This invention relates to a secure electronic transaction process and a corresponding system.
The invention is particularly applicable in electronic payment. It then uses a support called an electronic wallet that may be the same size as a credit card, with or without contact. But any other object or support could be used (watch, mobile telephone, etc.).
The electronic wallet is a payment means intended for small transactions, frequently carried out remotely. For example it may apply to transactions in sectors such as automatic distribution (drinks, newspapers, etc.), public transport (metro, bus, etc.), communication networks (mobile telephone, public phone, internet, etc.), broadcasting of pay television programs (decoder, etc.).
These transactions are frequently made secure using conventional computer security techniques based on cryptographic functions used to calculate and verify the proof that the electronic wallet has been debited.
Symmetric type cryptographic algorithms are widely used, particularly for card components, since they are easy to implement.
The same secret key must be shared between the electronic wallet that produces the proof of the debit and the terminal that verifies this proof. Since the terminal cannot memorize the secret keys of all electronic wallets, it actually has only one base key which is the mother of all daughter keys (also called diversified keys) input into the electronic wallets.
Therefore, the same key must be known to all terminals, which can cause security problems. One known solution consists of multiplying the number of base keys, each electronic wallet having the daughter keys of the different base keys which are dispersed at random in the terminals. However, the limited capacity of component memories used in electronic wallets (a few kbytes) makes it impossible to store a large number of keys. For example, if the system comprises about ten base keys, discovery of a single key would weaken the security by one tenth.
The purpose of this invention is to overcome these disadvantages.
A secure electronic transaction process between an electronic wallet (O) to be debited by a certain amount (M) and a terminal (T) that can control this debit and check that the debit has actually been made, and the system for performing this process.
The FIGURE shows a block-diagram of a system for performing the process of the invention according to one embodiment of the invention.
The process according to the invention consists of combining provisions related to cryptography with a secret key and provisions related to public key cryptography. For provisions related to public key cryptography, the invention uses an authentication value that is a digital signature applicable to an identifier related to the object to be debited. For example, this identifier may be the identity of the object, which can be used to calculate the daughter key. Other information, for example such as the validity start and end dates of the object, may be associated with the identity.
The authentication value and the daughter key (or the diversified key) are calculated and input into the objects by the authority that manages them, before any transaction, when the supports are personalized.
The authentication value is read in the object and is verified, in addition to the proof of the debit, for each transaction by the terminal, which has the public key corresponding to the private key used to produce the authentication value. The proof of debit will only be recognized if the diversifier is authenticated using the authentication value, and if it can be used to check the cryptogram of the proof of debit calculated by the object, after diversification of the base key.
If one of the base keys were discovered, the system would not be compromised as a result since it would also be necessary to extract a large number of authentication values from the different objects. Furthermore, introducing a fraudulent object into the system would require that an authentication value for this new object would be obtained. However, this value cannot be obtained without knowledge of the private key produced by the authority managing the objects. Therefore a massive fraud would require knowledge of the private key of the sender of the objects, in addition to knowledge of the base key.
Therefore, the invention has a “hybrid” nature providing an attractive compromise between performances (speed of execution) and security. This hybrid solution provides the advantages of both types of cryptographs but without their disadvantages; for real time transactions, all that is considered is the verification of the authentication value with the public key, since this verification is done more quickly than the calculation of this authentication value, that is only made once when the card is created and never afterwards during the transactions. In a way, it means adding a second public key authentication in addition to a secret key authentication. This may be referred to as “over security” which is not trivial for a subject (electronic wallets) in which performances are a strong constraint. This over security does not excessively constrain performances of the system, such that it is possible to talk about an optimum solution in terms of security and performances.
More precisely, the purpose of the invention is a secure electronic transaction process between an object (O) to be debited by a certain amount (M) and a terminal (T) that can control this debit and verify that the debit has actually been made, this process being characterized in that:
A) before any transaction:
B) for each transaction:
Preferably, in particular the identifier (i) used to calculate the authentication value (VA) comprises an identification number and possibly a validity period (start and/or end).
In one particular application, the object is an electronic wallet type support, the transaction being an electronic payment.
Another purpose of the patent application is a secure electronic transaction system comprising an object to be debited by a certain amount and a terminal that can control this debit and check that this debit has actually been made, this system being characterized in that:
In the following description, it will be assumed that the object participating in the transaction is an electronic wallet, the transaction then being an electronic payment. But this example is in no way limitative. The invention could also be used to debit loyalty points, telephone units, etc.
The electronic wallet is denoted “PME” and the terminal is denoted “T”. Furthermore:
The following diagram illustrates one embodiment of the process according to the invention. The arrows indicate data transfers between the terminal T and the PME.
Number | Date | Country | Kind |
---|---|---|---|
99 13343 | Oct 1999 | FR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FR00/02964 | 10/25/2000 | WO | 00 | 4/18/2002 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO01/31596 | 5/3/2001 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
4500750 | Elander et al. | Feb 1985 | A |
5761309 | Ohashi et al. | Jun 1998 | A |
5930777 | Barber | Jul 1999 | A |
6092202 | Veil et al. | Jul 2000 | A |
6332133 | Takayama | Dec 2001 | B1 |
6401206 | Khan et al. | Jun 2002 | B1 |
Number | Date | Country |
---|---|---|
41 19 924 | Dec 1992 | DE |
197 18 547 | Nov 1998 | DE |
0 231 702 | Aug 1987 | EP |
0 496 656 | Jul 1992 | EP |
0 588 339 | Mar 1994 | EP |
0 621 570 | Oct 1994 | EP |
0 671 712 | Sep 1995 | EP |
1041767 | Sep 1999 | JP |
WO 9116691 | Oct 1991 | WO |