIM card, which takes the pseudo-random security character received by the phone as one input, the above-mentioned total amount of payment as a second input, and the above-mentioned PIN as a second input. Three inputs. The second and third input can be entered manually via the keypad of the mobile phone in the usual way. Obviously, the encryption algorithm can be run in a similar manner on any suitable electronic device (eg, PDA, pager, personal computer, etc.) using standard storage and processing means.

在上述响应码被上述算法计算出之后,响应码可被显示在电子装置的显示器上。客户可以在网站的适当的数据输入区域(它可以是当前适用于标准CVV2编码输入区域)输入响应码,接着,采取适当的操作以经由商业机操作的网络服务器按照普通的方式将客户账号、交易金额以及商业机的响应码传输给商业机。还可以提供诸如卡到期时间和客户地址的附加安全信息。After the above response code is calculated by the above algorithm, the response code can be displayed on the display of the electronic device. The customer may enter a response code in an appropriate data entry field of the website (which may be a standard CVV2 coded entry field currently applicable), and then take appropriate action to transfer the customer account number, transaction The amount and the response code of the merchant machine are transmitted to the merchant machine. Additional security information such as card expiration time and customer address may also be provided.

通过传递客户账号、交易金额、响应码以及其它任何安全信息到由卡的发行者操作的验证服务器,上述商业机能从卡的发行者那里以平常的方式获得用于交易的授权。所述验证服务器能够从客户账号中确定所处理的卡是否向构成本发明一部分的计算机主机进行过登记,接着联络计算机主机去传递客户账号、交易金额和响应码。The merchant can obtain authorization for the transaction from the card issuer in the usual way by passing the customer account number, transaction amount, response code, and any other secure information to an authentication server operated by the card issuer. The verification server is able to determine from the customer account number whether the card being processed is registered with the host computer forming part of the invention, and then contacts the host computer to deliver the customer account number, transaction amount and response code.

在接收到这些信息之后,上述计算机主机应用上述客户账号检索(retrieve)出最初发行给客户电子装置的上述伪随机安全码和客户PIN,这是因为它们两者都存储在上述计算机主机中。然后运行与上述电子装置所使用的相同的预定加密算法对上述伪随机安全串、交易金额和客户PIN进行操作以产生检验码对于计算机主机来说是一件简单的事情。接着,上述计算机主机对检验码与接收到的响应码进行比较以确认它们是否匹配,如果它们相匹配,则向卡发行者的验证服务器汇报交易被授权。卡发行者就用平常的方式将客户的卡记入借方,将商业机的账户记入贷方。After receiving this information, the host computer uses the customer account number to retrieve the pseudo-random security code and customer PIN originally issued to the customer electronic device since they are both stored in the host computer. Then it is a simple matter for the computer host to operate the same predetermined encryption algorithm used by the above-mentioned electronic device to operate on the above-mentioned pseudo-random security string, transaction amount and customer PIN to generate the verification code. Then, the above-mentioned computer mainframe compares the verification code with the received response code to confirm whether they match, and if they match, report to the card issuer's verification server that the transaction is authorized. The card issuer then debits the customer's card and credits the merchant's account in the usual manner.

如果所述检验码和响应码不匹配,则交易不会被授权,并且卡发行者的验证服务器随后可以拒绝交易。如果尝试对一个特别客户账号发起的交易没有完成授权程序的次数超过预定的数目(例如,三次),则客户的账号就会被计算机主机锁住,任选地,也可被卡发行者的验证服务器锁住,这是因为反复的授权失败代表着卡已经被盗并且正在被没有被授权的不知道客户PIN或伪随机安全字符串的人使用。只有在客户/持卡人与卡的发行者和/或验证中心进行进一步的联络之后,所述客户账号才会被解锁,这有可能会导致给客户以具有新账号的新卡。If the verification code and response code do not match, the transaction will not be authorized, and the card issuer's authentication server can then decline the transaction. If attempts to initiate a transaction on a particular customer account do not complete the authorization process more than a predetermined number (e.g., three times), the customer's account will be locked by the host computer and, optionally, verified by the card issuer. The server locks because repeated authorization failures indicate that the card has been stolen and is being used by an unauthorized person who does not know the customer PIN or pseudo-random security string. Only after further contact by the customer/cardholder with the card's issuer and/or verification center will the customer account be unlocked, possibly resulting in the customer being given a new card with a new account number.

如果交易被计算机主机授权,所述计算机主机产生新的伪随机安全字符串并将它发送给客户的如前述的电子装置。接着客户可与相同或不同的商业机以同样的方式进行进一步的交易。然而,由于上述伪随机安全字符串对于每次交易来说是不同的,因此欺诈者和黑客很难使用任何截获的通讯信息来闯入系统。所述新的伪随机安全字符串作为包括进一步的信息(例如,最近交易的明细、账户结余、剩余的信贷限额等等)的消息的一部分被传送。If the transaction is authorized by the computer host, said computer host generates a new pseudo-random security string and sends it to the customer's electronic device as previously described. The customer can then conduct further transactions in the same manner with the same or a different business machine. However, because the aforementioned pseudo-random security string is different for each transaction, it is very difficult for fraudsters and hackers to use any intercepted communications to break into the system. The new pseudo-random security string is transmitted as part of a message including further information (eg, details of recent transactions, account balances, remaining credit limit, etc.).

本发明运行的方式与在传统的交易场所使用的方式相似,例如,在客户在商店和店铺进行购物或通过电话进行交易的情况下。在这些场所,不是通过网站与商业机进行联系,而是通过面对面(face-to-face)或电话的方式进行交易。当客户想要购物时,他或她向商业机请求交易总额,在将交易总额与PIN一起输入电子装置后,将上述计算的响应码传送到上述商业机。通过将信用卡或借记卡提交给商业机以使其通过电子读卡器(例如EPOS或EFTPOS机器),客户还把客户账号和可选择的安全细节(例如,卡的到期日期)传递给商业机。上述计算的响应码可被口头地提交给所述商业机,或者从所述电子装置电子地直接传送给例如EPOS或EFTPOS机器。然后商业机使用EPOS或EFTPOS机器等将上述客户账号、交易金额和响应码以通常的方式传递到由卡的发行者操作的验证服务器,并且进行如前所述的验证和授权的处理过程。The present invention operates in a manner similar to that used in traditional transaction venues, for example, where customers make purchases at stores and stores or conduct transactions over the phone. In these places, instead of contacting business machines through websites, transactions are conducted face-to-face or by telephone. When a customer wants to shop, he or she requests the transaction amount from the business machine, and after inputting the transaction amount together with the PIN into the electronic device, transmits the above-mentioned calculated response code to the above-mentioned business machine. By presenting the credit or debit card to the merchant for it to pass through an electronic card reader (such as an EPOS or EFTPOS machine), the customer also passes the customer account number and optional security details (such as the card's expiration date) to the merchant machine. The above-computed response code may be submitted orally to the merchant machine, or electronically transmitted directly from the electronic device to, for example, an EPOS or EFTPOS machine. Then the business machine uses EPOS or EFTPOS machine etc. to transmit the above-mentioned customer account number, transaction amount and response code to the verification server operated by the issuer of the card in a usual way, and carry out the processing process of verification and authorization as described above.

即便是在商业机没有EPOS或EFTPOS终端的地方,仍然可以便利地应用本发明的系统和方法。公知的是,通过向验证中心打电话和口头提交客户账号和交易金额的细节,也可使商业机完成对卡的授权。因此,商业机很容易如平常一样去完成这些(授权)并提供由客户提交的响应码。授权和验证的处理过程如前所述。Even where the business machines do not have EPOS or EFTPOS terminals, the system and method of the present invention can still be conveniently applied. It is also known to have the merchant authorize the card by telephone and orally submitting details of the customer's account number and transaction amount to the verification center. Therefore, it is easy for the merchant to do this (authorization) as usual and provide a response code submitted by the customer. Authorization and authentication are handled as previously described.

为了列举本发明的一些有益效果,以下将参照现有的卡验证协议对一些安全问题进行探讨。In order to enumerate some beneficial effects of the present invention, some security issues will be discussed below with reference to existing card verification protocols.

卡的偷撇(skimming)card skimming

在安全性方面,这种攻击包括罪犯获得信用卡号(客户账号)(也许通过攻击商业机的网站或者拾取被丢弃的含有卡号的交易收据)并且企图进行欺诈交易。在本发明中,由于罪犯不得不推测有效的响应码(例如,成功地推测三位十进制码的机会是1∶1000),所以这种攻击的成功可能性较小。在企图进行交易的失败次数达到预定的次数(例如,三次)后,计算机主机将卡锁住(block)(同时可能通过SMS消息等通知持卡人)并通知卡的发行者。卡的发行者与持卡人进行会话以对卡解锁。In terms of security, such an attack involves a criminal obtaining a credit card number (customer account number) (perhaps by hacking a merchant's website or picking up a discarded transaction receipt containing the card number) and attempting to make a fraudulent transaction. In the present invention, such an attack is less likely to succeed because the criminal has to guess a valid response code (eg, the chance of successfully guessing a three-digit decimal code is 1:1000). After a predetermined number of failed attempts to conduct a transaction (eg, three), the host computer blocks the card (possibly notifying the cardholder via SMS message, etc.) and notifies the issuer of the card. The issuer of the card engages in a session with the cardholder to unlock the card.

中间人(Man-in-the-middle)Man-in-the-middle

这种攻击包括罪犯获得信用卡号和有效的响应码。例如,罪犯可能是饭店的侍者(或暗中进行破坏的网站)并且获得对客户的账号和响应码的访问。犯罪的侍者能够以客户授权的同样金额进行欺诈交易,只是不能够完成真实的交易。这意味者犯罪的侍者能够以与餐馆餐费总额恰好相等的金额进行一次购物交易,但是,餐馆交易会失败。这种欺诈很容易被检测到(餐馆老板很快会发现钱少了),因此这是不太可能的情况。This attack involves criminals obtaining credit card numbers and valid response codes. For example, a criminal may be a waiter at a restaurant (or a website that is undercover) and gain access to a customer's account number and response codes. A criminal waiter can make fraudulent transactions for the same amount authorized by the customer, just not complete the real transaction. This means that the criminal waiter can make a shopping transaction for an amount exactly equal to the total amount of the restaurant's meal bill, however, the restaurant transaction will fail. This kind of fraud is easy to detect (restaurateurs will quickly find out that they are out of money), so this is an unlikely scenario.

肩窥(Shoulder-surfing)Shoulder-surfing

这种攻击包括罪犯从持卡人的肩膀上面偷看客户键入到电子装置上的关键码,从而获得客户的PIN。为了进行成功的欺诈交易,罪犯需要信用卡号,还需要拥有持卡人的电子装置(例如,移动电话)。这是一种有形的犯罪:罪犯需要偷看PIN然后盗取信用卡和电子装置。通过提高PIN的安全性和/或通过建议持卡人采取相关的安全措施(例如,持卡人决不要把卡和电子装置放在一起,在输入PIN时不要叫任何其它人看到),这个问题就可以得到克服。The attack involves the criminal peeking over the cardholder's shoulder at the key code the customer is typing into the electronic device to gain access to the customer's PIN. In order to carry out a successful fraudulent transaction, the criminal needs the credit card number and also needs to be in possession of the cardholder's electronic device (eg, a mobile phone). It's a tangible crime: Criminals need to peek at the PIN to steal credit cards and electronic devices. By increasing the security of the PIN and/or by advising cardholders to take relevant security measures (e.g., cardholders should never store their cards with electronic devices and do not allow anyone else to see when entering their PIN), this problem can be overcome.

响应码计算Response code calculation

这种攻击包括罪犯获得信用卡号并在之后计算有效的响应码。为了计算响应码,罪犯需要知道PIN和当前的伪随机安全字符串。推断PIN的方法依靠获得大量的响应码,推断也许是通过持卡人频繁访问的暗中进行破坏的网站。然而,推断PIN需要安全字符串的知识(字符串实际上是包括一块在可按虚线撕下纸本的随机码的一次性密乱数本,对于每一消息纸被撕下,这是整个安全领域公知的加密技术)。为了获得安全字符串,罪犯需要在网络GSM攻击加密,需要直接地攻击计算机主机,或攻击计算机主机和与移动式网络操作者关联的SMS消息中心(SMC)之间的链路。为了成功地实现对响应码的计算攻击,罪犯需要在截取交易(面对面或电子商务的情况下)的同时能够攻击安全基础架构。因此,这种攻击极端的不太可能成功或不值得花时间去作。This attack involves the criminal obtaining a credit card number and then calculating a valid response code. In order to calculate the response code, the criminal needs to know the PIN and the current pseudo-random security string. The method of inferring the PIN relies on obtaining a large number of response codes, inferring perhaps through a surreptitious website frequently visited by the cardholder. However, deriving the PIN requires knowledge of the security string (the string is actually a one-time pad consisting of a random number on a dotted tear-off paper, which is the entire security field for each message paper torn off. known encryption techniques). In order to obtain the security string, the criminal needs to attack the encryption in the network GSM, needs to attack the host computer directly, or attack the link between the host computer and the SMS Message Center (SMC) associated with the mobile network operator. To successfully implement computational attacks on response codes, criminals need to be able to attack the security infrastructure while intercepting transactions (in the case of face-to-face or e-commerce). Therefore, such an attack is extremely unlikely to be successful or worth the time.

本发明的实施方案提供了一种用于检验信用卡和借记卡交易的安全系统和方法,具有如下所述的部分或全部益处:Embodiments of the present invention provide a secure system and method for verifying credit and debit card transactions with some or all of the benefits described below:

●新的商业机和持卡人的基础架构不是必需的。假设商业机正在运行CVV2协议,它们甚至不需要知道客户卡是否向本发明上下文中定义的计算机主机进行登记。由于不需要智能卡,因此卡发行的成本低。• No new merchant and cardholder infrastructure is required. Assuming the merchants are running the CVV2 protocol, they do not even need to know whether the customer card is registered with the computer host as defined in the context of the present invention. Since no smart card is required, the cost of card issuance is low.

●交易金额是保密的。这意味者商业机不能运行没有授权的交易或增加交易的潜在费用。●The transaction amount is confidential. This means that the merchant cannot perform unauthorized transactions or increase the potential cost of transactions.

●通过SMS消息等自动地告知持卡人每一笔交易。● Automatically inform cardholders of each transaction via SMS messages etc.

●持卡人需要移动电话或等同的电子装置。然而,不需要特殊的移动电话或装置。持卡人需要的是移动电话中的用包括预定加密算法的applets进行程序编制的SIM卡。一些移动电话用户能够利用“无线(OTA)”形式将程序适当的applets安装编制入现有的SIM。适于本发明使用的applets非常简单,因此在SIM卡不需要太多的空间。● The cardholder needs a mobile phone or equivalent electronic device. However, no special mobile phone or device is required. What the cardholder needs is a SIM card in a mobile phone programmed with applets including predetermined encryption algorithms. Some mobile phone users are able to program the installation of appropriate applets into existing SIMs using an "over-the-air (OTA)" format. The applets suitable for use with the present invention are very simple and therefore do not require much space on the SIM card.

●在销售点,不需要移动电话覆盖。持卡人需要的是能够接收交易之间的SMS消息或类似物(因此,必须在交易之间被覆盖)。● At the point of sale, no mobile phone coverage is required. What the cardholder needs is to be able to receive SMS messages or similar between transactions (and thus must be covered between transactions).

●移动电话中的SIM卡里不需要存储持卡人专用的PIN、关键码或证书。为持卡人提供必需的装置不需要对SIM进行编程(不同于安装在SIM里的前述applets)。因此重新发行卡的处理过程(例如,由于丢失或拒绝服务攻击)不需要对SIM卡进行改变。● There is no need to store a cardholder-specific PIN, key code or certificate in the SIM card in the mobile phone. Providing the cardholder with the necessary means does not require programming of the SIM (unlike the aforementioned applets installed in the SIM). Thus the process of reissuing the card (eg due to loss or denial of service attack) does not require changes to the SIM card.

如以上所讨论的一样,本发明的一些实施方案需要新的伪随机安全字符串被用于每次交易(实际上,安全字符串是如前所定义的一次性密乱数本。伪随机安全字符串可通过SMS消息等在每次交易后被传送。然而,在一些情况下,为了进行下一交易(例如,持卡人在没有被移动电话覆盖的商店里仍然要进行多于一次的交易),持卡人不得不等待新的SMS消息等,这是不方便的。为了处理这种情况,本发明的实施方案可以适于允许多交易。As discussed above, some embodiments of the present invention require that a new pseudo-random security string be used for each transaction (actually, the security string is a one-time pad as previously defined. The pseudo-random security character The string can be sent after each transaction by SMS message etc. However, in some cases, in order to carry out the next transaction (for example, the cardholder still has to carry out more than one transaction in a store not covered by the mobile phone) , it is inconvenient for the cardholder to have to wait for a new SMS message, etc. To handle this situation, embodiments of the invention may be adapted to allow multiple transactions.

原理是简单的:当客户通过向计算机主机进行注册以激活他或他的卡时,计算机主机向电子装置发送单一的包括一组m个伪随机安全字符串(其中,m是整数,例如12)的信息(例如,SMS消息)。Applet一个接一个地用掉(consumes)每次被处理的交易的字符串。为了通知电子装置里的applet移向下一个安全字符串,持卡人可能需要选择“确认(confirm)”菜单项(这与本发明在前述的实施方案里所描述的相反,在前述的实施方案里确认是通过接收具有单个安全字符串的新SMS消息来隐含地被选择的)。The principle is simple: when a customer activates his or his card by registering with the computer host, the computer host sends a single set of m pseudo-random security strings to the electronic device (where m is an integer, such as 12) information (for example, SMS messages). Applet consumes (consumes) strings of each transaction processed one by one. In order to notify the applet in the electronic device to move to the next security string, the cardholder may need to select the "confirm" menu item (this is the opposite of what the present invention was described in the previous embodiment, where Confirmation is implicitly selected by receiving a new SMS message with a single security string).

当预定的第n次交易(n小于最初被发送给所述电子装置的安全字符串m的总数,例如,n为6)被计算机主机授权时,新的进一步包含一组安全字符串的消息由计算机主机发送到电子装置。这种方法允许持卡人不需要接收任何来自计算机主机的发送信息而进行m次购买交易,这是有用的,例如在没有移动电话覆盖等时。每次交易完成之后,一个简单的消息由计算机主机发送到持卡人的电子装置作为确认和小清单(mini-statement)(标有商业机,交易金额,即期余额和剩余账款)。When a predetermined nth transaction (n is less than the total number of security strings m originally sent to the electronic device, for example, n is 6) is authorized by the computer host, a new message further comprising a set of security strings is issued by The computer host sends to the electronic device. This method allows the cardholder to carry out m purchase transactions without receiving any transmissions from the host computer, which is useful, for example, when there is no mobile phone coverage or the like. After each transaction is completed, a simple message is sent by the host computer to the cardholder's electronic device as a confirmation and mini-statement (marking the merchant, transaction amount, current balance and remaining balance).

这种方法一种可能性是,运行在电子装置和计算机主机的applet在第一商业机没能在购买点完成处理交易时,可以停止处理步骤,因此防止后来的商业机处理后续的交易。当然,由于交易在随后无法完成(如,用户中止不正确的响应码),第一商业机没有动机去做这些。然而,这种情况可以通过在计算机主机对卡复位而得到处理(也许是在持卡人或商业机给授权中心打电话之后)。计算机主机则能够发送新的一组安全字符串去重新启动处理。One possibility of this approach is that the applet running on the electronic device and the computer mainframe can stop the processing step when the first merchant machine fails to complete processing the transaction at the point of purchase, thus preventing subsequent merchant machines from processing subsequent transactions. Of course, the first business opportunity has no incentive to do this since the transaction cannot be completed later (eg, user aborts with an incorrect response code). However, this situation can be handled by resetting the card at the host computer (perhaps after the cardholder or the merchant calls the authorization center). The host computer can then send a new set of secure strings to restart processing.

当(或如果)第一商业机结束处理交易时,计算机主机非常有可能能够确定是接收还是拒绝交易。当复位被触发时,存在有n和m之间的没有完成的安全字符串(也就是说,还没有被用来使交易生效的字符串)。计算机主机具有那些安全字符串的记录,并且来自第一商业机的交易能够根据最早未完成的安全字符串运行以判断是否存在匹配。匹配失败存在两种可能:(i)交易失败(是欺诈性的,或持卡人出错误,或商业机出错误)或(ii)多于一次的交易没有被及时地处理。在情形(ii)时,计算机主机能够试图以不同的安全字符串运行交易。当然,在所述商业机没有能够跟随正确的处理步骤运行的前提下,所述交易能够被完全拒绝。When (or if) the first business machine finishes processing the transaction, the computer host will most likely be able to determine whether to accept or decline the transaction. When the reset is triggered, there are between n and m outstanding security strings (that is, strings that have not yet been used to validate the transaction). The computer host has a record of those security strings, and a transaction from the first business machine can be run against the oldest outstanding security string to see if there is a match. There are two possibilities for matching failures: (i) the transaction failed (was fraudulent, or the cardholder made an error, or the merchant made an error) or (ii) more than one transaction was not processed in a timely manner. In case (ii), the host computer can try to run the transaction with a different security string. Of course, the transaction can be rejected outright provided the business machine fails to follow the correct process steps.

应用移动电话或类似物作为EPOS或EFTPOS终端Application of a mobile phone or similar as an EPOS or EFTPOS terminal

采用本发明改变了在交易中被处理的信息的安全状态(例如,知道卡号和响应码不足以进行欺诈性的交易)。这意味者可以使用为计算机主机提供所需交易信息(卡号或客户账号,响应码,交易金额等)的可选方法。Employing the present invention changes the security status of the information being processed in a transaction (eg, knowing the card number and response code is not sufficient to conduct a fraudulent transaction). This means that alternative methods of providing the host computer with the required transaction information (card or customer account number, response code, transaction amount, etc.) can be used.

移动电话或PDA等提供了这样一种极好方式,即商业机可以访问正在进行处理的系统。交易能够被以SMS消息或类似物(使用预定的格式)的格式描述并且发送到由适当的获得网络(acquiring network)建立的电话号码(装置)。接收消息的获得网络提取交易信息(从移动电话等源电话号码推断所述商业机身份)并且以正常的方式(检测信贷限额,访问计算机主机等等)处理所述交易。交易的接收或拒绝通过SMS消息或类似物发送回到所述商业机和原始的移动电话等。Mobile phones or PDAs etc. provide an excellent way for a business machine to access the system in progress. Transactions can be described in the format of SMS messages or similar (using a predetermined format) and sent to phone numbers (devices) established by the appropriate acquiring network. The acquisition network receiving the message extracts the transaction information (inferring the merchant identity from the source phone number such as a mobile phone) and processes the transaction in the normal way (checking credit limit, accessing computer host, etc.). Acceptance or rejection of the transaction is sent back to the business machine and the original mobile phone or the like via an SMS message or the like.

这种方法提供了使商业机成为卡处理网络的一部分的低成本方法,并且对于具有少量投资资本的小商业交易尤其有用。它允许在获得固定线路基础架构困难的区域内(例如在出租车内)对卡进行处理。This approach provides a low cost method of making the merchant a part of the card processing network and is especially useful for small business transactions with little investment capital. It allows card processing in areas where access to fixed line infrastructure is difficult, such as in taxis.

为了更好地理解本发明和说明本发明是如何被实施的,以下将参照附图以举例的方式进行说明,其中:In order to better understand the present invention and illustrate how the present invention is implemented, the following will be described by way of example with reference to the accompanying drawings, wherein:

图1显示了本发明实施方案的基础架构的示意图。Figure 1 shows a schematic diagram of the basic architecture of an embodiment of the present invention.

在图1中,显示了计算机主机10,其作为授权服务器。卡发行者将卡发行给客户时,客户必须首先从所述计算机主机10中进行注册,注册的细节信息有客户的账号(卡号)、PIN、移动电话号码等以及其它任何有用的信息(如客户名称及地址)。一旦注册完毕,计算机主机10产生至少一个伪随机安全字符串并将其通过步骤1发送到由客户操作的移动通讯装置11,所述装置11可以是移动电话,PDA,寻呼机等。发送1可以通过SMS消息,e-mail等。所述计算机主机10将位于其存储器中的上述至少一个伪随机安全字符串与客户账号及PIN关联起来。In Fig. 1, a computer host 10 is shown, acting as an authorization server. When the card issuer issues the card to the client, the client must at first register from the host computer 10, and the registered details include the client's account number (card number), PIN, mobile phone number, etc. name and address). Once registered, the host computer 10 generates at least one pseudo-random security string and sends it through step 1 to the mobile communication device 11 operated by the client, which may be a mobile phone, PDA, pager, etc. Sending 1 can be via SMS message, e-mail, etc. The host computer 10 associates the above-mentioned at least one pseudo-random security string located in its memory with the customer account number and PIN.

当客户希望与商业机13进行交易时,客户经由键盘或类似物将交易金额和PIN输入到移动通讯装置11。在SIM卡或类似物(其设于装置11之内,程序编制有单向加密哈西算法12)内运行的applet在步骤2中提取用户输入的交易金额,PIN和上述伪随机安全字符串,并且将这些信息混杂(hash)以产生3位数字的响应码,上述响应码经由步骤3被传给商业机13。上述响应码可以面对面或电话交易的方式被口头给予商业机13,或者当在进行电子商务交易时上述响应码经由商业机网站给予商业机13。When a customer wishes to conduct a transaction with the merchant machine 13, the customer inputs the transaction amount and PIN into the mobile communication device 11 via a keyboard or the like. The applet running inside the SIM card or similar (which is located in the device 11 and programmed with a one-way cryptographic hash algorithm 12) extracts in step 2 the transaction amount entered by the user, the PIN and the aforementioned pseudo-random security string, And the information is mixed (hash) to generate a 3-digit response code, and the above-mentioned response code is transmitted to the business machine 13 via step 3. The above-mentioned response code may be given to the business machine 13 orally in a face-to-face or telephone transaction, or the above-mentioned response code may be given to the business machine 13 via the business machine website when conducting an electronic commerce transaction.

同时,商业机13经由在EPOS或EFTPOS终端扫描卡或经由其它适当的方式接收客户账号和交易金额,之后将上述响应码与这些信息一起以公知的方式经由步骤4传递给卡需方网络服务器(CANS-Card Acquirer Network Server)14。商业机13还经由步骤4传递商业机身份信息到CANS 14,因此使CANS 14能够将交易与商业机13关联起来,以及与客户关联起来(经由客户账号)。Simultaneously, the business machine 13 receives the customer account number and the transaction amount by scanning the card at the EPOS or EFTPOS terminal or other appropriate means, and then transmits the above-mentioned response code together with these information to the card buyer's network server via step 4 in a known manner ( CANS-Card Acquirer Network Server) 14. The merchant 13 also passes the merchant identity information to CANS 14 via step 4, thus enabling CANS 14 to associate the transaction with the merchant 13, and with the customer (via the customer account number).

CANS 14接着以公知的方式经由步骤5传递客户账号和交易金额和响应码到计算机主机10。接着,计算机主机10使用从CANS 14接收到的客户账号从存储器中检索出客户PIN和伪随机安全字符串(最初在步骤1中传递给移动通讯装置11),并且除了算法12在计算机主机10里运行的时间之外,将伪随机安全字符串,客户PIN和交易金额输入到单向加密哈西算法12(如同在移动通讯装置11的applet中运行的算法一样)。由于运行在计算机主机10中的算法12将对与在移动通讯装置11的applet中运行的算法12所使用的相同的输入进行操作,所述算法输出3位数字的检验码,所述3位数字检验码在交易有效时与被给予的响应码相匹配。因此,所述被给予的响应码和所计算出的检验码被计算机主机10发现匹配时,则交易被授权,并且授权信号经由步骤6从计算机主机发送到CANS 14。CANS 14 then transmits customer account number and transaction amount and response code to host computer 10 via step 5 in a known manner. Next, host computer 10 uses the customer account number received from CANS 14 to retrieve the customer PIN and pseudo-random security string (initially passed to mobile communication device 11 in step 1) from memory, and in addition to algorithm 12 in host computer 10 Outside of running time, the pseudo-random security string, customer PIN and transaction amount are entered into the one-way cryptographic hash algorithm 12 (like the algorithm running in the applet of the mobile communication device 11). Since the algorithm 12 running in the computer host 10 will operate on the same input as the algorithm 12 running in the applet of the mobile communication device 11, the algorithm outputs a check code of 3 digits, the 3 digits The verification code matches the response code given when the transaction was valid. Therefore, when the given response code and the calculated verification code are found to match by the host computer 10, the transaction is authorized, and an authorization signal is sent from the host computer to CANS 14 via step 6.

作为一种选择,如果所述被给予的响应码和所计算出的检验码不匹配时,计算机主机10将拒绝交易,并且拒绝信号经由步骤6被发送到CANS 14。As an option, if the given response code does not match the calculated verification code, the host computer 10 will reject the transaction, and a rejection signal is sent to the CANS 14 via step 6.

如果CANS 14从计算机主机10接收到授权信号,客户的卡账户以平常的方式与交易金额一起记入借方,被记入借方的交易金额与商业机13的CANS 14的身份(identity)相关联。此外,CANS 14将商业机账号以平常的方式与交易金额一起记入贷方。CANS 14还经由步骤7将授权信号传递给商业机13,商业机则经由步骤8通知客户所述交易已经被授权。If the CANS 14 receives an authorization signal from the host computer 10, the customer's card account is debited in the usual way along with the transaction amount, which is associated with the CANS 14 identity of the merchant 13. In addition, CANS 14 credits the business machine account number with the transaction amount in the usual way. CANS 14 also passes an authorization signal to the business machine 13 via step 7, and the business machine informs the customer via step 8 that the transaction has been authorized.

此时,一旦计算机主机10授权交易,它将新的伪随机安全字符串与任选的用于确认交易授权、交易金额和卡账目余额的信息一起经由步骤1发送到客户的移动通讯装置11。At this time, once the computer mainframe 10 authorizes the transaction, it sends a new pseudo-random security string to the customer's mobile communication device 11 via step 1 together with optional information for confirming the transaction authorization, transaction amount and card account balance.

如果交易没有被授权,因为计算机主机10发现所述被给予的响应码和所计算出的检验码不匹配,上述CANS 14经由步骤13将拒绝信号传递到所述商业机13,同时卡账户不会被记入借方或商业机账号不会被记入贷方。在接收到拒绝信号后,商业机13能够拒绝交易,或请求来自客户的进一步响应码。如果客户连续提供的三次响应码没有与计算机主机10中的所计算出的检验码相匹配,计算机主机10能够将客户账户锁住(block)并且将结果发送到CANS 14,这样,在客户与操作计算机主机的授权中心取得联系之前,防止卡被进一步使用。有可能会出现这样情况,即客户的卡被盗取并且正在被第三方在不知道PIN和伪随机字符串的情形下欺诈地使用,这样就有可能需要发行新的卡。If the transaction is not authorized because the host computer 10 finds that the given response code does not match the calculated verification code, the above-mentioned CANS 14 passes a rejection signal to the merchant 13 via step 13, and the card account will not Debited or business machine account numbers will not be credited. After receiving the rejection signal, the merchant machine 13 can decline the transaction, or request a further response code from the customer. If the three consecutive response codes provided by the customer do not match the calculated verification code in the host computer 10, the host computer 10 can block the customer's account and send the result to the CANS 14, so that between the customer and the operator Prevent further use of the card until the host computer's authorization center is contacted. It is possible that a customer's card has been stolen and is being used fraudulently by a third party without knowledge of the PIN and pseudo-random string, so that a new card may need to be issued.

为了更进一步描述本发明的有益效果,现在描述典型的情景。In order to further describe the beneficial effects of the present invention, a typical scenario is now described.

艾丽丝决定需要获得本发明中使用的卡。她之所以如此是由于两个原因。首先,她要确保她能够在互联网上安全购物(她曾读了黑客是怎样轻而易举地闯入网站和盗取信用卡号,姓名,地址,电话号码等等)。第二,她需要卡但没有其它人能给她卡:艾丽丝15岁,年龄太小,所以不能获得信用卡。但是,因为经由本发明保护的卡能够防止商业机13和持卡人相互彼此的不正确操作,几家银行准备给青少年发行预付费的保护卡。Alice decides that she needs to obtain the card used in the present invention. She is so for two reasons. First, she wants to make sure she can shop safely on the Internet (she's read how easily hackers can break into websites and steal credit card numbers, names, addresses, phone numbers, and more). Second, she needs the card and no one else can give her one: Alice is 15, too young to get a credit card. However, several banks are going to issue prepaid protected cards to teenagers because the cards protected by the present invention can prevent the merchant 13 and the cardholder from mutually incorrect operations.

当在学校的时候,艾丽丝访问她的银行网站(应用她的互联网银行账户)并请求发卡,她还告诉银行她的移动电话号码(和她的移动操作者是谁)并选择PIN。她在选择项上划钩以使得在她的卡上有特殊的图片,接着从她的个人计算机上传数字照片(由于以后不会在复写纸上读她的卡,所以她的卡不是凸印的)。While at school, Alice accesses her bank's website (using her internet bank account) and requests a card, she also tells the bank her mobile phone number (and who her mobile operator is) and selects a PIN. She ticks the option to have a special picture on her card, then uploads a digital photo from her PC (her card is not embossed since her card will not be read on carbon paper later) .

银行开始处理申请卡的程序,银行检查所述移动操作者是否使用了本发明采用的适当applet程序编制的SIM。接着,银行为艾丽丝制造一张卡,并将卡号、艾丽丝的PIN以及她的移动电话号码传递给由独立授权中心操作的计算机主机10(计算机主机10不需要任何其它信息)。The bank starts the process of applying for a card, and the bank checks whether the mobile operator uses a SIM programmed with the appropriate applet used by the present invention. The bank then creates a card for Alice and passes the card number, Alice's PIN and her mobile phone number to the host computer 10 operated by an independent authorization center (the host computer 10 does not require any other information).

几天后,艾丽丝的卡被邮寄到。艾丽丝访问她的互联网银行账户通知银行卡已经收到了。艾丽丝将150英镑转账到卡内。几秒中之后,她的电话11上收到(步骤1)通知她的卡可以使用了的文本消息(所述消息还含有12个安全字符串,但是,她不必知道这些)。A few days later, Alice's card arrived in the mail. Alice accesses her internet bank account to notify that the card has been received. Alice transfers £150 to the card. A few seconds later, a text message is received (step 1) on her phone 11 informing her that her card is ready to use (the message also contains 12 security strings, but she doesn't have to know these).

艾丽丝在网上购物,她希望给她的母亲购买生日礼物。她访问出售园林装置的网站13,并找到了理想礼物:镀金喷水壶。包括邮寄费用在内的费用是50英镑。她转到“付账”网页取出她的卡付账。上述网站询问她的卡上的最后三位数字。在她的卡上,最后的三位数字被标记为“***”。她往近处一看,发现在卡上包括有“使用响应码为***”的词句,她记得在与卡一起发送给她的信息传单上有这些信息。她拿出她的移动电话11,从菜单里选择“卡付费”(这会激活applet),输入(步骤2)她的PIN,按下“OK”键。接着她键入(步骤2)交易金额数50并且按下“OK”。在电话11的SIM卡中运行的上述applet将算法12应用到PIN、交易金额及安全字符串(在步骤2中被给予),以产生3位数字响应码,电话11就显示“响应码:132”,她将“132”输入到上述网站13的请求3位数字的输入单元中。上述网站13接着显示“处理定单....”。Alice is shopping online and wants to buy her mother a birthday present. She visits website 13, which sells garden gear, and finds the ideal gift: a gold-plated watering can. The cost including postage is £50. She goes to the "Pay Bills" web page, takes out her card and pays the bill. The aforementioned website asked for the last three digits on her card. On her card, the last three digits are marked " *** ". She looked closer and saw that the card included the words "use response code *** " which she remembered was on the information leaflet sent to her with the card. She takes out her mobile phone 11, selects "pay by card" from the menu (this activates the applet), enters (step 2) her PIN, and presses the "OK" key. She then enters (step 2) the transaction amount number 50 and presses "OK". The above applet running in the SIM card of the phone 11 applies the algorithm 12 to the PIN, transaction amount and security string (given in step 2) to generate a 3-digit response code, the phone 11 displays "Response code: 132 ", she enters "132" into the input unit requesting 3 digits of the above-mentioned website 13. The aforementioned website 13 then displays "Processing order....".

上述网站的商业机服务器提交交易明细(卡号,金额,艾丽丝的地址,和三位数字编码,它看来就是CVV2编码)到卡处理计算机(网站商业机利用服务公司来处理卡交易)。计算机然后查看卡并与适当的卡需方网络服务器(CANS)14联络(步骤4)并向CANS提交同样的交易明细。The above-mentioned website's merchant server submits the transaction details (card number, amount, Alice's address, and a three-digit code, which appears to be the CVV2 code) to the card processing computer (the website's merchant uses the service company to process the card transaction). The computer then looks at the card and contacts the appropriate Card Acquirer Network Server (CANS) 14 (step 4) and submits the same transaction details to the CANS.

上述CANS14检查卡里(是否)有足够的钱去付账。该检查通过了(卡的账户有150英镑,交易金额是50英镑)。CANS 14接着用卡号、金额以及三位数字响应码向计算机主机10呼叫(步骤5)。计算机主机10使用卡号查阅其发给艾丽丝的移动电话11的艾丽丝的PIN和安全字符串。计算机主机10运行与艾丽丝的移动电话11的SIM卡里运行的算法一样的加密哈西算法12(使用安全字符串和PIN,其查阅由CANS 14提交的贷方的交易金额)。计算机主机10计算出与艾丽丝从她的移动电话读取的响应码132相应的检验码。计算出的检验码与由CANS 14给与计算机主机10的响应码匹配,因此,交易被认为是有效和经授权的。The above CANS14 checks that there is (whether) enough money in the card to pay the bill. The check passes (card's account has £150, transaction amount is £50). CANS 14 calls (step 5) to host computer 10 with card number, amount and three digit response codes then. The host computer 10 uses the card number to look up Alice's PIN and security string issued to Alice's mobile phone 11. The host computer 10 runs the same cryptographic hash algorithm 12 (using a secure string and PIN that looks up the transaction amount submitted by the lender by CANS 14) as is running in the SIM card of Alice's mobile phone 11. The host computer 10 calculates a check code corresponding to the response code 132 that Alice reads from her mobile phone. The calculated verification code matches the response code given by the CANS 14 to the host computer 10, and therefore the transaction is considered valid and authorized.

计算机主机10通知(步骤6)CANS 14安全检测通过并建立新的安全字符串。CANS 14通知计算机主机10商业机13的身份和她的卡上的即期余额。计算机主机10得到这些信息并且将其随同新的安全字符串一起以文本消息的形式发送给艾丽丝的移动电话11(步骤1),CANS 14通知卡处理计算机交易已经结清。上述卡处理计算机将这些信息通知给网络商业机服务器13。网络商业机服务器13通知艾丽丝付款已经被接受。几秒钟后,艾丽丝在其移动电话上收到来自计算机主机10的文本消息(步骤1)。文本消息是“目前开支(PresentsDirect)50英镑,结余100英镑”。Host computer 10 notifies (step 6) that CANS 14 safety detection passes and establishes new safe character string. CANS 14 notifies host computer 10 of the identity of merchant 13 and the current balance on her card. The host computer 10 gets this information and sends it to Alice's mobile phone 11 in a text message along with the new security string (step 1), CANS 14 notifies the card processing computer that the transaction has been settled. The above-mentioned card processing computer notifies the network business machine server 13 of these information. The web merchant server 13 notifies Alice that the payment has been accepted. A few seconds later, Alice receives a text message from the computer host 10 on her mobile phone (step 1). The text message is "Currently spending (PresentsDirect) £50 with a balance of £100".

艾丽丝来到城镇进行更多的购物。在她喜欢的书店,她发现不能够用移动电话11与她的朋友进行呼叫,因为没有信号(她想,真是奇怪,因为在商店的外面有信号,但她不知道商店是在加强的混凝土里用钢筋框架框住并用金属外包,因此阻断了移动电话的信号)。她找到自己非常喜欢的书想要付账。在收款处,办事员告诉她总金额是20.55英镑。她将她的卡交给办事员,接着拿出她的手机11。她从菜单里选择“卡付费”(这会激活applet),并输入(步骤2)她的PIN,按下“OK”键。接着她键入(步骤2)交易金额数20.55并且按下“OK”。上述applet取出最初给予的12个安全字符串中的一个作为第三输入,并且经由算法12计算响应码。上述电话11显示“响应码:451”。Alice comes to town for more shopping. At her favorite bookstore, she found that she couldn't use her mobile phone 11 to call her friends because there was no signal (strange, she thought, because there was signal outside the store, but she didn't know the store was in reinforced concrete Framed with a steel frame and clad in metal, thus blocking mobile phone signals). She finds a book she really likes and wants to pay the bill. At the cashier, the clerk told her the total amount was £20.55. She hands over her card to the clerk and takes out her cell phone 11 . She selects "Pay by Card" from the menu (this activates the applet), enters (step 2) her PIN, and presses the "OK" key. She then enters (step 2) the transaction amount number 20.55 and presses "OK". The above applet takes one of the 12 security strings initially given as a third input, and calculates a response code via Algorithm 12. The above-mentioned telephone 11 displays "response code: 451".

与此同时,上述办事员在EPOS机器13刷艾丽丝的卡,机器13读出卡号并与艾丽丝的银行使用的CANS 14进行呼叫(步骤4),在电话呼叫另一端的CANS 14请求EPOS机器13读取交易金额。上述办事员键入20.55。接着CAN服务器14请求响应码。上述办事员向艾丽丝询问响应码,艾丽丝告诉办事员“451”。上述办事员输入上述响应码到EPOS机器13,上述响应码被传递给CANS14(步骤4)。At the same time, the above-mentioned clerk swipes Alice's card at the EPOS machine 13, the machine 13 reads the card number and calls the CANS 14 used by Alice's bank (step 4), and the CANS 14 at the other end of the telephone call requests the EPOS machine 13 to read Amount of the transaction. The above clerk types in 20.55. The CAN server 14 then requests a response code. The aforementioned clerk asks Alice for the response code, and Alice tells the clerk "451". The above-mentioned clerk inputs the above-mentioned response code to the EPOS machine 13, and the above-mentioned response code is passed to the CANS14 (step 4).

CANS 14检查卡内是否有足够的钱来付账并且用卡号,金额及响应码对计算机主机10进行呼叫(步骤5)。计算机主机10计算出与从艾丽丝的移动电话显示器中读取的响应码451匹配的检验码。上述被计算出来的检验码和由CAN服务器14给予计算机主机10的响应码被发现是匹配的,因此交易是有效的。上述计算机主机通知(步骤6)CANS 14安全检查通过并产生新的安全字符串。CANS 14通知计算机主机10商业机身份和艾丽丝的卡内即期余额。计算机主机10收到这些信息并将它们与新安全字符串一起以文本消息的格式发送到艾丽丝的移动电话11(步骤1)。CANS 14 checks whether there is enough money in the card to pay the bill and calls the computer host 10 with the card number, amount and response code (step 5). The main computer 10 calculates a check code matching the response code 451 read from the display of Alice's mobile phone. The above-mentioned calculated verification code and the response code given by the CAN server 14 to the host computer 10 are found to match, so the transaction is valid. Above-mentioned computer host notification (step 6) CANS 14 security checks pass and produces new security character string. CANS 14 notifies host computer 10 of the identity of the business machine and Alice's current balance on the card. The host computer 10 receives these messages and sends them to Alice's mobile phone 11 in the form of a text message together with the new security string (step 1).

CANS 14通知(步骤7)EPOS机器13交易已结清,EPOS机器13显示“OK”消息以使办事员知道交易已经结清,上述办事员将卡和装有书的袋子交给艾丽丝。艾丽丝离开商店后发现雨下的很大。她决定打出租车回家,于是穿过街道。在她到达街道另一端的时候,在她的电话11上获得消息(步骤1),消息为“Acme书20.55英镑,结余79.45英镑”。她所没有看到的是上述消息还将新的安全字符串输入到她的电话11,以备她下一次使用卡。CANS 14 notifies (step 7) EPOS machine 13 that the transaction has been closed, EPOS machine 13 displays an "OK" message to let the clerk know that the transaction has been closed, and said clerk hands Alice the card and the bag containing the book. After Alice left the store, she found that it was raining heavily. She decides to take a taxi home and walks across the street. By the time she reaches the other end of the street, a message is obtained on her phone 11 (step 1) with the message "Acme book £20.55, balance £79.45". What she does not see is that the above message also enters the new security string into her phone 11 for the next time she uses the card.

当她到家时,出租车司机告诉她费用是22.50英镑。她告诉司机给他25英镑其中包括小费,她将他的卡交给司机并从她的移动电话11菜单里选择“卡付费”,输入(步骤2)她的PIN,按下“OK”键。接着她键入(步骤2)交易金额数25,按下“OK”。电话11将上述算法12应用到PIN,交易金额以及安全字符串,接着就会显示“响应码:722”,同时,出租车司机已经开始在他的移动电话13里写入新的消息。他键入艾丽丝的卡号和交易金额25.00。接着,他向艾丽丝请求响应码,艾丽丝告诉他“722”(步骤3),他输入722到消息中,然后将它发送(步骤4)到CANS 14的移动号码(被存储在他的电话13中的地址本中)。When she got home, the taxi driver told her the fare would be £22.50. She tells the driver to give him £25 including tip, gives him his card and selects "Pay by Card" from the menu on her mobile phone 11, enters (step 2) her PIN, presses "OK". She then enters (step 2) the transaction amount number 25 and presses "OK". The phone 11 applies the above algorithm 12 to the PIN, the transaction amount and the security string, then it will display "Response code: 722", while the taxi driver has started writing a new message in his mobile phone 13. He enters Alice's card number and the transaction amount of 25.00. Next, he asks Alice for a response code, Alice tells him "722" (step 3), he enters 722 into the message, and sends it (step 4) to the mobile number of CANS 14 (stored in his phone 13 in your address book).

CANS 14接收到这个消息后。它查阅发送者的电话号码发现其被注册到出租车司机(他是一个人的公司)。CANS 14检查艾丽丝的卡的账户是否有足够的钱来支付这次交易(账户里还有79.45英镑,交易金额是25英镑)。则,CANS14与计算机主机10进行联络并且提交(步骤5)卡号,金额(25英镑)和响应码(722)。计算机主机10通过将响应码与独立计算的检验码进行比较以检查其是否是有效的,接着向CANS 14表明交易成功(步骤6)。CANS14发送(步骤7)表明交易已经成功完成的SMS消息到出租车司机的电话13,并通知计算机主机10上述商业机的身份和新的卡余额(54.45英镑)。After CANS 14 receives this message. It looks up the sender's phone number and finds that it is registered to a taxi driver (he is a one-man company). CANS 14 checks that there is enough money in the account of Alice's card to cover the transaction (£79.45 still in the account, the transaction amount is £25). CANS 14 then contacts host computer 10 and submits (step 5) the card number, amount (£25) and response code (722). The host computer 10 checks whether the response code is valid by comparing the response code with an independently calculated verification code, and then indicates to the CANS 14 that the transaction was successful (step 6). CANS 14 sends (step 7) the SMS message that shows that the transaction has been successfully completed to the taxi driver's phone 13, and informs the host computer 10 of the above-mentioned business machine's identity and the new card balance (54.45 pounds).

上述出租车司机收到(步骤7)来自CANS 14的文本消息:“交易被授权”。他告诉艾丽丝付账已经OK(步骤8),艾丽丝从出租车里出来。几秒种后,在她的移动电话11中收到了文本消息(步骤1),消息为“约翰的出租车25.00英镑,结余54.45英镑”。艾丽丝回到家里。The above-mentioned taxi driver receives (step 7) a text message from CANS 14: "transaction authorized". He tells Alice that it is OK to pay the bill (step 8), and Alice gets out of the taxi. A few seconds later a text message is received in her mobile phone 11 (step 1) with the message "John's taxi £25.00, balance £54.45". Alice returns home.

第二天,当艾丽丝发现她的卡丢失时,她正在城镇里。出租车司机肯定是忘了将卡返回她了。她向银行致电告诉他们。他们告诉艾丽丝没关系,他们会很快把另外一张卡送到她家里。第二天,新的卡被邮寄到了。银行不用麻烦改变卡号或为艾丽丝建立新的PIN。银行知道罪犯是不能用那张旧卡完成付账的。艾丽丝很满意:她不想要改变她的卡的所有细节和不得不记住新PIN的麻烦。银行也很乐意:它们除了印制上述卡的另外一张复制品并将其邮寄外不用再做任何事情。Alice was in town the next day when she discovered her card was missing. The taxi driver must have forgotten to return the card to her. She called the bank and told them. They told Alice it was okay and they would send another card to her home soon. The next day, the new card arrived in the mail. The bank doesn't have to bother changing the card number or creating a new PIN for Alice. The bank knows that the criminal cannot use the old card to complete the payment. Alice is satisfied: she doesn't want the hassle of changing all the details of her card and having to remember a new PIN. The banks are happy, too: They don't have to do anything more than print another copy of the card and mail it.

本发明的实施方案因此是现有CVV2协议的主要改进。它们能够防止所有的欺诈。例如,持卡人防止错误的商业机(或其员工)操作,商业机能够防止被盗的卡或欺诈的持卡人使用。Embodiments of the present invention are thus a major improvement over the existing CVV2 protocol. They prevent all fraud. For example, cardholders are protected from erroneous merchant (or its employees) operation, and merchants can be protected from stolen cards or fraudulent cardholder use.

与可以消除利用卡进行欺诈的行为(卡的发行者和商业机的有益之处)一样,本发明的实施方案对持卡人提供的直接益处是:避免了更换丢失或被盗的卡时具有的麻烦,对卡申明的详细审查也不再重要。Embodiments of the present invention provide cardholders with the immediate benefit of avoiding the hassle of replacing a lost or stolen card, as can eliminating card fraud (a benefit to card issuers and merchants). The hassle of scrutiny of card claims is no longer important.

本发明的实施方案的安全属性使得在基础架构领域进行更进一步的提高成为可能。例如,移动电话作为低成本和引入商业机工具的简单方式的应用意味者卡的使用可以扩展到如今行不通的领域(讽刺地说,许多发展中国家具有极好的无线通讯基础实施,但是固定电话线路却很差)。这种方法甚至为普通人提供了用他们的卡去付账可能性(对于进行高额的项目,例如对二手小汽车和计算机装置进行支付是非常有用的)。The security properties of embodiments of the present invention enable further improvements in the infrastructure domain. For example, the adoption of mobile phones as a low-cost and easy way of introducing business tools means that the use of cards can be expanded into areas where it is not feasible today (ironically, many developing countries have excellent wireless infrastructure, but fixed The phone lines are poor). This method even offers ordinary people the possibility to pay bills with their card (very useful for making high value items such as paying for used cars and computer equipment).

本发明的实施方案的一个最重要的有益效果是,那些有益的效果的获得不需要重大基础架构的投资,因此,本发明提供了一个绝好的机会使得在减少欺诈的同时在个人财政行业打开新的可能局面。One of the most important benefits of embodiments of the present invention is that those benefits are achieved without a major infrastructure investment, and thus, the present invention presents an excellent opportunity to open up the personal finance industry while reducing fraud. new possible situations.

本发明优选的特征可应用于本发明的各个方面,并且可以以任何组合的方式被使用。The preferred features of the invention are applicable to all aspects of the invention and may be used in any combination.

这些详细描述的说明书和权利要求书中,单词“包括(comprise)”和“包含(contain)”及上述单词的变种,例如“包括(comprising)”和“包括(comprise)”,指的是“包括而不仅仅限制(but not limited to)”,并且不排除其它的组件,结合组件,部分组件,附加组件和步骤。In this detailed specification and claims, the words "comprise" and "contain" and variations of the above words, such as "comprising" and "comprise", mean " includes but not limited to", and does not exclude other components, combinations, sub-components, additional components and steps.

Claims (25)

1. one kind is carried out the Secure Transaction authorization method between client and commercial machine, and described method comprises the steps:
I) storage comprises the customer information of customer accounting code and relevant PIN (PIN) in main frame;
Ii) in described main frame, produce the pseudorandom security string;
Iii) send described pseudorandom security string at least one far-end electronic installation by client's operation from described main frame;
When iv) between client and commercial machine, concluding the business, described PIN and dealing money are imported described electronic installation;
V), produce answer code at described electronic installation by predetermined cryptographic algorithm being applied to described pseudorandom security string, PIN and dealing money;
Vi) transmit described answer code, dealing money and customer accounting code to described main frame;
Vii) in described main frame, utilize described customer accounting code to retrieve described PIN and described pseudorandom security string, then described predetermined cryptographic algorithm is applied to described pseudorandom security string, PIN and dealing money, thereby produce check code;
Viii) in described main frame, more described check code and described answer code are if they mate authorized transactions then mutually.
2. the method for claim 1 is characterized in that, described far-end electronic installation is mobile phone, personal digital assistant or pager.
3. method as claimed in claim 1 or 2 is characterized in that, described answer code passes to described commercial machine by described client, and described then commercial machine passes to described main frame with described answer code, dealing money and customer accounting code in step in vi).
4. method as claimed in claim 3 is characterized in that, described answer code is passed to described commercial machine by described client via commercial machine website.
5. method as claimed in claim 3 is characterized in that, described answer code is passed to described commercial machine by described client with the form of oral or written message.
6. method as claimed in claim 3 is characterized in that, described answer code is passed to described commercial machine from described electronic installation with the form of electric transmission information by described client.
7. any described method in the claim as described above is characterized in that, step vi) in, described answer code, dealing money and customer accounting code are transferred to described main frame via intermediate server.
8. any described method in the claim as described above is characterized in that, step vi) in, described answer code, dealing money and customer accounting code are transferred to described main frame via Internet connection.
9. as any described method in the claim 1 to 7, it is characterized in that, step vi) in, described answer code, dealing money and customer accounting code are via being transferred to described main frame by the EPOS of described commercial machine operation or EFTPOS device.
10. as any described method in the claim 1 to 7, it is characterized in that, step vi) in, described answer code, dealing money and customer accounting code are via being transferred to described main frame by the mobile phone of described commercial machine operation, personal digital assistant or analog.
11. any described method in the claim is characterized in that as described above, step I ii) in, a plurality of pseudorandom strings are transferred to described electronic installation from described main frame simultaneously.
12. any described method as in the claim 2 to 11 is characterized in that, described algorithm form with applet in being installed on the SIM card of described electronic installation is moved.
13. any described method in the claim is characterized in that described answer code and described check code are the tens digits of three bit digital as described above.
14. one kind is used for affaris safety trade system that the transaction between client and the commercial machine is authorized, described system comprises main frame and at least one electronic installation by client's operation, wherein:
I) customer information that comprises customer accounting code and relevant PIN (PIN) is stored in the described main frame;
Ii) described main frame produces the pseudorandom security string, and sends described pseudorandom security string to described at least one electronic installation by client's operation;
Iii) the client when concluding the business with commercial machine, described electronic installation receives the input from the client, described input comprises described PIN and dealing money;
Iv) described electronic installation is by applying to predetermined cryptographic algorithm described pseudorandom security string, PIN and dealing money, thereby produces answer code;
V) described answer code, dealing money and customer accounting code are transferred to described main frame;
Vi) described main frame utilizes described customer accounting code to retrieve described PIN and described pseudorandom security string, then described predetermined cryptographic algorithm is applied to described pseudorandom security string, PIN and dealing money, thereby produces check code;
More described check code of viii) described main frame and described answer code are if they mate authorized transactions then mutually.
15. system as claimed in claim 14 is characterized in that, described far-end electronic installation is mobile phone, personal digital assistant or pager.
16. as claim 14 or 15 described systems, be applicable to such situation, that is, described answer code can pass to described commercial machine by described client, and described commercial machine can pass to described main frame with described answer code, dealing money and customer accounting code in v) in step.
17. system as claimed in claim 16 also comprises being applicable to the commercial machine website of reception from described client's described answer code.
18. system as claimed in claim 16 is characterized in that, described electronic installation is applicable to described answer code is passed to described commercial machine with the form of electric transmission information.
19. any described system as among the claim 14-18 also comprises intermediate server, step v) in, described answer code, dealing money and customer accounting code are transferred to described main frame via described intermediate server.
20. as any described system among the claim 14-19, be adapted to step v) in, described answer code, dealing money and customer accounting code are transferred to described main frame via Internet connection.
21. any described system as in the claim 14 to 19 also comprises EPOS or EFTPOS device, its be applicable to step v) in, described answer code, dealing money and customer accounting code are transferred to described main frame.
22. as any described system in the claim 14 to 19, also comprise mobile phone, personal digital assistant or analog by described commercial machine operation, its be applicable to step v) in, described answer code, dealing money and customer accounting code are transferred to described main frame.
23. any described system as in the claim 14 to 22 is characterized in that described main frame is applicable at step I i) in, a plurality of pseudorandom strings are transferred to described electronic installation simultaneously.
24. any described system as in the claim 14 to 23 is characterized in that, the form with applet in the SIM card of described algorithm in being loaded on described electronic installation is moved.
25. any described system as in the claim 14 to 24 is characterized in that described answer code and described check code are the tens digits of three bit digital.
CN03807792.2A 2002-04-03 2003-03-14 System and method for credit and debit card transactions Pending CN1672180A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB0207705A GB2387253B (en) 2002-04-03 2002-04-03 System and method for secure credit and debit card transactions
GB0207705.5 2002-04-03
US10/131,489 US20030191945A1 (en) 2002-04-03 2002-04-25 System and method for secure credit and debit card transactions
US10/131,489 2002-04-25

Publications (1)

Publication Number Publication Date
CN1672180A true CN1672180A (en) 2005-09-21

Family

ID=28676501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN03807792.2A Pending CN1672180A (en) 2002-04-03 2003-03-14 System and method for credit and debit card transactions

Country Status (11)

Country Link
EP (1) EP1490846A2 (en)
JP (1) JP2005521961A (en)
CN (1) CN1672180A (en)
AU (1) AU2003219276A1 (en)
BR (1) BR0308965A (en)
CA (1) CA2505920A1 (en)
EA (1) EA006395B1 (en)
MX (1) MXPA04009725A (en)
NZ (1) NZ535428A (en)
TW (1) TWI229279B (en)
WO (1) WO2003083793A2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008037116A1 (en) * 2006-09-27 2008-04-03 Kamfu Wong Method and system for encrypting transfer that the transfer code adding the user-defined arithmetic equal to the bank password
CN102096968A (en) * 2009-12-09 2011-06-15 中国银联股份有限公司 Method for verifying accuracy of PIN (Personal Identification Number) in agent authorization service
CN102576435A (en) * 2009-11-09 2012-07-11 日本电气英富醍株式会社 Handy terminal and payment method used for the handy terminal
CN107408246A (en) * 2014-12-19 2017-11-28 迪堡多富公司 The ATM transaction pre-seted
CN116092623A (en) * 2023-04-12 2023-05-09 四川执象网络有限公司 Health data management method based on basic medical quality control

Families Citing this family (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098315A1 (en) 2002-11-19 2004-05-20 Haynes Leonard Steven Apparatus and method for facilitating the selection of products by buyers and the purchase of the selected products from a supplier
GB2416892B (en) * 2004-07-30 2008-02-27 Robert Kaplan Method and apparatus to enable validating entitlement to VoIP services
US8205793B2 (en) * 2007-03-31 2012-06-26 Dror Oved Banking transaction processing system
US7739169B2 (en) 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
WO2009042392A2 (en) 2007-09-24 2009-04-02 Apple Inc. Embedded authentication systems in an electronic device
JP2009130882A (en) * 2007-11-28 2009-06-11 Oki Electric Ind Co Ltd Check value confirming method and apparatus
US8799069B2 (en) * 2007-12-21 2014-08-05 Yahoo! Inc. Mobile click fraud prevention
US8600120B2 (en) 2008-01-03 2013-12-03 Apple Inc. Personal computing device control using face detection and recognition
GB2457445A (en) * 2008-02-12 2009-08-19 Vidicom Ltd Verifying payment transactions
EP2355028B1 (en) * 2009-12-30 2018-09-05 SecurEnvoy Ltd Authentication apparatus
US8649766B2 (en) 2009-12-30 2014-02-11 Securenvoy Plc Authentication apparatus
CA2704864A1 (en) 2010-06-07 2010-08-16 S. Bhinder Mundip Method and system for controlling access to a monetary valued account
US8638385B2 (en) 2011-06-05 2014-01-28 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9002322B2 (en) 2011-09-29 2015-04-07 Apple Inc. Authentication with secondary approver
US8769624B2 (en) 2011-09-29 2014-07-01 Apple Inc. Access control utilizing indirect authentication
US10769627B2 (en) 2013-04-05 2020-09-08 Visa International Service Association Systems, methods and devices for transacting
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
KR101952928B1 (en) 2013-10-30 2019-02-27 애플 인크. Displaying relevant user interface objects
TWI494880B (en) * 2013-11-14 2015-08-01 Nat Univ Tsing Hua Method for preventing misappropriation of plastic money and plastic money
US10043185B2 (en) 2014-05-29 2018-08-07 Apple Inc. User interface for payments
CN107633397B (en) * 2014-05-29 2019-11-08 苹果公司 User interface for payments
US9967401B2 (en) 2014-05-30 2018-05-08 Apple Inc. User interface for phone call routing among devices
US9336523B2 (en) 2014-07-28 2016-05-10 International Business Machines Corporation Managing a secure transaction
US10339293B2 (en) 2014-08-15 2019-07-02 Apple Inc. Authenticated device used to unlock another device
WO2016036603A1 (en) 2014-09-02 2016-03-10 Apple Inc. Reduced size configuration interface
WO2016036552A1 (en) 2014-09-02 2016-03-10 Apple Inc. User interactions for a mapping application
FR3028639B1 (en) * 2014-11-17 2016-12-23 Oberthur Technologies METHOD FOR SECURING A PAYMENT TOKEN
US20160224973A1 (en) 2015-02-01 2016-08-04 Apple Inc. User interface for payments
US9574896B2 (en) 2015-02-13 2017-02-21 Apple Inc. Navigation user interface
US10254911B2 (en) 2015-03-08 2019-04-09 Apple Inc. Device configuration user interface
US9940637B2 (en) 2015-06-05 2018-04-10 Apple Inc. User interface for loyalty accounts and private label accounts
US20160358133A1 (en) 2015-06-05 2016-12-08 Apple Inc. User interface for loyalty accounts and private label accounts for a wearable device
GB201522762D0 (en) * 2015-12-23 2016-02-03 Sdc As Data security
DK179186B1 (en) 2016-05-19 2018-01-15 Apple Inc REMOTE AUTHORIZATION TO CONTINUE WITH AN ACTION
US10776780B2 (en) * 2016-05-27 2020-09-15 Visa International Service Association Automated reissuance system for prepaid devices
CN114693289A (en) 2016-06-11 2022-07-01 苹果公司 User interface for trading
US10621581B2 (en) 2016-06-11 2020-04-14 Apple Inc. User interface for transactions
DK201670622A1 (en) 2016-06-12 2018-02-12 Apple Inc User interfaces for transactions
US9842330B1 (en) 2016-09-06 2017-12-12 Apple Inc. User interfaces for stored-value accounts
DK179978B1 (en) 2016-09-23 2019-11-27 Apple Inc. IMAGE DATA FOR ENHANCED USER INTERACTIONS
US10860199B2 (en) 2016-09-23 2020-12-08 Apple Inc. Dynamically adjusting touch hysteresis based on contextual data
US10496808B2 (en) 2016-10-25 2019-12-03 Apple Inc. User interface for managing access to credentials for use in an operation
KR102185854B1 (en) 2017-09-09 2020-12-02 애플 인크. Implementation of biometric authentication
EP4155988A1 (en) 2017-09-09 2023-03-29 Apple Inc. Implementation of biometric authentication for performing a respective function
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
CA3062211A1 (en) * 2018-11-26 2020-05-26 Mir Limited Dynamic verification method and system for card transactions
US11328352B2 (en) 2019-03-24 2022-05-10 Apple Inc. User interfaces for managing an account
US11481094B2 (en) 2019-06-01 2022-10-25 Apple Inc. User interfaces for location-related communications
US11477609B2 (en) 2019-06-01 2022-10-18 Apple Inc. User interfaces for location-related communications
JP7127232B1 (en) 2019-09-29 2022-08-29 アップル インコーポレイテッド Account management user interface
US11169830B2 (en) 2019-09-29 2021-11-09 Apple Inc. Account management user interfaces
DK202070633A1 (en) 2020-04-10 2021-11-12 Apple Inc User interfaces for enabling an activity
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
EP4264460B1 (en) 2021-01-25 2025-12-24 Apple Inc. Implementation of biometric authentication
US12210603B2 (en) 2021-03-04 2025-01-28 Apple Inc. User interface for enrolling a biometric feature
US12216754B2 (en) 2021-05-10 2025-02-04 Apple Inc. User interfaces for authenticating to perform secure operations
JP7429819B1 (en) 2023-04-05 2024-02-08 株式会社セブン銀行 Trading systems, trading devices, trading methods, and programs

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0691526B2 (en) * 1985-03-08 1994-11-14 株式会社東芝 Communications system
WO1995019593A1 (en) * 1994-01-14 1995-07-20 Michael Jeremy Kew A computer security system
GB2328310B (en) * 1996-05-15 1999-12-08 Ho Keung Tse Electronic transaction apparatus and method therefor
SE508844C2 (en) * 1997-02-19 1998-11-09 Postgirot Bank Ab Procedure for access control with SIM card
DE19820422A1 (en) * 1998-05-07 1999-11-11 Giesecke & Devrient Gmbh Method for authenticating a chip card within a message transmission network
FI115355B (en) * 2000-06-22 2005-04-15 Icl Invia Oyj Arrangements for identification and verification of a user in a protected system
US7392388B2 (en) * 2000-09-07 2008-06-24 Swivel Secure Limited Systems and methods for identity verification for secure transactions
WO2002082387A1 (en) * 2001-04-04 2002-10-17 Microcell I5 Inc. Method and system for effecting an electronic transaction

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008037116A1 (en) * 2006-09-27 2008-04-03 Kamfu Wong Method and system for encrypting transfer that the transfer code adding the user-defined arithmetic equal to the bank password
CN101523449B (en) * 2006-09-27 2011-04-13 黄金富 Encryption transmission method and system for transmitting code and self-definite arithmetic equal to bank password
CN102576435A (en) * 2009-11-09 2012-07-11 日本电气英富醍株式会社 Handy terminal and payment method used for the handy terminal
CN102576435B (en) * 2009-11-09 2015-05-13 Nec平台株式会社 Handy terminal and payment method used for the handy terminal
US10491395B2 (en) 2009-11-09 2019-11-26 Nec Platforms, Ltd. Handy terminal and payment method to be used in same
CN102096968A (en) * 2009-12-09 2011-06-15 中国银联股份有限公司 Method for verifying accuracy of PIN (Personal Identification Number) in agent authorization service
CN107408246A (en) * 2014-12-19 2017-11-28 迪堡多富公司 The ATM transaction pre-seted
CN116092623A (en) * 2023-04-12 2023-05-09 四川执象网络有限公司 Health data management method based on basic medical quality control
CN116092623B (en) * 2023-04-12 2023-07-28 四川执象网络有限公司 Health data management method based on basic medical quality control

Also Published As

Publication number Publication date
TWI229279B (en) 2005-03-11
EA006395B1 (en) 2005-12-29
WO2003083793A2 (en) 2003-10-09
EA200401187A1 (en) 2005-04-28
NZ535428A (en) 2006-08-31
WO2003083793A3 (en) 2003-12-31
EP1490846A2 (en) 2004-12-29
MXPA04009725A (en) 2005-07-14
CA2505920A1 (en) 2003-10-09
JP2005521961A (en) 2005-07-21
BR0308965A (en) 2005-02-01
AU2003219276A1 (en) 2003-10-13
TW200306483A (en) 2003-11-16

Similar Documents

Publication Publication Date Title
CN1672180A (en) System and method for credit and debit card transactions
US7600676B1 (en) Two factor authentications for financial transactions
US12074974B2 (en) Method and system for access token processing
US20030191945A1 (en) System and method for secure credit and debit card transactions
JP4511192B2 (en) Electronic transfer system
US10078832B2 (en) Method for using barcodes and mobile devices to conduct payment transactions
US20110251910A1 (en) Mobile Phone as a Switch
US20020116329A1 (en) Systems and methods for approval of credit/debit account transactions using a wireless device
US20060131390A1 (en) Method and system for providing transaction notification and mobile reply authorization
CN101990676A (en) Mobile phone transaction system and method
WO2011130422A2 (en) Mobile phone as a switch
PT1316076E (en) Code identification method and system
TW201349144A (en) System and method for preventing counterfeiting of e-tickets
US20170024742A1 (en) Methods and systems for using a consumer identity to perform electronic transactions
CN113518990B (en) Virtual access credential interaction system and method
EP4282128A1 (en) Mobile user authentication system and method
CN117642761A (en) Hosted Point of Sale Services
US12355888B2 (en) Validations using verification values
EP1396139B1 (en) Method and systems for improving security in data communication systems
John METHOD AND SYSTEM FOR SECURE CREDENTIAL GENERATION
JP2002230287A (en) System for instantaneously opening credit account
CN121079709A (en) Secure remote interaction using portable trading devices
HK1152439A (en) Ghosting payment account data in a mobile telephone payment transaction system
HK1152405A (en) Mobile telephone transaction systems and methods
HK1152438A (en) Transaction server configured to authorize payment transactions using mobile telephone devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication