Smartcard
20170300799 · 2017-10-19
Assignee
Inventors
- David S Breed (Miami Beach, FL, US)
- Wendell C Johnson (San Pedro, CA, US)
- Wilbur E DuVall (Katy, TX, US)
- Oleksandr Shostak (Kyiv, UA)
- Vyacheslav Sokurenko (Kyiv, UA)
Cpc classification
G07F7/1016
PHYSICS
B42D25/00
PERFORMING OPERATIONS; TRANSPORTING
G06K19/07354
PHYSICS
G06K19/0718
PHYSICS
G06K19/0723
PHYSICS
International classification
G06K19/073
PHYSICS
G07F7/10
PHYSICS
G07F7/08
PHYSICS
G06Q20/34
PHYSICS
Abstract
Card including a substrate, at least one biometric data entry device on the substrate to receive biometric data about an individual holding the substrate, a memory component on the substrate and containing biometric data about an individual possessing the card and at least one private key, and a processor configured to compare biometric data received via the biometric data entry device to biometric data contained in the memory component to determine whether they match. When there is a biometric data match, a process requiring use of the private key(s) is initiated for authorized use of the card. A chassis intrusion detector system detects tampering with the card and upon such detection, causes deletion of the private key(s) to thereby prevent unauthorized use of the card.
Claims
1. A card, comprising: a substrate, at least one biometric data entry device on said substrate to receive biometric data about an individual holding said substrate; at least one memory component on said substrate and containing biometric data about an individual possessing the card and at least one private key; a processor configured to compare biometric data received via said at least one biometric data entry device to biometric data contained in said at least one memory component to determine whether they match and when they match, initiate a process requiring use of the at least one private key for authorized use of the card; and a chassis intrusion detector system that detects tampering with the card and upon such detection, causes erasure or deletion of the at least one private key in said at least one memory component to thereby prevent unauthorized use of the card.
2. The card of claim 1, wherein said processor is configured to initiate the process, when the biometric data received via said at least one biometric data entry device matches the biometric data contained in said at least one memory component, which includes transmission of an identification number associated with the card and the card is a credit or debit card such that the identification number transmitted when the biometric data received via said at least one biometric data entry device matches the biometric data contained in said at least one memory component is a credit or debit card number.
3. The card of claim 2, wherein said processor is further configured to decode data, encoded based on a public key generated from the transmitted identification number, using a private key in said at least one memory component whereby unless decoded using the at least one private key, said card is unusable.
4. The card of claim 1, wherein said processor is configured to initiate the process, when the biometric data received via said at least one biometric data entry device matches the biometric data contained in said at least one memory component, which includes transmission of an identification number associated with the card and the card is an identification card such that the identification number transmitted when the biometric data received via said at least one biometric data entry device matches the biometric data contained in said at least one memory component is a unique identification associated with an owner of the card.
5. The card of claim 1, further comprising: an energy harvesting system arranged on said substrate to obtaining energy wirelessly from an external source based on proximity of said energy harvesting system to the external source; and a battery on said substrate that is charged by said energy harvesting system.
6. The card of claim 5, wherein said energy harvesting system is configured to interact with a Near Field Communications (NFC) reader.
7. The card of claim 1, wherein said at least one biometric data entry device comprises a fingerprint reader.
8. The card of claim 1, wherein said at least one biometric data entry device comprises a pair of fingerprint readers, one on each side of said substrate.
9. The card of claim 8, further comprising a finger resistance sensor adapted to determine contact between fingers and said fingerprint readers.
10. The card of claim 1, wherein said at least one biometric data entry device comprises a heartbeat detector.
11. The card of claim 1, wherein said chassis intrusion detector system comprises a series of conductors spaced apart from each other to cover said substrate except for said at least one biometric data entry device which remains exposed upon covering of said substrate by said conductors, said conductors being electronically connected together to form a transmission line, whereby breaking of one of said conductors causes variation of current through the transmission line, said processor being configured to erase or delete the at least one private key upon detecting a variance in current through the transmission line defined by said conductors caused by breaking of one of said conductors.
12. The card of claim 11, further comprising a protective layer over said conductors.
13. The card of claim 11, wherein said chassis intrusion detector system further comprises plastic film arranged on said substrate, said conductors being formed on said plastic film.
14. The card of claim 11, wherein said conductors are parallel to one another.
15. The card of claim 11, wherein said conductors are made of transparent material.
16. A method for validating use of a card by an authorized user, comprising: prior to use of the card, placing biometric data of the authorized user into at least one memory component on the card along with at least one private key required for authorized use of the card, the at least one private key being contained in the at least one memory component on the card; enclosing the card with a chassis intrusion detection system that detects tampering with the card; periodically determining whether the chassis intrusion detection system has detected tampering with the card and if so, erasing or deleting the at least one private key to thereby prevent authorized use of the card; receiving via at least one biometric data entry device on the card, biometric data about an individual holding the card; and comparing, via a processor on the card, biometric data received via the at least one biometric data entry device to biometric data contained in the at least one memory component to determine whether they match and when they match, initiating a process requiring use of the at least one private key for authorized use of the card.
17. The method of claim 16, wherein the chassis intrusion detection system comprises conductors arranged over the surface of the card, the step of periodically determining whether the chassis intrusion detection system has detected tampering with the card comprising periodically directing a pulse through the conductors and analyzing the pulse after passing through the conductors relative to the pulse being directed through the conductors, differences between the pulses being indicative of tampering with the card.
18. The method of claim 16, further comprising displaying information about a transaction about to be effected using the card or that has just been effected using the card on a display on the card.
19. The method of claim 16, wherein the step of initiating the process requiring use of the at least one private key for authorized use of the card comprises: transmitting an identification number of the card from the card to a terminal sought to be used by the card, the identification number being directed from the card to a server that retrieves a public key associated with the identification number and directs a transmission to the terminal encoded based on the public key to be directed from the terminal to the card; and decoding the transmission, using a processor at the card and the at least one private key and directing the decoded transmission to the server, whereby receipt of the correctly decoded transmission by the server allows for use of the card.
20. The method of claim 19, wherein after receipt of the decoded transmission at the server, an additional transmission is directed from the server to the terminal encoded based on the public key to be directed from the terminal to the card, the method further comprising: decoding the additional transmission, using the processor at the card and the at least one private key, and associating the decoded transmission with an approval key; and requiring action by the authorized user via an input device on the card to cause transmission of the decoded transmission to the server, whereby receipt of the decoded transmission by the server indicates allowability of the transaction.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] The following drawings are illustrative of embodiments of the system developed or adapted using the teachings of at least one of the embodiments disclosed herein and are not meant to limit the scope of the disclosure as encompassed by the claims.
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
BEST MODE FOR CARRYING OUT INVENTION
[0050] The present disclosure is directed at solving the problem of guaranteeing with a high degree of certainty that a credit, debit card, or other identification card, has not been hacked or stolen and that when it is presented for any purpose, the recipient of the information on the card can be certain that no fraud has occurred and that the person possessing or using the card is the owner of that card.
[0051]
[0052] When the NFC reader obtains an identification number from the card 12, it will transmit this number to the point of sale terminal, not shown, which communicates with the card issuer. When the card issuer receives this identification number, it will retrieve from its memory the public key associated with that identification number and use that public key to encode a random number, or other data known only to the card issuer. The encoded data will then be transmitted to the POS terminal and from there to the NFC reader 14 and to the card 12. The card 12 will decode the encoded data and return the decoded data to the card issuer through the NFC reader 14 and the POS terminal. By this process, the card issuer can be confident that the proper owner is holding the issued card 12 and therefore the transaction may proceed.
[0053] When the card 12 is manufactured, a pair of cryptographic keys are created, a private key and a corresponding public key. The encryption level for these keys can be the highest allowed by law. The private key is then written to card 12 and the writing path can be severed so that once written, it cannot be rewritten or read from the exterior of the card 12. The severing of the data path step can be omitted as described below if the card is to be reused with a different private key. This will be the only location where the private key is recorded. Once written to the card 12, it is erased from the system which created it. The public key is retained and when the card 12 is issued to a new owner, the owner provides an identification number which thereafter is associated with this public key. This information can then be provided to any interested party and does not need to be secure or secret. The entire process described above can take place in one second or less depending on the bandwidth of the communication channel between the NFC reader 14 and the card issuer. Thus, the approval of a transaction not only is extremely secure and fraud resistant but is practically instantaneous and does not require a signature or pin entry by the card owner. As described below, additional information such as the transaction amount and the owner's approval thereof may also be communicated between the owner and card issuer.
[0054]
[0055] The card includes a substrate 130 on which the elements described below are arranged, placed, positioned, embedded, mounted, integrated or incorporated or otherwise provided. The specific manner for placing the components on the substrate 130 is known to those skilled in the art to which this invention pertains or readily ascertainable in view of the disclosure herein.
[0056] A main processor is shown at 102, which can contain various forms of volatile and non-volatile memory including ROM, a near frequency communication chip at 104, a chassis intrusion detector (CID) microprocessor at 106, which contains the volatile memory holding the private key(s), and a CID battery at 114. A fingerprint reader is showing at 110 which can contain an ECG sensor 112. A primary or main rechargeable battery is seen at 116 and a display at 118. LEDs are shown at 120. An antenna designed to receive power from the NFC is showing at 122. This antenna can also be used to receive power for recharging the main battery 116 from an external device provided for that purpose. A touch input device is shown at 124; however, the display 118 can be designed to be a touch sensitive display obviating the need for the input device 124. A finger resistance sensor 126 can be provided as a check on whether the person using the card 110 has applied films to his fingers. An optional magnetic stripe is illustrated at 128. If this magnetic stripe 128 is present, then circuitry to read and program this stripe 128 would also be needed and would be placed, for example, below the stripe 128.
[0057] A high accuracy biometric identification of the card holder is accomplished using multiple fingerprint detectors or readers. Although only a single such detector or reader 110 is illustrated in
[0058] Additionally the ECG sensor 112 can be made part of the fingerprint sensor to measure the shape of the heart pulse which can additionally be used as a biometric measure as reported in “Unveiling the Biometric Potential of Finger-Based ECG Signals” which can be found on the Internet at www.hindawi.com/journals/cin/2011/720971. A combination of these biometric measurements can provide a highly accurate test that the person who is holding the card 100 is the same person to whom the card 100 was initially given.
[0059] When first obtaining a smartcard of this invention, the owner would position his or her fingers on to the appropriate fingerprint readers 110 which would acquire the various biometric measures as discussed above. The data relative to these measurements is then stored in volatile or nonvolatile memory for use in comparing future biometric data acquisitions with the initial such acquisition. By using several such biometric measurements, the identification accuracy will be very high. As explained below, the data relative to the biometric measurements is protected with the CID preventing access to this data from outside of the card 100. The particular methods by which the biometric comparisons are made and the data is stored will be unique to this system and undiscoverable by anyone attempting to reverse engineer the card 100. All of this data and corresponding programs are destroyed, if held in the volatile memory, if the card 100 is breached as discussed below.
[0060] The fingerprint reader 110 can be either based on capacitive, ultrasonic or optical systems as discussed below. The display can be of a variety of shapes and technologies however and E-ink touchscreen is preferred. If the touchscreen is used, then input device 124 is unnecessary.
[0061] The card 100 may also include a Bluetooth and/or Wi-Fi communications capability, a flash memory for holding various card IDs or numbers, a rewritable magnetic strip and rewriting capability, and various other similar capabilities. The display can also be used as a fingerprint sensor as illustrated and described in U.S. Pat. Appln. Publ. No. 20050240778. One or more comparison techniques and/or technologies may be used for comparisons. For example, for fingerprint comparisons, the main processor 102 may utilize the stored data to compare fingerprint minutia such as, for example, ridge endings, bifurcation, lakes or enclosures, short ridges, dots, spurs and crossovers, pore size and location, Henry System categories such as loops, whorls, and arches, and/or any other method known in the art for fingerprint comparisons as illustrated, for example, in U.S. Pat. No. 7,438,234. The present invention can use third-party fingerprint scanning and security devices such as those made by Interlink Electronics, Keytronic, Identix Biotouch, BIOmetriciD, on Click, and/or other third-party vendors.
[0062] The ECG sensor 112 results reported in: Lugovaya T. S. “Biometric human identification based on electrocardiogram”. [Master's thesis] Faculty of Computing Technologies and Informatics, Electrotechnical University “LETI”, Saint-Petersburg, Russian Federation; June 2005; Nemirko A. P., Lugovaya T. S. “Biometric human identification based on electrocardiogram.” Proc. XII-th Russian Conference on Mathematical Methods of Pattern Recognition, Moscow, MAKS Press, 2005, pp. 387-390. ISBN 5-317-01445-X. And, André Lourenco, Hugo Silva and Ana Fred, “Unveiling the Biometric Potential of Finger-Based ECG Signals”, June 2011, www.hindawi.com/journals/cin/2011/720971/. In these references, which are incorporated herein by reference, accuracies of from 94.3% to 96% are reported.
[0063] A flowchart illustrating the functioning of the smartcard system is shown at 300 in
[0064] Upon successful validation of the biometrics, the card 100 transmits the owner's ID to the NFC at step 310 and the NFC in turn, transmits this ID to the point of sale terminal (POS), step 312. Similarly the POS terminal transmits the ID to the card issuer at step 314. At step 316, the issuer creates a random number, or other data known only to the card issuer, and encodes these data using the public key associated with the card owner's ID at step 316. This encoded data is then transmitted to the card 100 via the POS terminal and the NFC reader at step 318. The card 100 then decodes the encoded data using the stored private key in the memory associated with microprocessor 106 at step 320 and transmits the decoded data to the NFC at step 322 which in turn transmits it to the POS terminal at step 324 and then to the issuer at step 326. The actions performed by the card 100 may be performed or enabled by hardware and/or software on the card 100, e.g., by components including but not limited to the main processor 102 including memory in which software may be resident, the near frequency communication chip 104, the CID microprocessor 106 having the memory in which the private key is stored, the main battery 116, and antenna 122.
[0065] Additional information such as the amount of the purchase and any other relative information can simultaneously be passed to the issuer from the POS terminal as needed. This additional information may influence the approval of the transaction; however, at this point if the decoded data agrees with the original data, then the issuer knows that they owner is in possession of his or her card. The issuer now can encode the transaction amount and send it by the same path to the card at step 328 where it is displayed on display 118 on the card 100 for owner approval. The issuer can, at the same time, encode a second random number which is also sent to the smartcard 100. When the smartcard 100 receives this second random number, it decodes it using the private key in the memory associate with the microprocessor 106 and associates this decoded number with the approval key on the smart card 100. If the owner approves the amount, he or she presses an approval key, which can be on the display 118 or elsewhere on the card 100, at step 330 and the decoded random number is returned to the card issuer. If this corresponds to the original number, then the issuer can approve the transaction to the POS terminal and the transaction is complete at step 332. After the transaction is completed at step 332, control is returned to the original step 302.
[0066] The owner's ID discussed above can be a single number or other text identifier associated with the owner and perhaps indicating the smartcard system being used or it can be a credit card number, a passport number, driver's license number, SS number, or any other authorization number. The particular identifier used can be chosen by the owner at the time of use.
[0067] By the added step of the second random number, the issuer knows that the owner has approved the amount of the transaction as approved by the issuer and that this amount has not been altered by an intermediary having access to the transaction stream.
[0068] Also although a single private key is contemplated in a preferred implementation of this invention, multiple private keys can be stored in the memory associated with the microprocessor 106, each corresponding to a card issuer. The appropriate private key can then be selected at the time the card issuer is selected. All can similarly be erased if an intrusion is detected. This use of a private key falls under the general heading of a “challenge/response” system in the literature. The particular system used herein is simpler than others. Other more complicated algorithms can of course be implemented within the teachings of this invention. For example, it is assumed that the integrity of the issuer need not be verified. If this is not the case, then a parallel system as discussed herein can be implemented.
[0069]
[0070] The interior 210 of the card 200 may be a substrate on which the remaining components, e.g., those shown schematically in
[0071] In the illustration, the conductive lines are shown to be straight and opaque. In one preferred application, the lines are made wavy and sufficiently thin that they are transparent. In this case, they are able to extend across the display 204. The fingerprint sensor 206 can also be covered when the wires are transparent when an optical fingerprint sensor is used. The wires can be printed from a variety of conductive materials such as aluminum, copper, indium tin oxide, and carbon-based materials such as graphene. As described below, these wires are connected so as to form a continuous circuit that totally surrounds the smartcard 200. If any of these wires is broken such that the circuit no longer conducts electricity, then this fact is sensed by the CID circuitry (microprocessor 106) which erases the private key(s) stored in its memory. It also can cause the stored biometric information to be similarly erased.
[0072] As an alternative to the wires used in
[0073] Since any attempt to break into the electronic and sensor assembly, that is the card, will necessarily sever one of these wires or change the circuit resistance, this design provides an easily detectable method of determining an attempt to intrude into the system electronics and sensor assembly or card.
[0074] A schematic of the chassis intrusion detector system is shown in
[0075] The SA 404 can be a separate subassembly which is further protected by being potted with a material such that any attempt to obtain access to the wires connecting the battery 408 to a microprocessor 414 therein or to the RAM memory 406 would be broken during such an attempt. This is a secondary precaution since penetration to the SA 404 should not be possible without breaking wire 402 and thus destroying the private key. This private key can be destroyed if it is resident on volatile RAM memory and power is removed from this memory. The power can be removed by the microprocessor 414.
[0076] To summarize, any disruption of the mash or conductive film in either of the above described examples will destroy the private key in the memory associated with a chassis intrusion detector (CID) microprocessor making it impossible to decode the data sent from the card issuer who will therefore deny transaction approval. After the assembly is completed, the microprocessor 414 can be powered on and the first step will be to measure the inductance, resistance, and capacitance, as appropriate, of the mesh or films. Thereafter, if any of these measurements significantly change, then the circuit in the SA 404 would remove power from the RAM memory 406 thereby destroying the private key(s). Since a particular private key cannot be reloaded since it was the only copy in existence, the assembly would need to be returned to the issuer for the insertion of a new private key or the card discarded.
[0077] When the SA 404 is loaded with the private key during manufacture or thereafter, it can be done so through two fused links, not shown, which can be broken after the loading process has occurred and been verified. Thereafter, the private key memory location cannot be accessed from outside of the card, and cannot be changed or reloaded.
[0078]
[0079] In this manner, the battery 516 has its life extended. Bidirectional serial communication takes place through wire 504. The testing pulse is imposed on the mash 506 through wire 510 labeled a. The returned signal comes through wire 512 labeled b. The pulse at a is shown at 522 and consists of a 20 μs burst which is repeated every second, or at some other convenient value. The signal indicated by the trace 524 illustrates the integrity of the mash at the beginning where it responds with an attenuated 20 μs pulse; however, after the one second when the second pulse arrived and was not sensed by the micro 520, b did not register a corresponding pulse indicating that the wire mesh had been severed.
[0080] Signal 526 indicates that the private key is present in the RAM and due to the failure of the mash at the second burst pulse, the RAM was cleared. Trace 528 indicates that a message was sent to the card indicating that intrusion had taken place.
[0081] A flowchart of this process is showing generally at 550 in
[0082] At step 556, the SA microprocessor is started, however the every one second pulses will not be initiated. This is to conserve power of the SA battery while the smartcard is not in use. The smartcard will be vulnerable to the theft of the private key during this period, however, and the card issuer may choose to initiate the pulse per second as soon as the private key is loaded into RAM. Alternatively, the cards can be manufactured and the private key loaded just prior to the card being given to its new owner. In either case, the sensing of power from the smartcard indicated here as P equals one, is used to initiate the once per second pulses have started. This is indicated by the dashed line 562.
[0083] At step 564, the 20 μs pulse is driven onto conductor a and conductor b is tested for the presence of the signal at step 566. If conductor b received the pulse indicating that the integrity of the wire mesh is intact, the decision is made at step 568 to transfer control to step 570 where the one second delay occurs after which control is transferred back to step 564. If no signal was sensed on b, then step 568 transfers to control to step 572 where the private key and any other information is erased from RAM. Control is then transferred to step 574 where a check is made as to whether power is available from the smartcard and if so a message “intrusion” is sent to the smartcard at 576. In either case, the process terminates at step 578 where the microprocessor is turned off.
[0084]
[0085] Below the second layer 612, the next layer 614 is a non-transparent plate with micro-diaphragms and having a light-absorbing coating. This plate can be manufactured of any suitable material known to those skilled in the art to which this invention pertains in view of the disclosure herein. Its principal function is to prevent the mixing of light, reflecting or scattering from neighboring fragments of the finger. One company, specializing on microhole drilling, can be found at www.potomac-laser.com/services/core/micro-hole-drilling/.
[0086] Below the layer 614, the final layer 616 is the image detector and can be made from CCD or CMOS pixels. Each pixel of the detector should catch the rays from the finger's area, located directly opposite the pixel. The image sensor may be monochrome like the OLED. The pixel's size should be approximately equal to a diameter of the micro-diaphragm, e.g. from about 25 micrometers to about 50 micrometers. The image detector size corresponds to the fingerprint area (typically, APS-C format or smaller). Such a configuration can provide resolution of from about 500 dpi to about 1000 dpi.
[0087]
[0088] Capacitance fingerprint sensors are more widely used while many manufactured optical sensors (CCD and CMOS) are available with much larger sensitive areas. To summarize, capacitive sensors are: relatively low cost (currently, widely used in mobile phones); insensitive to ambient lighting; resistant to contamination; acceptable resolution (for example, resolution in iPhone is 500 dpi, that is the minimum resolution for FBI-compliant scanners); hut, then have limited sensitive area.
[0089] Probably, most of manufactured optical fingerprint readers are based on frustrated total internal reflection (FTIR), i.e. the light entering the prism is reflected at the valleys, and randomly scattered (absorbed) at the ridges. The lack of reflection allows the ridges (which appear dark in the picture) to be differentiated from the valleys (appearing bright). Advantages are that: it is a verified technology; more accurate than capacitive sensors, resolution of about 1000 dpi and even greater is feasible; big sensing area (for example, the HiScan Fingerprint Scanner's area is 1 inch per 1 inch, www.biometrika.it/eng/hiscan.html). But in general, “classical” optical sensors contain light source(s), a lens objective, glass prism (plate) and a sensor, therefore, they are not slim; require to apply costly light-sensitive sensor (CCD or CMOS matrix); may be affected by stray light and/or surface contamination; need additional efforts to be resistant to deception.
[0090] Alternatives to “classical” optical sensors are solid-state optical sensors. In electro-optical sensors, a voltage across a light-emitting polymer film is applied. This polymer film can be coupled directly to an optical detector. When a finger is presented, ridges provide a ground to the polymer surface, creating a small current that generates light, Fingerprint valleys remain dark. Thus, a high contrast image can be produced. This is discussed in U.S. Pat. Appln. Publ, 20020131001. “Electro-optical device having an ITO layer, a SiN layer and an intermediate silicon oxide layer”, incorporated by reference herein.
[0091] Other interesting sensor types are based on combination of various technologies, but they are at a development or laboratory stage including silicon chips with capacitance and capacitance with TFT. An ultrasonic based fingerprint sensor is discussed below.
[0092] Fingerprint sensors are continuing to improve and to be able to use more of the finger than just the ridges and valleys of the fingerprint. For example, the fingerprint technology provided by www.lumidigm.com/, a US-based biometric authentication solutions company, is able to identify optical characteristics of subsurface skin which is highly variable between one person and another. It does this using different spectrums of light and advanced optical methods. It is probably premature to consider this for smartcard applications, though it may be applicable for the smartphone application discussed below.
[0093] Other biometrics can in some cases be incorporated into a smartcard and in all cases into a smart phone with suitable attached sensors. These include: the user's voice, facial features, ear features, sound signature, handwriting signature, vascular patterns, DNA, hand geometry, smell, keystroke/typing features, iris, retina, and brainwaves.
[0094]
[0095] There are many opportunities for using such a thumb drive 800. When coupled with the appropriate cloud-based program, the thumb drive 800 can facilitate automatic logins to various password-protected websites. The cloud-based program can verify that the thumb drive is resident on the computer accessing the cloud-based program by virtue of the finger and thumb print authentication plus the private key challenge mechanism. The owner can securely use the thumb drive 800 in any computer to conduct ordering or banking transactions among others. Thus, with the thumb drive 800, the owner need no longer be concerned with remembering passwords and pins. Similarly, credit card and other security-based information can be automatically transferred from the cloud-based program to the accessed website.
[0096] Instead of a USB connection, the thumb drive 800 in the form of a fob can be used to automatically unlock doors and similar functions.
[0097] As with the smart card, the CID microprocessor in the thumb drive 800 can check the fine mesh for breach of security at various time intervals. The security ID, or private key, is stored in the microprocessor RAM. If there is a breach of security, the microprocessor erases the information stored in the RAM. The microprocessor is powered by an internal battery when external power is not available. The battery is designed to operate for many years and, since there is more space available, provision can be made for a rechargeable battery if desired.
[0098] In a recent paper “get your hands off my laptop” available at www.tau.ac.il/˜tromer/papers/handsoff-20140731.pdf, the authors demonstrated that frequently private keys stored within a laptop can be extracted with some relatively simple methods. Since the private key is resonant on the thumb drive, these types of attacks are eliminated.
[0099] Although the fingerprint sensors are resonant on the thumb drive, for cases where biometric sensors also exists on a laptop, for example, even greater security can be realized by combining these two biometric systems.
[0100]
[0101] Depending on how much of the smart phone is to be protected, an alternate solution is to place within the smart phone a device of a similar size as the thumb drive described above which incorporates the private key and is protected by a CID.
[0102]
[0103]
[0104] In this implementation, the mesh 1104, 1106 is placed over the entire carrier board prior to the application of the top 1110 and bottom 1102 covers which complete the card manufacture. These covers 1102, 1110 can either be laminated on top and bottom of the carrier board 1108 or the carrier board 1108 can be over-molded by an injection molding process. The carrier board 1108 is made smaller than the final card size as illustrated in
[0105] Holes 1126 are also placed in the base board 1122 to permit the CID film 1124 to again be sealed to itself through such holes. In particular, the display is attached to the base board by a few thin bridges with space 1126 between bridges again for the CID film self-bonding. When the card is completed through lamination or injection molding, it becomes nearly impossible to gain access to the private key storage without breaking one or more of the fine conductors which make up the CID film. Additionally, these conductors can be constructed in such a manner that if the card plastic is dissolved by a solvent, the conductors will similarly be dissolved thereby severing the CID circuit and causing the contents of the CID volatile memory to be erased.
[0106] In this implementation, the CID film does not cover the display due to the risk that one or more of the conductors may be worn through by the owner's fingers through prolonged use.
[0107] In addition to those applications discussed above the technology disclosed herein following areas: [0108] 1. Bank & Credit Cards [0109] 2. Voter ID [0110] 3. E-voting over Internet [0111] 4. Access to an account such as by an ATI (e.g., credit, charge debit, checking, savings, reward, loyalty, travel or the like) [0112] 5. Entry into buildings [0113] 6. Passports [0114] 7. Google Glass version to secure internal electronics [0115] 8. Bitcoin or other Electronic wallet [0116] 9. All Government ID's [0117] 10. Social Security Card [0118] 11. Birth Certificate [0119] 12. Driver's License [0120] 13. Port ID [0121] 14. Pilot's License [0122] 15. HAZMAT & Explosives (ATF) License [0123] 16. Medical Info Card [0124] 17. Insurance Card [0125] 18. Student ID card [0126] 19. School Services Card [0127] 20. Computer Access [0128] 21. Public transportation Passes [0129] 22. Toll & Parking Passes [0130] 23. E-Payment Card [0131] 24. Government Benefit & Employment [0132] 25. Payment Card [0133] 26. Government & Business Access & Security Clearance [0134] 27. Visa or Entry/Exit Pass with Infectious Disease Info
[0135] There is a growing backlash by retailers against the 2-3% credit card charges. Since the cost of fraud has been essentially eliminated with the smartcard of this invention, these fees can now be substantially reduced. Alternatively, a new channel can now be put in place whereby the 2-3% fee is eliminated and the store provides a discount if the customer, for example, elects to use a direct bank transfer or substitute card which does not require the fee.
[0136] Finally, all patents, patent application publications and non-patent material identified above are incorporated by reference herein. The features disclosed in this material may be used in the invention to the extent possible.