Wireless transaction and information system

ABSTRACT

A financial information and transaction system utilizes wireless communication in connection with portable terminals. In this system, a terminal is connected to the financial institution via a wireless or cellular telephone hook-up. Smart cards are utilized to verify authorization for transactions, thereby minimizing potential security problems which could otherwise result from use of a mobile terminal. Alternately, a smart card is advantageously utilized not only for authorization, but also to maintain a secure record of available funds. The system not only provides the functionality of an ATM network, but also provides non-financial services, thereby forming an integrated system.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a divisional of U.S. patent application Ser. No. 08/558,091 filed Nov. 13, 1995 now U.S. Pat No. 5,796,832.

Reference is made to commonly owned co-pending application Ser. No. 08/177,548 entitled “WIRELESS SCREEN TELEPHONE,” the disclosure of which is incorporated by reference herein.

FIELD OF THE INVENTION

This invention relates to a system for providing information and performing financial transactions. In particular, it relates to a financial system which utilizes wireless, portable terminals for providing financial information and performing financial transactions.

BACKGROUND OF THE INVENTION

The proliferation of automated teller machines (ATMs) has revolutionized the banking and financial services industry by increasing the ability to provide financial services to the consumer. For example, in the past virtually all consumer transactions were conducted in person. Thus, consumer access was generally limited to the business hours of branch locations. With the advent of ATM and other financial networks, consumers may now access financial services virtually twenty-four hours a day, seven days a week. This results in increased convenience and efficiency both for the service provider and the consumer.

Despite these successes, ATM and other financial networks in use today are characterized by certain shortcomings which limit consumer access and provide a barrier to more widespread accessibility and use. For example, the ATMs in greatest use today are hard wired in a fixed location. This hard wiring is necessary to provide power for the terminal and to provide access to communication lines, such as telephone lines, over which data may be exchanged with the financial service provider. Security concerns also play a role in limiting ATMs to fixed locations.

As a result of the fixed location of such terminals, financial networks must take great care in distributing ATMs over a particular geographic region so as to maximize consumer access. However, with changing demographics, such distributions may become less advantageous. For example, a new shopping mall may open in a first location, increasing demand in that area, while another mall may close in a second location thereby decreasing demand in that location. One-time or isolated events resulting in an unexpected influx of people to a particular area may also result in an overwhelming demand which cannot be met satisfactorily by an existing distribution of terminals.

Currently, such problems may be addressed by providing additional ATM terminals. However, the capital costs of such terminals and the necessary peripheral equipment, such as power supplies, maintenance facilities and so forth may be too prohibitive to permit adaptive response to the above-described changes in consumer demand.

Accordingly, there is a need for a financial transaction and information system which can overcome the aforementioned shortcomings. Specifically, there is a need to provide transaction and information terminals which can be conveniently repositioned by the operator as necessary to maximize availability and use of the financial services provided thereby. Further, there is a need for transaction and information terminals which do not need to be directly connected by lines to a telephone network or power source network.

There is an additional need to provide the above-described features without compromising the security provided by existing systems and without introducing inordinate costs.

SUMMARY OF THE INVENTION

It is an object of the invention to meet these needs, and others, through a financial information and transaction system which utilizes wireless communication in connection with portable terminals. In this system, a terminal is connected to the financial institution via a wireless or cellular telephone hook-up. It is a feature of the invention that so-called “smart cards” are utilized to verify authorization for transactions, thereby minimizing potential security problems which could otherwise result from use of a mobile terminal. According to an alternate embodiment of the invention, a smart card is advantageously utilized not only for authorization, but also to maintain a secure record of available funds.

According to another embodiment of the invention, a portable transaction terminal is internally powered by, for example, rechargeable batteries. In an alternate embodiment, the terminal is powered by a standard ac power supply through a conventional outlet.

In yet another embodiment of the invention, a cellular telephone, having a smart card reader incorporated therein, is utilized as a data terminal for various financial transactions.

According to a further embodiment, the system not only provides the functionality of an ATM network, but also provides non-financial services thereby forming an integrated system.

The above, and other objects, features and advantages of the present invention will become readily apparent from the following detailed description thereof which is to be read in connection with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:

FIG. 1 is a block diagram of a financial information and transaction system in accordance with the invention.

FIG. 2A is a block diagram of a first application of the invention which includes a wireless transmitting/receiving station.

FIG. 2B is a block diagram showing a second application of the invention which includes a wireless transmission/receiving station.

FIG. 2C is a perspective view of a cellular telephone terminal in accordance with the invention.

