Device, system and method for reducing an interaction time for a contactless transaction

ABSTRACT

A method. The method comprises, at a reader, performing at least one transaction-based risk management process prior to energizing a contactless interface, initiating communication with a card utilized for the contactless transaction, receiving information associated with the card, and terminating communication with the card to authorizing the contactless transaction.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the priority benefit of U.S. Provisional PatentApplication No. 60/721,454, filed on Sep. 28, 2005, and U.S. ProvisionalPatent Application No. 60/807,775, filed on Jul. 19, 2006.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH AGREEMENTS

Not applicable

PARTIES TO JOINT RESEARCH

Not applicable

INCORPORATION OF MATERIAL SUBMITTED CD

Not applicable

BACKGROUND

This application disclosed an invention that is related, generally andin various embodiments, to a device, system and method for reducing andinteraction time for a contactless transaction.

Contactless and wireless communication technologies have become morewidespread in recent years. In the payment industry, contactlesspayments has a number of advantages over both traditional magneticstripe technologies and contact-based chip payment protocols. Forexample, traditional payment contact cards are known to operaterelatively slowly, and magnetic stripe cares are known to not besufficiently secure. Each of these technologies further requires a slotin a terminal reader that must be maintained by a merchant.

Contactless payment does not require a slot in which to enter the card.The consumer retains control over the card and merely positions the cardnear the terminal reader whenever necessary. The traditionalspecifications adopted by the payment industry for contact-based chippayment generally require the consumer to position the card near theterminal reader at different times and/or for extended periods of timein order to complete a transaction. With both merchants and consumersdesiring fast transaction times, contactless transactions executed inaccordance with the traditional specifications fail to meet marketrequirements.

Merchants and consumers are also demanding the contactless transactionsbe more secure. Although more recently issued contactless magneticstripe-based cards can be more secure than traditional magnetic stripecards, such contactless magnetic stripe-based cards are typicallydesigned only for online transactions. For contactless offlinetransactions executed in accordance with the traditional specifications,the transactions can be susceptible to various offline “man in themiddle” types of attacks generally referred to as sleeve attacks. Trojanhorse attacks, etc.

In one type of sleeve attack, a device intercepts data transmittedwirelessly from a card reader that is intended for a contactless card.The device alters the data and subsequently transmits the altered datato the card. Instead of receiving the data transmitted by the cardreader, the card receives the altered data transmitted by the device.The care subsequently processes the altered data and transmits a messagerelated to the altered data to the card reader. The card readersubsequently grants approval of the transaction based on informationpresent in the message transmitted by the card. In another type ofsleeve attack, a device intercepts data transmitted wirelessly from thecard that is intended for the card reader. The device alters the dataand subsequently transmits the altered data to the card reader. Insteadof receiving the data transmitted by the card, the card reader receivesthe altered data transmitted by the device. The card reader subsequentlyprocesses the altered data and grants approval of the transaction basedon information present in the altered data transmitted by the device. Inother types of sleeve attacks, the device may cause a denial of serviceby not forwarding intercepted data to the card or the card reader.

In one type of Trojan horse attack, malicious software embedded in thecard alters valid data prior to information being sent to the cardreader. The card reader ultimately grants approval of the transactionbased on the altered data. In another type of Trojan horse attack,malicious software embedded in the card render alters valid data priorto the authorization process. The card reader ultimately grants approvalof the transaction based on the altered data.

For a given offline transaction, a “man in the middle” attack may beutilized to reduce the amount of the transaction as ultimatelyrecognized by the card and the card reader. For example, for a givenoffline transaction involving the purchase of goods from a merchant, thecard reader may wirelessly transmit data intended for the card whichindicates that the value of the transaction is equal to $15. However,prior to the data being received by the card, the device intercepts thedata and alters the data so that the altered data indicates that thevalue of the transaction is equal to only $1. Upon receiving theapproval, the merchant releases the goods with the belief that theapproved transaction amount was equal to $15. The difference between theactual transaction amount and the reduced transaction amount may affectthe amount ultimately received by the merchant from a card issuer.

BRIEF SUMMARY OF THE INVENTION

In one general respect, this application discloses a reader. Accordingto various embodiments, the reader comprises a contactless interface anda transaction module. The transaction module is coupled to thecontactless interface, and is structured and arranged to process acontactless transaction with less than one-half second of interactiontime between a card and the reader.

In another general respect, this application discloses a card. Accordingto various embodiments, the card comprises a transaction modulestructured and arranged for wireless communication, and the card isstructured and arranged to operate in a chip-mode and a magnetic stripedata mode.

In another general respect, this application discloses a system.According to various embodiments, the system comprises a reader and acard. The reader comprises a contactless interface and a transactionmodule. The card is structured and arranged to communicate with thereader via the contactless interface. The transaction module is coupledto the contactless interface, and is structured and arranged to processa contactless transaction with less than one-half second of interactiontime between the card and the reader.

In another general respect, this application discloses a method forreducing an interaction time for a contactless transaction. According tovarious embodiments, the method comprises, at a reader, performing atleast one transaction-based risk management process prior to energizinga contactless interface, initiating communication with a card utilizedfor the contactless transaction, receiving information associated withthe card, and terminating communication with the card prior toauthorizing the contactless transaction.

In another general aspect, this application discloses a method forpreventing a man in the middle attack on a contactless transaction.According to various embodiments, the method comprises receiving adynamic signature that comprises an application transaction counter, aterminal unpredictable number, a transaction amount, a transactioncurrency code, and a card unpredictable number. The method alsocomprises receiving a card unpredictable number, recalculating thedynamic signature utilizing the card unpredictable number, andauthorizing the contactless transaction offline if the dynamic signatureis validated.

Aspects of the invention may be implemented by a computing device and/ora computer program stored on a computer-readable medium. Thecomputer-readable medium may comprise a disk, a device, and/or apropagated signal.

DESCRIPTION OF DRAWINGS

Various embodiments of the invention are described herein by way ofexample in conjunction with the following figures.

FIG. 1 illustrates various embodiments of a reader for reducing aninteraction time for a contactless transaction;

FIG. 2 illustrates various embodiments of a system for reducing aninteraction time for a contactless transaction;

FIG. 3 illustrates various embodiments of a method for reducing aninteraction time for a contactless transaction;

FIG. 4 is a simplified flow diagram illustrating various embodiments ofa preliminary transaction processing step of the method of FIG. 3;

FIG. 5 is a simplified flow diagram illustrating various embodiments ofan application selection step of the method of FIG. 3;

FIG. 6 is a simplified flow diagram illustrating various embodiments ofan authorization step of the method of FIG. 3;

FIG. 7 illustrates various embodiments of a method for reducing aninteraction time for a second contactless transaction.

DETAILED DESCRIPTION OF THE INVENTION

It is to be understood that at least some of the figure and descriptionsof the invention have been simplified to focus on elements that arerelevant for a clear understanding of the invention, while eliminating,for purposes of clarity, other elements that those of ordinary skill inthe art will appreciate may also comprise a portion of the invention.However, because such elements are wells known in the art, and becausethey do not necessarily facilitate a better understanding of theinvention, a description of such elements is not provided herein.

FIG. 1 illustrates various embodiments of a reader 10 for reducing aninteraction time for a contactless transaction. The reader 10 may be anytype of device that is structured and arranged to communicate withanother device via a contactless interface. According to variousembodiments, the reader 10 may be merchant device that is integratedinto a point-of-sale de vice. As used herein, the phrase “interactiontime” refers to the interaction time between the reader 10 and anotherdevice, and does not include the time required to go online forauthorization of for the reader to validate a static or dynamicsignature of offline data authentication. The reader 10 may be utilizedwith existing payment system infrastructure for markets which requiretransaction times faster than those associated with traditional paymentprotocols. According to various embodiments, the reader 10 may beutilized to reduce the interaction time to less than approximately 500milliseconds.

The reader 10 comprises a contactless interface 12, and a transactionmodule 14 coupled to the contactless interface. The transaction module14 is structured and arranged to process a contactless transaction withless than on-half of a second of interaction time between the reader 10and another device. The transaction module 14 may also be structured andarranged to perform static data authentication and/or dynamic dataauthentication as described in more detail hereinbelow. According tovarious embodiments, the reader 10 further comprises a security module16 coupled to the transaction module 14. The security module 16 isstructured and arranged to prevent a “man in the middle” attack on acontactless transaction.

Each of the modules 14, 16 may be implemented in hardware or infirmware. According to various embodiments, the modules 14, 16 may beimplemented as software applications, computer programs, etc. utilizingany suitable computer language (e.g., C, C++, Delphi, Java, JavaScript,Perl, Visual Basic, VBScript, etc.) and may be embodied permanently ortemporarily in any type of machine, component, physical or virtualequipment, storage medium, or propagated signal capable of deliveringinstruction to a device. The software code may be stored as a series ofinstitutions or commands on a computer-readable medium such that when aprocessor reads the medium, the functions described herein areperformed. As used herein, the term “computer-readable medium” mayinclude, for example, magnetic and optical memory devices such asdiskettes, compact disc of both read-only and writeable varieties,optical disk drives, and hard disk drives. A computer-readable mediummay also include memory storage that can be physical, virtual,permanent, temporary, semi-permanent and/or semi-temporary. Acomputer-readable medium may further include one or more propagatedsignals, and such propagated signals may or may not be transmitted onone or more carrier waves. Although the modules 14, 16 are shown in FIG.1 as two separate modules, one skilled in the art will appreciate thatthe functionality of the modules 14, 16 may be combined into a singlemodule.

FIG. 2 illustrates various embodiments of a system 20 for reducing aninteraction time for a contactless transaction. The system 20 comprisesthe reader 10 and a card 22. As used herein, the term “card” refers toany type of device that can communicate with the reader 10 over thecontactless interface 12. According to various embodiments, the card 22may be a smart card, a mobile phone, a personal digital assistant, etc.The card 22 is structured and arranged to communicate with the reader 10via the contactless interface 12. According to various embodiments, thecard 22 comprises a transaction module 24 structured and arranged tocooperate with the reader 10 to execute the contactless transaction. Thecard 22 may further comprise a security module 26 structured andarranged to cooperate with the reader 10 to prevent a “man in the middleattack” on the contactless transaction. The modules 24, 26 may besimilar to the modules 14, 16 of the reader 10. According to variousembodiments, the card 22 may be a dual mode card which is structured andarranged to operate in either a chip-mode or in a magnetic stripe datamode (utilizing Track 2 equivalent data). The mode of operation utilizedby the card 22 may be determined by the card 22 based on thecapabilities of the reader 10.

The system 20 may further comprise a network 28 coupled to the reader190 and an issuer 30. The network 28 may be any suitable type of networkas known in the art, may be coupled to the reader 28 in an suitablemanner known in the art, and may be coupled to the issuer 30 in ansuitable manner known in the art. The network 28 may include any type ofdelivery system including, but not limited to a local area network(e.g., Ethernet), a wide area network (e.g. the Internet and/or WorldWide Web), a telephone network (e.g., analog, digital, wired, wireless,PSTN, ISDN, GSM, GPRS, and/or xDSL), a packet-switched network, a radionetwork, a television network, a cable network, a satellite network,and/or any other wired or wireless communications network configured tocarry data. The network 28 may include elements, such as, for example,intermediate nodes, proxy servers, routers, switches, and adaptersconfigured to direct and/or deliver data.

FIG. 3 illustrates various embodiments of a method 40 for reducing aninteraction time for a contactless transaction. The method 40 may beimplemented by the system 20 of FIG. 2. The method 40 comprises thegeneral steps of preliminary transaction processing 42, discoveryprocessing 44, application selection 46, application processing 48, andtransaction authorization 50.

To minimize the interaction time between the card 22 and the reader 10for a given transaction, the preliminary transaction processing step 42is performed by the reader 10 before requesting that the card 22 bepresented. During the preliminary transaction processing step 42, thereader 10 performs certain transaction-based risk management processes.For example, according to various embodiments, the reader 10 may obtainthe transaction amount and compare the transaction amount to atransaction limit, a floor limit, a card holder verification methodlimit, etc. Once the preliminary transaction processing step 42 iscompleted, the reader 10 may prompt a cardholder to present the card 22.Based on the preliminary transaction processing, the reader 10 mayrequest that the transaction be terminated, processed online, orprocessed offline. A simplified flow diagram illustrating variousembodiments of the preliminary transaction processing step 42 is shownin FIG. 4.

The discovery processing step 44 follows the preliminary transactionprocessing step 42. Once the card 22 is presented and is within range ofthe reader 10, the reader 10 energizes the contactless interface 12 andestablishes communication with the card 22 via the contactless interface12 during the discovery processing step 44. If the reader 10 detectsmultiple contactless cards 22 within its range, the reader 10 mayindicate this condition to a cardholder and may request that only onecard 22 be presented for the transaction. In addition, a reader 10 mayabort a transaction during the discovery processing step 44 andde-energize the contactless interface 12 upon a merchant command orafter a pre-defined timeout period.

The application selection step 46 follows the discovery processing step44. During the application selection step 46, the reader 10 transmits afirst command message (e.g., SELECT PPSE) to the card 22. The firstcommand message may serve as a request for a list of applicationidentifies, application labels and application priority indicators forapplications that are supported by the card 22 and are accessible viathe contactless interface 12. Responsive to the first command message,the card 22 builds such a list and transmits the list to the reader 10.According to various embodiments, the list may be provided within filecontrol information (FCI) transmitted to the reader 10. The reader 10the utilizes the list transmitted by the card 22 to build a list ofapplications common to the reader 10 and the card 22. After building thelist of common applications, the reader 10 transmits a second commandmessage (e.g., SELECT AID) to the card 22. The second command messagemay serve as a request to conduct the transaction utilizing a specificapplication from the list of common applications. According to variousembodiments, the specific application may be the common applicationhaving the highest priority as indicated by the application priorityindicators previously transmitted by the card 22. Responsive to thesecond command message, the card 22 transits a request the reader 10 toprovide various details concerning the capabilities of the reader 10 andtransaction specific requirements of the reader 10. According to variousembodiments, the requires details may be provided in a list of terminaldata objects (e.g., PDOL) associated with the reader 10. If the list ofterminal data objects includes a particular data element (e.g., terminaltransaction qualifiers), the process advances to the application step48. Otherwise, the reader 10 may terminate the transaction or attempt toprocess the transaction over another interface. A simplified flowdiagram illustrating various embodiments of the application selectionstep 46 is shown in FIG. 5.

During the application processing step 48, the reader 10 transmits athird command message (e.g., GPO) to the card 22 responsive to thecard's request for details concerning the capabilities of the reader 10and transaction specific requirements of the reader 10. The thirdcommand message is structured such that it can be utilized in lieu ofthree separate commands required previous specifications. By reducingthe number of commands and responses required to complete thecontactless transaction, the interaction time required between the cards22 and the reader 10 is further minimized. The third command message maycomprise values for any number of data elements requested by the card22. Various data element values indicate the type of transactionssupported by the reader 20, whether offline and/or online processing issupported or required by the reader 10, which cardholder verificationmethods are supported or required by the reader 10, etc. The dataelements may comprise terminal transaction qualifiers, the transactionamount, a terminal unpredictable number, a transaction currency code,and any other data requested by the card 22 in its response to thesecond command message.

Based on the type of transactions supported by the reader 10, the card22 then performs a number of risk-management processes associated with aparticular transaction type. According to various embodiments, therisk-management processes may include checking an internal cardindicator to protect against transaction tearing, comparing a value ofan application currency code to a value of a transaction currency code,comparing the number of personal identification number entries to apredetermined limit, determining whether a cardholder verificationmethod is required, comparing the transaction amount to a low valuelimit associated with the card 22, comparing the transaction amount to acumulative total transaction amount associated with the card 22,comparing a value of a consecutive transaction counter to a value of aconsecutive transaction limit, etc. By performing the recited riskmanagement processes at this point in the transaction, as opposed tobeing performed at a later point in accordance traditionalspecification, the interaction time between the card 22 and the reader10 is further minimized. Based on the risk-management processing, thecard 22 may request that the transaction be terminated, processedonline, or processed offline.

Following the completion of the risk-management processes, the card 22builds the appropriate response to the third command message andtransmits the response to the reader 10. The information included in theresponse may vary depending on whether the card 22 desires thetransaction to be authorized online, authorized offline, or terminated.For example, when the card 22 desires the transaction to be authorizedonline, the response may include an application transaction counter(ATC) that indicates the number of transaction processed by the card, anapplication cryptogram generated by the card 22 utilizing theapplication transaction counter and terminal data (e.g., the terminalunpredictable number and the transaction amount) included in the thirdcommand message, an application interchange profile (AIP) that indicatessupport for risk management features, issuer application data, and Track2 equivalent data, and various other data elements.

When the card 22 desires the transaction to be authorized offline, theresponse to the third command message may include an applicationtransaction counter (ATC) that indicates the number of transactionsprocessed by the card. The response may also include a dynamic signaturegenerated by the card 22 utilizing the application transaction counter,terminal data (e.g., the terminal unpredictable number, the transactionamount, and the transaction currency) included in the third commandmessage, and a card unpredictable number. The response may furtherinclude an application cryptogram generated by the card 22 utilizing theapplication transaction counter and terminal data (e.g., the terminalunpredictable number and the transaction amount) included the thirdcommand message. In addition, the response may include an applicationfile locator (AFL) that indicates the location of files and recordsrelated to the application, an application interchange profiles (AIP)that indicates support for risk management features, issuer applicationdata, and various other data elements. According to various embodiments,the card 22 may increment the application transaction counter prior toits causation of the appreciation cryptogram and the dynamic signature.If the size of the dynamic signature exceeds a predetermined threshold,the dynamic signature may be returned in authorization step 50 in resentto a fourth command message described hereinbelow. According to variousembodiments, the application cryptogram generated by the card 22comprises feeder data elements than application cryptograms utilized byprevious specifications. By utilizing fewer data elements to generatethe application cryptogram, overall processing time is reduced and theinteraction time between the card 22 and the reader 10 is furtherminimized.

The authorization step 50 follows the application processing step 48.After the reader 10 receives the response to the third command messagefrom the card 22, the card 22 may be removed from the range of thereader 10 when the transaction is to be authorized online. Therefore,the card 22 is not required to remain within range of the reader 10while online authorization is requested and performed. By being able toremove the card 22 at this point in the transaction process, theinteraction time between the card 22 and the reader 10 is furtherminimized. The reader 10 may then send the application cryptogram,provided by the card 22 in response to the third command message, onlineto the issuer 30. Based on a response subsequently received from theissuer 30, the reader 10 approves or declines the transaction.

When the transactional is to be authorized offline, the reader 10transmits a fourth command message (e.g., READ RECORD) to the card 22after receiving the response to the third command message from the card22, The fourth command message may serve as a request for the recordsindicated in the application file locator (AFL) provided by the card 22in response to the third command message. Responsive to the fourthcommand message, the card 22 transmits the appropriate records to thereader 10. When the last record is received by the reader 10, the card22 may be removed from the range of the reader 10. Therefore, the card22 is not required to remain within range of the reader 10 while offlineauthorization is performed. By being able to remove the card 22 at thispoint in the transaction process, the interaction time between the card22 and the reader 10 is further minimized. The reader 10 may then checkwhether the card 22 is expired. If the reader 10 determines that thecard 22 is not expired, the reader 10 may the perform offline dataauthentication. The type of offline data authentication performed,static data authentication (SDA) or dynamic data authentication (DDA),is determined based on the application interchange profile (AIP)provided by the card 22 in response to the third command message.

For static data authentication, the reader 10 attempts to validate thestatic signature provided by the card 22 in the response to the thirdcommand message. Static data authentication involves validatingimportant application data to ensure that the data has not beenfraudulently altered. If the static signature is validated, thetransaction is approved offline. Otherwise, the transaction may be sentonline or terminated. For dynamic data authentication, the reader 10attempts to validate the dynamic signature provided by the card 22 inresponse to the third command message. Dynamic data authenticationinvolves validating important application data to ensure that the datahas not been fraudulently altered and that the card 22 is genuine.According to various embodiments, the validation of the dynamicsignature may comprise utilizing the application transaction counter(ATC) and the terminal unpredictable number provided by the card 22 inthe response to the third command message to recalculate the dynamicsignature. According to other embodiments, the validation of the dynamicsignature may comprise utilizing a card unpredictable number receivedfrom the card to recalculate the dynamic signature. If the dynamicsignature is validated, the reader 10 generates a clearing message whichincludes the cryptogram provided by the card 22 in the response to thethird command message and other related data. Otherwise, the transactionmay be sent online or terminated. According to various embodiments, ifthe dynamic signature is not validated, the reader 10 may send thetransaction online utilizing the cryptogram previously received from thecard 22. Thus, the reader 10 may generate an online request with anoffline cryptogram. A simplified flow diagram illustrating variousembodiments of the authorization step 50 is shown in FIG. 6.

As described hereinabove, the method 40 may be utilized to minimize theinteraction time between the card 22 and the reader 10 for a contactlesstransaction to less than approximately 500 milliseconds. To prevent anoffline sleeve attack on the contactless transaction, variousembodiments of the method 40 may utilize a novel type of dynamic dataauthentication. For offline transactions, the card 22 may utilize theapplication transaction counter (ATC) and the card unpredictable number,along with the terminal unpredictable number, the transaction amount andthe transaction currency code included in the third command message(e.g., GPO) to create the dynamic signature. The application filelocator (AFL), which is subsequently sent with the dynamic signature tothe reader 10 in the response to the third command message, points torecords containing the RSA certificates and data related to dynamic dataauthentication. Therefore, during the authentication step 50, the reader10 may read an issuer certificate, a contactless card certificate, anddata related to dynamic data authentication. According to variousembodiments, the reader 10 may utilize the application transactioncounter (ATC), the card unpredictable number, the terminal unpredictablenumber, the transaction amount and the transaction currency codereceived from the card 22 in response to the fourth command message torecalculate the dynamic signature for validation purposes. In instanceswhere the contactless transaction has been subjected to a sleeve attack,the recalculation will not match the dynamic signature previouslyreceived from the card 22. For such instances, the reader 10 may declineor terminate the contactless transaction.

FIG. 7 illustrates various embodiments of a method 60 for reducing aninteraction time for a second contactless transaction that occursfollowing the request for online authorization at step 50 of method 40.According to various embodiments, the method 60 may comprise a portionof the method 40. The method 60 may be implemented by the system 20 ofFIG. 2. The method 60 may be utilized to minimize the interaction timebetween the card 22 and the reader 10 for the second contactlesstransaction to less than approximately 500 milliseconds. According tovarious embodiments, the method 60 comprises the general steps of secondtransaction request 62, application selection 64, application processing66, and transaction approval 68.

The second contactless transaction is not a financial transaction. Asthe second contactless transaction comprises the card 22 being presentedwithin range of the reader 10 for a second time, the process may bereferred to as card return processing. Prior to the start of theprocess, during the first transaction described hereinabove, both thereader 10 and the card 22 may indicate to one another that they supportcard return processing. For example, the reader 10 and the card 22 mayindicate their support of card return processing during the applicationselection step 46 of the first transaction.

After the request for online authorization at step 50 of method 40,either the reader 10 or the card 22 (via the cardholder) may request thesecond contactless transaction during the second transaction requeststep 62. According to various embodiments, reader 10 may request thesecond contactless transaction during the second transaction requeststep 62 when an issuer response to the online authorization requestcomprises a message to be delivered to the card 22. Such a message maybe utilized to provide updates or counter resets to the are 22, or toblock the account. For example, in an online authorization response, theissuer 30 may include a script message in the response which requestthat the card 22 be presented for a second time. In this manner, theissuer 30 may be able to subsequently block the account, replenishoffline spending capability, increase the offline spending limit, etc.even if the card 22 has not requested that such actions be taken. Toprompt the cardholder to present the card 22 for a second time, thereader 10 may display a message indicating that additional cardprocessing time is required, a message requesting to please present thecard again, etc.

According to other embodiments, the card 22 may request the secondtransaction in order to receive a reload when card offline spendingcapability becomes low. For example, when card offline spendingcapability becomes low, the card 22, via the cardholder, may request areload by requesting an online authorization and providing the currentavailable spending amount. To ensure that the card 22 being presented isthe same card 22 which was presented for the first transaction, the card22 may be authenticated during the second transaction request step 62.

The application selection 64 step follows the second transaction requeststep 62. The application selection step 64 of method 60 may be similarto the application selection step 46 of the method 40 describedhereinabove. During the application selection step 64, the reader 10transmits a command message (e.g., SELECT VSDC AID) to the card 22. Thecommand message may serve as a request to conduct the second transactionutilizing a specific application from the list of common applicationspreviously built by the reader 10. Responsive to the command message thecard 22 transmits a PDOL to the reader 10. The PDOL may be similar tothe PDOL transmitted to the reader 10 during the application selectionstep 46 of the method 40 described hereinabove. If the PDOL includes aparticular data element (e.g., terminal transaction qualifiers), theprocess advances to the application processing step 66.

The application process step 66 follows the application selection step64. The application processing step 66 may be similar to the applicationprocessing step 48 of the method 40 described hereinabove, but isdifferent in that no financial transaction processing is involved.During the application processing step 66, the reader to transmitsanother command message (e.g., GPO) to the card 22. Upon receipt of thecommand message, the card 22 builds an appropriate response andtransmits the response to the reader 10.

The transaction approval step 68 follows the application processing step66. According to various embodiments, if the issuer 30 decides to reloadthe offline spending capability associated with the card 22, the issuer30 may transmit a response cryptogram and approve the transaction orinclude a script message with a message authentication code (MAC). Thecryptogram or the MAC may serve to ensure that the updates, counterresets, etc. are only made to cards 22 associated with the issuer 30.

As described hereinabove, the method 60 may be utilized to change cardrisk parameters, card counters, card status, etc. For example, withrespect to changing card risk parameters, the method 60 may be utilizedto increase the offline spending limit, increase the single transactionlimit, allow the card to perform transactions in two or more differentcurrencies, change the currency conversion rate utilized, etc. Withrespect to changing card counters, the method 60 may be utilized, forexample, to reset the offline available spending amount, etc. Withrespect to changing the card status, the method 60 may be utilized toblock or unblock a particular application. One skilled in the art willappreciate that the method 60 may be utilized to change otherparameters, counters, etc.

While several embodiments of the invention have been described herein byway of example, those skilled in the art will appreciate that variousmodifications, alterations, and adaptions to the described embodimentsmay be realized without departing from the spirit and scope of theinvention defined by the appended claims. For example, according tovarious embodiments, the reader 10 system 20 and/or the method 40described hereinabove may be modified to prevent analogous types of“sleeve attacks” on wireless handsets, USB fobs, and other devices whichutilize the wireless transmission of information. Additionally, variousembodiments of the method 60 may be utilized to process transactionsrelated to currency conversions, loyalty programs, etc.

1. A reader, comprising: a contactless interface; a transaction modulecoupled to the contactless interface, wherein: the transaction module isstructured and arranged to: discover the presence of a contactlesspayment device within a predetermined distance from the reader; energizethe contactless interface upon discovery of the presence of thecontactless payment device within the predetermined distance from thereader, wherein the energized contactless interface enablescommunication between the contactless payment device and the reader;send to the contactless payment device, via the contactless interface, arequest for data; and receive, from the contactless payment device, viathe contactless interface, the requested data; perform: a contactlesstransaction with less than one-half second of interaction time betweenthe contactless payment device and the reader; and static and dynamicdata authentication using the requested data; and a security modulecoupled to the transaction module, wherein the security module isstructured and arranged to prevent a man in the middle attack on thecontactless transaction by validating a dynamic signature received fromthe contactless payment device, wherein the dynamic signature comprises:a transaction currency code; and a contactless payment deviceunpredictable number.
 2. A reader as defined in claim 1, wherein thevalidating of the dynamic signature received from the contactlesspayment device comprises recalculating the dynamic signature.
 3. Areader as defined in claim 2, wherein the dynamic signature isrecalculated using at least one of: the transaction currency code; andthe contactless payment device unpredictable number.
 4. A card issued byan issuer, comprising: a transaction module structured and arranged: forwireless communication, wherein the card is structured and arranged tooperate in both a chip-mode and a magnetic stripe data mode; tocooperate with a reader to: be discoverable by being within apredetermined distance of the reader; receive from the reader a firstcommand message containing a request for a list of applications that aresupported by the card for conducting a contactless transaction; send tothe reader, in response to the first command message, the requested listof the applications; receive from the reader a second command messagerequesting to conduct the contactless transaction utilizing one saidapplication in the list of applications; send, in response to the secondcommand message, a request to provide one type of contactlesstransaction supported by the reader; receive a third command messagecontaining the requested one type of said contactless transactionsupported by the reader; send, in response to the third command message:a request for offline authorization of the contactless transaction; anaddress in memory of the card of data related to the one saidapplication in the list of applications; and a dynamic signaturecomprising:  a transaction currency code; and  a card unpredictablenumber; receive, in response to the request for the offlineauthorization of the contactless transaction, a fourth command messagecontaining a request for the data related to the one said application inthe list of applications at the address in the memory of the card; send,in response to the fourth command message, the requested data related tothe one said application in the list of applications; and execute thecontactless transaction that includes interactive communications withthe issuer of the card with less than one-half second of interactiontime between the card and the reader; and a security module structuredand arranged to cooperate with the reader to prevent a man in the middleattack on the contactless transaction by validating the dynamicsignature.
 5. The card issued by the issuer as defined in claim 4,wherein the validating of the dynamic signature comprises recalculatingthe dynamic signature.
 6. A card issued by the issuer as defined inclaim 5, wherein the dynamic signature is recalculated using at leastone of: the transaction currency code; and the contactless paymentdevice unpredictable number.
 7. An apparatus comprising: a card issuedby an issuer; and a reader, comprising: a contactless interface; atransaction module, coupled to the contactless interface, and structuredand arranged to: discover the presence of the card within apredetermined distance from the reader; energize the contactlessinterface upon discovery of the presence of the card within thepredetermined distance from the reader, wherein the energizedcontactless interface enables communication between the card and thereader; send to the card, via the contactless interface, a request fordata including a dynamic signature; and receive, from the card, via thecontactless interface, the requested data including the dynamicsignature; process a contactless transaction within less than one-halfsecond of interaction time between the reader and the card; and asecurity module, coupled to the transaction module, and structured tocooperate with the card to prevent a man in the middle attack on thecontactless transaction by validating a dynamic signature, wherein thedynamic signature comprises: a transaction currency code; and a cardunpredictable number; and wherein the card is structured and arranged tocommunicate with the reader via the contactless interface, and includes:a transaction module structured and arranged to: send to the reader: arequest for information; and the requested data; receive, from thereader: the requested information; and the request for data; and asecurity module structured and arranged to cooperate with the reader toprevent, using the dynamic signature, a man in the middle attack on thecontactless transaction.
 8. The apparatus as defined in claim 7, whereinthe validating of the dynamic signature comprises recalculating thedynamic signature.
 9. The apparatus as defined in claim 8, wherein thedynamic signature is recalculated using at least one of: the transactioncurrency code; and the contactless payment device unpredictable number.10. A reader apparatus comprising: means for initiating communicationwith a contactless payment device utilized for a contactless transactionby: upon sensing the contactless payment device within a predeterminedrange from the reader apparatus, energizing a contactless interface withthe contactless payment device, wherein the energized contactlessinterface enables communication between the contactless payment deviceand the reader; and sending to the contactless payment device, via thecontactless interface, a first command message containing a request fora list of applications that are supported by the contactless paymentdevice for conducting the contactless transaction; means for receiving,via the contactless interface, in response to the first command message,the requested list of the applications; means for sending to thecontactless payment device, via the contactless interface, a secondcommand message requesting to conduct the contactless transactionutilizing one said application in the list of applications; means forreceiving, via the contactless interface, in response to the secondcommand message, a request from the contactless payment device toprovide one type of contactless transaction supported by the reader;means for sending, via the contactless interface, a third commandmessage to the contactless payment device containing the requested onetype of said contactless transaction supported by the reader; means forreceiving from the contactless payment device, via the contactlessinterface, in response to the third command message: a request foroffline authorization of the contactless transaction; and an addressrelated to data for the one said application in the list ofapplications; and a dynamic signature comprising: an applicationtransaction counter; a transaction currency code; and a contactlesspayment device unpredictable number; means for recalculating the dynamicsignature; means for validating the recalculated dynamic signature,wherein the offline authorization of the contactless transaction is notperformed unless the dynamic signature is validated by the means forvalidating; means for sending, via the contactless interface, inresponse to the request for the offline authorization of the contactlesstransaction, a fourth command message to the contactless payment devicecontaining a request for the data at the address for the one saidapplication in the list of applications; means for receiving from thecontactless payment device, via the contactless interface, in responseto the fourth command message, the requested data at the address for theone said application in the list of applications; means, in response toreceiving the requested data at the address for the one said applicationin the list of applications, for terminating communication via thecontactless interface with the contactless payment device; and means,after said terminating of the communication with the contactless paymentdevice, using the requested data at the address for the one saidapplication in the list of applications, performing the offlineauthorization of the contactless transaction, wherein the time betweensending of the first command message and the terminating of thecommunication via the contactless interface with the contactless paymentdevice is less than one-half second.
 11. The reader apparatus as definedin claim 10, wherein the means for validating the recalculated dynamicsignature validates the recalculated dynamic signature using at leastone of: the application transaction counter; the transaction currencycode; and the contactless payment device unpredictable number.
 12. Thereader apparatus as defined in claim 10, further comprising: means forre-establishing communication with the contactless payment device viathe contactless interface; and means for completing a second saidcontactless transaction with less than one-half second of interactionbetween the contactless payment device and the reader.
 13. The readerapparatus as defined in claim 12, wherein the second said contactlesstransaction comprises a non-financial contactless transaction.
 14. Thereader apparatus as defined in claim 12, wherein the means forcompleting the second said contactless transaction further comprisesmeans for transmitting, via the contactless interface, a messagecontaining a change to memory in the contactless payment device.
 15. Areader apparatus comprising: means for discovering the presence of acontactless payment device within a predetermined distance from thereader apparatus; means for energizing a contactless interface upondiscovery of the presence of the contactless payment device within thepredetermined distance from the reader apparatus, wherein the energizedcontactless interface enables communication between the contactlesspayment device and the reader apparatus; means for reading from thecontactless payment device via the contactless interface a dynamicsignature from a contactless payment device, the dynamic signatureincluding: a transaction currency code; and a contactless payment deviceunpredictable number; means for recalculating the dynamic signatureutilizing the contactless payment device unpredictable number; means forvalidating the recalculated dynamic signature; means, if therecalculated dynamic signature is validated, for offline authorizing ofthe contactless transaction; and means for completing a contactlesstransaction with less than one-half second of interaction between thecontactless payment device and the reader apparatus.
 16. The readerapparatus as defined in claim 15, wherein: the means for reading furtherreads a cryptogram from the contactless payment device that includes anapplication transaction counter; and the reader apparatus furthercomprises means, if the recalculated dynamic signature is not validatedby the validating means, for requesting that the contactless transactionbe processed online with the cryptogram.