WO2008104601A2 - Method of managing command execution in an electronic token - Google Patents

Method of managing command execution in an electronic token Download PDF

Info

Publication number
WO2008104601A2
WO2008104601A2 PCT/EP2008/052457 EP2008052457W WO2008104601A2 WO 2008104601 A2 WO2008104601 A2 WO 2008104601A2 EP 2008052457 W EP2008052457 W EP 2008052457W WO 2008104601 A2 WO2008104601 A2 WO 2008104601A2
Authority
WO
WIPO (PCT)
Prior art keywords
command
applicative
execution
token
time
Prior art date
Application number
PCT/EP2008/052457
Other languages
English (en)
French (fr)
Other versions
WO2008104601A3 (en
Inventor
Xinyu Luo
Original Assignee
Axalto
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Axalto filed Critical Axalto
Publication of WO2008104601A2 publication Critical patent/WO2008104601A2/en
Publication of WO2008104601A3 publication Critical patent/WO2008104601A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/04Interfaces between hierarchically different network devices
    • H04W92/08Interfaces between hierarchically different network devices between user and terminal device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication

Definitions

  • the present invention relates to methods of managing command execution in an electronic token. It relates particularly to methods of managing command execution where time measurement constraints are severe, for example for communication between a handset and a SIM (Subscriber Identity Module) card.
  • SIM Subscriber Identity Module
  • the majority of smart cards such as a SIM telephone subscriber card or credit card, are electrically connected during operation to terminals such as mobile phones or readers. These cards exchange, with terminals, data according to dedicated communication protocols such as ISO standard 7816-3.
  • the time between the leading edge of the last character of a block received by the card and the leading edge of the first character of a following data block transmitted by the card may not exceed a predetermined maximum time BWT (Block Waiting Time) . If, during the sequence of operations of the application process, the card knows that the processing of the received block will exceed the predetermined maximum time then the card should transmit a specific protocol request to the reader. This specific protocol request is referred to as "Waiting Time extension" WTX before expiry of the maximum time BWT.
  • the terminal interprets this absence of a block as a time-out and may consider the card is mute.
  • the waiting time extension WTX requests are managed by an application embedded in the card.
  • This software solution is not portable because the times to be managed are dependent on the executed sub-programs. Moreover, is not applicable when the application calls a service having a long processing time like complex cryptography algorithm that does not take into account duration issue .
  • Waiting time extension WTX requests are supplied by a time manager interfacing with the protocol layer.
  • the time manager periodically sends, at the expiry of a waiting time, a waiting time extension protocol request transmitted to the terminal through the protocol layer as long as the data process in under progress in the embedded application of the card.
  • the invention aims at allowing execution of applications that require long internal execution phase in an electronic token connected to a host machine.
  • the invention aims at allowing the automatic sending of the relevant number of commands to the connected host machine at the relevant time.
  • the object of the present invention is a method of managing command execution in an electronic token connected to a host machine.
  • the token comprises a microprocessor, a time manager and a memory.
  • the memory comprises an operating system and elementary instructions for performing at least one applicative command.
  • Said method comprises the step of initializing the time manager with a predefined threshold, the step of receiving a first applicative command from the host machine, a step of activating the time manager, in response to the receipt of the first applicative command, a step of executing said first applicative command until the execution is completed or the predefined threshold is reached by the time manager, a step of sending, when the predefined threshold is reached, a second applicative command to the host machine, and going back to activating step.
  • the sending of the second applicative command to the host machine may be performed by means of the operating system or by means of the time manager.
  • the electronic token may comprise a flag.
  • the flag may be set to an activate state when the second applicative command is sent to the host machine.
  • the token may keep on said first applicative command execution without waiting for a response to the sent second applicative command.
  • the flag may be set to a deactivate state after the completion of the execution of the first applicative command.
  • Said method may comprise a further step of deactivating the time manager when the first applicative command execution is completed.
  • the memory may comprise a virtual machine and an application.
  • the first applicative command may be executed by both means of the virtual machine and the application.
  • the electronic token may have SIM features.
  • the virtual machine may be a Java virtual machine.
  • the sent second applicative command may be a proactive command.
  • the predefined threshold may be a number of Waiting Time Extension procedure bytes sent by the token.
  • the second applicative command may be a Display Text proactive command.
  • Another object of the invention is an electronic token which is intended to be connected to a host machine.
  • Said token comprises a microprocessor, a time manager and a memory.
  • the time manager is initialized with a predefined threshold.
  • the memory contains an application, an operating system and a virtual machine.
  • Said operating system activates the time manager in response to a first applicative command received from the host machine.
  • Said virtual machine executes the first applicative command until the execution is completed or the predefined threshold is reached by the time manager.
  • the predefined threshold is reached, the operating system sends a second applicative command to the host machine, then the operating system activates the time manager and keeps on executing the first applicative command.
  • the token may comprise a flag. Said flag may be set to an activate state when the second applicative command is sent to the host machine. Said flag may be set to a deactivate state after the completion of the execution of the first applic
  • FIG. 1 depicts schematically the interaction between a handset and a SIM card when executing long time commands without the invention
  • - Figure 2 depicts schematically the architecture of an electronic token of smart card type according to the invention
  • - Figure 3 is an algorithm for managing time constraint during a command execution according to the invention
  • - Figure 4 depicts schematically the interaction between a handset and a SIM card when executing long time commands with the invention.
  • the invention may apply to any types of electronic token connected to a host machine.
  • the electronic token is a SIM card but it could be any other kind of smart card or portable device performing a processing for a host device.
  • An advantage of the invention is to allow an automatic treatment of time constraint during the execution of command in an electronic token like a SIM card. It frees developer of software programs from the management of time relating to data exchanges. This is particularly interesting in but not limited to the case of applications software written in interpreted language like Java, such as an applet, that is assumed to be independent of any target platform.
  • a complex applicative command sent by the mobile phone ME can require a long time for execution completion in the SIM card.
  • the SIM card After receipt of a Terminal Response command, the SIM card send several waiting time extension procedure bytes 0x60 in order to inform the mobile phone that an additional time is required by the SIM card for the execution finalization.
  • the mobile phone ME After receipt of a predefined number of waiting extension time procedure bytes the mobile phone ME cut the communication even though the card duly sent waiting time extension protocol request.
  • the predefined number of waiting extension time procedure bytes depends on the mobile phone type. Some mobile phones cut the communication before receiving the fourth waiting extension time procedure byte.
  • FIG. 2 shows the architecture of a SIM card as an example of an electronic token according to a preferred embodiment of the invention.
  • the SIM card ET contains a microprocessor MP, a time manager TM, a communication interface CI and a memory MEM.
  • the memory MEM contains an operating system OS, a virtual machine VM, a software application AP and a flag FL.
  • the virtual machine VM may be a Java virtual machine or a .net virtual machine.
  • the microprocessor MP cooperates with the memory MEM and is intended to run the operating system OS, the virtual machine VM, and the software application AP.
  • the smart card is connected to a terminal ME such as a card reader or a mobile radiotelephone terminal by a communication link with or without electrical contacts.
  • the memory MEM may consist of a unique circuit or several circuits that may be of different types.
  • the time manager TM may consist of a hardware circuit, a software program or a combination of a hardware circuit and a software program.
  • Figure 3 shows an algorithm for managing time constraint during a command execution according to the invention.
  • the time manager TM After receipt of a first applicative command AC during a second step E2 , the time manager TM is activated by the operating system OS during a third step E3. Then the SIM card starts execution of the first applicative command AC.
  • This command may be a "SEND SHORT MESSAGE" proactive command for example.
  • Such a command prepares data and sends it to the mobile phone ME.
  • the treatment for preparing data may be long into the card, especially when the data is encrypted using a non-standard algorithm. Since this kind of algorithm is implemented in JAVA, a lot of time is required for execution.
  • the first applicative command AC corresponds to a feature provided by the application AP.
  • step E5 is performed by the time manager TM.
  • the time manager TM warns the operating system OS that the predefined threshold has been reached. This warning can be made by an interruption sent by the time manager to the microprocessor.
  • This second applicative command may be a proactive command like a Display Text command or a More Time command.
  • the mobile phone may display a message saying, for example, that the application is under progress for warning the user.
  • the SIM card may set a flag FL to an activate state, in step E6. By default this flag FL has been previously set at a deactivated state.
  • step E3 the time manager TM is reactivated by the operating system OS.
  • the SIM card goes on the first applicative command AC execution without waiting for the response corresponding to the second command DA sent to the mobile phone.
  • the flag FL may be set to a deactivate state. Such a flag allows the SIM card to distinguish the kind of command sent to the host machine. If the flag has been set to a deactivate state then the card waits for a response after sending a command to the host machine ME. In other words, the card turns in a sleeping mode until data is received from the host machine ME. If the flag has been set to an activate state then the card does not wait for the response after sending a command to the host machine ME and continues the previously received first command execution. Finally, in step E8, the time manager TM is deactivated by the operating system OS when the first applicative command AC execution is completed.
  • the second applicative command DA may be sent by the time manager TM itself to the mobile phone ME.
  • a SIM card according to the invention is able to execute a received first command while waiting for the response of another command sent to the reader, time is saved for the user.
  • the SIM card may not manage any flag.
  • the card may use another mechanism having a function equivalent to the flag in order to preserve time execution performance. Such a mechanism may be a variable storing the execution context.
  • the card may also manage neither any flag nor any replacement mechanism. In this case, the card waits for the answer to the second applicative command DA before continuing the first command AC execution.
  • the flag FL may be stored in the memory MEM or in a register of the microprocessor MP.
  • a complex applicative command sent by the mobile phone ME may require a long time for execution completion in the SIM card.
  • the mobile phone ME may send a Menu Selection command then a Fetch and several Terminal Response commands .
  • the SIM card send several waiting time extension procedure bytes 0x60 to the mobile phone ME.
  • the card OS automatically send a Display Text proactive command to the mobile phone ME and continues the long term command execution without waiting for a response for the Display Text command. Thanks to this automatic sending, the mobile phone ME does not cut the communication with the SIM card. The communication between the SIM card and the mobile phone remains alive.
  • the SIM card can then fully execute the long-time command and send a Status Word byte 0x9IXX corresponding to the end of the long-time command execution.
  • An additional advantage of the invention is to allow the entire execution of applications that require long internal execution steps in an electronic token even if the application does not take care of time constraint.
  • An electronic token according to the invention guarantees that the communication with the host machine will not be cut for time constraint reason during any application execution in the token.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Retry When Errors Occur (AREA)
  • Mobile Radio Communication Systems (AREA)
PCT/EP2008/052457 2007-03-01 2008-02-28 Method of managing command execution in an electronic token WO2008104601A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNA2007100856017A CN101256616A (zh) 2007-03-01 2007-03-01 管理电子令牌中命令执行的方法
CN200710085601.7 2007-03-01

Publications (2)

Publication Number Publication Date
WO2008104601A2 true WO2008104601A2 (en) 2008-09-04
WO2008104601A3 WO2008104601A3 (en) 2008-11-06

Family

ID=39671788

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2008/052457 WO2008104601A2 (en) 2007-03-01 2008-02-28 Method of managing command execution in an electronic token

Country Status (2)

Country Link
CN (1) CN101256616A (zh)
WO (1) WO2008104601A2 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10664669B2 (en) 2018-01-30 2020-05-26 Idex Biometrics Asa Device architecture
US10679020B2 (en) 2018-01-30 2020-06-09 Idex Biometrics Asa Voltage regulation

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2983990B1 (fr) * 2011-12-12 2014-06-20 Oberthur Technologies Lecteur de carte a puce

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040015594A1 (en) * 2000-02-03 2004-01-22 Pascal Guterman Time management at communication level for a smart card-type entity
EP1582969A1 (en) * 2004-03-29 2005-10-05 Hitachi, Ltd. Storage system and control method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040015594A1 (en) * 2000-02-03 2004-01-22 Pascal Guterman Time management at communication level for a smart card-type entity
EP1582969A1 (en) * 2004-03-29 2005-10-05 Hitachi, Ltd. Storage system and control method thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10664669B2 (en) 2018-01-30 2020-05-26 Idex Biometrics Asa Device architecture
US10679020B2 (en) 2018-01-30 2020-06-09 Idex Biometrics Asa Voltage regulation
US11010570B2 (en) 2018-01-30 2021-05-18 Idex Biometrics Asa Voltage regulation
US11341344B2 (en) 2018-01-30 2022-05-24 Idex Biometrics Asa Device architecture
US11651170B2 (en) 2018-01-30 2023-05-16 Idex Biometrics Asa Device architecture

Also Published As

Publication number Publication date
WO2008104601A3 (en) 2008-11-06
CN101256616A (zh) 2008-09-03

Similar Documents

Publication Publication Date Title
JP6305559B2 (ja) セキュアエレメント管理方法及び端末
CN105704332B (zh) 移动支付方法和装置
JP4640859B2 (ja) スマートカード内のアプレットから事前対応型セッションを開始する方法
US20080121687A1 (en) Method and system for detecting an end of transaction for contactless transactions on a mobile device
EP2645266B1 (en) Mobile device, transaction system including the mobile device, and method of signal transmission in a mobile device
EP4148615A1 (en) Near field communication (nfc) method and apparatus, and electronic device
CN107251069B (zh) 一种近场通信支付方法及终端
WO2010067222A2 (en) Portable mobile communication device and method of controlling near field communication
US20020016186A1 (en) Mobile phone
US8650387B2 (en) IC chip, information processing apparatus, software module control method, information processing system, information processing method, and program
US9021504B2 (en) Method and device for automatically selecting an application that can be implemented by said device
CN113518341B (zh) 一种eSIM码号管理方法及装置
WO2008104601A2 (en) Method of managing command execution in an electronic token
WO2019155792A1 (ja) 情報処理装置、情報処理方法、およびプログラム
KR102099739B1 (ko) 보안 엘리먼트를 관리하는 방법
EP2425336A1 (en) Mobile operating system management method and system
US9071640B2 (en) Method of selecting an application installed on a secured module, an associated terminal and an associated security module
US6866192B2 (en) IC card terminal
CN113950044A (zh) 用户识别卡的识别方法、装置、终端设备及存储介质
CN108990046B (zh) 移动网络的连接方法
JP2012093857A (ja) Icチップ、icチップにおけるメモリ初期化方法、icチップ用処理プログラム、携帯端末
JP5724694B2 (ja) 通信装置、通信方法、及び通信処理プログラム
US11809898B2 (en) Process implemented in an integrated circuit module, corresponding integrated circuit module, system comprising such a module and corresponding computer program
EP2632180A1 (en) Method for exchanging data between two mobile devices
EP3138360B1 (en) Method of managing profiles in a token

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08717239

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08717239

Country of ref document: EP

Kind code of ref document: A2