The application is that the application number of applying on September 24th, 2006 is 11/534, the partial continuous application of the common pending application of 653 U.S. Patent application, existing U.S. Patent number is 8,118,218, also that application number on April 23rd, 2007 application is the part continuation application of 11/739,044 U.S. Patent application.
[embodiment]
Detailed description of the present invention is mainly come the running of direct or indirect simulation technical solution of the present invention by program, step, logical block, process or other symbolistic descriptions.Be the thorough the present invention that understands, stated a lot of specific detail in ensuing description.And when there is no these specific detail, the present invention may still can realize.Affiliated those of skill in the art use herein these descriptions and statement effectively to introduce their work essence to the others skilled in the art in affiliated field.In other words, be the purpose of the present invention of avoiding confusion, due to the method for knowing and easily understanding of program, so they are not described in detail.
Alleged " embodiment " or " embodiment " refer to be contained in special characteristic, structure or the characteristic at least one implementation of the present invention herein.Different local in this manual " in one embodiment " that occur not are all to refer to same embodiment, neither be independent or the embodiment mutually exclusive with other embodiment optionally.In addition, the sequence of modules in method, flow chart or the functional block diagram of the one or more embodiment of expression also revocablely refers to any particular order, also is not construed as limiting the invention.Key set herein refers to a group key.
Introduce each embodiment of the present invention below with reference to Figure 1A-7.Yet the those of ordinary skill in affiliated field is understood that easily it is only indicative that the details of listing according to these accompanying drawings is described here, and the present invention is not limited in these embodiment.
When having near-field communication (Near Field Communication, being called for short NFC) mobile phone of function is used for controlling and during other infusive new services, NFC demonstrates great business opportunity such as payment services, traffic ticketing service, credit services, physical access.In order to support the business environment of this quick differentiation, (the manufacturer of manufacturer that comprises the mobile phone of financial institution, the various NFC of having functions, or title producer), software developer (developer, or claim the developer) and a plurality of entities of Mobile Network Operator (Mobile Network Operators is called for short MNO) participate in moving the ecosystem into NFC.Due to they independent role's characteristic, these participants need to exchange mutually and with a kind of reliable, interoperable mode exchange message.
Being downloaded to and being stored in the data of the cell-phone with NFC function of carrying out contactless sexual transaction (contactless transactions) and the confidentiality of sensitive application and the continuation raising of fail safe is all of equal importance for above-mentioned each entity.Provide fail safe and confidentiality in mobile phone can be called as safety element (Secure Element is called for short SE) with the assembly of supporting various business prototype.
Figure 1A shows the simple architecture of calculation element 100.Unless stated otherwise, the use that " calculation element ", " mobile device ", cellular phone or " cell-phone " general can substitute mutually in this article, yet can understanding above-mentioned vocabulary, the those of ordinary skill in affiliated field also can refer to other devices, such as smart phone, notebook computer, contactless property smart card and other mancarried devices.
Described mobile device 100 comprises NFC controller 101, and this NFC controller 101 makes the described mobile device 100 can be with other device wireless communication with swap data.Such as, the user can buy payment as stored value card (e-purse) with described mobile device 100.When operation, described stored value card is controlled by safety element 102.Described safety element 102 can be so that such a mobile device 100 be carried out financial transaction, traffic ticketing service, credit services, physical access control and other infusive services in a kind of safe mode.For such service is provided, described safety element 102 can be supported various Java applet programs, application or module (only showing two examples 104 and 106 in Figure 1A).When realizing, these modules can be the hardware modules that embeds or insert in it, can be also the software modules of downloading from one or more servers by data network.
When buying the earliest mobile device or the earliest mobile device being consigned to the client, one group of default key (a set of default keys is installed on the safety element 102 of described mobile device, or be called the default key collection), such as the issuer security domain that is arranged by safety element producer (manufacter) (Issuer Security Domain is called for short ISD) key set.When realizing, described safety element 102 can be the form of smart card, integrated circuit (IC) or software module, by rewriteeing partly or entirely can it be upgraded in this software module.In one embodiment, described safety element 102 is tamper resistant smartcard chips, and level of security according to demand, this intelligent card chip can embed the card level and use (such as payment, transmission).As shown in Figure 1A, described safety element 102 embeds or coordinates the relevant application of contactless property NFC, and is connected with described NFC controller 101 with as contactless property front end.
Typically, standard compliant safety element and an issuer security domain (issuer security domain, be called for short ISD) and the selection of one or more additional security domain (supplemental security domains, abbreviation SSD) supply with together.Each territory comprises a group key (a set ofkey, or title key set).In one embodiment, described safety element 102 is the chips that embed in small card in described mobile device 100 or insert mobile device 100 by card interface 109.In another embodiment, described safety element 102 is or comprises software module in the secure memory space 107 that is loaded in described mobile device.Can be by the network interface 103 (such as 3G network or LTE (Long Term Evolution) network) in described mobile device 100 from given server down loading updating assembly to upgrade described software module.
Described safety element 102 needs before use through individualized (Personalization or Personalizing) process.In one embodiment, described personalization process is that the individualized key set (derived personalized key set) of derivation according to the card issuer who selects (such as so-called safety element publisher) loads for described safety element 102 or upgrades a key set.Such personalization process also can be called layoutprocedure.According to an embodiment, when being installed, application or enabled services (install and individualize such as using) carry out described layoutprocedure with the described safety element that individualizes with online mode (Over the air).When making described safety element relate to a safety element publisher, just carry out the individualized of described safety element.When the user orders or application is installed, need to use to carry out to use for each and install and configure.
In one embodiment, when upgrading or promoting described safety element 102, for avoiding the individualized described safety element 102 that starts anew, only with one or some assemblies in the new described safety element 102 of renewal replacement.When realizing, can be automatically or manually obtain these new renewals, and they are loaded into described mobile device 100.
In one embodiment, according to corresponding safety element publisher and TSM, the mobile device with NFC function can be from server or TSM entrance (TSM portal) down load application.TSM refers to credible Service Management (Trusted Service Management), is a kind of set of service.The dominant role of described TSM is that helping service supplier (service provider) is for the issue of client's safety of their use mobile network with manage contactless sex service.Described TSM or its server needn't need to participate in using the actual contactless sexual transaction (transaction) of NFC device.These transaction are processed by the system that ISP and their business partner provide usually.Another role of described TSM is successful deployment and the lifting of using by accelerate mobile NFC as the business go-between, and the other side that it is conducive to the commercial relations between contractual arrangement and different each side makes mobile network's commercial affairs become possibility like this.
Can arrive service centre and carry out described personalization process, also can be by the described personalization process of webpage entrance (web portal) long-range execution of TSM server.Under the first scene, the client can arrive service centre, allows service represent the interior safety element of individualized mobile device.At the computer that is connected with the NFC card reader that is arranged in given place (such as service centre), configuration manager (provisioning manager) can be the application of installing or the application based on webpage that is connected to rear end TSM.Described configuration manager is used for carrying out communication (such as passing through card reader) with the safety element of mobile device.The process that such personalization process also can be called as (Over the Internet) Network Based.
Under the second scene, the client registers his/her mobile phone by server (TSM webpage entrance).Described TSM server can be sent to registered mobile phone with the generic resource identification code (universal resource identifier is called for short URI) of configuration manager.Based on the type of described mobile device, send mode can be that short message service sends (Short Message Service Push) or Google's Android sends (Google Android Push).Described client can be downloaded to described configuration manager in described mobile device, and begins described personalization process.Such personalization process is called as based on wireless process.
Under any scene, described configuration manager is as the safety element of mobile device and the agency between the TSM server.Refer now to shown in Figure 1B, it shows flow process or the process 110 of individualized safety element according to an embodiment of the invention.When realizing, described process 110 can be realized by the combination of software or software and hardware.When the user receives a new NFC device (such as the part of mobile device), need individualized its interior described safety element.
In operation 112, determine whether described new NFC device is real NFC device.An example is to check the sequence number (serial number) relevant to described NFC device.Described sequence number can authenticate by the database relevant to the TSM server.In the example of NFC mobile device, the device sequence number of described mobile device can be used for authenticating.The described NFC device of hypothesis is a real NFC device now, can be identified by the move operation person.Described process 110 will enter operation 114, make described NFC device and private server carry out communication.In one embodiment, described private server is the part of TSM system, and can conduct interviews to it by wireless network, the Internet or wireless and wired combination (referred to herein as data network or referred to as network).
In operation 116, make described NFC device to described server registration.In case described NFC device becomes the part of described TSM system, various services and data can be carried out communication by network and described NFC device.As the part of personalization process, in operation 118, the device information of the described safety element of described server request.In one embodiment, described server sends request of data (such as information on services, WAP PUSH) to described NFC device.Respond described request of data, described NFC device is beamed back card product life cycle (Card Product Life Cycle the is called for short CPLC) information of extracting from described safety element.Described CPLC information comprises safety element product information (such as smart card ID, producer's information and batch number etc.).Based on described CPLC information, described server can extract from its producer, warranty of attorney (authorized distributor) or ISP correspondence acquiescence issuer security domain (Issuer Security Domain the is called for short ISD) information of this safety element.When realizing, described server and safety element producer have two kinds of communication modes, specifically suitable part are hereinafter described in detail.
In operation 120, determine whether to upgrade described device information by described producer.Usually, when a safety element was sent by its producer, described safety element embeds some default apparatus information.If definite described default apparatus information (such as the CPLC data) need to be upgraded with described producer, described process 110 enters operation 122, and described producer is uploaded to described server with corresponding updating device information.In operation 124, described updating device communication to described NFC mobile device, and is stored in described safety element.If determine that the default apparatus information of described safety element does not need to upgrade with described producer, described process 110 enters operation 124, and the default apparatus information of extracting is stored in the database relevant to the TSM server.In one embodiment, described server comprises the interface that obtains derivative key collection (derived keyset).In one embodiment, according to the device information of described safety element (such as, ISD) produce described derivative key collection.When successfully installing derivation ISD key set in described safety element, notify corresponding safety element publisher described derivation ISD key set to use.
According to one embodiment of present invention, in operation 126, described device information (acquiescence or upgrade) is used for producing key set (or claiming a group key).In one embodiment, described server be used for using acquiescence ISD he hardware security module (HSM) and described safety element between set up escape way.Described server also is used for calculating the derivative key collection into described safety element.Service based agreement, the main ISD key of the publisher of safety element can be arranged in the local hardware security module of the hardware security module relevant to described server or described safety element publisher.Described hardware security module is a kind of safety encipher processor, and it is used for the administering digital key, accelerates ciphering process, and the authentication that the pass key-encrypting key that the access services device is used is provided effect.If be arranged in the hardware security module in described server, described server is used for the described hardware security module of instruction and removes to calculate described derivative key collection.Subsequently, described server provides a kind of mechanism (such as PUT KEY APDU) and uses default channel, substitutes default key collection in described safety element with described derivative key collection.If the main ISD key of described safety element publisher (SE issurer) is in the local hardware security module of described safety element publisher, described server also is used for hardware security module with far-end alternately to extract described main ISD key.
In operation 128, with the described safety element of being passed to of described key set safety.The key set individual is dissolved in described safety element, described key set is for the various safety operations that utilize the NFC device to carry out or service like this.In operation 130, described server be used for described safety element is synchronizeed with its publisher or provider (such as, the notice of relevant safety element state is sent to described publisher or provider).
After individualized, can use the individualized ISD key of described SE publisher to visit described safety element.Based on each service provider's demand for security, described TSM can provide extra SSD with individualized their respective application (such as, the module 104 or 106 in Figure 1A) for each provider.
As indicated above, have dual mode can be used for described producer's reciprocal process in extract corresponding acquiescence ISD information from described safety element.Based on architecture, the producer can choice for use real-time mode (real-time approach) or batch processing mode (batch approach).
In real-time mode, when the individualized described safety element of described TSM server, described server is provided for carrying out communication with producer's (such as its server).Like this, described default key collection is to extract from producer's server through requiring.In one embodiment, described TSM server comprises the plug-in unit module that carries out communication with each producer.
In batch processing mode, can carry out with line model, also can carry out with off-line mode.Under off-line mode, described safety element producer is all safety element transmission acquiescence ISD information of supporting by encrypted medium.The manager of described TSM or calculation element can be provided for calculation element of the input information in described physical media.Subsequently, decipher and extract described acquiescence ISD information, and be stored in a database.Under line model, described SE manufacturer uploads the acquiescence ISD information of the safety element of its support by network.Subsequently, decipher and extract described acquiescence ISD information, and be stored in a database.Then, described TSM only need to access in the safety element personalization process at its oneself hardware security module or database.Fig. 1 C has showed the relation between when off-line and line model SE producer, TSM manager, TSM system.
According to one embodiment of present invention, Fig. 1 D shows the data flowchart between the user, NFC device, TSM server of NFC device (such as the NFC mobile phone), corresponding SE producer and SE publisher.
On the one hand, can think that safety element 102 in Figure 1A is the preload operating system in smart card, it provides the PIN management and is used for the escape way of card individualized (card personalization) platform of (or claiming security domain).The interest of described safety element 102 combined with intelligent card issuers, seller, industry group, public entities and scientific ﹠ technical corporation is for running on a plurality of application definition demands and the technical standard on smart card.
As an example, as one group of agreement of a module 104 definition of stored value card safety, this group agreement makes the small amount payment transaction to carry out by wired or wireless environment.For the stored value card that is stored in smart card, after described stored value card is released, a group key (symmetry or asymmetrical) individual is dissolved described stored value card.In process of exchange, in order to make described stored value card and safety certification module (Security Authentication Module, SAM) or the information channel safety between back-end server, described stored value card uses one group of key separately to be encrypted with MAC to calculate.For single function card, described stored value card security module 104 is used as the door of protecting the practical operation of carrying out on single function card.During individualized, by the electronic-purse transaction key, described single function card access key (or his conversion) individual is dissolved described stored value card.
Fig. 1 E shows SAM or network electronic wallet server 152 based on platform according to one embodiment of present invention, as entrance guard's stored value card 154 and single functional label 156, and the personal data flow process 150 between these three entities.Described SAM or the communication between network electronic wallet server 152 and stored value card 154 based on platform will be according to the order of a type (such as APDU, application protocol is counted a tree name unit) carry out, and the communication between stored value card 154 and single functional label 156 will be carried out according to the order of another kind of type, wherein said stored value card plays entrance guard's effect, to guarantee only having safe and reliable and just can be allowed to carry out through the data interaction of authorizing.
In one embodiment, the physical security of stored value card realizes in a simulator.Simulator used herein refers to other a modules expectation hardware unit or one section program mutual with it, or to call oneself be that another installs or program especially.Described stored value card be safely be used for providing electronic purse function and and one or more java applet applet of paying server communication between realize.Support the safety element of stored value card to be responsible for upgrading safe key to set up mutual appropriate channel between paying server and java applet applet, wherein the stored value card program goes to regulate or control described exchanges data as the entrance guard.
Shown in Fig. 2 A, it shows a mobile ecosystem 200, and the related side who wherein participates in the described mobile ecosystem lists successively.In one embodiment, allow a NFC device to download or install one or more application from corresponding given server 202 (such as the application management supplier), wherein these application are to be developed at first by application developer 204, and by ISP 210, application management supplier 202 or other related sides issue.Suppose to have safety element 206 that safety element supplier 208 provides individualized via TSM or trusted third party (such as, financial institution 212).
In case install an application on described NFC device, next step will be by the described application of described safety element configuration.The layoutprocedure of using can begin in several ways.A kind of mode wherein is that a safety element owner selects an application on mobile device from the TSM entrance, and the beginning layoutprocedure.Another kind of mode is that described safety element owner receives the application configuration notification of using supplier's TSM from representative on mobile device.
Described TSM or application supplier can issue their application on the TSM entrance, have safety element and/or sign on the mobile device of user's request (such as SE owner) for downloading to.In one embodiment, described TSM provides cloud service for a plurality of SE publishers.Like this, can obtain from the TSM porch from many application of each ISP.Yet when logining described TSM entrance, the safety element owner is the application to see that those authenticate through his safety element supplier only.Based on the agreement between safety element and ISP, use the SSD key set of the ISD key set of safety element or ISP's appointment can realize the download of using/installations/individualize.If the SSD key set is not installed, can in one is used the process of installing, it be installed in described safety element.
Described TSM knows safety element for the store status of each SSD.Based on the storage allocation strategy of SSD and the store status of described safety element, can be labeled as different indications for the useful application for various SSD in using the shop, such as " can install " or " storage being installed not enough ".Can prevent the failure that the user is unnecessary like this.
In case an application is installed on a NFC device, and described application initiates self layoutprocedure, or the TSM server sends configuration notification for described NFC device by cellular network or radio data network.According to the type of described NFC device, the mode of a variety of transmission message (PUSH message, or be called promote message) is arranged so that described NFC device begins described layoutprocedure.An example of sending method comprises that note sends or Android Google sends.In case the user receives described notice, described layoutprocedure begins.When seeing fit, will describe layoutprocedure in detail.
As a part of described application configuration, the TSM server is carried out some protective mechanisms.One is to prevent the unexpected locking of safety element.Another is if stop the download of using when there is no enough memory spaces in safety element.
If during escape way is set up, too many mutual authentification failure is arranged, safety element may permanent locking oneself.In order to prevent the unexpected locking of described safety element, when setting up escape way between two sides (entities), described TSM continues to follow the tracks of the number of the authentification failure between safety element and TSM.In one embodiment, if reach preset limit, described TSM will refuse any further request.If service centre manual restart described safety element, described TSM can continue treatment S E request.
Described TSM also continues to follow the tracks of the storage use of each safety element.Described TSM determines based on the memory allocation of being distributed to each ISP by described SE publisher whether an application can be installed on a safety element.According to an embodiment, the strategy of three types is arranged:
Fixed storage space of preassignment, this is to guarantee the space;
Minimized storage space of preassignment, this is to guarantee minimum space;
Best endeavors.
The described TSM webpage entrance of described safety element publisher's use is completed this work.
1. for a collection of safety element, described safety element publisher can be for storage policy of ISP's preassignment to install its application by TSM webpage entrance;
2. when an application was installed in the mobile device request, whether the corresponding ISP's of TSM server authentication space met its storage policy; If do not meet, refuse this request;
Otherwise, described TSM server will be processed described configuring request;
4. if configuration successful, described TSM will accumulate the storage size of this application service.
Move application (if it is installed) when a mobile subscriber subscribes to one, this application need to configure via the safety element on mobile device before described application is used.In one embodiment, described layoutprocedure comprises four Main Stage;
If necessary, create additional security domain (SSD) on described safety element;
Download and install an application on described safety element;
In the individualized described application of described safety element;
Download UI (user interface) assembly to mobile device.
Fig. 2 B shows flow process or the process 220 of the one or more application of configuration according to an embodiment of the invention.Described process 220 can be implemented as the combination of software or software and hardware.In one embodiment, described application layoutprocedure 220 need to enter configuration manager on mobile device (such as the agency) with its in safety element mutual.
As shown in Fig. 2 B, at operation 222 places, described application layoutprocedure 220 can be that automatic or manual begins.Such as, supposing that it also is not configured, the user can install to spend and ordered related service starting described layoutprocedure by selecting one, or starts described layoutprocedure when using activating described the installation.In another embodiment, use the supplier send an information (such as note) to described mobile phone to begin described layoutprocedure.
Under any circumstance, described program 220 enters operation 224, extract from the safety element of mobile device described device information (such as, CPLC) after, set up and communicate by letter with private server (such as the TSM server or by the server of using publisher's operation).At operation 226 places, described device information is transferred into described server together with identifying the identifier of using.In operation 228, at first described server identifies the publisher of described safety element based on described device information, to determine whether described safety element is individualized in 230 operations.If described safety element is not also individualized, described process 220 enters operation 232, and with individualized described safety element, an embodiment of described operation 232 can realize according to the process 110 in Figure 1B.
Suppose that now the safety element in mobile device is individualized.Described process 220 enters operation 234, uses derivation ISD and described safety element to set up escape way here.Whom provides hardware security module HSM (such as TSM or SE publisher) for ISD according to, and it is that described safety element calculates and derives from ISD that described server will contact that described hardware security module goes, and uses this derivation ISD and described safety element to set up escape way.Subsequently, in operation 236, whether described server inspection has a SSD relevant to this application.If SSD corresponding to this application neither one, described server will check database and see whether it has been installed on described safety element.If need SSD to install, described flow process 220 enters 240 and removes to install described SSD.In one embodiment, remind the installation of the described SSD of described user (key).In operation 238, suppose that the user refuses to install described SSD, described process 220 stops and entering operation 222, restarts described layoutprocedure 220.
Now suppose to carry out the SSD process of installing in operation 240.Described SSD is installed similar with installation ISD.Described TSM server contact has the hardware security module HSM of main SSD key in it, is that described safety element calculates and derives from the SSD key set.Described main SSD key can be in TSM, ISP or safety element publisher, and this depends primarily on each side and how to reach an agreement on.
For download/installation in safety element is used, in operation 242, described server is used for using derivation SSD and described safety element to set up escape way.In one embodiment, this is similar to and how sets up escape way based on deriving from ISD.In operation 244, prepare the data of described application, its details will be described in more detail below.According to an embodiment, the described ISP of described server contact is to prepare storage market demand protocol Data Unit APDUs.According to being installed on application in mobile device, described server can repeat issue storage data with individualized described application.If successful execution described configurator, comprise that the excessive data of a suitable interface (such as, the user interface of the application of each mobile device) can be downloaded.In operation 246, described server uses to one the state that the supplier notifies the application that has been configured.
Fig. 2 C shows when one of configuration is used mutual data flow 250 between difference side.
As the operation 244 in Fig. 2 B, the important application that configuration is used is to prepare the customized application data into the targeted security element.Such as, for electronic wallet application, the personal data of this application comprises the various personalized transaction keys that the device information (such as CPLC information) based on safety element produces.In order to carry stored value card, the part of personal data comprises the Mifare access key of the identifier that is derived from the Mifare card, and the described server Java card sheet that both can individualize is used, and the Mifare4Mobile service goal also can individualize.Usually, has the mode of two kinds of different preparation data at least, with convenient transaction subsequently.
For data are prepared, the mutual two kinds of patterns of one embodiment of the present of invention support and described ISP are to calculate individualized application data.For the first pattern, described TSM server is not directly accessed the hardware security module related with the ISP.Described ISP can make with the mutual server of its hardware security module produce use key (such as, transmission, stored value card or Mifare key).Described TSM data prepare to realize to be that the agreement of using application programming interfaces (API) or server to provide goes for to ask to derive from and uses key (derived application key).The second pattern is that data are prepared to realize directly accessing the hardware security module relevant to the ISP to produce the application key.
According to an embodiment, Fig. 2 D shows the mutual data flow 255 in difference side when preparing application data in application process of configuration.Fig. 2 D is first mode, and wherein said TSM server is not directly accessed the hardware security module related with the ISP.Except described application data prepare to realize will be directly and ISP's hardware security module alternately, the second pattern has similar flow process.
Except supporting layoutprocedure, one embodiment of the present of invention are also supported the Life Cycle Management of safety element.Described Life Cycle Management includes but not limited to, safety element locking, safety element release and application deletion (disable).Can notify to begin these activities by TSM.In the actual use of mobile device, Fig. 2 E shows flow process or the process 260 that application has been installed in locking.NFC device may have been installed the application on safety element of running on of some.Because some reasons (such as, there is no for a long time activity or expire), an application need to be by its publisher or supplier's disable or locking.
The process 260 that one of disable has been installed application starts from operating 262.In one embodiment, described process 260 is manually booted by TSM webpage entrance by the operator.In another embodiment, described process 260 is started automatically by ISP's internal work flow process (such as using TSM web service API).In case described process 260 starts, and sends an information to one a NFC device (in mobile device), an application in it need to be by disable.When realizing, such message can have different-format.In one embodiment, described message is a PUSH order.In another embodiment, described message is a request of the TCP/IP to the described NFC device by network delivery.In operation 264, server (such as the TSM server) sends described message.When realizing, such a message comprises that sign is with the identifier of the application of locked or disable.When receiving such message, in operation 266, card manager on described NFC device agency (card manager proxy) is used for authenticating such information whether really from its original publisher or supplier by replying an information.In one embodiment, described message being sent to the TSM server authenticates.If authentification failure is not namely responded such inquiry, described process 260 will finish.
Suppose that described authentication passes through, namely received to reply from the inquiry for the supplier of described application of described device and confirmed, it is real that described raw requests is proved to be.Usually, in operation 268, such reply confirms to comprise the identifier of the application that will lock.Described TSM server is used for setting up an escape way with safety element.Subsequently, described TSM server is prepared suitable APDUs (such as SET STATUS (state is set), or/and DELETE (deletion)) by described card manager agency for described safety element.In operation 270, described device sends operation requests to described safety element, with the locking application-specific.
In any case, respond described order, in step 272, described safety element SE locking or the described application of disable.According to an embodiment, described SE is caused with application and separates, and makes like this this mounted application no longer can use described safety element.In operation 274, described safety element is used for sending confirms to notify the related side, and this application no longer runs on described device and suffered.In one embodiment, described confirmation is sent to the TMS server, has one to record which application and be installed in which device and the database of the corresponding state of each application in described TMS server.Described database root is according to upgrading from the confirmation (acknowledgement) of described safety element.
Fig. 2 E shows flow process or the process 260 that application has been installed in locking.For the one of ordinary skilled in the art, other operation such as release or enable one application has been installed, extends the time limit that application has been installed, is with the similar process shown in Fig. 2 E.
With reference to Fig. 2 F, Fig. 2 F root a tree name specific embodiment of the present invention has been showed the configuration diagram 280 when portable equipment is carried out ecommerce and Mobile business as stored value card.Described Figure 28 0 has comprised the portable phone 282 of smart card module embedded.An example of this type of portable phone is to support short-range communication (NFC, Near Field Communication), and comprises the portable phone of SmartMX (SMX) module.It can be integrated it should be noted that safety element and use.Unless stated otherwise, ensuing description will can not point out which partly carries out the function of safety element, and which partly is used as is used.The one of ordinary skilled in the art it should be understood that according to hereinafter given suitable part or the function of detailed description and will be performed.
Described SMX module is mounted with Mifare simulator 288 (being single function card) in advance, to be used for storing numerical value (values).Described portable phone is equipped with non-contact interface (for example ISO14443RFID), plays the effect of label to allow described portable phone.In addition, described SMX module is to move the Java card sheet (JavaCard) of Java applet program.Specific embodiment of root a tree name, stored value card is based upon on described global platform (GP), and is embodied as the applet program in described SMX module.Described stored value card is set to can be by the data structure of the described Mifare simulator of cryptographic acess, and described password is obtained through after suitable conversion by described access key.
Wallet administration device MIDlet program 284 is provided in described portable phone 282.In Mobile business, described MIDlet program 284 has been served as the communication agent between stored value card applet program 286 and one or more payment network and server 290, so that the transaction between each side is carried out smoothly.The MIDlet program of indication is the component software that is adapted at moving on portable equipment herein.Described wallet administration device MIDlet program 284 may be implemented as " the MIDlet program " on the Java portable phone, or " executable application programs " on PDA(Personal Digital Assistant) equipment.One of function of described wallet administration device MIDlet program 284 is access of radio network, and with operate in identical equipment or the stored value card applet program on outside intelligent card communicates.In addition, MIDlet program 284 also is set to provide management function, for example changes Personal Identification Number (PIN), checks electronic purse balance amount and transactions history daily record.The card issuing business provides the security identity module (SAM) 292 that is used for supporting and authenticating any transaction of carrying out between card and corresponding with service device (that is paying server) in an example is used.As shown in Fig. 2 F, application protocol is counted a tree name module (APDU) order and is created by server 290 that can access security identification module (SAM) 292, and wherein said APDU module is the communication module between reader and card.The structure of described APDU module is according to the ISO7816 standard formulation.Usually, the APDU order be embedded in internet message and be transferred into described server 290 or described stored value card applet program 286 to accept processing.
In ecommerce, the web agency 294 who moves on the computer (not shown) is responsible for a contactless reader (for example ISO14443RFID reader) and the described webserver 290 mutual.In practical operation, described agency 294 sends the APDU orders by described contactless reader 296 to the described stored value card applet program 286 of moving on portable phone 282, or receives corresponding reply by identical approach from described stored value card applet program 286.On the other hand, but described agency 294 generating network requests (for example HTTP) and receive corresponding reply from described paying server 290.
When individualized portable phone 282, the structure chart 300 in Fig. 3 A has been showed the correlation module interaction, carries out personalized process to complete stored value card by the donor.Structure chart 320 in Fig. 3 B has been showed the correlation module interaction, carries out personalized process with the stored value card of completing as shown in Figure 2 by its user.
Flow process in Fig. 3 C or procedure chart 350 have been showed according to a specific embodiment of the present invention, the process of individualized stored value card applet program.Fig. 3 C suggestion combines together with Fig. 3 A and Fig. 3 B to be understood.Procedure chart 350 can be realized by the mode of software, hardware or software and hardware combining.
As previously mentioned, the wallet administration device builds on global platform, required security mechanism so that individualized stored value card applet program to be provided.In practical operation, security domain be used to the to connect escape way of personalization application server and described stored value card applet program.According to a specific embodiment, comprise one or more operation keys (for example being written into or supplementing with money key and purchase key) through the critical data that individualize and be stored into described stored value card applet program, default Personal Identification Number, managing keys (for example block to remove the PIN key and again be written into the PIN key), and password (for example from Mifare password).
Suppose that the user wants the individualized stored value card applet program that is embedded in portable equipment (for example portable phone).In the step 352 of Fig. 3 C, personalization process is activated.According to the difference of specific implementation, personalization process may realize in the module in portable equipment, and activated by mode manually or automatically, also may be embodied as a physical process that is started by donor (normally with the associated personnel of card issuing business).As shown in Figure 3A, the donor starts personalization process 304, stored value card applet program with personalized user, described personalization process 304 is undertaken by the contactless reader 310 as the interface on existing (existing) new stored value card security identity module 306 and existing security identity module 308.Card management device 311 is carried out at least two functions: (1) sets up escape way by security domain, with in the card personalization process, installs and individualized external application (for example stored value card applet program); And (2) establishment safety measure (for example Personal Identification Number), with the described application program of protection in follow-up operation.Use the result of personalization application server 304 as described personalization process, described stored value card applet program 312 and simulator 314 are individualized.
Similarly, as shown in Fig. 3 B, electronic purse customer wishes to start personalization process, so that stored value card applet program individualizes by wireless mode (for example by the Mobile business path in Fig. 2).Different from Fig. 3 A, Fig. 3 B allows described personalization process to be activated by mode manually or automatically.For example, a device is housed on portable phone, if this device is pressed, activates described personalization process.In another kind of scheme, the condition prompting of " not individualized " can be submitted to the user to start described personalization process.As previously mentioned, MIDlet program 322 in portable equipment (i.e. service managerZ-HU) is served as the agency to assist communicating by letter between paying server 324 and stored value card applet program 312 and simulator 314, and wherein paying server 324 has the authority of accessing existing new stored value card security identity module 306 and existing security identity module 308.Through described personalization process, stored value card applet program 312 and simulator 314 are individualized.
Go back to now the C referring to Fig. 3, after the personalization process shown in Fig. 3 A was activated, contactless reader 310 was activated and reading tag identifier (ID) (being RFID label ID) and critical data the smart card in equipment in step 354.By application safety territory (for example card issuing business's default security settings), stored value card applet program in the new stored value card security identity module that connects in step 356 (for example security identity module 306 in Fig. 3 A) and portable equipment (for example stored value card applet program 312 in Fig. 3 A〉escape way.
Each application safety territory of global platform comprises three DES keys.For example:
Key 1:255/1/DES-ECB/404142434445464748494a4b4c4d4e4f
Key 2:255/2/DES-ECB/404142434445464748494a4b4c4d4e4f
Key 3:255/3/DES-ECB/404142434445464748494a4b4c4d4e4f
Security domain is utilized for two secured session session key generations between entity, described two entities can be card management device applet program and primary application program (host application), wherein said primary application program may be the individualized application program in tabletop machine, may be also the personalized service of the networking that provided by back-end server.
The application domain of acquiescence can be installed by the card issuing business, and distributes to different application/service providers.Each application program owner can be before personalization process the initial period of described process (or) changes the numerical value of set of cipher key separately.Application program can create for the escape way of carrying out personalization process with described new key group afterwards.
By the described escape way of being set up by the application safety territory of application provider, first group of data can be individualized and be deposited in stored value card applet program.Second group of number a tree name can individualize by the same passage equally.But if described data are kept in different security identity module, one is used the new escape way of same key group (or different set of cipher key) can be used to individualized described second group of data.
In step 358, generate one group of e-wallet implementation key and Personal Identification Number by new stored value card security identity module 306, being used for the exchanges data between new stored value card security identity module and stored value card applet program, and the described stored value card applet program that substantially individualizes.
Be established between the stored value card applet program (for example stored value card applet program 312 in Fig. 3 A) of second escape way in existing security identity module (for example security identity module 308 in Fig. 3 A) and portable equipment in step 360.Use described existing security identity module and label ID to generate one group of key after conversion in step 362.Key after described conversion is kept in described simulator with the data access authentication after being used for.Use described existing security identity module and label ID to generate one group of MF password in step 358, and deposit described password in stored value card applet program with the data access authentication after being used for.After aforesaid operations was all completed, described stored value card comprised described stored value card applet program and corresponding simulator, will be set to " individualized " state.
Based on a specific embodiment of the present invention, Fig. 4 A and Fig. 4 B have showed flow process or the procedure chart 400 of raising funds or registering capital to for stored value card together.Process 400 is by the Mobile business path enforcement in Fig. 2.For understanding process 400 better, Fig. 4 C has showed a representative calcspar 450, and in figure, relevant square interacts to complete described process 400.The different situations of practical application according to the present invention, described process 400 may realize by the mode of software, hardware or software and hardware combining.
Suppose that the user has obtained a portable equipment that stored value card is installed (for example portable phone).Described user wishes to inject fund to described stored value card from the account of bank.In step 402, described user inputs one group of Personal Identification Number (PIN).Suppose that described Personal Identification Number is effective, the wallet administration device in portable equipment is activated, and initiates request (being also referred to as aerial (OTA, Over-the-Air) charging request) in step 404.MIDlet program in step 406 in portable equipment sends request to stored value card applet program, has described the process of communicating by letter between wallet administration device MIDlet program 434 and stored value card applet program 436 in described step 406 in Fig. 4 C.
In step 408, stored value card applet program generates the reply that is used for responding described MIDlet PROGRAMMED REQUESTS.After receiving described reply, described MIDlet program is sent to payment network and server with described reply by cellular communications networks.As shown in Fig. 4 C, wallet administration device MIDlet program 434 communicates by letter to obtain reply with stored value card applet program 436, and described reply is sent to payment network and server 440 immediately.In step 410, process 400 need to be examined the validity of described reply.If described reply can't be verified, process 400 will stop.If described reply is verified as effectively, process 400 enters step 412 and checks account corresponding in bank.If described account exists really, the value transfer request will be activated.In step 414, described bank can return to reply to respond described request after receiving described request.Usually, the information exchange between described payment network and server and described bank need be observed procotol (for example http protocol of Internet use).
In step 416, the reply that described bank returns is transferred into payment network and server.In step 418, the MIDlet program is extracted source APDU order and described order is transmitted to stored value card applet program from described reply.Examine described order in the applet of stored value card described in step 420 program, if described order is verified as being authorized to, this order is sent to the simulator in step 420, upgrade simultaneously transaction log.Generating labels in step 422 (ticket) is to be used for formulating the reply (for example reply of APDU form) that sends to described paying server.In step 424, upgrade and send success status information to described MIDlet program after described paying server is received and replied, preserve simultaneously described APDU and reply in order to check later on.
As shown in Fig. 4 C, payment network and server 440 are received the reply that wallet administration device MIDlet program 434 is sent, and examine described reply with security identity module 444 and sent by the stored value card applet program 436 that process is authorized.After described reply was verified, payment network and server 440 sent request to financing bank 442, supposed that user 432 has the account in described bank.Described bank can examine and authorize described request, then according to predetermined message format return authorization number.After bank 442 received described reply, paying server 440 can send a network to MIDlet program 434 and reply to refuse or ratify described request.
Wallet administration device 434 is examined the validity (whether being for example the APDU form) that described network is replied, and then sends to simulator 438 and orders and upgrade transaction log.So far, stored value card applet program 436 completed required step and to and MIDlet program 434 is returned to a reply, described MIDlet program 434 forwards to paying server 440 network request that embedded (APDU) replys again.
Although process 400 is described to injection fund in the stored value card, others skilled in the art in this area can easily draw and use process that stored value card buys by network and process 400 is the same conclusion in essence, so the described process of buying is no longer in this independent discussion.
According to a specific embodiment of the present invention, showed first exemplary architecture 500 that makes portable equipment 530 carry out ecommerce and Mobile business on cellular communications networks 520 (for example GPRS network) in Fig. 5 A.Described portable equipment 530 is by base band 524 and safety element 529(smart card for example) form.An example of described portable equipment is the portable equipment (for example portable phone or PDA(Personal Digital Assistant)) of supporting short-range communication or near-field communication (NFC, Near Field Communication).Described base band 524 provides an e-platform or environment (miniature edition Java(JME for example, Java Micro Edition), or mobile information apparatus framework (MIDP, Mobile Information Device Profile)), can carry out or move application MIDlet program 523 and server manager 522 thereon.Described safety element 529 includes global platform (GP) card management device 526, and simulator 528 and other assemblies are such as Personal Identification Number manager (not shown).
For supporting described portable equipment 530 to carry out ecommerce and Mobile business, need to install in advance and arrange one or more service/application thereon.An example of service managerZ-HU 522 (for example MIDlet program that graphic user interface is arranged) need to be activated.In a specific embodiment, service managerZ-HU 522 can be downloaded and install.In another specific embodiment, service managerZ-HU 522 can be pre-loaded.No matter adopt which kind of mode, in case service managerZ-HU 522 is activated, the directory listing that comprises various services will be shown.Described directory listing may comprise the service item relevant with user's CAMEL-Subscription-Information, also may comprise the recommended project that is independent of user signing contract information.Obtain the catalogue storehouse 502 that described directory listing can be from LIST SERVER 512.LIST SERVER 512 may provide ISP's (for example build-in services device, personalized service device) of product and/or service to play the effect (as the Yellow Page function) of exchange centre (central hub) to the registrant for various.The Yellow Page function of described LIST SERVER 512 can comprise service planning information (for example service charge, Start Date, Close Date etc.), installations, individualized and/or MIDlet program download place (as the Internet address).Described installation and personalization process are provided by two different commercial entities, such as described installation process may be provided by the publisher of safety element 529, and described personalization process may be provided by the service provider of the application process key of holding application-specific.
According to a specific embodiment, service managerZ-HU 522 is configured to the one or more servers 514 by cellular communications networks 520 Connection Service providers.Suppose that the user has selected an application from the service catalogue of presenting to him.To set up an escape way 518 between described one or more server 514 and global platform manager 526, the application applet program 527 of selecting to install/to download described user, and then individualized this application applet program 527 and optional simulator 528, and final down load application MIDlet program 523.Applet program library 504 and MIDlet program library 506 provide respectively general application applet program and use the MIDlet program.Global platform security identity module 516 and application security identification module 517 are used to set up escape way 518 to carry out the individualized operation.
According to another specific embodiment of the present invention, Fig. 5 B has showed makes portable equipment 530 can carry out second exemplary architecture 540 of ecommerce and Mobile business on public network 521.Most of assemblies in described second framework 540 in essence with first framework 500 of Fig. 5 A in assembly similar.Difference is that first framework 500 is based on the operation on cellular communications networks 520, and second framework 540 used public network 521 (for example Internet).Described public network 521 may comprise local area network (LAN) (LAN, Local Area Network), a wide area network (WAN, Wide Area Network), WiFi(IEEE802.11) wireless connections, a Wi-Max(IEEE802.16) wireless connections etc.In order to carry out service operations on described public network 521, an example of service managerZ-HU 532 (namely with the service managerZ-HU MIDlet program 522 same or analogous examples of function) will be installed on the computer 538 of access public network 521.Described computer 538 can be the described example of desktop personal computer (PC), notebook computer or other energy operation service managers 532, and the computing equipment of access public network 521.Connection between described computer 538 and portable equipment 530 is undertaken by a contactless reader 534.Service managerZ-HU 532 has served as agency's role, between one or more servers 514 and global platform card management device 526 with assistance services provider, and installation and the personalization process of being undertaken by escape way 519.
Fig. 5 C is a flow chart, according to a specific embodiment of the present invention, has described to make portable equipment can carry out the process 550 of ecommerce and Mobile business function.Described process 550 can realize by the mode of software, hardware or software and hardware combining according to the difference of specific implementation.In order to understand better described process 550, will quote some diagram, especially Fig. 5 A and Fig. 5 B early in following description.
Before process 550 beginning, service managerZ-HU 522 or an example of 532 have been downloaded or have been contained in advance on portable equipment 530 or computer 538.In step 552, service managerZ-HU is activated and sends service requests to the server 514 that the service provider locates.Be identified and portable equipment is verified as after effectively the user, in step 554, described process 550 provides the directory listing of service/application according to signing (subscription) information of the user of portable equipment 530.For example, described list may comprise mobile sale point application program, electronic wallet application, electronic bill application program and other business-like services.Then a service/application is chosen from described directory listing.For example, stored value card or mobile sale point can selectedly be used for configuring portable equipment 530.As the response that the user is selected, described selected service/application is downloaded and installed to process 550 in step 556.For example, stored value card applet application program (namely using applet program 527) is downloaded and is arranged in safety element 529 from applet program library 504.The path of described download or installation can be escape way 518 or 519.In step 558, if necessary, process 550 will the individualize described application applet program that has been downloaded and described simulator 528.The application applet program that some are downloaded does not need to be individualized, and other needs to individualize.In a specific embodiment, mobile sale point is used applet program (" point of sale security identity module (POS SAM) ") and need to be individualized, and following information or data group must provide:
(a) unique security identity module ID based on bottom safety element unique identifiers;
(b) one group of debit master key (debit master key);
(c) the message encryption key after conversion;
(d) identification of the message after conversion key;
(e) remarks section of every off-line transaction maximum length that can be allowed to;
(f) the batch transaction key after conversion; And
(g) a global platform Personal Identification Number (GP PIN).
In another specific embodiment, during for single function card personalization stored value card applet program, not only need particular data (be Personal Identification Number, conversion after key, Start Date, Close Date etc.) is configured in stored value card, but also will be set to and to work in open system by simulator.At last, in step 560, process 550 is downloaded and is started according to selection the MIDlet program 523 of using.Some personal data in described application applet program can be accessed and be shown, or is provided by the user.Described process 550 finishes after all service/application assemblies all are downloaded, install and individualize.
According to a specific embodiment, make the portable equipment 530 can be as follows as the exemplary process that a mobile sale point uses:
(a) access build-in services devices (being service provider's a station server 514), and ask described server to set up article one escape way (for example escape way 518), to connect a distribution quotient field (being applet program library 504) and the global platform card management device 526 that runs on safety element 529;
(b) receive one or more internet message, comprise some APDU requests of an encapsulation point of sale security identity module applet program Java Cap file of applet program library 504 (for example from) in described message;
(c) extract described APDU request from the described internet message that receives;
(d) send the APDU request that extracts according to correct order to global platform card management device 526, so that point of sale security identity module (namely using applet program 527) to be installed on safety element 529;
(e) access personal server (i.e. a service provider's server 514), connect escape way between personalized service device and newly downloaded applet program (being the point of sale security identity module) (according to server and/or path different, described escape way may be may not be also escape way 518) to open second.
(f) receive one or more internet message to obtain one or more independent " data storage APDU (STORE DATAAPTU) ";
(g) extract and send described " data storage APDU (STORE DATAAPTU) ", with individualized point of sale security identity module; And
(h) download and start point of sale manager (namely use MIDlet and cross program 523).
Fig. 6 A has showed a representational framework 600, a root a tree name specific embodiment of the present invention, and wherein portable equipment 630 is as mobile sale point, to carry out ecommerce and Mobile business.Described portable equipment 630 is comprised of base band 624 and safety element 629.Point of sale manager 623 is downloaded and is arranged in described base band 624, and security identity module 628 quilts in point of sale individualize and are arranged in safety element 629, so that portable equipment 630 can serve as the role of mobile sale point.Real-time like this transaction 639 can be at the portable equipment 630 of supporting mobile sale point and the device 636(that the supports electronic token mobile device of single function card or support stored value card for example) between carry out.Described electronic token may represent the payment token of electronic money (e-money), electronic business transaction certificate (e-coupon), electronic ticket (e-ticket), electronic vouchers (e-voucher) or any other form in equipment.
Real-time deal 639 carries out (namely portable equipment not being accessed rear end point of sale (pos) transactions processing server 613) under can be online.But, in specific actual conditions, when for example trading volume has surpassed predetermined thresholding, or the equipment 636 of supporting electronic token need to be supplemented with money or during virtual supplementing with money, or (single or in batches) transaction is when uploading, and described portable equipment 630 can be by cellular network 520 access described rear end point of sale (pos) transactions processing servers 613.
The off-line transaction record of accumulation need to be uploaded to rear end point of sale (pos) transactions processing server 613 and process.Described upload operation is by carrying out by the portable equipment 630 of escape way 618 access point of sale (pos) transactions processing servers 613.Similar with personalization process to described installation, upload operation can be carried out via two different routes: cellular communications networks 520; Or public network 521.Fig. 6 A has described described article one route.
Described second route as shown in Fig. 6 B, a root a tree name specific embodiment of the present invention, Fig. 6 B has showed a representational framework 640, wherein portable equipment 630 is carried out the operation that transaction is uploaded in batches as mobile sale point and on public network 521.Off-line transaction in described mobile sale point record generally is kept in transaction log in point of sale security identity module 628 by accumulation.Described transaction log is read and is deposited in the point of sale agency 633 who is arranged in computer 638 by contactless reader 634.Described point of sale agency 633 accesses point of sale (pos) transactions processing servers 613 by escape way 619 again on public network 521.Each upload operation that comprises one or more transaction record is labeled as an independent batch upload operation.Data communication Bian between point of sale security identity module 628, contactless reader 634 and point of sale agency 632 threes is with form and comprise described transaction record.The internet message of encapsulation APDU (for example HTTP) is used to the communication between point of sale agency 632 and point of sale (pos) transactions processing server 613.
In a specific embodiment, the representative batch upload procedure from point of sale manager 623 or point of sale agency 633 comprises:
(a) send request to initiate upload operation in batches to point of sale security identity module 628;
(b) after described point of sale security identity module 628 is agreed described batch upload request, fetch the transaction record of accumulation with the form of APDU order in " a collection of " that is labeled or " one group " from described point of sale security identity module 628;
(c) establishment one or more comprises the internet message of described APDU order of fetching;
(d) by escape way 619, described one or more internet message is sent to point of sale (pos) transactions processing server 613;
(e) confirmation of receipt signature information from described point of sale (pos) transactions processing server 613;
(f) described confirmation signature information is transferred to described point of sale security identity module 628 to examine with the form of APDU, then delete the transaction record of having been uploaded through confirming; And
(g) if other transaction records of not uploaded are still arranged in described same " criticizing " or " group ", repeating step (b) is to step (f).
Fig. 6 C has showed a width flow chart, according to a specific embodiment of the present invention, has described use the portable equipment 630 that serves as mobile sale point and use and support the device 636 of electronic token to carry out the process 650 of Mobile business as single function card.To understand in order being more convenient for, preferably process 650 to be associated together with before diagram, especially Fig. 6 A and Fig. 6 B and investigate.Described process 650 can realize with the mode of software, hardware or soft or hard combination.
As the holder who supports electronic token device (for example Mifare card or support stored value card and simulate the portable phone of single function card), when wishing to buy article or subscribed services by mobile sale point (being portable equipment 630), and process 650 (for example performed process of point of sale manager 623 in Fig. 6 A〉just can be activated.In step 652, portable equipment 630 reads the device of described support electronic token and fetches electronic token (for example label ID of Mifare card).Whether then, process 650 is examined the described electronic token of fetching in step 654 effective.If support in Fig. 6 A that the device 636 of electronic token is single function card (for example Mifare), the described verification process of being carried out by point of sale manager 623 comprises: (i) read the card sign (ID) of described card, described card sign is kept at not protected or only is subjected on the zone of known cryptographic key protection; (ii) send to point of sale security identity module 628 request that comprises described card sign; (iii) reception is one or more by key after the conversion of point of sale security identity module 628 generations (such as the key that is used for transaction count, publisher's data etc.).If after the described one or more conversions that receive, key is invalid, namely the described electronic token of fetching is invalid, and terminal procedure 650.Else process 650 will be advanced into step 656 along "Yes" branch, will judge the expense that whether has enough remaining sums to need to pay current exchange in the described electronic token of fetching in step 656.If the result that step 656 is judged is "No", process 650 can select to propose that described holder supplements (namely be written into, inject or raise funds) with money for its electronic token in step 657.If described holder selects " negating " described proposal, process 650 finishes.Described holder carries out charging in real time with the device that means described support electronic token else if, and process 650 is carried out in step 658 and supplemented with money or the Virtual plan is supplemented operation with money.Process 650 is returned to step 656 afterwards.If enough coin remaining sums are arranged in electronic token, process 650 deducts from the electronic token of supporting electronic token device 636 in step 660 or debit is completed the number that described purchase need to be paid.In the situation of described single function card, after described one or more conversions, key is used to authorize described deduction operation.In step 662, the one or more off-line transactions records that accumulate in point of sale security identity module 628 are uploaded to point of sale (pos) transactions processing server 613 and process at last.Described upload operation can or be concluded the business in batches and carry out by cellular communications networks 520 or 521 pairs of single transaction of PD network.
Process 400 in Fig. 4 A has been described the aforesaid operation of supplementing with money.Virtual supplement with money the operation be described specific type of supplementing operation with money, common sponsored people or donor are used for improving the credit line of electronic token.In order to use the virtual operation of supplementing with money, described sponsor need to set up an account, and with described account and device (for example portable phone of single function card, Multifunction card, support electronic token the etc.) binding of supporting electronic token.For example, account on the line that is provided by commercial entity (for example enterprise, bank etc.).In case described sponsor has been filled with electronic token in account on the described line, support the holder of electronic token device just can receive electronic token account from described line when the access mobile sale point.Multiple different safety measure will be carried out to guarantee that described virtual to supplement operation with money be safety and reliably.A described virtual representative application scenario of supplementing with money is that father (mother) parent (being the sponsor) can be filled with electronic token in account on a line, on described line, account is connected with a children's (being the equipment holder) portable phone (namely supporting the device of electronic token), therefore as described children during at mobile sale point purchase article, described children just can receive the described electronic token that is charged.except various ecommerce described herein and Mobile business function, point of sale manager 623 also is set to provide multiple query manipulation, for example, (a) check the revenue and expenditure record of the not formation batch (namely not uploaded) of accumulating in the security identity module of point of sale, (b) list the transaction log of the not formation batch in the security identity module of point of sale, (c) show the details that is kept at the particular transaction in the security identity module of point of sale, (d) check the current remaining sum of the device of supporting electronic token, (e) list the transaction log of the device of supporting electronic token, and the details that (f) shows the particular transaction of the device of supporting electronic token.
Flow chart in Fig. 6 D, according to a specific embodiment of the present invention, the portable equipment 630 that can serve as mobile sale point and the device 636 that uses and support electronic token as Multifunction card have been described to use, the representative process 670 of carrying out Mobile business.To understand in order being more convenient for, preferably process 670 to be connected together with before diagram, especially Fig. 6 A and Fig. 6 B and investigate.Described process 670 can realize with the mode of software, hardware or soft or hard combination.
When the holder who supports electronic token device 636 (for example portable phone of Multifunction card or support stored value card and simulation multifunctional card) wished to buy article or subscribed services by mobile sale point (being portable equipment 630), process 670 (for example performed process of point of sale manager 623 in Fig. 6 A) just can be activated.In step 672, process 670 sends the initial request of buying to the device 636 of supporting electronic token.Buying expenses and described initial purchase request (for example order) together send.Then process 670 proceeds to determination step 674.When there is no enough remaining sums in the device 636 of supporting electronic token, point of sale manager 623 will be received receiveing the response of the described initial purchase request of refusal.Result is that process 670 finishes because described purchase request is rejected.If supporting has enough remaining sums in the device 636 of electronics for joint, the result of determination step 674 is "Yes", and process 670 will proceed to step 676 along "Yes" branch.The reply (for example APDU order) of there receiving from the device 636 of supporting electronic token will be forwarded to point of sale security identity module 628.Information in described reply comprises the version of electronic token key, and the random number that will be used to set up escape way, described escape way will connect the point of sale security identity module 628 of installing on applet program (for example stored value card applet) and portable equipment 630 on the device 636 of supporting electronic token.Then, in step 678, process 670 is received the debit request (for example APDU order) that is generated in order to respond described forwarding reply (being the reply in step 676) by point of sale security identity module 628.Described debit request contains message cognizance code (MAC, Message Authentication Code) so that applet program (being stored value card applet program) is examined the debit that is about to carry out to be operated, the wherein said debit operation that is about to carry out is carried out in order to respond the debit request that sends in step 680.Process 670 is advanced to step 682, receives the confirmation message of described debit operation.Comprise in described acknowledge message by point of sale security identity module 628 and point of sale (pos) transactions processing server 613 and be used for respectively the additional message cognizance code examining and process.Next in step 684, described debit acknowledge message is forwarded to point of sale security identity module 628 to examine.In case described message cognizance code is verified as effectively, and purchase-transaction is recorded in point of sale security identity module 628, and the described transaction that is recorded is shown in step 686, and then process 670 finishes.It should be noted that the aforementioned electronic business transaction can be undertaken by point of sale (pos) transactions processing server 613 down or on line online.And when in the device of supporting electronic token, Sorry, your ticket has not enough value, can carry out according to the process 400 of describing in Fig. 4 A and Fig. 4 B and supplement or register capital to operation with money.
Fig. 7 has showed the representative setting when portable equipment is used to the electronic bill application.Portable equipment 730 is configured to comprise stored value card 724.When the owner of described portable equipment 730 or holder wished to buy the bill (such as concert tickets, ball match admission ticket etc.) of participating in a specific activities, described owner can use stored value card 724 by electronic ticket service provider 720 bookings.It is predetermined and buy described bill that described electronic ticket service provider 720 can contact on traditional box office reservation system 716 or line ticketing service application program 710.Electronic token (for example electronic money) is by deduction from the stored value card 724 of portable equipment 730 afterwards, with to the credit/debit 714(of system financial institution for example, bank) the pay bills buying expenses.Security identity module 718 is access in described electronic bill service provider 720, is correctly validated to guarantee the stored value card 724 in portable equipment 730.After receiving that payment is confirmed, electronic ticket is transferred into portable equipment 730 by aerial connection (for example cellular communications networks), and is stored on safety element 726 in the mode of electronization, for example in the mode of electronic ticket code, key or password.Afterwards, as the owner of described portable equipment 730, when namely the holder of described electronic ticket attended described specific activities, described electronic ticket holder only need to allow entrance registration reader 734 read electronic ticket code or the key of preserving in portable equipment 730.In a specific embodiment, described entrance registration reader 734 is a contactless reader (for example observing the very-short-reach coupling device of ISO14443).Described portable equipment 730 is mobile phones of supporting short-range communication (NFC).
The present invention is more suitable for adopting software form to realize, but also the form of available hardware or software and hardware combining realizes.The present invention also can be implemented as the code that can be read by computer on computer-readable media.Described computer-readable media is that any can preservation can be by several a tree name storage devices of the data of computer system reads.The example of computer-readable media comprises read-only memory, random access memory, CD CD (CD-ROM), Digital video disc (DVD), tape, optical data storage device, and carrier wave.Described computer-readable media also can be distributed in many computer systems that are connected by network, describedly like this can will be stored and move in distributed mode by the code that computer reads.
Above-mentioned explanation has fully disclosed the specific embodiment of the present invention.It is pointed out that being familiar with any change that the person skilled in art does the specific embodiment of the present invention does not all break away from the scope of claims of the present invention.Correspondingly, the scope of claim of the present invention also is not limited only to previous embodiment.