Smart card as a security token
11341232 ยท 2022-05-24
Assignee
Inventors
- Volker Stohr (Munich, DE)
- Frank-Michael Kamm (Holzkirchen, DE)
- Nils Gerhardt (Munich, DE)
- Andreas Chalupar (Munich, DE)
Cpc classification
G06F21/45
PHYSICS
H04W12/04
ELECTRICITY
G06Q20/34
PHYSICS
H04L9/3228
ELECTRICITY
G06Q20/4018
PHYSICS
H04L9/3234
ELECTRICITY
H04L63/0853
ELECTRICITY
International classification
H04L9/08
ELECTRICITY
G06Q20/34
PHYSICS
G06F21/45
PHYSICS
G06Q20/40
PHYSICS
H04L9/32
ELECTRICITY
Abstract
The present invention relates to a method for making available a security key, wherein a smart card adapted according to the invention is employed for the production thereof. In this case, an expedient method sequence is proposed which makes it possible for the smart card to make available, for example, a so-called one-time password or a dynamic check number in interaction with a token server. The present invention further relates to a correspondingly adapted computing arrangement and to a computer program product with control commands which implement the method and/or operate the computing arrangement.
Claims
1. A method for making available a security key while employing a smart card as a security token and a token server, comprising: transmitting a random challenge message produced by the token server via a data connection from the token server to an end device; forwarding the produced challenge message from the end device to the smart card; transmitting at least one security information item as a response message to the token server via the secured data connection; checking the transmitted security information; producing a symmetric key in dependence on the transmitted security information, if the check is positive; computing a security key in dependence on the produced symmetric key; and making available the computed security key by means of the data connection from the token server to the end device; wherein the computing of the security key is carried out in dependence on the produced symmetric key while employing a stored cryptographic function; wherein when computing the security key, the symmetric key is determined as the start value.
2. The method according to claim 1, wherein the security information is transmitted as a signature and/or a cryptogram.
3. The method according to claim 1, wherein in addition to the security information data read out from the card, a PAN, a real name, an expiration date, a PIN, a password, a hash value, a card sequence number and/or a card type are transmitted.
4. The method according to claim 1, wherein the check is carried out in dependence on a card type of the smart card.
5. The method according to claim 1, wherein the security key is computed as a check number, a password used once and/or a password.
6. The method according to claim 1, wherein by the producing of the symmetric key there is comprised selecting at least one key stored on the token server.
7. The method according to claim 1, wherein the producing of the symmetric key is carried out on the basis of a stored cryptographic function.
8. The method according to claim 1, wherein by the checking of the transmitted security information there is comprised comparing the security information with stored reference values.
9. The method according to claim 1, wherein a predetermined error routine is started in the event of a negative check.
10. The method according to claim 1, wherein the end device communicates with the smart card in a contactless or contact-based manner.
11. The method according to claim 1, wherein the end device is made available as a mobile telephone or a card reading device.
12. A computing arrangement for making available a security key while employing a smart card as a security token and a token server, comprising: an interface unit adapted to transmit a random challenge message produced by the token server via a data connection from the token server to an end device; the end device adapted to forward the produced challenge message from the end device to the smart card, which is adapted to cause a transmission of at least one security information item as a response message to the token server via the data connection; the token server adapted to check the transmitted security information and, if the check is positive, to produce a symmetric key in dependence on the transmitted security information; a computing unit adapted to compute a security key in dependence on the produced symmetric key; and a further interface unit adapted to make available the computed security key by means of the data connection from the token server to the end device; wherein the computing of the security key is carried out in dependence on the produced symmetric key while employing a stored cryptographic function; wherein when computing the security key, the symmetric key is determined as the start value.
13. A computer program product with control commands which execute the method according to claim 1 when these are brought to execution on a computer.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Further advantageous embodiments are explained in more detail with reference to the attached figures. The figures are described as follows:
(2)
(3)
(4)
(5)
DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS
(6)
(7)
(8) The signed challenge is verified in the token server and a seed or a start value is derived. This is followed by a communication with the salt server app, which is brought to execution on the salt server, for example. This is followed by a request for transaction data to the transaction server, which can also be referred to as a payment server, and then transmitted back to the token server in response to these requested transaction data. This is followed by a computation of the one-time password or the check number. The computed password or the check number is transmitted to the end-user device, which has these data, i.e. the computed security key, checked by the verification server. The result is then transmitted to the transaction server, and, if the verification is positive, the transaction can ultimately be executed.
(9) Initially,
(10)
(11) Personalized EMV cards that have already been issued can be employed as security tokens for OTP/CVC generation without the cards being originally able to do so. It is not necessary to modify the cards (no additional applets, no change to the card operating system, no larger memory requirements, no increase in the price of the cards).
(12) The end user does not need to have with him an additional token or a special reading device (e.g. CAP reader); the issuer does not need to issue any new tokens according to one aspect of the present invention. A card base of >1 billion issued cards is immediately available as security tokens. Certain types of cards (DDA cards, partly CDA cards) can also be employed with this method without the involvement of the issuer.
(13) Compared to the software method, there is a significantly higher level of security, since the OTP/CVC generation is linked to a hardware security element (EMV card). In connection with PIN/password, a real two-factor method results with the cryptographic security of the card. According to one aspect of the present invention, there is no need to store a secret seed value on a (potentially insecure) customer device. The token server involved does not need to store any user-specific data. Dynamically derived seed values are discarded immediately after the transaction. This means that there are no databases created with user data that could potentially be attacked.