HK40120918A - Systems and methods for secure read-only authentication - Google Patents
Systems and methods for secure read-only authenticationInfo
- Publication number
- HK40120918A HK40120918A HK42025109111.2A HK42025109111A HK40120918A HK 40120918 A HK40120918 A HK 40120918A HK 42025109111 A HK42025109111 A HK 42025109111A HK 40120918 A HK40120918 A HK 40120918A
- Authority
- HK
- Hong Kong
- Prior art keywords
- transaction card
- value
- field communication
- transmitter
- user
- Prior art date
Links
Description
本申请是申请号为201980041892.0、申请日为2019年6月21日、发明名称为“用于安全只读认证的系统和方法”的申请的分案申请。This application is a divisional application of application No. 201980041892.0, filed on June 21, 2019, entitled "System and Method for Secure Read-Only Authentication".
相关申请Related applications
本申请要求享有于2018年6月21日提交的美国临时专利申请号16/014,542的优先权,其全部内容通过引用纳入本申请。This application claims priority to U.S. Provisional Patent Application No. 16/014,542, filed June 21, 2018, the entire contents of which are incorporated herein by reference.
说明书manual
技术领域Technical Field
所公开的实施例一般涉及对记账卡(an account card)进行认证,更具体地说,涉及使用同步计数器对记账卡进行认证。The disclosed embodiments generally involve authenticating an account card, and more specifically, authenticating an account card using a synchronized counter.
背景技术Background Technology
计算机系统上的许多类型的交互,诸如认证登录和其他基于交易的进程,都是不安全的。例如,当试图在计算机上登录网站时,该网站可以请求用户名和密码。任何拥有这组信息的人,无论是授权用户还是恶意用户,都可以出于任何目的使用该网站。为了应对这种不安全性,一些交易需要多因素认证,通常被称为“你知道什么和你有什么”。例如,在登录网站时,网站可以请求用户名/密码组合(“你知道什么”),以及电子设备上显示的六位数(“你有什么”)或指纹扫描(“你是谁”)。这个六位数(也称为基于时间的一次性密码(TOTP))可以每30秒更改一次,以避免未经授权的用户重复使用。另一个例子,信用卡上可能具有存储在其上的信息,其可以使信用卡处理器知道用户是否身上持有该信用卡。例如,虽然卡片的正面可能印有卡号(“你知道什么”),但一些信息可能只呈现为EMV芯片的一部分(“你有什么”)。一些设备可能会从EMV芯片中读取信息,用于对用户进行非接触认证。一些设备允许使用“你知道什么”因素和“你是谁”的多因素认证,例如人脸识别、指纹认证和/或虹膜扫描等的生物认证。Many types of interactions on computer systems, such as authenticated logins and other transaction-based processes, are insecure. For example, when attempting to log in to a website on a computer, the website may request a username and password. Anyone with this set of information, whether an authorized user or a malicious user, can use the website for any purpose. To address this insecurity, some transactions require multi-factor authentication, often referred to as "what you know and what you have." For example, when logging into a website, the website may request a username/password combination ("what you know"), as well as a six-digit number displayed on the electronic device ("what you have") or a fingerprint scan ("who you are"). This six-digit number (also known as a time-based one-time password (TOTP)) can be changed every 30 seconds to prevent unauthorized users from reusing it. Another example is that credit cards may contain information stored on them that allows the credit card processor to know whether a user is carrying the card. For example, while the card number may be printed on the front of the card ("what you know"), some information may only be presented as part of the EMV chip ("what you have"). Some devices may read information from the EMV chip for contactless authentication of the user. Some devices allow multi-factor authentication using "what you know" factors and "who you are" factors, such as biometric authentication like facial recognition, fingerprint authentication, and/or iris scanning.
目前,EMV协议依赖于交易卡的EMV芯片和支付终端(例如POS机)之间的双向通信。为了完成交易,交易信息从支付终端发送到交易卡。EMV芯片接收交易信息,对信息进行数字签名,并将签名后的信息传回到支付终端以用于进行认证。然而,许多设备和/或操作系统不支持双向通信,因此无法使用支持EMV的交易卡完成交易。Currently, the EMV protocol relies on two-way communication between the transaction card's EMV chip and the payment terminal (such as a POS machine). To complete a transaction, transaction information is sent from the payment terminal to the transaction card. The EMV chip receives the transaction information, digitally signs it, and sends the signed information back to the payment terminal for authentication. However, many devices and/or operating systems do not support two-way communication, thus preventing transactions from being completed using EMV-enabled transaction cards.
由于与使用双向通信协议的认证相关的这些缺点和其他缺点,存在一种允许技术上安全、只读认证的需求。Due to these and other drawbacks associated with authentication using bidirectional communication protocols, there is a need for technically secure, read-only authentication.
发明内容Summary of the Invention
与所公开的实施例一致,提供了一种与金融帐户相关联并用于生成加密值作为认证请求的一部分的交易卡。该交易卡包括射频发射器;与射频发射器耦合的时钟发生器,该时钟发生器被配置为响应于从外部射频读取器设备接收到的无线读取信号而递增计数器值;以及与所述射频发射器耦合并存储永久标识符和计数器值的近场通信标签。近场通信标签可以被配置为响应于所接收到的读取信号,以:基于永久标识符和计数器值生成加密值;并将加密值提供给射频发射器以便传输到外部射频读取器设备。Consistent with the disclosed embodiments, a transaction card is provided that is associated with a financial account and used to generate an encrypted value as part of an authentication request. The transaction card includes a radio frequency (RF) transmitter; a clock generator coupled to the RF transmitter, the clock generator being configured to increment a counter value in response to a wireless read signal received from an external RF reader device; and a near-field communication (NFC) tag coupled to the RF transmitter and storing a permanent identifier and the counter value. The NFC tag can be configured to, in response to the received read signal,: generate an encrypted value based on the permanent identifier and the counter value; and provide the encrypted value to the RF transmitter for transmission to the external RF reader device.
与另一个所公开的实施例一致,提供了一种与金融帐户相关联并生成加密值作为认证请求的一部分的交易卡。该交易卡包括射频发射器;与射频发射器耦合的近场通信标签;以及与近场通信标签耦合并由电源供电的时钟。该时钟可以被配置为响应于近场通信标签从外部射频读取器设备接收到的无线读取信号而向近场通信标签发送时间值。近场通信标签可以被配置为:存储永久标识符和时间值;并且响应于所接收到的读取信号,以:基于永久标识符和时间值生成加密值;并且将加密值提供给射频发射器以便传输到外部射频读取器设备。Consistent with another disclosed embodiment, a transaction card is provided that is associated with a financial account and generates an encrypted value as part of an authentication request. The transaction card includes an RF transmitter; a near-field communication (NFC) tag coupled to the RF transmitter; and a clock coupled to the NFC tag and powered by a power source. The clock can be configured to send a time value to the NFC tag in response to a wireless read signal received by the NFC tag from an external RF reader device. The NFC tag can be configured to: store a permanent identifier and a time value; and in response to the received read signal, to: generate an encrypted value based on the permanent identifier and the time value; and provide the encrypted value to the RF transmitter for transmission to the external RF reader device.
与另一个所公开的实施例一致,提供了一种与金融帐户相关联并用于生成加密值作为认证请求的一部分的交易卡。该交易卡包括:射频发射器;与射频发射器耦合的近场通信标签;以及与近场通信标签耦合并由电源供电的微处理器。微处理器可以被配置为响应于从外部射频读取器设备接收的无线读取信号而计算更新值。近场通信标签可以被配置为:存储永久标识符和更新值,并响应于接收到的读取信号:基于永久标识符和更新值生成加密值,并向射频发射器提供加密值以便传输到外部射频读取器设备。Consistent with another disclosed embodiment, a transaction card is provided that is associated with a financial account and used to generate an encrypted value as part of an authentication request. The transaction card includes: an RF transmitter; a near-field communication (NFC) tag coupled to the RF transmitter; and a microprocessor coupled to the NFC tag and powered by a power source. The microprocessor can be configured to calculate an updated value in response to a wireless read signal received from an external RF reader device. The NFC tag can be configured to: store a permanent identifier and an updated value, and in response to the received read signal: generate an encrypted value based on the permanent identifier and the updated value, and provide the encrypted value to the RF transmitter for transmission to the external RF reader device.
与其他所公开的实施例相一致,有形的计算机可读存储介质可以存储可由一个或多个处理器执行的程序指令以用于实现本文本公开的任何进程。Consistent with other disclosed embodiments, a tangible computer-readable storage medium may store program instructions executable by one or more processors for implementing any process disclosed herein.
应当理解的是,上述的一般描述和以下的详细描述只是示例性和解释性的,并不是对所公开的实施例的限制。It should be understood that the above general description and the following detailed description are exemplary and explanatory only, and are not intended to limit the disclosed embodiments.
附图说明Attached Figure Description
纳入本说明书中并构成了本说明书的一部分的附图示出了多个实施例,并与说明书一起用于解释本公开的原理。在附图中:The accompanying drawings, which are incorporated in and form a part of this specification, illustrate several embodiments and, together with the specification, serve to explain the principles of this disclosure. In the drawings:
图1是与所公开的实施例一致的示例性系统的框图;Figure 1 is a block diagram of an exemplary system consistent with the disclosed embodiments;
图2A-2C是与所公开的实施例一致的示例性交易卡的示图;Figures 2A-2C are illustrations of exemplary transaction cards consistent with the disclosed embodiments;
图3A-3C是示出了与所公开的实施例一致的临时标识符的递增的流程图;以及Figures 3A-3C are flowcharts illustrating the incrementing of temporary identifiers consistent with the disclosed embodiments; and
图4是与所公开的实施例一致的用于对具有多态标签的交易卡的用户进行认证的示例性过程的流程图。Figure 4 is a flowchart of an exemplary process for authenticating a user of a transaction card with a polymorphic tag, consistent with the disclosed embodiments.
具体实施方式Detailed Implementation
现在将详细参考示例性实施例,其示例在附图中示出并在本文公开。在方便的情况下,在整个示图中使用相同的参考标记来指代相同或相似的部件。Reference will now be made in detail to exemplary embodiments, examples of which are shown in the accompanying drawings and disclosed herein. Where convenient, the same reference numerals are used throughout the drawings to refer to the same or similar parts.
在所公开的实施例中,当在移动设备上完成金融交易时,用户可以使用交易卡作为一种认证的形式。该交易卡可能与具有金融服务提供商的用户持有的金融账户相关联。大多数交易卡在一个或多个RFID标签或其他存储组件中包含静态标识符。然而,这种静态标识符很容易被恶意用户复制。所公开的实施例实现了一种包括动态多态标签的交易卡,动态多态标签在每次标签被读取时改变。这种动态标签比传统的静态标签更安全,并且可以防止恶意用户简单地复制和使用标签。In the disclosed embodiments, when completing a financial transaction on a mobile device, a user can use a transaction card as a form of authentication. This transaction card may be associated with a financial account held by the user with a financial service provider. Most transaction cards contain a static identifier in one or more RFID tags or other storage components. However, such static identifiers are easily copied by malicious users. The disclosed embodiments implement a transaction card that includes a dynamically polymorphic tag that changes each time the tag is read. This dynamic tag is more secure than traditional static tags and prevents malicious users from easily copying and using the tag.
本文使用的术语“交易卡”,是指当读取器读取时,被配置为提供信息,诸如金融信息(例如卡号、账号、账户余额等)、准金融信息(例如,积分余额,折扣信息等),和/或个人身份信息(例如姓名、地址等)的任何物理卡产品。交易卡的示例包括信用卡、借记卡、礼品卡、积分卡、飞行常客卡、商家专用卡、折扣卡等等,但不限于此。术语“交易卡”可以包括身份证,诸如护照卡、驾驶执照、入口门禁卡或类似的证件。交易卡的物理特性(例如,尺寸、柔性、卡内各个组件的位置)可以符合各种国际标准,包括例如ISO/IEC 7810、ISO/IEC 7811、ISO/IEC 7812、ISO/IEC 7813、ISO/IEC 7816、ISO 8583、ISO/IEC 4909和ISO/IEC 14443。例如,按照ISO/IEC 7810的规定,交易卡的尺寸可为85.60mm(宽)*53.98mm(高)*0.76mm(厚)。As used herein, the term "transaction card" refers to any physical card product that, when read by a reader, is configured to provide information such as financial information (e.g., card number, account number, account balance, etc.), quasi-financial information (e.g., points balance, discount information, etc.), and/or personally identifiable information (e.g., name, address, etc.). Examples of transaction cards include, but are not limited to, credit cards, debit cards, gift cards, loyalty cards, frequent flyer cards, merchant cards, discount cards, and so on. The term "transaction card" can also include identification documents such as passport cards, driver's licenses, access cards, or similar identification. The physical characteristics of a transaction card (e.g., size, flexibility, and the location of the various components within the card) may conform to various international standards, including, for example, ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO/IEC 7816, ISO 8583, ISO/IEC 4909, and ISO/IEC 14443. For example, according to ISO/IEC 7810, the dimensions of a transaction card can be 85.60mm (width) * 53.98mm (height) * 0.76mm (thickness).
图1示出了与所公开的实施例一致的示例性系统100的示图。正如图1所示,系统100可以包括用户设备110、交易卡120、促进系统100组件之间通信的网络130以及服务提供商(SP)设备140。系统100中包含的组件和组件的布置可以改变。因此,系统100可以进一步包括执行或协助与所公开的实施例一致的一个或多个过程的其他组件。图1所示的组件和布置并不旨在限制所公开的实施例,因为用于实现本公开的过程和特性的组件可以改变。Figure 1 illustrates an exemplary system 100 consistent with the disclosed embodiments. As shown in Figure 1, system 100 may include user equipment 110, transaction card 120, network 130 facilitating communication between components of system 100, and service provider (SP) equipment 140. The components included in system 100 and the arrangement of the components may vary. Therefore, system 100 may further include other components that perform or assist one or more processes consistent with the disclosed embodiments. The components and arrangements shown in Figure 1 are not intended to limit the disclosed embodiments, as the components used to implement the processes and features of this disclosure may vary.
系统100可能包括一个或多个用户设备110。用户可操作用户设备110,其可以是台式电脑、笔记本电脑、平板电脑、智能手机、多功能手表、一副多功能眼镜、追踪设备或任何适合的具有计算能力的设备。用户设备110可以包括本领域技术人员已知的一个或多个处理器和一个或多个存储设备。例如,用户设备110可以包括存储数据和软件指令的一个或多个存储器设备,该数据和软件指令在由一个或多个处理器执行时执行与所公开的实施例一致的操作。一方面,用户设备110可以在其上安装的交易应用,其可以使用户设备110能够经由网络130或其他方式(例如近场通信设备)与交易卡120或SP设备140通信。例如,用户设备110可以是智能手机或平板电脑或类似设备,其执行存储的移动应用来执行各种电子交易,诸如认证操作(例如登录到计算机系统)、银行操作(例如资金转账、购物或提现)或类似地操作。在其他实施例中,用户设备110可以通过使用用户设备110存储并执行的浏览器软件连接到SP设备140。用户设备110可以被配置为执行软件指令以允许用户访问存储在SP设备140中的信息,诸如,例如,私钥或其他认证信息、与最近的购物交易相关的金融信息、金融折扣、财务报表、账户信息、积分回馈信息等。此外,用户设备110可以被配置为执行软件指令,其发起和进行与SP设备140和/或交易卡120的交易,例如,在网站或计算机上登录或认证、提现、电汇、PIN重置,或呼叫中心交易。System 100 may include one or more user devices 110. User devices 110 are user-operable and may be desktop computers, laptops, tablets, smartphones, multi-functional watches, multi-functional glasses, tracking devices, or any suitable computing-capable device. User devices 110 may include one or more processors and one or more storage devices known to those skilled in the art. For example, user devices 110 may include one or more memory devices storing data and software instructions that, when executed by one or more processors, perform operations consistent with the disclosed embodiments. On one hand, user devices 110 may have transaction applications installed thereon that enable user devices 110 to communicate with transaction cards 120 or SP devices 140 via network 130 or other means (e.g., near-field communication devices). For example, user devices 110 may be smartphones, tablets, or similar devices that execute stored mobile applications to perform various electronic transactions, such as authentication operations (e.g., logging into a computer system), banking operations (e.g., fund transfers, shopping, or cash withdrawals), or similar operations. In other embodiments, user devices 110 may connect to SP devices 140 using browser software stored and executed on user devices 110. User equipment 110 can be configured to execute software instructions to allow users to access information stored in SP device 140, such as, for example, private keys or other authentication information, financial information related to recent shopping transactions, financial discounts, financial statements, account information, points reward information, etc. Furthermore, user equipment 110 can be configured to execute software instructions to initiate and conduct transactions with SP device 140 and/or transaction card 120, such as logging in or authenticating on a website or computer, cash withdrawal, wire transfer, PIN reset, or call center transactions.
用户设备110可以执行与所公开的实施例一致的一个或多个操作。用户设备110可以由用户操作。一方面,用户可以是金融服务提供商的客户(例如,操作SP设备140的金融服务提供商)。例如,金融服务提供商可以为用户设备110的用户维护金融服务帐户(例如支票帐户、储蓄帐户、借记卡帐户或信用卡帐户)。用户设备110(和/或其他物品,诸如卡、令牌、密钥卡或类似物品)可以访问该帐户,以便购买商品、服务或信息。附加地或替代地,用户设备110和金融服务账户(例如,通过安装在用户设备110上的移动应用)可以发起从ATM机提取现金、联系客户呼叫中心、转账或电汇,或重置他们的借记卡PIN。User equipment 110 can perform one or more operations consistent with the disclosed embodiments. User equipment 110 can be operated by a user. On one hand, the user can be a customer of a financial service provider (e.g., a financial service provider operating SP device 140). For example, the financial service provider can maintain a financial service account (e.g., a checking account, savings account, debit card account, or credit card account) for the user of user equipment 110. User equipment 110 (and/or other items, such as cards, tokens, key cards, or similar items) can access the account to purchase goods, services, or information. Additionally or alternatively, user equipment 110 and financial service accounts (e.g., via a mobile application installed on user equipment 110) can initiate cash withdrawals from ATMs, contact customer call centers, transfers or wire transfers, or reset their debit card PINs.
在一些实施例中,用户设备110可以包括RFID读取器,其可以使用一个或多个无线协议(例如,近场通信(NFC)、BLUETOOTHTM、BLUETOOTH LETM(BLE)、射频识别(RFID))检测交易卡120。如下所述,交易卡120可以包括多态标签,能够使用户使用交易卡120作为多因素认证过程中的一个因素。用户设备110可以读取存储在交易卡120上的标签和“加盐值(salt)”(即一段随机数据)的加密值,并将加密值与存储在SP设备140上的期望值进行比较。In some embodiments, user equipment 110 may include an RFID reader that can detect transaction card 120 using one or more wireless protocols (e.g., Near Field Communication (NFC), BLUETOOTH ™ , BLUETOOTH LE ™ (BLE), Radio Frequency Identification (RFID)). As described below, transaction card 120 may include a polymorphic tag, enabling the user to use transaction card 120 as a factor in a multi-factor authentication process. User equipment 110 can read the tag and the encrypted value of a "salt" (i.e., a piece of random data) stored on transaction card 120 and compare the encrypted value with a desired value stored on SP device 140.
交易卡120可以被配置为使用诸如BLUETOOTHTM、BLUETOOTH LETM(BLE)、Wi-Fi、近场通信(NFC)或类似的协议来传输数据。在一些实施例中,交易卡120还可以包括无线发射器,例如RFID发射器。The transaction card 120 can be configured to transmit data using protocols such as BLUETOOTH ™ , BLUETOOTH LE ™ (BLE), Wi-Fi, Near Field Communication (NFC), or similar protocols. In some embodiments, the transaction card 120 may also include a wireless transmitter, such as an RFID transmitter.
在一些实施例中,交易卡120可以包括存储一个或多个标识符的一个或多个存储设备。例如,交易卡120可以存储可以唯一地标识交易卡120的标签或永久标识符,以及一个或多个其他临时/滚动标识符,例如加盐值。例如,交易卡120可以被配置为存储包括私钥和加盐值的标签,其每次用户设备110读取交易卡120时加盐值都会递增。交易卡120可以将加盐值存储在存储器中(例如,通过重写先前记录的加盐值)。交易卡120可以包括被配置为向用户设备110发送永久标识符和临时标识符的加密的RFID发射器。在一些实施例中,一个或多个标识符可以存储在SP设备120可访问数据库中。In some embodiments, transaction card 120 may include one or more storage devices storing one or more identifiers. For example, transaction card 120 may store a tag or permanent identifier that can uniquely identify transaction card 120, and one or more other temporary/rolling identifiers, such as salted values. For example, transaction card 120 may be configured to store a tag including a private key and a salted value, the salted value being incremented each time user equipment 110 reads transaction card 120. Transaction card 120 may store the salted value in memory (e.g., by overwriting previously recorded salted values). Transaction card 120 may include an encrypted RFID transmitter configured to send permanent and temporary identifiers to user equipment 110. In some embodiments, one or more identifiers may be stored in a database accessible to SP device 120.
与所公开的实施例一致,SP设备140可以是与网站相关联的系统,诸如存储数据和向用户提供数据的安全数据存储网站。SP设备140也可以是与金融服务提供商(未示出)相关联的系统,例如银行、信用卡公司、出借人、经纪公司、或为一个或多个用户生成、提供、管理和维护金融服务账户等的任何其他类型的金融服务实体。Consistent with the disclosed embodiments, SP device 140 can be a system associated with a website, such as a secure data storage website that stores data and provides data to users. SP device 140 can also be a system associated with a financial service provider (not shown), such as a bank, credit card company, lender, brokerage firm, or any other type of financial service entity that generates, provides, manages, and maintains financial service accounts for one or more users.
SP设备140可以实现为一个或多个计算系统,其被配置为执行存储在一个或多个存储设备上的软件指令,以执行与所公开的实施例一致的一个或多个操作。例如,SP设备140可以包括存储数据和软件指令的一个或多个存储设备,以及被配置为使用数据和执行软件指令以执行本领域技术人员已知的基于服务器的功能和操作的一个或多个处理器。SP设备140可以包括一个或多个通用计算机、大型计算机或这些类型的组件的任何组合。SP device 140 can be implemented as one or more computing systems configured to execute software instructions stored on one or more storage devices to perform one or more operations consistent with the disclosed embodiments. For example, SP device 140 may include one or more storage devices storing data and software instructions, and one or more processors configured to use the data and execute the software instructions to perform server-based functions and operations known to those skilled in the art. SP device 140 may include one or more general-purpose computers, mainframe computers, or any combination of these types of components.
在一些实施例中,SP设备140可以被配置为基于软件指令(致使处理器执行与所公开的实施例一致的一个或多个操作)的存储、执行和/或实现的特定装置、系统等。SP设备140可以是独立的,也可以是子系统的一部分,子系统反而又是更大系统的一部分。例如,SP设备140可以表示远程定位的分布式服务器,并且通过公共网络(例如网络140)或金融服务提供商的专用网络(诸如LAN)进行通信。In some embodiments, SP device 140 may be configured as a specific means, system, etc., based on software instructions that cause a processor to perform one or more operations consistent with the disclosed embodiments. SP device 140 may be standalone or part of a subsystem that is itself part of a larger system. For example, SP device 140 may represent a remotely located distributed server and communicate over a public network (e.g., network 140) or a private network of a financial service provider (such as a LAN).
SP设备140可以包括或可以访问被配置为存储数据和/或软件指令(由SP设备140的一个或多个处理器用于执行与所公开的实施例一致的操作)的一个或多个存储设备。例如,SP设备140可以包括被配置为存储一个或多个软件程序(当由处理器执行时执行多种功能)的存储器。所公开的实施例不限于被配置为执行专用任务的单独程序或计算机。例如,SP设备140可以包括存储单个程序或多个程序的存储器。此外,SP设备140可以执行一个或更多位于SP设备140远程的程序。例如,SP设备140可以访问存储在包含远程组件的存储器中的一个或多个远程程序,该远程组件在执行时执行与所公开的实施例一致的操作。在一些方面,SP设备140可以包括生成、维护和提供与金融帐户管理相关的服务的服务器软件。在其他方面,SP设备140可以连接单独的一个或多个服务器或类似的计算设备,所述单独的一个或多个服务器或类似的计算设备生成、维护和提供与针对与SP设备140关联的金融服务提供商的金融数据关联的服务。SP device 140 may include or have access to one or more storage devices configured to store data and/or software instructions (used by one or more processors of SP device 140 to perform operations consistent with the disclosed embodiments). For example, SP device 140 may include memory configured to store one or more software programs (which perform multiple functions when executed by a processor). The disclosed embodiments are not limited to a single program or computer configured to perform a specific task. For example, SP device 140 may include memory storing a single program or multiple programs. Furthermore, SP device 140 may execute one or more programs located remotely to SP device 140. For example, SP device 140 may access one or more remote programs stored in memory containing remote components that, when executed, perform operations consistent with the disclosed embodiments. In some aspects, SP device 140 may include server software that generates, maintains, and provides services related to financial account management. In other aspects, SP device 140 may connect to one or more separate servers or similar computing devices that generate, maintain, and provide services associated with financial data for financial service providers associated with SP device 140.
SP设备140可以被配置为生成并向用户设备110发送期望值。期望值可以对应于交易卡的标签和加盐值120。SP设备140还可连接到数据库,并可存储与一张或多张交易卡120相关联的所生成的标签和加盐值对。SP device 140 can be configured to generate and send expected values to user device 110. The expected values may correspond to the tags and salt values 120 of transaction cards. SP device 140 can also connect to a database and store the generated tag and salt value pairs associated with one or more transaction cards 120.
网络130可以包括用于交换数据的任何类型的计算机联网布置。例如,网络130可以是互联网、专用数据网络、公共网络上的虚拟专用网络、Wi-Fi网络、LAN或WAN网络,和/或其他可使系统100的各个组件之间进行信息交换的适当连接中的一个或多个。网络130还可以包括公用交换电话网("PSTN")和/或无线蜂窝网络。网络130可以是安全的网络,也可以是不安全的网络。在其他实施例中,系统100的一个或多个组件可以通过一个或多个专用通信链路直接通信,诸如用户设备110和服务提供商设备140之间的链路。Network 130 may include any type of computer networking arrangement for exchanging data. For example, network 130 may be one or more of the Internet, a private data network, a virtual private network over a public network, a Wi-Fi network, a LAN or WAN network, and/or other suitable connections that enable information exchange between the various components of system 100. Network 130 may also include a public switched telephone network ("PSTN") and/or a wireless cellular network. Network 130 may be a secure network or an insecure network. In other embodiments, one or more components of system 100 may communicate directly via one or more dedicated communication links, such as the link between user equipment 110 and service provider equipment 140.
另外地或替代地,网络130可以包括直接通信网络。直接通信可以使用任何合适的技术,包括,例如,BLUETOOTHTM、BLUETOOTH LETM(BLE)、Wi-Fi、近场通信(NFC)或其他合适的通信方法,这些方法提供了用于在不同设备之间传输数据的媒介。在一些实施例中,用户设备110可以通过直接通信网络连接和通信。Alternatively or concurrently, network 130 may include a direct communication network. Direct communication may utilize any suitable technology, including, for example, BLUETOOTH ™ , BLUETOOTH LE ™ (BLE), Wi-Fi, Near Field Communication (NFC), or other suitable communication methods that provide a medium for transferring data between different devices. In some embodiments, user equipment 110 may connect and communicate via a direct communication network.
对于本领域的普通技术人员已知的其他组件可以包含在系统100中,以处理、传输、提供和接收与所公开的实施例一致的信息。Other components known to those skilled in the art may be included in system 100 to process, transmit, provide, and receive information consistent with the disclosed embodiments.
图2A是示例性交易卡200A的示图,其可对应于与所公开的实施例一致的交易卡120(图1)。卡200A可以包括时钟发生器201、NFC标签202和RFID发射器203。Figure 2A is a diagram of an exemplary transaction card 200A, which may correspond to a transaction card 120 (Figure 1) consistent with the disclosed embodiments. Card 200A may include a clock generator 201, an NFC tag 202, and an RFID transmitter 203.
时钟发生器201可以被配置为响应于来自RFID读取器的电磁辐射而发起周期。例如,交易卡200A可以包括使用ISO 14443的Javacard芯片(包括NFC标签202),从而在收到来自RFID读取器的具有频率为13.56mHz的信号时,时钟发生器201可以发起周期。每次时钟发生器201发起周期,计数器可以递增对于交易卡唯一的预配置的值。因此,时钟发生器201可以被配置为由RFID读取器对交易卡120的每个读取“记时”。计数器的起始值也可以是唯一的、预配置的、非零的值。时钟发生器201可以是本领域技术人员已知的任何配置的时钟发生器电路。Clock generator 201 can be configured to initiate a cycle in response to electromagnetic radiation from an RFID reader. For example, transaction card 200A may include a Javacard chip (including NFC tag 202) using ISO 14443, such that clock generator 201 can initiate a cycle upon receiving a signal with a frequency of 13.56 MHz from an RFID reader. Each time clock generator 201 initiates a cycle, a counter can increment by a pre-configured value unique to the transaction card. Therefore, clock generator 201 can be configured to "time" each read of transaction card 120 by the RFID reader. The initial value of the counter can also be a unique, pre-configured, non-zero value. Clock generator 201 can be any clock generator circuit configuration known to those skilled in the art.
NFC标签202可以是包括天线和集成电路(IC)的芯片。在一些实施例中,NFC标签202可以是RFID标签。在另一个实施例中,NFC标签202可以是经由NFC线圈操作的微芯片或微控制器的组件。在一些实施例中,交易卡200A可以包括微芯片(例如,EMV芯片)、通信设备(例如,近场通信(NFC)天线、设备、WiFi设备)、磁条、条形码、快速响应(QR)码和/或除NFC标签202之外的或替代NFC标签202的其他设备。在一些实施例中,NFC标签202可以是按照ISO 14443标准操作的Javacard芯片的组件。NFC tag 202 may be a chip including an antenna and an integrated circuit (IC). In some embodiments, NFC tag 202 may be an RFID tag. In another embodiment, NFC tag 202 may be a component of a microchip or microcontroller operating via an NFC coil. In some embodiments, transaction card 200A may include a microchip (e.g., an EMV chip), a communication device (e.g., a near field communication (NFC) antenna, a device, a WiFi device), a magnetic stripe, a barcode, a quick response (QR) code, and/or other devices besides or alternatives to NFC tag 202. In some embodiments, NFC tag 202 may be a component of a Javacard chip operating according to the ISO 14443 standard.
在一些实施例中,NFC标签202可以存储包括永久标识符和临时标识符(也分别称为标签和加盐值)的信息。永久标识符可以包含对用户唯一的标识数字。在一些实施例中,永久标识符可以是对交易卡唯一的标识码。在另一个实施例中,永久标识符包括由NFC标签202存储的交易数据。例如,用于过去一个、两个、三个等交易的商户ID。在其他实施例中,存储的交易数据可以包括交易类型、商户ID、交易金额或其中的任何组合。临时标识符可以是附加到永久标识符的数据,例如数值。在检测到RFID读取器(例如,放置在移动设备中的RFID读取器)发出的电磁信号时,可以在NFC标签202的线圈中感应电流,从而供电使时钟发生器201发起周期,从而临时标识符按预配置的增量而增加。NFC标签202然后生成永久标识符和递增的临时标识符的加密值。在一些实施例中,加密值可以包括永久标识符和递增的临时标识符的哈希值。In some embodiments, the NFC tag 202 may store information including a permanent identifier and a temporary identifier (also referred to as a tag and a salt value, respectively). The permanent identifier may contain a unique identification number for the user. In some embodiments, the permanent identifier may be a unique identifier for a transaction card. In another embodiment, the permanent identifier includes transaction data stored by the NFC tag 202. For example, a merchant ID for one, two, three, etc., past transactions. In other embodiments, the stored transaction data may include transaction type, merchant ID, transaction amount, or any combination thereof. The temporary identifier may be data appended to the permanent identifier, such as a numerical value. Upon detection of an electromagnetic signal emitted by an RFID reader (e.g., an RFID reader placed in a mobile device), a current may be induced in the coil of the NFC tag 202, thereby powering a clock generator 201 to initiate a cycle, causing the temporary identifier to increment by a pre-configured increment. The NFC tag 202 then generates an encrypted value for the permanent identifier and the incrementing temporary identifier. In some embodiments, the encrypted value may include a hash value of the permanent identifier and the incrementing temporary identifier.
RFID发射器203可以被配置为将加密值传输到设备,例如用户设备110。RFID发射器203可以是NFC标签202的一部分,并可以被配置为响应于从读取器接收到的信号将加密值传输到RFID读取器。RFID发射器203可进一步被配置为将加密的交易卡数据传输到用户设备110。RFID transmitter 203 can be configured to transmit encrypted values to a device, such as user equipment 110. RFID transmitter 203 may be part of NFC tag 202 and can be configured to transmit encrypted values to an RFID reader in response to a signal received from a reader. RFID transmitter 203 may be further configured to transmit encrypted transaction card data to user equipment 110.
例如,参考图3A,在第一个周期中,NFC标签202可以检测来自RFID读取器的信号,其感应NFC标签202的线圈。NFC标签202可向时钟发生器201提供由上述线圈感应产生的功率(步骤301)。每个时钟周期在从NFC标签202接收到功率开始。例如,从NFC标签202接收到的功率供应可以发起时钟周期1,时钟周期2,…时钟周期n。作为响应,时钟发生器201可以将信号302返回给NFC标签202。在步骤303中,响应于信号302的接收,NFC标签202可以将计数器305递增一个值N,以产生以临时标识符C1形式的加盐值。在一些实施例中,N可以是整数值。N和/或初始计数器值对交易卡200A可能是唯一的。在步骤304中,NFC标签202然后可以将该加盐值C1(例如,计数器+N)附加到永久标识符306(例如,标签)并生成(PI+C1)的加密。NFC标签202可以存储C1作为新的计数器值。For example, referring to Figure 3A, in the first cycle, NFC tag 202 can detect a signal from an RFID reader that senses the coil of NFC tag 202. NFC tag 202 can provide power induced by the coil to clock generator 201 (step 301). Each clock cycle begins upon receiving power from NFC tag 202. For example, the power supply received from NFC tag 202 can initiate clock cycle 1, clock cycle 2, ..., clock cycle n. In response, clock generator 201 can return signal 302 to NFC tag 202. In step 303, in response to the reception of signal 302, NFC tag 202 can increment counter 305 by a value N to generate a salted value in the form of a temporary identifier C1. In some embodiments, N can be an integer value. N and/or the initial counter value may be unique to transaction card 200A. In step 304, NFC tag 202 can then append the salted value C1 (e.g., counter + N) to a permanent identifier 306 (e.g., tag) and generate an encryption of (PI + C1). The NFC tag 202 can store C1 as a new counter value.
每次NFC标签202从RFID读取器接收到信号时,重复上述过程。同时,SP设备140可以从用户设备110接收移动应用发起RFID读取器的指示。所述SP设备140可存储永久标识符、初始计数器值和递增值。SP设备140可以在每次从用户设备110接收到指示RFID读取器被发起的信息时递增计数器。当用户经由用户设备110请求认证时,设备的RFID读取器可以从RFID发射器203接收到NFC标签202产生的加密值,并将加密值发送给SP设备140。为了对用户进行认证,SP设备140可以通过将来自交易卡200A的加密值与SP设备140生成的加密值进行比较来验证加密值。The above process is repeated each time the NFC tag 202 receives a signal from the RFID reader. Simultaneously, the SP device 140 can receive an indication from the user device 110 that the mobile application has initiated the RFID reader activation. The SP device 140 can store a permanent identifier, an initial counter value, and an incrementing value. The SP device 140 can increment the counter each time it receives information from the user device 110 indicating that the RFID reader has been activated. When a user requests authentication via the user device 110, the device's RFID reader can receive the encrypted value generated by the NFC tag 202 from the RFID transmitter 203 and send the encrypted value to the SP device 140. To authenticate the user, the SP device 140 can verify the encrypted value by comparing the encrypted value from the transaction card 200A with the encrypted value generated by the SP device 140.
在一些实施例中,交易卡的计数器值可以与SP设备的计数器值不同步。例如,如果未成功读取交易卡,则用户设备110可能无法与SP设备140通信以递增计数器。然而,即使没有读取交易卡,NFC标签202也可以收到来自RFID读取器的致使计数器递增的信号。在一些实施例中,如果交易卡120未与SP设备140同步,SP设备140可以指示用户经由用户设备110向移动设备110点击卡片一定次数,从而生成一定数量的卡片的致使卡片的计数器305递增的读数。SP设备140可以确定通过执行一定数量的点击生成的加密值序列与期望的加密值序列相匹配。如果序列匹配,则SP设备140可以会使用户设备110向交易120发送指令进行重置。In some embodiments, the counter value of the transaction card may be out of sync with the counter value of the SP device. For example, if the transaction card is not successfully read, the user device 110 may not be able to communicate with the SP device 140 to increment the counter. However, even without reading the transaction card, the NFC tag 202 can receive a signal from the RFID reader causing the counter to increment. In some embodiments, if the transaction card 120 is not synchronized with the SP device 140, the SP device 140 may instruct the user to tap the card a certain number of times via the user device 110 to the mobile device 110, thereby generating a certain number of readings for the card that cause the card's counter 305 to increment. The SP device 140 may determine that the sequence of encrypted values generated by performing the certain number of taps matches a desired sequence of encrypted values. If the sequences match, the SP device 140 may cause the user device 110 to send an instruction to the transaction 120 to reset.
该系统可以包括NFC标签202和SP设备140可以不同步的周期阈值数。例如,一个无害的动作(诸如不理想的卡片放置或失败的尝试)可能导致交易卡和SP设备不同步。可以设置阈值数,只要计数器值在周期的阈值数内匹配,用户就可以被认证。在本实施例中,如果卡片的计数器值在周期阈值数内,则将卡片的计数器值设置为SP设备的当前计数器值。在另一个例子中,计数器可能由于欺诈活动而失去同步。如果计数器在周期的阈值数内不匹配,认证请求可能被拒绝,并可能向用户和/或金融服务提供商发送欺诈警报。此外,这种认证方法可以防止欺诈,因为即使永久标识符和临时标识符的加密被复制,恶意用户也无法重放复制的加密值,并且无法得到系统的认证。The system may include a periodic threshold number at which the NFC tag 202 and the SP device 140 may become out of sync. For example, a harmless action (such as an undesirable card placement or a failed attempt) may cause the transaction card and the SP device to become out of sync. A threshold number can be set so that the user can be authenticated as long as the counter value matches within the periodic threshold number. In this embodiment, if the card's counter value is within the periodic threshold number, the card's counter value is set to the current counter value of the SP device. In another example, the counter may become out of sync due to fraudulent activity. If the counter does not match within the periodic threshold number, the authentication request may be rejected, and a fraud alert may be sent to the user and/or the financial service provider. Furthermore, this authentication method can prevent fraud because even if the encryption of the permanent and temporary identifiers is copied, a malicious user cannot replay the copied encrypted value and will not be able to obtain authentication from the system.
图2B是另一个示例卡200B的示图,其可以对应于与所公开的实施例相一致的交易卡120(图1)。交易卡200B可以包括NFC标签202和RFID发射器203,以及由电源205供电的实时时钟(RTC)204。Figure 2B is a diagram of another example card 200B, which may correspond to the transaction card 120 (Figure 1) consistent with the disclosed embodiments. The transaction card 200B may include an NFC tag 202 and an RFID transmitter 203, as well as a real-time clock (RTC) 204 powered by a power supply 205.
RTC 204可以是被配置为保持精确的时间的集成电路。也就是说,RTC 204可以每秒进行一个周期,从而递增存储的时间。当NFC标签202接收到来自RFID读取器的信号时,RTC 204可以通过向NFC标签202发送时间戳来响应,从而时间戳可以附加到永久标识符。在另一个实施例中,时间戳可以附加到数值上。为了增强用户安全性,RTC 204可以为每一张交易卡设置唯一的开始时间,使得在给定时刻的时间戳对每一张卡来说都是不同的。RTC 204 can be an integrated circuit configured to maintain precise time. That is, RTC 204 can cycle once per second, thereby incrementing the stored time. When NFC tag 202 receives a signal from an RFID reader, RTC 204 can respond by sending a timestamp to NFC tag 202, thus attaching the timestamp to a permanent identifier. In another embodiment, the timestamp can be attached to a numerical value. To enhance user security, RTC 204 can set a unique start time for each transaction card, making the timestamp at a given moment different for each card.
例如,参考图3B,当接收到来自RFID读取器的读数并在NFC标签202的IC中感应电流时,NFC标签202向RTC 204发送ping 301。作为响应,RTC 204发起周期1,并向NFC标签202发送包含当前时间戳、Time 1的信号302。在步骤303中,NFC标签202将当前时间戳Time 1附加到对交易卡唯一的标识符307,以生成加盐值C1。在步骤304中,NFC标签202将C1附加到与交易卡相关联的永久标识符306上,并生成PI+C1的加密值。在一些实施例中,加密值可以是PI+C1的哈希值。在一些实施例中,时间戳本身可以是加盐值,并且可以直接附加到PI 306而不首先附加和/或添加到标识符307。所生成的加密值可以与第一个时钟周期中的永久标识符(由SP设备140所生成)和时间戳的加密值进行比较。如果加密值匹配,则用户可以被认证。交易卡200B的RTC 204和SP设备140相应的RTC可以通过同时发起这两个RTC来同步。在本实施例中,由于在任何给定的时钟周期处的临时标识符(例如,加盐值)只在一个短暂的时间段内有效,因此通过交易卡200B进行的认证是高度安全的。例如,加密的值可以在预定的时间窗口内有效,例如30秒、60秒等。在一些实施例中,为了考虑服务器时钟与RTC 204之间的漂移,系统可以接受在当前接受值之前和之后的一定数量的值。虽然使用RTC产生加盐值是高度安全的,但RTC 204需要电源205(例如,电池或其他电源)以准确地操作。For example, referring to Figure 3B, when a reading is received from an RFID reader and a current is sensed in the IC of NFC tag 202, NFC tag 202 sends a ping 301 to RTC 204. In response, RTC 204 initiates cycle 1 and sends a signal 302 containing the current timestamp, Time 1, to NFC tag 202. In step 303, NFC tag 202 appends the current timestamp Time 1 to an identifier 307 unique to the transaction card to generate a salted value C1. In step 304, NFC tag 202 appends C1 to a permanent identifier 306 associated with the transaction card and generates an encrypted value of PI+C1. In some embodiments, the encrypted value may be a hash value of PI+C1. In some embodiments, the timestamp itself may be a salted value and may be directly appended to PI 306 without first appending and/or adding to identifier 307. The generated encrypted value may be compared with the encrypted values of the permanent identifier (generated by SP device 140) and the timestamp in the first clock cycle. If the encrypted values match, the user can be authenticated. The RTC 204 of transaction card 200B and the corresponding RTC of SP device 140 can be synchronized by initiating these two RTCs simultaneously. In this embodiment, authentication via transaction card 200B is highly secure because temporary identifiers (e.g., salted values) at any given clock cycle are valid for only a short period of time. For example, encrypted values can be valid within a predetermined time window, such as 30 seconds, 60 seconds, etc. In some embodiments, to account for drift between the server clock and RTC 204, the system can accept a certain number of values before and after the currently accepted value. While using RTC to generate salted values is highly secure, RTC 204 requires power supply 205 (e.g., battery or other power source) to operate accurately.
图2C是另一个示例卡200C的图,该示例卡可以对应于与所公开的实施例一致的交易卡120(图1)。交易卡200C可以包括NFC标签202和RFID发射器203,以及由电源205(例如电池)供电的微处理器206。Figure 2C is a diagram of another example card 200C, which may correspond to the transaction card 120 (Figure 1) consistent with the disclosed embodiments. The transaction card 200C may include an NFC tag 202 and an RFID transmitter 203, as well as a microprocessor 206 powered by a power source 205 (e.g., a battery).
微处理器206可以是IntelTM生产的PentiumTM或XeonTM系列微处理器,AMDTM生产的TurionTM系列微处理器,或者Sun Microsystems生产的各种处理器的任何一种微处理器。在其他实施例中,微处理器206可以是可编程逻辑设备。微处理器206可以被配置为实现算法,使得NFC标签202存储的计数器在每个时钟周期递增不同的值。Microprocessor 206 can be any of the following: a Pentium ™ or Xeon ™ series microprocessor manufactured by Intel ™ , a Turion ™ series microprocessor manufactured by AMD ™ , or a microprocessor of various types manufactured by Sun Microsystems. In other embodiments, microprocessor 206 can be a programmable logic device. Microprocessor 206 can be configured to implement an algorithm that causes the counter stored in NFC tag 202 to increment by a different value in each clock cycle.
图3C是一系列时钟周期的简化示例。如上所述,NFC标签202在收到来自RFID读取器的信号时向微处理器206发送ping 301。微处理器206通过将算法应用的结果发送给NFC标签202的X而作出响应。例如,微处理器206可以被配置为值X除以时钟周期数。因此,在第一个时钟周期(周期1),计数器305递增X/1以生成临时标识符,例如,加盐值C1(步骤303)。在周期2,周期1期间生成的加盐值C1递增X/2以生成加盐值C2,以此类推。在每个时钟周期可以实现更复杂的算法来生成临时标识符。在步骤304中,NFC标签202将步骤303生成的加盐值附加到与交易卡相关联的永久标识符306上,并确定永久标识符306和加盐值的加密值。根据所需的复杂性,由处理器存储的算法可以直接应用于计数器305。在其他实施例中,该算法的结果可以是临时标识符C1。如上所述,通过将步骤304处生成的加密值与由SP设备140生成的期望加密值进行验证,用户可以被认证。Figure 3C is a simplified example of a series of clock cycles. As described above, NFC tag 202 sends a ping 301 to microprocessor 206 upon receiving a signal from an RFID reader. Microprocessor 206 responds by sending the result of an algorithm applied to X of NFC tag 202. For example, microprocessor 206 can be configured to divide the value X by the number of clock cycles. Thus, in the first clock cycle (cycle 1), counter 305 increments X/1 to generate a temporary identifier, such as a salted value C1 (step 303). In cycle 2, the salted value C1 generated during cycle 1 is incremented X/2 to generate a salted value C2, and so on. More complex algorithms can be implemented in each clock cycle to generate the temporary identifier. In step 304, NFC tag 202 appends the salted value generated in step 303 to a permanent identifier 306 associated with the transaction card and determines the encrypted value of the permanent identifier 306 and the salted value. Depending on the required complexity, the algorithm stored by the processor can be directly applied to counter 305. In other embodiments, the result of this algorithm can be the temporary identifier C1. As described above, the user can be authenticated by verifying the encrypted value generated in step 304 against the expected encrypted value generated by the SP device 140.
在一些实施例中,如果交易卡120与SP设备140不同步,则SP设备140可以向用户设备110发送指令,以向NFC标签202发送信号以重置计数器。在一些实施例中,可以要求用户在重置NFC标签202之前提供多个认证因素。当NFC标签202被重置时,计数器或RTC可以被设置为它的发起起始值。在其他实施例中,为了增加安全性,计数器或RTC可以设置为不同于起始值的值。在另一个实施例中,用户设备110可以向微处理器206传输新算法,或者可以改变由计数器(见图3A)增加的增量。In some embodiments, if the transaction card 120 is out of sync with the SP device 140, the SP device 140 may send a command to the user equipment 110 to send a signal to the NFC tag 202 to reset the counter. In some embodiments, the user may be required to provide multiple authentication factors before resetting the NFC tag 202. When the NFC tag 202 is reset, the counter or RTC may be set to its initiation starting value. In other embodiments, for increased security, the counter or RTC may be set to a value different from the starting value. In another embodiment, the user equipment 110 may transmit a new algorithm to the microprocessor 206, or may change the increment by which the counter (see FIG. 3A) increases.
图4是描述了使用具有多态标签的交易卡对用户进行认证的示例性过程400的流程图。Figure 4 is a flowchart illustrating an exemplary process 400 for authenticating a user using a transaction card with a polymorphic tag.
在步骤401中,系统100在SP设备140处接收来自用户设备110的认证请求。在一些实施例中,认证请求可以经由金融服务提供商的移动应用与例如购物、转账或支付相关联。金融服务提供商可以需要一个或多个因素来认证用户。认证请求可以包括识别信息(诸如用户ID、帐号等)以便将用户与交易卡关联起来。In step 401, system 100 receives an authentication request from user equipment 110 at SP device 140. In some embodiments, the authentication request may be associated with, for example, shopping, transferring funds, or making a payment via a financial service provider's mobile application. The financial service provider may require one or more factors to authenticate the user. The authentication request may include identification information (such as user ID, account number, etc.) to associate the user with a transaction card.
在步骤402中,SP设备140从存储器或数据库获得与交易卡相关联的永久标识符。在一些实施例中,永久标识符是私钥。In step 402, the SP device 140 obtains a permanent identifier associated with the transaction card from a memory or database. In some embodiments, the permanent identifier is a private key.
在步骤403中,SP设备140生成临时标识符。该临时标识符可以使用以上参照图3A-3C所述的任何方法来生成。In step 403, SP device 140 generates a temporary identifier. This temporary identifier can be generated using any of the methods described above with reference to FIG3A-3C.
在步骤404中,SP设备140生成永久标识符和临时标识符的加密。In step 404, SP device 140 generates encryption for permanent identifiers and temporary identifiers.
在步骤405中,SP设备140经由网络130接收来自用户设备110的加密值。该加密值可以经由用户设备110的RFID读取器从交易卡120中获取。In step 405, SP device 140 receives an encrypted value from user equipment 110 via network 130. This encrypted value can be obtained from transaction card 120 via RFID reader of user equipment 110.
在步骤406中,SP设备140根据接收到的加密值来验证生成的加密值。在一些实施例中,验证可以包括加密值的比较。如果值是相等的,则用户可以被认证。在一些实施例中,SP设备140可以存储与一个或多个时钟周期相关联的、最高可达时钟周期的阈值数的期望加密值。因此,在一些实施例中,如果所接收到的加密值与该值的任意一个匹配,则用户可以被认证。In step 406, SP device 140 verifies the generated encrypted value based on the received encrypted value. In some embodiments, verification may include a comparison of the encrypted values. If the values are equal, the user can be authenticated. In some embodiments, SP device 140 may store a desired encrypted value associated with one or more clock cycles, up to a threshold number of clock cycles. Therefore, in some embodiments, the user can be authenticated if the received encrypted value matches any of these values.
在步骤407中,SP设备140可以向与用户关联的移动设备传输认证命令。例如,SP设备140可以经由网络130传输致使移动设备完成需要用户认证的交易的指令。In step 407, SP device 140 may transmit an authentication command to the mobile device associated with the user. For example, SP device 140 may transmit instructions via network 130 to cause the mobile device to complete a transaction requiring user authentication.
在一些实施例中,提供了一种与金融帐户相关联并用于生成作为认证请求一部分的加密值的交易卡。所述交易卡可以包括射频发射器;与射频发射器耦合的时钟发生器,该时钟发生器被配置为响应于对从外部射频读取器设备接收到的无线读取信号而递增计数器值;并且与射频发射器耦合并存储永久标识符和计数器值的近场通信标签。近场通信标签可以被配置为响应于所接收到的读取信号,来:基于永久标识符和计数器值生成加密值;并向射频发射器提供加密值,以传输到外部射频读取器设备。In some embodiments, a transaction card is provided that is associated with a financial account and used to generate an encrypted value as part of an authentication request. The transaction card may include a radio frequency (RF) transmitter; a clock generator coupled to the RF transmitter, the clock generator being configured to increment a counter value in response to a wireless read signal received from an external RF reader device; and a near-field communication (NFC) tag coupled to the RF transmitter and storing a permanent identifier and the counter value. The NFC tag may be configured, in response to the received read signal, to: generate an encrypted value based on the permanent identifier and the counter value; and provide the encrypted value to the RF transmitter for transmission to the external RF reader device.
永久标识符可以包含私钥。A permanent identifier can contain a private key.
当时钟发生器周期开始时,射频发射器可以被配置为生成数字信号。When the clock generator cycle begins, the RF transmitter can be configured to generate a digital signal.
当时钟发生器周期开始时,时钟发生器可以被配置为将计数器值递增预配置的量。该时钟生成器还可以被配置为在时钟生成器周期开始时更新临时标识符、数值和递增的计数器值。数值可以对交易卡是唯一的。近场通信标签可以被配置为基于永久标识符、计数器值和数值来生成加密值。近场通信标签也可以被配置为在由射频发射器进行传输后存储该数值。When the clock generator cycle begins, the clock generator can be configured to increment the counter value by a pre-configured amount. The clock generator can also be configured to update the temporary identifier, the numerical value, and the incremented counter value at the start of the clock generator cycle. The numerical value can be unique to the transaction card. The NFC tag can be configured to generate an encrypted value based on the permanent identifier, the counter value, and the numerical value. The NFC tag can also be configured to store this value after transmission by the RF transmitter.
在一些实施例中,交易卡可以包括射频发射器;与射频发射器耦合的近场通信标签;以及与近场通信标签耦合并由电源供电的时钟。该时钟可以被配置为响应于从外部射频读取器设备由近场通信标签接收到的无线读取信号而向近场通信标签发送时间值。近场通信标签可以被配置为:存储永久标识符和时间值;并且响应于所接收到的读取信号,以:基于永久标识符和时间值生成加密值;并向射频发射器提供加密值,以传输到外部射频读取器设备。In some embodiments, the transaction card may include an RF transmitter; a near-field communication (NFC) tag coupled to the RF transmitter; and a clock coupled to the NFC tag and powered by a power source. The clock may be configured to send a time value to the NFC tag in response to a wireless read signal received from an external RF reader device. The NFC tag may be configured to: store a permanent identifier and a time value; and in response to the received read signal, to: generate an encrypted value based on the permanent identifier and the time value; and provide the encrypted value to the RF transmitter for transmission to the external RF reader device.
电源可以包括电池。该电源可向射频发射器或近场通信标签中的至少一个提供电源。The power source may include a battery. This power source can provide power to at least one of the radio frequency transmitter or the near-field communication tag.
时间值可以包括时钟的时间戳。时间值可以包括时间戳和对交易卡唯一的数值。时间值可以仅在预配置的时间段内有效。The time value can include a clock timestamp. The time value can include a timestamp and a value unique to the transaction card. The time value can be valid only for a pre-configured time period.
在另一个实施例中,交易卡可以包括:射频发射器;与射频发射器耦合的近场通信标签;以及与近场通信标签耦合并由电源供电的微处理器。微处理器可以被配置为响应于从外部射频读取器设备接收到的无线读取信号而计算更新值。近场通信标签可以被配置为:存储永久标识符和更新值,并响应于收到的读取信号:基于永久标识符和更新值生成加密值,并向射频读取器提供加密值,以传输到外部射频发射器读取器设备。In another embodiment, the transaction card may include: an RF transmitter; a near-field communication tag coupled to the RF transmitter; and a microprocessor coupled to the near-field communication tag and powered by a power source. The microprocessor may be configured to calculate an updated value in response to a wireless read signal received from an external RF reader device. The near-field communication tag may be configured to: store a permanent identifier and an updated value, and in response to the received read signal: generate an encrypted value based on the permanent identifier and the updated value, and provide the encrypted value to the RF reader for transmission to the external RF transmitter reader device.
近场通信标签可以被配置成在射频发射器传输时基于更新值生成临时标识符。Near-field communication tags can be configured to generate temporary identifiers based on updated values during radio frequency transmitter transmission.
微处理器可进一步配置以在随后的传输之间改变更新值。该更新值可以基于算法来计算。该算法可以对交易卡是唯一的。The microprocessor can be further configured to change the updated value between subsequent transfers. This updated value can be calculated based on an algorithm. This algorithm can be unique to the transaction card.
该交易卡可以进一步包括与微处理器耦合的存储器组件。The transaction card may further include a memory component coupled to the microprocessor.
本公开的示例性实施例描述了用于对具有包含多态标签的交易卡的用户进行认证的系统和方法。提出上述描述是为了说明的目的。它不是详尽的,也不限于本公开的精确形式或实施例。通过考虑所公开的实施例的说明书和实践,对实施例的修改和适应是明显的。例如,所述实施方式包括硬件和软件,但与本公开一致的系统和方法可以单独作为硬件实现。Exemplary embodiments of this disclosure describe systems and methods for authenticating users having transaction cards containing polymorphic tags. The above description is provided for illustrative purposes. It is not exhaustive, nor is it limited to the precise form or embodiments of this disclosure. Modifications and adaptations to the embodiments will be apparent from consideration of the specification and practice of the disclosed embodiments. For example, the implementations include hardware and software, but systems and methods consistent with this disclosure may be implemented solely as hardware.
基于本说明书的书面描述和方法的计算机程序在软件开发人员的技能范围内。各种程序或程序模块可以使用各种编程技术创建。例如,程序部分或程序模块可以用Java、C、c++、汇编语言或任何这类编程语言来设计或借助于这些语言来设计。一个或多个这样的软件部分或模块可以集成到计算机系统、计算机可读介质或现有的通信软件中。Computer programs based on the written descriptions and methods in this specification are within the skill level of software developers. Various programs or program modules can be created using a variety of programming techniques. For example, program parts or modules can be designed or designed using Java, C, C++, assembly language, or any such programming language. One or more such software parts or modules can be integrated into a computer system, a computer-readable medium, or existing communication software.
此外,虽然本文已经描述了说明性实施例,但该范围包括具有基于本公开的等价元素、修改、遗漏、组合(例如,跨不同实施例的方面)、适应或变更的任何和所有实施例。根据权利要求中所使用的语言对权利要求中的元素进行广义的解释,而不限于本说明书或在本申请的进行过程中所述的示例,其中这些示例应解释为非排他性的。此外,本公开的方法中的步骤可以以任何方式(包括通过重新排序步骤或插入或删除步骤)修改。Furthermore, while illustrative embodiments have been described herein, the scope includes any and all embodiments having equivalent elements, modifications, omissions, combinations (e.g., aspects across different embodiments), adaptations, or variations based on this disclosure. The language used in the claims is interpreted broadly, not limited to the examples described in this specification or in the course of this application, wherein such examples should be interpreted as non-exclusive. Moreover, the steps in the methods of this disclosure can be modified in any way, including by reordering steps or inserting or deleting steps.
此外,尽管所公开的实施例的各个方面被描述为与存储在存储器和其他有形的计算机可读存储介质中的数据相关联,但本领域的技术人员将理解这些方面也可以被存储在许多类型的非暂时性计算机可读介质上并被执行,诸如二级存储设备,如硬盘、软盘、CD-ROM或其他形式的RAM和ROM。Furthermore, although the various aspects of the disclosed embodiments are described as being associated with data stored in memory and other tangible computer-readable storage media, those skilled in the art will understand that these aspects can also be stored on and performed on many types of non-transitory computer-readable media, such as secondary storage devices, like hard disks, floppy disks, CD-ROMs, or other forms of RAM and ROM.
因此,本说明书和示例意图仅被认为是示例,其真正的范围和精神由所述权利要求及其等价物的全部范围所表示。Therefore, this specification and examples are intended to be illustrative only, and their true scope and spirit are indicated by the full scope of the claims and their equivalents.
Claims (10)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/014,542 | 2018-06-21 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK40120918A true HK40120918A (en) | 2025-08-29 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7748423B2 (en) | Systems and methods for secure read-only authentication | |
| US12125021B2 (en) | Devices and methods for selective contactless communication | |
| CN113014400B (en) | Secure authentication of users and mobile devices | |
| US12505429B2 (en) | Authentication using non-fungible token as proof of account ownership | |
| KR102574524B1 (en) | Remote transaction system, method and point of sale terminal | |
| US12206801B2 (en) | Digital identity authentication system and method | |
| US12399758B2 (en) | Mobile application integration | |
| WO2017118923A1 (en) | Methods and devices for authentication of an electronic payment card using electronic tokens | |
| US20210035107A1 (en) | Secure authentication system and method | |
| WO2020058861A1 (en) | A payment authentication device, a payment authentication system and a method of authenticating payment | |
| HK40120918A (en) | Systems and methods for secure read-only authentication | |
| HK40048471B (en) | Systems and methods for secure read-only authentication | |
| HK40048471A (en) | Systems and methods for secure read-only authentication | |
| CA3186186A1 (en) | Authentication using non-fungible token as proof of account ownership |