WO2011029266A1 - 多应用智能卡及智能卡多应用管理系统和方法 - Google Patents

多应用智能卡及智能卡多应用管理系统和方法 Download PDF

Info

Publication number
WO2011029266A1
WO2011029266A1 PCT/CN2010/001302 CN2010001302W WO2011029266A1 WO 2011029266 A1 WO2011029266 A1 WO 2011029266A1 CN 2010001302 W CN2010001302 W CN 2010001302W WO 2011029266 A1 WO2011029266 A1 WO 2011029266A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
smart card
security domain
application security
card
Prior art date
Application number
PCT/CN2010/001302
Other languages
English (en)
French (fr)
Inventor
庄晓
鲁志军
何朔
孟宏文
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Priority to EP10814868.5A priority Critical patent/EP2477165B1/en
Priority to US13/394,803 priority patent/US9009476B2/en
Publication of WO2011029266A1 publication Critical patent/WO2011029266A1/zh

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • G06Q20/3563Software being resident on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3574Multiple applications on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • G06Q20/35765Access rights to memory zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Definitions

  • the present invention relates to a smart card and smart card application management system and method, and more particularly to a multi-application smart card and smart card multi-application management system and method. Background technique
  • the Global Platform (GlobalPlatform) specification proposes a smart card multi-application management model.
  • a card manager (Card Manager) that plays the role of centralized administrator in the card, which contains the issuer security domain.
  • the main responsibility of the security domain is to perform the duties of the card issuer on the card, ie, have the right The ability to load, install, and delete applications provided by the publisher or its application provider.
  • the multi-application management model also includes an application provider security domain (ie, a partner security domain) whose primary responsibility is to manage keys and provide encryption operations related to these keys, which are independent of the issuer security domain, and are not Its control makes it possible to ensure complete separation between the key and the card issuer and the multi-application provider by creating an application provider security domain.
  • an application provider security domain ie, a partner security domain
  • the privileged security domain ie, the issuer security domain
  • the above multi-application management model cannot satisfy the co-management relationship of smart cards at the market and business levels, that is, does not meet the non-centralized multi-party co-management real environment.
  • the multi-application management model can not meet the need for the card control right to be tilted to the cardholder. Summary of the invention
  • the present invention proposes a multi-application smart card and smart card multi-application management system and method that are adapted to the non-centralized multi-party co-management real environment.
  • a smart card multi-application management system includes a terminal, a server, a multi-application smart card, and a card reader, and the terminal includes a browser, a network protocol module, and a network adapter.
  • the multi-application smart card is connected to the terminal through the network adapter and the card reader, and the server is connected to the terminal through a network adapter, where the multi-application smart card includes an application security domain management device,
  • the application security domain in the multi-application smart card is managed and maintained, and the application security domain includes a plurality of card issuer application security domains, and the plurality of card issuer application security domains share control rights of the multi-application smart card.
  • the application security domain further includes at least one cardholder application security domain, and the cardholder application security domain belongs to a card issuer application that creates the cardholder application security domain.
  • a security domain that manages and maintains applications created by cardholders.
  • the multi-application smart card is used between the terminal and the terminal
  • the HTTP protocol establishes a secure channel.
  • the multiple card issuer application security domains decide whether to add a new card issuer application security domain by voting.
  • the terminal is a web-based mobile phone or a POS machine or an ATM machine.
  • a multi-application smart card includes an application module, a local operating system, an application security domain management device, and physical layer hardware, where the application security domain management device is configured to manage and maintain application security in the multi-application smart card.
  • the domain, and the application security domain includes a plurality of card issuer application security domains, and the plurality of card issuer application security domains share control rights of the multi-application smart card.
  • the application security domain further includes at least one cardholder application security domain, and the cardholder application security domain belongs to a card issuer application that creates the cardholder application security domain.
  • a security domain that manages and maintains applications created by cardholders.
  • the multi-application smart card establishes a secure channel with the external terminal using the HTTP protocol.
  • the local operating system includes a web-based server module, and the web-based server module is configured to encode, decode, and interpret interaction information between the application module and an external terminal.
  • the multiple card issuer application security domains decide whether to add a new card issuer application security domain by voting.
  • the external terminal is a web-based mobile phone or a POS machine or an ATM machine.
  • a smart card multi-application management method comprising the following steps:
  • the multi-application smart card sends event information to a browser in the terminal through a card reader
  • the event handler processes the event parameter after receiving the event parameter to generate a request message with the identity identification information and the callback address of the multi-application smart card, and sends the request message Give the server;
  • the server processes the request message and generates a response message after receiving the request message, and sends the response message to the multi-application smart card by using the browser, where the response
  • the message contains the identity of the application security domain that needs to be operated;
  • the multi-application smart card performs the specified operation on the corresponding application security domain after receiving the response message, and performs subsequent communication with the server;
  • the application security domain includes a plurality of card issuer application security domains, and the plurality of card issuer application security domains share control rights of the multi-application smart card.
  • the application security domain further includes at least one cardholder application security domain, and the cardholder application security domain belongs to a card issuer application that creates the cardholder application security domain.
  • a security domain that manages and maintains applications created by cardholders.
  • step (a) further comprises the following steps:
  • a browser in the terminal sending a secure channel setup request message to the multi-application smart card, the secure channel setup request message containing identification information and additional information of a domain to be operated and a public key of the browser a certificate, thereby affirming an algorithm, a public key, and an application security domain of the selected operation supported by the terminal;
  • the multi-application smart card checks the received location after receiving the secure channel establishment request message Determining the content of the secure channel establishment request message, verifying the public key certificate of the browser, and determining the content of the returned secure channel establishment response message according to the additional information, thereby declaring the algorithm, public key, and suggestion supported by the multi-application smart card a session algorithm supported by both parties;
  • the browser in the terminal determines whether to accept the proposal or renegotiate the multi-application smart card
  • the multi-application smart card generates a process key according to a negotiated algorithm for protecting data encryption and preventing tampering of subsequent communications.
  • the multi-application smart card establishes a secure channel with the terminal using an HTTP protocol.
  • the multiple card issuer application security domains decide whether to add a new card issuer application security domain by voting.
  • the terminal is a web-based mobile phone or a POS machine or an ATM machine.
  • the multi-application smart card and smart card multi-application management system and method disclosed by the invention have the following advantages:
  • the multi-application smart card has multiple card issuer application security domains and shares the control right of the smart card, thereby adapting to the objective reality of real-world multi-party co-management;
  • multi-application has the cardholder application security domain to meet the need for the card control right to tilt towards the cardholder.
  • FIG. 1 is a structural diagram of a smart card multi-application management system according to an embodiment of the present invention.
  • FIG. 2 is a structural diagram of a multi-application smart card according to an embodiment of the present invention.
  • FIG. 3 is a structural diagram of an application security domain according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a working principle of a Web-based server module according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of an operating principle of an application module according to an embodiment of the present invention
  • the smart card multi-application management system disclosed by the present invention includes a terminal 1, a server 2, a multi-application smart card 3, and a card reader 9, and the terminal 1 includes a browser 4, an HTTP protocol module 5, and a static domain name resolution. 7, TCP/IP protocol module 6 and network adapter 8.
  • the multi-application smart card 3 is connected to the terminal 1 through the network adapter 8 and the card reader 9, and the server 2 can be connected to the terminal through the network adapter 8.
  • the user can interact with the multi-application smart card 3 through the browser 4 in the terminal 1.
  • the event information encapsulated by the multi-application smart card 3 and encapsulated by the communication protocol is transmitted to the terminal 1 through the card reader 9 and the network adapter 8, and thereafter, the information is parsed by the HTTP protocol module 5 and the TCP/IP protocol module 6 to obtain The event parameters are then passed to the event handler by the mapping of the static domain name resolver 7.
  • the server 2 can interact with the terminal 1 in a similar manner.
  • the multi-application smart card 3 can interact with the server 2 through the terminal 1 as a medium.
  • the terminal 1 may be a mobile phone, a web-based POS machine or an ATM machine or the like.
  • the multi-application smart card 3 disclosed in the present invention includes an application module 10, an application development framework module 11, an API interface 14, and local operation.
  • the system 13, the application security domain management device 12, and the physical layer hardware 15, and the local operating system 13 includes an encryption module 16, an input and output module 17, a file system module 18, and a web-based server module 19.
  • the web-based server module 19 is configured to complete encoding, decoding, and translation of interaction information between the application module 10 and the server 2 and the browser 4.
  • 4 is a schematic diagram showing the working principle of a Web-based server module according to an embodiment of the present invention. As shown in FIG.
  • the Web-based server module 19 includes a decoder 20, an encoder 21, and an interpreter 22.
  • the message from the browser 4 is decoded by the decoder 20 and sent to the interpreter 22 in the form of a WebReques request or a WebResponse response. Thereafter, the generated request or response message is sent to the encoder 21 through parsing and processing by the interpreter. Subsequently, the web-based server module 19 transmits the encoded request or response message to the server 2 through the browser 4.
  • application module 10 interacts with web-based server module 19 in a similar manner.
  • FIG. 5 is a schematic diagram showing the working principle of an application module according to an embodiment of the present invention.
  • the module 10 uses the adapter (WebAdapter) to perform dynamic reference of the resource.
  • the adaptation process is as follows: The adapter selects the corresponding page action object (WebAct ion) according to the received information, and then the page action object invokes the corresponding action according to the mapping relationship. Process functions to dynamically reference page resources.
  • the application security domain management device 12 is used to centrally manage and maintain the applications of the various partners on the card and maintain a certain degree of independence.
  • the agent on the card outside the card is called the application security domain.
  • the external card entity can manage the application only through the application security domain.
  • Figure 3 is a block diagram of an application security domain in accordance with an embodiment of the present invention. As shown in FIG.
  • the multi-application smart card disclosed by the present invention defines the following application security domains: a card issuer application security domain, the card issuer application security domain is used to manage a card issuer application, and can be installed to generate other application security domains. For example, a general application security domain or a cardholder application security domain, and can lock or delete an application or application security domain created by itself.
  • the multiple application smart card may have multiple issuer application security domains;
  • the shared application security domain can share the control of the card, can create a general application security domain in its own domain, and can lock or delete the application or application security domain created by itself; the general application security domain (ie, the partner application security domain), issue the card
  • the third-party organization allows the third-party organization to provide an application to the cardholder through the card issued by the third-party organization.
  • the agent on the card of the third-party organization is called a general application security domain, and the general application security domain can create an application and can lock or delete the created one.
  • Application; cardholder application security domain, card issuer allows card Install and delete the application on the card.
  • the cardholder's card agent is called the cardholder application security domain.
  • the cardholder application security domain can create an application or tablet application, and can lock or delete its own.
  • the application security domain disclosed by the present invention further includes a service application and a slice application, the service application being a special application on the smart card, the service application does not interact with the terminal, and provides services to other applications through its private interface.
  • the slice application is a lightweight application that supports industry applications and provides a flexible, scalable security architecture and data access mechanism.
  • the application security domain disclosed by the present invention has the following functions: the agent card external entity performs the maintenance work of the application. Before the agent application maintenance work, the application security domain first establishes a secure channel with the card external entity to complete mutual authentication, and after the security channel is established.
  • the application security domain can accept and execute application maintenance commands sent by the card external entity; provide services for directly affiliated applications or application security domains.
  • the application security domain stores some private keys for its directly affiliated applications.
  • the service interface consists of Apply security domain customization.
  • the card issuer application security domain disclosed by the present invention is already preset in the card at the time of card issuance, and its main functions are as follows: storing the card issuer certificate or key, and the smart card disclosed by the present invention allows multiple card issuer application security domains to exist.
  • the multiple card issuer application security domain indicates that the smart card is jointly issued by multiple card issuers, and each card issuer corresponds to one card issuer application security domain, and at the same time, the issuer certificate or key participates in the establishment of the secure channel, and The card entity proves its legal identity; provides the key and algorithm service for the card issuer application.
  • the card issuer application security domain can store some private key and private key algorithms.
  • the algorithm can provide a key service through a customized service interface. Only the application directly belonging to the issuer application security domain can use the key service of the issuer application security domain.
  • Application maintenance the issuer application security domain is responsible for maintaining the membership. For its application, maintenance operations include application installation and registration, application life cycle Change and delete applications, in hair card application security domains open before maintenance operations, the issuer application security domain requires and external entity to establish safe passage.
  • the general application security domain and the cardholder application security domain disclosed in the present invention are secondary application security domains, which belong to a card issuer application security domain on the card.
  • the general application security domain and the cardholder application security domain may be preset in the card when the card is issued, or may be created by the card issuer application security domain after the card is issued. Therefore, the general application security domain and the cardholder application security domain may be It is regarded as an application belonging to the issuer's application security domain, so that the service provided by the issuer application security domain can be invoked.
  • the main functions of the general application security domain are as follows: store the key of the application security domain, the key of the application security domain participates in the establishment of the secure channel, and proves its legal identity to the external entity; provides the key for the directly attached application.
  • Algorithm service, these keys and algorithms are private to the general application security domain, and the service interface is customized by the general application security domain, responsible for maintaining the applications belonging to it, maintenance operations including application installation and registration, application life cycle The change and the deletion of the application, etc., and after successfully establishing a secure channel with the external entity, the general application security domain performs an application management operation by receiving an application management command of the external entity of the card.
  • the main role of the cardholder application security domain is as follows: The personal identification number (PIN) of the cardholder application security domain is stored. Before the cardholder performs the application maintenance of the cardholder application security domain, the cardholder application security domain needs to be verified first. PIN code, the cardholder application security domain needs to customize the command to verify the PIN code.
  • PIN personal identification number
  • the cardholder application security domain can confirm the identity of the outside cardholder, that is, establish a secure channel with the outside world; Subordinate applications provide key services, these keys and algorithms are cardholder application security
  • the domain is private, and the service interface is customized by the cardholder application security domain; it is responsible for maintaining the applications attached to it, maintenance operations including application installation and registration, application lifecycle changes and application deletion, etc., successfully verified
  • the cardholder application security domain performs an application management operation by receiving an application management command of the entity outside the card.
  • the existing issuer application security domain may decide whether to add a new issuer application security domain by voting.
  • the voting process is as follows: Process initialization is mainly used to determine the authentication algorithm; each existing card issuer application security domain receives the request and then votes; opens each ticket, compares the contents of each ticket, and decides whether to add according to the comparison result.
  • the new card issuer applies the security domain.
  • the information contained in each ticket determines the key attributes of the new card issuer application security domain (for example, whether the new issuer application security domain has voting rights).
  • the installation steps of the application are as follows:
  • the secure channel is established by using the HTTP protocol, wherein the key system uses an asymmetric key system combined with a symmetric key system;
  • the application of the card application security domain can use the PIN to establish a secure channel; create an application handle; download and install the application itself; activate the application.
  • the establishment process of the secure channel is as follows:
  • the terminal 1 sends a secure channel establishment request message to the smart card 3, where the message contains the identifier and additional information of the domain to be operated and the public key certificate of the browser 4, thereby affirming that the terminal 1 supports Algorithm, public key, and application security domain of the selection operation;
  • the smart card 3 checks the content of the received message after receiving the secure channel establishment request message, verifies the browser certificate, and determines the content of the returned secure channel establishment response message according to the additional information.
  • the algorithm supported by the smart card 3, the public key, and the proposed session algorithm supported by both parties are claimed; after receiving the secure channel establishment response message, the terminal 1 determines whether to accept the recommendation or renegotiation of the smart card; and generates the process key according to the negotiated algorithm. , used to protect data encryption and prevent tampering of subsequent communications.
  • the smart card multi-application management method includes the following steps: (a) establishing a secure channel between the browser in the terminal and the multi-application smart card; (b) browsing the multi-application smart card through the card reader to the terminal.
  • the browser After receiving the event information, the browser obtains an event parameter by parsing and passes the parameter to the event handler; (d) the event handler receives the event parameter and then Processing to generate a request message with the identification information of the multi-application smart card and the callback address, and The request message is sent to the server; (e) the server processes the request message and generates a response message, and sends the response message to the multi-application smart card through a browser, where the response message The identifier of the application security domain that needs to be operated is included; (f) the multi-application smart card performs the specified operation on the corresponding application security domain after receiving the response message, and performs subsequent communication with the server.
  • the application security domain includes more than one card issuer application security domain.
  • the application security domain includes at least one cardholder application security domain.
  • the voting process is as follows: Process initialization is mainly used to determine the authentication algorithm; each existing card issuer application security domain receives the request and then votes; opens each ticket, compares the contents of each ticket, and decides whether to add according to the comparison result. The new card issuer applies the security domain. Among them, the information contained in each ticket determines the key attributes of the new issuer application security domain (for example, whether the new issuer application security domain has voting rights).
  • the step in the smart card multi-application management method further includes the following steps: (a) The browser in the terminal sends a secure channel establishment request message to the multi-application smart card, the message containing the identifier and additional information of the domain to be operated And the public key certificate of the browser, thereby declaring an algorithm, a public key, and an application security domain of the selected operation supported by the terminal; (a2) the multi-application smart card checking the received message content after receiving the secure channel establishment request message Validating the browser certificate and determining the content of the returned secure channel establishment response message according to the additional information, thereby declaring the algorithm supported by the multi-application smart card, the public key, and the recommended session algorithm supported by both parties; 3) browser reception in the terminal After the security channel establishes the response message, it is determined whether to accept the recommendation or renegotiation of the multi-application smart card; (a4) the multi-application smart card generates a process key according to the negotiated algorithm, and is used to protect data encryption and prevention of subsequent communication. tamper.

Description

多应用智能卡及智能卡多应用管理系统和方法 技术领域
本发明涉及智能卡及智能卡应用管理系统和方法, 更具体地, 涉及多应用 智能卡及智能卡多应用管理系统和方法。 背景技术
目前, 随着智能卡应用的不断增加和日益普及, 用户需要拥有和携带的智 能卡也越来越多, 例如网上艮行支付卡、 电子交易卡、 电子交通卡等, 然而, 不断增多的智能卡数量和种类不仅提高了用户使用智能卡的成本,也不便于用 户对智能卡进行管理。
因此, 为了克服上述问题, 全球平台 (GlobalPlatform )规范提出了一种 智能卡多应用管理模型。在该模型中,具有在卡中扮演集中式管理员角色的卡 管理者 (Card Manager ), 其包含发行者安全域 该安全域的主要职责为在卡 上执行卡发行者的职责, 即具有对发行者或其应用提供者提供的应用进行装 载、 安装、 删除的功能。 所述多应用管理模型还包括应用提供者安全域(即合 作方安全域), 其主要职责是管理密钥和提供这些密钥相关的加密操作, 这些 密钥独立于发行者安全域, 不受其控制, 因而可以通过创建应用提供者安全域 来保证密钥和卡发行者以及多应用提供者之间的完全分离。 由上可知,在上述 多应用管理模型中, 特权安全域(即发行者安全域)行使智能卡的管理权, 其 他的安全域都是在该域的 4曼权下创建, 并接受特权安全域的管理。 然而, 随着 智能卡市场逐步成熟并形成规模,上述多应用管理模型不能满足智能卡在市场 和业务层面上的共管共生关系, 即不符合非集中式的多方共管的真实环境。 同 时, 该多应用管理模型也不能满足卡片控制权适度向持卡人倾斜的需求。 发明内容
为了解决上述现有技术方案所存在的缺陷,本发明提出了一种适应非集中 式的多方共管的真实环境的多应用智能卡及智能卡多应用管理系统和方法。
本发明的目的是通过以下技术方案实现的: 一种智能卡多应用管理系统, 所述智能卡多应用管理系统包括终端、服务 器、 多应用智能卡和读卡器, 并且所述终端包括浏览器、 网络协议模块和网络 适配器。其中,所述多应用智能卡通过所述网络适配器和所述读卡器与终端相 连接, 而所述服务器通过网络适配器与终端相连接, 其中, 所述多应用智能卡 包括应用安全域管理装置, 用于管理和维护所述多应用智能卡内的应用安全 域, 并且所述应用安全域包括多个发卡商应用安全域, 所述多个发卡商应用安 全域共享所述多应用智能卡的控制权。
在上面所公开的方案中,优选地,所述应用安全域还包括至少一个持卡人 应用安全域,所述持卡人应用安全域隶属于创建所述持卡人应用安全域的发卡 商应用安全域, 用于管理和维护持卡人所创建的应用。
在上面所公开的方案中,优选地,所述多应用智能卡与所述终端之间使用
HTTP协议建立安全通道。
在上面所公开的方案中,可选地, 所述多个发卡商应用安全域通过投票的 方式决定是否添加新的发卡商应用安全域。
在上面所公开的方案中, 可选地, 所述终端是基于 Web方式的移动电话 或 P0S机或 ATM机。
本发明的目的是通过以下技术方案实现的:
一种多应用智能卡, 所述多应用智能卡包括应用模块、 本地操作系统、 应 用安全域管理装置以及物理层硬件,所述应用安全域管理装置用于管理和维护 所述多应用智能卡内的应用安全域,并且所述应用安全域包括多个发卡商应用 安全域, 所述多个发卡商应用安全域共享所述多应用智能卡的控制权。
在上面所公开的方案中,优选地,所述应用安全域还包括至少一个持卡人 应用安全域 ,所述持卡人应用安全域隶属于创建所述持卡人应用安全域的发卡 商应用安全域, 用于管理和维护持卡人所创建的应用。
在上面所公开的方案中,优选地,所述多应用智能卡与外部终端之间使用 HTTP协议建立安全通道。
在上面所公开的方案中,优选地,所述本地操作系统包括基于 Web的服务 器模块,所述基于 Web的服务器模块用于对所述应用模块与外部终端之间的交 互信息进行编解码和解释。 在上面所公开的方案中, 可选地, 所述多个发卡商应用安全域通过投票的 方式决定是否添加新的发卡商应用安全域。
在上面所公开的方案中, 可选地,所述外部终端是基于 Web方式的移动电 话或 P0S机或 ATM机。
本发明的目的是通过以下技术方案实现的:
一种智能卡多应用管理方法, 所述方法包括如下步骤:
( a )在多应用智能卡和终端中的浏览器之间建立安全通道;
( b )所述多应用智能卡通过读卡器向所述终端中的浏览器发出事件信息;
( c )所述浏览器接收到所述事件信息后, 通过解析而获得事件参数, 并将 所述事件参数传递给事件处理者;
( d )所述事件处理者接收到所述事件参数后对所述事件参数进行处理而生 成带有所述多应用智能卡的身份识别信息和回叫地址的请求消息,并将所述请 求消息发送给服务器;
( e )所述服务器接收到所述请求消息后对所述请求消息进行处理并生成响 应消息,并将所述响应消息通过所述浏览器发送到所述多应用智能卡中,其中, 所述响应消息包含有需要操作的应用安全域的标识;
( f )所述多应用智能卡接收到所述响应消息后对相应的应用安全域进行指 定的操作, 并与所述服务器进行后续的通信;
并且, 所述应用安全域包括多个发卡商应用安全域, 所述多个发卡商应用 安全域共享所述多应用智能卡的控制权。
在上面所公开的方案中,优选地, 所述应用安全域还包括至少一个持卡人 应用安全域,所述持卡人应用安全域隶属于创建所述持卡人应用安全域的发卡 商应用安全域, 用于管理和维护持卡人所创建的应用。
在上面所公开的方案中, 优选地, 步骤(a )进一步包括如下步骤:
( al )所述终端中的浏览器向所述多应用智能卡发送安全通道建立请求消 息,所述安全通道建立请求消息包含有需要操作的域的标识信息和附加信息以 及所述浏览器的公钥证书,从而申明所述终端所支持的算法、公钥和所选择操 作的应用安全域;
( a2 )所述多应用智能卡收到所述安全通道建立请求消息后检查收到的所 述安全通道建立请求消息的内容,校验所述浏览器的公钥证书、并根据附加信 息确定返回的安全通道建立响应消息的内容,从而申明所述多应用智能卡支持 的算法、 公钥以及建议的双方均支持的会话算法;
( a 3 )所述终端中的浏览器接收到所述安全通道建立响应消息后, 判断是 否接受所述多应用智能卡的建议或重新协商;
4 )所述多应用智能卡按照协商的算法产生过程密钥, 用于保护后续通 讯的数据加密和防止篡改。
在上面所公开的方案中,优选地, 所述多应用智能卡与所述终端之间使用 HTTP协议建立安全通道。
在上面所公开的方案中,可选地, 所述多个发卡商应用安全域通过投票的 方式决定是否添加新的发卡商应用安全域。
在上面所公开的方案中, 可选地,所述终端是基于 Web方式的移动电话或 P0S机或 ATM机。
本发明所公开的多应用智能卡及智能卡多应用管理系统和方法具有如下 优点: 多应用智能卡具有多个发卡商应用安全域并共享该智能卡控制权,从而 适应真实世界多方共管的客观现实;多应用智能卡具有持卡人应用安全域满足 了卡片控制权适度向持卡人倾斜的需求。 附图说明
结合附图, 本发明的技术特征以及优点将会被本领域技术人员更好地理 解, 其中:
图 1为根据本发明的实施例的智能卡多应用管理系统的结构图;
图 2为根据本发明的实施例的多应用智能卡的结构图;
图 3为根据本发明的实施例的应用安全域结构图;
图 4为根据本发明的实施例的基于 Web的服务器模块工作原理示意图; 图 5为根据本发明的实施例的应用模块工作原理示意图;
图 6为根据本发明的实施例的智能卡多应用管理方法流程图。 具体实施方式 图 1 为才艮据本发明的实施例的智能卡多应用管理系统的结构图。 如图 1 所示, 本发明公开的智能卡多应用管理系统包括终端 1、 服务器 2、 多应用智 能卡 3和读卡器 9 , 并且所述终端 1包括浏览器 4、 HTTP协议模块 5、 静态域 名解析器 7、 TCP/ IP协议模块 6和网络适配器 8。 其中, 所述多应用智能卡 3 通过网络适配器 8和读卡器 9与终端 1相连接,而服务器 2可通过网络适配器 8与终端相连接。 多应用智能卡 3插入读卡器 9后, 用户可通过终端 1中的浏 览 4器与该多应用智能卡 3相交互。例如: 多应用智能卡 3发出的经过通信协 议封装的事件信息通过读卡器 9和网络适配器 8而被传送到终端 1 , 此后, 信 息将被 HTTP协议模块 5和 TCP/ IP协议模块 6解析从而获得事件参数,随后通 过静态域名解析器 7的映射而将所获得的事件参数传递给事件处理者。 同样, 服务器 2可通过类似的方式与终端 1相交互。由上可知,通过终端 1作为媒介, 多应用智能卡 3可以与服务器 2相交互。其中, 当客户端(即多应用智能卡 3 ) 在请求服务器 2服务时必须将自己的身份识别信息通过 URL参数的方式带到服 务器 2 , 同时告知浏览器 4服务器相应信息的回叫地址。 根据本发明的实施例 的终端 1可以是移动电话、 基于 Web方式的 P0S机或 ATM机等。
图 2为才艮据本发明的实施例的多应用智能卡的结构图,如图 2所示, 本发 明公开的多应用智能卡 3包括应用模块 10、 应用开发框架模块 11、 API接口 14、 本地操作系统 13、 应用安全域管理装置 12以及物理层硬件 15, 并且所述 本地操作系统 13包括加密模块 16、 输入输出模块 17、 文件系统模块 18和基 于 Web的服务器模块 19。 其中, 所述基于 Web的服务器模块 19用于完成应用 模块 10与服务器 2和浏览器 4之间的交互信息的编解码和翻译。 图 4为根据 本发明的实施例的基于 Web的服务器模块工作原理示意图。如图 4所示,基于 Web的服务器模块 19包括解码器 20、编码器 21和解释器 22。来自于浏览器 4 的消息经过解码器 20解码后以 WebReques t请求或 WebResponse响应的格式发 送给解释器 22, 此后, 经过解释器的解析和处理, 将产生的请求或响应消息 发送给编码器 21 , 随后, 基于 Web的服务器模块 19将编码后的请求或响应消 息通过浏览器 4发送到服务器 2。 同样, 应用模块 10通过类似的方式与基于 Web的服务器模块 19相交互。
图 5为根据本发明的实施例的应用模块工作原理示意图。如图 5所示,应 用模块 10使用适配器(WebAdapter )来进行资源的动态引用, 适配过程如下: 适配器才艮据接收到的信息选择对应的页面动作对象( WebAct ion ), 随后页面动 作对象根据映射关系调用对应的动作处理函数, 从而动态引用页面资源。
所述应用安全域管理装置 12用于集中管理和维护卡上的各个合作方的应 用, 并使之保持一定的独立性。 通常, 智能卡上存在多个应用, 这些应用需要 分成几个集合,每个集合中的应用属于同一个卡外实体, 例如卡发行商或持卡 人。 卡外实体的卡上代理叫做应用安全域。 在实际应用中, 只有通过应用安全 域, 外卡实体才能实现对应用的管理。 图 3为才艮据本发明的实施例的应用安全 域结构图。如图 3所示, 本发明所公开的多应用智能卡定义了下面几种应用安 全域: 发卡商应用安全域, 所述发卡商应用安全域用于管理发卡商应用, 可以 安装生成其他应用安全域, 例如一般应用安全域或持卡人应用安全域, 并且可 以锁定或删除自己创建的应用或应用安全域,所述多应用智能卡上可以存在多 个发卡商应用安全域; 共享应用安全域, 所述共享应用安全域可以共享卡片控 制权,可以在自己的域内创建一般应用安全域, 并且可以锁定或删除自己创建 的应用或应用安全域; 一般应用安全域(即合作方应用安全域), 发卡商允许 第三方组织通过其发行的卡片向持卡人提供应用,第三方组织的卡上代理被称 之为一般应用安全域, 所述一般应用安全域可以创建应用, 并且可以锁定或删 除自己创建的应用;持卡人应用安全域,发卡商允许持卡人在自己的卡上安装 和删除应用,持卡人的卡上代理被称之为持卡人应用安全域, 所述持卡人应用 安全域可以创建应用或片应用, 并且可以锁定或删除自己的应用安全域。本发 明所公开的应用安全域还包括服务应用和片应用,所述服务应用是智能卡上的 特殊应用,该服务应用不与终端交互,并通过其私有接口向其他应用提供服务。 所述片应用是一种为行业应用提供支撑的轻量级应用, 可以提供灵活的、可伸 缩的安全架构和数据存取机制。
本发明所公开的应用安全域具有如下作用:代理卡外实体进行应用的维护 工作, 在代理应用维护工作前, 应用安全域首先与卡外实体建立安全通道, 完 成相互认证,安全通道建立完成后,应用安全域才可接受和执行卡外实体发来 的应用维护命令; 为直接隶属的应用或应用安全域提供服务, 通常, 应用安全 域会存储一些私有的密钥, 为其直接隶属的应用提供加解密服务,服务接口由 应用安全域自定义。
本发明所公开的发卡商应用安全域在卡发行时已经预置在卡中,其主要作 用如下: 存储发卡商证书或密钥,本发明所公开的智能卡允许存在多个发卡商 应用安全域, 其中, 所述多个发卡商应用安全域表示该智能卡由多个发卡商联 合发行, 每个发卡商对应一个发卡商应用安全域, 同时, 发卡商证书或密钥参 与安全通道的建立, 并向卡外实体证明自己的合法身份; 为发卡商应用提供密 钥和算法服务, 除了发卡商证书或密钥外,发卡商应用安全域可以存储一些私 有密钥和私有密钥算法,这些密钥和算法可以通过自定义的服务接口向外提供 密钥服务,只有直接隶属于发卡商应用安全域的应用才可以使用发卡商应用安 全域的密钥服务; 应用维护, 发卡商应用安全域负责维护隶属于它的应用, 维 护操作包括应用的安装和注册,应用的生命周期的改变和应用的删除等,在发 卡商应用安全域开启维护操作前,该发卡商应用安全域需要和卡外实体建立安 全通道。
如图 3所示,本发明所公开的一般应用安全域和持卡人应用安全域是二级 应用安全域, 其隶属于卡上某个发卡商应用安全域。一般应用安全域和持卡人 应用安全域可在卡发行时预置在卡中,也可以在卡发行后由发卡商应用安全域 创建, 因此,一般应用安全域和持卡人应用安全域可以看作隶属于发卡商应用 安全域的应用,从而可以调用发卡商应用安全域提供的服务。一般应用安全域 的主要作用如下:存储应用安全域的密钥,该应用安全域的密钥参与安全通道 的建立, 并向卡外实体证明自己的合法身份; 为直接隶属的应用提供密钥和算 法服务,这些密钥和算法是该一般应用安全域私有的, 并且服务接口由该一般 应用安全域自定义, 负责维护隶属于它的应用, 维护操作包括应用的安装和注 册,应用的生命周期的改变和应用的删除等, 并且在与卡外实体成功建立安全 通道之后,一般应用安全域通过接收卡外实体的应用管理命令进行应用管理操 作。 持卡人应用安全域主要作用如下: 存储持卡人应用安全域的个人身份码 ( PIN ),持卡人在进行持卡人应用安全域的应用维护前, 需要先验证持卡人应 用安全域的 PIN码, 持卡人应用安全域需要自定义验证 PIN码的命令, 脸证 PIN码后, 持卡人应用安全域就可以确认外界持卡人身份, 即与外界建立了安 全通道; 为直接隶属的应用提供密钥服务, 这些密钥和算法是持卡人应用安全 域私有的,并且服务接口由持卡人应用安全域自定义;负责维护隶属它的应用, 维护操作包括应用的安装和注册,应用的生命周期的改变和应用的删除等,在 成功验证了持卡人应用安全域的 PIN码后,持卡人应用安全域通过接收卡外实 体的应用管理命令进行应用管理操作。
如图 3所示, 在本发明所公开的应用安全域中, 可选地, 已存在的发卡商 应用安全域可以通过投票的方式决定是否添加新的发卡商应用安全域。投票过 程如下: 进程初始化, 主要用于确定认证算法; 各个已存在的发卡商应用安全 域接收到请求后进行投票; 拆开每张票, 比较每张票的内容, 并根据比较结果 决定是否添加新的发卡商应用安全域。其中,每张票中包含的信息决定了新的 发卡商应用安全域的关键属性(例如,该新的发卡商应用安全域是否具有投票 权)。
在根据本发明的实施例的智能卡多应用管理系统中, 应用的安装步骤如 下: 采用 HTTP协议建立安全通道, 其中密钥体系釆用非对称密钥体系结合对 称密钥体系; 如果是隶属于持卡人应用安全域的应用, 则可以利用 PIN建立安 全通道; 创建应用句柄; 下载并安装应用本身; 激活应用。 其中, 安全通道的 建立过程如下: 终端 1向智能卡 3发送安全通道建立请求消息, 该消息内含需 要操作的域的标识和附加信息以及浏览器 4的公钥证书,从而申明终端 1所支 持的算法、公钥和选择操作的应用安全域; 智能卡 3收到安全通道建立请求消 息后检查收到的消息内容,校验浏览器证书、并根据附加信息确定返回的安全 通道建立响应消息的内容,从而申明智能卡 3支持的算法、公钥以及建议的双 方均支持的会话算法; 终端 1接收到该安全通道建立响应消息后, 判断是否接 受智能卡的建议或重新协商; 按照协商的算法产生过程密钥, 用于保护后续通 讯的数据加密和防止篡改。
图 6为根据本发明的实施例的智能卡多应用管理方法流程图。如图 6所示, 该智能卡多应用管理方法包括如下步骤:(a )在终端中的浏览器和多应用智能 卡之间建立安全通道; ( b )多应用智能卡通过读卡器向终端中的浏览器发出事 件信息; (c )该浏览器接收到所述事件信息后, 通过解析而获得事件参数, 并 将该参数传递给事件处理者; ( d )该事件处理者接收到事件参数后对其进行处 理而生成带有所述多应用智能卡的身份识别信息和回叫地址的请求消息,并将 该请求消息发送给服务器; ( e )该服务器接收到所述请求消息后对其进行处理 并生成响应消息,并将该响应消息通过浏览器发送到所述多应用智能卡,其中, 所述响应消息包含有需要操作的应用安全域的标识;( f )所述多应用智能卡接 收到该响应消息后对相应的应用安全域进行指定的操作,并与服务器进行后续 的通信。 其中, 所述应用安全域包括多于一个的发卡商应用安全域。 并且可选 地, 所述应用安全域包括至少一个持卡人应用安全域。 其中, 可选地, 已存在 域。 投票过程如下: 进程初始化, 主要用于确定认证算法; 各个已存在的发卡 商应用安全域接收到请求后进行投票; 拆开每张票, 比较每张票的内容, 并根 据比较结果决定是否添加新的发卡商应用安全域。其中,每张票中包含的信息 决定了新的发卡商应用安全域的关键属性(例如,该新的发卡商应用安全域是 否具有投票权)。
所述智能卡多应用管理方法中的步骤 )进一步包括如下步骤: (al )终 端中的浏览器向所述多应用智能卡发送安全通道建立请求消息,该消息内含需 要操作的域的标识和附加信息以及该浏览器的公钥证书,从而申明终端所支持 的算法、 公钥和选择操作的应用安全域; (a2 )所述多应用智能卡收到该安全 通道建立请求消息后检查收到的消息内容, 效验浏览器证书、并根据附加信息 确定返回的安全通道建立响应消息的内容, 从而申明多应用智能卡支持的算 法、 公钥以及建议的双方均支持的会话算法; 3 )终端中的浏览器接收到该 安全通道建立响应消息后, 判断是否接受所述多应用智能卡的建议或重新协 商; (a4 )所述多应用智能卡按照协商的算法产生过程密钥, 用于保护后续通 讯的数据加密和防止篡改。
尽管本发明是通过上述的优选实施方式进行描述的,但是其实现形式并不 局限于上述的实施方式。 应该认识到: 在不脱离本发明主旨和范围的情况下, 本领域技术人员可以对本发明做出不同的变化和修改。

Claims

权利要求
1. 一种智能卡多应用管理系统, 所述智能卡多应用管理系统包括终端、 服务器、 多应用智能卡和读卡器, 并且所述终端包括浏览器、 网络协议模块和 网络适配器; 其中, 所述多应用智能卡通过所述网络适配器和所述读卡器与终 端相连接, 而所述服务器通过网络适配器与终端相连接, 其中, 所述多应用智 能卡包括应用安全域管理装置,用于管理和维护所述多应用智能卡内的应用安 全域, 其特征在于, 所述应用安全域包括多个发卡商应用安全域, 所述多个发 卡商应用安全域共享所述多应用智能卡的控制权。
2. 根据权利要求 1所述的智能卡多应用管理系统, 其特征在于, 所述应 用安全域还包括至少一个持卡人应用安全域,所述持卡人应用安全域隶属于创 建所述持卡人应用安全域的发卡商应用安全域,用于管理和维护持卡人所创建 的应用。
3. 根据权利要求 1-2中任一个权利要求所述的智能卡多应用管理系统, 其特征在于,所述多应用智能卡与所述终端之间使用 HTTP协议建立安全通道。
4. 根据权利要求 3所述的智能卡多应用管理系统, 其特征在于, 所述多 个发卡商应用安全域通过投票的方式决定是否添加新的发卡商应用安全域。
5. 根据权利要求 4所述的智能卡多应用管理系统, 其特征在于, 所述终 端是基于 Web方式的移动电话或 P0S机或 ATM机。
6. —种多应用智能卡, 所述多应用智能卡包括应用模块、本地操作系统、 应用安全域管理装置以及物理层硬件,所述应用安全域管理装置用于管理和维 护所述多应用智能卡内的应用安全域, 其特征在于, 所述应用安全域包括多个 发卡商应用安全域,所述多个发卡商应用安全域共享所述多应用智能卡的控制 权。
7. 根据权利要求 6所述的多应用智能卡, 其特征在于, 所述应用安全域 还包括至少一个持卡人应用安全域,所述持卡人应用安全域隶属于创建所述持 卡人应用安全域的发卡商应用安全域, 用于管理和维护持卡人所创建的应用。
' 8. 根据权利要求 6-7中任一个权利要求所述的多应用智能卡, 其特征在 于, 所述多应用智能卡与外部终端之间使用 HTTP协议建立安全通道。
9. 根据权利要求 8所述的多应用智能卡, 其特征在于, 所述本地操作系 统包括基于 Web的服务器模块,所述基于 Web的服务器模块用于对所述应用模 块与外部终端之间的交互信息进行编解码和解释。
10. 根据权利要求 9 述的多应用智能卡,其特征在于, 所述多个发卡商 应用安全域通过投票的方式决定是否添加新的发卡商应用安全域。
11. 根据权利要求 10所述的多应用智能卡, 其特征在于, 所述外部终端 是基于 Web方式的移动电话或 P0S机或 ATM机。
12. —种智能卡多应用管理方法, 所述方法包括如下步骤:
( a )在多应用智能卡和终端中的浏览器之间建立安全通道;
( b )所述多应用智能卡通过读卡器向所述终端中的浏览器发出事件信息; (c ) 所述浏览器接收到所述事件信息后,通过解析而获得事件参数, 并将所述事件 参数传递给事件处理者;
( d )所述事件处理者接收到所述事件参数后对所述事件参数进行处理而生成带 有所述多应用智能卡的身份识别信息和回叫地址的请求消息,并将所述请求消 息发送给服务器;
( e )所述服务器接收到所述请求消息后对所述请求消息进行处理并生成响应消 息, 并将所述响应消息通过所述浏览器发送到所述多应用智能卡中, 其中, 所 述响应消息包含有需要操作的应用安全域的标识;
( f )所述多应用智能卡接收到所述响应消息后对相应的应用安全域进行指定的 操作, 并与所述服务器进行后续的通信;
其特征在于, 所述应用安全域包括多个发卡商应用安全域, 所述多个发卡 商应用安全域共享所述多应用智能卡的控制权。
13. 根据权利要求 12所述的智能卡多应用管理方法, 其特征在于, 所述 应用安全域还包括至少一个持卡人应用安全域,所述持卡人应用安全域隶属于 创建所述持卡人应用安全域的发卡商应用安全域,用于管理和维护持卡人所创 建的应用。
14. 根据权利要求 12-13 中任一个权利要求所述的智能卡多应用管理方 法, 其特征在于, 步骤(a )进一步包括如下步骤:
( a l )所述终端中的浏览器向所述多应用智能卡发送安全通道建立请求消 息,所述安全通道建立请求消息包含有需要操作的域的标识信息和附加信息以 及所述浏览器的公钥证书,从而申明所述终端所支持的算法、公钥和所选择操 作的应用安全 ί^;
( a2 )所述多应用智能卡收到所述安全通道建立请求消息后检查收到的所 述安全通道建立请求消息的内容,校验所述浏览器的公钥证书、并根据附加信 息确定返回的安全通道建立响应消息的内容,从而申明所述多应用智能卡支持 的算法、 公钥以及建议的双方均支持的会话算法;
3 ) 所述终端中的浏览器接收到所述安全通道建立响应消息后, 判断是 否接受所述多应用智能卡的建议或重新协商;
( a4 ) 所述多应用智能卡按照协商的算法产生过程密钥, 用于保护后续通 讯的数据加密和防止篡改。
15. 根据权利要求 14所述的智能卡多应用管理方法, 其特征在于, 所述 多应用智能卡与所述终端之间使用 HTTP协议建立安全通道。
16. 根据权利要求 15所述的智能卡多应用管理方法, 其特征在于, 所述
17. 根据权利要求 16所述的智能卡多应用管理方法, 其特征在于, 所述 终端是基于 Web方式的移动电话或 P0S机或 ATM机。
PCT/CN2010/001302 2009-09-11 2010-08-27 多应用智能卡及智能卡多应用管理系统和方法 WO2011029266A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP10814868.5A EP2477165B1 (en) 2009-09-11 2010-08-27 Multi-application smart card, and system and method for multi-application management of smart card
US13/394,803 US9009476B2 (en) 2009-09-11 2010-08-27 Multi-application smart card, and system and method for multi-application management of smart card

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910195624.2 2009-09-11
CN200910195624.2A CN102025710B (zh) 2009-09-11 2009-09-11 多应用智能卡及智能卡多应用管理系统和方法

Publications (1)

Publication Number Publication Date
WO2011029266A1 true WO2011029266A1 (zh) 2011-03-17

Family

ID=43731940

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/001302 WO2011029266A1 (zh) 2009-09-11 2010-08-27 多应用智能卡及智能卡多应用管理系统和方法

Country Status (4)

Country Link
US (1) US9009476B2 (zh)
EP (1) EP2477165B1 (zh)
CN (1) CN102025710B (zh)
WO (1) WO2011029266A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167498A (zh) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 一种能力管控方法和系统
CN113162771A (zh) * 2021-04-25 2021-07-23 广州羊城通有限公司 一种智能卡应用管理方法、装置及系统

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2273748A1 (en) * 2009-07-09 2011-01-12 Gemalto SA Method of managing an application embedded in a secured electronic token
CN102542226A (zh) * 2011-12-26 2012-07-04 东信和平智能卡股份有限公司 一种应用终端访问智能卡的安全访问实现方法
CN103188233B (zh) * 2011-12-30 2016-03-16 卓望数码技术(深圳)有限公司 一种多应用分发与管理的方法及系统
CN103208065A (zh) * 2012-01-16 2013-07-17 深圳市家富通汇科技有限公司 在移动装置中个人化安全元件的方法和装置
CN103117856B (zh) * 2012-01-16 2015-07-01 深圳市可秉资产管理合伙企业(有限合伙) 在移动装置中配置应用的方法和装置
US9058498B2 (en) * 2012-07-12 2015-06-16 Oracle International Corporation Runtime environment management of secure communications on card computing devices
CN103778448B (zh) * 2012-10-25 2017-10-27 中国银联股份有限公司 多应用智能卡管理系统及方法
US8898769B2 (en) 2012-11-16 2014-11-25 At&T Intellectual Property I, Lp Methods for provisioning universal integrated circuit cards
US8959331B2 (en) 2012-11-19 2015-02-17 At&T Intellectual Property I, Lp Systems for provisioning universal integrated circuit cards
KR101449644B1 (ko) 2013-05-22 2014-10-15 한국정보통신주식회사 Pos 시스템 및 이를 이용한 카드 정보 암호화 결제 방법
CN104301284A (zh) * 2013-07-15 2015-01-21 中国银联股份有限公司 多应用智能卡及智能卡多应用管理方法
US9036820B2 (en) 2013-09-11 2015-05-19 At&T Intellectual Property I, Lp System and methods for UICC-based secure communication
US9124573B2 (en) 2013-10-04 2015-09-01 At&T Intellectual Property I, Lp Apparatus and method for managing use of secure tokens
US9208300B2 (en) 2013-10-23 2015-12-08 At&T Intellectual Property I, Lp Apparatus and method for secure authentication of a communication device
US9240994B2 (en) 2013-10-28 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for securely managing the accessibility to content and applications
US9313660B2 (en) 2013-11-01 2016-04-12 At&T Intellectual Property I, Lp Apparatus and method for secure provisioning of a communication device
US9240989B2 (en) 2013-11-01 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for secure over the air programming of a communication device
US9413759B2 (en) 2013-11-27 2016-08-09 At&T Intellectual Property I, Lp Apparatus and method for secure delivery of data from a communication device
CN103957210B (zh) * 2014-04-30 2017-10-20 捷德(中国)信息科技有限公司 智能卡及其安全控制方法、装置和系统
US9713006B2 (en) 2014-05-01 2017-07-18 At&T Intellectual Property I, Lp Apparatus and method for managing security domains for a universal integrated circuit card
US20150326545A1 (en) * 2014-05-06 2015-11-12 Apple Inc. Secure key rotation for an issuer security domain of an electronic device
CN104092546B (zh) * 2014-06-30 2017-07-14 飞天诚信科技股份有限公司 智能卡上安全域的生成方法
CN104463263B (zh) * 2014-10-17 2017-08-11 青岛丰华时代信息技术有限公司 Ic卡上多应用的系统构架及基于该构架的信息处理方法
CN105592115A (zh) * 2014-10-23 2016-05-18 广东华大互联网股份有限公司 一种分布式智能卡行业应用系统和方法
CN105809064B (zh) * 2014-12-31 2018-09-28 北京华大智宝电子系统有限公司 一种智能卡安全控制方法及智能卡
CN104573591B (zh) * 2015-01-05 2017-11-28 飞天诚信科技股份有限公司 一种安全读卡器及其工作方法
US20160234343A1 (en) 2015-02-11 2016-08-11 Dell Products L.P. Client side redirection
CN106203578B (zh) * 2015-05-08 2019-03-01 北京数码视讯科技股份有限公司 一种智能卡、智能卡应用的安全服务调用方法及装置
EP3101862A1 (en) * 2015-06-02 2016-12-07 Gemalto Sa Method for managing a secure channel between a server and a secure element
US9819670B2 (en) * 2015-06-18 2017-11-14 Airwatch Llc Distributing security codes through a restricted communications channel
US9843572B2 (en) 2015-06-29 2017-12-12 Airwatch Llc Distributing an authentication key to an application installation
CN105184330B (zh) * 2015-09-21 2019-08-13 北京握奇智能科技有限公司 一种基于网络的ic卡发卡系统及方法
CN105516181A (zh) * 2015-12-29 2016-04-20 邵军利 安全设备管理系统及方法
CN106355124A (zh) * 2016-08-31 2017-01-25 新智数字科技有限公司 一种cpu卡的读写方法及装置
CN106874733A (zh) * 2016-12-29 2017-06-20 北京握奇智能科技有限公司 一种具有UI功能的多应用网银Key及其控制方法
CN108304716A (zh) * 2017-01-13 2018-07-20 国民技术股份有限公司 多应用智能卡及其应用管理方法、通信系统及通信方法
CN107169762B (zh) * 2017-05-24 2020-02-07 中国银联股份有限公司 一种安全载体的配置方法及装置
CN109711221B (zh) * 2018-12-28 2021-09-28 飞天诚信科技股份有限公司 一种多应用智能卡及其查询应用监听关系的方法
US11727403B2 (en) 2019-05-20 2023-08-15 Samsung Electronics Co., Ltd. System and method for payment authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022051A1 (en) * 2005-05-18 2007-01-25 Parcxmart Technologies, Inc. System and method for multi-application payment processing
CN101231768A (zh) * 2008-01-25 2008-07-30 北京深思洛克数据保护中心 一种多应用智能卡及实现智能卡多应用的方法
CN201114171Y (zh) * 2006-12-31 2008-09-10 泰州苏源集团科电有限公司 一种多功能智能卡网络管理系统
CN101500224A (zh) * 2008-01-31 2009-08-05 中国移动通信集团公司 电信智能卡的多应用管理服务器、多应用管理方法及系统

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998043212A1 (en) 1997-03-24 1998-10-01 Visa International Service Association A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
EP1004992A3 (en) * 1997-03-24 2001-12-05 Visa International Service Association A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US7290288B2 (en) * 1997-06-11 2007-10-30 Prism Technologies, L.L.C. Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network
FR2782435B1 (fr) 1998-08-13 2000-09-15 Bull Cp8 Procede de communication entre une station d'utilisateur et un reseau, notamment de type internet, et architecture de mise en oeuvre
US6402028B1 (en) 1999-04-06 2002-06-11 Visa International Service Association Integrated production of smart cards
EP1272983B1 (en) * 2000-04-11 2004-11-10 Visa International Service Association Integrated production of smart cards
US20040123152A1 (en) 2002-12-18 2004-06-24 Eric Le Saint Uniform framework for security tokens
WO2004100094A2 (en) * 2003-05-01 2004-11-18 The Trustees Of The University Of Pennsylvania System and method for using open apis to provide integrated security policies for flexible management and customization of payment instruments
KR100437513B1 (ko) * 2004-02-09 2004-07-03 주식회사 하이스마텍 복수의 발급자 시큐리티 도메인을 설치할 수 있는 스마트카드 및 하나의 스마트 카드에 복수의 발급자 시큐리티도메인을 설치할 수 있는 방법
US7628322B2 (en) 2005-03-07 2009-12-08 Nokia Corporation Methods, system and mobile device capable of enabling credit card personalization using a wireless network
EP2048591B1 (en) * 2007-10-09 2018-01-24 Vodafone Holding GmbH Method for communication, communication device and secure processor
EP2048594A1 (en) 2007-10-09 2009-04-15 Vodafone Holding GmbH Method for communication, communication device and secure processor
GB2457221A (en) 2007-10-17 2009-08-12 Vodafone Plc Smart Card Web Server (SCWS) administration within a plurality of security domains
CN101729502B (zh) * 2008-10-23 2012-09-05 中兴通讯股份有限公司 密钥分发方法和系统
WO2010120222A1 (en) * 2009-04-16 2010-10-21 Telefonaktiebolaget L M Ericsson (Publ) Method, server, computer program and computer program product for communicating with secure element

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022051A1 (en) * 2005-05-18 2007-01-25 Parcxmart Technologies, Inc. System and method for multi-application payment processing
CN201114171Y (zh) * 2006-12-31 2008-09-10 泰州苏源集团科电有限公司 一种多功能智能卡网络管理系统
CN101231768A (zh) * 2008-01-25 2008-07-30 北京深思洛克数据保护中心 一种多应用智能卡及实现智能卡多应用的方法
CN101500224A (zh) * 2008-01-31 2009-08-05 中国移动通信集团公司 电信智能卡的多应用管理服务器、多应用管理方法及系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167498A (zh) * 2011-12-19 2013-06-19 卓望数码技术(深圳)有限公司 一种能力管控方法和系统
CN113162771A (zh) * 2021-04-25 2021-07-23 广州羊城通有限公司 一种智能卡应用管理方法、装置及系统
CN113162771B (zh) * 2021-04-25 2022-09-16 广州羊城通有限公司 一种智能卡应用管理方法、装置及系统

Also Published As

Publication number Publication date
EP2477165A4 (en) 2014-05-21
US9009476B2 (en) 2015-04-14
EP2477165B1 (en) 2016-11-02
CN102025710A (zh) 2011-04-20
US20120246476A1 (en) 2012-09-27
CN102025710B (zh) 2015-11-25
EP2477165A1 (en) 2012-07-18

Similar Documents

Publication Publication Date Title
WO2011029266A1 (zh) 多应用智能卡及智能卡多应用管理系统和方法
TW548535B (en) Security system
CN105590198B (zh) 一种二维码支付方法以及支付系统
TW533723B (en) Secure distributing services network system and method thereof
CN102103778B (zh) 移动支付系统、移动终端及移动支付业务的实现方法
US20120221474A1 (en) Secure Electronic Ticketing using Mobile Communication Devices over the Internet
JP2007042103A (ja) 物理的posトランザクションのための方法及び装置
CN101842795B (zh) 用于进行具有动态安全性的交互的系统、方法和设备
US20130290718A1 (en) Mobile storage device and the data processing system and method based thereon
CN102469080A (zh) 实现通行证用户安全登录应用客户端的方法和系统
KR20170077170A (ko) 트랜잭션 메시징
KR20080108549A (ko) 온라인 거래 인가 방법, 컴퓨터 시스템, 프로그램, 모바일 모듈 인증 방법, 휴대용 장치, 액세스 방법, 컴퓨팅 프레임워크, 전송 레벨 보안 통신의 설정 방법, 안전 상거래 제공 방법, 안전 상거래 수행 방법, 지불 인가 방법, 지불 인가의 유효성 검사 방법, 자동 지불 배분 방법, 지불 옵션 제시 방법
KR20090006831A (ko) 온라인 거래 인가 방법, 컴퓨터 시스템, 프로그램, 모바일 모듈 인증 방법, 휴대용 장치, 액세스 방법, 컴퓨팅 프레임워크, 전송 레벨 보안 통신의 설정 방법, 안전 상거래 제공 방법, 안전 상거래 수행 방법, 지불 인가 방법, 지불 인가의 유효성 검사 방법, 자동 지불 배분 방법, 지불 옵션 제시 방법
JP2003308437A (ja) 送金システム、送金方法および送金プログラム
CN101697220A (zh) 保护基于pin交易的安全的系统和方法
US11195177B1 (en) Distributed ledger systems for tracking recurring transaction authorizations
WO2013042306A1 (ja) 認証システム、認証サーバ、認証方法および認証用プログラム
CN109766152A (zh) 一种交互方法及装置
JP6819335B2 (ja) パーソナルデータ提供システム、パーソナルデータ提供方法及び情報処理装置
KR20130095363A (ko) 해쉬함수 또는 전자서명을 이용하는 디지털 코드 기반 송금 방법
KR101407737B1 (ko) Qr 코드를 이용한 스마트 기기의 금융 정보 처리 장치 및 그 방법
Shirali-Shahreza Improving mobile banking security using steganography
CN110401526A (zh) 基于小程序的客户信息安全交互方法、终端及服务器
Nosrati et al. A review of mobile banking security
CN106453273A (zh) 一种基于云技术的信息保险管理系统和方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10814868

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2010814868

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010814868

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 13394803

Country of ref document: US