Abstract: The present disclosure provides a system and method for establishing a communication channel between a card and a card processing unit 106. The card is operatively coupled to the card processing unit 106 through a card machine 102. Authentication of the cardis based on a comparison of a first key code associated with the card and a dataset including pre-stored key codes. When the card is authenticated,asecondkey code is generated by the card processing unit 106. The card processing unit 106 enablesthe second key code to replace the first key code on the memory associated with the card through the card machine 102. The second key code replaces the first key code in the dataset. The system 100 issues a warning signal representing detection of card cloning based on a negative comparison of the key code associated with the card and the dataset.
TECHNICAL FIELD
[0001] The present disclosure relates to securing communication between a card and
a card machine. More particularly, the present disclosure relates to a system and method forsecuring communication between a card and a card machineby implementing time-dependent cryptographyusing radio frequency identification (RFID) technology.
BACKGROUND
[0002] Background description includes information that may be useful in
understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] ATMs are convenient machines allowing consumers to perform quick, self-
serve transactions from everyday banking, from deposits and withdrawals of money to more complex transactions like bill payments and money transfers. Since the first ATM appeared in 1967, the popularity of these machines has steadily been on the rise. There are more than 3.5 million ATMs in use across the world. They are also known in different parts of the world as automated bank machines (ABM) or bank machines. Transactions commonly conducted at ATMs include dispensing cash, making deposits, transferring funds between accounts, check cashing, bill payment and account balance inquiries.
[0004] As technology is getting advanced day by day, ATMs are also getting
advanced. Transactions commonly conducted at ATMs now are not limited to only dispensing cash, but, making deposits, transferring funds between accounts, check cashing, bill payment, and account balance inquiries are also possible due to advancement in technology. But, the advancements also imposes a serious threat as scammers are coming up with innovative ideas to steal people's hard-earned money from debit or credit card. In recent times, scammers have invented card cloning technique to steal money from ATM kiosks. Many have fallen prey to this tactic used by cyber thieves.
[0005] Cyber scammers have invented a unique method of cloning a card to steal
money sitting at a remote location.Scammers place a skimming device and a miniature camera on, when the card is swiped in the ATM it gets cloned by the skimmer device, the
camera records the pass cord entry, later a duplicate cloned card can be created, and all the money can be withdrawn by entering the passcode.
[0006] There is, therefore, a need in the art to provide an improved system and
method for securing ATM transactions and detecting ATM card cloning/ skimming to protect peoplefrom fraud.
OBJECTS OF THE PRESENT DISCLOSURE
[0007] Some of the objects of the present disclosure, which at least one embodiment
herein satisfies are as listed hereinbelow.
[0008] It is an object of the present disclosure to provide a system and method for
securing communication between a card and a card machine.
[0009] It is another object of the present disclosure to provide a system and method
for securing communication between a card and a card machine using RFID technology.
[0010] It is another object of the present disclosure to provide a system and method
for protecting against card cloning fraud.
[0011] It is another object of the present disclosure to provide a system and method
for the establishment of a secure, reliable and efficient communication channel between a
card and a card machineto protect people from fraud through card cloning/ cloned card.
[0012] It is another object of the present disclosure to provide a system and method
for securing communication between a card and a card machine that is cost-effective and easy
to implement.
SUMMARY
[0013] The present disclosure relates to securing communication between a card and
a card machine. More particularly, the present disclosure relates to a system and method
forsecuring communication between a card and a card machine by implementing atime-
dependent cryptographyusing radio frequency identification (RFID) technology.
[0014] An aspect of the present disclosure pertains toa method for securing
communication between a card and a card machine, and the method includes the steps of: extracting, by one or more processors of a processing engine that forms part of the card machine, a first key code of a card when the card is operatively coupled to a card machine, wherein the first key code may be stored on a memory associated with the card; authenticating, by the one or more processors, the card by comparing the extracted first key code associated with the card with a first dataset comprising a set of pre-stored key codes;
responsive to positive authentication of the card, generating, by the one or more processors, a second key code; and replacing, by the one or more processors, the first key code of the card with the generated second key code, wherein the pre-stored first key code of the card may be replaced with the generated second key code in the first dataset; wherein a secured communication channel may hereinbelow between the card and the card machine responsive to positive authentication of the card.
[0015] In an aspect,method may comprise a step of authenticating, by the one or more
processors, a card identification code by comparing the card identification code with a second
dataset comprising a pre-stored card identification code, and wherein the card identification
code may be entered into the card machine by a user using an input device.
[0016] In an aspect,the first key code and the second key code may be generated
based on the card identification code and card attributes of the card.
[0017] In an aspect, the card attributes may be any or a combination of tag ID, card
number, account number, and server authentication time.
[0018] In an aspect, the method may comprise a step of terminating the secured
communication channel between the card and the card machine responsive to negative authentication of the card, and wherein the method may comprise a step of generating a warning signal responsive to the negative authentication of the card.
[0019] In an aspect,the one or more processors may establish the secured
communication channel between the card and the card machine for a predefined time interval.
[0020] Another aspect of the present disclosure pertains to a system to secure
communication between a card and a card machine, the system comprising:a card machine adapted to operatively couple a card to the card machine and configured to extract a first key code from the card; a card processing unit operatively coupled to the card machine, the card processing unit comprising one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors and configured to:receive the extracted first key code associated with the card;authenticate the card by comparing the extracted first key code associated with the card with a first dataset comprising a set of pre-stored key codes; generate a second key code responsive to positive authentication of the card; and replace the first key code of the card with the generated second key code, wherein the pre-stored first key code of the card may be replaced with the generated second key code in the first dataset; and wherein a secured communication channel may be established between the card and the card machine responsive to positive authentication of the card
[0021] In an aspect, the system may comprise an RFID card reader/ writer, and the
card may comprise an RFID tag to store any or a combination of the first key code, the
second key code, and the real-time card attributes, and wherein the card read/write module
may enable the RFID card reader/ writer to extract the first key code form the RFID tag of the
card, and further may enable storing the second key code in the RFID tag of the card.
[0022] In an aspect,the system may terminate the secure communication channel
between the card and the card machine responsive to negative authentication of the card.
[0023] In an aspect, the system may generate a warning signal responsive to negative
authentication of the card.
BRIEF DESCRIPTION OF THE DRAWINGS
[0024] The accompanying drawings are included to provide a further understanding
of the present disclosure, and are incorporated in and constitute a part of this specification.
The drawings illustrate exemplary embodiments of the present disclosure and, together with
the description, serve to explain the principles of the present disclosure.
[0025] The diagrams are for illustration only, which thus is not a limitation of the
present disclosure, and wherein:
[0026] FIG. 1 illustrates exemplarynetwork architecture of the proposed system for
securing communication between a card and a card machineto illustrate its overall working in
accordance with an embodiment of the present disclosure.
[0027] FIG. 2 illustrates exemplary functional components of a card processing unit,
in accordance with an exemplary embodiment of the present disclosure.
[0028] FIG. 3 illustrates an exemplary block diagram of an RFID module
incorporated in the proposed system to illustrate its overall working in accordance with an
embodiment of the present disclosure.
[0029] FIGs. 4A through 4C illustrate exemplary flow diagramfor securing
communication between an ATM card and an ATM to illustrate its overall working in
accordance with an embodiment of the present disclosure.
[0030] FIG. 5 illustrates an exemplary flow diagram for securingcommunication
between a card and a card machinein accordance with an embodiment of the present
disclosure.
DETAILED DESCRIPTION
[0031] The following is a detailed description of embodiments of the disclosure
depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0032] Various terms as used herein are shown below. To the extent a term used in a
claim is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in printed publications and issued patents at the time of filing.
[0033] In some embodiments, the numerical parameters set forth in the written
description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0034] As used in the description herein and throughout the claims that follow, the
meaning of "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
[0035] The recitation of ranges of values herein is merely intended to serve as a
shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. "such as") provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No
language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0036] Groupings of alternative elements or embodiments of the invention disclosed
herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
[0037] The present disclosure relates to securing communication between a card and
a card machine. More particularly, the present disclosure relates to a system and method
forsecuring communication between a card and a card machine by implementing atime-
dependent cryptographyusing radio frequency identification (RFID) technology.
[0038] According to an aspect the present disclosure pertains to a method for securing
communication between a card and a card machine, the method including the steps of: extracting, by one or more processors of a processing engine that forms part of the card machine, a first key code of a card when the card is operatively coupled to a card machine, wherein the first key code can be stored on a memory associated with the card; authenticating, by the one or more processors, the card by comparing the extracted first key code associated with the card with a first dataset including a set of pre-stored key codes; responsive to positive authentication of the card, generating, by the one or more processors, a second key code; and replacing, by the one or more processors, the first key code of the card with the generated second key code, wherein the pre-stored first key code of the card can be replaced with the generated second key code in the first dataset; wherein a secured communication channel can be established between the card and the card machine responsive to positive authentication of the card.
[0039] In an embodiment,method can include a step of authenticating, by the one or
more processors, a card identification code by comparing the card identification code with a
second dataset including a pre-stored card identification code, and wherein the card
identification code can be entered into the card machine by a user using an input device.
[0040] In an embodiment,the first key code and the second key code can be generated
based on the card identification code and card attributes of the card.
[0041] In an embodiment, the card attributes can be any or a combination of tag ID,
card number, account number, and server authentication time.
[0042] In an embodiment, the method can include a step of terminating the secured
communication channel between the card and the card machine responsive to negative authentication of the card, and wherein the method can include a step of generating a warning signal responsive to the negative authentication of the card.
[0043] In an embodiment,the one or more processors can establish the secured
communication channel between the card and the card machine for a predefined time interval.
[0044] According to another aspect, the present disclosure provides a system to
secure communication between a card and a card machine, the system includes:a card machine adapted to operatively couple a card to the card machine and configured to extract a first key code from the card; a card processing unit operatively coupled to the card machine, the card processing unit including one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors and configured to:receive the extracted first key code associated with the card;authenticate the card by comparing the extracted first key code associated with the card with a first dataset including a set of pre-stored key codes; generate a second key code responsive to positive authentication of the card; and replace the first key code of the card with the generated second key code, wherein the pre-stored first key code of the card can be replaced with the generated second key code in the first dataset; and wherein a secured communication channel can be established between the card and the card machine responsive to positive authentication of the card
[0045] In an embodiment, the system can include an RFID card reader/ writer, and
the card can include an RFID tag to store any or a combination of the first key code, the
second key code, and the real-time card attributes, and wherein the card read/write module
can enable the RFID card reader/ writer to extract the first key code form the RFID tag of the
card, and further can enable storing the second key code in the RFID tag of the card.
[0046] In an embodiment,the system can terminate the secure communication channel
between the card and the card machine responsive to negative authentication of the card.
[0047] In an embodiment, the system can generate a warning signal responsive to
negative authentication of the card.
[0048] FIG. 1 illustrates exemplarynetwork architecture of the proposed system for
securing communication between a card and a card machine to illustrate its overall working in accordance with an embodiment of the present disclosure.
[0049] As illustrated, in an aspect, a card processing unit 106 implemented in any
computing device can be operatively coupled to a sever 108. Further, one or morecard
machines 102-1, 102-2... 102-N(also collectively referred to card machinesl02, and
individually referred to as card machinel02, herein), can be communicatively coupled with
the card processing unitl06 through a network 104.In an exemplary embodiment, the card
machine 102 can be but not limited to an automated teller machine(ATM), a metro card
processor, a token reader, a Process Data Quickly (PDQ) machine (also referred to as
handheld card transaction machine, herein), and the likes.
[0050] In an embodiment, the card can be operatively coupled to the card
machine 102in a contact and contactless way. In first way, the card can be brought into
contact with the card machine 102byinserting the card into the card machine 102 or by
making physical contact of the card with the card machine 102. However, in a second way,
the card can be operatively coupled to thecard machine 102 in a contactless manner. The card
can include a communication unit such as but not limited to an antenna embedded inside
the card that enables communication of the card with the card machine 102 without any
physical contact.
[0051] In an embodiment, a card can be operatively coupled to the card processing
unitl06 using the card machine 102. Thecard machinel02can facilitate extraction of card
attributes of the card when the card is operatively coupled to the card processing unit 106
using the card machine 102.The card attributes can be any or a combination of tag ID, card
number, account number, server authenticationtime, and the likes.
[0052] In another embodiment, the card processing unit 106 can authenticate the card
based on an interrogation associated with the card attributes extracted by the card machine
102.
[0053] In an embodiment, afirst key code(interchangeably referred to as key code,
herein) associated with the card can be generated by the card processing unit 106. The
proposed system can facilitate a secured communication between the card and the card
machinel02 by generating thekey code every time thecard is operatively coupled to the card
processing unit 106 through the card machine 102.
[0054] In an embodiment, thecard machine 102can also facilitate extraction of the key
codealong with extraction of card attributes of the card from the card whennext timethecard is
operatively coupled to the card processing unit 106 through the card machine 102.
[0055] In an embodiment, the card processing unit 106 can authenticate the card by
comparing the extracted first key code associated with the card with a first dataset including a
set of pre-stored key codes. The first dataset,including the set of pre-stored key codes,can be
stored in a database of the system 100.
[0056] In an embodiment, the card processing unit 106 can generate a second key
code responsive to positive authentication of the card.The first key code of the card can be
replaced with the generated second key code. The pre-stored first key code of the card can be
replaced with the generated second key code in the first dataset.In another embodiment, the
card processing unit 106 can establish wherein a secured communication channel between the
card and the card machine 120 responsive to positive authentication of the card.
[0057] In an embodiment, the system can terminate the secure communication
channel between the card and the card machine 120 responsive to negative authentication of the card. In another embodiment, the system 100 can issue a warning signal to user responsive to negative authentication of the card.
[0058] In an illustrative embodiment, the card machine can include an RFID card
reader/ writer, and the card can include an RFID tag to store any or a combination of the first key code, the second key code, and the real-time card attributes. The card processing unit can enable the RFID card reader/writer to extract the first key code from the RFID tag of the card, and further enables the RFID card reader/writer to store the generated second key code in the RFID tag of the card.
[0059] Further, in an embodiment, the network 104 can be a wireless network, a
wired network or a combination thereof. The network 104 can be implemented as one of the
different types of networks, such as an intranet, local area network (LAN), wide area network
(WAN), the internet, Wi-Fi, LTE network, CDMA network, and the like. Further, the
network can either be a dedicated network or a shared network. The shared network
represents an association of the different types of networks that use a variety of protocols, for
example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet
Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with
one another. Further, the network 104 can include a variety of network devices, including
routers, bridges, servers, computing devices, storage devices, and the like.
[0060] In an embodiment, the card processing unitl06 can include a server 108. In
some implementations, the server 108 can be configured to manage the card operatorsl02 in the system 100. Themanagement of the card machines 102 can include, for example, scheduling data, configuring data, sending specific instructions, and other operations consistent with the present disclosure.
[0061] FIG. 2 illustrates exemplary functional components of a card processing unit,
in accordance with an exemplary embodiment of the present disclosure.
[0062] As illustrated, in an embodiment, the card processing unitl06can include one
or more processor(s) 202, the one or more processor(s) 202 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 202 can be configured to fetch and execute computer-readable instructions stored in a memory 206 of the card processing unitl06. The memory 206can store one or more computer-readable instructions or routines, which can be fetched and executed to create or share the data units over a network service. The memory 206 can be any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0063] The card processing unitl06can include an interface(s) 204. The interface(s)
204 can include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) 204 can facilitate communication of the card processing unitl06with various devices coupled to thecard processing unitl06such as an input unit and an output unit. The interface(s) 204 can also provide a communication pathway for one or more components of thecard processing unitl06and the proposed system 100. Examples of such components include, but not limited to, processing engine(s) 208 and database 218.
[0064] The processing engine(s) 208 can be implemented as a combination of
hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) 208. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) 208 can be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) 208 can include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) 208. In such examples, the processing engine(s)208 can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the card processing unit 106 and the processing resource. In other examples, the processing engine(s) 208 can be implemented by electronic circuitry.
[0065] In an embodiment, the database 218 can include data that is either stored or
generated as a result of functionalities implemented by any of the components of the
processing engine(s) 208.
[0066] In an embodiment, the processing engine(s) 208 can include but not limited to
a read/ writemodule 210,an authentication module 212, a key generationmodule 214, other
module(s) 216, and the likes.
[0067] In an embodiment, a card machine 102 can extract card attributes and a key
code associated with a card whenthe card is operatively coupled to a system 100 through the
card machine 102.
[0068] In an embodiment,the read/ writemodule210 can enable the one or more
processors to receive the extracted key code and the extracted card attributes associated with
the card. In another embodiment, the read/ write module 210 can enable the one or more
processors to writea key code on a card through the card machine 102.
[0069] In an embodiment,the authenticationmodule 212 can enable the one or more
processors toauthenticate the card by comparing the extracted key code associated with the
card with a first dataset including a set of pre-stored key codes.The first dataset can be in the
database 218 of the card processing unit 106.
[0070] In another embodiment,the authentication module212can enable the one or
more processors toauthenticate the card by authenticating bya card identification code
associated with the card. Thecard identification code associated with the card can be
authenticated by comparing the card identification code associated with the card with a
second dataset, including a pre-stored card identification code. The second dataset can be in
the database 218 of the card processing unit 106.
[0071] In an embodiment,the card identification code associated with the card can be
entered into the card machine 120 by a user using an input device. The input device can
include but not limited to any or a combination of a keyboard, a mouse, a touch screen, a
microphone, and the likes.
[0072] In an embodiment, the card processing system 106 can generate a warning
signal based on a negative comparison of any or a combination of the extracted key code and
the entered card identification code of the card with any or a combination of the pre-stored
key code or the pre-stored card identification code associated with the card.
[0073] In an embodiment, responsive to positive authentication of the card, a key
generation module 214 can enable the one or more processors to generate a key code through
encryption. In another embodiment, theread/ writemodule 210 can enable the one or more
processors to write the generated key code on a memory associated with the card through the card machine 102 for enhancing security features of the card. The key code can be stored in the database 218 of the card processing unit 106 simultaneously.
[0074] In an illustrative embodiment,when a card identification code is to be
generated for the first time,the card can be operatively coupled to the card processing unit 106 through the card machine 102. The card machine 102 can extract card attributes associated with the card. Theread/ writemodule210 can enable the one or more processors toreceive the extracted card attributes from the card machine 102. Thecard identification code can be generated based on interrogation associated with the received card attributes through the card processing unit 106.The key generation module 214 can generate afirst key code for the card. The generated first key code can be associated with the received card attributes. The read/ write module 210 can enable the one or more processors towrite the generated first key code on the memory associated with the card through the card machine 102. The generated first key code can be stored in a first dataset. The first dataset can be including key codes. The first dataset can be stored in the database 218 of the card processing unitl06 simultaneously.
[0075] In an illustrative embodiment,for establishing a secured communication
channel between the card and the card machine 102,the card can beoperatively coupled to the
card processingunit 106 through the card machine 102.The card identification code is
required to be entered in order to establish a secured communication channel between the
card and the card machine 102.The authentication module212 can enable the one or more
processors toauthenticate the card by comparing the card identification code associated with
the card with a second dataset including a pre-stored card identification code. The card
identification code is entered into the card machine by a user using the input device. The
second dataset can be in the database 218 of the card processingunit 106.
[0076] In another embodiment,theread/ writemodule210 can enable the one or more
processors to receive the extracted card attributes from the card machine 102. The
authentication module 212 can authenticate the card by comparing the extracted first key
code associated with the card with the first dataset comprising the set of pre-stored key codes.
[0077] In an embodiment, when the card is authenticated,the key generation module
214 can generate a configured key code (also referred to as second key code, herein). The read/ write module 210 can enable the one or more processors to write the second key code on the memory associated with the card through the card machine 102. The second key code can replace the first key code associated with the card.In another embodiment, when the card
is authenticated by the one or more processors, a secured communication channel can be
established between the card and the card machine 102.
[0078] Those skilled in the art would appreciate that the generated key code can be
stored at a first address in the database 218 of the card processingunit 106 when the card is
operatively coupled to the card processing unit 106 for the first time. But, when the card is
operatively coupled to the card processing unit 106 for the at least one transaction, the
generated key code can be stored at the first address in the database 218 of the card
processing unit 106 replacing the earlier key code (the first key code) associated with the card
stored in the database 218of the card processing unit 106 with the second key code, without
deviating from the scope of present disclosure.
[0079] FIG. 3 illustrates an exemplary block diagram of an RFID module
incorporated in the proposed system to illustrate its overall working in accordance with an
embodiment of the present disclosure.
[0080] In an embodiment, a card machine 102 can include a radio frequency
identification (also referred to as RFID, herein) card reader/ writer 302 and a card including
an RFID tag 306.
[0081] In an embodiment,the RFID card reader/ writer 302 associated with the card
machine 102 can include an antenna 304 to communicate with one or moreRFID tags, each
associated with one or more cards. In another embodiment, each of the one or more RFID
tags can include an electronic chip with a memory to store data communicated bythe RFID
card reader/ writer 302.The one or more RFID tags can be a small adhesive label that can be
attached to or integrated with the cards.
[0082] In an illustrative embodiment, when the card including the RFID tag 306 is
operatively coupled to the RFID card reader/ writer 302 associated with the card machine
102, the chip on the RFID tag 306 associated with the card can receive requests sent by the
RFID card reader/ writer 302 associated with the card machine 102and respond to the
requests through a wireless communication mode. In another embodiment, the RFID tag
306associated with the cardcan store any or a combination of the card attributes and key code
on the chip.The RFID tag 306 associated with the cardcan also transmit the stored card
attributes and key code to the RFID card reader/ writer302 associated with the card machine
102through the antenna 304.
[0083] In an embodiment, the card can be authenticated by comparing the key code
stored on the RFID tag 306associated with the card with a first dataset comprising a set of
pre-stored key codes.
[0084] In an embodiment, responsive to positive authentication of the card, a secured
communication channel can be established between the RFID tag 306associated with the card
and RFID card reader/ writer 302 associated with the card machine 102.
[0085] Those skilled in the art would appreciate that the above-mentioned aspects
related to the RFID tag 306 can also be utilized for identification of passports, tickets or
payment cards, or can be used like barcodes, to identify products when theRFID tag 306 is
attached to a product, without deviating from the scope of present disclosure.
[0086] FIG. 4A, 4B, and 4C illustrate an exemplary flow diagram for securing
communication between an ATM card and an ATM to illustrate its overall working in accordance with an embodiment of the present disclosure.
[0087] As illustratedbyFIGs. 4A to 4C, an ATM 102 (not shown) can include a
cryptography generator 106. Thecryptography generator 106 can include an RFID card reader/ writer 302.The cryptography generator 106can be operatively coupled with a banking server 410. In an embodiment, an ATM card can be operatively coupled to the ATM 102 through the RFID card reader/ writer 302. The ATM card can include an RFID tag 306.Thecryptography generator 106 can generate a key code each timethe ATM card is operatively coupled to the ATM 102for establishinga secured communication channel between the card and the ATM 102.
[0088] In an embodiment, the ATM card can be operatively coupled to the ATM
102by any or a combination of a contact mode or a contact-less mode. In the contact mode, the ATM card can be inserted in the ATM 102 or can be placed on the ATM 102. In the contact-less mode, the ATM card can be operatively coupled to the ATM 102through awireless communication module.
[0089] In an embodiment, when a card identification code is to be generated for the
first time, the ATM card is required to be operatively coupled to the ATM 102. The RFID card reader/ writer 302 associated with the ATM 102 can read card attributes associated with the RFID tag 306 associated with the ATM card. A card identification code can be generated based on interrogation associated with the received card attributes. The cryptography generator 106can generate a key code for the card. The generated key code can be associated with the received card attributes.The RFID card reader/ writer 302associated with the ATM 102can write the generated key code on the RFID tag 306associated with the ATM card.The generated key code can also be stored in the first dataset, including pre-stored key codes. The first dataset can be associated with a bank server 410.
[0090] In an embodiment, an RSSI (Received Signal Strength Indicator) module can
be used to convert a set of radio signals generated by RFIDcard reader/ writer 302 and RFID
tag 306 into a readable/ writable form. The RSSI module can also be utilized to identify
signal strength the generated set of radio signals.In another embodiment, the cryptography
generator 106 can generate the keycode using Rivest - Shamir - Adleman algorithm.
[0091] Those skilled in the art would appreciate that the above-mentioned aspects
related to the cryptography generator 106 can also generate a key code using triple DES algorithm, blowfish algorithm, AES algorithm, and SHA algorithm, without deviating from the scope of the present disclosure.
[0092] In anembodiment, when at least one transaction is to be performed, the ATM
card can beoperatively coupled to the ATM 102. The card identificationcode is required to be entered through an input device. The ATM can authenticate the ATM card based on a positive comparison of the entered card identification code and a second dataset, including pre-stored card identificationcodes. Thecard identification code can be entered using an input device such as a keyboard, touch screen, and mouse, but not limited to the likes. The second dataset can be associated with the bank server 410.
[0093] In another embodiment,the RFID card reader/ writer 302 associated with the
ATM 102 can retrieve thekey code from the ATM card. TheATM card can be authenticatedbased on a positive comparison of the extracted key codeof the card and the first dataset, including pre-stored key codes. When the ATM card is authenticated,cryptography generator 106 can generate a configured key code. TheRFID card reader/ writer 302associated with the ATM 102 can enable storing the generated key code on the RFID tag 306 associated with the ATM card. The generated key code can be stored in the first dataset associated with the bank server 410.When the card is authenticated, a secured communication channel can be established between the ATM card and the ATM 102.
[0094] In an embodiment, the secured communication channel can be established
between the ATM card and the ATM 102 for a pre-defined timeperiod.
[0095] In an embodiment, the ATM can terminate the establishment ofa secured
communication channel between the ATM card and the ATM 102basedon a negative comparison of the extracted first key code of the card with the first dataset including pre-stored first key codes.
[0096] In another embodiment, the ATM can issue a warning signal based on a
negative comparison of the extracted key code of the card and with the first dataset, including
pre-stored first key codes. In an exemplary embodiment, the issued warning signal can
indicate detection of the ATM card cloning.
[0097] Those skilled in the art would appreciate that the above-mentioned
embodiments associated with the system 400 for securing an ATM transaction can also be
utilized to secure transaction associated with a passport, a ticket or a payment cards. The
embodiments of the above system can also be utilized when a card is used as a barcode, to
identify a product when the card/ barcode is attached to the product, without deviating from
the scope of the present disclosure.
[0098] FIG. 5 illustrates an exemplary flow diagram for securing communication
between a card and a card machine in accordance with an embodiment of the present
disclosure.
[0099] In context of the flow diagram 500 of the proposed method for securing
communication between a card and a card machine 102, step 502 pertains toextracting, by
one or more processorsof a processing engine that forms part of the card machine 102,a first
key code ofa card. The first key code can be extracted from the card when the card is
operatively coupled to the card machine 102.The first key code can be stored on a memory
associated with the card.
[00100] In an embodiment, the method can include a step 504 of authenticating, by the
one or more processors, the card by comparing the first key code associated with the card
extracted in the step 502 with a first dataset comprising a set of pre-stored key codes.
[00101] In an embodiment, the method can include a step 506 ofgenerating, by the one
or more processors, a second key code responsive to positive authentication of the card in the
step 504.
[00102] In an embodiment, the method can include a step 508 ofreplacing, by the one
or more processors, the first key code of the card with the second key code generatedin the
step 506. In another embodiment, the pre-stored first key code of the card can be replaced
with the generated second key code in the first dataset.
[00103] In an embodiment, the method can include a step (not shown)
ofauthenticating, by the one or more processors, a card identification code by comparing the
card identification code with a second dataset comprising a pre-stored card identification
code. The card identification code can be entered into the card machine 102 by a user using
input devices such as a keyboard, touch screen, mouse, and the likes.
[00104] In anembodiment, the first key code and the second key code can be generated
based on the card identification code and card attributes of the card.
[00105] In an embodiment, the card attributes can be any or a combination of tag ID,
card number, account number, and card authentication time.
[00106] In an embodiment, the method may include a step (not shown) of terminating
the secured communication channel between the card and the card machine 102 responsive to
negative authentication of the card. In another embodiment, the method may include a step of
generating a warning signal responsive to the negative authentication of the card.
[00107] Embodiments of the present disclosure may be implemented entirely
hardware, entirely software (including firmware, resident software, micro-code, etc.) or
combining software and hardware implementation that may all generally be referred to herein
as a "circuit," "module," "component," or "system." Furthermore, aspects of the present
disclosure may take the form of a computer program product comprising one or more
computer-readable media having computer-readable program code embodied thereon.
[00108] Thus, it will be appreciated by those of ordinary skill in the art that the
diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named.
[00109] As used herein, and unless the context dictates otherwise, the term "coupled
to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean "communicatively coupled with" over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[00110] It should be apparent to those skilled in the art that many more modifications
besides those already described are possible without departing from the inventive concepts
herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C .... and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[00111] While the foregoing describes various embodiments of the invention, other
and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE INVENTION
[00112] The present disclosure provides a system and method for securing
communication between a card and a card machine.
[00113] The present disclosure provides a system and method for generation of a real-
time key code based on card attributes of a card.
[00114] The present disclosure provides a system and method forsecuring ATM
communication between a card and a card machine using RFID technology.
[00115] The present disclosure provides a system and method fordetecting cloned card/
card cloning.
[00116] The present disclosure provides a system and method for establishment of a
secure, reliable and efficient communication channel between a card and a card machine to protect people from fraud through card cloning/ cloned card.
We Claim
1.A method for securing communication between a card and a card machine, the
method comprising the steps of:
extracting, by one or more processors of a processing engine that forms part of the card machine, a first key code of a card when the card is operatively coupled to a card machine, wherein the first key code is stored on a memory associated with the card;
authenticating, by the one or more processors, the card by comparing the extracted first key code associated with the card with a first dataset comprising a set of pre-stored key codes;
responsive to positive authentication of the card, generating, by the one or more processors, a second key code; and
replacing, by the one or more processors, the first key code of the card with the generated second key code,
wherein the pre-stored first key code of the card is replaced with the generated second key code in the first dataset;
wherein a secured communication channel is established between the card and the card machine responsive to positive authentication of the card.
2. The method as claimed in claim 1, wherein the method comprises a step of authenticating, by the one or more processors, a card identification code by comparing the card identification code with a second dataset comprising a pre-stored card identification code, and wherein the card identification code is entered into the card machine by a user using an input device.
3. The method as claimed in claim 2, wherein the first key code and the second key code are generated based on the card identification code and card attributes of the card.
4. The method as claimed in claim 3, wherein the card attributes are any or a combination of tag ID, card number, account number, and card authentication time.
5. The method as claimed in claim 1, wherein the method comprises a step of terminating the secured communication channel between the card and the card machine responsive to negative authentication of the card, and wherein the method comprises a step of generating a warning signal responsive to the negative authentication of the card.
The method as claimed in claim 1, wherein the one or more processors establishes the
secured communication channel between the card and the card machine for a
predefined time interval.
A system to secure communication between a card and a card machine, the system
comprising:
a card machine adapted to operatively couple a card to the card machine and configured to extract a first key code from the card;
a card processing unit operatively coupled to the card machine, the card processing unit comprising one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors and configured to:
receive the extracted first key code associated with the card;
authenticate the card by comparing the extracted first key code associated with the card with a first dataset comprising a set of pre-stored key codes;
generate a second key code responsive to positive authentication of the card; and
replace the first key code of the card with the generated second key code, wherein the pre-stored first key code of the card is replaced with the generated second key code in the first dataset; and
wherein a secured communication channel is established between the card and the card machine responsive to positive authentication of the card.
The system as claimed in claim 7, wherein the card machine comprises an RFID card reader/ writer, and the card comprises an RFID tag to store any or a combination of the first key code, the second key code, and the real-time card attributes, and wherein the card processing unit enables the RFID card reader/writer to extract the first key code from the RFID tag of the card, and further enables the RFID card reader/writer to store the generated second key code in the RFID tag of the card. The system as claimed in claim 7, wherein the system terminates the secure communication channel between the card and the card machine responsive to negative authentication of the card.
10. The system as claimed in claim 7, wherein the system generates a warning signal responsive to negative authentication of the card.
| # | Name | Date |
|---|---|---|
| 1 | 201911051946-STATEMENT OF UNDERTAKING (FORM 3) [14-12-2019(online)].pdf | 2019-12-14 |
| 2 | 201911051946-FORM FOR STARTUP [14-12-2019(online)].pdf | 2019-12-14 |
| 3 | 201911051946-FORM FOR SMALL ENTITY(FORM-28) [14-12-2019(online)].pdf | 2019-12-14 |
| 4 | 201911051946-FORM 1 [14-12-2019(online)].pdf | 2019-12-14 |
| 5 | 201911051946-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [14-12-2019(online)].pdf | 2019-12-14 |
| 6 | 201911051946-EVIDENCE FOR REGISTRATION UNDER SSI [14-12-2019(online)].pdf | 2019-12-14 |
| 7 | 201911051946-DRAWINGS [14-12-2019(online)].pdf | 2019-12-14 |
| 8 | 201911051946-DECLARATION OF INVENTORSHIP (FORM 5) [14-12-2019(online)].pdf | 2019-12-14 |
| 9 | 201911051946-COMPLETE SPECIFICATION [14-12-2019(online)].pdf | 2019-12-14 |
| 10 | 201911051946-FORM-26 [26-10-2022(online)].pdf | 2022-10-26 |
| 10 | abstract.jpg | 2020-01-03 |
| 11 | 201911051946-Proof of Right [03-02-2020(online)].pdf | 2020-02-03 |
| 12 | 201911051946-FORM-26 [03-02-2020(online)].pdf | 2020-02-03 |
| 13 | 201911051946-FORM 18 [03-09-2021(online)].pdf | 2021-09-03 |
| 14 | 201911051946-FER.pdf | 2022-04-26 |
| 15 | 201911051946-FORM-26 [26-10-2022(online)].pdf | 2022-10-26 |
| 16 | 201911051946-FER_SER_REPLY [26-10-2022(online)].pdf | 2022-10-26 |
| 17 | 201911051946-CORRESPONDENCE [26-10-2022(online)].pdf | 2022-10-26 |
| 18 | 201911051946-COMPLETE SPECIFICATION [26-10-2022(online)].pdf | 2022-10-26 |
| 19 | 201911051946-CLAIMS [26-10-2022(online)].pdf | 2022-10-26 |
| 20 | 201911051946-US(14)-HearingNotice-(HearingDate-17-03-2025).pdf | 2025-02-14 |
| 21 | 201911051946-FORM-26 [10-03-2025(online)].pdf | 2025-03-10 |
| 22 | 201911051946-Correspondence to notify the Controller [10-03-2025(online)].pdf | 2025-03-10 |
| 23 | 201911051946-Written submissions and relevant documents [01-04-2025(online)].pdf | 2025-04-01 |
| 24 | 201911051946-Annexure [01-04-2025(online)].pdf | 2025-04-01 |
| 25 | 201911051946-PatentCertificate30-05-2025.pdf | 2025-05-30 |
| 26 | 201911051946-IntimationOfGrant30-05-2025.pdf | 2025-05-30 |
| 1 | SearchStrategyMatrixE_25-04-2022.pdf |