EP0553163A1 - Procede pour repartir la memoire d'un circuit integre entre plusieurs applications - Google Patents

Procede pour repartir la memoire d'un circuit integre entre plusieurs applications

Info

Publication number
EP0553163A1
EP0553163A1 EP91917979A EP91917979A EP0553163A1 EP 0553163 A1 EP0553163 A1 EP 0553163A1 EP 91917979 A EP91917979 A EP 91917979A EP 91917979 A EP91917979 A EP 91917979A EP 0553163 A1 EP0553163 A1 EP 0553163A1
Authority
EP
European Patent Office
Prior art keywords
code
memory
zone
access
integrated circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP91917979A
Other languages
German (de)
English (en)
French (fr)
Inventor
Jacek Kowalski
Jean-Jacques Foglino
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus Card International SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus Card International SA filed Critical Gemplus Card International SA
Publication of EP0553163A1 publication Critical patent/EP0553163A1/fr
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • G06Q20/35765Access rights to memory zones

Definitions

  • the present invention relates to methods which make it possible to distribute the content of the memory of an integrated circuit between several applications, themselves possibly assigned to different users. It applies more particularly to integrated circuits intended to be mounted in memory cards called "smart" cards. It is particularly useful for integrated circuits which do not include a microprocessor, but only a few logic circuits which make it possible to exploit the content of the memory.
  • the invention proposes a method for distributing the memory of an integrated circuit between several applications, characterized in that the memory is divided into several zones each corresponding to an application, and which is associated with each zone a code intended to be presented to the circuit by the user to authorize when it is recognized the access to the zone with which it is associated.
  • the invention also applies to integrated circuits fitted with a microprocessor by implementing the method of the invention in the software, which gives the corresponding software part a reduced size and remarkable efficiency.
  • each application located in the circuit memory is assigned an access code, which can be a secret code reserved for the authorized user, which opens access to a particular area of the memory where the user resides. 'corresponding application.
  • the user who can be the manufacturer responsible for developing a particular application, or the individual end user of the smart card containing the integrated circuit, begins in a step 101 by entering a code in the circuit.
  • This code is decoded in a step 102 to obtain authorization to access one of the areas of the memory 103, and from this moment the user is free to use the content of this area, that is to install the use it has developed, either to operate it. Access to other areas is, in the simplest and most common cases, prohibited, but it is possible to authorize partial access, for example to use a subroutine contained in another application.
  • An interesting improvement consists in organizing the logic of the circuit, or the software of the microprocessor, so that the addresses from the start of the zone, and the following ones until the end if they are of identical lengths, are the same, seen from the user. .
  • the physical addresses will be different, but this will not be seen on the user side, which will in fact use the invisible equivalent for it of relative addressing.
  • security is increased by preventing access to prohibited addresses by a roundabout route, possibly possible following a programming or specification bug. If the recognition of a particular code and the selection of the corresponding memory area are easily done with a microprocessor, these actions require in the case of wired logic relatively heavy hardware compared to that strictly necessary for memory management in the absence of a microprocessor.
  • the invention proposes to use a code formed of 2 pieces, as shown in FIG. 2.
  • This code will therefore include a first part 201, formed by x bits, designating the usable zone number, and a second part 202, formed by y bits and comprising the secret (or confidential) code necessary to access the zone designated by the code.
  • the total length of the code to be presented by the user will therefore be x + y bits and this length will preferably be equal to that of a word from memory, to facilitate the creation of the logic circuits of the integrated circuit.
  • the zone number will preferably be placed at the head of the code, referring to the direction by which the user enters it into the circuit in serial mode, which is the most frequent case, in particular in smart cards due the low number of contacts available on the input / output connector.
  • the first x bits are read first and indicate which is the internal secret code stored in the circuit which must be compared to the external secret code formed by the y bits of the second part of the code entered by the user.
  • the internal pointer of the circuit selects the memorized secret code then, if the comparison is positive, it gives access to the area of the memory designated by the number forming the first part of the code. Of course, if the comparison is negative, access will be refused, except possibly to a zone delivering for example an error message.
  • the memorized secret codes will for example be contained in a special table, but preferably they will be placed in the memory at the head of the zones to which they give access, which again makes it possible to simplify the internal circuits of the integrated circuit.
  • the internal pointer under the command of the zone number, directly addresses the first word of the memory and the application can start without delay as soon as the secret code is recognized.
  • the circuits necessary to form such a table and its interfaces with the rest of the integrated circuit are saved.
  • this table makes it possible, by decoding them, to lead to a common addressing part which plays a role of selection for the memory areas to which the secret codes give access.
  • the total length of the code (secret + zone number) is equal to that of a word in the memory, you can either neutralize the bits corresponding to the number, or put this number itself and make a total comparison of the word and the code, thus obtaining additional security by redundancy of the verification of the zone number.
  • the selection is made by software. After extraction of the first x bits of the code presented, the software directs the internal pointer to the first word in the zone corresponding to the number indicated by these x bits, it causes the reader of this word, then the comparison of the last y bits with the word thus read, and finally starting the application if the comparison is positive.
  • the code entered by the user arrives via a "code entry" connection in a register 301 where it is stored.
  • the first x bits are applied to a zone logic 302 where they are decoded to obtain a signal which indicates on a "selection" connection the zone concerned. This logic memorizes this signal until the end of the application.
  • the selection signal thus obtained is applied to the addressing members 303 of the memory 304 of the integrated circuit. These selection members also receive by an "address input" connection the addresses of the words to be read in the application.
  • the first address, 0 by convention, is always the same, and combined with the ⁇ selection signal it allows the first word in the designated area to be read from the memory, which contains the stored internal secret code.
  • This internal code is applied, with the external secret code coming from the register 301, to a comparator 305 which delivers, if this comparison is positive, a read validation signal which opens a door 306 which allows the words read in the memory to exit to the other organs of the integrated circuit.
  • This validation signal also makes it possible, if necessary, to unlock all or part of these other organs, for example to authorize writing to the memory.
  • the "selection" signal makes it possible, in combination with the address signal, to read the content of the zone as if it were at the head of the memory. It is the same of course for other applications.
  • each confidential code it is not absolutely necessary for each confidential code to be placed at the beginning of its memory area.
  • the structure of the invention is also particularly interesting if, after the presentation of the code, all the zones are the same size. Otherwise, an organization is used in which the secret codes are stored in a small area.
  • FIG. 4 the simple logic circuit which makes it possible to dispense with the existence, in the integrated circuit, of a microprocessor, while authorizing, according to the invention, the setting in work of several applications with the smart card.
  • the addressing of the memory words is sequential.
  • a clock causes, by means of a counter internal to the memory, an address counting.
  • a validation signal emitted from outside the circuit, validates the state of the counter to designate the address of the word to be reached.
  • a validation signal emitted from outside the circuit, validates the state of the counter to designate the address of the word to be reached.
  • such a system is used to, in addition, implement the security linked to the different applications.
  • the number of the zone where the secret code is stored is coded on four bits so that a partition of the memory into sixteen parts (2 4 ) is imposed. Any other number other than four is however possible.
  • the first four bits of the secret code (which represent its address) are sent by an input pin IN of the integrated circuit on four shift registers 401 to 404 connected in cascade.
  • an APL signal delivered by the zone logic 302, prior to zero changes to a state one. It then invalidates the transmission of the clock pulses to the registers 401-404. These remain in the state in which they were. They therefore deliver during all of the following use, at the output, each a signal, respectively A3 to A0, constituting a given bit of weight of an address.
  • This address is decoded in a zone predecoder 405 having sixteen outputs. Each ⁇ of these sixteen outputs leads to an input of a word line decoder 406 from memory 407. This outcome is also authorized by an AND gate assembly such as 408 receiving the signal from the predecoder 406 and the signal APL.
  • the decoder 406 Before the fifth bit of the clock, the decoder 406 is therefore supplied with the sixteen signals from the predecoder 405. The other inputs of the decoder 406 still remain at zero.
  • the decoder 406 is therefore configured to allow access to the first word of the addressed partition (one among sixteen). This word, which precisely contains the secret code, is then read to be compared as indicated above.
  • the secret code CODE No. 1, CODE No. 2, etc.
  • the usable partition of the memory 407 for example the partition 409, attached to the first word of the area 410 which contains the secret code CODE N ° 1, is physically close to this word 410.
  • This physical proximity s ' explains by the fact that the memory words of the partition 409 of the memory 407 have moments of address A0 and A3 which are the same as those of the secret code which governs this zone 409.
  • the addressing of the different memory words in the partition 409 is then carried out as follows. Part of the address is supplied to the decoder 406 by the predecoder 405 (frozen in this state throughout the application). Another part is conventionally supplied by a counter 411 receiving CLKV clock signals validated (to arrive at the correct memorized word) and connected to a predecoder 412. This latter link is of the same type as that which connects the registers 401-404 to the predecoder 405.
  • the predecoder 412 transforms the count of the counter 411 into address signals. For example, the counter can count from 0 to 2 n and the predecoder 412 therefore has n connections and output. These n connections lead to n inputs of the decoder 406.
  • n-1 are useful for accessing all the memory words of the partition 409. Once this access has been made, the counter 411 is counted up to not. We then arrive at a fictitious memory word at the output of the decoder 406.
  • the fictitious memory word consists of a connection 413 connected to a reset input of the counter 411. We can then start another account to access an address again of partition 409. You cannot access other words than those of this partition.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
EP91917979A 1990-10-09 1991-10-08 Procede pour repartir la memoire d'un circuit integre entre plusieurs applications Ceased EP0553163A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR9012439A FR2667714A1 (fr) 1990-10-09 1990-10-09 Procede pour repartir la memoire d'un circuit integre entre plusieurs applications.
FR9012439 1990-10-09

Publications (1)

Publication Number Publication Date
EP0553163A1 true EP0553163A1 (fr) 1993-08-04

Family

ID=9401057

Family Applications (1)

Application Number Title Priority Date Filing Date
EP91917979A Ceased EP0553163A1 (fr) 1990-10-09 1991-10-08 Procede pour repartir la memoire d'un circuit integre entre plusieurs applications

Country Status (5)

Country Link
EP (1) EP0553163A1 (ja)
JP (1) JPH06502032A (ja)
CA (1) CA2093524A1 (ja)
FR (1) FR2667714A1 (ja)
WO (1) WO1992006451A1 (ja)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2690008B1 (fr) * 1991-05-29 1994-06-10 Gemplus Card Int Memoire avec cellule memoire eeprom a effet capacitif et procede de lecture d'une telle cellule memoire.
FR2685113B1 (fr) * 1991-12-17 1998-07-24 Gemplus Card Int Procede d'intervention sur une borne de delivrance d'un bien ou d'un service.
CA2147824A1 (en) * 1992-10-26 1994-05-11 Johannes Marinus George Bertina Host and user transaction system
FR2703501B1 (fr) * 1993-04-01 1995-05-19 Gemplus Card Int Circuit intégré pour carte à mémoire et procédé de décomptage d'unités dans une carte à mémoire.
FR2703526B1 (fr) * 1993-04-02 1995-05-19 Gemplus Card Int Circuit de déclenchement automatique.
FR2705810B1 (fr) * 1993-05-26 1995-06-30 Gemplus Card Int Puce de carte à puce munie d'un moyen de limitation du nombre d'authentifications.
US5544246A (en) * 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US6145739A (en) * 1993-10-26 2000-11-14 Intellect Australia Pty Ltd. System and method for performing transactions and an intelligent device therefor
US5491827A (en) * 1994-01-14 1996-02-13 Bull Hn Information Systems Inc. Secure application card for sharing application data and procedures among a plurality of microprocessors
DE19536206A1 (de) * 1994-09-30 1996-04-04 Samsung Electronics Co Ltd Intelligente Karte
GB9502864D0 (en) * 1995-02-14 1995-04-05 Digicash Bv Cryptographic reduced instruction set processor
FR2739706B1 (fr) * 1995-10-09 1997-11-21 Inside Technologies Perfectionnements aux cartes a memoire
FR2739737B1 (fr) * 1995-10-09 1997-11-21 Inside Technologies Perfectionnements aux cartes a memoire
EP0818761A1 (en) * 1996-07-12 1998-01-14 Koninklijke KPN N.V. Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card
FR2757654B1 (fr) * 1996-12-24 1999-02-05 Sgs Thomson Microelectronics Memoire avec zones protegees en lecture
GB2321728B (en) * 1997-01-30 2001-12-19 Motorola Inc Apparatus and method for accessing secured data stored in a portable data carrier

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6373388A (ja) * 1986-09-16 1988-04-02 Fujitsu Ltd 複数サ−ビス用icカ−ドの領域獲得方式
JPH02165290A (ja) * 1988-12-19 1990-06-26 Hitachi Maxell Ltd Icカード及びその動作方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9206451A1 *

Also Published As

Publication number Publication date
FR2667714A1 (fr) 1992-04-10
FR2667714B1 (ja) 1995-01-27
JPH06502032A (ja) 1994-03-03
WO1992006451A1 (fr) 1992-04-16
CA2093524A1 (fr) 1992-04-10

Similar Documents

Publication Publication Date Title
EP0553163A1 (fr) Procede pour repartir la memoire d'un circuit integre entre plusieurs applications
FR2698195A1 (fr) Procédé et circuit de cryptage et d'authentification pour carte à mémoire synchrone.
EP0554164B1 (fr) Carte à puce à plusieurs protocoles de communication
EP0651394B1 (fr) Circuit intégré contenant une mémoire protégée et système sécurisé utilisant ledit circuit intégré
EP0426541B1 (fr) Procédé de protection contre l'utilisation frauduleuse de cartes à microprocesseur, et dispositif de mise en oeuvre
CA2035161C (fr) Procede et dispositif de gestion de transactions utilisant des cartes a microcircuit
FR2779850A1 (fr) Procede et systeme d'utilisation d'une carte a microcircuit dans une pluralite d'applications
FR2486684A1 (fr) Objet portatif individualise du genre carte de credit
FR2653914A1 (fr) Systeme d'authentification d'une carte a microcircuit par un micro-ordinateur personnel, et procede pour sa mise en óoeuvre.
CH627570A5 (fr) Dispositif de comptabilisation d'unites homogenes predeterminees.
FR2549989A1 (fr) Systeme d'authentification entre un lecteur de carte et une carte de paiement echangeant des informations
FR2686170A1 (fr) Carte a memoire de masse pour microordinateur.
FR2686171A1 (fr) Carte a memoire de masse pour microordinateur avec facilites d'execution de programmes internes.
FR2606530A1 (fr) Circuit integre pour la memorisation et le traitement d'informations de maniere confidentielle comportant un dispositif anti-fraude
FR2642544A1 (fr) Systeme de traitement de donnees a programme de securite
FR2608809A1 (fr) Systeme de fourniture de prestations a revalidation
FR2732487A1 (fr) Procede de protection de zones de memoires non volatiles
EP0228329B1 (fr) Dispositif électronique formant mémoire stable rapide perfectionnée
EP0884704B1 (fr) Procédé d'authentification de circuit intégré
FR2473755A1 (fr) Procede et dispositif electronique de memorisation et de traitement confidentiel de donnees
EP0393050B1 (fr) Dispositif de protection des zones memoire d'un systeme electronique a microprocesseur
FR2680262A1 (fr) Circuits integres pour carte a puce et carte a plusieurs puces utilisant ces circuits.
EP0957461B1 (fr) Procédé de personnalisation d'une carte à puce
WO2006013258A1 (fr) Procede d'authentification a distance d’un utilisateur
EP0985790B1 (fr) Serrure electronique a commande dynamique et systeme de commande muni d'une telle serrure

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19930403

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): DE ES GB IT

17Q First examination report despatched

Effective date: 19930823

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 19940425