WO2007093580A1 - Smart card with identity checking - Google Patents

Smart card with identity checking Download PDF

Info

Publication number
WO2007093580A1
WO2007093580A1 PCT/EP2007/051355 EP2007051355W WO2007093580A1 WO 2007093580 A1 WO2007093580 A1 WO 2007093580A1 EP 2007051355 W EP2007051355 W EP 2007051355W WO 2007093580 A1 WO2007093580 A1 WO 2007093580A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
microprocessor
communication port
data
user
Prior art date
Application number
PCT/EP2007/051355
Other languages
French (fr)
Inventor
Mauro Brunazzo
Original Assignee
Mauro Brunazzo
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mauro Brunazzo filed Critical Mauro Brunazzo
Publication of WO2007093580A1 publication Critical patent/WO2007093580A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention concerns a smart card with identity checking.
  • the “intelligent card”, also known as a “smart card”, is an electronic card which stores information and puts it at the disposal of automatic devices, henceforth named “readers”.
  • the transmission of information occurs through a communication port, which can be of various types:
  • - with magnetic strip in this case, the technique of reading/writing the data exploits variation of the magnetic field on a strip;
  • - with direct contact in this case, the reader and the card are in contact to form an electrical circuit: the card is normally equipped with a microprocessor which, when powered by the reader, can transmit and receive data according to a pre-established communication protocol;
  • the card equipped with a microprocessor, receives energy from outside, through electromagnetic waves of suitable frequency, and exchanges data with the reader by means of radio waves.
  • these computerised systems base their recognition of the user on the reading of a smart card, which is distributed by the issuing company, and which is to be inserted into a reader at the time of requesting the transaction or the purchase.
  • the electronic card may be assigned a recognition code, generally known as a "PIN” (from "Personal Identification Number"), which the user must enter on a keypad located in proximity to the reader: if the code entered does not match the PIN associated with the card, the system treats the user as not authorised to conclude the purchase of the goods or the transaction in progress.
  • PIN Personal Identification Number
  • the object of the present invention is to create a smart card with identity checking which enables the secure recognition of the user and is compatible with traditional recognition systems.
  • a smart card comprising a battery for electrical power supply, a port for communication with an external reader, a microprocessor with programmable access data, which normally keeps this communication port in an inactive state, and data entry means to allow the user of the card to input into said microprocessor recognition data which can be compared with said access data to enable the microprocessor to switch said communication port into an active state, suitable for communication with the external reader.
  • the card is thus normally inactive and capable of preventing its use by a reader until the moment when the authorised user is recognised.
  • Recognition of the user can occur through the entry of a numerical code on a keypad incorporated into the card, or else by means of a sensor which records a piece of biometric data, as for example the user's voice or fingerprint.
  • the recognition code or biometric data thus entered is compared with the access data previously recorded in a permanent memory in the microprocessor at the time of issue of said card. If the recognition data coincides with the access data, the microprocessor activates the communication port to make the card usable for the operations for which it is intended; otherwise the card remains inactive.
  • Activation of the card can be associated with a signal, given by means of a luminous (LED, OLED) or acoustic signalling device.
  • a luminous (LED, OLED) or acoustic signalling device can be associated with a signal, given by means of a luminous (LED, OLED) or acoustic signalling device.
  • the information stored in the memory associated with the microprocessor can be accessible from outside only if the card is used by an authorised user.
  • the effect of the authorisation can be timed and, for example, can allow the reading of the information by the reader for a preset period of time only, after which the communication port is once again deactivated by the microprocessor and, for further operations, a new recognition procedure is required.
  • the card retains the dimensions of normal cards and is therefore totally compatible with current systems. Recognition of the user is performed inside the card.
  • the reader has no knowledge of the existence of the recognition procedure used by the card: the said reader, therefore, does not require to be modified in any way. It should be noted that, for the delivery of service to the user, two recognition procedures are necessary:
  • figure 1 is a general block diagram of the smart card according to the present invention
  • figure 2 shows a view of one of the two faces of an example of a card according to the invention, illustrating a communication port with magnetic strip; some devices included in the card are not shown
  • figure 3 shows a view of the same card as in figure 2, illustrating the reading/writing devices on the magnetic strip
  • figure 4 shows a view of one of the two faces of another example of a smart card according to the invention, illustrating a communication port with direct contact; some devices included in the card are not shown
  • figure 5 shows a view of one of the two faces of a further example of a card according to the invention, illustrating a communication port without direct contact; some devices included in the card are not shown
  • figure 6 shows a view of one of the two faces of a card according to the invention, illustrating a keypad as a means of entering recognition data
  • a card 1 is made up of a microprocessor 2, which can communicate with an external reader via a communication port 3, connected with said microprocessor 2 via a bidirectional path 4; said microprocessor 2 receives recognition data from a data entry means 5 via a unidirectional path 6. Said microprocessor 2 is powered by a battery 7. A signalling device (LED) 60 is controlled by the microprocessor 2 via the unidirectional path 61.
  • LED signalling device
  • an example of a card 10 according to the invention includes a communication port of the type with magnetic strip 12.
  • the data entry means nor the battery are illustrated.
  • FIG 3 is an illustration of the said card 10, which shows the method by which the microprocessor 2 reads/writes to the magnetic strip 12: a plurality of reading/writing heads 13, normally not visible, each of them connected to the microprocessor, reads the data to be stored and writes it to said magnetic strip 12 in the process of writing the card.
  • the heads 13 delete the information from the magnetic strip 12 at the moment when the card returns to the inactive state.
  • the information is again written to said magnetic strip by the microprocessor 2 at the stage of activating said card 10, and re-deleted at the end of the period of activation.
  • FIG. 4 another example of a card 20 according to the invention includes a communication port of the type with direct contact
  • a further example of a card 30 according to the invention includes a communication port of the type without direct contact 32, which consists of an antenna. In figure 5, neither the data entry means nor the battery are illustrated.
  • an example of a card 40 according to the invention comprises a keypad 42 as data entry means.
  • a keypad 42 as data entry means.
  • neither the communication port nor the battery are illustrated.
  • a card 50 according to the invention comprises a fingerprint sensor 52 as data entry means.
  • a fingerprint sensor 52 as data entry means.
  • neither the communication port nor the battery are illustrated.
  • card 1 according to the invention in all its embodiments 10, 20, 30, 40 and 50, does not differ from traditional cards from the point of view either of bulk or of communication port, and can therefore be inserted into a traditional reader: compatibility between traditional computerised systems and the system according to the invention is therefore guaranteed.
  • a state diagram is shown which represents the operations of loading the access data for the said card 1 according to the invention, at a preliminary stage.
  • Said card is in the "virgin card” state 300, and has not yet been assigned any authorised user and is therefore not usable.
  • the "loading access data” state 302 is reached when the authorised user enters the access data into the microprocessor for the first time, for example by making a fingerprint or typing a code into the keypad (event 301).
  • This operation which is carried out once only in the entire lifetime of the card 1 , is irreversible; it may be carried out by means of dedicated apparatus and by a trained operator, such as a staff member of the company providing the service; alternatively, if the data entry means is a keypad 42, it is possible for a factory code to be assigned to it, the same for all virgin cards, which is then changed by the user. At the end, the card becomes usable, and moves (event 303) to the "card inactive" state 300. At this point the card can be used in an unlimited number of operations, whenever the correct access data is entered by the user.
  • a state diagram may be seen which represents the typical operation of said card 1 according to the invention, once the access data has been loaded into it by the procedure illustrated in figure 8.
  • said card 1 is in a "card inactive" state 300.
  • a user enters input data, for example by making a fingerprint on a sensor 52 or typing a code into a keypad 42 ("signature entry" event 101)
  • said card 1 changes to a "recognition” state 102, during which microprocessor 2 compares the data entered by the user with the access data stored earlier: if the comparison has a negative result, the card denies authorisation ("authorisation denied” event 103) and returns to the "card inactive" state 300.
  • microprocessor 2 If, on the other hand, the comparison has a positive result ("authorisation” event 104), said microprocessor 2 transmits the information for the reader to said communication port 3, and said card 1 changes to "card active" state 105, during which said card 1 can be used; at the expiry of the preset time, microprocessor 2 deletes the information from the communication port 3 ("timeout" event 106), and returns to the "waiting" state 300.
  • the process of recognition of the user by a traditional computerised system, into which the card 1 according to the invention is introduced is also illustrated.
  • the system is in the "system waiting" state 200; on the introduction of said card into a reader ("card introduction” event 201), the system changes to "recognition” state 202, during which the said system effects the recognition of the user by checking the information obtained from said card 1 and transmitted by said communication port 3. If the recognition procedure has a negative result, the system denies authorisation to the user ("authorisation denied” event 203) and returns to "system waiting" state 200.

Abstract

A smart card is described, comprising a battery for electrical power supply (7), a port (3) for communication with an external reader, a microprocessor (2) with programmable access data, which normally keeps said communication port (3) in an inactive state, and data entry means (5), to allow the user of the card to input into said microprocessor (2) recognition data which can be compared with said access data; the microprocessor (2) can switch said communication port (3) into an active state suitable for communicat ion with the external reader. The data entered by the user can be secret codes or biometric data: this prevents utilisation of the card by users who are not recognised.

Description

"Smart card with identity checking".
* * * *
The present invention concerns a smart card with identity checking.
The "intelligent card", also known as a "smart card", is an electronic card which stores information and puts it at the disposal of automatic devices, henceforth named "readers". The transmission of information occurs through a communication port, which can be of various types:
- with magnetic strip: in this case, the technique of reading/writing the data exploits variation of the magnetic field on a strip; - with direct contact: in this case, the reader and the card are in contact to form an electrical circuit: the card is normally equipped with a microprocessor which, when powered by the reader, can transmit and receive data according to a pre-established communication protocol;
- without direct contact: in this case, the card, equipped with a microprocessor, receives energy from outside, through electromagnetic waves of suitable frequency, and exchanges data with the reader by means of radio waves.
The above types of card have become extremely widespread in recent decades. There is a continually growing number of computerised systems carrying out automatic functions for the supply of services, the distribution of goods or authorisation of access, and these systems operate even on an international scale. Operations such as the drawing of cash from Bancomat (ATM) machines, or the purchase of products from automatic vending machines, have now entered everybody's daily life. In what follows, the term "delivery of service" will be used for all these operations.
Normally, these computerised systems base their recognition of the user on the reading of a smart card, which is distributed by the issuing company, and which is to be inserted into a reader at the time of requesting the transaction or the purchase. If a higher level of security is required, the electronic card may be assigned a recognition code, generally known as a "PIN" (from "Personal Identification Number"), which the user must enter on a keypad located in proximity to the reader: if the code entered does not match the PIN associated with the card, the system treats the user as not authorised to conclude the purchase of the goods or the transaction in progress.
However, the procedure for recognising the user can go wrong in a number of cases. The growing availability of cheap electronic equipment has allowed simple devices to be put together which are capable of fraudulently acquiring the PIN. There is a well-known proliferation of small videocameras and illicit keypad covering devices, which record the PIN as it is entered. It is also well-known that many users, in contravention of the recommendations of the issuing companies, are in the habit of keeping a written copy of their PIN in proximity to the card, for example in their wallet, or of storing it in their mobile phone. It is therefore possible, if a card is lost or stolen, for the recognition mechanism to be circumvented by unauthorised users.
In the current state of affairs, however, computerised systems based on recognition by means of an electronic card are so widespread that their replacement with more secure systems would be difficult to achieve, as well as being costly. The optimal solution should therefore bring to a higher level of security, but maintaining compatibility with existing systems, thus allowing the gradual replacement of traditional cards with others which are more secure.
The object of the present invention is to create a smart card with identity checking which enables the secure recognition of the user and is compatible with traditional recognition systems.
In accordance with the invention, this aim is achieved with a smart card comprising a battery for electrical power supply, a port for communication with an external reader, a microprocessor with programmable access data, which normally keeps this communication port in an inactive state, and data entry means to allow the user of the card to input into said microprocessor recognition data which can be compared with said access data to enable the microprocessor to switch said communication port into an active state, suitable for communication with the external reader. The card is thus normally inactive and capable of preventing its use by a reader until the moment when the authorised user is recognised.
Recognition of the user can occur through the entry of a numerical code on a keypad incorporated into the card, or else by means of a sensor which records a piece of biometric data, as for example the user's voice or fingerprint. The recognition code or biometric data thus entered is compared with the access data previously recorded in a permanent memory in the microprocessor at the time of issue of said card. If the recognition data coincides with the access data, the microprocessor activates the communication port to make the card usable for the operations for which it is intended; otherwise the card remains inactive.
Activation of the card can be associated with a signal, given by means of a luminous (LED, OLED) or acoustic signalling device.
In this way, the information stored in the memory associated with the microprocessor can be accessible from outside only if the card is used by an authorised user.
The effect of the authorisation can be timed and, for example, can allow the reading of the information by the reader for a preset period of time only, after which the communication port is once again deactivated by the microprocessor and, for further operations, a new recognition procedure is required.
Although it comprises various types of device, the card retains the dimensions of normal cards and is therefore totally compatible with current systems. Recognition of the user is performed inside the card. The reader has no knowledge of the existence of the recognition procedure used by the card: the said reader, therefore, does not require to be modified in any way. It should be noted that, for the delivery of service to the user, two recognition procedures are necessary:
- the recognition procedure according to the invention, executed internally to the card, by means of which the microprocessor compares the access data with the recognition data;
- the traditional recognition procedure, executed by the computerised system through traditional operations (checking the information transmitted by the microprocessor to the communication port, possible checking of any PIN entered by the user on the keypad attached to the reader, checking of operations which may be carried out by the user).
Only in the case of recognition of the user by means of both the procedures will the user be authorised to obtain the service requested.
These and other characteristics of the present invention will be made more clearly evident from the following detailed description of some examples of practical embodiment which are illustrated without limiting effect in the attached drawings, in which: figure 1 is a general block diagram of the smart card according to the present invention; figure 2 shows a view of one of the two faces of an example of a card according to the invention, illustrating a communication port with magnetic strip; some devices included in the card are not shown; figure 3 shows a view of the same card as in figure 2, illustrating the reading/writing devices on the magnetic strip; figure 4 shows a view of one of the two faces of another example of a smart card according to the invention, illustrating a communication port with direct contact; some devices included in the card are not shown; figure 5 shows a view of one of the two faces of a further example of a card according to the invention, illustrating a communication port without direct contact; some devices included in the card are not shown; figure 6 shows a view of one of the two faces of a card according to the invention, illustrating a keypad as a means of entering recognition data; some devices included in the card are not shown; figure 7 shows a view of one of the two faces of a card according to the invention, illustrating a fingerprint sensor as a means of entering recognition data; some devices included in the card are not shown; figure 8 shows a state diagram which exemplifies the procedure for loading the access data at a preliminary stage onto a card according to the invention; figure 9 shows a state diagram which exemplifies the operation of a card according to the invention; figure 10 shows a state diagram which exemplifies the operation of a traditional computerised system following the insertion into a reader of a traditional card or of a card according to the invention.
With reference to figure 1 , a card 1 according to the invention is made up of a microprocessor 2, which can communicate with an external reader via a communication port 3, connected with said microprocessor 2 via a bidirectional path 4; said microprocessor 2 receives recognition data from a data entry means 5 via a unidirectional path 6. Said microprocessor 2 is powered by a battery 7. A signalling device (LED) 60 is controlled by the microprocessor 2 via the unidirectional path 61.
With reference to figure 2, an example of a card 10 according to the invention includes a communication port of the type with magnetic strip 12. In figure 2, neither the data entry means nor the battery are illustrated.
Figure 3 is an illustration of the said card 10, which shows the method by which the microprocessor 2 reads/writes to the magnetic strip 12: a plurality of reading/writing heads 13, normally not visible, each of them connected to the microprocessor, reads the data to be stored and writes it to said magnetic strip 12 in the process of writing the card. The writing having been performed, the heads 13 delete the information from the magnetic strip 12 at the moment when the card returns to the inactive state. By means of said heads 13, the information is again written to said magnetic strip by the microprocessor 2 at the stage of activating said card 10, and re-deleted at the end of the period of activation.
With reference to figure 4, another example of a card 20 according to the invention includes a communication port of the type with direct contact
22. In figure 4, neither the data entry means nor the battery are illustrated.
With reference to figure 5, a further example of a card 30 according to the invention includes a communication port of the type without direct contact 32, which consists of an antenna. In figure 5, neither the data entry means nor the battery are illustrated.
With reference to figure 6, an example of a card 40 according to the invention comprises a keypad 42 as data entry means. In figure 6, neither the communication port nor the battery are illustrated.
With reference to figure 7, a card 50 according to the invention comprises a fingerprint sensor 52 as data entry means. In figure 7, neither the communication port nor the battery are illustrated.
It should be noted that card 1 according to the invention, in all its embodiments 10, 20, 30, 40 and 50, does not differ from traditional cards from the point of view either of bulk or of communication port, and can therefore be inserted into a traditional reader: compatibility between traditional computerised systems and the system according to the invention is therefore guaranteed.
With reference to figure 8, a state diagram is shown which represents the operations of loading the access data for the said card 1 according to the invention, at a preliminary stage. Said card is in the "virgin card" state 300, and has not yet been assigned any authorised user and is therefore not usable. The "loading access data" state 302 is reached when the authorised user enters the access data into the microprocessor for the first time, for example by making a fingerprint or typing a code into the keypad (event 301). This operation, which is carried out once only in the entire lifetime of the card 1 , is irreversible; it may be carried out by means of dedicated apparatus and by a trained operator, such as a staff member of the company providing the service; alternatively, if the data entry means is a keypad 42, it is possible for a factory code to be assigned to it, the same for all virgin cards, which is then changed by the user. At the end, the card becomes usable, and moves (event 303) to the "card inactive" state 300. At this point the card can be used in an unlimited number of operations, whenever the correct access data is entered by the user.
With reference to figure 9, a state diagram may be seen which represents the typical operation of said card 1 according to the invention, once the access data has been loaded into it by the procedure illustrated in figure 8. Normally, said card 1 is in a "card inactive" state 300. When a user enters input data, for example by making a fingerprint on a sensor 52 or typing a code into a keypad 42 ("signature entry" event 101), said card 1 changes to a "recognition" state 102, during which microprocessor 2 compares the data entered by the user with the access data stored earlier: if the comparison has a negative result, the card denies authorisation ("authorisation denied" event 103) and returns to the "card inactive" state 300. If, on the other hand, the comparison has a positive result ("authorisation" event 104), said microprocessor 2 transmits the information for the reader to said communication port 3, and said card 1 changes to "card active" state 105, during which said card 1 can be used; at the expiry of the preset time, microprocessor 2 deletes the information from the communication port 3 ("timeout" event 106), and returns to the "waiting" state 300.
With reference to figure 10, the process of recognition of the user by a traditional computerised system, into which the card 1 according to the invention is introduced, is also illustrated. The system is in the "system waiting" state 200; on the introduction of said card into a reader ("card introduction" event 201), the system changes to "recognition" state 202, during which the said system effects the recognition of the user by checking the information obtained from said card 1 and transmitted by said communication port 3. If the recognition procedure has a negative result, the system denies authorisation to the user ("authorisation denied" event 203) and returns to "system waiting" state 200. It should be noted that for the system there is no difference between the case of the user committing an error in typing the PIN into the keypad, and the case of card 1 not being in "card active" state 105 because said card has not recognised the user. If recognition has a positive result, the system authorises the user ("authorisation of operations" event 204), leading to "service delivery" state
205, during which the system effects the delivery of the service requested by the user. At the end of the operations, when the service has been provided, the reader returns the card 1 ("end of operations" event 206), and the system goes back to "system waiting" state 200.

Claims

1. Smart card comprising a battery for electrical power supply (7), a port (3) for communication with an external reader, a microprocessor (2) with programmable access data, which normally keeps said communication port (3) in an inactive state, and data entry means (5) to allow the user of the card to input into said microprocessor (2) recognition data which can be compared with said access data to allow the microprocessor (2) to switch said communication port (3) into an active state, suitable for communication with the external reader.
2. Card according to claim 1, characterised in that said communication port (3) is of the type with magnetic strip (12).
3. Card according to claim 2, characterised by comprising a plurality of heads (13) associated with said magnetic strip (12) and connected to said microprocessor (2) to enable the writing and deletion of information to the magnetic strip (12).
4. Card according to claim 1, characterised in that said communication port (3) is of the type with direct contact (22).
5. Card according to claim 1, characterised in that said communication port (3) is of the type without direct contact (32).
6. Card according to any of the preceding claims, characterised by comprising a keypad (42) as data entry means (5).
7. Card according to any of the preceding claims, characterised by comprising a fingerprint sensor (52) as data entry means (5).
8. Card according to any of the preceding claims, characterised by comprising a signalling device (60) which notifies the user that authorisation has occurred for using the card.
9. Card according to any of the preceding claims, characterised by being configurable into three states: a "card inactive" state (300), during which the microprocessor (2) keeps the communication port (3) inactive, thus preventing a reader from obtaining information; a "recognition" state (102), during which the microprocessor (2) compares the recognition data obtained from the data entry means (5); a "card active" state (105), during which the microprocessor (2) activates the communication port (3), allowing a reader to obtain information.
10. Card according to any of the preceding claims, characterised by being able to communicate with readers of traditional type.
PCT/EP2007/051355 2006-02-16 2007-02-12 Smart card with identity checking WO2007093580A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITMI20060284 ITMI20060284A1 (en) 2006-02-16 2006-02-16 INTELLIGENT CARD WITH IDENTITY CHECK
ITMI2006A000284 2006-02-16

Publications (1)

Publication Number Publication Date
WO2007093580A1 true WO2007093580A1 (en) 2007-08-23

Family

ID=37899259

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/051355 WO2007093580A1 (en) 2006-02-16 2007-02-12 Smart card with identity checking

Country Status (2)

Country Link
IT (1) ITMI20060284A1 (en)
WO (1) WO2007093580A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011110438A1 (en) 2010-03-09 2011-09-15 Proton World International N.V. Protection of a communication channel between a security module and an nfc circuit
CN102792723A (en) * 2010-03-09 2012-11-21 质子世界国际公司 Protection of a security module in a telecommunication device coupled to an NFC circuit
US9179301B2 (en) 2010-08-31 2015-11-03 Proton World International N.V. Protection of a communication channel of a telecommunication device coupled to an NFC circuit against misrouting
US9185561B2 (en) 2010-03-09 2015-11-10 Proton World International N.V. Protection against rerouting in an NFC circuit communication channel
US9209866B2 (en) 2010-08-31 2015-12-08 Proton World International N.V. Securing of a telecommunication device equipped with a near-field communication module
US9219745B2 (en) 2011-04-05 2015-12-22 Proton World International N.V. Assessing the resistance of a security module against attacks by communication pipe diversion
US9225687B2 (en) 2011-04-13 2015-12-29 Proton World International N.V. Access control mechanism for a secure element coupled to an NFC circuit
US10511626B2 (en) 2010-12-20 2019-12-17 Stmicroelectronics (Rousset) Sas Protection against rerouting a communication channel of a telecommunication device having an NFC circuit and a secure data circuit
US10667133B2 (en) 2010-03-09 2020-05-26 Proton World International N.V. Detection of a rerouting of a communication channel of a telecommunication device connected to an NFC circuit

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623552A (en) * 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
EP1074949A1 (en) * 1999-08-02 2001-02-07 Ming-Shiang Shen Integrated circuit board with fingerprint verification capability
US6188309B1 (en) * 1998-01-07 2001-02-13 At&T Corp Method and apparatus for minimizing credit card fraud
WO2001035334A1 (en) * 1999-11-11 2001-05-17 Kenneth Li Credit card with fingerprint authentication system
US20040177045A1 (en) * 2001-04-17 2004-09-09 Brown Kerry Dennis Three-legacy mode payment card with parametric authentication and data input elements

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5623552A (en) * 1994-01-21 1997-04-22 Cardguard International, Inc. Self-authenticating identification card with fingerprint identification
US6188309B1 (en) * 1998-01-07 2001-02-13 At&T Corp Method and apparatus for minimizing credit card fraud
EP1074949A1 (en) * 1999-08-02 2001-02-07 Ming-Shiang Shen Integrated circuit board with fingerprint verification capability
WO2001035334A1 (en) * 1999-11-11 2001-05-17 Kenneth Li Credit card with fingerprint authentication system
US20040177045A1 (en) * 2001-04-17 2004-09-09 Brown Kerry Dennis Three-legacy mode payment card with parametric authentication and data input elements

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10667133B2 (en) 2010-03-09 2020-05-26 Proton World International N.V. Detection of a rerouting of a communication channel of a telecommunication device connected to an NFC circuit
FR2957439A1 (en) * 2010-03-09 2011-09-16 Proton World Int Nv PROTECTION OF A COMMUNICATION CHANNEL BETWEEN A SECURITY MODULE AND AN NFC CIRCUIT
CN102792723A (en) * 2010-03-09 2012-11-21 质子世界国际公司 Protection of a security module in a telecommunication device coupled to an NFC circuit
CN102792724A (en) * 2010-03-09 2012-11-21 质子世界国际公司 Protection of a communication channel between a security module and an nfc circuit
WO2011110438A1 (en) 2010-03-09 2011-09-15 Proton World International N.V. Protection of a communication channel between a security module and an nfc circuit
US9185561B2 (en) 2010-03-09 2015-11-10 Proton World International N.V. Protection against rerouting in an NFC circuit communication channel
US11743721B2 (en) 2010-03-09 2023-08-29 Proton World International N.V. Protection of a communication channel between a security module and an NFC circuit
US10999737B2 (en) 2010-03-09 2021-05-04 Proton World International N.V. Detection of a rerouting of a communication channel of a telecommunication device connected to an NFC circuit
US10880739B2 (en) 2010-03-09 2020-12-29 Proton World International N.V. Protection of a communication channel between a security module and an NFC circuit
US10278077B2 (en) 2010-03-09 2019-04-30 Proton World International N.V. Protection of a security module in a telecommunication device coupled to an NFC circuit
US10716007B2 (en) 2010-03-09 2020-07-14 Proton World International N.V. Protection of a security module in a telecommunication device coupled to an NFC circuit
US9179301B2 (en) 2010-08-31 2015-11-03 Proton World International N.V. Protection of a communication channel of a telecommunication device coupled to an NFC circuit against misrouting
US9209866B2 (en) 2010-08-31 2015-12-08 Proton World International N.V. Securing of a telecommunication device equipped with a near-field communication module
US10511626B2 (en) 2010-12-20 2019-12-17 Stmicroelectronics (Rousset) Sas Protection against rerouting a communication channel of a telecommunication device having an NFC circuit and a secure data circuit
US10931712B2 (en) 2010-12-20 2021-02-23 Stmicroelectronics (Rousset) Sas Protection against rerouting a communication channel of a telecommunication device having an NFC circuit and a secure data circuit
US9219745B2 (en) 2011-04-05 2015-12-22 Proton World International N.V. Assessing the resistance of a security module against attacks by communication pipe diversion
US9225687B2 (en) 2011-04-13 2015-12-29 Proton World International N.V. Access control mechanism for a secure element coupled to an NFC circuit

Also Published As

Publication number Publication date
ITMI20060284A1 (en) 2007-08-17

Similar Documents

Publication Publication Date Title
WO2007093580A1 (en) Smart card with identity checking
AU2008248013B2 (en) Dynamically programmable RFID transponder
US7128274B2 (en) Secure credit card with near field communications
US20170289127A1 (en) Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match
CN100520814C (en) Portable data carrier, external arrangement, system and methods for wireless data transfer
CA2529176A1 (en) Method and system for creating and operating biometrically enabled multi-purpose credential management devices
US20020174336A1 (en) Information protection system and information protection method
EP3471070A1 (en) Configurable digital badge holder
WO2016160816A1 (en) Smart data cards that enable the performance of various functions upon activation/authentication by a user's fingerprint, oncard pin number entry, and/or by facial recognition of the user, or by facial recognition of a user alone, including an automated changing security number that is displayed on a screen on a card's surface following an authenticated biometric match
US20030204526A1 (en) Interlocking smart fob enabling secure access and tracking for electronic devices
CN101467158A (en) System and method for activating telephone-based payment instrument
WO2002019288A3 (en) Method and device for secure network identification
WO2003003194A1 (en) Integrated circuit device, information processing device, information recording device memory management method, mobile terminal device, semiconductor integrated circuit device, and communication method using mobile terminal device
JP2000215296A (en) Authentication system for pc card
US6932269B2 (en) Pass-code identification device and pass-code identification method
EP2095297B1 (en) Apparatus and method for action control of rfid system
US7889060B2 (en) Active radio tag, security management system, and security management method
JP4207403B2 (en) Information storage medium, IC chip having memory area, information processing apparatus having IC chip having memory area, and memory management method for information storage medium
JP4599081B2 (en) Memory card adapter and memory card
CN111656414A (en) Aggregator for identification devices
CN102663472A (en) Contactless radio frequency card capable of preventing unauthorized swiping
WO2002069281A2 (en) Chip reader and identification method for verifying the user authorisation of a chip user
US8220718B2 (en) Method for post-manufacturing data transfer to and from a sealed device
JP2007026138A (en) Fraudulent card utilization preventing system and atm
KR100727866B1 (en) Smart Card leader system for the one time password creation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07704532

Country of ref document: EP

Kind code of ref document: A1