WO1998037526A1 - Multi-application ic card system - Google Patents
Multi-application ic card system Download PDFInfo
- Publication number
- WO1998037526A1 WO1998037526A1 PCT/GB1998/000531 GB9800531W WO9837526A1 WO 1998037526 A1 WO1998037526 A1 WO 1998037526A1 GB 9800531 W GB9800531 W GB 9800531W WO 9837526 A1 WO9837526 A1 WO 9837526A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- application
- data
- personalization
- permissions
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0719—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for application selection, e.g. an acceleration sensor or a set of radio buttons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3574—Multiple applications on card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
- G06Q20/35765—Access rights to memory zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
Definitions
- IC cards are becoming increasingly used for many reasons.
- An IC card also called a smart card
- An IC card typically is
- ROM read-only-memory
- An IC card may contain a single application
- MULTOSTM is a
- a conventional single application IC card such as a telephone card or an
- a card user may have both a purse application and a credit/debit application on the same card so that the user could select which type of payment (by electronic cash or credit card) to use to make a purchase.
- Multiple applications could be provided to an IC card if sufficient memory exists and an operating system capable of supporting multiple applications is present on the card.
- Applicant has further recognised that it would be beneficial for the IC card system to have the capability of controlling the loading process and restricting, when
- This "selective capability" would allow the loading and deleting of applications at, for example, a desired point in time in the card's life cycle. It would also allow the loading
- an advantage of a preferred embodiment of the invention that it provides these important features and specifically a secure IC-card system that allows for selective availability of smart card applications which may be loaded onto IC cards.
- the application 's permissions data. If it does, the application may be loaded onto the card.
- the card personalization data is transferred
- the card preferably includes data representing the card number, the issuer, product class (i.e., such as gold or platinum cards), and the date on which the card was personalized.
- product class i.e., such as gold or platinum cards
- the IC card secure system checks the enablement data prior to loading an application to determine whether or not the card has been enabled. Preferably, if the card has been enabled, the system checks if the card
- the application's permissions data are within the acceptable set indicated by the application's permissions data. If so, the application may be loaded onto the IC card. In yet another preferred embodiment, the application's permissions data
- Fig. 1 is block diagram illustrating the three stages in the life of a multi-
- Fig. 2 is a block diagram illustrating the steps of the card manufacture
- Fig. 3 is a flow diagram illustrating the steps involved in enabling each of the IC cards in the secure system
- Fig. 4 is a block diagram of an IC card chip which can be used in accordance with an embodiment of the invention.
- Fig. 5 is a block diagram illustrating the data stored on the IC card as indicated in block 307 of Fig. 3;
- Fig. 5 A is a schematic of the data structures residing in an IC card and representing personalization data
- Fig. 6 is a flowchart illustrating the steps of loading an application onto an
- Fig. 7 is a flow chart illustrating the checking steps as indicated in block
- Fig. 8 is a flowchart illustrating the steps undertaken in determining if
- Fig. 9 is a block diagram showing the components of the system architecture for the enablement process of an IC card in a secure multi-application IC
- Fig. 10 is a system diagram of entities involved with the use of the IC card
- An embodiment of the present invention provides an IC card system and process which allow the flexibility to load and delete selected applications over the lifetime of a multi-application IC card in response to the needs or desires of the card user, card issuers and/or application developers.
- a card user who has such a card can selectively load and delete applications as desired if allowed by the card issuer in
- CA Certification Authority
- a card issuer can extend additional functionality to an individual IC card without
- a frequent flyer loyalty program may automatically credit one frequent flyer mile to a card user's internal account for every dollar spent with an electronic purse such as the
- a card issuer or application developer may intend that a particular
- Embodiments in accordance with the present invention would allow for this selective loading and specifically allow for the prevention of loading proprietary applications onto unauthorized cards issued by others.
- embodiments of the present invention give each card a specific indentity by storing "card personalization data" on the card.
- card personalization data on the card.
- each application to be loaded or deleted on one or more cards in the system is assigned "application permissions data" which specify the cards upon which the applications may be loaded.
- the type of personalized data can vary depending upon the needs and
- the personalization data include unique card identification designation data
- the application permissions data associated with an application also relates to an application.
- the application permissions data in the card issuer field could represent both product class A and product class B from
- Figure 1 shows the three steps involved in providing an operational multi-
- the first step is the card manufacturing step 101.
- the second step is the personalization step 103 where card personalization data (also
- the third step is the application loading step 105 which checks to see if a card is qualified to receive an application, i.e.,
- Card Manufacture Figure 2 shows the steps necessary in manufacturing an IC card in a secure
- Step 201 manufactures the physical IC card by creating the integrated circuit on
- the integrated circuit chip will include RAM, ROM, and EEPROM
- CA Certification Authority
- CA which is stored on the card, is used only for determining if the data sent to the card
- Step 205 inserts a card enablement key in a secure portion of EEPROM in
- step 207 inserts
- a card identifier in EEPROM of the card which can be accessed by any
- the terminal will allow the system to determine the identity of the card in later processes.
- the identifier is freely available and will not be used to authenticate messages.
- Step 209 stores the operating system code in ROM on the card including
- primitives are subroutines which may be called by the operating system or by
- PB to enable and personalize the card by storing card personalization data in the memory of the card.
- enablement and personalization are used interchangeably
- the individual cards are preferably manufactured in batches and are sent
- FIG 3 shows the steps of the card enablement process when the card
- the personalization bureau may be the card issuer
- a bank or other financial institution e.g., a bank or other financial institution
- a third party e.g., a third party that performs the
- the personalization bureau configures the card to a specific
- Figure 3 specifically shows the steps taken to enable and personalize each IC card which will work within the system.
- the cards can be placed in a terminal which
- identification data command to the card and the card will return the identification data to the terminal.
- the PB typically processes a group of cards at the same time, and will first
- CA Certification Authority
- Step 303 first checks to see if an enablement bit stored in EEPROM of the
- step 305 continues with step 305.
- step 305 the individualized card key set for the card being enabled
- off-card verification i.e., to verify that the card is an authentic card. This verification is necessary to further authenticate the card as the one for which the application was
- Step 307 generates four different MULTOS Security Manager (MSM)
- characteristic data elements (otherwise referred to herein as personalization data) for the
- the MSM characteristics also allow for the loading of
- system design such as an address table or further subroutines.
- Step 311 sets the enablement bit in EEPROM of the card which indicates
- enablement bit is initially not set when the card is manufactured and is set at the end of
- Figure 4 shows an example of a block diagram of an IC card chip
- the IC card chip is located on an IC card for
- the IC card preferably includes a central processing unit 401, a RAM 403, a
- EEPROM 405 a ROM 407, a timer 409, control logic 411, an I/O ports 413 and security
- Control logic 411 in memory cards provides sufficient sequencing and
- CPU 401 with its control logic can perform calculations, access memory locations,
- Input/output ports 413 are used under the control of a CPU and control logic alone, for communications
- Timer 409 (which generates or provides a clock pulse) drives the control logic 411 and CPU 401 through the sequence of steps that accomplish memory access, memory reading or writing, processing, and data communication.
- a timer may be used to provide application features such as call
- Security circuitry 415 includes fusible links that connect the input/output lines
- Figure 5 shows the steps of generating and loading the four elements of
- Fig. 5 A shows a
- Step 501 loads the data
- the data could be any length that indicates a unique number for
- 2 bytes are dedicated as a signal indicator, 2 bytes
- MIMM ID MULTOS Injection Security Module ID
- Step 503 loads the data structure for the identity field "issuer ED" called
- msm_mcd_permissions_ mcd_issuer_id This nomenclature stands for a MULTOS card device issuer identification number.
- Each card issuer (such as a particular bank,
- Each IC card in the MULTOS system will contain
- a card issuer will order a certain number of cards from a manufacturer and perform
- the data structure is 4 bytes long (as shown in Fig. 5 A at
- Step 505 loads the data structure for the identity field "product ID" called
- MULTOS card device issuer product identification number Each card issuer may have different classes of products or cards which it may want to differentiate. For example, a
- the card issuer may wish
- the product ID field identifies the card as a particular class and will later allow the card issuer to check the product ID and only load
- Another way to differentiate products is by application type, such as by
- one card issuer may assign particular applications to a group of cards. For example, one card issuer may
- a bank may have an American Airlines® loyalty program and a
- structure is preferably an indexing mechanism (unlike the other personalization data
- Step 507 loads the data structure for the identity field data called
- msm_mcd_permissions_mcd_ controls_data_ date This nomenclature stands for the MULTOS card device controls data date or, in other words, the date on which the card
- the application loader can load cards dated only after a certain date, load cards before a certain date (e.g., for application updates) or load cards with a particular data date.
