GB2370659A - Method of controlling access to a data file held by a smart card - Google Patents
Method of controlling access to a data file held by a smart card Download PDFInfo
- Publication number
- GB2370659A GB2370659A GB0031837A GB0031837A GB2370659A GB 2370659 A GB2370659 A GB 2370659A GB 0031837 A GB0031837 A GB 0031837A GB 0031837 A GB0031837 A GB 0031837A GB 2370659 A GB2370659 A GB 2370659A
- Authority
- GB
- United Kingdom
- Prior art keywords
- access
- file
- data
- allowed
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
- G06Q20/35765—Access rights to memory zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72445—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting Internet browser applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/14—Details of telephonic subscriber devices including a card reading device
Abstract
Smart cards 10 can hold data for a number of different applications. A gateway 34 is provided through which access to the smart card by external devices 31 is controlled. Even though the external device may have access to certain application data, such as credit card details, it may not have access to sensitive information, such as authentication and ciphering keys. The external device may be a mobile telephone.
Description
Method of controlling access to a data file held by a smart card Description
The present invention relates to a method of controlling access to a data file held by a smart card.
Smart cards are commonly used in mobile telephone handsets, payment systems and for user identification. An overview of smart cards and their application is given in "Smart Card Handbook"by W. Rankl & W. Effing, John Riley & Sons, 2000 [ISBN 0471988758].
In mobile telephone handsets conforming to the Global System for Mobile
Communications (GSM) standard, a smart card is usually referred to as a subscriber identification module (SIM) card. The SIM card holds a subscriber's identity number, security information and memory for a personal directory of telephone numbers. An overview of SIM cards is given in"The GSM System for Mobile
Communications"by M. Mouly & M. B. Pautet, Sell & Sys, 1992 [ISBN 950719007], pp 67-71.
In payment systems, such as credit and debit cards and electronic money, a smart card may be used to hold a variety of different types of information and provide secure methods of payment. Payment systems employing a smart card usually conform to the Europay-Mastercard-Visa (EMV) standard and a copy of the specification may be obtained from www. emvco. com. An overview of payment systems is given in"Electronic Payment Systems", by D. OMahony, M. Peirce and
H. Tewari, Artech House, 1997 [ISBN 08900692555] and at www. mastercard. com.
Increasingly smart cards hold many different types of information accessible to different applications such electronic payment systems and telecommunications.
This is known as open access and such a smart card capable of housing different applications is a universal integrated circuit card (UICC). However, it is desirable to restrict access to some files, especially those concerned with personal and financial
information or those containing data necessary for user authentication and call encryption.
Furthermore, mobile telephones are increasingly capable of exchanging data and accessing the internet. Therefore, the opportunity arises of using the mobile telephone handset to make and pay for purchases over the internet. It is preferable that data available to different applications should be delimited in some way.
The present invention seeks to help allow open access to a smart card used by different applications.
According to the present invention there is provided a method of controlling access to a data file held by a smart card, the method comprising providing an access table including an indication whether access to said file is allowed, receiving a request for access identifying said data file, deciding whether access to said data file is allowed in dependence upon said indication and, if access is allowed, providing access to said file.
The receiving said request may include receiving an instruction to execute a command in respect of said file. Alternatively, the method may further include receiving an instruction to execute a command in respect of said file. The providing access may comprise transmitting said instruction to execute the command in respect of said file to said smart card.
The method may further comprise receiving information in relation to execution of said command from said smart card. The receiving of the information may comprise receiving confirmation that the command has been executed or data from said file.
The providing access to said file may include reading or writing to said file.
According to the present invention there is also provided a method, in a controller, of controlling access to a data file held by a smart card, the method comprising
receiving a request for access identifying said data file, deciding whether access to said file is allowed and, if access is allowed, providing access to said file.
According to the present invention there is also provided a method of programming a controller which controls access to a data file held by a smart card, the method comprising providing access data including an indication whether access to said file is allowed
According to the present invention there is also provided a computer program to be loaded on data processing apparatus to control access to a data file held by a smart card, such that the data processing means provides an access table including an indication whether access to said file is allowed, receives a request for access identifying said data file, decides whether access to said data file is allowed in dependence upon said indication and, if access is allowed, provides access to said file.
According to the present invention there is also provided a device to control access to a data file held by a smart card comprising means for providing an access table including an indication whether access to said file is allowed, means for receiving a request for access identifying said data file, means for deciding whether access to said data file is allowed in dependence upon said indication and means for providing access to said file.
According to the present invention there is also provided electronic apparatus or a mobile telephone incorporating said device.
Embodiments of the present invention will now be described, by way of example, with reference to the accompanying drawings, in which:
Figure 1 is an exploded view of a mobile telephone according to a first embodiment of the present invention ;
Figure 2 is a schematic representation of telephone circuits of the mobile telephone shown in Figure 1;
Figure 3 is a plan view of a universal integrated circuit card;
Figure 4 is a schematic representation of the circuits of the universal integrated
circuit card shown in Figure 3 ; Figure 5 is schematic diagram of the memory structure held by the universal integrated circuit card shown in Figure 3;
Figure 6 shows a laptop personal computer with an infra red port exchanging information with the mobile telephone shown in Figure 1;
Figure 7 is schematic diagram of information exchange between the personal computer and the mobile telephone;
Figures 8a and 8b are sequence diagrams of the interaction between the personal computer and the mobile telephone;
Figure 9 is a schematic representation of a request message from the personal computer;
Figure 10 is a schematic representation of a response message from the mobile telephone,
Figure 11 is a process flow diagram of the response of the mobile telephone
Figure 12 is a schematic representation of telephone circuits of the mobile telephone according to a second embodiment;
Figure 13 shows a laptop personal computer with Bluetooth unit exchanging information with a mobile telephone also having a Bluetooth unit;
Figure 14 is a schematic block diagram illustrating the mobile telephone communicating through a PLMN with a WAP server and
Figure 15 is process flow diagram of making a purchase on with the mobile telephone.
First embodiment
Referring to Figures 1 and 2, a mobile telephone 1 comprises a housing 2, a liquid crystal display 3, a keypad 4, a microphone 5, an ear-piece 6, battery 7, an infrared port 8, antenna 9, a universal integrated circuit card (UICC) 10, a UICC card reader 11 and mobile telephone circuitry 12. The mobile telephone circuitry 12 includes radio interface circuitry 13, codec circuitry 14, controller 15 and memory 16.
Individual circuits and elements are of a type well known in the art, for example in the Nokia range of mobile telephones.
Referring to Figures 3 and 4, the UICC card 10 comprises a plastics card body 17 and a module 18, which comprises an integrated circuit 19 and contacts 20. The integrated circuit 19 comprises input/output circuits 21, a processor 22 and nonvolatile memory 23.
The UICC card 10 conforms to International Standards Organisation/International
Electrotechnical Commission (ISO/IEC) 7816. A copy of the ISO/IEC standards may be obtained from ISO at Case Postale 56,1211 Geneva 20, Switzerland. The
UICC card 10 may also conform to other standards, for example Europay
Mastercard-Visa (EMV) set of specifications which relate to standards for international debit and credit cards. A copy of the EMV standards may be obtained from Europay at 198A Chausée de Tervuren, B-1410 Waterloo, Belgium.
Referring to Figure 5, files stored in memory 23 are organised according to a hierarchical structure 24 and are grouped according to application 25. The structure 24 comprises a master file (MF) 26, dedicated files (DF) 27, application dedicated files (ADFs) 28 and elementary files (EFs) 29. An ADF 28 is a particular type of
DF 27 and serves as a point of entry to EFs 29 of a particular application. A directory file 30 attached to the MF 26 is used to access ADFs 28. Usually, an external device wishes access to the contents of EFs 29.
Referring to Figure 6, the mobile terminal 1 may exchange information with an external device, for example a laptop personal computer (PC) 31 having an infrared (IR) port 32, through an IR link 33.
Referring to Figure 7, a functional representation of the interface between the mobile terminal 1 and the PC 31 is shown. Access to DFs 27, ADFs 28 and EFs 29 stored in the memory 23 of the UICC 10 is controlled by an external interface gateway 34. The gateway 34 is the implemented in software by the controller 15.
The gateway 34 prevents PC 31 from having direct access to DFs 27, ADFs 28 and
EFs 29. The gateway 34 has available to it the location of a file, such as a first EF 29"within the hierarchical structure 24 and whether the PC 31 is allowed access to it. In this example,"access"is understood to include reading and writing to the file, although specific types of access are defined in ISO/IEC 7816 and EMV standards.
Thus, access by the PC 31 to the first EF 291 is non-transparent because no path information is sent to the PC 31. The gateway 34 performs any command received from the PC 31 on its behalf. Furthermore, the gateway 34 provides a standard interface between the PC 31 and the UICC 10.
Referring to Figure 8a, a sequence diagram of the exchange of signals within the application layer between the PC 31 and the mobile telephone handset 1 is shown in which the PC 31 successfully retrieves the first EF 29i from the UICC 10. A description of the signal exchanges within the physical, data link and terminal transport layers may be found in the ISO/IEC 7816 and EMV standards
The PC 31 sends an interrogation signal INRG over the IR link 33, requesting a list of applications LIST held by the card (step Sl). The list of applications is held by the directory file 30. The exchange 34 retrieves the application list LIST from the directory 30 and sends it to the PC 31 over the IR link 33 (steps S2, S3 & S4). The
PC 31 sends a request REQ to read the contents of a particular file, in this example the first EF 291 which holds a credit card number. The first EF 291 is attached to a first application AID 1 251, which in this example is a banking application such as
EMV, and is entered through a first ADF 281 (step S5). The form and content of the request REQ will be described in more detail below. The gateway 34 checks whether the PC 31 is allowed access to the first EF 291 by referring to a look-up table (not shown) (step S6). In this example, the look-up table is held in memory 16. The form and content of the table will be described in more detail later. If the
PC 31 is allowed access to the first EF 29,, then the gateway 34 performs a command COMMAND contained in the request REQ, in this example to read the contents of the first file EF 291 (step S7). The contents of the first EF 29, is retrieved and a response RES sent to the PC 31 containing the contents of the first
EF 291 (steps S8, S9 & S10).
Referring to Figure 8b, a sequence diagram of the interaction between the PC 31 and the mobile telephone 1 is shown in which the PC 31 is unsuccessful in its attempt to retrieve a second EF 292 from the UICC 10.
The PC 31 sends an interrogation signal INRG over the IR link 33, requesting a list of applications held by the card (step Sil). The exchange 34 retrieves the application list LIST from the directory 30 and sends it to the PC 31 over the IR link 33 (steps S12, S13 & S14). The PC 31 sends a request REQ to read the contents of a particular file, in this example the second EF 292 which holds a ciphering key used in mobile telecommunications. The second EF 292 is attached to a second application AID2 252, which in this example is a telecommunication application, such as a universal subscriber identification module (USIM) and is accessed through a second ADF 282 (step S15). The gateway 34 checks whether the
PC 31 is allowed access to the second EF 292 by referring to a look-up table (not shown) (step S16). If the PC 31 is not allowed access to the second EF 292 then the gateway 34 sends a response RES to the PC 31 containing an error message indicating that the PC 31 is not allowed access (step S17). Similarly, if the PC 31 requests the contents of a file which does not exit, when the gateway 34 checks the look-up table and does not find the file, it returns an error message indicating that the file has not been found. It will be appreciated that instead of retrieving the application list LIST every time a command is sent, it may be retrieved once per card session during which many access requests are made.
Referring to Figure 9, an example of a request command REQ 35 using an ISO 7816 definition control-application protocol data unit (C-APDU) is shown together with exemplary data in the case that the PC 31 wants to read the content of the first
EF 291 in the application. The request 35 comprises an application identifier (AID) field 36, which identifies the application the PC 31 wishes to access. In this example, the AID 36 comprises a registered application provider identifier (RID) and a proprietary application identifier extension (PIX). The request 35 further comprises a file label field 37, which identifies the file to be accessed. The request 35 also includes a length of data string 38 and a class (CLA) byte 39, which identifies the instruction to be performed on the file. The request 35 further comprises an instruction byte (INS) 40, which identifies the type of instruction the application should perform, such as read or write and first and second parameter (P) bytes 41u 412, which further subdivide the operations described in the instruction byte 40. The request 35 further includes a length of command data field 42, which
indicates the number of bytes that the card 10 should expect. The request 35 also comprises a data field 43, which could for example contain data to be stored in a selected file or a path to a file to be read. The request 35 also comprises a length of expected data field 44, which indicates the number of bytes the PC 31 expects to receive from the mobile terminal 1.
In this example, the class, instruction and parameter bytes 39,40, 41 together with the length of command, data and expected data fields 42,43, 44 are a C-APDU string 45 which is defined in accordance with ISO 7816. It will be appreciated that these fields are conditional.
Referring to Figure 10, an example of a response RES 46 is shown. The response 46 comprises application identifier 47, file label 48 and command type fields 49 fields as described above. The response 46 further includes length of received data and data fields 50,51 and it will be appreciated that these fields 50,51 are conditional.
The response 46 also comprises first and second status words (SWs) 52t, 522, which indicate the status of the response.
In this example, the data field 52 and the status words 5211 522 are a responseapplication protocol data unit (R-APDU) string 53 which is defined in accordance with ISO 7816. Thus, for example, if the first and second status words 521, 522 contain between them"6A82", this indicates"file not found"and"6982"indicates "security status not satisfied".
Referring to Table 1 below, the look-up table comprises a list of EFs 29 together with flags indicating whether access by the PC 31 is allowed. In this example, a flag set to"1"indicates that access is allowed, while a flag set to"0"indicates that access is not permitted. The look-up table holds different types of information.
For example, the DF TELECOM file 27 is point of entry for general telecommunications information such as an abbreviated dialling numbers EF.
Further examples of EFs in the DF TELECOM file 27 are found in 3GPP
Technical Specification 31.102. The ADFs 28 provide points of access to data related to other applications. For example, the first ADF 28, is point of access to
credit card information such as card number, issue number, expiry date, card holder's name and card issuer. Each credit card, debit card and electronic cash card may be represented by a separate application 25. In this example, the second ADF 282 contains USIM data, such as ciphering keys, subscription identity and memory for short message service (SMS). It will be appreciated that other applications having information stored on the card 10 may include driving licence, health details and insurance, club membership, automobile breakdown membership and library card.
TABLE 1
File Access Contents of EFs 29 at the MF 26 level EFDIR 1 EFICCIDfICC Identity) 1 EFPL (preferred Language) 1 Contents level EF1 (Abreviated Dialling Number) 0 EF2 1 Efx 0 Contents of EFs 29 at ADF1 28, level EF1 (Credit Card Number) 1 EF2 (PIN number 0 EFv Credit Card Exnirv Date) 1 Contents level EF1 (Ciphering Keys) 0 EF2 (Subscription Identity) 0 EFz (SMS sotrage) 1 Referring to Figure 11, a process flow for operation of the gateway 34 is shown.
The gateway 34 receives the request 35 and extracts the application and file identifiers 36,37 which identify an ADF 28 and an EF 29 respectively (steps S18 &
S19) The gateway 34 searches for the EF 29 (steps S20 & S21). If it does not find the EF 29, then it sets the first and second status word 521, 522 to"6A82"indicating that the file has not been found (step S22). If it does find the EF 29, then retrieves the access status (step S23). The gateway 34 checks the access status (step S24). If access is denied, then it sets the first and second status word 521, 522 to"6982" indicating that access is denied (step S25). If access is permitted, then the gateway 24 sends a command, for example read contents of EF 29, to the UICC 10 (step 26). The gateway 34 receives the contents of the EF 29 and sets the first and
second status word 52l, 522 to"9000"indic'oting that access is permitted (steps S27 & S28). Once the response 46 has been assembled, it is sent to the PC 31 (step
S29).
If the command at step S26 is to write data to EF 29, then the gateway 34 sends the data to UICC 10. Once the data has been written, the UICC 10 confirms writing of the data. The gateway 34 sets the first and second status word 52 522 to"9000" indicating that writing is successful.
It will be appreciated that the gateway 34 and the UICC 10 communicate using C APDUandR-APDUs.
Second embodiment
Referring to Figures 1,12 and 13, the mobile telephone handset 1 of the first embodiment of the present invention is modified to include a Bluetooth unit 54.
This allows the mobile telephone handset 1 to communicate with the PC 31, which has also been modified to include a Bluetooth unit (not shown) over a short-range radio link. A Bluetooth specification (version LOB) and a system overview may be found on the world-wide web at www. bluetooth. com or ordered from Bluetooth
SIG, c/o Daniel Edlund, Facsimile No.: +46 70 615 9049.
The exchange of information between the mobile telephone 1 and the PC 31 is similar to the that described in the first embodiment with reference to Figures 3,4, 5,7, 8a, 8b, 9a, 9b, 10 and 11. The gateway 34 is implemented in software by the controller 15. Alternatively, the gateway 34 may be implemented independently of the controller 15 by the Bluetooth unit 54 itself.
Third embodiment
Referring to Figures 1 and 14, the mobile telephone 1 according to the first embodiment of the invention is modified so as to support wireless application protocol (WAP). The mobile telephone 1 may used not only to search for an item, such a television set, on the internet but also to pay for it using a credit card application on the USIM 10.
An overview of WAP and the wireless application environment (WAE) may be found at http://www. wapforum. org/.
The mobile telephone 1 is in radio communication with a public land mobile network (PLMN) 55 through which it may exchange content with a WAP server 56 via a WAP gateway 57. The mobile telephone 1 is configured to execute browser software with which a user can access and view content provided by the server 56.
In this example, a supplier of electrical goods maintains the server 56 and it is possible to browse an on-line catalogue and select and pay for a purchase.
Referring to Figure 15, a flow diagram of a purchase selection and payment process is shown. The server 56 is accessed by dialling an individual telephone number associated with the WAP gateway 57. A connection to the PLMN 55 is established, involving authentication of the user using Ki and encryption of transmission signals using Kc (steps S30). This process involves the mobile telephone 1 accessing values of Ki and Kc held by the UICC 10. Security management is described in"The GSM System for Mobile Communications"ibid., pp 477 to 492. Once a secure encrypted connection to the WAP gateway 57 has been established, the user selects a link to the server (step S31). The user searches the on-line catalogue for the television set of his choice (step 32). Once they succeed in finding their choice of television, they select a link"BUY" (step S33). The server 56 obtains delivery and payment information from the UICC 10 according to the procedure outlined in Figures 8a and 8b (step S34). For example, the server 56 sends a request for the contents of the first EF 291 which contains the user's credit card number. The server 56 goes on further to request name and address of the user. If at any point the gateway 34 decides that the server 56 is not allowed to access the UICC 10, then the server 56 may request the user to enter the information on the keypad 4 (step S35 & S36).
Otherwise, if the sequence of requests is successful (step S37), then the server 56 sends a message to the mobile telephone 1 that the transaction is complete (step
S38).
Use of the gateway 34 has the advantage that it is possible to delimit access to different applications. In particular, even though an external agent may have access
to application data, such as credit card details, it may not have access to sensitive information, such as authentication and ciphering keys. The gateway 34 provides a means to prevent fraudulent attempts to obtain such keys and so defraud the telephone billing system. Thus, even though an external device may have successfully accessed some data on the UICC 10, it does not mean that it will have complete freedom to access all data on the UICC 10, such as files of another application.
It will be appreciated that many modifications may be made to the embodiments described above. For example, the connection between the mobile telephone and the PC need not be wireless. The exchange may be located in the smart card. A dedicated smart card reader may be used instead of a PC. The smart card may be of the contactless type. The request message may include the identity of the external device. The look-up table may list different sets of flags for different external devices. Access to the data file may be dependent upon the type of external device seeking access.-Encryption may also be used, particularly encryption of a type used in SIM cards.
Claims (22)
- Claims 1. A method of controlling access to a data file held by a smart card, the method comprising providing access data including an indication whether access to said file is allowed, receiving a request for access identifying said data file, deciding whether access to said data file is allowed in dependence upon said indication and, if access is allowed, providing access to said file.
- 2. A method according to claim 1 wherein the receiving of the request includes a receiving an instruction to execute a command in respect of said file.
- 3. A method according to claim 1 wherein the method further comprises receiving an instruction to execute a command in respect of said file.
- 4. A method according to either claim 2 or claim 3 wherein the providing access comprises transmitting said instruction to execute the command in respect of said file to said smart card.
- 5. A method according to claim 4 further comprising receiving information in relation to execution of said command from said smart card.
- 6. A method according to claim 5 wherein the receiving of the information comprises receiving confirmation that the command has been executed.
- 7. A method according to claim 5 or 6 wherein the receiving of the information comprises receiving data from said file.
- 8. A method according to any preceding claim wherein the providing access to said file includes reading said file.
- 9. A method according to any one of claims 1 to 8 wherein the providing access to said file includes writing to said file.
- 10. A method of controlling access to a data file held by a smart card substantially as hereinbefore described with reference to Figures 1 to 11 of the accompanying drawings.
- 11. A method of controlling access to a data file held by a smart card substantially as hereinbefore described with reference to Figures 1,3 to 5 and 7 to 13 of the accompanying drawings.
- 12. A method, performed by a controller, of controlling access to a data file held by a smart card, the method comprising receiving a request for access identifying said data file, deciding whether access to said file is allowed and, if access is allowed, providing access to said file.
- 13. A method of programming a controller which controls access to a data file held by a smart card, the method comprising providing access data including an indication whether access to said file is allowed.
- 14. A computer program to be loaded on data processing apparatus to control access to a data file held by a smart card, such that the data processing means provides an access data including an indication whether access to said file is allowed, receives a request for access identifying said data file, decides whether access to said data file is allowed in dependence upon said indication and, if access is allowed, provides access to said file.
- 15. A device to control access to a data file held by a smart card comprising: means for providing an access data including an indication whether access to said file is allowed; means for receiving a request for access identifying said data file; means for deciding whether access to said data file is allowed in dependence upon said indication and means for providing access to said file.
- 16. A device to control access to a data file held by a smart card comprising: memory to store an access data including an indication whether access tosaid file is allowed ; receiver for receiving a request for access identifying said data file ; a controller for deciding whether access to said data file is allowed in dependence upon said indication and a switch for providing access to said file.
- 17. A device to control access to a data file held by a smart card substantially as hereinbefore described with reference to Figures 1 to 11 of the accompanying drawings.
- 18. A device to control access to a data file held by a smart card substantially as hereinbefore described with reference to Figures 1,3 to 5 and 7 to 13 of the accompanying drawings.
- 19. Electronic apparatus including a device according to any one of claims 15 to 18.
- 20. A mobile telephone including a device according to any one of claims 15 to 18.
- 21. A smart card comprising a device to control access to a data file held by the smart card comprising : means for providing access data including an indication whether access to said file is allowed; means for receiving a request for access identifying said data file; means for deciding whether access to said data file is allowed in dependence upon said indication and means for providing access to said file.
- 22. A smart card comprising memory to store a data file and access data including an indication whether access to said file is allowed.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0031837A GB2370659A (en) | 2000-12-29 | 2000-12-29 | Method of controlling access to a data file held by a smart card |
PCT/EP2001/014861 WO2002054195A2 (en) | 2000-12-29 | 2001-12-14 | Method of controlling access to a data file held by a smart card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0031837A GB2370659A (en) | 2000-12-29 | 2000-12-29 | Method of controlling access to a data file held by a smart card |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0031837D0 GB0031837D0 (en) | 2001-02-14 |
GB2370659A true GB2370659A (en) | 2002-07-03 |
Family
ID=9906031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0031837A Withdrawn GB2370659A (en) | 2000-12-29 | 2000-12-29 | Method of controlling access to a data file held by a smart card |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2370659A (en) |
WO (1) | WO2002054195A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002054195A2 (en) * | 2000-12-29 | 2002-07-11 | Nokia Corporation | Method of controlling access to a data file held by a smart card |
FR2857207A1 (en) * | 2003-07-04 | 2005-01-07 | Orange France | Data exchange method for access point e.g. personal computer, and SIM card communication, involves responding to logical process in point by logical process in card via message in SIM buffer memory, that manages application software |
US8095179B2 (en) | 2004-10-14 | 2012-01-10 | Nokia Corporation | Proxy smart card applications |
WO2022043967A1 (en) * | 2020-08-31 | 2022-03-03 | Jio Platforms Limited | System and method for enabling a sim card as a micro-platform |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6963740B1 (en) | 2001-07-31 | 2005-11-08 | Mobile-Mind, Inc. | Secure enterprise communication system utilizing enterprise-specific security/trust token-enabled wireless communication devices |
US7043493B2 (en) | 2001-09-17 | 2006-05-09 | Fujitsu Limited | Hierarchical file system and anti-tearing algorithm for a limited-resource computer such as a smart card |
US7097107B1 (en) | 2003-04-09 | 2006-08-29 | Mobile-Mind, Inc. | Pseudo-random number sequence file for an integrated circuit card |
US8583561B2 (en) * | 2009-04-28 | 2013-11-12 | Mastercard International Incorporated | Apparatus, method, and computer program product for providing a quality control mechanism for the contactless interface of a dual-interface card |
WO2010126994A1 (en) | 2009-04-28 | 2010-11-04 | Mastercard International Incorporated | Apparatus, method, and computer program product for recovering torn smart payment device transactions |
US8321481B2 (en) | 2010-05-13 | 2012-11-27 | Assa Abloy Ab | Method for incremental anti-tear garbage collection |
IT1404159B1 (en) * | 2010-12-30 | 2013-11-15 | Incard Sa | METHOD AND SYSTEM OF CONTROL OF A COMMUNICATION BETWEEN AN INTEGRATED CIRCUIT UNIVERSAL CARD AND AN EXTERNAL APPLICATION |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3736190A1 (en) * | 1986-10-24 | 1988-05-05 | Hitachi Ltd | Access control system and method for smart cards |
GB2331821A (en) * | 1997-11-27 | 1999-06-02 | Northern Telecom Ltd | Electronic sealed envelope |
DE19816541A1 (en) * | 1998-04-15 | 1999-10-21 | Orga Kartensysteme Gmbh | Data exchange system using smart cards |
WO2000043875A1 (en) * | 1999-01-22 | 2000-07-27 | Sun Microsystems, Inc. | Techniques for implementing security on a small footprint device using a context barrier |
GB2346239A (en) * | 1999-01-26 | 2000-08-02 | Ibm | Card security and Web sites |
EP1085395A2 (en) * | 1999-09-13 | 2001-03-21 | Phone.Com Inc. | Access control system for files on a memory card |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2748834B1 (en) * | 1996-05-17 | 1999-02-12 | Gemplus Card Int | COMMUNICATION SYSTEM ALLOWING SECURE AND INDEPENDENT MANAGEMENT OF A PLURALITY OF APPLICATIONS BY EACH USER CARD, USER CARD AND CORRESPONDING MANAGEMENT METHOD |
US6324537B1 (en) * | 1999-09-30 | 2001-11-27 | M-Systems Flash Disk Pioneers Ltd. | Device, system and method for data access control |
GB2370659A (en) * | 2000-12-29 | 2002-07-03 | Nokia Mobile Phones Ltd | Method of controlling access to a data file held by a smart card |
-
2000
- 2000-12-29 GB GB0031837A patent/GB2370659A/en not_active Withdrawn
-
2001
- 2001-12-14 WO PCT/EP2001/014861 patent/WO2002054195A2/en not_active Application Discontinuation
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3736190A1 (en) * | 1986-10-24 | 1988-05-05 | Hitachi Ltd | Access control system and method for smart cards |
GB2331821A (en) * | 1997-11-27 | 1999-06-02 | Northern Telecom Ltd | Electronic sealed envelope |
DE19816541A1 (en) * | 1998-04-15 | 1999-10-21 | Orga Kartensysteme Gmbh | Data exchange system using smart cards |
WO2000043875A1 (en) * | 1999-01-22 | 2000-07-27 | Sun Microsystems, Inc. | Techniques for implementing security on a small footprint device using a context barrier |
GB2346239A (en) * | 1999-01-26 | 2000-08-02 | Ibm | Card security and Web sites |
EP1085395A2 (en) * | 1999-09-13 | 2001-03-21 | Phone.Com Inc. | Access control system for files on a memory card |
Non-Patent Citations (2)
Title |
---|
WPI abstract 1988-127391 & DE 3736190 A1 * |
WPI abstract 2000-024385 & DE 19816541 A1 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002054195A2 (en) * | 2000-12-29 | 2002-07-11 | Nokia Corporation | Method of controlling access to a data file held by a smart card |
WO2002054195A3 (en) * | 2000-12-29 | 2002-11-14 | Nokia Corp | Method of controlling access to a data file held by a smart card |
FR2857207A1 (en) * | 2003-07-04 | 2005-01-07 | Orange France | Data exchange method for access point e.g. personal computer, and SIM card communication, involves responding to logical process in point by logical process in card via message in SIM buffer memory, that manages application software |
WO2005015930A1 (en) * | 2003-07-04 | 2005-02-17 | Orange France | Method enabling an access point to communicate by using a mobile terminal |
US8095179B2 (en) | 2004-10-14 | 2012-01-10 | Nokia Corporation | Proxy smart card applications |
WO2022043967A1 (en) * | 2020-08-31 | 2022-03-03 | Jio Platforms Limited | System and method for enabling a sim card as a micro-platform |
Also Published As
Publication number | Publication date |
---|---|
GB0031837D0 (en) | 2001-02-14 |
WO2002054195A3 (en) | 2002-11-14 |
WO2002054195A2 (en) | 2002-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6035443B2 (en) | Storage medium | |
RU2505857C2 (en) | Mobile payment application architecture | |
RU2242795C2 (en) | Method for cashless settlements and system for realization thereof | |
KR100587882B1 (en) | Smart card wallet | |
US8381999B2 (en) | Selectively switching antennas of transaction cards | |
EP2626823A1 (en) | Location based selection in mobile wallets | |
WO2009013700A2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
KR100842556B1 (en) | Method for approving service using a mobile communication terminal equipment | |
KR20110068116A (en) | Mobile communication terminal and smartcard for providing payment information and method thereof | |
GB2370659A (en) | Method of controlling access to a data file held by a smart card | |
EP1724689A1 (en) | Portal site providing system, and server, method, and program used for the same | |
EP1860605A1 (en) | Electronic money system, information storage medium, and mobile terminal device | |
EP1705605A1 (en) | Personal information storage device and mobile terminal | |
KR100432838B1 (en) | Electronic money processing method and program and recording medium | |
KR20050047154A (en) | System and method for processing mobile payment | |
JP2003317020A (en) | Individual authentication system and individual authentication program used for the same | |
WO2001084460A1 (en) | Authentication and payment card for automatically updating user numbers, and authentication payment system and method using the card | |
KR20050047310A (en) | System and method for charging the prepaid card function in mobile devices | |
KR20050075494A (en) | Method of setting wap profile in wireless communication terminal | |
KR20070017630A (en) | Method of insurance service using ic chip mounted cell phone | |
WO2020052753A1 (en) | Intermediary system for faciliting communication between virtual smart cards and a smart card interface | |
KR20080103951A (en) | Mobile phone | |
Nieto | HCE-oriented payments vs. SE-oriented payments. Security Issues | |
KR20080103952A (en) | System for processing mobile payment by using rfid tag information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
COOA | Change in applicant's name or ownership of the application | ||
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |