Technical Field
The present invention is generally related to commerce over networks. Particularly, the present invention is related to electronic purses and mobile point-of-sales (POS) that can be advantageously used in portable devices for both electronic commerce (a.k.a., e-commerce) and mobile commerce (a.k.a., m-commerce).
Description of the Related Art
Single functional cards have been successfully used in enclosed environments such as transportation systems. One example of such single functional cards is MIFARE that is the most widely installed contactless smart card technology in the world. With more than 500 million smart card ICs and 5 million reader components sold, MIFARE has been selected as the most successful contactless smart card technology. MIFARE is the perfect solution for applications like loyalty and vending cards, road tolling, city cards, access control and gaming.
However, single functional card applications are deployed in enclosed systems, which are difficult to be expanded into other areas such as e-commerce and m-commerce because stored values and transaction information are stored in data storage of each tag that is protected by a set of keys. The nature of the tag is that the keys need to be delivered to the card for authentication before any data can be accessed during a transaction. This constraint makes systems using such technology difficult to be expanded to an open environment such as the Internet for e-commerce and/or cellular communications networks for m-commerce as the delivery of keys over a public domain network would cause security concerns.
There is, thus, a need for a mechanism in devices, especially portable devices, functioning as an electronic purchaser and/or an electronic seller to conduct transactions over an open network with a payment server and/or a POS transaction server without compromising security.
This section is for the purpose of summarizing some aspects of embodiments of the present invention and to briefly introduce some preferred embodiments. Simplifications or omissions in this section as well as the title and the abstract of this disclosure may be made to avoid obscuring the purpose of the section, the title and the abstract. Such simplifications or omissions are not intended to limit the scope of the present invention.
Broadly speaking, the invention is related to a mechanism provided to devices, especially portable devices, functioning as an electronic purchaser (e.g., electronic purse (e-purse)) and/or an electronic mobile seller (e.g., mobile POS) to be able to conduct transactions over an open network with a payment server and/or a POS transaction server without compromising security. According to one aspect of the present invention, a portable device (e.g., a cell phone, a personal digital assistant (PDA), etc.) is loaded with an e-purse manager. The e-purse manager is configured to manage various transactions and functions as a mechanism to access an emulator therein. The transactions may be conducted over a public domain network and/or a cellular communications network.
According to another aspect of the present invention, a three-tier security model is proposed, based on which the present invention is contemplated to operate. The three-tier security model includes a physical security, an e-purse security and a card manager security, concentrically encapsulating one with another. Security keys (either symmetric or asymmetric) are personalized within the three-tier security model so as to personalize an e-purse and perform secured transaction with a payment server. In one embodiment, the essential data to be personalized into an e-purse include one or more operation keys (e.g., a load or top-up key and a purchase key), default personal identification numbers (PINs), administration keys (e.g., an unblock PIN key and a reload PIN key), and passwords (e.g., from a service provider such as Mifare). During a transaction, the security keys are used to establish a secured channel between an embedded e-purse and a Security Authentication Module (SAM) or backend server in a financial institute (e.g., bank, credit union, credit clearing bureau, etc.).
According to yet another aspect of the present invention, a portable device with a service manager installed or pre-installed thereon is configured to securely download and install various service/application components (e.g., application MIDlets and application applets) from one or more service servers (e.g., service providers) over a cellular communications network (e.g., General Packet Radio Service (GPRS) network). Depending on implementation, some or all of the application MIDlets (e.g., POS manager, e-purse manager, etc.) are installed onto a baseband (e.g., memory space associated with microprocessor circuitry) of the portable device. The application applets are installed onto a secured element (e.g., a smart card) of the portable device, and further configured with personalized security keys (e.g., transformed keys, PINs) and other personalized information.
Furthermore, the service manager may also be pre-installed on a computer (e.g., a laptop, a desktop personal computer), or implemented as an online application (e.g., a web-based application). Together with a contactless reader (e.g., an ISO 14443 complied proximity coupling device, an ISO 15693 priximity reader), the installation and personalization described herein can then be conducted over a wired and/or wireless network (e.g., Internet).
According to yet another aspect of the present invention, a portable device is configured to conduct e-commerce and/or m-commerce as an electronic mobile seller (e.g., mobile POS). E-commerce and m-commerce operations (i.e., offline payment, online payment, real time top-up, virtual top-up, batch transactions upload, and various queries of balances and transactions) can be conducted using the portable device with a POS manager and a POS SAM installed therein.
Offline payment allows the portable device to collect an e-token from another e-token enabled device (e.g., a single functional card, Mifare, an e-purse enabled portable device, etc.) without connecting to a backend POS server. Real-time top-up allows the portable device to replenish e-tokens to another e-token enabled device in real time from a financial institute. Virtual top-up allows the portable device to replenish e-tokens to an e-token enabled device configured to only receive e-tokens from a funding account set up by a sponsor or donor. Batch transaction uploading allows accumulated POS transactions to be transmitted to a backend POS transaction server for settlement. Queries to the transaction and balance history are enabled with a MIDIet (e.g., a graphical user interface with built-in queries). All of the applications are secured in accordance with e-commerce and/or m-commerce industry standards.
The invention may be implemented in numerous ways, including a method, system, and device. In one embodiment, the present invention is a method for enabling a portable device to conduct mobile commerce transactions, the method comprises at least the following: installing a mobile commerce transaction module onto a secured element coupled to a baseband of the portable device; personalizing the installed mobile commerce transaction module; downloading a mobile commerce transaction manager module onto the baseband of the portable device based on personalized information from the personalized mobile commerce transaction module; and pre-installing a service manager module configured to facilitate said installing, said personalizing and said downloading steps. The personalization further comprises connecting to a personalization server at a service provider to establish a secured channel; sending a personalization request to the personalization server; receiving one or more network messages containing an personalization data array from the personalization server; and forwarding the personalization data array to the e-commerce and m-commerce transaction module.
According to another embodiment, the present invention is a system for system for conducting mobile commerce transactions, the system comprises at least the following: a portable device configured to be a mobile point-of-sales (POS) including a POS manager and a POS security authentication module (SAM) installed and personalized thereon and an e-token enabled device, wherein e-token is configured to be read by an contactless interface of the portable device, wherein the contactless interface is a complied proximity coupling device. The system further comprises a POS transaction server coupling to the POS manager via a secured channel over a cellular communications network.
According to yet another embodiment, the present invention is a method for conducting mobile commerce transactions using a portable device, the method comprises at least the following: retrieving an e-token by reading an e-token enabled device from a holder desirous of making a purchase transaction; determining whether the retrieved e-token is valid using a point-of-sales security authentication module (POS SAM) installed on the portable device; and recording the purchase transaction in the POS SAM by debiting the e-token if the e-token is determined to be valid and has enough balance to cover purchase amount, otherwise the purchase transaction is denied. The method further comprises uploading accumulated transactions in the POS SAM to a POS transaction server over either a cellular communications network or a public domain network and funding the e-token enabled device from a financial institute or a linked account via a POS manager of the portable device.
Accordingly one of the objects of the present inventions is to provide a mechanism to be embedded in devices, especially portable devices, to function as an electronic purchaser and/or an electronic mobile seller to conduct transactions over an open network with a payment server and/or a POS transaction server without compromising security.
Other objects, features, and advantages of the present invention will become apparent upon examining the following detailed description of an embodiment thereof, taken in conjunction with the attached drawings.
The invention will be readily understood by the following detailed description in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention. The present invention may be practiced without these specific details. The description and representation herein are the means used by those experienced or skilled in the art to effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components, and circuitry have not been described in detail since they are already well understood and to avoid unnecessarily obscuring aspects of the present invention.
Reference herein to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one implementation of the invention. The appearances of the phrase in “one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Further, the order of blocks in process, flowcharts or functional diagrams representing one or more embodiments do not inherently indicate any particular order nor imply limitations in the invention.
Embodiments of the present invention are discussed herein with reference to
Physical security 102 refers to a security mechanism provided by a single functional card to protect data stored on the card. The card may be hardware implemented or software emulated running on a type of media. Data on a single function card is protected by a set of access keys. These keys are configured onto the card when the card is issued. To avoid obscuring aspects of the present invention, the process of how the keys are configured onto the cards is omitted. For accessing the data, related keys are read by a contactless reader for authentication.
E-purse security 104 defines a set of protocols that enable micro payment transactions to be carried out in both wired and wireless environments. With an electronic purse (a.k.a., e-purse) stored on a smart card, a set of keys (either symmetric or asymmetric) is personalized into the e-purse when the e-purse is being issued. During a transaction, the e-purse uses a set of respective keys for encryption and Message Authentication Code (MAC) computation in order to establish and protect a secured channel between the e-purse and the SAM or backend servers. For a single functional card, the e-purse security 104 will act as a gate keeper to protect actual operations performed on a single functional card. During personalization, the single functional card access keys (or its transformation) are personalized into the e-purse with the e-purse transaction keys.
Card Manager Security 106, referring to a general security framework of a preload operating system in a smart card, provides a platform for PIN management and security channels (security domains) for card personalization. This platform via a card manager can be used to personalize an e-purse in one embodiment. One example of the card manager security 106 is what is referred to as a Global Platform (GP) that is a cross-industry membership organization created to advance standards for smart card growth. A GP combines the interests of smart card issuers, vendors, industry groups, public entities and technology companies to define requirements and technology standards for multiple application smart cards. In one embodiment, a global platform security is used to personalize a smart card. As a result, both e-purse keys and card access keys are personalized into a target tag.
In reference to
According to one embodiment, a smart card has a preloaded smart card operation system that provides security framework to control the access to the smart card (e.g., an installation of external applications into the smart card). In order to manage the life cycle of an external application, a card manager module is configured by using the smart card security framework. For instance, a Java based smart card, SmartMX, is preloaded with an operating system JCOP 4.1. The Global Platform 2.1 installed on the SmartMX performs the card manager functionality.
Referring now to
In the cell phone 202, an e-purse manager MIDIet 204 is provided. For m-commerce, the MIDIet 204 acts as an agent to facilitate communications between an e-purse applet 206 and one or more payment network and servers 210 to conduct transactions therebetween. As used herein, a MIDIet is a software component suitable for being executed on a portable device. The e-purse manager MIDIet 204 is implemented as a “MIDIet” on a Java cell phone, or an “executable application” on a PDA device. One of the functions of the e-purse manager MIDIet 204 is to connect to a wireless network and communicate with an e-purse applet which can reside on either the same device or an external smart card. In addition, it is configured to provide administrative functions such as changing a PIN, viewing an e-purse balance and a transaction history log. In one application in which a card issuer provides a SAM 212 that is used to enable and authenticate any transactions between a card and a corresponding server (also referred to as a payment server). As shown in
For e-commerce, a web agent 214 on a computer (not shown) is responsible for interacting with a contactless reader (e.g., an ISO 14443 RFID reader) and the network server 210. In operation, the agent 214 sends the APDU commands or receives responses thereto through the contactless reader 216 to/from the e-purse applet 206 residing in the cell phone 202. On the other hand, the agent 214 composes network requests (such as HTTP) and receives responses thereto from the payment server 210.
To personalize the cell phone 202,
As described above, an e-purse manager is built on top of a global platform to provide a security mechanism necessary to personalize e-purse applets designed therefor. In operation, a security domain is used for establishing a secured channel between a personalization application server and the e-purse applet. According to one embodiment, the essential data to be personalized into the e-purse applet include one or more operation keys (e.g., a load or top-up key and a purchase key), default PINs, administration keys (e.g., an unblock PIN key and a reload PIN key), and passwords (e.g., from Mifare).
It is assumed that a user desires to personalize an e-purse applet embedded in a portable device (e.g., a cell phone). At 352 of
Similarly, as shown in
Referring now back to
Each application security domain of a global platform includes three (3) DES keys. For example:
Key1: 255/1/D ES-EC B/404142434445464748494a4b4c4d4e4f
Key2: 255/2/D ES-EC B/404142434445464748494a4b4c4d4e4f
Key3: 255/3/D ES-ECB/404142434445464748494a4b4c4d4e4f
A security domain is used to generate session keys for a secured session between two entities, such as the card manager applet and a host application, in which case the host application may be either a desktop personalization application or a networked personalization service provided by a backend server.
A default application domain can be installed by a card issuer and assigned to various application/service providers. The respective application owner can change the value of the key sets before the personalization process (or at the initial of the process). Then the application can use the new set to create a security channel for performing the personalization process.
With the security channel is established using the application provider's application security domain, the first set of data can be personalized to the e-purse applet. The second set of data can also be personalized with the same channel, too. However, if the data are in separate SAM, then a new security channel with the same key set (or different key sets) can be used to personalize the second set of data.
Via the new e-purse SAM 306, a set of e-purse operation keys and PINs are generated for data transactions between the new e-purse SAM and the e-purse applet to essentially personalize the e-purse applet at 358.
A second security channel is then established at 360 between an existing SAM (e.g., the SAM 308 of
A user is assumed to have obtained a portable device (e.g., a cell phone) that is configured to include an e-purse. The user desires to fund the e-purse from an account associated with a bank. At 402, the user enters a set of personal identification numbers (PIN). Assuming the PIN is valid, an e-purse manger in the portable device is activated and initiates a request (also referred to an over-the-air (OTA) top-up request) at 404. The MIDIet in the portable device sends a request to the e-purse applet at 406, which is illustrated in
At 408, the e-purse applet composes a response in responding to the request from the MIDIet. Upon receiving the response, the MIDIet sends the response to a payment network and server over a cellular communications network. As shown in
At 416, the response from the bank is transported to the payment network and server. The MIDIet strips and extracts the APDU commands from the response and forwards the commands to the e-purse applet at 418. The e-purse applet verifies the commands at 420 and, provided they are authorized, sends the commands to the emulator at 420 and, meanwhile updating a transaction log. At 422, a ticket is generated to formulate a response (e.g., in APDU format) for the payment server. As a result, the payment server is updated with a successful status message for the MIDIet, where the APDU response is retained for subsequent verification at 424.
As shown in
The e-purse manager 434 verifies the authenticity (e.g., in APDU format) and sends commands to the emulator 438 and updates the transaction logs. By now, the e-purse applet 436 finishes the necessary steps and returns a response to the MIDIet 434 that forwards an (APDU) response in a network request to the payment server 440.
Although the process 400 is described as funding the e-purse. Those skilled in the art can appreciate that the process of making purchasing over a network with the e-purse is substantially similar to the process 400, accordingly no separate discussion on the process of making purchasing is provided.
Referring to
To enable the portable device 530 to conduct e-commerce and m-commerce, one or more services/applications need to be pre-installed and pre-configured thereon. An instance of a service manager 522 (e.g., a MIDIet with GUI) needs to be activated. In one embodiment, the service manager 522 is downloaded and installed. In another embodiment, the service manager 522 is preloaded. In any case, once the service manager 522 is activated, a list of directories for various services is shown. The items in the list may be related to the subscription by a user, and may also include items in promotion independent of the subscription by the user. The directory list may be received from a directory repository 502 of a directory server 512. The directory server 512 acts as a central hub (i.e., yellow page functions) for different service providers (e.g., an installation server, a personalization server) that may choose to offer products and/or services to subscribers. The yellow page functions of the directory server 512 may include service plan information (e.g., service charge, start date, end date, etc.), installation, personalization and/or MIDIet download locations (e.g., Internet addresses). The installation and personalization may be provided by two different business entities. For example, the installation is provided by an issuer of a secured element 529, while the personalization may be provided by a service provider who holds application transaction keys for a particular application.
According to one embodiment, the service manager 522 is configured to connect to one or more servers 514 from service providers over the cellular communications network 520. It is assumed that the user has chosen one of the applications from the displayed directory. A secured channel 518 is established between the one or more servers 514 and the GP manager 526 to install/download an application applet 527 selected by the user and then to personalize the application applet 527 and optionally emulator 528, and finally to download an application MIDIet 523. The applet repository 504 and MIDIet repository 506 are the sources of generic application applets and application MIDlets, respectively. GP SAM 516 and application SAM 517 are used for creating the secured channel 518 for the personalization operations.
Before the process 550 starts, an instance of a service manager 522 or 532 has been downloaded or pre-installed on either the portable device 530 or a computer 538. At 552, the service manager is activated and sends a service request to the server 514 at a service provider. Next after the authentication of a user and the portable device has been verified, at 554, the process 550 provides a directory list of services/applications based on subscription of the user of the portable device 530. For example, the list may contain a mobile POS application, an e-purse application, an e-ticketing application, and other commercially offered services. Then one of the services/applications is chosen from the directory list. For example, an e-purse or a mobile-POS may be chosen to configure the portable device 530. Responding to the user selection, the process 550 downloads and installs the selected services/applications at 556. For example, e-purse applet (i.e., application applet 527) is downloaded from the applet repository 504 and installed onto a secured element 529. The path for downloading or installation may be either via a secured channel 518 or 519. At 558, the process 550 personalizes the downloaded application applet and the emulator 528 if needed. Some of the downloaded application applets do not need to be personalized and some do. In one embodiment, a mobile POS application applet (“POS SAM”) needs to be personalized, and the following information or data array has to be provided:
In another embodiment, personalization of an e-purse applet for a single functional card not only needs to configure specific data (i.e., PINs, transformed keys, start date, end date, etc.) onto the e-purse, but also needs to configure the emulator to be operable in an open system. Finally, at 560, the process 550 downloads and optionally launches the application MIDIet 523. Some of the personalized data from the application applet may be accessed and displayed or provided from the user. The process 550 ends when all of the components of services/applications have been installed, personalized and downloaded.
According to one embodiment, an exemplary process of enabling a portable device 530 as a mobile POS is listed as follows:
Referring to
The real time transaction 639 can be conducted offline (i.e., without the portable device connecting to a backend POS transaction server 613). However, the portable device 630 may connect to the backend POS transaction servers 613 over the cellular network 520 in certain instances, for example, the amount of the transaction is over a pre-defined threshold or limit, the e-token enabled device 636 needs a top-up or virtual top-up, transactional upload (single or in batch).
Records of accumulated offline transactions need to be uploaded to the backend POS transaction server 613 for settlement. The upload operations are conducted with the portable device 630 connecting to the POS transaction server 613 via a secured channel 618. Similar to the installation and personalization procedures, the upload operations can be conducted in two different routes: the cellular communications network 520, or the public network 521. The first route has been described and illustrated in
The second route is illustrated in
In one embodiment, an exemplary batch upload process from the POS manager 623 or the POS agent 633 includes:
Referring to
The process 650 (e.g., a process performed by the POS manager 623 of
The top-up operations have been described and shown in the process 400 of
Referring to
The process 670 (e.g., a process performed by the POS manager 623 of
The invention is preferably implemented by software, but can also be implemented in hardware or a combination of hardware and software. The invention can also be embodied as computer readable code on a computer readable medium. The computer readable medium is any data storage device that can store data which can thereafter be read by a computer system. Examples of the computer readable medium include read-only memory, random-access memory, CD-ROMs, DVDs, magnetic tape, optical data storage devices, and carrier waves. The computer readable medium can also be distributed over network-coupled computer systems so that the computer readable code is stored and executed in a distributed fashion.
The present invention has been described in sufficient details with a certain degree of particularity. It is understood to those skilled in the art that the present disclosure of embodiments has been made by way of examples only and that numerous changes in the arrangement and combination of parts may be resorted without departing from the spirit and scope of the invention as claimed. Accordingly, the scope of the present invention is defined by the appended claims rather than the foregoing description of embodiment.
This application is a continuation of co-pending U.S. patent application Ser. No. 11/739,044, filed on Apr. 23, 2007, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 11/534,653, filed on Sep. 24, 2006, now U.S. Pat. No. 8,118,218 issued on Feb. 21, 2012.
Number | Date | Country | |
---|---|---|---|
Parent | 11739044 | Apr 2007 | US |
Child | 15271225 | US | |
Parent | 11534653 | Sep 2006 | US |
Child | 11739044 | US |