- the information can include the year, month and day of
- the card has been identified by issuer, product class, date and identification number
- product_id stored in the card to gain access to different applications available to another
- This system is consistent with a gold card member receiving a new
- the card is ready to have applications loaded into its memory.
- the application loading process contains a number of security and card
- the application loading process is preferably performed at the personalization bureau so that the card will contain one or more applications when the
- the card is issued.
- the card may contain certain common applications which will be present on every card the issuer sends out, such as an electronic purse application or a credit/debit application.
- the personalization bureau could send the enabled cards to a
- FIG. 6 shows the preferred steps performed in loading an application
- Step 601 is loading an application from a terminal which enabled the same card.
- the open command provides the card with the application's permissions data, the application's size, and instructs the card to determine (1) if the enablement bit is set indicating the card has been personalized; (2) whether the application code and associated data will fit in the
- the application to be loaded allows for the loading of the application onto the particular
- the application loader via the terminal will be advised if the card contains the proper identification personalization data
- step 603 a warning response is given in step 603, but the process continues to the load and create steps. Alternatively, if there is no match, the
- process may automatically be abended. If a positive response is retumed by the card to
- the application loader preferably proceeds to next steps.
- open command allows the application to preview the card before starting any transfer of
- Step 607 then loads the application code and data onto the IC card into
- the combination of the open, load and create commands are sent by the terminal, or another application provider source, to the IC card to perform the application loading process.
- the operating system in the IC cards is programmed to perform a
- Step 609 performs the create command which at least: (1) checks if an
- application load certificate is signed (encrypted) by the CA and therefore authenticates
- Figure 7 shows the various steps of the open step 601 of Fig. 6 in more
- Step 701 determines if the enablement (i.e., control) bit is set. This bit is set when the enablement (i.e., control) bit is set. This bit is set when the enablement (i.e., control) bit is set.
- the card has completed its personalization process and has been assigned its
- An application can be loaded on an IC card in the card system only if the card contains the personalization data. If the enablement bit is not set, the card has
- Step 711 checks if there is sufficient space in the memory on the card to store the application code and its associated data. Applications will typically have
- An example of the size of a preset EEPROM on an IC card is 16K bytes although the
- data associated with an application can range from no data being stored in the card
- MULTOS as an operating system is not limited by the number of
- memory is filled to its capacity, however, a new application cannot be loaded onto the card unless another application including its code and data of sufficient size can be
- the application loader can then decide if another existing application on the card should be deleted to make room for the new application. Deletion
- step 715 An example of the testing of memory spaces in step 711 is now described.
- An IC card may have 16K available
- the purse application's required data may take up an additional 4K of memory
- Figure 8 shows the steps performed in determining whether the card's personalization data falls within the permissible set of cards onto which the application at
- the card is personalized by storing data specific to the card (MSM personalization data) including: a card ID
- the card the product type of the card, such as a gold or platinum card, and the date the card was personalized. This data uniquely identifies the card apart from all other IC cards
- an application can be loaded only upon one type of product specified by the particular card issuer, and/or the application can be loaded only on cards which have a
- the set may be based on virtually any factor, including one or more of the
- card numbers card issuers, product types or personalization dates.
- the individual card's personalization data typically identify one specific number, one card issuer, one product type and one date
- the application's permissions data may indicate a card numbers or a blanket permission, a card issuer or a blanket permission, and a number of product types and dates.
- a frequent loyalty program may be configured to allow its
- the application permissions data may indicate that the loyalty program can be
- the MSM permissions check will determine if the card's individual personalization data is
- an alternative embodiment may be provided.
- the zero indicator could also be used for other permissions data, as required.
- each of the permissions data is checked in the order
- Step 801 checks if the
- application permissions product type set encompasses the card's product type number stored in the memory of the card.
- Each card product type is assigned a number by the system operator.
- the product types are specified for each card issuer because different
- card issuers will have different product types. The cards are selectively checked to ensure
- permissions product type set can be 32 bytes long which includes multiple acceptable
- the operating system would check bit number 2 in the 256 bit array (32 bytes x 8 bits per byte) resulting from the 32 byte long application
- Step 805 checks if the application permissions allowable card issuer number set encompasses the card's issuer number stored in the memory of the card or if
- Each card issuer is assigned a number by the system operator and
- the cards are selectively checked to ensure that applications are loaded only on cards
- set can be 4 bytes long if one issuer is designated or can be longer depending upon the
- the card If the issuer check fails, then the card returns a failure message to
- Step 809 checks if the application permissions date set encompasses the card's data date stored in the memory of the card.
- the date that the IC card was personalized will be stored and will preferably include at least the month and year. The cards are selectively checked to ensure that applications are loaded only on cards with the
- the application permissions date set can be 32 bytes
- step 811 If the date check passes, then the process continues with step 812.
- Step 813 checks if the application permissions allowable card number set
- the testing of the permissions is performed on the card during the execution of the open, load and create commands.
- number data set can be 8 bytes long if one number is designated or can be longer
- FIG. 9 shows the components of the system architecture for the card
- the system includes a card manufacturer 102, a personalization bureau 104, an application loader 106, the IC card 107 being initialized, the card user 109 and the certification
- the card user 131 is the person or entity who will use the stored applications on the IC card.
- a card For example, a card
- an IC card that contains both an electronic purse containing electronic cash (such as MONDEXTM) and a credit/debit application (such as the MasterCard®
- the card user would contact a card issuer 113, such as a bank which
- the integrated circuit chip for the IC card would be
- data is transmitted 115 via a data conduit from the
- conduits described in this figure could be a telephone line, Internet connection or any
- the certification authority 111 which maintains encryption/decryption keys for the entire system, transmits 117 security data (i.e., global
- the card's multiple application operating system is also stored in ROM and placed on the card by the manufacturer. After the cards have been initially processed, they are sent to the card issuer for personalization and application loading.
- the card issuer 113 performs, or has performed by another entity, two
- the personalization bureau 104 personalizes the IC card 107 in
- the application loader 106 loads the application
- an individualized card key set is generated by
- the card is further given a specific identity
- MSM personalization (see Fig. 3, step 307 and Fig. 5) including a card ID number
- the application loader 106 which could use the same terminal or data
- conduit as personalization bureau 104 first needs to have determined if the card is
- the card if it
- the application loader communicates 119 with the IC card via a terminal or by some other data conduit.
- the card is delivered to the card user 109 for use.
- the secure multiple application IC card system described herein allows for
- a card user could also receive a personalized card with no applications and then select a desired application over a common
- transmission line such as a telephone line or Internet connection.
- Figure 10 is a system diagram of entities involved with the use of an IC
- the system includes an IC card 151, a terminal 153,
- the CA 157 facilitates loading and deleting of applications.
- the CA allows applications to be later loaded and deleted preferably by
- the IC card 151 also can communicate
- Card issuer 171 is involved with all decisions of loading and
- IC card 151 will use the following procedure to load a new
- IC card 101 is connected to terminal 153 and the terminal
- Terminal 153 contacts application load/delete entity 155 which, as a result and in conjunction with card issuer 171, sends the
- Terminal 153 queries card 151 to ensure it is the correct card
- the CA 157 provides the application load or delete certificate that enables the application to be loaded or deleted from the card. This
- permissions data may not only be used for loading applications onto IC cards but also for
- the data may also be applicable to personal computers or other units onto which applications may be loaded which are not physically loaded on cards.
- the application's permissions data may actually include data representative of a
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP98907003A EP0963580B1 (en) | 1997-02-21 | 1998-02-19 | Multi-application ic card system |
CA002281576A CA2281576C (en) | 1997-02-21 | 1998-02-19 | Multi-application ic card system |
AU62996/98A AU736325B2 (en) | 1997-02-21 | 1998-02-19 | Multi-application IC card system |
DE69823649T DE69823649T2 (en) | 1997-02-21 | 1998-02-19 | MULTI-APPLICATION IC CARD SYSTEM |
JP53639498A JP2001513231A (en) | 1997-02-21 | 1998-02-19 | Multi-application IC card system |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB9703591.9A GB9703591D0 (en) | 1997-02-21 | 1997-02-21 | Multiple application computer system |
GB9703591.9 | 1997-02-21 | ||
US4651497P | 1997-05-15 | 1997-05-15 | |
US09/023,057 | 1998-02-12 | ||
US09/023,057 US6575372B1 (en) | 1997-02-21 | 1998-02-12 | Secure multi-application IC card system having selective loading and deleting capability |
US60/046,514 | 1998-05-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998037526A1 true WO1998037526A1 (en) | 1998-08-27 |
Family
ID=27268738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB1998/000531 WO1998037526A1 (en) | 1997-02-21 | 1998-02-19 | Multi-application ic card system |
Country Status (8)
Country | Link |
---|---|
US (2) | US6575372B1 (en) |
EP (1) | EP0963580B1 (en) |
JP (2) | JP2001513231A (en) |
AR (1) | AR011449A1 (en) |
AU (1) | AU736325B2 (en) |
CA (1) | CA2281576C (en) |
DE (1) | DE69823649T2 (en) |
WO (1) | WO1998037526A1 (en) |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001041087A1 (en) * | 1999-12-04 | 2001-06-07 | Orga Kartensysteme Gmbh | Method for initialising and/or personalising chip cards and a corresponding device |
JP2003507821A (en) * | 1999-08-24 | 2003-02-25 | シュラムバーガー システムズ | Apparatus and method for loading commands on an integrated circuit card |
JP2003515857A (en) * | 1999-11-12 | 2003-05-07 | サン、マイクロシステムズ、インコーポレーテッド | Language subset validation |
US6633984B2 (en) | 1999-01-22 | 2003-10-14 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using an entry point object |
EP1418538A1 (en) * | 2001-08-03 | 2004-05-12 | Dai Nippon Printing Co., Ltd. | MULTI−APPLICATION IC CARD |
US6769053B1 (en) | 1999-06-10 | 2004-07-27 | Belle Gate Investment B.V. | Arrangement storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory |
US6883163B1 (en) | 2000-04-28 | 2005-04-19 | Sun Microsystems, Inc. | Populating resource-constrained devices with content verified using API definitions |
US6883716B1 (en) | 1999-12-07 | 2005-04-26 | Sun Microsystems, Inc. | Secure photo carrying identification device, as well as means and method for authenticating such an identification device |
US6922835B1 (en) | 1999-01-22 | 2005-07-26 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges |
US6981245B1 (en) | 2000-09-14 | 2005-12-27 | Sun Microsystems, Inc. | Populating binary compatible resource-constrained devices with content verified using API definitions |
US6986132B1 (en) | 2000-04-28 | 2006-01-10 | Sun Microsytems, Inc. | Remote incremental program binary compatibility verification using API definitions |
US6996213B1 (en) | 1998-09-29 | 2006-02-07 | Sun Microsystems, Inc. | Superposition of data over voice |
US7020740B2 (en) | 1999-12-06 | 2006-03-28 | Sun Microsystems, Inc. | Computer arrangement using non-refreshed DRAM |
US7085840B2 (en) | 2001-10-29 | 2006-08-01 | Sun Microsystems, Inc. | Enhanced quality of identification in a data communications network |
US7093122B1 (en) | 1999-01-22 | 2006-08-15 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces |
USRE39269E1 (en) | 1994-02-08 | 2006-09-05 | Sun Microsystems, Inc. | Data exchange system comprising portable data processing units |
US7140549B2 (en) | 2004-02-24 | 2006-11-28 | Sun Microsystems, Inc. | Method and apparatus for selecting a desired application on a smart card |
US7158993B1 (en) | 1999-11-12 | 2007-01-02 | Sun Microsystems, Inc. | API representation enabling submerged hierarchy |
US7165727B2 (en) | 2004-02-24 | 2007-01-23 | Sun Microsystems, Inc. | Method and apparatus for installing an application onto a smart card |
US7191288B2 (en) | 2004-02-24 | 2007-03-13 | Sun Microsystems, Inc. | Method and apparatus for providing an application on a smart card |
DE102005052888A1 (en) * | 2005-11-07 | 2007-05-16 | Giesecke & Devrient Gmbh | Portable data storage medium personalizing method, involves receiving response data of processing device from personalization system, and carrying out personalization step based on response data that are determined based on detected data |
US7231635B2 (en) | 2000-04-28 | 2007-06-12 | Sun Microsystems, Inc. | Remote incremental program verification using API definitions |
US7275260B2 (en) | 2001-10-29 | 2007-09-25 | Sun Microsystems, Inc. | Enhanced privacy protection in identification in a data communications network |
US7334720B2 (en) | 1999-10-25 | 2008-02-26 | Smart-Flash Limited | Data storage and access systems |
US7374099B2 (en) | 2004-02-24 | 2008-05-20 | Sun Microsystems, Inc. | Method and apparatus for processing an application identifier from a smart card |
US7496751B2 (en) | 2001-10-29 | 2009-02-24 | Sun Microsystems, Inc. | Privacy and identification in a data communications network |
US7874492B2 (en) | 2001-12-04 | 2011-01-25 | Visa U.S.A. Inc. | Method and system for facilitating memory and application management on a secured token |
EP2490159A1 (en) * | 2005-07-25 | 2012-08-22 | Oberthur Card Systems Sa | Electronic entity with a means for communication by contact and remotely |
CN103257853A (en) * | 2012-02-17 | 2013-08-21 | 上海复旦微电子集团股份有限公司 | Composite application implementing method for CPU (central processing unit) card with multi-application COS (chip operating system) |
US8548923B2 (en) | 2002-10-07 | 2013-10-01 | Sonia Reed | Method and system for facilitating data access and management on a secure token |
EP2927858A1 (en) * | 2014-04-02 | 2015-10-07 | Oberthur Technologies | Method for manufacturing a security device |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6317832B1 (en) * | 1997-02-21 | 2001-11-13 | Mondex International Limited | Secure multiple application card system and process |
FR2775375A1 (en) * | 1998-02-23 | 1999-08-27 | Solaic Sa | Loading processing programs by blocks into memory of portable devices and avoiding loss of time when contact with an emitter is lost. Particularly applicable to contactless devices |
US7636694B1 (en) * | 1998-09-18 | 2009-12-22 | Mastercard International Incorporated | Apparatus and method for generating an electronic-commerce personal identification number cryptographically related to an ATM personal identification number |
US7716080B2 (en) * | 1999-06-23 | 2010-05-11 | Signature Systems, Llc | Method and system for using multi-function cards for storing, managing and aggregating reward points |
DE19929164A1 (en) * | 1999-06-25 | 2001-01-11 | Giesecke & Devrient Gmbh | Method for operating a data carrier designed for executing reloadable function programs |
DE19947986A1 (en) * | 1999-10-05 | 2001-04-12 | Ibm | Method of downloading of application parts via distributed systems on to a chip-card, requires provision of secret code or session key by the server prior to loading command-sequence of commands for downloading |
US6876991B1 (en) | 1999-11-08 | 2005-04-05 | Collaborative Decision Platforms, Llc. | System, method and computer program product for a collaborative decision platform |
DE69933142T2 (en) * | 1999-11-30 | 2007-08-30 | Kabushiki Kaisha Toshiba | CHIP CARD AND METHOD FOR MANAGING A PUBLISHED MEMORY ON THE SAME |
US7493497B1 (en) * | 2000-02-03 | 2009-02-17 | Integrated Information Solutions | Digital identity device |
US8150767B2 (en) * | 2000-02-16 | 2012-04-03 | Mastercard International Incorporated | System and method for conducting electronic commerce with a remote wallet server |
US20020040438A1 (en) * | 2000-05-05 | 2002-04-04 | Fisher David Landis | Method to securely load and manage multiple applications on a conventional file system smart card |
JP2002117376A (en) * | 2000-10-04 | 2002-04-19 | Fujitsu Ltd | Copyright information inquiry device |
US20020044655A1 (en) * | 2000-10-18 | 2002-04-18 | Applebaum David C. | Information appliance and use of same in distributed productivity environments |
US7398225B2 (en) * | 2001-03-29 | 2008-07-08 | American Express Travel Related Services Company, Inc. | System and method for networked loyalty program |
ES2220671T3 (en) * | 2000-12-22 | 2004-12-16 | Nagravision Sa | FILTRATION CONTROL METHOD |
US20020087662A1 (en) * | 2000-12-29 | 2002-07-04 | Stephane Bouet | System and method for selective updating of media files |
JP2002305250A (en) * | 2001-02-02 | 2002-10-18 | Matsushita Electric Ind Co Ltd | Semiconductor integrated circuit and business method concerning semiconductor circuit |
JP3727907B2 (en) * | 2002-06-28 | 2005-12-21 | 株式会社東芝 | Issuing system and issuing method for portable electronic medium and portable electronic medium |
NO20023194D0 (en) * | 2002-07-01 | 2002-07-01 | Sospita As | Method and apparatus for executing software applications in a multiprocessor environment |
EP1398904B1 (en) * | 2002-09-16 | 2006-02-15 | Telefonaktiebolaget LM Ericsson (publ) | Secure factory process |
CN1682488B (en) * | 2002-09-16 | 2010-11-03 | 艾利森电话股份有限公司 | Loading data onto an electronic device |
JP4557969B2 (en) * | 2003-03-31 | 2010-10-06 | エヌエックスピー ビー ヴィ | How to grant smart card change rights |
US20040249710A1 (en) * | 2003-05-16 | 2004-12-09 | David Smith | Methods and apparatus for implementing loyalty programs using portable electronic data storage devices |
EP1492061A1 (en) * | 2003-06-25 | 2004-12-29 | Nagracard S.A. | A method for allocation of secure resources in a security module |
JP4496771B2 (en) * | 2003-12-19 | 2010-07-07 | 株式会社日立製作所 | IC card system and application loading method |
EP1776675A1 (en) * | 2004-08-13 | 2007-04-25 | Telecom Italia S.p.A. | Method of and system for secure management of data stored on electronic tags |
DE102004040462A1 (en) * | 2004-08-20 | 2006-02-23 | Giesecke & Devrient Gmbh | Authenticated secure access to a volume with mass storage and a chip |
KR100471007B1 (en) * | 2004-08-27 | 2005-03-14 | 케이비 테크놀러지 (주) | Smart card for ensuring an independent nature of security domain |
FR2875949A1 (en) * | 2004-09-28 | 2006-03-31 | St Microelectronics Sa | LOCKING AN INTEGRATED CIRCUIT |
JP4794269B2 (en) * | 2004-11-08 | 2011-10-19 | パナソニック株式会社 | Secure device and relay terminal |
CN101088249B (en) * | 2004-11-25 | 2012-04-04 | 法国电信公司 | Method for securing a telecommunications terminal which is connected to a terminal user identification module |
US8083133B2 (en) * | 2005-05-04 | 2011-12-27 | The Western Union Company | System and method for accounting for activation of stored value cards |
US9004355B2 (en) * | 2005-09-29 | 2015-04-14 | Cardfree Inc | Secure system and method to pay for a service provided at a reservation |
US8622292B2 (en) * | 2005-09-29 | 2014-01-07 | Jeffrey Bart Katz | Reservation-based preauthorization payment system |
FR2896323B1 (en) * | 2006-01-16 | 2008-10-31 | Oberthur Card Syst Sa | METHOD FOR GENERATING A PROFILE FOR CUSTOMIZING AN ELECTRONIC ENTITY AND ASSOCIATED SYSTEM |
US7689250B2 (en) * | 2006-02-01 | 2010-03-30 | General Instrument Corporation | Method, apparatus and system for partitioning and bundling access to network services and applications |
CN101484901B (en) * | 2006-02-28 | 2014-09-17 | 塞尔蒂卡姆公司 | System and method for controlling productive process |
EP2016535A4 (en) * | 2006-04-19 | 2010-06-23 | Stepnexus Holdings | Methods and systems for ic card application loading |
US7967194B2 (en) * | 2006-05-17 | 2011-06-28 | Mastercard International Incorporated | Centralized issuer hub for transaction card customization |
US20130139230A1 (en) * | 2006-09-24 | 2013-05-30 | Rfcyber Corporation | Trusted Service Management Process |
US8738485B2 (en) | 2007-12-28 | 2014-05-27 | Visa U.S.A. Inc. | Contactless prepaid product for transit fare collection |
US8346639B2 (en) | 2007-02-28 | 2013-01-01 | Visa U.S.A. Inc. | Authentication of a data card using a transit verification value |
US20080208681A1 (en) * | 2006-09-28 | 2008-08-28 | Ayman Hammad | Payment using a mobile device |
US20080203170A1 (en) * | 2007-02-28 | 2008-08-28 | Visa U.S.A. Inc. | Fraud prevention for transit fare collection |
US8118223B2 (en) | 2006-09-28 | 2012-02-21 | Visa U.S.A. Inc. | Smart sign mobile transit fare payment |
US7527208B2 (en) | 2006-12-04 | 2009-05-05 | Visa U.S.A. Inc. | Bank issued contactless payment card used in transit fare collection |
US8386349B2 (en) * | 2007-02-28 | 2013-02-26 | Visa U.S.A. Inc. | Verification of a portable consumer device in an offline environment |
US8523069B2 (en) | 2006-09-28 | 2013-09-03 | Visa U.S.A. Inc. | Mobile transit fare payment |
JP4554581B2 (en) * | 2006-09-29 | 2010-09-29 | 株式会社野村総合研究所 | Job management apparatus, system and program |
US7992774B2 (en) * | 2007-06-13 | 2011-08-09 | Image Asset Management Inc. | System and methods for creating a user customized bank card |
US11049372B2 (en) | 2007-06-13 | 2021-06-29 | CPI Card Group—Colorado, Inc. | System and methods for generating user interfaces for custom card design session |
HU230695B1 (en) * | 2007-10-20 | 2017-09-28 | Andrá Vilmos | Method of preparing storing and method of storing single user access information into safe storage unit of a communication device |
US8152074B1 (en) | 2008-03-28 | 2012-04-10 | Oracle America, Inc. | Method for preparing by a smart card issuer an anonymous smart card and resulting structure |
US8225386B1 (en) * | 2008-03-28 | 2012-07-17 | Oracle America, Inc. | Personalizing an anonymous multi-application smart card by an end-user |
US8789753B1 (en) | 2008-03-28 | 2014-07-29 | Oracle International Corporation | Method for using and maintaining user data stored on a smart card |
US8220718B2 (en) * | 2008-09-15 | 2012-07-17 | Vasco Data Security, Inc. | Method for post-manufacturing data transfer to and from a sealed device |
US20100135542A1 (en) * | 2008-09-18 | 2010-06-03 | Keepper Jr Lester H | System and methods for biometric identification on smart devices using multos |
US9230259B1 (en) | 2009-03-20 | 2016-01-05 | Jpmorgan Chase Bank, N.A. | Systems and methods for mobile ordering and payment |
KR100961274B1 (en) * | 2009-12-07 | 2010-06-07 | 조정식 | Integrated circuit card of unity |
ES2806261T3 (en) | 2010-11-19 | 2021-02-17 | Nagravision Sa | Method to detect cloned software |
US11037123B2 (en) * | 2019-01-07 | 2021-06-15 | Visa International Service Association | System, method, and computer program product for customizing functions of a point-of-sale terminal |
US11610188B2 (en) | 2020-04-15 | 2023-03-21 | Capital One Services, Llc | Systems and methods for ATM integrated card fabricator |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0292248A2 (en) * | 1987-05-19 | 1988-11-23 | THE GENERAL ELECTRIC COMPANY, p.l.c. | Data processing system |
EP0328289A2 (en) * | 1988-02-03 | 1989-08-16 | Hitachi Maxell Ltd. | IC card and method of writing its operation program |
WO1990005960A1 (en) * | 1988-11-22 | 1990-05-31 | Cryptag Limited | Programmable transponder |
EP0475837A1 (en) * | 1990-09-12 | 1992-03-18 | Gemplus Card International | Method of managing an application program stored in an IC card |
EP0594493A1 (en) * | 1992-10-23 | 1994-04-27 | Gemplus Card International | Software acquiring procedure and information system for carrying out this procedure |
GB2284689A (en) * | 1993-12-07 | 1995-06-14 | Inventec Corp | Programming SMART cards. |
Family Cites Families (165)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4218582A (en) | 1977-10-06 | 1980-08-19 | The Board Of Trustees Of The Leland Stanford Junior University | Public key cryptographic apparatus and method |
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4259720A (en) | 1978-01-09 | 1981-03-31 | Interbank Card Association | Security system for electronic funds transfer system |
US4408203A (en) | 1978-01-09 | 1983-10-04 | Mastercard International, Inc. | Security system for electronic funds transfer system |
US4214230A (en) | 1978-01-19 | 1980-07-22 | Rolf Blom | Personal identification system |
FR2455320B1 (en) | 1979-04-25 | 1986-01-24 | Cii Honeywell Bull | DEVICE FOR RECYCLING IDENTIFIABLE RECORDING MEDIA USING IDENTIFICATION DATA AND NON-VOLATILE DELETE MONOLITHIC MEMORY COMPOUNDS |
US4321672A (en) | 1979-11-26 | 1982-03-23 | Braun Edward L | Financial data processing system |
US4302810A (en) | 1979-12-28 | 1981-11-24 | International Business Machines Corporation | Method and apparatus for secure message transmission for use in electronic funds transfer systems |
US4305059A (en) | 1980-01-03 | 1981-12-08 | Benton William M | Modular funds transfer system |
FR2480539B1 (en) | 1980-04-09 | 1985-09-13 | Cii Honeywell Bull | METHOD AND SYSTEM FOR TRANSMITTING SIGNED MESSAGES |
US4341951A (en) | 1980-07-02 | 1982-07-27 | Benton William M | Electronic funds transfer and voucher issue system |
FR2497617B1 (en) | 1981-01-07 | 1989-08-18 | Transac Develop Transactions A | SECURITY METHOD AND DEVICE FOR TRIPARTITY COMMUNICATION OF CONFIDENTIAL DATA |
US4423287A (en) | 1981-06-26 | 1983-12-27 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4578530A (en) | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4453074A (en) | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
FR2536928B1 (en) | 1982-11-30 | 1989-10-06 | France Etat | SYSTEM FOR ENCRYPTING AND DECIPHERING INFORMATION, OF THE TYPE USING A PUBLIC KEY DECRYPTION SYSTEM |
US4906828A (en) | 1983-02-28 | 1990-03-06 | Paperless Accounting, Inc. | Electronic money purse and fund transfer system |
US4536647A (en) | 1983-07-15 | 1985-08-20 | Atalla Corporation | Pocket banking terminal, method and system |
US4926480A (en) | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
US4759063A (en) | 1983-08-22 | 1988-07-19 | Chaum David L | Blind signature systems |
US4759064A (en) | 1985-10-07 | 1988-07-19 | Chaum David L | Blind unanticipated signature systems |
US4605820A (en) | 1983-11-10 | 1986-08-12 | Visa U.S.A. Inc. | Key management system for on-line communication |
SE442249B (en) | 1983-11-17 | 1985-12-09 | Ericsson Telefon Ab L M | PROCEDURE AND DEVICE FOR VERIFICATION OF PERSONAL IDENTIFICATION NUMBER AND CHECKING INSERT NUMBER SERIES IN IDENTIFICATION MEDIA |
US4745267A (en) | 1983-12-28 | 1988-05-17 | Fairview Partners | Fraudulent card intercept system |
JPS60160491A (en) | 1984-01-31 | 1985-08-22 | Toshiba Corp | Ic card |
DE3579815D1 (en) | 1984-02-09 | 1990-10-25 | Toshiba Kawasaki Kk | DATA PROCESSING TERMINAL. |
US4630201A (en) | 1984-02-14 | 1986-12-16 | International Security Note & Computer Corporation | On-line and off-line transaction security system using a code generated from a transaction parameter and a random number |
JPS60144154U (en) | 1984-03-07 | 1985-09-25 | シャープ株式会社 | portable computer |
JPS60207957A (en) | 1984-03-31 | 1985-10-19 | Toshiba Corp | Data protecting system |
US4736094A (en) | 1984-04-03 | 1988-04-05 | Omron Tateisi Electronics Co. | Financial transaction processing system using an integrated circuit card device |
US4709137A (en) | 1984-04-16 | 1987-11-24 | Omron Tateisi Electronics Co. | IC card and financial transaction processing system using IC card |
US4727243A (en) | 1984-10-24 | 1988-02-23 | Telenet Communications Corporation | Financial transaction system |
GB2168514A (en) | 1984-12-12 | 1986-06-18 | Ibm | Security module |
US4650978A (en) | 1985-01-23 | 1987-03-17 | Rmh Systems, Inc. | Off line cash card system and method |
JPS61177585A (en) | 1985-02-04 | 1986-08-09 | Toshiba Corp | Sealing body of portable electronic device |
JPS61210488A (en) | 1985-03-14 | 1986-09-18 | Toppan Moore Co Ltd | Ic card |
JPS61264485A (en) | 1985-05-18 | 1986-11-22 | Hitachi Maxell Ltd | Reader and writer for integrated circuit card |
JPS61278989A (en) | 1985-06-04 | 1986-12-09 | Toppan Moore Co Ltd | Reader/writer of ic card |
JPH069067B2 (en) | 1985-07-16 | 1994-02-02 | カシオ計算機株式会社 | IC card system |
JPH0818473B2 (en) | 1985-07-31 | 1996-02-28 | トッパン・ムーア株式会社 | IC card that can set confidentiality level |
JPH0762862B2 (en) | 1985-09-17 | 1995-07-05 | カシオ計算機株式会社 | Authentication method in IC card system |
US4752677A (en) | 1985-09-25 | 1988-06-21 | Casio Computer Co., Ltd. | Customer service system for use in IC card system |
EP0218176B1 (en) | 1985-10-07 | 1991-11-13 | Kabushiki Kaisha Toshiba | Portable electronic device |
US4778983A (en) | 1985-10-12 | 1988-10-18 | Sanden Corporation | Automatic vending machine |
US4669596A (en) | 1985-10-22 | 1987-06-02 | Debitek, Inc. | Vending machine accessory permitting dual mode machine operation with either money or coded cards |
JPS62105293A (en) | 1985-10-31 | 1987-05-15 | Toshiba Corp | Reading/writing device for portable recording medium |
FR2591008B1 (en) | 1985-11-30 | 1991-05-17 | Toshiba Kk | PORTABLE ELECTRONIC DEVICE |
US4849614A (en) | 1985-12-27 | 1989-07-18 | Toppan Moore Company, Ltd. | Composite IC card |
FR2592510B1 (en) | 1985-12-31 | 1988-02-12 | Bull Cp8 | METHOD AND APPARATUS FOR CERTIFYING SERVICES OBTAINED USING A PORTABLE MEDIUM SUCH AS A MEMORY CARD |
JPS62179994A (en) | 1986-02-04 | 1987-08-07 | カシオ計算機株式会社 | Electronic card |
US4874935A (en) | 1986-03-10 | 1989-10-17 | Data Card Coprporation | Smart card apparatus and method of programming same |
JPS62222363A (en) | 1986-03-25 | 1987-09-30 | Omron Tateisi Electronics Co | Automatic transaction processing device |
JPS62254265A (en) | 1986-04-28 | 1987-11-06 | Hitachi Ltd | Control system for automatic cash transaction machine |
US4742215A (en) | 1986-05-07 | 1988-05-03 | Personal Computer Card Corporation | IC card system |
US4816654A (en) | 1986-05-16 | 1989-03-28 | American Telephone And Telegraph Company | Improved security system for a portable data carrier |
US4816653A (en) | 1986-05-16 | 1989-03-28 | American Telephone And Telegraph Company | Security file system for a portable data carrier |
US4839792A (en) | 1986-06-20 | 1989-06-13 | Kabushiki Kaisha Toshiba | Portable electronic apparatus with a device for determining data validity |
JP2537199B2 (en) | 1986-06-20 | 1996-09-25 | 株式会社東芝 | IC card |
US4748668A (en) | 1986-07-09 | 1988-05-31 | Yeda Research And Development Company Limited | Method, apparatus and article for identification and signature |
FR2601535B1 (en) | 1986-07-11 | 1988-10-21 | Bull Cp8 | METHOD FOR CERTIFYING THE AUTHENTICITY OF DATA EXCHANGED BETWEEN TWO DEVICES CONNECTED LOCALLY OR REMOTELY THROUGH A TRANSMISSION LINE |
FR2601795B1 (en) | 1986-07-17 | 1988-10-07 | Bull Cp8 | METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND SYSTEM FOR IMPLEMENTING IT |
JPS6332658A (en) | 1986-07-28 | 1988-02-12 | Casio Comput Co Ltd | Ic card system |
JPH07104891B2 (en) | 1986-08-05 | 1995-11-13 | 沖電気工業株式会社 | Transaction processor |
US4802218A (en) | 1986-11-26 | 1989-01-31 | Wright Technologies, L.P. | Automated transaction system |
JPH087720B2 (en) | 1986-09-16 | 1996-01-29 | 富士通株式会社 | Area access method for IC cards for multiple services |
JPS6373388A (en) | 1986-09-16 | 1988-04-02 | Fujitsu Ltd | Area acquiring system for ic card for plural services |
DE3731736A1 (en) | 1986-09-27 | 1988-04-07 | Toshiba Kawasaki Kk | Processing system for a portable electronic device |
JPS63120391A (en) | 1986-11-10 | 1988-05-24 | Hitachi Ltd | Ic card |
US4900904A (en) | 1986-11-26 | 1990-02-13 | Wright Technologies, L.P. | Automated transaction system with insertable cards for downloading rate or program data |
JPS63182795A (en) | 1987-01-20 | 1988-07-28 | インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン | Portable card and manufacture thereof |
US4969188A (en) | 1987-02-17 | 1990-11-06 | Gretag Aktiengesellschaft | Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management |
US5162989A (en) | 1987-02-20 | 1992-11-10 | Oki Electric Industry Co., Ltd. | Information rental system including processor equipped IC card having data erasing means |
JPH0758500B2 (en) | 1987-02-20 | 1995-06-21 | 株式会社東芝 | Portable electronic device |
EP0281058B1 (en) | 1987-03-04 | 1993-02-03 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Data exchange system |
FR2611962B1 (en) | 1987-03-06 | 1989-06-09 | Trt Telecom Radio Electr | SYSTEM AND METHOD FOR APPLIED CRYPTOGRAPHY |
JPS63236186A (en) | 1987-03-24 | 1988-10-03 | Mitsubishi Electric Corp | Card issuing device |
US4949257A (en) | 1987-04-28 | 1990-08-14 | Zvi Orbach | Automated merchandising system for computer software |
US4797920A (en) | 1987-05-01 | 1989-01-10 | Mastercard International, Inc. | Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys |
JPS6421327U (en) | 1987-07-28 | 1989-02-02 | ||
US4984270A (en) | 1987-06-19 | 1991-01-08 | The Exchange System | Method and system for transmission of financial data |
JP2592856B2 (en) | 1987-09-24 | 1997-03-19 | 株式会社東芝 | IC card issuing system |
JPH0161764U (en) | 1987-10-09 | 1989-04-19 | ||
US4853961A (en) | 1987-12-18 | 1989-08-01 | Pitney Bowes Inc. | Reliable document authentication system |
FR2626095B1 (en) | 1988-01-20 | 1991-08-30 | Sgs Thomson Microelectronics | SECURITY SYSTEM FOR PROTECTING PROGRAMMING AREAS OF A CHIP CARD |
US5214702A (en) | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5012076A (en) | 1988-03-02 | 1991-04-30 | Hitachi, Ltd. | Transaction method wherein transaction amount is compared with account balance before ID is entered |
US4987593A (en) | 1988-03-16 | 1991-01-22 | David Chaum | One-show blind signature systems |
US4995081A (en) | 1988-03-21 | 1991-02-19 | Leighton Frank T | Method and system for personal identification using proofs of legitimacy |
US4879747A (en) | 1988-03-21 | 1989-11-07 | Leighton Frank T | Method and system for personal identification |
US4891503A (en) | 1988-03-29 | 1990-01-02 | Gascard, Inc. | Distributed authorization system |
JPH01259483A (en) | 1988-04-08 | 1989-10-17 | Minolta Camera Co Ltd | Ic card |
CA1321649C (en) | 1988-05-19 | 1993-08-24 | Jeffrey R. Austin | Method and system for authentication |
US4961142A (en) | 1988-06-29 | 1990-10-02 | Mastercard International, Inc. | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer |
EP0355372B1 (en) | 1988-07-20 | 1995-03-15 | SPA Syspatronic AG | Data carrier controlled terminal for a data exchange system |
DE68927361T4 (en) | 1988-08-12 | 1999-11-04 | Hitachi Maxell | Chip card and procedure for rewriting your program |
JP2695855B2 (en) | 1988-08-26 | 1998-01-14 | 株式会社東芝 | Portable electronic devices |
JPH0622030B2 (en) | 1988-10-03 | 1994-03-23 | 富士通株式会社 | Transaction validity confirmation method |
US5016274A (en) | 1988-11-08 | 1991-05-14 | Silvio Micali | On-line/off-line digital signing |
JPH02170272A (en) | 1988-12-23 | 1990-07-02 | Hitachi Maxell Ltd | Collation system for secret information |
JPH02214994A (en) | 1989-02-15 | 1990-08-27 | Hitachi Maxell Ltd | Ic card |
US5165043A (en) | 1989-03-15 | 1992-11-17 | Hitachi, Ltd. | Memory card system and access method for memory card |
US4977595A (en) | 1989-04-03 | 1990-12-11 | Nippon Telegraph And Telephone Corporation | Method and apparatus for implementing electronic cash |
US4996711A (en) | 1989-06-21 | 1991-02-26 | Chaum David L | Selected-exponent signature systems |
FR2650097B1 (en) | 1989-07-19 | 1992-12-31 | Pailles Jean Claude | CABLE MICROCIRCUIT CARD AND TRANSACTION METHOD BETWEEN A CORRESPONDING CABLE MICROCIRCUIT CARD AND A TERMINAL |
FR2651347A1 (en) | 1989-08-22 | 1991-03-01 | Trt Telecom Radio Electr | SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM. |
ZA907106B (en) | 1989-10-06 | 1991-09-25 | Net 1 Products Pty Ltd | Funds transfer system |
US5148481A (en) | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
FR2653248B1 (en) | 1989-10-13 | 1991-12-20 | Gemolus Card International | PAYMENT OR INFORMATION TRANSFER SYSTEM BY ELECTRONIC MEMORY CARD. |
FR2653914A1 (en) | 1989-10-27 | 1991-05-03 | Trt Telecom Radio Electr | SYSTEM FOR AUTHENTICATING A MICROCIRCUIT CARD BY A PERSONAL MICROCOMPUTER, AND METHOD FOR ITS IMPLEMENTATION |
US5120939A (en) | 1989-11-09 | 1992-06-09 | At&T Bell Laboratories | Databaseless security system |
US4993068A (en) | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
JPH03240127A (en) | 1990-02-17 | 1991-10-25 | Hitachi Maxell Ltd | Program control system |
JPH03248249A (en) | 1990-02-27 | 1991-11-06 | Mitsubishi Electric Corp | Ic memory card |
JPH0424889A (en) | 1990-05-21 | 1992-01-28 | Toshiba Corp | Ic card provided with personal identification function |
DE59004248D1 (en) | 1990-07-20 | 1994-02-24 | Siemens Nixdorf Inf Syst | Procedure for preventing inadmissible deviations from the run log of an application in a data exchange system. |
US5163098A (en) | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
FR2667171B1 (en) | 1990-09-25 | 1994-08-26 | Gemplus Card Int | PORTABLE MEDIUM WITH EASILY PROGRAMMABLE MICRO-CIRCUIT AND METHOD FOR PROGRAMMING THIS MICRO-CIRCUIT. |
FR2667417B1 (en) | 1990-10-02 | 1992-11-27 | Gemplus Card Int | MICROPROCESSOR CARD DESIGNED TO RECEIVE MULTIPLE PROGRAMS IN PROGRAMMABLE MEMORY. |
US5131038A (en) | 1990-11-07 | 1992-07-14 | Motorola, Inc. | Portable authentification system |
JP3114991B2 (en) | 1990-11-30 | 2000-12-04 | 株式会社東芝 | Data communication system |
FR2673476B1 (en) | 1991-01-18 | 1996-04-12 | Gemplus Card Int | SECURE METHOD FOR LOADING MULTIPLE APPLICATIONS INTO A MICROPROCESSOR MEMORY CARD. |
FR2671889A1 (en) | 1991-01-22 | 1992-07-24 | Pailles Jean Claude | METHOD OF EXCHANGING RIGHTS BETWEEN MICROPROCESSOR CARDS. |
US5224162A (en) | 1991-06-14 | 1993-06-29 | Nippon Telegraph And Telephone Corporation | Electronic cash system |
US5142578A (en) | 1991-08-22 | 1992-08-25 | International Business Machines Corporation | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
US5200999A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Public key cryptosystem key management based on control vectors |
US5201000A (en) | 1991-09-27 | 1993-04-06 | International Business Machines Corporation | Method for generating public and private key pairs without using a passphrase |
JP3083187B2 (en) | 1991-09-30 | 2000-09-04 | 富士通株式会社 | Key management method of electronic wallet system |
DE69231118T2 (en) | 1991-10-18 | 2000-12-14 | Fujitsu Ltd | Message distribution system with cordless message-transmitting substations and message-receiving terminal devices |
FR2683357A1 (en) | 1991-10-30 | 1993-05-07 | Philips Composants | MICROCIRCUIT FOR PROTECTED PROGRAMMABLE MEMORY CHIP CARD. |
US5164988A (en) | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
EP0722596A4 (en) | 1991-11-12 | 1997-03-05 | Security Domain Pty Ltd | Method and system for secure, decentralised personalisation of smart cards |
GB9126779D0 (en) | 1991-12-17 | 1992-02-12 | Int Computers Ltd | Security mechanism for a computer system |
FR2687816B1 (en) | 1992-02-24 | 1994-04-08 | Gemplus Card International | METHOD FOR PERSONALIZING A CHIP CARD. |
JPH05250523A (en) | 1992-03-06 | 1993-09-28 | Toshiba Corp | Processing system |
US5396558A (en) | 1992-09-18 | 1995-03-07 | Nippon Telegraph And Telephone Corporation | Method and apparatus for settlement of accounts by IC cards |
WO1994010657A1 (en) | 1992-10-26 | 1994-05-11 | Intellect Australia Pty. Ltd. | Host and user transaction system |
US5371797A (en) | 1993-01-19 | 1994-12-06 | Bellsouth Corporation | Secure electronic funds transfer from telephone or unsecured terminal |
US5420405A (en) | 1993-02-26 | 1995-05-30 | Chasek; Norman E. | Secure, automated transaction system that supports an electronic currency operating in mixed debit & credit modes |
JPH06251206A (en) | 1993-02-26 | 1994-09-09 | Fujitsu Ltd | Processing system for card displaying plural functions |
JP3421378B2 (en) | 1993-03-23 | 2003-06-30 | 株式会社東芝 | Transmission control method |
JPH0744672A (en) | 1993-07-28 | 1995-02-14 | Oki Electric Ind Co Ltd | Ic card and ic card system |
US5544246A (en) | 1993-09-17 | 1996-08-06 | At&T Corp. | Smartcard adapted for a plurality of service providers and for remote installation of same |
US5485520A (en) | 1993-10-07 | 1996-01-16 | Amtech Corporation | Automatic real-time highway toll collection from moving vehicles |
GB9320982D0 (en) | 1993-10-12 | 1993-12-01 | Ibm | A data processing system |
DE69431306T2 (en) | 1993-12-16 | 2003-05-15 | Open Market Inc | NETWORK-BASED PAYMENT SYSTEM AND METHOD FOR USING SUCH A SYSTEM |
US5530232A (en) | 1993-12-22 | 1996-06-25 | Datamark Services, Inc. | Multi-application data card |
US5578808A (en) | 1993-12-22 | 1996-11-26 | Datamark Services, Inc. | Data card that can be used for transactions involving separate card issuers |
US5557516A (en) | 1994-02-04 | 1996-09-17 | Mastercard International | System and method for conducting cashless transactions |
EP0666550B1 (en) * | 1994-02-08 | 1997-05-02 | Belle Gate Investment B.V. | Data exchange system comprising portable data processing units |
FR2716280B1 (en) * | 1994-02-11 | 1996-04-12 | Solaic Sa | Method for protecting memory card components against fraudulent use. |
US5511121A (en) | 1994-02-23 | 1996-04-23 | Bell Communications Research, Inc. | Efficient electronic money |
FR2720848B1 (en) | 1994-06-03 | 1996-07-26 | Gemplus Card Int | Method of conducting a transaction between a smart card and an information system. |
FR2725537B1 (en) | 1994-10-11 | 1996-11-22 | Bull Cp8 | METHOD FOR LOADING A PROTECTED MEMORY AREA OF AN INFORMATION PROCESSING DEVICE AND ASSOCIATED DEVICE |
US5715314A (en) | 1994-10-24 | 1998-02-03 | Open Market, Inc. | Network sales system |
US5517011A (en) | 1994-11-21 | 1996-05-14 | Oki Electric Industry Co. Ltd. | Slotless card reader |
US5705798A (en) | 1994-12-16 | 1998-01-06 | Mastercard International Inc. | System and method for processing a customized financial transaction card |
US5546523A (en) | 1995-04-13 | 1996-08-13 | Gatto; James G. | Electronic fund transfer system |
US5692132A (en) | 1995-06-07 | 1997-11-25 | Mastercard International, Inc. | System and method for conducting cashless transactions on a computer network |
US5708780A (en) | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
US5799314A (en) | 1995-06-30 | 1998-08-25 | Sun Microsystems, Inc. | System and method of controlling mapping of data buffers for heterogenous programs in digital computer system |
US5699528A (en) | 1995-10-31 | 1997-12-16 | Mastercard International, Inc. | System and method for bill delivery and payment over a communications network |
US5889941A (en) * | 1996-04-15 | 1999-03-30 | Ubiq Inc. | System and apparatus for smart card personalization |
US5704046A (en) | 1996-05-30 | 1997-12-30 | Mastercard International Inc. | System and method for conducting cashless transactions |
US5923884A (en) * | 1996-08-30 | 1999-07-13 | Gemplus S.C.A. | System and method for loading applications onto a smart card |
-
1998
- 1998-02-12 US US09/023,057 patent/US6575372B1/en not_active Expired - Lifetime
- 1998-02-19 DE DE69823649T patent/DE69823649T2/en not_active Expired - Lifetime
- 1998-02-19 JP JP53639498A patent/JP2001513231A/en not_active Withdrawn
- 1998-02-19 CA CA002281576A patent/CA2281576C/en not_active Expired - Lifetime
- 1998-02-19 AU AU62996/98A patent/AU736325B2/en not_active Expired
- 1998-02-19 EP EP98907003A patent/EP0963580B1/en not_active Revoked
- 1998-02-19 WO PCT/GB1998/000531 patent/WO1998037526A1/en active IP Right Grant
- 1998-02-20 AR ARP980100778A patent/AR011449A1/en active IP Right Grant
-
2001
- 2001-12-21 US US10/033,281 patent/US6659354B2/en not_active Expired - Lifetime
-
2008
- 2008-07-22 JP JP2008189233A patent/JP4405568B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0292248A2 (en) * | 1987-05-19 | 1988-11-23 | THE GENERAL ELECTRIC COMPANY, p.l.c. | Data processing system |
EP0328289A2 (en) * | 1988-02-03 | 1989-08-16 | Hitachi Maxell Ltd. | IC card and method of writing its operation program |
WO1990005960A1 (en) * | 1988-11-22 | 1990-05-31 | Cryptag Limited | Programmable transponder |
EP0475837A1 (en) * | 1990-09-12 | 1992-03-18 | Gemplus Card International | Method of managing an application program stored in an IC card |
EP0594493A1 (en) * | 1992-10-23 | 1994-04-27 | Gemplus Card International | Software acquiring procedure and information system for carrying out this procedure |
GB2284689A (en) * | 1993-12-07 | 1995-06-14 | Inventec Corp | Programming SMART cards. |
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
USRE39269E1 (en) | 1994-02-08 | 2006-09-05 | Sun Microsystems, Inc. | Data exchange system comprising portable data processing units |
US6996213B1 (en) | 1998-09-29 | 2006-02-07 | Sun Microsystems, Inc. | Superposition of data over voice |
US6922835B1 (en) | 1999-01-22 | 2005-07-26 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges |
US7093122B1 (en) | 1999-01-22 | 2006-08-15 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces |
US6633984B2 (en) | 1999-01-22 | 2003-10-14 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using an entry point object |
US7607175B2 (en) | 1999-01-22 | 2009-10-20 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using an entry point object |
US6769053B1 (en) | 1999-06-10 | 2004-07-27 | Belle Gate Investment B.V. | Arrangement storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory |
JP2003507821A (en) * | 1999-08-24 | 2003-02-25 | シュラムバーガー システムズ | Apparatus and method for loading commands on an integrated circuit card |
US8118221B2 (en) | 1999-10-25 | 2012-02-21 | Smartflash Technologies Limited | Data storage and access systems |
US8033458B2 (en) | 1999-10-25 | 2011-10-11 | Smartflash Technologies Limited | Data storage and access systems |
US7942317B2 (en) | 1999-10-25 | 2011-05-17 | Smartflash Technologies Limited | Data storage and access systems |
US8061598B2 (en) | 1999-10-25 | 2011-11-22 | Smartflash Technologies Limited | Data storage and access systems |
US8336772B2 (en) | 1999-10-25 | 2012-12-25 | Smartflash Technologies Limited | Data storage and access systems |
US7334720B2 (en) | 1999-10-25 | 2008-02-26 | Smart-Flash Limited | Data storage and access systems |
US9471910B2 (en) | 1999-10-25 | 2016-10-18 | Smartflash, LLC | Data storage and access systems |
JP4913302B2 (en) * | 1999-11-12 | 2012-04-11 | オラクル・アメリカ・インコーポレイテッド | Language subset validation |
US7158993B1 (en) | 1999-11-12 | 2007-01-02 | Sun Microsystems, Inc. | API representation enabling submerged hierarchy |
JP2003515857A (en) * | 1999-11-12 | 2003-05-07 | サン、マイクロシステムズ、インコーポレーテッド | Language subset validation |
WO2001041087A1 (en) * | 1999-12-04 | 2001-06-07 | Orga Kartensysteme Gmbh | Method for initialising and/or personalising chip cards and a corresponding device |
US7020740B2 (en) | 1999-12-06 | 2006-03-28 | Sun Microsystems, Inc. | Computer arrangement using non-refreshed DRAM |
US6883716B1 (en) | 1999-12-07 | 2005-04-26 | Sun Microsystems, Inc. | Secure photo carrying identification device, as well as means and method for authenticating such an identification device |
US7231635B2 (en) | 2000-04-28 | 2007-06-12 | Sun Microsystems, Inc. | Remote incremental program verification using API definitions |
US6883163B1 (en) | 2000-04-28 | 2005-04-19 | Sun Microsystems, Inc. | Populating resource-constrained devices with content verified using API definitions |
US6986132B1 (en) | 2000-04-28 | 2006-01-10 | Sun Microsytems, Inc. | Remote incremental program binary compatibility verification using API definitions |
US6981245B1 (en) | 2000-09-14 | 2005-12-27 | Sun Microsystems, Inc. | Populating binary compatible resource-constrained devices with content verified using API definitions |
EP1418538A1 (en) * | 2001-08-03 | 2004-05-12 | Dai Nippon Printing Co., Ltd. | MULTI−APPLICATION IC CARD |
EP1418538A4 (en) * | 2001-08-03 | 2007-07-11 | Dainippon Printing Co Ltd | Multi-application ic card |
US7275260B2 (en) | 2001-10-29 | 2007-09-25 | Sun Microsystems, Inc. | Enhanced privacy protection in identification in a data communications network |
US7085840B2 (en) | 2001-10-29 | 2006-08-01 | Sun Microsystems, Inc. | Enhanced quality of identification in a data communications network |
US7496751B2 (en) | 2001-10-29 | 2009-02-24 | Sun Microsystems, Inc. | Privacy and identification in a data communications network |
US7874492B2 (en) | 2001-12-04 | 2011-01-25 | Visa U.S.A. Inc. | Method and system for facilitating memory and application management on a secured token |
US8548923B2 (en) | 2002-10-07 | 2013-10-01 | Sonia Reed | Method and system for facilitating data access and management on a secure token |
US9430666B2 (en) | 2002-10-07 | 2016-08-30 | Visa International Service Association | Method and system for facilitating data access and management on a secure token |
US7140549B2 (en) | 2004-02-24 | 2006-11-28 | Sun Microsystems, Inc. | Method and apparatus for selecting a desired application on a smart card |
US7191288B2 (en) | 2004-02-24 | 2007-03-13 | Sun Microsystems, Inc. | Method and apparatus for providing an application on a smart card |
US7374099B2 (en) | 2004-02-24 | 2008-05-20 | Sun Microsystems, Inc. | Method and apparatus for processing an application identifier from a smart card |
US7165727B2 (en) | 2004-02-24 | 2007-01-23 | Sun Microsystems, Inc. | Method and apparatus for installing an application onto a smart card |
EP2490159A1 (en) * | 2005-07-25 | 2012-08-22 | Oberthur Card Systems Sa | Electronic entity with a means for communication by contact and remotely |
US9111188B2 (en) | 2005-07-25 | 2015-08-18 | Oberthur Technologies | Electronic entity with contact and remote communication means |
US9600697B2 (en) | 2005-07-25 | 2017-03-21 | Oberthur Technologies | Electronic entity with contact and remote communication means |
DE102005052888A1 (en) * | 2005-11-07 | 2007-05-16 | Giesecke & Devrient Gmbh | Portable data storage medium personalizing method, involves receiving response data of processing device from personalization system, and carrying out personalization step based on response data that are determined based on detected data |
CN103257853A (en) * | 2012-02-17 | 2013-08-21 | 上海复旦微电子集团股份有限公司 | Composite application implementing method for CPU (central processing unit) card with multi-application COS (chip operating system) |
FR3019672A1 (en) * | 2014-04-02 | 2015-10-09 | Oberthur Technologies | METHOD OF MAKING A SECURITY DEVICE |
EP2927858A1 (en) * | 2014-04-02 | 2015-10-07 | Oberthur Technologies | Method for manufacturing a security device |
Also Published As
Publication number | Publication date |
---|---|
US20020050528A1 (en) | 2002-05-02 |
JP4405568B2 (en) | 2010-01-27 |
AR011449A1 (en) | 2000-08-16 |
EP0963580A1 (en) | 1999-12-15 |
CA2281576A1 (en) | 1998-08-27 |
AU6299698A (en) | 1998-09-09 |
AU736325B2 (en) | 2001-07-26 |
JP2001513231A (en) | 2001-08-28 |
DE69823649D1 (en) | 2004-06-09 |
CA2281576C (en) | 2004-11-30 |
EP0963580B1 (en) | 2004-05-06 |
DE69823649T2 (en) | 2005-06-16 |
JP2009003945A (en) | 2009-01-08 |
US6659354B2 (en) | 2003-12-09 |
US6575372B1 (en) | 2003-06-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0963580B1 (en) | Multi-application ic card system | |
US7469339B2 (en) | Secure multiple application card system and process | |
EP0981807B1 (en) | Integrated circuit card with application history list | |
US5036461A (en) | Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device | |
US4961142A (en) | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer | |
AU758710B2 (en) | Card activation at point of distribution | |
EP0985203A1 (en) | Key transformation unit for an ic card | |
US6249869B1 (en) | Integrated circuit card, secure application module, system comprising a secure application module and a terminal and a method for controlling service actions to be carried out by the secure application module on the integrated circuit card | |
AU732887B2 (en) | A system and method for loading applications onto a smart card | |
CA2293297C (en) | Chip card comprising means for managing a virtual memory, associated communication method and protocol | |
EP1053535A1 (en) | Configuration of ic card | |
WO1999040549A1 (en) | System and method for controlling access to computer code in an ic card | |
CA2625235C (en) | System and method for maintaining in the field an activation secure module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1998 536394 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998907003 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2281576 Country of ref document: CA Ref country code: CA Ref document number: 2281576 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 62996/98 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 1998907003 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWG | Wipo information: grant in national office |
Ref document number: 62996/98 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1998907003 Country of ref document: EP |