This application claims the benefit of, and priority to, European Patent Application No. 1702795.4 filed on Feb. 21, 2017. The entire disclosure of the above application is incorporated herein by reference.
The present disclosure relates to a contactless interaction system, apparatus and method. It is particularly relevant to wearable devices adapted for contactless interaction, for example payment according to a contactless transaction protocol.
It is increasingly common for wearable devices to be used to provide functionality to users both through processing capability in the wearable device and by interaction with other digital devices. While some wearable devices have an extended networking capability (using cellular telephony or 802.11 based wireless networking protocols such as WiFi), others are adapted only for short range interaction using Bluetooth or Near Field Communication protocols. Wearable devices typically have specific actions that are extremely convenient for users, but have a limited user interface and often relatively limited processing power. This can be addressed in some cases by pairing with another device—for example, so that significant computation and a user interface is provided by a user cellular telephone handset paired to a wearable device using Bluetooth—but this creates other challenges.
Providing a wearable device that is adapted for use as a transaction device poses particular challenges. Protocols and applications exist for treating a cellular telephone handset as a transaction device adapted to transact with a terminal of a financial transaction system (such as a POS terminal) using contactless protocols. Typically contactless protocols allow payments for small value transactions to be made without additional cardholder verification, but larger payments, if allowed, require cardholder verification. This poses processing and security challenges for a wearable device with a limited user interface.
In a first aspect, the disclosure provides a method of operating a transaction device to perform a contactless transaction with a terminal of a transaction system, the method comprising: determining if the transaction device has associated with it a mechanism for providing user verification at the device, and if there is an associated user verification mechanism, transacting with the terminal according to a first transaction protocol, and if there is no associated user verification mechanism, transacting with the terminal according to a second transaction protocol.
The contactless transaction may be performed under the ISO/IEC 14443 standard, and may use EMV contactless protocols (EMV specifications may be found at https://www.emvco.com/document-search/)—the user is represented by a transaction application running on the wearable device. The user verification mechanism may be a Consumer Device Cardholder Verification Method (CDCVM), and may be provided at the wearable device itself, or may be provided through a device such as the user's cell phone—it may for example be a biometric identifier of the user, such as a fingerprint. The transaction is performed by an application in the wearable device, but the user verification mechanism may be mediated through a further application in the wearable device interacting with the transaction application.
Where CDCVM or a similar mechanism exists, the transaction application may transact in a similar manner to a mobile phone running a mobile transaction application—CDCVM is used to provide confirmation that the deviceholder is the legitimate cardholder. For mobile phone applications, CDCVM is typically the only form of Customer Verification Method (CVM) supported. Where CDCVM does not exist (for example, if the user has the wearable device but not the associated device capable of providing CDCVM), the transaction application uses a different protocol and transacts as a contactless card. When transacting as a card, CDCVM is not normally an available option and other CVM mechanisms (such as entry of a PIN) need to be used—the transaction application may be configured to provide basic contactless card functionality. This approach allows flexibility in use of the wearable device while retaining the ability to operate with a limited set of software in the wearable device, reducing computational complexity, power demand and cost. This allows desirable form factors (such as a ring, or a band, a strap or a pendant) to be available for use.
Configuration of user verification mechanism may be performed by the issuer before user personalisation, or may occur at a user personalisation step.
In a second aspect, the disclosure provides a wearable device, or a system comprising a wearable device and an associated user device, adapted to carry out a method as set out above.
In a third aspect, the disclosure provides software which when installed on a suitable wearable device, or system comprising a wearable device and an associated user device, performs a method as set out above.
In further aspects, the disclosure provides further novel combinations of functionality in enabling wearable devices to provide contactless transaction capabilities, both when provided with user verification mechanisms and when not so provided.
One or more embodiments of the disclosure will now be described, by way of example only, with reference to the accompanying drawings, in which:
Specific embodiments of the disclosure will be described below. Embodiments of the disclosure are particularly relevant to a four-party payment transaction scheme, though embodiments of the disclosure may also be provided for other payment models and payment transaction schemes. For convenience, a typical four-party model or four-party payment transaction scheme will first be described with reference to
Normally, card schemes—payment networks linked to payment cards—are based on one of two models: a three-party model (adopted by American Express) or a four-party model (adopted by Visa and Mastercard). For the purposes of this document, the four-party model 100 is described in further detail below.
The four-party model may be used as a basis for the transaction network. For each transaction, the model comprises four entity types: cardholder 110, merchant 120, issuer 130 and acquirer 140. In this model, the cardholder 110 purchases goods or services from the merchant 120. The issuer 130 is the bank or any other financial institution that issued the card to the cardholder 110. The acquirer 140 provides services for card processing to the merchant 120.
The model also comprises a central switch 150—interactions between the issuer 130 and the acquirer 140 are routed via the switch 150. The switch 150 enables a merchant 120 associated with one particular bank (acquirer 140) to accept payment transactions from a cardholder 110 associated with a different bank (issuer 130).
A typical transaction between the entities in the four-party model can be divided into two main stages: authorisation and settlement. The cardholder 110 initiates a purchase of a good or service from the merchant 120 using their card. Details of the card and the transaction are sent to the issuer 130 via the acquirer 140 and the switch 150 to authorise the transaction. Should the transaction be considered abnormal by the issuer 130, the cardholder 110 may be required to undergo a verification process to verify their identity and the details of the transaction. Once the verification process is complete the transaction is authorised.
On completion of the transaction between the cardholder 110 and the merchant 120, the transaction details are submitted by the merchant 120 to the acquirer 140 for settlement.
The transaction details are then routed to the relevant issuer 130 by the acquirer 140 via the switch 150. Upon receipt of these transaction details, the issuer 130 provides the settlement funds to the switch 150, which in turn forwards these funds to the merchant 120 via the acquirer 140.
Separately, the issuer 130 and the cardholder 110 settle the payment amount between them. In return, a service fee is paid to the acquirer 140 by the merchant 120 for each transaction, and an interchange fee is paid to the issuer 130 by the acquirer 140 in return for the settlement of funds.
The disclosure provides a technical specification for an application for use in a wearable device 1 (here with its own processor 1a, memory 1b and power source 1c—in other embodiments the wearable device may be inductively powered) to enable the wearable device to act as a payment device in a transaction scheme. This is as illustrated in
A third approach is shown in
In the embodiment discussed below, the wearables application 31 is implemented as a state machine that connects to a signalling interface for the wearables device (using a short range communications technology as described), with the wearables application implementing a form of EMV contactless specification. Discussion of this state machine is provided further below, with a description of how particular EMV features are implemented in this embodiment of the wearables application 31. Before this, provision of CDCVM and personalisation of a wearable device to a user are also discussed.
The wearables application 31 is adapted to perform contactless transactions under the ISO/IEC 14443 standard, specifically by implementing EMV contactless protocols as set out in EMV specifications as may be found at https://www.emvco.com/document-search/. The EMV contactless specifications comprise four books (Books A, B, C and D), three of which are in common between different implementations, with Book C (the kernel specification) varying according to different card schemes—the Kernel 2 approach (Mastercard) is used in implementations described here, but other kernels may be adapted similarly using the principles indicated in this document. It should be noted that this kernel supports two transaction modes: EMV Mode and Mag-Stripe Mode. The person skilled in the art will be familiar with existing EMV protocols, and will refer to these reference materials in developing any implementation of an EMV contactless specification. Existing contactless specifications will therefore not be described in detail in this document, which will concentrate on how existing routines may be developed in implementations of the present disclosure. The skilled person may therefore refer to such specifications in any assessment of the detailed teaching provided below. Abbreviations used in this document are consistent with existing EMV nomenclature, but for convenience are provided in a table at the end of this description.
In general terms, the wearables application 31 is adapted to interact with a terminal on selection through a C-APDU command received from the terminal to perform a contactless transaction. If the terminal is able to interact with the wearables application, the C-APDU will include an application identifier (AID), or an alternate AID, that matches the wearables application. The wearables application 31 is responsive to C-APDU signals (a select signal, and subsequent card commands), an unselect signal, and no other signals.
As shown in
CDCVM application: CDCVMSubmitted. CDCVMSubmitted has value True if and only if CDCVM has been submitted to the CDCVM application for verification.
In this way, the wearables application 31 is essentially separated in functionality from the CDCVM application 34—it is necessary for the wearables application 31 to be able to trust the results provided by the CDCVM application, so these need to be obtained and communicated in a trusted manner, typically using appropriate cryptographic means to ensure that functionality and communication paths can be trusted.
If CDCVM is obtained at the wearable device itself—as in the arrangement shown in
In other embodiments, CDCVM may be obtained at the user's cellphone, as in the arrangement shown in
The determination as to whether or not the wearables device 1 supports CDCVM in embodiments described here is made before personalisation of the device to the user. Before use, the wearables device 1 and the wearables application 31 needs to be personalised to the user, along with the CDCVM application 34 and any associated biometric application 33. The biometric application 33 needs to obtain the user's reference biometric information in a trusted manner, the CDCVM application needs to establish that the specific CDCVM method (such as user fingerprint) is the specific CDCVM mechanism for that device, and the wearables application 31 needs to be personalised with card details for that user. Such personalisation processes need to be trusted both by the user and a card issuer, but are not described further here as personalisation of a payment device to a user is a standard EMV process that will be familiar to the person skilled in the art.
The state machine defining the wearables application 31 will now be described in greater detail. When the application has been personalised and is in its operational phase, its behavior can be specified as an Extended Finite State Machine. The application states are listed in Table 1 below.
The application is in state idle if it is not currently activated. This may apply if the wearables application is a more complex device that can access more than one application. In a multi-application card for instance, the application may be in state idle if another application is activated. The application also goes to the state idle when the card is reset or powered off (unselect signal).
In the state idle the application does not process C-APDUs that are card commands from a terminal, but simply waits for an external select(C-APDU) signal. Successful processing of the select(C-APDU) signal changes the application state from idle to selected.
Every transaction starts in the state selected. There are three C-APDUs processed in this state:
The wearables application goes to state initiated after the successful processing of the GET PROCESSING OPTIONS command. The other commands do not modify the application state. Aspects of GET PROCESSING OPTIONS specific to embodiments of the disclosure are described below—neither GET DATA nor READ RECORD raises special issues that will not be apparent to a person skilled in the art, and these are not described further below.
In the state initiated, a new transaction can be initiated. There are six C-APDUs processed in this state:
EXCHANGE RELAY RESISTANCE DATA is an existing extension to this EMV kernel that uses a challenge-response mechanism between the terminal and the payment device (in this case, the wearable device) in which the terminal measures response time to determine that the device takes to reply to a command. The number used by the terminal in the challenge may be used as the Unpredictable Number (UN) in protocols described below. Again, this functions essentially as in the existing EMV kernel, so is not described further below.
GENERATE AC is an EMV kernel command, under which the payment device generates an application cryptogram for use in payment in EMV Mode contactless transactions. Specific features of the GENERATE AC command in implementations of the disclosure are described below. The wearables application goes back from the state initiated to the state selected after successful processing of the GENERATE AC command, completed with an ARQC or AAC.
COMPUTE CRYPTOGRAPHIC CHECKSUM is an EMV kernel command, under which the payment device generates an application cryptogram for use in payment in Mag-Stripe Mode contactless transactions. Specific features of the
COMPUTE CRYPTOGRAPHIC CHECKSUM command in implementations of the disclosure are described below. The wearables application goes back from the state initiated to the state selected after successful processing of the COMPUTE CRYPTOGRAPHIC CHECKSUM command.
The other commands do not modify the application state. The signals that the wearables application accepts are thus determined by its state. When the wearables application is in the state idle, the only signal accepted from the card manager is the select(C-APDU) signal. When the wearables application is active (i.e. the application is in a state other than idle), it will accept the following signals:
When receiving a select(C-APDU) signal, the wearables application may perform a validity check, and not perform any action if the validity check fails.
Individual applications (C-APDU) modified for or otherwise specific to the wearables application will now be described. Where other modifications are necessary for consistency or obvious compliance with EMV standards and requirements, these may not be expressly described as they will be apparent to the person skilled in the art.
Processing of a card command is done in three consecutive steps:
When a C-APDU is recognized, the wearables application checks whether it is in a state allowing the actual processing of the C-APDU. Acceptance or rejection of a C-APDU is specified in Table 2 below. If the C-APDU is accepted in the current application state (P: Processed), then the C-APDU is processed as specified below.
This is broadly similar to the existing EMV kernel command, but it is modified to address the different approaches that may be taken to CVM. Initial set up is conventional (and not shown,), with preparation for the new transaction shown in
Under this command, the wearables application generates an application cryptogram used to initiate payment in EMV Mode. This is a conventional EMV command, but is modified somewhat in this implementation, in particular to support the CVM options described here. The start of GENERATE AC processing is shown in
Card like processing simply implements existing EMV kernel options for card processing, as shown in
Generation of application cryptograms then takes place essentially according to existing EMV protocols—these are shown for completeness for each cryptogram type in
Under this command, the wearables application operates in Contactless Mag-Stripe Mode and generates a checksum as a card validation code (CVC3), in which the Unpredictable Number is used as a parameter to compensate for the static nature of mag stripe data. As will be shown, POS Cardholder Interaction Information (PCII) may be included to provide additional information to the user.
CDCVM supported processing is shown in
As the person skilled in the art will appreciate, the approach described here may be varied without departing from the spirit and scope of the disclosure. In particular, embodiments may be provided that are based on other EMV kernels than that referenced here.
Number | Date | Country | Kind |
---|---|---|---|
1702795.4 | Feb 2017 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2018/018873 | 2/21/2018 | WO | 00 |