Method and apparatus for funding an electronic purse

ABSTRACT

Techniques for funding an electronic purse (e-purse) are disclosed. According to one aspect of the invention, a mechanism is provided to enable a portable device to conduct transactions over an open network with a payment server without compromising security. In one embodiment, a device is loaded with an e-purse manager. The e-purse manager is configured to manage various transactions and functions as a mechanism to access an e-purse therein. The e-purse is funded by interactions among the e-purse manager, a payment server and a financial institution (its server) that maintains an account therefor.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/534,653, filed on Sep. 24, 2006, now U.S. Pat. No. 8,118,218.

BACKGROUND

1. Technical Field

The present invention is generally related to commerce over networks.Particularly, the present invention is related to electronic purses thatcan be advantageously used in portable devices configured for bothelectronic commerce (a.k.a., e-commerce) and mobile commerce (a.k.a.,m-commerce).

2. Description of the Related Art

Single functional cards have been successfully used in enclosedenvironments such as transportation systems. One example of such singlefunctional cards is MIFARE that is the most widely installed contactlesssmart card technology in the world. With more than 500 million smartcard ICs and 5 million reader components sold, MIFARE has been selectedas the most successful contactless smart card technology. MIFARE is theperfect solution for applications like loyalty and vending cards, roadtolling, city cards, access control and gaming.

It is noticed that such enclosed systems are difficult to be expandedinto other areas such as e-commerce and m-commerce because stored valuesand transaction information are stored in data storage of each tag thatis protected by a set of keys. The nature of the tag is that the keysneed to be delivered to the card for authentication before data can beaccessed during a transaction. This constraint makes systems using suchtechnology difficult to be expanded to an open environment such as theInternet for e-commerce and cellular networks for m-commerce as the keydelivery over a public domain network causes security concerns.

There is, thus, a need for a mechanism in devices, especially portabledevices, functioning as an electronic purse (e-purse) to be able toconduct transactions over an open network with a payment server withoutcompromising security.

SUMMARY

This section is for the purpose of summarizing some aspects ofembodiments of the present invention and to briefly introduce somepreferred embodiments. Simplifications or omissions in this section aswell as the title and the abstract of this disclosure may be made toavoid obscuring the purpose of the section, the title and the abstract.Such simplifications or omissions are not intended to limit the scope ofthe present invention.

Broadly speaking, the invention is related to a mechanism provided todevices, especially portable devices, functioning as an electronic purse(e-purse) to be able to conduct transactions over an open network with apayment server without compromising security. According to one aspect ofthe present invention, a device is loaded with an e-purse manager. Thee-purse manager is configured to manage various transactions andfunctions as a mechanism to access an emulator therein. The transactionsmay be conducted over a wired network or a wireless network.

According to another aspect of the present invention, a three-tiersecurity model is proposed, based on which the present invention iscontemplated to operate. The three-tier security model includes aphysical security, an e-purse security and a card manager security,concentrically encapsulating one with another. Security keys (eithersymmetric or asymmetric) are personalized within the three-tier securitymodel so as to personalize an e-purse and perform secured transactionwith a payment server. In one embodiment, the essential data to bepersonalized into an e-purse include one or more operation keys (e.g., aload key and a purchase key), default PINs, administration keys (e.g.,an unblock PIN key and a reload PIN key), and passwords (e.g., fromMifare). During a transaction, the security keys are used to establish asecured channel between an embedded e-purse and an SAM (SecurityAuthentication Module) or backend server.

The invention may be implemented in numerous ways, including a method,system, and device. In one embodiment, the present invention is a methodfor providing an e-purse, the method comprises providing a portabledevice embedded with a smart card module pre-loaded with an emulator,the portable device including a memory space loaded with a midlet thatis configured to facilitate communication between an e-purse applettherein and a payment server over a wireless network, wherein theportable device further includes a contactless interface thatfacilitates communication between the e-purse applet therein and thepayment server, and personalizing the e-purse applet by reading off datafrom the smart card to generate one or more operation keys that aresubsequently used to establish a secured channel between the e-purse anda SAM or a payment server.

According to another embodiment, the present invention is a system forproviding an e-purse, the system comprises a portable device embeddedwith a smart card module pre-loaded with an emulator, the portabledevice including a memory space loaded with a midlet that is configuredto facilitate wireless communication between an e-purse applet thereinand a payment server over a wireless network, the portable devicefurther including a contactless interface that facilitates communicationbetween the e-purse applet therein and the payment server, the paymentserver associated with an issuer of the e-purse, and a SAM moduleconfigured to enable the e-purse, wherein the SAM module is behind thepayment server when the e-purse is caused to communicate with thepayment server via the midlet over a wireless network (M-commerce inFIG. 2) or via the agent on a PC over a wired network (E-commerce inFIG. 2).

Accordingly one of the objects of the present inventions is to provide amechanism to be embedded in devices, especially portable devices, tofunction as an electronic purse (e-purse) to be able to conducttransactions over an open network with a payment server withoutcompromising security.

Other objects, features, and advantages of the present invention willbecome apparent upon examining the following detailed description of anembodiment thereof, taken in conjunction with the attached drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention will be readily understood by the following detaileddescription in conjunction with the accompanying drawings, wherein likereference numerals designate like structural elements, and in which:

FIG. 1A shows a three-tier security model based on which the presentinvention is contemplated to operate according to one embodimentthereof;

FIG. 1B shows a data flow in accordance with the three-tier securitymodel among three entities;

FIG. 2 shows an exemplary architecture diagram according to oneembodiment of the present invention;

FIG. 3A a block diagram of related modules interacting with each otherto achieve what is referred to herein as e-purse personalization by anauthorized person as shown in FIG. 2;

FIG. 3B shows a block diagram of related modules interacting with eachother to achieve what is referred to herein as e-purse personalizationby a user of the e-purse as shown in FIG. 2;

FIG. 3C shows a flowchart or process of personalizing an e-purseaccording to one embodiment of the present invention;

FIG. 4A and FIG. 4B show together a flowchart or process of financing ane-purse according to one embodiment of the present invention; and

FIG. 4C shows an exemplary block diagram of related blocks interactingwith each other to achieve the process FIG. 4A.

DETAILED DESCRIPTION OF THE INVENTION

In the following description, numerous specific details are set forth toprovide a thorough understanding of the present invention. The presentinvention may be practiced without these specific details. Thedescription and representation herein are the means used by thoseexperienced or skilled in the art to effectively convey the substance oftheir work to others skilled in the art. In other instances, well-knownmethods, procedures, components, and circuitry have not been describedin detail since they are already well understood and to avoidunnecessarily obscuring aspects of the present invention.

Reference herein to “one embodiment” or “an embodiment” means that aparticular feature, structure, or characteristic described in connectionwith the embodiment can be included in at least one implementation ofthe invention. The appearances of the phrase “in one embodiment” invarious places in the specification are not necessarily all referring tothe same embodiment, nor are separate or alternative embodimentsmutually exclusive of other embodiments. Further, the order of blocks inprocess, flowcharts or functional diagrams representing one or moreembodiments do not inherently indicate any particular order nor implylimitations in the invention.

Embodiments of the present invention are discussed herein with referenceto FIGS. 1A-4C. However, those skilled in the art will readilyappreciate that the detailed description given herein with respect tothese figures is for explanatory purposes only as the invention extendsbeyond these limited embodiments.

FIG. 1A shows a three-tier security model 100 based on which the presentinvention is contemplated to operate according to one embodimentthereof. The three-tier security model 100 includes physical security102, e-purse security 104 and card manager security 106.

Physical security 102 refers to a security mechanism provided by asingle functional card to protect data stored on the card. The card maybe hardware implemented or software emulated running on a type of media.Data on a single function card is protected by a set of access keys.These keys are configured onto the card when the card is issued. Toavoid obscuring aspects of the present invention, the process of how thekeys are configured onto the cards is to be omitted. For accessing thedata, related keys are delivered to a reader for authentication.

E-purse security 104 defines a set of protocols that enable micropayment transactions to be carried out in both wired and wirelessenvironments. With an electronic purse (a.k.a., e-purse) stored on asmart card, a set of keys (either symmetric or asymmetric) ispersonalized into the purse when the purse is being issued. During atransaction, the purse uses a set of respective keys for encryption andMAC computation in order to secure the message channel between the purseand the SAM or backend servers. For a single functional card, thee-purse security 104 will act as gates to protect actual operationsperformed on a single functional card. During personalization, thesingle functional card access keys (or its transformation) arepersonalized into the purse with the purse transaction keys.

Card Manager Security 106, referring to a general security framework ofa preload operating system in a smart card, provides a platform for PINmanagement and security channels (security domains) for cardpersonalization. This platform via a card manager can be used topersonalize a purse in one embodiment. One example of the card managersecurity 106 is what is referred to as a Global Platform (GP) that is across-industry membership organization created to advance standards forsmart card growth. A GP combines the interests of smart card issuers,vendors, industry groups, public entities and technology companies todefine requirements and technology standards for multiple applicationsmart cards. In one embodiment, a global platform security is used topersonalize a smart card. As a result, both e-purse keys and card accesskeys are personalized into the target tag.

FIG. 1B shows a data flow in accordance with the three-tier securitymodel among three entities a land-based SAM or a network e-purse server112, e-purse 114 acting as a gate keeper, and a single function tag 116.According to one embodiment of the present invention, communicationsbetween the land-based SAM or the network e-purse server 112 and thee-purse 114 are conducted in sequence of a type of commands (e.g., APDU)while communications between the e-purse 114 and the single function tag116 are conducted in sequence of another type of commands, wherein thee-purse 114 acts as the gate keeper to ensure only secured andauthorized data transactions could happen.

In reference to FIG. 1A, the physical security is realized in anemulator. As used herein, an emulator means a hardware device or aprogram that pretends to be another particular device or program thatother components expect to interact with. The e-purse security isrealized between one or more applets configured to provide e-pursefunctioning and a payment server. The card manager security (e.g.,global platform security) is realized via a card manager to updatesecurity keys to establish appropriate channels for interactions betweenthe server and the applets, wherein the e-purse applet(s) acts as agatekeeper to regulate or control the data exchange.

According to one embodiment, a smart card has a preloaded smart cardoperating system that provides security framework to control the accessto the smart card (e.g., an installation of external applications intothe smart card). In order to manage the life cycle of an externalapplication, a card manager module is configured by using the smart cardsecurity framework. For instance, a Java-based smart card, SmartMX, ispreloaded with an operating system JCOP 4.1. The Global Platform 2.1installed on the SmartMX performs the card manager functionality.

Referring now to FIG. 2, there shows an exemplary architecture diagram200 according to one embodiment of the present invention. The diagram200 includes a cellphone 202 embedded with a smart card module. Anexample of such a cell phone is a near field communication (NFC) enabledcellphone that includes a Smart MX (SMX) module. The SMX is pre-loadedwith a Mifare emulator 208 (which is a single functional card) forstoring values. The cellphone is equipped with a RFID interface (e.g.,ISO 144443) that allows the cellphone to act as a tag. In addition, theSMX is a JavaCard that can run Java applets. According to oneembodiment, an e-purse is built on top of the global platform andimplemented as an applet in SMX. The e-purse is configured to be able toaccess the Mifare data structures with appropriate transformed passwordsbased on the access keys.

In the cellphone 202, a purse manager midlet 204 is provided. ForM-commerce, the midlet 204 acts as an agent to facilitate communicationsbetween an e-purse applet 206 and one or more payment network andservers 210 to conduct transactions therebetween. As used herein, amidlet is a software component suitable for being executed on a portabledevice. The purse manager midlet 204 is implemented as a “midlet” on aJava cellphone, or an “executable application” on a PDA device. One ofthe functions this software component provides is to connect to awireless network and communicate with an e-purse applet which can resideon either the same device or an external smart card. In addition, it isconfigured to provide administrative functions such as changing a PIN,viewing a purse balance and a history log. In one application in which acard issuer provides an SA module 212 that is used to enable andauthenticate any transactions between a card and a corresponding server(also referred to as a payment server). As shown in FIG. 2, APDUcommands are constructed by the servers 210 having access to an SAmodule 212, where the APDU stands for Application Protocol Data Unitthat is a communication unit between a reader and a card. The structureof an APDU is defined by the ISO 7816 standards. Typically, an APDUcommand is embedded in network messages and delivered to the server 210or the e-purse applet 206 for processing.

For e-commerce, a web agent 214 on a computing device (not shown) isresponsible for interacting with a RFID reader and the network server210. In operation, the agent 214 sends the APDU commands or receivesresponses thereto through the RFID reader 216 to/from the e-purse applet206 residing in the cellphone 202. On the other hand, the agent 214composes network requests (e.g., an HTTP request) and receives responsesthereto from the payment server 210.

To personalize the cellphone 202, FIG. 3A shows a block diagram 300 ofrelated modules interacting with each other to achieve what is referredto herein as e-purse personalization by an authorized person as shown inFIG. 2. FIG. 3B shows a block diagram 320 of related modules interactingwith each other to achieve what is referred to herein as e-pursepersonalization by a user of the e-purse as shown in FIG. 2.

FIG. 3C shows a flowchart or process 350 of personalizing an e-purseaccording to one embodiment of the present invention. FIG. 3C issuggested to be understood in conjunction with FIG. 3A and FIG. 3B. Theprocess 350 may be implemented in software, hardware or a combination ofboth.

As described above, an e-purse is built on top of a global platform toprovide a security mechanism necessary to personalize applets designedtherefor. In operation, a security domain is used for establishing asecured channel between a personalization application and the e-purse.According to one embodiment, the essential data to be personalized intothe purse include one or more operation keys (e.g., a load key and apurchase key), default PINs, administration keys (e.g., an unblock PINkey and a reload PIN key), and passwords (e.g., from Mifare).

It is assumed that a user desires to personalize an e-purse embedded ina device (e.g., a cellphone). At 352 of FIG. 3C, a personalizationprocess is initiated. Depending on implementation, the personalizationprocess may be implemented in a module in the device and activatedmanually or automatically, or a physical process initiated by anauthorized person (typically associated with a care issuer). As shown inFIG. 3A, an authorized personal initiates a personalization process 304to personalize the e-purse for a user thereof via an existing newe-purse SA module 306 and a SA module 308 with the RFID reader 310 asthe interface. The card manager 311 performs at least two functions: 1.establishing a security channel, via a security domain, to install andpersonalize an external application (e.g., e-purse applet) in the cardpersonalization; and 2. creating security means (e.g., PINs) to protectthe application during subsequent operations. As a result of thepersonalization process 304, the e-purse applet 312 and the emulator 314are personalized.

Similarly, as shown in FIG. 3B, a user of an e-purse desires to initiatea personalization process to personalize the e-purse wirelessly (e.g.,via the m-commerce path of FIG. 2). Different from FIG. 3A, FIG. 3Ballows the personalization process to be activated manually orautomatically. For example, there is a mechanism on a cellphone that, ifpressed, activates the personalization process. Alternatively, a statusof “non-personalized” may prompt to the user to start thepersonalization process. As described above, a midlet 322 in a deviceacts as an agent to facilitate the communication between a paymentserver 324 and the e-purse 312 as well as the emulator 314, wherein thepayment server 324 has the access to the existing new e-purse SA module306 and an SA module 308. As a result of the personalization process,the e-purse applet 312 and the emulator 314 are personalized.

Referring now back to FIG. 3C, after the personalization process isstarted, in view of FIG. 3A, the RFID reader 310 is activated to readthe tag ID and essential data from a card in the device at 354. With anapplication security domain (e.g., a default security setting by a cardissuer), a security channel is then established at 356 between a newe-purse SAM (e.g., the SAM 306 of FIG. 3A) and an e-purse applet (e.g.,the e-purse applet 312 of FIG. 3A) in the device.

Each application security domain of a global platform includes three3DES keys. For example:

Key1: 255/1/DES-ECB/404142434445464748494a4b4c4d4e4f

Key2: 255/2/DES-ECB/404142434445464748494a4b4c4d4e4f

Key3: 255/3/DES-ECB/404142434445464748494a4b4c4d4e4f

security domain is used to generate session keys for a secured sessionbetween two entities, such as the card manager applet and a hostapplication, in which case the host application may be either a desktoppersonalization application or a networked personalization serviceprovided by a backend server.

A default application domain can be installed by a card issuer andassigned to various application/service providers. The respectiveapplication owner can change the value of the key sets before thepersonalization process (or at the initial of the process). Then theapplication can use the new set to create a security channel forperforming the personalization process.

With the security channel is established using the applicationprovider's application security domain, the first set of data can bepersonalized to the purse applet. The second set of data can also bepersonalized with the same channel, too. However, if the data are inseparate SAM, then a new security channel with the same key set (ordifferent key sets) can be used to personalize the second set of data.

Via the new purse SAM 306, a set of e-purse operation keys and pins aregenerated for data transactions between the new e-purse SAM and thee-purse applet to essentially personalize the e-purse applet at 358.

A second security channel is then established at 360 between an existingSAM (e.g., the SAM 308 of FIG. 3A) and the e-purse applet (e.g., thee-purse applet 312 of FIG. 3A) in the device. At 362, a set oftransformed keys is generated using the existing SAM and the tag ID. Thegenerated keys are stored in the emulator for subsequent data accessauthentication. At 358, a set of MF passwords is generated using theexisting SAM and the tag ID, then is stored into the e-purse applet forfuture data access authentication. After it is done, the e-purseincluding the e-purse applet and the corresponding emulator is set to astate of “personalized”.

FIG. 4A and FIG. 4B show together a flowchart or process 400 offinancing an e-purse according to one embodiment of the presentinvention. The process 400 is conducted via the m-commerce path of FIG.2. To better understand the process 400, FIG. 4C shows an exemplaryblock diagram 450 of related blocks interacting with each other toachieve the process 400. Depending on an actual application of thepresent invention, the process 400 may be implemented in software,hardware or a combination of both.

A user is assumed to have obtained a portable device (e.g., a cellphone)that is configured to include an e-purse. The user desires to fund thee-purse from an account associated with a bank. At 402, the user entersa set of personal identification numbers (PIN). Assuming the PIN isvalid, a purse manger in the device is activated and initiates a request(also referred to an OTA top off request) at 404. The midlet in thedevice sends a request to the e-purse applet at 406, which isillustrated in FIG. 4C where the e-purse manager midlet 434 communicateswith the e-purse applet 436.

At 408, the e-purse applet composes a response in responding to therequest from the midlet. Upon receiving the response, the midlet sendsthe response to a payment network and server over a wireless network. Asshown in FIG. 4C, the e-purse manager midlet 434 communicates with thee-purse applet 436 for a response that is then sent to the paymentnetwork and server 440. At 410, the process 400 needs to verify thevalidity of the response. If the response can not be verified, theprocess 400 stops. If the response can be verified, the process 400moves to 412 where a corresponding account at a bank is verified. If theaccount does exist, a fund transfer request is initiated. At 414, thebank receives the request and responds to the request by returning aresponse. In general, the messages exchanged between the payment networkand server and the bank are compliant with a network protocol (e.g.,HTTP for the Internet).

At 416, the response from the bank is transported to the payment networkand server. The midlet strips and extracts the APDU commands from theresponse and forwards the commands the e-purse at 418. The e-purseverifies the commands at 420 and, provided they are authorized, send thecommands to the emulator at 420 and, meanwhile updating a transactionlog. At 422, a ticket is generated to formulate a response (e.g., inAPDU format) for payment server. As a result, the payment server isupdated with a successful status message for the midlet, where the APDUresponse is retained for subsequent verification at 424.

As shown in FIG. 4C, the payment network and server 440 receives aresponse from the purse manager midlet 434 and verifies that theresponse is from an authorized e-purse originally issued therefrom witha SAM module 444. After the response is verified, the payment networkand server 440 sends a request to the financing bank 442 with which theuser 432 is assumed to maintain an account. The bank will verify therequest, authorize the request and return an authorization number insome pre-arranged message format. Upon receiving the response from bank,the server 440 will either reject the request or form a network responseto be sent to the midlet 434.

The e-purse verifies the authenticity (e.g., in APDU format) and sendscommands to the emulator 438 and updates the transaction logs. By now,the e-purse finishes the necessary steps and returns a response to themidlet 434 that forwards an (APDU) response in a network request to thepayment server 440.

Although the process 400 is described as funding the e-purse. Thoseskilled in the art can appreciate that the process of making purchasingover a network with the e-purse is substantially similar to the process400, accordingly no separate discussion on the process of makingpurchasing is provided.

The invention is preferably implemented by software, but can also beimplemented in hardware or a combination of hardware and software. Theinvention can also be embodied as computer readable code on a computerreadable medium. The computer readable medium is any data storage devicethat can store data which can thereafter be read by a computer system.Examples of the computer readable medium include read-only memory,random-access memory, CD-ROMs, DVDs, magnetic tape, optical data storagedevices, and carrier waves. The computer readable medium can also bedistributed over network-coupled computer systems so that the computerreadable code is stored and executed in a distributed fashion.

The present invention has been described in sufficient details with acertain degree of particularity. It is understood to those skilled inthe art that the present disclosure of embodiments has been made by wayof examples only and that numerous changes in the arrangement andcombination of parts may be resorted without departing from the spiritand scope of the invention as claimed. Accordingly, the scope of thepresent invention is defined by the appended claims rather than theforegoing description of embodiment.

We claim:
 1. A method for funding an e-purse, the method comprising:receiving a PIN from a user of a portable device, wherein the portabledevice is a near field communication (NFC) enabled device that includesa card module; initiating a request from a midlet embedded in theportable device after the PIN is verified, wherein the midlet sends therequest to an e-purse applet; causing the e-purse applet to compose aresponse to the request; sending the response by the e-purse applet overa wireless network to a server administrating the e-purse, the serverconfigured to verify the response against an account in a financialinstitution across a network, a fund transfer request is initiated bythe server to the financial institution when the response issuccessfully verified; receiving commands from the server in respondingto the fund transfer request; and causing an emulator in the portabledevice to update a transaction log after an authenticity of the commandsis verified by the e-purse applet wherein the e-purse in the portabledevice has been personalized by operations including: establishing aninitial security channel between the card module and an e-purse securityauthentication module (SAM) external to the card module to install andpersonalize the e-purse applet in the card module, and creating asecurity channel on top of the initial security channel to protectsubsequent operations of the card module with the e-purse SAM, whereinany subsequent transactions with the e-purse are conducted over thesecurity channel.
 2. The method as recited in claim 1, wherein the cardmodule is a SmartMX (SMX) module pre-loaded with the emulator forstoring secured values.
 3. The method as recited in claim 1, wherein thee-purse is built on top of a global platform and implemented as thee-purse applet, the global platform provides a security to personalizethe card module, wherein both e-purse keys and card access keys arepersonalized into a tag.
 4. The method as recited in claim 3, whereinthe security is realized via a card manager to update security keys toestablish appropriate channels for interactions between the server andthe e-purse applet, wherein the e-purse applet acts as a gatekeeper toregulate or control data exchange between the server and the portabledevice for funding the e-purse therein.
 5. The method as recited inclaim 2, wherein the e-purse is implemented in the emulator.
 6. Themethod as recited in claim 5, further comprising: accessing by thee-purse applet the emulator with appropriate transformed passwords basedon access keys.
 7. The method as recited in claim 1, wherein thecommands are network messages including Application Protocol Data Unit(APDU) commands, and said receiving commands from the payment servercomprises: extracting the APDU commands from the network messages. 8.The method as recited in claim 7, wherein the commands include aresponse from the financial institution transported to the server.
 9. Amethod for funding an e-purse, the method comprising: receiving arequest from a portable device; verifying the request with an account ina bank across a network; initiating a fund transfer request by a serverwith a financial institution administrating the e-purse when the requestis successfully verified; sending commands to the portable device tocause an emulator in the portable device to update a transaction log inthe portable device after an authenticity of the commands is verified bya midlet in the portable device, and wherein the request is a responsecomposed by an e-purse applet after the e-purse applet receives aninitial request from the midlet in the portable device and an PIN isentered by a user of the portable device and verified, the request issent over a wireless network to the server, and wherein the e-purse inthe portable device has been personalized by operations including:establishing an initial security channel between the card module and ane-purse security authentication module (SAM) external to the card moduleto install and personalize the e-purse applet in the card module, andcreating a security channel on top of the initial security channel toprotect subsequent operations of the card module with the e-purse SAM,wherein any subsequent operation of the emulator is conducted over thesecurity channel via the e-purse applet.
 10. The method as recited inclaim 9, wherein the portable device is a near field communication (NFC)enabled device that includes a card module.
 11. The method as recited inclaim 10, wherein the card module is a SmartMX (SMX) module pre-loadedwith the emulator for storing secured values.
 12. The method as recitedin claim 10, wherein the e-purse is built on top of a global platformand implemented as the e-purse applet, the global platform provides asecurity to personalize the card module, wherein both e-purse keys andcard access keys are personalized into a tag.
 13. The method as recitedin claim 12, wherein the security is realized via a card manager toupdate security keys to establish appropriate channels for interactionsbetween the server and the e-purse applet, wherein the e-purse appletacts as a gatekeeper to regulate or control data exchange between theserver and the portable device for funding the e-purse therein.
 14. Themethod as recited in claim 10, wherein the e-purse is implemented in theemulator.
 15. The method as recited in claim 14, further comprising:accessing by the e-purse applet the emulator with appropriatetransformed passwords based on access keys.
 16. The method as recited inclaim 9, wherein the commands are network messages including ApplicationProtocol Data Unit (APDU) commands, and said receiving commands from theserver comprises: extracting the APDU commands from the networkmessages.
 17. The method as recited in claim 16, wherein the commandsinclude a response from the financial institution transported to theserver.