The present invention relates to an automated transaction system, a method for control thereof, and a card reader. The present invention is suitable for application to an automated transaction system including: an automated teller machine (ATM) that performs deposit and withdrawal transactions based on card information recorded in a credit or cash card and the user's operation; and a core banking host computer that authorizes the deposit and withdrawal transactions and performs other processes, for example.
In recent years, along with the rapid development of information societies, the need for management of personal information and confidential information has been increasing in companies, local governments, and the like. In addition, extraction of confidential information by malware and unauthorized transactions has become big issues in the closed networks within ATMs, which were previously not considered problematic.
Confidential information handled by ATMs includes magnetic information recorded in a magnetic tape attached to the back of a card and card information such as a card number and a bank code (Patent Literature 1). If magnetic information is leaked, a counterfeit card can be created for improper use based on the magnetic information. If the card number is leaked together with the expiration date or the like, the leaked information can be improperly used for Internet shopping.
In one of the countermeasures to prevent such information leakage, card information read from a card inserted to an ATM by the user is encrypted by the controller of the ATM to be transmitted to a core banking host computer that authorizes the transaction or performs other processing.
Patent Literature 1: JP-A-H05-274331
However, even when the ATM controller encrypts card information and transmits the encrypted card information to a core banking host computer as described above, malware infection of components of the ATM, particularly an ATM controller that governs the overall operational control of the ATM and communicates with the core banking host computer, could cause leakage of the card information via the ATM controller.
The present invention has been made in the light of the aforementioned problem, and an object of the present invention is to provide a highly-reliable automated transaction system that is able to prevent leakage of card information sufficiently for practical use, a method for control thereof, and a card reader.
To solve the aforementioned problem, according to the present invention, in an automated transaction system which includes an automated transaction apparatus and a host apparatus and in which the automated transaction apparatus transmits to the host apparatus, a request message for a transaction corresponding to a user's operation for the automated transaction apparatus and performs the transaction based on a response message from the host apparatus corresponding to the request message, the automated transaction apparatus includes: a card reader that reads first card information recorded in the card medium inserted by the user: and an apparatus controller that generates the request message, transmits the generated request message to the host apparatus, and executes a control process to perform the transaction based on the response message from the host apparatus. The card reader holds first card format information including information that is related to the format of the first card information and is specific to each financial institution. With reference to the first card format information, the card reader acquires predetermined confidential information including the card number from the first card information read from the card medium. The card reader encrypts the acquired confidential information and transmits the encrypted confidential information to the apparatus controller. The apparatus controller generates the request message including the encrypted confidential information transmitted from the card reader and transmits the generated request message to the host apparatus.
Moreover, according to the present invention, in a method for control of an automated transaction system which includes an automated transaction apparatus and a host apparatus and in which the automated transaction apparatus transmits to the host apparatus, a request message for a transaction corresponding to a user's operation for the automated transaction apparatus and performs the transaction based on a response message from the host apparatus corresponding to the request message, the automated transaction apparatus includes: a card reader that reads first card information recorded in the card medium inserted by the user; and an apparatus controller that generates the request message, transmits the generated request message to the host apparatus, and executes a control process to perform the transaction based on the response message from the host apparatus. The card reader holds first card format information in which information that is related to the format of the first card information is registered and which is specific to each financial institution. The control method includes: a first step of, by referring to the first card format information, the card reader acquiring predetermined confidential information including the card number from the first card information read from the card medium; a second step of the card reader encrypting the acquired confidential information and transmitting the encrypted confidential information to the apparatus controller; and a third step of the apparatus controller generating the request message including the encrypted confidential information transmitted from the card reader and transmitting the generated request message to the host apparatus.
Furthermore, according to the present invention, a card reader is provided for an automated transaction apparatus, that transmits a request message for a transaction corresponding to a user's operation and performs the transaction based on a response message from the host apparatus corresponding to the request message, and reads card information recorded in a card medium inserted into the automated transaction apparatus by the user. The card reader includes: a card transporting and reading section which transports the card medium inserted in the automated transaction apparatus and reads the card information from the card medium; and a card reader cryptographic processor which encrypts the card information read from the card medium by the card transporting and reading section. The automated transaction apparatus includes: an apparatus controller that generates the request message, transmits the generated request message to the host apparatus, and executes a control process to perform the transaction based on the response message from the host apparatus. The card reader cryptographic processor holds first card format information in which information that is related to the format of the first card information is registered and which is specific to each financial institution; by referring to the first card format information, acquires predetermined confidential information including the card number from the first card information read from the card medium: encrypts the acquired confidential information; and transmits the encrypted confidential information to the apparatus controller.
According to the automated transaction system, the control method therefor, and the card reader of the present invention, the confidential information is encrypted. Even if the ATM controller is infected with malware and leaks the first information, it is therefore possible to prevent leakage of the card number necessary for creation of a counterfeit card or improper use for Internet shopping.
According to the present invention, it is possible to implement a highly-reliable automated transaction system which is able to prevent leakage of card information sufficiently for practical use, a method for control thereof, and a card reader.
Hereinafter, embodiments of the present invention are described in detail with reference to the drawings.
In
The ATM 2 is an automated transaction apparatus which performs transactions, including deposits and withdrawals of cash, in response to users' operations. As illustrated in
The ATM 2 may include a processing section (not illustrated) that handles deposited coins and coins to be dispensed. In the example described in the first embodiment, the card medium is an integrated circuit (IC) card 21.
The storage area of the memory 31 of the ATM controller 10 is divided into a program region 31A and a data region 31B for management. The program region 31A stores an ATM application 40 controlling entire transactions of the ATM 2, software to control the I/O (Input/Output) controller 11, bill processing section 12, card reader 13, encryption keypad 14, receipt printer 15, passbook printer 16, journal printer 17, security camera 18, display section 19, and communication processor 20, and a software setting file 50 as a setting file for software environments and the like. The above software includes I/O controller control software 41, bill processing section control software 42, card reader control software 43, encryption keypad control software 44, receipt printer control software 45, passbook printer control software 46, journal printer control software 47, security camera control software 48, and communication processor software 49.
The data region 31B stores data necessary for deposit and withdrawal transactions at the ATM 2. For example, the data region 31B stores: a card number 60; an ATM controller (ATC) random number 61 generated at each transaction to enhance the security of transaction messages exchanged with the core banking host computer 3 (
As illustrated in
The overall control firmware 82 is software having a function to control communication with the ATM controller 10 and a function to control transportation by the card transporting and reading section 71 (
The overall control buffer 85 is a data area used for overall control and includes a buffer for communication with the ATM controller 10. The IC card communication buffer 86 and CSE communication buffer 87 are buffers for controlling communication with the IC card 21 and the card reader cryptographic processor 72, respectively.
As illustrated in
The storage region of the memory 91 of the card reader cryptographic processor 72 is divided into a program region 91A and a data region 91B for management in a similar manner to the card reader controller 70 (
The memory 91A stores an application 92, communication control firmware 93, and cryptographic processing firmware 94. The application 92 is software having a function to control the entire card reader cryptographic processor 72. The communication control firmware 93 is software having a function to control communication with the card reader controller 70. The cryptographic processing firmware 94 is software having a function to perform electronic signature-related processing, encryption, and the like.
The data region 91B properly stores a root verification key 95, a CR signature key 96, a CR verification key 97, a CR verification key signature 98, an EPP public key 99, a host public key 100, a CR-EPP master key 101, a CR-EPP session key 102, a CR-host master key 103, a CR-host session key 104, and the like during each process of various types of processing described later.
The encryption keypad (EPP) 14 includes an encryption keypad controller 110, a keypad 111, and the like as illustrated in
As illustrated in
The storage region of the memory 121 of the encryption keypad controller 110 is divided into a program region 121A and a data region 121B for management.
The program region 121A stores an application 122, communication control firmware 123, and cryptographic processing firmware 124. The application 122 is software having a function to control the entire encryption keypad controller 110. The communication control firmware 123 is software having a function to control communication with the ATM controller 10 and card reader 13. The cryptographic processing firmware 124 is software having a function to perform electronic signature-related processing, encryption, and the like.
The data region 121B includes an overall control buffer 125 and a communication buffer 126. The data region 121B properly stores the root verification key 95, an EPP secret key 105, the EPP public key 99, an EPP public key signature 106, the CR verification key 97, the CR-EPP master key 101, the CR-EPP session key 102, and the like during each process of various types of processing described later.
The IC region 130 includes information processing resources, including a CPU 131 and a memory 132. The CPU 131 is a processor that governs the operational control of the IC region 130 of the IC card 21. The memory 132 is composed of a semiconductor memory, for example.
The storage region of the memory 132 of the IC region 130 is divided into a program region 132A and a data region 132B for management. The program region 132A stores an IC application 133 that controls processing in the IC region 130, communication control firmware 134, cryptographic processing firmware 135, and the like.
