[go: up one dir, main page]

WO2018096559A1 - System and method for translation and authentication of secure pin and sensitive data - Google Patents

System and method for translation and authentication of secure pin and sensitive data Download PDF

Info

Publication number
WO2018096559A1
WO2018096559A1 PCT/IN2017/050549 IN2017050549W WO2018096559A1 WO 2018096559 A1 WO2018096559 A1 WO 2018096559A1 IN 2017050549 W IN2017050549 W IN 2017050549W WO 2018096559 A1 WO2018096559 A1 WO 2018096559A1
Authority
WO
WIPO (PCT)
Prior art keywords
card
arqc
transaction
chip card
pin
Prior art date
Application number
PCT/IN2017/050549
Other languages
French (fr)
Inventor
Harish VEERAVALLI
Bhaktha Keshavachar
Original Assignee
Ezetap Mobile Solutions Pvt. Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ezetap Mobile Solutions Pvt. Ltd. filed Critical Ezetap Mobile Solutions Pvt. Ltd.
Publication of WO2018096559A1 publication Critical patent/WO2018096559A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the embodiments herein are generally related to a field of electronic transactions.
  • the embodiments herein are particularly related to a system and method for authentication of card data and pin in secure electronic transactions.
  • the embodiments herein are more particularly related to a system and method for translation and authentication of secure PIN and sensitive data through cryptogram.
  • the technology used in the plastic cards is a magnetic stripe and a chip card technology.
  • Magnetic card has a data written on the magnetic strip, and the magnetic card data is exposed by any card reader and is easily cloned.
  • the hacking of data and cloning of data is lead to a problem of identifying whether the magnetic card data is retrieved from the card issued by the bank or from a cloned card data or virtual data.
  • EMV Co a consortium formed by financial network providers named EMV Co. has proposed a usage of chip cards which authenticates itself to the issuer bank with less or no chance of fraudulent activity in card authentication.
  • the banks have to face one more issue in the authentication or identification of a signature of a person or card holder / customer, especially in cases, in which the card is stolen and used to complete a transaction at merchant's place/terminal. There are many cases where the stolen card is used to complete a transaction at merchant's end. Hence an identification of the customer is done by comparing the signature of the customer on the charge slip with that of the signature present on the card. This method has led to a forgery of customer signature at times. To overcome the forgery, the banks have come up with PIN entry at merchant terminal.
  • ARQC is a cryptogram generated by the card (ICC) for identifying and securely authenticating card transaction by the issuer.
  • ICC card
  • a primary object of the embodiments herein is to provide a system and method for a secure electronic transaction and secure user authentication and authorization with simple process thereby avoiding any possible security flaws at a plurality of points or stakeholders such as merchant terminal, acquirer bank, etc.
  • Another object of the embodiments herein is to provide a system and method for secure electronic transactions.
  • Yet another object of the embodiments herein is to provide a system and method for secure PIN and sensitive data translation and authentication.
  • Yet another object of the embodiments herein is to provide a system and method for authenticating user PIN by the issuer payment system without following a complex and less secure method of key rotation and key management by acquirer or third party financial organization/establishment.
  • Yet another object of the embodiments herein is to provide a system and method for concatenating an encrypted PIN Block to ARQC for a secure electronic transaction and secure user authentication and authorization.
  • Yet another object of the embodiments herein is to provide a system and method for generating ARQC, which is a cryptogram generated by the card (ICC) for identifying and securely authenticating card transaction by the issuer.
  • ARQC is a cryptogram generated by the card (ICC) for identifying and securely authenticating card transaction by the issuer.
  • Yet another object of the embodiments herein is to provide a system and method for enabling an issuer bank to authenticate both secure card data and PIN data with a single command and without any security flaw and a plurality of PIN translations.
  • Yet another object of the embodiments herein is to provide a system and method for enabling a fast and efficient electronic transaction.
  • Yet another objective of the embodiments herein is to provide a system and method for eradicating human snooping and security flaw of different uncontrolled facilities/systems in which the key is injected/used.
  • Yet another object of the embodiments herein is to provide a system and method for using a secure method for encrypting sensitive data in a transaction flow.
  • Yet another object of the embodiments herein is to provide a system and method for offering a cost effective solution with in-built and independent secure and safe method.
  • Yet another object of the embodiments herein is to provide a system and method to encrypt sensitive data in a safer and simpler way using a key management process.
  • Yet another object of the embodiments herein is to provide a system and method for authenticating PIN block by both the card and/or issuer bank as well.
  • Yet another object of the embodiments herein is to provide a system and method to protect and guard transportation of sensitive data (PIN block) with a high level security encryption standard which is also used and accepted by the industry.
  • Yet another objective of the embodiments herein is to provide a system and method which is backward compatible and works on all existing financial / payment / security centric systems.
  • Yet another object of the embodiments herein is to provide a system and method to prevent a replay and / or brute force attack in an electronic transaction.
  • Yet another object of the embodiments herein is to provide a system and method to translate a PIN by using existing eco system without a knowledge of the parties or stack-holders involved in between the card issued and issuer processing systems.
  • Yet another object of the embodiments herein is to provide a system and method to enable an issuer bank to authenticate both the card data and PIN data with one command and without any security flaw thereby avoiding multiple PIN translations across the system which is open to security flaw.
  • Yet another object of the embodiments herein is to provide a system and method to find an alternative to the present day complex Key management which is used for translating PIN blocks at each point / switch / server.
  • Yet another object of the embodiments herein is to provide a system and method to deal with EMV contact and contactless cards or any other system where security of authorization or identification is vital.
  • Yet another object of the embodiments herein is to develop a system and method to provide an enhanced security in using industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other industry best standard in encryption.
  • Yet another object of the embodiments herein is to develop a system and method to avoid brute force attack and also secure the data replay as the system is intended to use in the open environment.
  • Yet another object of the embodiments herein is to develop a system and method to kill the card, when the number of attacks in securing the sensitive data reaches a preset threshold level.
  • the embodiments herein provide a system and method for secure electronic transaction.
  • the system comprises a terminal device/merchant terminal configured for receiving one or more PIN details for Customer Verification Method (CVM) from a user via a keypad or an input device associated with the terminal device.
  • the terminal device is further configured for encrypting the received PIN input from the user using one or more encryption algorithms.
  • the system also comprises a chip card/integrated circuit card (ICC) communicatively coupled with the terminal device.
  • the chip card is configured for accepting and translating the encrypted PIN from the terminal device.
  • the chip card comprises a transaction counter configured for incrementing for every transaction attempt performed by the user.
  • the chip card is configured for encrypting the translated PIN with Derived Unique Key Per Transaction (DUKPT) key based on transaction counter value present in the card as a Key Serial Number (KSN).
  • the chip card is further configured for concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) to generate a Proprietary Authentication Data (PAD)/authorization request comprising of the ARQC and the PIN block.
  • ARQC Authorization Request Cryptogram
  • PAD Proprietary Authentication Data
  • the chip card is further configured for transmitting the ARQC over a secure channel.
  • the system further comprises an authentication terminal device configured for accepting the transmitted ARQC and for forwarding the received ARQC over a secure communication channel and an acquirer terminal device/merchant bank device configured for receiving the ARQC from the authentication terminal device and for forwarding the received ARQC through a network provider system for authentication and payment.
  • the system still further comprises a card issuer bank device configured for receiving the ARQC from the acquirer terminal device and for authenticating the chip card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the chip card reading terminal.
  • the card issuer bank device is further configured for validating both PIN block and the chip card generated ARQC/cryptogram and for informing the validation state back to the user via the card issuer bank device.
  • the chip card is further configured for counting the number of transaction attempts with no valid server response using the transaction counter.
  • the chip card is further configured for de-activating when the number of invalid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • the transaction counter is reset every time after a successful transaction is completed or carried out.
  • the system is further configured for activating a barred card or unusable card and for making the card usable on lock with a user secure script run on the chip card after the authentication or identification of issuer by chip card.
  • the one or more encryption algorithms used for PIN block encryption comprises Derived Unique Key Per Transaction algorithm (DUKPT (ATC as IKSN)) or MK-SK algorithm.
  • DUKPT Derived Unique Key Per Transaction algorithm
  • MK-SK algorithm MK-SK algorithm
  • the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
  • PARQC Authorization Request Cryptogram
  • the chip card is a contact or contactless Near Field Communication (NFC) card or a smart card.
  • NFC Near Field Communication
  • the system is configured for translating the PIN by using existing eco system without the knowledge of one or more parties involved between the card issued and issuer processing system.
  • a method for secure electronic transaction comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal.
  • the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • CVM Customer Verification Method
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • a computer implemented method comprising instructions stored on a non-transitory computer readable storage medium and executed on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided. The method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • CVM Customer Verification Method
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated.
  • the validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • an article of manufacture comprising a computer readable storage medium recorded with or stored with instructions for execution on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided.
  • the stored instructions are executed on a computing device provided with a hardware processor and memory, and configured for carrying out or performing or executing a method for a secure electronic transaction by inserting or the article of manufacture into the computing device or by connecting a player device loaded with the article of manufacture.
  • the method comprises the steps of receiving a chip card or tapping a chip card in a terminal device or merchant terminal.
  • the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • the embodiments herein provide a system and method for secure electronic transaction.
  • the system includes end to end transaction eco system comprising card issued by the issuer bank, any PCI and EMV approved terminal, payments server or host and financial network providers.
  • the system for a secure electronic transaction using a card comprises a terminal for reading an EMV card data, an acquirer bank server, the network providers and a card issuer bank.
  • the card is a Near Field Communication (NFC) card or a smart card or any other similar eco system.
  • NFC Near Field Communication
  • the card data is unique for the card and strictly in compliance with EMV Co. standards or any other specific standards which is used in the system and works on all EMV Co. or any other specific system certified/ complied terminals.
  • the system is configured to introduce changes to current eco system to match backward or existing system compatibility.
  • the system is configured to introduce no changes to the current eco system which is maintained by third party players.
  • the system is configured to provide changes in the card processing, for validating PIN by the issuer without an intervention of acquirer or middle system like network or financial switch or any similar server.
  • the issuer is defined as the one who issues card or any instrument or tool and has association with consumer or card holder or user.
  • the acquirer is defined as the one who has issued terminal or has association with merchant or terminal holder.
  • the system and method introduces changes to the present day card processing which is allowed by EMV Co.
  • the changes are done internally to the card and Issuer processing system (server).
  • the system and method eliminates the need for PIN translation at a plurality of payment servers such as servers of acquirer bank, third party partner system, network provider system, etc.
  • the system is configured to translate PIN by using existing eco system without the knowledge of parties involved between the card issued and issuer processing systems.
  • the system and method provides an alternative technique to the present day complex key management which is used for translating PIN blocks.
  • the system and method deals with only EMV contact and contactless card or any such (similar) systems.
  • the system and method introduces industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other data encryption standard for enhanced security.
  • the system and method involves using the present day offline PIN (clear or enciphered) concept.
  • the method involves enabling the card holder to enter his secret identifier or his PIN into the terminal and the terminal is configured to transfer the entered secret identifier/PIN to the card in turn.
  • card is configured to perform encryption by extracting PIN Block.
  • PIN is encrypted with current Key
  • PIN is encrypted based on current key with ATC (Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter) and IPEK to generate current Key and PIN block is encrypted with the key.
  • ATC Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter
  • IPEK to generate current Key and PIN block is encrypted with the key.
  • any other scheme such system is used.
  • encrypted PIN Block is concatenated to ARQC as per CI. 8.2.2. of Book 2 Security and Key management of EMV Co. Version 4.3.
  • the ARQC is used as Proprietary Authentication Data (PAD) which is used as a length of 8 Bytes.
  • PID Proprietary Authentication Data
  • the method is used for generation of ARQC, which is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer.
  • ARQC is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer.
  • the issuer authenticates both card data and PIN data in one command with no security flaw thereby avoiding multiple PIN translations across the system is open to security flaw.
  • a system for secure translation and authentication of card data and PIN data in a secure transaction process.
  • the system comprises a terminal device or merchant terminal for receiving a chip card or tapping of a chip card or any physical contact.
  • the card data is read by the terminal device with Card Verification Method as offline PIN.
  • the terminal device is configured to pass the PIN block to ICC (Card) upon PIN entry by a Card holder.
  • the ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC/counter as IKSN) or MK-SK method.
  • the ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated.
  • the ICC (Card) is configured to send the generated ARQC to an authentication terminal device.
  • the authentication terminal device is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device.
  • the acquirer terminal device is configured to forward the received ARQC to a card issuer bank device through a network provider system for authentication and payment.
  • the card issuer bank device is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal.
  • the Card Issuer bank terminal is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC.
  • the Card Issuer bank terminal is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC.
  • the Card Issuer bank terminal is configured to validate both PIN block and the card generated cryptogram.
  • the card receiver terminal is configured to notify/give issuer bank decision generated based on authorization.
  • the IC chip in the card is loaded with an algorithm for encrypting PIN block and generating the ARQC.
  • a system and a method for a secure electronic transaction are provided.
  • the system includes a card issued by the bank or any financial agency, a terminal (with no changes and manufactured and maintained by any third party agency or bank), a network provider (like VISA, Mastercard, etc.,) and an issuer payments processing machine.
  • the system of the embodiments herein is a payment system or a system for payments with secure element used in conjunction with mobile phone, personal computer and the like.
  • the typical credit card transaction involves the card holder making use of the NFC enabled device or EVM card for transacting with the terminal.
  • the terminal is configured to process the card and transaction information and request an authorization from the acquiring bank or any financial agency.
  • the acquiring bank terminal device is configured to forward the request to the issuer bank terminal device which in turn is configured to forward the authorization request to credit card network typically.
  • the credit card network device is configured to send the request to the card issuer bank terminal device.
  • the card issuer bank terminal device is configured to approve or decline the transaction based on multiple factors (validity, valid authorization request etc.) stored securely.
  • the credit card network device is configured to forward the card issuer bank authorization response to the acquiring bank terminal device via the issuer bank terminal device.
  • the acquiring bank terminal or any financial agency terminal is configured to store the transaction information for later processing like payment settlement. Further, the bank terminal device is configured to forward the response to the card terminal device and the terminal device is configured to continue and complete the transaction accordingly.
  • the system for a secure electronic transaction using an EMV Co. or any other regulatory/guided body/consortium approved and complied card which uses chip card technology or contactless (NFC) technology.
  • the system is also configured to handle any brute force attack or replay attack to the instrument.
  • any brute force attack or replay attack to the instrument.
  • the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner.
  • the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period.
  • the system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC).
  • the system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value.
  • the system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.
  • the counter is reset every time a successful transaction is done or carried out.
  • the card is configured to wait for the Issuer Authority (IA) response.
  • IA Issuer Authority
  • FIG.1 illustrates a block diagram of a system for secure electronic transaction, according to one embodiment herein.
  • FIG.2 illustrates a flowchart explaining a method of secure electronic transaction, according to one embodiment herein.
  • FIG.3 illustrates a table indicating the mandatory data used for cryptogram generation, according to one embodiment herein.
  • the embodiments herein provide a system and method for secure electronic transaction.
  • the system comprises a terminal device/merchant terminal configured for receiving one or more PIN details for Customer Verification Method (CVM) from a user via a keypad or an input device associated with the terminal device.
  • the terminal device is further configured for encrypting the received PIN input from the user using one or more encryption algorithms.
  • the system also comprises a chip card/integrated circuit card (ICC) communicatively coupled with the terminal device.
  • the chip card is configured for accepting and translating the encrypted PIN from the terminal device.
  • the chip card comprises a transaction counter configured for incrementing for every transaction attempt performed by the user.
  • the chip card is configured for encrypting the translated PIN with Derived Unique Key Per Transaction (DUKPT) key based on transaction counter value present in the card as a Key Serial Number (KSN).
  • the chip card is further configured for concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) to generate a Proprietary Authentication Data (PAD)/authorization request comprising of the ARQC and the PIN block.
  • ARQC Authorization Request Cryptogram
  • PAD Proprietary Authentication Data
  • the chip card is further configured for transmitting the ARQC over a secure channel.
  • the system further comprises an authentication terminal device configured for accepting the transmitted ARQC and for forwarding the received ARQC over a secure communication channel and an acquirer terminal device/merchant bank device configured for receiving the ARQC from the authentication terminal device and for forwarding the received ARQC through a network provider system for authentication and payment.
  • the system still further comprises a card issuer bank device configured for receiving the ARQC from the acquirer terminal device and for authenticating the chip card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the chip card reading terminal.
  • the card issuer bank device is further configured for validating both PIN block and the chip card generated ARQC/cryptogram and for informing the validation state back to the user via the card issuer bank device.
  • the chip card is further configured for counting the number of transaction attempts with no valid server response using the transaction counter.
  • the chip card is further configured for de-activating when the number of invalid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • the transaction counter is reset every time after a successful transaction is completed or carried out.
  • the system is further configured for activating a barred card or unusable card and for making the card usable on lock with a user secure script run on the chip card after the authentication or identification of issuer by chip card.
  • the one or more encryption algorithms used for PIN block encryption comprises Derived Unique Key Per Transaction algorithm (DUKPT (ATC as IKSN)) or MK-SK algorithm.
  • the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
  • PARQC Authorization Request Cryptogram
  • the chip card is a contact or contactless Near Field Communication (NFC) card or a smart card.
  • NFC Near Field Communication
  • the system is configured for translating the PIN by using existing eco system without the knowledge of one or more parties involved between the card issued and issuer processing system.
  • a method for secure electronic transaction comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal.
  • the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • CVM Customer Verification Method
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • a computer implemented method comprising instructions stored on a non-transitory computer readable storage medium and executed on a computing device provided with a hardware processor and memory, for a secure electronic transaction.
  • the method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal.
  • the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • CVM Customer Verification Method
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • an article of manufacture comprising a computer readable storage medium recorded with or stored with instructions for execution on a computing device provided with a hardware processor and memory, for a secure electronic transaction.
  • the stored instructions are executed on a computing device provided with a hardware processor and memory, and configured for carrying out or performing or executing a method for a secure electronic transaction by inserting or the article of manufacture into the computing device or by connecting a player device loaded with the article of manufacture.
  • the method comprises the steps of receiving a chip card or tapping a chip card in a terminal device or merchant terminal.
  • the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN.
  • the PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms.
  • An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card.
  • the transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device.
  • the ARQC is received from the acquirer terminal device.
  • the chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated.
  • the validation status or the result of validation process is sent back to the user via card issuer bank device.
  • the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
  • the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
  • the embodiments herein provide a system and method for secure electronic transaction.
  • the system includes end to end transaction eco system comprising card issued by the issuer bank, any PCI and EMV approved terminal, payments server or host and financial network providers or specific infrastructure.
  • the system for a secure electronic transaction using a card comprises a terminal for reading an EMV card data, an acquirer bank server, the network providers and a card issuer bank.
  • the card is a Near Field Communication (NFC) card or a smart card or any other instrument which is used for authentication or authorization and has/interfaces with secure element.
  • NFC Near Field Communication
  • the card data is unique for the card and strictly in compliance with EMV Co. standards or any other specific standards which is used in the system and works on all EMV Co. or any other specific system certified/ complied terminals.
  • the system is configured to introduce changes to current eco system to match backward or existing system compatibility.
  • the system is configured to introduce no changes to the current eco system which is maintained by third party players.
  • the system is configured to provide changes in the card processing, for validating PIN by the issuer without an intervention of acquirer or middle system like network or financial switch or any similar server.
  • the issuer is defined as the one who issues card or any instrument or tool and has association with consumer or card holder or user. Further the acquirer is defined as the one who has issued terminal or has association with merchant or terminal holder.
  • the system and method introduces changes to the present day card processing which is allowed by EMV Co.
  • the changes are done internally to the card and Issuer processing system (server).
  • the system and method eliminates the need for PIN translation at a plurality of payment servers such as servers of acquirer bank, third party partner system, network provider system, etc.
  • the system is configured to translate PIN by using existing eco system without the knowledge of parties involved between the card issued and issuer processing systems.
  • the system and method provides an alternative technique to the present day complex key management which is used for translating PIN blocks.
  • the system and method deals with only EMV contact and contactless card or any such (similar) systems.
  • the system and method introduces industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other data encryption standard for enhanced security.
  • the system and method involves using the present day offline PIN (clear or enciphered) concept.
  • the method involves enabling the card holder to enter his secret identifier or his PIN into the terminal and the terminal is configured to transfer the entered secret identifier/PIN to the card in turn.
  • card is configured to perform encryption by extracting PIN Block.
  • PIN is encrypted with current Key
  • PIN is encrypted based on current key with ATC (Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter) and IPEK to generate current Key and PIN block is encrypted with the key.
  • ATC Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter
  • IPEK to generate current Key and PIN block is encrypted with the key.
  • any other scheme such system is used.
  • encrypted PIN Block is concatenated to ARQC as per CI. 8.2.2. of Book 2 Security and Key management of EMV Co. Version 4.3.
  • the ARQC is used as Proprietary Authentication Data (PAD) which is used as a length of 8 Bytes.
  • PID Proprietary Authentication Data
  • the method is used for generation of ARQC, which is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer.
  • ARQC is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer.
  • the issuer authenticates both card data and PIN data in one command with no security flaw thereby avoiding multiple PIN translations across the system is open to security flaw.
  • a system for secure translation and authentication of card data and PIN data in a secure transaction process.
  • the system comprises a terminal device or merchant terminal for receiving a chip card or tapping of a chip card or any physical contact.
  • the card data is read by the terminal device with Card Verification Method as offline PIN.
  • the terminal device is configured to pass the PIN block to ICC (Card) upon PIN entry by a Card holder.
  • the ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC/counter as IKSN) or MK-SK method.
  • the ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated.
  • the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
  • ARQC which is Authorization request will have Cryptogram and PIN block in it
  • the ICC (Card) is configured to send the generated ARQC to an authentication terminal device.
  • the authentication terminal device is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device.
  • the acquirer terminal device is configured to forward the received ARQC to a card issuer bank device through a network provider system for authentication and payment.
  • the card issuer bank device is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal.
  • the Card Issuer bank terminal is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC.
  • the card issuer bank device uses DUKPT algorithm which has Base Derived key (BDK) and derives card key which is Initial Pin Encryption Key (IPEK) with BDK and card number as the input elements. For every card transaction, transaction counter is incremented and session key or Transaction Pin Key (TPK) is derived.
  • BDK Base Derived key
  • IPEK Initial Pin Encryption Key
  • TPK Transaction Pin Key
  • the Card Issuer bank terminal is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC.
  • the Card Issuer bank terminal is configured to validate both PIN block and the card generated cryptogram.
  • the card receiver terminal is configured to notify /give issuer bank decision generated based on authorization.
  • the IC chip in the card is loaded with an algorithm for encrypting PIN block and generating the ARQC.
  • a system and a method for a secure electronic transaction are provided.
  • the system includes a card issued by the bank or any financial agency, terminal (with no changes and manufactured and maintained by any third party agency or bank), network provider (like VISA, Mastercard, etc.,) issuer payments processing machine.
  • the system of the embodiments herein is a payment system or a system for payments with secure element used in conjunction with mobile phone, personal computer and the like.
  • the typical credit card transaction involves the card holder making use of the NFC enabled device or EVM card for transacting with the terminal.
  • the terminal is configured to process the card and transaction information and request an authorization from the acquiring bank or any financial agency.
  • the acquiring bank terminal device is configured to forward the request to the issuer bank terminal device which in turn is configured to forward the authorization request to credit card network typically.
  • the credit card network device is configured to send the request to the card issuer bank terminal device.
  • the card issuer bank terminal device is configured to approve or decline the transaction based on multiple factors (validity, valid authorization request etc.) stored securely.
  • the credit card network device is configured to forward the card issuer bank authorization response to the acquiring bank terminal device via the issuer bank terminal device.
  • the acquiring bank terminal or any financial agency terminal is configured to store the transaction information for later processing like payment settlement. Further, the bank terminal device is configured to forward the response to the card terminal device and the terminal device is configured to continue and complete the transaction accordingly.
  • the system for a secure electronic transaction using an EMV Co. or any other regulatory/guided body/consortium approved and complied card which uses chip card technology or contactless (NFC) technology.
  • the system is also configured to handle any brute force attack or replay attack to the instrument.
  • any brute force attack or replay attack to the instrument.
  • the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner.
  • the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period.
  • the system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC).
  • the system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value.
  • the system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.
  • the counter is reset every time a successful transaction is done or carried out.
  • a finite counter value is recommended.
  • card gets updated with different IPEK using encrypted issuer scripts that run as per EMV standards.
  • usual procedure to update card remotely by the issuer bank through any authorized terminal or reader is followed.
  • the card in asking the card to generate a series of cryptograms, the card is configured to wait for the Issuer Authority (IA) response.
  • IA Issuer Authority
  • the counter is incremented by one count.
  • cryptogram which is generated as part of EMV based transaction takes into consideration of data elements as per 8.1.1. of EMV_4.3_Book 2
  • the system is configured to also ask for PIN or secret key of user for validation. It has different Card or user verification methods. Usually, online PIN which is entered in the terminal and packed it with encryption keys present on the terminal or reader. Keys to encrypt can be exchanged by the terminal associated bank and not by the card or user relationship bank. Offline PIN or secret key can be verified by the card itself. But this is not a viable process for updating PIN or secret key by the user easily without running scripts on the card itself by the bank. [00125] According to one embodiment herein, packed and encrypted PIN or user key is translated at Bank HSM which owns the reader or terminal. Translated PIN is then encrypted with the Network or card associated bank. Then associated bank verifies it and takes a decision on authenticity.
  • card is configured to take PIN or user secret key into account also.
  • the system and method is configured to use encrypted offline PIN as card verification method.
  • the existing card readers or terminals are configured to capture PIN or user secret key on pin pad and then send PIN in encrypted form to card.
  • the card is then configured to then translate PIN and then encrypts it with DUKPT key based on transaction counter present in the card as KSN.
  • Encrypted PIN is then XORed with the cryptogram generated in usual process.
  • ARQC which is Authorization request is configured to have Cryptogram and PIN block in it. With this process there is no need of PIN translation of at a bank which owns a terminal and then PIN is never opened in clear in any of the HSM.
  • Cryptogram is forwarded to the issuer bank or card associated bank and then issuer bank is configured to create same cryptogram with same operation and then compare with the received ARQC. On successful matching, the transaction is approved.
  • issuer server usually has the same algorithm of that of the card and it is like a mirror. While determining keys, it uses DUKPT algorithm which has Base Derived key (BDK) and then it derives card key which is Initial Pin Encryption Key (IPEK) with BDK and card number as the input elements.
  • BDK Base Derived key
  • IPEK Initial Pin Encryption Key
  • TPK Transaction Pin Key
  • the ARPC is handled in par with current system, no change in this is required. But ARPC is also generated by the issuer in response to the ARQC received by the issuer from the card.
  • authentication terminal is the terminal or reader which is designed as per EMV Co. standards and PCI guidelines.
  • the main aim of this solution or idea is not to change any part of existing terminals in the filed which are working at as per EMV Co. guidelines.
  • FIG. 1 illustrates a block diagram of a system for secure electronic transaction, according to one embodiment herein.
  • the system 100 comprises a terminal device 102 or merchant terminal 103 for receiving a chip card or tapping of a chip card through a mobile computing device 101.
  • the card data is read by the terminal device 102 with CVM as offline PIN.
  • the terminal device 102 is configured to passes the PIN block to ICC (Card) upon PIN entry by a Card holder.
  • the ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC as IKSN) or MK-SK method.
  • the ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated.
  • the ICC (Card) is configured to send the generated ARQC to an authentication terminal device 104.
  • the authentication terminal device 104 is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device 105.
  • the acquirer terminal device 105 is configured to forward the received ARQC to a card issuer bank device 107 through a network provider system 106 for authentication and payment.
  • the card issuer bank device 107 is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal.
  • the Card Issuer bank terminal 107 is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC.
  • the Card Issuer bank terminal 107 is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC.
  • the Card Issuer bank terminal 107 is configured to validate both PIN block and the card generated cryptogram.
  • the card data receiver terminal 103 is configured to notify/give issuer bank decision generated based on authorization.
  • the IC chip in the card is loaded with an algorithm for encrypting the PIN block and generating the ARQC.
  • the system is also configured to handle any brute force attack or replay attack to the instrument. There is always a possibility of such attack, as the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner. To avoid such actions, the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period.
  • the system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC).
  • the system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value.
  • the system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.
  • the counter is reset every time a successful transaction is done or carried out.
  • the card is configured to wait for the Issuer Authority (IA) response.
  • IA Issuer Authority
  • FIG. 2 illustrates a flowchart explaining a process of secure electronic transaction, according to one embodiment herein.
  • the method is provided for secure translation and authentication of card data and PIN data in a secure transaction process.
  • the method comprises inserting a chip card or tapping a chip card in a card terminal device or merchant terminal (202).
  • the card holder is requested to enter PIN as per CVM (204).
  • the card data is read by the terminal device with CVM as off-line PIN (206).
  • the PIN block is passed to ICC (Card) from the terminal device when PIN is entered by a Card holder (208).
  • the PIN block is encrypted by the ICC (Card) using DUKPT (ATC as IKSN) or MK-SK method (210).
  • the ARQC is generated/prepared by the ICC (Card), using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated (212).
  • the generated ARQC is sent to an authentication terminal device from the ICC (Card) (214).
  • the received ARQC from the ICC (Card) is forwarded to an acquirer terminal device by the authentication terminal device.
  • the received ARQC is forwarded to a card issuer bank device from the acquirer terminal device through a network provider system for authentication and payment (216).
  • the card data and the transaction are authenticated by the card issuer bank device by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal.
  • the ARQC is calculated and generated at the Card Issuer bank terminal in the same method followed by the ICC (card) in calculating and generating the ARQC.
  • the received ARQC is authorized and authenticated at the Card Issuer bank terminal by comparing the received ARQC with the generated ARQC (218). Both the PIN block and the card generated cryptogram are validated at the Card Issuer bank terminal (220).
  • the issuer bank decision generated based on authorization is notified to the user by the card receiver terminal (222).
  • the method is also provided to handle any brute force attack or replay attack to the instrument.
  • any brute force attack or replay attack to the instrument.
  • the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner.
  • a counter is provided to register and store the number of brute force attempts made at any instant/time period. The counter is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC).
  • the card is deactivated or barred from use or the card is killed or the card is made non-usable or prevented from generating ARQC, when the total number of counts is equal to or more than a preset threshold value.
  • the barred card or unusable card is activated again and the card is made usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.
  • the counter is reset every time a successful transaction is done or carried out.
  • the card is configured to wait for the Issuer Authority (IA) response.
  • IA Issuer Authority
  • FIG. 3 illustrates a table indicating the mandatory data used for cryptogram generation, according to one embodiment herein.
  • the mandatory data used for cryptogram generation comprises value and the source.
  • the embodiments herein provide a system and method for a secure electronic transaction / authentication.
  • the system and method provides a technique for a fast and an efficient electronic transaction / authentication.
  • the system provides a secure and efficient technique without leaving any security flaw and process flaw.
  • the system provides a technique to make use of existing terminal / system without any change in the existing system. The same process or system is applied to any of the sensitive data present in the system.
  • the embodiments herein provide a system and method for secure authentication of any system with a secure element.
  • the system is not only EMV compliant but also works with any electronic device which acts as a transport to send confidential or secret key from a device connected to it and uses same logic.
  • the system is also configured to handle any brute force attack or replay attack to the instrument.
  • the system is configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value.
  • the system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiments herein discloses a system and method for a secure electronic transaction is provided. The system enables the chip in the card to generate ARQC and a cryptogram based on card data / instrument identification and PIN block or user secret key or actual user identification. The generated ARQC and the cryptogram are sent to the issuer bank terminal or central issuer of the instrument or associating agency of user for authentication of the card data / instrument identification and PIN block or user secret key for authorizing a transaction or identification session. The issuer bank terminal is configured to generate ARQC and a cryptogram based on stored card data / instrument identification and PIN block or user secret key. The cryptogram generated at the issuer bank terminal are compared with the cryptogram received from the card to authenticate the card data and PIN block for authorizing a transaction.

Description

SYSTEM AND METHOD FOR TRANSLATION AND AUTHENTICATION OF
SECURE PIN AND SENSITIVE DATA
CROSS-REFERENCETO RELATED APPLICATION
[0001] The embodiments herein claims the priority of the Indian Provisional Patent Application with the serial number 201641028600 and entitled, "SYSTEM AND METHOD FOR TRANSLATION AND AUTHENTICATION OF SECURE PIN AND SENSITIVE DATA" filed on August 22, 2016 and subsequently postdated to November 22, 2016 and the contents of which are included entirely as reference herein.
BACKGROUND
Technical Field
[0002] The embodiments herein are generally related to a field of electronic transactions. The embodiments herein are particularly related to a system and method for authentication of card data and pin in secure electronic transactions. The embodiments herein are more particularly related to a system and method for translation and authentication of secure PIN and sensitive data through cryptogram.
Description of the Related Art
[0003] As the world is currently interested in cash free transactions, the security of a cashless transaction remains a big concern. Therefore the industry and financial regulators are keen on encouraging secure plastic and secure online transactions to find an option or alternative to cash banking. These methods are beneficial to all types of financial systems in terms of cash audit, taxation and to curb unaudited cash problem.
[0004] An authorization and authentication of transactions in an open network is always challenging task. The chances of stealing and hacking credentials are higher. In order to handle these situations, the banks and financial industries have come up with preset procedures and specifications to allow the banks to issue plastic cards and to perform authentication and authorization processes securely.
[0005] The technology used in the plastic cards is a magnetic stripe and a chip card technology. Magnetic card has a data written on the magnetic strip, and the magnetic card data is exposed by any card reader and is easily cloned. The hacking of data and cloning of data is lead to a problem of identifying whether the magnetic card data is retrieved from the card issued by the bank or from a cloned card data or virtual data. To mitigate this, a consortium formed by financial network providers named EMV Co. has proposed a usage of chip cards which authenticates itself to the issuer bank with less or no chance of fraudulent activity in card authentication.
[0006] The banks have to face one more issue in the authentication or identification of a signature of a person or card holder / customer, especially in cases, in which the card is stolen and used to complete a transaction at merchant's place/terminal. There are many cases where the stolen card is used to complete a transaction at merchant's end. Hence an identification of the customer is done by comparing the signature of the customer on the charge slip with that of the signature present on the card. This method has led to a forgery of customer signature at times. To overcome the forgery, the banks have come up with PIN entry at merchant terminal.
[0007] With the advent of this, banks has resolved customer identification problem. As the merchant terminal is not under secure area and the data transmitted is also not in a secure form, a security threat is identified in the form of PIN stealing using possible methods thereby creating a new issue altogether. To mitigate this, an organization called PCI is formed for assigning strict compliance/standards to the terminals, and servers which are used in handling card data and PIN. [0008] Hence the industry have proposed encryption of PIN blocks at source, thereby providing stringent compliance process to be taken care by the Acquirer Bank and Terminal manufacturer. This compliance process includes, secure Key injection into the terminal and then translating and handling the Keys which are used by the acquirer bank in encrypting PIN blocks. To eradicate replay attacks, the banks follow key rotation or change for every settlement or every 24 hours, whichever is earlier.
[0009] Hence there is a need for a system and method for a secure electronic transaction and secure user authentication and authorization with simple process and avoiding any possible security flaws at multiple points. Further, there is a need for a system and method for secure electronic transactions. Yet there is a need for a system and method for secure PIN and sensitive data translation and authentication. Yet there is a need for a system and method for authenticating user PIN by the issuer payment system without following a complex and less secure method of key rotation and key management by acquirer or third party financial organization/establishment. Yet there is a need for a system and method for concatenating an encrypted PIN Block to Authorization Request Cryptogram (ARQC) for a secure electronic transaction and secure user authentication and authorization. Yet there is a need for a system and method for generating ARQC, which is a cryptogram generated by the card (ICC) for identifying and securely authenticating card transaction by the issuer. Yet there is a need for a system and method for enabling an issuer bank to authenticate both secure card data and PIN data with a single command and without any security flaw and a plurality of PIN translations. Yet there is a need for a system to avoid brute force attack in getting the data sequence or pattern and tracing back to the key which is used for encrypting or coding the secret / sensitive data. [0010] The above-mentioned shortcomings, disadvantages and problems are addressed herein and which will be understood by reading and studying the following specification.
OBJECTIVES OF THE EMB ODIEMNTS HEREIN
[0011] A primary object of the embodiments herein is to provide a system and method for a secure electronic transaction and secure user authentication and authorization with simple process thereby avoiding any possible security flaws at a plurality of points or stakeholders such as merchant terminal, acquirer bank, etc.
[0012] Another object of the embodiments herein is to provide a system and method for secure electronic transactions.
[0013] Yet another object of the embodiments herein is to provide a system and method for secure PIN and sensitive data translation and authentication.
[0014] Yet another object of the embodiments herein is to provide a system and method for authenticating user PIN by the issuer payment system without following a complex and less secure method of key rotation and key management by acquirer or third party financial organization/establishment.
[0015] Yet another object of the embodiments herein is to provide a system and method for concatenating an encrypted PIN Block to ARQC for a secure electronic transaction and secure user authentication and authorization.
[0016] Yet another object of the embodiments herein is to provide a system and method for generating ARQC, which is a cryptogram generated by the card (ICC) for identifying and securely authenticating card transaction by the issuer.
[0017] Yet another object of the embodiments herein is to provide a system and method for enabling an issuer bank to authenticate both secure card data and PIN data with a single command and without any security flaw and a plurality of PIN translations. [0018] Yet another object of the embodiments herein is to provide a system and method for enabling a fast and efficient electronic transaction.
[0019] Yet another objective of the embodiments herein is to provide a system and method for eradicating human snooping and security flaw of different uncontrolled facilities/systems in which the key is injected/used.
[0020] Yet another object of the embodiments herein is to provide a system and method for using a secure method for encrypting sensitive data in a transaction flow.
[0021] Yet another object of the embodiments herein is to provide a system and method for offering a cost effective solution with in-built and independent secure and safe method.
[0022] Yet another object of the embodiments herein is to provide a system and method to encrypt sensitive data in a safer and simpler way using a key management process.
[0023] Yet another object of the embodiments herein is to provide a system and method for authenticating PIN block by both the card and/or issuer bank as well.
[0024] Yet another object of the embodiments herein is to provide a system and method to protect and guard transportation of sensitive data (PIN block) with a high level security encryption standard which is also used and accepted by the industry.
[0025] Yet another objective of the embodiments herein is to provide a system and method which is backward compatible and works on all existing financial / payment / security centric systems.
[0026] Yet another object of the embodiments herein is to provide a system and method to prevent a replay and / or brute force attack in an electronic transaction.
[0027] Yet another object of the embodiments herein is to provide a system and method to translate a PIN by using existing eco system without a knowledge of the parties or stack-holders involved in between the card issued and issuer processing systems. [0028] Yet another object of the embodiments herein is to provide a system and method to enable an issuer bank to authenticate both the card data and PIN data with one command and without any security flaw thereby avoiding multiple PIN translations across the system which is open to security flaw.
[0029] Yet another object of the embodiments herein is to provide a system and method to find an alternative to the present day complex Key management which is used for translating PIN blocks at each point / switch / server.
[0030] Yet another object of the embodiments herein is to provide a system and method to deal with EMV contact and contactless cards or any other system where security of authorization or identification is vital.
[0031] Yet another object of the embodiments herein is to develop a system and method to provide an enhanced security in using industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other industry best standard in encryption.
[0032] Yet another object of the embodiments herein is to develop a system and method to avoid brute force attack and also secure the data replay as the system is intended to use in the open environment.
[0033] Yet another object of the embodiments herein is to develop a system and method to kill the card, when the number of attacks in securing the sensitive data reaches a preset threshold level.
[0034] These and other objects and advantages of the embodiments herein will become readily apparent from the following detailed description taken in conjunction with the accompanying drawings. SUMMARY
[0035] The embodiments herein provide a system and method for secure electronic transaction. The system comprises a terminal device/merchant terminal configured for receiving one or more PIN details for Customer Verification Method (CVM) from a user via a keypad or an input device associated with the terminal device. The terminal device is further configured for encrypting the received PIN input from the user using one or more encryption algorithms. The system also comprises a chip card/integrated circuit card (ICC) communicatively coupled with the terminal device. The chip card is configured for accepting and translating the encrypted PIN from the terminal device. The chip card comprises a transaction counter configured for incrementing for every transaction attempt performed by the user. The chip card is configured for encrypting the translated PIN with Derived Unique Key Per Transaction (DUKPT) key based on transaction counter value present in the card as a Key Serial Number (KSN). The chip card is further configured for concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) to generate a Proprietary Authentication Data (PAD)/authorization request comprising of the ARQC and the PIN block. The chip card is further configured for transmitting the ARQC over a secure channel. The system further comprises an authentication terminal device configured for accepting the transmitted ARQC and for forwarding the received ARQC over a secure communication channel and an acquirer terminal device/merchant bank device configured for receiving the ARQC from the authentication terminal device and for forwarding the received ARQC through a network provider system for authentication and payment. The system still further comprises a card issuer bank device configured for receiving the ARQC from the acquirer terminal device and for authenticating the chip card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the chip card reading terminal. The card issuer bank device is further configured for validating both PIN block and the chip card generated ARQC/cryptogram and for informing the validation state back to the user via the card issuer bank device.
[0036] According to one embodiment herein, the chip card is further configured for counting the number of transaction attempts with no valid server response using the transaction counter. The chip card is further configured for de-activating when the number of invalid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks. The transaction counter is reset every time after a successful transaction is completed or carried out.
[0037] According to one embodiment herein, the system is further configured for activating a barred card or unusable card and for making the card usable on lock with a user secure script run on the chip card after the authentication or identification of issuer by chip card.
[0038] According to one embodiment herein, the one or more encryption algorithms used for PIN block encryption comprises Derived Unique Key Per Transaction algorithm (DUKPT (ATC as IKSN)) or MK-SK algorithm.
[0039] According to one embodiment herein, the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
[0040] According to one embodiment herein, the chip card is a contact or contactless Near Field Communication (NFC) card or a smart card.
[0041] According to one embodiment herein, the system is configured for translating the PIN by using existing eco system without the knowledge of one or more parties involved between the card issued and issuer processing system. [0042] According to one embodiment herein, a method for secure electronic transaction is provided. The method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0043] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
[0044] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks. [0045] According to one embodiment herein, a computer implemented method, comprising instructions stored on a non-transitory computer readable storage medium and executed on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided. The method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0046] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
[0047] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks. [0048] According to one embodiment herein, an article of manufacture comprising a computer readable storage medium recorded with or stored with instructions for execution on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided. The stored instructions are executed on a computing device provided with a hardware processor and memory, and configured for carrying out or performing or executing a method for a secure electronic transaction by inserting or the article of manufacture into the computing device or by connecting a player device loaded with the article of manufacture. The method comprises the steps of receiving a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0049] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out. [0050] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
[0051] The embodiments herein provide a system and method for secure electronic transaction. The system includes end to end transaction eco system comprising card issued by the issuer bank, any PCI and EMV approved terminal, payments server or host and financial network providers.
[0052] According to one embodiment herein, the system for a secure electronic transaction using a card comprises a terminal for reading an EMV card data, an acquirer bank server, the network providers and a card issuer bank.
[0053] According to one embodiment herein, the card is a Near Field Communication (NFC) card or a smart card or any other similar eco system.
[0054] According to one embodiment herein, the card data is unique for the card and strictly in compliance with EMV Co. standards or any other specific standards which is used in the system and works on all EMV Co. or any other specific system certified/ complied terminals.
[0055] According to one embodiment herein, the system is configured to introduce changes to current eco system to match backward or existing system compatibility.
[0056] According to one embodiment herein, the system is configured to introduce no changes to the current eco system which is maintained by third party players.
[0057] According to one embodiment herein, the system is configured to provide changes in the card processing, for validating PIN by the issuer without an intervention of acquirer or middle system like network or financial switch or any similar server. [0058] According to one embodiment herein, the issuer is defined as the one who issues card or any instrument or tool and has association with consumer or card holder or user. Further the acquirer is defined as the one who has issued terminal or has association with merchant or terminal holder.
[0059] According to one embodiment herein, the system and method introduces changes to the present day card processing which is allowed by EMV Co. The changes are done internally to the card and Issuer processing system (server).
[0060] According to one embodiment herein, the system and method eliminates the need for PIN translation at a plurality of payment servers such as servers of acquirer bank, third party partner system, network provider system, etc. The system is configured to translate PIN by using existing eco system without the knowledge of parties involved between the card issued and issuer processing systems.
[0061] According to one embodiment herein, the system and method provides an alternative technique to the present day complex key management which is used for translating PIN blocks.
[0062] According to one embodiment herein, the system and method deals with only EMV contact and contactless card or any such (similar) systems.
[0063] According to one embodiment herein, the system and method introduces industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other data encryption standard for enhanced security.
[0064] According to one embodiment herein, the system and method involves using the present day offline PIN (clear or enciphered) concept. The method involves enabling the card holder to enter his secret identifier or his PIN into the terminal and the terminal is configured to transfer the entered secret identifier/PIN to the card in turn. Then card is configured to perform encryption by extracting PIN Block. In case of MK-SK, PIN is encrypted with current Key and in case of DUKPT, PIN is encrypted based on current key with ATC (Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter) and IPEK to generate current Key and PIN block is encrypted with the key. In case of any other scheme such system is used.
[0065] According to one embodiment herein, encrypted PIN Block is concatenated to ARQC as per CI. 8.2.2. of Book 2 Security and Key management of EMV Co. Version 4.3. The ARQC is used as Proprietary Authentication Data (PAD) which is used as a length of 8 Bytes.
[0066] According to one embodiment herein, the method is used for generation of ARQC, which is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer.
[0067] According to one embodiment herein, the issuer authenticates both card data and PIN data in one command with no security flaw thereby avoiding multiple PIN translations across the system is open to security flaw.
[0068] According to one embodiment herein, a system is provided for secure translation and authentication of card data and PIN data in a secure transaction process. The system comprises a terminal device or merchant terminal for receiving a chip card or tapping of a chip card or any physical contact. The card data is read by the terminal device with Card Verification Method as offline PIN. The terminal device is configured to pass the PIN block to ICC (Card) upon PIN entry by a Card holder. The ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC/counter as IKSN) or MK-SK method. The ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated. The ICC (Card) is configured to send the generated ARQC to an authentication terminal device. The authentication terminal device is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device. The acquirer terminal device is configured to forward the received ARQC to a card issuer bank device through a network provider system for authentication and payment. The card issuer bank device is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal. The Card Issuer bank terminal is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC. The Card Issuer bank terminal is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC. The Card Issuer bank terminal is configured to validate both PIN block and the card generated cryptogram. The card receiver terminal is configured to notify/give issuer bank decision generated based on authorization. The IC chip in the card is loaded with an algorithm for encrypting PIN block and generating the ARQC.
[0069] According to one embodiment herein, a system and a method for a secure electronic transaction are provided. The system includes a card issued by the bank or any financial agency, a terminal (with no changes and manufactured and maintained by any third party agency or bank), a network provider (like VISA, Mastercard, etc.,) and an issuer payments processing machine.
[0070] According to one embodiment herein, the system of the embodiments herein is a payment system or a system for payments with secure element used in conjunction with mobile phone, personal computer and the like. The typical credit card transaction involves the card holder making use of the NFC enabled device or EVM card for transacting with the terminal. The terminal is configured to process the card and transaction information and request an authorization from the acquiring bank or any financial agency. The acquiring bank terminal device is configured to forward the request to the issuer bank terminal device which in turn is configured to forward the authorization request to credit card network typically. The credit card network device is configured to send the request to the card issuer bank terminal device. The card issuer bank terminal device is configured to approve or decline the transaction based on multiple factors (validity, valid authorization request etc.) stored securely. The credit card network device is configured to forward the card issuer bank authorization response to the acquiring bank terminal device via the issuer bank terminal device. The acquiring bank terminal or any financial agency terminal is configured to store the transaction information for later processing like payment settlement. Further, the bank terminal device is configured to forward the response to the card terminal device and the terminal device is configured to continue and complete the transaction accordingly.
[0071] According to one embodiment herein, the system for a secure electronic transaction using an EMV Co., or any other regulatory/guided body/consortium approved and complied card which uses chip card technology or contactless (NFC) technology.
[0072] According to one embodiment herein, the system is also configured to handle any brute force attack or replay attack to the instrument. There is always a possibility of such attack, as the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner. To avoid such actions, the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period. The system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC). The system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value. The system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC. The counter is reset every time a successful transaction is done or carried out.
[0073] To prevent brute force attacks, in asking the card to generate a series of cryptograms, the card is configured to wait for the Issuer Authority (IA) response. When a response is not received within a time period, due to a malicious brute force attack, the counter is incremented by one count.
[0074] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating the preferred embodiments and numerous specific details thereof, are given by way of an illustration and not of a limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF THE DRAWINGS
[0075] The other objects, features and advantages will occur to those skilled in the art from the following description of the preferred embodiment and the accompanying drawings in which:
[0076] FIG.1 illustrates a block diagram of a system for secure electronic transaction, according to one embodiment herein.
[0077] FIG.2 illustrates a flowchart explaining a method of secure electronic transaction, according to one embodiment herein.
[0078] FIG.3 illustrates a table indicating the mandatory data used for cryptogram generation, according to one embodiment herein. [0079] Although the specific features of the embodiments herein are shown in some drawings and not in others. This is done for convenience only as each feature may be combined with any or all of the other features in accordance with the embodiments herein.
DETAILED DESCRIPTION OF THE EMBODIMENTS HEREIN
[0080] In the following detailed description, a reference is made to the accompanying drawings that form a part hereof, and in which the specific embodiments that may be practiced is shown by way of illustration. These embodiments are described in sufficient detail to enable those skilled in the art to practice the embodiments and it is to be understood that the logical, mechanical and other changes may be made without departing from the scope of the embodiments. The following detailed description is therefore not to be taken in a limiting sense.
[0081] The embodiments herein provide a system and method for secure electronic transaction. The system comprises a terminal device/merchant terminal configured for receiving one or more PIN details for Customer Verification Method (CVM) from a user via a keypad or an input device associated with the terminal device. The terminal device is further configured for encrypting the received PIN input from the user using one or more encryption algorithms. The system also comprises a chip card/integrated circuit card (ICC) communicatively coupled with the terminal device. The chip card is configured for accepting and translating the encrypted PIN from the terminal device. The chip card comprises a transaction counter configured for incrementing for every transaction attempt performed by the user. The chip card is configured for encrypting the translated PIN with Derived Unique Key Per Transaction (DUKPT) key based on transaction counter value present in the card as a Key Serial Number (KSN). The chip card is further configured for concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) to generate a Proprietary Authentication Data (PAD)/authorization request comprising of the ARQC and the PIN block. The chip card is further configured for transmitting the ARQC over a secure channel. The system further comprises an authentication terminal device configured for accepting the transmitted ARQC and for forwarding the received ARQC over a secure communication channel and an acquirer terminal device/merchant bank device configured for receiving the ARQC from the authentication terminal device and for forwarding the received ARQC through a network provider system for authentication and payment. The system still further comprises a card issuer bank device configured for receiving the ARQC from the acquirer terminal device and for authenticating the chip card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the chip card reading terminal. The card issuer bank device is further configured for validating both PIN block and the chip card generated ARQC/cryptogram and for informing the validation state back to the user via the card issuer bank device.
[0082] According to one embodiment herein, the chip card is further configured for counting the number of transaction attempts with no valid server response using the transaction counter. The chip card is further configured for de-activating when the number of invalid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks. The transaction counter is reset every time after a successful transaction is completed or carried out.
[0083] According to one embodiment herein, the system is further configured for activating a barred card or unusable card and for making the card usable on lock with a user secure script run on the chip card after the authentication or identification of issuer by chip card. [0084] According to one embodiment herein, the one or more encryption algorithms used for PIN block encryption comprises Derived Unique Key Per Transaction algorithm (DUKPT (ATC as IKSN)) or MK-SK algorithm.
[0085] According to one embodiment herein, the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
[0086] According to one embodiment herein, the chip card is a contact or contactless Near Field Communication (NFC) card or a smart card.
[0087] According to one embodiment herein, the system is configured for translating the PIN by using existing eco system without the knowledge of one or more parties involved between the card issued and issuer processing system.
[0088] According to one embodiment herein, a method for secure electronic transaction is provided. The method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0089] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
[0090] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
[0091] According to one embodiment herein, a computer implemented method, comprising instructions stored on a non-transitory computer readable storage medium and executed on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided. The method comprises the steps of inserting a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0092] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
[0093] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
[0094] According to one embodiment herein, an article of manufacture comprising a computer readable storage medium recorded with or stored with instructions for execution on a computing device provided with a hardware processor and memory, for a secure electronic transaction is provided. The stored instructions are executed on a computing device provided with a hardware processor and memory, and configured for carrying out or performing or executing a method for a secure electronic transaction by inserting or the article of manufacture into the computing device or by connecting a player device loaded with the article of manufacture. The method comprises the steps of receiving a chip card or tapping a chip card in a terminal device or merchant terminal. The chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN. The PIN block is passed to the chip card from the terminal device when PIN is entered by a card holder and the PIN block is encrypted by the chip card using one or more encryption algorithms. An ARQC is concatenated with the encrypted PIN block as Proprietary Authentication Data and the concatenated ARQC is transmitted over a secure channel using the chip card. The transmitted ARQC is received and the received ARQC is forwarded over a secure channel using an authentication terminal device. The ARQC is received from the acquirer terminal device. The chip card and the transaction are authenticated by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device. Both the PIN block and the chip card generated ARQC/cryptogram are validated. The validation status or the result of validation process is sent back to the user via card issuer bank device.
[0095] According to one embodiment herein, the method further comprises counting the number of transaction attempts without any valid server responses using a transaction counter and resetting the transaction counter every time after a successful transaction is done or carried out.
[0096] According to one embodiment herein, the method further comprises deactivating the chip card when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks.
[0097] The embodiments herein provide a system and method for secure electronic transaction. The system includes end to end transaction eco system comprising card issued by the issuer bank, any PCI and EMV approved terminal, payments server or host and financial network providers or specific infrastructure.
[0098] According to one embodiment herein, the system for a secure electronic transaction using a card comprises a terminal for reading an EMV card data, an acquirer bank server, the network providers and a card issuer bank.
[0099] According to one embodiment herein, the card is a Near Field Communication (NFC) card or a smart card or any other instrument which is used for authentication or authorization and has/interfaces with secure element. [00100] According to one embodiment herein, the card data is unique for the card and strictly in compliance with EMV Co. standards or any other specific standards which is used in the system and works on all EMV Co. or any other specific system certified/ complied terminals.
[00101] According to one embodiment herein, the system is configured to introduce changes to current eco system to match backward or existing system compatibility.
[00102] According to one embodiment herein, the system is configured to introduce no changes to the current eco system which is maintained by third party players.
[00103] According to one embodiment herein, the system is configured to provide changes in the card processing, for validating PIN by the issuer without an intervention of acquirer or middle system like network or financial switch or any similar server.
[00104] According to one embodiment herein, the issuer is defined as the one who issues card or any instrument or tool and has association with consumer or card holder or user. Further the acquirer is defined as the one who has issued terminal or has association with merchant or terminal holder.
[00105] According to one embodiment herein, the system and method introduces changes to the present day card processing which is allowed by EMV Co. The changes are done internally to the card and Issuer processing system (server).
[00106] According to one embodiment herein, the system and method eliminates the need for PIN translation at a plurality of payment servers such as servers of acquirer bank, third party partner system, network provider system, etc. The system is configured to translate PIN by using existing eco system without the knowledge of parties involved between the card issued and issuer processing systems. [00107] According to one embodiment herein, the system and method provides an alternative technique to the present day complex key management which is used for translating PIN blocks.
[00108] According to one embodiment herein, the system and method deals with only EMV contact and contactless card or any such (similar) systems.
[00109] According to one embodiment herein, the system and method introduces industry best practice to encrypt PIN block at issuing card, like DUKPT/MK-SK or any other data encryption standard for enhanced security.
[00110] According to one embodiment herein, the system and method involves using the present day offline PIN (clear or enciphered) concept. The method involves enabling the card holder to enter his secret identifier or his PIN into the terminal and the terminal is configured to transfer the entered secret identifier/PIN to the card in turn. Then card is configured to perform encryption by extracting PIN Block. In case of MK-SK, PIN is encrypted with current Key and in case of DUKPT, PIN is encrypted based on current key with ATC (Application Transaction Counter - Tag 9F36 maintained by ICC in case of EMV Co. complied card or any other counter) and IPEK to generate current Key and PIN block is encrypted with the key. In case of any other scheme such system is used.
[00111] According to one embodiment herein, encrypted PIN Block is concatenated to ARQC as per CI. 8.2.2. of Book 2 Security and Key management of EMV Co. Version 4.3. The ARQC is used as Proprietary Authentication Data (PAD) which is used as a length of 8 Bytes.
[00112] According to one embodiment herein, the method is used for generation of ARQC, which is a cryptogram generated by the card (ICC) to identify and securely authenticate card transaction by the issuer. [00113] According to one embodiment herein, the issuer authenticates both card data and PIN data in one command with no security flaw thereby avoiding multiple PIN translations across the system is open to security flaw.
[00114] According to one embodiment herein, a system is provided for secure translation and authentication of card data and PIN data in a secure transaction process. The system comprises a terminal device or merchant terminal for receiving a chip card or tapping of a chip card or any physical contact. The card data is read by the terminal device with Card Verification Method as offline PIN. The terminal device is configured to pass the PIN block to ICC (Card) upon PIN entry by a Card holder. The ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC/counter as IKSN) or MK-SK method. The ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated. The Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function. ARQC, which is Authorization request will have Cryptogram and PIN block in it The ICC (Card) is configured to send the generated ARQC to an authentication terminal device. The authentication terminal device is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device. The acquirer terminal device is configured to forward the received ARQC to a card issuer bank device through a network provider system for authentication and payment. The card issuer bank device is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal. The Card Issuer bank terminal is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC. [00115] According to one embodiment herein, the card issuer bank device uses DUKPT algorithm which has Base Derived key (BDK) and derives card key which is Initial Pin Encryption Key (IPEK) with BDK and card number as the input elements. For every card transaction, transaction counter is incremented and session key or Transaction Pin Key (TPK) is derived. The same algorithm is followed in the bank server as well where BDK (is stored in the server), card number and transaction counter (as part of pay load to server from the card) are present.
[00116] The Card Issuer bank terminal is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC. The Card Issuer bank terminal is configured to validate both PIN block and the card generated cryptogram. The card receiver terminal is configured to notify /give issuer bank decision generated based on authorization. The IC chip in the card is loaded with an algorithm for encrypting PIN block and generating the ARQC.
[00117] According to one embodiment herein, a system and a method for a secure electronic transaction are provided. The system includes a card issued by the bank or any financial agency, terminal (with no changes and manufactured and maintained by any third party agency or bank), network provider (like VISA, Mastercard, etc.,) issuer payments processing machine.
[00118] According to one embodiment herein, the system of the embodiments herein is a payment system or a system for payments with secure element used in conjunction with mobile phone, personal computer and the like. The typical credit card transaction involves the card holder making use of the NFC enabled device or EVM card for transacting with the terminal. The terminal is configured to process the card and transaction information and request an authorization from the acquiring bank or any financial agency. The acquiring bank terminal device is configured to forward the request to the issuer bank terminal device which in turn is configured to forward the authorization request to credit card network typically. The credit card network device is configured to send the request to the card issuer bank terminal device. The card issuer bank terminal device is configured to approve or decline the transaction based on multiple factors (validity, valid authorization request etc.) stored securely. The credit card network device is configured to forward the card issuer bank authorization response to the acquiring bank terminal device via the issuer bank terminal device. The acquiring bank terminal or any financial agency terminal is configured to store the transaction information for later processing like payment settlement. Further, the bank terminal device is configured to forward the response to the card terminal device and the terminal device is configured to continue and complete the transaction accordingly.
[00119] According to one embodiment herein, the system for a secure electronic transaction using an EMV Co., or any other regulatory/guided body/consortium approved and complied card which uses chip card technology or contactless (NFC) technology.
[00120] According to one embodiment herein, the system is also configured to handle any brute force attack or replay attack to the instrument. There is always a possibility of such attack, as the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner. To avoid such actions, the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period. The system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC). The system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value. The system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC. The counter is reset every time a successful transaction is done or carried out.
[00121] According to one embodiment herein, as part of security process a finite counter value is recommended. When the counter value overflows, card gets updated with different IPEK using encrypted issuer scripts that run as per EMV standards. Thus, usual procedure to update card remotely by the issuer bank through any authorized terminal or reader is followed.
[00122] According to one embodiment herein, to prevent brute force attacks, in asking the card to generate a series of cryptograms, the card is configured to wait for the Issuer Authority (IA) response. When a response is not received within a time period, due to a malicious brute force attack, the counter is incremented by one count.
[00123] According to one embodiment herein, cryptogram which is generated as part of EMV based transaction takes into consideration of data elements as per 8.1.1. of EMV_4.3_Book 2
[00124] According to one embodiment herein the system is configured to also ask for PIN or secret key of user for validation. It has different Card or user verification methods. Usually, online PIN which is entered in the terminal and packed it with encryption keys present on the terminal or reader. Keys to encrypt can be exchanged by the terminal associated bank and not by the card or user relationship bank. Offline PIN or secret key can be verified by the card itself. But this is not a viable process for updating PIN or secret key by the user easily without running scripts on the card itself by the bank. [00125] According to one embodiment herein, packed and encrypted PIN or user key is translated at Bank HSM which owns the reader or terminal. Translated PIN is then encrypted with the Network or card associated bank. Then associated bank verifies it and takes a decision on authenticity.
[00126] According to one embodiment herein, at the time of Cryptogram generation, in addition to data elements as per 8.1.1. Of EMV_4.3_Book2, card is configured to take PIN or user secret key into account also.
[00127] According to one embodiment herein, the system and method is configured to use encrypted offline PIN as card verification method.
[00128] According to one embodiment herein, the existing card readers or terminals are configured to capture PIN or user secret key on pin pad and then send PIN in encrypted form to card. The card is then configured to then translate PIN and then encrypts it with DUKPT key based on transaction counter present in the card as KSN. Encrypted PIN is then XORed with the cryptogram generated in usual process. ARQC, which is Authorization request is configured to have Cryptogram and PIN block in it. With this process there is no need of PIN translation of at a bank which owns a terminal and then PIN is never opened in clear in any of the HSM.
[00129] According to one embodiment herein, Cryptogram (ARQC) is forwarded to the issuer bank or card associated bank and then issuer bank is configured to create same cryptogram with same operation and then compare with the received ARQC. On successful matching, the transaction is approved. The advantage with this procedure is no PIN translation in a system which is not owned or governed by the card issuing bank. Thus no form of security breach or compromise can ever happen. [00130] According to one embodiment herein, issuer server usually has the same algorithm of that of the card and it is like a mirror. While determining keys, it uses DUKPT algorithm which has Base Derived key (BDK) and then it derives card key which is Initial Pin Encryption Key (IPEK) with BDK and card number as the input elements. Then for every card transaction - counter which increments every transaction increments and derives session key or Transaction Pin Key (TPK). The same algorithm is followed in the bank server as well where BDK (is stored in the server), card number and transaction counter (as part of pay load to server from the card) are present.
[00131] According to one embodiment herein, it is highly recommended to use finite counter value usually as part of security process and if the counter value overflows card should get updated with different IPEK using encrypted issuer scripts that can run as per EMV standards. This is usual procedure to update card remotely by the issuer bank through any authorized terminal or reader.
[00132] According to one embodiment herein, the ARPC is handled in par with current system, no change in this is required. But ARPC is also generated by the issuer in response to the ARQC received by the issuer from the card.
[00133] According to one embodiment herein, authentication terminal is the terminal or reader which is designed as per EMV Co. standards and PCI guidelines.
[00134] According to one embodiment herein, the main aim of this solution or idea is not to change any part of existing terminals in the filed which are working at as per EMV Co. guidelines.
[00135] According to one embodiment herein, not only the EMV Co system, but also any electronic device which acts as a transport to send confidential or secret key from a device which is connected to it can use same logic. This will make sure the machine which is used to transport does not interfere in the security of the secret key. [00136] FIG. 1 illustrates a block diagram of a system for secure electronic transaction, according to one embodiment herein. With respect to FIG. 1, the system 100 comprises a terminal device 102 or merchant terminal 103 for receiving a chip card or tapping of a chip card through a mobile computing device 101. The card data is read by the terminal device 102 with CVM as offline PIN. The terminal device 102 is configured to passes the PIN block to ICC (Card) upon PIN entry by a Card holder. The ICC (Card) is configured to encrypt the PIN block using DUKPT (ATC as IKSN) or MK-SK method. The ICC (Card) is configured to generate/prepare ARQC, using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated. The ICC (Card) is configured to send the generated ARQC to an authentication terminal device 104. The authentication terminal device 104 is configured to forward the received ARQC from the ICC (Card) to an acquirer terminal device 105. The acquirer terminal device 105 is configured to forward the received ARQC to a card issuer bank device 107 through a network provider system 106 for authentication and payment. The card issuer bank device 107 is configured to authenticate the card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal. The Card Issuer bank terminal 107 is configured to calculate and generate ARQC in the same method followed by the ICC (card) in calculating and generating the ARQC. The Card Issuer bank terminal 107 is configured to authorize the received ARQC by comparing the received ARQC with the generated ARQC. The Card Issuer bank terminal 107 is configured to validate both PIN block and the card generated cryptogram. The card data receiver terminal 103 is configured to notify/give issuer bank decision generated based on authorization. The IC chip in the card is loaded with an algorithm for encrypting the PIN block and generating the ARQC. [00137] According to one embodiment herein, the system is also configured to handle any brute force attack or replay attack to the instrument. There is always a possibility of such attack, as the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner. To avoid such actions, the system is configure to have a counter to register and store the number of brute force attempts made at any instant/time period. The system is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC). The system is further configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value. The system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC. The counter is reset every time a successful transaction is done or carried out.
[00138] To prevent brute force attacks, in asking the card to generate a series of cryptograms, the card is configured to wait for the Issuer Authority (IA) response. When a response is not received within a time period, due to a malicious brute force attack, the counter is incremented by one count.
[00139] FIG. 2 illustrates a flowchart explaining a process of secure electronic transaction, according to one embodiment herein. With respect to FIG. 2, the method is provided for secure translation and authentication of card data and PIN data in a secure transaction process. The method comprises inserting a chip card or tapping a chip card in a card terminal device or merchant terminal (202). The card holder is requested to enter PIN as per CVM (204). The card data is read by the terminal device with CVM as off-line PIN (206). The PIN block is passed to ICC (Card) from the terminal device when PIN is entered by a Card holder (208). The PIN block is encrypted by the ICC (Card) using DUKPT (ATC as IKSN) or MK-SK method (210). The ARQC is generated/prepared by the ICC (Card), using encrypted PIN block as Proprietary Authentication Data and a cryptogram is generated (212). The generated ARQC is sent to an authentication terminal device from the ICC (Card) (214). The received ARQC from the ICC (Card) is forwarded to an acquirer terminal device by the authentication terminal device. The received ARQC is forwarded to a card issuer bank device from the acquirer terminal device through a network provider system for authentication and payment (216). The card data and the transaction are authenticated by the card issuer bank device by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the card reading terminal. The ARQC is calculated and generated at the Card Issuer bank terminal in the same method followed by the ICC (card) in calculating and generating the ARQC. The received ARQC is authorized and authenticated at the Card Issuer bank terminal by comparing the received ARQC with the generated ARQC (218). Both the PIN block and the card generated cryptogram are validated at the Card Issuer bank terminal (220). The issuer bank decision generated based on authorization is notified to the user by the card receiver terminal (222).
[00140] According to one embodiment herein, the method is also provided to handle any brute force attack or replay attack to the instrument. There is always a possibility of such attack, as the system is intended to use in the open environment. Any person intended to break the system is able to attack the system with a brute force to get the sensitive data by observing a pattern of encryption by making all input data which is used to calculate algorithm in a non-random manner. To avoid such actions, a counter is provided to register and store the number of brute force attempts made at any instant/time period. The counter is configured to count such actions (actions without issuer authentication in response to ARQC generated by the ICC). The card is deactivated or barred from use or the card is killed or the card is made non-usable or prevented from generating ARQC, when the total number of counts is equal to or more than a preset threshold value. The barred card or unusable card is activated again and the card is made usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC. The counter is reset every time a successful transaction is done or carried out.
[00141] To prevent brute force attacks, in asking the card to generate a series of cryptograms, the card is configured to wait for the Issuer Authority (IA) response. When a response is not received within a time period, due to a malicious brute force attack, the counter is incremented by one count.
[00142] FIG. 3 illustrates a table indicating the mandatory data used for cryptogram generation, according to one embodiment herein. With respect to FIG. 3, the mandatory data used for cryptogram generation comprises value and the source.
[00143] The embodiments herein provide a system and method for a secure electronic transaction / authentication. The system and method provides a technique for a fast and an efficient electronic transaction / authentication. The system provides a secure and efficient technique without leaving any security flaw and process flaw. The system provides a technique to make use of existing terminal / system without any change in the existing system. The same process or system is applied to any of the sensitive data present in the system.
[00144] The embodiments herein provide a system and method for secure authentication of any system with a secure element. The system is not only EMV compliant but also works with any electronic device which acts as a transport to send confidential or secret key from a device connected to it and uses same logic. [00145] The system is also configured to handle any brute force attack or replay attack to the instrument. The system is configured to deactivate the card or bar the card operation or kill the card or make the card non usable or prevent the card from generating ARQC, when the total number of counts is equal to or more than a preset threshold value. The system is also configured to activate the barred card or unusable card and make the card usable on lock with the user secure scripts run on the ICC after the authentication or identification of issuer by ICC.
[00146] The foregoing description of the specific embodiments herein will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments herein without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments.
[00147] It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modifications. However, all such modifications are deemed to be within the scope of the claims.
[00148] Although the embodiments herein are described with various specific embodiments, it will be obvious for a person skilled in the art to practice the embodiments herein with modifications.

Claims

CLAIMS What is claimed is:
1. A system for secure electronic transaction, the system comprising:
a terminal device/merchant terminal configured for receiving one or more PIN details for Customer Verification Method (CVM) from a user via a keypad or an input device associated with the terminal device, and wherein the terminal device is further configured for encrypting the received PIN input from the user using one or more encryption algorithms;
a chip card/integrated circuit card (ICC) communicatively coupled with the terminal device, and wherein the chip card is configured for accepting and translating the encrypted PIN from the terminal device, and wherein the chip card comprises a transaction counter, and wherein the transaction is configured for incrementing a count for every transaction attempt performed by the user, and wherein the chip card is configured for encrypting the translated PIN with Derived Unique Key Per Transaction (DUKPT) key based on transaction counter value present in the card as a Key Serial Number (KSN), and wherein the chip card is further configured for concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) to generate an Proprietary Authentication Data (PAD)/authorization request comprising of the ARQC and the PIN block, and wherein the chip card is further configured for transmitting the ARQC over a secure channel;
an authentication terminal device configured for accepting the transmitted ARQC and for forwarding the received ARQC over a secure communication channel;
an acquirer terminal device/merchant bank device configured for receiving the ARQC from the authentication terminal device and for forwarding the received ARQC through a network provider system for authentication and payment; and a card issuer bank device configured for receiving the ARQC from the acquirer terminal device and for authenticating the chip card and the transaction by generating an ARQC with the stored card data and by comparing the generated ARQC with the ARQC received from the chip card reading terminal, and wherein the card issuer bank device is further configured for validating both PIN block and the chip card generated ARQC/cryptogram and for informing the validation state back to the user via the card issuer bank device.
2. The system according to claim 1, wherein the chip card is further configured for counting a number of transaction attempts without any valid server responses using the transaction counter, and wherein the chip card is further configured for de-activating when the number of invalid server responses or the number of transaction attempts without any valid server responses is equal to or more than a preset threshold value to protect the system from brute-force attacks, and wherein the transaction counter is reset every time after a successful transaction is done or carried out.
3. The system according to claim 1, wherein the system is further configured for activating a barred card or unusable card and for making the card usable on lock with a user secure script run on the chip card after the authentication or identification of issuer by chip card.
4. The system according to claim 1, wherein the one or more encryption algorithms used for PIN block encryption comprise Derived Unique Key Per Transaction algorithm (DUKPT (ATC as IKSN)) or MK-SK algorithm.
5. The system according to claim 1, wherein the Proprietary Authentication Data (PAD)/authorization is generated by concatenating the encrypted PIN block to an Authorization Request Cryptogram (ARQC) using a XOR function.
6. The system according to claim 1, wherein the chip card is a contact or contactless Near Field Communication (NFC) card or a smart card.
7. The system according to claim 1, wherein the system is configured for translating the PIN by using existing eco system without the knowledge of one or more parties involved between the card issued and issuer processing system.
8. An automated method for secure electronic transaction, the method comprising the steps of:
inserting a chip card or tapping a chip card in a terminal device or merchant terminal, and wherein the chip card data is read by the terminal device with CVM (Customer Verification Method) as off-line PIN;
passing the PIN block to the chip card from the terminal device when PIN is entered by a card holder and encrypting the PIN block by the chip card using one or more encryption algorithms;
concatenating an ARQC with the encrypted PIN block as Proprietary Authentication Data and transmitting the ARQC over a secure channel using the chip card;
accepting the transmitted ARQC and forwarding the received ARQC over a secure channel using an authentication terminal device;
receiving the ARQC from the acquirer terminal device and authenticating the chip card and the transaction by generating an ARQC with the stored card data and comparing the generated ARQC with the ARQC received from the chip card reading terminal using a card issuer bank device; and
validating both PIN block and the chip card generated ARQC/cryptogram and informing the validation state back to the user via card issuer bank device.
9. The method according to claim 8, wherein the method further comprises counting the number of transaction attempts with no valid server response using a transaction counter and resetting the transaction counter every time a successful transaction is done or carried out.
10. The method according to claim 8, wherein the method further comprises de-activating the chip card when the number of invalid server response is equal to or more than a preset threshold value to protect the system from brute-force attacks.
PCT/IN2017/050549 2016-11-22 2017-11-21 System and method for translation and authentication of secure pin and sensitive data WO2018096559A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201641028600 2016-11-22
IN201641028600 2016-11-22

Publications (1)

Publication Number Publication Date
WO2018096559A1 true WO2018096559A1 (en) 2018-05-31

Family

ID=62195449

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2017/050549 WO2018096559A1 (en) 2016-11-22 2017-11-21 System and method for translation and authentication of secure pin and sensitive data

Country Status (1)

Country Link
WO (1) WO2018096559A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072382A1 (en) * 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020191179A1 (en) * 2019-03-20 2020-09-24 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
CN111835749A (en) * 2020-07-07 2020-10-27 上海通联金融服务有限公司 Method for realizing access of single UnionPay system to multiple credit card systems
CN113316798A (en) * 2019-01-09 2021-08-27 维萨国际服务协会 Methods, systems, and computer program products for network binding agent re-encryption and PIN translation
CN114868123A (en) * 2019-12-23 2022-08-05 第一资本服务有限责任公司 Contactless Card Personal Identification System
US11562057B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Ecosystem security platforms for enabling data exchange between members of a digital ecosystem using digital genomic data sets
US11562255B2 (en) 2021-02-04 2023-01-24 Quantum Digital Solutions Corporation Cyphergenics-based notarization blockchains
US12166750B2 (en) 2022-02-08 2024-12-10 Capital One Services, Llc Systems and methods for secure access of storage
US12301706B1 (en) * 2021-12-22 2025-05-13 Wells Fargo Bank, N.A. Translate random unique method for passcode encryption technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030156721A1 (en) * 2000-03-24 2003-08-21 Mathias Widman Method and system for encryption and authentication
US20080189214A1 (en) * 2006-10-17 2008-08-07 Clay Von Mueller Pin block replacement
US20090159692A1 (en) * 2004-11-08 2009-06-25 Gemplus Method of unblocking a locked application using a personal identification number

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030156721A1 (en) * 2000-03-24 2003-08-21 Mathias Widman Method and system for encryption and authentication
US20090159692A1 (en) * 2004-11-08 2009-06-25 Gemplus Method of unblocking a locked application using a personal identification number
US20080189214A1 (en) * 2006-10-17 2008-08-07 Clay Von Mueller Pin block replacement

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"ARQC and ARPC generation and validation", ATMMARKETPLACE, 6 August 2012 (2012-08-06), XP054978466, Retrieved from the Internet <URL:https://www.atmmarketplace.com/videos/arqc-and-arpc-generation-and-validation/> [retrieved on 20181101] *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11563583B2 (en) 2018-10-02 2023-01-24 Capital One Services, Llc Systems and methods for content management using contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072382A1 (en) * 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072353A1 (en) * 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
WO2020072373A1 (en) * 2018-10-02 2020-04-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12155770B2 (en) 2018-10-02 2024-11-26 Capital One Services, Llc Systems and methods for user information management using contactless cards
US12125027B2 (en) 2018-10-02 2024-10-22 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
CN112889046A (en) * 2018-10-02 2021-06-01 第一资本服务有限责任公司 System and method for password authentication of contactless cards
US12112322B2 (en) 2018-10-02 2024-10-08 Capital One Services, Llc Systems and methods for user authorization and access to services using contactless cards
US11182784B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US11182785B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for authorization and access to services using contactless cards
US12106294B2 (en) 2018-10-02 2024-10-01 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11444775B2 (en) 2018-10-02 2022-09-13 Capital One Services, Llc Systems and methods for content management using contactless cards
CN113316798B (en) * 2019-01-09 2024-05-10 维萨国际服务协会 Methods, systems, and computer program products for network binding agent re-encryption and PIN translation
US11736295B2 (en) 2019-01-09 2023-08-22 Visa International Service Association Method, system, and computer program product for network bound proxy re-encryption and PIN translation
US12126725B2 (en) 2019-01-09 2024-10-22 Visa International Service Association Method, system, and computer program product for network bound proxy re-encryption and PIN translation
CN113316798A (en) * 2019-01-09 2021-08-27 维萨国际服务协会 Methods, systems, and computer program products for network binding agent re-encryption and PIN translation
US11757644B2 (en) 2019-01-09 2023-09-12 Visa International Service Association Method, system, and computer program product for network bound proxy re-encryption and PIN translation
US12256009B2 (en) 2019-01-09 2025-03-18 Visa International Service Association Method, system, and computer program product for network bound proxy re-encryption and PIN translation
KR102780967B1 (en) 2019-03-20 2025-03-13 캐피탈 원 서비시즈, 엘엘씨 Using a contactless card to securely share personal data stored in a blockchain
WO2020191179A1 (en) * 2019-03-20 2020-09-24 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US11734676B2 (en) 2019-03-20 2023-08-22 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
KR20230156959A (en) * 2019-03-20 2023-11-15 캐피탈 원 서비시즈, 엘엘씨 Using a contactless card to securely share personal data stored in a blockchain
US12300075B2 (en) 2019-12-23 2025-05-13 Capital One Services, Llc Contactless card personal identification system
CN114868123A (en) * 2019-12-23 2022-08-05 第一资本服务有限责任公司 Contactless Card Personal Identification System
US11562057B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Ecosystem security platforms for enabling data exchange between members of a digital ecosystem using digital genomic data sets
US12223021B2 (en) 2020-02-05 2025-02-11 Quantum Digital Solutions Corporation Systems and methods for controlling a digital ecosystem using digital genomic data sets
US11562056B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Systems for establishing a digital ecosystem using digital genomic data sets
US11562058B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Systems and methods for participating in a digital ecosystem using digital genomic data sets
CN111835749B (en) * 2020-07-07 2022-09-02 上海通联金融服务有限公司 Method for realizing access of single UnionPay system to multiple credit card systems
CN111835749A (en) * 2020-07-07 2020-10-27 上海通联金融服务有限公司 Method for realizing access of single UnionPay system to multiple credit card systems
US11687791B2 (en) 2021-02-04 2023-06-27 Quantum Digital Solutions Corporation Virtual trusted execution domains
US11687792B2 (en) 2021-02-04 2023-06-27 Quantum Digital Solutions Corporation Cyphergenics-based decoding and encoding of executable instructions
US11620533B2 (en) 2021-02-04 2023-04-04 Quantum Digital Solutions Corporation Cyphergenics-based decoding and encoding of program data
US11615323B2 (en) 2021-02-04 2023-03-28 Quantum Digital Solutions Corporation Cyphergenics-based verifications of blockchains
US11562255B2 (en) 2021-02-04 2023-01-24 Quantum Digital Solutions Corporation Cyphergenics-based notarization blockchains
US12301706B1 (en) * 2021-12-22 2025-05-13 Wells Fargo Bank, N.A. Translate random unique method for passcode encryption technology
US12166750B2 (en) 2022-02-08 2024-12-10 Capital One Services, Llc Systems and methods for secure access of storage

Similar Documents

Publication Publication Date Title
WO2018096559A1 (en) System and method for translation and authentication of secure pin and sensitive data
CN113812128B (en) Method, system and storage medium for NFC mobile money transfer
AU2023203952B2 (en) Steganographic image encoding of biometric template information on a card
CN114175078A (en) System and method for providing online and hybrid card interaction
CN109716373B (en) Cryptographically authenticated and tokenized transactions
US20130226812A1 (en) Cloud proxy secured mobile payments
US20160117673A1 (en) System and method for secured transactions using mobile devices
JP6743276B2 (en) System and method for end-to-end key management
CN115004208A (en) Generating barcodes using cryptographic techniques
US20150142666A1 (en) Authentication service
CN103123708A (en) Secure payment method, mobile device and secure payment system
CN102222389A (en) Realization method and device of fingerprint comparison in financial IC (integrated circuit) card
US20150142667A1 (en) Payment authorization system
EP3364352A1 (en) Determining legitimate conditions at a computing device
KR102348823B1 (en) System and Method for Identification Based on Finanace Card Possessed by User
KR20100006004A (en) Autentification processing method and system using card, card terminal for authentification processing using card
KR20200013494A (en) System and Method for Identification Based on Finanace Card Possessed by User
EP3095081A1 (en) Authentication method and system
US10721081B2 (en) Method and system for authentication
Nezhad et al. SoK: Security of EMV Contactless Payment Systems
KR20200103615A (en) System and Method for Identification Based on Finanace Card Possessed by User
Mehr Nezhad On the security of contactless payment systems
EP3145116B1 (en) Method and system for terminal to secure element communication
HK40062383A (en) Method, system for nfc mobile currency transfer and storage medium
HK40072900A (en) Generating barcodes utilizing cryptographic techniques

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17875045

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17875045

Country of ref document: EP

Kind code of ref document: A1