FIG. 3A is a perspective/block view of a first portable wireless transaction and information terminal in accordance with the invention.

FIG. 3B is a perspective/block view of a second portable wireless transaction and information terminal in accordance with the invention.

FIG. 4 is a block diagram of a wireless transaction and information system in accordance with the invention.

FIG. 5 is a block diagram of a smart card according to the invention.

FIG. 6 is a block diagram of a file structure of the smart card of FIG. 5.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 1 is a block diagram illustrating a system for providing financial information and performing financial transactions in accordance with the present invention. In this embodiment, a financial institution is represented by block 10. As known in the art, the financial institution, such as a consumer banking institution, utilizes an automated system, including a host computer, for maintaining records of customer accounts. These records are used to keep track of funds in the customer accounts, to enter debits and credits made to such accounts, and for other purposes.

In order to provide various services to the customer, such as providing account information and account debiting and crediting at the customer's request, a communications front end 12 is used to exchange data corresponding to such information. The communication front end 12 provides access to the host computer operated by the financial institution 10 from a variety of communication systems. For example, as shown, the communications front end 12 may exchange data with a standard switch network 14, such as one operated by a regional telephone company. Thus, data transfer utilizing such a system generally takes place over the telephone line. In this way, data may be exchanged with a user suitably linked to the standard switch network 14 with a modem using any of a variety of communication protocols known in the art. Moreover, data may be exchanged in this way other financial institutions and financial networks (not shown), for example, to provide data for settlement of various customer transactions.

Alternately, the communication front end 12 may be connected to a network service provider 16 or a private network 18. For example, one of several commercial services now available may link users throughout a geographic area. Further, the communications front end 12 may provide an interface between the financial institution 10 and a private network 18 comprising, for example, one or more local area networks (LAN) or wide area networks (WAN).

Further, the communications front end in this representation is connected to a direct wireless service 20. For example, such a hook-up could operate at a very high frequency (900 megahertz) along a cellular telephone-type or spread spectrum type connection (900 megahertz with multiplexers) for security purposes. The signal from the direct wireless service 20 may be received by a number of different types of terminals, described below.

As illustrated, FIG. 1 shows direct links between the communications front end 12 and the various types of communication systems 14, 16, 18, and 20. However, it will be understood by those skilled in the art that various combinations of such systems, and others, are possible. For example, a private network 22 may be accessed with the communications front end 12 through a network service provider 16. Alternatively, rather than the direct wireless communication represented by block 20, wireless communication may take place using various commercial wireless service providers 24 via the standard switch network 14. Other networks 26, such as the so-called “Internet,” may be accessed with the standard switch networks 14.

FIGS. 2A to 2C illustrate various applications in which wireless data transmission may be utilized to provide convenient access to a financial institution, such as the financial institution 10 mentioned above in relation to FIG. 1. For example, FIG. 2A illustrates an application in which a wireless transmitting and receiving station 50 is operatively linked to various terminals A to D distributed in a shopping mall 52 or other localized area.

In FIG. 2B, a wireless transmitting and receiving station 54 is operatively linked to a financial server 56 associated with LAN or WAN of a business. Various nodes 58, 60, and 64 are provided along the network of the business. One such node 64 shown in FIG. 2B may comprise a personal computer which includes a smart card reader 64 a.

In FIG. 2C a cellular telephone 75 serves as a financial information and transaction terminal. In this embodiment, the cellular telephone 75 includes standard features such as an alpha-numerical keypad 80, a speaker portion 76, a microphone portion 82, and a display 78 (for example, a LCD display). Additionally, a smart card reader portion 84 is provided. This additional feature provides the additional capability to perform financial transactions using the keypad 80 as an interface. The functionality of this embodiment and of those described above is apparent from the ensuing description.

FIGS. 3A and 3B illustrate in greater detail embodiments of a portable, wireless terminal in accordance with the invention. In both of these embodiments and in those which are later described, use is made of a smart card and a smart card reader. As is known in the art, a smart card is a device which may include processing means as well as both volatile and non-volatile memory. Data stored in read-write memory on the smart card may be exchanged with a reader device, typically through a serial interface. One advantage of such use of the smart card is that encryption algorithms may be stored and processed with the smart card to allow the smart card to be validated from a remote location, for example, by a host computer operated by a financial institution. In this way, information can be securely exchanged between the card and the remote location using one or more encryption keys that are in place in both locations. The encryption keys are used to encode information to be transmitted and to decode information that is received.

Using encryption techniques, it is possible not only to encode financial information stored remotely by a host computer or locally on the smart card, but also to encode identification information, such as personal identification numbers (PINs). In this way a user's PIN may be encrypted by the smart card and communicated to a remote host which has the same encryption key to decode the encrypted PIN and to validate it. This provides authorization to access information stored by the host and/or to request various financial transactions.

FIG. 3A illustrates a first wireless terminal 100 for use with a smart card. This terminal 100 includes a customer interface 102, such as an alpha-numerical keypad 104, a display 106, and a smart card reader 108. Signals provided from a wireless service provider, such as one described in FIG. 1, are received by a transmitter/receiver portion 110 of the terminal 100. Conversely, signals are provided from the transmitter/receiver portion 110 of the terminal 100 to a front end processor via wireless service provider. In this manner, the terminal 100 may be used to wirelessly receive and transmit data to and from a financial institution or financial network. This data may then be read and write from and onto a smart card that is inserted into the smart card reader 108.

In this embodiment, the terminal 100 may be advantageously used to read data stored on a smart card to determine, for example, a value corresponding to an amount of funds existing in the user's account. With the terminal 100, the user may add to the amount stored on the card and have the added amount debited from the user's account by the host computer. In such a way, the terminal thereby functions as a credit-authorization terminal. The authorization and financial information is kept secure during transmission as a result of the encryption capabilities of a smart card that is used to access the terminal 100.

For example, the user may insert a smart card into the smart card reader 108. The card first encrypts, then transmits to the terminal 100 information stored on a smart card. This information identifies the financial institution which maintains the user's account as well as the user's account number. Additional security may be obtained by requiring that the user input a PIN with the numeric keypad. Again, the smart card can then encrypt the PIN for transmission by the terminal to a host computer for verification.

Once authorization has been obtained, the user may determine the user's current account balance and/or request that value be added to the card. In executing these requests, the terminal exchanges encoded information by wireless transmission with a financial network, such as one described above with respect to FIG. 1. For example, the terminal may be used to directly add value to the user's card, and then request by wireless transmission that the customer's account be debited a corresponding amount. These requests comprise encoded data which is decoded by the host computer associated with financial institution.

When the funds are transferred to and from the smart card, an encrypted bank signature appended to the funds certifies that the funds are “real.” It also ensures that when the transaction enters the settlement system, the funds are validated. Because the settlement system may involve more than one financial institution, when the transaction is ultimately presented to the financial institution for payment, the encrypted bank signature verifies that the transaction is authentic.

In the embodiment shown in FIG. 3A, the terminal 100 may operate with a standard ac supply 112 from a conventional outlet. In the embodiment of FIG. 3B (in which identical reference numerals are used to refer to corresponding structure described in reference to FIG. 3A), a terminal 120 is powered by rechargeable batteries 122 in order to provide even greater mobility.

It will be appreciated that such a terminal as described in reference to FIGS. 3A and 3B permits the user to conduct numerous financial transactions without a hard wired connection between the terminal and the financial institution. For example, the terminal can be used to “recharge” a smart card in the manner described above. After “recharging,” the user may then use the card in connection with terminals that accept this “electronic cash” in lieu of cash by deducting an amount from the user's card. The amount deducted can then be redeemed by a merchant through a settlement process with the user's financial institution (and others).

It can be seen that the terminal described in FIGS. 3A and 3B is a truly mobile unit and enjoys the benefits of such mobility. Because the terminal is not required to dispense cash, no safe is required. This, in turn, reduces the cost and size of the terminal and maximizes the flexibility of the design of the terminal. For example, the terminal may be positioned in the corridor of a mall or an office building, thereby maximizing its access and availability to foot traffic during the day. At night, the terminal could be rolled back in from the corridor and accessed for settlement/verification procedures in accordance with standard industry practice with ATMs. In the embodiment of FIG. 3B, the terminal's batteries could be recharged during this time for use the next day.

Alternatively, the mobile terminal could be positioned on a truck which could be parked outside at a fair or sporting event and powered by batteries or a generator stored on the truck. Again, the mobile terminal is positioned to maximize access to foot traffic and is repositioned at night for recharging, servicing, etc. Positioned in this way, the above-described terminals provide increased flexibility and adaptiveness for responding to customer demands.

FIG. 4 illustrates another embodiment of the invention in which a wireless server/terminal unit 150 is used to exchange financial information between a user and a remote host computer of a financial institution, such as that referred to in FIG. 1. The wireless server/terminal unit 150 preferably includes a terminal described above in reference to FIGS. 3A and 3B (that is, one which incorporates a display, a keypad, a smart card reader, and means for wireless transmission of data).

The system shown in FIG. 4 integrates the capability of exchanging financial information with other non-financial functionality, such as security control. In particular, the wireless server/terminal unit 150 forms a portion of a LAN which comprises a variety of other computers and networks. As illustrated, these other computers and networks include an employee's work place PC 158, an employee's home PC 152, a WAN 156, a local building computer system 154, a conventional ATM 160, and a spread spectrum server 162.

A variety of terminals and associate device are coupled to the networks shown. For example, the WAN 156 includes PCs 166 and 168. A building access system 174 includes various smart card readers 170, some of which are equipped with keypads. Similarly, each of the employee PCs 152 and 158 are equipped with smart card readers 152 a and 158 a.

Also, a plurality of terminals, represented by the terminal 172, are coupled to the spread spectrum server 162. For example, the terminal 172 is equipped with a smart card reader 172 a. In this way, the wireless financial server terminal 150 enables employees to access their financial institution through a variety of means and from a variety of locations in the work place and at home.

In particular, the wireless smart card recharge station 172 communicates to the financial institution via the spread spectrum receiver 162 and the server terminal 150. The recharge station 172 has a slot for receiving and reading a smart card and a display (see FIGS. 3A and 3B). Through its connection with a financial system, such as that shown in FIG. 1, the user makes selections from a menu displayed on the display of the terminal 172. For example, the user may review account balances, transfer funds, or perform other activities typically available on a fixed-location ATM. The user may also reload monetary value onto the smart card via the cash station, adding set funds to either a “prepaid” or “purse” account on the smart card as described below. In this way the user can obtain access to money via a portable ATM-type terminal without security risk because no cash is directly involved. At the end of the user's visit to a location where the smart card is honored, the user may employ the station to deposit any unused balances from the user's smart card to the user's account with the financial institution.

As shown, a user's PC 152 may be connected to a smart card reader, such as one having a keypad and processing capabilities. This enables the user to access the user's financial accounts and to “recharge” the smart card (that is, add funds onto the smart card). In this respect, the keypad enables the user to enter the user's PIN and the smart card inserted into reader 152 a provides additional encryption and security measures to make the transport route (namely, the LAN/wireless terminal/route) sufficiently secure to conduct financial transactions. A similar arrangement is conducted at other remote locations through a telephone line connection between the terminal and the employee's home personal computer connected to a smart card reader/processor and keypad. Further, a smart card reader/processor with a display which simulates an ATM protocol could be connected to the terminal, thereby enabling the user to perform all ATM functions including recharging the smart card, without the use of a personal computer.

Thus, the server terminal 150 provides a communications channel for several remote devices, such as the home PC 152, the work place PC 158 and the terminals 172 associated with the spread spectrum server 162 and those associated with the wide area network 156. By providing card readers with these terminals, it is possible to obtain a wide range of access points to a remote host computer via the wireless financial server/terminal. This provides additional capabilities to the above-described financial information and transactions.

Additionally, the embodiment of FIG. 4 describes an integrated system which may be used for other non-financial transactions. For example, the building computer system 154 noted above may be used to control a building access system 174. The building access system of this example includes a plurality of smart card readers and/or keypads. Such interface devices may be used to verify that a user is authorized to enter particular areas by matching information stored on a smart card against security records maintained or updated through the server/terminal unit 150. Different security levels may be instituted for different areas, each requiring additional authorization. For example, it may only be necessary to insert a card to access a parking garage, while gaining access to particular rooms may require additional authorization, for example, the inputting of a PIN with a keypad.

FIG. 5 illustrates a multi-purpose smart card 200 which permits both financial and non-financial functions in an integrated system such as that described in FIG. 4. The smart card 200 comprises a central processing unit 202 (CPU) which is connected to a read only memory 204 (ROM), primarily used for storage of an operating system. A random access memory 206 (RAM) is also provided for volatile storage of data, particularly for program execution. The CPU 202 is operatively coupled to a serial interface 208 which in turn communicates with a smart card reader 210 according to techniques well known in the art.

The CPU is connected to an arithmetic logic unit 212, for example, one suitable for processing large keys (512 byte keys). An electrically erasable programmable read only memory 214 (EEPROM) is provided, which typically stores system files and applications.

As illustrated in FIG. 6, the smart card 200 of FIG. 5 has different file paths for different functions. The EEPROM has a master file 220 and dedicated files for different applications. These dedicated files include a biometric identification file 222 and an encrypted digital signature file 224. Also included is a building access file 226 that contains information which enables the card to be used in conjunction with a security system, such as the one referred to in FIG. 4. The master file 220 also is linked to a banking card debit file 228 which may also have its own security path for identification. The smart card has a prepaid function path 230 which can only be loaded through a secure function, and a “non-secure” electronic purse function file 232. These files are readable by an external terminal, such as the terminal described in reference to FIGS. 3A and 3B, and may be decremented as required from an outside terminal, as described more fully below.

In this example, the master file 220 also has a digital encryption capability 234 providing algorithmic computation for the processing of digital keys and encryption of, for example, the user's PIN. The algorithms used may provide symmetrical or asymmetrical encryption as known in the art.

While the smart card utilized in the invention embodies a “computer”, it has a fairly limited memory. For example, the EEPROM may be limited to the range between 3 to 8 kilobytes with current technology limitations. Accordingly, the smart card in the system preferably acts as an enabling device for other systems according to known techniques. For example, the smart card provides validation of the individual and the service requested, but does not store large quantities of data on the card.

It should be understood from the above description that as the mobility of an ATM-type terminal increases, security concerns may also increase. More specifically, it may be unfeasible to place cash in a mobile ATM due to the possibility of theft of the terminal. Use of a smart card enables the system to provide users with secure purchasing in a cash-free environment.

Further addressing this concern, the smart card 200 of FIGS. 5 and 6 includes two storage areas for storing monetary values. The first is an “electronic purse” represented by file 232. This area is used, for example, when the user makes a high value purchase by placing the smart card in a merchant's terminal. The user accepts the transaction and amount of the purchase entered by the merchant by entering the user's PIN. The user then approves the amount, for example, by pushing an “enter” button on a terminal keypad, the card purse cash value is then debited by the requested amount, and, conversely, the merchant's account is credited that amount.

A second area for storing monetary values on the card comprises a “pre-paid account” represented by file 230. This account is generally utilized for lower value purchases, for example, fifty dollars or less. This account is kept in an unsecured cash area of the smart card and operates essentially like cash. For example, the user of the smart card may make purchases from this account without entering the user's PIN. Possible uses would include, preferably, low value, fast transactions such as at a cafeteria, or a vending machine, or when placing a local telephone call.

The smart cards referred herein interface with the system through the use of various smart card reader/processors. These processors vary in complexity and sophistication depending upon the application. For example, when used to regulate building access, the smart card may be inserted into a smart card reader which simply identifies the user. This could be used in lower security areas, such as parking garages. A numerical keypad, by which a user's PIN may be entered, can be required for added security, such as at building door entrances. For even further security, some biometric parameter (such as a fingerprint) may be used for identification. This same access code with or without a PIN can be used in a smart card reader attached to a stand-alone or network personal computer 158A to control the level of access to local or remote files, communication networks, databases and network services.

In the aforementioned embodiments, the smart card incorporates optional digital encryption signatures and encryption algorithms to enable the smart card to be validated from a remote location, such as a host computer at a financial institution or at off/on line merchant terminals equipped with a SAM module for off-line card authentication. In such instances both ends of the communication (for example, the host computer and the smart card) may each have an encryption key so that data (such as a PIN entry) which is sent via the smart card 60 is validated at the host computer. Thus, the host computer is able to validate that the smart card is authentic and that the proper user is using the smart card so that a financial transaction can take place.

In a wireless off-line situation, the smart card and the terminal being used similarly validate one another because there is a possibility that a false terminal is being used. Accordingly, even in an off line system, security measures are available to validate the card, the terminal, and the user.

Various preferred embodiments of the invention have now been described in fulfillment of the objects of the invention. While these embodiments have been set forth by way of example, various other embodiments and modifications will be apparent to those skilled in the art. Accordingly, it should be understood that the invention is not limited to such embodiments, but encompasses all that which is described in the following claims. 

What is claimed is:
 1. A method for performing transactions, comprising: receiving, at a host computer system, encrypted user identification information wirelessly transmitted from a mobile server terminal, the encrypted identification information transmitted by a user to the mobile server terminal from one of a plurality of user terminals over a corresponding one of a plurality of networks, each of the plurality of user terminals having a smart card interface device, each of the plurality of user terminals and each of the plurality of networks compatible for communication with the mobile server terminal, the plurality of user terminals including at least one of personal computer, a mobile terminal, a battery-powered mobile terminal, an automatic teller machine, and a building access terminal, the plurality of networks including at least one of standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network, the encrypted user identification information encrypted via a smart card having an encryption algorithm, the host system having records of user account information, including reference identification information, and the host system having a decryption algorithm capable of decrypting data encrypted by the encryption algorithm of the smart card; decrypting the encrypted identification information using the decryption algorithm of the host system and validating the identification information sent from the smart card with the reference identification information; if the identification information is validated, providing the user with wireless access to the information and functionality of the host system through the mobile server terminal to exchange information, the information exchange comprising: receiving at the host computer system an encrypted selected function from a group of transaction functions and encrypted function data corresponding to the selected function both wirelessly transmitted from the mobile server terminal, the group of transaction functions including at least a financial transaction function and an entry into a secure physical location function, both the encrypted selected function and the encrypted data encrypted via the smart card; decrypting the encrypted selected function and the encrypted function data for the selected function at the host system, performing the selected function in response to the transmitted function data for the selected function to provide data for the performed function, and encrypting the data for the performed function; and wirelessly transmitting the encrypted data for the performed function to the mobile server terminal for use by the user.
 2. The method of claim 1 wherein the group of transaction functions further includes at least one function selected from the group consisting of an account information gathering function, a credit authorization function, a banking card debit function, an electronic prepaid function, and an electronic purse function.
 3. The method of claim 1, wherein the host system comprises a security system for controlling access to a secure physical location, wherein the identification information comprises security information stored on the smart card, the security system having security records and providing access to the secure physical location by matching the security information to the corresponding security record.
 4. A system for a user to obtain information and perform transactions on a network, comprising: a plurality of user terminals each having a smart card interface device for communicating with a smart card, each of the plurality of user terminals having an input device associated with the user terminal and in combination with the smart card interface device for receiving identification information and data from the user, wherein the identification information is encrypted by a smart card in communication with the smart card interface device and the smart card having a first encryption algorithm, the plurality of user terminals including at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a plurality of networks including at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a mobile server terminal compatible for communication with all of the plurality of user terminals through any of the plurality of networks, the mobile server terminal further comprising a first wireless device for wirelessly transmitting and receiving data; a host computer system having an associated second wireless device and at least a second encryption algorithm corresponding to the first encryption algorithm, wherein the second wireless device receives the encrypted identification information and wherein the second encryption algorithm decrypts the encrypted identification information, wherein the host system maintains records of user account information including identification information and compares the identification information encrypted by the smart card to the user account information to verify the identification information, and wherein the host system wirelessly transmits authorization information through the second wireless device to the mobile server terminal to allow the user access to the host computer system; and a transaction application for providing the user with transactions to be performed through the server terminal if the identification information is validated by the user account information, the transaction application including financial transaction functions and an entry into a secure physical location function.
 5. The method of claim 1 wherein the battery-powered mobile terminal comprises a cellular phone.
 6. The method of claim 1, further comprising encrypting authorization information using an encryption algorithm within the host system, where the authorization information represents whether or not the identification information is validated, wirelessly transmitting the encrypted authorization information to the mobile server terminal for notifying the user whether or not access to the host system is allowed.
 7. The method of claim 1, wherein the information exchange further comprises adding electronic value to the smart card and debiting value from a user account in the host system.
 8. The method of claim 7, further comprising appending an encrypted bank signature to the value added to the smart card, wherein the bank signature certifies the authenticity of the value.
 9. The system of claim 4, wherein the transaction application further includes at least one transaction selected from the group consisting of an account information gathering transaction, a credit authorization transaction, a banking card debit transaction, an electronic prepaid transaction, and an electronic purse transaction.
 10. A method for performing transactions, comprising: receiving a smart card in a smart card reader in communication with a user terminal, wherein the smart card comprises at least a first encryption algorithm and validation information, wherein the user terminal comprises at least one terminal selected from a plurality of user terminals consisting of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; receiving at least an encrypted portion of the validation information at the user terminal, the encrypted portion encrypted using the first encryption algorithm of the smart card; wirelessly transmitting the encrypted portion of the validation information via a mobile server terminal having a first transmitter/receiver in communication with the user terminal through a network, wherein the network is at least one network selected from a plurality of networks consisting of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network, wherein the mobile server terminal is compatible with any of the plurality of user terminals and a corresponding one of the plurality of networks; wirelessly receiving the encrypted portion of the validation information at a second transmitter/receiver and transmitting the encrypted portion of the validation information to a host system, wherein the host system comprises user account information including reference validation information, a second encryption algorithm and financial transaction capabilities, wherein the user account information corresponds to the validation information on the smart card, and wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa; decrypting the encrypted portion of the validation information and comparing the validation information to the user account information to determine an authorization code for further accessing the host system; and wirelessly transmitting the authorization code via the second transmitter/receiver; and if the authorization code represents verification between the validation information and the user account information, providing the user with access to the host system to perform transactions including at least one financial function and an access to a secure physical location function, wherein communications between the host system and the user terminal are encrypted by the host system and the smart card, respectively.
 11. The method of claim 10, further comprising: wirelessly receiving at the host system encrypted identification information along with the encrypted validation information, where the encrypted identification information comprises a personal identification number input by the user into the user terminal and encrypted via the smart card; and decrypting and comparing the identification information and the validation information to the user account information to determine the authorization code.
 12. A system for performing transactions, comprising: a plurality of smart card readers capable of communication with a smart card having at least a first encryption algorithm and a plurality of stored data, wherein the plurality of stored data includes validation information; a plurality of user terminals each corresponding to and in communication with one of the plurality of smart card readers, wherein each of the plurality of terminals have a first input device for generating user input data, the plurality of user terminals consisting of at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a server terminal compatible for communication with each of the plurality of user terminals, wherein the server terminal comprises a second input device, a first wireless transmit/receive device and a display, wherein the second input device includes a keypad for generating user input data and the display is adapted for displaying images to the user, wherein the first wireless transmit/receive device receives and transmits a first encrypted message comprising validation information and user input data, wherein the first encrypted message is encrypted by the encryption algorithm of the smart card; a plurality of networks, wherein at least one of the plurality of networks connects at least one of the plurality of user terminals to the server terminal, the plurality of networks consisting of at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a host financial system in communication with the server terminal, wherein the host system comprises user account information, an authentication program, a plurality of transaction applications, and at least a second encryption algorithm, wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa, wherein the authentication program compares the validation information to the user account information to verify the authenticity of the validation information and thereby to determine user access to the host system, the plurality of transaction applications including at least a financial transaction function and an entry to a secure physical location function, and wherein the host system provides a second encrypted message comprising data relating to at least one of the plurality of transaction applications if the authentication program authenticates the validation information and; a second transmit/receive device associated with the host system for wirelessly transmitting and receiving the first and second encrypted messages, wherein the second transmit/receive device is in communication with the first transmit/receive device and the host system.
 13. The system of claim 12, wherein the financial transaction function is selected from the group consisting of an account information gathering function, a credit authorization function, a banking card debit function, an electronic prepaid function, and an electronic purse function.
 14. The method of claim 1, where the selected function further comprises an electronic prepaid function, where the smart card includes an electronic prepaid account having an electronic prepaid value, where the information exchange includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and where the identification information does not include a personal identification number.
 15. The method of claim 1, where the selected function further comprises an electronic purse function, where the smart card includes an electronic purse account having an electronic monetary value, where the information exchange includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and where the identification information includes a personal identification number.
 16. The method of claim 1, where the encrypted user identification received at the host computer system is transmitted by the automatic teller machine further comprising a cashless automatic teller machine such that the information exchange comprises exchanging financial information or electronic value.
 17. The method of claim 16, where the cashless automatic teller machine is located in a vehicle.
 18. The method of claim 10, further comprising receiving from the mobile server terminal a selected function from a plurality of functions, where the selected function comprises an electronic prepaid function, where the smart card includes an electronic prepaid account having an electronic prepaid value, where the information exchange includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and where the identification information does not include a personal identification number.
 19. The method of claim 10, further comprising receiving from the mobile server terminal a selected function from a plurality of functions, where the selected function comprises an electronic purse function, where the smart card includes an electronic purse account having an electronic monetary value, where the information exchange includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and where the identification information includes a personal identification number.
 20. The method of claim 10, where the encrypted portion of the validation information received at the host computer system is transmitted by the automatic teller machine further comprising a cashless automatic teller machine such that the transactions comprise exchanging financial information or exchanging electronic value.
 21. The method of claim 10, where the cashless automatic teller machine is located in a vehicle.
 22. The system of claim 4, wherein the mobile server terminal comprises a cellular phone or an automatic teller machine.
 23. The system of claim 4, wherein the user terminal further comprises a cashless automatic teller machine such that the transaction application comprises a function of exchanging financial information or exchanging electronic value.
 24. The system of claim 23, wherein the cashless automatic teller machine is located in a vehicle.
 25. The system of claim 4, wherein the transaction application comprises an electronic prepaid function, wherein the smart card includes an electronic prepaid account having an electronic prepaid value, wherein the electronic prepaid function includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and wherein the identification information does not include a personal identification number.
 26. The system of claim 4, wherein the transaction application comprises an electronic purse function, wherein the smart card includes an electronic purse account having an electronic monetary value, wherein the electronic purse function includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and wherein the identification information includes a personal identification number.
 27. A system for performing transactions, comprising: a plurality of smart card readers capable of communication with a smart card having at least a first encryption algorithm and a plurality of stored data, wherein the plurality of stored data includes validation information; a plurality of user terminals each corresponding to and in communication with one of the plurality of smart card readers, wherein each of the plurality of terminals have a first input device for generating user input data, the plurality of user terminals consisting of at least one of a personal computer, a mobile terminal, a battery-powered mobile terminal, an automated teller machine, and a building access terminal; a server terminal compatible for communication with each of the plurality of user terminals, wherein the server terminal is a mobile server terminal that comprises a second input device, a first wireless transmit/receive device and a display, wherein the second input device includes a keypad for generating user input data and the display is adapted for displaying images to the user, wherein the first wireless transmit/receive device receives and transmits a first encrypted message comprising validation information and user input data, wherein the first encrypted message is encrypted by the encryption algorithm of the smart card, and where the mobile server terminal comprises a cellular phone or an automatic teller machine; a plurality of networks, wherein at least one of the plurality of networks connects at least one of the plurality of user terminals to the server terminal, the plurality of networks consisting of at least one of a standard switch network, a direct wireless service network, the Internet, a financial network, a commercial network, a private network, a wide area network, a local area network, an ATM network and a spread spectrum network; a host financial system in communication with the server terminal, wherein the host system comprises user account information, an authentication program, a plurality of transaction applications, and at least a second encryption algorithm, wherein the second encryption algorithm corresponds to the first encryption algorithm on the smart card such that data encrypted by the first encryption algorithm is decryptable by the second encryption algorithm and vice versa, wherein the authentication program compares the validation information to the user account information to verify the authenticity of the validation information and thereby to determine user access to the host system, the plurality of transaction applications including at least a financial transaction function and an entry to a secure physical location function, and wherein the host system provides a second encrypted message comprising data relating to at least one of the plurality of transaction applications if the authentication program authenticates the validation information; and a second transmit/receive device associated with the host system for wirelessly transmitting and receiving the first and second encrypted messages, wherein the second transmit/receive device is in communication with the first transmit/receive device and the host system.
 28. The system of claim 12, wherein the user terminal further comprises a cashless automatic teller machine such that the financial transaction application comprises a function of exchanging financial information or exchanging electronic value.
 29. The system of claim 28, wherein the cashless automatic teller machine is located in a vehicle.
 30. The system of claim 12, wherein the financial transaction function comprises an electronic prepaid function, wherein the smart card includes an electronic prepaid account having an electronic prepaid value, wherein the electronic prepaid function includes a transaction comprising adjusting an amount of the electronic prepaid value in the electronic prepaid account, and wherein the identification information does not include a personal identification number.
 31. The system of claim 12, wherein the financial transaction function comprises an electronic purse function, wherein the smart card includes an electronic purse account having an electronic monetary value, wherein the electronic purse function includes a transaction comprising adjusting an amount of the electronic monetary value in the electronic purse account, and wherein the identification information includes a personal identification number.
 32. The method of claim 1, further comprising providing physical access to a secure physical location associated with the one of the plurality of user terminals if the identification information is validated by the user terminal.
 33. The method of claim 1, further comprising, prior to the transmission of the encrypted user identification information to the mobile server terminal, validating via the smart card the identification information, providing access to local files associated with the smart card or the user terminal or a local network connected to the user terminal, and providing access to the one of the plurality of networks.
 34. The method of claim 33, further comprising receiving a personal identification number input into the user terminal by the user, where the user identification information validated by the smart card includes the personal identification number.
 35. The method of claim 33, further comprising receiving a biometric parameter input into the user terminal by the user, where the user identification information validated by the smart card includes the biometric parameter.
 36. The method of claim 1, further comprising, prior to the transmission of the encrypted user identification information to the mobile server terminal and where the one of the plurality of user terminals comprises a personal computer connected to a local network, validating the identification information via the smart card, providing access to local files associated with the personal computer or the smart card or the local network, and providing access to the one of the plurality of networks associated with the mobile server terminal. 