The IC application 133 is software that controls the entire IC card 21. The communication control firmware 134 is software having a function to control data communication with the card reader 13 (
The data region 132B stores data necessary for processing in the IC region 130. To be specific, the data region 132B includes a processing buffer 136 and a communication buffer 137 necessary for control in the IC region 130 and stores transaction data 138 necessary for transactions using the IC card 21. The transaction data 138 includes a card number (hereinafter, referred to as a primary account number (PAN)), information having the substantially same contents as later-described magnetic information stored in the magnetic region 140, discretionary information, and the like. The discretionary information is information that the financial institution that has issued the IC card 21 can freely store.
In the magnetic information 140, each track (tracks 1 to 3 in
The storage region of the memory 151 of the core banking host computer 3 is divided into a program region 151A and a data region 151B for management. The program region 151A stores a host application 152 that controls the overall processing of the core banking host computer 3, communication control software 153, cryptographic processing software 154, and the like.
The host application 152 is software that controls the entire core banking host computer 3. The communication control software 153 is software having a function to control data communication between the core banking host computer 3 and each ATM 2. The cryptographic processing software 154 is software having a cryptographic processing function to verify a message authentication code transmitted from each ATM 2 and generate a new message authentication code.
The memory 151B stores data necessary for processing in the core banking host computer 3. To be specific, the data region 151B includes an overall control buffer 155 necessary for the overall control of the core banking host computer 3 and a communication buffer 156. The memory 151B properly stores the root verification key 95, a host secret key 107, the host public key 100, a host public key signature 108, the CR verification key 97, the CR-host master key 103, the CR-host session key 104, and the like during each process of various types of processing described later.
The memory 151B of the memory 151 of the core banking host computer 3 further stores a financial institution table (FIT) 157 necessary for transactions using the IC card 21.
The FIT 157 is a table storing various types of information specific to each financial institution. As illustrated in
The financial institution ID is an identifier which is given to the corresponding financial institution and is specific to the same financial institution as described above. The financial institution ID offset refers to an amount of offset of the stored financial institution ID from the top of the storage region of the magnetic tape attached to the back of the IC card 21 that the same financial institution has issued. The maximum PIN length refers to the maximum length of the personal identification number (PIN) determined by the same financial institution as described above.
The PAN offset refers to an amount of offset of the stored PAN (card number) from the top of the storage region of the magnetic tape of the IC card 21 that the same financial institution has issued. The PAN length refers to the length of the card number of the financial institution.
The language code offset refers to an amount of offset of the stored language code from the top of the storage region of the magnetic tape of the IC card 21 that the same financial institution has issued. The PIN block format refers to a format (an encryption format) used to encrypt within the encryption keypad 14, the PIN entered by the user.
The storage region of the memory 171 of the certificate authority 5 is divided into a program region 171A and a data region 171B for management. The memory 171A stores: an application 172 that controls the overall processing of the certificate authority 5; communication control software 173 that outputs a verification key and performs other processing; and cryptographic processing software 174 having a function to execute various types of processing concerning encryption.
The data region 171B stores data necessary for processing in the certificate authority 5. To be specific, the data region 171B includes: a processing buffer 175 necessary for overall control of the certificate authority 5; and a communication control buffer 176 used to control communication. The data region 171B properly stores a root signature key 109, the root verification key 95, and the like during each process of various types of processing described later.
Next, a description is given of the flow of each process executed in the automated transaction system 1 of the first embodiment. In the following description, subjects that execute various types of processing are the ATM controller 10 (
First, a description is given of the flow of setting of cryptographic keys necessary for implementation of a secure transaction in the automated transaction system 1. The key setting is performed before the ATM 2 becomes available for users.
For setting the initial keys, first, an asymmetric root key pair (the root signature key 109 and the root verification key 95) is generated by an organization (mainly assumed to be an ATM vendor) responsible for secure transactions in the automated transaction system 1, in the certificate authority 5 having a secure environment (S1). The certificate authority 5 stores the generated root signature key 109 and root verification key 95 in the data region 171B of the memory 171 (
In the ATM 2, the card reader cryptographic processor 72 of the card reader 13 (
Upon receiving the CR verification key 97 (S6), the certificate authority 5 uses the root signature key 109 generated in the step S1 to give an electronic signature (the CR verification key signature 98) to the CR verification key 97 (S7). The certificate authority 5 transmits the given CR verification key signature 98 and the root verification key 95 generated in the step S1 to the card reader cryptographic processor 72 (S8).
Upon receiving the CR verification key signature 98 and the root verification key 95 (S9), the card reader cryptographic processor 72 stores the received CR verification key signature 98 and root verification key 95 in the data region 91B (
After the certificate authority 5 generates the root signature key 109 and root verification key 95 described for
The encryption keypad 14 (to be precise, the encryption keypad controller 110, the same applies to the following description) stores the generated EPP secret key 105 and EPP public key 99 in the data region 121B (
Upon receiving the EPP public key 99 (S23), the certificate authority 5 uses the root signature key 109 to give an electronic signature to the EPP public key 99 (S24). The certificate authority 5 transmits an EPP public key signature 106, which is the given electronic signature, and the root verification key 95 to the encryption keypad 14 (S25).
Upon receiving the EPP public key signature 106 and root verification key 95 (S26), the encryption keypad 14 stores the EPP public key signature 106 and root verification key 95 in the data region 121B (
After the certificate authority 5 generates the aforementioned root signature key 109 and root verification key 95 described for
The core banking host computer 3 transmits the host public key 100 to the certificate authority 5 to give an electronic signature to the host public key 100 using the root signature key 109 (S32).
Upon receiving the host public key 100 (S33), the certificate authority 5 uses the root signature key 109 to give an electronic signature to the host public key 100 (S34). The certificate authority 5 transmits a host public key signature 108, which is the electronic signature given to the host public key 100, and the root verification key 95 to the core banking host computer 3 (S35).
Upon receiving the host public key signature 108 and root verification key 95 (S36), the core banking host computer 3 stores the host public key signature 108 and root verification key 95 in the memory 151B (
In the automated transaction system 1 of the first embodiment, in order to securely exchange confidential information between the card reader 13 and encryption keypad 14 and between the card reader 13 and core banking host computer 3, the confidential information is encrypted using a session key. The session key is encrypted using a master key so as to be securely shared by the card reader 13 and encryption keypad 14 and by the card reader 13 and core banking host computer 3.
Hereinafter, a description is given of the procedure to securely share the master key between the card reader 13 and encryption keypad 14 with reference to
In this case, first, the card reader cryptographic processor 72 (
Upon receiving the CR verification key 97 and CR verification key signature 98 (S41), the encryption keypad 14 verifies the signature validity of the CR verification key signature 98 using the root verification key 95 (S42). When the signature validity is verified, the encryption keypad 14 stores the CR verification key 97 in the data region 121B (
Upon receiving the EPP public key 99 and EPP public key signature 106 (S45), the card reader cryptographic processor 72 verifies the signature validity of the EPP public key signature 106 using the root verification key 95 (S46). When the signature validity is verified, the card reader cryptographic processor 72 stores the EPP public key 99 in the data region 91B (
Subsequently, as illustrated in
The card reader cryptographic processor 72 encrypts the CR-EPP master key 101 using the EPP public key 99 and gives an electronic signature to the encrypted CR-EPP master key 101 (hereinafter, referred to as an encrypted CR-EPP master key) using the CR signature key 96 (S52). The card reader cryptographic processor 72 then transmits the encrypted CR-EPP master key 101A and the electronic signature 101B to the encryption keypad 14 (S53).
Upon receiving the encrypted CR-EPP master key 101A and electronic signature 101B (S54), the encryption keypad 14 first verifies the validity of the electronic signature 101B using the CR verification key 97 (S55). When the validity is verified, the encryption keypad 14 decrypts the CR-EPP master key 101A using the EPP secret key 105 (S56) and stores the decrypted CR-EPP master key 101 in the data region 121B (
Next, a description is given of the procedure through which the card reader 13 and the core banking host computer 3 share a master key with reference to
Upon receiving the CR verification key 97 and CR verification key signature 98 (S61), the core banking host computer 3 verifies the signature validity of the CR verification key signature 98 using the root verification key 95 (S62). When the signature validity is verified, the core banking host computer 3 stores the CR verification key 97 in the memory 151B (
Upon receiving the host public key 100 and host public key signature 108 (S65), the card reader cryptographic processor 72 verifies the signature validity of the host public key signature 108 using the root verification key 95 (S66). When the signature validity is verified, the card reader cryptographic processor 72 stores the host public key 100 in the data region 91B (
As illustrated in
The card reader cryptographic processor 72 further encrypts the CR-host master key 103 using the host public key 100 and gives an electronic signature to the encrypted host public key 100 (hereinafter, referred to as an encrypted host public key) using the CR signature key 96 (S72). The card reader cryptographic processor 72 then transmits the encrypted CR-host master key and electronic signature to the core banking host computer 3 (S73).
Upon receiving the encrypted CR-host master key and electronic signature (S74), the core banking host computer 3 first verifies the validity of the electronic signature using the CR verification key 97 (S75). When the validity of the electronic signature is verified, the core banking host computer 3 decrypts the encrypted CR-host master key using the host secret key 107 (S76) and stores the thus-obtained decrypted CR-host master key 103 in the memory 151B (
Next, with reference to
The card reader cryptographic processor 72 first generates the CR-EPP session key 102 using random numbers (S80) and stores the generated CR-EPP session key 102 in the data region 91B (
The card reader cryptographic processor 72 encrypts the CR-EPP session key 102 using the CR-EPP master key 101 (S82) and then transmits the encrypted CR-EPP session key 102 (hereinafter, referred to as an encrypted CR-EPP session key 102A) to the encryption keypad 14 (S83).
Upon receiving the encrypted CR-EPP session key 102A (S84), the encryption keypad 14 decrypts the CR-EPP session key 102A using the CR-EPP master key 101 (S85) and stores the thus-obtained decrypted CR-EPP session key 102 in the data region 121B (
Next, with reference to
The card reader cryptographic processor 72 first generates the CR-host session key 104 using random numbers (S90) and stores the generated CR-host session key 104 in the data region 91B (
The card reader cryptographic processor 72 encrypts the CR-host session key 104 using the CR-host master key 103 (S92) and then transmits the encrypted CR-host session key 104 (hereinafter, referred to as an encrypted CR-host session key 104A) to the core banking host computer 3 (S93).
Upon receiving the encrypted CR-host session key 104A (S94), the core banking host computer 3 decrypts the CR-host session key 104A using the CR-host master key 103 (S95) and stores the thus-obtained decrypted CR-host session key 104 in the memory 151B (
Next, a description is given of the flow of transaction using the IC card 21 (
As illustrated in
In the card reader 13, the card reader cryptographic processor 72 receives the encrypted FIT 157A (S102) and decrypts the received encrypted FIT 157A using the CR-host session key 104 (S103). The card reader cryptographic processor 72 stores the original FIT 157 obtained by the decryption, in the data region 91B (
When the user performs a predetermined operation to start a transaction and inserts the IC card 21 into the ATM 2, as illustrated in
Upon receiving the card read request (S111), the card reader controller 70 starts a card reading process and accepts the IC card 21 inserted by the user (S112). The card reader controller 70 then causes the card transporting and reading section 71 (
Upon receiving the magnetic information 180 (S115), the card reader cryptographic processor 72 stores the received magnetic information 180 in the data region 91B (
The card reader cryptographic processor 72 then transmits the thus-acquired masked magnetic information 180 (hereinafter, referred to as masked magnetic information 180A) and the encrypted magnetic information 180 (hereinafter, referred to as encrypted magnetic information 180B) to the ATM controller 10 (S119).
Upon receiving the masked magnetic information 180A and encrypted magnetic information 180B (S120), the ATM controller 10 stores the masked magnetic information 180A and encrypted magnetic information 180B in the data region 31B (
Subsequently, as illustrated in
Upon receiving the FIT check request (S131), the card reader cryptographic processor 72 executes an FIT checking process to check the magnetic information 180 against the FIT 157 (S132). Through the FIT checking process, the card reader cryptographic processor 72 specifies the financial institution having issued the IC card 21 among the information concerning the financial institutions registered in the FIT 157. The card reader cryptographic processor 72 then acquires record information (hereinafter, referred to as FIT record information 183 of the specified financial institution) of the record 160 (
The card reader cryptographic processor 72 uses the FIT record information 183 to acquire the PAN of the IC card 21 from the magnetic information 180 and encrypts the acquired PAN (S134). The card reader cryptographic processor 72 also uses the FIT record information 183 to acquire the language code of the IC card 21 from the magnetic information 180 (S135).
The card reader cryptographic processor 72 transmits the thus-acquired encrypted PAN (hereinafter, referred to as an encrypted PAN 181A), the language code 182, and the other FIT record information 183 to the ATM controller 10 as an FIT check result 184 (S136).
Upon receiving the FIT check result 184 (S137), the ATM controller 10 stores the received FIT check result 184 in the data region 31B (
Based on the language code 182 included in the FIT check result 184 acquired in in the step S137, the ATM controller 10 controls the display section 19 (
Next, as illustrated in
Upon receiving the IC chip read request (S141), the card reader controller 70 causes the card transporting and reading section 71 (
Upon receiving the confidential IC information 191 (S144), the card reader cryptographic processor 72 stores the received confidential IC information 191 in the data region 91B (
The card reader cryptographic processor 72 then masks the confidential IC information 191 (S146) and encrypts the confidential IC information 191 (S147). The card reader cryptographic processor 72 then transmits the masked confidential IC information 191 (hereinafter, referred to as masked confidential IC information 191A) and the encrypted confidential IC information 191 (hereinafter, referred to as an encrypted confidential IC information 191B) to the ATM controller 10 (S148). The masking and encryption herein are the same as the masking and encryption performed for the aforementioned magnetic information 180, respectively.
Upon receiving the masked confidential IC information 191A and encrypted confidential IC information 191B (S149), the ATM controller 10 stores the masked confidential IC information 191A and encrypted confidential IC information 191B in the data region 31B (
Next, as illustrated in
Each time that the user presses a key of the keypad 111, the encryption keypad 14 transmits to the ATM controller 10, information (hereinafter, referred to as key press information) 200 that the key has been pressed (S162). Note that in the step S162, the encryption keypad 14 only notifies the ATM controller 10 of information that one of the keys has been pressed (hereinafter, referred to as key press information 200) but does not notify the ATM controller 10 of information on which key has been pressed.
Upon receiving the key press information 200 (S163), the ATM controller 10 causes the ATM screen to display information on how many digits of the PIN the user has entered, when needed.
When the entry of the PIN by the user is completed (when the enter key of the keypad 111 is pressed or a specified number of PIN digits have been entered), the encryption keypad 14 transmits to the ATM controller 10, a notification (hereinafter, referred to an entry completion notification) indicating completion of the entry of the PIN (S164). Based on the entry completion notification, the ATM controller 10 recognizes completion of the entry of the PIN (S165). The ATM controller 10 may be configured to determine completion of the entry of the PIN based on the number of digits that have been entered. The encryption keypad 14 then stores the PIN entered by the user in the data region 121B (
The ATM controller 10 then requests transfer of the encrypted PIN from the encryption keypad 14 (hereinafter, the request is referred to as an encrypted PIN transfer request) (S167). Some methods of encrypting the PIN require the PAN. In such a case, the encrypted PAN 181A is transmitted together with the encrypted PIN transfer request. The encrypted PAN 181A is contained in the FIT check result 184 (
Upon receiving the encrypted PIN transfer request (S168), the encryption keypad 14 decrypts the encrypted PAN 181A if necessary (S169) and encrypts the PIN using the decrypted PAN (S170). The encryption keypad 14 transmits the encrypted PIN (hereinafter, referred to as an encrypted PIN) 201 to the ATM controller 10 (S171).
Upon receiving the encrypted PIN 201 (S172), the ATM controller 10 stores the received encrypted PIN 201 in the data region 31B (
As illustrated in
Each time that the user presses a key of the keypad 111, the encryption keypad 14 notifies the ATM controller 10 of the value of the pressed key as pressed key information 210 (S182). Upon receiving the pressed key information 210 (S183), based on the received pressed key information 210, the ATM controller 10 causes the ATM screen to display the transaction amount which is entered by the user until then, as amount information.
When the enter key of the keypad 111 is pressed, that is, the entry of the transaction amount by the user is completed, the encryption keypad 14 makes a notification (entry completion notification) that indicates completion of the entry to the ATM controller 10 (S184). Based on the entry completion notification, the ATM controller 10 recognizes completion of the entry of the transaction amount (S185).
The ATM controller 10 stores the transaction amount entered by the user in the data region 31B (
Subsequently, as illustrated in
Upon receiving the card authentication data generation request (S191), the IC card 21 generates card authentication data 221 using the information 220 transmitted together with the card authentication data generation request (S192). The IC card 21 transmits the generated card authentication data 221 to the ATM controller 10 via the card reader controller 70 (S193).
Upon receiving the card authentication data 221 (S194), the ATM controller 10 stores the card authentication data 221 in the data region 31B (
As illustrated in
Upon receiving the transaction request message 230 (S202), the core banking host computer 3 decrypts the encrypted magnetic information 180B and encrypted confidential IC information 191B included in the received transaction request message 230 (S203). The core banking host computer 3 then uses the magnetic information 180, the IC information 190, and the like obtained by the decryption to generate a transaction request message 231 (S204)
The core banking host computer 3 transmits the generated transaction request message 231 to a card bland issuer (not illustrated) via an external network 232 (S205).
As illustrated in
Upon receiving the transaction response message 240, based on the received information, the core banking host computer 3 generates a transaction response message 243 for the ATM controller 10 (S211). The core banking host computer 3 transmits the generated transaction response message 243 to the ATM controller 10 (212). The transaction response message 243 includes the amount information 241 and issuer authentication data 242.
Upon receiving the transaction response message 243 (S213), the ATM controller 10 stores message information contained in the transaction response message 243, including the amount information 241, the issuer authentication data 242, and the like, in the data region 31B (
As illustrated in
Upon receiving the issuer authentication data 242 and issuer authentication request (S221), the IC card 21 executes issuer authentication (S222). The IC card 21 transmits the results of the executed issuer authentication to the ATM controller 10 as an issuer authentication result 244 (S223).
Upon receiving the issuer authentication result 244 (S224), the ATM controller 10 determines whether the issuer authentication is successful. When the issuer authentication is successful, the ATM controller 10 transmits withdrawal information 245, including the amount of money to be dispensed, and a withdrawal request to the bill processing section 12 (S225). Upon receiving the withdrawal request, the bill processing section 12 dispenses the amount of money based on the received withdrawal information (S226).
As described above, in the automated transaction system 1 of the first embodiment, the card reader cryptographic processor 72 (
According to the first embodiment, even if the ATM controller 10 of the ATM 2 is infected with malware and leaks card information, it is possible to prevent leakage of the PAN necessary for creation of a counterfeit card or improper use for Internet shopping since confidential information is encrypted. This can implement a highly-reliable automated transaction system.
According to the first embodiment, moreover, the ATM controller 10 does not handle card numbers which are not encrypted. The ATM controller 10 can therefore be eliminated from the objects for certificate by payment card industry data security standards (PCIDSS). This effectively facilitates certification of the ATM 2 by the PCIDSS.
In the description of the first embodiment, the card reader cryptographic processor 72 processes the FIT 157 (
In this case, the core banking host computer 251 includes the same configuration as that of the core banking host computer 3 of the first embodiment except an FIT update-related process (described later for
The ATM 252 includes the same configuration as that of the ATM 2 of the first embodiment except a process (described later for
In the second embodiment, the core banking host computer 251 transmits the updated FIT 157 to the ATM controller 253 of the ATM 252 (S250). Upon receiving the FIT 157 (S251), the ATM controller 253 stores the received updated FIT 157 in the data region 31B (
As illustrated in
In the card reader 254, a card reader cryptographic processor 255 receives the FIT confidential information table 157A via the card reader controller 70 (S255) and stores the received FIT confidential information table 157A in the data region 91B (
In the second embodiment, the ATM controller 253 checks the masked magnetic information 180A against the FIT 157 (S260). The ATM controller 253 then acquires record information other than the confidential data (the PAN and language code) of the record 160 of the corresponding financial institution based on the check result (S261). With reference to the reference result in the step S260, the ATM controller 253 transmits a table index 300 to the card reader 254 (
Upon receiving the aforementioned request via the card reader controller 70 (S263), the card reader cryptographic processor 255 of the card reader 254 starts a process to acquire confidential data. The card reader cryptographic processor 255 first checks the magnetic information 180 against the FIT confidential information table 157A (
The card reader cryptographic processor 255 uses the information 166 (
Upon receiving the encrypted PAN 181A and language code 182 (S268) via the card reader controller 70 (S268), the ATM controller 253 stores the received encrypted PAN 181A and language code 182 and the other results 259 from checking the FIT 157 and FIT confidential information table 157A, in the data region 31B (
As described above, in the automated transaction system 250 of the second embodiment, the card reader cryptographic processor 255 of the card reader 254 (
In this case, the amount of data of the FIT confidential information table 157A is significantly smaller than the amount of data of the FIT 157. According to the automated transaction system 250 of the second embodiment, in addition to the effects provided by the automated transaction system 1 of the first embodiment, it is possible to reduce the memory capacity of the memory 91 (
In the automated transaction system 250, only the PAN and language code are acquired from the card reader cryptographic processor 255 as described above. The process to acquire the card information from the magnetic information 180 is thus shared by the card reader cryptographic processor 255 and the ATM controller 253. This reduces processing load on the card reader cryptographic processor 255 and reduces the processing time of the card reader cryptographic processor 255 concerning acquisition of the card information.
Next, with reference to
As illustrated in
As illustrated in
The processes in
For setting the initial keys, first, an asymmetric root key pair (the root signature key 109 and the root verification key 95) is generated in the certificate authority 264 having a secure environment by an organization (mainly assumed to be an ATM vender) responsible for secure transactions in the automated transaction system 260 (S270). The certificate authority 264 stores the generated root signature key 109 and root verification key 95 in the data region 171B of the memory 171 (
In the ATM 262 (
Upon receiving the CR public key 273 (S275), the certificate authority 264 uses the root signature key 109 generated in the step S270 to give an electronic signature to the CR public key 273 (S276). The certificate authority 264 transmits a CR public key signature 274, which is the given electronic signature, and the root verification key 95 to the card reader cryptographic processor 270 (S277).
Upon receiving the CR public key signature 274 and root verification key 95 (S278), the card reader cryptographic processor 270 stores the received CR public key signature 274 and root verification key 95 in the data region 91B (
After the certificate authority 264 generates the root signature key 109 and root verification key 95 described for
The core banking host computer 261 transmits the host verification key 281 to the certificate authority 264 to give an electronic signature to the host verification key 281 using the root signature key 109 (S282).
Upon receiving the host verification key 281 (S283), the certificate authority 264 uses the root signature key 109 to give an electronic signature to the host verification key 281 (S284). The certificate authority 264 transmits a host verification key signature 282, which is the electronic signature given to the host verification key 281, and the root verification key 95 to the core banking host computer 261 (S285).
Upon receiving the host verification key signature 282 and root verification key 95 (S286), the core banking host computer 261 stores the host verification key signature 282 and root verification key 95 in the data region 151B (
Upon receiving the CR public key 273 and CR public key signature 274 (S291), the core banking host computer 261 verifies the signature validity of the CR public key signature 274 using the root verification key 95 (S292). When the signature validity is verified, the core banking host computer 261 stores the CR public key 273 in the data region 151B (
Upon receiving the host verification key 281 and host verification key signature 282 (S295), the card reader cryptographic processor 270 verifies the signature validity of the host verification key signature 282 using the root verification key 95 (S296). When the signature validity is verified, the card reader cryptographic processor 270 stores the host verification key 281 in the data region 91B (
As illustrated in
The core banking host computer 261 further encrypts the CR-host master key 103 using the CR public key 273 and gives an electronic signature to the encrypted CR-host master key 103 (hereinafter, referred to as an encrypted host master key 103A) using the host signature key 280 (S302). The core banking host computer 261 then transmits the encrypted CR-host master key 103A and electronic signature to the card reader cryptographic processor 270 (S303).
Upon receiving the encrypted CR-host master key 103A and electronic signature (S304), the card reader cryptographic processor 270 first verifies the validity of the electronic signature using the host verification key 281 (S305). When the validity of the electronic signature is verified, the card reader cryptographic processor 270 decrypts the encrypted CR-host master key 103A using the CR secret key 272 (S306) and stores the thus-obtained decrypted CR-host master key 103 in the data region 91B (
As for subsequent generation of session keys, in the first embodiment (
As described above, according to the automated transaction system 260 of the third embodiment, in order for the card reader cryptographic processor 270 of the card reader 263 of the ATM 262 and the core banking host computer 261 to share the CR-host session key 104 used for encryption in communication therebetween, the CR-host master key 103 used to encrypt the CR-host session key 104 is generated in the core banking host computer 261. The CR-host master key 103 used between the core banking host computer 261 and each of the plurality of ATM 262 and can be therefore collectively managed in the core banking host computer 261.
Accordingly, the CR-host master key is easily managed compared with the case where the CR-host master key 103 is generated by the card reader cryptographic processor 72 (
In the aforementioned first to third embodiments, the ATMs 2, 252, and 262, as the automated transaction apparatus, are configured as illustrated in
In the aforementioned first to third embodiments, the card medium is the IC card 21. However, the present invention is not limited to such an IC card and is also applicable to the case where the card medium is a magnetic card.
In the aforementioned first to third embodiments, the ATM controllers 10 and 253 are respectively configured as illustrated in
In the aforementioned first to third embodiments, the FIT 157 and FIT confidential information table 157A have a table form. However, the form thereof is not limited to a table form. The FIT 157 and FIT confidential information table 157A only need to be information relating information necessary to execute the aforementioned processes (information related to the format of card information of each financial constitution, for example).
In the aforementioned second embodiment, the FIT confidential information table 157A is generated for each financial institution by extracting the information 161, 162, 164, 165, and 167 (the financial institution ID offset, financial institution ID, PAN offset, PAN length, and language code) from the record information of the record 160A of the financial institution. The present invention is not limited to this configuration. The FIT confidential information table may include information other than the information 161, 162, 164, 165, and 167.
The present invention is applicable to an automated transaction system which includes an ATM performing deposit and withdrawal transactions based on card information and a user's operation; and a core banking host computer performing authentication of the deposit and withdrawal transactions and the like.
1, 250, 260 . . . AUTOMATED TRANSACTION SYSTEM
2, 252, 262 . . . ATM
3, 251, 261 . . . CORE BANKING HOST COMPUTER
5, 264 . . . CERTIFICATE AUTHORITY
10, 253 . . . ATM CONTROLLER
13, 254, 263 . . . CARD READER
14 . . . ENCRYPTION KEYPAD
21 . . . IC CARD
30, 90, 120, 150, 170 . . . CPU
72 . . . CARD READER CRYPTOGRAPHIC PROCESSOR
110 . . . ENCRYPTION KEYPAD CONTROLLER
130 . . . IC REGION
140 . . . MAGNETIC REGION
157 . . . FIT
157A . . . FIT CONFIDENTIAL INFORMATION TABLE
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/JP2016/066630 | 6/3/2016 | WO | 00 |