Method and apparatus for authorizing a calling card telephone call

ABSTRACT

Method and apparatus for authorizing a calling card telephone call are described. In one example, a telephone calling card includes a planar body having a memory system, an input circuit, a controller, and a display. The memory system is configured to store key code information. The input circuit is configured to receive a personal identification number (PIN). The controller is configured to derive a key code from the key code information using the PIN. The display is configured to present the key code. The user may then use the key code for purposes of authorizing a call made using a calling card. The key code may change from time-to-time as the user uses the calling card. Since the user&#39;s PIN is not entered into a telephone by the user, the calling card is less susceptible to unauthorized and/or fraudulent use by third parties.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. provisional application Ser.No. 60/817,407, filed Jun. 30, 2006, which is incorporated by referenceherein in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to telephone systems and, moreparticularly, to a method and apparatus for authorizing a calling cardtelephone call.

2. Description of the Related Art

The use of telephone calling cards is well known. For example, acustomer may receive a telephone card that authorizes telephone callcharges to be charged to the customer's account. Typically, the user hasto dial a number associated with the calling card processing service andis prompted to dial-in an account number and a personal identificationnumber (PIN) for authentication and authorization purposes. Once theauthorization and authentication step is complete, the caller isprompted to dial the called party's telephone number and charges for thecall are charged to the customer's account. These types of calling cardare susceptible to fraud if the account number and the PIN are disclosedto unauthorized users. One well known fraud technique is to monitor aperson making a call using a calling card. By monitoring and recordingthe numbers being dialed into the phone, a person can determine thenumbers which need to be dialed to gain access to the account and thuscan make unauthorized telephone calls using the account.

One technique for combating this type of fraud requires the use of aspecialized phone having a magnetic card reader. The account and PINinformation is embedded in a magnetic strip on the calling card. When acard holder wants to use the calling card, the card is inserted into themagnetic card reader and the account and PIN information can be read.This method of automatically reading the account and PIN informationobviates the necessity of the user having to dial this information usingthe key pad. Therefore, the account and PIN information is notinadvertently disclosed to a third person monitoring the use of thephone by a user. A major disadvantage to this technique, however, isthat this calling card can only be used with phones having thecapability to read the magnetic strip and it is possible for local phonelistening devices to record the account number and pin when the phoneconverts the magnetic card reader information to dual tonemulti-frequency (DTMF) tones, which are sent over the phone line.

Accordingly, there exists a need in the art for a method and apparatusfor authorizing a calling card telephone call that prevents fraud anddoes not require specialized telephone equipment to use.

SUMMARY OF THE INVENTION

An aspect of the invention relates to a telephone calling cardapparatus. A planar body includes a memory system, an input circuit, acontroller, and a display. The memory system is configured to store keycode information. The input circuit is configured to receive a personalidentification number (PIN). The controller is configured to derive akey code from the key code information using the PIN. The display isconfigured to present the key code. The user may then use the key codefor purposes of authorizing a call made using a calling card. The keycode may change from time-to-time as the user uses the calling card.Since the user's PIN is not entered into a telephone by the user, thecalling card is less susceptible to unauthorized and/or fraudulent useby third parties.

Another aspect of the invention relates to processing a telephone call.A request for a call is received using a calling card and a useraccount. A key code generated by the calling card is received. The keycode being derived from key code information stored on the calling cardusing a PIN associated with the user account. Authorization for the callis verified by validating the key code. A telephone number is requested.The call is then routed based on the telephone number. In someembodiments, the call is placed between first and second endpointscoupled to the public switched telephone network (PSTN). The call isrouted over a packet network. In this manner, a call betweennon-subscribers to voice-over-internet-protocol (VoIP) technology may behandled using VoIP technology.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the manner in which the above recited features of the presentinvention can be understood in detail, a more particular description ofthe invention, briefly summarized above, may be had by reference toembodiments, some of which are illustrated in the appended drawings. Itis to be noted, however, that the appended drawings illustrate onlytypical embodiments of this invention and are therefore not to beconsidered limiting of its scope, for the invention may admit to otherequally effective embodiments.

