Lllllllllllllllllillll - L - L - !) !) ) L) (L) !) ) L! (L) LLLLLLLLLLLLLLLLLLLLLLLLLL
Lllllllllllllllllillll - L - L - !) !) ) L) (L) !) ) L! (L) LLLLLLLLLLLLLLLLLLLLLLLLLL
[l]l l l l l l l l l l l l l
United States Patent [19]
Chen et al.
[54] ELECTRONIC PAYMENT SYSTEM AND
METHOD
[11]
Patent Number:
5,590,197
Dec. 31, 1996
[45]
Date of Patent:
stored on the customers computer (or personal digital assistant, PCMCIA card, or the like) together with the
browser/mosaic software, is provide to a customer for the
[52]
380/30
[58] Field of Search ............................. .. 380/3, 4, 23, 24,
380/25, 49, 30
[56] References Cited
U.S. PATENT DOCUMENTS
5,373,561 5,511,122 12/1994 Haber et a1. ............................ .. 380/49 4/1996 Atkinson ................................. .. 380/25
parties have no access. The public key rile preferably contains a plurality or public keys selectable by an identi?er
associated with but not a part of the key itself, so that the account servicer can control, by having the merchant send an
identi?er to the wallet, the selection of uncomprornised keys without anyone but the servicer having knowledge of which
[57]
ABSTRACT
12 Claims, 1 Drawing Sheet
A cyber wallet in the form of stored and protected account information, which may be carried on a tamper resistant
User
Merchant Processor
User
Merchant Processor
Merchant Processor
Secured Network
User
Secured Network
Secured Network
Credit Processor
Credit Processor
US. Patent
5,590,197
Merchant Processor
User
Merchant Processor
Merchant Processor
Secured Network
User
Credit Processor
Authorization
Figure 1
5,590,197
1
ELECTRONIC PAYMENT SYSTEM AND METHOD
BACKGROUND OF THE INVENTION
2
solicitors, and the investment necessary to maintain a phone bank and advertising. While fraud on the part of merchants, and of third party interceptors of the credit information has
been a source of substantial losses to customers and credit
card companies, the risk has generally been viewed as unavoidable and offset by the convenience of credit card
transactions. This balance between convenience and risk has now been substantially altered by the development of a new form of
In describing the invention, the provider of services or goods will be referred to as a merchant, and the provider of the wallet, which will typically be a credit card company,
bank, or account servicer, will be referred to as the ser
personal computer and an Internet account, in which the merchant and customers may be spread around the globe, and in which there is no effective regulation of the ?ow of
information and who has access to the information. Unless information access to the credit payment and
from the point-of-view of the consumer and/or the company or bank which guarantees payments made using the card. purchaser physically presents a credit card to a merchant Despite these risks, there is a rapid trend towards increas who veri?es the authentication information by comparing a 25 ing use carrying out transactions over the least controlled signature on the card with the cardholders signature, and public network available, namely the Internet. In such reads the account number from the card so that it can be transactions, the merchant is often nothing more than an transmitted to the credit card servicer for authorization. electronic address, and it is impossible for anyone to ensure The level of security for the parties who have a stake in 30 that whoever is receiving the payment information is legiti mate. Thus, such remote electronic transactions carry sig the transaction, i.e., the authorized owner of the card, the ni?cant risks for both the customer and the credit provider. merchant, and the credit card company, depends on two The customer is faced with the problem of misuse of his or factors: the ability of the merchant to authenticate the card her account information, either by someone who has inter by comparing signatures and recognizing a forgery, the cepted the information, or by a dishonest or compromised ability and honesty of the merchant in protecting the account merchant, while the credit issuer is faced with the problem information necessary to carry out the transaction. of verifying that a request for payment from a merchant is Much attention has recently been paid to the problem of in response to a legitimate order. card authentication. For example, secret codes or PIN num
The Internet was originally designed as a way of com access to the information on the card unless the cardholder 40 municating research information, but recent advances in communications and computer technology has made access is an unauthorized user of the card. In addition, a variety of to the Internet available to a mass world-wide audience. To proposals have been made for further verifying the authen a merchant, the Internet is potentially not only a way of ticity of the card to ensure that the card is not a forgery. For
transmitting information, but also a way of bringing a global market to his or her doorstep. In practice, however, the lack of an eifective way of securing transfers of funds has prevented optimal utilization of the Intemets potential as a global marketplace for goods and services as well as ideas. In order to be useful, a system of electronic payments must provide not only protection of account information and authentication of all information having to do with the transaction, but also should be compatible with the existing infrastructure of credit card issuers, without the need for
mass encryption technology. Thus, conventional crypto graphic systems alone cannot solve the problems of Internet
commerce and unlikely ever to be implemented, because
uted over the Internet due to export restrictions by the U.S. government, and because of the more fundamental problem that even if communications with a merchant are protected,
5,590,197
3
there is no guarantee that the merchant will protect the information or even that the intended recipient of the infor mation will not misuse it. It is true that in any transaction, someone must be trusted. However, most consumers and merchants would agree that the party to be trusted is not the purported consumer or the
4
electronic wallet in the form of stored and protected account
information, which may be canied on a tamper resistant portable electronic storage medium such as a smartcard, or
stored on the customers computer (or personal digital assistant, PCMCIA card, or the like) together with the
browser/mosaic software which will enable the customer to utilize the wallet for transactions carried out on the Internet,
merchant, but rather the credit card company (or bank), which can more easily be regulated by appropriate watchdog agencies, and which is the party that ultimately carries the
risk of a fraudulent transaction.
and by also providing in the wallet a public key ?le containing public keys to be used for encrypting information
10 necessary to carry out a remote transaction, the decryption
25
In an especially preferred embodiment of the invention, the public keys are held only by the possessor of the wallet, and control of the keys by the account servicer is maintained by having the merchant forward to the wallet a public key identi?er for selecting a key, thus allowing the account
servicer to change the keys associated with a merchant or prevent the use of unauthorized keys, without the merchant or any third party ever having access any of the public keys in the wallet, and without any involvement on the part of the
customer or his or her wallet.
30
card concept into a concept involving multiple cards with multiple issuers in a convenient package designed to enable the holder of the cyber wallet to make purchases over the vast global communications network known as the Internet, with ?rll protection of the electronic payment information
from not only eavesdroppers, but also from remote mer
system for utilizing an open communication network such as merchant. 45 the Internet as a medium for the transfer of credit card It is a further objective of the invention to provide a account information. The system on which the cyber wallet system of electronic payment which has the advantages is utilized includes a plurality of users, each provided with described above and which further can easily be utilized in an individual cyber wallet, the users being connected to a connection with the system and method described in US. plurality of merchant processors over the Internet (for patent application Ser. No. 08/285, 1 34, in order to ensure the example, by means of the World-Wide Web). Each of these
merchant processors is connected by means of a secured network or by means of a secret tunneling or other channel
merchant processor in the form of a public key encrypted authorization ticket, which is then forwarded by the mer chant to the credit processor. All unprotected communica
tions over the Internet are presumed to be accessible by unauthorized parties, and all merchants are subject to sus picion. The credit processors, however, are presumed to be secure and trustworthy.
These objectives are achieved, in accordance with the 65 personal information required to be transmitted to the account servicer in order to verify the account status, and providing at the customer end/user side of the system, an which may be carried on a tamper resistant portable
5,590,197
5
electronic storage medium such as a smartcard, or stored on
6
possession of a public key. The present invention involves public key encryption of any information contained in the
wallet which is necessary to authenticate the transaction, and
the customer s computer (or personal digital assistant, PCM CIA card, or the like) together with the browser/mosaic
software which will enable the customer to utilize the wallet for transactions carried out on the Internet, and a public key ?le which will be described below. For some purposes,
information in the wallet could also be accessible solely through use of a PIN mechanism, such as might be included in a smart card of the type described in the copending application cited above, in order to ensure compatibility with such systems.
contained in the wallet contains means for varying the public key used to encrypt the authorization ticket, thus reducing
10
the likelihood that one of the keys could be compromised. Use of the cyber wallet is carried out as follows: First, the wallet is created by the account servicer or
not part of the invention, but rather it is their combination with the public key ?le and the manner in which they are
used to carry out a transaction that constitutes the invention.
20
a user ID, MAC, and any other information which might be needed during the payment and authentication process. This information is associated with a public key ?le preferably containing a plurality of public keys associated with a single root key, and key identi?ers. The entire wallet is then provided to the customer, in any form which enables the
customer to utilize the wallet, for example as a software package for use on the customers portable computer, or on a smart card which can be carried around by the customer
and used at kiosks provided with smart card readers. When a transaction is to be carried out, the customer
credit or debit cards are used, without the need for entry of additional information. In this embodiment, the cyber wallet can be provided on the card using the procedures described
reader; and establishes communications with the merchant. The customer then makes an order and the merchant
requests an authorization ticket in the form of payment or
account information encrypted by one of the public keys in the public key ?le. Selection of the public key may be in
response to transmission from the merchant of a public key identi?er associated with the public key. If the card has been
inserted into a card reader, or if the software has been
transaction and, uniquely, a ?le containing a plurality of public keys. These public keys are an important feature of cyber wallet because it is these keys that are used to protect
the information on the card as it is being transmitted to the merchant. Essentially, the concept of the key ?le is to use
45
08/285,134.
When the merchant receives the authorization ticket, the
one of the public keys of a public-private key cryptosystem to encrypt the necessary information and send the encrypted
merchant then embeds or associates it with whatever infor 50 mation the merchant needs to provide the account servicer. The authorization ticket is then forwarded to the account information in the form of an authorization ticket, which
servicer which allows the transaction to be completed. By using public keys to encrypt the information, so that the
decrypt the ?le and verify the status of the account. If the transaction is approved, the account servicer then sends an
information can only be decrypted by the party in possession of the associated private key, the information can be fully protected as it is passed electronically to the merchant, and
from the merchant to the account servicer.
60
approval message back to the merchant, together with decrypted information necessary for the merchants records. It will of course be appreciated by those skilled in the art
The inclusion of a public key ?le in the cyber wallet is to be distinguished from the inclusion of card authentication information. As noted above, the authenticity of the infor mation can be made fully veri?able by using the method
provided to the merchant by the account servicer, which can thus prevent the use of compromised keys, a public key can
provision in the cyber wallet for decrypting a new public key which has been encrypted by the old private key. Also, it is possible to provide for cyber wallets containing the neces
5,590,197
7
sary public key ?le and browser software to be downloaded by a merchant to a customer, rather than supplied by the
credit card company directly to the customer, with the user adding the account and personal information necessary to elfect a transaction, in which case the private key will still be held by the account servicer and the merchant will still
have no access to any information in the authorization ticket which it forwards from the customer to the account servicer.
8
tion of public keys without access by the merchant to the
Having thus described a preferred embodiment of the invention in su?icient detail to enable those skilled in the art to make and use the invention, it should therefore neverthe less be appreciated that numerous modi?cations and varia tions of the basic cyber wallet concept, and it is intended that the invention encompass all such modi?cations and variations without limitation to the details of the preferred embodiments described above. To the contrary, it is intended that the above description not be taken as limiting, but rather
over an open computer network, and said public key ?le including means for selecting the public key of a
25
private-public key cryptosystem and for encrypting the sensitive information using the public key to generate
an authorization ticket; 30 computer, said step of distributing the software program means possessed by a merchant in communication with being carded out by a credit card company or merchant. the storage means for receiving said authorization 9. A method as claimed in claim 7, wherein the step of ticket from the storage means and forwarding it to a providing the customer with personal account information, secured account processor; at least one browser program, and a public key ?le com means in the account processor including a private key for 35 prises the step of providing at least the personal account decrypting the authorization ticket and informing the information and public key ?le on a smart card for use in merchant whether a transaction is authorized. kiosks equipped with smart card readers. 2. A system as claimed in claim 1, wherein the storage 10. A method as claimed in claim 7, further comprising means is in the form of a software program distributed by a the step of providing the customer with a private key
credit card company or the merchant to a customer for use 40
4. A system as claimed in claim 1, wherein the storage means further includes means including a private key
45
key ?le includes a plurality of public keys retrievable based on identi?ers associated therewith, and further comprising the steps of having the account servicer supply the merchant with a key identi?er and, during a transaction, having the merchant supply the key identi?er to an electronic storage
device on which said personal account information and public key ?le are stored in order to enable the account
servicer to control the selection of public keys via the merchant without the merchant having access to the public
keys themselves.
12. A method as claimed in claim 1, further comprising
the step of allowing access to the account information via a 55 PIN mechanism, so that the wallet can be used in situations
essary. 6. A system as claimed in claim 1, wherein the public key ?le includes a plurality of public keys retrievable based on
identi?ers associated therewith, one of the identi?ers at a