WO2002073337A2 - Systems and methods for providing smart card interoperability - Google Patents
Systems and methods for providing smart card interoperability Download PDFInfo
- Publication number
- WO2002073337A2 WO2002073337A2 PCT/US2002/005100 US0205100W WO02073337A2 WO 2002073337 A2 WO2002073337 A2 WO 2002073337A2 US 0205100 W US0205100 W US 0205100W WO 02073337 A2 WO02073337 A2 WO 02073337A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- token
- tokens
- service
- service provider
- provider module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
Definitions
- the invention relates to portable data storage devices in general, and to token devices in particular.
- a token may be used to store and carry cryptographic keys and certificates that support user identity authentication.
- tokens including smart cards, subscriber identity module (SIM) tokens, universal serial bus (USB) tokens, Personal Computer Memory Card International Association (PCMCIA) cards, and IBUTTONSTM / JAVA RINGSTM.
- SIM subscriber identity module
- USB universal serial bus
- PCMCIA Personal Computer Memory Card International Association
- IBUTTONSTM / JAVA RINGSTM IBUTTONSTM / JAVA RINGSTM.
- Various physical characteristics of a token may be established by a predetermined standard such as, for example, the ISO 7816-1 standard entitled "ID Cards - ICC, Part 1 - Physical Characteristics.”
- a token will contain at least a memory.
- Tokens may include various memory sizes such as, for example, 512 bytes, 1 K, 2K, 4K, 6K, 8K, 10K and 64K of EEPROM.
- Conventional tokens usually include a processor in addition to the memory.
- Tokens may include various types of processors such as, for example, 8-bit processors, 16-bit processors, and 32-bit processors.
- tokens have been made using various processors, including the MOTOROLATM 6805 processor, the INTELTM 8051 processor, and the HITACHITM H8 processor.
- Tokens may also include additional processors such as, for example, a math coprocessor or a cryptographic coprocessor.
- additional processors such as, for example, a math coprocessor or a cryptographic coprocessor.
- Various physical characteristics of a processor for a token may be established by a predetermined standard such as, for example, the ISO 7816-2 standard entitled "ID Cards - ICC Part 2 - Dimension and locations of Chip.”
- Each manufacturer may select the token architecture, the processor, and the memory without regard to compatibility with tokens made by other manufacturers.
- various operating system programs are available for tokens including, for example, JAVACARDTM, JAVA VIRTUAL MACHINETM, SMART CARDS FOR WINDOWSTM, MPCOSTM, STARCOSTM, and MULTOSTM.
- various tokens support different programming languages, including MELTM, JAVATM, C, C++, Assembler Language, and VISUAL BASICTM.
- devices for accessing tokens made by one manufacturer may be incompatible with tokens made by another manufacturer.
- PCMCIA cards such as the National Security Agency (NSA) FORTEZZATM Crypto Card, SIM tokens, USB tokens, and IBUTTONS / JAVA RINGSTM each use different electrical contact interfaces.
- the interface for accessing a token may be established by a predetermined standard such as, for example, the ISO 7816-3 standard entitled "ID Cards - ICC, Part 3 - Electronic Signal and Transmission Protocols.” Consequently, devices for accessing one type of token may be unable to access another type of token.
- Other tokens such as, for example, contact-less smart cards may be accessed using transmitted signals such as radio signals or optical signals.
- the interface for accessing a contact-less token may be established by a predetermined standard such as the ISO 14443 standard entitled "Contactless Integrated Circuit Cards” which is incorporated herein by reference. Because the signals are transmitted, the information exchanged with the token may be intercepted.
- Tokens may contain privileged information such as, for example, information used to identify a person.
- Application programs that exchange privileged information with a token may be required to comply with a predetermined security standard such as the National Security Agency standard entitled “Guidelines for Placing Biometrics in Smart Cards;” the FIPS 140-1 standard entitled “Security Requirements for Cryptographic Modules;” the FIPS 180-1 standard entitled “Secure Hash Standards;” the FIPS 186-2 standard entitled “Digital Signature Standards;” and the National Institute of Standards and Technology standard entitled “Smart Card Protection Profile.” Each of these standards is incorporated herein by reference.
- the token may contain information that a person knows, such as a personal identification number, a password, or a memory phrase.
- the token may contain information that identifies a physical characteristic of the person that is difficult to change, such as biometric data.
- possession of tokens such as a magnetic stripe card, a physical key, or a smart card may serve to identify the person. Consequently, application programs may exchange information with the token using a cryptograph ically secure protocol and store the information to the token in an encrypted form to prevent interception or recovery of the privileged information.
- the present invention provides a system for improving the interoperability of tokens. This is achieved by defining a model for a token Service Provider Module (SPM) that provides a basic services interface (BSI) to application programs that access the tokens.
- SPM token Service Provider Module
- BSI basic services interface
- the BSI may include interoperable logical access control, physical access control, cryptography and biometrics services between the application program and the token.
- the BSI may provide predetermined services and a corresponding services interface common to all SPMs.
- the SPM may receive a request from the application program for a service selected from a predetermined set of services and then determine whether the token supports the requested service. If the SPM determines that the token does not support the requested service, then it may provide information indicating an error to the application program. Otherwise, the SPM may process the request for service using the token.
- Methods and systems consistent with one aspect of the present invention may provide interoperability between an application program and a token using a service provider module, comprising: receiving at the service provider module a request for a service selected from a predetermined set of services, wherein the service provider module is configured to communicate with a plurality of types of tokens; determining, at the service provider module, whether the token supports the requested service; and providing information indicating an error to the application program in response to a determination that the token does not support the requested service.
- Methods and systems consistent with another aspect of the present invention may provide interoperability between an application program and a token using a service provider module, comprising: a first interface configured to receive at the service provider module a request for a service selected from a predetermined set of services, wherein the service provider module is configured to communicate with a plurality of types of tokens; logic configured to determine, at the service provider module, whether the token supports the requested service; and logic configured to provide information indicating an error to the application program in response to a determination that the token does not support the requested service.
- Methods and systems consistent with yet another aspect of the present invention may provider interoperability between an application program and a token using a service provider module, comprising: means for receiving at the service provider module a request for a service selected from a predetermined set of services, wherein the service provider module is configured to communicate with a plurality of types of tokens; means for determining, at the service provider module, whether the token supports the requested service; and means for providing information indicating an error to the application program in response to a determination that the token does not support the requested service.
- a computer program product consistent with yet another aspect of the present invention may provide for interfacing an application program to a token, the computer program product comprising: code for receiving at the service provider module a request for a service selected from a predetermined set of services, wherein the service provider module is configured to communicate with a plurality of types of tokens; code for determining, at the service provider module, whether the token supports the requested service; and code for providing information indicating an error to the application program in response to determining that the token does not support the requested service.
- FIG. 1 is a general block diagram of an exemplary architecture for interfacing an application to a token in which methods and systems consistent with the present invention may be implemented;
- FIG. 2 shows an exemplary architecture for a token in accordance with methods and systems consistent with the present invention
- FIG. 3 is a general block diagram of services provided by a Basic Services Interface in accordance with methods and systems consistent with the present invention
- FIG. 4 shows an exemplary set of utility service commands that may be provided by a BSI in accordance with methods and systems consistent with the present invention
- FIG. 5 shows an exemplary set of access control rules that a Basic Services Interface may support in accordance with methods and systems consistent with the present invention
- FIG. 6 shows an exemplary set of response values that a Basic Services Interface may issue in response to a request in accordance with methods and systems consistent with the present invention
- FIGs. 7A-C are flowcharts showing an exemplary set of transactions between an application program, a Basic Services Interface, a token reader, and a token in accordance with methods and systems consistent with the present invention
- FIG. 8 is a flowchart of a process for interfacing a service provider module to a token in which methods and systems consistent with the present invention may be implemented.
- FIG. 9 is a general block diagram of an alternative exemplary architecture for interfacing a service provider module to a token in which methods and systems consistent with the present invention may be implemented.
- a service provider module may receive a request for a service, selected from a predetermined set of services, from the application program. The SPM may then determine whether the token supports the requested service. If the SPM determines that the token does not support the requested service, then it may provide information indicating an error to the application program. Otherwise, the SPM may process the request for service using the token.
- application programs may be generated that are interoperable with various tokens, without requiring that the application program incorporate code for interfacing with each type of token.
- Typical application programs for tokens may include a broad range of services including, for example, physical access control, logical access control, property passes, medical record storage, cash equivalent storage, attendance monitoring, training record storage, miscellaneous information storage, and secure storage of certificates such as biometric access information.
- Token applications for physical access control may provide, for example, positive accounting for personnel, controlled access to a secure building or area, automatic generation of an audit log, and controlled access to sensitive spaces.
- Token applications for logical access control may provide, for example, computer security, data security, user authentication, non-repudiation of credentials, and encrypted data transmission.
- token applications for logical access control may eliminate a need to memorize personal identification numbers (PINs) and may use biometrics for extra security. Because credentials stored on a token are portable, the token may be used to identify an individual's security clearances and authorization to access sensitive information or use equipment.
- PINs personal identification numbers
- Token applications for property passes may provide, for example, a positive record of equipment issued, reducing loss potential and increasing property accountability.
- the positive record may provide an electronic audit trail without requiring a paper trail, which may eliminate repetitious property tracking and save time when exiting a building.
- a token property pass application may provide an audit trail for take-home equipment, as well as a reminder of property issued to the employee during his/her employment.
- Token applications may be used, for example, to contain medical information, reducing data entry and paper handling and enhancing the accuracy of patient information.
- a medical record token may provide immediate access to medical information and reduce the time required to create medical reports and maintain the medical information securely, while ensuring a patient's privacy and providing enhanced portability.
- the medical records may be used to prevent drug interaction, to provide drug batch control, and to prevent drug treatment overlap.
- Medical information tokens may further provide a convenient storage to carry information regarding the patient's current or last treatment as a reference, or may be used to store immunization records.
- Token applications may be used, for example, to provide stored value cash equivalents to reduce handling of cash transactions and reduce potential for crime.
- a token application may be used to eliminate a need for coins, to provide rewards for increased usage, to restrict use, to provide cash reimbursement, to record expenditures, to eliminate the need to carry cash, to provide electronic currency exchange as needed, and to capture customer demographics for improving delivery of products and services.
- Token applications may help to increase personal security, and may permit reloads from an automated teller machine or an on-line banking system.
- Token applications may be used, for example, to automate monitoring of attendance at an event or activity. Tokens may be used to register for the event, to capture e-mail addresses of the attendees, to generate accurate records and ensure complete capture of the attendees, and to reduce time and shorten waiting lines. Captured information may be used to create a database, which may be transferred to other applications.
- FIG. 1 shows a general block diagram of an exemplary architecture for interfacing an application to a token in which methods and systems consistent with the present invention may be implemented.
- An application program 1000 may communicate with a Service Provider Module (SPM) 1020 through a Basic Services Interface (BSI) 1010.
- SPM 1020 may include, for example, a token 1060, a token reader 1050 for interfacing to token 1060, a token-edge interface 1040 for accessing hardware in token reader 1050, as well as service provider software 1030 corresponding to token reader 1050 and token 1060.
- SPM Service Provider Module
- BSI Basic Services Interface
- FIG. 2 shows an exemplary architecture for token 1060 in accordance with methods and systems consistent with the present invention.
- Token 1060 may include a physical interface 2010 used to exchange signals between token 1060 to token reader 1050.
- Physical interface 2010 may include an electrical contact interface such as a smart card interface, a subscriber identity module (SIM) interface, a universal serial bus (USB) interface, a Personal Computer Memory Card International Association (PCMCIA) card interface, or an IBUTTON / JAVA RINGTM interface.
- physical interface 2010 may include a contact-less interface such as, for example, a contact-less smart card interface using radio or optical signals.
- Token 1060 may also include a processor 2020 and a memory 2030.
- Memory 2030 may include a plurality of storage types such as read-write memory (RAM) 2040, read-only memory (ROM) 2050, or electrically-erasable programmable read-only memory (EEPROM) 2060.
- the processor 2020 may be coupled to interface 2010 and memory 2030 using an electrical bus 2070.
- token 1060 may include a sensor 2080 such as, for example, a biomethc sensor.
- token 1060 may include a coprocessor 2090 such as, for example, a math coprocessor or a cryptographic coprocessor.
- application program 1000 may transmit the information in an encrypted format so that the information cannot be intercepted or recovered from token 1060 by an unauthorized user.
- application program 1000 must determine whether token 1060 and token reader 1050 support exchanging information according to a secure cryptographic algorithm such as, for example, an Advanced Encryption Standard (AES) protocol, a Data Encryption Standard (DES) protocol, a Digital Signature Standard (DSS) protocol, a triple-DES protocol, an RSATM protocol, or a Key Exchange Algorithm (KEA) protocol.
- AES Advanced Encryption Standard
- DES Data Encryption Standard
- DSS Digital Signature Standard
- Triple-DES RSATM protocol
- KAA Key Exchange Algorithm
- Application program 1000 may determine whether token reader 1050 and token 1060 support a desired cryptographic algorithm by issuing a request to BSI 1010.
- FIG. 3 is a general block diagram of services provided by BSI 1010 in accordance with methods and systems consistent with the present invention.
- BSI 1010 may be established as a layer between application program 1000 and SPM 1020 to insulate application program 1000 from implementation-specific details of token reader 1050 and token 1060.
- BSI 1010 may provide interoperable logical access control, physical access control, cryptography and biometrics services between application program 1000 and token 1060.
- BSI 1010 may provide a standard set of predetermined services and a corresponding services interface common to all SPMs, providing access to the token in a manner which is transparent to application program 1000.
- the BSI 1010 may include a utility services module 3010, a generic container services module 3020, and a cryptographic services module 3030.
- the utility services module 3010 may include services for detecting a token reader, detecting whether a token is coupled to the reader, and monitoring the status of the token.
- FIG. 4 shows an exemplary set of utility service commands that may be provided by the BSI 1010 in accordance with methods and systems consistent with the present invention.
- the generic container services module 3020 may include services for creating, deleting, reading, writing, and updating a collection of data items stored on token 1060. Each collection of data items may be stored in a container on the token 1060, and each container on token 1060 may be uniquely identified by a tag. Access to each container may be restricted according to an access rule.
- FIG. 5 shows an exemplary set of access control rules that BSI 1010 may support in accordance with methods and systems consistent with the present invention.
- Application program 1000 may access a data item on token 1060 by requesting the data item and providing the information required by an access rule corresponding to the container. SPM 1060 may then provide a response value indicating whether the request was successful.
- FIG. 6 shows an exemplary set of response values that a BSI 1050 may issue in response to a request in accordance with methods and systems consistent with the present invention.
- FIGs. 7A-C are flowcharts showing an exemplary set of transactions between application program 1000, BSI 1010, token reader 1050, and token 1060.
- application program 1000 may issue a GetBSIVersionQ request to BSI 1010 to determine the version of an implementation of BSI 1010; BSI 1010 may provide a response with a BSI OK value to indicate that the request was successfully processed (Step 7010).
- application program 1000 may issue a GetReaderListQ request to BSI 1010 to determine whether at least one token reader 1050 is available.
- SPM 1020 may identify each available token reader 1050 through token-edge interface 1040.
- SPM 1020 may load appropriate Service Provider Software (SPS) such as driver software, and communicate with each token reader 1050 through token-edge interface 1040.
- SPS Service Provider Software
- SPM 1020 may determine the status of each token reader 1050 and then BSI 1010 may provide a response with a BSI OK value to indicate that the request was successfully processed (Step 7020).
- SPS Service Provider Software
- application program 1000 may issue a GetTokenStatusQ request to BSI 1010 to determine whether token reader 1050 is coupled to token 1060. If token reader 1050 indicates that it is not coupled to token 1060, then BSI 1010 may provide a response with a BSI_TOKEN_NOT_PRESENT value to indicate that token 1060 is not available (Step 7030). Application program 1000 may issue additional GetTokenStatusQ requests to BSI 1010 to determine when token reader 1050 becomes coupled to token 1060. When token reader 1050 indicates that it is coupled to token 1060, then BSI 1010 may provide a response with a BSI_OK value to indicate that token 1060 is available (Step 7040).
- application program 1000 may issue a TokenConnectQ request to BSI 1010 to establish communication with token 1060 and BSI 1010 may provide a response with a BSI_OK value to indicate that a communication session has been established with token 1060 (Step 7050).
- Application program 1000 may issue a GetTokenPropertiesQ request to determine token-specific features, such as whether token 1060 supports a cryptographic communication protocol (Step 7060).
- Application program 1000 may also issue a GetContainerPropertiesQ request to BSI 1010 to determine what information is stored on token 1060 and what access protocols are supported to provide access to the stored information (Step 7070).
- Application program 1000 may then issue an AcquireContext() request to BSI 1010 to establish a cryptographically secure communication session, according to the determined access rules, with token 1060 (Step 7080).
- application program 1000 may create, read, update, and write data items to token 1060 by issuing one or more PassThruQ requests (Step 7090).
- Application program 1000 may then terminate the cryptographically secure communication session by issuing a ReleaseContextQ request (Step 7100).
- application program 1000 may end the communication session with token 1060 by issuing a TokenDisconnectQ request (Step 7110), after which token 1060 may be safely decoupled from token reader 1050.
- FIG. 8 is a flowchart of a process for interfacing SPM 1020 to token 1060 in which methods and systems consistent with the present invention may be implemented. As shown in FIG. 8, communication may be established using only SPM 1020 and token 1060. A transaction between SPM 1020 and token 1060 may be established by establishing a connection between SPM 1020 and token 1060.
- a vending machine may incorporate SPM 1020 to accept payment from cash-equivalent storage on token 1060.
- a customer may request a product or service from the vending machine by connecting token 1060 to SPM 1020, such as by placing a contact-less token 1060 near SPM 1020.
- the vending machine may then establish a communication session, determine whether token 1060 has sufficient stored cash equivalent to purchase a product, debit the cash equivalent storage on token 1060, and provide the product or service to the customer.
- FIG. 9 is a general block diagram of an alternative exemplary architecture for interfacing a service provider module to a token in which methods and systems consistent with the present invention may be implemented.
- Application program 1000, BSI 1010, Service Provider Software 1030, token-edge interface 1040, and token reader 1050 may be incorporated within SPM 1020.
- the present invention also relates to computer readable media that include program instructions or program code for performing various computer-implemented operations based on the methods and processes of the invention.
- the media and program instructions may be those specially designed and constructed for the purposes of the invention, or they may be of the kind well-known and available to those having skill in the computer software arts.
- Examples of program instructions include micro-code, machine code, such as produced by a compiler, and files containing a high-level code that can be executed by the computer using an interpreter.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Finance (AREA)
- Mobile Radio Communication Systems (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2002247177A AU2002247177A1 (en) | 2001-03-07 | 2002-03-07 | Systems and methods for providing smart card interoperability |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US27331701P | 2001-03-07 | 2001-03-07 | |
| US60/273,317 | 2001-03-07 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2002073337A2 true WO2002073337A2 (en) | 2002-09-19 |
| WO2002073337A3 WO2002073337A3 (en) | 2002-11-07 |
Family
ID=23043430
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2002/005100 Ceased WO2002073337A2 (en) | 2001-03-07 | 2002-03-07 | Systems and methods for providing smart card interoperability |
Country Status (2)
| Country | Link |
|---|---|
| AU (1) | AU2002247177A1 (en) |
| WO (1) | WO2002073337A2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2129172A1 (en) * | 2008-05-30 | 2009-12-02 | Gemplus | A method, a token and a system for processing a service |
| CN109743338A (en) * | 2019-03-21 | 2019-05-10 | 深圳市网心科技有限公司 | Verification method, system, server and readable storage medium for automatic login |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6385729B1 (en) * | 1998-05-26 | 2002-05-07 | Sun Microsystems, Inc. | Secure token device access to services provided by an internet service provider (ISP) |
| US6418420B1 (en) * | 1998-06-30 | 2002-07-09 | Sun Microsystems, Inc. | Distributed budgeting and accounting system with secure token device access |
-
2002
- 2002-03-07 AU AU2002247177A patent/AU2002247177A1/en not_active Abandoned
- 2002-03-07 WO PCT/US2002/005100 patent/WO2002073337A2/en not_active Ceased
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2129172A1 (en) * | 2008-05-30 | 2009-12-02 | Gemplus | A method, a token and a system for processing a service |
| WO2009144292A1 (en) * | 2008-05-30 | 2009-12-03 | Gemalto Sa | A method, a token and a system for processing a service |
| CN109743338A (en) * | 2019-03-21 | 2019-05-10 | 深圳市网心科技有限公司 | Verification method, system, server and readable storage medium for automatic login |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2002247177A1 (en) | 2002-09-24 |
| WO2002073337A3 (en) | 2002-11-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shelfer et al. | Smart card evolution | |
| US6510983B2 (en) | System and method for transferring value to a magnetic stripe on a transaction card | |
| US6145739A (en) | System and method for performing transactions and an intelligent device therefor | |
| US5682027A (en) | System and method for performing transactions and a portable intelligent device therefore | |
| US8151345B1 (en) | Self-authorizing devices | |
| US20180039987A1 (en) | Multi-function transaction card | |
| US20030154355A1 (en) | Methods and apparatus for providing a memory challenge and response | |
| CA2365644A1 (en) | Portable electronic charge and authorization devices and methods therefor | |
| JPH0622030B2 (en) | Transaction validity confirmation method | |
| WO2002063825A2 (en) | An optical storage medium for storing a public key infrastructure (pki)-based private key and certificate, a method and system for issuing the same and a method for using such | |
| KR101968156B1 (en) | Mobile terminal, transaction terminal, and method for carrying out a transaction at a transaction terminal by means of a mobile terminal | |
| US20020046186A1 (en) | Electronic purse system having a double-structured purse, ic card applicable to the electronic purse system, ic card transaction apparatus having a double-structured purse, ic card transaction system having a double-structured purse, and ic card applicable to the | |
| US7210621B2 (en) | Secure credit card and method and apparatus for utilizing the same | |
| CN101236673A (en) | Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier | |
| US7433848B1 (en) | System for carrying out a transaction | |
| WO2002095645A1 (en) | The kiosk system for combined perscriptional publishing, electronic transfer and cd(cash dispenser) | |
| JPH1131190A (en) | Electronic money card, electronic money depositing and dispensing machine, and electronic money card editing device | |
| WO2002073337A2 (en) | Systems and methods for providing smart card interoperability | |
| JP2000172798A (en) | Electronic money system components | |
| JPH10334197A (en) | Simple password input device | |
| AU2020101940A4 (en) | IoT-Based Micropayment Protocol for Wearable Devices with Biometric Verification | |
| JP2004287805A (en) | Child card issuing system and child card use system | |
| KR100819568B1 (en) | IC card storage information exchange method and system and program recording medium therefor | |
| JPWO2002075676A1 (en) | Automatic transaction apparatus and transaction method therefor | |
| EP0961241A2 (en) | Multi-memory technology smart card personal banking system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |
|
| WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |