Electronic cashless transaction system
First Claim
1. A key control method for use in an electronic cashless transaction system including at least a bank center, a store transaction terminal and an IC card being used as an electronic cashless transaction medium, comprising:
- a step of having said bank center generate and code a first parameter for a transmission to said IC card;
a step of having said IC card receive and decode said coded first parameter by using a first key, thereby reconstructing said first parameter issued by said bank center, perform a first arithmetic operation on said first parameter and a password of a holder of said IC card, and store in a first register as a first value;
a step of having said store transaction terminal send to said IC card a second parameter coded by a second key, when said holder inserts said IC card into said store transaction terminal;
a step of having said IC card decode said coded second parameter by using said second key, thereby reconstructing said second parameter received from said store transaction terminal, perform a second arithmetic operation on said second parameter and said first value stored in a first register, store a result of said second arithmetic operation in said second register; and
a step of decoding a second value stored in said second register by using a coding session key stored in a memory of said IC card, thereby obtaining a key for an intended authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A key control method is for use in an electronic cashless transaction system including at least a bank center, a store transaction terminal and an IC card being used as an electronic cashless transaction medium. The key control method comprises a step of having the bank center generate and code a first parameter for a transmission to the IC card; a step of having the IC card receive and decode the coded first parameter by using the first key, thereby reconstructing the first parameter issued by the bank center, perform a first operation on the first parameter and a password of a holder of the IC card, and store in a first register; a step of having the store transaction terminal send to the IC card a second parameter coded by a second key, when the holder inserts the IC card 11 into the store transaction terminal; a step of having the IC card decode the coded second parameter by using the second key, thereby reconstructing the second parameter received from the store transaction terminal, perform a second operation on the second parameter and the value stored in the first register, store a result of the second operation in the second register; and a step of decoding a value stored in the second register by using a coding session key stored in a memory of the IC card, thereby obtaining a key for an intended authentication.
265 Citations
14 Claims
-
1. A key control method for use in an electronic cashless transaction system including at least a bank center, a store transaction terminal and an IC card being used as an electronic cashless transaction medium, comprising:
-
a step of having said bank center generate and code a first parameter for a transmission to said IC card; a step of having said IC card receive and decode said coded first parameter by using a first key, thereby reconstructing said first parameter issued by said bank center, perform a first arithmetic operation on said first parameter and a password of a holder of said IC card, and store in a first register as a first value; a step of having said store transaction terminal send to said IC card a second parameter coded by a second key, when said holder inserts said IC card into said store transaction terminal; a step of having said IC card decode said coded second parameter by using said second key, thereby reconstructing said second parameter received from said store transaction terminal, perform a second arithmetic operation on said second parameter and said first value stored in a first register, store a result of said second arithmetic operation in said second register; and a step of decoding a second value stored in said second register by using a coding session key stored in a memory of said IC card, thereby obtaining a key for an intended authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification