WO2013054747A1 - 情報処理装置および方法、並びにプログラム - Google Patents
情報処理装置および方法、並びにプログラム Download PDFInfo
- Publication number
- WO2013054747A1 WO2013054747A1 PCT/JP2012/075918 JP2012075918W WO2013054747A1 WO 2013054747 A1 WO2013054747 A1 WO 2013054747A1 JP 2012075918 W JP2012075918 W JP 2012075918W WO 2013054747 A1 WO2013054747 A1 WO 2013054747A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- information processing
- processing apparatus
- domain
- registering
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
- G06Q20/3263—Payment applications installed on the mobile devices characterised by activation or deactivation of payment capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/204—Point-of-sale [POS] network systems comprising interface for record bearing medium or carrier for electronic funds transfer or payment credit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- the present technology relates to an information processing apparatus, method, and program, and more particularly, to an information processing apparatus, method, and program that can easily deal with replacement of the apparatus.
- FIG. 1 is a block diagram showing a configuration of a conventional payment system 1.
- the payment system 1 is composed of a host terminal 11 and a payment terminal 12 that are composed of a register of a POS (Point of Sales) system.
- the payment terminal 12 includes a user interface (UI) control terminal 21 and a terminal SAM22.
- UI user interface
- the terminal SAM 22 performs a settlement process with an IC card (not shown) based on an internal service application. Accordingly, the terminal SAM 22 performs RF (Radio Frequency) control for communication with the IC card and communication control with the UI control terminal 21.
- RF Radio Frequency
- the UI control terminal 21 controls a UI device such as a display device (not shown), and also performs communication control with the terminal SAM 22 and communication control with the host terminal 11.
- Communication control with the terminal SAM 22 is performed according to a protocol defined by the firmware of the payment terminal 12.
- communication control with the upper terminal 11 is performed according to a protocol defined by the upper terminal 11.
- Patent Document 1 proposes that each client device is provided with a relay module, and each client device communicates with each other via a dedicated server arranged on the Internet using the relay module.
- Patent Document 1 It is conceivable to apply the technology of Patent Document 1 to the payment system 1.
- Patent Document 1 The technology of Patent Document 1 is to make each client device have a common device called a relay module so that the protocol can be shared and many client devices can be connected to each other via the Internet.
- the technique of Patent Document 1 is used when it is necessary to change a part of the device to another manufacturer's device and change the protocol. Application is costly and it is difficult to easily replace the device.
- This technology has been made in view of such a situation, and makes it possible to easily deal with replacement of devices.
- One aspect of the present technology includes: a first application creating unit that creates a first application that controls a device of another information processing apparatus that communicates with an IC card; and a first domain that registers the first application.
- First domain creation means for creating the other information processing apparatus; first application registration means for registering the first application in the first domain of the other information processing apparatus; and the first Write means for writing an application in the execution area of the other information processing apparatus, second application creation means for creating a second application for processing the IC card, and second for registering the second application
- Second domain creating means for causing the other information processing apparatus to create a domain of
- the second application is an information processing apparatus and a second application registering means for registering in said second domain of said other information processing apparatus.
- the commands for creating the first domain, registering in the first domain, writing to the execution region, creating the second domain, and registering in the second domain are encryption packages. Can be transmitted to the other information processing apparatus.
- the writing means can cause the first application to be written in the execution area of the first application formed in a memory different from the memory in which the execution area of the second application is formed.
- It can further comprise an enabling means for enabling the first application.
- the first application If the first application is enabled, it can be started when the other information processing apparatus is started.
- the first application may have a higher priority than the firmware of the other information processing apparatus.
- the information processing apparatus may be a POS terminal, and the other information processing apparatus may be an IC card reader / writer.
- the information processing method and program according to one aspect of the present technology are a method and program corresponding to the information processing apparatus according to one aspect of the present technology described above.
- a first domain creating unit that creates a first domain for registering a first application that controls a device based on an instruction from another information processing apparatus, and the other information Based on an instruction from the processing device, a first application registration unit for registering the first application received from the other information processing device in the first domain, and an instruction from the other information processing device And writing means for writing the first application to the execution area, and creating a second domain for registering the second application for processing the IC card based on an instruction from the other information processing apparatus. And the second domain creating means that receives the second domain information received from the other information processing device based on an instruction from the other information processing device.
- the writing means can write the first application in the execution area of the first application formed in a memory different from the memory in which the execution area of the second application is formed.
- the information processing apparatus further comprises storage means for storing activation information indicating that the first application has been activated by the other information processing apparatus, and when the first application is activated, the information processing apparatus Can be activated when activated.
- the first application may have a higher priority than the firmware of the information processing apparatus.
- the information processing apparatus may be an IC card reader / writer, and the other information processing apparatus may be a POS terminal.
- the information processing method and program according to another aspect of the present technology are a method and program corresponding to the information processing apparatus according to another aspect of the present technology described above.
- a first application that controls a device of another information processing apparatus that communicates with an IC card is created, and a first domain that registers the first application is created in the other information processing apparatus Is done. Further, the first application is registered in the first domain of another information processing apparatus. The first application is written in the execution area of another information processing apparatus. A second application for processing the IC card is created, and a second domain for registering the second application is created in another information processing apparatus. Then, the second application is registered in the second domain of another information processing apparatus.
- a first domain for registering a first application for controlling a device is created based on an instruction from another information processing apparatus, and based on an instruction from the other information processing apparatus
- the first application received from the other information processing apparatus is registered in the first domain.
- the first application is written in the execution area based on an instruction from another information processing apparatus.
- a second domain for registering a second application that performs processing on the IC card is created based on an instruction from another information processing apparatus, and another information processing is performed based on an instruction from the other information processing apparatus.
- the second application received from the device is registered in the second domain.
- FIG. 2 is a diagram illustrating an overall configuration example of an information processing system to which the present technology is applied.
- This information processing system 31 functioning as a payment system is configured by a terminal SAM (Secure Application Module) client 41-1 to 41-3, a network 42, a certification device 43, servers 44-1 to 44-3, and a key server 45. Has been.
- SAM Secure Application Module
- the terminal SAM clients 41-1 to 41-3 are connected to the network 42, respectively.
- the network 42 is connected with an authorization device 43, servers 44-1 to 44-3, and a key server 45.
- the server 44-1 is operated by the service provider A
- the server 44-2 is operated by the service provider B
- the server 44-3 is operated by the service provider C. That is, the servers 44-1 to 44-3 are operated by different service providers and provide different services.
- the network 42 is configured by, for example, a LAN (Local Area Network), the Internet, or the like.
- the key server 45 which is a server that centrally manages keys for exchanging information with the IC card, is operated jointly by the service providers A, B, and C. That is, key data corresponding to services managed by the servers 44-1 to 44-3 are collectively managed by the key server 45.
- the servers 44-1 to 44-3 register the key data in the key server 45 via the network 42 when updating the key.
- the accreditation device 43 is a device managed by a predetermined accreditation body. In practice, the accreditation device 43 executes various processes. That is, the processing of the accreditation device 43 is executed by the accreditation organization.
- terminal SAM clients 41-1 to 41-3 do not need to be individually distinguished, they are simply referred to as the terminal SAM client 41 and the servers 44-1 to 44-3 need not be individually distinguished. Simply referred to as server 44. Further, when it is not necessary to individually distinguish the service providers A, B, and C, they are referred to as service providers. The same applies to other components.
- the accreditation device 43 is an organization that authorizes the terminal SAM client 41 to the service provider. For example, in response to a request from the terminal SAM client 41, the authorized device 43 issues a digital certificate for the application (a certificate for the application of the terminal SAM client 41 by the authorized device 43) to the application of the terminal SAM client 41. .
- FIG. 3 is a diagram showing an example of the digital certificate 353 of the application.
- the application digital certificate 353 includes an application ID for identifying the application and its signature.
- the terminal SAM client 41 reads the registered application ID. This application ID is plain text.
- the application ID is transmitted to the authorized device 43.
- the authorization device 43 compresses the application ID using a hash function. Further, the authorization device 43 encrypts the compressed result with the authorization device private key to obtain a signature.
- the certification device 43 combines the application ID and its signature as a pair to create a digital certificate 353 for the application.
- the application digital certificate 353 is transmitted from the authorization device 43 to the terminal SAM client 41.
- Each application of the terminal SAM client 41 transmits the digital certificate of the application to the key server 45, and the key server 45 receives the digital certificate of the application.
- the key server 45 verifies whether the digital certificate of the application is valid with the public key of the certification device 43, and if it is verified as valid, issues an access permit and transmits it to the application of the terminal SAM client 41 To do.
- the application of the terminal SAM client 41 acquires key data from the key server 45 as appropriate using this access permit. Also, the terminal SAM client 41 appropriately receives distribution of applications and other information from the server 44.
- the key server 45 can determine whether or not the application of the terminal SAM client 41 should distribute key data based on the access permit from the application of the terminal SAM client 41.
- the key server 45 transmits key data to the application of the terminal SAM client 41 when the authentication of the application of the terminal SAM client 41 is successful based on the access permit from the application of the terminal SAM client 41.
- the terminal SAM client 41 can execute a plurality of applications. Further, the terminal SAM client 41 executes an application and accesses the IC card 71 (see FIG. 4 described later). At this time, the application uses the key data as a common key for exchanging information with the IC card 71. For example, the terminal SAM client 41 executes an application and updates data in the IC card 71. Then, the application of the terminal SAM client 41 transmits processing execution results, inquiries, and the like via the network 42 to the server 44 that provides the corresponding service. When the network 42 is offline, the application of the terminal SAM client 41 holds the execution result of the process, and when it is online, transmits the execution result to the server 44 via the network 42. Although this embodiment is described as being via the network 42, the network 42 need not be used.
- FIG. 4 is a block diagram showing a functional configuration example of the terminal SAM client 41 of FIG.
- the terminal SAM client 41 includes a host terminal 51 and a payment terminal 52, and the payment terminal 52 includes a terminal SAM 61 and an antenna unit 62.
- the terminal SAM 61 is configured by, for example, an IC card reader / writer.
- the upper terminal 51 is, for example, a POS (Point Of Sales) terminal.
- the upper terminal 51 serving as an information processing apparatus issues a command to update data to the IC card 71 and transmits data read from the IC card 71 to the server 44 via the network 42.
- the antenna unit 62 communicates with the external IC card 71 in a non-contact manner such as NFC (Near Field Communication) or other short-range wireless communication, reads various data stored in the IC card 71, Write.
- the antenna unit 62 reads data such as an identification number unique to the IC card 71 stored in the IC card 71 and an amount stored in the IC card 71.
- the antenna unit 62 communicates with the IC card 71 in a non-contact manner, and rewrites (that is, updates) data such as the amount of money stored in the IC card 71.
- the IC card 71 and the application are described as being non-contact, but the IC card and the IC card reader / writer may be contact-type.
- the terminal SAM 61 as an information processing apparatus communicating with the IC card 71 performs encryption processing and decryption processing on the data supplied from the antenna unit 62. Further, the terminal SAM 61 controls the certification device 43 to request the signature of the public key of the terminal SAM 61 in order to obtain certification of the server 44. Further, the terminal SAM 61 controls the server 44 to transmit a terminal SAM digital certificate comprising the public key signature of the terminal SAM 61 and the terminal SAM public key. Further, the terminal SAM 61 executes an application and saves the execution result of the process as a log. That is, the terminal SAM 61 securely manages the data in the terminal SAM client 41.
- FIG. 5 is a block diagram showing a hardware configuration of the terminal SAM61.
- the terminal SAM 61 includes a nonvolatile memory 91 configured by, for example, a NAND type memory, a nonvolatile memory 92 configured by, for example, a NOR type memory, and a volatile memory 93 configured by, for example, a RAM (Random Access Memory).
- a nonvolatile memory 91 configured by, for example, a NAND type memory
- a nonvolatile memory 92 configured by, for example, a NOR type memory
- a volatile memory 93 configured by, for example, a RAM (Random Access Memory).
- a service domain and an MC (Module Controller) domain are formed.
- a service application as a second application is registered in the service domain as the second domain, and an MC (Module (Controller) application as the first application is registered in the MC domain as the first domain.
- the service application is a program that performs processing on the IC card 71, and in the case of the present embodiment, is a program that executes a settlement service.
- the MC application is a program that controls the device.
- the nonvolatile memory 91 also stores data, service logs, and the like.
- the MC application is simply referred to as MC
- SAP as necessary.
- an execution area for firmware (hereinafter also referred to as FW if necessary) and an execution area for MC applications are formed. That is, when the MC application is executed, it is read from the nonvolatile memory 91 and expanded in the MC application execution area of the nonvolatile memory 92.
- a service application execution area is formed in the volatile memory 93. That is, when the service application is executed, the service application is read from the nonvolatile memory 91 and expanded in the service application execution area of the volatile memory 93.
- various parameters are stored and each program heap area is formed.
- a display device 81 such as an LCD (Liquid Crystal Display) is connected to the terminal SAM 61 via a communication interface 101 such as an SPI (System Packet Interface), and a communication interface 102 such as an I2S (The Inter-IC Sound Sound Bus).
- a sound device 82 such as a speaker is connected via the.
- the terminal SAM 61 is connected to a network such as a LAN via the interface 104. Further, the terminal SAM 61 is connected to the upper terminal 51 via the serial interface 103.
- FIG. 6 is a diagram showing a software configuration of the terminal SAM61.
- the software of the terminal SAM 61 has system software 151 and user software 152.
- the system software 151 includes terminal SAM firmware 161.
- the terminal SAM firmware 161 includes an OS (Operating System) 171 that performs task management, kernel resource management, and the like, and service middleware 181 that operates on the OS.
- the service middleware 181 includes a card operation service unit 191, a domain management service unit 192, a device control service unit 193, and a terminal SAM command execution service unit 194.
- the card operation service unit 191 executes a service corresponding to the operation of the IC card 71.
- the domain management service unit 192 manages the domain.
- the device control service unit 193 includes an SPI driver, a sound driver, a serial driver, and the like, and performs device control.
- the terminal SAM command execution service unit 194 executes activation, activation of a service application, and the like.
- the user software 152 has a service domain 201 and an MC domain 202.
- service applications 211-1 and 211-2 are registered in the service domain 201, and an MC application 221 is registered in the MC domain 202.
- service applications 211 When there is no need to distinguish the service applications 211-1 and 211-2, they are simply referred to as service applications 211.
- the OS 171 provides an API to the service domain 201, the MC domain 202, and the service middleware 181.
- the card operation service unit 191 provides an API to the service domain 201 and the MC domain 202.
- the domain management service unit 192 also provides an API to the service domain 201 and the MC domain 202.
- the device control service unit 193 provides an API to the MC domain 202.
- the terminal SAM command execution service unit 194 also provides an API to the MC domain 202.
- FIG. 7 is a block diagram showing a functional configuration of the upper terminal 51.
- the host terminal 51 includes a storage unit 301, a transmission unit 302, a reception unit 303, an MC application creation unit 304, an MC domain creation unit 305, an MC application registration unit 306, a writing unit 307, a service application creation unit 308, and a service domain creation.
- a unit 309, a service application registration unit 310, and an validation unit 311 are provided.
- the storage unit 301 stores (virtually) information necessary for the host terminal 51 to execute processing.
- FIG. 8 is a diagram for explaining storage information in the storage unit 301 of the upper terminal 51. As shown in the figure, the storage unit 301 stores an authorized institution public key 351.
- the certification authority public key 351 is a public key issued by the certification device 43 and constitutes a key pair with the certification organization private key held by the certification device 43.
- the transmission unit 302 transmits information.
- the receiving unit 303 receives information.
- the MC application creation unit 304 creates an MC application 221 that controls the device.
- the MC domain creation unit 305 creates the MC domain 202 in which the MC application 221 is registered.
- the MC application registration unit 306 registers the MC application 221 in the MC domain 202.
- the writing unit 307 writes the MC application 221 in the execution area.
- the service application creation unit 308 creates a service application 211.
- the service domain creation unit 309 creates a service domain 201 in which the service application 211 is registered.
- the service application registration unit 310 registers the service application 211 in the service domain 201.
- the validation unit 311 validates the MC application 221.
- FIG. 9 is a diagram showing a functional configuration of the terminal SAM firmware 161.
- the terminal SAM firmware 161 includes a storage unit 381, a transmission unit 382, a reception unit 383, a verification processing unit 384, an MC domain creation unit 385, an MC application registration unit 386, a writing unit 387, a service domain creation unit 388, and a service application registration.
- a unit 389, an activation unit 390, and a card control unit 391 are provided.
- the storage unit 381 stores (virtually) information necessary for the terminal SAM firmware 161 to execute processing.
- FIG. 10 is a diagram for explaining storage information in the storage unit 381 of the terminal SAM firmware 161.
- the storage unit 381 stores the certification authority public key 411, the MC permission flag 412, and the password 413.
- the MC permission flag 412 is set to ON when the upper terminal 51 validates the MC application 221.
- the password 413 is stored for authenticating the administrator of the upper terminal 51.
- the transmission unit 382 transmits information.
- the receiving unit 383 receives information.
- the verification processing unit 384 executes processing for verifying that the predetermined data is valid. For example, the verification processing unit 384 verifies that the predetermined data is valid using the public key of the transmission source.
- the MC domain creation unit 385 creates the MC domain 202 in which the MC application 221 is registered.
- the MC application registration unit 386 registers the MC application 221 in the MC domain 202.
- the writing unit 387 writes the MC application 221 in the execution area.
- the service application creation unit 388 creates a service application 211.
- the service domain creation unit 389 creates a service domain 201 in which the service application 211 is registered.
- the service application registration unit 390 registers the service application 211 in the service domain 201.
- the activation unit 390 executes activation processing.
- the card control unit 391 executes a service corresponding to the operation of the IC card 71.
- each part of the service middleware 181 in FIG. 6 corresponds to the following parts of the terminal SAM firmware in FIG.
- Card operation service unit 191 card control unit 391
- Domain management service unit 192 ⁇ MC domain creation unit 385, MC application registration unit 386, writing unit 387, service domain creation unit 388, service application registration unit 389
- Device control service unit 193 ⁇ storage unit 381, transmission unit 382, reception unit 383, activation unit 390
- Terminal SAM command execution service unit 194 ⁇ verification processing unit 384
- FIG. 11 is a flowchart for explaining application registration.
- application registration will be described with reference to FIG.
- the following communication between the upper terminal 51 and the terminal SAM firmware 161 is performed via the serial interface 103.
- step S11 the transmission unit 302 of the upper terminal 51 transmits an activation command to the terminal SAM61 in the administrator mode. This process is performed when the MC application 221 and the service application 211 are set up in the terminal SAM 61 based on an instruction from the administrator of the upper terminal 51. At this time, the activation password entered by the administrator is transmitted.
- step S51 the terminal SAM 61, more specifically, the receiving unit 383 of the terminal SAM firmware 161 receives the activation command transmitted via the serial interface 103.
- the verification processing unit 384 verifies the activation password included in this activation command. That is, the password 413 stored in the storage unit 381 is collated with the received activation password. If the two match, the activation unit 390 performs activation processing in the administrator mode in step S52. If they do not match, it is determined that the instruction is not from the administrator, and the activation process is not performed. Thereby, only a specific administrator can execute application registration processing.
- step S52 the transmission unit 382 transmits a success response indicating that activation is successful.
- step S12 the receiving unit 303 of the upper terminal 51 receives a response from the terminal SAM firmware 161. If a successful response cannot be received within a certain time after sending the activation command, the activation command is sent again or the process is aborted.
- step S13 the MC domain creation unit 305 creates an MC domain creation command. Then, the transmission unit 302 transmits an MC domain creation command.
- This command is an encryption package as shown in FIG.
- the encryption package means a package obtained by combining a transmission content such as a message or an application and a signature generated by encrypting the transmission content with a secret key as a pair.
- the secret key of the authorization device 43 is used as a secret key for encryption.
- Encryption is performed by compressing with a hash function which is a one-way function. Since it is a one-way function, the compressed value cannot be restored to the original plaintext. A function other than the hash function can also be used as the one-way function. Note that the device that creates the encryption package and the device that decrypts the same hold the same one-way function in advance.
- FIG. 12 is a diagram illustrating an example of the MC domain creation request package 501.
- the MC domain creation request package 501 includes an MC domain creation request message and a signature of the MC domain creation request message.
- the MC domain creation unit 305 creates an MC domain creation request message. This message is a message serving as a command for requesting creation of the MC domain 202, and is plain text.
- a plaintext MC domain creation request message is sent to the authorization device 43.
- the authorization device 43 compresses the MC domain creation request message using a hash function, and encrypts the compressed result with the private key of the authorization device 43 to obtain a signature.
- the authorization device 43 creates a MC domain creation request package 501 by combining the MC domain creation request message and its signature as a pair.
- the MC domain creation request package 501 is transmitted from the authorization device 43 to the upper terminal 51.
- the process of preparing the package may be performed in real time or may be performed in advance. The same applies to the processing for preparing the packages shown in FIGS.
- step S53 the receiving unit 383 of the terminal SAM firmware 161 receives the MC domain creation request package 501 transmitted from the upper terminal 51.
- the verification processing unit 384 verifies the signature of the received encrypted package. That is, the verification processing unit 384 decrypts the signature of the MC domain creation request package 501 using the certification authority public key 411. As a result, the MC domain creation request message compressed by the hash function is obtained. Further, the verification processing unit 384 applies a hash function to the plaintext MC domain creation request message and compresses it. Then, the verification processing unit 384 compares the compressed value obtained by decryption with the compressed value obtained by compressing the plain text.
- the plain text MC domain creation request message described in the MC domain creation request package 501 is authentic and not falsified. This is because the only person who can create a signature that can be decrypted by the certification authority public key 411 is the person who possesses the certification authority private key. This is because the accreditation apparatus 43 is the only person who possesses the accreditation authority private key.
- the command can be prevented from being altered by making the command into an encryption package.
- the terminal SAM 61 also receives the certification authority public key 411 from the certification device 43 in advance and stores it in the storage unit 381.
- the MC domain creation unit 385 creates the MC domain 202 in the nonvolatile memory 91 in step S53.
- step S14 the MC application creation unit 304 of the upper terminal 51 creates the MC application 221.
- the MC application 221 controls communication with the upper terminal 51 in the terminal SAM 61 and controls the display device 81, the sound device 82, and other UI devices.
- the priority of the MC application 221 is higher than the priority of the terminal SAM firmware 161.
- the API (Application Interface) of the terminal SAM firmware 161 that can be used by the MC application 221 is different from that of the service application 211.
- the MC application 221 is set in this way, the immediacy of device control by the upper terminal 51 can be ensured. Further, since the MC application 221 is prepared separately from the service application 211, an application for performing device control (that is, the MC application 221) can be made resident in the terminal SAM61.
- the MC application registration unit 306 of the upper terminal 51 creates an MC application registration command in the MC domain in step S14. Then, the transmission unit 302 transmits an MC application registration command to the MC domain.
- This command is an encryption package as shown in FIG.
- FIG. 13 is a diagram showing an example of a registration request package 502 for the MC domain.
- the registration request package 502 for the MC domain includes an MC application registration request message for the MC domain, the MC application 221, and its signature.
- the MC application registration unit 306 creates an MC application registration request message for the MC domain. This message is a message requesting registration of the MC application 221 in the MC domain 202 and is plain text. Similarly, the MC application 221 is plain text.
- the MC application registration request message to the MC domain and the MC application 221 are transmitted to the authorization device 43.
- the authorization device 43 compresses the MC application registration request message to the MC domain and the MC application 221 using a hash function. Furthermore, the accreditation device 43 encrypts the compressed result with the accreditation authority private key to obtain a signature.
- the authorization device 43 creates a registration request package 502 for the MC domain by combining the MC application registration request message to the MC domain, the MC application 221, and the signature thereof as a pair.
- the registration request package 502 for the MC domain is transmitted from the authorization device 43 to the upper terminal 51.
- step S54 the reception unit 383 of the terminal SAM firmware 161 receives the encryption package, that is, the registration request package 502 for the MC domain.
- the verification processing unit 384 verifies the signature of the encrypted package. That is, the verification processing unit 384 decrypts the signature of the registration request package 502 for the MC domain using the certification authority public key 414. As a result, an MC application registration request message to the MC domain compressed by the hash function and the MC application 221 are obtained. Also, the verification processing unit 384 applies a hash function to the MC application registration request message to the MC domain in plain text and the MC application 221 for compression. Then, the verification processing unit 384 compares the compressed value obtained by decryption with the compressed value obtained by compressing the plain text.
- the MC application registration request message and the MC application 221 in the plain text MC domain described in the MC application registration request package 502 for the MC domain are falsified. It will not be genuine.
- the two do not match that is, if the verification fails, the MC application registration request message to the MC domain or the MC application 221 has been falsified. In this case, the process of registering the MC application 221 and the service application 211 is ended. Processing up to that point is invalidated.
- the MC application registration unit 386 registers the received MC application 221 in the MC domain 202 created in the nonvolatile memory 91 in the process of step S53. Further, the verification processing unit 384 verifies the checksum value of the MC application 221. If the calculated checksum value matches the checksum value registered in the MC application 221, it is confirmed that there is no error in the MC application 221.
- step S15 the writing unit 307 of the upper terminal 51 creates a write command to the execution area of the MC application, and the transmitting unit 302 transmits it.
- This command is an encryption package as shown in FIG.
- FIG. 14 is a diagram showing an example of a package for requesting writing to the execution area of the MC application.
- the MC application execution area write request package 503 includes a message for requesting writing to the MC application execution area and its signature.
- the writing unit 307 creates a message for requesting writing to the execution area of the MC application. This message is a message requesting to write the MC application 221 to the execution area, and is plain text.
- a message for requesting writing to the execution area of the MC application is transmitted to the authorization device 43.
- the authorization device 43 compresses a message for requesting writing to the execution area of the MC application using a hash function. Further, the authorization device 43 encrypts the compressed result with the authorization device private key to obtain a signature.
- the authorization device 43 creates a write request package 503 for the execution area of the MC application by combining the message of the request for writing to the execution area of the MC application and the signature as a pair.
- the write request package 503 for the execution area of the MC application is transmitted from the authorization device 43 to the upper terminal 51.
- step S55 the receiving unit 383 of the terminal SAM firmware 161 receives a write request command to the encryption package, that is, the execution area of the MC application.
- the verification processing unit 384 verifies the signature of the encrypted package. That is, the verification processing unit 384 decrypts the signature of the write request package 503 to the execution area of the MC application with the certification authority public key 414. As a result, a message for requesting writing to the execution area of the MC application compressed by the hash function is obtained. Further, the verification processing unit 384 applies a hash function to the message for requesting writing to the execution area of the plaintext MC application and compresses the message. Then, the verification processing unit 384 compares the compressed value obtained by decryption with the compressed value obtained by compressing the plain text.
- the message for requesting writing to the execution area of the plaintext MC application described in the MC application execution area write request package 503 has not been tampered with. It will be genuine.
- the two do not match that is, if the verification fails, the message for requesting writing to the execution area of the MC application is falsified. In this case, the process of registering the MC application 221 and the service application 211 is ended. Processing up to that point is invalidated.
- the writing unit 387 reads the MC application 221 registered in the process of step S54 to the MC domain 202 created in the nonvolatile memory 91 in the process of step S53 in step S55, and stores it in the execution area of the nonvolatile memory 92. Write.
- the MC application 221 can be made resident regardless of the switching of the service application 211.
- the MC application 221 can be activated earlier than the service application 211.
- the verification processing unit 384 verifies the checksum value of the MC application 221. If the calculated checksum value matches the checksum value registered in the MC application 221, it is confirmed that there is no error in the MC application 221.
- step S16 the service domain creation unit 309 of the upper terminal 51 creates a service domain creation command. Then, the transmission unit 302 transmits a service domain creation command.
- This command is an encryption package as shown in FIG.
- FIG. 15 is a diagram showing an example of a service domain creation request package 504.
- the service domain creation request package 504 includes a service domain creation request message and its signature.
- the service domain creation unit 309 creates a service domain creation request message. This message is a message serving as a command for requesting creation of the service domain 201 and is plain text.
- the service domain creation request message is sent to the authorization device 43.
- the authorization device 43 compresses the service domain creation request message using a hash function. Further, the authorization device 43 encrypts the compressed result with the authorization device private key to obtain a signature.
- the authorization device 43 creates a service domain creation request package 504 by combining the service domain creation request message and its signature as a pair.
- the service domain creation request package 504 is transmitted from the authorization device 43 to the upper terminal 51.
- step S56 the receiving unit 383 of the terminal SAM firmware 161 receives the service domain creation request package 504 transmitted from the upper terminal 51.
- the verification processing unit 384 verifies the signature of the received encrypted package. That is, the verification processing unit 384 decrypts the signature of the service domain creation request package 504 with the certification authority public key 414. Thus, a service domain creation request message compressed by the hash function is obtained.
- the verification processing unit 384 applies a hash function to the plaintext service domain creation request message and compresses it. Then, the verification processing unit 384 compares the compressed value obtained by decryption with the compressed value obtained by compressing the plain text.
- the plain text service domain creation request message described in the service domain creation request package 504 is an authentic message that has not been tampered with. .
- the two do not match that is, if the verification fails, the service domain creation request message has been falsified. In this case, the process of registering the MC application 221 and the service application 211 is ended. Processing up to that point is invalidated.
- the service domain creation unit 388 creates the service domain 201 in the nonvolatile memory 91.
- step S17 the service application creation unit 308 of the upper terminal 51 creates the service application 211.
- the service application 211 controls settlement processing in the terminal SAM61.
- the priority of the service application 211 is assumed to be lower than the priority of the MC application 221 and the terminal SAM firmware 161. This is to prevent the operations of the MC application 221 and the terminal SAM firmware 161 from being disturbed.
- the API (Application Interface) of the terminal SAM firmware 161 that can be used by the service application 211 is different from that of the MC application 221. As the program execution area and program priority of the service program, those permitted by the MC application 221 are set.
- the service application registration unit 310 of the upper terminal 51 creates a service application registration command for the service domain, and the transmission unit 302 transmits the command.
- This command is an encryption package as shown in FIG.
- FIG. 16 is a diagram showing an example of a registration request package 505 for the service domain.
- the registration request package 505 for the service domain includes a service application registration request message for the service domain, a service application, and a signature thereof.
- the service application registration unit 310 creates a service application registration request message in the service domain. This message is a message requesting registration of the service application 211 in the service domain 201 and is plain text. Similarly, the service application 211 is plain text.
- the service application registration request message to the service domain and the service application 211 are transmitted to the authentication device 43.
- the authentication device 43 compresses the service application registration request message to the service domain and the service application 211 using a hash function. Further, the authentication device 43 encrypts the compressed result with the certification authority private key to obtain a signature.
- the authentication device 43 creates a registration request package 505 for the service domain by combining the service application registration request message for the service domain and the signature as a pair.
- the registration request package 505 for the service domain is transmitted from the authorization device 43 to the upper terminal 51.
- step S57 the receiving unit 383 of the terminal SAM firmware 161 receives the encryption package, that is, a service application registration command in the service domain.
- the verification processing unit 384 verifies the signature of the encrypted package. That is, the verification processing unit 384 decrypts the signature of the registration request package 505 for the service domain using the certification authority public key 414. As a result, a service application registration request message to the service domain compressed by the hash function and the service application 211 are obtained. Further, the verification processing unit 384 applies a hash function to the service application registration request message to the plaintext service domain and the service application 211 to compress the message. Then, the verification processing unit 384 compares the compressed value obtained by decryption with the compressed value obtained by compressing the plain text.
- the service application registration request message to the plain text service domain and the service application 211 described in the service application registration request package 505 to the service domain are: It is a genuine thing that has not been tampered with.
- the service application registration request message to the service domain or the service application 211 has been falsified. In this case, the process of registering the MC application 221 and the service application 211 is ended. Processing up to that point is invalidated.
- the service application registration unit 389 registers the received service application 211 in the service domain 201 created in the nonvolatile memory 91 in the process of step S56. Further, the verification processing unit 384 verifies the checksum value of the service application 211. If the calculated checksum value matches the checksum value registered in the service application 211, it is confirmed that the service application 211 has no error.
- step S18 the enabling unit 311 of the upper terminal 51 creates an MC command enabling command.
- the transmission unit 302 transmits an MC command validation command.
- step S58 the receiving unit 383 of the terminal SAM firmware 161 receives the MC command validation command.
- the activation unit 390 changes the state of the terminal SAM61 to the MC valid state. Specifically, the MC permission flag 412 as the validation information is set to ON and stored in the storage unit 381.
- the MC permission flag 412 is used for determination processing in step S83 of FIG. That is, the terminal SAM 61 is activated in the MC activation mode when the MC permission flag 412 is set to ON at the next activation.
- the MC permission flag 412 is not set to ON, that is, when it is set to OFF, the MC application 221 is not activated. Therefore, the administrator of the upper terminal 51 can freely select the activation of the MC application 221 by selecting whether to perform the activation.
- step S19 the transmission unit 302 of the upper terminal 51 transmits a restart command.
- step S59 the receiving unit 383 of the terminal SAM firmware 161 receives the restart command.
- the activation unit 390 resets and restarts the terminal SAM61.
- the MC application 221 and the service application 211 created by the upper terminal 51 are set in the terminal SAM61.
- FIG. 17 is a flowchart for explaining the system power supply startup process.
- the system power supply activation process in the terminal SAM61 will be described. This process is executed when activation is instructed, for example, by turning on the power of the terminal SAM61.
- step S81 the OS 171 of the terminal SAM firmware 161 is activated.
- step S82 the OS 171 activates the service middleware 181.
- step S83 the service middleware 181 determines whether the MC permission flag 412 is on.
- the MC permission flag 412 is set to ON or OFF in the processes of steps S18 and S58 in FIG.
- step S84 the service middleware 181 determines whether MC is registered. That is, it is determined whether or not the MC application 221 is registered in the execution area of the nonvolatile memory 92 by the process of step S55 in FIG.
- the OS 171 determines in step S85 whether the MC binary is consistent. Specifically, it is confirmed whether the checksum value matches the registered one, whether the number of tasks and the number of kernel resources recorded in the header are violated, and whether the priority order is observed. Is called. If the MC binary is consistent, the OS 171 activates the MC application 221 in step S86.
- step S83 If it is determined in step S83 that the MC permission flag 412 is off, the activation process of the MC application 221 in step S86 is not executed. Even when it is determined in step S84 that the MC application 221 is not registered, the activation process of the MC application 221 in step S86 is not executed. Furthermore, if it is determined in step S85 that the MC binary is not consistent, that is, if it is a binary that cannot be activated, the activation process of the MC application 221 is not executed.
- FIG. 18 is a diagram showing a functional configuration of the MC application 221.
- the MC application 221 includes a receiving unit 551, a transmitting unit 552, and a control unit 553.
- the receiving unit 551 receives information.
- the transmission unit 552 transmits information.
- the control unit 553 performs various controls.
- FIG. 19 is a diagram showing a functional configuration of the service application 211.
- the service application 211 includes a reception unit 581, a transmission unit 582, and a control unit 583.
- the receiving unit 581 receives information.
- the transmission unit 582 transmits information.
- the control unit 583 performs various controls.
- step S151 the terminal SAM firmware 161 executes MC activation processing. Specifically, the system power supply startup process of FIG. 17 is executed by the restart process of step S59 of FIG. That is, when the conditions of steps S83, S84, and S85 described with reference to FIG. 17 are satisfied, the activation unit 390 of the terminal SAM firmware 161 instructs the MC application 221 to activate.
- step S121 the receiving unit 551 of the MC application 221 receives this instruction.
- the control unit 553 activates the MC application 221 based on this instruction.
- the MC application 221 can be activated simultaneously with the activation of the terminal SAM61.
- step S101 the transmission unit 302 of the upper terminal 51 transmits an activation command requesting execution of the payment service in the operation mode to the MC application 221.
- This command including the activation password is transmitted via the serial interface 103. Since the MC application 221 can freely control the communication device of the terminal SAM 61, the MC application 221 can define a unique communication path and a unique protocol to communicate with the host terminal 51.
- step S122 the receiving unit 551 of the MC application 221 receives this command.
- the control unit 553 makes an activation request using the API of the terminal SAM61.
- step S152 the receiving unit 383 of the terminal SAM firmware 161 receives the activation request.
- the verification processing unit 384 verifies the activation password. That is, the password 413 stored in advance in the storage unit 381 is compared with the received password, and if both match, the activation unit 390 activates.
- step S153 the transmission unit 382 transmits a response indicating that activation is successful.
- step S124 the receiving unit 551 of the MC application 221 receives a response from the terminal SAM firmware 161. This confirms the success of activation.
- step S102 the transmission unit 302 of the upper terminal 51 transmits a payment service start request command to the MC application 221 in order to activate the service application 211 that executes the payment service.
- step S125 the receiving unit 551 of the MC application 221 receives this command.
- step S126 the transmission unit 552 makes an activation request for the service application 211 using the API of the terminal SAM61.
- step S154 the receiving unit 383 of the terminal SAM firmware 161 receives the activation request.
- the activation unit 390 (that is, the terminal SAM command execution service unit 194 in FIG. 6) reads the service application 211 stored in the service domain 201 of the nonvolatile memory 91 and develops it in the service application execution area of the volatile memory 93.
- the execution area of the MC application 221 is the non-volatile memory 92, while the execution area of the service application 211 is the volatile memory 93.
- the MC application 221 is prevented from being altered or destroyed by the service application 211.
- the activation unit 390 confirms the consistency of the service application 211 as in step S85 of FIG.
- step S155 the transmission unit 382 instructs activation of the service application 211 specified by the activation request.
- step S181 the reception unit 581 of the service application 211 receives this instruction.
- the control unit 583 executes activation processing.
- step S156 the transmission unit 382 of the terminal SAM firmware 161 transmits a successful response to the MC application 221.
- step S127 the receiving unit 551 of the MC application 221 receives a successful response. As a result, the activation of the service application 211 is confirmed.
- step S182 the control unit 583 of the service application 211 calls an API for writing settlement information to the IC card 71.
- step S157 the receiving unit 383 of the terminal SAM firmware 161 receives an API call.
- the writing unit 387 performs a settlement process using the writing API of the IC card 71. That is, the RF of the antenna unit 62 is activated, the payment information is written in the IC card 71, and the payment is completed.
- step S158 the transmission unit 382 transmits a write success response.
- step S183 the reception unit 581 of the service application 211 receives this response.
- step S184 the transmission unit 582 notifies the completion of settlement using the API.
- step S128 the receiving unit 551 of the MC application 221 receives this notification.
- the MC application 221 that has received the notification of payment completion displays the payment information. That is, in order to instruct the display of the payment completion on the display device 81 of the terminal SAM61, in step S129, the transmission unit 552 of the MC application 221 calls the SPI driver data transmission API.
- step S159 the receiving unit 383 of the terminal SAM firmware 161 receives a call for the SPI driver data transmission API.
- the SPI driver transmits data to the display device 81 via the designated communication interface 101 (that is, using the designated SPI port). As a result, the payment information is displayed on the display device 81.
- step S160 the transmission unit 382 of the terminal SAM firmware 161 transmits a transmission completion response.
- step S130 the receiving unit 551 of the MC application 221 receives this response.
- step S131 the transmission unit 552 of the MC application 221 calls the sound driver API.
- step S161 the receiving unit 383 of the terminal SAM firmware 161 accepts a sound driver API call.
- the sound driver outputs the designated sound data to the sound device 82.
- a settlement confirmation sound is generated through the I2S communication interface 102.
- the transmission unit 382 transmits a completion response in step S162.
- step S132 the receiving unit 551 of the MC application 221 receives this response.
- step S133 the transmission unit 552 calls an API that requests termination of the service application 211.
- step S163 the receiving unit 383 of the terminal firmware 161 receives this request.
- step S164 the transmission unit 382 instructs the service application 211 to end.
- step S185 the reception unit 581 of the service application 211 receives this instruction.
- the control unit 583 ends the service application 211.
- step S134 the transmission unit 552 of the MC application 221 transmits a settlement service completion response.
- step S103 the receiving unit 303 of the upper terminal 51 receives this response and confirms the completion of the payment process.
- FIG. 22 is a block diagram showing a configuration of the terminal SAM client 41. As is apparent from the comparison of FIG. 22 with FIG. 1, the terminal SAM client 41 is not provided with the UI control terminal 21 of the settlement system 1 of FIG.
- the terminal SAM22 of FIG. 1 has the service application 211 and performs communication control with the UI control terminal 21 in addition to performing RF control and the like.
- the terminal SAM 61 of FIG. 22 has a service application 211 and performs RF control and the like, and also performs communication control with the upper terminal 51 and UI device control such as the display device 81 and the sound device 82. Therefore, user-specific processing that has been performed by the conventional UI control terminal 21 can be taken into the terminal SAM 61.
- the present technology is applied to a payment system has been described as an example.
- the present technology can be applied to other information processing systems.
- a program constituting the software may execute various functions by installing a computer incorporated in dedicated hardware or various programs. For example, it is installed from a network or a recording medium into a general-purpose personal computer or the like.
- a recording medium including such a program is distributed to provide a program to the user separately from the main body of the apparatus, and includes a magnetic disk (including a floppy disk) on which the program is recorded, an optical disk (CD-ROM (Compact Disk-Read (Only Memory) (including DVD), magneto-optical disk (including MD (Mini-Disk)), or a recording medium consisting of a semiconductor memory, etc., but also pre-installed in the main unit It is composed of a flash ROM, hard disk, etc., which is provided to the user and stores the program.
- a magnetic disk including a floppy disk
- CD-ROM Compact Disk-Read (Only Memory)
- MD Magneto-optical disk
- a recording medium consisting of a semiconductor memory, etc. but also pre-installed in the main unit It is composed of a flash ROM, hard disk, etc., which is provided to the user and stores the program.
- the network refers to a mechanism in which at least two devices are connected so that information can be transmitted from one device to another device.
- the devices that communicate via the network may be independent devices, or may be internal blocks that constitute one device.
- the communication is not only wireless communication and wired communication, but also communication in which wireless communication and wired communication are mixed, that is, wireless communication is performed in one section and wired communication is performed in another section. May be. Further, communication from one device to another device may be performed by wired communication, and communication from another device to one device may be performed by wireless communication.
- the steps for describing a program recorded on a recording medium are executed in parallel or individually even if they are not necessarily processed in time series, as well as processes performed in time series in that order. It also includes the processing. Each step can be shared by different devices, and one step can be shared by different devices.
- Embodiments of the present technology are not limited to the above-described embodiments, and various modifications can be made without departing from the gist of the present technology.
- First application creating means for creating a first application for controlling a device of another information processing apparatus communicating with the IC card; First domain creating means for causing the other information processing apparatus to create a first domain for registering the first application; First application registration means for registering the first application in the first domain of the other information processing apparatus; Writing means for writing the first application into an execution area of the other information processing apparatus; Second application creation means for creating a second application for performing processing on the IC card; Second domain creating means for causing the other information processing apparatus to create a second domain for registering the second application; An information processing apparatus comprising: a second application registration unit configured to register the second application in the second domain of the other information processing apparatus.
- the commands for creating the first domain, registering in the first domain, writing to the execution region, creating the second domain, and registering in the second domain are encryption packages.
- the writing means causes the first application to be written in an execution area of the first application formed in a memory different from a memory in which the execution area of the second application is formed.
- the information processing apparatus according to any one of (1) to (5), wherein the first application has a higher priority than firmware of the other information processing apparatus.
- the information processing apparatus is a POS terminal;
- First domain creating means for creating a first domain for registering a first application for controlling a device based on an instruction from another information processing apparatus; First application registration means for registering the first application received from the other information processing apparatus in the first domain based on an instruction from the other information processing apparatus; Writing means for writing the first application to an execution area based on an instruction from the other information processing apparatus; Second domain creating means for creating a second domain for registering a second application for performing processing on the IC card based on an instruction from the other information processing apparatus; An information processing apparatus comprising: a second application registration unit configured to register the second application received from the other information processing apparatus in the second domain based on an instruction from the other information processing apparatus.
- the writing means writes the first application into an execution area of the first application formed in a memory different from a memory in which the execution area of the second application is formed.
- Information processing device (12) Storage means for storing activation information indicating that the first application has been activated by the other information processing apparatus; The information processing apparatus according to (10) or (11), wherein the information processing apparatus is activated when the information processing apparatus is activated when the first application is activated. (13) The information processing apparatus according to (10), (11), or (12), wherein the first application has a higher priority than firmware of the information processing apparatus. (14) The information processing device is an IC card reader / writer, The information processing apparatus according to any one of (10) to (13), wherein the other information processing apparatus is a POS terminal.
- a first domain creating step for creating a first domain for registering a first application for controlling a device based on an instruction from another information processing apparatus A first application registration step of registering the first application received from the other information processing apparatus in the first domain based on an instruction from the other information processing apparatus; A writing step of writing the first application into an execution area based on an instruction from the other information processing apparatus; A second domain creation step of creating a second domain for registering a second application for performing processing on the IC card based on an instruction from the other information processing apparatus; A second application registration step of registering the second application received from the other information processing apparatus in the second domain based on an instruction from the other information processing apparatus.
- Information processing method for creating a first domain for registering a first application for controlling a device based on an instruction from another information processing apparatus.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Stored Programmes (AREA)
Abstract
Description
1 情報処理システムの構成
2 端末SAMクライアントの構成
3 端末SAMのハードウェアの構成
4 端末SAMのソフトウェアの構成
5 上位端末の機能的構成
6 端末SAMの機能的構成
7 アプリケーション登録処理
8 システム電源起動処理
9 MCアプリケーションとサービスアプリケーションの構成
10 決済サービス処理
11 決済システムの構成
12 本技術のプログラムへの適用
13 その他
ドメイン管理サービス部192→MCドメイン作成部385、MCアプリケーション登録部386、書き込み部387、サービス用ドメイン作成部388、サービスアプリケーション登録部389
デバイス制御サービス部193→記憶部381、送信部382、受信部383、起動部390
端末SAMコマンド実行サービス部194→検証処理部384
(1)
ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成手段と、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成手段と、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録手段と、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込み手段と、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成手段と、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成手段と、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録手段と
を備える情報処理装置。
(2)
前記第1のドメインの作成、前記第1のドメインへの登録、前記実行領域への書き込み、前記第2のドメインの作成、および前記第2のドメインへの登録のコマンドのそれぞれは、暗号化パッケージとして前記他の情報処理装置に送信される
前記(1)に記載の情報処理装置。
(3)
前記書き込み手段は、前記第1のアプリケーションを、前記第2のアプリケーションの実行領域が形成されているメモリとは異なるメモリに形成された前記第1のアプリケーションの実行領域に書き込ませる
前記(1)または(2)に記載の情報処理装置。
(4)
前記第1のアプリケーションを有効化する有効化手段をさらに備える
前記(1)、(2)または(3)に記載の情報処理装置。
(5)
前記第1のアプリケーションは有効化されている場合、前記他の情報処理装置が起動されたとき起動される
前記(4)に記載の情報処理装置。
(6)
前記第1のアプリケーションは、前記他の情報処理装置のファームウェアより高い優先度を有する
前記(1)乃至(5)のいずれかに記載の情報処理装置。
(7)
前記情報処理装置はPOS端末であり、
前記他の情報処理装置はICカードのリーダライタである
前記(1)乃至(6)のいずれかに記載の情報処理装置。
(8)
ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成ステップと、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成ステップと、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録ステップと、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込みステップと、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成ステップと、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成ステップと、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録ステップと
を含む情報処理方法。
(9)
コンピュータに、
ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成ステップと、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成ステップと、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録ステップと、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込みステップと、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成ステップと、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成ステップと、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録ステップと
を実行させるプログラム。
(10)
他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成手段と、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録手段と、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込み手段と、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成手段と、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録手段と
を備える情報処理装置。
(11)
前記書き込み手段は、前記第1のアプリケーションを、前記第2のアプリケーションの実行領域が形成されているメモリとは異なるメモリに形成された前記第1のアプリケーションの実行領域に書き込む
前記(10)に記載の情報処理装置。
(12)
前記第1のアプリケーションが前記他の情報処理装置により有効化されたことを表す有効化情報を記憶する記憶手段をさらに備え、
前記第1のアプリケーションは有効化されているとき、前記情報処理装置が起動されたとき起動される
前記(10)または(11)に記載の情報処理装置。
(13)
前記第1のアプリケーションは、前記情報処理装置のファームウェアより高い優先度を有する
前記(10)、(11)または(12)に記載の情報処理装置。
(14)
前記情報処理装置はICカードのリーダライタであり、
前記他の情報処理装置はPOS端末である
前記(10)乃至(13)のいずれかに記載の情報処理装置。
(15)
他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録ステップと、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込みステップと、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録ステップと
を含む情報処理装置の情報処理方法。
(16)
情報処理装置の動作を制御するコンピュータに、
他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録ステップと、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込みステップと、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録ステップと
を実行させるプログラム。
Claims (16)
- ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成手段と、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成手段と、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録手段と、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込み手段と、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成手段と、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成手段と、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録手段と
を備える情報処理装置。 - 前記第1のドメインの作成、前記第1のドメインへの登録、前記実行領域への書き込み、前記第2のドメインの作成、および前記第2のドメインへの登録のコマンドのそれぞれは、暗号化パッケージとして前記他の情報処理装置に送信される
請求項1に記載の情報処理装置。 - 前記書き込み手段は、前記第1のアプリケーションを、前記第2のアプリケーションの実行領域が形成されているメモリとは異なるメモリに形成された前記第1のアプリケーションの実行領域に書き込ませる
請求項2に記載の情報処理装置。 - 前記第1のアプリケーションを有効化する有効化手段をさらに備える
請求項3に記載の情報処理装置。 - 前記第1のアプリケーションは有効化されている場合、前記他の情報処理装置が起動されたとき起動される
請求項4に記載の情報処理装置。 - 前記第1のアプリケーションは、前記他の情報処理装置のファームウェアより高い優先度を有する
請求項5に記載の情報処理装置。 - 前記情報処理装置はPOS端末であり、
前記他の情報処理装置はICカードのリーダライタである
請求項6に記載の情報処理装置。 - ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成ステップと、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成ステップと、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録ステップと、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込みステップと、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成ステップと、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成ステップと、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録ステップと
を含む情報処理方法。 - コンピュータに、
ICカードと通信する他の情報処理装置のデバイスを制御する第1のアプリケーションを作成する第1のアプリケーション作成ステップと、
前記第1のアプリケーションを登録する第1のドメインを前記他の情報処理装置に作成させる第1のドメイン作成ステップと、
前記第1のアプリケーションを前記他の情報処理装置の前記第1のドメインに登録させる第1のアプリケーション登録ステップと、
前記第1のアプリケーションを前記他の情報処理装置の実行領域に書き込ませる書き込みステップと、
前記ICカードに対する処理を行う第2のアプリケーションを作成する第2のアプリケーション作成ステップと、
前記第2のアプリケーションを登録する第2のドメインを前記他の情報処理装置に作成させる第2のドメイン作成ステップと、
前記第2のアプリケーションを前記他の情報処理装置の前記第2のドメインに登録させる第2のアプリケーション登録ステップと
を実行させるプログラム。 - 他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成手段と、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録手段と、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込み手段と、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成手段と、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録手段と
を備える情報処理装置。 - 前記書き込み手段は、前記第1のアプリケーションを、前記第2のアプリケーションの実行領域が形成されているメモリとは異なるメモリに形成された前記第1のアプリケーションの実行領域に書き込む
請求項10に記載の情報処理装置。 - 前記第1のアプリケーションが前記他の情報処理装置により有効化されたことを表す有効化情報を記憶する記憶手段をさらに備え、
前記第1のアプリケーションは有効化されているとき、前記情報処理装置が起動されたとき起動される
請求項11に記載の情報処理装置。 - 前記第1のアプリケーションは、前記情報処理装置のファームウェアより高い優先度を有する
請求項12に記載の情報処理装置。 - 前記情報処理装置はICカードのリーダライタであり、
前記他の情報処理装置はPOS端末である
請求項13に記載の情報処理装置。 - 他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録ステップと、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込みステップと、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録ステップと
を含む情報処理装置の情報処理方法。 - 情報処理装置の動作を制御するコンピュータに、
他の情報処理装置からの指示に基づいて、デバイスを制御する第1のアプリケーションを登録する第1のドメインを作成する第1のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第1のアプリケーションを、前記第1のドメインに登録する第1のアプリケーション登録ステップと、
前記他の情報処理装置からの指示に基づいて、前記第1のアプリケーションを実行領域に書き込む書き込みステップと、
前記他の情報処理装置からの指示に基づいて、ICカードに対する処理を行う第2のアプリケーションを登録する第2のドメインを作成する第2のドメイン作成ステップと、
前記他の情報処理装置からの指示に基づいて、前記他の情報処理装置から受信した前記第2のアプリケーションを、前記第2のドメインに登録する第2のアプリケーション登録ステップと
を実行させるプログラム。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201280048977.XA CN103843012A (zh) | 2011-10-13 | 2012-10-05 | 信息处理设备和方法、以及程序 |
EP12840398.7A EP2755169A1 (en) | 2011-10-13 | 2012-10-05 | Information processing device and method, and program |
US14/350,330 US9674272B2 (en) | 2011-10-13 | 2012-10-05 | Information processing apparatus and method, and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011-225476 | 2011-10-13 | ||
JP2011225476 | 2011-10-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013054747A1 true WO2013054747A1 (ja) | 2013-04-18 |
Family
ID=48081802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/075918 WO2013054747A1 (ja) | 2011-10-13 | 2012-10-05 | 情報処理装置および方法、並びにプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US9674272B2 (ja) |
EP (1) | EP2755169A1 (ja) |
JP (1) | JPWO2013054747A1 (ja) |
CN (1) | CN103843012A (ja) |
WO (1) | WO2013054747A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023042825A1 (ja) * | 2021-09-17 | 2023-03-23 | 株式会社 東芝 | 情報管理システム、認証デバイスおよび個人情報サーバ |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9473580B2 (en) * | 2012-12-06 | 2016-10-18 | Cisco Technology, Inc. | System and associated methodology for proximity detection and device association using ultrasound |
US9930050B2 (en) * | 2015-04-01 | 2018-03-27 | Hand Held Products, Inc. | Device management proxy for secure devices |
US10205598B2 (en) * | 2015-05-03 | 2019-02-12 | Ronald Francis Sulpizio, JR. | Temporal key generation and PKI gateway |
US11405207B2 (en) * | 2019-07-31 | 2022-08-02 | The Toronto-Dominion Bank | Dynamic implementation and management of hash-based consent and permissioning protocols |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11203433A (ja) * | 1998-01-20 | 1999-07-30 | Shinko Electric Co Ltd | 非接触icカードシステムおよび該非接触icカードシステムにおける不具合処理方法 |
JP2001067226A (ja) * | 1999-08-26 | 2001-03-16 | Tamura Electric Works Ltd | プログラムダウンロードシステム |
JP2008306736A (ja) | 2006-05-23 | 2008-12-18 | Freebit Co Ltd | 通信モジュール及びこの通信モジュールを備えたアプリケーションプログラム |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060219774A1 (en) * | 2005-03-30 | 2006-10-05 | Benco David S | Network support for credit card receipt reconciliation |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
EP2462567A2 (en) * | 2009-05-03 | 2012-06-13 | Logomotion, s.r.o. | A payment terminal using a mobile communication device, such as a mobile phone; a method of direct debit payment transaction |
US8807440B1 (en) * | 2010-12-17 | 2014-08-19 | Google Inc. | Routing secure element payment requests to an alternate application |
-
2012
- 2012-10-05 JP JP2013538523A patent/JPWO2013054747A1/ja active Pending
- 2012-10-05 CN CN201280048977.XA patent/CN103843012A/zh active Pending
- 2012-10-05 WO PCT/JP2012/075918 patent/WO2013054747A1/ja active Application Filing
- 2012-10-05 US US14/350,330 patent/US9674272B2/en not_active Expired - Fee Related
- 2012-10-05 EP EP12840398.7A patent/EP2755169A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11203433A (ja) * | 1998-01-20 | 1999-07-30 | Shinko Electric Co Ltd | 非接触icカードシステムおよび該非接触icカードシステムにおける不具合処理方法 |
JP2001067226A (ja) * | 1999-08-26 | 2001-03-16 | Tamura Electric Works Ltd | プログラムダウンロードシステム |
JP2008306736A (ja) | 2006-05-23 | 2008-12-18 | Freebit Co Ltd | 通信モジュール及びこの通信モジュールを備えたアプリケーションプログラム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023042825A1 (ja) * | 2021-09-17 | 2023-03-23 | 株式会社 東芝 | 情報管理システム、認証デバイスおよび個人情報サーバ |
Also Published As
Publication number | Publication date |
---|---|
CN103843012A (zh) | 2014-06-04 |
US20140258362A1 (en) | 2014-09-11 |
JPWO2013054747A1 (ja) | 2015-03-30 |
EP2755169A1 (en) | 2014-07-16 |
US9674272B2 (en) | 2017-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200084188A1 (en) | Secure software updates | |
JP4913871B2 (ja) | セキュアコンテンツおよびアプリケーションのコピーを防ぐセキュリティメカニズムを有するメモリカードのアップグレード | |
JP5449905B2 (ja) | 情報処理装置、プログラム、および情報処理システム | |
CN109639427B (zh) | 一种数据发送的方法及设备 | |
JP4326443B2 (ja) | 情報処理装置および情報処理方法、並びにプログラム | |
JP2011154688A (ja) | ネットワーク認証方法、および、ネットワーク認証方法を実行するためのネットワーク認証デバイス | |
CN103051451A (zh) | 安全托管执行环境的加密认证 | |
JP2004021755A (ja) | 記憶装置 | |
US10282549B2 (en) | Modifying service operating system of baseboard management controller | |
WO2013054747A1 (ja) | 情報処理装置および方法、並びにプログラム | |
WO2024124804A1 (zh) | 软件功能激活方法、装置、设备及存储介质 | |
US7174465B2 (en) | Secure method for system attribute modification | |
JP5391743B2 (ja) | 決済処理セキュリティ情報配信方法、決済処理セキュリティ情報配信システム、そのセンタ装置、サーバ装置、決済端末、及びプログラム | |
JP6517435B2 (ja) | アプリケーションを管理する方法 | |
JP7296390B2 (ja) | 電子デバイスの無欠性検査 | |
KR101711024B1 (ko) | 부정조작방지 장치 접근 방법 및 그 방법을 채용한 단말 장치 | |
CN115037492A (zh) | 基于在存储器装置中实施的安全特征的在线安全服务 | |
CN110852756A (zh) | 一种数据处理方法及设备 | |
JP5702458B2 (ja) | 情報処理装置、プログラム、および情報処理システム | |
EP4254855A1 (en) | A device and a method for controlling use of a cryptographic key | |
US10565356B2 (en) | Method, printing device and system for printing a three dimensional object | |
KR101810946B1 (ko) | 트러스트 존 기반의 공인인증서를 이용한 전자서명 방법 | |
KR101683481B1 (ko) | 모바일 환경에서 nfc 보안토큰 공인인증서 발급 시스템 및 그 방법 | |
CN115643060A (zh) | 一种固件文件的执行方法和装置 | |
CN115021950A (zh) | 用于端点的在线服务商店 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12840398 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013538523 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012840398 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14350330 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |