Electronic card and methods for making same

ABSTRACT

An electronic card includes a digital processor, an electrochemical battery and a communications port. The processor and battery are essentially coplanar, and are sandwiched between and enclosed by two flexible covers, preferably made from an insulating plastic material, and preferably fitted to the components that they enclose. The communications port can include, for example, a Smart Card contact port, a stripe emulator, an RF port, and IR port, etc. The battery may comprise a rechargeable battery. In an exemplary embodiment, at least the processor is carried by a flexible printed circuit (PC) board. In other exemplary embodiments, switches and/or indicators are also carried by the PC.board. A method for manufacturing an electronic card having at least two components is also disclosed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. Ser. No. 12/726,868 filedMar. 18, 2010 now U.S. Pat. No. 7,954,724, which was a continuation ofU.S. Ser. No. 11/413,595, filed Apr. 27, 2006 now abandoned which was acontinuation-in-part of U.S. Ser. No. 11/391,719 filed Mar. 27, 2006 nowabandoned, which claims the benefit of U.S. Ser. Nos. 60/675,388 filedApr. 27, 2005 and 60/594,300 filed Mar. 26, 2005, all of whichapplications are specifically incorporated herein by reference. Inaddition, U.S. Ser. No. 11/391,719 claims the benefit of U.S. Ser. No.60/594,300 filed Mar. 26, 2005, the disclosure of which is alsoincorporated herein by reference.

BACKGROUND

Exemplary embodiments disclosed herein pertain to electronic cards. Moreparticularly, exemplary embodiments disclosed herein pertain to secureelectronic cards and methods for making same.

There are a great many applications for electronic security. Forexample, security is desirable or required for financial transactions,or for providing access to various physical and non-physical resources.One area of great concern for electronic security is in the field offinancial transaction cards, e.g. credit and debit cards.

Conventional credit cards, debit cards and other financial transactioncards (hereafter “transaction cards”) have a typically plastic body uponwhich is embossed a 16 digit account number and other data. A magneticstrip, usually referred to as a “stripe”, is adhered to the back of thecard. The stripe typically magnetically encodes the account numberand/or other data.

A stripe is typically a magnetic tape material much like the magnetictape used in digital data recording. The stripe material typicallyincludes a magnetic oxide and binder compounds that provide the magneticstripe with data encoding capabilities and physical durabilitycharacteristics needed for transaction card applications. While thesemagnetic tape components have been optimized for transaction cardapplications the magnetic tape used for the magnetic stripe on atransaction card is very similar to standard digital data recordingtape.

The two most common magnetic oxides used in magnetic stripe cards arereferred to as low coercivity (LoCo) and high coercivity (HiCo) magneticoxides. Coercivity measures how difficult it is to magnetize ordemagnetize the stripe and is measured in oersteds. Low coercivitymagnetic stripes are typically 300 oersteds and high coercivity magneticstripes are above 2700 oersteds. A high coercivity magnetic striperequires about three times more energy to encode or erase than does alow coercivity magnetic stripe. Many transaction card applications havegone to HiCo magnetic stripes because it is much harder to accidentallyerase the encoded data than on LoCo magnetic stripes. This providesgreater durability and readability of the encoded data in use for manyapplications.

The encoding of the magnetic stripe on a transaction card typicallyfollows standard digital recording techniques but is again optimized fortransaction card applications. The encoded data takes the form of zonesof magnetization in the magnetic stripe with alternate magneticpolarities. The north and south poles' of the magnetized zones alternatein direction providing an encoding technique that can represent thebinary “zeroes” and “ones” of a binary digital code.

The standard encoding technique for the magnetic stripe on a transactioncard is the F2F (Aiken double frequency) code where a binary zero isrepresented by a long magnetized zone and a binary one is represented bytwo magnetized zones, each one half the length of the zero—a longmagnetized zone. The exact length of these zones of magnetization isdetermined by how much data needs to be recorded on the magnetic stripe.For example Track. 2 data is encoded at 75 bits per inch or 75 long zerozones per inch—International Standards Organization (ISO) specifications7811-2/6. That equates to 0.01333 inches in length for the zeromagnetized zone. The binary one would then be two zones of one half thatlength or 0.00666 inches in length. Other lengths can be obtained fordifferent data densities such as the 210 bits per inch used in Track 1and Track 2 of the magnetic stripe.

Reading the encoded data in the magnetic stripe is accomplished bycapturing the magnetic flux field extending from the magnetized zones inthe stripe by a magnetic read head. The read head converts the changingmagnetic flux in the coil of the read head to a voltage patternmirroring the magnetization zones of the encoded data. The voltagepattern can then be translated by the decoding electronics into thebinary zeroes and ones of the data as is well known in the industry.

A magnetic stripe encoder consists of a magnetic write head and anelectronic current drive circuit capable of magnetizing the magneticoxide in the stripe to full magnetization (saturation). The encodingcurrent in the write head is capable of alternating direction therebyproducing alternating zones of magnetization direction in the stripethat will form the data encoding of the magnetic stripe. Transactioncards typically have their stripes encoded with account and/or otherinformation in commercial magnetic stripe encoders prior to delivery tothe consumer.

The process of magnetic tape application to transaction cards, theencoding of the magnetic stripe and the reading of the encoded data inthe magnetic stripe at point of use has been a reliable and costeffective method for portable personal data storage for financial, IDand other transaction card based applications. However, the relativeease of reading and encoding or re-encoding of the magnetic stripe datahas made the magnetic stripe transaction card subject to counterfeiting,copying the data to one or more cards (often referred to as “skimming”)and other fraud abuses. Skimming fraud alone is growing around the worldand has reached financial dollar losses that call for immediatesolutions.

There are many security problems with conventional transaction cards.For one, the stripe is static and is not encrypted, allowing transactioncard thieves to “steal”, in the virtual sense, the data from the stripeand use it for unauthorized transactions. This is because withconventional magnetic stripe cards the transaction data is “exposed”,i.e. not encrypted. If ‘picked off’, the data can be usedindistinguishably in a counterfeit transaction card. As such, acounterfeit transaction card can be freely used by a thief until it iscancelled.

The skimming and counterfeiting problem has been partially addressed byMagTek Incorporated with its MagnePrint technology. MagnePrint® is acard security technology that can detect “skimmed” or magneticallyaltered counterfeit cards. Just as fingerprints can uniquely identifyhuman beings, MagnePrint® can uniquely identify magstripe cards.MagnePrint® technology was discovered at Washington University in St.Louis, Mo., USA. MagTek refined the technology, to bring it to practicaluse, and has an exclusive license to market this technology. However,MagnePrint technology requires modified card readers for itsimplementation, which would render obsolete millions of legacy cardreaders.

In addition to a lack of security, conventional transaction cards arealso quite limited in storage capacity. That is, conventional cards arelimited to their stripe for storage. As such, conventional cards are notelectronic cards, e.g. cards with embedded electronics such as anon-board processor and/or digital memory, and are very limited in theirfunctionality.

An example of an electronic card is the so-called “Smart Card”, whichincludes both an on-board processor and digital memory. By providing anon-board electronics, a Smart Card can implement security protocols suchas encryption, store large amounts of user information, etc.

A common standard for Smart Cards is referred to as the ISO 7816standard. With this protocol, a Smart Card is provided with anelectrical interface including a number of electrically conductive andexternally accessible contact pads which are coupled to an embeddedsecure processor. The Smart Card is inserted into a Smart Card readerwhich makes electrical contact with the contact pads to provide power toand communications with the secure processor. Smart Cards, however, arenot provided with embedded power, e.g. a battery. Smart cards can alsoinclude a conventional stripe which, in the prior art, does not in anyway interact with the secure processor.

Smart cards using memory chips and microprocessor chips were firstintroduced to provide increased data storage and to guard against someof the types of fraud found in magnetic stripe transaction cards. TheSmart Cards do reduce some types of fraud but the cards are much moreexpensive than a magnetic stripe transaction card and the magneticstripe readers at the point-of-transaction had to be replaced withreaders that could read the data storage chip and the magnetic stripe.These cost factors and inertia in changing the existing infrastructurebuilt up around the magnetic stripe transaction card systems andapplications (e.g. “legacy” card readers) have prevented the rapid andmore general acceptance of Smart Cards in the United States.

Another factor in the slow acceptance of Smart Cards in the UnitedStates, has been the lack of visible benefits to the end user orconsumer. The consumer is just as content to use the magnetic stripe asto use the chip to complete a transaction.

While broadly adopted abroad, Smart Cards have not been extensivelyadopted in the U.S., as noted above. As noted above, a major reason forthis is the investment made by millions of merchants in legacy cardreaders, which cannot communicate with the secure processors of SmartCards. Also, Smart Cards conforming to the ISO 7816 standard suffer fromtheir own limitations, including severely restricted 1/0, an inabilityto provide “smart” transactions with legacy card readers, etc.

Another limitation of smart cards in general is that they lack theability to interact with a user when they are not in contact with asmart card reader. This limitation is due to the fact that the smartcard of the prior art does not have an on-board power supply. Thus theelectronic components lie dormant and do not allow for interaction. Thislimitation prevents a myriad of features, such as account selection, ora security feature to lock the card, etc.

Another suggested approach, not yet in use, uses a general processor anda stripe emulator which work with legacy card readers. As used here, theterm “stripe emulator” will refer to a transaction card where datatransmitted to a legacy card reader is under the control of the generalprocessor. This approach will be referred to herein as an “emulatorcard”, which is one form of an electronic card.

Emulator cards potentially have a number of distinct advantages overconventional credit cards. For one, a single card can emulate a numberof different transaction cards, greatly reducing the bulk in one'swallet. For example, an emulator card can emulate a Visa card, aMasterCard, and an ATM card. Also, since the emulator card includes aprocessor, it is possible to implement additional functionality, such assecurity functions.

However, emulator cards, too, have their limitations. For one, sincegeneral processors are used the security level of the card is reduced.For example, a hacker could potentially obtain data stored in unsecuredelectronic memory. Also, emulator cards do not-address Smart Cardprotocols, as they are designed to work with legacy card readers. Forexample, as with conventional credit cards, data flows from the emulatorcard to the legacy card reader, and not vice versa. Still further, theinformation that can be provided by the emulator card is limited to theamount of information that a conventional stripe can hold and that alegacy card reader can read.

The need for fraud reduction with a versatile and inexpensivelymanufactured electronic card is urgent. In the U.S., fraud is tending tocover from 7.5 to 12 basis points in credit card transactions, andskimming alone is estimated to cost $8 billion dollars in 2005.Internationally, the need is even more dire, with fraud tending from 25to 40 basis points, with 60 percent of that being due to skimming.Nevertheless, merchants in the United States and elsewhere are reluctantto invest the resources necessary to change all of their currentmagnetic-card transaction equipment for various reasons, including cost,inconvenience, disruption and lack of reliability.

There are other uses for electronic cards other than for financialtransactions. For example, electronic cards have been used for securitypurposes to allow, for example, personnel to high security areas of abuilding (“access control”). Electronic cards can therefore be used fora variety of purposes where the identity and/or status of the bearerneeds to be verified by a physical card or “token.”

Electronic cards, as noted above, tend to be relatively expensivecompared to conventional, non-electronic, magnetic stripe cards. This isdue, in part, to the cost of the electronic components and is due, inpart, to the complexity of manufacture of electronic cards. For example,care must be taken during lamination of electronic cards that the heatand/or pressure do not damage the sensitive electronic components. Also,electronic cards should remain thin, flexible and preferably of the samedimensions as conventional cards. As another example, stripe emulatorstend to be difficult to design and manufacture such that they work withlegacy readers.

Furthermore, powering the electronic circuitry of electronic cards tendsto be problematical. For example, Smart Cards are powered by theirreaders, limiting their usefulness in non-contact applications. A goodsolution for powering ubiquitous electronic cards has not been found inthe prior art.

These and other limitations of the prior art will become apparent tothose of skill in the art upon a reading of the following descriptionsand a study of the several figures of the drawing.

A number of non-limiting examples of electronic cards which addressaforementioned problems and limitations of prior transaction cards andelectronic cards are presented. As will be apparent to those skilled inthe art, the methods and apparatus as disclosed herein are applicable toa wide variety of problems which require or could be improved withimproved electronic cards.

In an embodiment, set forth by way of example rather than limitation, anelectronic card includes a thin, flat digital processor, a thin, flatelectrochemical battery, a communications port, a first flexible cover,and a second flexible cover. The digital processor preferably has afirst substantially planar surface and a substantially opposing secondsubstantially planar surface, wherein at least one of the first surface,the second surface, and a cross-section of the processor define amaximum surface area. The battery preferably has a first substantiallyplanar surface and a substantially opposing second substantially planarsurface, wherein at least one of the first surface, the second surface,and a cross-section of the processor define a maximum surface area, thebattery being positioned substantially co-planar with the processor andcapable of powering the processor. The communications port is coupled tothe processor. Each of the first flexible cover and the opposing secondflexible cover have a surface area greater than the combined maximumsurface areas of the digital processor and the battery. The processorand the battery are sandwiched between and enclosed by the firstflexible cover and the second flexible cover.

In an exemplary embodiment, the electronic card includes a flexiblecircuit board. In another exemplary embodiment at least one of the firstcover and the second cover are contoured to fit over the circuit board,processor and battery. In another exemplary embodiment, one or moreswitches are coupled to the circuit board. In another exemplaryembodiment, one or more indicators are coupled to the circuit board. Inanother exemplary embodiment, the processor is coupled to the circuitboard in a flip-.chip fashion. In another exemplary embodiment, theprocessor is coupled to the circuit board with bonded wire. In anotherexemplary embodiment, the bonded wire has a low loop height. In anotherexemplary embodiment, the processor is encapsulated against the printedcircuit board. In another exemplary embodiment, the battery includes twoor more batteries. In another exemplary embodiment, the battery is notrechargeable. In another exemplary embodiment, the battery isrechargeable. In another exemplary embodiment, the battery includes arechargeable battery and a non-rechargeable battery. In anotherexemplary embodiment, the battery is part of a power supply including apower filter.

In an embodiment, set forth by way of example rather than limitation, amethod for making an electronic card includes making a flexible printedcircuit board, attaching at least one processor to the printed circuitboard, coupling at least one battery to the printed circuit board,encapsulating at least the one processor, making a top cover and abottom cover; and sandwiching the printed circuit board, the processorand the battery between the top cover and the bottom cover.

In an embodiment, set forth by way of example rather than limitation, anenhanced Smart Card includes a card body provided with an externallyaccessible card interface including a signal port, a power port, and aground port, a secure processor disposed at least partially within thecard body and coupled to the signal port, the power port, and the groundport, a general processor disposed at least partially within the cardbody, the general processor being coupled to a power source disposed atleast partially within the card body and being operative to providepower to and communicate with the secure processor when the secureprocessor is being used in an enhanced Smart Card mode; and anon-contact communications port coupled to at least one of the secureprocessor and the general processor.

In an embodiment, set forth by way of example rather than limitation, asecure transaction card includes a card body, a secure processordisposed at least partially within the card body, a general processordisposed at least partially within the card body, a power sourcedisposed at least partially within the card body; and a non-contactcommunications port coupled to at least one of the secure processor andthe general processor.

In an embodiment, set forth by way of example rather than limitation, aswipe emulating broadcaster system includes a coil having an elongatedcore material and a winding having a plurality of turns around the corematerial; and a signal generator having a broadcaster driver signalcoupled to the coil such that the coil provides a dynamic magnetic fieldwhich emulates the swiping of a magnetic stripe transaction card past aread head of a card reader.

In an exemplary embodiment, the signal generator includes a processorhaving a digital output and a signal processing circuit which convertsthe digital output to the broadcaster driver signal. In anotherexemplary embodiment, the signal generator is a digital signalgenerator. In another exemplary embodiment, the coil is one of aplurality of coils. In another exemplary embodiment, at least one of theplurality of coils is a track coil. In another exemplary embodiment, atleast one of the plurality of coils is a cancellation coil. In anotherexemplary embodiment, the coil includes a wire wound around the core. Inanother exemplary embodiment, the coil includes a wire formed around thecore by a process including at least the deposition of conductivematerial and the etching of the conductive material.

In an embodiment, set forth by way of example rather than limitation, amethod for creating a low-loop bonding for thin profile applicationsincludes attaching a first surface of a fabricated semiconductor die toa first surface of a substrate having a plurality of substrate contactpads, such that a second surface of the die which opposes the firstsurface is exposed to provide access to a plurality of die contact pads,wire bonding a first end of a wire to a substrate contact pad; and wirebonding a second end of the wire to a die contact pad, such that theloop height of the wire is no greater that 5 mils above the secondsurface of the die, and no greater than 20 mils above the first surfaceof the substrate.

These and other embodiments, aspects and advantages will become apparentto those of skill in the art upon a reading of the followingdescriptions and a study of the various figures of the drawing.

BRIEF DESCRIPTION OF THE DRAWINGS

Several exemplary embodiments will now be described with reference tothe drawings, wherein like components are provided with like referencenumerals. The exemplary embodiments are intended to illustrate, but notto limit. The drawings include the following figures:

FIG. 1 is a top plan view of an exemplary electronic card;

FIG. 2 is a bottom plan view of the exemplary electronic card of FIG. 1;

FIG. 3 is a block diagram of an exemplary circuit for the electroniccard illustrated in FIGS. 1 and 2;

FIG. 4 is a block diagram of an exemplary secure processor of FIG. 3;

FIG. 5 and FIG. 5A are schematic diagrams of an exemplary embodiment ofa general processor of FIG. 3 and exemplary associated 1/0 devices andsubsystems;

FIG. 6 is a top plan view of an exemplary printed circuit (PC) board ofan exemplary electronic card;

FIG. 7 is a bottom plan view of the PC board of FIG. 6;

FIG. 8 is an exploded, partially cross-sectional view of an exemplaryelectronic card;

FIG. 9 is partially cross-sectional view of the electronic card of FIG.8 after it has been assembled;

FIG. 10 illustrates an exemplary wire bond connection between aprocessor and a PC board;

FIG. 11 illustrates an exemplary broadcaster slot with alignment marks;

FIG. 12 is a top plan view of a broadcaster before it is inserted intothe broadcaster slot illustrated in FIG. 11;

FIG. 13 illustrates an exemplary broadcaster coil;

FIGS. 14-16 illustrate exemplary winding patterns of the broadcastercoil of FIG. 13;

FIG. 17 is a block diagram of an alternate embodiment, set forth by wayof example and not limitation, of a broadcaster assembly;

FIG. 18 is a flow-diagram of a manufacturing process, set forth by wayof example and not limitation, for producing electronic cards;

FIG. 19 is a flow-diagram illustrating an exemplary Phase Imanufacturing process 168 of FIG. 18 in greater detail;

FIG. 20 is a flow-diagram illustrating an exemplary programming process180 of FIG. 19 in greater detail;

FIG. 21 is a flow-diagram illustrating an exemplary “load softwareand/or data into chip” process 200 of FIG. 20 in greater detail;

FIG. 22 is a flow-diagram illustrating an exemplary Phase IImanufacturing process 170 of FIG. 18 in greater detail; and

FIG. 23 is a flow-diagram illustrating an exemplary Phase IIImanufacturing process 172 of FIG. 18 in greater detail.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

As noted, there are a great many applications for electronic cards. Oneof many applications is to provide security for financial transactions,e.g. financial transactions using transactions cards such as creditcards and debit cards. In the following exemplary embodiments,particular emphasis will be placed on transaction card security, withthe understanding that other uses for enhanced electronic security, suchas, but not limited to, access control, are within the true spirit andscope of the invention.

FIG. 1 is an embodiment of an electronic card 10, set forth by way ofexample but not limitation, which includes a card body 11. The card bodymay be made from a thermoplastic material, such as polyvinylchloride(PVC) in exemplary embodiments, but other materials with sufficientflexibility and durability are also suitable. For example, otherthermoplastics can be used, as well as thin metal (e.g. stainlesssteel). Of course, if a conductive material is used for the card body11, adequate electrical insulation from the electrical and/or electroniccomponents must be maintained. Still other materials, such as resins,carbon fibers, organic and non-organic materials, etc. are also suitablefor various alternate embodiments. In summary, card body 11 can be madefrom any suitable material which is strong enough and durable enough tobe used as a transaction card.

The exemplary electronic card 10 has a front surface 12 which isprovided with an electrical interface 16. This is one non-limitingexample of a communication port for the electronic card 10. In otherembodiments, the interface 16 may be eliminated, or additionalcommunication ports may be provided.

The illustrated electrical interface 16 includes a number of contactpads which, in this example, are formed in a configuration which iscompliant with the International Standards Organization “Smart Card”standard ISO 7816, incorporated herein by reference. In this exemplaryembodiment, the electronic card is usable as a legacy mode Smart Card.Also shown on the front surface 12 is an institution identifier 18, aninstitution number 20, an account number 22, and a client name 24. Theaccount number is preferably embossed on the electronic card 10 toprovide raised numerals for credit card imprint machines.

FIG. 2 illustrates a back surface 14 of the exemplary electronic card10. In this exemplary embodiment, a magnetic stripe emulator 26 isprovided on the back surface 14 which can be used to communicate withlegacy magnetic stripe readers of the prior art. The stripe emulator 26is therefore another non-limiting example of a communications port.

The electronic card may also have, for example, an on/off button 28, an“on” indicator 30, and an “off’ indicator 32. In this exemplaryembodiment, “on” indicator 30 may be a green LED and the ‘off’ indicator32 may be a red LED. Also seen on the exemplary card back 14 are aplurality of account interfaces 34. Each account interface 34 preferablyhas account indicator LED 36 and an account selector switch 38. Eachaccount interface 34 may also have, for example, printed informationidentifying the account and expiration date. Back surface 14 also has,in this example, instructions 40, an institution identifier 41, asignature box 42, and various other printed information.

FIG. 3 is a block diagram, presented by way of example but notlimitation, of the circuitry of exemplary electronic card 10. In thisexample, the electronic card 10 includes a secure processor 44, ageneral processor 52, and a magnetic stripe emulator 64. In thisembodiment, both the secure processor 44 and the general processor 52are coupled to the ISO 7816 interface 16 by a bus 48.

Secure processor 44 is preferably a commercially available Smart Cardchip which has various tamper resistant properties such as a securecryptographic function and tamper resistant storage 46. An exemplaryembodiment of secure processor 44, given by Germany. Similar devices aremanufactured by Hitachi, Infineon, Toshiba, ST and others. As notedpreviously, in this example secure processor 44 is connectedelectrically to the interface 16 by a bus 48.

General processor 52 is, in this example, also connected to the bus 48and, therefore, to both the secure processor 44 and the interface 16.Additionally, in this example, the general processor 52 is coupled tothe secure processor 44 by an “I/O 2” line 50. In the current exemplaryembodiment, memory 54 is coupled to the general processor 52. Generalprocessor 52 is also coupled, in this example, to power source 56,display 58, switches 60, and other 1/0 62.

In an alternate embodiment, general processor 52 communicates with thesecure processor 44 in an IS07816 compliant mode over the bus 48. Insuch an embodiment, no other connection to the secure processor isrequired (e.g. the I/O 2 line 50 connection can be omitted).

Power source 56 is preferably an electrochemical battery disposed withinthe card body 11. It may be either a non-rechargeable battery or arechargeable battery. If power source 56 is a non-rechargeable battery,it should have sufficient capacity to power the electronic card 10 forits useful life. If the power source 56 is rechargeable, the electroniccard 10 may be used indefinitely. A rechargeable battery may, forexample, be recharged through interface 16, by magnetic induction (e.g.through an induction coil or the broadcaster coils), a photovoltaic cellembedded in body 11, a piezoelectric material embedded in the electroniccard 10, another electrical connector, kinetic recharging mechanisms(e.g. magnets and coils), or other suitable mechanisms. For example, insome situations a rectification of ambient RF energy may providesufficient energy to power the electronic card 10, recharge a battery,or store supplemental charge in, for example, a capacitor.

Alternative exemplary embodiments include both a primary and a secondarybattery disposed within the card body. For example, a non-rechargeablebattery could serve as a primary battery and a rechargeable batterycould serve as a secondary battery, or vice versa. These exemplaryembodiments are given by way of example and not limitation.

Since the power source 56 is embedded in the electronic card 10, it mustbe thin. This is because the electronic card 10, for many applications,must be able to bend within certain ranges. For example, an electroniccard 10 used for transaction card applications must conform to the ISO7810 standard, which is 85.60 mm (−3370 mils) wide, 53.98 mm (−2125mils) tall, and 0.76 mm (−30 mils) thick. This is often referred to asthe “CR80” format, which is roughly 3½″ by 2″, and fits well into astandard wallet. However, other formats can also be used which arelarger, small, or differently configured than the CR80 format. By way ofnon-limiting example, an electronic card of smaller than CR80 dimensionscan be made to fit on, for example, a keychain.

The cards must be somewhat flexible so that they can be used in, forexample, insertion-type legacy card readers, so it is also preferablethat the power source be somewhat flexible if it is relatively large insurface area. However, flexibility is not a problem if the battery isrelatively small in surface area, or if several smaller batteries arecoupled together to form the power source 56. Also, it is important thatthe power source 56 can withstand heat and/or pressure if, for example,heat and/or pressure lamination techniques are used to manufacture theelectronic card 10.

Examples of suitable batteries are manufactured by Varta Microbattery ofEllwangen, Germany and Solicore of Lakeland, Fla. The batteries arepreferably electrochemical in nature, although other types of batteriesor capacitive storage devices can also be used. Suitable electrochemicalbatteries can include, by way of example but not limitation, Li-polymer,Ni-MH, lithium, lithium-ion, alkaline, etc.

General processor 52 may be, for example, a PIC 16 or PIC 18microcontroller. In an alternative embodiment, general processor 52 maycomprise an ASIC chip. In still further embodiments, general processormay be any form of logic (e.g. a state machine, analog processor, etc.)which performs the desired processing functions.

Display 58 may include, for example, LED devices as disclosedpreviously. As another non-limiting example, display 58 is may comprisean LCD display. The LCD display is preferably flexible if it is of arelatively large surface area. Switches 60 can be any form of electricalswitches or devices which provides the functionality of switches toprovide inputs or controls for the electronic card 10. The processor 52may, for example, provide software debouncing algorithms with respect tosuch switches. Other I/O 62 may comprise any number of alternative I/Osubsystems. These may include, by way of example and not limitation,audio, tactile, RF, IR, optical, keyboard, biometric I/O or other I/O.The secure processor 44 may also provide I/O by RF or IR in accordancewith ISO 7816 standards.

Also coupled to general processor 52, in this exemplary embodiment, ismagnetic stripe emulator 64, which allows the electronic card 10 to beused in a mode which emulates a magnetic stripe card of the prior art.Magnetic stripe emulator 64, in this non-limiting example, is comprisedof a buffering circuit 66, which converts digital output from generalprocessor 52 into a wave form appropriate for magnetic stripe emulation.In this exemplary embodiment, buffering circuit 66 includes a conversioncircuit which is typically implemented as an RC network. Along with thebroadcaster, the RC network forms an RCL network to condition thewaveform. RC networks and their equivalents are well known to thoseskilled in the art.

In this example, magnetic stripe emulator 64 further includes abroadcaster 68. As used herein, the term “broadcaster” refers to one ormore inductive coils which are used to “broadcast” a fluctuatingmagnetic signal which emulates the movement (“swipe”) of a transactioncard's stripe past the read head of a magnetic card reader.

Broadcaster 68 may be electrically coupled to buffering circuit 66 andreferably receives two tracks of signal which are converted bybroadcaster 68 into magnetic impulses for magnetic stripe emulation.Alternative embodiments include one, three, four or more tracks.Broadcaster 68 may include one or more electrical coils to convertelectrical signal into magnetic impulses.

Broadcaster 68 of this example may further include one or more sensors70, which are electrically coupled to general processor 52. Thesesensors are used to signal to general processor 52 that the physical actof swiping the card body 10 through a legacy card reader has commenced.Sensors 70 also communicate to general processor 52 when contact is lostwith the magnetic stripe reader 72, which receives and interpretsmagnetic flux impulses from the broadcaster.

As noted previously, the electronic card 10 of this example includes anelectrical interface 16. In this example, electrical connectors 16 areused in a manner compliant with ISO 7816 to communicate with an ISO 7816reader device 74. That is, electronic card 10, in this example, can beused as a legacy Smart Card or as a legacy magnetic stripe transactioncard.

When used in a legacy Smart Card mode, secure processor 44 is powered bybus 48 from a Smart Card reader device 74. The reader device 74 can beused to program and personalize secure processor 44 with variousinformation including, by way of example and not imitation, firmwarecode, account numbers, cryptographic keys, PIN numbers, etc. Thisinformation, once loaded into secure processor 44, prepares secureprocessor 44 for an operational mode which no longer requires the use ofreader device 74.

In this “independent” mode, secure processor 44 communicates withgeneral processor 52 and provides services such as cryptographicfunctions and the dynamic generation of authentication information whichis used to communicate via general processor 52 and magnetic stripeemulator 64 with magnetic stripe reader 72. Also in this example, theauthentication code may be used only once for a single transaction.Subsequent transactions require new authentication codes to begenerated. Secure processor 44 can also send account information and/orDACs via RF and IR.

In an alternative embodiment, the card body 10 continues to be used withreader device 74 and also with magnetic stripe reader device 72. In thisalternate embodiment, the card detects the mode in which it is beingused and automatically switches the usage of bus 48 appropriately forthe detected mode of operation. This is achieved in optional busarbitrator 76. In other embodiments, there is no bus arbitrator 76.Optional bus arbitrator 76 can detect when it is being used with readerdevice 74 because power is provided by reader device 74 via electricalconnectors 16 to bus 48. Similarly, optional bus arbitrator 76 candetect that power is being provided by general processor 52 and switchto the corresponding mode of operation, which services general processor52 and the various I/O devices connected thereto. In yet anotheralternative embodiment, optional bus arbitrator 76 allows for thedynamic communication of both general processor 52 and secure processor44 with each other respectively, and with reader device 74. Thisrequires bus arbitration logic which is well known to those skilled inthe art. In a further alternative embodiment, general processor 52 isinterposed between secure processor 44 and electrical connectors 16. Inthis alternative embodiment, general processor 52 acts as a “go-between”or a “front end” for secure processor 44.

With continuing reference to FIG. 3, an exemplary non-contactcommunications port 77 may be included as an alternative to or inaddition to exemplary communication ports 16 and 64. That is,non-contact communications port 77 may be provided to allowcommunications without physical contact with a reader.

Non-contact communications port 77 can be a radio frequencycommunications port, IR communications port, or any other form ofcommunications which does not require physical contact. Of course otherembodiments may be provided with contact communications ports, such ascommunications port 16 and broadcaster. That is, these embodiments aredescribed by way of example and not limitation.

A standard for radio frequency (“RF”) communication for Smart Cardcommunications is ISO/IEC 14443, dated 2001, incorporated herein byreference. It includes an antenna and RF driver characteristics anddefines two types of contactless cards (“A” and “B”), allows forcommunications at distances up to 10 cm. There have been proposals forISO 14443 types C, D, E and F that have yet to complete the standardsprocess. An alternative standard for contactless smart cards is ISO15693, which allows communications at distances up to 50 cm.

FIG. 4 illustrates exemplary secure processor 44 of FIG. 3 in greaterdetail. Secure processor 44 of this example is an ISO 7816 compliantmicrocontroller comprising power switch 78, security sensors 80, resetgenerator 82, clock input filter 84, CPU 86, interrupt system 88, andinternal bus 90. Coupled to internal bus 90 is tamper resistant storage46, which may be comprised of RAM, EEPROM, etc. Also coupled to bus 90is co-processor 92, which handles encryption and decryption. In thisexemplary embodiment, the co-processor 92 performs TRIPLE-DES encryptionand decryption. Also coupled to bus 90 are timers 94 and ROM 96, whichis used, for example, for storing firmware for secure processor 44, UART98, which is used for serial communications. Also connected to bus 90 isI/O subsystem 100 and random number generator 102.

Secure processors 44 as described above are commercially available froma variety of sources including Philips, Hitachi, Infineon, Toshiba, ST,and others. A suitable secure processor 44 for use in the disclosedexemplary embodiment is the model P8WE6032 processor made by Philips ofGermany. In certain alternate embodiments, the secure processor 44 canbe replaced by a general processor.

FIG. 5 is a schematic of general processor 52 coupled its associated I/Odevices subsystems set forth by way of example and not limitation. Asnoted above, general processor 52 may be a PIC 16 or PIC 18microcontroller. For example, the general processor 52 can be aMicrochip LF 77 PIC 16 or Microchip LF 4530 PIC 18. Alternatives areprovided bye Texas Instruments, Atmel, and others. Other generalprocessors may also be used and, in certain alternate embodiments, thegeneral processor 52 can also be a secure processor.

In this exemplary embodiment, two electrochemical batteries 121A and 121B are shown. As noted, batteries of suitable chemistries and dimensionsare commercially available from, for example, Varta Microbattery GmbH.In this example, non-rechargeable battery 121 A serves as a primarybattery, while rechargeable battery 121B serves as a secondary battery.Battery 121B may be coupled to a recharging apparatus 122, which isshown here as an RF power source. Of course, the induced current isrectified prior to being applied to the battery 121 B. As noted above,there are a number of other suitable recharging apparatus that will beapparent to those skilled in the art.

Preferably, capacitor assembly 124 is provided in order to provide asmooth source of power without peaks or power dropouts. The capacitorassembly can include one or more capacitors, as illustrated. Capacitorassembly 124 may also be used to smooth the power from a rectifier whichmay be present in recharging apparatus 122. Battery 121A, battery 121B,recharging apparatus 122, and capacitor assembly 124 are all part ofpower source 56 of FIG. 3 in this exemplary embodiment.

One or more capacitors, such as the capacitor assembly 124, can also beused as a charge storage device. That is, -a “super capacitor” having asufficiently high capacitance can significantly supplement the currentprovided by the electrochemical battery in certain embodiments. Forexample, a capacitance range of about 1 uF+−10% @ 6.3 v is suitable insome embodiments to serve as a super capacitor. This relatively largecapacitor assembly 124 can be conveniently accomplished, for example, byusing ten 0.1 uF capacitors connected parallel in order to reduce thesize and height of the capacitor.

With continuing reference to FIG. 5, a temporary port 125 may providedto assist in the manufacturing process. Optionally, it is provided on apart of a printed circuit board that is removed once the manufacturingoperations requiring its use are completed. Temporary port 125 may beused, for example, to load data and programs into general processor 52and associated EEPROM as well as secure processor 44 and its associatedEEPROM. Components 123 may be provided to ensure that the electricalconnections to general processor 52 have appropriate electricalcharacteristics, are free of power spikes or power dropouts, etc.

General processor 52 is, in the present example, connected to a numberof switches including on/off switch 28 and account selector switches 38.Also connected to general processor 52 are a number of light emittingdiodes (“LEDs”) including a “power-on” indicator 30, a “power-off’indicator 32, and “account-on” indicators 36. These various LED's andswitches comprise a human/computer interface with the electronic card10. Of course, there are many alternates or additions to the electroniccard 10 and to devices communicating with the electronic card 10 whichare also helpful human/computer interfaces. By way of further examplebut not limitation, the electronic card 10 may include an LCD screen(with or without a touch panel), audio I/O, voice recognition, andvarious other alternatives that will be apparent to those of skill inthe art.

In this example, an RC buffering circuit 66 is coupled to generalprocessor 52 and converts (in conjunction with the broadcaster 68 and/orother components) square wave type signals emanating from generalprocessor 52 into wave forms which emulate the magnetic signals(“dynamic magnetic flux”) provided by a magnetic stripe transaction cardpassing through a reader. Wave forms are communicated electrically tobroadcaster 68 which converts the electrical signals into a dynamicmagnetic field which simulates the passing of a card with a magneticstripe through a magnetic stripe reader. The electronic card 10 may bemoving or stationary, and the varying magnetic field broadcasted by thebroadcaster 68 will emulate the varying magnetic field created by amagnetic stripe of a conventional transaction card moving past a readhead. The magnetic signal created by the broadcaster therefore tends tobe substantially uniform along its length.

Sensors 70 provide signals to general processor 52 to indicate that thecard has made physical contact with the reader. Sensors 70 may takevarious forms including physical switches, pressure sensors or otheralternatives which will be apparent to those of skill in the art.Broadcaster 68 achieves its waveform subsequent to the activation of oneor more sensors 70.

Four exemplary coils 128, 130, 132 and 134 are shown in FIG. 5. Moreparticularly, in this exemplary embodiment, the broadcaster 68 includesa “track one” coil 128, a “track two” coil 130, a “track onecancellation” coil 132 and a “track two cancellation” coil 134. In thisexemplary embodiment, the track one coil 128 and the track two coil 130are preferably positioned on the card for optimal contact with magneticread head of magnetic stripe reader device 72 (see FIG. 3). That is, thetrack one coil 128 is preferably positioned equidistant from andinterposed between the track two coil 130 and the track two cancellationcoil 134.

Since the magnetic field from the track two coil 130 may interfere withthe magnetic field of the track one coil 128, the track two cancellationcoil 134 is provided to “cancel” this “cross talk” effect. By “cancel”it is meant that the cross talk is at least significantly reduced. Themagnetic field generated by the track two cancellation coil 134 is theinverse of that of the track two coil 130 thus reduces the effect of thetrack two coil 130 magnetic field of track one coil 128. Similarly, thetrack two coil 130 is, in this example, equidistant from and interposedbetween track one coil 128 and track one cancellation coil 132.Reduction of the cross talk effect of the track one coil 128 is providedby the track one cancellation coil 132. The broadcaster coils 128-134and sensors 70 comprise broadcaster 68 in this exemplary embodiment.

In an alternative embodiment, cancellation coils 134 and 132 are notprovided, but rather, the electrical signals provided to these coils aremodified in such a manner that the interfering magnetic fields provideappropriate magnetic input to magnetic stripe reader device 72. This maybe achieved through the use of an ASIC, digital signal processor (DSP),or by other instrumentalities. Optionally, the positions of these twobroadcaster coils 126 may be offset from their positions in thepreviously described embodiment to provide the appropriate effect.Alternatively, cancellation can be achieved through mechanical shieldingwith nano materials that could shield the broadcast data between the twoadjacent coils. These various exemplary embodiments are given by way ofexample and not limitation. Alternatives to the embodiments shown inFIG. 5 will be apparent to those of skill in the art.

Furthermore, a digitally synthesized signal may be applied to thebroadcaster 68 which could reduce or eliminate the need for signalconditioning circuitry such as the RC circuit and/or for the need forcancellation coils. The digitally synthesized signal may beaccomplished, for example, in the general processor 52, in a DSP, or inother circuitry, as will be appreciated by those skilled in the art.

FIG. 6 is a top plan view of an exemplary printed circuit (PC) board136. Preferably, PC board 136 is a “flex” board so that the electroniccard 10 is compliant with the aforementioned ISO 7810 standard forflexibility. PC board 136 is provided with conductive traces, such astraces 137, and supports various electronic components such asprocessors 44 and 52. The PC board 36 also provides space for thebroadcaster 66 and one or more electrochemical batteries 121. Thisexemplary embodiment is provided by way of example and not limitation.

As noted previously, the thickness (or height, when the card is taken incross-section) for an electronic card 10 made to ISO 7810 standarddimensions is only about 30 mils. Therefore, it is important that thevarious internal components of the electronic card 10 be thin, flat, andsubstantially coplanar. By way of example and not limitation, thedigital processor 52 should be thin and flat, with a first substantiallyplanar surface and a substantially opposing second substantially planarsurface. It should also define a first maximum surface area. By way offurther example but not limitation, the electrochemical battery 121should have a first substantially planar surface and as substantiallyopposing second substantially planar surface, and should define a secondmaximum surface area. A theoretical plane through the center of thedigital processor 52 should be substantially coplanar with a theoreticalplane through the center of battery 121 so that the desired thinness ofthe electronic card 10 may be achieved.

The word “substantially” is used herein to mean approximately. Forexample, a substantially planar surface is at least approximately flat.Minor imperfections, steps, bumps or curvatures to the major surfacesare still considered to be “substantially planar”, and do not have to beapplied to the entire surface. “Substantially opposing surfaces” aregenerally facing each other and are at least approximately parallel.

By “substantially co-planar” it is meant that theoretical center planesare at least close together and approximately parallel. Of course, thecenter plane of processor 52 could be above or below the center plane ofbattery 121 and the two components could still be considered“substantially co-planar” as long as the desired thinness of theelectronic card 10 can be maintained. For example, the processor 52 andbattery 121 can still be considered coplanar as long as there is anyplane generally parallel to the major surfaces of these components whichintersects both of the components. If, for example, the battery 121 is16 mils high and the processor 52 is 10 mils high in cross section, thecenter planes of the components could be separated by as much as 8 milsand they would still be considered to be “substantially co-planar.”

FIG. 7 is a bottom plan view of exemplary PC board 136. PC board 136 isagain provided with a number of traces 137, as well as space for thebroadcaster 66 and batteries 121. Also shown is interface 16 which isgeometrically positioned to coincide with the position of secureprocessor 44. These exemplary embodiments are given by way of exampleand not limitation.

PC board 136 may be, for example, a multilayer PC board. For example,the top of the PC board 136 as seen in FIG. 6 may be a first or toplayer, and the bottom of the PC board as seen in FIG. 7 may be a secondor bottom layer. The two layers may be adhered together, or there may beother intermediate layers. Each layer includes an insulating substratemade, for example, from a PVC material, and may include conductivetraces, pads, and other structures. As noted above, it is desired thatthe PC board be flexible to help the electronic card meet the ISO 7810standards for flexibility.

FIG. 8 is an exploded, partially cross-sectional view of electronic card10. A bottom cover 140 has, in this example, a maximum height of about25 mils. It should be noted that the bottom cover 140 is contoured onits upper surface 141 to fit the contours of the PC board, battery,and/or components attached to the bottom of the PC board or the like.The PC board 136, in this example, has a height of about 6 mils, whichmakes it thin and flexible. General processor 52 is shown mounted on PCboard 136 and encapsulated by material 144 (e.g. an epoxy encapsulant).Also shown is secure processor 44 similarly encapsulated by material144. Also mounted on PC board 136 are the various components of battery121.

With continuing reference to FIG. 8, an exemplary embodiment of battery121 has a height of 16 mils. Also shown in FIG. 8 is broadcaster 68which coincides laterally with battery 121 in this embodiment and thusoccupies the overlapping space in this cross-section diagram.Broadcaster 68 as shown in this exemplary embodiment has a height ofabout 20 mils. Also mounted PC board 136 are account selector switches38, “on” indicator 30, and ‘off’ indicator 32. Account indicators 34coincide laterally with on indicator 30 and, therefore, occupyoverlapping space in this cross-section view. Cover 146 is shown with aheight of about 5 mils. When assembled, the electric card 30 istherefore approximately 30 mils, which is ISO 7810 compliant. Theexemplary embodiments shown in FIG. 8 are given by way of example andnot limitation, and dimensions can vary, as will be appreciated by thoseof skill in the art.

FIG. 9 is a partial cross-sectional view of electronic card 10 after ithas been assembled. The various exemplary components are shown with thevarious layers in compact form as with a finished electronic card 10.Covers 140 and 146 enclose and protect the electrical and electroniccircuitry within the card. Preferably, an epoxy adhesive 147 is used toencapsulate the electrical and electronic components (other than thosewhich must be exposed) and to hold the assembly together. The covers 140and 146 may be composed of polyester or FR4 or various other materials,as described previously. The final assembly is a hermetically sealedelectronic card 10 compliant with loop height of preferably less than 5mils, more preferably less than 4 mils, and most preferably about 2 milsor less, 7-10 grams of pull-strength on the wire can be achieved.

FIG. 10 is a detailed elevational view of a wire bond connecting aprocessor die 56 to PC board 136. This exemplary embodiment allows for alow profile as is advantageous due to the severe size constraintsimposed by the thickness standards for electronic card 10. Die 56 ismounted on PC board 136 using an adhesive or other bonding material 158which forms the physical connection between processor 56 and printedcircuit board 136. Wire 148 electrically connects a bonding pad 160 ofprocessor 56 with a bonding pad 160 of PC board 136.

It is very important to have a low loop-height “d” for the wire 148.Conventional wire bonding techniques bond a wire first to the processorand then to the substrate, resulting in a very high loop height. A highloop height is unacceptable for electronic cards, which must be madevery thin. Also, a high loop height creates a reliability problem due tobending and torsional stresses to which the electronic card may besubjected.

In accordance with an aspect of this exemplary embodiment, a reversebonding process is used where the wire 148 is first attached to the PCboard 136 and then attached to the processor 56. This results in a shortloop height “d”, which is preferably less than 5 mils and is morepreferably 2-4 mils or less. As a result, the total height of the loopis equal to d+D, where “D” is the height of the top surface of theprocessor 56 above the top surface of the PC board 136. In the presentexample, the processor die 56 is about 9-10 mils, and the adhesive isabout 1-2 mils, resulting in a height D of about 1012 mils. If the loopheight d is in the range of 2-4 mils, the total height of the loop abovethe top surface of the PC board is in the range of 12-16 mils, in thisexample.

The low loop height also helps with the aforementioned bending andtorsional stresses to which the electronic card may be subjected. Forexample, with a embodiments. As another non-limiting example, certainembodiments have only a single track coil.

In another embodiment, the processor 56 is attached to the PC board in aflip-chip fashion. Techniques for attaching dies to substrates in aflip-chip fashion are well known to those skilled in the art.

FIG. 11 shows a receptacle 160 in PC board 136 for broadcaster 68.Broadcaster 68, in this example, is inserted into receptacle 160 at alate stage of the manufacturing process and is then electricallyconnected to contact pads 161. When mounting broadcaster 68 insidereceptacle 160 it is important to achieve a high degree of geometricalignment so that broadcaster 68 can be properly aligned with the readhead of a card reader. Guides 162, visible through holes in broadcaster68, are provided to aid in this physical alignment process. Wheninserting broadcaster 68 into slot 160, it is preferable that thealignment guides 162 closely align with the holes in broadcaster 68.Optical microscopes may be used to help with this process. Of course,these exemplary embodiments are given by way of example and notlimitation, and other alignment techniques are suitable.

FIG. 12 shows broadcaster 68 in its final form before it is insertedinto slot 160. Track one coil 128 and track two coil 130 are aligned tomake optimal contact with magnetic stripe reader device 72. Track onecancellation coil 132 and track two cancellation coil 134 are positionedappropriately to perform their function of cancellation cross talkbetween track one coil 128 and track two coil 130. Sensors 70 are shownhere as trip switches which detect the event of electronic card 10 beingpassed through magnetic stripe reader device 72.

These exemplary embodiments are given by way of example and notlimitation. Alternatives for the composition and configuration ofbroadcaster 68 will be apparent to those of skill in the art. Forexample, alternative embodiments which do not include cancellation coils132 and 134 are contemplated as are other alternative the dimensions setforth by ISO 7810 standard. Importantly, the thickness T should not bemuch greater than about 30 mils so that it works properly with legacycard readers. Other embodiments provide electronic cards of differentsizes and formats.

FIG. 13 shows an exemplary broadcaster coil 128 in greater detail. Theother broadcaster coils 130-134 can be of similar or identical design,or can be of different designs in alternated embodiments. In thisembodiment, a wire 164 is wound around a ferromagnetic core 166. Thewire 164 can be made from, for example, copper or aluminum, alloysthereof, etc. The wire 164 may be insulated, or the core 166 may beinsulating or insulated to prevent the windings of wire 164 fromshorting out.

In an exemplary embodiment, broadcaster core 166 is composed of amaterial called “HyMu 80”, with favorable magnetic properties, which iscommercially available from National Electronic Alloys Inc. A singlestrand of copper wire 164 is wound around broadcaster core 166 atregularly spaced intervals, e.g. with a constant pitch “P.” In anexemplary embodiment, the pitch of the wire coil is about 4.8 mils. Thisexemplary embodiment is given by way of example and not limitation, asother pitches and variable pitches are suitable in certain embodiments.

FIG. 14 shows an exemplary spacing of wire 164 coiled around core 166.FIG. 14 shows a regular spacing between each coil wind of copper wire164 with a constant pitch. This is a preferred embodiment although otherembodiments may be used.

FIG. 15 shows a somewhat irregular winding. Even though some errors maybe introduced during the winding process, it is possible to still usethe resulting broadcaster coils despite some error in the windingprocess as shown in FIG. 15. The pitch may also be varied to modify themagnetic flux pattern. However, if too much error is introduced duringthe manufacture of broadcaster coil 126, then the coil may beinoperative. It has been found that if the variation in pitch is toogreat, errors may be introduced into the dynamic magnetic field producedby the coils, resulting in improper operation of the emulator embodimentof electronic card 10.

FIG. 16 depicts an example of too much error in the positions of thecoil windings of broadcaster coil 126. It is important to note that manyvariables exist which affect the threshold of operability and that thebroadcaster coil 126 should be tested in order to ensure proper quality.It may not be necessary to test each and every coil but a sampling ofbroadcaster coils 126 should be tested to ensure that a manufacturedbatch of coils is operative. FIGS. 14 through 16 are given as examplesof alternative coil windings and should not be construed in a limitingway.

The aforementioned embodiments for the coils teach winding a wire arounda ferromagnetic core. In alternate embodiments, the coils can be made inother fashions. For example, coils can be made with various deposition,patterning, and etching techniques. As will be appreciated by thoseskilled in the art, a ferromagnetic core can be coated with aninsulating film, and then coated with a conductive (usually metal) layerof, for example, copper or aluminum or alloys thereof by, by way ofexample and not limitation, sputtering and nano-sputtering techniques. Amask can then be applied to the conductive layer to define the coil, andportions of the conductive layer can be etched away to provide thewindings. The mask can be made photolithographically, by spraying with,for example, ink jet technologies, or by other techniques well known tothose skilled in the art. The etching can be accomplished with an acidwhich attacks the conductive layer but which is stopped by theinsulating film. This method of coil production may have advantages inhigh-volume manufacturing situations.

For example, a ferromagnetic coil can be prepared and cleaned. Aninsulating and/or etch stop layer can be applied by a variety oftechniques including, but not limited to, dipping, spraying, coating,sputtering, CVD, etc. A metal or other conductive layer can then beapplied, again by a variety of techniques including, but not limited to,dipping, spraying, coating, sputtering, CVD, etc. A mask layer can beapplied as a photolithographic material, by painting, printing,spraying, stenciling, etc., as will be appreciated by those skilled inthe art. The etching of the conductive layer through the mask layer canbe accomplished by a variety of techniques including, but not limitedto, dipping, spraying, immersing, and plasma etching techniques. Themask layer is then removed, and a pacifying layer may be applied toprotect the coil assembly.

As will be appreciated by those skilled in the art, there are other waysto produce the effects of the “coils” of the broadcaster. For example,magnetic material can be lithographically sputtered to create thebroadcaster coil effect. There are a variety of mass productiontechniques such as those noted above, by example, which will be apparentto those skilled in the art of semiconductor and micro-machinemanufacturing.

FIG. 17 shows an alternate embodiment which allows a broadcaster 68′ tooperate without cancellation coils. Track one coil 128 and track twocoil 130 are shown within broadcaster 68′. Buffering circuit 66′, inthis embodiment, is designed to perform cancellation prior to emittingthe wave forms to track one coil 128 and track two coil 130. The waveforms are adjusted in such a way that the overall cross talk effectbetween track one coil 128 and track two coil 130 produces the desiredmagnetic flux. This alternate embodiment cancels cross talk bycorrecting the wave forms so that the appropriate signals to be receivedby magnetic stripe reader device 72. In this embodiment, bufferingcircuit 66′ may be an ASIC, a DSP, or other appropriate components forsignal processing. Sensors 70 are present in this embodiment ofbroadcaster 68.

In one exemplary alternative embodiment, general processor 52 iscomprised of an ASIC chip, which optionally includes one or more othercomponents of exemplary transaction card 10. For example, the ASICassumes the role of buffering circuit 66 as well as the duties of othercomponents associated with general processor 52 in the previouslydisclosed embodiments. Further, the ASIC embodiment could, for example,produce adjusted waveforms for track 1 coil 128 and track 2 coil 130 sothat it is not necessary to include track 1 cancellation coil 132 ortrack 2 cancellation coil 134. For example, the ASIC could apply acorrection to the amplitude and phase of the waveform of track 1 coil128 because of the anticipated effect of magnetic flux interference fromtrack 2 coil 130. Likewise, a correction would be applied to thewaveform for track 2 coil 130, to cancel the effect of track 1 coil 128.

Note that the corrections applied to the waveform may vary with timebecause the interference from the opposing broadcaster coil 126 may varywith time (at different parts of the waveform). Thus, the correctionconstitutes two new waveforms for the two respective broadcaster coils128 and 130 of this exemplary embodiment. Note also that the correctionwaveform for a given broadcaster coil 128 will itself cause interferencewith the opposing broadcaster coil 130, and vice versa.

In some exemplary embodiments, an additional correction is applied tocompensate for the effect of the previous correction. In still furtherexemplary embodiments, one or more additional corrections are applieduntil the diminishing effect of interference becomes negligible as theseries converges. Note that these corrections are performed in acomputational manner before the corresponding portions of the waveformsreach the broadcaster 68.

In a further alternative embodiment, the crosstalk cancellation isperformed in a linear RC circuit which outputs corrected waveforms totrack 1 coil 128 and track 2 coil 130. This RC circuit could be disposedwithin the exemplary ASIC described above or external to the ASIC.Again, this embodiment is provided by way of example and not limitation.

FIG. 18 shows a manufacturing process for producing electronic card 10.In an operation 168, a first phase of the manufacturing process isperformed. During this process, the various components are mounted andprogrammed. An operation 170 continues this process of manufacture in asecond phase by installing additional components such as the broadcaster68 and battery 121. Finally, the manufacturing process is completed in athird phase by an operation 172 which performs an epoxy fill.

FIG. 19 shows the first phase 168 of manufacturing in greater detail. Inan operation 174 technology components are mounted to the surface oftheir associated printed circuits. In an operation 176, the die isattached. Previously described wiring bonding process may be performedin an operation 178 to electrically connect the die to the printedcircuit board. Then, in a programming step 180, secure processor 44 andgeneral processor 52 are programmed with various data and programsnecessary for the operation of electronic card 10. An operation 182performs a functional test prior to encapsulation to ensure that theprogramming was successfully loaded and the various electricalconnections were secure.

In a decision step 184, it is determined whether or not the functionaltest has been passed. If it is not, then, control passes to an operation186, wherein the problem which causes the failure is determined. Then,in an operation 188, the problem is reworked in an operation 188 and,then, control passes again to programming step 180. If, on the otherhand, in decision step 184 it is determined that the functional test ispassed, then, an encapsulation process is performed in step 190. Onceencapsulation is completed, the first phase of manufacture is completed.The process shown here is exemplary and as will be apparent to those ofskill in the art, many alternative embodiments may be used. That is,this process is described by way of example and not limitation.

FIG. 20 describes the programming operation 180 in greater detail. Theoperation is commenced in an operation 192 and continues in an operation194 wherein electronic card 10 is attached to a test rig. A test programis launched on the test rig in an operation 196. The purpose of thistest program is to load data and programs on to the technologycomponents of electronic card 10, such as secure processor 44 andgeneral processor 52. In an operation 198, the test program isinitialized. This may involve loading various parameters and settingsfrom a file or obtaining them from a user. An operation 200 performs theactual loading of the software and data on to the technology componentsaforementioned. Then, in an operation 202, the process is concluded.This process is shown in terms of its exemplary embodiments and shouldnot be construed in a limiting way.

FIG. 21 shows operation 200 of FIG. 20 in greater detail. This operationis used to load software and data into the technology components ofelectronic card 10. The operation is commenced with an operation 204 andcontinues with an operation 206, which opens a file containing the codeand data to be loaded. Then, in an operation 208, an address range isobtained for a specific block of data. This address range is used whencommunicating with secure processor 44 and general processor 52 tospecifically identify the locations in EEPROM where this particularblock of data should be stored. As is understood by those skilled in theart, the data could comprise programs. In an operation 210, a message isformatted which contains a block of data and the address information.Then, in an operation 212, the message is sent. An operation 214receives and records status information. A decision operation 216determines whether or not the last block has been sent or if, for otherreasons, the process should be terminated, such as in the case of anerror. If it is determined that the loading operation should continue,control passes back to operation 208. If in operation 216 it isdetermined that the process should terminate, control passes to anoperation 218 which reports the status of the loading operation and,then, the process is concluded in an operation 220.

FIG. 22 shows the second phase of manufacturing operation 170 in greaterdetail. The process starts in an operation 222 and continues in anoperation 224, which performs a functional test on the device. In adecision operation 226, it is determined whether or not the functionaltest has been passed and, if it has not, control passes to an operation228 where corrective action is taken. Control then passes to back tooperation 224. If, in operation 226, it is determined that thefunctional test has been passed, control passes to operation 228 whereinthe dome switch is taped and the via switch is soldered. Then, in anoperation 230, broadcaster 68 is installed in the slot provided for itwithin electronic card 10. Then, in an operation 232, battery 121 isinstalled. In an operation 234, the assembly is inspected and tested. Ifit is determined in operation 234 that the assembly is not functioningproperly, control passes to an operation 236 where corrective action istaken. Control then passes back to operation 234. If it is determined inoperation 234 that the assembly is working correctly, control passes toan operation 236 which ends the process. These exemplary embodiments aregiven by way of example and not limitation.

FIG. 23 describes the third phase 172 of the manufacturing process. Itbegins with an operation 238 and continues with an operation 240 whereinthe assembly of electronic card 10 is filled with epoxy, laminated andtested. Then, in an operation 242, various measurements of the assemblyare taken and, in a decision step 244, it is determined whether or notthe assembly needs to be reworked. If it is determined in operation 244that the assembly needs to be reworked, corrective action is taken inoperation 246, and control is passed back to operation 244. If it isdetermined in operation 244 that the assembly does not requirereworking, control is passed to operation 246, which concludes theprocess.

The above described exemplary manufacturing process, and variantsthereof, may be used to a variety of embodiments of transaction card 10.For example, a variant of the manufacturing process usesphotolithography techniques well known to those skilled in the art toproduce broadcaster 68. This method avoids the use of coil winding,which may save time and money when manufacturing transaction card 10 inlarge numbers.

Another variant of the process would use the “flip chip” method wellknown to those skilled in the art to mount one or more technologycomponents such as general processor 52. Optionally, this variant wouldinclude the use of an ASIC as general processor 52. This embodiment isgiven by way of example and not limitation.

An alternative exemplary embodiment of non-contact communication port 77of FIG. 3 comprises a WiFi device or equivalent, which allows thisembodiment of transaction card 10 to communicate with the internetindependently of a card reader. By non-limiting example, the WiFi 802.1lb and 802.1 lg protocols may be used. The card could periodicallydownload and upload information, and also perform transactions inresponse to user input. Information from the internet could be displayedto the user and interaction with the World Wide Web would also bepossible in certain embodiments. This embodiment would preferablyinclude an LCD display or equivalent and a touch screen or equivalent.This embodiment is given by way of example and not limitation.

Although various embodiments have been described using specific terms,and devices, such description is for illustrative purposes only. Thewords used are words of description rather than of limitation. It is tobe understood that changes and variations may be made by those ofordinary skill in the art without departing from the spirit or the scopeof the present invention, which is set forth in the following claims. Inaddition, it should be understood that aspects of various otherembodiments may be interchanged either in whole or in part. It istherefore intended that the claims be interpreted in accordance with thetrue spirit and scope of the invention without limitation or estoppel.

1. An apparatus for providing transaction specific data of a user,comprising: a secure processor conforming to International StandardsOrganization specification 7816; a non-secure processor; a power source;a general purpose input/output (“I/O”) for receiving an input from theuser to the apparatus electrically connected to the non-secureprocessor; an output port for providing an output from the apparatusthat is readable by a magnetic stripe reader; wherein the secureprocessor, the non-secure processor, the power source, the generalpurpose I/O and the output port are mounted together within saidapparatus; and wherein transaction specific data provided by a securefunction of the secure processor can be accessed without anyintervention by a secure card terminal.
 2. The apparatus of claim 1,wherein transaction specific data is provided in the output.
 3. Theapparatus of claim 2, further comprising a second general purpose I/Omounted in said apparatus electrically connected to the non-secureprocessor for providing a user output to the user from the apparatus. 4.The apparatus of claim 2, further comprising an electrical interfaceelectrically connected to the secure processor that can be accessed bythe secure card terminal.
 5. The apparatus of claim 2, furthercomprising a non-contact communications port coupled to at least one ofsaid secure processor and said non-secure processor for providing asecond output from the apparatus with transaction specific data that isnot readable by the magnetic stripe reader.
 6. The apparatus of claim 2,wherein the output port is a magnetic stripe emulator.
 7. The apparatusof claim 6, wherein the magnetic stripe emulator is comprised of abroadcaster used to broadcast a fluctuating magnetic signal whichemulates the movement of a magnetic stripe of a transaction card past aread head of a magnetic card reader.
 8. The apparatus of claim 7,further comprising at least one sensor electrically coupled to thenon-secure processor for providing a signal to the non-secure processorfor controlling timing of a broadcast of the fluctuating magnetic signalby the broadcaster.
 9. The apparatus of claim 8, wherein the broadcasteris further comprised of: a coil including an elongated core material anda winding having a plurality of turns around said core material; and asignal generator having a broadcaster driver signal coupled to said coilsuch that said coil provides a dynamic magnetic field which emulates theswiping of a magnetic stripe transaction card past a read head of themagnetic stripe reader.
 10. The apparatus of claim 9, further comprisingone or more sensors electrically coupled to the non-secure processor forproviding a signal to the non-secure processor that a physical act ofswiping the apparatus through the read head of the magnetic stripereader has commenced.
 11. The apparatus of claim 10, wherein thenon-secure processor uses the signal to control timing of an initiationof the dynamic magnetic field.
 12. The apparatus of claim 10, whereinthe dynamic magnetic field is comprised of: a first track coil magneticfield that emulates the movement of a first track of the magnetic stripeof the transaction card past the read head; and a second track coilmagnetic field that emulates the movement of a second track of themagnetic stripe of the transaction card past the read head.
 13. Theapparatus of claim 12, further comprising means for reduction ofinterference between the first track coil magnetic field and the secondtrack coil magnetic field.
 14. An apparatus for providing transactionspecific data of a user, comprising: a secure processor conforming toInternational Standards Organization specification 7816; a non-secureprocessor; a power source; a general purpose input/output (“I/O”) forreceiving an input from the user to the apparatus electrically connectedto the non-secure processor; a second general purpose I/O mounted insaid apparatus electrically connected to the non-secure processor forproviding a user output to the user from the apparatus; a broadcasterused to broadcast a fluctuating magnetic signal which emulates themovement of a magnetic stripe of a transaction card past a read head ofa magnetic card reader, said broadcaster being further comprised of: acoil including an elongated core material and a winding having aplurality of turns around said core material; and a signal generatorhaving a broadcaster driver signal coupled to said coil such that saidcoil provides a dynamic magnetic field which emulates the swiping of amagnetic stripe transaction card past a read head of the magnetic stripereader; and one or more sensors electrically coupled to the non-secureprocessor for providing a signal to the non-secure processor that aphysical act of swiping the apparatus through the read head of themagnetic stripe reader has commenced; wherein transaction specific dataprovided by a secure function of the secure processor can be accessedwithout any intervention by a secure card terminal; wherein transactionspecific data is provided in the output; and wherein the non-secureprocessor uses the signal to control timing of an initiation of thedynamic magnetic field.
 15. The apparatus of claim 14, wherein thedynamic magnetic field is comprised of: a first track coil magneticfield that emulates the movement of a first track of the magnetic stripeof the transaction card past the read head; and a second track coilmagnetic field that emulates the movement of a second track of themagnetic stripe of the transaction card past the read head.
 16. Theapparatus of claim 15, further comprising means for reduction ofinterference between the first track coil magnetic field and the secondtrack coil magnetic field.
 17. An apparatus for providing transactionspecific data of a user, comprising: a secure processor; a non-secureprocessor; a power source; a general purpose input/output (“I/O”) forreceiving an input from the user to the apparatus electrically connectedto the non-secure processor; a magnetic stripe emulator for providing anoutput from the apparatus that is readable by a magnetic stripe reader,said magnetic stripe emulator being comprised of a broadcaster used tobroadcast a fluctuating magnetic signal which emulates the movement of amagnetic stripe of a transaction card past a read head of a magneticcard reader, said broadcaster being comprised of a coil including anelongated core material and a winding having a plurality of turns aroundsaid core material; one or more sensors electrically coupled to thenon-secure processor for providing a signal to the non-secure processorthat a physical act of swiping the apparatus past the read head of themagnetic stripe reader has commenced which the non-secure processor usesto control timing of an initiation of the dynamic magnetic field; asignal generator having a broadcaster driver signal coupled to said coilsuch that said coil provides a dynamic magnetic field which emulates theswiping of a magnetic stripe transaction card past the read head of themagnetic stripe reader, wherein the dynamic magnetic field is comprisedof a first track coil magnetic field that emulates the movement of afirst track of the magnetic stripe of the transaction card past the readhead and a second track coil magnetic field that emulates the movementof a second track of the magnetic stripe of the transaction card pastthe read head; and at least one sensor electrically coupled to thenon-secure processor for providing a signal to the non-secure processorfor controlling timing of a broadcast of the fluctuating magnetic signalby the broadcaster; wherein the secure processor, the non-secureprocessor, the power source, the general purpose I/O and the output portare mounted together within said apparatus; wherein transaction specificdata provided by a secure function of the secure processor can beaccessed without any intervention by a secure card terminal; and whereintransaction specific data is provided in the output.