EP2478435A1 - Verfahren zum installieren und konfigurieren von applikationen auf einem portablen datenträger - Google Patents
Verfahren zum installieren und konfigurieren von applikationen auf einem portablen datenträgerInfo
- Publication number
- EP2478435A1 EP2478435A1 EP10759608A EP10759608A EP2478435A1 EP 2478435 A1 EP2478435 A1 EP 2478435A1 EP 10759608 A EP10759608 A EP 10759608A EP 10759608 A EP10759608 A EP 10759608A EP 2478435 A1 EP2478435 A1 EP 2478435A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- application
- applications
- app
- privileged
- data carrier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
Definitions
- the present invention relates to a method for installing and configuring applications on a portable data carrier as well as a correspondingly established data carrier.
- Portable data carriers which have at least one memory and a processor for executing applications stored in the memory, are predominantly set up such that applications of a plurality of service providers can be installed on the data carrier.
- special, privileged applications so-called "security domains” which provide a kind of security environment for the traditional, non-privileged applications of a service provider between them are again differentiated according to the degree of their privilege, the security domain of the card issuer usually has the highest privileges.
- Such a privileged application comprises its own key infrastructure and supports the data communication of the non-privileged application installed in the security domain with third parties via secure data communication channels.
- Non-privileged applications are typically conventional applications, for example, to handle a payment transaction or the like.
- a disk infrastructure of the type outlined is described in detail in the "GlobalPlatform Card Specification, Version 2.2".
- executable applications are provided in a first step in the form of executable code, as so-called “executable load files” in a memory of the disk.This can already happen during the production of the disk, but also if the disk already in
- a further installation step which is essentially carried out by a run time environment of the data carrier, is required. In this case, for example, it is checked whether the service provider for whom or in whose security domain the application is to be installed has provided the application for this, ie the application is being authenticated.
- the runtime environment of the application provides the necessary resources, for example memory space for application data, and enters an information identifying the application in the data carrier into a corresponding data carrier register.
- Each installation and each configuration step requires an installation command that is sent to and processed by the runtime environment of the disk, as well as, in many cases, corresponding disk response responses.
- the installation commands are transmitted from a production machine contact-related to the disk. Due to the large number of installation committees required In order to install and configure a number of applications, such a production step is very time-consuming and expensive, since the production machine has to wait idly until the data carrier has processed and answered an installation grain command.
- the installation commands e.g. by means of SMS or GPRS, as carrier over an air interface ("OTA") to the data carrier.
- OTA air interface
- a large number or even all mobile phone cards of a service provider must be equipped with some new applications and these are configured appropriately for each user, This requires a high volume of data, for example, a very large number of exchanged SMS messages, with the result of an enormous network load.
- a method according to the invention for installing and configuring applications in a portable data carrier is characterized in that one of the applications is installed and configured with only one call of an installation command, or a majority of the applications are installed and / or configured. It is also possible by means of a call to the installation command to carry out several configuration steps relating to an application.
- a portable data carrier which is set up for the purpose of exporting applications installed and configured on the data carrier, comprises a control device for receiving installation commands for installing and configuring the applications on the data carrier.
- the control device is set up to install and configure one of the applications based on only one received installation command, or to install and / or configure a majority of the applications.
- the data volume to be transferred to the data carrier is reduced due to the reduced protocol thread. Furthermore, reduces the number of possibly necessary response commands of the disk, which in addition to the data volume to be transmitted, the number to be transferred and processed commands and thus the entire installation and configuration effort is further reduced.
- the overall effort can be reduced by the fact that, with installation or configuration steps related to one another, for example during installation and subsequent configuration of the same application, method steps that are identical in many cases, for example a specific verification of the application, are only to be performed once.
- the once received installation command can be processed by the disk while it is supplied only with power and clock, but is separated from the production machine. This can thus be utilized more efficiently by already another volume is being processed during this time in which the first volume processes the received installation command. So far, errors have occurred during a sequence of installation and configuration commands in one place, so all these commands had to be undone in a complex process before the commands could be executed again. Now it is necessary to undo the one installation command and execute it again. Overall, the installation and configuration of applications on a portable data carrier is thus simplified and made more efficient.
- Both a security domain as a privileged application and a conventional application as a non-privileged application can be installed and / or configured by means of the method according to the invention. It is also possible for multiple privileged applications or multiple non-privileged applications or a mixture of one or more privileged and one or more non-privileged applications to be installed and / or configured by the method.
- the privileged applications can have the same or different privileges.
- a privileged application can be configured by assigning itself or an already installed privileged application by means of extradition.
- a hierarchy of privileged applications can be built, with a privileged application tion, which is assigned to itself, forms a root of a new tree in the hierarchy and hierarchically subordinates a privileged application, which is assigned to an already installed privileged application.
- the child application has lower privileges than the privileged application to which it is assigned.
- An assigned application can, for example, make use of the services of a higher-level application if the assigned application itself can not provide or provide corresponding services.
- the method according to the invention therefore makes it possible, for example, for a privileged application to be installed by a call to a correspondingly expanded installation command, and subsequently assigned to an already installed further privileged application.
- a privileged application that is within that privileged application, i. Within the environment provided by this application, one or more other applications, be they privileged or non-privileged applications, are installed.
- the privileged application must have corresponding privileges, which are checked by the runtime environment of the data carrier before installing the other applications.
- Additional applications installed in a privileged application can then be assigned to this application. This configures both the privileged application and the assigned application. However, it is also possible to subsequently assign an application installed in a privileged application to another privileged application, for example if the other privileged application is not has enough privileges to install an application in it, but has enough privileges to assign it an application installed elsewhere. Again, the assigned application as well as the privileged application being assigned is configured through the assigning step.
- a privileged application can furthermore be configured by generating key data, which relates to cryptographic keys, within the data carrier and assigning it to the privileged application.
- the key data may include cryptographic keys for use in symmetric or asymmetric encryption techniques.
- the keys are used by the privileged application to provide the application assigned further applications with a security infrastructure, for example, to securely transmit or receive data and store stored data secured.
- a non-privileged application can also be configured by personalizing it with personalization data.
- Personalization data can be any type of user-specific data to set up or adapt the application to a user.
- Each application installed in the data carrier must have unique identification data in order to be addressed within the data carrier.
- identification data are for example a so-called “Application Identifier” (AID) in connection with a contact-type data communication with the data carrier or a “Toolkit Application Reference” (TAR) for contactless data grain communication.
- AID Application Identifier
- TAR Toolkit Application Reference
- a control device of the data carrier generates data carriers within the same Identification data and assigns them to the applications to be installed or configured.
- the control device can be supported, for example, by a counter application which appropriately increments a first identification data record, which is transmitted as a parameter of the installation command, for each additional application to be installed or configured.
- the data carrier can receive the extended or adapted installation command via a data communication interface set up for data communication or, alternatively or additionally, via a data commutation interface established for contactless data communication.
- the received, extended or adapted installation command can include various information, for example in the form of suitable parameters, in particular the number of applications to be installed and / or the number of applications to be configured and / or how an application should be configured.
- This configuration information can therefore in particular include further information about which privileged application an application is to be assigned.
- the privileged application can be specified, within which another application is to be installed, as well as all those applications which are to be assigned to the privileged application.
- the configuration information may further include information about keys to be generated, in particular about key type, key length, key version or key identification.
- a corifiguration information may include or include personalization data for a non-privileged application. A corresponding installation command can thus be adapted for a wide variety of applications and set up.
- the conventional syntax of known installation commands can be at least partially retained.
- Some suitable so-called "tags" can be newly introduced to suitably encode appropriate installation or configuration steps within the extended installation command
- the control device of the data carrier according to the invention is set up to evaluate and process the extended installation command in this way.
- Figure 1 is a portable data carrier according to a preferred embodiment of the invention.
- Figure 2 process steps for installation and configuration of a
- a portable data carrier 10 which is shown as a chip card with reference to FIG. 1, comprises a data commutation interface 20, a processor (CPU) 30 and various memories 40, 50 and 60.
- the design of the data carrier 10 may vary, for example it may also be referred to as (U) SIM mobile communication card, be designed as a memory card, as a USB token or the like.
- the data communication interface 20 is designed as a contact field.
- the data carrier 10 can be contacted via a corresponding reading device.
- a data communication interface for contactless data communication for example in the form of an antenna coil (not shown), be provided.
- a non-rewritable, non-volatile ROM 40 stores an operating system (OS) 42 controlling the data carrier 10 and an application 44 executable on the data carrier 10 according to an installation described below with reference to FIG.
- OS operating system
- a control device 52 and another application 54 are stored in the rewritable nonvolatile memory 50, e.g. a flash or EEPROM.
- the control device 52 which could also be stored in the ROM 40, is configured to execute installation commands received from the data carrier 10 via the data correlation interface 20 for installing and configuring the applications 44, 54 and other applications that can be reloaded via the data communication interface 20, such as this will be described in more detail below with reference to FIG.
- the rewritable, volatile RAM 60 serves the disk 10 as a working memory.
- executable applications such as the stored in the memories 40 and 50 applications 44 and 54, can be assigned to different classes.
- a first class is formed by so-called "security domains.”
- These are privileged applications that can be set up to provide a security environment for other, non-privileged, traditional second-class applications that can not privileged applications, which in the corresponding environment be installed or assigned after an installation, exchange data securely via secure channels and securely store generated or received data.
- a privileged application comprises its own key infrastructure, ie cryptographic keys and functionalities for performing symmetric or asymmetric encryption methods.
- a privileged application is ever assigned to a service provider, so that conventional, non-privileged applications of the service provider can act protected by the privileged application and shielded from applications and services of other providers on the same disk 10. Privileged applications can have different privileges.
- the privileged application of the card issuer the so-called "Issuer Security Domain", ISD, usually has the highest priorities and is installed as a first application on the disk 10. Other privileged applications can subsequently set up on the disk 10, ie installed and configured , become.
- the privileged applications can form a hierarchy by assigning a privileged application to another privileged application (extradited) and thus subordinate it.
- the assigned application can then use services of the privileged application to which it has been assigned, for example if the assigned application does not itself have corresponding privileges.
- a non-privileged application must be installed within a privileged application. If the corresponding privileged application does not have sufficient privileges, the non-privileged application can be installed in a higher-privileged application and afterwards assigned to the low-privileged application by means of extradition.
- the application When installing an application 44, 54 on the data carrier 10 by the controller 52, the application is first authenticated, i. It is checked whether an installation is provided on the disk 10 in the appropriate place. Thereafter, memory space allocated to the application 44, 54 is reserved by the control device 52, which includes a runtime environment of the data carrier 10, and data identifying the application 44, 54 are entered in a register of the data carrier 10. Only after such an installation is an application 44, 54, which was previously already stored as executable code in the form of a so-called "executable load file" in a memory 40, 50 of the data carrier 10 or has been reloaded via the data communication interface 20, on the Processor 30 of the data carrier 10 executable.
- an application 44, 54 may be additionally configured before it can be executed.
- a privileged application 44, 54 must necessarily include predetermined cryptographic keys before it can be executed. These keys must be assigned to the application 44, 54 in one or more configuration steps. Only then can this application 44, 54 be regarded as personalized (“PERSONALIZED") and thus completely usable.Additional configuration steps are the extrapolation, ie the assignment of an application 44, 54 to a privileged application 44, 54. As mentioned, both can not privileged applications 44, 54 as well as privileged applications 44, 54 to other privileged applications 44, 54.
- a privileged application 44, 54 can also be assigned to itself and thus forms a new root in the hierarchy.
- a non-privileged application 44, 54 can also be configured by associating the application with personalization data relating to a later user of the application 44, 54.
- the data carrier 10 is connected via a suitable reading device to a data processing device (not shown), for example a chip card production machine in the manufacture of the data carrier 10 or with a PC for subsequent reloading and installing further applications 44, 54 on the data carrier 10.
- a data processing device for example a chip card production machine in the manufacture of the data carrier 10 or with a PC for subsequent reloading and installing further applications 44, 54 on the data carrier 10.
- An appropriate Da - Communication with the disk 10 for installing and configuring applications can also be carried out via an air interface (OTA).
- OTA air interface
- As a carrier for the corresponding commands then serve e.g. SMS messages, GPRS.
- a privileged application already installed on the data carrier 10 is selected in the form of a security domain, SD 1, eg by means of a SELECT command, and in a second step S2, a secured data channel is established to the privileged application.
- an extended installation command INSTALL is sent to the privileged application SD 1 via this secure channel.
- this command is processed by the control device 52 as described below.
- another privileged application SD 2 is installed within the privileged application SD 1.
- predetermined cryptographic keys are generated in a first configuration step KS 1.
- the generated key data can, if necessary, be transmitted via the secure channel to the data processing device.
- this can be set to the status "PERSONALIZED.”
- the privileged application SD 2 is assigned to itself (extraded) and thus forms the root of its own tree Hierarchy of privileged applications on the disk 10.
- a non-privileged application App is installed within the privileged application SD 1 and then, in a third configuration step KS 3, extradited to the newly installed and extracted privileged application SD 2 ,
- the extended installation command can be customized in any way to encode combinations of the installation and configuration steps described.
- the syntax of the extended installation command largely follows the syntax of conventional, well-known installation commands. It can be necessary to redefine some syntax components.
- the known type of coding for example in TLV format, maintained.
- a new "tag" of length one byte may be emulated followed by a byte indicating the length of the subsequent command and a Byte, which defines the number of applications to be installed / configured, so that three bytes suffice to encode the corresponding information in the extended installation command, in the same way it can be coded, for example, that a given application should be installed and extradited.
- a first byte defines a corresponding new "tag"
- a second byte the length and the n following bytes identify the application via an "Application Identifier" (AID)
- the configuration step of generating keys can be coded by 2 + 4 * n bytes (day, length, 4 * (key type, key length, version number, ID)). Analog or a Similarly, installation and configuration steps described above may be encoded in the extended installation command.
- the amount of data to be transferred - in the case of a contact-type data communication - from the data processing device to the disk by about 45% and from the disk to the data processing device by approx. 30% (measured in bytes of data to be transferred). If, in addition, the key for the privileged applications to be installed is generated internally, the reduction is even approximately 95% or 53%. In the case of contactless data transmission, there are even more significant improvements (now measured in the number of SMS messages required), namely 58% and 58% (excluding key generation), and 98% and 93% (with key generation).
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE200910041924 DE102009041924A1 (de) | 2009-09-17 | 2009-09-17 | Verfahren zum Installieren und Konfigurieren von Applikationen auf einem portablen Datenträger |
PCT/EP2010/063632 WO2011033030A1 (de) | 2009-09-17 | 2010-09-16 | Verfahren zum installieren und konfigurieren von applikationen auf einem portablen datenträger |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2478435A1 true EP2478435A1 (de) | 2012-07-25 |
Family
ID=43048855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP10759608A Withdrawn EP2478435A1 (de) | 2009-09-17 | 2010-09-16 | Verfahren zum installieren und konfigurieren von applikationen auf einem portablen datenträger |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP2478435A1 (de) |
DE (1) | DE102009041924A1 (de) |
WO (1) | WO2011033030A1 (de) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102010012496A1 (de) | 2010-03-24 | 2011-09-29 | Giesecke & Devrient Gmbh | Datenträgerinterne Schlüsselerzeugung |
DE102014112304A1 (de) | 2014-08-27 | 2016-03-03 | Bundesdruckerei Gmbh | Verfahren zur Installation einer zusätzlichen Applikation in einem nicht-flüchtigen Speicher einer Chipkarte |
DE102014112347A1 (de) | 2014-08-28 | 2016-03-03 | Bundesdruckerei Gmbh | Zugriffsschutz für Fremddaten im nichtflüchtigen Speicher einer Chipkarte |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040236680A1 (en) * | 2003-05-22 | 2004-11-25 | International Business Machines Corporation | Method and apparatus for displaying embedded chip states and embedded chip end-user application states |
US20080148277A1 (en) * | 2006-12-18 | 2008-06-19 | Nokia Corporation | Optimizing calls from a managed runtime environment to microkernel extended functionality |
-
2009
- 2009-09-17 DE DE200910041924 patent/DE102009041924A1/de not_active Ceased
-
2010
- 2010-09-16 WO PCT/EP2010/063632 patent/WO2011033030A1/de active Application Filing
- 2010-09-16 EP EP10759608A patent/EP2478435A1/de not_active Withdrawn
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2011033030A1 * |
Also Published As
Publication number | Publication date |
---|---|
DE102009041924A1 (de) | 2011-04-07 |
WO2011033030A1 (de) | 2011-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2318921B1 (de) | Laden und aktualisieren einer personalisierungsbedürftigen applikation | |
EP2910039B1 (de) | Verfahren zum einbringen von teilnehmeridentitätsdaten in ein teilnehmeridentitätsmodul | |
EP2289225B1 (de) | Verfahren zum personalisieren eines sicherheitselements eines mobilen endgeräts | |
EP2779722B1 (de) | Verfahren zum Personalisieren eines Sicherheitsmuduls eines Tele-kommunikations-Endgerätes | |
EP1196902B1 (de) | Verfahren zum betreiben eines zur ausführung von nachladbaren funktionsprogrammen ausgebildeten datenträgers | |
EP2673731B1 (de) | Verfahren zur programmierung eines mobilendgeräte-chips | |
EP2478435A1 (de) | Verfahren zum installieren und konfigurieren von applikationen auf einem portablen datenträger | |
EP3452946B1 (de) | Verfahren zur erstmaligen inbetriebnahme eines nicht vollständig personalisierten sicheren elements | |
WO2001041087A1 (de) | Verfahren zur initialisierung und/oder personalisierung von chipkarten sowie eine entsprechende einrichtung | |
DE102010004446A1 (de) | Verfahren zum Bereitstellen eines sicheren Zählers auf einem Endgerät | |
DE102007041873A1 (de) | Installieren eines Patch in einem Smartcard-Modul | |
WO2023051950A1 (de) | Universal integrated chip card, uicc, zum verwalten von profilen, sowie verfahren | |
DE102021000077A1 (de) | Integriertes Teilnehmeridentitätsmodul mit Anti-Rollback-Mechanismus | |
DE102021005325A1 (de) | Verfahren zur rechnergestützten Erzeugung eines Speicherabbilds für ein sicheres Element | |
DE102015214422A1 (de) | Chipkarte mit Hauptapplikation und Persistenzapplikation | |
DE102023102191A1 (de) | Installieren eines Betriebssystems in einer Prozessoreinrichtung, insbesondere einem Sicherheitsmodul | |
WO2015158419A1 (de) | Verfahren zum ausführen einer codefolge auf einem sicherheitsmodul | |
DE102023110087A1 (de) | Verfahren und System zur Personalisierung eines sicheren Elements | |
EP2659349B1 (de) | Verfahren zum zurücksetzen eines dateisystems | |
EP1959343A1 (de) | Verfahren zur Analyse einer Softwarekonfiguration eines tragbaren Datenträgers | |
EP3293912A1 (de) | Teilnehmeridentifikationssystem | |
DE102010012496A1 (de) | Datenträgerinterne Schlüsselerzeugung | |
DE102014007022A1 (de) | Implementierung einer sicheren Laufzeitumgebung eines mobilen Endgeräts | |
DE102010005726A1 (de) | Verfahren zum Zuordnen eines tragbaren Datenträgers, insbesondere einer Chipkarte, zu einem Terminal | |
EP2172913A1 (de) | Personalisieren von portable Datenträgern |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20120417 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20170127 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20171115 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20180124 |