WO2010072642A1 - Securing device with radiofrequency communication interface - Google Patents

Securing device with radiofrequency communication interface Download PDF

Info

Publication number
WO2010072642A1
WO2010072642A1 PCT/EP2009/067385 EP2009067385W WO2010072642A1 WO 2010072642 A1 WO2010072642 A1 WO 2010072642A1 EP 2009067385 W EP2009067385 W EP 2009067385W WO 2010072642 A1 WO2010072642 A1 WO 2010072642A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface
communication port
communication
radiofrequency
microcontroller
Prior art date
Application number
PCT/EP2009/067385
Other languages
French (fr)
Inventor
Pierre Gravez
Michel Thill
Original Assignee
Gemalto Sa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto Sa filed Critical Gemalto Sa
Publication of WO2010072642A1 publication Critical patent/WO2010072642A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/072Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising a plurality of integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07743External electrical contacts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07766Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement
    • G06K19/07769Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement the further communication means being a galvanic interface, e.g. hybrid or mixed smart cards having a contact and a non-contact interface
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0833Card having specific functional components
    • G07F7/084Additional components relating to data transfer and storing, e.g. error detection, self-diagnosis

Definitions

  • the invention relates to a securing device with a radiofrequency communication interface. More particularly, it relates to devices of the smart card type or equivalent types, with a broadband radiofrequency type interface.
  • New digital security applications generally use the combination of a general-public high-speed communication interface component and a secure microcontroller such as that widely used in smart cards.
  • These high-speed communication interfaces may particularly be interfaces of the radiofrequency (RF) type.
  • RF radiofrequency
  • the RF components available in the market are generally microcontrollers with a modulator/demodulator that operates in the required RF range.
  • These microcontrollers further have dedicated functional elements for carrying out RF communication and one or more programmable communication ports for interfacing an outside circuit.
  • these communication ports and the RF interface are not functional without the presence of a microcode that is specific to the use of the component.
  • Microcontroller vendors in the market provide designers with development tools for developing and validating their software applications.
  • the tool makes it possible to load programs or test routines via the development interface driven by a downloading program. Once the loading is complete, the loader invalidation command is executed, validating the code in the flash memory up to the next component reset. Only then does the component become functional.
  • the invention consists in benefiting from the securing mechanisms and resources available while programming the secure microcontroller of the smart card to load and personalise the program memory of the RF component instead of the development tools of the said interface component.
  • the secure assembly can use the high-speed protocol of the interface component to load the final application and the personalisation data of the user of the product.
  • the invention can then guarantee that the two- component system does not degrade the security level throughout the life cycle, including manufacturing, personalisation and issue.
  • the invention is a securing device including a connector, a first integrated circuit and a second integrated circuit. The connector is used for connecting the device by contact.
  • the first integrated circuit includes a secure microcontroller connected by a first communication port to the connector.
  • the said first integrated circuit further has a second communication port and a third communication port.
  • the second integrated circuit includes a radiofrequency communication interface, a fourth communication port, a fifth communication port and at least one memory for configuring the communication interface and the fourth communication port.
  • the fourth communication port is connected to the second communication port and the fifth communication port is connected to the third communication port.
  • the fifth communication port is a port for configuring the second integrated circuit which is deactivated during normal use of the device.
  • the first integrated circuit is a smart card microcontroller and the second integrated circuit is a programmable radiofrequency communication circuit.
  • the second communication port and the fourth communication port correspond to an SPI bus.
  • the communication interface complies with standard IEEE 802.15.4.
  • the invention is a method for personalising a secure device including a connector, a programmable radiofrequency interface and a microcontroller connected on the one hand to the connector and on the other hand to the radiofrequency interface through two distinct connections.
  • the said method includes a stage for loading a microcode from the connector to make it possible to configure the radiofrequency interface and one of the two connections, a stage for configuring the radiofrequency interface using the secure microcontroller so as to be able to effect secure radiofrequency communication and a stage for loading the application microcode and personal data through the radiofrequency interface into the secure microcontroller.
  • figure 1 represents a device according to the invention
  • figure 2 illustrates the communication link between the secure microcontroller and the RF component.
  • FIG. 1 schematically represents the components of a smart card according to the invention.
  • the smart card comprises a connector 1 , a secure microcontroller 2, a radiofrequency circuit 3 and an antenna 4.
  • the connector 1 has an insulating substrate on which the secure microcontroller 2 is mounted and connected by connection wires to the contact pads of the said connector 1.
  • the RF circuit 3 may be either glued to the substrate near the microcontroller 2 and connected to it by connecting wires and to a contact pad located on the same side as the circuits and designed to come into contact with the antenna 4 embedded in the body of the card (not represented).
  • the microcontroller 2 is a component manufactured by
  • Atmel and sold as part number AT91SC512384 RCT and the RF circuit is a component manufactured by Texas Instruments and sold as part number CC2430, this component being compliant with standard IEEE802.15.4.
  • FIG. 2 provides more details about the constitution of the microcontroller 2 and the RF circuit 3.
  • the microcontroller 2 has a microprocessor 21 , a memory bank 22, a communication interface 23 compliant with standard ISO7816, a serial interface 24 of the SPI type provided for a memory extension of the NOR flash type and a parallel interface 25 making it possible to drive an external memory of the NAND flash type.
  • a microcontroller 2 has other circuits that are only remotely related to the invention and are thus not described in this application.
  • the memory bank 22 is made up of several types of memory including the RAM memory, the ROM memory, non-volatile memory of the EEPROM or NOR flash type.
  • the non-volatile memory is used to store programs and other data while personalising the card. That NOR memory is a secure memory, access to which may be restricted.
  • the microprocessor 21 controls all the circuits 22 to 25 through a central bus.
  • the RF circuit 3 has a microprocessor 31 , a memory bank 32, a radiofrequency interface 33, a programmable communication interface 34 and a maintenance interface 35. Such circuits may comprise other elements that are not represented because they are unrelated to the invention.
  • the memory bank 32 contains the RAM memory and non-volatile memory. The non-volatile memory is used to store a microcode that is used to configure the working of the RF circuit 3.
  • the microprocessor 31 controls all the circuits 32 to 35 through a central bus.
  • the microcontroller 2 is connected to the connector 1 through a first communication port 26 which corresponds to the communication interface 23.
  • the microcontroller 2 has a second port 27 corresponding to the serial interface 24 and connected to a first port 36 of the RF circuit 3.
  • the microcontroller 2 has a third port 28 corresponding to the parallel interface 25 and connected to a second port 37 of the RF circuit 3.
  • the first port 36 corresponds to the programmable communication interface 34 and the second port 37 corresponds to the maintenance interface 35.
  • the parallel interface 25 is set up to communicate with the maintenance interface 35.
  • the maintenance interface 35 has three inputs: one for data, one for the clock input and one for the reset input.
  • the parallel interface 35 is diverted from its normal operating mode because a single data wire is used for data, the memory selection output (Chip Enable or CE) is used to drive the resetting of the maintenance interface and the write sampling signal (Latch Enable) is used to drive the clock signal of the maintenance interface.
  • the programmable interface 34 is configured as a serial port of the SPI type to communicate with the serial interface 24 which is itself a serial interface of the SPI type.
  • a first personalisation stage consists in loading into the microcontroller 2, via the connector 1 , a microcode aimed (a) at configuring the functioning of the parallel interface and (b) configuring the radiofrequency interface 33 and the programmable communication interface 34.
  • the microcontroller 2 then configures the RF circuit 3 through the third port 28 and the maintenance interface 35. If needed, it is also possible to configure the microcontroller 2 and the RF circuit 3 to set up secure radio communication by the microcontroller 2.
  • a second personalisation stage may be carried out by radiofrequency. That second personalisation stage is used to transfer into the microcontroller 2 the application programs and personalised data. This second stage is carried out through the RF circuit 3.
  • the transmission speed of an ISO7816 interface is approximately a few kilobits per second, whilst an interface according to IEEE802.15.4 allows several megabits per second. In that way, the application programs and personalisation data are sent to the card approximately 1000 times faster than through a conventional ISO7816 interface. Only the microcode used for configuring the microcontroller 2 and the RF interface 3 is sent at a slow speed. To sum up, the time required for personalisation including the first and second personalisation stages is of the same magnitude as the time required for personalising a conventional card, whereas, if the entire personalisation process was carried out through the ISO7816 interface alone, that time would have been twice as long.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Transceivers (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The invention makes it possible to benefit from available security mechanisms and resources while programming a smart card microcontroller 2 to load and personalise an RF component 3 instead of the development tools of the said RF component 3. To reduce the personalisation time, the device may use the high-speed protocol of the RF component 3 to load the final application and the personalisation data of the user of the product. The invention thus makes it possible to guarantee that the two-component system does not degrade the security level throughout the life cycle, including manufacturing, personalising and issue.

Description

SECURING DEVICE WITH RADIOFREQUENCY COMMUNICATION
INTERFACE
The invention relates to a securing device with a radiofrequency communication interface. More particularly, it relates to devices of the smart card type or equivalent types, with a broadband radiofrequency type interface.
New digital security applications generally use the combination of a general-public high-speed communication interface component and a secure microcontroller such as that widely used in smart cards. These high-speed communication interfaces may particularly be interfaces of the radiofrequency (RF) type. For example, there are a large number of components compatible with different communication standards such as IEEE 802.15.4 or IEEE 802.11. In that way, a smart card can be equipped with a high-speed RF interface, which avoids having to entirely design an RF interface in a smart card integrated circuit. The RF components available in the market are generally microcontrollers with a modulator/demodulator that operates in the required RF range. These microcontrollers further have dedicated functional elements for carrying out RF communication and one or more programmable communication ports for interfacing an outside circuit. However, these communication ports and the RF interface are not functional without the presence of a microcode that is specific to the use of the component.
Microcontroller vendors in the market provide designers with development tools for developing and validating their software applications. In the case of products with a rewritable program memory of the flash type, the tool makes it possible to load programs or test routines via the development interface driven by a downloading program. Once the loading is complete, the loader invalidation command is executed, validating the code in the flash memory up to the next component reset. Only then does the component become functional. To use such a component in a smart card, you need to either load the microcode before assembly in the smart card or after assembly, when the smart card is personalised. Loading the microcode before assembly requires significant loading time, which becomes disadvantageous. Further, it is difficult to secure the information in the component at this stage, as the securing component is not yet associated with it. After assembly, access to the loading port is difficult.
A solution is provided by the invention to remedy the aforementioned problems. The invention consists in benefiting from the securing mechanisms and resources available while programming the secure microcontroller of the smart card to load and personalise the program memory of the RF component instead of the development tools of the said interface component. In order to avoid excessively lengthening the time required for personalising the smart card, the secure assembly can use the high-speed protocol of the interface component to load the final application and the personalisation data of the user of the product. The invention can then guarantee that the two- component system does not degrade the security level throughout the life cycle, including manufacturing, personalisation and issue. More particularly, the invention is a securing device including a connector, a first integrated circuit and a second integrated circuit. The connector is used for connecting the device by contact. The first integrated circuit includes a secure microcontroller connected by a first communication port to the connector. The said first integrated circuit further has a second communication port and a third communication port. The second integrated circuit includes a radiofrequency communication interface, a fourth communication port, a fifth communication port and at least one memory for configuring the communication interface and the fourth communication port. The fourth communication port is connected to the second communication port and the fifth communication port is connected to the third communication port.
Preferentially, the fifth communication port is a port for configuring the second integrated circuit which is deactivated during normal use of the device. The first integrated circuit is a smart card microcontroller and the second integrated circuit is a programmable radiofrequency communication circuit. The second communication port and the fourth communication port correspond to an SPI bus. The communication interface complies with standard IEEE 802.15.4.
In another aspect, the invention is a method for personalising a secure device including a connector, a programmable radiofrequency interface and a microcontroller connected on the one hand to the connector and on the other hand to the radiofrequency interface through two distinct connections. The said method includes a stage for loading a microcode from the connector to make it possible to configure the radiofrequency interface and one of the two connections, a stage for configuring the radiofrequency interface using the secure microcontroller so as to be able to effect secure radiofrequency communication and a stage for loading the application microcode and personal data through the radiofrequency interface into the secure microcontroller.
The invention will be better understood, and other particularities and benefits will become clear in the description below, which description refers to the drawings attached, where: figure 1 represents a device according to the invention, figure 2 illustrates the communication link between the secure microcontroller and the RF component.
Figure 1 schematically represents the components of a smart card according to the invention. The smart card comprises a connector 1 , a secure microcontroller 2, a radiofrequency circuit 3 and an antenna 4. According to a known smart card assembly technique, the connector 1 has an insulating substrate on which the secure microcontroller 2 is mounted and connected by connection wires to the contact pads of the said connector 1. The RF circuit 3 may be either glued to the substrate near the microcontroller 2 and connected to it by connecting wires and to a contact pad located on the same side as the circuits and designed to come into contact with the antenna 4 embedded in the body of the card (not represented). According to another technique, it is also possible to mount the communication circuit 3 on the microcontroller 2 and connect them by direct contact or through connecting wires. For example, the microcontroller 2 is a component manufactured by
Atmel and sold as part number AT91SC512384 RCT and the RF circuit is a component manufactured by Texas Instruments and sold as part number CC2430, this component being compliant with standard IEEE802.15.4.
Figure 2 provides more details about the constitution of the microcontroller 2 and the RF circuit 3. The microcontroller 2 has a microprocessor 21 , a memory bank 22, a communication interface 23 compliant with standard ISO7816, a serial interface 24 of the SPI type provided for a memory extension of the NOR flash type and a parallel interface 25 making it possible to drive an external memory of the NAND flash type. As known to the person of the art, such a microcontroller 2 has other circuits that are only remotely related to the invention and are thus not described in this application. The memory bank 22 is made up of several types of memory including the RAM memory, the ROM memory, non-volatile memory of the EEPROM or NOR flash type. The non-volatile memory is used to store programs and other data while personalising the card. That NOR memory is a secure memory, access to which may be restricted. The microprocessor 21 controls all the circuits 22 to 25 through a central bus.
The RF circuit 3 has a microprocessor 31 , a memory bank 32, a radiofrequency interface 33, a programmable communication interface 34 and a maintenance interface 35. Such circuits may comprise other elements that are not represented because they are unrelated to the invention. The memory bank 32 contains the RAM memory and non-volatile memory. The non-volatile memory is used to store a microcode that is used to configure the working of the RF circuit 3. The microprocessor 31 controls all the circuits 32 to 35 through a central bus.
The microcontroller 2 is connected to the connector 1 through a first communication port 26 which corresponds to the communication interface 23. The microcontroller 2 has a second port 27 corresponding to the serial interface 24 and connected to a first port 36 of the RF circuit 3. The microcontroller 2 has a third port 28 corresponding to the parallel interface 25 and connected to a second port 37 of the RF circuit 3. The first port 36 corresponds to the programmable communication interface 34 and the second port 37 corresponds to the maintenance interface 35.
The parallel interface 25 is set up to communicate with the maintenance interface 35. With the circuits taken as an example, the maintenance interface 35 has three inputs: one for data, one for the clock input and one for the reset input. The parallel interface 35 is diverted from its normal operating mode because a single data wire is used for data, the memory selection output (Chip Enable or CE) is used to drive the resetting of the maintenance interface and the write sampling signal (Latch Enable) is used to drive the clock signal of the maintenance interface. The programmable interface 34 is configured as a serial port of the SPI type to communicate with the serial interface 24 which is itself a serial interface of the SPI type.
After card assembly, a first personalisation stage consists in loading into the microcontroller 2, via the connector 1 , a microcode aimed (a) at configuring the functioning of the parallel interface and (b) configuring the radiofrequency interface 33 and the programmable communication interface 34. The microcontroller 2 then configures the RF circuit 3 through the third port 28 and the maintenance interface 35. If needed, it is also possible to configure the microcontroller 2 and the RF circuit 3 to set up secure radio communication by the microcontroller 2. Once the microcontroller 2 and the RF circuit 3 are configured to set up radio communication, a second personalisation stage may be carried out by radiofrequency. That second personalisation stage is used to transfer into the microcontroller 2 the application programs and personalised data. This second stage is carried out through the RF circuit 3. The transmission speed of an ISO7816 interface is approximately a few kilobits per second, whilst an interface according to IEEE802.15.4 allows several megabits per second. In that way, the application programs and personalisation data are sent to the card approximately 1000 times faster than through a conventional ISO7816 interface. Only the microcode used for configuring the microcontroller 2 and the RF interface 3 is sent at a slow speed. To sum up, the time required for personalisation including the first and second personalisation stages is of the same magnitude as the time required for personalising a conventional card, whereas, if the entire personalisation process was carried out through the ISO7816 interface alone, that time would have been twice as long.

Claims

1. A securing device including:
- a connector (1 ) allowing connection by contact with the device,
- a first integrated circuit (2) including a secure microcontroller connected by a first communication port (26) to the connector (1 ), the said first integrated circuit (2) further having a second communication port (27) and a third communication port (28),
- a second integrated circuit (3) including a radiofrequency communication interface (33), a fourth communication port (36), a fifth communication port (37) and at least one memory (32) that is used to configure the communication interface (33) and the fourth communication port (36), the fourth communication port (36) being connected to the second communication port (27) and the fifth communication port (37) being connected to the third communication port (28).
2. A device according to claim 1 , where the fifth communication port (37) is a port for configuring the second integrated circuit (2) which is deactivated during the normal use of the device.
3. A device according to claim 1 , where the first integrated circuit (2) is a smart card microcontroller and the second integrated circuit (3) is a programmable radiofrequency communication circuit.
4. A device according to claim 1 , where the second communication port (27) and the fourth communication port (36) correspond to an SPI bus.
5. A device according to claim 1 , where the communication interface (33) is compliant with standard IEEE 802.15.4.
6. A device according to claim 1 , where the device is a smart card.
7. A method for personalising a secure device comprising a connector (1 ), a programmable radiofrequency interface (3) and a microcontroller (2) connected on the one hand to a connector and on the other hand to the radiofrequency interface (3) by two distinct connections (25, 28, 35, 37, 24, 27, 34, 36), the said method comprising the following stages:
- loading a microcode for configuring the radiofrequency interface (3) and one of the two links (34, 36) from the connector (1 ),
- configuration of the radiofrequency interface (3) by the secure microcontroller (2) in order to carry out secure radiofrequency communication,
- loading through the radiofrequency interface (3) of the application microcode and personal data into the secure microcontroller (2).
PCT/EP2009/067385 2008-12-23 2009-12-17 Securing device with radiofrequency communication interface WO2010072642A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP08306004A EP2202676A1 (en) 2008-12-23 2008-12-23 Securing device with radiofrequency communication interface
EP08306004.6 2008-12-23

Publications (1)

Publication Number Publication Date
WO2010072642A1 true WO2010072642A1 (en) 2010-07-01

Family

ID=41682361

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/067385 WO2010072642A1 (en) 2008-12-23 2009-12-17 Securing device with radiofrequency communication interface

Country Status (2)

Country Link
EP (1) EP2202676A1 (en)
WO (1) WO2010072642A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2955668A4 (en) * 2013-02-06 2016-10-19 Xiamen Elite Electric Co Ltd Mobile phone subscriber identity card based on multichannel digital authentication of mobile payment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2405409A1 (en) * 2010-07-06 2012-01-11 Gemalto SA Interconnected standalone multiprocessor devices, and adapted customisation method
EP2600287A1 (en) * 2011-12-01 2013-06-05 Gemalto SA Electronic device including elements managed by various standardised protocols and method for managing communication between said elements

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006056220A1 (en) * 2004-11-25 2006-06-01 Telecom Italia S.P.A. Joint ic card and wireless transceiver module for mobile communication equipment
US20070145152A1 (en) * 2005-12-28 2007-06-28 Fabrice Jogand-Coulomb Nested memory system with near field communications capability
US20070253251A1 (en) * 2006-04-28 2007-11-01 Nagamasa Mizushima Ic module and cellular phone
EP1860840A2 (en) * 2006-05-23 2007-11-28 Giesecke & Devrient GmbH Method for personalising a safety module of a telecommunications terminal
US20070293155A1 (en) * 2006-06-15 2007-12-20 Jton Systems Inc. Chipset for mobile wallet system
EP1895743A1 (en) * 2006-08-31 2008-03-05 Incard SA A method for implementing a wireless personal communication protocol for an IC Card
EP1909431A1 (en) * 2006-10-05 2008-04-09 Inside Contactless Mutual authentication method between a communication interface and a host processor of an NFC chipset

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006056220A1 (en) * 2004-11-25 2006-06-01 Telecom Italia S.P.A. Joint ic card and wireless transceiver module for mobile communication equipment
US20070145152A1 (en) * 2005-12-28 2007-06-28 Fabrice Jogand-Coulomb Nested memory system with near field communications capability
US20070253251A1 (en) * 2006-04-28 2007-11-01 Nagamasa Mizushima Ic module and cellular phone
EP1860840A2 (en) * 2006-05-23 2007-11-28 Giesecke & Devrient GmbH Method for personalising a safety module of a telecommunications terminal
US20070293155A1 (en) * 2006-06-15 2007-12-20 Jton Systems Inc. Chipset for mobile wallet system
EP1895743A1 (en) * 2006-08-31 2008-03-05 Incard SA A method for implementing a wireless personal communication protocol for an IC Card
EP1909431A1 (en) * 2006-10-05 2008-04-09 Inside Contactless Mutual authentication method between a communication interface and a host processor of an NFC chipset

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2955668A4 (en) * 2013-02-06 2016-10-19 Xiamen Elite Electric Co Ltd Mobile phone subscriber identity card based on multichannel digital authentication of mobile payment

Also Published As

Publication number Publication date
EP2202676A1 (en) 2010-06-30

Similar Documents

Publication Publication Date Title
EP2107511A1 (en) IC card comprising improved electrical contacts
EP2105892B1 (en) Apparatus and method for initializing an IC card
JP4937736B2 (en) Memory card with standard security functions
EP1457922B1 (en) Smart card that can be configured for debugging and software development using secondary communication port
US20020103944A1 (en) Arrangement with a microprocessor
JP2005322109A (en) Ic card module
US8686836B2 (en) Fast block write using an indirect memory pointer
EP1792257A2 (en) Generic universal serial bus device operable at low and full speed and adapted for use in a smart card device
US8931705B2 (en) IC card, mobile electronic device and data processing method in IC card
CN101211266A (en) FPGA automatic downloading and on-line upgrading process
US20120007723A1 (en) Interrupt generation and acknowledgment for rfid
CN101385038B (en) Ic card, terminal with ic card and initializing method thereof
CN108139916A (en) The loading of multistage booting image and configuration of programmable logic device
WO2010072642A1 (en) Securing device with radiofrequency communication interface
CN108037965B (en) Method and device for reading and writing target chip
US20080114935A1 (en) Memory Card System and Method Transmitting Host Identification Information Thereof
US9453867B2 (en) Processor chip with ultrasound transducer for ultrasound chip debugging
CN207264382U (en) The chip and system of field programmable gate array multi version configuration
US10169281B2 (en) Switch system and operation method thereof
US8957763B2 (en) RFID access method using an indirect memory pointer
US20120234926A1 (en) Portable electronic apparatus
US6912601B1 (en) Method of programming PLDs using a wireless link
EP1043662A1 (en) Apparatus and method for reconfiguring the pin assignments of one or more functinal circuits in a microcontroller
CN110580137B (en) Intelligent display card and operation method thereof
US8074023B2 (en) In-system programming to switch memory access from one area to another in memory cards

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09784091

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09784091

Country of ref document: EP

Kind code of ref document: A1