Smart card personalization assistance tool

ABSTRACT

A personalization of a batch of smart cards is provided. A user is provided with a plurality of queries regarding smart card features. Responses to the plurality of queries are received from the user. A personalization data file is generated using the responses to the plurality of queries, where the personalization data file comprises values, which may be used to provide features on a batch of smart cards.

RELATED APPLICATIONS

[0001] This application claims priority under 35 USC 119(e) from theProvisional Application No. 60/464,559 (Attorney Docket NumberVISAP076P) entitled “Smart Card Personalization Assistance Tool,” whichwas filed on Apr. 21, 2003, and which is hereby incorporated byreference.

BACKGROUND OF THE INVENTION

[0002] 1. Field of the Invention

[0003] The invention relates to the personalization of smart cards.

[0004] 2. Description of the Related Art

[0005] The present invention is applicable to smart cards. Also termedchip cards, integrated circuit cards, memory cards or processor cards, asmart card is typically a credit card-sized plastic card that includesone or more semiconductor integrated circuits. A smart card caninterface with a point-of-sale terminal, an ATM, or with a card readerintegrated with a computer, telephone, vending machine, or a variety ofother devices. The smart card may be programmed with various types offunctionality such as a stored-value application, a credit or debitapplication, a loyalty application, cardholder information, etc.Although a plastic card is currently the medium of choice for smartcards, it is contemplated that a smart card may also be implemented in asmaller form factor, for example, it may attach to a key chain or be assmall as a chip module. A smart card may also be implemented as part ofa personal digital assistant, telephone, or take a different form. Thebelow description provides an example of the possible elements of asmart card, although the present invention is applicable to a wide rangeof types of smart cards.

[0006] A smart card may include a microprocessor, random access memory(RAM), read-only memory (ROM), non-volatile memory, an encryption module(or arithmetic unit), and a card reader (or terminal) interface. Otherfeatures may be present such as optical storage, flash EEPROM, FRAM, aclock, a random number generator, interrupt control, control logic, acharge pump, power connections, and interface contacts that allow thecard to communicate with the outside world. Of course, a smart card maybe implemented in many ways, and need not necessarily include amicroprocessor or other features.

[0007] The microprocessor is any suitable central processing unit forexecuting commands and controlling the device. RAM serves as temporarystorage for calculated results and as stack memory. ROM stores theoperating system, fixed data, standard routines, look up tables andother permanent information. Non-volatile memory (such as EPROM orEEPROM) serves to store information that must not be lost when the cardis disconnected from a power source, but that must also be alterable toaccommodate data specific to individual cards or changes possible overthe card lifetime. This information includes a card identificationnumber, a personal identification number, authorization levels, cashbalances, credit limits, and other information that may need to changeover time. An encryption module is an optional hardware module used forperforming a variety of encryption algorithms. Of course, encryption mayalso be performed in software.

[0008] The card reader interface includes the software and hardwarenecessary for communication with the outside world. A wide variety ofinterfaces is possible. By way of example, the interface may provide acontact interface, a close-coupled interface, a remote-coupledinterface, or a variety of other interfaces. With a contact interface,signals from the integrated circuit are routed to a number of metalcontacts on the outside of the card which come in physical contact withsimilar contacts of a card reader device. A smart card may include atraditional magnetic strip to provide compatibility with traditionalcard reader devices and applications, and may also provide a copy of themagnetic stripe information within the integrated circuit itself forcompatibility.

[0009] Various mechanical and electrical characteristics of a smart cardand aspects of its interaction with a card reader device are describedin Smart Card Handbook, W. Rankl and W. Effing, John Wiley & Sons, Ltd.,1997, and are defined by the following specifications, all of which areincorporated herein by reference: Visa Integrated Circuit CardSpecification, Visa International Service Association, 1996; EMVIntegrated Circuit Card Specification for Payment Systems, EMVIntegrated Circuit Card Terminal Specification for Payment Systems, EMVIntegrated Circuit Card Application Specification for Payment Systems,Visa International, Mastercard, Europay, 1996; and InternationalStandard; Identification Cards—Integrated Circuit(s) Cards withContacts, Parts 1-6, International Organization for Standardization,1987-1995.

[0010] To facilitate understanding, FIG. 1 is a block diagram of a priorart system used for the personalization of a smart card. A datapreparation table of values 138 and an input file 159 provide input to apreparation processing device 154. The preparation processing device 154has two-way communications with a hardware security module 130. Thepreparation processing device 154 provides an output file 160, whichprovides input to a personalization device 150. The personalizationdevice 150 has two-way communication with a hardware security module152. A card supplier 170 also provides input to the personalizationdevice 150. The personalization device 150 takes blank smart cards 172and output personalized smart cards 180.

[0011] The data preparation tables are used to specify various optionsthat a card issuer may desire for a smart card such as offline limits,language preferences, and card holder verification methods.

[0012] In addition to the encoding and embossing data on a smart card,there may be over forty chip data elements that need to be incorporatedinto the card personalization process. Some of the mandates for thesedata elements may be specified in the data preparation table of values138. The data elements are identified by tag, length, and value.

[0013] Previously in order to create such tables, templates have beenused to suggest table values for various card preferences. Independentprogrammers would create a table specifying various values. Theprogrammers would need to know complex details about the table tocorrectly determine values for the table. Choosing appropriate valuesfor the table is often too confusing and could lead to personalizationerrors. In addition, the process of choosing appropriate values maybecome too mired in the technical details, causing the user to losesight of the business and risk management decisions that should dictatethe selection of values. This process may require business people andtechnical people to complete this process. This may require accuratecommunication between the technical people and business people toreflect the desired business decisions.

[0014]FIG. 2 is a block diagram illustrating in further detailgenerating a data preparation table of values, used in the prior art. Astand-alone system 190 is an independent computer or computer system.Templates 192 reside on the stand alone system 190. In the alternative,the templates 192 may be a printed document that is referred to by theuser of the stand alone system 190. The templates 192 are used asreferences or suggestions. However, a user might use the stand alonesystem to create a data preparation table of values 138, ignoring all ofthe suggestions of the template.

[0015] The complex nature of chip card personalization and the abilityto generate data preparation table of values that ignore or are contraryto template suggestions has led to discrepancies in the process that insome cases have resulted in interoperability problems. Chip cards issuedin one country or region, may experiencing acceptance problems whenbeing used in terminals in other countries and regions, if data in thedata preparation table of values is not correct.

[0016] A chip card may have base applications already loaded by the chipcard manufacturer. The operation of the application is driven by thedata elements in the data preparation table of values. Theinterdependency of data elements may make the process of defining thedata elements more complex.

[0017] Therefore, the prior art system was difficult to use and providedan output that could cause interoperability problems.

SUMMARY OF THE INVENTION

[0018] These and other features of the present invention will bedescribed in more details below in the detailed description of theinvention and in conjunction with the following figures.

[0019] Member banks need a clear and easy way to tailor theirdebit/credit applications to best suit their domestic and regionalmarket needs. The current method Members use for selecting and choosingthe appropriate values can be confusing and potentially can lead topersonalization errors. Too often Members become mired in the technicaldetails and lose sight of the business and risk management decisionsthat should dictate their application selections. The personalizationassistant is a user-friendly tool designed to help Members tailor theirVSDC programs to their specific needs and to help to facilitate aseamless migration to chip.

[0020] The personalization assistant guides issuers through thedecision-making process of selecting their desired debit/credit options.Issuers are requested to respond to a series of business questions.Responses to these questions will be used by the tool to generate a setof debit/credit parameters and values, representing the issuer'sbusiness and risk requirements for the debit/credit application. In thisdocument, the set of debit/credit parameters and values is referred toas the “Data Preparation Output File” (or Personalization AssistantOutput File).

[0021] Throughout the process, the personalization assistant will assistthe Member with best practice suggestions, default values, mandatorysettings and help screens. The actual mechanics of capturing the data tobe used in the data preparation process will be transparent to theIssuer who is then free to focus on the business/risk management aspectsof this process. The set of chosen parameters and their values generatedby the tool is uniquely identified and retained in a “Member Profile.”This Profile can be copied and modified later by the same Issuer inorder to create additional profiles that contain parameter or valuemodifications needed to meet different business requirements.

[0022] Once a “Data Preparation Output File” is created, it can beexported for use both in the personalization data preparation processand by the tool used to validate correct personalization of the card'sdebit/credit application. Various reports of the Issuer's business/riskmanagement decisions can also be displayed noting any deviation fromVisa's best practice suggestions. The use of mandatory settings and bestpractice suggestions will minimize the potential for interoperabilityproblems in both domestic and international markets.

[0023] Other features and benefits include the ability to communicateupdated information on rules, application best practices, and changes ina timely manner.

BRIEF DESCRIPTION OF THE DRAWINGS

[0024] The present invention is illustrated by way of example, and notby way of limitation, in the figures of the accompanying drawings and inwhich like reference numerals refer to similar elements and in which:

[0025]FIG. 1 is a block diagram of a prior art system used for thepersonalization of a smart card.

[0026]FIG. 2 is a block diagram illustrating in further detailgenerating a data preparation table of values, used in the prior art.

[0027]FIG. 3 is a block diagram of a personalization system used in apreferred embodiment of the invention.

[0028]FIG. 4 is a high level flow chart of a process used by thepersonalization system.

[0029]FIG. 5 is a more detailed flow chart of a step of generating apersonalization data file from the responses to the plurality of queriesfor an embodiment using a lookup table.

[0030]FIGS. 6 and 7 illustrate a computer system, which is suitable forimplementing the web host or local systems used in embodiments of thepresent invention.

[0031]FIG. 8 is a block diagram of an example of an embodiment of theinvention.

[0032]FIG. 9 is a block diagram of an example of a personalizationdatabase.

[0033]FIG. 10 is a view of a profile listing screen.

[0034]FIG. 11 is a view of a page report type page.

[0035]FIG. 12 is a view of a modify profile option page.

[0036]FIG. 13 is a view of a start new profile page.

[0037]FIG. 14 is a view of a search profile page.

[0038]FIG. 15 is a view of a default profile web page.

[0039]FIG. 16 is a view of a feature selection page.

[0040]FIG. 17 is a view of an account data web page for account usagecontrols.

[0041]FIG. 18 is a view of an account data web page for applicationidentification.

[0042]FIG. 19 is a view of an account data web page for applicationconfirmation.

[0043]FIG. 20 is a view of an account data web page for customizing theaccount name of the application to be displayed in a specific language.

[0044]FIG. 21 is a view of an account data web page for customizingaccount language.

[0045]FIG. 22 is a view of an account data web page for prioritizing theaccount.

[0046]FIG. 23 is a view of an account data web page for account riskmanagement decisions.

[0047]FIG. 24 is a view of an offline authorization control web page foroffline risk management control.

[0048]FIG. 25 is a view of an offline authorization control web page foroffline limits and thresholds.

[0049]FIG. 26 is a view of an offline authorization control web page forsetting account effective date checking.

[0050]FIG. 27 is a view of an offline authorization control web page foroffline risk management decisions.

[0051]FIG. 28 is a view of a web page for cardholder verification methodselection.

[0052]FIG. 29 is a view of a web age for a PIN Try Limit.

[0053]FIG. 30 is a view of a first web page of the CVM AssistantQuestionnaire Method 1.

[0054]FIG. 31 is a view of a second web page of the CVM AssistantQuestionnaire Method 1

[0055]FIG. 32 is a view of a cardholder verification method summary webpage.

[0056]FIG. 33 is a view of a web page for the CVM Method 2.

[0057]FIG. 34 is a view of a terminal risk management web page.

[0058]FIG. 35 is a view of an offline dynamic data authentication webpage.

[0059]FIG. 36 is a view of a web page for Offline Data AuthenticationRisk Management Decisions.

[0060]FIG. 37 is a view of a web page for card authentication options.

[0061]FIG. 38 is a view of a web page for issuer authentication options.

[0062]FIG. 39 is a view of a web page for issuer script risk managementdecisions.

[0063]FIG. 40 is a view of a first web page for a low-value paymentfeature.

[0064]FIG. 41 is a view of a second web page for the low-value paymentfeature.

[0065]FIG. 42 is a view of a third web page for low-value payment.

[0066]FIG. 43 is a view of a fourth web page for low-value payment.

[0067]FIG. 44 is a view of a fifth web page for low-value payment.

[0068]FIG. 45. is a view of an output options page.

[0069]FIG. 46 is a view of a business report.

[0070]FIG. 47 is a view of a technical report.

[0071]FIG. 48 is a view of a stand-in options report.

[0072]FIG. 49 is an example of a data schema that may be used in anembodiment of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0073] The present invention will now be described in detail withreference to a few preferred embodiments thereof as illustrated in theaccompanying drawings. In the following description, numerous specificdetails are set forth in order to provide a thorough understanding ofthe present invention. It will be apparent, however, to one skilled inthe art, that the present invention may be practiced without some or allof these specific details. In other instances, well known process stepsand/or structures have not been described in detail in order to notunnecessarily obscure the present invention.

[0074]FIG. 3 is a block diagram of a personalization system 300 used ina preferred embodiment of the invention. In this system a first localsystem 304 and a second local system 306 are connected to the Internet312. A web host 316 is also connected to the Internet 312. The web host316 includes a personalization assistant software application 320 (or“personalization assistant tool”). The personalization assistantsoftware application 320 includes or is in communication with a look uptable 324. The web host 316 is connected to a preparation processingdevice 154 and a personalization validation tool 344.

[0075] In an alternative embodiment, the data preparation table ofvalues is stored on the local systems 304, 306. In such a case, thelocal systems 304, 306 may be connected to the preparation processingdevice and may send the data preparation table of values to thepreparation processing device 154. In such a case, approved datapreparation table of values may have an indicator of whether they areapproved, with the preparation processing device only accepting approveddata preparation of values.

[0076]FIG. 4 is a high level flow chart of a process used by thepersonalization system 300. The web host 316 provides a log on screen tousers of the local systems 304, 306 (step 404). After the users of thelocal system 304, 306 successfully log on, the web host 316 providesusers of the local systems 304, 306 with a plurality of queriesregarding smart card features (step 408). The users of the local systems304, 306 provide responses to the queries. The responses to theplurality of queries are received by the web host 316 (step 412). Theweb host 316 generates a personalization data file from the responses tothe plurality of queries (step 416). In this embodiment, thepersonalization data file is sent to a preparation processing device154, which uses individual input files and the personalization data fileto generate a plurality of personalized smart cards (step 420). In oneimplementation, the preparation processing device 154 does this bygenerating an output file from the personalization data file and theindividual input files. The output file is then sent to apersonalization device, which uses the output file to generatepersonalized smart cards. In another implementation, the preparationprocessing device performs the actual personalization on the smartcards. In other embodiments, the web host may be able to generate thesmart cards.

[0077] The sending of the plurality of queries (step 408) may occursimultaneously with the receiving user responses (step 412). This may bedone by sending one or more queries at a time and then receivingresponses before sending one or more additional queries.

[0078]FIG. 5 is a more detailed flow chart of the step of generating thepersonalization data file from the responses to the plurality of queries(step 416) for an embodiment using a lookup table. During this step thepersonalization assistant finds a matching entry in the look up table324 that matches the responses to the plurality of queries (step 504).The look up table may be a table of entries, where each entry is apossible combination of response to the plurality of queries. The lookup table 324 associates each entry with output data. The output dataassociated with the matching entry is then located (step 508). Theoutput data associated with the matching entry is then outputted into apersonalization data file (step 512).

[0079] Some embodiments may use some programming logic in addition to alook up table to generate the data preparation table of values. Othermethods not using a look up table may be used to generate the datapreparation table of values. Such other methods may use a knowledgebased system with artificial intelligence or some other system.

[0080]FIGS. 6 and 7 illustrate a computer system 600, which is suitablefor implementing the web host or local systems used in embodiments ofthe present invention. FIG. 6 shows one possible physical form of thecomputer system. Of course, the computer system may have many physicalforms ranging from an integrated circuit, a printed circuit board, and asmall handheld device up to a huge super computer. Computer system 600includes a monitor 602, a display 604, a housing 606, a disk drive 608,a keyboard 610, and a mouse 612. Disk 614 is a computer-readable mediumused to transfer data to and from computer system 600.

[0081]FIG. 7 is an example of a block diagram for computer system 600.Attached to system bus 620 is a wide variety of subsystems. Processor(s)622 (also referred to as central processing units, or CPUs) are coupledto storage devices, including memory 624. Memory 624 includes randomaccess memory (RAM) and read-only memory (ROM). As is well known in theart, ROM acts to transfer data and instructions uni-directionally to theCPU and RAM is used typically to transfer data and instructions in abi-directional manner. Both of these types of memories may include anysuitable of the computer-readable media described below. A fixed disk626 is also coupled bi-directionally to CPU 622; it provides additionaldata storage capacity and may also include any of the computer-readablemedia described below. Fixed disk 626 may be used to store programs,data, and the like and is typically a secondary storage medium (such asa hard disk) that is slower than primary storage. It will be appreciatedthat the information retained within fixed disk 626 may, in appropriatecases, be incorporated in standard fashion as virtual memory in memory624. Removable disk 614 may take the form of any of thecomputer-readable media described below.

[0082] CPU 622 is also coupled to a variety of input/output devices,such as display 604, keyboard 610, mouse 612 and speakers 630. Ingeneral, an input/output device may be any of: video displays, trackballs, mice, keyboards, microphones, touch-sensitive displays,transducer card readers, magnetic or paper tape readers, tablets,styluses, voice or handwriting recognizers, biometrics readers, or othercomputers. CPU 622 optionally may be coupled to another computer ortelecommunications network using network interface 640. With such anetwork interface, it is contemplated that the CPU might receiveinformation from the network, or might output information to the networkin the course of performing the above-described method steps.Furthermore, method embodiments of the present invention may executesolely upon CPU 622 or may execute over a network such as the Internetin conjunction with a remote CPU that shares a portion of theprocessing.

[0083] In addition, embodiments of the present invention further relateto computer storage products with a computer-readable medium that havecomputer code thereon for performing various computer-implementedoperations. The media and computer code may be those specially designedand constructed for the purposes of the present invention, or they maybe of the kind well known and available to those having skill in thecomputer software arts. Examples of computer-readable media include, butare not limited to: magnetic media such as hard disks, floppy disks, andmagnetic tape; optical media such as CD-ROMs and holographic devices;magneto-optical media such as floptical disks; and hardware devices thatare specially configured to store and execute program code, such asapplication-specific integrated circuits (ASICs), programmable logicdevices (PLDs) and ROM and RAM devices. Examples of computer codeinclude machine code, such as produced by a compiler, and filescontaining higher level code that are executed by a computer using aninterpreter. Computer readable media may also be computer codetransmitted by a computer data signal embodied in a carrier wave andrepresenting a sequence of instructions that are executable by aprocessor.

EXAMPLE

[0084]FIG. 8 is a block diagram of an example of an embodiment of theinvention. A responses to a plurality of queries form business decisions804, which are provided as input to the personalization assistant 320.The personalization assistant creates a data file (or data preparationtable of values) 138. The personalization assistant 320 may also be usedto create a paper record 808 and screen report 812, which may be used toform another paper record 816. The data file 138 and an input file 159are inputted into a preparation processing device 154 to provide anoutput file, which is sent to a personalization device 150. Thepersonalization device 150 uses the output file to personalize a chipcard 180. Generally, a single data file with a plurality of input filesmay be used to provide one or more output files used to personalize aplurality of smart cards. A personalization validation tool 344 may beused to compare the data file 138 with the smart card 180 to validatethe smart card. The personalization validation tool 344 creates avalidation paper record 830 to validate business decisions and a screenreport 834 designating if the smart card 180 contains data that violatesrules or best practices defined by the card scheme. The screen report834 may be used to provide a paper record 838.

[0085] In an example of a process in an embodiment of the invention, toproved a log on process (step 404) a log-on web page is provided by theweb host that would allow a user to log on to the web host (step 404).The log on web page requests a users username and password. Thisprovides security, that keeps users from viewing or changing otheruser's data. Once logged in the user may be presented with a home pagethat allows the user to select the personalization assistant and run thepersonalization assistant application. Running the personalizationassistant application may provide an Early/Full Data Options Decisionpage. This page allows the user to indicate the appropriate data optionsthat apply to both the issuer host environment and the domesticacquiring environment of the user. For an issuer, if an issuer is notable to receive all of the chip data then the Early Data Option isselected. This selection limits the Issuer in the amount of chip datathey are able to receive. For an issuer, if the issuer is able toreceive all of the chip data then a Full Data Option is selected. Theissuer receives all of the chip data fields. Similarly, an EarlyAcquirer truncates a message only sending some of the fields of data foran Early Data Option, and sends a full message with all of the datafields if a Full Data Option is selected. The inventive personalizationtool is able to provide different best practices recommendationsdepending on whether an early or full environment is used.

[0086] The user is then brought to a business profile selection menu,which allows a user to build a new member profile or to select anexisting member profile, only if a new profile has been previouslycreated. Another option allows the user to select a recommended profile.If the user chooses to build a new member profile from an existingmember profile, then a profile listing screen 1004, as shown in FIG. 10,is provided. The profile listing screen 1004 allows a user to select anyof the listed profiles 1008 and then choose a button to modify a profile1012, a button to view details of the profile 1016, a button to add aprofile 1020, or a button to search profiles 1024.

[0087] If the user selects the button to view details of the profile1016, then a page report type page 1104 is provided, as shown in FIG.11. The report type page 1104 allows a user to choose to generate abusiness report, generate a technical report, generate a datapreparation output file, or generate a stand-in settings report.

[0088] If a user selects the button to modify a profile 1012, a pop-upwindow would be displayed in case the selected profile contains bestpractice violations. The user is asked to confirm whether he/she wantsto continue with the profile, or cancel the selection. If the selectedprofile doesn't contain any best practice violation, a modify profileoption page 1204 is provided, as shown in FIG. 12. The modify profileoption page 1204 provides the options of either archiving the currentprofile and creating a new profile based on the archived profile, or notarchiving the current profile and modifying the current profile. Itshould be noted that profiles that are modified by a user will remain ina pending state until a member user who has supervisor privilege canchange the profile status to “active”. On making the appropriateselection the user would click on the Next button.

[0089] If a user selects the button to add a profile 1020, a start newprofile page 1304 is provided, as shown in FIG. 13. The start newprofile page 1304 queries the user for a profile label 1308, a bankidentification number (BIN) 1312, and an account range 1316. The newprofile will remain in a pending state until a member user who hassupervisor privilege can change the profile status to “active”. Afterall requested information has been entered, the user should click on the“Next” button 1320 to proceed to the next screen. The next screenprovides the user with a summary of selected smart debit/credit cardfeatures.

[0090] If a user selects the button to search profiles 1024, a searchprofile page 1404 is provided, as shown in FIG. 14. The search profilepage 1404 allows a user to search from a list of active or inactiveprofiles over a period defined by the user. The user may search by bankidentification number (BIN) or account range. To perform a search, auser would enter the required information and then click on the continue1408 button.

[0091] If in the business profile selection menu the user selects theuse of a recommended profile, a default profile web page 1504 isprovided, as shown in FIG. 15. The default profile web page 1504provides the options of viewing the details of the default profile andcreating a new profile based on the default profile.

[0092]FIG. 9 is a block diagram of an example of a personalizationdatabase 900. The personalization database provides a hierarchy ofprofiles that is used to provided default and recommended profiles. Auniversal personalization assistant center profile database 904 isprovided. The universal center can maintain multiple profiles perproduct. These profiles may be used as default and recommended profiles.The profiles may be used globally for all regions. A personalizationassistant regional profile database 908 is provided. Usage is dividedinto several regions. Each region may contain several countries. Oneregion may be Latin America and the Caribbean. Each region would takeone or more of the recommended or default profiles in the universalpersonalization assistant center profile database 904 and tailor the oneor more default or recommended profiles according to regionalpreferences and requirements and place these as default and recommendedprofiles in the personalization assistant regional profile database 908.A personalization assistant country profile table 912 is provided. Anexample of a country in the Latin America and the Caribbean region isBrazil. Each country would take one or more of the recommended ordefault profiles in the personalization assistant region profiledatabase 908 and tailor the one or more default or recommended profilesaccording to country preferences and requirements and place these asdefault and recommended profiles in the personalization assistantcountry profile database 912. Each country can have multiplecountry/domestic profiles associated to it, identified by the countryand region code. If a country is in a region that does not have defaultor recommended profiles, then the country may use the global profiles.An issuer profile table 916 is provided. Each issuer can have multipleissuer profiles associated to it, identified by the businessidentification, country code, account range, and profile identification.The issuer would take one or more of the recommended or default profilesin the personalization assistant country profile database 912 and tailorthe one or more default or recommended profiles according to issuerpreferences and requirements and place these as default and recommendedprofiles in the personalization assistant issuer profile database 916.The base profile table contains a list of all profiles andconfigurations for international, regional, country, and issuerprofiles. The personalization assistant base profile table 920 providesinput for a personalization assistant profile data table 924. Thepersonalization assistant profile data table contains a list of all tagsand values associated to it. Each profile has mandatory, recommended,and default settings or values for the various features or functions andtag lengths and values that correspond to the setting or values for theprofile.

[0093] A personalization assistant level rules table 925 is provided.The personalization assistant level rules table 925 contains a list ofall tags and values associated with every level profile and stores therules per profile. The personalization assistant level rules table 925provides input to a personalization assistant BP rules table 928.

[0094] On completion of the profile selection process that defines thedefault profile to be used for building a new profile, thepersonalization assistant application presents a user with a featureselection page 1604, as shown in FIG. 16. This page outlines themandatory features that must be supported by an issuer along withoptional features that users can select or deselect. Some of themandatory features listed are “Account Data,” Cardholder VerificationMethods” (CVMs), “Terminal Risk Management,” and “Card Authentication.”These items as shown, are not next to a check box, since they cannot beselected or deselected, since they are mandatory. Optional featureslisted are “Offline Authorization Controls,” “Offline Static DataAuthentication” (SDA), “Offline Dynamic Data Authentication” (DDA),“Issuer Authentication,” “Issuer-Script Processing,” and “Visa Low-ValuePayment” (VLP). These items as shown, are next to a check box to allow auser to select or deselect the optional feature. The personalizationassistant tool has some of the check boxes for the optional featurespre-checked, where the pre-checked items are either built inrecommendations or best practices. If a user deselects a pre-checkeditem, the personalization assistant tool provides a warning window thatinforms the user that they are about to violate a recommendation or bestpractice and asks if they are sure if they want to do that. As a result,the personalization assistant tool is able to provide mandatory featuresand optional features with implemented recommendations and bestpractices.

[0095] If during the selection or deselection of a feature or function,the user changes an option that results in a violation of current bestpractice, the personalization assistant provides a warning box to theuser, to alert the user to the violation. The following screens dependon the features selected by a user. In this example, it is presumed thatall features have been selected. On this web page and all subsequent webpages that appear during the feature and function selection process, theuser may at any time click on the “Profile Complete” button 1608, tocomplete the profile building process; the “Save” button 1612, to savecurrent setting and remain on the current screen; the “Back” button1616, to return to the previous screen; the “Next” button 1620, to savecurrent settings and to proceed to the next screen; or the “Cancel”button 1624 cancel all settings selected by the user on this page.

[0096] Account Data

[0097]FIG. 17 is a view of an account data web page for account usagecontrols 1704. This page allows a user to define where a card may beused geographically (internationally only, domestically only, or bothinternationally and domestically) for each of the services provided bythe card, i.e. goods and services, cash and cash back. In the caseeither domestic or international usage is checked (i.e. not both arechecked), the system will pop up a question asking if the card willsupport a geographic restriction check. The user may also define if thecard can be used at Automatic Teller Machines (ATM) and at devices otherthan ATMs, such as point of sale devices.

[0098]FIG. 18 is a view of an account data web page for applicationidentification 1804. For issuers who choose to have more than one creditor debit application, using the same application identifier for each,this page allows a user to uniquely identify each of these applicationsusing additional information referred to as the application identifierextension.

[0099]FIG. 19 is a view of an account data web page for applicationconfirmation 1904. This page allows the user to indicate whether thereare multiple payment applications on the card. If multiple applicationsare present, the user has the option on this screen to set the currentconfigure application to require that the cardholder confirm theapplication's use before a transaction is performed. If confirmation isnot requested then a terminal would select an application with thehighest priority, without requesting confirmation.

[0100]FIG. 20 is a view of an account data web page for customizing theaccount name of the application to be displayed in a specific language2004. This page allows the account name of the application to bedisplayed in a specific language to be customized so that in the event aterminal supports the language of choice, the account name would bedisplayed to the cardholder in that language.

[0101]FIG. 21 is a view of an account data web page for customizingaccount language 2104. The page, in this example, allows the issuer todefine up to four languages of choice, so that in the event a terminalin use supports any of these languages, the display messages provided bythe terminal will be displayed in the chosen language.

[0102]FIG. 22 is a view of an account data web page for prioritizing theaccount 2204. This page allows a user to set a required priority orderby which a terminal should select an application, assuming that multiplepayment applications are being supported on the card.

[0103]FIG. 23 is a view of an account data web page for account riskmanagement decisions 2304. This page allows a user to set either declineoffline, send online, or decline options, if online unavailable forvarious risk management results that may be detected by a terminalduring transaction processing. For example, if a terminal determinesthat a card is expired an issuer may choose to have the card declinedoffline at the point of transaction, or send the transaction online tothe issuer, or to send the transaction online to the issuer but declineoffline if an online connection is unavailable. If the terminal is notable to connect online or the connection is down, the decline if onlineunavailable option would decline the card offline.

[0104] Offline Authorization Control

[0105]FIG. 24 is a view of an offline authorization control web page foroffline risk management control 2404. This page allows a user to specifywhether the card, terminal or both should perform risk managementchecks.

[0106]FIG. 25 is a view of an offline authorization control web page foroffline limits and thresholds 2504. This web page allows the user toselect appropriate counter limits, amount limits, secondary currencydefinitions, etc. that are required for card and terminal velocitychecking. For example an offline limit may provide that a maximum ofthree offline transactions may occur before an online transaction isrequired and the number of consecutive offline transactions that areallowed before declining a transaction when an online transaction cannotbe completed. In this example, a mandatory requirement is placed so thatthe issuer must allow at least two offline transactions between onlinetransactions. Threshold limits may be set on offline internationaltransactions and amount limits

[0107]FIG. 26 is a view of an offline authorization control web page forsetting account effective date checking 2604. This page allows the userto determine if an application effective date is required on the accountand the action to be taken if a cardholder attempts to use the cardbefore the account date becomes effective. The options, in this example,are to decline the transaction offline, send the transaction online, orsend the transaction online but decline if an online connection is notavailable.

[0108]FIG. 27 is a view of an offline authorization control web page foroffline risk management decisions 2704. This page allows a user to seteither decline offline, send online, or decline if online unavailableoptions for various offline risk management results that may beencountered by a terminal during transaction process. Examples include;if the card is new, if card data is missing, and if the lower and upperlimits specified by the user for offline use have been exceeded. Forexample, an offline limit may provide that a maximum of three offlinetransactions may occur before an online transaction is required.

[0109] Card Verification Methods

[0110]FIG. 28 is a view of a web page for cardholder verification methodselection 2804. The page provides a user with a choice of two methodsfor preparing the user's cardholder verification methods list. A Method1 option offered by the web page provides a series of questions. Basedon the user's response to the question the personalization assistantgenerates an appropriate cardholder verification method list. A Method 2option offered by the web page allows a user to create the user's owncardholder verification method list. Under Method 2, a review is made ofthe cardholder verification method list before the profile is activated.If either method indicates offline PIN support, a user will be providedby a PIN Try Limit web page 2904, as shown in FIG. 29, to allow theentry of the PIN Try Limit and the action to be taken in event acardholder exceeds the PIN Try Limit during transaction processing.

[0111] If Method 1 is selected, a Card Verification Method AssistantQuestionnaire Method 1 process is performed. A first web page of the CVMAssistant Questionnaire Method 1 3004 is shown in FIG. 30. This pageallows a user to indicate if they require separate CVM lists fordomestic and international transactions. This allows the support of twoCVM lists on a single application.

[0112] A second web page of the CVM Assistant Questionnaire Method 13104 is shown in FIG. 31. Some of the questions on this page are: Willyou allow your cardholder to be validated using offline plaintext PIN?Will you allow your cardholder to be validated using offline EncipheredPIN? At ATMs supporting both offline PIN and online PIN, should offlinePIN be used instead of online PIN? A cardholder verification methodsummary web page 3204 is then provided, as shown in FIG. 32. This pageprovides a summary of the features selected by the user.

[0113]FIG. 33 is a view of a web page for the CVM Method 2 3304. Thispage provides the users with options of designating if the CVM is fordomestic, international, or both, and for providing Amount X and AmountY, and for providing application currency code. The page also providesfields for selecting the Cardholder Verification Method to use, when touse this verification method, and the action to take if this cardholderverification method is not successful.

[0114] Cardholder Verification Risk Management Decisions

[0115]FIG. 34 is a view of a terminal risk management web page 3404.This page allows a user to select decline transaction offline, sendonline, or decline if online is unavailable for various decisions.Examples of some of these decisions are: If cardholder verification isnot successful, what action should be take? If one of the card holdermethods in the card's CVM list is not recognized by the terminal, whataction should be taken? If an offline PIN is required and the PIN pad isnot working or not present, what action should be taken? If an offlinePIN is required and the PIN pad is present but the cardholder's PIN isnot entered, what action should be taken? If the Offline PIN try limitis exceeded, what action should be taken? A series of Yes and Noquestions may also be provided. Examples of some of these questions are:If the offline PIN try limit is exceeded on the current transaction andthe transaction is declined offline, should an advice be created? If theoffline PIN is exceeded on the current transaction, should theapplication be blocked? If the offline PIN try limit is exceeded on theprevious transaction, should the transaction be declined offline?

[0116] Offline Dynamic Data Authentication

[0117] The system provides two methods of offline data authentication,which are static and dynamic. In static authentication, a terminal readsstatic data from the card and runs the data through an algorithm tocheck to see if the data matches a signature on the card using RSAtechnology. This authentication is to detect whether data such as theexpiration date of the card has been changed. Dynamic authenticationprovides static authentication, and in addition generates a dynamicsignature for each transaction. For dynamic authentication, a privatekey may be stored on a card. A public key that matches the private keyis placed in a certificate, which is read by a terminal. The terminaluses the public key to encrypt data, which is sent to the card. The cardis able to validate the encrypted data using the private key.

[0118]FIG. 35 is a view of an offline dynamic data authentication webpage 3504. The page allows the user to determine if additionalterminal-based data elements should be used during the dynamic dataauthentication process. The EMV specifications require that at minimum,a randomly generated unpredictable number be used, but the user mayspecify additional data elements.

[0119] Offline Data Authentication Risk Management Decisions

[0120]FIG. 36 is a view of a web page for Offline Data AuthenticationRisk Management Decisions 3604. This page provides options for the userto set either decline offline, send online, or decline if online isunavailable for various static or dynamic offline data authenticationrisk management results that may be encountered by the terminal duringtransaction processing.

[0121] Card Authentication Options

[0122]FIG. 37 is a view of a web page for card authentication options3704. This card authentication process is an online process. This pageallows the user to select the appropriate cryptogram version number forthe application cryptogram that may be sent online for validation by theissuer. This page provides a detailed description of each version. Inthis example, the DES encryption process is used. The card contains theDES secret key, which is only known to the issuer. In this process, thecard creates a cryptogram using the secret key and data from the cardand terminal. The cryptogram is sent to the issuer. Since the issuerholds a master of the secret key, the issuer is able to validate thecryptogram.

[0123] Issuer Authentication Options

[0124]FIG. 38 is a view of a web page for issuer authentication options3804. This page allows the user to indicate whether issuerauthentication should be performed as an optional feature or should bemandatory. It also provides the user with additional actions to beperformed in the event of a failure of issuer authentication. In issuerauthentication, the card validates that the information came from theright issuer. In this example a DES key is used.

[0125] Issuer Script Risk Management Decisions

[0126]FIG. 39 is a view of a web page for issuer script risk managementdecisions 3904. This page allows the user to indicate whether the nexttransaction should be sent online following the application's failure toprocess an issuer script. Issuer script is used by an issuer to update asmart card. When a card is issued to a new cardholder, an issuer mayplace more stringent controls in the smart card. As the relationshipwith the cardholder develops and the issuer begins to trust thecardholder more, the issuer may send script through issuer scriptprocessing to the smart card that makes the controls more lenient. Theissuer script processing may be accomplished when the cardholder placesa card in a terminal. This process may be invisible to the cardholder byperforming the issuer script processing during a purchase transaction.This web page allows the issuer to decide what action to take if aissuer script process fails.

[0127] Visa Low-Value Payment (VLP) Feature

[0128]FIG. 40 is a view of a first web page for a low-value payment(VLP) feature 4004. The low-value payment feature is an optional featurethat provides quick offline transaction processing for small-ticketpurchases in single-currency markets. This page allows the user toselect or change features associated with the low-value payment option.FIG. 41 is a view of a second web page for the low-value payment feature4104. This page allows the user to indicate whether low-value paymentshould support the same cardholder verification methods used for thedebit credit card or use separate ones. FIG. 42 is a view of a third webpage for low-value payment 4204. If the user has indicated “no” tohaving the same cardholder verification methods used for both debitcredit and low-value payment, this page will appear allowing theselection of a cardholder verification method. FIG. 43 is a view of afourth web page for low-value payment 4304. If the user chooses to usethe same cardholder verification methods for credit debit and low-valuepayment, this page will appear to verify the selection. Although this isdesignated the fourth web page, it does not designate an order ofappearance, since either the third or fourth web page appears, butusually not both during this process. FIG. 44 is a view of a fifth webpage for low-value payment 4404. This page allows the user to select theappropriate authorization code, low-value payment funds limit, and toindicate whether or not a low-value single transaction limit shouldapply.

[0129] Data Schema

[0130]FIG. 49 is an example of a data schema 4904 that may be used in anembodiment of the invention. The core function of the data schema is tocreate, store, and maintain universal, regional, country, and memberprofiles that contain mandatory, default, recommended, and selectedsettings. Some of the tables in the data schema are used to storeprofile specific data, while other tables are used as cross-referencesfor setting appropriate value for the profile (lookup tables) or tosupport some administrative function (e.g. for providing e-mailnotification). Generally, the User Information Table 4912, the MemberInformation Table 4916, the Base Profile Table 4920, the CVM ApprovalTable 4924, the Update Bulletin Table 4928, and the Profile Data Table4932 are updated when a profile is added or modified. The remainingtables are normally not updated when a profile is added or modified.

[0131] An example of the lookup table is made up of the CVM tables, suchas the VPA_CVM_QUESTION table 4908, the VPA_CVM_DATA_EMAIL table 4944,the VPA_CST_CVM_CONDITION table 4946, the VPA_CST_CVM_LIST table 4948,the VPA_CVM_APPROVAL table 4924, and the VPA_CST_CVM_TYPE table 4950.For example, for the Method 1 of CVM, the CVM Assistant QuestionnaireMethod 1 3104 of FIG. 31 is provided with seven “yes” and “no”questions. In this example, there are a set number (for example 64)different possible combinations of CVM (Card Verification Method)related answers to CVM Method 1 related questions in the questionnaire3104. A user selects the answers to the questions in the questionnaire3104 and submits the answers. The combination of answers is compared tothe combination of answers of various entries in the lookup table. Whena matching combination of answers entry is found in the lookup table, anassociated output is provided for the matching entry. FIG. 32 provides asummary of the customer CVM list based on the found associated output.

[0132] From a maintenance perspective, the questions in the CVM Method 1questionnaire 3104 and the associated output in the lookup table may beeasily changed without programmers, since the information is in a datatable, instead of being part of the program logic. This allows easyrephrasing of questions in the questionnaire by changing data in theVPA_CVM_QUESTION table 4908.

[0133] The VPA_CST_CURRENCY table 4936 is a table of all currencysupported by the personalization assistant. For the web page for offlinelimits and thresholds 2504, a pull down menu 2508 is provided to allowthe selection of a secondary currency. The entries for the pull downmenu may be generated from the VPA_CST-CURRENCY table 4936. TheVPA_CST_CRYPTOGRAM table 4938 provides a list of various cryptogramversion numbers available for the application cryptogram. The data inthe VPA_CST_CRYPTOGRAM table 4938 may be used to generate the pull downmenu for the cryptogram version number 3708 in FIG. 37. The use of thesetypes of tables such as the VPA_CST_CRYPTOGRAM table 4938 is that a newcryptogram version may be added and supported merely by adding the newversion to the VPA_CST_CRYPTOGRAM table 4938. The program logic thenlists all entries in the table at the appropriate places in the webpages. Similarly, new currency may be added or currency may be deletedby adding or deleting the currency entry in the VPA_CST-CURRENCY table4936. This allows the program logic to display new currency in theappropriate web pages without reprogramming computer logic.

[0134] VPA_CST_TAG_ELEMENT table 4940 is a table of tag elements. Thistable lists descriptions for all tags and may reserve places for futuretags. This table also defines tag values and lengths for the differentchoices. Adding new functionality to a tag may be achieved by changingdefinitions and tag values in the VPA_CST_TAG_ELEMENT table 4940.

[0135] Personalization Assistant Output Options

[0136] The output file is a direct translation from the profile. Formany of the questions that are answered above, the answer to thequestion causes a tag value stored in the profile to be set. Programminglogic uses the selected answer to set the tag value in the profile. Inthis example, a tag length and value (TLV) method are used. In thisexample, once a profile is completed the profile contains about 40 tags.

[0137] On completion of the profile creation process, the user will betaken to an output options page 4504, as shown in FIG. 45. On this page,the user may chose from a number of options for creating reports andoutput files. The choices for reports and output files include abusiness report, a technical report, a data preparation output file, anda stand-in options report. The contents of all the reports and outputfiles are based on responses made by the user to all of the businessquestions. The user may view, print, or save any of these reports. Theymay also be forwarded to a third-party data preparation service bureauor to a regional office for review.

[0138]FIG. 46 is a view of a business report 4604, which may be viewedas a web page. The business report provides a high level summary ofvarious business decisions and settings and also notes any bestpractices violations. Users of this report may include product managersand portfolio managers.

[0139]FIG. 47 is a view of a technical report 4704, which may be viewedas a web page. This report provides a summary a various businessdecisions and settings supported by technical details such as tag,category, length, and values. This report highlights any best practicesviolations. Users of this report may include member technical staff orregional support representatives.

[0140]FIG. 48 is a view of a stand-in options report 4804. This reportshows a summary of the stand-in options related to the personalizationfeatures. This report will assist the issuer in determining theappropriate stand-in options settings for the account. Users of thisreport may include regional support representatives in order todetermine the appropriate stand-in parameters that should apply to thisaccount.

[0141] The option for generating the data preparation output file(personalization data file) will only be displayed if the selectedprofile is in “active” state. The data preparation output file containsthe member profile details that are incorporated into the datapreparation process of personalization. The same file may be used on thepersonalization validation tool 344 to establish an issuer profile forpersonalization validation. In this embodiment both a comma separatedvalues (CSV) format and an extensible markup language (XML) format aresupported.

[0142] The comma separated values (CSV) format offers a way to collectdata from any table so that it can be conveyed as input to anothertable-oriented application. It presents the required values in the tableas a series of ASCII text lines. Each column value in the table isseparated from the next column's value by a comma. Each row starts a newline. Appendix A is a sample CSV data preparation output file. “T=” isused to designate a tag number. “C=” is used to designate a tag namecategory. “L=” is used to designate a tag length. “V=” is used todesignate tag value.

[0143] The Extensible Markup Language (XML) format allows the exchangeof data between incompatible systems. By converting data to the XMLformat, there is a significant reduction in the complexity oftransferring this data, which makes it possible for this data to be readby many different types of applications and systems. Appendix B is asample XML data preparation output file. The tag number, tag namecategory, tag length, and tag value are more easily labeled as shown inthe example.

[0144] In the XML file in appendix B, line 20, defines a tag number.Line 21 defines a tag length. Line 22 defines a tag value. Other tags,tag lengths, and tag values are defined in other parts of the XML file.

[0145] Other embodiments of the invention may use other configurations,such as it may be possible to connect the local systems to the web hostthrough a network that is not the Internet. The requirement that thepersonalization assistant generates the data preparation table of valuesand the storage of the data preparation table of values 138 on the webhost, helps to assure that all data preparation table of values 138submitted to the preparation processing device meet certain mandates toensure compatibility. It is also possible to store the data preparationtable of values on the local system and still provide ensurecompatibility.

[0146] The invention provides a user friendly tool that is able to takebusiness related answers to generate technical settings expressed in adata preparation table of values, without requiring the understanding ofthe technical settings. The invention also provides a data preparationtable of values that embodies the best practice of rules and that doesnot contain any prohibited combination of data elements.

[0147] Some of these features may have mandates or recommendations thatare set at a national, regional, or global level. For example, a globalrecommendation of a pin length may be for at least five characters. Aregion, such as Europe, may have a mandate that the pin length be atleast six characters. A country within the region may require that pinlength be at least seven characters. An issuer within country may beable to require that pin length be at least eight characters. Sincethere are several different possible approval levels, recommendationsand mandates at the different approval levels may quickly change. As aresult, it is desirable to have a personalization assistant to assistusers in applying any changes. The templates in the prior art would betoo complex to allow changes to be applied quickly and effectively. Inaddition, it would be difficult to continuously update templates thatare used on stand alone system. The look up table allows therecommendations and mandates to be more quickly changed than if therecommendations and mandates were placed in program logic. In addition,since the personalization assistant 320 is located at a centralized webhost, it is much easier to provided updates globally, than trying toupdate templates on many stand alone systems.

[0148] A central system also allows e-mail communication with an issueror the central system to obtain approvals at various stages. If used ina stand alone system, e-mail may also be used to obtain certainapproval.

[0149] While this invention has been described in terms of severalpreferred embodiments, there are alterations, permutations,modifications and various substitute equivalents, which fall within thescope of this invention. It should also be noted that there are manyalternative ways of implementing the methods and apparatuses of thepresent invention. It is therefore intended that the following appendedclaims be interpreted as including all such alterations, permutations,modifications, and various substitute equivalents as fall within thetrue spirit and scope of the present invention. APPENDIX A Sample CSVFile: Organization: Demo Bank PAN: 1111222233334444-1111222233334444Profile: FullVSDC-Issuer-CreditProfile01 ProfileId: 000000000017Application Default Action: T=9F52, C=VSDC, L=02, V=(0000) ApplicationExpiration Date: T=5F24, C=VSDC, L=03, V=(101011) Application Identifier(AID): T=4F, C=VSDC, L=07, V= (A0000000031010) Application InterchangeProfile (VSDC): T=82, C=VSDC, L=02, V= (7C00)

[0150] APPENDIX B Sample XML File: <?xml version=“1.0”encoding=“ISO-8859-1” ?> <!DOCTYPE config [ <!ELEMENT config(tagelement+)> <!ELEMENT tagelement (tagname, tag, taglength, tagvalue)><!ELEMENT tagname (#PCDATA)> <!ELEMENT tag  (#PCDATA)> <!ELEMENTtaglength (#PCDATA)> <!ELEMENT tagvalue (#PCDATA)> <!ATTLIST config panCDATA #IMPLIED> <!ATTLIST config profile CDATA #REQUIRED> <!ATTLISTconfig profileid CDATA #REQUIRED> <!ATTLIST tagname category(VSDC|VLP|Domestic|International) “VSDC”> ]> -<configpan=“1111222233334444-1111222233334444” org=“Demo Bank”profile=“FullVSDC-Issuer-CreditProfile01” profileid=“000000000017”>-<tagelement> <tagname category=“VSDC”>Application DefaultAction</tagname> <tag>9F52</tag> <taglength>02</taglength><tagvalue>0000</tagvalue> </tagelement> -<tagelement> <tagnamecategory=“VSDC”>Application Expiration Date</tagname> <tag>5F24</tag><taglength>03</taglength> <tagvalue>101011</tagvalue> </tagelement><tagname category=“VSDC”>Application Identifier (AID)</tagname><tag>4F</tag> <taglength>07</taglength><tagvalue>A0000000031010</tagvalue> </tagelement> -<tagelement> <tagnamecategory=“VSDC”>Application Interchange Profile (VSDC)</tagname><tag>82</tag> <taglength>02</taglength> <tagvalue>7C00</tagvalue></tagelement> </config>

What is claimed is:
 1. A method for automating the personalization of abatch of smart cards, said method comprising: providing a user with aplurality of queries regarding smart card features; receiving from theuser responses to the plurality of queries; and generating apersonalization data file using the responses to the plurality ofqueries, wherein the personalization data file comprises values, whichmay be used to provide features on a batch of smart cards.
 2. Themethod, as recited in claim 1, further comprising using individual cardholder input files and the personalization data file to personalize aplurality of smart cards to yield a plurality of personalized smartcard.
 3. The method, as recited in claim 2, wherein the generating apersonalization data file, comprises: providing a look up table withentries for various combinations of responses to the plurality ofqueries; finding a matching entry in the look up table that matches theresponses to the plurality of queries; locating personalization datafile output associated with the matching entry; and outputting thepersonalization data file output associated to the matching entry. 4.The method, as recited in claim 3, wherein the plurality of queries,comprise: at least one query regarding smart card account usage control;at least one query regarding smart card account risk management; and atleast one query regarding offline limits and thresholds.
 5. The method,as recited in claim 4, wherein responses to the plurality of queries areused to provide best practices recommendations.
 6. The method, asrecited in claim 5, further comprising providing regional profiles andsubregional profiles, wherein a subregion is within a region, whereinthe regional and subregional profiles have mandatory and recommendedsettings, wherein some of the subregional profiles are more stringentthan regional profiles in which the subregions belong.
 7. The method, asrecited in claim 1, wherein the generating a personalization data file,comprises: providing a look up table with entries for variouscombinations of responses to the plurality of queries; finding amatching entry in the look up table that matches the responses to theplurality of queries; locating personalization data file outputassociated with the matching entry; and outputting the personalizationdata file output associated to the matching entry.
 8. The method, asrecited in claim 1, wherein the plurality of queries, comprise: at leastone query regarding smart card account usage control; at least one queryregarding smart card account risk management; and at least one queryregarding offline limits and thresholds.
 9. The method, as recited inclaim 1, wherein responses to the plurality of queries are used toprovide best practices recommendations.
 10. The method, as recited inclaim 1, further comprising providing regional profiles and subregionalprofiles, wherein a subregion is within a region, wherein the regionaland subregional profiles have mandatory and recommended settings,wherein some of the subregional profiles are more stringent thanregional profiles in which the subregions belong.
 11. A computerimplemented method for automating the personalization of a batch ofsmart cards, comprising: running on a host computer a personalizationassistant application; providing to at least one user system over anetwork a plurality of queries regarding smart card features; receivingfrom the at least one user system over the network responses to theplurality of queries; generating a personalization data file using theresponse to the plurality of queries, wherein the personalization datafile comprises values which may be used to provide features on a batchof smart cards.
 12. The computer implemented method, as recited in claim11, further comprising: sending the personalization data file to apreparation processing device; and using the personalization data fileand card holder input files to personalize smart cards.
 13. The computerimplemented method, as recited in claim 12, wherein the generating apersonalization data file, comprises: providing a look up table withentries for various combinations of responses to the plurality ofqueries; finding a matching entry in the look up table that matches theresponses to the plurality of queries; locating personalization datafile output associated with the matching entry; and outputting thepersonalization data file output associated to the matching entry. 14.The computer implemented method, as recited in claim 13, wherein theplurality of queries, comprise: at least one query regarding smart cardaccount usage control; at least one query regarding smart card accountrisk management; and at least one query regarding offline limits andthresholds.
 15. The computer implemented method, as recited in claim 14,wherein responses to the plurality of queries are used to provide bestpractices recommendations.
 16. The computer implemented method, asrecited in claim 15, further comprising providing regional profiles andsubregional profiles, wherein a subregion is within a region, whereinthe regional and subregional profiles have mandatory and recommendedsettings, wherein some of the subregional profiles are more stringentthan regional profiles in which the subregions belong.
 17. The computerimplemented method, as recited in claim 11, wherein the generating apersonalization data file, comprises: providing a look up table withentries for various combinations of responses to the plurality ofqueries; finding a matching entry in the look up table that matches theresponses to the plurality of queries; locating personalization datafile output associated with the matching entry; and outputting thepersonalization data file output associated to the matching entry. 18.The computer implemented method, as recited in claim 11, wherein theplurality of queries, comprise: at least one query regarding smart cardaccount usage control; at least one query regarding smart card accountrisk management; and at least one query regarding offline limits andthresholds.
 19. The computer implemented method, as recited in claim 11,wherein responses to the plurality of queries are used to provide bestpractices recommendations.
 20. The computer implemented method, asrecited in claim 11, further comprising providing regional profiles andsubregional profiles, wherein a subregion is within a region, whereinthe regional and subregional profiles have mandatory and recommendedsettings, wherein some of the subregional profiles are more stringentthan regional profiles in which the subregions belong.
 21. A system forautomating the personalization of a batch of smart cards, comprising ahost computer running on a host computer a personalization assistantapplication, comprising computer readable media, comprising; computerinstructions for providing to at least one user system over a network aplurality of queries regarding smart card features; computerinstructions for receiving from the at least one user system over thenetwork responses to the plurality of queries; and computer instructionsfor generating a personalization data file using the response to theplurality of queries, wherein the personalization data file comprisesvalues which may be used to provide features on a batch of smart cards.22. The system, as recited in claim 21, further comprising: apreparation processing device, wherein the computer readable mediafurther comprises computer instructions for sending the personalizationdata file to the preparation processing device; wherein the preparationprocessing device comprises, computer readable media, comprisingcomputer instructions for receiving individual card holder input file;and computer instructions for using the personalization data file andcard holder input file to personalize a smart card.
 23. The system, asrecited in claim 22, wherein the computer instructions for generating apersonalization data file, comprises: computer instructions forproviding a look up table with entries for various combinations ofresponses to the plurality of queries; computer instructions for findinga matching entry in the look up table that matches the responses to theplurality of queries; computer instructions for locating personalizationdata file output associated with the matching entry; and computerinstructions for outputting the personalization data file outputassociated to the matching entry.
 24. The system, as recited in claim23, wherein the plurality of queries, comprise: at least one queryregarding smart card account usage control; at least one query regardingsmart card account risk management; and at least one query regardingoffline limits and thresholds.
 25. The system, as recited in claim 24,further comprising computer instructions for using responses to theplurality of queries to provide best practices recommendations.
 26. Thesystem, as recited in claim 25, further comprising computer instructionsfor providing regional profiles and subregional profiles, wherein asubregion is within a region, wherein the regional and subregionalprofiles have mandatory and recommended settings, wherein some of thesubregional profiles are more stringent than regional profiles in whichthe subregions belong.
 27. The system, as recited in claim 21, whereinthe computer instructions for generating a personalization data file,comprises: computer instructions for providing a look up table withentries for various combinations of responses to the plurality ofqueries; computer instructions for finding a matching entry in the lookup table that matches the responses to the plurality of queries;computer instructions for locating personalization data file outputassociated with the matching entry; and computer instructions foroutputting the personalization data file output associated to thematching entry.
 28. The system, as recited in claim 21, wherein theplurality of queries, comprise: at least one query regarding smart cardaccount usage control; at least one query regarding smart card accountrisk management; and at least one query regarding offline limits andthresholds.
 29. The system, as recited in claim 21, further comprisingcomputer instructions for using responses to the plurality of queries toprovide best practices recommendations.
 30. The system, as recited inclaim 21, further comprising computer instructions for providingregional profiles and subregional profiles, wherein a subregion iswithin a region, wherein the regional and subregional profiles havemandatory and recommended settings, wherein some of the subregionalprofiles are more stringent than regional profiles in which thesubregions belong.
 31. A computer implemented method for automating thepersonalization of a batch of smart cards, comprising: running on a hostcomputer a personalization assistant application; providing to at leastone user system over a network a plurality of queries regarding smartcard features; receiving from the at least one user system over thenetwork responses to the plurality of queries; providing apersonalization data file using the response to the plurality ofqueries, wherein the personalization data file comprises values whichmay be used to provide features on a batch of smart cards.
 32. Thecomputer implemented method, as recited in claim 31, further comprising:providing the personalization data file to a preparation processingdevice; and using the personalization data file and card holder inputfiles to personalize smart cards.
 33. The computer implemented method,as recited in claim 31, wherein the plurality of queries, comprise: atleast one query regarding smart card account usage control; at least onequery regarding smart card account risk management; and at least onequery regarding offline limits and thresholds.
 34. The computerimplemented method, as recited in claim 31, further comprising providingbest practices recommendations based on responses to the plurality ofqueries are used to.
 35. The computer implemented method, as recited inclaim 31, further comprising providing regional profiles and subregionalprofiles, wherein a subregion is within a region, wherein the regionaland subregional profiles have mandatory and recommended settings,wherein some of the subregional profiles are more stringent thanregional profiles in which the subregions belong.