WO1998052160A2 - System and method for flexibly loading an ic card - Google Patents

System and method for flexibly loading an ic card Download PDF

Info

Publication number
WO1998052160A2
WO1998052160A2 PCT/GB1998/001393 GB9801393W WO9852160A2 WO 1998052160 A2 WO1998052160 A2 WO 1998052160A2 GB 9801393 W GB9801393 W GB 9801393W WO 9852160 A2 WO9852160 A2 WO 9852160A2
Authority
WO
WIPO (PCT)
Prior art keywords
application
card
memory
segments
integrated circuit
Prior art date
Application number
PCT/GB1998/001393
Other languages
French (fr)
Other versions
WO1998052160A3 (en
Inventor
David Barrington Everett
Stuart James Miller
Anthony David Peacham
Ian Stephen Simmons
Timothy Philip Richards
John Charles Viner
Original Assignee
Mondex International Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mondex International Limited filed Critical Mondex International Limited
Priority to AU77769/98A priority Critical patent/AU7776998A/en
Publication of WO1998052160A2 publication Critical patent/WO1998052160A2/en
Publication of WO1998052160A3 publication Critical patent/WO1998052160A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0719Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for application selection, e.g. an acceleration sensor or a set of radio buttons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • G06Q20/35765Access rights to memory zones
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • G07F7/084Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system

Definitions

  • IC cards are becoming increasingly used for many reasons.
  • An IC card also called a smart card
  • An IC card typically is
  • ROM read-only-memory
  • EEPROM only-memory
  • I/O Input/Output
  • An IC card may contain a single application
  • MULTOSTM is a
  • a conventional single application IC card such as a telephone card or an
  • IC cards issued to him or her, such as both an electronic purse and a credit/debit
  • a card user may have both a purse application and a credit/debit
  • Bank A beneficial for an application provided by Bank A to be loaded from a terminal (such as an
  • an IC card has limited space in its input buffer, which can be
  • I/O Input/Output
  • the card stores the segment in an available space in the IC card's memory.
  • the segments can be
  • the IC may be placed in non-contiguous memory in order to reduce memory fragmentation.
  • the application provider determines the size of the IC
  • Fig. 1 is block diagram of the flexible loading system of the present
  • Fig. 2 is a block diagram of an IC card chip upon which an application and
  • Fig. 3 is a graphic example of a memory map of EEPROM on an IC card
  • Fig. 4 is a flow chart of an example of multiple segments being loaded
  • Fig. 5 is a flow chart of the steps of segmenting the application and its
  • Fig. 6 is a flow chart of the steps of receiving and processing the
  • the IC card and also allows older applications to be updated with newer versions of the
  • a card user may start with an IC card
  • the IC card has a limited amount of
  • data is segmented such that each segment will fit in the IC card's I/O buffer at one time.
  • the segment is then stored in the IC card's storage memory, e.g., EEPROM, in a manner
  • Figure 1 shows a block diagram of the entities used in a remote application
  • the flexible loading technique also applies to local loading such as a
  • System 100 includes an application provider
  • the application provider 101 can
  • application provider 101 preferably initiates an application loading process onto IC card
  • the IC card 103 can request the loading process.
  • Data conduit 107 is connected to interface device 105 (e.g., a terminal that communicates with an IC card).
  • interface device 105 e.g., a terminal that communicates with an IC card.
  • Data conduit 107 can be a
  • the application provider 101 which is remotely located from the
  • IC card 103 in this example desires to send and load an application to the IC card.
  • Application provider 101 has an I/O buffer 113 and IC card 103 has an I/O buffer 115.
  • I/O buffer 113 and IC card 103 has an I/O buffer 115.
  • interface device 105 also contains an I/O buffer 117. Each of the I/O buffers
  • the I/O buffers could be a combined input or output
  • the IC card 103 the IC card 103
  • the IC card will typically have the smallest I/O buffer due to physical size limitations.
  • the IC card will typically have the smallest I/O buffer due to physical size limitations.
  • 103 also has a memory 119 in which it stores the loaded application and its associated
  • Figure 1 shows two segments 109 and 111 which are transferred at
  • the application could be loaded directly at a terminal and not remotely.
  • a bank could load an application onto an IC card by requiring the customer to
  • Figure 2 shows an example of a block diagram of an IC card chip upon
  • the IC card preferably includes a central processing unit 201, a
  • RAM 203 an EEPROM 205, a ROM 207, a timer 209, control logic unit 211, an I/O port
  • Control logic 211 in memory cards provides sufficient sequencing and
  • CPU 201 with its control logic can perform calculations, access memory locations,
  • Input output ports 213 are used under the control of a CPU and control logic, for
  • Timer 209 (which generates or provides a clock pulse) drives the
  • control logic 211 and CPU 201 through the sequence of steps that accomplish memory
  • a timer may be
  • Security circuitry 215 is used to provide application features such as call duration.
  • fusible links that connect the input/output lines to internal circuitry as
  • the application segments are stored in
  • Figure 2 also shows a possible configuration for the integrated circuit for
  • CPU 201 present in the integrated circuit for the application
  • Figure 3 shows a graphic representation of a memory map of EEPROM
  • the first application 301 is stored in a contiguous memory
  • Contiguous memory space means that the application occupies sequential
  • a second application 303 is
  • execution of the operating system is stored in memory space 351.
  • memory space 351 One example of a
  • IC card after the initial application was deleted can be a different size than the initial
  • the operating system stored on the card maintains a record of the physical
  • address look-up data can be stored in a table, a stack, a pointer or any conventional means
  • Memory space 363 in Figure 3 is shown as not
  • Figure 4 shows a flow chart of an illustrative example of loading multiple
  • initial segments are created to be loaded onto the IC card. Two of the segments are
  • Step 401 loads a segment corresponding to the program code of the
  • the program code includes the program
  • the segment can be further split into two or more components which can be
  • the components can be stored in non-contiguous locations if component pointers or tables are supported
  • Step 403 loads the application data segment onto the IC card.
  • application data segment includes necessary and optional data needed for the execution of
  • the application code For example, if the application is a credit/debit application, the card
  • Another example is a health related application where a customer's
  • the medical history may be stored on the card for quick access at remote locations.
  • medical history data may be quite large and require further segmentation into two or more
  • Step 405 loads a Key Transformation Unit (KTU) segment for the KTU.
  • KTU Key Transformation Unit
  • information preferably contains information regarding the encryption key used to
  • the key information is sent with
  • the KTU information in necessary.
  • the flexible loading technique also applies when no encryption scheme is used and this information
  • Step 407 loads a file control segment onto the IC card.
  • information preferably includes an application identifier, security information and
  • the file control information will be used by the
  • control information is a separate segment, it could be included in another segment
  • Step 409 loads a directory information segment onto the IC card.
  • directory information preferably includes the name of the application which can be used
  • Purse is selected by a customer as a terminal, the terminal will send a command to the IC
  • the directory information is a separate segment, the information could be included in
  • Step 411 loads an application signature segment onto the IC card.
  • application signature segment preferably includes data signed with the digital signature of the application provider. This allows the IC card to verify that the application provider is
  • the IC card verifies the signature
  • the segments could be organized in any manner and sent in any order.
  • the IC card will need to have identified the subject matter of the incoming segment or
  • FIG. 5 shows a flowchart of the steps the application provider performs
  • the 501 determines the I/O buffer size of the IC card.
  • the input buffer size is
  • IC card I/O buffer will be smaller than the application provider I/O buffer because of the
  • Interface I/O buffer is smaller than the IC card I/O buffer, the smallest I/O buffer will
  • the application provider can determine the IC card memory buffer size by some preliminary information exchange which identifies the IC
  • Step 503 then segments the application and associated data in two or more
  • Step 505 then sends the segments to the IC card one at a time.
  • IC card receives a segment in its I/O buffer, it will store that segment in a location of its
  • the application provider can send a transmission
  • Figure 6 is a flow chart of the steps of processing the segmented
  • Step 601 receives a transmitted segment in the I/O
  • Step 603 then stores the segment in available memory space after the microprocessor on the IC card identifies the proper
  • the processor can check for the first available free memory space that is
  • stored applications can be stored contiguously if desired.
  • the processor can
  • Step 605 determines if there are any additional segments to be stored.
  • This step can be accomplished by checking earlier information regarding the number of
  • the IC card can simply remain in a wait
  • data such as data blocks, database files, word processing documents or any other type

Abstract

A system and method of flexibly loading an application and its associated data from an application provider onto an IC card. The application and its associated data is divided into segments which can each fit into the input buffer of an Integrated circuit card. Each segment is transmitted separately and the Integrated circuit card then stores the segment in an available space in the IC card's memory. The segments can be placed in non-contiguous memory in order to reduce memory fragmentation.

Description

SYSTEM AND METHOD FOR FT.F.YTRT Y LOADING AN TC CARD
BACKGROUND OF INVENTION
Integrated circuit ("IC") cards are becoming increasingly used for many
different purposes in the world today. An IC card (also called a smart card) typically is
the size of a conventional credit card which contains a computer chip including a
microprocessor, read-only-memory (ROM), electrically erasable programmable read¬
only-memory (EEPROM), an Input/Output (I/O) mechanism and other circuitry to
support the microprocessor in its operations. An IC card may contain a single application
or may contain multiple independent applications in its memory. MULTOS™ is a
multiple application operating system which runs on IC cards, among other platforms,
and allows multiple applications to be executed on the card itself. This allows a card user
to run many programs stored in the card (for example, credit/debit, electronic
money /purse and/or loyalty applications) irrespective of the type of terminal (i.e., ATM,
telephone and/or POS) in which the card is inserted for use.
A conventional single application IC card, such as a telephone card or an
electronic cash card, is loaded with a single application when it is manufactured and
before it is given to a card user. That application, however, cannot be modified or
changed after the card is issued even if the modification is desired by the card user or card
issuer. Moreover, if a card user wanted a variety of application functions to be performed
by IC cards issued to him or her, such as both an electronic purse and a credit/debit
function, the card user would be required to carry multiple physical cards on his or her person, which would be quite cumbersome and inconvenient. If an application developer
or card user desired two different applications to interact or exchange data with each
other, such as a purse application interacting with a frequent flyer loyalty application, the
card user would be forced to swap multiple cards in and out of the card-receiving
terminal, making the transaction difficult, lengthy and inconvenient.
Therefore, it is beneficial to store multiple applications on the same IC
card. For example, a card user may have both a purse application and a credit/debit
application on the same card so that the user could select which type of payment (by
electronic cash or credit card) to use to make a purchase. Multiple applications could be
provided to an IC card if sufficient memory exists and an operating system capable of
supporting multiple applications is present on the card. Although multiple applications
could be preselected and placed in the memory of the card during its production stage, it
would also be beneficial to have the ability to load and delete applications for the card
post-production as needed.
It is important, particularly where there is a continuing wide availability of
new applications to the cardholder, that the system has the capability of adding
applications onto the IC card subsequent to issuance. This is necessary to protect the
longevity of the IC cards; otherwise, once an application becomes outdated, the card
would be useless. It would be beneficial to allow the addition of applications from a
remote location as well as from a direct connection to an application provider's terminal. For example, it would be beneficial for a card user to be able to plug his IC card into his
home computer and download an application over the Internet. Alternatively, it would be
beneficial for an application provided by Bank A to be loaded from a terminal (such as an
ATM) located at Bank B which is connected to Bank A by a network or series of
interconnected networks.
The increased flexibility and power of storing multiple applications on a
single card create new technical challenges to be overcome concerning the application
loading process in which information (including application code and associated data) is
exchanged between the application provider and the individual card. The IC card only
has a finite amount of memory on the card for storing applications. Applications and
their associated data can vary drastically in size depending upon the application. When
multiple applications are stored on a card, and a series of application additions and
deletions have occurred, memory fragmentation where memory which is free cannot be
used because of size limitations.
Additionally, an IC card has limited space in its input buffer, which can be
separate or combined with an output buffer, i.e., an Input/Output (I/O) buffer. It may not
be possible to fit the entire application and its associated data into an I/O buffer of an
IC card at one time. In order to achieve the flexibility of selectively loading and deleting
applications on an IC card, the problems of limited I/O buffer space and fragmentation
must be addressed. Accordingly, it is an object of preferred embodiments of this invention to
provide a system and method that allows for flexible loading of an application and its
associated data onto an IC card by segmenting the application and associated data into
selected segments in order to limit the size of the data packets being transmitted at one
time and reduce fragmentation in the memory of the IC card.
SUMMARY OF THE INVENTION
These and other objectives are achieved by an embodiment of the present
invention which provides an IC card system and method for flexibly loading an
application and its associated data from an application onto an IC card. The application
provider divides the application and its associated data into segments which will fit into
the I/O buffer of the intended IC card. Each segment is transmitted separately and the IC
card stores the segment in an available space in the IC card's memory. The segments can
be placed in non-contiguous memory in order to reduce memory fragmentation. The IC
card's microprocessor can additionally determine the smallest memory space which will
store the segment in order to minimize fragmentation.
In a preferred embodiment, the application provider determines the size of the IC
card's I/O buffer so that it can correctly select the size of each segment.
BRIEF DESCRIPTION OF THE DRAWINGS
Further objects, features and advantages of embodiments of the invention
will become apparent from the following detailed description taken by way of example
only and in conjunction with the accompanying figures showing illustrative embodiments
of the invention, in which
Fig. 1 is block diagram of the flexible loading system of the present
invention;
Fig. 2 is a block diagram of an IC card chip upon which an application and
its associated data can be flexibly loaded and stored;
Fig. 3 is a graphic example of a memory map of EEPROM on an IC card;
Fig. 4 is a flow chart of an example of multiple segments being loaded
onto the IC card;
Fig. 5 is a flow chart of the steps of segmenting the application and its
associated data by the application provider; and
Fig. 6 is a flow chart of the steps of receiving and processing the
segmented information by the IC card.
Throughout the figures, the same reference numerals and characters,
unless otherwise stated, are used to denote like features, elements, components or
portions of the illustrated embodiments. Moreover, while the subject invention will now be described in detail with reference to the figures, it is done so in connection with the
illustrative embodiments. It is intended that changes and modifications can be made to
the described embodiments without departing from the true scope and spirit of the subject
invention as defined by the appended claims.
DETAILED DESCRIPTION OF THE INVENTION
It is beneficial to have the capability to load applications onto IC cards
containing multiple application operating systems at any time during the lifetime of the
IC card. This flexibility allows a user of a card to periodically add new applications to
the IC card and also allows older applications to be updated with newer versions of the
application when they are released. For example, a card user may start with an IC card
that contains a purse, or electronic cash application (e.g., MONDEX™), being stored on
her IC card. Some time after the user has the card, she may load an additional application
onto the card such as a credit/debit application. Some time after loading the credit/debit
application on the card, a new version of the credit/debit application may become
available and the card user should be able to erase the old application on her IC card and
replace it with the new version of the credit/debit application which may contain
additional features.
In a multiple application operating system environment, it is beneficial to
be able to load applications both at terminals, such as a bank ATM machine, as well as over remote communication links, such as telephone lines, cable lines, the Internet,
satellite or other communications means. When loading applications onto an IC card, the
application provider and the card issuer (which could be the same entity) need to provide
security regarding the applications to be loaded. The IC card has a limited amount of
available I/O space and a limited amount of memory to store applications and their
associated data. In order to address these limitations, the application and its associated
data is segmented such that each segment will fit in the IC card's I/O buffer at one time.
The segment is then stored in the IC card's storage memory, e.g., EEPROM, in a manner
that can be non-contiguous to reduce memory fragmentation. This system and technique
will now be described in detail.
Figure 1 shows a block diagram of the entities used in a remote application
loading process of an application and its associated data. While Figure 1 shows a remote
loading system, the flexible loading technique also applies to local loading such as a
terminal located at the application provider. System 100 includes an application provider
for transmitting an IC card application and its associated data to an intended IC card 103,
an IC card interface device 105 and a data conduit 107. The application provider 101 can
be a card issuer, bank or other entity which provides application loading services. The
application provider 101 preferably initiates an application loading process onto IC card
103. Alternatively, the IC card 103 can request the loading process. Application
Provider 101 is connected to data conduit 107 which is connected to interface device 105 (e.g., a terminal that communicates with an IC card). Data conduit 107 can be a
telephone line, an intranet, the Internet, a satellite link or any other type of
communications link. The application provider 101, which is remotely located from the
IC card 103 in this example, desires to send and load an application to the IC card.
Application provider 101 has an I/O buffer 113 and IC card 103 has an I/O buffer 115. In
addition, interface device 105 also contains an I/O buffer 117. Each of the I/O buffers
has a maximum storage capacity. The I/O buffers could be a combined input or output
buffer or the input buffer and output buffer could be separate. However, the IC card 103
will typically have the smallest I/O buffer due to physical size limitations. The IC card
103 also has a memory 119 in which it stores the loaded application and its associated
data.
In the illustrative embodiment of Figure 1, the application provider 101
sends two application segments SI, 109 and S2, 111 to the interface device 105 which is
coupled to IC card 103. The application segments are discussed in more detail in
connection with Figure 4. The application and its associated data are broken into two or
more segment units in order for each of the data segments to fit in the I/O buffer of the
I/O card. Additionally, the segmentation of the application and associated data helps to
reduce fragmentation of the memory of the IC card which stores the application and
associated data being loaded. Figure 1 shows two segments 109 and 111 which are transferred at
discrete times from the application provider to the IC card. However, any number of
segments could be used depending upon such factors including the size of the application
being loaded, the size of the associated data being loaded, the size of the respective I/O
buffers, the availability of memory space on the IC card and the amount of memory
fragmentation already on the IC card.
The application could be loaded directly at a terminal and not remotely. In
that case, a separate interface device 105 would not be required because the application
provider would have its own terminal capable of communicating with the IC card. For
example, a bank could load an application onto an IC card by requiring the customer to
insert his or her card into the bank's ATM machine. In that case, the application provider
communicates with the IC card locally and transmissions are not sent over telephone lines
or the Internet. Embodiments of the present invention are applicable to both the remote
loading and local loading.
Figure 2 shows an example of a block diagram of an IC card chip upon
which an application can be flexibly loaded and stored. An integrated circuit is located
on an IC card for use. The IC card preferably includes a central processing unit 201, a
RAM 203, an EEPROM 205, a ROM 207, a timer 209, control logic unit 211, an I/O port
213 and security circuitry 215, which are connected together by a conventional data bus. Control logic 211 in memory cards provides sufficient sequencing and
switching to handle read- write access to the card's memory through the input/output
ports. CPU 201 with its control logic can perform calculations, access memory locations,
modify memory contents, and manage input/output ports. Some cards have a coprocessor
for handling complex computations like performing cryptographic operations.
Input output ports 213 are used under the control of a CPU and control logic, for
communications between the card and a card interface device. Input/Output ports 213
include an I/O buffer. Timer 209 (which generates or provides a clock pulse) drives the
control logic 211 and CPU 201 through the sequence of steps that accomplish memory
access, memory reading or writing, processing, and data communication. A timer may be
used to provide application features such as call duration. Security circuitry 215
preferably includes fusible links that connect the input/output lines to internal circuitry as
required for testing during manufacture, but which are destroyed ("blown") upon
completion of testing to prevent later access. The application segments are stored in
EEPROM 205. The storage and memory management process as described herein is
performed by the CPU 201.
Figure 2 also shows a possible configuration for the integrated circuit for
the application provider. CPU 201 present in the integrated circuit for the application
provider determines the size of the IC card's I/O buffer, controls the segmentation of the application and associated data described herein and performs any other necessary
operation.
Figure 3 shows a graphic representation of a memory map of EEPROM
300 on IC card 103. In this illustrative example, three applications are stored in
EEPROM of an IC card. The first application 301 is stored in a contiguous memory
space 355. Contiguous memory space means that the application occupies sequential
memory addresses with no skipped memory addresses. A second application 303 is
stored in contiguous memory space 359. Operating system data required for the
execution of the operating system is stored in memory space 351. One example of a
cause of fragmentation existing in the IC card is a previous application being deleted
which was previously located at memory space 313. The next application loaded onto the
IC card after the initial application was deleted can be a different size than the initial
application and thus not all the freed up available memory space can be used in such a
manner where two or more programs and data are stored contiguously without leaving
small portions of unused memory space. In the example of Figure 1, the last application
and its associated data which was loaded was segmented into three segments 307, 309
and 311. These segments are smaller portions of the entire application and its associated
data set which could be placed in smaller areas of available memory. Thus fragmentation
in the IC card's memory was alleviated by segmenting the application and its associated
data. The operating system stored on the card maintains a record of the physical
location of the different segments and can access the physical locations when a logical
address is called out when a program or operating system is being executed. The physical
address look-up data can be stored in a table, a stack, a pointer or any conventional means
for indicating the physical locations. Memory space 363 in Figure 3 is shown as not
storing any data in the example and that memory space could be later used for storing
new segmented applications and their associated data.
Figure 4 shows a flow chart of an illustrative example of loading multiple
segments into a memory of an IC card from an application provider. In this example, six
initial segments are created to be loaded onto the IC card. Two of the segments are
further divided into components which results in a total of nine segments individually
being sent to the IC card.
Step 401 loads a segment corresponding to the program code of the
application to be provided to the IC card. The program code includes the program
instructions which will be executed by the microprocessor located on the IC card. If the
code segment is too large to fit into the I/O buffer of either the IC card or the application
provider, then the segment can be further split into two or more components which can be
separately transmitted to the IC card. In Figure 4, three components are illustrated for the
program code, components 413, 415 and 417. The components are preferably stored in
contiguous memory locations in the memory of the IC card. However, the components can be stored in non-contiguous locations if component pointers or tables are supported
by the operating system on the IC card.
Step 403 loads the application data segment onto the IC card. The
application data segment includes necessary and optional data needed for the execution of
the application code. For example, if the application is a credit/debit application, the card
user's account number, identification data and credit limit may be needed for the
application to run. Another example is a health related application where a customer's
medical history may be stored on the card for quick access at remote locations. The
medical history data may be quite large and require further segmentation into two or more
components. In Figure 4, components 419 and 421 are shown as subsets of the data
segment being loaded in step 403.
Step 405 loads a Key Transformation Unit (KTU) segment for the
application being loaded. If the application is being loaded from a remote location, there
is a need to make sure the transmission is secure from third party access. The KTU
information preferably contains information regarding the encryption key used to
encipher the application program and associated data. The key information is sent with
the application because applications can be transmitted from any application provider to
any IC card with an IC card system. Since different encryption techniques can be used by
different application providers, the KTU information in necessary. However, the flexible loading technique also applies when no encryption scheme is used and this information
could also be included in another segment depending upon its size.
Step 407 loads a file control segment onto the IC card. File control
information preferably includes an application identifier, security information and
application and data size requirements. The file control information will be used by the
operating system on the IC card to process the application. While in this example the file
control information is a separate segment, it could be included in another segment
depending upon its size.
Step 409 loads a directory information segment onto the IC card. The
directory information preferably includes the name of the application which can be used
by the operating system to identify the application. For example, if a select file command
is initiated by a terminal, the name of the file to be selected which accompanies the
command will be recognized by the operating system on the IC card. If the MONDEX™
Purse is selected by a customer as a terminal, the terminal will send a command to the IC
card in the form of a "Select File Mondex" and the IC card will correlate MONDEX with
a previously loaded application with the directory name Mondex. While in this example
the directory information is a separate segment, the information could be included in
another segment depending upon its size.
Step 411 loads an application signature segment onto the IC card. The
application signature segment preferably includes data signed with the digital signature of the application provider. This allows the IC card to verify that the application provider is
the genuine application provider and not an imposter. The IC card verifies the signature
with the public key of an asymmetric encryption key pair of the application provider.
While in this example the application signature is a separate segment, the information
could be included in another segment if its size permitted it.
The segments could be organized in any manner and sent in any order.
The IC card will need to have identified the subject matter of the incoming segment or
component so that it can later locate a specific segment or component when needed. This
information can be part of the load control information or can be obtained prior to the
loading of the application. While Figure 4 describes a number of different segments, the
subject matter of the segments transmitted will vary and depend upon the particular
application and associated data.
Figure 5 shows a flowchart of the steps the application provider performs
when segmenting the application and associated data to be loaded upon the IC card. Step
501 determines the I/O buffer size of the IC card. Alternatively, the input buffer size is
determined if the input and output buffers are separate on the IC card. In most cases, the
IC card I/O buffer will be smaller than the application provider I/O buffer because of the
limited memory on the IC card. However, if the application provider I/O buffer or the
Interface I/O buffer is smaller than the IC card I/O buffer, the smallest I/O buffer will
control the size of the segments. The application provider can determine the IC card memory buffer size by some preliminary information exchange which identifies the IC
card as the correct card upon which to load the application. Alternatively, some
agreement or standard can be followed so that the application provider can create
segments which will fit in an IC card which follows the agreement or standard.
Step 503 then segments the application and associated data in two or more
segments. In the example of Figure 4, six initial segments were created and some of the
segments were further divided to form two or more components. The segmented
information is preferably divided in a predetermined organization to aid the IC card
processing of the segments.
Step 505 then sends the segments to the IC card one at a time. When the
IC card receives a segment in its I/O buffer, it will store that segment in a location of its
memory thus freeing up its I/O buffer for the next incoming segment. After all the
segments have been transmitted, the application provider can send a transmission
indicating no more segments are being transmitted or the number of segments can be sent
at the beginning of the transmission. Alternatively, a known segment protocol can be
followed.
Figure 6 is a flow chart of the steps of processing the segmented
information performed by the IC card. Step 601 receives a transmitted segment in the I/O
buffer of the IC card. The entire segment will fit within the I/O buffer because of the
processing performed at the application provider. Step 603 then stores the segment in available memory space after the microprocessor on the IC card identifies the proper
memory space. The processor can check for the first available free memory space that is
sufficient to store the segment. Once the segment is stored at a physical location, that
location is recorded either in a segment address table, by a pointer or by any other
conventional means. Different memory architectures can be used for storing the
segments. For example, all the similar types of segments (e.g., program code) for the
stored applications can be stored contiguously if desired. Alternatively, the processor can
determine the space that is closest in size to the segment to be stored by scanning the
memory. This will reduce any problems of fragmentation in the limited size IC card
memory.
Step 605 determines if there are any additional segments to be stored.
This step can be accomplished by checking earlier information regarding the number of
segments which were being sent. It can also be accomplished by receiving a transmission
indicating no more segments. Alternatively, the IC card can simply remain in a wait
status until additional data or instructions is sent to the card. If the IC card determines
that additional segments are being transmitted, the technique jumps back to step 602. If
no more segments, the process ends.
The foregoing merely illustrates the principles of the invention. It will
thus be appreciated that those skilled in the art will be able to devise numerous systems and methods which, although not explicitly shown or described herein, embody the
principles of the invention and are thus within the spirit and scope of the invention.
For example, while loading an application and its associated data is
discussed herein, the same flexible loading process can apply to transmitting other types
of data such as data blocks, database files, word processing documents or any other type
of data requiring to be transmitted in a segmented manner.
The scope of the present disclosure includes any novel feature or
combination of features disclosed therein either explicitly or implicitly or any
generalisation thereof irrespective of whether or not it relates to the claimed invention or
mitigates any or all of the problems addressed by the present invention. The application
hereby gives notice that new claims may be formulated to such features during the
prosecution of this application or of any such further application derived therefrom. In
particular, with reference to the appended claims, features from dependant claims may be
combined with those of the independent claims in any appropriate manner and not merely
in the specific combinations enumerated in the claims.

Claims

WE CLAIM:
l. A method for loading an application and its associated data from an
application provider onto an integrated circuit card, wherein said integrated
circuit card comprises a memory, comprising the steps of:
dividing said application and its associated data into a
plurality of segments;
separately transmitting each said segment to said
integrated circuit card; and
storing each said separately transmitted segment in an
available area of said integrated circuit card's memory.
2. The method of claim 1 , wherein at least two of said plurality of
segments are not stored contiguously.
3. The method of claim 1 or claim 2, further including the step of
determining an available area in said integrated circuit card's memory to store
each said segment.
4. The method of claim 3, wherein said determining step identifies the
smallest available area in said integrated circuit card's memory in which said
segment can be stored.
5, The method of any preceding claim, wherein at least a first portion of
said application is not stored contiguously with said application's remaining
portion in said integrated circuit card's memory.
6. The method of any preceding claim, wherein said application is not
stored contiguously with said associated data in said integrated circuit card's
memory.
7. The method of any preceding claim, wherein said application is
divided into a plurality of segments.
8 ΓÖª The method of any preceding claim, wherein said associated data is
divided into a plurality of segments.
9. The method of any preceding claim, further including the step of
determining said integrated circuit card's input buffer size.
10. A system for loading an application and its associated data onto an
integrated circuit card comprising:
an application provider comprising means for dividing
said application and its associated data into a plurality of segments and means
for separately transmitting each said segment to said integrated circuit card;
and
an integrated circuit card comprising a memory, means
for receiving said transmitted segments and means for storing each said
transmitted segment in an available area of said integrated circuit card's
memory.
11. The system of claim 10, wherein at least two of said plurality of
segments are not stored contiguously in said integrated circuit card.
12 - The system of claim 10 or claim 11 , wherein said card further
includes means for determining an available area in said memory to store
each said segment.
13. The system of claim 12, wherein said determining means identifies
the smallest available area in which said segment can be stored.
14. The system of any of claims 10 to 13, wherein at least a first portion
of said application is not stored contiguously with said application's
remaining portion in said memory.
15 . The system of any of claims 10 to 14, wherein said application is not
stored contiguously with said associated data in said memory.
16. The system of any of claims 10 to 15, wherein said application is
divided into a plurality of segments.
17. The system of any of claims 10 to 16, wherein said associated data is
divided into a plurality of segments.
18. The system ofany of claims 10 to 17, wherein said application
provider further includes means for determining said integrated circuit card's
input buffer size.
19 Γû║ The system of any of claims 10 to 18, wherein said means for
receiving said transmitted segments has a size capacity smaller than said
application and associated data's size.
20. The system of any of claims 10 to 19, wherein said integrated circuit
card is remotely located from said application provider.
PCT/GB1998/001393 1997-05-15 1998-05-14 System and method for flexibly loading an ic card WO1998052160A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU77769/98A AU7776998A (en) 1997-05-15 1998-05-14 System and method for flexibly loading an ic card

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US4651497P 1997-05-15 1997-05-15
US60/046,514 1997-05-15
US09/076,550 1998-05-12
US09/076,550 US6488211B1 (en) 1997-05-15 1998-05-12 System and method for flexibly loading in IC card

Publications (2)

Publication Number Publication Date
WO1998052160A2 true WO1998052160A2 (en) 1998-11-19
WO1998052160A3 WO1998052160A3 (en) 1999-05-14

Family

ID=26724018

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1998/001393 WO1998052160A2 (en) 1997-05-15 1998-05-14 System and method for flexibly loading an ic card

Country Status (3)

Country Link
US (2) US6488211B1 (en)
AU (1) AU7776998A (en)
WO (1) WO1998052160A2 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1006478A2 (en) * 1998-12-01 2000-06-07 Kabushiki Kaisha Toshiba IC card, portable device, and data updating method for IC card
WO2000069183A2 (en) * 1999-05-11 2000-11-16 Nokia Corporation Storage media
WO2000068902A1 (en) * 1999-05-11 2000-11-16 Microsoft Corporation Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card
WO2000072276A1 (en) * 1999-05-21 2000-11-30 Robert Bosch Gmbh Method for customising a car radio to individual requirements
WO2001057810A1 (en) * 2000-02-03 2001-08-09 Gemplus Time management at communication level for a smart card-type entity
WO2001095273A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart card, and integrated system therefor
WO2002005225A1 (en) * 2000-07-11 2002-01-17 Kaba Schliesssysteme Ag Method for the initialisation of mobile data supports
WO2002019264A1 (en) * 2000-08-22 2002-03-07 Giesecke & Devrient Gmbh Method for virtually enlarging the stack of a portable data carrier
WO2002035464A2 (en) * 2000-10-23 2002-05-02 Omega Electronics S.A. Non-contact electronic identification system
WO2002039369A1 (en) * 2000-11-10 2002-05-16 Cp8 Technologies Communication protocol between a proactive smart card and its host terminal
FR2817055A1 (en) * 2000-11-22 2002-05-24 Gemplus Card Int Execution of an application in a portable electronic device, such as a chip card, when the card does not have sufficient memory to load the entire application, by sequential loading of parts of the code in a secure manner
WO2002097746A1 (en) * 2001-06-01 2002-12-05 Anton Gunzinger System and method for transmitting information, and information carrier
EP1271429A1 (en) * 2001-06-21 2003-01-02 Fujitsu Limited Card system, card information presentation apparatus, card issuing apparatus, card contents update apparatus, card data update apparatus and card information distribution system
US6547150B1 (en) 1999-05-11 2003-04-15 Microsoft Corporation Smart card application development system and method
EP1365362A1 (en) * 2002-05-15 2003-11-26 Omega Electronics S.A. Contactless electronic identification system
WO2004003861A1 (en) * 2002-07-01 2004-01-08 Sospita As Process for compiling and executing software applications in a multi-processor environment
US6845498B1 (en) 1999-05-11 2005-01-18 Microsoft Corporation Method and apparatus for sharing data files among run time environment applets in an integrated circuit card
US6938244B1 (en) 1999-05-11 2005-08-30 Microsoft Corp. Interlaced protocol for smart card application development
US7046810B2 (en) 2000-04-06 2006-05-16 Sony Corporation Data processing method and system of same portable device data processing apparatus and method of same and program
EP3050012A1 (en) * 2013-09-24 2016-08-03 Mastercard Asia Pacific Pte. Ltd. A method for electrically personalizing a payment chip and a payment chip
US9471910B2 (en) 1999-10-25 2016-10-18 Smartflash, LLC Data storage and access systems

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317832B1 (en) * 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
FR2775375A1 (en) * 1998-02-23 1999-08-27 Solaic Sa Loading processing programs by blocks into memory of portable devices and avoiding loss of time when contact with an emitter is lost. Particularly applicable to contactless devices
US6931381B1 (en) * 1999-03-11 2005-08-16 American Express Travel Related Services Company, Inc. Methods and apparatus for authenticating the download of information onto a smart card
US6876991B1 (en) 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform
EP1239411B1 (en) * 1999-11-30 2006-09-06 Kabushiki Kaisha Toshiba Ic card and method for managing volatile memory of the ic card
EP2290577B1 (en) * 2000-02-18 2017-08-16 Vasco Data Security International GmbH Token device having a USB connector
JP2003085525A (en) * 2001-09-13 2003-03-20 Konica Corp Ic card, and card authentication method
JP3758554B2 (en) * 2001-10-31 2006-03-22 ソニー株式会社 Information providing system, information providing method, storage medium, and computer program
DE60210416T2 (en) * 2002-02-28 2006-09-07 Matsushita Electric Industrial Co., Ltd., Kadoma memory card
JP2004220575A (en) * 2002-12-27 2004-08-05 Ricoh Co Ltd Interface circuit of card type memory, asic carrying its circuit and image forming apparatus carrying asic
JP4072503B2 (en) * 2004-02-04 2008-04-09 シャープ株式会社 IC card with built-in coprocessor for auxiliary operation and control method thereof
US7051929B2 (en) * 2004-10-18 2006-05-30 Gongling Li Secure credit card having daily changed security number
JP2006119901A (en) * 2004-10-21 2006-05-11 Toshiba Corp Portable electronic apparatus and application updating method for the portable electronic apparatus
FR2878685B1 (en) * 2004-11-30 2007-02-02 Gemplus Sa PRO-ACTIVE SESSION TRIGGER FROM AN APPLET IN A CHIP CARD
JP4856400B2 (en) * 2005-07-06 2012-01-18 ルネサスエレクトロニクス株式会社 Storage device and information processing terminal
WO2008054512A2 (en) * 2006-04-19 2008-05-08 Stepnexus Holdings Methods and systems for ic card application loading
US9230259B1 (en) 2009-03-20 2016-01-05 Jpmorgan Chase Bank, N.A. Systems and methods for mobile ordering and payment
EP2325773B1 (en) * 2009-10-30 2018-06-06 Nxp B.V. System and method for obtaining an authorization key to use a product
US9674184B2 (en) * 2014-08-13 2017-06-06 Qualcomm Incorporated Systems and methods to generate authorization data based on biometric data and non-biometric data
US9430628B2 (en) 2014-08-13 2016-08-30 Qualcomm Incorporated Access authorization based on synthetic biometric data and non-biometric data
CN110705672A (en) * 2019-10-11 2020-01-17 捷德(中国)信息科技有限公司 Smart card chip and smart card

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987007061A1 (en) * 1986-05-16 1987-11-19 American Telephone & Telegraph Company Security file system for a portable data carrier
EP0261030A2 (en) * 1986-09-16 1988-03-23 Fujitsu Limited System for data field area acquisition in IC card for multiple services
EP0275510A2 (en) * 1987-01-20 1988-07-27 International Business Machines Corporation Smart card having external programming capability and method of making same
EP0292248A2 (en) * 1987-05-19 1988-11-23 THE GENERAL ELECTRIC COMPANY, p.l.c. Data processing system
US4901276A (en) * 1986-06-20 1990-02-13 Kabushiki Kaisha Toshiba Portable electronic apparatus having a function of checking for empty areas in which to write data
EP0354793A2 (en) * 1988-08-12 1990-02-14 Hitachi Maxell Ltd. IC card and method for rewriting its program
EP0559205A1 (en) * 1992-03-06 1993-09-08 Kabushiki Kaisha Toshiba Data processing system

Family Cites Families (164)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218582A (en) 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4408203A (en) 1978-01-09 1983-10-04 Mastercard International, Inc. Security system for electronic funds transfer system
US4259720A (en) 1978-01-09 1981-03-31 Interbank Card Association Security system for electronic funds transfer system
US4214230A (en) 1978-01-19 1980-07-22 Rolf Blom Personal identification system
FR2455320B1 (en) 1979-04-25 1986-01-24 Cii Honeywell Bull DEVICE FOR RECYCLING IDENTIFIABLE RECORDING MEDIA USING IDENTIFICATION DATA AND NON-VOLATILE DELETE MONOLITHIC MEMORY COMPOUNDS
US4321672A (en) 1979-11-26 1982-03-23 Braun Edward L Financial data processing system
US4302810A (en) 1979-12-28 1981-11-24 International Business Machines Corporation Method and apparatus for secure message transmission for use in electronic funds transfer systems
US4305059A (en) 1980-01-03 1981-12-08 Benton William M Modular funds transfer system
FR2480539B1 (en) 1980-04-09 1985-09-13 Cii Honeywell Bull METHOD AND SYSTEM FOR TRANSMITTING SIGNED MESSAGES
US4341951A (en) 1980-07-02 1982-07-27 Benton William M Electronic funds transfer and voucher issue system
FR2497617B1 (en) 1981-01-07 1989-08-18 Transac Develop Transactions A SECURITY METHOD AND DEVICE FOR TRIPARTITY COMMUNICATION OF CONFIDENTIAL DATA
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4423287A (en) 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4453074A (en) 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
FR2536928B1 (en) 1982-11-30 1989-10-06 France Etat SYSTEM FOR ENCRYPTING AND DECIPHERING INFORMATION, OF THE TYPE USING A PUBLIC KEY DECRYPTION SYSTEM
US4536647A (en) 1983-07-15 1985-08-20 Atalla Corporation Pocket banking terminal, method and system
US4759063A (en) 1983-08-22 1988-07-19 Chaum David L Blind signature systems
US4759064A (en) 1985-10-07 1988-07-19 Chaum David L Blind unanticipated signature systems
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4605820A (en) 1983-11-10 1986-08-12 Visa U.S.A. Inc. Key management system for on-line communication
SE442249B (en) 1983-11-17 1985-12-09 Ericsson Telefon Ab L M PROCEDURE AND DEVICE FOR VERIFICATION OF PERSONAL IDENTIFICATION NUMBER AND CHECKING INSERT NUMBER SERIES IN IDENTIFICATION MEDIA
US4745267A (en) 1983-12-28 1988-05-17 Fairview Partners Fraudulent card intercept system
JPS60160491A (en) 1984-01-31 1985-08-22 Toshiba Corp Ic card
DE3579815D1 (en) 1984-02-09 1990-10-25 Toshiba Kawasaki Kk DATA PROCESSING TERMINAL.
US4630201A (en) 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
JPS60144154U (en) 1984-03-07 1985-09-25 シャープ株式会社 portable computer
JPS60207957A (en) 1984-03-31 1985-10-19 Toshiba Corp Data protecting system
US4736094A (en) 1984-04-03 1988-04-05 Omron Tateisi Electronics Co. Financial transaction processing system using an integrated circuit card device
US4709137A (en) 1984-04-16 1987-11-24 Omron Tateisi Electronics Co. IC card and financial transaction processing system using IC card
US4727243A (en) 1984-10-24 1988-02-23 Telenet Communications Corporation Financial transaction system
GB2168514A (en) 1984-12-12 1986-06-18 Ibm Security module
US4650978A (en) 1985-01-23 1987-03-17 Rmh Systems, Inc. Off line cash card system and method
JPS61177585A (en) 1985-02-04 1986-08-09 Toshiba Corp Sealing body of portable electronic device
JPS61210488A (en) 1985-03-14 1986-09-18 Toppan Moore Co Ltd Ic card
JPS61264485A (en) 1985-05-18 1986-11-22 Hitachi Maxell Ltd Reader and writer for integrated circuit card
JPS61278989A (en) 1985-06-04 1986-12-09 Toppan Moore Co Ltd Reader/writer of ic card
JPH069067B2 (en) 1985-07-16 1994-02-02 カシオ計算機株式会社 IC card system
JPH0818473B2 (en) 1985-07-31 1996-02-28 トッパン・ムーア株式会社 IC card that can set confidentiality level
JPH0762862B2 (en) 1985-09-17 1995-07-05 カシオ計算機株式会社 Authentication method in IC card system
US4752677A (en) 1985-09-25 1988-06-21 Casio Computer Co., Ltd. Customer service system for use in IC card system
EP0218176B1 (en) 1985-10-07 1991-11-13 Kabushiki Kaisha Toshiba Portable electronic device
US4778983A (en) 1985-10-12 1988-10-18 Sanden Corporation Automatic vending machine
US4669596A (en) 1985-10-22 1987-06-02 Debitek, Inc. Vending machine accessory permitting dual mode machine operation with either money or coded cards
JP2664137B2 (en) * 1985-10-29 1997-10-15 凸版印刷株式会社 IC card
JPS62105293A (en) 1985-10-31 1987-05-15 Toshiba Corp Reading/writing device for portable recording medium
FR2591008B1 (en) 1985-11-30 1991-05-17 Toshiba Kk PORTABLE ELECTRONIC DEVICE
US4849614A (en) 1985-12-27 1989-07-18 Toppan Moore Company, Ltd. Composite IC card
FR2592510B1 (en) 1985-12-31 1988-02-12 Bull Cp8 METHOD AND APPARATUS FOR CERTIFYING SERVICES OBTAINED USING A PORTABLE MEDIUM SUCH AS A MEMORY CARD
JPS62179994A (en) 1986-02-04 1987-08-07 カシオ計算機株式会社 Electronic card
US4874935A (en) 1986-03-10 1989-10-17 Data Card Coprporation Smart card apparatus and method of programming same
JPS62222363A (en) 1986-03-25 1987-09-30 Omron Tateisi Electronics Co Automatic transaction processing device
JPS62254265A (en) 1986-04-28 1987-11-06 Hitachi Ltd Control system for automatic cash transaction machine
US4742215A (en) 1986-05-07 1988-05-03 Personal Computer Card Corporation IC card system
US4816654A (en) 1986-05-16 1989-03-28 American Telephone And Telegraph Company Improved security system for a portable data carrier
US4839792A (en) 1986-06-20 1989-06-13 Kabushiki Kaisha Toshiba Portable electronic apparatus with a device for determining data validity
US4748668A (en) 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
FR2601535B1 (en) 1986-07-11 1988-10-21 Bull Cp8 METHOD FOR CERTIFYING THE AUTHENTICITY OF DATA EXCHANGED BETWEEN TWO DEVICES CONNECTED LOCALLY OR REMOTELY THROUGH A TRANSMISSION LINE
FR2601795B1 (en) 1986-07-17 1988-10-07 Bull Cp8 METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND SYSTEM FOR IMPLEMENTING IT
JPS6332658A (en) 1986-07-28 1988-02-12 Casio Comput Co Ltd Ic card system
JPH07104891B2 (en) 1986-08-05 1995-11-13 沖電気工業株式会社 Transaction processor
US4802218A (en) 1986-11-26 1989-01-31 Wright Technologies, L.P. Automated transaction system
JPH087720B2 (en) 1986-09-16 1996-01-29 富士通株式会社 Area access method for IC cards for multiple services
DE3731736A1 (en) 1986-09-27 1988-04-07 Toshiba Kawasaki Kk Processing system for a portable electronic device
JPS63120391A (en) 1986-11-10 1988-05-24 Hitachi Ltd Ic card
US4900904A (en) 1986-11-26 1990-02-13 Wright Technologies, L.P. Automated transaction system with insertable cards for downloading rate or program data
US4969188A (en) 1987-02-17 1990-11-06 Gretag Aktiengesellschaft Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
JPH0758500B2 (en) 1987-02-20 1995-06-21 株式会社東芝 Portable electronic device
US5162989A (en) 1987-02-20 1992-11-10 Oki Electric Industry Co., Ltd. Information rental system including processor equipped IC card having data erasing means
DE3877984D1 (en) 1987-03-04 1993-03-18 Siemens Nixdorf Inf Syst DATA EXCHANGE SYSTEM.
FR2611962B1 (en) 1987-03-06 1989-06-09 Trt Telecom Radio Electr SYSTEM AND METHOD FOR APPLIED CRYPTOGRAPHY
JPS63236186A (en) 1987-03-24 1988-10-03 Mitsubishi Electric Corp Card issuing device
US4949257A (en) 1987-04-28 1990-08-14 Zvi Orbach Automated merchandising system for computer software
US4797920A (en) 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
JPS6421327U (en) 1987-07-28 1989-02-02
US4984270A (en) 1987-06-19 1991-01-08 The Exchange System Method and system for transmission of financial data
JP2592856B2 (en) 1987-09-24 1997-03-19 株式会社東芝 IC card issuing system
JPH0161764U (en) 1987-10-09 1989-04-19
US4853961A (en) 1987-12-18 1989-08-01 Pitney Bowes Inc. Reliable document authentication system
FR2626095B1 (en) 1988-01-20 1991-08-30 Sgs Thomson Microelectronics SECURITY SYSTEM FOR PROTECTING PROGRAMMING AREAS OF A CHIP CARD
JP2623332B2 (en) 1988-02-03 1997-06-25 日立マクセル株式会社 IC card and its operation program writing method
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5214702A (en) 1988-02-12 1993-05-25 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5012076A (en) 1988-03-02 1991-04-30 Hitachi, Ltd. Transaction method wherein transaction amount is compared with account balance before ID is entered
US4987593A (en) 1988-03-16 1991-01-22 David Chaum One-show blind signature systems
US4879747A (en) 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US4995081A (en) 1988-03-21 1991-02-19 Leighton Frank T Method and system for personal identification using proofs of legitimacy
US4891503A (en) 1988-03-29 1990-01-02 Gascard, Inc. Distributed authorization system
JPH01259483A (en) 1988-04-08 1989-10-17 Minolta Camera Co Ltd Ic card
CA1321649C (en) 1988-05-19 1993-08-24 Jeffrey R. Austin Method and system for authentication
US4961142A (en) 1988-06-29 1990-10-02 Mastercard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
EP0355372B1 (en) 1988-07-20 1995-03-15 SPA Syspatronic AG Data carrier controlled terminal for a data exchange system
JP2695855B2 (en) 1988-08-26 1998-01-14 株式会社東芝 Portable electronic devices
JPH0622030B2 (en) 1988-10-03 1994-03-23 富士通株式会社 Transaction validity confirmation method
US5016274A (en) 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
GB8829919D0 (en) * 1988-12-22 1989-02-15 Int Computer Limited File system
JPH02170272A (en) 1988-12-23 1990-07-02 Hitachi Maxell Ltd Collation system for secret information
JPH02214994A (en) 1989-02-15 1990-08-27 Hitachi Maxell Ltd Ic card
US5165043A (en) 1989-03-15 1992-11-17 Hitachi, Ltd. Memory card system and access method for memory card
US4977595A (en) 1989-04-03 1990-12-11 Nippon Telegraph And Telephone Corporation Method and apparatus for implementing electronic cash
US4996711A (en) 1989-06-21 1991-02-26 Chaum David L Selected-exponent signature systems
FR2650097B1 (en) 1989-07-19 1992-12-31 Pailles Jean Claude CABLE MICROCIRCUIT CARD AND TRANSACTION METHOD BETWEEN A CORRESPONDING CABLE MICROCIRCUIT CARD AND A TERMINAL
FR2651347A1 (en) 1989-08-22 1991-03-01 Trt Telecom Radio Electr SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM.
US5148481A (en) 1989-10-06 1992-09-15 International Business Machines Corporation Transaction system security method and apparatus
ZA907106B (en) 1989-10-06 1991-09-25 Net 1 Products Pty Ltd Funds transfer system
FR2653248B1 (en) 1989-10-13 1991-12-20 Gemolus Card International PAYMENT OR INFORMATION TRANSFER SYSTEM BY ELECTRONIC MEMORY CARD.
FR2653914A1 (en) 1989-10-27 1991-05-03 Trt Telecom Radio Electr SYSTEM FOR AUTHENTICATING A MICROCIRCUIT CARD BY A PERSONAL MICROCOMPUTER, AND METHOD FOR ITS IMPLEMENTATION
US5120939A (en) 1989-11-09 1992-06-09 At&T Bell Laboratories Databaseless security system
US4993068A (en) 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
JPH03240127A (en) 1990-02-17 1991-10-25 Hitachi Maxell Ltd Program control system
JPH03248249A (en) 1990-02-27 1991-11-06 Mitsubishi Electric Corp Ic memory card
JPH0424889A (en) 1990-05-21 1992-01-28 Toshiba Corp Ic card provided with personal identification function
ATE100229T1 (en) 1990-07-20 1994-01-15 Siemens Nixdorf Inf Syst METHOD OF PREVENTING UNAUTHORIZED DEVIATIONS FROM THE RUN LOG OF AN APPLICATION IN A DATA EXCHANGE SYSTEM.
US5163098A (en) 1990-09-06 1992-11-10 Dahbura Abbud S System for preventing fraudulent use of credit card
FR2666671B1 (en) 1990-09-12 1994-08-05 Gemplus Card Int METHOD FOR MANAGING AN APPLICATION PROGRAM LOADED IN A MICROCIRCUIT MEDIUM.
FR2667171B1 (en) 1990-09-25 1994-08-26 Gemplus Card Int PORTABLE MEDIUM WITH EASILY PROGRAMMABLE MICRO-CIRCUIT AND METHOD FOR PROGRAMMING THIS MICRO-CIRCUIT.
FR2667417B1 (en) 1990-10-02 1992-11-27 Gemplus Card Int MICROPROCESSOR CARD DESIGNED TO RECEIVE MULTIPLE PROGRAMS IN PROGRAMMABLE MEMORY.
US5131038A (en) 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
JP3114991B2 (en) 1990-11-30 2000-12-04 株式会社東芝 Data communication system
FR2673476B1 (en) 1991-01-18 1996-04-12 Gemplus Card Int SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD.
FR2671889A1 (en) 1991-01-22 1992-07-24 Pailles Jean Claude METHOD OF EXCHANGING RIGHTS BETWEEN MICROPROCESSOR CARDS.
US5224162A (en) 1991-06-14 1993-06-29 Nippon Telegraph And Telephone Corporation Electronic cash system
US5142578A (en) 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
US5200999A (en) 1991-09-27 1993-04-06 International Business Machines Corporation Public key cryptosystem key management based on control vectors
US5201000A (en) 1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase
JP3083187B2 (en) 1991-09-30 2000-09-04 富士通株式会社 Key management method of electronic wallet system
DE69231118T2 (en) 1991-10-18 2000-12-14 Fujitsu Ltd Message distribution system with cordless message-transmitting substations and message-receiving terminal devices
FR2683357A1 (en) 1991-10-30 1993-05-07 Philips Composants MICROCIRCUIT FOR PROTECTED PROGRAMMABLE MEMORY CHIP CARD.
US5164988A (en) 1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
EP0722596A4 (en) 1991-11-12 1997-03-05 Security Domain Pty Ltd Method and system for secure, decentralised personalisation of smart cards
GB9126779D0 (en) 1991-12-17 1992-02-12 Int Computers Ltd Security mechanism for a computer system
FR2687816B1 (en) 1992-02-24 1994-04-08 Gemplus Card International METHOD FOR PERSONALIZING A CHIP CARD.
US5396558A (en) 1992-09-18 1995-03-07 Nippon Telegraph And Telephone Corporation Method and apparatus for settlement of accounts by IC cards
FR2697357B1 (en) 1992-10-23 1994-12-23 Gemplus Card Int Software acquisition process and computer system for implementing the process.
ATE237854T1 (en) 1992-10-26 2003-05-15 Intellect Australia Pty Ltd HOST-USER TRANSACTION SYSTEM
US5371797A (en) 1993-01-19 1994-12-06 Bellsouth Corporation Secure electronic funds transfer from telephone or unsecured terminal
US5420405A (en) 1993-02-26 1995-05-30 Chasek; Norman E. Secure, automated transaction system that supports an electronic currency operating in mixed debit & credit modes
JPH06251206A (en) 1993-02-26 1994-09-09 Fujitsu Ltd Processing system for card displaying plural functions
JP3421378B2 (en) 1993-03-23 2003-06-30 株式会社東芝 Transmission control method
JPH0744672A (en) 1993-07-28 1995-02-14 Oki Electric Ind Co Ltd Ic card and ic card system
US5544246A (en) 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5485520A (en) 1993-10-07 1996-01-16 Amtech Corporation Automatic real-time highway toll collection from moving vehicles
GB9320982D0 (en) 1993-10-12 1993-12-01 Ibm A data processing system
GB2284689B (en) 1993-12-07 1998-02-18 Inventec Corp Ic card back-up generating and programming device
EP1235177A3 (en) 1993-12-16 2003-10-08 divine technology ventures Digital active advertising
US5578808A (en) 1993-12-22 1996-11-26 Datamark Services, Inc. Data card that can be used for transactions involving separate card issuers
US5530232A (en) 1993-12-22 1996-06-25 Datamark Services, Inc. Multi-application data card
US5557516A (en) 1994-02-04 1996-09-17 Mastercard International System and method for conducting cashless transactions
DE69402955T2 (en) 1994-02-08 1997-08-14 Belle Gate Invest Bv Data exchange system with portable data processing units
US5511121A (en) 1994-02-23 1996-04-23 Bell Communications Research, Inc. Efficient electronic money
JP3600266B2 (en) * 1994-04-08 2004-12-15 株式会社ルネサステクノロジ Contactless IC card interface device and communication system using the same
US5568634A (en) * 1994-04-21 1996-10-22 Gemplus Card International Method of writing in a non-volatile memory, notably in a memory card employing memory allocation strategies on size and occupancy basis
FR2720848B1 (en) 1994-06-03 1996-07-26 Gemplus Card Int Method of conducting a transaction between a smart card and an information system.
FR2725537B1 (en) 1994-10-11 1996-11-22 Bull Cp8 METHOD FOR LOADING A PROTECTED MEMORY AREA OF AN INFORMATION PROCESSING DEVICE AND ASSOCIATED DEVICE
US5715314A (en) 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5517011A (en) 1994-11-21 1996-05-14 Oki Electric Industry Co. Ltd. Slotless card reader
US5705798A (en) 1994-12-16 1998-01-06 Mastercard International Inc. System and method for processing a customized financial transaction card
US5546523A (en) 1995-04-13 1996-08-13 Gatto; James G. Electronic fund transfer system
US5708780A (en) 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US5692132A (en) 1995-06-07 1997-11-25 Mastercard International, Inc. System and method for conducting cashless transactions on a computer network
US5799314A (en) 1995-06-30 1998-08-25 Sun Microsystems, Inc. System and method of controlling mapping of data buffers for heterogenous programs in digital computer system
US5699528A (en) 1995-10-31 1997-12-16 Mastercard International, Inc. System and method for bill delivery and payment over a communications network
US5704046A (en) 1996-05-30 1997-12-30 Mastercard International Inc. System and method for conducting cashless transactions
US5923884A (en) * 1996-08-30 1999-07-13 Gemplus S.C.A. System and method for loading applications onto a smart card

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987007061A1 (en) * 1986-05-16 1987-11-19 American Telephone & Telegraph Company Security file system for a portable data carrier
US4901276A (en) * 1986-06-20 1990-02-13 Kabushiki Kaisha Toshiba Portable electronic apparatus having a function of checking for empty areas in which to write data
EP0261030A2 (en) * 1986-09-16 1988-03-23 Fujitsu Limited System for data field area acquisition in IC card for multiple services
EP0275510A2 (en) * 1987-01-20 1988-07-27 International Business Machines Corporation Smart card having external programming capability and method of making same
EP0292248A2 (en) * 1987-05-19 1988-11-23 THE GENERAL ELECTRIC COMPANY, p.l.c. Data processing system
EP0354793A2 (en) * 1988-08-12 1990-02-14 Hitachi Maxell Ltd. IC card and method for rewriting its program
EP0559205A1 (en) * 1992-03-06 1993-09-08 Kabushiki Kaisha Toshiba Data processing system

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1006478A3 (en) * 1998-12-01 2001-02-28 Kabushiki Kaisha Toshiba IC card, portable device, and data updating method for IC card
EP1006478A2 (en) * 1998-12-01 2000-06-07 Kabushiki Kaisha Toshiba IC card, portable device, and data updating method for IC card
US7516444B2 (en) 1999-05-11 2009-04-07 Microsoft Corporation Interlaced protocol for smart card application development
US6547150B1 (en) 1999-05-11 2003-04-15 Microsoft Corporation Smart card application development system and method
WO2000069183A3 (en) * 1999-05-11 2001-01-18 Nokia Mobile Phones Ltd Storage media
WO2000068902A1 (en) * 1999-05-11 2000-11-16 Microsoft Corporation Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card
US6845498B1 (en) 1999-05-11 2005-01-18 Microsoft Corporation Method and apparatus for sharing data files among run time environment applets in an integrated circuit card
US6938244B1 (en) 1999-05-11 2005-08-30 Microsoft Corp. Interlaced protocol for smart card application development
US6961587B1 (en) 1999-05-11 2005-11-01 Nokia Mobile Phones Ltd. Storage media
WO2000069183A2 (en) * 1999-05-11 2000-11-16 Nokia Corporation Storage media
US7454741B2 (en) 1999-05-11 2008-11-18 Microsoft Corporation Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card
US7703086B2 (en) 1999-05-11 2010-04-20 Microsoft Corporation Method and apparatus for sharing data files among runtime environment applets in an integrated circuit card
US6975849B1 (en) 1999-05-21 2005-12-13 Robert Bosch Gmbh Method for customizing a car radio to individual requirements
WO2000072276A1 (en) * 1999-05-21 2000-11-30 Robert Bosch Gmbh Method for customising a car radio to individual requirements
US9471910B2 (en) 1999-10-25 2016-10-18 Smartflash, LLC Data storage and access systems
US7975057B2 (en) 2000-02-03 2011-07-05 Gemalto Sa Time management at communication protocol layer for a smart card-type device
FR2804819A1 (en) * 2000-02-03 2001-08-10 Gemplus Card Int TIME MANAGEMENT AT COMMUNICATION LEVEL FOR CHIP CARD ENTITIES
WO2001057810A1 (en) * 2000-02-03 2001-08-09 Gemplus Time management at communication level for a smart card-type entity
US7046810B2 (en) 2000-04-06 2006-05-16 Sony Corporation Data processing method and system of same portable device data processing apparatus and method of same and program
FR2810138A1 (en) * 2000-06-08 2001-12-14 Bull Cp8 Method for storing secret data, such as an encryption key in memory of a silicon chip integrated system, especially a smart card, in which the data is stored, more securely, in two parts in both ROM and EEPROM memory elements
WO2001095273A1 (en) * 2000-06-08 2001-12-13 Bull Cp8 Method for secure storage of sensitive data in a silicon chip integrated system storage, in particular a smart card, and integrated system therefor
US7260727B2 (en) 2000-06-08 2007-08-21 Cp8 Technologies Method for secure storage of sensitive data in a memory of an embedded microchip system, particularly a smart card, and embedded system implementing the method
WO2002005225A1 (en) * 2000-07-11 2002-01-17 Kaba Schliesssysteme Ag Method for the initialisation of mobile data supports
US7631187B2 (en) 2000-07-11 2009-12-08 Kaba Schliesssysteme Ag Method for the initialisation of mobile data supports
US7000071B2 (en) 2000-08-22 2006-02-14 Giesecke & Devrient Method for virtually enlarging the stack of a portable data carrier
WO2002019264A1 (en) * 2000-08-22 2002-03-07 Giesecke & Devrient Gmbh Method for virtually enlarging the stack of a portable data carrier
WO2002035464A2 (en) * 2000-10-23 2002-05-02 Omega Electronics S.A. Non-contact electronic identification system
WO2002035464A3 (en) * 2000-10-23 2003-05-01 Omega Electronics Sa Non-contact electronic identification system
FR2816785A1 (en) * 2000-11-10 2002-05-17 Bull Cp8 Communication protocol for smart card uses additional communication layer to provide additional commands for reading proactive smart card
WO2002039369A1 (en) * 2000-11-10 2002-05-16 Cp8 Technologies Communication protocol between a proactive smart card and its host terminal
FR2817055A1 (en) * 2000-11-22 2002-05-24 Gemplus Card Int Execution of an application in a portable electronic device, such as a chip card, when the card does not have sufficient memory to load the entire application, by sequential loading of parts of the code in a secure manner
WO2002042912A1 (en) * 2000-11-22 2002-05-30 Gemplus Executing an application in a portable electronic object with low storage capacity
WO2002097746A1 (en) * 2001-06-01 2002-12-05 Anton Gunzinger System and method for transmitting information, and information carrier
EP1271429A1 (en) * 2001-06-21 2003-01-02 Fujitsu Limited Card system, card information presentation apparatus, card issuing apparatus, card contents update apparatus, card data update apparatus and card information distribution system
US6622914B2 (en) 2001-06-21 2003-09-23 Fujitsu Limited Card system, card information presentation apparatus, card issuing apparatus, card contents update apparatus, card data update apparatus and card information distribution system
EP1365362A1 (en) * 2002-05-15 2003-11-26 Omega Electronics S.A. Contactless electronic identification system
WO2004003861A1 (en) * 2002-07-01 2004-01-08 Sospita As Process for compiling and executing software applications in a multi-processor environment
EP3050012A1 (en) * 2013-09-24 2016-08-03 Mastercard Asia Pacific Pte. Ltd. A method for electrically personalizing a payment chip and a payment chip
EP3050012A4 (en) * 2013-09-24 2017-05-17 Mastercard Asia Pacific Pte. Ltd. A method for electrically personalizing a payment chip and a payment chip

Also Published As

Publication number Publication date
US6742715B2 (en) 2004-06-01
AU7776998A (en) 1998-12-08
US6488211B1 (en) 2002-12-03
US20030024980A1 (en) 2003-02-06
WO1998052160A3 (en) 1999-05-14

Similar Documents

Publication Publication Date Title
US6488211B1 (en) System and method for flexibly loading in IC card
US7689826B2 (en) Flexibly loading a tamper resistant module
AU736325B2 (en) Multi-application IC card system
US6578768B1 (en) Method and device for selecting a reconfigurable communications protocol between and IC card and a terminal
EP0981805B1 (en) Ic card with shell feature
EP0985202B1 (en) Multi-application ic card with delegation feature
EP0981807B1 (en) Integrated circuit card with application history list
US5687398A (en) Device having automatic process for upgrading the performance of mobile systems
EP1873728A1 (en) Method for configuring an IC Card in order to receive personalization commands
US6761319B2 (en) Configuration of IC card
KR20010013827A (en) Chip card comprising means for managing a virtual memory, associated communication method and protocol
AU764307B2 (en) Method and device for selecting a reconfigurable communications protocol between an IC card and a terminal
EP1384197B1 (en) Method of manufacturing smart cards
WO1998052152A2 (en) Communication between interface device and ic card

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998548937

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA