WO2005121976A1 - 情報管理装置及び情報管理方法 - Google Patents
情報管理装置及び情報管理方法 Download PDFInfo
- Publication number
- WO2005121976A1 WO2005121976A1 PCT/JP2005/010599 JP2005010599W WO2005121976A1 WO 2005121976 A1 WO2005121976 A1 WO 2005121976A1 JP 2005010599 W JP2005010599 W JP 2005010599W WO 2005121976 A1 WO2005121976 A1 WO 2005121976A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- information
- card
- archive
- access
- Prior art date
Links
- 238000007726 management method Methods 0.000 title claims description 78
- 230000015654 memory Effects 0.000 claims abstract description 101
- 238000004891 communication Methods 0.000 claims description 38
- 238000012545 processing Methods 0.000 claims description 31
- 238000000034 method Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000011161 development Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 13
- 238000012546 transfer Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 8
- 239000004065 semiconductor Substances 0.000 description 5
- 230000010365 information processing Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241000207961 Sesamum Species 0.000 description 1
- 235000003434 Sesamum indicum Nutrition 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0866—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by active credit-cards adapted therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
Definitions
- the present invention relates to an information management device and an information management method for managing access to information stored in a relatively large-capacity memory area, and more particularly, to storing electronic value information in a memory area.
- the present invention relates to an information management device and an information management method for securely exchanging information such as electronic payment.
- the present invention relates to an information management apparatus and an information management method for managing information for service operation by allocating various files on a memory area, and more particularly, relates to an information management apparatus and an information management method. More specifically, the present invention relates to an information management apparatus and an information management method for copying or backing up value information stored in a storage device and for smoothly transferring value information between terminals.
- Non-contact 'proximity communication systems represented by IC cards have been widely spread because of their ease of operation.
- the general usage of an IC card is as follows.
- the Z writer constantly polls the ic card, and when it finds an external ic card, the communication operation between the two starts. For example, by storing personal identification codes, other personal authentication information, and value information such as electronic tickets, etc. on IC cards, visitors and passengers at the cash dispenser at the entrance of the concert hall, at ticket gates at stations, etc. Authentication process can be performed.
- IC cards having relatively large-capacity memories have appeared.
- a single IC card can be used for multiple purposes by deploying a file system in the memory space and storing multiple applications at the same time. it can.
- storing multiple applications on a single IC card such as electronic money for performing electronic payments and electronic tickets for entering specific concert venues, allows one IC card to be used.
- the various uses It can be applied in some way.
- electronic money or electronic ticket here refers to a mechanism for settlement (electronic settlement) through electronic data issued according to the funds provided by the user, or such electronic data itself.
- an IC card and a card reader Z writer have a wired interface for connecting to external devices, and are equipped with a portable electronic tongue machine, a PDA (Personal Digital Assistance), CE (Consumer Electronics) equipment, personal computers, etc., these devices are equipped with ic cards, card readers, Z-writers, and / or both. can do.
- the IC card technology can be used as a versatile two-way proximity communication interface.
- a proximity communication system is configured by devices such as computers and information home appliances
- non-contact communication using an IC card is performed one-on-one. It is also possible for a certain device to communicate with a partner device other than a device such as a non-contact IC card. In this case, an application that performs one-to-many communication between one device and a plurality of cards is also conceivable. .
- various applications using an IC card can be executed on the information processing terminal.
- a user's interaction with the IC card can be performed on the information processing terminal using a user's interface such as a keyboard and a display on the information processing terminal.
- the IC card since the IC card is connected to the mobile phone, the contents stored in the IC card can be exchanged via the telephone network.
- the user can pay the usage fee by IC card by connecting to the Internet from a mobile phone.
- a file for a certain service provider company 'Allocates the system to the internal memory of the IC card, and stores information for service operation by this company in this file system (for example, user identification' By managing authentication information, remaining value information, usage history (logs, etc.), it is possible to replace the conventional prepaid 'card and service for each store' card with a useful service based on contactless proximity communication. Can be realized.
- the IC card issuer manages the entire memory area, but the service provider's memory area other than the IC card issuer also has a new file area.
- the system is divided and assigned to applications for implementing each service operation.
- File'system division is the issue of a virtual IC card.
- the memory area in the IC card has a structure in which multiple file systems coexist, and one IC card can provide multiple applications, that is, provide various applications Can be.
- Non-Patent Document 1 "Everything about wireless IC tags: business changes with sesame chip” (RFC Technology Editor, Nikkei Business Publications, April 20, 2004)
- a main object of the present invention is to provide an excellent information management apparatus and information management method capable of allocating various files on a memory area and managing information for service operation. is there.
- a further object of the present invention is to copy or back up value information electronically stored in a memory area, and to transfer excellent value information between terminals smoothly.
- a management device and an information management method are provided.
- a communication unit that transmits and receives data via a wireless or wired transmission path
- a data processing unit that processes data transmitted and received by the communication unit
- An archive of one or more files to be backed up An archive of one or more files to be backed up.
- An information management apparatus comprising: an 'archive created by attaching identification information of a file development destination';
- the information management device referred to here is a non-contact IC card incorporating a wireless communication unit, an IC chip having a data transmission / reception function and a data processing unit, a contact IC card having terminals on its surface, and a contact Z non-contact IC card.
- This is a device in which an IC chip having the same function as that described above is incorporated in a blue-green information communication terminal device such as a mobile phone, a PHS (Personal Handyphone System), or a PDA (Personal Digital Assistance).
- the IC chip equipped with the contactless IC card function is equipped with an RF analog front-end and logic circuits (protocol control, RF modulation / (Processing, encryption processing, memory management) may be configured with one chip, or may be configured with two or more ICs separated from each other. In the following, these are sometimes collectively referred to simply as "IC card.”
- the information management apparatus has a memory area including a data storage memory such as an EEPROM, a data processing unit, and has a data communication function.
- a data storage memory such as an EEPROM
- a data processing unit has a data communication function.
- an external storage medium such as an IC card having a built-in IC chip may be configured to be detachable.
- a SIM (Subscriber Identity Module) function that records contractor information issued by a mobile phone company may be mounted on an IC chip.
- the information management device may perform data communication via an information communication network such as the Internet, or may perform direct data communication with an external terminal device in a wired or wireless manner.
- the present invention relates to the provision of services that require security, including exchange of value information, using the tamper resistance and authentication function of an IC card.
- a memory in an IC card is divided into a plurality of areas, and access control is performed by providing a different encryption key for each area.
- the area here corresponds to a file system obtained by dividing the memory space, or a directory or individual file in the file system.
- the data in the IC card is created in the form of a file containing the terminal ID of the destination and stored in a predetermined storage location, so that the value information can be safely backed up. Can be up. Also, make sure that the archive file can be expanded only by the device specified by the terminal ID.
- a mechanism is introduced to manage access to files and directories in the IC card using a counter. After archiving a file to a storage location, the original file's counter value is lost and cannot be accessed. By doing so, file movement can be realized.
- the information management device cooperates to specify files to be simultaneously opened.
- the apparatus further includes an aisle link designating means, wherein the file in which the archive file is created and an access management information file in which access management information for the file is described are linked and designated by the file linkage designating means.
- the access management means simultaneously opens the access management information file when accessing the file in which the archive file has been created, and performs access management based on the access management information. Update the content of the access management information.
- the access management information file describes a counter value for the file in which the archive file was created as access management information, and the access management means decrements the counter value each time the access management information file is opened. I do.
- the present invention it is possible to provide an excellent information management device and an excellent information management method that can allocate information to various files on a memory area and manage information for service operation.
- FIG. 1 is a diagram schematically showing a configuration of a contactless IC card communication system to which the present invention can be applied.
- FIG. 2 is a diagram schematically showing an overall configuration of a service providing system that operates electronic money, electronic tickets, and other value information, which is realized using an IC card.
- FIG. 3 is a diagram showing a state of a memory area in which an original card issuer manages only its own file system.
- FIG. 4 is a diagram showing that a card issuer can permit a certain range of memory to be lent (or transferred) to an area manager in a free area of its own file system.
- FIG. 5 shows that another service provider is in the area where the card issuer is authorized.
- FIG. 5 is a diagram showing a state in which a memory area is divided and a new file system is generated.
- FIG. 6 is a diagram showing a state in which a memory is divided by a common area system code SCO in an area permitted by a card issuer card by the common area manager.
- FIG. 7 is a diagram showing a structure in which a plurality of file systems coexist in a memory area of an IC card.
- FIG. 8 is a diagram schematically showing an example of a data structure in a file system.
- FIG. 9 is a diagram showing a basic configuration of a file system.
- FIG. 10 is a diagram showing a state where areas are hierarchized in a memory space of an IC card.
- FIG. 11 is a diagram schematically showing a functional configuration of firmware in an IC card.
- FIG. 12 is a diagram showing a mechanism for archiving files and directories in an IC card.
- Figure 13 schematically shows the basic configuration in a file system specified for file linkage
- FIG. 14 is a diagram schematically showing a configuration of a file in a directory or a file system in which a directory and a counter file are linked to each other.
- FIG. 15 is a diagram schematically showing a hardware configuration of an IC card according to one embodiment of the present invention.
- FIG. 16 is a flowchart showing a processing procedure for setting a file association in a file system.
- FIG. 17 is a flowchart showing a processing procedure for accessing a file for which a file cooperation relationship is specified in the file system.
- FIG. 1 schematically shows a configuration of a contactless IC card communication system to which the present invention can be applied.
- This contactless card system includes a card 'reader Z writer 1, an IC card 2, and a controller 3, and the card' reader Z writer 1 and the IC card 2 use electromagnetic waves to perform non-contact. Data transmission / reception is performed by contact. That is, the card reader Z writer 1 A predetermined command is transmitted to the command 2 and the IC card 2 performs a process corresponding to the received command. Then, the IC card 2 transmits response data corresponding to the processing result to the card 'reader Z writer 1.
- the card 'reader Z writer 1 is connected to the controller 3 via a predetermined interface (for example, one conforming to the RS-485A standard).
- the controller 3 performs a predetermined process by supplying a control signal to the card reader Z writer 1.
- Fig. 2 schematically shows the overall configuration of a service providing system that operates electronic money, electronic tickets, and other value information, which is realized using an IC card.
- the illustrated system 100 includes, for example, an issuer communication device 111 used by an IC card issuer 121, an operator communication device 112 used by a card storage area operator 122, and a device manufacturer 123. And a storage area dividing device 114 and an operation file registering device 115 used by a card storage area user 124.
- the IC card issuer 121 issues the IC card 116 to the card holder 126
- the file data related to the service provided by the card storage area user 124 is transferred to the IC card based on predetermined conditions.
- the card holder 126 can use both the IC card issuer 121 and the card storage area user 124 using the single IC card 116.
- the issuer communication device 111 the operator communication device 112, the manufacturer communication device 113, the storage area dividing device 114, and the operation file registration device 115 Connected via 117.
- the IC card issuer 121 is a person who issues the IC card 116, and provides its own service using the IC card 116.
- the card storage area operator 122 receives the request from the IC card issuer 121, and operates the storage area (semiconductor memory) in the storage unit (semiconductor memory) in the IC card 116 issued by the IC card issuer 121.
- the service provider lends a storage area not used by the IC card issuer 121 to the card storage area user 124.
- the device manufacturer 123 receives the request from the card storage area operator 122 and divides the storage area. The person who manufactures the device 114 and delivers it to the card storage area user 124.
- the card storage area user 124 requests the card storage area operator 122 and provides its own service using the storage area of the IC card 116. It is equivalent to a service provider that divides and creates a new file system, and provides its own service using its own file system.
- the card holder 126 is a person who receives the issuance of the IC card 116 from the IC card issuer 121 and receives a service provided by the IC card issuer 121, that is, an end user. If the card holder 126 wishes to receive the service provided by the card storage area user 124 after issuing the IC card 116, the card holder 126 uses the storage area dividing device 114 and the operation file registration device 115 to File 'data relating to the service of the card storage area user 124 is stored in the IC card 116, and thereafter, the service of the card storage area user 124 can be received.
- the system 100 uses the IC card issuer 121 and the card storage area user.
- the file related to the service 124 has a configuration that makes it difficult for an unauthorized person to illegally write and rewrite data in a storage area where data is stored.
- FIG. 2 illustrates a case where there is a single IC card issuer 121, a single card storage area user 124, and a single card holder 126, each of them may be plural.
- the IC card 116 may be literally a card-type data communication device, or may be a mobile phone incorporating a semiconductor chip on which a so-called IC card function is mounted. And CE equipment).
- an IC chip equipped with a non-contact IC card function may be configured as a single chip with an RF analog front-end and a logic circuit (protocol control, RF modulation / demodulation, command processing, encryption processing, memory management). Or they may be composed of two or more chips separated from each other.
- FIG. 15 schematically shows a hardware configuration of an IC card unit according to one embodiment of the present invention.
- the IC card section is an analog port connected to the antenna section 1001.
- the mobile terminal 1100 includes a group 1002, a digital U-controller 1003, a memory 1004, and an external interface 1005.
- This IC card unit may be configured by a one-chip semiconductor integrated circuit, or may be configured by a two-chip semiconductor integrated circuit by separating the RF analog front end and the logic circuit unit.
- Antenna unit 1001 transmits and receives non-contact data to and from a card reader / writer (not shown).
- the analog unit 1002 processes analog signals transmitted and received from the antenna unit 1001, such as detection, modulation / demodulation, and clock extraction. These constitute a contactless interface between the IC card unit and the card reader / writer.
- the digital control unit 1003 controls the processing of transmission / reception data and other operations in the IC card in an integrated manner.
- the digital control unit 1003 connects the addressable memory 1004 in a vocalist.
- the memory 1004 is configured by a nonvolatile storage device such as an EEPROM (Electrically Erasable Programmable Read Only Memory), stores user data such as an electronic money or an electronic ticket, and executes a program executed by the digital control unit 1003. It can be used to write code or store working data while it is running.
- EEPROM Electrically Erasable Programmable Read Only Memory
- the external interface 1005 is a functional module for connecting the digital control unit 1003 to a device such as the portable terminal 1100 by using an interface protocol different from a non-contact interface connected to a card reading / writing device (not shown). It is.
- the data written in the memory 1004 can be transferred to the portable terminal 1100 via the external interface 1005.
- the data received from the card reading / writing device is converted as it is, or converted by an appropriate conversion rule, or converted into another packet structure, Send to the mobile terminal 1100 via 1005.
- the data received from the mobile terminal 1100 via the external interface is converted as it is, according to an appropriate conversion rule, or converted into another packet structure, and the card read / write device is transmitted via the contactless interface.
- the IC card section is used by being built in the portable terminal 1100, and the external interface 1005 includes a UART (Universal Asynchronous). Use a wired interface like Receiver Transmitter.
- the interface specification of the external interface 1005 is not particularly limited, and may be a wired interface or a wireless interface such as Bluetooth communication or IEEE 802.11.
- the IC card unit can be driven by, for example, energy obtained from a card reading / writing device that is received via the antenna unit 1001.
- energy obtained from a card reading / writing device that is received via the antenna unit 1001.
- it may be configured such that part or all of them operate by the power supplied from the portable terminal 1100 side.
- the mobile terminal 1100 corresponds to an information processing terminal such as a mobile phone, a PDA, and a personal computer (PC).
- the mobile terminal 1100 includes a program control unit 1101, a display unit 1102, and a user input unit 1103.
- the program control unit 1101 includes, for example, a microprocessor, a RAM, and a ROM (both are not shown in FIG. 15).
- the microprocessor controls the RAM in accordance with a program code stored in the ROM. Perform various processing services using the work area.
- the processing service includes processing for the IC card unit in addition to the functions inherent in the mobile terminal 1100 such as a mobile phone.
- the program control unit 1101 may include an external storage device such as a hard disk and other peripheral devices.
- the program control unit 1101 can access the IC card unit via the external interface 1005.
- the display unit 1102 is constituted by, for example, a liquid crystal display, and can output a processing result or the like in the program control unit 1101 on a screen to notify a user.
- the user input unit 1103 includes a keyboard, a jog dial, or a touch panel superimposed on the display screen of the display unit 1102, and is used by a user to input commands and data to the mobile terminal 1100.
- the program control unit 1101 in the mobile terminal 1100 is driven by power supply from a main power supply (not shown) such as a notebook.
- a file system for each service provider is allocated on a single memory area, a single IC card is shared by a plurality of providers, and a plurality of services are shared by a single IC card. Provided.
- the memory area in the IC card manages the entire IC card issuer memory area. Power of service providers other than IC card issuer S Memory area power New file 'When dividing the system, both the authority to divide the memory area and the authentication to the IC card issuer are required.
- the memory area When the memory area is divided and divided, access to the file system requires authentication of the file system itself, which is not the issuer of the original IC card, to the service provider. Therefore, the boundary between the file systems functions as a firewall, and unauthorized access from other file systems can be preferably eliminated. In addition, it is possible for the user to ensure the convenience of using each service as if it were an IC card issued by the business operator.
- the memory area in the IC card has a structure in which a plurality of file systems coexist.
- the division of the file system is the issuance of virtual IC cards.
- FIG. 3 shows the state of the memory area where the original card issuer manages only its own file system.
- the original card issuer's system 'code SC1' is granted by the system 'code management mechanism.
- SC1 as the identification code (that is, the argument of the request command).
- FIG. 4 shows that the card issuer has a certain range of free space in his file system. Indicates that the memory can be lent (or transferred) to the area manager. At this stage, the file system in the memory area has not yet been divided.
- the card issuer can authorize multiple area managers to lend memory while there is free space in their file system. For example, in an implementation that identifies a file system by a 4-bit system code, it is possible to divide up to 16 (up to 15 times).
- FIG. 5 shows a state where another service provider divides the memory area in the area permitted by the card issuer and creates a new file system.
- This new file system is provided with a system code management system code system code SC2.
- SC2 is used as the identification code (argument of the request command).
- FIG. 6 shows a state in which the memory is divided by the common area system code SCO in the area where the card issuer is authorized by the common area manager.
- the system' code SCO is used as the identification code (argument of the request command).
- the memory area of the IC card has a structure in which a plurality of file systems coexist as shown in FIG.
- the original card issuer and the service provider that acquired their file system on the IC card with the permission of the card issuer use their own file system to set up areas and services. Can be used for their own business development.
- service memory area The memory area allocated to the application.
- service memory area The use of an application, that is, the processing operation of accessing the corresponding service 'memory area. Services include read access and write access to memory. For example, adding or subtracting value from value information such as electronic money can be mentioned.
- a PIN code that is, a PIN is assigned to the application, and the PIN is collated when the service is executed. It has become.
- the access to the service 'memory area is performed by encryption communication according to the security level of the application.
- a hierarchical structure similar to a “directory” is introduced for each file system set in the memory area in the IC card. Then, each application assigned to the memory area can be registered in an “area” of a desired hierarchy.
- a plurality of applications used for a series of transactions, or applications having a high degree of relevance are registered as a service 'memory area in the same area.
- applications and areas in the memory area are arranged in order, and the user can efficiently classify and organize applications.
- a PIN can be set for each area in addition to being able to set a PIN for each application. For example, by inputting a PIN corresponding to a certain area, access to all applications (and sub-areas) in the area can be given through verification processing and mutual authentication processing. Therefore, only one input of PIN to the corresponding area can obtain the access right of all applications used in a series of transactions. Usability is improved.
- the access right to a certain service 'memory area is unique, and to set a personal identification code for each access right, that is, for each service executed in the service' memory area. it can. For example, if the service to be started for the same service 'memory area is'read' and 'read and write', IN is set. Separate PINs are set for “increase” and “decrease” for electronic money and other value information. In addition, it is not necessary to input a PIN when reading from a certain memory area, but it is possible to make it necessary to input a PIN when writing.
- FIG. 8 schematically shows an example of a data structure in the file system.
- a hierarchical structure similar to “directory” is introduced in the storage space of the file system. That is, each application allocated to the memory area can be registered as a service memory area in a desired hierarchical area. For example, applications that are closely related, such as applications used for a series of transactions, are registered in the same area (and areas that are closely related are registered in the same parent area).
- the application that is, the service 'memory area
- the area allocated in the file system have a password code definition block. Therefore, a PIN can be set for each application or for each area.
- the access right to the file system can be set for each application as well as for each area.
- a PIN for each service is set, which has a single access right to a certain service 'memory area. For example, separate PINs are set for the same service ⁇ ⁇ ⁇ ⁇ the services started for the memory area are “read” and “read and write”, and “increase” and “decrease” for electronic money and other value information. With, separate PINs are set.
- the collation unit sets the PIN sent via the interface such as contactless data communication using an IC card in the area or service assigned to each application or directory in the memory area, for example.
- the access to the corresponding memory area is permitted by collating with the set security code.
- the memory area to which access is permitted can be read and written via the protocol 'interface.
- FIG. 9 shows the basic configuration of a file system. As already explained with reference to Fig. 8, a hierarchical structure similar to "directory" has been introduced for the file system. Then, the service 'memory area allocated to the application can be registered in the area of the desired hierarchy. In the example shown in FIG. 9, one service 'memory area is registered in the area 0000 defined by the area 0000 definition block.
- the illustrated service "memory area is composed of one or more user" blocks.
- the user's block is the minimum data unit whose access operation is guaranteed.
- One service defined in the service 0108 definition block, that is, service 0108 is applicable to this service 'memory area.
- a password can be set for each type of service to restrict access on a service basis.
- the security code setting information for the service subject to the access restriction is defined as a security code only service (ie, “security code 'service”).
- security code 'service the security code for the service 0108 is defined as a security code'service 0128 definition block.
- the content of the security code ⁇ service is stored in the security code ⁇ service ⁇ data ⁇ block.
- the security code using the security code 'service 0128 must be set before starting the service 0108 and performing a read or write operation on the user block. Collation is required. Specifically, in the case of using the read / write command with encryption (ReadZWrite) command, the password, that is, the PIN is collated with the service 0108 before the mutual authentication.
- ReadZWrite encryption
- the service 'memory area allocated to the application can be registered in an area of a desired hierarchy, and the area can be hierarchized (areas with high relevance are registered in the same parent area). In this case, by setting a PIN for each area, the area can be used as an access restriction unit.
- FIG. 10 shows a state in which areas are hierarchized in the memory space of the IC card. In the example shown in the figure, another area 1000 defined in the area 1000 definition block is registered in the area 0000 defined in the area 0000 definition block.
- two service ′ memory areas are further registered in area 1000.
- the service 1108 definition block The service 1108 defined by the service 1108 and the service 110B defined by the service 110B definition block are applicable. Defining a plurality of services having different service contents for one service'memory area in this way is called "overlap service" in this specification. In the overlapped 'service', different services will be applied to the same 'service' area according to the entered PIN.
- the service 110C defined in the service 110C definition block can be applied to the other service 'memory area.
- Each service can start a service set in the memory area and perform a read or write operation on the user's block.
- a security code 'service can be defined for each service. In this case, if the security code service for the service is activated, the PIN will be verified using the security code service and the service will be activated.
- the security code for the area 1000 is defined as a security code 'service 1020 definition block. Its security code 'service content is stored in the security code' service data block!
- FIG. 11 schematically shows a functional configuration of firmware in an IC card capable of providing a plurality of file systems in the internal memory.
- the interface control unit communicates with a card reader Z writer using a contactless IC card interface, communication as a card reader Z writer, communication via a wired interface, and communication via other IZO interfaces. Performs protocol control.
- the command control unit receives the command received from the outside via the interface control unit. It performs processing, issues commands to the outside, and checks commands.
- the security control unit implements security processing such as authentication processing when accessing the memory area or each file in the memory area, and PIN verification when using directories and services in the file system. I do.
- the file system control unit manages the file system such as the division into the file system (and the division of the file system) as described above, and manages the directory structure in the file system. .
- the mode management unit manages the modes of all file systems and individual file systems.
- the mode referred to here includes the status such as suspension and resumption of use of the file system.
- firmware for controlling each hardware in the IC card such as boot control, ROM management, parameter management, nonvolatile memory management, and patch control is also included.
- Figure 12 illustrates the mechanism for archiving files and directories on an IC card.
- the archive 'file creator creates an archive' file for archiving a file or directory specified to be knocked out.
- the format of the file is not particularly limited.
- the terminal specifies the terminal ID that identifies the terminal to which the archive file is to be expanded, and stores the archive file in the storage device. As a result, data in the IC card can be backed up.
- the storage device is tamper-resistant, and the stored archive file will not be leaked to the outside illegally. Then, the storage device transfers the archive file to the terminal specified by the terminal ID.
- the archive 'file is expanded to restore the original file or directory, and use is resumed. This allows the data in the IC card to be moved to the correct partner.
- a mechanism for managing access to files and directories in the IC card using a counter has been introduced. After archiving a file in a storage location, the original file loses its power counter value and cannot be accessed. By doing so, duplication of data after movement is prevented.
- the counter file which is a special file for managing the number of accesses to each file, is arranged in the memory or the directory.
- the upper limit of the number of access times for each file in the memory or directory is described.
- a file linkage specifier has been introduced so that a linkage relationship between two or more files can be set. Two or more files specified by the file linkage specifier must be opened at the same time, that is, a restriction is imposed that the file cannot be opened unless authentication is performed at the same time. The file in which the archive file was created is specified to be linked with the counter file by the file linkage specification file.
- FIG. 13 schematically shows a basic configuration in a file system in which file linkage is specified.
- the file linkage specifier that specifies the simultaneous authentication of two or more files has a file format, like other files in the file system.
- the file linkage specifier may be defined in another form.
- files 1 to 3 and a counter file are arranged in the file system.
- the symmetric keys common to all cards are set by the IC card issuer.
- An individual key is set in the counter file.
- the file in which the file cooperation specification file is located is a special file that specifies a combination of files that can be simultaneously authenticated.
- File linkage specification file itself is set so that the IC card issuer authenticates with the symmetric key common to all the IC cards, just like other files! RU
- the file linkage specification file specifies linkage between file 2 to be archived and counter.file, that is, file 2 must be opened at the same time as counter file.
- the authentication key required when opening a file is specified for the file. It is assumed that the key combination is obtained by calculating the combination of the keys using a predetermined function f.
- File 1 is not specified by any file linkage specifier. Therefore, if mutual authentication is performed using only the symmetric key ⁇ set in file 1 itself, the file will be opened.
- the authentication key in this case is as follows.
- file 2 cannot be mutually authenticated with the symmetric key set in file 2, and must perform mutual authentication at the same time as the counter file according to the settings in the file coordination specification file.
- the mutual authentication key used at this time is the individual key because the result of combining the symmetric key K of file 2 and the individual key K of the counter file is used.
- Authentication key K f (symmetric key K of file 2, counter individual key K of file)
- the counter value is decremented. If the counter value is Oxffff, the counter 'file can be opened at any time. On the other hand, if the counter value is 0, the counter's file cannot be opened, and therefore the file 2 specified for linkage cannot be opened.
- FIG. 16 is a flowchart showing a processing procedure for setting a file association in a file system.
- the file to be archived and the counter that restricts the number of times of access to the file 'file' are linked.
- step S1 a counter file describing the number of times of access to a file to be archived is created (step S1), and then an individual key for opening the counter file is set (step S2). .
- a file linkage specification file describing the linkage between the file to be archived and the counter file is created (step S3), and a key for accessing this file linkage specification file is set (step S3).
- Step S4 a symmetric key used for all IC cards is used (described above).
- FIG. 17 shows, in the form of a flowchart, a processing procedure for accessing a file in the file system in which the file association is specified.
- step S11 When the file 'system is accessed, first, it is checked whether or not there is a file linkage designation file in the file' system (step S11). If the file linkage designation file does not exist, each file in the file system can be accessed by a single authentication process, and the key set for each file is used. The authentication is performed (step S19).
- the key of the file linkage designation file is a common symmetric key for all IC cards! /.
- step S12 the description in the file linkage designation file is further confirmed (step S12), and the file linkage relationship is set for the file to be accessed. Check whether it has been performed (step S13).
- the file can be accessed by a single authentication process. That is, the file can be accessed through an authentication process using an individual key set in the file (step S20). In this embodiment, a common symmetric key is used for all the IC cards for the same file.
- the authentication key is set using the key of the file to be accessed and the key of the file that is linked to this.
- Generate and perform a simultaneous authentication process step S14).
- the files having a cooperative relationship are counter files describing the number of times of access to the file to be accessed, and an individual key is set. Therefore, even if a symmetric key common to all IC cards is used for the file itself to be accessed, simultaneous authentication cannot be performed without knowing the individual key of the counter. What,
- step S15 the counter file is subsequently opened to check the counter value. If the counter value still remains (step SI6), the file to be accessed can be accessed, the file can be opened (step S17), and the counter value is decremented by 1 (step SI6). S18). On the other hand, force If the counter value has already disappeared, the file is not allowed to be opened (step SI6)
- the number of times to the file in the file' system can be freely set by designating the counter 'file and file cooperation'. For example, for a file to be archived, specify a counter file with a counter value of 1 with a counter value of 1 immediately before the file is archived. In this case, since the counter value disappears at the time of archiving, the file cannot be accessed after archiving unless the counter is authenticated to a file and the counter value is rewritten. As a result, secure file transfer is realized.
- FIG. 14 schematically shows a configuration in a file system in which a file in a directory or a directory and a counter file are linked.
- a symmetric key common to all cards by the IC card issuer is set in file 11, file 12, and file 1-3. Also, an individual key is set in the counter 'file 1'. Also, the file linkage specification file 1 is set so that the IC card issuer performs authentication with a symmetric key common to all IC cards.
- the file linkage specification file 1 is a special file that specifies a combination of files that can be authenticated at the same time.
- the linkage between file 1-1 and the counter 'file 1 is performed. That is, file 1-1 specifies that counter file 1 must be opened at the same time.
- files 12 and 13 can be individually authenticated using only their respective symmetric keys, whereas file 1-1 cannot be independently authenticated.
- Mutual authentication must be performed at the same time as 1.
- the mutual authentication key used at this time is the result of combining the symmetric key K of file 1-1 and the individual key K of the individual key file 1.
- Authentication key K f (symmetric key K of file 1-1, counter 'individual key K of file 1)
- the symmetric keys common to all the cards by the IC card issuer are set in file 2-1, file 2-2, and file 2-3. Also, an individual key is set in the counter 'File 2'. Also, the file linkage specification file 2 is set so that the IC card issuer authenticates with a common symmetric key for all IC cards, just like a general file!
- the file linkage specification file 2 is a special file that specifies a combination of files that can be authenticated at the same time.
- the linkage between directory 2 and the counter 'file 2, that is, directory 2 is the counter' file 2 ' It also stipulates that it must be open at the same time.
- step S3 in the flowchart shown in FIG. This can be read as:
- step S11 in the flowchart shown in FIG. 17 it is checked whether the file to be accessed exists in the directory to be accessed. The target of authentication and access after reading should be read not as a specific file but as an entire directory.
- Archived data can be expanded only on a terminal (file-system) with the ID specified at the time of archiving! /.
- the directory is the root 'directory, the entire file' system can be backed up or copied or moved.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/567,921 US20060218196A1 (en) | 2004-06-14 | 2005-06-09 | Information management device and information management method |
CN2005800006929A CN1820260B (zh) | 2004-06-14 | 2005-06-09 | 信息管理设备和信息管理方法 |
EP05748895A EP1764699A4 (en) | 2004-06-14 | 2005-06-09 | INFORMATION MANAGEMENT DEVICE AND INFORMATION MANAGEMENT PROCESS |
JP2006519592A JPWO2005121976A1 (ja) | 2004-06-14 | 2005-06-09 | 情報管理装置及び情報管理方法 |
HK06110251.7A HK1089833A1 (en) | 2004-06-14 | 2006-09-15 | Information management device and information management method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004175524 | 2004-06-14 | ||
JP2004-175524 | 2004-06-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005121976A1 true WO2005121976A1 (ja) | 2005-12-22 |
Family
ID=35503251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/010599 WO2005121976A1 (ja) | 2004-06-14 | 2005-06-09 | 情報管理装置及び情報管理方法 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20060218196A1 (ja) |
EP (1) | EP1764699A4 (ja) |
JP (1) | JPWO2005121976A1 (ja) |
KR (1) | KR20070030157A (ja) |
CN (1) | CN1820260B (ja) |
HK (1) | HK1089833A1 (ja) |
SG (1) | SG133613A1 (ja) |
WO (1) | WO2005121976A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009296463A (ja) * | 2008-06-06 | 2009-12-17 | Sony Corp | 情報処理装置、情報処理方法、プログラム及び通信システム |
WO2013111490A1 (ja) | 2012-01-25 | 2013-08-01 | ソニー株式会社 | 情報処理装置、情報処理方法およびコンピュータプログラム |
WO2013150872A1 (ja) | 2012-04-06 | 2013-10-10 | ソニー株式会社 | 情報処理装置、情報処理方法およびコンピュータプログラム |
US9262128B2 (en) | 2011-07-08 | 2016-02-16 | Sony Corporation | Information processing apparatus, information processing method and computer program |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4175386B2 (ja) * | 2006-03-27 | 2008-11-05 | ソニー株式会社 | 情報処理システム、情報処理装置、および集積回路チップ |
CN100535935C (zh) * | 2006-12-26 | 2009-09-02 | 北京握奇数据系统有限公司 | Cpu与逻辑加密双用智能卡及其数据同步方法 |
US9406186B2 (en) * | 2010-05-12 | 2016-08-02 | Capital One Financial Corporation | System and method for providing limited access to data |
CN103345647B (zh) * | 2013-05-09 | 2017-08-22 | 马钢控制技术有限责任公司 | 一种数据在rfid电子标签的备份存取方法 |
JP6330279B2 (ja) * | 2013-09-18 | 2018-05-30 | ソニー株式会社 | 情報処理装置、情報処理システム、情報処理方法、及びプログラム |
KR101421666B1 (ko) | 2013-12-12 | 2014-07-22 | 이경아 | 파일 에이징 서비스 제공 방법 |
US11055258B2 (en) * | 2014-04-02 | 2021-07-06 | International Business Machines Corporation | Directly accessing archived data and executable files |
EP3435237B1 (en) * | 2016-03-23 | 2022-08-31 | Sony Group Corporation | Information processing device and information processing method |
WO2021014324A1 (en) * | 2019-07-19 | 2021-01-28 | JFrog Ltd. | Data archive release in context of data object |
US11182786B2 (en) | 2020-01-29 | 2021-11-23 | Capital One Services, Llc | System and method for processing secure transactions using account-transferable transaction cards |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001066986A (ja) * | 1999-08-26 | 2001-03-16 | Sony Corp | 送信装置および方法、受信装置および方法、通信システム、並びにプログラム格納媒体 |
JP2003067257A (ja) * | 2001-08-27 | 2003-03-07 | Sayaka Ando | ソフトウェアの使用端末固定化システム |
JP2004102465A (ja) * | 2002-09-06 | 2004-04-02 | Toshiba Corp | 携帯情報端末、情報記録制御方法、及び、情報記録制御プログラム |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2730833B1 (fr) * | 1995-02-16 | 1997-03-28 | Gemplus Card Int | Procede de mise a jour securisee de memoire eeprom |
DE19600081C2 (de) * | 1996-01-03 | 1999-11-18 | Ibm | Sicherung der Datenintegrität bei Datenträgerkarten |
FR2765362B1 (fr) * | 1997-06-26 | 2001-08-17 | Bull Cp8 | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires |
CH693808A5 (de) * | 1997-12-11 | 2004-02-13 | Swisscom Mobile Ag | Verfahren zur Sperrung eines Mobilfunkteilnehmers mittels einer Identifikationskarte sowie eine entsprechende Identifikationskarte. |
AU8734698A (en) * | 1998-07-10 | 2000-02-01 | Gemplus | Chip card provided with a counting device |
JP4051510B2 (ja) * | 1998-07-16 | 2008-02-27 | ソニー株式会社 | データ記憶装置およびデータ記憶方法 |
US6952823B2 (en) * | 1998-09-01 | 2005-10-04 | Pkware, Inc. | Software patch generator using compression techniques |
US6836651B2 (en) * | 1999-06-21 | 2004-12-28 | Telespree Communications | Portable cellular phone system having remote voice recognition |
US6367696B1 (en) * | 1999-02-05 | 2002-04-09 | Hitachi, Ltd. | IC card processing device, automatic vending device, and selling method |
JP3782261B2 (ja) * | 1999-07-23 | 2006-06-07 | 株式会社東芝 | 携帯可能電子装置 |
US6317755B1 (en) * | 1999-07-26 | 2001-11-13 | Motorola, Inc. | Method and apparatus for data backup and restoration in a portable data device |
WO2002003271A1 (fr) * | 2000-07-04 | 2002-01-10 | Hitachi, Ltd. | Carte a circuit integre, procede de duplication d'une carte a circuit integre et procede de restitution |
CN1197006C (zh) * | 2001-02-20 | 2005-04-13 | 英业达股份有限公司 | 一种生成具有自检测和自修复功能的应用程序的方法 |
US20030004802A1 (en) * | 2001-03-19 | 2003-01-02 | Jeff Callegari | Methods for providing a virtual coupon |
US8402005B2 (en) * | 2001-03-27 | 2013-03-19 | Intel Corporation | Systems and methods for creating self-extracting files |
DE10247794B4 (de) * | 2002-10-14 | 2008-05-08 | Giesecke & Devrient Gmbh | Verwalten eines Fehlversuchszählers in einem tragbaren Datenträger |
-
2005
- 2005-06-09 CN CN2005800006929A patent/CN1820260B/zh not_active Expired - Fee Related
- 2005-06-09 SG SG200704815-0A patent/SG133613A1/en unknown
- 2005-06-09 WO PCT/JP2005/010599 patent/WO2005121976A1/ja not_active Application Discontinuation
- 2005-06-09 US US10/567,921 patent/US20060218196A1/en not_active Abandoned
- 2005-06-09 KR KR1020067002943A patent/KR20070030157A/ko not_active Application Discontinuation
- 2005-06-09 EP EP05748895A patent/EP1764699A4/en not_active Withdrawn
- 2005-06-09 JP JP2006519592A patent/JPWO2005121976A1/ja active Pending
-
2006
- 2006-09-15 HK HK06110251.7A patent/HK1089833A1/xx not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001066986A (ja) * | 1999-08-26 | 2001-03-16 | Sony Corp | 送信装置および方法、受信装置および方法、通信システム、並びにプログラム格納媒体 |
JP2003067257A (ja) * | 2001-08-27 | 2003-03-07 | Sayaka Ando | ソフトウェアの使用端末固定化システム |
JP2004102465A (ja) * | 2002-09-06 | 2004-04-02 | Toshiba Corp | 携帯情報端末、情報記録制御方法、及び、情報記録制御プログラム |
Non-Patent Citations (1)
Title |
---|
See also references of EP1764699A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009296463A (ja) * | 2008-06-06 | 2009-12-17 | Sony Corp | 情報処理装置、情報処理方法、プログラム及び通信システム |
JP4631935B2 (ja) * | 2008-06-06 | 2011-02-16 | ソニー株式会社 | 情報処理装置、情報処理方法、プログラム及び通信システム |
US9262128B2 (en) | 2011-07-08 | 2016-02-16 | Sony Corporation | Information processing apparatus, information processing method and computer program |
WO2013111490A1 (ja) | 2012-01-25 | 2013-08-01 | ソニー株式会社 | 情報処理装置、情報処理方法およびコンピュータプログラム |
US9372985B2 (en) | 2012-01-25 | 2016-06-21 | Sony Corporation | Information processing device, information processing method, and computer program |
WO2013150872A1 (ja) | 2012-04-06 | 2013-10-10 | ソニー株式会社 | 情報処理装置、情報処理方法およびコンピュータプログラム |
Also Published As
Publication number | Publication date |
---|---|
HK1089833A1 (en) | 2006-12-08 |
JPWO2005121976A1 (ja) | 2008-04-10 |
SG133613A1 (en) | 2007-07-30 |
CN1820260B (zh) | 2010-09-29 |
EP1764699A4 (en) | 2010-07-28 |
KR20070030157A (ko) | 2007-03-15 |
CN1820260A (zh) | 2006-08-16 |
US20060218196A1 (en) | 2006-09-28 |
EP1764699A1 (en) | 2007-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005121976A1 (ja) | 情報管理装置及び情報管理方法 | |
JP4428055B2 (ja) | データ通信装置及びデータ通信装置のメモリ管理方法 | |
US20070271433A1 (en) | Information Management Device and Information Management Method | |
CA2847942C (en) | Writing application data to a secure element | |
US7516479B2 (en) | Data communicating apparatus and method for managing memory of data communicating apparatus | |
JPH11345266A (ja) | 多重機能スマ―トカ―ド用アプリケ―ションを管理する方法およびシステム | |
JP3797195B2 (ja) | 情報処理端末又はその制御方法 | |
JP4228567B2 (ja) | データ転送システム及びデータ転送方法、価値情報移動サービス装置及び価値情報移動サービス方法、並びにコンピュータ・プログラム | |
JP4576894B2 (ja) | 情報管理装置及び情報管理方法 | |
EP1542391A1 (en) | Data processing method, its program and its device | |
JP4599899B2 (ja) | 情報管理装置及び情報管理方法 | |
JP4638135B2 (ja) | 情報記憶媒体 | |
JP4349130B2 (ja) | データ通信装置及びデータ通信装置のメモリ管理方法 | |
JP2005352963A (ja) | 情報管理装置及びその制御方法 | |
JP2005196409A (ja) | データ通信装置及びデータ通信装置のメモリ管理方法 | |
KR20070022737A (ko) | 정보 관리 장치 및 정보 관리 방법 | |
JP2005196410A (ja) | データ通信装置及びデータ通信装置のメモリ管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200580000692.9 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006519592 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006218196 Country of ref document: US Ref document number: 10567921 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067002943 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005748895 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 10567921 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 1020067002943 Country of ref document: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 2005748895 Country of ref document: EP |