EP1969535A1 - Mit einer personalisierten chipkarte ausgestatteter generischer elektronischer schlüssel - Google Patents

Mit einer personalisierten chipkarte ausgestatteter generischer elektronischer schlüssel

Info

Publication number
EP1969535A1
EP1969535A1 EP06830702A EP06830702A EP1969535A1 EP 1969535 A1 EP1969535 A1 EP 1969535A1 EP 06830702 A EP06830702 A EP 06830702A EP 06830702 A EP06830702 A EP 06830702A EP 1969535 A1 EP1969535 A1 EP 1969535A1
Authority
EP
European Patent Office
Prior art keywords
microcontroller
smart chip
interface
portable device
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06830702A
Other languages
English (en)
French (fr)
Inventor
Max De Groot
Eric Plet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemplus SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus SA filed Critical Gemplus SA
Publication of EP1969535A1 publication Critical patent/EP1969535A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T29/00Metal working
    • Y10T29/49Method of mechanical manufacture
    • Y10T29/49002Electrical device making

Definitions

  • the present invention relates to an electronic portable device such as an electronic key, comprising, in the same housing, a smart chip storing an application, an interface with a user and a microcontroller controlling this interface and the chip.
  • the electronic key refers to a portable hardware device that can be connected to a computer and act, for example, as an authentication key for a software portion.
  • the use of such electronic keys is known for various applications: the generation of a one time password (OTP) during a network authentication in a computer system, the management of rights on the use of software, the signing and encryption of electronic documents, the authentication of subscribers on a mobile telephone system by the EAP-SI M protocol (Extensible Authentication Protocol Method for GSM Subscriber Identity) , securing and encrypting the transport of information within computer networks (TLS: Transport Layer Security).
  • OTP one time password
  • EAP-SI M protocol Extensible Authentication Protocol Method for GSM Subscriber Identity
  • TLS Transport Layer Security
  • Such electronic keys can be used stand-alone and / or connected to a host machine by a USB type interface (Universal Serial Bus - Universal Serial Bus), for example.
  • USB type interface Universal Serial Bus - Universal Serial Bus
  • FIG. 1 illustrates the operation of an autonomous electronic key equipped with an ignition and selection button and a screen for the generation of a one-time password.
  • the user activates (10) the electronic key by pressing the button and the firmware requests the display (12) on the screen of a menu of the application offering several choices to the user.
  • the selection of the user by the selection button is detected (14) allowing the execution of the chosen application (16).
  • the microcontroller feeds the smart chip (18), sends a request to the smart chip with the parameters useful for the generation of the password (20), then the chip intelligent generates an OTP password (22) that it transmits to the microcontroller (24). The latter switches off the smart chip (26), displays the OTP password received on the key screen (28) for a set time and then the electronic key turns off (30).
  • the application program embedded in the smart chip performs processing for the generation of useful data to the user.
  • the operation described above also requires a firmware that can manage, in addition to the interfaces of the key (screen, selection button, ...), the progress of the application of the smart chip.
  • the latter application is specific to the intended use by the key so that the firmware is also.
  • a second disadvantage relating to the need for a specific microprogram and main application concerns the need to provide for multiple test and validation phases resulting in additional costs and the requisition of teams.
  • This disadvantage is illustrated in Figure 2 showing different stages of the process of developing a personalized electronic key.
  • a firmware dedicated to the intended application is developed (42) and requires different validation tests depending on whether the intended application is No. 1 (44a), No. 2 (44b) or No. 3 (44c).
  • the smart chip is personalized with the desired main application (46) and validation tests are conducted (48a, 48b, 48c). It follows that tests to validate the interoperability and integration of the firmware and the main application are performed (50a, 50b, 50c), these tests vary depending on the intended application.
  • the microprogram is loaded into memory for the microcontroller, generally during a step very far upstream of the production of the key (52),
  • a third disadvantage of electronic keys of the prior art relates to the significant increase in the costs of production when the quantity of keys to be produced is increased and / or that new applications of the keys are implemented.
  • These solutions of the prior art do not make the most of cost-sharing possibilities in the production of keys and the purchase of components.
  • the keys are specialized at a very early stage of the production, which results in a specific production for each of the applications, a specific inventory management by application, etc.
  • FIG. 2 A partial solution to this drawback is known as illustrated in FIG. 2.
  • This solution relies on the loading of the specific microprogram into a memory of the microcontroller during the personalization operation, thus making it possible to use a generic electronic key before customization for different intended uses.
  • this partial solution requires an electronic key having a computer interface with a third-party equipment in order to carry out the customization of the microcontroller.
  • this solution is not applicable to autonomous electronic keys.
  • the present invention aims to solve at least one of these disadvantages by proposing a solution in which the microprogram (microcontroller) remains generic whatever the intended application and only the smart chip is personalized, the smart chip driving the microcontroller for the implementation of the desired application.
  • the microprogram offers the main application of the smart chip a set of standard functions relating to the basic functionalities of the electronic key.
  • the main application of the smart chip implements the desired application based on these standard functions. This results in reduced specialization of the electronic key, easy firmware development and independent of the application of the smart chip.
  • the main application for example a one-time password generator
  • the microcontroller is used to initialize the execution of the main application and to provide this application with the basic functions of the electronic key such as the display, the management of the selection interfaces with the user, the management of the clock
  • the present invention thus makes it possible to rationalize and reduce the production cost of electronic keys: a single generic electronic key is necessary for different applications, only the smart chip is personalized.
  • Another advantage provided by the present invention resides in the possibility of dynamically modifying the smart chip and thus offering the possibility of correcting a bug or proposing new functionalities from the same key.
  • the present invention firstly relates to an electronic portable device, such as an electronic key, comprising a housing, which housing comprises a smart chip, an application stored in the smart chip, at least one interface with a user. and a microcontroller driving said smart chip and said interface, said microcontroller being arranged to perform primitive functions of said electronic key for operating said interface and said smart chip being arranged to execute said application, the latter being arranged to generate calls primitive functions to communicate with the user by said interface.
  • the user interface allows the application to provide information (password, for example) or to retrieve data from the user (selection of a menu from a list, validation of a action, ).
  • information for example
  • selection of a menu from a list, validation of a action e.g., a selection of a menu from a list, validation of a action, .
  • Such an interface concerns, in particular and in a non-exhaustive manner, a display screen (password, list of menus, validation instruction, ...), an on / off button used for the autonomous electronic keys, a button of selection to navigate among different items of a menu, a validation button to validate a selection or the data displayed, ...
  • an intelligent chip is to be understood in the sense of an integrated circuit with autonomous processing resources giving them great security: microprocessor, memories, ... These smart chips are used for making smart cards.
  • the smart chip may be under the form of a smart card module connected to a chip card reader, either directly welded to the electrical circuit supporting the microcontroller, or in a removable form using a dedicated connector. The use of a smart card reader may be necessary if the microcontroller requires it.
  • the primitive functions concern all the generic / basic functions of the electronic key. I l is therefore the features offered by the generic electronic key regardless of the intended application that is stored in the secure chip. These include screen control functions for display, clock management, initialization of the microcontroller, control of a possible communication interface (USB, MMC - multimedia card) with a third party equipment, from sending instructions or commands to the smart chip, ...
  • the application in the chip is specific to the desired use, for example OTP calculations, cryptographic calculations, ...
  • the relationship between the smart chip and the microcontroller is of the master-slave type, said smart chip providing said microcontroller with execution instructions comprising said calls to the primitive functions and possibly calls to the functions of the smart chip itself.
  • execution instructions comprising said calls to the primitive functions and possibly calls to the functions of the smart chip itself.
  • the applications are then brought to communicate with each other through calls to functions of the chip itself. Since only the application in the chip is customized according to the desired use, it is this application that can control the sequence of processing steps.
  • the chip becomes the master of the device as opposed to the electronic keys of the prior art.
  • the microcontroller for its part, initiates the execution of the main application by the secure chip by means of controlling the supply of this chip and by means of a generic request whose interpretation as an initialization request will have been integrated into the functions of the chip. Therefore, the microcontroller is able to interrogate, during its initialization and by a standard control, said chip to receive said execution instructions.
  • microcontroller control instructions are then achieved by sending messages including microcontroller control instructions, these instructions being in the format of a syntax interpretable by the microcontroller and include calls to the primitive functions and possibly calls to the functions smart chip allowing interaction with the user.
  • said housing of the electronic key further comprises a memory connected to said microcontroller, and said microcontroller is arranged to store, in said memory, said instructions comprising the calls to the primitive functions.
  • said interface is a display screen and it further comprises a "selection" interface with the user.
  • the dongle can be used for applications in connected mode with a host system, such as a personal computer.
  • the electronic key further comprises a communication interface with third-party electronic equipment and said microcontroller is arranged to transfer data transmitted by said third-party equipment to said chip and data transmitted by the chip to said third-party equipment.
  • the role played by the microcontroller in the exchanges between the chip and the third-party equipment consists of a relay transmitting the data transmitted by the one to the other component.
  • This communication interface can be a USB or USB2 port, an MMC interface, a wireless communication interface such as Bluetooth or I RDA (Infrared Communication - InfraRed Data Association) or RFI D (Radio Frequency Identification) according to ISO 14443 or RF ID according to ISO 15693 for example.
  • I RDA Infrared Communication - InfraRed Data Association
  • RFI D Radio Frequency Identification
  • said application is a generic program for testing the primitive functions of said microcontroller, this program being present in the generic electronic key before personalization.
  • This test program can be executed during the production steps of the generic key in order to validate the "generic" operation of this key.
  • said chip comprises a second application capable of generating calls to the primitive functions and to perform algorithmic processing, and means arranged to deactivate said generic test program.
  • the second application that is to say the main application targeted by the electronic key, takes precedence over the test application. From now on, the initialization launched by the microcontroller will launch the main application.
  • said application is a one-time password generation program.
  • the invention also relates to the application of the electronic key to the generation and transmission of single use authentication data.
  • Transmission is understood to mean communicating the authentication data to third-party equipment via appropriate communication means (as previously mentioned) or to the user through the display screen.
  • the invention also relates to a method of manufacturing a personalized electronic portable device, such as an electronic key, comprising: a step of manufacturing a generic portable device comprising a housing, the latter comprising a smart chip, an application stored in the smart chip, at least one interface with a user and a microcontroller driving said smart chip and said interface, said microcontroller being arranged to perform primitive functions of said electronic portable device for operating said interface and said smart chip being arranged to execute said application, the latter being able to generate calls to the primitive functions for communicating with the user via said interface,
  • said application stored in the chip of the generic key is a generic test program generating calls to the primitive functions and the method comprises, following said manufacturing step, a test step of said electronic key consisting of the execution of the generic test program.
  • the invention also relates to a method for operating an electronic portable device, for example an electronic key, as described above, the method comprising one or more exchanges defined by:
  • the request can be an initialization request at the start of the key to launch the main application of the chip or a result (input of the user) in which case the transmission of the result to the chip is an implicit request in that this message implies that the microcontroller is waiting for the next instruction to be executed.
  • the method further comprises a step of recording said script in a memory, the recording being performed by the microcontroller upon receipt of the script, and said script execution step consists of reading each instruction of the script in memory and the execution of the instruction after reading.
  • the method further comprises a plurality of requests sent by the microcontroller to said smart chip and, in response to each of said sendings, a step of reception, by said microcontroller, of at least one instruction issued. by the smart chip and execution of said instruction by the microcontroller.
  • queries can be "queries types "characterized by the fact that they are independent of the application in memory of the smart chip, since they are intended to obtain the specific instructions of an application from the generic microcontroller.
  • These requests may also include data specific to the application of the portable device, in which case, these data are provided by the user via the interface (for example, choosing an item from a menu) and transmitted to the chip. without modification or interpretation by the microcontroller (since it is not specific to the intended application).
  • the method comprises, during the execution of a script or an instruction, a preliminary step of supplying the smart chip by the microcontroller and a subsequent step, after at least one exchange with the smart chip, de-powering the smart chip by the microcontroller.
  • the information for the execution of these two prior and subsequent steps can be indicated in the script itself or the instruction itself.
  • FIG. 1 illustrates the operation of an autonomous electronic key of the prior art equipped with an ignition and selection button, and a screen for generating a one-time password
  • FIG. 2 illustrates an example of a process for developing a personalized electronic key of the prior art
  • FIG. 3 represents an exemplary architecture of an electronic key according to the present invention.
  • FIG. 4 illustrates an operation of an electronic key according to the present invention
  • FIG. 5 illustrates another example of operation of an electronic key according to the present invention, this operation being cumulative with that illustrated in FIG. 3 within the same electronic key
  • FIG. 6 represents an example of a process for manufacturing a personalized electronic key according to the present invention.
  • an electronic key 100 used for the generation of OTP single use passwords according to the present invention comprises:
  • a microcontroller 1 10 equipped with a read-only memory ROM 1 12 comprising the microcontroller's execution microprogram and a writable memory RAM 1 14 for the temporary storage of data during the operation of the key,
  • the secure smart chip 124 possibly connected via a "smart card” interface component 122 to the microcontroller.
  • the secure chip is of the intelligent type comprising a microprocessor, RAM and dead and means of communication with the microcontroller 1 10 via the interface component 122.
  • the chip comprises in its read-only memory an application program 126 (or main application ) dedicated to the desired application of the electronic key (the generation of one-time passwords), this program providing different processes or functions to be executed
  • the button or buttons are connected to the microcontroller, the latter exploiting the actions applied to the buttons, and
  • a connection interface 150 with third party equipment typically a personal computer PC with which the electronic key will communicate for the generation of a one-time password for the user. This communication interface is connected to the microcontroller.
  • the microprogram of the microcontroller provides basic or "primitive" functions acting on the generic components of the key 100, among which:
  • Menu this function scrolls a menu and allows the selection of an item according to a parameterizable delay or specific to the electronic key, for example 2 seconds.
  • Display This function displays a character string by scrolling if it exceeds the capabilities of the screen.
  • the microcontroller turns on the smart chip 124,
  • the microcontroller executes a generic instruction to issue a process request S00 to the chip.
  • This generic instruction can be coded directly in the executable code of the firmware or stored at a specific location of the read-only memory 1 12 to which the microprocessor accesses by default.
  • this instruction is stored on a remote server accessible by means of communication parameterized appropriately.
  • This process request S00 requests the chip 124 to execute the process S00 of the application program 126.
  • the chip 124 upon receipt of the request S00, the chip 124 executes this process S00, which makes it possible to transmit to the microcontroller an execution script comprising the instructions that the microcontroller must execute.
  • This script is stored at a specific location in the memory of the chip 124 or directly in the application program 126.
  • the script is a string comprising calls to the primitive functions available on the microcontroller: "Menu: OTP (S10), Counter (S1 1), Token ID (S12) ", where the values S10, S1 1 and S12 correspond to process identifiers used by the smart chip to take into account the choice of the user.
  • the request S00 issued by the microcontroller corresponds to the power-up signal (power supply) of the smart chip. The latter is set to respond when it is initialized (ATR - Answer To Reset) by sending an ATR sequence comprising so-called "historical" bytes that contain the script.
  • the microcontroller Upon receipt of the script, the microcontroller stores the script in RAM memory 1 14. This temporary storage is all the more useful that the transmitted script includes several execution instructions. Either the storage is automatic by the microcontroller, or it can be forced by the chip 124 by adding at the beginning of the script the primitive function "Save" which allows the microcontroller to save the following instructions in RAM memory 1. the microcontroller turns off the smart card module 120.
  • the firmware executes the instruction "Menu: OTP (S10), Counter (S1 1), Token ID (S12)” and therefore displays on the screen 130 the first item of the menu, namely "OTP", during the time delay parameterized by 2 seconds.
  • the user who wishes to generate an OTP password validates the choice by noting, for example, the button 140 that it keeps pressed from step 200 when "OTP" is displayed on the screen.
  • the firmware interprets the user input (validation) by going through the following steps.
  • the microcontroller supplies the module 120 again.
  • the microcontroller sends a request for execution of the process S10 to the attention of the chip 124.
  • the smart chip executes the process S10, that is, the operations for generating the one-time password and transmits the script "Display gX36Jz; UWait 30s; Power Off" to the microcontroller.
  • the latter stores the script in memory 1 14, especially since there are three instructions (Display, UWait and Power Off) to execute one after the other.
  • the microcontroller turns off the smart chip.
  • the microcontroller executes the script, that is to say the first instruction "Display gX36Jz” and thus displays the password generated “gX36Jz” on the screen 130.
  • the microcontroller then executes "UWait 30s" while maintaining the display for 30s without any intervention of the user can modify the behavior of the key.
  • the chip transmits only one instruction at a time, so that the microcontroller interrogates the card after each instruction executed, which allows a dynamic execution based on decisions made by the card.
  • the display of item 1 of the menu during step 212 ends after the delay. 2 seconds.
  • the microcontroller then displays (232) the item 2 of the "Counter” menu during the time delay, the user being able at any time to release the button 140 to enter the menu and cause the process S1 1 to be executed by the smart chip. If the user does not intervene within the delay time, item 3 "Token I D" is then displayed (234) and, similarly to what has been described above:
  • the microcontroller feeds the smart card
  • 240 the microcontroller sends a request for execution of the process S12 to the attention of the chip 124.
  • the smart chip executes process S12, ie the retrieval and transmission of the serial number of the key electronic. It then sends the script "Display N 123456; Wait 10s; Power Off” to the microcontroller.
  • the microcontroller stores the script in memory 1 14, 246: the microcontroller turns off the smart chip. 248: Then the microcontroller executes the script, that is to say the first instruction "Display N 123456" and thus displays the identifier "N 123456" of the key on the screen 130.
  • the microcontroller then executes "Wait 10s" while maintaining the display for 10s. If the user presses the button 140, the microcontroller instantly proceeds to the execution of the following instruction, namely to turn off the key.
  • Figure 5 illustrates another way of using the key interacting with a third-party PC equipment for the provision of an OTP.
  • the user connects the key 100 to the third-party equipment via a USB port and the interface 150.
  • the key is then automatically powered by the USB interface.
  • the PC issues an OTP request via the USB port 304: the microcontroller then supplies the smart card module 120, then 306: the microcontroller transmits the OTP request to the module 120, corresponding to a process to be executed by the chip 124.
  • the smart chip issues a display request "Display" to prompt the user to validate the sending of a password
  • the user validates the command by pressing the button 140
  • 312 the support is transmitted by the microcontroller to the smart card
  • 314 the chip 124 then generates an OTP password and transmits it to the microcontroller
  • Figure 6 illustrates the different steps performed by the company who wishes to customize an electronic key of the present invention according to the desired application.
  • step 400 the company receives the generic electronic keys.
  • the invention makes it possible to have a single generic key with the same firmware regardless of the intended use and the customization made to reduce the production costs caused by the increase in volumes and / or the diversification of the applications, and to facilitate the management of key stocks.
  • the firmware controlling the microcontroller is installed in ROM memory 1 12 by the component founder. The manufacturing costs per unit are thus reduced since the ROM is inexpensive.
  • the electronic key in its generic version includes a test program 128 stored in memory of the secure chip.
  • This test program is generic and allows, when executed by the chip 124 to test the features available to the microcontroller 1 10.
  • test the key To test the key, the user turns on the key.
  • the microcontroller then transmits the SOO request to the chip, this SOO process being associated in the chip with the test program.
  • the latter then issues a test script, for example, "Display EssaM; UWait 10s; Display Test2; Wait 5s; Display 5; UWait 1 s; Display 4; UWait 1 s; Display 3; UWait 1 s; Display 2; UWait 1 s; Display 1; UWait 1 s; Display Extinction; UWait 1 s; Power Off.
  • the user validates the correct operation of the key by ensuring that it displays "EssaM” for 10s, then “Trial2” for 5s and then count down from 5 to 0 until the key is extinguished.
  • the test script makes, ideally, at least one call to each primitive functions of the microcontroller. Such a test phase can be performed at several levels of the production line.
  • This personalization step consists in loading the main application 126 (or a set of processes to be executed) in the chip 124. This loading can be carried out via the USB communication interface 150 but also by placing the chip 124 in another reader smart card directly connected to a computer programming equipment. The loading of this main application 126 inhibits the test application 128, for example by modifying, in smart card memory, a register associated with the process S00 which now points to the memory address of the new application 126. loaded.
  • 406 and 408 After customization, tests on the specific application and its interoperability with the whole key are performed taking into account this specificity.
  • the presence of the interface 150 makes it possible to envisage, without significant additional cost, modifying the behavior of the electronic key a posteriori (bug correction, optimization of applications, etc.).
EP06830702A 2006-01-06 2006-12-18 Mit einer personalisierten chipkarte ausgestatteter generischer elektronischer schlüssel Withdrawn EP1969535A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0650055A FR2896060A1 (fr) 2006-01-06 2006-01-06 Cle electronique generique munie d'une carte a puce personnalisee
PCT/EP2006/069870 WO2007077119A1 (fr) 2006-01-06 2006-12-18 Cle electronique generique munie d'une carte a puce personnalisee

Publications (1)

Publication Number Publication Date
EP1969535A1 true EP1969535A1 (de) 2008-09-17

Family

ID=37337754

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06830702A Withdrawn EP1969535A1 (de) 2006-01-06 2006-12-18 Mit einer personalisierten chipkarte ausgestatteter generischer elektronischer schlüssel

Country Status (4)

Country Link
US (1) US20090144556A1 (de)
EP (1) EP1969535A1 (de)
FR (1) FR2896060A1 (de)
WO (1) WO2007077119A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034812A (zh) * 2021-03-25 2021-06-25 一汽解放大连柴油机有限公司 一种钥匙管理箱及其控制电路

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9965067B2 (en) 2007-09-19 2018-05-08 T1V, Inc. Multimedia, multiuser system and associated methods
US9953392B2 (en) 2007-09-19 2018-04-24 T1V, Inc. Multimedia system and associated methods
JP4546551B2 (ja) * 2008-03-18 2010-09-15 フェリカネットワークス株式会社 情報処理装置、情報処理方法、プログラムおよび情報処理システム
WO2010005681A1 (en) * 2008-06-16 2010-01-14 Visa U.S.A. Inc. System and method for authorizing financial transactions with online merchants
US8190906B1 (en) * 2008-12-16 2012-05-29 Emc Corporation Method and apparatus for testing authentication tokens
EP2437198B1 (de) 2010-10-01 2020-12-30 HID Global GmbH Sicheres Pin-Rückstellverfahren
WO2012100001A1 (en) * 2011-01-18 2012-07-26 T1 Visions, Llc Multimedia, multiuser system and associated methods
EP2750006A1 (de) * 2012-12-27 2014-07-02 Gemalto SA Vorrichtung, die für die Emulierung von taktilen Kontakten auf einem kapazitiven Schirm ausgelegt ist
TWI528626B (zh) * 2013-07-24 2016-04-01 啟碁科技股份有限公司 傳輸裝置及近場通訊裝置
WO2015101687A1 (es) * 2013-12-30 2015-07-09 Pedro Jose Iglesias Rosado Dispositivo criptografico electronico personalizable
CN103679904A (zh) * 2014-01-03 2014-03-26 上海长跃通信技术有限公司 光缆交接箱的智能锁安全管理系统
CN109191617A (zh) * 2018-07-12 2019-01-11 安徽先锋门业科技有限公司 一种基于特征识别的开门安全控制方法
CN109711519B (zh) * 2018-12-27 2022-10-25 江苏恒宝智能系统技术有限公司 一种基于金融芯片的外设扩展方法及金融卡

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802176A (en) * 1996-03-22 1998-09-01 Activcard System for controlling access to a function, using a plurality of dynamic encryption variables
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
US6564995B1 (en) * 1997-09-19 2003-05-20 Schlumberger Malco, Inc. Smart card application-selection
US6151647A (en) * 1998-03-26 2000-11-21 Gemplus Versatile interface smart card
FR2784479B1 (fr) * 1998-10-09 2000-11-17 Bull Cp8 Protocole d'echange interne de donnees entre applications d'un objet portatif multi-applications et objet portatif multi-applications correspondant
IL126552A (en) * 1998-10-13 2007-06-03 Nds Ltd Remote administration of smart cards for secure access systems
CN1262485A (zh) * 1998-11-10 2000-08-09 阿拉丁知识系统有限公司 由可灵活连接计算机系统群体使用的用户-计算机交互方法
FR2806505A1 (fr) * 2000-03-15 2001-09-21 Schlumberger Systems & Service Procede de communication entre une carte a puce et une station hote
CN2517012Y (zh) * 2002-01-23 2002-10-16 台均实业有限公司 可随意升级扩容更换存储介质的usb移动存储器
US7143224B2 (en) * 2003-05-09 2006-11-28 Stmicroelectronics, Inc. Smart card for performing advance operations to enhance performance and related system, integrated circuit, and methods
US7762470B2 (en) * 2003-11-17 2010-07-27 Dpd Patent Trust Ltd. RFID token with multiple interface controller
US7213766B2 (en) * 2003-11-17 2007-05-08 Dpd Patent Trust Ltd Multi-interface compact personal token apparatus and methods of use
US7270276B2 (en) * 2004-09-29 2007-09-18 Sap Ag Multi-application smartcard
US7748636B2 (en) * 2004-11-16 2010-07-06 Dpd Patent Trust Ltd. Portable identity card reader system for physical and logical access

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007077119A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034812A (zh) * 2021-03-25 2021-06-25 一汽解放大连柴油机有限公司 一种钥匙管理箱及其控制电路

Also Published As

Publication number Publication date
WO2007077119A1 (fr) 2007-07-12
FR2896060A1 (fr) 2007-07-13
US20090144556A1 (en) 2009-06-04

Similar Documents

Publication Publication Date Title
EP1969535A1 (de) Mit einer personalisierten chipkarte ausgestatteter generischer elektronischer schlüssel
KR101434293B1 (ko) 텔레포니 및 디지털 미디어 서비스들을 제공하기 위한 시스템, 방법 및 장치
EP2203834B1 (de) Verfahren und vorrichtung zur verwaltung von anwendungsdaten in einem nfc-system
US8942672B2 (en) Mobile integrated distribution and transaction system and method for NFC services, and a mobile electronic device thereof
US20100093396A1 (en) Systems and methods for storing or performing functions within removable memory, such as a subscriber identity module of a mobile device
WO2006053958A1 (fr) Support personnel de mémoire de masse portatif et système informatique d'accès sécurisé a un espace utilisateur via un réseau
EP3123387B1 (de) Sichern des ladens von daten in einen nichtflüchtigen speicher eines sicheren elements
WO2008129225A1 (fr) Procédé de communication et de transmission d'un message concernant une transaction d'une application sans contact, terminal, module sécurisé et système associés
EP2483784A1 (de) Abgleichungsverfahren, system und vorrichtung für den datenaustausch zwischen einem kommunikationsobjekt und einer verarbeitungseinheit
EP2466471A1 (de) Sicherheitsgerätemodul und Fehlerbeseitigungsverfahren in einem solchen Modul
FR2908209A1 (fr) Entite electronique portable et procede de personnalisation d'une telle entite electronique
FR2945143A1 (fr) Procede et systeme d'activation d'applications de paiement sans contact
EP2210403A1 (de) Verfahren und vorrichtung zur steuerung der anzeige eines informationsbereichs auf dem startbildschirm eines mobilen endgerätes
CN114138343A (zh) 一种终端及终端启动方法
EP2058746A1 (de) Tragbare elektronische Einheit, Hoststation und entsprechendes Verfahren
CN115146293A (zh) 一种文件加、解密方法、设备及介质
EP4066106A1 (de) Kommunikationsverfahren zwischen zwei subsystemen, die ein modulares zahlungsterminal bilden
EP1588252B1 (de) System und verfahren zur übertragung von daten zwischen interaktiven öffentlichen terminalgeräten und persönlichen terminalgeräten
FR2901386A1 (fr) Support personnel de memoire de masse portatif et systeme informatique d'acces securise a un reseau par des utilisateurs.
CN114390013A (zh) 一种视频下载方法和相关设备
WO2009071836A1 (fr) Procédé de gestion de l'interface utilisateur d'un terminal mobile associé à un module de sécurité et terminal mobile associé
WO2007026002A1 (fr) Execution d'une commande pro-active elaboree dans un terminal
FR2901380A1 (fr) Support personnel de memoire de masse portatif et systeme informatique d'acces securise a un espace utilisateur via un reseau
WO2001057699A2 (fr) Microcontroleur et procede pour la gestion d'applications interactives
EP2306414A1 (de) Kommunikationsverfahren zwischen einem Kartenleser und zwei Chipkarten

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080604

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GEMALTO SA

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20130527

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160712