In general, embodiments of the invention relate to devices used in reading and writing to chip cards and, more particularly, relate to systems, methods, and computer program products for authenticating a chip card interface device with a backend system during a transaction.
Bank cards, including credit and debit cards, are used by cardholders to make purchases, cash withdrawals, and other financial transactions at bank card machines, such as automated teller machines (ATMs), point-of-sale (POS) terminals, and the like. For example, one type of bank card has a magnetic stripe that holds information about a credit or debit account. The cardholder can then access the credit or debit account by, for example, swiping the bank card by a magnetic stripe reader on the bank card machine. A newer type of bank card, generally referred to as a “chip card,” “smart card,” or “integrated circuit card” includes an on-card electronic chip such as a processor, microprocessor, memory, another type of electronic chip, or combinations of these devices.
Such chip cards provide the opportunity for localized storing of application(s) and data such as one or more personal identification number(s) (PINS) in a secure format. During a transaction, authentication can be performed locally at the POS terminal without requiring online authentication. Such local authentication is more effective than previous attempts for local authentication because of the possibility of additional security such as encryption of PINs stored on chip cards.
When a chip card is issued by an issuing bank, the PIN is determined beforehand and stored in the memory of the chip card. The PIN can be changed by the account-owner (referred to as a “customer”) by establishing an online connection to the backend systems maintained by an issuing bank through an ATM. In fact, in some arrangements, card issuers and/or regulators require changes of the PIN periodically in order to strengthen security. Chip card interface devices (CCIDs) such as the CCID discussed in patent application Ser. No. 12/752,567 titled “Personal Identification Number Changing System and Method” and discussed below provide an interface with the chip cards, such as, for reading and/or writing data to and/or from the chip card. Unfortunately, some or all data stored on a CCID and/or a chip card is sensitive and, in some cases, compromise of such data would be considered a significant security breach by the customer and the issuing bank. Fraudsters could potentially gain access to sensitive data saved on a CCID and/or accessed by a CCID during an interaction between the CCID and the chip card in a variety of ways. For example, in one scheme, a fraudster breaks into a housing of a CCID and installs a keylogger device for recording data from any chip card interacting with the CCID. For example, in another scheme, the fraudster installs a replacement, fraudulent processing device in the CCID.
Therefore, systems, methods, and computer program products are needed for authenticating a chip card interface device with a backend system during a transaction.
According to embodiments of the present invention, systems, methods, and computer program products are provided for authenticating a chip card interface device (CCID) during a transaction with the CCID. The system has a communication device configured for communicating with the CCID over a network and a processing device coupled with the communication device. The processing device is configured for receiving a transaction initiation communication from the CCID and instructing the communication device to communicate a request for authentication information including a random number to the CCID. The CCID encrypts the random number with a unique chip key (UCK) previously created with a master chip key (MCK). Then, the CCID communicates the encrypted random number to the system along with a serial number. The system recalculates the UCK using the serial number, encrypts a copy of the random number using the recalculated UCK and compares the encrypted copy with the encrypted random number received from the CCID to authenticate the CCID.
According to embodiments of the present invention, a chip card interface device (CCID) is configured for authenticating with a backend system during a transaction with the backend system and includes a network communication device configured for communicating with the backend system over a network, a processing device coupled with the network communication device, and the processing device is configured for instructing the network communication device to communicate a transaction initiation communication to the backend system, receiving a request for authentication information from the backend system, and instructing the network communication device to communicate an authentication communication to the backend system, the authentication communication including information configured to indicate an identity of the processing device such that the backend system can authenticate the identity of the processing device and complete the transaction.
In some embodiments, the request for authentication information from the backend system comprises a random number, the CCID further comprises a memory device configured for storing a unique chip key created by the backend system based at least in part on a master chip key of the backend system and based at least in part on a serial number of the processing device of the CCID, and the processing device is further configured for symmetrically encrypting the random number based at least in part on the unique chip key stored in the memory device. In some such embodiments, the authentication communication comprises the encrypted random number and the serial number of the processing device, and the serial number is to be used by the backend system to recalculate the unique chip key using the master chip key, the recalculated unique chip key is to be used by the backend system to encrypt a copy of the random number previously received at the CCID from the backend system, and the encrypted copy of the random number is to be compared to the encrypted random number, thereby indicating whether the identity of the processing device is authenticated.
In some embodiments, the processing device is further configured for receiving a successful authentication communication from the backend system, the CCID further configured for completing the transaction.
According to embodiments of the present invention, a method for authenticating a chip card interface device (CCID) with a backend system during a transaction with the backend system includes instructing, by a processing device of the CCID, the network communication device to communicate a transaction initiation communication to the backend system, receiving, at the processing device, a request for authentication information from the backend system, and instructing, by the processing device, the network communication device to communicate an authentication communication to the backend system, the authentication communication including information corresponding to an identity of the processing device such that the backend system can authenticate the identity of the processing device and complete the transaction.
In some embodiments, the request for authentication information from the backend system includes a random number, and the method also includes storing, by a memory device of the CCID, a unique chip key created by the backend system based at least in part on a master chip key of the backend system and based at least in part on a serial number of the processing device of the CCID and symmetrically encrypting, by the processing device, the random number based at least in part on the unique chip key stored in the memory device. In some such embodiments, instructing the network communication device to communicate an authentication communication to the backend system includes instructing the network communication device to communicate an encrypted random number and a serial number of the processing device to the backend system. In such embodiments, the serial number is to be used by the backend system to recalculate the unique chip key using the master chip key, the recalculated unique chip key is to be used by the backend system to encrypt a copy of the random number previously received at the CCID from the backend system, and the encrypted copy of the random number is to be compared to the encrypted random number, thereby indicating whether the identity of the processing device is authenticated such that the transaction can be completed.
In some embodiments, the method also includes receiving, at the processing device, a successful authentication communication from the backend system, and completing, by the processing device, the transaction with the backend system.
According to embodiments of the present invention, a computer program product includes a non-transitory computer-readable medium including computer-readable instructions for execution by a chip card interface device (CCID), the instructions configured for authenticating the CCID with a backend system during a transaction with the backend system. The instructions include instructions for instructing, by a processing device of the CCID, a network communication device to communicate a transaction initiation communication to the backend system, instructions for receiving, at the processing device, a request for authentication information from the backend system, and instructions for instructing, by the processing device, the network communication device to communicate an authentication communication to the backend system, the authentication communication including information corresponding to an identity of the processing device such that the backend system can authenticate the identity of the processing device and complete the transaction.
In some embodiments, the request for authentication information from the backend system comprises a random number; and the instructions also include instructions for storing, by a memory device of the CCID, a unique chip key created by the backend system based at least in part on a master chip key of the backend system and based at least in part on a serial number of the processing device of the CCID and instructions for symmetrically encrypting, by the processing device, the random number based at least in part on the unique chip key stored in the memory device. In some such embodiments, the instructions for instructing the network communication device to communicate an authentication communication to the backend system include instructions for instructing the network communication device to communicate an encrypted random number and a serial number of the processing device to the backend system. In such embodiments, the serial number is to be used by the backend system to recalculate the unique chip key using the master chip key, the recalculated unique chip key is to be used by the backend system to encrypt a copy of the random number previously received at the CCID from the backend system, and the encrypted copy of the random number is to be compared to the encrypted random number, thereby indicating whether the identity of the processing device is authenticated such that the transaction can be completed.
In some embodiments, the instructions also include instructions for receiving, at the processing device, a successful authentication communication from the backend system, and instructions for completing, by the processing device, the transaction with the backend system.
According to embodiments of the present invention, a system configured for authenticating a chip card interface device (CCID) during a transaction with the CCID includes a communication device configured for communicating with the CCID over a network, a processing device coupled with the communication device. The processing device is configured for receiving a transaction initiation communication from the CCID, instructing the communication device to communicate a request for authentication information to the CCID, receiving an authentication communication from the CCID in response to the request for authentication information, the authentication communication including information configured to indicate an identity of a processing device of the CCID, and determining whether the identity of the processing device corresponds with a processing device allowed to conduct the transaction.
In some such embodiments, the system also includes a memory device coupled with the processing device, the memory device configured for storing a master chip key. In some such embodiments, the processing device is further configured for creating a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key, the unique chip key configured for storage at a memory device of the CCID and configured for assisting authentication of the CCID with the backend system. In some such embodiments, the processing device is configured for instructing the communication device to communicate the unique chip key to the CCID and instructing the communication device to communicate instructions to store the unique chip key in the memory device of the CCID to the CCID.
In some embodiments, the processing device is further configured for instructing the communication device to communicate a random number to the CCID as part of the request for authentication information. In some such embodiments, the processing device is further configured for receiving, via the communication device, an encrypted random number, the encrypted random number being an encryption of the random number based at least in part on a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key. In some such embodiments, the processing device is further configured for receiving, via the communication device, a serial number of a processing device of the CCID. In some such embodiments, the processing device is configured for re-calculating the unique chip key by encrypting the received serial number and the stored master chip key. In some such embodiments, the processing device is configured for encrypting a copy of the random number communicated to the CCID based at least in part on the recalculated unique chip key. In some such embodiments, the processing device is further configured for comparing the encrypted copy of the random number with the encrypted random number received from the CCID.
In other such embodiments, the processing device is further configured for logging the serial number of the CCID as a potentially fraudulent device when the encrypted copy of the random number does not match the encrypted random number received from the CCID. In yet other other such embodiments, the processing device is further configured for terminating the transaction. In yet other such embodiments, the processing device is further configured for proceeding with the transaction when the encrypted copy of the random number matches the encrypted random number received from the CCID.
According to embodiments of the present invention, a method for authenticating a chip card interface device (CCID) during a transaction with the CCID includes communicating, by a communication device of a system, with the CCID over a network, receiving, at a processing device of the system coupled with the communication device of the system, a transaction initiation communication from the CCID, instructing, by the processing device, the communication device to communicate a request for authentication information to the CCID, receiving, at the processing device, an authentication communication from the CCID in response to the request for authentication information, the authentication communication including information configured to indicate an identity of a processing device of the CCID, and determining, by the processing device of the system, whether the identity of the processing device of the CCID corresponds with a processing device allowed to conduct the transaction.
In some embodiments, the method also includes storing, at a memory device coupled with the processing device, a master chip key. In some such embodiments, the method also includes creating a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key, the unique chip key configured for storage at a memory device of the CCID and configured for assisting authentication of the CCID with the backend system. In some such embodiments, the method also includes instructing, by the processing device, the communication device to communicate the unique chip key to the CCID and instructing the communication device to communicate instructions to store the unique chip key in the memory device of the CCID to the CCID.
In some embodiments, the method also includes instructing, by the processing device, the communication device to communicate a random number to the CCID as part of the request for authentication information. In some such embodiments, the method also includes receiving, at the processing device, via the communication device, an encrypted random number, the encrypted random number being an encryption of the random number based at least in part on a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key. In some such embodiments, the method also includes receiving, at the processing device, via the communication device, a serial number of a processing device of the CCID. In some such embodiments, the method includes re-calculating, by the processing device, the unique chip key by encrypting the received serial number and the stored master chip key.
In some such embodiments, the method also includes encrypting, by the processing device, a copy of the random number communicated to the CCID based at least in part on the recalculated unique chip key. In some such embodiments, the method also includes comparing, by the processing device, the encrypted copy of the random number with the encrypted random number received from the CCID.
In some such embodiments, the method also includes logging the serial number of the CCID as a potentially fraudulent device when the encrypted copy of the random number does not match the encrypted random number received from the CCID. In yet other such embodiments, the method also includes terminating, by the processing device, the transaction, and in yet others, the method also includes proceeding, by the processing device, with the transaction when the encrypted copy of the random number matches the encrypted random number received from the CCID.
According to embodiments of the present invention, a computer program product includes a non-transitory computer-readable medium including computer-readable instructions for execution by a chip card interface device (CCID). The instructions are configured for authenticating a chip card interface device (CCID) during a transaction with the CCID and include instructions for communicating, by a communication device of a system, with the CCID over a network, instructions for receiving, at a processing device of the system coupled with the communication device of the system, a transaction initiation communication from the CCID, instructions for instructing, by the processing device, the communication device to communicate a request for authentication information to the CCID, instructions for receiving, at the processing device, an authentication communication from the CCID in response to the request for authentication information, the authentication communication including information configured to indicate an identity of a processing device of the CCID, and instructions for determining, by the processing device of the system, whether the identity of the processing device of the CCID corresponds with a processing device allowed to conduct the transaction.
In some embodiments, the instructions also include instructions for storing, at a memory device coupled with the processing device, a master chip key. In some such embodiments, the instructions also include instructions for creating a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key, the unique chip key configured for storage at a memory device of the CCID and configured for assisting authentication of the CCID with the backend system. In some such embodiments, the instructions also include instructions for instructing, by the processing device, the communication device to communicate the unique chip key to the CCID and instructions for instructing the communication device to communicate instructions to store the unique chip key in the memory device of the CCID to the CCID.
In some embodiments, the instructions also include instructions for instructing, by the processing device, the communication device to communicate a random number to the CCID as part of the request for authentication information. In some such embodiments, the instructions also include instructions for receiving, at the processing device, via the communication device, an encrypted random number, the encrypted random number being an encryption of the random number based at least in part on a unique chip key based at least in part on a serial number of the processing device of the CCID and based at least in part on the master chip key. In some such embodiments, the instructions also include instructions for receiving, at the processing device, via the communication device, a serial number of a processing device of the CCID. In some such embodiments, the instructions also include instructions for re-calculating, by the processing device, the unique chip key by encrypting the received serial number and the stored master chip key, and in some such embodiments, the instructions also include instructions for encrypting, by the processing device, a copy of the random number communicated to the CCID based at least in part on the recalculated unique chip key.
In some such embodiments, the instructions also include instructions for comparing, by the processing device, the encrypted copy of the random number with the encrypted random number received from the CCID. In some such embodiments, the instructions also include instructions for logging the serial number of the CCID as a potentially fraudulent device when the encrypted copy of the random number does not match the encrypted random number received from the CCID.
In some embodiments, the instructions also include instructions for terminating, by the processing device, the transaction. In other embodiments, the instructions also include instructions for proceeding, by the processing device, with the transaction when the encrypted copy of the random number matches the encrypted random number received from the CCID.
Having thus described embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Embodiments of the present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
Systems, methods, and computer program products are provided for authenticating a chip card interface device (CCID) during a transaction with the CCID. The system has a communication device configured for communicating with the CCID over a network and a processing device coupled with the communication device. The processing device is configured for receiving a transaction initiation communication from the CCID and instructing the communication device to communicate a request for authentication information including a random number to the CCID. The CCID encrypts the random number with a unique chip key (UCK) previously created with a master chip key (MCK). Then, the CCID communicates the encrypted random number to the system along with a serial number. The system recalculates the UCK using the serial number, encrypts a copy of the random number using the recalculated UCK and compares the encrypted copy with the encrypted random number received from the CCID to authenticate the CCID.
As used herein, unless specifically limited by the context, the term “transaction” may refer to a purchase of goods or services, a withdrawal of funds, an electronic transfer of funds, a payment transaction, a credit transaction, a PIN change transaction, any other interaction between a CCID and a bank, such as a server and/or backend system of a bank, or any other interaction involving a bank account. As used herein, a “bank card” refers to a credit card, debit card, ATM card, check card, or the like, and a “bank account” refers to a credit account, debit account, deposit account, checking account, or the like. Although the phrases “bank card” and “bank account” include the term “bank,” the card need not be issued by a bank, and the account need not be maintained by a bank and may instead be issued by and/or maintained by other financial institutions. As discussed above, as used herein the terms “chip card” or “smart card” refer to a bank card having one or more electronic devices included in or on the card. The electronic device(s) may be or include processing device(s), memory device(s), communication device(s), the like, or any other electronic device(s).
As used herein, a “processing device” generally refers to a device or combination of devices having circuitry used for implementing the communication and/or logic functions of a particular system. For example, a processing device may include a digital signal processor device, a microprocessor device, and various analog-to-digital converters, digital-to-analog converters, and other support circuits and/or combinations of the foregoing. Control and signal processing functions of the system are allocated between these processing devices according to their respective capabilities. Further, in some embodiments, a processing device includes both a processor and a collocated or proximally located memory, that is, both located either on a single device, such as a chip, or multiple devices, such as multiple chips, proximate one another.
As used herein, a “communication device” generally includes a modem, server, transceiver, and/or other device for communicating with other devices directly or via a network, and/or a user interface for communicating with one or more users. As used herein, a “user interface” generally includes a display, mouse, keyboard, button, touchpad, touch screen, microphone, speaker, LED, light, joystick, switch, buzzer, bell, and/or other user input/output device for communicating with one or more users.
As used herein, a “memory device” generally refers to a device or combination of devices including one or more forms of computer-readable media for storing instructions, computer-executable code, and/or data thereon. Computer-readable media is defined in greater detail herein below. It will be appreciated that, as with the processing device, each communication interface and memory device may be made up of a single device or many separate devices that conceptually may be thought of as a single device.
The issuing bank 115 is the bank or other financial institution that maintains the customer's bank account, which, as described above, may be a credit account, debit account, or other account. Accordingly, the issuing bank 115 is also, typically, the financial institution that issues the chip card 110. In this regard, the issuing bank 115 includes a memory system housing a datastore of customer account information 120. The memory system housing the customer account information is typically part of or in communication with one or more backend systems 160 maintained by the issuing bank.
A “backend system” is one or more computers or computer-like devices such as one or more server systems, and a backend system typically has one or more processing devices such as a server and typically includes one or more memory devices as well as one or more communication devices.
The customer account information 120 generally includes an account number, an account balance, transaction information about previous transactions, and/or other financial and non-financial information about the customer and the customer's account. As described in greater detail below, embodiments of the present invention permit customers to change a PIN associated with an account without requiring access to an ATM. In some instances, accounts have more than one associated PIN for various purposes. For example, in one application, an account is given a regular PIN as well as a “panic” PIN for the customer to enter if he or she is being robbed. Generally, the PIN or PINS are stored as part of the customer account information 120 at the backend systems using an offset value that represents the value of the PIN. The PIN(s) are also stored on the chip card 110 associated with one or more accounts and issued by the issuing bank 115. In one embodiment, the PIN is a string of numbers, such as a string of four or six numbers. In other embodiments, however, the PIN may not be a number at all and may include a string of alphabetic or alphanumeric characters and/or other symbols and characters.
In some embodiments, the “Europay MasterCard VISA” (EMV) standard is used as the protocol for communication between the chip card 110 and a chip card-compatible bank card machine 125 or a chip card interface device 150 in accordance with the present invention. In other embodiments other standards of communication are used. EMV is a standard for interoperation of chip cards 110 and chip card-compatible bank card machines 125 such as POS terminals, ATMs and the like that was named for the three companies that originally cooperated to develop the standard. The EMV standard defines the interaction between the chip cards and chip card input/output devices. EMV governed transactions typically utilize cryptographic algorithms generally considered safer than traditional offline magnetic stripe transaction authentication. Types of algorithms used include, but are not limited to, DES, Triple-DES, RSA, SHA, and the like.
The system 100 generally also includes a bank card machine 125. In one embodiment, the bank card machine 125 is an ATM. In other embodiments, the bank card machine 125 is a point-of-sale terminal, such as a bank card terminal at the register of a grocery store or a pay-at-the-pump terminal at a gas station. The bank card machine 125 is configured to communicate with the issuing bank 115 via a network 130. The bank card machine 125 is owned, held, or otherwise associated with a bank card machine owner/holder 135. In one embodiment, the bank card machine owner/holder 135 is the issuing bank 115. For example, many banks have their own ATMs. In such an embodiment, the bank card machine 125 may communicate directly with the issuing bank 115 over the network 130 or through one or more other entities.
In other embodiments, however, the bank card machine owner/holder 135, is another bank or financial institution, a merchant, or the like. In such embodiments, the bank card machine 125 may communicate with the issuing bank 115 through the bank card machine owner/holder 135, the bank card machine owner/holder's bank 140, and/or one or more other entities.
The bank card machine owner/holder 135 may have a bank 140 that maintains a bank account for the bank card machine owner/holder 135. The bank card machine owner/holder's bank 140 may be the same as or different from the issuing bank 115. For example, where the bank card machine 125 is a POS terminal at a merchant's store, the bank card machine owner/holder 135 may be the merchant, and the bank card machine owner/holder's bank 140 may be the receiving bank that maintains the merchant's account and obtains payment from the issuing bank 115 for bank card purchases made at the merchant's store.
In another example, the bank card machine 125 is a kiosk-style ATM owned or leased by a merchant, such as a gas station or convenience store. In such an embodiment, although the bank card machine owner/holder (the “merchant” in this example) 135 may provide the money in the bank card machine 125, the bank card machine 125 may be operated by a host processor bank 145. In such an embodiment, the bank card machine 125 may communicate with the issuing bank 115 through the host processor bank 145. Where the transaction involves a withdrawal of cash from the bank card machine 125, the issuing bank 115 transfers funds to the host processor bank 145 via, for example, an electronic funds transfer, and the host processor bank 145 then transfer the funds via the Automated Clearing House (ACH) to the merchant's bank account maintained by the merchant's bank 140. In this way, the merchant 135 is reimbursed for the funds dispensed at the bank card machine 125.
During some transactions, the bank card machine 125 establishes a connection to the backend systems 160 for various purposes including, potentially, verification of cardholder PIN inputs. Such a connection is considered an “online” transaction, and an “offline” transaction is one in which the bank card machine 125 does not establish a connection with the backend systems 160 of the issuing bank 115.
In order to change the PIN number associated with the account and stored on the chip card 110, a cardholder 105 must either perform an online transaction at the bank card machine 125, which communicates with the issuing bank 115 via one or more of the several pathways discussed in greater detail above, or, the cardholder 105 can use a chip card interface device 150 (CCID) in accordance with embodiments of the present invention. The chip card interface device 150 forms an online connection to the issuing bank 115 via a host 155 such as, but not limited to, a personal computer and through the network 130 such as, but not limited to, the Internet.
The chip card interface device 150 is configured for recognizing the chip carried on or in the chip card 110, reading data from the chip, and writing data to the chip. The chip card interface device 150 is also configured for connecting with the issuing bank 115 via the host 155 and the network 130. For example, the chip card interface device 150 is configured for connecting with a host 155 such as a computer, ATM, POS terminal, mobile telephone or smartphone or the like via a communication protocol, either wired or wireless. For example, in one embodiment, the chip card 110 communicates with the chip card interface device 150, which communicates with a personal computer via a Universal Serial Bus (USB) connection. The chip card interface device 150 is configured to provide local or “offline” authentication of the customer's PIN in some applications, but is configured for making an online authentication during a PIN change process. The device 150 is also configured for providing the cardholder 105 an interface with which to change the PIN(s) saved on the chip card 110 and associated with one or more of the accounts associated with the chip card.
As shown in
Numerous other entities may also be involved in embodiments of the present invention, but are not shown in
Furthermore, although only a single representation of a network 130 is illustrated in
The chip card input/output device 230 is configured for reading data, such as account data corresponding to one or more accounts, from the chip card 110 as well as transmitting data to be updated on the chip card 110. In some embodiments, the chip card 110 includes electrical contacts and the chip card input/output device 230 also includes electrical contacts for coupling with and communicating via the electrical contacts of the chip card 110. For example, in some embodiments, the chip card communicates using the International Organization for Standardization (ISO) 7816 and ISO 7810 standards. In other embodiments, the chip card 110 includes a wireless communication device and the chip card input/output device 230 also includes a wireless communication device for coupling with and communicating via the wireless communication device of the chip card 110. For example, in some embodiments, the chip card communicates using the ISO 14443 standard for contactless smartcard communications, and in other embodiments other types of communication such as radio frequency identification (RFID) wireless communication is used.
The network communication device 240 is configured for communicating with the network 130 via the host 155, and in some embodiments with the backend systems 160. As mentioned above, the backend systems are or include, in various embodiments, one or more processing devices 160A, one or more memory devices 160B, and one or more communication devices 160C. In some embodiments, the network communication device 240 includes a wired interface for connecting with a personal computer such as a Universal Serial Bus (USB) connection, an IEEE 1394 (“Firewire”) protocol connection, or the like. In other embodiments, the network communication device 240 includes a wireless interface for connecting with the cardholder's personal computer such as a Bluetooth device, a Wi-Fi device, a radio frequency communication device, or the like.
The PED 250 is configured for receiving a cardholder current PIN input from the cardholder. The PED 250 is also configured for receiving a cardholder desired PIN input corresponding to the cardholder's desired new PIN. The PED 250, in some embodiments, is part of the chip card interface device 150, and in other embodiments, it is part of the host 155. In yet other embodiments, the PED 250 is a standalone device in communication with the chip card interface device 150. The PED 250 is any input device capable of receiving input from the cardholder indicating a PIN. For example, in one embodiment, the cardholder input device 245 is a nine-digit keypad. In other embodiments, the cardholder input device 245 is a keyboard or included on a keyboard, a touch-screen, or the like.
In some embodiments the CCID 150 includes a data protection system 288 configured for protecting data stored at the CCID in the event of a compromise. As shown in
In some embodiments of the CCID 150, a compromise detection system 290 is coupled with the data processing system 288. For example, in various embodiments, the compromise detection system 290 is coupled with the processing device 210, the memory device 220, or both. The compromise detection system 290 is configured for detecting a compromise of the CCID 150 and taking action to mitigate or eliminate the possible disclosure of sensitive data to a fraudster. A compromise, in some embodiments, for example, is a structural compromise of the housing 205 of the CCID 150. For example, a fraudster physically manipulates the housing 205 in order to gain physical access to the components housed therein. In various embodiments of the housing 205 the housing includes two or more pieces that are fit and secured together upon assembly of the CCID 150. In such a case, a fraudster seeking access to the components of the CCID 150 may physically separate the two or more pieces of the housing 205 thereby gaining access. In some instances, such fraudsters will connect a fraud device such as a keylogging device or keylogger with one or more components of the CCID 150, such as the processing device 210 and/or the memory device 220 in order to access sensitive information stored or passing through. The fraud device, in some instances, includes short range wireless communication capabilities such as radio communication, RFID, Bluetooth, Near Field Communication, or some other wireless communication capabilities. In such cases, the fraudster might place a receiver within communication range of the fraud device for receiving and storing sensitive data transmitted from the fraud device.
To protect against such a physical invasion of the CCID 150, the compromise detection system 290 is configured to detect the physical compromise, generate a detection signal for indicating the compromise, and communicate the detection signal to the data protection system 288. The data protection system 288 is configured to protect data stored by the CCID 150, or in other words, to take appropriate action to mitigate or eliminate the possibility of a fraudster gaining access to sensitive information.
In some embodiments of the compromise detection system 290, the system includes one or more detection devices 292 such as one or more sensors, for example, disposed proximal or adjacent an intersection between the pieces of the housing 205. In some such embodiments, the one or more detection devices 292 are configured to detect a separation of the pieces of the housing 205. In some embodiments, for example, the one or more detection devices 292 include one or more pressure sensors disposed on or adjacent an intersection between two or more pieces of the housing 205 such that if the pieces are separated, the one or more pressure sensors detects the separation and generates the detection signal configured for indicating the separation. In some embodiments, the one or more detection devices 292 include one or more contacts configured for completing a circuit when the pieces of the housing are secured and opening a circuit when the pieces of the housing are separated. In this regard, a detection signal indicating the separation can be generated. In other embodiments, the open circuit performs a similar function as the detection signal and the open circuit itself communicates the separation. For example, in one embodiment, the circuit is coupled with a switch, and once the circuit has been opened the switch is thrown and a detection signal is created, thereby indicating the separation of the housing pieces. In another embodiment, for example, the circuit is coupled with a processing device, and once the circuit is opened, a signal is no longer received at the processing device. In this embodiment, the processing device is configured, through program code, to recognize the lack of signal as an indication that the housing pieces have been separated. In some other embodiments, the one or more detection devices 292 are configured such that a minimal separation of the pieces of the housing does not trigger the sensors to generate a detection signal. In other embodiments, the one or more detection devices 292 are configured to communicate a detection signal regardless of the amount of separation between the pieces of the housing 205.
In some embodiments, the compromise detection system 290 includes a processing device 294 for receiving the detection signal from the one or more detection devices 292 and analyzing the detection signal to determine whether a breach of the housing 205 has occurred. In some embodiments, the one or more detection devices 292 communicate directly with the processing device 210 of the data protection system 288 rather than with a processing device 294 of the compromise detection system 290. In some embodiments, a predetermined distance threshold between the pieces of the housing 205 is stored at the processing device 294 and/or a memory device 296 of the compromise detection system 290. In some other embodiments, the predetermined distance threshold between the pieces of the housing 205 is stored at the processing device 210 and/or the memory device 220 of the data protection system 288. In some such embodiments, the detection signal generated by the one or more detection devices 292 is conditioned, if necessary, and then compared to the predetermined threshold to determine whether a breach of the housing 205 has occurred.
In other embodiments of the compromise detection system 290, the one or more detection devices 292 are, for example, one or more light sensors disposed within the housing 205 in order to detect changes, namely increases in ambient light reaching the interior of the CCID 150 such as might occur if he housing were compromised. In some such embodiments, the housing 205 of the CCID 150 is manufactured of opaque or substantially opaque materials such that little or no light is allowed to enter the housing 205 after the pieces of the housing are secured during manufacture. In other embodiments, for example, one or more detection devices 292 are disposed within the CCID 150 and configured to detect changes in the shape of the interior of the housing. In some embodiments, for example, one or more detection devices 205 monitor the interior surface of the housing 205 to ensure the housing 205 is not breached by cutting, drilling, puncture, or some other type of physical breach. In some such embodiments, the housing 205 is manufactured of one piece rather than two or more pieces, and therefore, a fraudster could not simply separate the two or more pieces of the housing to gain physical access, but rather, must physically alter the housing 205 in order to gain access. In some embodiments, the one or more detection devices 292 include one or more motion sensors, such as accelerometers, configured to measure acceleration or motion of the CCID 150. These embodiments may find use in a configuration where the CCID 150 is permanently mounted. Such motion sensors, should a fraudster attempt to dislodge the CCID 150 from its mount, are configured to detect the motion.
In some embodiments, the data protection system 288 is configured to erase some or all of the data stored within the CCID 150 in the event of a compromise of the housing 205. In some embodiments, the data protection system 288 is configured to lock the processing device 210 and/or the processing device 294 in the even of a compromise of the housing 205. In some such embodiments, the data protection system 288 is configured to both erase some or all the data stored within the CCID 150 as well as lock one or more processing devices, such as 210 and/or 294 in the event of a compromise of the housing 205.
In some embodiments, the data stored within the CCID 150 is split. In some such embodiments, the processing device 210 is a chip and includes both a processor and a memory on the same chip. Further, in some embodiments, the CCID 150 includes a both a memory device 220 in addition to a memory 210B collocated with a processor 210A at the processing device 210. In some embodiments, the processing device 210 includes two physically separated memories collocated with a processor on one chip. In various other embodiments, various other configurations of processors and memories are envisioned, but in some embodiments, there are two or more physical memories in the CCID 150.
In some embodiments, for example, the processing device 210 has a memory 210B and the CCID 150 also has another memory, memory device 220. In some such embodiments, for example, the data of the CCID is separated into sensitive data and non-sensitive data. In some embodiments, the sensitive data is stored on the memory 210B of the processing device 210 while the non-sensitive data is stored on the memory device 220 of the CCID 150. According to embodiments of the invention, in some instances, the processing device 210 erases or formats the sensitive data and retains the non-sensitive data in the event of a compromise. Sensitive data, in some embodiments, includes authentication data, also referred to as challenge/response data, such as, for example, key data and/or PIN data. This authentication data is typically used during authentication between the CCID 150 and the backend systems 160 during a transaction, such as a PIN change transaction. Non-sensitive data, in some embodiments, includes application data, such as data or instructions for performing the function of the CCID. In some embodiments, the application data includes instructions for performing a PIN change transaction. Furthermore, in some embodiments, non-sensitive data includes log data for logging the activities of the CCID 150 including data regarding the number, type and characteristics of transactions involving the CCID 150.
In other embodiments, for example, the processing device 210 is configured to be locked, and thereby rendered inoperable, in the event of compromise. In some embodiments, the processing device 210 locks itself, and in others, another component, such as another processing device, such as processing device 294, locks processing device 210. For example, in one embodiment, the processing device 210 receives a detection signal from the compromise detection system 290, and the processing device 210 includes code stored in its memory 210B instructing it to activate a locking function, such as by toggling a locking bit, thus effectively locking the processor 210A of the processing device 210 and rendering it inoperable. In other embodiments, the processing device 294 of the compromise detection system 290 receives the detection signal from the detection device 292 and instructs the processing device 210 of the CCID 150 to toggle a locking bit effectively locking the processor 210A of the processing device 210 and rendering it inoperable. In such a case, if the CCID 150 was compromised accidentally by its owner or other honest user, for example, the CCID 150 could be returned to the bank for refurbishment or replacement of the locked processing device 210.
In some instances, a fraudster may recognize the processing device 210 has been locked and seek to replace the processing device 210 with his own fraudulent processing device, thereby allowing the fraudster to collect sensitive information as the CCID is subsequently used in transactions. Some embodiments of the present invention are configured for preventing this type of fraud by implementation of an authentication method or “challenge/response method” as discuss in greater detail below with reference to
In some embodiments of the compromise detection system 290, the system 290 includes one or more software modules, stored on the memory device 296, stored on the memory device 220, and/or stored on memory 210B configured to minimize or eliminate compromise of data, such as sensitive data, when executed by processing device 294 and/or processing device 210. Several embodiments of such software modules, methods and computer program products embodying such software modules and methods are discussed below with reference to
Next, as represented by block 320, a host 155 initiates an “online” session with the backend systems 160 maintained by the issuing bank 115. The host 155 also receives stored account identification information from the backend systems 160. For example, in one embodiment, an account owner's account number is stored in the backend system and is retrieved by the host 155 during initiation of the online session.
As represented by block 330, the CCID 150 compares the card account identification information to the stored account identification information received from the backend systems 160 in order to authenticate the cardholder as the account owner. This step, in some embodiments, is performed by the host 155, and in some embodiments, it is optional. That is, in some applications, for example, this additional layer of authentication is not required, such as during a transaction involving an amount of money under a pre-determined threshold.
Next, as represented by block 340, the PED 250 of the CCID 150 receives cardholder input corresponding to the current PIN. Then, the PED 250 receives cardholder input corresponding to the cardholder's desired new PIN as represented by block 350. In some embodiments, as discussed in further detail below, the desired new PIN is entered more than once and the entries are compared for consistency in order to ensure the cardholder properly entered the desired new PIN.
Next, as represented by block 360, the network communication device 240 of the CCID 150 communicates the new PIN to the backend systems 160 through the host 155 and the network 130. The backend systems 160 then store the PIN. In some embodiments, the backend systems 160 store data related to the actual PIN value, such as, for example an offset value that can be manipulated by applying a re-generable default PIN value in order to determine the actual PIN value. Storing an offset value in this manner provides an additional layer of fraud protection over and above merely storing the PIN value itself.
Finally, as represented by block 370, the chip card input/output device 230 of the CCID 150 sends information regarding the new PIN to the chip card 110. As discussed in further detail below, the new PIN is communicated from the backend systems 160 as part of or in addition to a change PIN script created by the backend systems 160 for instructing the chip card to replace the previous PIN with the new PIN.
Referring now to
Referring now to
Next, as represented by block 520, the host 155 communicates network banking authentication information received from the cardholder 105 over a network 130 to the backend systems 160. Then, as represented by block 530, the backend systems 160 compare the network banking authentication information received from the cardholder 105 with stored network banking authentication information. If the two match, then the cardholder 105 is authenticated as the account owner. The network banking authentication information, in one embodiment, includes a username and a password associated with the username and both associated with one or more accounts. The username and password, in this example, can be stored open, that is, with any security measures to deter fraud, or may be locked, encrypted, or otherwise protected while stored in the backend systems 160.
Next, as represented by blocks 540 and 550, the backend systems 160 communicate the result of the authentication as well as the stored account identification information to the host 155 across the network 130. Then, as represented by block 560, the cardholder interface 270 of the host 155 communicates a “Change PIN” option to the cardholder 105. In one embodiment, for example, the “Change PIN” message is a link such as a hyperlink on the network/online banking webpage discussed above. In other embodiments, the option to change the PIN is communicated in another way such as a text or video message displayed on a video monitor that is part of the host 155, and in another embodiment, the change PIN option is communicated aurally, and the cardholder is given the option to respond verbally or otherwise, such as by providing input to another cardholder interface 270.
Referring now to
If the PIN entered by the cardholder does not match the current PIN stored on the chip card 110, as represented by decision block 650, the PIN try limit is reduced by one as represented by block 660, and the process is re-started at sub-step 610. The PIN try limit is a pre-determined threshold of changes for a user to input a PIN before the host 155, the PED 250, the CCID 150 and/or the chip card 110 disallow the user from attempting additional PIN entries. The process of
If the PIN entered by the cardholder does match the current PIN stored on the chip card 110, as represented by decision block 650, then the chip card 110 communicates positive validation to the chip card input/output device 230 of the CCID 150.
Referring now to
Next, the CCID 150 and/or chip card 110 compares the first received desired new PIN with the second received desired new PIN as represented by block 750. As represented by decision block 760, if the first received new PIN does not match the second received new PIN, the process is repreated to sub-step 710, requesting cardholder 105 entry of the desired new PIN. If the PINs match, the CCID 150 and/or chip card 110 locks (or encrypts) the new PIN using a key stored on the chip card 110 and/or in the CCID 150 as represented by block 770.
Various types of encryption individually or in combination are used in various embodiments and in various steps and sub-steps of the methods of the invention. For example, in one embodiment, symmetric keys such as Triple-DES or AES are used to encrypt and decrypt the various messages and data communicated to and from the chip card 110. In another embodiment, for example, asymmetric keys such as RSA are used. In other embodiments, other types of encryption, cryptography or other security measures are used to secure communications and data.
Referring now to
Next, in some embodiments, the backend systems 160 re-create the key used to lock the new PIN as represented by block 830. In other embodiments, the backend systems 160 use a “secret” or private key corresponding to the public key previously used to lock the new PIN, and in these embodiments, re-creating the key (step 830) is typically unnecessary. Then, the backend systems 160 unlock the new PIN using the re-created key or the secret key as represented by block 840. In other embodiments, as discussed above, various other methods of encryption and decryption are used. Finally, as represented by block 850, the backend systems 160 store an offset value representing the new PIN. The offset value, as discussed above, provides a layer of fraud protection because the PIN itself is not stored. In other embodiments, however, the PIN itself is stored or other storage methods are used, either secure or insecure.
Referring now to
Referring now to
In step 1010, the cardholder interface 270 of the host 155 communicates a message to the cardholder requesting cardholder input regarding checking the validity of the new PIN stored on the chip card 110. Next, as represented by block 1020, the PED 250 of the CCID 150 receives cardholder 105 input corresponding to the new PIN in response to the communicated message. Then the chip card input/output device 230 send an EMV VERIFY command including data corresponding to the cardholder input to the chip card 110 as represented by block 1030. Next, as represented by block 1040, the chip card 110, validates the PIN entered by the cardholder by comparing it with the current PIN stored on the chip card 110.
If the PIN entered does not match the current PIN stored on the chip card 110, as represented by decision block 1050, then the cardholder interface 270 of the host 155 communicates a message to the cardholder indicating the failed validation as represented by block 1060. At that time, the cardholder has several options including re-trying method 1000, requesting a new PIN be issued by the issuing bank, or others. If the PIN entered by the cardholder 105 matches the current PIN stored on the chip card 110 as represented by decision block 1050, the chip card communicates positive validation to the chip card input/output device 230 of the CCID 150, and in some embodiments, a message indicating the same is communicated to the cardholder via the cardholder interface 270.
Referring now to
Then, in some embodiments, the processing device 210 of the data protection system 288 analyses the detection signal to determine whether the detection signal indicates a compromise, which is also represented by decision block 1125. If the processing device 210 determines the detection signal does not indicate a compromise, the CCID 150 resumes normal operation, as represented by block 1130. In some embodiments, the compromise detection system 290 continuously, periodically, or regularly generates a signal representing the status of the one or more detection devices 292 such that the signal indicates whether a compromise has occurred. The compromise detection system 290 then communicates the detection signal to the processing device 210, in various embodiments, continuously, periodically and/or regularly. Further, in some such embodiments, the continuous, periodic, or regular detection signal generated and communicated by the compromise detection system 290 sometimes indicates there has been no compromise if that is the case and indicates there has been a compromise if that is the case. In other words, in these embodiments, the detection signal, merely because it is generated and communicated to the processing device 210 does not necessary indicate a compromise has taken place. For example, in one embodiment, the detection signal is generated and communicated constantly at a level of five volts; however, if a compromise occurs, the compromise detection system 290 is configured to generate and communicate a detection signal at a level of one volt. The processing device 210 of the data protection system 288 is programmed to analyze the detection signal and determine whether a compromise has occurred. Specifically, for example, the processing device 210 may determine that, if the detection signal drops below a predetermined threshold, such as two volts, for a predetermined period of time, such as five seconds, then the compromise detection system is indicating that a compromise has occurred. In other example embodiments, the detection signal generated and communicated is a digital signal and indication that a compromise has occurred is, in some embodiments, based on whether a predetermined bit in a bitstream is positive or negative, or a one or zero.
If the processing device determines the detection signal indicates a compromise has occurred, as represented by decision block 1125, the data protection system 288 protects data stored at the CCID 150 based at least in part on the received and analyzed detection signal, as represented by block 1135. In various embodiments of step 1135, the data protection system 288 takes one or more data protection steps as discussed below with reference to
Referring now to
In some embodiments, as discussed above, the processing device 210 only instructs the memory(ies) to erase a portion of the stored data, which, in some such embodiments is the sensitive data such as key data and PIN data. In some embodiments, the sensitive data is physically separated from the non-sensitive data so that erasure of the sensitive data in the event of compromise allows for retaining non-sensitive data such as application data and/or log data. In some embodiments, a processor or processing device other than the processing device 210 instructs erasure of some or all the stored data. In some other embodiments, some or all the data to be erased is stored in one or more memories or memory devices other than memory device 220 or memory 210B.
Referring now to
Next, as represented by block 1320, the data protection system processing device 210 activates a locking function, thereby locking the processing device and rendering it inoperable. As discussed above, in some embodiments, the processing device 210 locks itself (and/or its processor 210A and memory 210B) and in other embodiments another component of the CCID, such as another processor or processing device, for example processing device 294 of the compromise detection system 290 sends instructions for locking the processing device 210 (and/or its processor 210A and memory 210B).
As mentioned above, in some embodiments, both methods 1200 and 1300 are performed in the event of a compromise. In some embodiments, method 1200 is performed before step 1300, as the processing device must, in some cases, instruct the erasure of the memory before it is rendered inoperable. In some embodiments, methods 1200 and 1300 are performed concurrently or substantially concurrent if possible. Of course, in these embodiments, if the processing device 210 is instructing erasure of the memory, it must perform such instructions before being rendered inoperable. However, in some embodiments, the memory is erased by one or more other devices, such as by another processing device, for example processing device 294 of the compromise detection system 290. In such cases, and in some embodiments therefore, method 1300 can be performed before, overlapping, concurrently with, or after step 1200.
Referring now to
Next, the compromise detection system of the CCID detects a compromise of the CCID, a detection signal is generated and communicated, and the processing device analyzes the detection signal (as discussed above with reference to
In some alternate embodiments, however, the processing device 210 instructs the memory(ies) to erase non-sensitive data as well. For example, in the event of a compromise non-sensitive data such as application data and/or log data can be erased. In some instances, erasing application data is useful as it can deter the fraudster from attempting to reuse the processing device in further fraudulent endeavors. As discussed elsewhere, of course, the sophisticated fraudster could replace the processing device having no application data with a fraudulent processing device and attempt to reuse the CCID, in which case, the authentication methods, as discussed below, should prevent the fraudster from succeeding.
Referring now to
Next, as represented by block 1530, the backend system makes a determination as to whether the CCID is authentic and therefore has permission to continue the initiated transaction. If the backend system determines the CCID is not authentic, the backend system terminates the transaction as represented by block 1540. If the backend system determines the CCID is authentic, and therefore has permission to continue with the initiated transaction, the backend system resumes and completes the transaction, as represented by block 1550.
Referring now to
Referring now to
Referring now to
In various embodiments, both methods 1200 and 1300 are performed, and in other embodiments, only one or the other are performed in response to a compromise. Further, in various embodiments, various combinations of methods 1100, 1200, 1300, 1400, 1500, 1600, and 1700 are used. For example, in one embodiment, the CCID and backend systems are configured to perform the authentication methods, namely methods 1500, 1600, and 1700 or variations thereof and do not perform method 1100 including erasing the memory (method 1200) and locking the processor (method 1300). In another embodiment, for example, the CCID is configured to lock the processor (method 1300) and the CCID and backend systems are configured for the authentication methods and/or variations thereof (methods 1500-1700). In yet another embodiment, for example, the CCID is configured to erase the memory (method 1200), is not configured to lock the processor (method 1300), but is configured to perform the authentication methods and/or variations thereof (methods 1500-1700).
In summary, systems, methods, and computer program products are provided for authenticating a chip card interface device (CCID) during a transaction with the CCID. The system has a communication device configured for communicating with the CCID over a network and a processing device coupled with the communication device. The processing device is configured for receiving a transaction initiation communication from the CCID and instructing the communication device to communicate a request for authentication information including a random number to the CCID. The CCID encrypts the random number with a unique chip key (UCK) previously created with a master chip key (MCK). Then, the CCID communicates the encrypted random number to the system along with a serial number. The system recalculates the UCK using the serial number, encrypts a copy of the random number using the recalculated UCK and compares the encrypted copy with the encrypted random number received from the CCID to authenticate the CCID.
As will be appreciated by one of skill in the art, the present invention may be embodied as a method, apparatus (including a system), computer program product, or a combination of the foregoing. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.), or an embodiment combining software and hardware aspects that may generally be referred to herein as a “system.”
Furthermore, embodiments of the present invention may take the form of a computer program product comprising a computer-readable storage medium having computer-usable program code/computer-readable instructions embodied in the medium. Any suitable computer-readable medium may be utilized. The computer-readable medium may be, for example but not limited to, a non-transitory, tangible medium such as an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection having one or more wires; a tangible medium such as a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a compact disc read-only memory (CD-ROM), or other tangible optical or magnetic storage device; or transmission media such as those supporting the Internet or an intranet.
Computer-readable instructions for carrying out operations of the present invention may be written in an object-oriented, scripted or unscripted programming language such as Java, Perl, Smalltalk, C++, or the like. However, the computer-readable instructions for carrying out operations of the invention may also be written in conventional procedural programming languages, such as the “C” programming language or similar programming languages.
Embodiments of the present invention are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatuses (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams shown in
These computer-readable program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction mechanisms which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer-readable program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. Alternatively, computer program implemented steps or acts may be combined with operator or human implemented steps or acts in order to carry out an embodiment of the invention.
While certain exemplary embodiments have been described and shown in the accompanying drawings, it is to be understood that such embodiments are merely illustrative of, and not restrictive on, the broad invention, and that this invention not be limited to the specific constructions and arrangements shown and described, since various other changes, combinations, omissions, modifications and substitutions, in addition to those set forth in the above paragraphs, are possible. Those skilled in the art will appreciate that various adaptations and modifications of the just described embodiments can be configured without departing from the scope and spirit of the invention. Therefore, it is to be understood that, within the scope of the appended claims, the invention may be practiced other than as specifically described herein.
This Non-provisional Patent Application claims priority to Provisional Patent Application Ser. No. 61/295,515 titled “Personal Identification Number Changing System and Method,” filed Jan. 15, 2010, assigned to the assignee hereof and hereby expressly incorporated by reference herein. This Application is also a continuation-in-part of patent application Ser. No. 12/752,567 titled “Personal Identification Number Changing System and Method,” filed Apr. 1, 2010, assigned to the assignee hereof and hereby expressly incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
61295515 | Jan 2010 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12752567 | Apr 2010 | US |
Child | 12847373 | US |