US20020191788A1 - Credit or debit copy-protected optical disc - Google Patents
Credit or debit copy-protected optical disc Download PDFInfo
- Publication number
- US20020191788A1 US20020191788A1 US09/819,231 US81923101A US2002191788A1 US 20020191788 A1 US20020191788 A1 US 20020191788A1 US 81923101 A US81923101 A US 81923101A US 2002191788 A1 US2002191788 A1 US 2002191788A1
- Authority
- US
- United States
- Prior art keywords
- optical disc
- user
- copy
- credit
- debit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00659—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a control step which is implemented as an executable file stored on the record carrier
Definitions
- the present invention relates to a secure optical copy-protected disc.
- Cards and related materials find widespread use in modem society. They can be a convenient replacement to carrying large amounts of cash. They can also enable long-distance commerce, such as electronic commerce, in which the use of cash would be almost impossible.
- a credit or debit copy-protected optical disc for use with a CD-ROM drive to provide for payment over a network to a seller of supplies or services comprising:
- the RAM portion being adapted to be written on to include user-specific encrypted information which makes the hybrid optical disc unique for a specific user and in combination with the ROM preformed identification signature provides a user-personalized secure signature that permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the optical disc is secure from piracy.
- This invention permits a user to pay electronically, after verifying the authenticity of the user. It is a feature of the present invention that a pirate will have great difficulty in having an illicit payment charged to a user, since a user's charge number and expiration date is insufficient information to authorize payment.
- the hybrid optical disc itself must be used to authorize payment.
- An additional advantage of using the card itself as verification is that the card number can be a much longer number stored on the card itself.
- the hybrid optical credit card is highly copy-protected, and that the signature is highly protected, since the signature in the ROM portion is difficult to duplicate, and the user-specific information in the RAM portion is encrypted. Because of these two features, it is very difficult for a pirate to duplicate a disc or create a disc that would otherwise permit theft of product or services.
- Further advantages include additional security measures that are available as a result of the high data storage capacity (compared to a magnetic stripe on today's credit cards).
- User-selected personal information in a series of questions can be encrypted on the card to be used as a check later on (e.g. “What is your mother's maiden name?” or “What breed of dog do you own?”).
- Examples of other security measures that can be added include a voiceprint of the cardholder, which can be compared to a “live” voiceprint at the time of use.
- User benefits of such a system can include ease of use. For purchases, the users do not need to enter their name, address, or any other information. This can all be included on the card and transmitted automatically from any computer that has a CD reader. It is also possible for this to be used as a preloaded anonymous cash card from a home computer. No special equipment, such as that needed to read magnetic stripe cash cards or SmartCards, is necessary.
- FIG. 1 a shows an embodiment of a credit or debit copy-protected optical disc
- FIG. 1 b shows a schematic diagram of a substitution scheme of encryption
- FIG. 1 c shows a schematic diagram of a simple hiding scheme of encryption
- FIG. 1 d shows a schematic diagram of a more complex hiding scheme of encryption
- FIG. 2 a shows a method of forming a secure signature
- FIG. 2 b is a schematic view of how the various software routines interact to verify authenticity and decrypt the encrypted data in a secure manner
- FIG. 3 is a schematic diagram of the software technique to encrypt the client application in a non-copyable way
- FIG. 4 is a block diagram that shows a method of manufacturing the optical part of an optical credit card
- FIG. 5 shows another embodiment of this invention as an optical cash-equivalent card
- FIG. 6 is a block diagram that shows a method of manufacturing an optical cash-equivalent card
- FIG. 7 is a schematic diagram of the use of this invention over a network connection
- FIG. 8 is a block diagram showing the basic process by which the end-user would use a card according to this invention over a network connection;
- FIG. 9 a is a block diagram showing more details of the secure steps in the connection and purchasing process
- FIG. 9 b is a block diagram showing more details of the secure steps in the connection and purchasing process in which interactive questions are asked by the remote site;
- FIG. 9 c is a block diagram showing more details of the secure steps in the connection and purchasing process in which interactive questions are asked locally;
- FIG. 9 d is a block diagram showing an example of interactive questions
- FIG. 10 is a block diagram showing a way of managing financial transactions if the card is used as a credit card or debit card;
- FIG. 11 a is a block diagram showing one way of managing financial transactions if the card is used as a cash card
- FIG. 11 b is a block diagram showing another way of managing financial transactions if the card is used as a cash card
- FIG. 12 is a schematic showing the public keys available for encryption and their complementary private keys.
- FIG. 13 is a block diagram which shows how the public and private keys are used in this invention to create a secure channel f preformed identification signature or communication for transmitting the card identification.
- FIG. 1 a we see a first embodiment in accordance with this invention.
- This is a hybrid optical disc that can function as a credit-type card.
- It is a credit or debit copy-protected optical disc 10 that is a hybrid optical disc; that is, it includes both a mastered pre-recorded area, also known as a ROM portion 14 , and a recordable area, also known as a RAM portion 16 .
- the credit or debit copy-protected optical disc 10 can be in various sizes or shapes, e.g. a disc, a square card, or a card the size and shape of a credit card, so long as it is of a size and symmetry to be usable in a conventional optical disc drive (e.g.
- ROM portion 14 is a mastered session; that is, a master disc was created including supplied software or data in the first session, and was subsequently used, either directly or through intermediate “Father” and “Mother” discs-to stamp multiple uncustomized copies of the disc.
- RAM portion 16 can be a written session, or can be a writeable area within ROM portion 14 utilizing the techniques for creating and writing such areas.
- the credit or debit copy-protected optical disc 10 can also include further writeable area 20 , which can be written on using a standard optical disc writer (e.g. CD-R, CD-RW).
- the credit or debit copy-protected optical disc 10 further includes a preformed identification number or preformed identification signature 22 , which is a digital signal recorded during the mastering process and subsequently pressed into each credit or debit copy-protected optical disc 10 .
- Preformed identification signature 22 is recorded in such a way (e.g. in the ATIP signal) as to make it difficult for a pirate to copy.
- the credit or debit copy-protected optical disc 10 further includes a unique identification number or unique ID, also known as user-specific encrypted information 24 , that is written in one or more known absolute sector addresses in an encrypted manner.
- User-specific encrypted information 24 serves to make each credit or debit copy-protected optical disc 10 unique or personalized by virtue of the fact that each user-specific encrypted information 24 written to the credit or debit copy-protected optical disc 10 is a unique combination of numbers and/or letters and other characters. While user-specific encrypted information 24 in RAM portion 16 is shown in the second session, it will be understood that it can be written into another session.
- the credit or debit copy-protected optical disc 10 can further include an encrypted client application package 26 and other user-specific personalized information 15 (e.g. name, address, etc.) which can optionally be encrypted.
- FIGS. 1 b , 1 c , and 1 d we see schematic diagrams of several example methods of encryption.
- FIG. 1 b shows a substitution scheme in which the symbols of unique identification 65 are replaced, on an individual basis or in blocks, with other symbols or groups of symbols.
- FIG. 1 c shows a simple hiding scheme in which unique identification 65 is hidden among a longer series of symbols. Its position and length must be known to effect decryption.
- FIG. 1 b shows a substitution scheme in which the symbols of unique identification 65 are replaced, on an individual basis or in blocks, with other symbols or groups of symbols.
- FIG. 1 c shows a simple hiding scheme in which unique identification 65 is hidden among a longer series of symbols. Its position and length must be known to effect decryption.
- FIG. 1 b shows a substitution scheme in which the symbols of unique identification 65 are replaced, on an individual basis or in blocks, with other symbols or groups of symbols.
- FIG. 1 c shows a simple hiding scheme in which unique identification 65 is hidden among
- 1 d shows a more complex hiding scheme in which the symbols of unique identification 65 are scrambled, either individually or in groups, and hidden among a larger series of symbols.
- This invention can use one or more of these or other schemes to write user-specific encrypted information 24 in an encrypted manner to RAM portion 16 of credit or debit copy-protected optical disc 10 .
- Preformed identification signature 22 and user-specific encrypted information 24 are concatenated to provide user-personalized secure signature 8 .
- the user-personalized signature 8 permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the optical disc is secure from piracy.
- FIG. 2 b we see a schematic view of one way that the authentication is done in a secure manner.
- This can be effected by using two routines which can communicate with each other from physically-separated but connected computers, i.e. over a network 19 (e.g. the Internet) in a secure manner.
- the first routine is commerce site application or remote site application 21 , which exists on the commerce site or a support site, and can verify the authenticity of credit or debit copy-protected optical disc 10 .
- the second routine is client application 25 , which is originally encrypted on credit or debit copy-protected optical disc 10 as encrypted client application package 26 .
- Client application 25 is designed to read (step 29 ) preformed identification signature 22 and user-specific encrypted information 24 from credit or debit copy-protected optical disc 10 , create user-personalized secure signature 8 , and send it in a secure message to remote site application 21 .
- Remote site application 21 first sends key request 23 , for a decryption key, to client application 25 .
- This transmission takes place over network 19 via any of a number of well-known protocols (e.g. TCP/IP, secure TCP/IP). Included in key request 23 is a message to use one of a number of private keys to sign the message when answering the request.
- Client application 25 returns the card number (e.g.
- remote site application 21 possesses the corresponding public key, and can verify the authenticity of the signed message 27 , and therefore of credit or debit copy-protected optical disc 10 .
- Encrypted client application package 26 is written to credit or debit copy-protected optical disc 10 . It includes client application 25 , which has been encrypted as encrypted client application 39 . Encrypted client application package 26 appears as a single executable program and includes self-extracting software 31 , which runs first. The encrypted client application package 26 also includes anti-hacking routines 33 to check for the presence of hacking software (e.g. kernel debuggers, SCSI debuggers, and device emulators) in memory when the program is run. There can also be a section of polymorphic data and/or commands 35 .
- hacking software e.g. kernel debuggers, SCSI debuggers, and device emulators
- Polymorphic code generally provides multiple paths which achieve the same results, but are constructed in such a way that a program follows a different path each time it executes. Polymorphic code is used to make the program more difficult to reverse-engineer.
- De-encrypting routines 37 are designed to use data on credit or debit copy-protected optical disc 10 (preformed identification signature 22 and user-specific encrypted information 24 ) to de-encrypt the encrypted client application 39 .
- Encrypted client application package 26 also includes a private keys area 41 , which includes private encryption keys that are used to verify the authenticity and integrity of credit or debit copy-protected optical disc 10 in a secure manner by utilizing public key encryption.
- FIG. 4 we see a block diagram showing one method for producing the optical part of optical credit-type cards.
- a credit or debit copy-protected optical disc 10 is mastered (step 30 ) using any of several well known mastering techniques for mastering hybrid optical discs. See, for example, above-cited, commonly assigned U.S. patent application Ser. No. 09/662,561.
- the hybrid optical disc master includes a first (mastered) session 14 , although it can also include other mastered sessions as well. Included in the master disc is preformed identification signature 22 .
- the master disc is then used in step 32 for the manufacture of credit or debit copy-protected optical discs 10 by standard stamping methods. At this point, a large number of identical credit or debit copy-protected optical discs 10 exist.
- step 34 the encrypting program 50 , which can be mastered onto credit or debit copy-protected optical disc 10 or located on a local hard drive or on a distributed network, is read into the memory of a computer.
- step 36 client application 25 is read into memory.
- the card issuer here defined as a person or entity using credit or debit copy-protected optical disc 10 to make credit or cash cards, puts credit or debit copy-protected optical disc 10 into the optical disc writer in step 38 .
- the card issuer designates the files to be encrypted (step 40 ).
- the value of preformed identification signature 22 is read from credit or debit copy-protected optical disc 10 (step 44 ) and user-specific encrypted information 24 is created (step 46 ).
- the security software When the security software has obtained preformed identification signature 22 and user-specific encrypted information 24 , it concatenates them in step 48 to create user-personalized secure signature 8 , which also serves as the encryption key.
- Encrypting program 50 uses user-personalized secure signature 8 with client application 25 in step 52 to create the encrypted client application 39 .
- the files that were encrypted in step 52 are then added as data files to self-extracting software 31 in step 58 .
- Self-extracting software 31 includes the subroutines required to read preformed identification signature 22 and user-specific encrypted information 24 from credit or debit copy-protected optical disc 10 , anti-hacking routines 33 to detect the presence of reverse engineering tools (e.g. kernel debuggers, SCSI debuggers, device emulators) in the memory of the computer. When the program is running the anti-hacking routines stop execution if reverse-engineering tools are detected. Self-extracting software 31 also includes de-encrypting routines 37 that decrypt and launch the execution of the software application. In step 62 , writing program 60 writes encrypted client application package 26 to credit or debit copy-protected optical disc 10 in RAM portion 16 .
- reverse engineering tools e.g. kernel debuggers, SCSI debuggers, device emulators
- FIG. 5 we see another embodiment in accordance with this invention.
- This is a hybrid optical disc that can be used as a prepaid-cash-type card with the value stored on the disc itself.
- the credit or debit copy-protected optical disc 28 includes both a mastered pre-recorded area, also known as a ROM portion 14 , a recordable area, also known as writeable area 20 , and an area of written data, also known as RAM portion 16 that serves as an individual security area. It has a hole 12 for a central spindle to spin the credit or debit copy-protected optical disc 28 .
- ROM portion 14 is a mastered session; that is, a master disc was created including supplied software or data in the first session, and was subsequently used, either directly or through intermediate “Father” and “Mother” discs-to stamp multiple uncustomized copies of credit or debit copy-protected optical disc 28 .
- Credit or debit copy-protected optical disc 28 also includes at least one written (value) area 18 that serves to record the cash or equivalent value 17 remaining.
- the credit or debit copy-protected optical disc 28 further includes a preformed identification number or preformed identification signature 22 , which is a digital signal recorded during the mastering process and subsequently pressed into each credit or debit copy-protected optical disc 28 .
- the credit or debit copy-protected optical disc 28 further includes a unique identification number or unique ID, also known as user-specific encrypted information 24 that is written in one or more known absolute sector addresses.
- the credit or debit copy-protected optical disc 28 further includes encrypted client application package 26 .
- FIG. 6 we see a block diagram showing a method for producing the optical part of optical prepaid-cash-type cards.
- a hybrid optical disc is mastered (step 30 ) using any of several well known mastering techniques for mastering compact discs. See, for example, commonly assigned U.S. patent application Ser. No. 09/393,527 filed Sep. 10, 1999, entitled “System for Making a Photoresist Master for a Hybrid Optical Recording Disc”, by Ha et al, the disclosure of which is incorporated by reference.
- the hybrid optical disc master includes a ROM portion 14 , although it can also include other mastered sessions as well. Included in the master disc is a preformed identification signature 22 .
- the master disc is then used in step 32 for the manufacture of credit or debit copy-protected optical discs 28 by standard stamping methods. At this point, a large number of identical credit or debit copy-protected optical discs 28 exist.
- step 34 encrypting program 50 , which can be mastered onto credit or debit copy-protected optical disc 28 or located on a local hard drive or on a distributed network, is read into the memory of a computer.
- client application 25 is read into memory.
- the card issuer here defined as a person or entity using credit or debit copy-protected optical disc 28 to make cash cards, puts credit or debit copy-protected optical disc 28 into the CD-ROM writer in step 38 .
- the card issuer designates the files to be encrypted (step 40 ).
- the value of preformed identification signature 22 is read from credit or debit copy-protected optical disc 28 (step 44 ) and user-specific encrypted information 24 is created (step 46 ).
- the security software When the security software has obtained preformed identification signature 22 and user-specific encrypted information 24 , it concatenates them in step 48 to create user-personalized secure signature 8 , which also serves as the encryption key.
- Encrypting program 50 uses user-personalized secure signature 8 with client application 25 in step 52 to create encrypted client application 39 .
- the files that were encrypted in step 52 are then added as data files to self-extracting software 31 in step 58 .
- Self-extracting software 31 includes the subroutines required to read preformed identification signature 22 and user-specific encrypted information 24 from credit or debit copy-protected optical disc 28 .
- the self-extracting software 31 also includes anti-hacking routines 33 to detect the presence of reverse engineering tools (e.g. kernel debuggers, SCSI debuggers, and device emulators) in the memory of the computer. When the program is running the anti-hacking routines stop execution if reverse-engineering tools are detected.
- Self-extracting software 31 also includes de-encrypting routines 37 that decrypt and launch the execution of the software application.
- writing program 60 writes encrypted client application package 26 to credit or debit copy-protected optical disc 28 in RAM portion 16 .
- step 64 which can be performed at a later time, the cash or equivalent value 17 is written to credit or debit copy-protected optical disc 28 in written (value) area 18 .
- FIG. 7 we see a schematic diagram of the use of this invention over Internet or other network 19 .
- Personal computer 72 which includes a CD-ROM drive that can be embodied either in a CD reader 73 or CD reader/writer 73 a .
- the CD-ROM drive can be at the end-user's home site 70 , and is connected via the Internet or other network 19 to a network (commerce) site 76 .
- Network (commerce) site 76 can also be intimately connected to support site 82 (e.g. a banking site or a credit card site).
- an end-user places his/her credit or debit copy-protected optical disc 10 into CD reader 73 or CD reader/writer 73 a in personal computer 72 .
- Information is transferred between credit or debit copy-protected optical disc 10 and network (commerce) site 76 via a secure connection. This information transfer can be either initiated by client application 25 on credit or debit copy-protected optical disc 10 (CD-Push operation 78 ) or by network (commerce) site 76 (Web-Pull operation 80 ). Information is also transferred between network (commerce) site 76 and support site 82 . This allows the transaction to be transacted properly at the financial institution or credit clearance center.
- FIG. 8 we see a block diagram showing the basic process by which the end-user would use a hybrid optical disc according to this invention over the Internet or other network 19 .
- this follows standard steps for network shopping up to the point of selecting a payment method.
- an end-user visits network (commerce) site 76 and proceeds to select items to purchase (step 92 ) and then indicate purchase completion (step 94 ).
- the end-user can select in step 96 to make payment for ordered products or services by optical card.
- the site requests that the end-user load credit or debit copy-protected optical disc 10 in CD reader 73 or CD reader/writer 73 a (step 98 ), which the end-user does (step 100 ).
- Inclusive step 135 refers to a series of steps that will vary slightly depending upon the type of card. This will be described in further detail in this description. The general steps are that client application 25 on credit or debit copy-protected optical disc 10 autolaunches or is launched by the end-user or by network (commerce) site 76 (step 105 ). Client application 25 establishes a secure transmission link with network (commerce) site 76 in step 110 . In step 115 , network (commerce) site 76 and support site 82 can determine if the transaction will be valid financially. If it is not, the transaction is canceled (step 120 ). If the transaction is valid, funds are transferred (i.e. the user's account is debited) in step 125 and network (commerce) site 76 can ship the merchandise (step 130 ).
- FIG. 9 a we see a block diagram showing more details of the steps in the purchasing process and especially of providing a high degree of assurance that the information on credit or debit copy-protected optical disc 10 is secure from piracy. This was shown in less detail as block 135 in FIG. 8.
- Some of the elements were disclosed by Barnard et al in the above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333, filed Jan. 29, 2001, entitled “Copy Protection Using a Preformed ID and a Unique ID on a Programmable CD-ROM, the disclosure of which is incorporated by reference.
- encrypted client application package 26 is launched automatically or is selected to run.
- Encrypted client application package 26 includes anti-hacking routines 33 that first look (step 132 ) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protected optical disc 10 . If this hacking software is found, the execution of the program stops (step 134 ). If no such software is found, the self-extracting software 31 proceeds to read preformed identification signature 22 (step 136 ) and user-specific encrypted information 24 (step 138 ).
- hacking software e.g. kernel debuggers, SCSI debuggers, device emulators
- step 140 The two ID's are concatenated in step 140 to get user-personalized secure signature 8 , which also serves as the decryption key that is used to decrypt the encrypted client application 39 in step 142 .
- step 144 if the decryption is improper, the program stops (step 134 ).
- client application 25 is launched in step 146 .
- Client application 25 then establishes a secure connection with network (commerce) site 76 in step 110 .
- a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.
- Remote site application 21 randomly chooses a secure channel from those available to it (step 148 ) and sends client application 25 a key request 23 for user-personalized secure signature 8 sent in a signed message 27 (step 150 ).
- Client application 25 then creates a message which includes user-personalized secure signature 8 , signs the message with the private key requested by remote site application 21 , and sends signed message 27 to remote site 76 (step 152 ).
- Remote site application 21 receives signed message 27 and, in step 154 , uses the selected public key to verify the identity of credit or debit copy-protected optical disc 10 . If the check fails, the process stops (step 134 ) and no further financial transactions are performed. Presumably this is because credit or debit copy-protected optical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signed message 27 is valid, and therefore credit or debit copy-protected optical disc 10 is valid, remote site application 21 and client application 25 continue with the financial transaction steps (step 156 ), which will be discussed in more detail below.
- FIG. 9 b we see a block diagram showing more details of the steps in the purchasing process in which interactive questions are asked by the remote site. These questions are used to verify the authenticity of the user. This was shown in less detail as block 135 in FIG. 8. Some of the elements were disclosed in the above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333.
- encrypted client application package 26 is launched automatically or is selected to run.
- Encrypted client application package 26 includes anti-hacking routines 33 that first look (step 132 ) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protected optical disc 10 . If this hacking software is found, the execution of the program stops (step 134 ). If no such software is found, the self-extracting software 31 proceeds to read preformed identification signature 22 (step 136 ) and user-specific encrypted information 24 (step 138 ).
- hacking software e.g. kernel debuggers, SCSI debuggers, device emulators
- step 140 The two ID's are concatenated in step 140 to get user-personalized secure signature 8 , which also serves as the decryption key used to decrypt encrypted client application 39 in step 142 .
- step 144 if the decryption is improper, the program stops (step 134 ).
- client application 25 is launched in step 146 .
- Client application 25 then establishes a secure connection with network (commerce) site 76 in step 110 .
- a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.
- Remote site application 21 randomly chooses a secure channel from those available to it (step 148 ) and sends client application 25 a key request 23 for user-personalized secure signature 8 sent in a signed message 27 (step 150 ).
- Client application 25 then creates a message which includes user-personalized secure signature 8 , signs the message with the private key requested by remote site application 21 , and sends signed message 27 to remote site 76 (step 152 ).
- Remote site application 21 receives signed message 27 and, in step 154 , uses the selected public key to verify the identity of credit or debit copy-protected optical disc 10 . If the check fails, the process stops (step 134 ) and no further financial transactions are performed. Presumably this is because credit or debit copy-protected optical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signed message 27 is valid, and therefore credit or debit copy-protected optical disc 10 is valid, remote site application 21 asks the user one or more interactive questions, which the user must answer properly to authenticate that the user is the assigned owner of the disc (step 155 ). If the user's answers are not valid (step 157 ), the process stops (step 134 ). If the user's answers are valid, remote site application 21 and client application 25 continue with the financial transaction steps (step 156 ), which will be discussed in more detail below.
- FIG. 9 c we see a block diagram showing more details of the steps in the purchasing process in which interactive questions are asked locally and not over the network. This was shown in less detail as block 135 in FIG. 8. Some of the elements were disclosed in above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333.
- encrypted client application package 26 is launched automatically or is selected to run.
- Encrypted client application package 26 includes anti-hacking routines 33 that first look (step 132 ) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protected optical disc 10 . If this hacking software is found, the execution of the program stops (step 134 ). If no such software is found, the self-extracting software 31 proceeds to read preformed identification signature 22 (step 136 ) and user-specific encrypted information 24 (step 138 ).
- hacking software e.g. kernel debuggers, SCSI debuggers, device emulators
- step 140 The two ID's are concatenated in step 140 to get user-personalized secure signature 8 , which also serves as the decryption key used to decrypt encrypted client application 39 in step 142 .
- step 144 if the decryption is improper, the program stops (step 134 ).
- client application 25 is launched in step 146 .
- Client application 25 asks the user one or more interactive questions, which the user must answer properly to authenticate that the user is the assigned owner of the disc (step 147 ). The answers can be stored as part of user-specific encrypted information 24 or user-specific personalized information 15 . If the user's answers are not valid (step 157 ), the process stops (step 134 ). If the user's answers are valid, client application 25 then establishes a secure connection with network (commerce) site 76 in step 110 . Once the connection is established, a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.
- Remote site application 21 randomly chooses a secure channel from those available to it (step 148 ) and sends client application 25 a key request 23 for user-personalized secure signature 8 to be sent in a signed message 27 (step 150 ).
- Client application 25 then creates a message which includes user-personalized secure signature 8 , signs the message with the private key requested by remote site application 21 , and sends signed message 27 to remote site 76 (step 152 ).
- Remote site application 21 receives signed message 27 and, in step 154 , uses the selected public key to verify the identity of credit or debit copy-protected optical disc 10 . If the check fails, the process stops (step 134 ) and no further financial transactions are performed. Presumably this is because credit or debit copy-protected optical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signed message 27 is valid, and therefore credit or debit copy-protected optical disc 10 is valid, remote site application 21 and client application 25 continue with the financial transaction steps (step 156 ), which will be discussed in more detail below.
- step 260 the system (remote site application 21 or client application 25 ) asks the user interactive question 262 .
- the user enters answer 266 .
- the system can optionally ask further interactive questions 262 in step 268 . If answers 266 are not valid (step 157 ), the process stops (step 134 ) and the transaction is not allowed. If answers 266 are determined to be valid, the further steps of the process are allowed (step 156 ).
- step 160 network (commerce) site 76 sends information to support site 82 . This includes the card number and transaction amount, as well as any other information that support site 82 requires. Support site 82 decides if the transaction can be approved (step 162 ). If it cannot be approved, a message is sent back (step 164 ) that there is a problem, e.g. insufficient credit (for a credit card) or funds (for a debit card). The transaction is then cancelled (step 166 ).
- a problem e.g. insufficient credit (for a credit card) or funds (for a debit card).
- step 162 If the transaction is approved in step 162 , the credit card account is charged (for a credit account) or the associated account is debited (for a debit card) and credited to the merchant's network (commerce) site 76 in step 168 . A message is sent back to network (commerce) site 76 that the financial part of the transaction has been completed (step 170 ). In step 172 , the transaction is finalized, i.e. the merchandise is released for shipment to the end-user, and it is then shipped (step 174 ).
- FIG. 11 a we see the financial transaction steps if credit or debit copy-protected optical disc 10 is being used as a cash card with the cash or equivalent value stored on a central server. This is similar to the use of a credit card or debit card, but there are several possible differences. One is that the user can be anonymous; only credit or debit copy-protected optical disc 10 itself needs to be verified as authentic. Another is that the value can be other than cash (e.g. minutes for a service, such as telephone service).
- network (commerce) site 76 sends information to support site 82 . This includes the card number or user-personalized secure signature 8 and transaction amount, as well as any other information that support site 82 requires.
- User-personalized secure signature 8 for this type of credit or debit copy-protected optical disc 10 can include pre-payment information 161 .
- the user-personalized secure signature 8 includes the pre-payment information 161 that permits pre-payment in whole or in part for services or products to be ordered.
- Pre-payment information 161 is defined as the amount of pre-payment, that is, the initial value of credit or debit copy-protected optical disc 10 .
- This pre-payment value can be a fixed amount for a given group of discs, or can depend on the amount pre-paid by the user.
- Support site 82 decides if the transaction can be approved (step 162 ).
- Support site 82 can choose to accept credit or debit copy-protected optical disc 10 as full payment or as partial payment for services or products to be offered. If the transaction cannot be approved, a message is sent back (step 176 ) that there is a problem, e.g. insufficient funds remain for the card. The transaction is then cancelled (step 166 ).
- step 162 If the transaction is approved in step 162 , the cash or equivalent value is debited and credited to the merchant's network (commerce) site 76 in step 178 . A message is returned to network (commerce) site 76 that the financial part of the transaction has been completed (step 170 ). In step 172 , the transaction is finalized, i.e. the merchandise is released for shipment to the end-user, and it is then shipped (step 174 ).
- FIG. 11 b we see a method for achieving this.
- the cash or equivalent value 17 already exists on credit or debit copy-protected optical disc 28 in written (value) area 18 (FIG. 5).
- the user must have a CD reader/writer 73 a in which credit or debit copy-protected optical disc 28 is loaded in step 100 a .
- network (commerce) site 76 requests cash or equivalent value 17 .
- Client application 25 reads cash or equivalent value 17 from credit or debit copy-protected optical disc 28 and sends it to network (commerce) site 76 (step 182 ).
- Network (commerce) site 76 forwards this information to support site 82 (step 184 ).
- support site 82 decides if the transaction is approved. If it is not approved, a message is sent back, e.g. insufficient funds are available for the purchase or the cash funds are not available to be transferred (step 188 ) and the transaction is cancelled (step 190 ).
- step 192 a message is returned to network (commerce) site 76 stating so (step 192 ).
- step 194 the network (commerce) site 76 orders the client application 25 to write the new cash or equivalent value, deducting the purchase funds.
- client application 25 writes the new cash or equivalent value on credit or debit copy-protected optical disc 28 via CD reader/writer 73 a (step 196 ).
- step 198 client application 25 signals network (commerce) site 76 that the value has been written (step 198 ).
- network (commerce) site 76 notifies support site 82 in step 200 that the requisite finds can be transferred.
- step 202 support site 82 transfers the funds to the commerce site's account.
- the merchandise is released (step 204 ) and shipped (step 206 ).
- Client application 25 has been provided with private key series 230 , which is stored in private keys area 41 . These private keys are capable of decrypting messages that have been encrypted with the corresponding public key, and they are also capable of signing messages in a secure way.
- Remote site application 21 also includes public key series 232 , corresponding to private key series 230 .
- Public key series 232 can include the entire set of keys included in private key series 230 , or it can be a subset of private key series 230 . The latter allows certain keys to be maintained exclusively for one application or one vendor without modifying client application 25 . If the security of any key is compromised, that key can be simply removed from the remote site application 21 , and the security breach is closed.
- Remote site application 21 randomly selects a public key “X” from public key series 232 , which gives selected public key 256 .
- Remote site application 21 sends key request 23 to client application 25 and indicates in key request 23 which key has been selected to be selected public key 256 .
- Client application 25 selects the corresponding private key from private key series 230 to give selected private key 254 .
- the selected public key 256 selected private key 254 pair form public/private key channel 258 .
- Client application 25 uses selected private key 254 to sign signed message 27 that is sent to remote site application 21 .
- step 210 network (commerce) site 76 randomly selects selected public key 256 from public key series 232 .
- step 212 network (commerce) site 76 sends key request 23 to client application 25 to use public/private key channel 258 (i.e. the random key it has selected).
- Client application 25 formats the card ID into a message (step 214 ) which it then signs with selected private key 254 (step 216 ).
- Client application 25 then sends signed message 27 to network (commerce) site 76 (step 218 ).
- Remote site application 21 receives signed message 27 and uses selected public key 256 to verify signed message 27 (step 220 ). If the signature is not valid (step 222 ), the process stops (step 224 ). If the signature is valid, the process then continues (step 226 ) as described earlier.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Optical Record Carriers And Manufacture Thereof (AREA)
- Optical Recording Or Reproduction (AREA)
Abstract
A credit or debit copy-protected optical disc for use with a CD-ROM drive to provide for payment over a network to a seller of supplies or services comprising: a hybrid optical disc having a ROM portion and a RAM portion; the ROM portion including a preformed identification signature which is impressed into the ROM portion of the hybrid optical disc and is arranged to be difficult for a pirate to copy; and the RAM portion being adapted to be written on to include user-specific encrypted information which makes the hybrid optical disc unique or personalized for a specific user and in combination with the ROM preformed identification signature provides a user-personalized secure signature that permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the optical disc is secure from piracy.
Description
- Reference is made to commonly assigned U.S. patent application Ser. No. filed concurrently herewith, entitled “Catalog Merchandising Using Hybrid Optical Disc” by Mueller et al; U.S. patent application Ser. No. 09/393,527 filed Sep. 10, 1999, entitled “Hybrid Optical Recording Disc with Copy Protection” by Ha et al, and U.S. patent application Ser. No. 09/772,333 filed Jan. 29, 2001, entitled “Copy Protection Using a Preformed ID and a Unique ID on a Programmable CD-ROM” by Barnard et al, the disclosures of which are incorporated herein by reference.
- The present invention relates to a secure optical copy-protected disc.
- Credit cards and related materials (debit cards, cash cards) find widespread use in modem society. They can be a convenient replacement to carrying large amounts of cash. They can also enable long-distance commerce, such as electronic commerce, in which the use of cash would be almost impossible.
- However, they have a distinct disadvantage in long-distance commerce. In personal transactions, the buyer uses the card itself in the transaction. In long-distance commerce, the buyer merely provides pertinent information that is printed on the card. This opens up the possibility of abuse of the card by another person who has obtained the information on the card, but not the card itself. The owner of the card may not even be aware of this theft, since the card remains in his or her possession, and may only find out weeks later when a number of illicit charges appear on their bill.
- Credit cards today do include coded information recorded on a magnetic stripe on the back of the card. While this is convenient for personal shopping, as most merchants have readers for the stripe, such equipment is generally not available to the consumer who is shopping from home.
- It is therefore an object of the present invention to provide a secure credit or debit card.
- It is a further object of the present invention to provide for payment by using a credit card in long-distance commerce over a network that is highly protected and provides a user with a high degree of confidence that payment information is secure.
- It is a further object of the present invention to provide a credit card that can be used with commercially available computer equipment at a user's work or home facility.
- These objects are achieved by a credit or debit copy-protected optical disc for use with a CD-ROM drive to provide for payment over a network to a seller of supplies or services comprising:
- (a) a hybrid optical disc having a ROM portion and a RAM portion;
- (b) the ROM portion including a preformed identification signature which is impressed into the ROM portion of the hybrid optical disc and is arranged to be difficult for a pirate to copy; and
- (c) the RAM portion being adapted to be written on to include user-specific encrypted information which makes the hybrid optical disc unique for a specific user and in combination with the ROM preformed identification signature provides a user-personalized secure signature that permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the optical disc is secure from piracy.
- This invention permits a user to pay electronically, after verifying the authenticity of the user. It is a feature of the present invention that a pirate will have great difficulty in having an illicit payment charged to a user, since a user's charge number and expiration date is insufficient information to authorize payment. The hybrid optical disc itself must be used to authorize payment.
- An additional advantage of using the card itself as verification is that the card number can be a much longer number stored on the card itself.
- It is a feature of the present invention that the hybrid optical credit card is highly copy-protected, and that the signature is highly protected, since the signature in the ROM portion is difficult to duplicate, and the user-specific information in the RAM portion is encrypted. Because of these two features, it is very difficult for a pirate to duplicate a disc or create a disc that would otherwise permit theft of product or services.
- Further advantages include additional security measures that are available as a result of the high data storage capacity (compared to a magnetic stripe on today's credit cards). User-selected personal information in a series of questions can be encrypted on the card to be used as a check later on (e.g. “What is your mother's maiden name?” or “What breed of dog do you own?”). Examples of other security measures that can be added include a voiceprint of the cardholder, which can be compared to a “live” voiceprint at the time of use.
- User benefits of such a system can include ease of use. For purchases, the users do not need to enter their name, address, or any other information. This can all be included on the card and transmitted automatically from any computer that has a CD reader. It is also possible for this to be used as a preloaded anonymous cash card from a home computer. No special equipment, such as that needed to read magnetic stripe cash cards or SmartCards, is necessary.
- FIG. 1a shows an embodiment of a credit or debit copy-protected optical disc;
- FIG. 1b shows a schematic diagram of a substitution scheme of encryption;
- FIG. 1c shows a schematic diagram of a simple hiding scheme of encryption;
- FIG. 1d shows a schematic diagram of a more complex hiding scheme of encryption;
- FIG. 2a shows a method of forming a secure signature;
- FIG. 2b is a schematic view of how the various software routines interact to verify authenticity and decrypt the encrypted data in a secure manner;
- FIG. 3 is a schematic diagram of the software technique to encrypt the client application in a non-copyable way;
- FIG. 4 is a block diagram that shows a method of manufacturing the optical part of an optical credit card;
- FIG. 5 shows another embodiment of this invention as an optical cash-equivalent card;
- FIG. 6 is a block diagram that shows a method of manufacturing an optical cash-equivalent card;
- FIG. 7 is a schematic diagram of the use of this invention over a network connection;
- FIG. 8 is a block diagram showing the basic process by which the end-user would use a card according to this invention over a network connection;
- FIG. 9a is a block diagram showing more details of the secure steps in the connection and purchasing process;
- FIG. 9b is a block diagram showing more details of the secure steps in the connection and purchasing process in which interactive questions are asked by the remote site;
- FIG. 9c is a block diagram showing more details of the secure steps in the connection and purchasing process in which interactive questions are asked locally;
- FIG. 9d is a block diagram showing an example of interactive questions;
- FIG. 10 is a block diagram showing a way of managing financial transactions if the card is used as a credit card or debit card;
- FIG. 11a is a block diagram showing one way of managing financial transactions if the card is used as a cash card;
- FIG. 11b is a block diagram showing another way of managing financial transactions if the card is used as a cash card;
- FIG. 12 is a schematic showing the public keys available for encryption and their complementary private keys; and
- FIG. 13 is a block diagram which shows how the public and private keys are used in this invention to create a secure channel f preformed identification signature or communication for transmitting the card identification.
- Turning now to FIG. 1a, we see a first embodiment in accordance with this invention. This is a hybrid optical disc that can function as a credit-type card. It is a credit or debit copy-protected
optical disc 10 that is a hybrid optical disc; that is, it includes both a mastered pre-recorded area, also known as aROM portion 14, and a recordable area, also known as aRAM portion 16. The credit or debit copy-protectedoptical disc 10 can be in various sizes or shapes, e.g. a disc, a square card, or a card the size and shape of a credit card, so long as it is of a size and symmetry to be usable in a conventional optical disc drive (e.g. CD-ROM, CD-R, DVD, etc.). It has ahole 12 for a central spindle to spin the credit or debit copy-protectedoptical disc 10.ROM portion 14 is a mastered session; that is, a master disc was created including supplied software or data in the first session, and was subsequently used, either directly or through intermediate “Father” and “Mother” discs-to stamp multiple uncustomized copies of the disc.RAM portion 16 can be a written session, or can be a writeable area withinROM portion 14 utilizing the techniques for creating and writing such areas. The credit or debit copy-protectedoptical disc 10 can also include furtherwriteable area 20, which can be written on using a standard optical disc writer (e.g. CD-R, CD-RW). - The credit or debit copy-protected
optical disc 10 further includes a preformed identification number or preformedidentification signature 22, which is a digital signal recorded during the mastering process and subsequently pressed into each credit or debit copy-protectedoptical disc 10.Preformed identification signature 22 is recorded in such a way (e.g. in the ATIP signal) as to make it difficult for a pirate to copy. The credit or debit copy-protectedoptical disc 10 further includes a unique identification number or unique ID, also known as user-specificencrypted information 24, that is written in one or more known absolute sector addresses in an encrypted manner. User-specificencrypted information 24 serves to make each credit or debit copy-protectedoptical disc 10 unique or personalized by virtue of the fact that each user-specificencrypted information 24 written to the credit or debit copy-protectedoptical disc 10 is a unique combination of numbers and/or letters and other characters. While user-specificencrypted information 24 inRAM portion 16 is shown in the second session, it will be understood that it can be written into another session. The credit or debit copy-protectedoptical disc 10 can further include an encryptedclient application package 26 and other user-specific personalized information 15 (e.g. name, address, etc.) which can optionally be encrypted. - This type of hybrid disc, and also preformed
identification signature 22 and user-specificencrypted information 24, have already been described in detail in commonly-assigned U.S. patent application Ser. No. 09/662,561, filed Sep. 12, 2000, entitled “System For Making a Photoresist Master for a Hybrid Optical Recording Disc” by Ha et al, the disclosure of which is incorporated by reference. - By written in an encrypted manner, we mean written in such a way that the contents are not clear to a reader who does not know how the data is stored. Turning now to FIGS. 1b, 1 c, and 1 d, we see schematic diagrams of several example methods of encryption. FIG. 1b shows a substitution scheme in which the symbols of
unique identification 65 are replaced, on an individual basis or in blocks, with other symbols or groups of symbols. FIG. 1c shows a simple hiding scheme in whichunique identification 65 is hidden among a longer series of symbols. Its position and length must be known to effect decryption. FIG. 1d shows a more complex hiding scheme in which the symbols ofunique identification 65 are scrambled, either individually or in groups, and hidden among a larger series of symbols. This invention can use one or more of these or other schemes to write user-specificencrypted information 24 in an encrypted manner to RAMportion 16 of credit or debit copy-protectedoptical disc 10. - Turning now to FIG. 2a, we see one method of forming a secure signature.
Preformed identification signature 22 and user-specificencrypted information 24 are concatenated to provide user-personalizedsecure signature 8. As will become clear herein after, the user-personalizedsignature 8 permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the optical disc is secure from piracy. - Turning now to FIG. 2b, we see a schematic view of one way that the authentication is done in a secure manner. This can be effected by using two routines which can communicate with each other from physically-separated but connected computers, i.e. over a network 19 (e.g. the Internet) in a secure manner. The first routine is commerce site application or
remote site application 21, which exists on the commerce site or a support site, and can verify the authenticity of credit or debit copy-protectedoptical disc 10. The second routine isclient application 25, which is originally encrypted on credit or debit copy-protectedoptical disc 10 as encryptedclient application package 26.Client application 25 is designed to read (step 29) preformedidentification signature 22 and user-specificencrypted information 24 from credit or debit copy-protectedoptical disc 10, create user-personalizedsecure signature 8, and send it in a secure message toremote site application 21.Remote site application 21 first sendskey request 23, for a decryption key, toclient application 25. This transmission takes place overnetwork 19 via any of a number of well-known protocols (e.g. TCP/IP, secure TCP/IP). Included inkey request 23 is a message to use one of a number of private keys to sign the message when answering the request.Client application 25 returns the card number (e.g. user-specificencrypted information 24 or user-personalized secure signature 8) toremote site application 21 in signedmessage 27, which is signed with a private key.Remote site application 21 possesses the corresponding public key, and can verify the authenticity of the signedmessage 27, and therefore of credit or debit copy-protectedoptical disc 10. - Turning next to FIG. 3, we see a diagram of one way of encrypting
client application 25 for use in this invention. Encryptedclient application package 26 is written to credit or debit copy-protectedoptical disc 10. It includesclient application 25, which has been encrypted asencrypted client application 39. Encryptedclient application package 26 appears as a single executable program and includes self-extractingsoftware 31, which runs first. The encryptedclient application package 26 also includesanti-hacking routines 33 to check for the presence of hacking software (e.g. kernel debuggers, SCSI debuggers, and device emulators) in memory when the program is run. There can also be a section of polymorphic data and/or commands 35. Polymorphic code generally provides multiple paths which achieve the same results, but are constructed in such a way that a program follows a different path each time it executes. Polymorphic code is used to make the program more difficult to reverse-engineer.De-encrypting routines 37 are designed to use data on credit or debit copy-protected optical disc 10 (preformedidentification signature 22 and user-specific encrypted information 24) to de-encrypt theencrypted client application 39. Encryptedclient application package 26 also includes aprivate keys area 41, which includes private encryption keys that are used to verify the authenticity and integrity of credit or debit copy-protectedoptical disc 10 in a secure manner by utilizing public key encryption. - Turning now to FIG. 4, we see a block diagram showing one method for producing the optical part of optical credit-type cards. A credit or debit copy-protected
optical disc 10 is mastered (step 30) using any of several well known mastering techniques for mastering hybrid optical discs. See, for example, above-cited, commonly assigned U.S. patent application Ser. No. 09/662,561. The hybrid optical disc master includes a first (mastered)session 14, although it can also include other mastered sessions as well. Included in the master disc is preformedidentification signature 22. The master disc is then used instep 32 for the manufacture of credit or debit copy-protectedoptical discs 10 by standard stamping methods. At this point, a large number of identical credit or debit copy-protectedoptical discs 10 exist. - In
step 34, the encryptingprogram 50, which can be mastered onto credit or debit copy-protectedoptical disc 10 or located on a local hard drive or on a distributed network, is read into the memory of a computer. Instep 36,client application 25 is read into memory. The card issuer, here defined as a person or entity using credit or debit copy-protectedoptical disc 10 to make credit or cash cards, puts credit or debit copy-protectedoptical disc 10 into the optical disc writer instep 38. - The card issuer designates the files to be encrypted (step40). The value of preformed
identification signature 22 is read from credit or debit copy-protected optical disc 10 (step 44) and user-specificencrypted information 24 is created (step 46). When the security software has obtained preformedidentification signature 22 and user-specificencrypted information 24, it concatenates them instep 48 to create user-personalizedsecure signature 8, which also serves as the encryption key. Encryptingprogram 50 uses user-personalizedsecure signature 8 withclient application 25 instep 52 to create theencrypted client application 39. The files that were encrypted instep 52 are then added as data files to self-extractingsoftware 31 instep 58. Self-extractingsoftware 31 includes the subroutines required to readpreformed identification signature 22 and user-specificencrypted information 24 from credit or debit copy-protectedoptical disc 10,anti-hacking routines 33 to detect the presence of reverse engineering tools (e.g. kernel debuggers, SCSI debuggers, device emulators) in the memory of the computer. When the program is running the anti-hacking routines stop execution if reverse-engineering tools are detected. Self-extractingsoftware 31 also includesde-encrypting routines 37 that decrypt and launch the execution of the software application. Instep 62, writingprogram 60 writes encryptedclient application package 26 to credit or debit copy-protectedoptical disc 10 inRAM portion 16. - Turning now to FIG. 5, we see another embodiment in accordance with this invention. This is a hybrid optical disc that can be used as a prepaid-cash-type card with the value stored on the disc itself. The credit or debit copy-protected
optical disc 28 includes both a mastered pre-recorded area, also known as aROM portion 14, a recordable area, also known aswriteable area 20, and an area of written data, also known asRAM portion 16 that serves as an individual security area. It has ahole 12 for a central spindle to spin the credit or debit copy-protectedoptical disc 28.ROM portion 14 is a mastered session; that is, a master disc was created including supplied software or data in the first session, and was subsequently used, either directly or through intermediate “Father” and “Mother” discs-to stamp multiple uncustomized copies of credit or debit copy-protectedoptical disc 28. Credit or debit copy-protectedoptical disc 28 also includes at least one written (value)area 18 that serves to record the cash orequivalent value 17 remaining. - The credit or debit copy-protected
optical disc 28 further includes a preformed identification number or preformedidentification signature 22, which is a digital signal recorded during the mastering process and subsequently pressed into each credit or debit copy-protectedoptical disc 28. The credit or debit copy-protectedoptical disc 28 further includes a unique identification number or unique ID, also known as user-specificencrypted information 24 that is written in one or more known absolute sector addresses. The credit or debit copy-protectedoptical disc 28 further includes encryptedclient application package 26. - Turning now to FIG. 6, we see a block diagram showing a method for producing the optical part of optical prepaid-cash-type cards. A hybrid optical disc is mastered (step30) using any of several well known mastering techniques for mastering compact discs. See, for example, commonly assigned U.S. patent application Ser. No. 09/393,527 filed Sep. 10, 1999, entitled “System for Making a Photoresist Master for a Hybrid Optical Recording Disc”, by Ha et al, the disclosure of which is incorporated by reference. The hybrid optical disc master includes a
ROM portion 14, although it can also include other mastered sessions as well. Included in the master disc is a preformedidentification signature 22. The master disc is then used instep 32 for the manufacture of credit or debit copy-protectedoptical discs 28 by standard stamping methods. At this point, a large number of identical credit or debit copy-protectedoptical discs 28 exist. - In
step 34, encryptingprogram 50, which can be mastered onto credit or debit copy-protectedoptical disc 28 or located on a local hard drive or on a distributed network, is read into the memory of a computer. Instep 36,client application 25 is read into memory. The card issuer, here defined as a person or entity using credit or debit copy-protectedoptical disc 28 to make cash cards, puts credit or debit copy-protectedoptical disc 28 into the CD-ROM writer instep 38. - The card issuer designates the files to be encrypted (step40). The value of preformed
identification signature 22 is read from credit or debit copy-protected optical disc 28 (step 44) and user-specificencrypted information 24 is created (step 46). When the security software has obtained preformedidentification signature 22 and user-specificencrypted information 24, it concatenates them instep 48 to create user-personalizedsecure signature 8, which also serves as the encryption key. Encryptingprogram 50 uses user-personalizedsecure signature 8 withclient application 25 instep 52 to createencrypted client application 39. The files that were encrypted instep 52 are then added as data files to self-extractingsoftware 31 instep 58. Self-extractingsoftware 31 includes the subroutines required to readpreformed identification signature 22 and user-specificencrypted information 24 from credit or debit copy-protectedoptical disc 28. The self-extractingsoftware 31 also includesanti-hacking routines 33 to detect the presence of reverse engineering tools (e.g. kernel debuggers, SCSI debuggers, and device emulators) in the memory of the computer. When the program is running the anti-hacking routines stop execution if reverse-engineering tools are detected. Self-extractingsoftware 31 also includesde-encrypting routines 37 that decrypt and launch the execution of the software application. Instep 62, writingprogram 60 writes encryptedclient application package 26 to credit or debit copy-protectedoptical disc 28 inRAM portion 16. Instep 64, which can be performed at a later time, the cash orequivalent value 17 is written to credit or debit copy-protectedoptical disc 28 in written (value)area 18. - Turning now to FIG. 7, we see a schematic diagram of the use of this invention over Internet or
other network 19.Personal computer 72, which includes a CD-ROM drive that can be embodied either in aCD reader 73 or CD reader/writer 73 a. The CD-ROM drive can be at the end-user'shome site 70, and is connected via the Internet orother network 19 to a network (commerce)site 76. Network (commerce)site 76 can also be intimately connected to support site 82 (e.g. a banking site or a credit card site). - To pay for a purchase, an end-user places his/her credit or debit copy-protected
optical disc 10 intoCD reader 73 or CD reader/writer 73 a inpersonal computer 72. Information is transferred between credit or debit copy-protectedoptical disc 10 and network (commerce)site 76 via a secure connection. This information transfer can be either initiated byclient application 25 on credit or debit copy-protected optical disc 10 (CD-Push operation 78) or by network (commerce) site 76 (Web-Pull operation 80). Information is also transferred between network (commerce)site 76 andsupport site 82. This allows the transaction to be transacted properly at the financial institution or credit clearance center. - Turning now to FIG. 8, we see a block diagram showing the basic process by which the end-user would use a hybrid optical disc according to this invention over the Internet or
other network 19. Initially, this follows standard steps for network shopping up to the point of selecting a payment method. For example, instep 90, an end-user visits network (commerce)site 76 and proceeds to select items to purchase (step 92) and then indicate purchase completion (step 94). At this point, the end-user can select instep 96 to make payment for ordered products or services by optical card. The site requests that the end-user load credit or debit copy-protectedoptical disc 10 inCD reader 73 or CD reader/writer 73 a (step 98), which the end-user does (step 100). -
Inclusive step 135 refers to a series of steps that will vary slightly depending upon the type of card. This will be described in further detail in this description. The general steps are thatclient application 25 on credit or debit copy-protectedoptical disc 10 autolaunches or is launched by the end-user or by network (commerce) site 76 (step 105).Client application 25 establishes a secure transmission link with network (commerce)site 76 instep 110. Instep 115, network (commerce)site 76 andsupport site 82 can determine if the transaction will be valid financially. If it is not, the transaction is canceled (step 120). If the transaction is valid, funds are transferred (i.e. the user's account is debited) instep 125 and network (commerce)site 76 can ship the merchandise (step 130). - Turning now to FIG. 9a, we see a block diagram showing more details of the steps in the purchasing process and especially of providing a high degree of assurance that the information on credit or debit copy-protected
optical disc 10 is secure from piracy. This was shown in less detail asblock 135 in FIG. 8. Some of the elements were disclosed by Barnard et al in the above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333, filed Jan. 29, 2001, entitled “Copy Protection Using a Preformed ID and a Unique ID on a Programmable CD-ROM, the disclosure of which is incorporated by reference. - In
step 105, encryptedclient application package 26 is launched automatically or is selected to run. Encryptedclient application package 26 includesanti-hacking routines 33 that first look (step 132) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protectedoptical disc 10. If this hacking software is found, the execution of the program stops (step 134). If no such software is found, the self-extractingsoftware 31 proceeds to read preformed identification signature 22 (step 136) and user-specific encrypted information 24 (step 138). The two ID's are concatenated instep 140 to get user-personalizedsecure signature 8, which also serves as the decryption key that is used to decrypt theencrypted client application 39 instep 142. Instep 144, if the decryption is improper, the program stops (step 134). - If the decryption is successful,
client application 25 is launched instep 146.Client application 25 then establishes a secure connection with network (commerce)site 76 instep 110. Once the connection is established, a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.Remote site application 21 randomly chooses a secure channel from those available to it (step 148) and sends client application 25 akey request 23 for user-personalizedsecure signature 8 sent in a signed message 27 (step 150).Client application 25 then creates a message which includes user-personalizedsecure signature 8, signs the message with the private key requested byremote site application 21, and sends signedmessage 27 to remote site 76 (step 152). -
Remote site application 21 receives signedmessage 27 and, instep 154, uses the selected public key to verify the identity of credit or debit copy-protectedoptical disc 10. If the check fails, the process stops (step 134) and no further financial transactions are performed. Presumably this is because credit or debit copy-protectedoptical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signedmessage 27 is valid, and therefore credit or debit copy-protectedoptical disc 10 is valid,remote site application 21 andclient application 25 continue with the financial transaction steps (step 156), which will be discussed in more detail below. - Turning now to FIG. 9b, we see a block diagram showing more details of the steps in the purchasing process in which interactive questions are asked by the remote site. These questions are used to verify the authenticity of the user. This was shown in less detail as
block 135 in FIG. 8. Some of the elements were disclosed in the above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333. - In
step 105, encryptedclient application package 26 is launched automatically or is selected to run. Encryptedclient application package 26 includesanti-hacking routines 33 that first look (step 132) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protectedoptical disc 10. If this hacking software is found, the execution of the program stops (step 134). If no such software is found, the self-extractingsoftware 31 proceeds to read preformed identification signature 22 (step 136) and user-specific encrypted information 24 (step 138). The two ID's are concatenated instep 140 to get user-personalizedsecure signature 8, which also serves as the decryption key used to decryptencrypted client application 39 instep 142. Instep 144, if the decryption is improper, the program stops (step 134). - If the decryption is successful,
client application 25 is launched instep 146.Client application 25 then establishes a secure connection with network (commerce)site 76 instep 110. Once the connection is established, a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.Remote site application 21 randomly chooses a secure channel from those available to it (step 148) and sends client application 25 akey request 23 for user-personalizedsecure signature 8 sent in a signed message 27 (step 150).Client application 25 then creates a message which includes user-personalizedsecure signature 8, signs the message with the private key requested byremote site application 21, and sends signedmessage 27 to remote site 76 (step 152). -
Remote site application 21 receives signedmessage 27 and, instep 154, uses the selected public key to verify the identity of credit or debit copy-protectedoptical disc 10. If the check fails, the process stops (step 134) and no further financial transactions are performed. Presumably this is because credit or debit copy-protectedoptical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signedmessage 27 is valid, and therefore credit or debit copy-protectedoptical disc 10 is valid,remote site application 21 asks the user one or more interactive questions, which the user must answer properly to authenticate that the user is the assigned owner of the disc (step 155). If the user's answers are not valid (step 157), the process stops (step 134). If the user's answers are valid,remote site application 21 andclient application 25 continue with the financial transaction steps (step 156), which will be discussed in more detail below. - Turning now to FIG. 9c, we see a block diagram showing more details of the steps in the purchasing process in which interactive questions are asked locally and not over the network. This was shown in less detail as
block 135 in FIG. 8. Some of the elements were disclosed in above-cited, commonly-assigned U.S. patent application Ser. No. 09/772,333. - In
step 105, encryptedclient application package 26 is launched automatically or is selected to run. Encryptedclient application package 26 includesanti-hacking routines 33 that first look (step 132) for hacking software (e.g. kernel debuggers, SCSI debuggers, device emulators), which would enable a pirate to follow the workings of the programs on credit or debit copy-protectedoptical disc 10. If this hacking software is found, the execution of the program stops (step 134). If no such software is found, the self-extractingsoftware 31 proceeds to read preformed identification signature 22 (step 136) and user-specific encrypted information 24 (step 138). The two ID's are concatenated instep 140 to get user-personalizedsecure signature 8, which also serves as the decryption key used to decryptencrypted client application 39 instep 142. Instep 144, if the decryption is improper, the program stops (step 134). - If the decryption is successful,
client application 25 is launched instep 146.Client application 25 asks the user one or more interactive questions, which the user must answer properly to authenticate that the user is the assigned owner of the disc (step 147). The answers can be stored as part of user-specificencrypted information 24 or user-specificpersonalized information 15. If the user's answers are not valid (step 157), the process stops (step 134). If the user's answers are valid,client application 25 then establishes a secure connection with network (commerce)site 76 instep 110. Once the connection is established, a secure channel is selected from a multiplicity of such channels, each of which is a public key/private key combination.Remote site application 21 randomly chooses a secure channel from those available to it (step 148) and sends client application 25 akey request 23 for user-personalizedsecure signature 8 to be sent in a signed message 27 (step 150).Client application 25 then creates a message which includes user-personalizedsecure signature 8, signs the message with the private key requested byremote site application 21, and sends signedmessage 27 to remote site 76 (step 152). -
Remote site application 21 receives signedmessage 27 and, instep 154, uses the selected public key to verify the identity of credit or debit copy-protectedoptical disc 10. If the check fails, the process stops (step 134) and no further financial transactions are performed. Presumably this is because credit or debit copy-protectedoptical disc 10 is counterfeit or damaged in some way. If the public-key confirms that signedmessage 27 is valid, and therefore credit or debit copy-protectedoptical disc 10 is valid,remote site application 21 andclient application 25 continue with the financial transaction steps (step 156), which will be discussed in more detail below. - Turning now to FIG. 9d, we see a block diagram showing one example of interactive questions that can be asked of the user. In
step 260, the system (remote site application 21 or client application 25) asks the userinteractive question 262. Instep 264, the user entersanswer 266. The system can optionally ask furtherinteractive questions 262 instep 268. Ifanswers 266 are not valid (step 157), the process stops (step 134) and the transaction is not allowed. Ifanswers 266 are determined to be valid, the further steps of the process are allowed (step 156). - Turning now to FIG. 10, we see the financial transaction steps if the card is being used as a credit card or a debit card. In
step 160, network (commerce)site 76 sends information to supportsite 82. This includes the card number and transaction amount, as well as any other information that supportsite 82 requires.Support site 82 decides if the transaction can be approved (step 162). If it cannot be approved, a message is sent back (step 164) that there is a problem, e.g. insufficient credit (for a credit card) or funds (for a debit card). The transaction is then cancelled (step 166). - If the transaction is approved in
step 162, the credit card account is charged (for a credit account) or the associated account is debited (for a debit card) and credited to the merchant's network (commerce)site 76 instep 168. A message is sent back to network (commerce)site 76 that the financial part of the transaction has been completed (step 170). Instep 172, the transaction is finalized, i.e. the merchandise is released for shipment to the end-user, and it is then shipped (step 174). - Turning now to FIG. 11a, we see the financial transaction steps if credit or debit copy-protected
optical disc 10 is being used as a cash card with the cash or equivalent value stored on a central server. This is similar to the use of a credit card or debit card, but there are several possible differences. One is that the user can be anonymous; only credit or debit copy-protectedoptical disc 10 itself needs to be verified as authentic. Another is that the value can be other than cash (e.g. minutes for a service, such as telephone service). Instep 160, network (commerce)site 76 sends information to supportsite 82. This includes the card number or user-personalizedsecure signature 8 and transaction amount, as well as any other information that supportsite 82 requires. User-personalizedsecure signature 8 for this type of credit or debit copy-protectedoptical disc 10 can includepre-payment information 161. The user-personalizedsecure signature 8 includes thepre-payment information 161 that permits pre-payment in whole or in part for services or products to be ordered.Pre-payment information 161 is defined as the amount of pre-payment, that is, the initial value of credit or debit copy-protectedoptical disc 10. This pre-payment value can be a fixed amount for a given group of discs, or can depend on the amount pre-paid by the user.Support site 82 decides if the transaction can be approved (step 162).Support site 82 can choose to accept credit or debit copy-protectedoptical disc 10 as full payment or as partial payment for services or products to be offered. If the transaction cannot be approved, a message is sent back (step 176) that there is a problem, e.g. insufficient funds remain for the card. The transaction is then cancelled (step 166). - If the transaction is approved in
step 162, the cash or equivalent value is debited and credited to the merchant's network (commerce)site 76 instep 178. A message is returned to network (commerce)site 76 that the financial part of the transaction has been completed (step 170). Instep 172, the transaction is finalized, i.e. the merchandise is released for shipment to the end-user, and it is then shipped (step 174). - As a cash card, another embodiment of this invention is to keep the current cash or equivalent value on credit or debit copy-protected
optical disc 28 itself, as described above referring to FIG. 5. Turning now to FIG. 11 b, we see a method for achieving this. In this particular example, the cash orequivalent value 17 already exists on credit or debit copy-protectedoptical disc 28 in written (value) area 18 (FIG. 5). As a preliminary step, the user must have a CD reader/writer 73 a in which credit or debit copy-protectedoptical disc 28 is loaded in step 100 a. Instep 180, network (commerce)site 76 requests cash orequivalent value 17.Client application 25 reads cash orequivalent value 17 from credit or debit copy-protectedoptical disc 28 and sends it to network (commerce) site 76 (step 182). Network (commerce)site 76 forwards this information to support site 82 (step 184). Instep 186,support site 82 decides if the transaction is approved. If it is not approved, a message is sent back, e.g. insufficient funds are available for the purchase or the cash funds are not available to be transferred (step 188) and the transaction is cancelled (step 190). - If the transaction is approved, a message is returned to network (commerce)
site 76 stating so (step 192). Instep 194, the network (commerce)site 76 orders theclient application 25 to write the new cash or equivalent value, deducting the purchase funds. Upon receiving this order,client application 25 writes the new cash or equivalent value on credit or debit copy-protectedoptical disc 28 via CD reader/writer 73 a (step 196). After new cash orequivalent value 17 is written to credit or debit copy-protectedoptical disc 28,client application 25 signals network (commerce)site 76 that the value has been written (step 198). When this has been accomplished, network (commerce)site 76 notifiessupport site 82 instep 200 that the requisite finds can be transferred. Instep 202,support site 82 transfers the funds to the commerce site's account. The merchandise is released (step 204) and shipped (step 206). - Turning now to FIG. 12, we see how the applications are endowed with secure communications keys in the form of public keys and corresponding private keys.
Client application 25 has been provided with privatekey series 230, which is stored inprivate keys area 41. These private keys are capable of decrypting messages that have been encrypted with the corresponding public key, and they are also capable of signing messages in a secure way.Remote site application 21 also includes publickey series 232, corresponding to privatekey series 230. Publickey series 232 can include the entire set of keys included in privatekey series 230, or it can be a subset of privatekey series 230. The latter allows certain keys to be maintained exclusively for one application or one vendor without modifyingclient application 25. If the security of any key is compromised, that key can be simply removed from theremote site application 21, and the security breach is closed. -
Remote site application 21 randomly selects a public key “X” from publickey series 232, which gives selectedpublic key 256.Remote site application 21 sendskey request 23 toclient application 25 and indicates inkey request 23 which key has been selected to be selectedpublic key 256.Client application 25 selects the corresponding private key from privatekey series 230 to give selectedprivate key 254. The selectedpublic key 256 selectedprivate key 254 pair form public/privatekey channel 258.Client application 25 uses selectedprivate key 254 to sign signedmessage 27 that is sent toremote site application 21. - Turning now to FIG. 13, we see a block diagram showing more details of the secure method for transmitting the card ID. In
step 210, network (commerce)site 76 randomly selects selectedpublic key 256 from publickey series 232. Instep 212, network (commerce)site 76 sendskey request 23 toclient application 25 to use public/private key channel 258 (i.e. the random key it has selected).Client application 25 formats the card ID into a message (step 214) which it then signs with selected private key 254 (step 216).Client application 25 then sends signedmessage 27 to network (commerce) site 76 (step 218).Remote site application 21 receives signedmessage 27 and uses selectedpublic key 256 to verify signed message 27 (step 220). If the signature is not valid (step 222), the process stops (step 224). If the signature is valid, the process then continues (step 226) as described earlier. - The invention has been described in detail with particular reference to certain preferred embodiments thereof, but it will be understood that variations and modifications can be effected within the spirit and scope of the invention.
PARTS LIST 8 User-personalized secure signature 10 Credit or debit copy-protected optical disc 12 Hole 14 ROM portion 15 User-specific personalized information 16 RAM portion 17 Cash or equivalent value 18 Written (value) area 19 Network 20 Writeable area 21 Remote site application 22 Preformed identification signature 23 Key request 24 User-specific encrypted information 25 Client application 26 Encrypted client application package 27 Signed message 28 Credit or debit copy-protected optical disc 29 Data read step 30 Block 31 Self-extracting software 32 Block 33 Anti-hacking routines 34 Block 35 Polymorphic data and/or commands 36 Block 37 De-encrypting routines 38 Block 39 Encrypted client application 40 Block 41 Private keys area 44 Block 46 Block 48 Block 50 Encrypting program 52 Block 54 Block 56 Block 58 Block 60 Writing program 62 Block 64 Block 65 Unique identification 66 Substituted unique ID 67 Hidden unique ID 68 Scrambled unique ID 70 Home site 72 Personal computer 73 CD Reader 73a CD Reader/writer 76 Network (commerce) site 78 CD-Push operation 80 Web-pull operation 82 Support site 90 Block 92 Block 94 Block 96 Block 98 Block 100 Block 100a Block 105 Block 110 Block 115 Decision block 120 Block 125 Block 130 Block 132 Decision block 134 Block (stop) 135 Inclusive block 136 Block 138 Block 140 Block 142 Block 144 Decision block 146 Block 147 Block 148 Block 150 Block 152 Block 154 Decision block 155 Block 156 Block 157 Decision block 160 Block 161 Pre-payment information 162 Decision block 164 Block 166 Block 168 Block 170 Block 172 Block 174 Block 176 Block 178 Block 180 Block 182 Block 184 Block 186 Decision block 188 Block 190 Block 192 Block 194 Block 196 Block 198 Block 200 Block 202 Block 204 Block 206 Block 210 Block 212 Block 214 Block 216 Block 218 Block 220 Block 222 Decision block 224 Stop block 226 Block 230 Private key series 232 Public key series 234 Private key 236 Private key 238 Private key 240 Private key 242 Private key 244 Private key 246 Public key 248 Public key 250 Public key 252 Public key 254 Selected private key 256 Selected public key 258 Public/private key channel 260 Block 262 Interactive question 264 Block 266 Answer 268 Block
Claims (7)
1. A credit or debit copy-protected optical disc for use with a CD-ROM drive to provide for payment over a network to a seller of supplies or services comprising:
(a) a hybrid optical disc having a ROM portion and a RAM portion;
(b) the ROM portion including a preformed identification signature which is impressed into the ROM portion of the hybrid optical disc and is arranged to be difficult for a pirate to copy; and
(c) the RAM portion being adapted to be written on to include user-specific encrypted information which makes the hybrid optical disc unique for a specific user and in combination with the ROM preformed identification signature provides a user-personalized secure signature that permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the hybrid optical disc is secure from piracy.
2. The credit or debit copy-protected optical disc according to claim 1 wherein the user-personalized secure signature includes pre-payment information which permits pre-payment in whole or in part for services or products to be ordered.
3. The credit or debit copy-protected optical disc according to claim 1 wherein the hybrid optical disc is shaped so as to be usable by a conventional optical disc drive.
4. The credit or debit copy-protected optical disc according to claim 1 wherein the RAM portion includes a series of interactive questions which solicit answers from the user to verify the authenticity of the user.
5. The credit or debit copy-protected optical disc according to claim 4 wherein the series of interactive questions and answers are provided locally and not over the network.
6. The credit or debit copy-protected optical disc according to claim 1 further including user-specific information which personalizes the hybrid optical disc for that specific user.
7. A method for providing and using a credit or debit copy-protected optical disc, comprising the steps of:
(a) providing a hybrid optical disc having a ROM portion and a RAM portion;
(b) providing the ROM portion to include a preformed identification signature which is impressed into the ROM portion of the hybrid optical disc and is arranged to be difficult for a pirate to copy;
(c) providing the RAM portion to be adapted to be written on to include user-specific encrypted information which makes the hybrid optical disc unique for a specific user and in combination with the ROM preformed identification signature provides a user-personalized secure signature that permits a user to communicate over the network to make payment for ordered products or services with a high degree of assurance that the information on the hybrid optical disc is secure from piracy; and
(d) communicating over a network the information in the ROM and RAM portions to permit payment for ordered products or services.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/819,231 US20020191788A1 (en) | 2001-03-28 | 2001-03-28 | Credit or debit copy-protected optical disc |
EP02076046A EP1246104A1 (en) | 2001-03-28 | 2002-03-18 | Credit or debit copy-protected optical disc |
JP2002089705A JP2003006982A (en) | 2001-03-28 | 2002-03-27 | Credit or debit copy-protected optical disk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/819,231 US20020191788A1 (en) | 2001-03-28 | 2001-03-28 | Credit or debit copy-protected optical disc |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020191788A1 true US20020191788A1 (en) | 2002-12-19 |
Family
ID=25227551
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/819,231 Abandoned US20020191788A1 (en) | 2001-03-28 | 2001-03-28 | Credit or debit copy-protected optical disc |
Country Status (3)
Country | Link |
---|---|
US (1) | US20020191788A1 (en) |
EP (1) | EP1246104A1 (en) |
JP (1) | JP2003006982A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070083355A1 (en) * | 2005-10-12 | 2007-04-12 | Storage Appliance Corporation | Data backup devices and methods for backing up data |
US20070083356A1 (en) * | 2005-10-12 | 2007-04-12 | Storage Appliance Corporation | Methods for selectively copying data files to networked storage and devices for initiating the same |
US20070152840A1 (en) * | 2006-01-05 | 2007-07-05 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US20070152839A1 (en) * | 2006-01-05 | 2007-07-05 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US20070221117A1 (en) * | 2006-03-23 | 2007-09-27 | Honeywell International Inc. | Active protection for closed systems |
US20080073491A1 (en) * | 2006-09-27 | 2008-03-27 | Honeywell International Inc. | Anti-tamper enclosure system |
US20080117046A1 (en) * | 2005-11-02 | 2008-05-22 | Honeywell International Inc. | Intrusion detection using pseudo-random binary sequences |
US20080129501A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Secure chassis with integrated tamper detection sensor |
US20080132118A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Secure connector with integrated tamper sensors |
US20080134349A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Card slot anti-tamper protection system |
US20080192240A1 (en) * | 2007-02-08 | 2008-08-14 | Honeywell International Inc. | Methods and systems for recognizing tamper events |
US7813913B2 (en) | 2005-10-12 | 2010-10-12 | Storage Appliance Corporation | Emulation component for data backup applications |
US7822595B2 (en) | 2005-10-12 | 2010-10-26 | Storage Appliance Corporation | Systems and methods for selectively copying embedded data files |
US7844445B2 (en) | 2005-10-12 | 2010-11-30 | Storage Appliance Corporation | Automatic connection to an online service provider from a backup system |
US20100322055A1 (en) * | 2008-02-19 | 2010-12-23 | John Matthew Town | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US7899662B2 (en) | 2005-10-12 | 2011-03-01 | Storage Appliance Corporation | Data backup system including a data protection component |
US8195444B2 (en) | 2005-10-12 | 2012-06-05 | Storage Appliance Corporation | Systems and methods for automated diagnosis and repair of storage devices |
US8413137B2 (en) | 2010-02-04 | 2013-04-02 | Storage Appliance Corporation | Automated network backup peripheral device and method |
US8792321B2 (en) | 2010-08-17 | 2014-07-29 | Thomson Licensing | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US20140279566A1 (en) * | 2013-03-15 | 2014-09-18 | Samsung Electronics Co., Ltd. | Secure mobile payment using media binding |
US10223688B2 (en) | 2012-09-24 | 2019-03-05 | Samsung Electronics Co., Ltd. | Competing mobile payment offers |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5065429A (en) * | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
US5490216A (en) * | 1992-09-21 | 1996-02-06 | Uniloc Private Limited | System for software registration |
US5745879A (en) * | 1991-05-08 | 1998-04-28 | Digital Equipment Corporation | Method and system for managing execution of licensed programs |
US5982889A (en) * | 1997-04-30 | 1999-11-09 | Demont; Jason Paul | Method and apparatus for distributing information products |
US6449226B1 (en) * | 1999-10-13 | 2002-09-10 | Sony Corporation | Recording and playback apparatus and method, terminal device, transmitting/receiving method, and storage medium |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4341223B4 (en) * | 1993-12-03 | 2010-11-18 | Deutsche Thomson-Brandt Gmbh | ROM-RAM disk |
JPH117412A (en) * | 1997-06-18 | 1999-01-12 | Oputoromu:Kk | Storage medium having electronic circuit and its management method |
DE19850089A1 (en) * | 1998-10-30 | 2000-05-04 | Maz Mikroelektronik Anwendungs | Electronic payment methods on the Internet |
AU1081400A (en) * | 1999-05-26 | 2000-12-18 | Cd Cash Co., Ltd. | Compact disc authentication system and method |
-
2001
- 2001-03-28 US US09/819,231 patent/US20020191788A1/en not_active Abandoned
-
2002
- 2002-03-18 EP EP02076046A patent/EP1246104A1/en not_active Withdrawn
- 2002-03-27 JP JP2002089705A patent/JP2003006982A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5065429A (en) * | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
US5745879A (en) * | 1991-05-08 | 1998-04-28 | Digital Equipment Corporation | Method and system for managing execution of licensed programs |
US5490216A (en) * | 1992-09-21 | 1996-02-06 | Uniloc Private Limited | System for software registration |
US5982889A (en) * | 1997-04-30 | 1999-11-09 | Demont; Jason Paul | Method and apparatus for distributing information products |
US6449226B1 (en) * | 1999-10-13 | 2002-09-10 | Sony Corporation | Recording and playback apparatus and method, terminal device, transmitting/receiving method, and storage medium |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7822595B2 (en) | 2005-10-12 | 2010-10-26 | Storage Appliance Corporation | Systems and methods for selectively copying embedded data files |
US20070083356A1 (en) * | 2005-10-12 | 2007-04-12 | Storage Appliance Corporation | Methods for selectively copying data files to networked storage and devices for initiating the same |
US7813913B2 (en) | 2005-10-12 | 2010-10-12 | Storage Appliance Corporation | Emulation component for data backup applications |
US20070083355A1 (en) * | 2005-10-12 | 2007-04-12 | Storage Appliance Corporation | Data backup devices and methods for backing up data |
US7702830B2 (en) | 2005-10-12 | 2010-04-20 | Storage Appliance Corporation | Methods for selectively copying data files to networked storage and devices for initiating the same |
US8195444B2 (en) | 2005-10-12 | 2012-06-05 | Storage Appliance Corporation | Systems and methods for automated diagnosis and repair of storage devices |
US7899662B2 (en) | 2005-10-12 | 2011-03-01 | Storage Appliance Corporation | Data backup system including a data protection component |
US7844445B2 (en) | 2005-10-12 | 2010-11-30 | Storage Appliance Corporation | Automatic connection to an online service provider from a backup system |
US7818160B2 (en) | 2005-10-12 | 2010-10-19 | Storage Appliance Corporation | Data backup devices and methods for backing up data |
US7719419B2 (en) | 2005-11-02 | 2010-05-18 | Honeywell International Inc. | Intrusion detection using pseudo-random binary sequences |
US20080117046A1 (en) * | 2005-11-02 | 2008-05-22 | Honeywell International Inc. | Intrusion detection using pseudo-random binary sequences |
US7436316B2 (en) | 2006-01-05 | 2008-10-14 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US7388486B2 (en) | 2006-01-05 | 2008-06-17 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US20070152839A1 (en) * | 2006-01-05 | 2007-07-05 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US20070152840A1 (en) * | 2006-01-05 | 2007-07-05 | Honeywell International Inc. | Method and system to detect tampering using light detector |
US20070221117A1 (en) * | 2006-03-23 | 2007-09-27 | Honeywell International Inc. | Active protection for closed systems |
US7671324B2 (en) | 2006-09-27 | 2010-03-02 | Honeywell International Inc. | Anti-tamper enclosure system comprising a photosensitive sensor and optical medium |
US20080073491A1 (en) * | 2006-09-27 | 2008-03-27 | Honeywell International Inc. | Anti-tamper enclosure system |
US7796036B2 (en) | 2006-11-30 | 2010-09-14 | Honeywell International Inc. | Secure connector with integrated tamper sensors |
US20080129501A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Secure chassis with integrated tamper detection sensor |
US20080134349A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Card slot anti-tamper protection system |
US8279075B2 (en) | 2006-11-30 | 2012-10-02 | Honeywell International Inc. | Card slot anti-tamper protection system |
US20080132118A1 (en) * | 2006-11-30 | 2008-06-05 | Honeywell International Inc. | Secure connector with integrated tamper sensors |
US8284387B2 (en) | 2007-02-08 | 2012-10-09 | Honeywell International Inc. | Methods and systems for recognizing tamper events |
US20080192240A1 (en) * | 2007-02-08 | 2008-08-14 | Honeywell International Inc. | Methods and systems for recognizing tamper events |
US20100322055A1 (en) * | 2008-02-19 | 2010-12-23 | John Matthew Town | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US8675466B2 (en) | 2008-02-19 | 2014-03-18 | Thomson Licensing | Optical disc with pre-recorded and recordable regions and methods of forming the disc |
US9019807B2 (en) | 2008-02-19 | 2015-04-28 | Thomson Licensing | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US9025426B2 (en) | 2008-02-19 | 2015-05-05 | Thomson Licensing | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US8413137B2 (en) | 2010-02-04 | 2013-04-02 | Storage Appliance Corporation | Automated network backup peripheral device and method |
US8792321B2 (en) | 2010-08-17 | 2014-07-29 | Thomson Licensing | Optical disc with pre-recorded and recordable regions and method of forming the disc |
US10223688B2 (en) | 2012-09-24 | 2019-03-05 | Samsung Electronics Co., Ltd. | Competing mobile payment offers |
US20140279566A1 (en) * | 2013-03-15 | 2014-09-18 | Samsung Electronics Co., Ltd. | Secure mobile payment using media binding |
Also Published As
Publication number | Publication date |
---|---|
JP2003006982A (en) | 2003-01-10 |
EP1246104A1 (en) | 2002-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20020191788A1 (en) | Credit or debit copy-protected optical disc | |
US7003501B2 (en) | Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites | |
TWI391863B (en) | Computer readable universal authorization card system and method for using same | |
US20060190412A1 (en) | Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites | |
US6128391A (en) | Method and apparatus for asymetric key management in a cryptographic system | |
US7103575B1 (en) | Enabling use of smart cards by consumer devices for internet commerce | |
US7003500B1 (en) | Retail point of sale (RPOS) apparatus for internet merchandising | |
EP0385400B1 (en) | Multilevel security apparatus and method with personal key | |
US20030130955A1 (en) | Secure transaction systems | |
US4357529A (en) | Multilevel security apparatus and method | |
US7191153B1 (en) | Content distribution method and apparatus | |
US7158954B2 (en) | System and method for processing protected video information | |
US20020152180A1 (en) | System and method for performing secure remote real-time financial transactions over a public communications infrastructure with strong authentication | |
TW200409038A (en) | Computer readable universal authorization card system and method for using same | |
EP1342216A2 (en) | An authentication system | |
JP2003100013A (en) | Access method to electronic contents on network by using hydride optical disk for authentication | |
JP2004500671A (en) | Improved method and system for making secure payments over a computer network | |
US20020032662A1 (en) | System and method for servicing secure credit/debit card transactions | |
EP0927974B1 (en) | Process for compressing digital certificates for use in smart card | |
WO2002050743A1 (en) | Method and system for using optical data cards as portable secure unified platforms for performing a variety of secure on-line transactions | |
JP2003110552A (en) | Card authentication system, information recording card, and card authenticating method | |
US20020035694A1 (en) | Method and apparatus for anonymous remote transactions | |
JP2000339366A (en) | System and method for authentication utilizing cd | |
AU723525B2 (en) | A method for certifying a running total in a reader | |
JP2004535619A (en) | Systems and methods for secure payment transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EASTMAN KODAK COMPANY, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:INCHALIK, MICHAEL A.;BARNARD, JAMES A.;REEL/FRAME:011668/0882;SIGNING DATES FROM 20010321 TO 20010323 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |