×

Unitary, self-contained card verification and validation system and method

  • US 4,614,861 A
  • Filed: 11/15/1984
  • Issued: 09/30/1986
  • Est. Priority Date: 11/15/1984
  • Status: Expired due to Fees
First Claim
Patent Images

1. A unitary, self-contained card capable of storing and generating information independently of systems external to said card to verify proper use of said card comprising:

  • data entry means for entering a personal identification number into said card;

    electronic memory means for storing a predetermined personal identification number associated with said card and an encryption algorithm (N);

    data processing means comprising;

    means for comparing said personal identification number entered through said data entry means with said predetermined personal identification number stored in said electronic memory means to generate a PIN validation signal upon favorable comparison of said personal identification number entered through said data entry means and said predetermined personal identification number stored in said electronic memory means;

    means for generating a transaction key number (KLM) which is generated in response to said PIN validation signal and which is different each time said PIN validation signal is generated;

    means for generating an algorithmic code number (XYZ) from said transaction key number (KLM) in accordance with said encryption algorithm (N);

    means for generating a transaction identification code number (TIC) from said transaction key number (KLM) and said algorithmic code number (XYZ);

    means for displaying on said card said transaction identification code (TIC) so that the validity of said use of said card can be verified by knowing said encryption algorithm (N) and by identifying said transaction key number (KLM) and said algorithmic code number (XYZ) in said transaction identification code (TIC) and verifying said algorithmic code number (XYZ) by deriving said algorithmic code number (XYZ) from said transaction key number (KLM) and said encryption algorithm (N).

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×