WO2006120365A1 - Transactions securisees a l'aide d'un ordinateur personnel - Google Patents
Transactions securisees a l'aide d'un ordinateur personnel Download PDFInfo
- Publication number
- WO2006120365A1 WO2006120365A1 PCT/GB2005/001770 GB2005001770W WO2006120365A1 WO 2006120365 A1 WO2006120365 A1 WO 2006120365A1 GB 2005001770 W GB2005001770 W GB 2005001770W WO 2006120365 A1 WO2006120365 A1 WO 2006120365A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secure
- user
- transaction
- operating environment
- computer
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 69
- 230000015654 memory Effects 0.000 claims abstract description 63
- 230000008569 process Effects 0.000 claims abstract description 46
- 230000008859 change Effects 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 6
- 230000007246 mechanism Effects 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 238000007639 printing Methods 0.000 claims description 3
- 230000006978 adaptation Effects 0.000 claims description 2
- 230000000694 effects Effects 0.000 claims description 2
- 230000003287 optical effect Effects 0.000 claims 2
- 238000004519 manufacturing process Methods 0.000 claims 1
- 101150010802 CVC2 gene Proteins 0.000 abstract description 10
- 238000013475 authorization Methods 0.000 abstract description 7
- 230000004044 response Effects 0.000 abstract description 7
- 238000001650 pulsed electrochemical detection Methods 0.000 description 14
- 230000006266 hibernation Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 5
- 238000012552 review Methods 0.000 description 4
- 238000003825 pressing Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000796 flavoring agent Substances 0.000 description 2
- 235000019634 flavors Nutrition 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008707 rearrangement Effects 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 description 1
- 241000178041 Ceropegia media Species 0.000 description 1
- YTAHJIFKAKIKAV-XNMGPUDCSA-N [(1R)-3-morpholin-4-yl-1-phenylpropyl] N-[(3S)-2-oxo-5-phenyl-1,3-dihydro-1,4-benzodiazepin-3-yl]carbamate Chemical compound O=C1[C@H](N=C(C2=C(N1)C=CC=C2)C1=CC=CC=C1)NC(O[C@H](CCN1CCOCC1)C1=CC=CC=C1)=O YTAHJIFKAKIKAV-XNMGPUDCSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 239000000605 aspartame Substances 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000005370 isotopic spin Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Definitions
- the invention relates to secure transactions such as PIN based transactions, where the
- PIN Personal Identification Number
- An ATM transaction is an example of PIN based transactions.
- the invention relates to electronic transactions that are made on a computer trusted by the user to be physically secure yet not trusted to be logically secure due to the possibility of malicious software that may exist on that computer.
- the electronic transaction itself can be of any kind, including but not limited to making orders, payments, voting, stocks trading ... etc.
- Any personal a PC or notebook at home or in office is usually trusted by the user to be physically secure yet not trusted to be logically secure due to the possibility of malicious software that may exist on that computer.
- the user can normally validly assume that no malicious hardware, designed for example to steal his confidential data, is implanted on his computer, but he can never be sure that there is no hidden malicious software, sent by a hacker for example, is actually running on his computer.
- Statistics show that most PCs connected to the Internet are eventually infected with critical malicious software, like spy ware and Trojan horses.
- a PIN Entry Device is a device used in securing the entry and processing of the PIN of the user. It needs to have a keypad, a display, storage and processing capabilities. The keypad-like device found beside merchant POS machines for the use by the cardholder to enter his PIN is an example of a PED.
- a transaction terminal is the system used to initiate the transaction. It should have a PED if PIN- based transactions are to be supported on this transaction terminal.
- PIN based transactions enjoy very high security due to the very well established technical standards that support it. Also the market has responded by implementing the standards and making available Hardware Security Modules, HSMs, for physically securing the server side part of PIN-based transactions and PIN Entry Devices, PEDs, for securing the client side part. In most critical environments, like banks and governments, only certified HSMs and PEDs are used.
- HSMs Hardware Security Modules
- PEDs PIN Entry Devices
- One result of this well established field is the possibility of assuming non-repudiation and putting the liability of the PIN on the user. This is because the whole system for PIN based transactions is based on well established standards of well proven security that need not to be verified every time there is a dispute, the only thing needed is to verify that the standards are taking place in the system.
- the PIN entered in PIN based transactions is either a PIN to be verified against an offset in the server side, or it is a PIN that unlocks the access to a smartcard,
- the PIN Entry Device is a secure device that captures and processes the PIN. It should have a display to present transaction details on its screen in order to allow the user to review what he is about to authorise by entering his PIN. After the PIN is entered, the PED immediately processes it, either by encrypting it to from an Encrypted PIN Block, or by using it to enable access to a smartcard that would create a transaction cryptogram or a digital signature for the transaction.
- Transaction cryptogram is a sort of digital signature, but based on symmetric keys and utilising the Derived Unique Keys (DUK) method for key agreement; it is used mainly in the EMV standard to authorise the transaction.
- DPK Derived Unique Keys
- the PIN Entry Device is also able to create and verify Message Authentication Codes, MAC.
- MAC Message Authentication Codes
- the details of these operations are well defined by national and international standardisation bodies like ANSI and ISO. Also, the national and the international institutions that rely on PIN based transactions further enforce the standards by putting their detailed specifications and minimum requirements on the security of PIN Entry Devices. Like the VISA PED Security Requirements.
- a transaction terminal is a device or system that initiates a transaction. In known forms it must include or interact with a PED if it should support PIN based transactions. It provides the interface to the acquirer's host. The clearest example is the POS terminal with an external PIN pad; in this case the PIN pad is the secure PED.
- An ATM machine is also a transaction terminal, but it has the PED integrated in the transaction terminal itself, because there is no separate screen for the PED of the ATM machine. The whole ATM machine is considered as both a transactional terminal and a PED.
- Security from malicious software, like Trojan horses, software key loggers and viruses is either by software or by avoiding the PC altogether and using an external device for entering the highly critical information, like the PIN.
- the hardware solution could be very secure, but what prohibits it from spreading to most PC users is its high cost.
- a good example of a hardware solution is the smartcard reader with a PIN pad integrated in the smartcard reader itself; the PIN is never sent to the host computer, it is sent directly to the smartcard.
- This integrated PIN pad adds a very high value to security because without it, i.e. using a normal smartcard reader that does not have an integrated PIN pad, a malicious software can capture the PIN from the keyboard of the PC and every time it detects that the smartcard is inserted, it would maliciously use it to make fraudulent transactions, as many times as it wishes but when the smartcard reader has an integrated PIN pad on it, this can never happen.
- the hardware solution to this attack has been to integrate a small screen on the smartcard reader in addition to the PIN pad.
- the smartcard reader displays what is actually going to be signed. Of course this makes the smartcard reader more expensive; but without this secure screen on the smartcard reader, the malicious software can make a fraudulent transaction each time the user tries to make a transaction.
- the Internet is a public network and people other than the card holder and the merchant can capture the packets passing between them and get the credit card number and use if for fraudulent use.
- the best solution that solved this network sniffing problem was the Secure Socket Layer or SSL, which is now integrated in most web browsers.
- the second problem is that, the credit card number and the expiration date are not really confidential. Any physical merchant will have the credit card number and the expiration date of the credit card written on the receipt and if he is malicious, he could use it to make fraudulent Internet transactions. This fraud happens even with card holders who never use the Internet altogether.
- CVV2 or CVC2 or the like which is a three or four digits number on the back of credit cards, to be entered in internet transactions and should not be saved by merchants in the database.
- the Address Verification System where the card holder must enter his billing address to be verified by the bank in order to make sure that the legitimate card holder is the one who is actually making the transaction.
- the third problem was in the internet merchant himself being fraudulent and stores a copy of all the card holder's confidential data, including the CVV2. and billing address in order to intentionally make fraudulent transactions.
- the most famous solution that solved this problem was the 3D Secure, which is basically a variant from the well known SET protocol. It requires that the issuer bank, the bank of cardholder, gets involved in the transaction to authenticate the user.
- the two most common methods for authenticating the user are: the user name and password method and the smartcard and PIN method.
- the smartcard readers commonly used do not integrate a PIN pad and search because of cost. So, the password or the smartcard PIN are entered on the keyboard on the PC.
- the fourth problem is the most critical of because it places unfair liability on the user.
- This problem is malicious and spying software that are able to read every key stroke typed on the keyboard and see everything displayed on the screen and even take full control over the victim's computer. This is not a rare problem, statistics how that computers today are infected with Trojan horses and spying software.
- This problem has no low cost solution.
- the secure solutions are very expensive, like the use of smartcard with a reader that has an integrated PIN pad and an integrated LCD screen or a unconnected token with display and keypad for generating transaction certificates.
- the personal computer is made of hardware, kernel, operating system, services and applications; it is practically unfair to hold the user liable or even responsible for the security of all these layers especially because malicious software can in many cases be undetectable or at least difficult to detect for some period of time until it is discovered and a detection and/or removable tool becomes available. Also, statistics reveal that most PCs today are infected' with Trojan horses and/or spy software. Malicious hardware, like hardware key loggers can also be attached to personal computers. Accordingly these and other problems exist in prohibiting customer owned relatively low cost transaction security terminals.
- one aspect of the invention provides a transaction terminal adapted to enable a secure transaction over a communications network, comprising a controller having a first source for booting a normal operating environment which operably enables communication between the terminal and the network, the controller being adapted to create transaction data in accordance with user operation of the transaction terminal, to save the transaction data to a specified location, and a second source for booting the terminal into a secure environment having limited operability compared to the normal operating environment but enabling security critical operation to be done securely, like for example enabling entry by the user of authentication information, such as a PIN, for authenticating the transaction data which is retrievable from the specific location by the transaction terminal in the secure operating environment, the transaction terminal being adapted to enable shut down of the normal operating environment and booting of the secure operating environment to enable authentication and encryption of the transaction data.
- a controller having a first source for booting a normal operating environment which operably enables communication between the terminal and the network
- the controller being adapted to create transaction data in accordance with user operation of the transaction terminal, to save
- the transaction terminal can be a personal computer and the source of software for the secure operating environment can be a thin operating system application stored on a removable device such as a readable medium like a CD or USB memory stick.
- Another aspect of the invention provides a process that allows a transaction terminal such as a personal computer to be used as a secure PIN entry device.
- the process includes one or more of the steps of: A preparing transaction data, B storing the transaction data, C shutting down, D rebooting from a secure media or device, E loading the transaction data, F allow modification of the transaction data, G entry of secret information such as a PIN, H storage of the secured transaction data in memory, shutting down and rebooting to a normal operating environment and subsequent processing of the transaction in the normal operating environment.
- a Preparing transaction data as with the normal transaction terminal, like POS terminals, the terminal prepares the transaction data, like the amount, the card number and currency, before interacting with the PED, and a separate aspect of the invention is the secure PIN entry and its interface with the transaction terminal,
- non-volatile memory which is the suggested interface between the transaction terminal and the secure PIN entry using personal computer
- non-volatile memory could be for example, the hard disk of the computer or a USB token or any memory that is persistent between system restarts
- C Rebooting in other words restarting, or hibernating and starting, or shutting down and restarting the computer, beneficially to ensure that any malicious software is no longer in control since restarting the computer is usually very characteristic and very easily distinguishable by the normal user and hence it is too difficult for malicious software to imitate the behaviour of restarting the computer while still being in control on the computer, but the user might need to adjust the boot sequence of his personal computer, and even this adjustment, if ever needed, is not a very advanced task and only need be done once, to configure the computer to seek booting from the bootable media or device mentioned in the next step before attempting to boot normally from the hard disk for example, but notably, most computers are already adjusted to seek booting from CD/DVD and USB devices before normally booting from the hard disk, hence need no any adjustment,
- bootable media or device would be mailed to the user, this bootable media or device should also be sufficiently difficult to tamper with the data on it, in order to prevent malicious software from being injected in it.
- Two examples are: 1.
- USB smartcard reader personal computers today allow for booting from USB devices. People today are able to boot from USB drives and USB sticks but there is no technical problem at all to boot from a USB smartcard reader, for example. This may sound very strange, but most, if not all, USB smartcard readers today have firmware which can very easily be enlarged in size to even a few megabytes; this is quite more than sufficient to boot into the secure environment, described in the next step, with a very nice GUI.
- the firmware of most USB smartcard readers, especially the EMV certified ones is sufficiently difficult to tamper with the data in it; even firmware upgrades is done securely using cryptographic methods, like digital signatures. Smartcard readers, especially the EMV certified ones, are sufficiently difficult to counterfeit, they even carry certification logos and holographic.
- the booted environment (secure operating environment) should be minimalist, ideally with no networking capabilities in order to dramatically reduce the effort needed to verify its security. It should load only the PED software among with any helper programs or trusted software. Software is assumed to be trusted if it is loaded from the bootable media or device mentioned in the above step or digitally signed using a valid digital software from an untrusted source, is to have its checksum stored on a trusted media or device, but this method does not allow newer versions to be loaded without modification on the trusted media or device that contains the checksum.
- Another requirement on the booted environment is its ability to boot from a read-only source, like a CD, because most boot media or devices that satisfy the requirements in the previous step are not writeable, at least during normal operation.
- the PIN would either be used to create an encrypted PIN block or enable the use of a smartcard to create a transaction cryptogram or a digital signature.
- Password encrypted private or secret keys can be used as a low cost alternative to smartcards for creating digital signatures.
- Other confidential data like for example the ATM card track2 data which is the data on the magnetic stripe of a debit or credit card, can also be password protected using password based encryption. This way, any one who could maliciously copy information from the users computer or even from a bootable media or device, can not access the confidential information stored on it.
- Another level of securing the very confidential data like the TM card track2 data is to have it stored encrypted under the public key of the server. This way, no one can use the information on the personal computer to try to make an attack on another channel, like real ATM machines for example, simply because he does not have the ATM card information in clear.
- the process allows for secure PIN entry, it allows also for entering additional critical pieces of information like a user choosable one time password or secret number to be encrypted and sent to the server in order to be used some time later on another less- secure channel like the Internet or WAP or telephone or IVR.
- the user can for example enter a user choosable CVV2 or CVC2 or 3D secure password that the he will use in the next transaction that he will make on the Internet.
- the user may also specify the same constraints on the next transaction that will happen using the specified CVV2/CVC2, like the maximum amount of the transaction and/or the time within which the transaction should be made.
- a mobile phone that supports Java is a sort of personal computer that always boots into a secure environment from its firmware by default. Hence it does not need the parts of the process that involve restarting and booting into a secure environment; all that is needed is to launch the secure PIN entry application.
- the PIN entry application can execute directly and securely on the mobile phone.
- the physical phone must be trusted by the user; the mobile phone owned by the user himself could satisfy this requirement very easily, because the user knows that his own phone was never physically accessible to anyone who has the technical expertise and malicious motivation in addition to the ability to pay the cost of obtaining and inserting a malicious hardware or firmware in his mobile phone.
- the PIN entry application that will run on the mobile phone can also interact with the SIM in the mobile, which is basically a smartcard; this allows for the second use of the secure PIN entry, which is to enable the access to a component in the smartcard that would create a transaction cryptogram or a digital signature for the transaction.
- the terminal and process can be used to protect the PIN entry of any PIN that needs to be secured, not just the ATM PIN, but using the same security standards that were originally made to secure the ATM PIN.
- the process radically protects the user from any malicious software that might affect the security of PIN entry; it dramatically reduces the user responsibilities to physical security considerations only, like those in ATM transactions.
- An example of the traditional merchant system is a payment web-page with SSL that allows the user to enter his credit card number, expiration date and CVV2 or CVC2 and sends this information to the acquirer bank, which is usually the bank of the merchant.
- the process allows the 3D secure password to be different, user choosable, for every transaction; because before every transaction, the user would follow the said process and enter in the secure state, away from any malicious software, the 3D secure password. After that he will use it in the next transaction to be done on unsecured channels like the Internet where malicious software can capture it, or on IVR where it could also be captured or on any less secure channel, but it will be of no use for the attacker any more.
- a device for enabling a computer to be booted into a secure operating environment comprising a body for carrying a storage medium for storing software which software is readable by computer in use and enables the computer to run in a secure operating environment, wherein the body comprising anti counterfeit feature and/or a tamper- evident feature, and the storage medium comprises a special area which cannot be overwritten by an unauthorised user, wherein the software is stored at least in part in the special area.
- Figure l is a block diagram of a personal computer for carrying out the invention
- Figure 2 shows the security dependency in the case when the PIN is encrypted by the PIN entry system itself as described by the first embodiment below,
- FIG. 3 is a flow diagram of some of the process steps according to the invention.
- Figure 4 comprises three views of keypads presented to the user to help prevent detection of entry secret information through a keypad having malicious key-logger devices
- Figure 5 is a schematic representation of events versus time according to the process.
- Figure 6 is a flow diagram of steps in the process according to the invention.
- Figure 7A and B shows a USB memory according to the invention.
- Figure 8 is a USB token according to the invention.
- Figure 9 A and B shows a smartcard reader according to the invention.
- Figure 1OA and B is a CD adapted according to the invention.
- Figure 11 is a block diagram of independent inventive concepts according to the invention.
- a transaction terminal application puts the transaction data in a file on the hard disk.
- a transaction or client terminal 10 comprising a personal computer 12, a monitor 14, a keyboard 16 having a letters and number keypad 18.
- the PC 12 comprises usual components such as a mother board 30 and a hard drive 32 as well as a CD RW drive 20, a floppy 31/2" drive 22, and input ports 24 such as USB sockets for example enable connection of a smart card reader.
- the PC comprises other components enabling operation as a network terminal, including a network connection device such as a modem 26 for connection to a network 28 such as the internet.
- the user inserts the secure PIN entry CD in his computer's CD drive.
- the CD is a business card shaped CD-R with a hologram sticker on it.
- the CD-R is closed, i.e. no other sessions can be added to the CD--R in order to change the data on it.
- the user hibernates the computer.
- the user starts the computer.
- the computer boots from the CD.
- the secure PIN entry application reads the transaction data from the hard disk.
- the secure PIN entry application displays the transaction data to the user.
- the user agrees on the transaction and enters his PIN.
- the secure PIN entry application generates a random DES or 3DES key, PIN Key, and uses it to encrypt the PIN.
- the secure PIN entry application generates another DES or 3DES key, Auth Key, and uses it for generating a Message Authentication Code, MAC, on the transaction.
- the secure PIN entry application encrypts the Auth Key under the PIN Key.
- the secure PIN entry application encrypts the PIN Key under the public key of the HSM used in the server side.
- the public key is stored on the CD-R itself.
- the user may also enter, once or twice, the CVV2 to be sued in the next Internet transaction.
- the secure PIN entry application would also encrypt this user choosable CVV2.
- the secure PIN entry application forms its reply which is the transaction data, the MAC and the encrypted PIN.
- the secure PIN entry application stores the reply in a file on the computer's hard disk.
- the user ejects the CD and restart the computer.
- the computer returns back from hibernation.
- the transaction terminal application can now load the reply file from the hard disk. This reply file is almost the transaction request which the transaction terminal needs to send to the acquirer to be authorised.
- the server side would use it to update the cards database in order to secure the next e-commerce transactions coming from less secure channels like the Internet.
- the user may also specify the same constraints on the next transaction that will happen using the specified CVV2/CVC2 or 3D secure password, like the maximum amount of the transaction and/or the time within which the transaction should be made.
- step 118 the computer completes the transaction as described above.
- the personal computer has a bootable smartcard reader, as described in the description above, but the transaction terminal forms the transaction data and puts it in a file on the smartcard which is inserted in the smartcard reader.
- the user hibernates the computer. The user starts the computer. The computer boots from the smartcard reader, the boot loader checks the smartcard and finds that there is a pending transaction data, so it launches the secure PIN entry application.
- the secure PIN entry application displays the transaction data to the user.
- the user agrees on the transaction and enters his PIN.
- the PIN is sent to the smartcard as a verify PIN command.
- the transaction data is sent to the smartcard with a command to create an Authorisation Request Cryptogram, ARQC.
- the secure PIN entry application forms its reply which is the transaction data and the ARQC.
- the secure PIN entry application stores the reply in a file on the smartcard.
- the user restarts the computer.
- the boot loader on the smartcard reader will sense that there is no new application data so it skips its booting and the computer boots normally.
- the computer returns back from hibernation.
- the transaction terminal application can now load the reply file from the smartcard. This reply file is almost the transaction request which the transaction terminal needs to send to the acquirer to be authorised.
- the physical bootable media or devices can be manufactured and loaded with software that allows the user to apply the process in the transactions he makes.
- the process according to the invention can secure the entry of the PIN of an ATM transaction made from the user's own computer. This allows the user to access and make transactions from his debit and credit account while he is in his home using his personal computer or mobile phone.
- the issuer bank of the cardholder will feel exactly that the transaction was coming from a real ATM, because the process not only secures the PIN entry, but also allows for transactions to be made in the same way specified in the ISO 8583 standard for card originated transactions. So, the issuer bank will require no change in his system allowing his customers to use this type of transaction. All the changes could be handled by the d riving system, which is usually owned by the Acquirer bank who is the first to receive the transaction from the transaction terminal, in our case the personal computer.
- the invention can be used to allow secure PIN entry for using a smartcard to sign a contract or transaction.
- the invention provides an Electronic Check with Digital Signature using a USB Token
- a USB token can be viewed as a smartcard reader and a smartcard combined in a single device, which is used in this embodiment but the user may also be given other options, such as use of a special bootable media to be used in case his computer does not support booting from USB; but he will be using the USB token in the process of digitally signing the check.
- the website through a special browser plug-in, stores the unsigned check-data on the USB token and sends a command to the operating system to hibernate the computer
- the booted environment checks if there is a pending transaction in the USB token; it finds that there is a check that needs to be signed.
- the secure environment notifies the user that it will return back to the normal environment, so that the user would be able to resume the transaction
- the invention provides an internet banking process using digitally signed payment transactions using a laser bank card.
- the laser bank card is the bootable media described in the invention that will be used to enable the secure process to be done.
- the bank sends a shaped CD to his customer by mail.
- the CD is already personalized for the user, who is preferably instructed to call the bank to activate it, like most credit card or secondary credit card.
- the laser bank card is a shaped CD with special printing and optionally holograms, similar to those found on credit cards.
- the CD is for example a 50MB CD- R, personalized with the user ID of the customer to whom the bank is sending it to.
- the application also looks like a credit-card on the screen; it does not require any setup; it just auto-runs when the CD is inserted.
- the application first asks customer for his Internet Banking password; entering the password on a windows application is much more secure than entering it on a website, because faking an application is much more difficult than DNS spoofing or phishing. But still such passwords are not sufficiently secure at all for the non-repudiation requirements of electronic signatures, simply became a software key-logger can very easily capture this password.
- the credit-card looking application After the user enters his password on the credit-card looking application, he sees his credit card number, expiration date, his name and his credit card balance in addition to the bank's logo. When he clicks on the bank's logo, the application launches the default web browser passing to it a URL that enables the customer to enter automatically to the Internet Banking page of his bank. He does not need to enter any more usernames or passwords. This is because the credit-card looking application already sent the username and a special one time password in the URL.
- the user selects transfers on the Internet banking website, and selects the payees to whom he wants to make transfers, e.g. the telephone company, the cable TV company, the card loan... etc. He fills in the amounts and the accounts numbers in the table presented to him on the Internet banking web page.
- the credit-card shaped windows application that was used in the login to the Internet banking website, will popup again and tell the user that the computer should go into the secure environment in order to be able to enter the ATM PIN to approve the transaction.
- the application will store the transaction data in a special location on the hard disk, for example the last 30 sectors on track 0 of any hard disk is intentionally left free by operating systems to allow for special boot loaders to work.
- Track 0 is usually 64 sectors; each can sector holds 512 bytes. So, using sectors 40 to 50 on Track 0 should be very sufficient and very safe.
- the credit-card application will send a special command to the operating system telling it to hibernate and then restart. This is a custom modified version of hibernate that would reset the computer after the hibernate operation, instead of turning the computer off.
- the booted environment will initially check if there is a pending transaction or transactions left for it on Track 0. If yes it will continue launching the secure environment, otherwise it will immediately chain boot to normal environment; chain-booting does not require restarting, hence does not require ejecting the CD.
- the encryption and security algorithms are executed according to the banking standards, which can make use of the public key of the bank that is burnt on the CD to send information that can only be read by the bank's Hardware Security Module; finally the result of these tasks that require secure environment is stored back on Track 0.
- the environment notifies the user that it will return back to the normal environment to enable the transaction to resume.
- the secure environment chain boots to the original environment, without requiring the CD to be ejected; because chain booting means booting an operating system after another one was already booted without the need for restarting the computer. This makes the process very smooth, because the user would not have to eject the CD at all.
- the normal operating system returns back very quickly, because it is returning back from hibernation, which is usually extremely fast.
- the credit-card application will sense that it returned from hibernation, because the windows operating system notifies all the applications that register for this event (returning from hibernation). Now the credit-card application will silently check if any reply was sent back to it in Track 0; if no reply is found, the application will simply ignore the event; in our example the application will actually find the reply that was left for it by the secure environment. So, it automatically loads it and asks the user to enter again his Internet banking password, in order to connect to the bank's server and resume the transaction.
- the application will automatically reconnect to the Internet or at least launch the Internet connection for the user to confirm reconnecting to the Internet, by pressing dial.
- the application After successful entry of the password the application will send the transaction to the bank's server, which in turns verifies the secure transaction and replies back telling the user about its success or failure.
- the invention provides a process that allows a user to make secure PIN- based transactions using his personal computer through one or more of the steps of: (a) Preparing transaction data (b) Storing it in non-volatile memory, (c) Restarting or hibernating the computer, (d) booting into a secure, un-networked, environment from a bootable media or device; this bootable media or device must be sufficiently difficult to counterfeit and sufficiently difficult to tamper with the data stored in it and optionally
- the process radically protects the user from any malicious software that might affect the security of PIN entry; it dramatically reduces the user responsibilities to physical security considerations only, like those in ATM transactions.
- the user should use a personal computer that he knows that it does not contain malicious hardware; this could easily be his own notebook or PC at home. He should still quickly check that there is no external hardware key logger attached to the computer.
- the process enables non-repudiation in e-commerce transactions.
- the process is also an ideal solution for securing the use of smartcards on personal computers.
- Hibernating restart regarding to step c), there is another flavor of restarting the computer proved to make the process easier to the user. It is basically a modified version of hibernate where the computer would restart immediately automatically after hibernation instead of the normal action of hibernate where the computer would turn off and the user would have to power on the computer manually by himself. Many users prefer hibernate rather than restarting the computer because hibernate usually takes much less time than normal restart and more importantly it keeps all the user's applications opened in the same state that the user left it. This new flavor is not normally bundled with operating systems, like Microsoft Windows; it is a custom implementation designed specifically to support this invention.
- step j Chain booting: regarding to step j) where the computer is restarted back to normal operation.
- the secure environment would itself boot the computer back to normal operation after the user finishes working in the secure environment, without restarting the computer; this process is called chain booting because a second operating environment is booted after an initial one boots and finishes its work, without restarting the computer.
- This is realized technically, by the secure environment after finishing all its work with the user, performs the operation that a BIOS would normally do to boot the computer, i.e. loading the boot sector of the hard disk into memory and giving control to that code by jumping into it.
- Step b) and Step f) involve data exchanged between normal mode and secure mode.
- this data can be encrypted to ensure that if the process is interrupted in any way due to a computer hardware failure or any other reason, the non-critical transaction data would still be kept undisclosed.
- Basic encryption mechanisms can be used, because the data is already not critical, the critical parts of the transaction data are already encrypted using the appropriate encryption mechanism according to the transaction protocol. This additional layer of security is something like communication line encryption.
- FIG 4A shows a typical keypad layout on keyboard such as keyboard 16 shown in Figure one, and this layout can be presented to the user via an output such as a display monitor 14.
- the user is informed of other keys which represent the number for the purposes of the secure entry. Examples of random number allocation to keys are shown in Figures 4B and 4C.
- FIG 4B for example, to enter the PIN 3378, the user types LLEK on the keyboard.
- the whole keyboard including letter key can be scrambled e.g. randomly allow entry of other type of secret information other than PINs.
- the possible bootable media or devices that can be used are based on the necessary and sufficient criteria for a bootable media or device that can be used in this process are: the physical characteristics of this bootable media or device must be sufficiently difficult to counterfeit and the data stored on it must be sufficiently difficult to tamper with.
- Two examples are, one based on the CD-R and another based on a smartcard reader, but there are many other examples that can be made to satisfy the process requirements, and here are some of the examples:
- High end smartcards today have memory of up to 4 mega bytes. They also have circuits that talk the USB protocol directly without the need for a reader, just a connector
- USB tokens they are basically a tamper resistant device like smartcards, with a USB interface.
- SD Card Specially modified Secure Digital Card
- the bootable device could even be the BIOS of the computer itself. It may contain a light secure environment
- the proofs of identity of the user need not to be just a PIN, since the proofs of identity of the user are categorized into three main categories:
- a smartcard requires a PIN to be activated, which is an example of a something that you have and something that you know that are coupled together.
- Types of transaction covered are diverse and any type of electronic transaction can be secured using the current invention.
- two types that are extremely important: a) PIN based financial transactions (with and without a smartcard) b) Digital signature transactions (where contracts or forms need to be digitally signed) they may already have initial signatures on them that should be verified, before the user signs them. Or the user may just be satisfied by verifying the signature that may already be on the contract or form.
- Focus on type a) (PIN based financial transactions) has been given here as mentioned in the application were covering a PIN based transaction. In the first best mode the PIN was an online PIN 3 i.e. the PIN gets encrypted and attached to the transaction data to be verified by the host after returning to the normal mode. While the second Best Mode is a PIN of a smartcard or token where the PIN is used to enable access to the smartcard or token which in turns generate cryptograms that make the transaction data authorized by the user.
- Non-volatile memory used in transferring the transaction data from the transaction terminal (in the normal mode) to the secure environment can be, any or a combination of the following:
- each hard disk there is also a free area
- the secure environment is able to browse the file system of the hard disks of the user, then the user may be allowed to choose the file that contains the transaction data, manually, by him
- Non-volatile memory area on a device like for example
- the smartcard reader itself can have a special temp memory area to be used for this purpose
- ii An area on a smartcard or token iii.
- a server side Through a server side: In case where the secure environment is able to connect to some server, i.e. has some sort of networking capability or can use any simple communication channel like sending and receiving touch tones using a modem. Then the transaction data can be transferred through that server side which is accessible from both normal environment and secure environment, even if the channels used to access the server from the normal environment and the secure environment is different.
- the normal RAM can be used as a channel for passing the transaction data back to the normal environment, there are many ways to do this, like for example: i. Installing a virtual device driver, that will become accessible in the secure mode
- the changed info in the transaction is a small thing, like a small transaction certificate of a small number of digits, or if it is a simple one time password, then the user can study it or even write it down and type it again after returning to the normal environment.
- the transaction terminal is also accessible through another channel, like Interactive Voice Response (IVR), then the user can even resume the transaction without even restarting back to normal operation. He simply dials the telephone number of a server, and keys, through the touch tone keys of the telephone, the transactions details that were changed, which can be as simple as a small transaction certificate or a one time password in addition to a transaction ID for example; things that he can see on the screen before leaving the secure mode. In this case the transaction completes completely without the need to return back to normal operation to complete the transaction.
- IVR Interactive Voice Response
- Another similar way to the above case is when the secure environment can connect to the Internet or to some server using some communication channel, while inside the secure mode.
- the transaction data can be sent back to the server directly while inside the secure mode or sent to an interim server and when restarted back to normal operation the data is fetched from the interim server and the transaction be resumed by the transaction terminal
- the solution not only prevent malicious software from tapping and/or fraudulently using the proofs of identity of the user, the solution also prevents malicious software from fraudulently affecting the correctness of the digital verification of the transaction data, if it were already digitally signed by one or more other parties.
- the presenting of the proofs of identity can be done immediately after booting into the secure environment or at a later stage after the user decides that he really wants to authorize a transaction or both in which case the proofs of identity presented in each stage may of different types.
- cryptographic operations are made to process the transaction data to make it eligible for authorization.
- the processed transaction data is stored on a non-volatile memory; it can optionally be encrypted to ensure that only the legitimate user would be able to view or complete the processed transaction data by sending it for authorization.
- the invention also provides a personal computer physically trusted by the user who wants to enter his PIN to authorise a transaction.
- the said PIN is either a PIN to be encrypted or a PIN to be verified by a smartcard to enable operations on it.
- the user prepares the transaction using a transaction terminal system or software that is outside the scope of the invention.
- the said transaction terminal stores the transaction data in a non-volatile memory.
- the user would restart, or hibernate and start or shutdown and start the said personal computer.
- the computer would boot from a bootable media or device that is sufficiently difficult to counterfeit and sufficiently difficult to tamper with the data stored in it.
- the said bootable media or device launches the secure PIN entry application.
- the said secure PIN entry application reads the transaction data from the said non-volatile memory.
- the said secure PIN entry application displays the said transaction data to the said user.
- the said user verifies the said displayed transaction data and decides whether to enter his PIN or not. If the said user decided not to enter his PIN, he can just cancel the transaction and restart the computer back to normal operation and the process stops here. Else, the said user would enter his PIN.
- the said PIN entry application would process the PIN either by encrypting the PIN and optionally generating a MAC or by sending the PIN to a smartcard to enable the operation that authorises the transaction on it, which is either an EMV cryptogram or a digital signature or an encrypted PIN and optionally a MAC.
- the said PIN entry application would form the reply and store it in a non-volatile memory possibly different from the one said above in the transaction data.
- the said user may also enter a password to enable secure access to password encrypted secret keys, private keys and confidential data. This step can be done before or after the said PIN entry step.
- the said user may also enter secure information that updates his records in the server side system, like a user choosable CVV2/CVC2 or new 3D Secure password.
- the said PIN entry application also encrypts the said other secrets.
- the said user restarts the computer.
- the said computer boots normally or resumes from said hibernation.
- the said transaction terminal loads the reply from the later said non-volatile memory and resumes the transaction, which is outside the scope of the process.
- the server side of the system would receive the said transaction terminal request, including the said encrypted PIN or the said cryptogram or the said digital signature, depending on whether the said PIN was encrypted or was used to create a cryptogram or a digital signature.
- the said request also optionally includes the said MAC.
- the said server side also receives the said encrypted other secretes and decrypts it.
- the said server side processes the request as normal PIN based transactions relying on the whole sale PIN security standards. If the said user entered the said other secret, the said server side would decrypt it and update the system with the new secret.
- the transaction processing is done using the established transaction processing processes for processing PIN based transactions.
- Transaction Data is prepared by software on the un-trusted operating environment. 2. Transaction Data is kept in a non-volatile memory accessible to both the un- trusted environment and trusted secure environment.
- Computer is restarted or turned off or reset or hibernated or hibernated with auto-restart; this guarantees that any software, including malicious software, in the computer's memory is Inactive.
- the computer is booted using the invention apparatus into a special secure, trusted environment.
- the computer is either chain-booted or rebooted back to the normal un-trusted operating environment.
- the updated transaction data is loaded and used to resume the transaction.
- a device to enable secure booting comprising a contribution of physical media and software.
- the device provides a bootable source which is a combination of a physical part and a software part; it is either a combination of a physical media and software written on that media, e.g. a bootable CD or a bootable floppy, OR a combination of a physical device and software residing inside that physical device, e.g. a bootable USB memory stick or a bootable memory card
- the invention apparatus is a bootable source whose physical part has two distinguishable characteristics and whose software part has another two distinguishable characteristics. If any of these four characteristics, whether physical or logical, is missing in the bootable source, the whole value of the apparatus, which is Securing Electronic Transactions that are made on Un-trusted Operating Environments, becomes lost. Additionally, the package which includes the physical part combined with the software part must be provided by a trusted party to the user, through a trusted physical delivery chain.
- an unchangeable area which is an area that the data written on it cannot be changed by an attacker or by mistake after the bootable source is packaged, i.e. the physical and the software part are combined.
- this can be easily realized by using a media technology that is already tamper immune, like for example a CD-ROM, or a write once media that can be fully written or at least prohibit new sessions to replace the sessions in the unchangeable area.
- the device itself must be tamper proof, i.e. the device becomes unusable if tampered, or at least tamper evident, i.e.
- the device should not allow commands sent to the device through its external interfaces to make any changes in the unchangeable area.
- Temporary or transient data whether volatile or non-volatile, can still be stored inside the device in a memory area other than the unchangeable area.
- the unchangeable area does not necessarily need to be implemented as a ROM chip that is never changeable; the manufacturer may for example allow this area to be securely overwritten with a newer version of the critical software that should be kept in the unchangeable area.
- technologies that allow for this secure upgrade, like for example checking the digital signature that is on the software, inside the device itself, before making the overwriting.
- the two distinguishable characteristics of the software part 1- Contain minimalist secure operating environment that resides in the unchangeable area and allows only trusted software to execute; i.e. software that is either on the unchangeable area also, or is validly digitally signed by a signor accepted by the said minimalist secure operating environment.
- Run dedicated trusted software that perform security critical operations related to an electronic transaction that is being made on an un-trusted operating environment, rather than performing the transaction completely by itself. This requires the said dedicated trusted software to load transaction data that were initially prepared by software that was running on the said un-trusted operating environment, do some processing on it that involve taking authorization from the user and finally store back the updated transaction data containing the cryptographic non-repudiate-able consent of the user. These updated transaction data are to be used by software on the said un-trusted operating environment to resume making the transaction, by for example sending these secured data to a server and waiting back for a reply.
- a USB memory device 200 having a casing/body from which the USB contacts 206 protrude for connection to a USB drive is a PC in a conventional manner.
- the exterior of the casing has an anti-counterfeit feature 204 which can be for example artwork, logos, holograms etc.
- the casing/body is held together by tamper proof rivets 202.
- rivets 202 other forms of tamper proof or tamper evidence technology could be used.
- USB memory Inside of the casing/body there is USB memory with a non- volatile memory 210 and a controller 208 able to run software within the memory 210.
- the non- volatile memory 210 comprises a dedicated reading only area 212.
- the dedicated read only area 212 imposes a read only constraint on the controller 208 rather than use a separate read only memory chip.
- the non- volatile memory 210 contains a software which is readable by the connected computer in use and enables the computer to run in a secure operating environment.
- the software is stored at least in part in the dedicated read only area 212 so that it cannot be interfered with or overwritten by an unauthorized user.
- FIG 8 an adapted USB token 250 or USB smartcard.
- the token 230 comprises a body/casing and USB terminals as with device 200.
- On the body/casing of token 230 also comprises an LED 230 and tamper proof or a tamper evidence fastening such as rivet 236 (alternatively known USB token's tamper proof technology can be used) and an anti-counterfeit feature 234 such as artwork, logos, holograms etc.
- the token 230 is adapted to make it function as two devices at the same time, a connected USB token and a read only memory store.
- the read only memory can actually be allowed to be updated if the appropriate logic for verifying the signature on the loaded software is implemented or at least require a high security Admin code to change, which is preserved securely with the provider.
- Admin codes are used, the updated memory should be used in a secure environment, because there is no digital signature to verify internally inside the USB token 230.
- a smartcard can be used instead of a token such as by using a modern smartcard which is able to natively talk with the USB protocol, and can connect to a computer through a USB connector with no bits of logic necessary.
- the smartcard reader 240 comprises a main body/casing 241a USB cable 240 and USB interface 250.
- the external casing 244 there is again anti- counterfeit features such artwork, logos, holograms etc 242.
- Tamper evident screw cap 246 which could also be any other form of tamper proof or tamper evidence fastener.
- the inside of the casing 244 is shown in figure 9b. Inside is a controller 252, EERPOM 258, memory 256, and contacts 254. This is a schematic representation of the conceptual components inside the smartcard reader 240 rather than showing real integrated circuits.
- controller 252 is connected to contact 254 memory 256 EEPROM 258 and the USB interface 250 via a cable 248.
- the smartcard reader 240 is adapted to the invention by adding more memory to the EEPROM and is supplemented in the USB (read only) disk interface in the controller, in addition to the existing USB smartcard interface as if the device is acting as two devices at the same time.
- a CD-R 270 which is shaped in the form of round-edged rectangle.
- On the exterior of CD-R 270 is anti-counterfeit artwork, logos, holograms etc 272. Additional extra artwork and anti-counterfeit features can be added on the back of the CD-R 270 and even on the unused part of the storage area.
- the back of the CD- R is shown in figure 10b with the used readable media itself depicted as 274, the surrounding area being more artwork by 272. In the case of the CD-R all the software stored on it can of course be read only.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
La présente invention se rapporte à un terminal de transactions et à un procédé permettant à un utilisateur d'effectuer des transactions sécurisées, telles que des transactions faisant appel à un PIN, à l'aide de son ordinateur personnel. Le procédé selon l'invention comprend les étapes consistant: (a) à préparer les données de transaction ; (b) à les enregistrer dans une mémoire non volatile ; (c) à redémarrer ou à faire hiberner l'ordinateur ; (d) à lancer un environnement sécurisé, qui n'est pas en réseau, à partir d'un support ou d'un dispositif lançable, ces derniers devant être suffisamment difficiles à contrefaire, contenir des données suffisamment difficiles à trafiquer et éventuellement être difficiles à copier ; (e) à lancer de manière sécurisée le logiciel de saisie de PIN sécurisé ; (f) à charger les données de transaction depuis la mémoire non volatile ; (g) à présenter les données de transaction à l'utilisateur, et éventuellement à permettre à l'utilisateur de les modifier et/ou de les compléter ; (h) à sécuriser la saisie du PIN donnant lieu à un bloc PIN chiffré, et/ou à permettre la génération de clés appropriées pour créer un ou plusieurs codes d'authentification de message et/ou cryptogrammes et/ou signatures digitales conformément aux normes de sécurité de la transaction. L'utilisateur peut également entrer un mot de passe permettant l'accès sécurisé à des clés secrètes, des clés privées et des données confidentielles chiffrées par mot de passe ; l'utilisateur peut également entrer des informations sécurisées pour mettre à jour ses enregistrements dans le système côté serveur, telles qu'un CVV2/CVC2 sélectionnable par l'utilisateur ou un nouveau mot de passe sécurisé 3D. Le procédé selon l'invention comprend également les étapes consistant: (i) à enregistrer la demande de transaction sécurisée dans la mémoire non volatile ; (j) à redémarrer l'ordinateur en fonctionnement normal ; (k) à charger la demande de transaction sécurisée depuis la mémoire non volatile ; (l) à envoyer la transaction aux fins d'autorisation ; (m) à recevoir la réponse ; (n) à présenter la réponse à l'utilisateur, et éventuellement à l'enregistrer. Le procédé selon l'invention protège parfaitement l'utilisateur de tout logiciel malveillant susceptible de nuire à la sécurité de la saisie du PIN, et réduit considérablement les responsabilités de l'utilisateur vis-à-vis de la sécurité physique, notamment lors de transactions effectuées auprès d'un guichet automatique bancaire. L'utilisateur doit utiliser un ordinateur personnel dont il est sûr qu'il ne contient pas de matériel malveillant, soit le plus souvent son propre ordinateur portable ou ordinateur personnel à son domicile.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2004/050628 WO2005109360A1 (fr) | 2004-05-10 | 2004-05-10 | Saisie securisee de nip au moyen d'un ordinateur personnel |
EPPCT/IB2004/050628 | 2005-05-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006120365A1 true WO2006120365A1 (fr) | 2006-11-16 |
Family
ID=34957780
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/050628 WO2005109360A1 (fr) | 2004-05-10 | 2004-05-10 | Saisie securisee de nip au moyen d'un ordinateur personnel |
PCT/GB2005/001770 WO2006120365A1 (fr) | 2004-05-10 | 2005-05-10 | Transactions securisees a l'aide d'un ordinateur personnel |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2004/050628 WO2005109360A1 (fr) | 2004-05-10 | 2004-05-10 | Saisie securisee de nip au moyen d'un ordinateur personnel |
Country Status (1)
Country | Link |
---|---|
WO (2) | WO2005109360A1 (fr) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8375440B2 (en) | 2007-10-15 | 2013-02-12 | Microsoft Corporation | Secure bait and switch resume |
WO2013028901A3 (fr) * | 2011-08-23 | 2013-05-10 | Visa International Service Association | Procédé d'authentification pour une machine de transfert de valeur |
DE102012015913A1 (de) * | 2012-08-10 | 2014-02-13 | Rosch Holding Und Consulting Gmbh | Vorrichtungsanordnung zur Durchführung oder Freigabe eines elektronischen Diensts, Elektronikmodul für eine solche Vorrichtungsanordnung und Verfahren zum sicheren Eingeben von Autorisierungsdaten |
US8700895B1 (en) | 2010-06-30 | 2014-04-15 | Google Inc. | System and method for operating a computing device in a secure mode |
US20140236838A1 (en) * | 2011-08-03 | 2014-08-21 | Syed Fayez Asar | Account access at point of sale |
US9072842B2 (en) | 2002-04-19 | 2015-07-07 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for penetrating tissue |
US9089294B2 (en) | 2002-04-19 | 2015-07-28 | Sanofi-Aventis Deutschland Gmbh | Analyte measurement device with a single shot actuator |
US9118666B2 (en) | 2010-06-30 | 2015-08-25 | Google Inc. | Computing device integrity verification |
US9248267B2 (en) | 2002-04-19 | 2016-02-02 | Sanofi-Aventis Deustchland Gmbh | Tissue penetration device |
US9261476B2 (en) | 2004-05-20 | 2016-02-16 | Sanofi Sa | Printable hydrogel for biosensors |
US9427532B2 (en) | 2001-06-12 | 2016-08-30 | Sanofi-Aventis Deutschland Gmbh | Tissue penetration device |
US9561000B2 (en) | 2003-12-31 | 2017-02-07 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for improving fluidic flow and sample capture |
US9560993B2 (en) | 2001-11-21 | 2017-02-07 | Sanofi-Aventis Deutschland Gmbh | Blood testing apparatus having a rotatable cartridge with multiple lancing elements and testing means |
US9694144B2 (en) | 2001-06-12 | 2017-07-04 | Sanofi-Aventis Deutschland Gmbh | Sampling module device and method |
US9724021B2 (en) | 2002-04-19 | 2017-08-08 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for penetrating tissue |
US9802007B2 (en) | 2001-06-12 | 2017-10-31 | Sanofi-Aventis Deutschland Gmbh | Methods and apparatus for lancet actuation |
US9839386B2 (en) | 2002-04-19 | 2017-12-12 | Sanofi-Aventis Deustschland Gmbh | Body fluid sampling device with capacitive sensor |
US11876791B2 (en) * | 2016-04-18 | 2024-01-16 | Amtel Corporation | Message authentication with secure code verification |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0706810D0 (en) * | 2007-04-05 | 2007-05-16 | Becrypt Ltd | System for providing a secure computing environment |
US9053471B2 (en) * | 2007-08-31 | 2015-06-09 | 4361423 Canada Inc. | Apparatus and method for conducting securing financial transactions |
AU2010232817A1 (en) * | 2009-03-30 | 2011-11-17 | Apriva, Llc | Method and system for securing a payment transaction with trusted code base |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
US8602293B2 (en) | 2009-05-15 | 2013-12-10 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US7891560B2 (en) | 2009-05-15 | 2011-02-22 | Visa International Service Assocation | Verification of portable consumer devices |
US8893967B2 (en) | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
US9038886B2 (en) | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
US8533811B2 (en) * | 2010-01-20 | 2013-09-10 | Microsoft Corporation | Developer phone registration |
CN103503010B (zh) | 2011-03-04 | 2017-12-29 | 维萨国际服务协会 | 支付能力结合至计算机的安全元件 |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US9972005B2 (en) | 2013-12-19 | 2018-05-15 | Visa International Service Association | Cloud-based transactions methods and systems |
CN106465112A (zh) | 2014-05-21 | 2017-02-22 | 维萨国际服务协会 | 离线认证 |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
EP3013014A1 (fr) * | 2014-10-21 | 2016-04-27 | Gemalto Sa | Procédé pour l'accès à un service, premier dispositif correspondant, deuxième dispositif et système |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
CN104915602B (zh) * | 2015-04-22 | 2017-08-11 | 飞天诚信科技股份有限公司 | 一种Android平台下的PIN码保护方法 |
KR101747529B1 (ko) | 2015-09-02 | 2017-06-27 | 주식회사 엘지씨엔에스 | 금융 기기 및 그 제어 방법 |
CN112002080B (zh) * | 2019-05-27 | 2022-02-15 | 中电金融设备系统(深圳)有限公司 | 银行终端机、银行终端设备及信息安全的处理方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1085396A1 (fr) * | 1999-09-17 | 2001-03-21 | Hewlett-Packard Company | Fonctionnement de l'état sécurisé sur une plate-forme d'ordinateur |
US20010056411A1 (en) * | 2000-06-05 | 2001-12-27 | Helena Lindskog | Mobile electronic transaction personal proxy |
WO2002001520A1 (fr) * | 2000-06-26 | 2002-01-03 | Covadis S.A. | Dispositif destine a effectuer des transactions securisees dans un reseau de communication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5327497A (en) * | 1992-06-04 | 1994-07-05 | Integrated Technologies Of America, Inc. | Preboot protection of unauthorized use of programs and data with a card reader interface |
-
2004
- 2004-05-10 WO PCT/IB2004/050628 patent/WO2005109360A1/fr active Application Filing
-
2005
- 2005-05-10 WO PCT/GB2005/001770 patent/WO2006120365A1/fr not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1085396A1 (fr) * | 1999-09-17 | 2001-03-21 | Hewlett-Packard Company | Fonctionnement de l'état sécurisé sur une plate-forme d'ordinateur |
US20010056411A1 (en) * | 2000-06-05 | 2001-12-27 | Helena Lindskog | Mobile electronic transaction personal proxy |
WO2002001520A1 (fr) * | 2000-06-26 | 2002-01-03 | Covadis S.A. | Dispositif destine a effectuer des transactions securisees dans un reseau de communication |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9427532B2 (en) | 2001-06-12 | 2016-08-30 | Sanofi-Aventis Deutschland Gmbh | Tissue penetration device |
US9802007B2 (en) | 2001-06-12 | 2017-10-31 | Sanofi-Aventis Deutschland Gmbh | Methods and apparatus for lancet actuation |
US9694144B2 (en) | 2001-06-12 | 2017-07-04 | Sanofi-Aventis Deutschland Gmbh | Sampling module device and method |
US9560993B2 (en) | 2001-11-21 | 2017-02-07 | Sanofi-Aventis Deutschland Gmbh | Blood testing apparatus having a rotatable cartridge with multiple lancing elements and testing means |
US9072842B2 (en) | 2002-04-19 | 2015-07-07 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for penetrating tissue |
US9498160B2 (en) | 2002-04-19 | 2016-11-22 | Sanofi-Aventis Deutschland Gmbh | Method for penetrating tissue |
US9839386B2 (en) | 2002-04-19 | 2017-12-12 | Sanofi-Aventis Deustschland Gmbh | Body fluid sampling device with capacitive sensor |
US9089294B2 (en) | 2002-04-19 | 2015-07-28 | Sanofi-Aventis Deutschland Gmbh | Analyte measurement device with a single shot actuator |
US9724021B2 (en) | 2002-04-19 | 2017-08-08 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for penetrating tissue |
US9186468B2 (en) | 2002-04-19 | 2015-11-17 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for penetrating tissue |
US9248267B2 (en) | 2002-04-19 | 2016-02-02 | Sanofi-Aventis Deustchland Gmbh | Tissue penetration device |
US9561000B2 (en) | 2003-12-31 | 2017-02-07 | Sanofi-Aventis Deutschland Gmbh | Method and apparatus for improving fluidic flow and sample capture |
US9261476B2 (en) | 2004-05-20 | 2016-02-16 | Sanofi Sa | Printable hydrogel for biosensors |
US8375440B2 (en) | 2007-10-15 | 2013-02-12 | Microsoft Corporation | Secure bait and switch resume |
US8700895B1 (en) | 2010-06-30 | 2014-04-15 | Google Inc. | System and method for operating a computing device in a secure mode |
US9118666B2 (en) | 2010-06-30 | 2015-08-25 | Google Inc. | Computing device integrity verification |
US9081985B1 (en) | 2010-06-30 | 2015-07-14 | Google Inc. | System and method for operating a computing device in a secure mode |
US20140236838A1 (en) * | 2011-08-03 | 2014-08-21 | Syed Fayez Asar | Account access at point of sale |
WO2013028901A3 (fr) * | 2011-08-23 | 2013-05-10 | Visa International Service Association | Procédé d'authentification pour une machine de transfert de valeur |
DE102012015913A1 (de) * | 2012-08-10 | 2014-02-13 | Rosch Holding Und Consulting Gmbh | Vorrichtungsanordnung zur Durchführung oder Freigabe eines elektronischen Diensts, Elektronikmodul für eine solche Vorrichtungsanordnung und Verfahren zum sicheren Eingeben von Autorisierungsdaten |
US11876791B2 (en) * | 2016-04-18 | 2024-01-16 | Amtel Corporation | Message authentication with secure code verification |
Also Published As
Publication number | Publication date |
---|---|
WO2005109360A1 (fr) | 2005-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006120365A1 (fr) | Transactions securisees a l'aide d'un ordinateur personnel | |
US10586229B2 (en) | Anytime validation tokens | |
US9436940B2 (en) | Embedded secure element for authentication, storage and transaction within a mobile terminal | |
CN110249586B (zh) | 用于在智能卡上安全存储敏感数据的方法和智能卡 | |
TW405105B (en) | Terminal and system for performing secure electronic transactions | |
JP5050066B2 (ja) | 携帯型電子的課金/認証デバイスとその方法 | |
RU2537795C2 (ru) | Доверенный дистанционный удостоверяющий агент (traa) | |
CA2547308C (fr) | Systeme de paiement securise | |
CA2650662A1 (fr) | Dispositif portable et procedes pour effectuer des transactions securisees | |
MX2015000757A (es) | Metodo y sistema de autenticacion. | |
JP2002539514A (ja) | コンピュータ装置およびその動作方法 | |
KR100914905B1 (ko) | 일회용 패스워드 생성기능을 가진 스마트카드 및 이를이용한 전자금융거래시스템 | |
CN110582774A (zh) | 用于软件模块绑定的系统和方法 | |
AU2019204157A1 (en) | Method, system and device for e-commerce payment intelligent access control | |
CN102822835A (zh) | 个人便携式安全网络访问系统 | |
Petri | An introduction to smart cards | |
AU2015200701B2 (en) | Anytime validation for verification tokens | |
US20220318797A1 (en) | System and method for secure and contactless fund transfer in open and closed loop transactions | |
Tuliani | Implementing CAP | |
Castiglione | Chip Authentication Program For Mobile Phones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
NENP | Non-entry into the national phase |
Ref country code: RU |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: RU |