FIG. 1 is a block diagram depicting an exemplary embodiment of acommunication system in accordance with one or more aspects of theinvention;

FIG. 2 is a block diagram depicting an exemplary embodiment of thesecure calling card in accordance with one or more aspects of theinvention

FIG. 3 is a flow diagram depicting an exemplary embodiment of a methodof processing a telephone call in accordance with one or more aspects ofthe invention; and

FIG. 4 is a block diagram depicting another exemplary embodiment of acommunication system in accordance with one or more aspects of theinvention.

DETAILED DESCRIPTION

FIG. 1 is a block diagram depicting an exemplary embodiment of acommunication system 100 in accordance with one or more aspects of theinvention. The communication system 100 includes an endpoint 102 (alsoreferred to as a first endpoint), one or more communication networks104, a call processor 106, and an endpoint 107 (also referred to as asecond endpoint). The communication networks 104 may include varioustypes of circuit-switched and/or packet networks, which may comprise thepublic switched telephone network (PSTN), voice-over-internet-protocol(VoIP) networks, the Internet, and the like. A more detailed example ofthe communication networks 104 is described below with respect to FIG.4. The endpoints 102 and 107 may include various types of devicescapable of making and receiving telephone calls over the communicationnetworks 104, including time division multiplexed (TDM) phone (i.e., aconventional telephone), an internet protocol (IP) phone, a computer, orthe like.

The call processor 106 includes various devices and systems forimplementing a call processing center. The call processor 106 isconfigured to perform one or more functions, including the processing oftelephone calls made using telephone calling cards. The call processor106 may be in communication with a database 112 that maintains dataassociated with calling card accounts. The telephone calling cardshandled by the call processor 106 may be conventional calling cards,where users use the cards to make telephone calls that are then billedto the corresponding accounts. Other exemplary telephone calling cardsinclude “pre-paid” calling cards. A pre-paid calling card is associatedwith an account that is pre-loaded with a block of minutes to be used. Acustomer purchases the pre-paid calling card for a particular fee. Inessence, a user purchases a block of minutes to be used to maketelephone calls. As the users make telephone calls, the balance isdebited from the associated pre-paid calling cards for the amount oftime spent for each call. Some pre-paid calling cards are disposed ofwhen the balance in the account is depleted. Other pre-paid callingcards may be “re-charged” by purchasing additional minutes.

In some embodiments, a call is made from the endpoint 102 to theendpoint 107 using a secure telephone calling card (“secure calling card114”). The secure calling card 114 obviates the need for a user 116 todial or otherwise enter private data, such as personal identificationnumber (PIN). Rather, the user inputs a PIN to the secure calling card114, which in turn outputs a key code. The key code is then used inplace of the PIN to authenticate the user for making calls using thesecure calling card 114. The key code may change from time-to-time suchthat a previously generated key code cannot be used to authenticate thesecure calling card 114. In this manner, the secure calling card 114substantially reduces the risk that the private data (e.g., PIN) isillicitly obtained by third parties as the user 116 uses the card.Exemplary embodiments of the secure calling card 114 are describedbelow.

FIG. 2 is a block diagram depicting an exemplary embodiment of thesecure calling card 114 in accordance with one or more aspects of theinvention. The secure calling card 114 includes a generally planar body202. The body 202 may be fashioned from plastic, metal, or like-typematerials, or a combination of such materials. The body 202 includes aninput keypad 204, a controller 206, a display 208, and a memory system210. The memory system 210 stores key code information from which keycodes are derived. In one embodiment, the key code information comprisesa plurality of key codes associated with a PIN of a user. Alternatively,the key code information may be mechanism that allows key codes to begenerated responsive to a PIN of a user. For example, the key codeinformation may be an algorithm that accepts a PIN as input and outputsa valid key code. The algorithm may be executed by the controller 206.In some embodiments, the memory system 210 comprises a non-volatilememory system, such as a programmable read-only memory (PROM), anerasable PROM (EPROM), an electronically erasable PROM (EEPROM), FLASHmemory, or the like. In some embodiments, the memory system 210 mayinclude a removable component, such as a removable FLASH memory card.

The controller 206 may comprise any type of processing element orcontrol logic known in the art. The controller 206 is coupled to receiveinput from the input keypad 204, and provide output to the display 208.The input keypad 204 may include a plurality of keys corresponding to arespective plurality of alphanumeric characters (e.g., numbers between 1and 6). A user uses the keypad 204 to enter a PIN, which is thenreceived by the controller 206. The display 208 may comprise any type ofdisplay known in the art capable of displaying a sequence ofalphanumeric characters, including digital read-out displays, such asliquid crystal displays (LCDs), light emitting diode (LED) displays, andthe like. Given an input PIN, the controller 206 obtains a key codeassociated therewith and provides the key code to the display 208 forpresentation to the user.

The controller 206 obtains the key code by accessing the memory system210 and the key code information stored therein. For example, in someembodiments, a set of key codes is stored in the memory system 210 andassociated with a particular PIN. The controller 206 may obtain one ofthe key codes in a set if the input PIN from the input keypad 204matches the PIN associated with the set of key codes. In otherembodiments, the controller 206 executes an algorithm stored in thememory system 210 to obtain the key code given an input PIN from theinput keypad 204. The algorithm may comprise, for example, acryptographic function or the like that takes a PIN and produces a fixedlength alphanumeric output code as a key code. That is, the PIN is usedas a “seed” to generate a key code. The algorithm may account for otherinputs (seeds) in combination with the PIN, such as time-of-day, togenerate the key code. This would assure that the key code changes fromtime-to-time. In general, the algorithm must be such that the callprocessing center can recover the user's PIN from the key code orotherwise verify that the entered key code is associated with the user'sPIN. For example, the call processing center may execute an inverse ofthe key code algorithm using the key code (and other data if used togenerate the key code) as parametric input. Such algorithms are known inthe art.

In some embodiments, the body 202 further includes a communicationinterface (I/F) 212. The communication interface 212 is coupled to thememory system 210. The communication interface 212 may be used to keycode information the memory system 210. The communication interface 212may comprise any type of communication circuitry known in the art,including any wired interface (e.g., universal serial bus (USB)),wireless interface, or the like.

The secure calling card 114 may be associated with a traditional accountor a pre-paid account. The memory system 210 may be updated with new keycode information over time. The memory system 210 may be updated usingthe communication interface 212. For example, the communicationinterface 212 may be coupled to a computer 250 coupled to a network 252,such as the Internet. In this manner, new or updated key codeinformation may be downloaded from the network 252 through the computer250 to the secure calling card 114 for storage in the memory system 210.If the memory system 210 includes a removable component, such as aremovable FLASH memory chip, the key code information may be updated byinserting a new removable component into the memory system 210.Alternatively, the removable component may be removed, updated, andre-inserted into the memory system 210. Those skilled in the art willappreciate that there are a myriad of possible mechanisms for updatingthe key code information in the memory system 210.

In some embodiments, the user may connect the secure calling card 114 toa database via the computer 250 and the network 252, such as thedatabase 112 shown in the communication system 100 of FIG. 1. Thedatabase 112 may maintain a range of key codes associated with each of aplurality of PINs corresponding to a respective plurality of users. Theuser may access the database 112 to establish a PIN, which is thenassociated with a plurality of key codes. The key codes for a given PINmay then be downloaded to the memory system 210 of the secure accesscard 114 along with the corresponding PIN. In such an embodiment, manydifferent users can use a single access card. Each user establishes aPIN, which is then associated with a plurality of key codes. The keycodes and PINs are downloaded to the memory system 210. Each user willgenerate a unique key code as a function of the user's PIN.

In other embodiments, the user may establish a PIN, as described above,but a set of key codes is not generated. Rather, an algorithm is used togenerate key codes “on-the-fly” as the user uses the secure calling card114. The algorithm may be downloaded into the memory system 210 of thesecure access card 114 via the computer 250 and the network 252. In suchan embodiment, any customer can use any other customer's secure callingcard, as long as the algorithm used is the same across calling cards.

For purposes of clarity by example, the input keypad 204, the controller206, the display 208, the memory system 210, and the communicationinterface 212 are shown as separate functional elements. Those skilledin the art will appreciate that one or more of such components may becombined and implemented as a single device, such as an integratedcircuit (IC). In any case, the electrical components on the securecalling card 114 are coupled to a power source 214 in the body 202. Thepower source 214 may comprise any type of power source known in the art,including a battery, solar power cells, or the like.

FIG. 3 is a flow diagram depicting an exemplary embodiment of a method300 of processing a telephone call in accordance with one or moreaspects of the invention. The method 300 may be understood withreference to the communication system 100 of FIG. 1. The method 300begins at step 302, where the user 116 uses the secure calling card 114to request a call. For example, the user 116 may dial a telephone numberof the call processor 106 (e.g., a toll free number). The user 116 maythen enter his or her account number or other type of indicia thatidentifies the user 116 to the call processor 106.

At step 304, the call processor 106 prompts the user 116 for a key code.At step 306, the user 116 generates a key code using the secure callingcard 114 and a PIN associated with the user or user account. Asdescribed above, the user 116 may generate the key code by inputting aPIN to the secure calling card 114. The secure calling card 114 thenderives a key code from key code information stored therein using thePIN (and possibly additional information). The secure calling card 114then displays the key code to the user 116 so that the user 116 maytransmit the key code to the call processor 106.

At step 308, the call processor 306 receives the key code from the user116. At step 310, the call processor 306 verifies authorization for thecall by validating the key code. For example, if the key code wasderived from a plurality of key codes associated with the PIN, the callprocessor 306 may recover a PIN associated with the key code. If the keycode was derived from a key code algorithm, the call processor 306 mayapply the key code to an inverse of the key code algorithm to recoverthe PIN. In either case, the call processor 306 verifies that therecovered PIN is indeed associated with the user's account.

At step 312, a determination is made whether the user 116 is authorizedto make the call. If not, the method 300 proceeds to step 314, where thecall is rejected. Otherwise, the method 300 proceeds to step 316, wherethe call processor 106 prompts the user 116 for a telephone number. Atstep 318, the call processor 106 receives the telephone number androutes the call based on the telephone number. For example, the callprocessor 106 causes the endpoint 107 to indicate an incoming call. Ifthe incoming call is answered at the endpoint 107, the call processor106 facilitates a connection between the endpoint 102 and the endpoint107 through the communication networks 104.

FIG. 4 is a block diagram depicting another exemplary embodiment of acommunication system 400 in accordance with one or more aspects of theinvention. The communication system 400 shows a more detailed embodimentof the communication system 100 of FIG. 1. The communication system 400includes a circuit-switched network 402, one or more packet networks404, and a circuit-switched network 406. The circuit-switched networks402 and 406 may be part of the same network, generally referred to asthe PSTN. As is well known in the art, the PSTN comprises a collectionof local exchange carriers (LECs) and inter-exchange carriers (IXC). Thepacket networks 404 may comprise various interconnected internetprotocol (IP) networks operated by various entities. At least a portionof the packet networks 404 may be generally referred to as the Internet.

In the present example, a telephone 408 is coupled to thecircuit-switched network 402, and a telephone 410 is coupled to thecircuit-switched network 406. The telephones 408 and 410 comprisetraditional telephones coupled to the PSTN and may be referred to asPSTN telephones. The packet networks 404 are also used to carrytelephone calls, such service generally referred to asvoice-over-internet-protocol (VoIP). For example, VoIP technology allowsusers to place telephone calls through the Internet, rather than usingthe PSTN. In the present example, a telephone 412 is coupled to aterminal adapter (TA) 414, which is in turn coupled to the packetnetworks 404. One of the functions of the TA 414 is to convert the voicesignals to digital data packets for transmission over the packetnetworks 404. Some phones have built-in terminal adapters and aretypically referred to as IP phones.

Also in the present example, a personal computer (PC) 416 is coupled toa gateway/router 419, which is in turn coupled to the packet networks404. As a PC typically includes a microphone and speaker, the PC 416 canalso be used as a telephone and can operate similarly to the telephone412 and TA 414. The PC 416 performs the function of the TA to covertvoice signals to digital data packets for transmission over the packetnetworks 404. Although telephones and PCs are shown by example, thoseskilled in the art will appreciate that other types of devices may beused to implement VoIP telephones, such as notebook computers, personaldigital assistants (PDAs), and the like.

In some cases, a user of a PSTN telephone will call a user of a VoIPtelephone, such as a call between the telephone 408 and the telephone412 (PSTN-to-VoIP call flow). In such cases, a user of the telephone 408dials the phone number assigned to user of the telephone 412. Thecircuit-switched network 402 recognizes the telephone number as a numberassociated with a VoIP service provider and transmits the call to aninbound point of presence (POP) or regional data center (RDC) (“inboundPOP/RDC 418”). The inbound POP/RDC 418 provides an interface between thecircuit-switched network 402 and the packet networks 404. The inboundPOP/RDC 418 provides the call to a call processing center 420 of theVoIP service provider via the packet networks 404. The call processingcenter 420 obtains the IP address of the TA 414 associated with thetelephone. The call processing center 420 then signals the TA 414 of theincoming call. The signaling between the inbound POP/RDC 418 and thecall processing center 420, and between the call processing center 420and the TA 414, may be performed using various signaling protocols, suchas the session initiation protocol (SIP) or the like. If the call isanswered at the telephone 412, a voice stream is established between theTA 414 and the inbound POP/RDC 418 over the packet networks 404, such asa real-time transport protocol (RTP) stream or the like. The inboundPOP/RDC 418 converts the voice stream for transmission over thecircuit-switched network 402 to the telephone 408. At the end of thecall, the inbound POP/RDC 418 and the TA 414 signal the call processingcenter 420 that the call has ended. As a result, the call processingcenter 420 can determine the appropriate billing information. Theabove-described call flow is merely exemplary and various detailsrelated thereto have been omitted for clarity.

In other cases, a user of a VoIP telephone will call a user of a PSTNtelephone, such as a call between the telephone 412 and the telephone410 (VoIP-to-PSTN call flow). In such cases, a user of the telephone 412dials the phone number assigned to the user of the telephone 410. Thecall processing center 420 recognizes the telephone number as being astandard PSTN telephone number and provides the call to an outbound POPor RDC (“outbound POP/RDC 422”) via the packet networks 404. Theoutbound POP/RDC 422 provides an interface between the packet networks404 and the circuit-switched network 406. The outbound POP/RDC 422coverts the IP data to time division multiplexed (TDM) format, which ishanded off to the circuit-switched network 406. The circuit-switchednetwork 406 then signals the telephone 410 of the incoming call in aconventional manner. The signaling between the outbound POP/RDC 422 andthe call processing center 420, and between the call processing center420 and the TA 414, may be performed using various signaling protocols,such as SIP or the like. If the call is answered at the telephone 410, avoice stream is established between the TA 414 and the outbound POP/RDC422 over the packet networks 404, such as an RTP stream or the like. Atthe end of the call, the outbound POP/RDC 422 and the TA 414 signal thecall processing center 420 that the call has ended. As a result, thecall processing center 420 can determine the appropriate billinginformation. The above-described call flow is merely exemplary andvarious details related thereto have been omitted for clarity.

In the above-described call flows, one of the users has subscribed toVoIP technology (e.g., the user of the telephone 412). Users who havenot subscribed to VoIP technology have not previously been given theoption of using VoIP technology for calls placed to othernon-subscribing users. For example, a call between the telephone 402 andthe telephone 410 is typically facilitated using only the PSTN (circuitswitched networks 404 and 406). In some embodiments of the invention,users of PSTN telephones can selectively use VoIP technology, even whenthe users are non-subscribers to VoIP technology and are calling othernon-subscribers of VoIP technology (e.g., a call between PSTN phones).This may be done using the secure calling card 114.

In particular, a user of a PSTN telephone (e.g., the telephone 402)obtains the secure calling card 114 provided by a VoIP service provider.Assume the VoIP service provider that provides the secure calling card114 also operates the inbound and outbound POP/RDCs 418 and 422, as wellas the call processing center 420. The call processing center 420 iscoupled to the PSTN (e.g., the circuit-switched network 404 and/or thecircuit switched network 406). Thus, in some embodiments, the callprocessing center 420 provides a similar function as the POP/RDC, i.e.,interfacing between the packet networks 404 and the PSTN. The user thenuses the secure calling card 114 as described above in the method 300 ofFIG. 3. The call processing center 420 routes a call from the telephone402 to the called telephone using the packet networks 404. The callprocessing center 420 receives and packetizes the voice signals from thetelephone 402 for transmission over the packet networks 404. If thecalled telephone is a VoIP telephone (e.g., the telephone 412), the callprocessing center 420 routes the call to the TA 414 through the packetnetworks 404, as described above in the PSTN-to-VoIP call flow. If thecalled telephone is a PSTN telephone (e.g., the telephone 410), the callprocessing center 420 routes the call to a POP/RDC (e.g., the outboundPOP/RDC 422) through the packet networks 404, as described above in theVoIP-to-PSTN call flow. In this manner, a call between two PSTNtelephones may be facilitated using the secure calling card 114 and VoIPtechnology.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

1. A telephone calling card apparatus, comprising: a planar card bodyhaving mounted thereon: a memory system configured to store key codeinformation; an input circuit configured to receive a personalidentification number (PIN); a controller configured to derive a keycode from the key code information using the PIN; and a displayconfigured to present the key code.
 2. The apparatus of claim 1, whereinthe memory system comprises a non-volatile memory system.
 3. Theapparatus of claim 1, wherein the key code information comprises aplurality of key codes associated with the PIN, and wherein thecontroller is configured to derive the key code by selecting one of theplurality of key codes.
 4. The apparatus of claim 1, wherein the keycode information comprises a key code algorithm, and wherein thecontroller is configured to derive the key code by executing the keycode algorithm using the PIN as parametric input.
 5. The apparatus ofclaim 4, wherein the controller is configured to execute the key codealgorithm using additional data in combination with the PIN asparametric input.
 6. The apparatus of claim 1, wherein the planar cardbody further includes: a communication interface, coupled to the memorysystem, configured to receive the key code information for storage inthe memory system.
 7. The apparatus of claim 1, wherein the inputcircuit comprises an input keypad, and wherein the display comprises adigital read-out display.
 8. A method of processing a telephone call,comprising: receiving a request for a call using a calling card and auser account; receiving a key code generated by the calling card, thekey code being derived from key code information stored on the callingcard using a personal identification number (PIN) associated with theuser account; verifying authorization for the call by validating the keycode; prompting for a telephone number; and routing the call based onthe telephone number.
 9. The method of claim 8, wherein the key codeinformation comprises a plurality of key codes associated with the PIN,and wherein the step of verifying comprises: searching a database toverify that the key code is one of the plurality of key codes associatedwith the PIN.
 10. The method of claim 8, wherein the key codeinformation comprises a key code algorithm, and wherein the step ofverifying comprises: recovering the PIN by executing an inverse of thekey code algorithm using the key code as parametric input.
 11. Themethod of claim 10, wherein the PIN is recovered using additional datain combination with the key code as parametric input.
 12. The method ofclaim 8, wherein the request and the key code are received at a callprocessing center of a voice-over-internet-protocol (VoIP) serviceprovider.
 13. The method of claim 8, wherein the request for the call isreceived from a first endpoint and the telephone number is associatedwith a second endpoint, each of the first and second endpoints beingcoupled to a public switched telephone network (PSTN), and wherein thecall is routed over a packet network.
 14. A communication system,comprising: a first endpoint configured to provide a request for a call;a second endpoint; a calling card configured to generate a key codederived from key code information using a personal identification number(PIN) associated with a user account; and a call processing centerconfigured to verify authorization for the call by validating the keycode, to prompt for a telephone number of the second endpoint, and torout the call from the first endpoint to the second endpoint.
 15. Thesystem of claim 14, further comprising: a packet network; wherein thecall processing center routes the call through the packet network. 16.The system of claim 15, wherein the first endpoint and the secondendpoint are each coupled to a public switched telephone network (PSTN).17. The system of claim 14, wherein the calling card comprises: a planarcard body having mounted thereon: a memory system configured to storethe key code information; an input circuit configured to receive thePIN; a controller configured to derive the key code from the key codeinformation using the PIN; and a display configured to present the keycode.
 18. The system of claim 17, wherein the key code informationcomprises a plurality of key codes associated with the PIN, and whereinthe controller is configured to derive the key code by selecting one ofthe plurality of key codes.
 19. The system of claim 17, wherein the keycode information comprises a key code algorithm, and wherein thecontroller is configured to derive the key code by executing the keycode algorithm using the PIN as parametric input.
 20. The system ofclaim 17, wherein the planar card body further includes: a communicationinterface, coupled to the memory system, configured to receive the keycode information for storage in the memory system.