WO1999001960A2 - Smart card control of terminal and network resources - Google Patents

Smart card control of terminal and network resources Download PDF

Info

Publication number
WO1999001960A2
WO1999001960A2 PCT/IB1998/001162 IB9801162W WO9901960A2 WO 1999001960 A2 WO1999001960 A2 WO 1999001960A2 IB 9801162 W IB9801162 W IB 9801162W WO 9901960 A2 WO9901960 A2 WO 9901960A2
Authority
WO
WIPO (PCT)
Prior art keywords
smart card
terminal
command
host computer
network
Prior art date
Application number
PCT/IB1998/001162
Other languages
French (fr)
Other versions
WO1999001960A3 (en
Inventor
Michael A. Montgomery
Scott B. Guthery
Bertrand Du Castel
Original Assignee
Schlumberger Systemes
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Systemes filed Critical Schlumberger Systemes
Priority to DE69826009T priority Critical patent/DE69826009T2/en
Priority to EP98935222A priority patent/EP1002291B1/en
Priority to AU84568/98A priority patent/AU8456898A/en
Publication of WO1999001960A2 publication Critical patent/WO1999001960A2/en
Publication of WO1999001960A3 publication Critical patent/WO1999001960A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data

Definitions

  • the invention relates to smart cards, and in particular to smart card control of terminal and network resources.
  • Smart cards are used for a variety of applications including electronic game cards, identification badges, and data storage media such as electronic books.
  • the smart cards are typically encased in a tamper-resistant, plastic or metal housing about the size of a credit card and contain one or more embedded integrated circuit devices.
  • Terminals such as ID verification systems and electronic video games, etc., are available with one or more smart card interfaces that permit connection of the smart card to the terminal.
  • a prior art terminal typically starts in the idle state (ST11), as shown in FIG. 1. The terminal then transmits a command to the smart card (ST12), and then waits for a response (ST13). After receiving the response from the smart card (ST14), the terminal returns to the idle state (ST11). Similarly, as shown in FIG. 2, a prior art smart card begins with the smart card waiting for a command from the terminal (ST21).
  • the smart card Upon receiving the command from the terminal (ST22), the smart card proceeds to prepare an appropriate response (ST23), transmits the response to the terminal (ST24), and returns to the wait state (ST21) to await the next command. Under the above scheme, there is no provision for the smart card to access resources controlled by the terminal.
  • the invention in general, in one aspect, relates to a smart card system.
  • the system has a terminal and a smart card that is connected to the terminal and configured to initiate communication with the terminal.
  • the smart card communicates with the terminal using a communications protocol that enables asynchronous communications between the smart card and the terminal. For systems that do not support asynchronous communication, the communications protocol also enables logical asynchronous communications.
  • the system further comprises means for establishing full-duplex or logical full-duplex communication between the smart card and the terminal.
  • the terminal may be connected to a host computer which is in turn connected to a network.
  • the smart card can access the resources connected to the terminal, the host computer, and the network.
  • the invention in general, in another aspect, relates to a smart card that has a communications circuit and a microcontroller.
  • the microcontroller is configured to initiate communication with a terminal to which the smart card is connected.
  • the smart card also has a storage unit that stores programs that are executed by the microcontroller and a memory unit that temporarily stores the programs.
  • the terminal may be connected to a host computer and a network, and the smart card may access the resources connected to the terminal, the host computer, and the network.
  • the invention relates to a method of operating a smart card. The method comprises transmitting a command from the smart card to the terminal, waiting for a response from the terminal, and receiving the response from the terminal.
  • the smart card initiates communication with the terminal.
  • a communications protocol which may be configured to be ISO 7816 compatible, allows the smart card to communicate asynchronously with the terminal, or logically asynchronously with the terminal in cases where the actual asynchronous communication is not available. Additionally, the communication may occur in full-duplex mode. If a response is not received within a predefined time period, the smart card re-transmits the command. The method also comprises requesting a list of available services from the terminal and selecting a command based on the list of services.
  • the invention in general, in another aspect, relates to a method of debugging a smart card.
  • the method includes executing a diagnostic portion of a program stored on the smart card, receiving a result from the smart card, and comparing the result with an expected result.
  • the method further includes displaying the result on a terminal display.
  • Advantages of the invention include at least the following: smart card control of terminal, host computer, and network resources; smart card-initiated communication with a terminal, host computer, and network; and asynchronous communication between a smart card and a terminal, host computer, and network.
  • FIG. 1 is a state machine diagram of a prior art terminal.
  • FIG. 2 is a state machine diagram of a prior art smart card.
  • FIG. 3 is a block diagram of a smart card system.
  • FIG. 4 is a state machine diagram of the smart card of the present invention.
  • FIG. 5 is a state machine diagram of the terminal of the present invention.
  • FIG. 6 is a block diagram of a smart card communications scheme.
  • FIG. 7 illustrates a smart card communications protocol.
  • FIG. 8 is another embodiment of the smart card system.
  • FIG. 9 is a method of operating a smart card.
  • FIG. 10 is another method of operating a smart card. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • a smart card systems 30 has a smart card 31 connected to a terminal 32 which has terminal resources 33 available.
  • the terminal resources 33 may be very minimal, such as an input/output port for connecting to a host computer, or the resources 33 could be more extensive, for example, a keyboard, monitor, modem, cash dispenser, and other specialized resources.
  • the smart card 31 and the terminal 32 operate independently of any other devices. This is exemplified by portable value checker products which allow a particular value in the smart card 31 to be displayed by the terminal, and portable Mondex transaction devices which allow two smart cards 31 to be connected to a single terminal 32, and to transfer data between the two cards 31.
  • the terminal resources 33 connect the terminal 32 to a host computer 34, which has certain host computer resources 35 available. These resources could include a network connection, keyboard, monitor, hard disk, and other types of resources common to computers or specialized for a particular application.
  • the smart card 31 can send commands to, and receive responses from, the host computer 34 through the terminal 32, and vice-versa.
  • the host computer 34 optionally can be connected to a network 36 if the host computer resources 35 include a network port. This allows the host computer 34 to gain access to network resources 37, which include other computers, printers, storage devices, and other potential resources, including for example resources available on the Internet.
  • the smart card 31 can be used as a tamper-resistant storage unit for network passwords, keys, certificates, electronic cash, and other information which the host computer 34 uses for network access, electronic commerce, and other types of network applications.
  • An advantage of the smart card 31 is that it is able to initiate communication with the terminal 32 and thereby become a "master" while the terminal 32 acts as a "slave", as illustrated in FIG. 4 and FIG. 5.
  • communications is in an idle state in the smart card 31 while the smart card 31 is processing data or waiting for some event to occur (ST41).
  • the smart card 31 transmits a command (e.g., a display data command), or a message, or a packet of information to the terminal (ST42). After the transmission, the smart card 31 waits (ST43) until it receives a response (ST44) from the terminal 32 (e.g., an acknowledgement of the command).
  • the smart card 31 returns to the idle state (ST41) until the card needs to communicate with the terminal 32" again.
  • the smart card 31 may initiate communication with the terminal at any time. For example, if data or information from the terminal 32 which is needed by the smart card 31 to carry out a certain task is missing or incomplete, rather than remain in an idle state awaiting further data transfer, the smart card 31 can act proactively and request the missing information from the terminal 32.
  • terminal 32 waits in an idle state for a command from the smart card 31 (ST51). When a command is detected, the terminal 32 receives the command and prepares an appropriate response (ST52 and ST53). The terminal 32 then transmits the response to the smart card 31 (ST54) and returns to the idle state to await receipt of another command (ST51).
  • the smart card 31 may access host computer resources 35 and network resources 37 by issuing, for example, a print command to a printer resource or a send network message command to a network messaging resource.
  • time-out features it may be desirable to add time-out features to the smart card 31 so that if a response is not received in the allotted time, the smart card 31 takes alternative actions, such as re-transmitting the command or transmitting a different command.
  • FIGS. 4 and 5 represent systems with only half-duplex communication between the smart card 31 and terminal 32.
  • Alternative systems may, of course, be designed to support full-duplex communication between the smart card 31 and terminal 32.
  • full-duplex communication between the smart card 31 and the terminal 32 may be implemented using two conventional RS- 232 serial ports in both the smart card 31 and terminal 32.
  • Serial ports 61 and 62 of the smart card 31 transmit and receive data to and from serial ports 63 and 64 in the terminal 32, respectively. Because the transmissions in one direction are independent in time relative to the transmissions in the other direction, the smart card 31 and the terminal 32 may communicate with each other asynchronously.
  • synchronous communication protocols e.g., the ISO 7816 protocol.
  • such a system may implement a special low level protocol which appears as an asynchronous protocol interface to the higher level protocols. This will allow the devices in the system to communicate with each other and with external devices using high level protocols which require asynchronous communications.
  • a "polling protocol" may be used with a smart card 31 and a terminal 32 that support the ISO 7816 half-duplex low level protocols. In the polling protocol, the terminal 32 has an obligation to send packets to the smart card 31 at the earliest possible opportunity.
  • a special class of instruction code may be sent to indicate to the smart card 31 that this is only a polling packet. If the smart card 31 is ready to send data to the terminal 32, it sends a response to the terminal 32 containing a byte which indicates the length of the data the smart card 32 is ready to send. The terminal 32 then responds with a special packet having a length which is equal to the length indicated by the smart card 31. This then allows the smart card 31 to send its data to the terminal 32, effectively allowing the smart card 31 to initiate communication with the terminal 32. The polling may be repeated at the maximum rate that is supported by the terminal 32.
  • Such a low level protocol may be augmented by marking each message in each direction with a unique identifier, for example, a sequence number. This allows the responses in either direction to be deferred and sent later using the sequence number to correlate with the original messages. For example, if the terminal sent a message requiring a response, at the low level protocol the smart card could continue communicating other messages back and forth. Then, when the desired response is ready, the smart card 31 marks the response with the identification number of the initiating message. When the terminal 32 receives the response, it correlates the response with the original message and returns the response value to the thread that initiated the message.
  • a unique identifier for example, a sequence number.
  • Such a scheme also may permit the original thread to continue execution without waiting for the response, and allows the response to be passed back to the thread (or to another designated thread) using a callback mechanism. It will be appreciated that this logically presents what appears to be a full asynchronous interface to the higher level protocols.
  • FIG. 4 and FIG. 5 are illustrative of the simplest state machines that implement smart card initiated communications, which is the key to this invention. It is well understood that other state machines for both half-duplex and full-duplex communications can be devised, as well as non- state based protocols, and are intended to fall within the scope of this invention if such communication protocols include card initiated communication.
  • FIG. 4 and FIG. 5 illustrate only the simplest systems that implement smart card-initiated communications. Other systems having both half- duplex and full-duplex communications may be devised that, so long as they include smart card- initiated communication, are within the scope of the invention.
  • a communications protocol shown generally at 70 in FIG. 7 and in more detail in TABLE 1, defines the commands that the smart card can initiate with respect to the terminal, host computer, or network.
  • the communications protocol 70 uses ISO 7816 escape commands with the existing ISO 7816 protocol to generate a new set of smart card-initiated commands.
  • the use of the ISO 7816 escape commands allows the communications protocol 70 to retain backwards compatibility with standard ISO 7816 commands.
  • Each command in the communications protocol 70 is comprised of the following ISO 7816 fields: a class (CLA) field 71, an instruction (LNS) field 72, a first parameter (PI) field 73, a second parameter (P2) field 74, and a data (Data) field 75. Not every field is required for every command and some fields may be either left empty or filled with a null value.
  • the fields themselves are standard ISO 7816 fields well known to one having ordinary skill in the art and will not be described here.
  • the commands of the communications protocol 70 may be defined broadly such that not every terminal, host computer, network, or the resources connected thereto will have the service requested. When a particular service is not available, the communications protocol 70 includes an error message which may be sent back to the smart card to indicate that the requested service is not available. In one embodiment, the communications protocol 70 includes a query command so that the smart card can query the terminal, host computer, or network to determine which services are available. In addition, the communications protocol 70 may use a global naming convention (e.g., the Domain Name' Service (DNS)) such that the smart card may specify a particular resource on a global basis.
  • DNS Domain Name' Service
  • the commands defined in the communications protocol 70 include the following: Display Request, Activate Input Scan, Request Data Length in Buffer, Request Data in Buffer, Activate Secure ID Entry, Query Resources, and Send Network Message.
  • the Display Request command allows the smart card to display information on the terminal, host computer, or network display device.
  • a Java program implementing this command using the standard Java Card 1.0 specification is shown in Appendix A.
  • the Activate Input Scan command scans for user input.
  • the Request Data Length in Buffer command which may be executed at any time, determines the length of the data in the input buffer.
  • the Request Data in Buffer command reads the data entered in the terminal, host computer, or network input buffer.
  • the Request a Secure ID Entry command requests identification information such as a username, password, or biometrics information such as a thumbprint or voiceprint.
  • the Query Resources command queries the terminal, host computer, or network for available services and resources. This command may also be used to determine other information such as available user input devices, secure ID devices, network connectivity, data files, database availability, and other types of services were resources.
  • the Send Network Message command sends a message to a network computer which is identified by the standard DNS node ED convention. This command is sent from the smart card to the host computer, which must either receive and execute this command or return an error response to the smart card. If the network computer identified is the host computer, then the command is executed locally. Otherwise, the host computer routes the command through the network to the identified network computer.
  • the communications protocol 70 may, of course, be expanded as required to support other services. Furthermore, for systems that use full-duplex communication between the smart card and the terminal and do not require ISO 7816 compatibility, standard asynchronous callback mechanisms can be added to the protocol to expand functionality and improve performance greatly. For example, instead of sending a network message and waiting for a response, the smart card can continue normal processing. Once the response has been prepared by the DNS node that received the message, an asynchronous response message can be sent to the smart card.
  • Other half-duplex and full-duplex communications protocols can be devised readily and are intended to fall within the scope of this invention if such communications protocols include card initiated communication. For example, a logical full-duplex scheme may be devised for systems that do not have actual full-duplex.
  • a smart card system 80 comprises a smart card 81 connected to a smart card terminal 32.
  • the smart card 81 has an embedded microcontroller 82, memory unit 83, and storage unit 84, all of which are interconnected.
  • the microcontroller 82 executes smart card software and programs, carries out terminal instructions, and generally manages the flow of data to and from the smart card 81.
  • the microcontroller 82 may include a microprocessor (e.g., a 68HC05), a programmable array logic (PAL), an application-specific integrated circuit (ASIC), and/or other integrated circuit devices.
  • a microprocessor e.g., a 68HC05
  • PAL programmable array logic
  • ASIC application-specific integrated circuit
  • the memory unit 83 which may include a random- access-memory (RAM), temporarily stores software and data used by the microcontroller 82 during program execution.
  • the storage unit 84 which may include a read-only memory (ROM), stores the basic program codes and data that are needed to configure and operate the smart card 31. New or updated codes and data may be downloaded or programmed into the smart card 81 from time to time to upgrade the smart card 81.
  • the smart card 81 also has a communications unit 85 that is connected to the microcontroller 82 and allows the microcontroller 82 to transfer data to and from the terminal 32 and other external devices.
  • the smart card 81 is connected to the terminal 32 by a smart card interface 86 which facilitates communication between the smart card 81 and the terminal 32.
  • the interface 86 typically includes a smart card reader or reader/writer and a power supply, such as a battery, (not shown) that provides power to the smart card 81.
  • the interface 86 physically engages the smart card 81.
  • the interface 86 may use inductive, capacitive, or optical coupling, or the interface 86 may use radio frequency signals to connect the smart card 81 to the terminal 32.
  • the smart card 81 is able to access and control the terminal 32 and terminal resources 33 by initiating communication with the terminal 32 and terminal resources 33, contrary to conventional smart cards that only respond to received commands.
  • communication between the smart card 31 and the terminal 36 is established, for example, via an electronic handshake or series of handshakes (ST91).
  • the smart card 81 requests a list of available services from the terminal 32 (ST92).
  • the list of services may vary depending on the type of terminal 32 (e.g., a video game, security system, etc.) and terminal resources 33.
  • the smart card 81 sends a command to the terminal 32 based on the services that are available (ST94).
  • the smart card 81 then checks to see if a response to the command has been received from the terminal 32 (ST95). If a response has been received, the smart card 81 encrypts (ST97) and stores (ST98) any data received from the terminal 32, and prepares itself to send another command to the terminal 32 (ST94). If not, the smart card 81 checks to see if a predefined time period has expired or timed out (ST96). If the predefined time period has expired, then the smart card 81 re-transmits the command to the terminal 32 (ST94). If the predefined time period has not expired, the smart card 81 checks again to see if the response has been received from the terminal 32.
  • Smart card programs are typically very difficult to develop and debug due to the lack of visibility into the cards necessitated b'y the strict security requirements of most smart card applications.
  • the ability of the smart card to drive the terminal allows one having ordinary skill in the art to develop debugging applications that are resident on the card and program test harnesses to exercise difficult to reach sections of smart card code.
  • Such applications can make use of a terminal display to provide internal state and runtime trace information to assist in debugging card resident applications.
  • a debugging routine ST101
  • the smart card outputs a result (ST102), such as, e.g., the number of rows and columns in the memory unit that passed the test.
  • the results are compared with a known or predefined number of good rows and columns (ST103) and the results are displayed on the terminal display (ST 104).
  • the user may use a terminal input device to select different sections of the smart card's program to execute.
  • Network games traditionally have suffered from a lack of security, which allows devious players to manipulate stored data to enhance game attributes to the detriment of other players. This can result in general dissatisfaction with the game itself.
  • the solution employed in some cases is to require all players to access a secure host computer which stores the gaming files; however, this slows down the host computer and limits the number of simultaneous players per game.
  • a game may be stored and executed entirely on the smart card. Such a game benefits from the secure environment provided by the smart card and does not require a secure host. This removes the limit on the number of simultaneous players.
  • each player may interact directly with other players and be confident that the gaming information stored on the opponent's smart card is free from tampering.
  • Solitaire games which reward high scores also are subject to such tampering by devious players, which has discouraged the deployment of such games.
  • these solitaire games can become more viable with dishonest play prevented and honest levels of achievement appropriately rewarded.
  • ** This program was written to demonstrate the display request command ** to control the OKI display. This program monitors the keypad, ** and toggles the segment corresponding to the two keys entered. ** The first key enters the row number (byte to be changed), and
  • ** the second key enters the column number (bit to be changed).
  • _OS.SendMessage (dispmapbuffer,OkiDevConst.DISP_MAP_CMD_LENGTH); _OS.GetMessag ⁇ (receiveddatabuffer,(byte)0x02,OkiDevConst.ACK_CODE);

Abstract

A smart card comprises a microcontroller, a memory unit, a storage unit, and a communications unit. The smart card may be connected to a terminal, which in turn may be connected to a host computer and/or a network. The smart card is configured to initiate communications with the terminal, which enables the smart card to control the terminal, host computer, or network and to access the resources connected to the terminal, host computer, or network. A communications protocol defines the commands that the smart card can send and allows the smart card to communicate using asynchronous or logical asynchronous communication.

Description

SMART CARD CONTROL OF TERMINAL AND NETWORKRESOURCES
This application claims the benefit *of the filing of U.S. Provisional Patent Application No. 60/051,326, filed June 30, 1997.
BACKGROUND OF THE INVENTION
The invention relates to smart cards, and in particular to smart card control of terminal and network resources.
Smart cards are used for a variety of applications including electronic game cards, identification badges, and data storage media such as electronic books. The smart cards are typically encased in a tamper-resistant, plastic or metal housing about the size of a credit card and contain one or more embedded integrated circuit devices. Terminals, such as ID verification systems and electronic video games, etc., are available with one or more smart card interfaces that permit connection of the smart card to the terminal.
In traditional systems, the terminals or terminal device accesses the smart card through standard protocols, such as the ISO 7816 protocol. These protocols usually limit the smart cards to the role of "slave", while the terminal or terminal device acts as the "master". This means that the smart card cannot initiate any action or communication, but can only respond to specific commands from the terminal. A prior art terminal typically starts in the idle state (ST11), as shown in FIG. 1. The terminal then transmits a command to the smart card (ST12), and then waits for a response (ST13). After receiving the response from the smart card (ST14), the terminal returns to the idle state (ST11). Similarly, as shown in FIG. 2, a prior art smart card begins with the smart card waiting for a command from the terminal (ST21). Upon receiving the command from the terminal (ST22), the smart card proceeds to prepare an appropriate response (ST23), transmits the response to the terminal (ST24), and returns to the wait state (ST21) to await the next command. Under the above scheme, there is no provision for the smart card to access resources controlled by the terminal. SUMMARY OF THE INVENTION
In general, in one aspect, the invention relates to a smart card system. The system has a terminal and a smart card that is connected to the terminal and configured to initiate communication with the terminal. The smart card communicates with the terminal using a communications protocol that enables asynchronous communications between the smart card and the terminal. For systems that do not support asynchronous communication, the communications protocol also enables logical asynchronous communications. The system further comprises means for establishing full-duplex or logical full-duplex communication between the smart card and the terminal. The terminal may be connected to a host computer which is in turn connected to a network. The smart card can access the resources connected to the terminal, the host computer, and the network.
In general, in another aspect, the invention relates to a smart card that has a communications circuit and a microcontroller. The microcontroller is configured to initiate communication with a terminal to which the smart card is connected. The smart card also has a storage unit that stores programs that are executed by the microcontroller and a memory unit that temporarily stores the programs. The terminal may be connected to a host computer and a network, and the smart card may access the resources connected to the terminal, the host computer, and the network. In general, in another aspect, the invention relates to a method of operating a smart card. The method comprises transmitting a command from the smart card to the terminal, waiting for a response from the terminal, and receiving the response from the terminal. The smart card initiates communication with the terminal. A communications protocol, which may be configured to be ISO 7816 compatible, allows the smart card to communicate asynchronously with the terminal, or logically asynchronously with the terminal in cases where the actual asynchronous communication is not available. Additionally, the communication may occur in full-duplex mode. If a response is not received within a predefined time period, the smart card re-transmits the command. The method also comprises requesting a list of available services from the terminal and selecting a command based on the list of services.
In general, in another aspect, the invention relates to a method of debugging a smart card. The method includes executing a diagnostic portion of a program stored on the smart card, receiving a result from the smart card, and comparing the result with an expected result. The method further includes displaying the result on a terminal display. Advantages of the invention include at least the following: smart card control of terminal, host computer, and network resources; smart card-initiated communication with a terminal, host computer, and network; and asynchronous communication between a smart card and a terminal, host computer, and network. Other advantages will become apparent from the below description and the following claims. BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a state machine diagram of a prior art terminal. FIG. 2 is a state machine diagram of a prior art smart card. FIG. 3 is a block diagram of a smart card system. FIG. 4 is a state machine diagram of the smart card of the present invention. FIG. 5 is a state machine diagram of the terminal of the present invention. FIG. 6 is a block diagram of a smart card communications scheme. FIG. 7 illustrates a smart card communications protocol. FIG. 8 is another embodiment of the smart card system.
FIG. 9 is a method of operating a smart card. FIG. 10 is another method of operating a smart card. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Throughout the description and the drawings, elements which are the same will be accorded the same reference numbers.
Referring to Fig. 3, a smart card systems 30 has a smart card 31 connected to a terminal 32 which has terminal resources 33 available. The terminal resources 33 may be very minimal, such as an input/output port for connecting to a host computer, or the resources 33 could be more extensive, for example, a keyboard, monitor, modem, cash dispenser, and other specialized resources.
In some systems, the smart card 31 and the terminal 32 operate independently of any other devices. This is exemplified by portable value checker products which allow a particular value in the smart card 31 to be displayed by the terminal, and portable Mondex transaction devices which allow two smart cards 31 to be connected to a single terminal 32, and to transfer data between the two cards 31.
In other systems, the terminal resources 33 connect the terminal 32 to a host computer 34, which has certain host computer resources 35 available. These resources could include a network connection, keyboard, monitor, hard disk, and other types of resources common to computers or specialized for a particular application. The smart card 31 can send commands to, and receive responses from, the host computer 34 through the terminal 32, and vice-versa.
The host computer 34 optionally can be connected to a network 36 if the host computer resources 35 include a network port. This allows the host computer 34 to gain access to network resources 37, which include other computers, printers, storage devices, and other potential resources, including for example resources available on the Internet. In such systems, the smart card 31 can be used as a tamper-resistant storage unit for network passwords, keys, certificates, electronic cash, and other information which the host computer 34 uses for network access, electronic commerce, and other types of network applications.
An advantage of the smart card 31 is that it is able to initiate communication with the terminal 32 and thereby become a "master" while the terminal 32 acts as a "slave", as illustrated in FIG. 4 and FIG. 5. Referring to FIG. 4, communications is in an idle state in the smart card 31 while the smart card 31 is processing data or waiting for some event to occur (ST41). When the smart card 31 needs to communicate with the terminal 32, it transmits a command (e.g., a display data command), or a message, or a packet of information to the terminal (ST42). After the transmission, the smart card 31 waits (ST43) until it receives a response (ST44) from the terminal 32 (e.g., an acknowledgement of the command). Once the response has been received, the smart card 31 returns to the idle state (ST41) until the card needs to communicate with the terminal 32" again. Under such a scheme, the smart card 31 may initiate communication with the terminal at any time. For example, if data or information from the terminal 32 which is needed by the smart card 31 to carry out a certain task is missing or incomplete, rather than remain in an idle state awaiting further data transfer, the smart card 31 can act proactively and request the missing information from the terminal 32.
Referring to FIG. 5, terminal 32 waits in an idle state for a command from the smart card 31 (ST51). When a command is detected, the terminal 32 receives the command and prepares an appropriate response (ST52 and ST53). The terminal 32 then transmits the response to the smart card 31 (ST54) and returns to the idle state to await receipt of another command (ST51).
In a similar way, the smart card 31 may access host computer resources 35 and network resources 37 by issuing, for example, a print command to a printer resource or a send network message command to a network messaging resource.
In some cases, it may be desirable to add time-out features to the smart card 31 so that if a response is not received in the allotted time, the smart card 31 takes alternative actions, such as re-transmitting the command or transmitting a different command.
It should be noted that the state machine diagrams of FIGS. 4 and 5 represent systems with only half-duplex communication between the smart card 31 and terminal 32. Alternative systems may, of course, be designed to support full-duplex communication between the smart card 31 and terminal 32. For example, referring to FIG. 6, full-duplex communication between the smart card 31 and the terminal 32 may be implemented using two conventional RS- 232 serial ports in both the smart card 31 and terminal 32. Serial ports 61 and 62 of the smart card 31 transmit and receive data to and from serial ports 63 and 64 in the terminal 32, respectively. Because the transmissions in one direction are independent in time relative to the transmissions in the other direction, the smart card 31 and the terminal 32 may communicate with each other asynchronously. In contrast, systems that have only half-duplex physical channels are generally limited to synchronous communication and typically require synchronous communication protocols, e.g., the ISO 7816 protocol. However, such a system may implement a special low level protocol which appears as an asynchronous protocol interface to the higher level protocols. This will allow the devices in the system to communicate with each other and with external devices using high level protocols which require asynchronous communications. For example, a "polling protocol" may be used with a smart card 31 and a terminal 32 that support the ISO 7816 half-duplex low level protocols. In the polling protocol, the terminal 32 has an obligation to send packets to the smart card 31 at the earliest possible opportunity. In the case where there is no terminal data to be sent, a special class of instruction code may be sent to indicate to the smart card 31 that this is only a polling packet. If the smart card 31 is ready to send data to the terminal 32, it sends a response to the terminal 32 containing a byte which indicates the length of the data the smart card 32 is ready to send. The terminal 32 then responds with a special packet having a length which is equal to the length indicated by the smart card 31. This then allows the smart card 31 to send its data to the terminal 32, effectively allowing the smart card 31 to initiate communication with the terminal 32. The polling may be repeated at the maximum rate that is supported by the terminal 32. Such a low level protocol may be augmented by marking each message in each direction with a unique identifier, for example, a sequence number. This allows the responses in either direction to be deferred and sent later using the sequence number to correlate with the original messages. For example, if the terminal sent a message requiring a response, at the low level protocol the smart card could continue communicating other messages back and forth. Then, when the desired response is ready, the smart card 31 marks the response with the identification number of the initiating message. When the terminal 32 receives the response, it correlates the response with the original message and returns the response value to the thread that initiated the message. Such a scheme also may permit the original thread to continue execution without waiting for the response, and allows the response to be passed back to the thread (or to another designated thread) using a callback mechanism. It will be appreciated that this logically presents what appears to be a full asynchronous interface to the higher level protocols.
Asynchronous communication between the smart card 31 and the terminal 32 allows more complex systems to be designed. For example, conventional packet protocols exist which would allow packets to be initiated by both the smart card 31 and terminal 32, which may result in multiple packets that are in various states of processing occurring at the same time. This permits the use of high level features such as multi-threaded communications and callbacks. In short, FIG. 4 and FIG. 5 are illustrative of the simplest state machines that implement smart card initiated communications, which is the key to this invention. It is well understood that other state machines for both half-duplex and full-duplex communications can be devised, as well as non- state based protocols, and are intended to fall within the scope of this invention if such communication protocols include card initiated communication. Since low level protocols based on this invention could allow asynchronous communication between the smart card 11 and the terminal 12, this can further enable high level communication protocols, such Remote Procedure Call and Remote Message Invocation, to be used. Such protocols can greatly enhance the value of the smart cards for many applications. In short, FIG. 4 and FIG. 5 illustrate only the simplest systems that implement smart card-initiated communications. Other systems having both half- duplex and full-duplex communications may be devised that, so long as they include smart card- initiated communication, are within the scope of the invention. In another embodiment, a communications protocol, shown generally at 70 in FIG. 7 and in more detail in TABLE 1, defines the commands that the smart card can initiate with respect to the terminal, host computer, or network. The communications protocol 70 uses ISO 7816 escape commands with the existing ISO 7816 protocol to generate a new set of smart card-initiated commands. The use of the ISO 7816 escape commands allows the communications protocol 70 to retain backwards compatibility with standard ISO 7816 commands. Each command in the communications protocol 70 is comprised of the following ISO 7816 fields: a class (CLA) field 71, an instruction (LNS) field 72, a first parameter (PI) field 73, a second parameter (P2) field 74, and a data (Data) field 75. Not every field is required for every command and some fields may be either left empty or filled with a null value. The fields themselves are standard ISO 7816 fields well known to one having ordinary skill in the art and will not be described here.
The commands of the communications protocol 70 may be defined broadly such that not every terminal, host computer, network, or the resources connected thereto will have the service requested. When a particular service is not available, the communications protocol 70 includes an error message which may be sent back to the smart card to indicate that the requested service is not available. In one embodiment, the communications protocol 70 includes a query command so that the smart card can query the terminal, host computer, or network to determine which services are available. In addition, the communications protocol 70 may use a global naming convention (e.g., the Domain Name' Service (DNS)) such that the smart card may specify a particular resource on a global basis.
Referring to TABLE 1, the commands defined in the communications protocol 70 include the following: Display Request, Activate Input Scan, Request Data Length in Buffer, Request Data in Buffer, Activate Secure ID Entry, Query Resources, and Send Network Message. The Display Request command allows the smart card to display information on the terminal, host computer, or network display device. A Java program implementing this command using the standard Java Card 1.0 specification is shown in Appendix A. The Activate Input Scan command scans for user input. The Request Data Length in Buffer command, which may be executed at any time, determines the length of the data in the input buffer. The Request Data in Buffer command reads the data entered in the terminal, host computer, or network input buffer. The Request a Secure ID Entry command requests identification information such as a username, password, or biometrics information such as a thumbprint or voiceprint. The Query Resources command, as indicated above, queries the terminal, host computer, or network for available services and resources. This command may also be used to determine other information such as available user input devices, secure ID devices, network connectivity, data files, database availability, and other types of services were resources. The Send Network Message command sends a message to a network computer which is identified by the standard DNS node ED convention. This command is sent from the smart card to the host computer, which must either receive and execute this command or return an error response to the smart card. If the network computer identified is the host computer, then the command is executed locally. Otherwise, the host computer routes the command through the network to the identified network computer.
TABLE 1
Communications protocol: Mapping To ISO 7816 Escape Commands
Figure imgf000013_0001
The communications protocol 70 may, of course, be expanded as required to support other services. Furthermore, for systems that use full-duplex communication between the smart card and the terminal and do not require ISO 7816 compatibility, standard asynchronous callback mechanisms can be added to the protocol to expand functionality and improve performance greatly. For example, instead of sending a network message and waiting for a response, the smart card can continue normal processing. Once the response has been prepared by the DNS node that received the message, an asynchronous response message can be sent to the smart card. Other half-duplex and full-duplex communications protocols can be devised readily and are intended to fall within the scope of this invention if such communications protocols include card initiated communication. For example, a logical full-duplex scheme may be devised for systems that do not have actual full-duplex. Referring to FIG. 8, another embodiment of a smart card system 80 comprises a smart card 81 connected to a smart card terminal 32. The smart card 81 has an embedded microcontroller 82, memory unit 83, and storage unit 84, all of which are interconnected. The microcontroller 82 executes smart card software and programs, carries out terminal instructions, and generally manages the flow of data to and from the smart card 81. In some embodiments, the microcontroller 82 may include a microprocessor (e.g., a 68HC05), a programmable array logic (PAL), an application-specific integrated circuit (ASIC), and/or other integrated circuit devices. The memory unit 83, which may include a random- access-memory (RAM), temporarily stores software and data used by the microcontroller 82 during program execution. The storage unit 84, which may include a read-only memory (ROM), stores the basic program codes and data that are needed to configure and operate the smart card 31. New or updated codes and data may be downloaded or programmed into the smart card 81 from time to time to upgrade the smart card 81. The smart card 81 also has a communications unit 85 that is connected to the microcontroller 82 and allows the microcontroller 82 to transfer data to and from the terminal 32 and other external devices. Although shown as separate blocks, the microcontroller 82, memory unit 83, storage unit 84, and communications unit 85 may be combined into a single integrated circuit device or an otherwise reduced or expanded number of separate IC devices. The smart card 81 is connected to the terminal 32 by a smart card interface 86 which facilitates communication between the smart card 81 and the terminal 32. The interface 86 typically includes a smart card reader or reader/writer and a power supply, such as a battery, (not shown) that provides power to the smart card 81. In some embodiments, the interface 86 physically engages the smart card 81. In other embodiments, however, the interface 86 may use inductive, capacitive, or optical coupling, or the interface 86 may use radio frequency signals to connect the smart card 81 to the terminal 32.
In operation, the smart card 81 is able to access and control the terminal 32 and terminal resources 33 by initiating communication with the terminal 32 and terminal resources 33, contrary to conventional smart cards that only respond to received commands. Referring to FIG. 9, communication between the smart card 31 and the terminal 36 is established, for example, via an electronic handshake or series of handshakes (ST91). The smart card 81 than requests a list of available services from the terminal 32 (ST92). The list of services may vary depending on the type of terminal 32 (e.g., a video game, security system, etc.) and terminal resources 33. Once the list of available services or commands is received from the terminal 32 (ST93), the smart card 81 sends a command to the terminal 32 based on the services that are available (ST94). The smart card 81 then checks to see if a response to the command has been received from the terminal 32 (ST95). If a response has been received, the smart card 81 encrypts (ST97) and stores (ST98) any data received from the terminal 32, and prepares itself to send another command to the terminal 32 (ST94). If not, the smart card 81 checks to see if a predefined time period has expired or timed out (ST96). If the predefined time period has expired, then the smart card 81 re-transmits the command to the terminal 32 (ST94). If the predefined time period has not expired, the smart card 81 checks again to see if the response has been received from the terminal 32.
The smart cards described above facilitate a wide range of new and innovative smart card applications heretofore unrealizable with conventional smart card architectures. Three such applications are disclosed below.
Smart card programs are typically very difficult to develop and debug due to the lack of visibility into the cards necessitated b'y the strict security requirements of most smart card applications. The ability of the smart card to drive the terminal allows one having ordinary skill in the art to develop debugging applications that are resident on the card and program test harnesses to exercise difficult to reach sections of smart card code. Such applications can make use of a terminal display to provide internal state and runtime trace information to assist in debugging card resident applications. Referring to FIG. 10, one such application begins with executing a debugging routine (ST101), for example, a memory test routine. After running the routine, the smart card outputs a result (ST102), such as, e.g., the number of rows and columns in the memory unit that passed the test. The results are compared with a known or predefined number of good rows and columns (ST103) and the results are displayed on the terminal display (ST 104). In some embodiments, the user may use a terminal input device to select different sections of the smart card's program to execute.
Network games traditionally have suffered from a lack of security, which allows devious players to manipulate stored data to enhance game attributes to the detriment of other players. This can result in general dissatisfaction with the game itself. The solution employed in some cases is to require all players to access a secure host computer which stores the gaming files; however, this slows down the host computer and limits the number of simultaneous players per game. With a smart card that is able to interact fully with the user and the network, a game may be stored and executed entirely on the smart card. Such a game benefits from the secure environment provided by the smart card and does not require a secure host. This removes the limit on the number of simultaneous players. Also, each player may interact directly with other players and be confident that the gaming information stored on the opponent's smart card is free from tampering. Solitaire games which reward high scores also are subject to such tampering by devious players, which has discouraged the deployment of such games. However, with the game and data files, including the prize validation information, stored securely and executed in a smart card, these solitaire games can become more viable with dishonest play prevented and honest levels of achievement appropriately rewarded.
It is to be understood that the embodiments described above are merely illustrative and that other arrangements can be devised by one of ordinary skill in the art at the time the invention was made without departing from the scope of the invention.
APPENDIX A
/*
** Oki Dev Program - Written by Michael Montgomery 4/10/97 ** Copyright © 1997 Schlumberger Austin Products Center, ** Schlumberger Technologies, Austin, Texas, USA. ** All Rights Reserved.
**
** This program was written to demonstrate the display request command ** to control the OKI display. This program monitors the keypad, ** and toggles the segment corresponding to the two keys entered. ** The first key enters the row number (byte to be changed), and
** the second key enters the column number (bit to be changed).
**
** Pressing the Cancel key, immediately followed by Unlock key, ** cancels autoexecution of this program. **
** Any other keypress is ignored.
**
*/ public class OkiDev { public static void main(String args[]) {
// Send back the Answer To Reset (ATR) _OS.SendATR();
// Allocate command buffers byte[] keyscanbuffer = new byte[OkiDevConst.KEY_SCAN_CMD_LENGTH]; byte[] keydatabuffer = new byte[OkiDevConst.KEY DATA_CMD_LENGTH]; byte[] dispmapbuffer = new bvte[OkiDevConst.DISP_MAP_CMD_LENGTH];
// Allocate receive buffers byte[] receiveddatabuffer = new byte[OkiDevConst.RECEIVED_DATA_LENGTH]; // Build display command buffers dispmapbuffer[0] = OkiDevConst.ISO_ESCAPE; dispmapbuffer[l] = OkiDevConsLlNS_LCD_DISPLAY; dispmapbuffer[2] = OkiDevConst.DISPLAY_SEGMENT_MAP; dispmapbuffer[3] = OkiDevConst.DISP_MAP_DATA_LENGTH; dispmapbuffer[4] = (byte)OxFF; dispmapbuffer[5] = (byte)OxFF; dispmapbuffer[6] = (byte)OxFF; dispmapbuffer[7] = (byte)OxFF; dispmapbuffer[8] = (byte)OxFF; dispmapbuffer[9] = (byte)OxFF; dispmapbuffeτ[10] = (byte)OxFF; dispmapbuffer[l 1] = (byte)OxFF; dispmapbuffer[12] = (byte)OxFF; dispmapbuffer[13] = (byte)OxFF; dispmapbuffer[14] = (byte)OxFF; dispmapbuffer[15] = (byte)OxFF; dispmapbuffer[16] = (byte)OxFF; dispmapbuffer[17] = (byte)OxFF; dispmapbuffer[18] = (byte)OxFF; dispmapbuffer[19] = (byte)OxFF;
// Build key pad command buffers keyscanbuffer[0] = OkiDevConst.ISOJESCAPE; keyscanbufferfl] = OkiDevConst.INS_KEY_SCAN; keyscanbuffer[2] = OkiDevConst.PARAM_UNUSED; keyscanbuffer[3] = OkiDevConst.PARAM_UNUSED; keydatabuffer[0] = OkiDevConst.ISO_ESCAPE; keydatabuffer[l] = OkiDevConst.INS_KEY_DATA; keydatabuffer[2] = OkiDevConst.PARAM_UNUSED; keydatabuffer[3] = OkiDevConst.PARAM_UNUSED;
// Initialize to send key scan command receiveddatabuffer[0] = 1; byte inputkey;
// Initialize unlock sequence: if cancel and unlock keys are pressed sequentially, // the card cancels automatic execution of this test program. To continue use // of this test program after this requires reselection of this program as // auto-execute in the development environment This provision is made to // (hopefully) permit reuse and redownloading of this card in the event that
// either the test program has a bug, or the test program is not longer needed // and the card can be reused for another purpose. boolean cancelpressed = false;
// Initialize bit masks - selects appropriate bit to toggle byte[] mask = new byte[8]; mask[0] = (byte)0x01; mask[l] = (byte)0x02 mask[2] = (byte)0x04 mask[3] = (byte)0x08 mask[4] = (byte)0xl0: mask[5] = (byte)0x20 mask[6] = (byte)0x40 mask[7] = (byte)0x80 boolean firstkey = true; byte firstvalue = 0; // Light all segments
_OS.SendMessage(dispmapbuffer,OkiDevConst.DISP_MAP_CMD_LENGTH); _OS.GetMessage(receiveddatabuffer,(byte)0x02,OkiDevConst.ACK_CODE); // Ignore status reply boolean getmoredata = true;
//Main Loop (do forever) do {
// Set up to buffer keystrokes if (getmoredata) {
_OS.SendMessage(keyscanbuffer,OkiDevConst.KEY_SCAN_CMD_LENGTH); _OS.GetMessage(receiveddatabuffer,(byte)0x02,OkiDevConst.ACK_CODE); getmoredata = false;
}
// Get control keystroke (ignore all but first) _OS.SendMessage(keydatabuffer,OkiDevConst.KEY_DATA_CMD_LENGTH);
_OS.GetMessage(receiveddatabuffer,OkiDevComt.RECEIVED_DATA_LENGTH,OkiDevConst.ACK_CODE); // Select buffer to display
• if(receiveddatabuffer[0] != 0)
{ getmoredata = true; inputkey = receiveddatabuffer[l]; if (inputkey = OkiDevConst.KEY_CODE_CANCEL)
{ cancelpressed = true;
} else if (inputkey = OkiDevConst.KEY_CODE_UNLOCK)
{ if (cancelpressed) _OS.Execute((short)0, (byte)0);
} else
{ cancelpressed = false; if (firstkey)
{ if ((inputkey < 0x10) && (inputkey >= 0))
{ firstvalue = inputkey; firstkey = false; } } else
{ firstkey = true; if ((inputkey < 8) && (inputkey >= 0))
{
// Toggle display segment specified dispmapbuffer[5 + firstvalue] Λ= maskf inputkey];
// Display current map buffer
_OS.SendMessage(dispmapbuffer,OkiDevConst.DISP_MAP_CMD_LENGTH); _OS.GetMessagς(receiveddatabuffer,(byte)0x02,OkiDevConst.ACK_CODE);
}
}
} while (true);
}
public interface OkiDevConst{ // Constants used throughout the program static final byte DISP_MAP_DATA_LENGTH = (byte) 16; static final byte DISP_MAP_CMD_LENGTH = DISP_MAP_DATA_LENGTH + (byte)4; static final byte KEY_SCAN_CMD_LENGTH = (byte)4; static final byte KEY_DATA_CMD_LENGTH = (byte)4; static final byte ISO_ESCAPE = (byte)OxDO; static final byte INS_LCD_DISPLAY = (byte)OxEO; static final byte INS_KEY_SCAN = (byte)0xEl; static final byte INS_KEY_D ATA = (byte)0xE3 ; static final byte PARAM JNUSED = (byte)OxOO; static final byte DISPLA Y_FDOED_POINT = (byte)θxθ 1 ; static final byte DISPLAY_HEXADECIMAL = (byte)0x02; static final byte DISPLAY_SEGMENT_MAP = (byte)0x03 ; static final byte KEY_CODE_CANCEL = (byte)0xF2; static final byte KEY_CODE_UNLOCK = (byte)OxF 1 ; static final byte RECEIVED_DATA_LENGTH = (byte)3; static final byte ACK_CODE = (byte)O;
}

Claims

What is claimed is: 1. A smart card system, comprising: a terminal; and a smart card connected to the terminal and configured to initiate communication with the terminal.
2. The smart card system of claim 1, further comprising a communications protocol that enables asynchronous communications between the smart card and the terminal.
3. The smart card system of claim 2, further comprising a communications protocol that enables logical asynchronous communication between the smart card and the terminal.
4. The smart card system of claim 1, wherein the smart card accesses terminal resources connected to the terminal.
5. The smart card system of claim 1, wherein the terminal is connected to a host computer.
6. The smart card system of claim 5, wherein the smart card accesses host computer resources connected to the host computer.
7. The smart card system of claim 1, wherein the terminal is connected to a network.
8. The smart card system of claim 7, wherein the smart card accesses network resources connected to the network.
9. The smart card system of claim 1 , further comprising a means for establishing communication between the smart card and the terminal.
10. The smart card system of claim 9, wherein the means for establishing communication includes means for establishing full-duplex communication.
11. A smart card, comprising; a communications circuit; and a microcontroller connected to the communications circuit and configured to initiate communication with a terminal to which the smart card is connected.
12. The smart card of claim 1, further comprising a storage unit having a program stored therein.
13. The smart card of claim 12, wherein the microcontroller executes the program stored in the storage unit.
14. The smart card of claim 13, further comprising a memory unit, wherein the microcontroller temporarily stores the program in the memory unit.
15. The smart card of claim 11, wherein the terminal has terminal resources connected thereto and the microcontroller accesses the terminal resources.
16. The smart card of claim 11, wherein the terminal is connected to a host computer.
17. The smart card of claim 16, wherein the host computer has host computer resources connected thereto and the microcontroller accesses the host computer resources.
18. The smart card of claim 11 , wherein the terminal is connected to a network.
19. The smart card of claim 18, wherein the network has network resources connected thereto and the microcontroller accesses the network resources.
20. A method of operating a smart card, comprising; transmitting a command from the smart card to the teπ inal; waiting for a response from the terminal; and receiving the response from the terminal.
21. The method of claim 20, wherein the smart card initiates communication with the terminal.
22. The method of claim 20, further comprising a communications protocol that includes a class field, an instruction field, a first parameter field, a second parameter field, and a data field.
23. The method of claim 22, wherein the communications protocol is ISO 7816 compatible.
24. The method of claim 20, wherein transmitting the command and receiving the response occur asynchronously.
25. The method of claim 20, wherein transmitting the command and receiving the response occur logically asynchronously.
26. The method of claim 20, wherein transmitting the command and receiving the response occur in full-duplex.
27. The method of claim 20, further comprising re-transmitting the command if no response is received from the terminal within a predefined time period.
28. The method of claim 20, further comprising requesting a list of available services from the terminal.
29. The method of claim 28, wherein the command is selected from the list of available services.
30. A method of debugging a smart card, comprising: executing a diagnostic portion of a program stored on the smart card; receiving a result from the smart card; and comparing the result to an expected result.
31. The method of claim 30, further comprising displaying the result on a display.
PCT/IB1998/001162 1997-06-30 1998-06-30 Smart card control of terminal and network resources WO1999001960A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
DE69826009T DE69826009T2 (en) 1997-06-30 1998-06-30 SMART CARD CONTROL OF TERMINAL AND NETWORKING DEVICES
EP98935222A EP1002291B1 (en) 1997-06-30 1998-06-30 Smart card control of terminal and network resources
AU84568/98A AU8456898A (en) 1997-06-30 1998-06-30 Smart card control of terminal and network resources

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US5132697P 1997-06-30 1997-06-30
US60/051,326 1997-06-30
US09/107,033 1998-06-29
US09/107,033 US6157966A (en) 1997-06-30 1998-06-29 System and method for an ISO7816 complaint smart card to become master over a terminal

Publications (2)

Publication Number Publication Date
WO1999001960A2 true WO1999001960A2 (en) 1999-01-14
WO1999001960A3 WO1999001960A3 (en) 1999-04-29

Family

ID=26729305

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB1998/001162 WO1999001960A2 (en) 1997-06-30 1998-06-30 Smart card control of terminal and network resources

Country Status (5)

Country Link
US (2) US6157966A (en)
EP (1) EP1002291B1 (en)
AU (1) AU8456898A (en)
DE (1) DE69826009T2 (en)
WO (1) WO1999001960A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001093216A1 (en) * 2000-05-31 2001-12-06 France Telecom Cryptography method and smart card microcircuit
WO2001099038A1 (en) * 2000-06-20 2001-12-27 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e. V. Control of communication in access and entry systems
WO2002039369A1 (en) * 2000-11-10 2002-05-16 Cp8 Technologies Communication protocol between a proactive smart card and its host terminal
WO2003085594A1 (en) 2002-04-08 2003-10-16 Nokia Corporation Mobile terminal featuring smart card interrupt
WO2004001657A1 (en) * 2002-06-20 2003-12-31 Infineon Technologies Ag System for the data exchange between at least two contactless data carriers
FR2862407A1 (en) * 2003-11-14 2005-05-20 Iteon Communication protocol for smart card and terminal enables execution of tasks in terminal or card, and communication of results
FR2873218A1 (en) * 2004-05-14 2006-01-20 Infineon Technologies Ag COMMUNICATION SYSTEM
EP1719288A1 (en) * 2004-02-27 2006-11-08 Research In Motion Limited System and method for communicating asynchronously with web services using message set definitions
US8498898B1 (en) * 1999-03-19 2013-07-30 Citicorp Development Center, Inc. System and method for point of use reward determination

Families Citing this family (105)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6453377B1 (en) * 1998-06-16 2002-09-17 Micron Technology, Inc. Computer including optical interconnect, memory unit, and method of assembling a computer
FR2782435B1 (en) * 1998-08-13 2000-09-15 Bull Cp8 COMMUNICATION METHOD BETWEEN A USER STATION AND A NETWORK, PARTICULARLY AN INTERNET TYPE, AND IMPLEMENTATION ARCHITECTURE
TW460847B (en) * 1998-08-26 2001-10-21 Hitachi Ltd IC card, terminal apparatus and service management server
ATE343169T1 (en) * 1998-08-31 2006-11-15 Irdeto Access Bv SYSTEM FOR SUPPLYING ENCRYPTED DATA, SYSTEM FOR DECRYPTING ENCRYPTED DATA AND METHOD FOR PROVIDING A COMMUNICATIONS INTERFACE IN SUCH A SYSTEM
JP2002526836A (en) * 1998-09-30 2002-08-20 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Data carrier equipment
US6591229B1 (en) * 1998-10-09 2003-07-08 Schlumberger Industries, Sa Metrology device with programmable smart card
US6425003B1 (en) * 1999-01-22 2002-07-23 Cisco Technology, Inc. Method and apparatus for DNS resolution
US6581206B2 (en) * 1999-11-12 2003-06-17 Sun Microsystems, Inc. Computer program language subset validation
US7200842B1 (en) * 1999-02-02 2007-04-03 Sun Microsystems, Inc. Object-oriented instruction set for resource-constrained devices
FI106495B (en) * 1999-04-12 2001-02-15 Nokia Mobile Phones Ltd network element
US6938244B1 (en) * 1999-05-11 2005-08-30 Microsoft Corp. Interlaced protocol for smart card application development
US6577229B1 (en) * 1999-06-10 2003-06-10 Cubic Corporation Multiple protocol smart card communication device
FR2797968B1 (en) * 1999-08-24 2001-10-12 Schlumberger Systems & Service DEVICE AND METHOD FOR LOADING CONTROLS IN AN INTEGRATED CIRCUIT CARD
US8243929B2 (en) * 1999-09-13 2012-08-14 Igt Gaming terminal and system with biometric identification
WO2001048580A2 (en) * 1999-12-27 2001-07-05 Arthur Swanberg A computerized trading card system
FR2803674B1 (en) * 2000-01-12 2002-04-19 Schlumberger Systems & Service ELECTRONIC CHIP FOR PORTABLE OBJECT
FR2804819B1 (en) * 2000-02-03 2002-05-03 Gemplus Card Int TIME MANAGEMENT AT COMMUNICATION LEVEL FOR CHIP CARD TYPE ENTITIES
US7187924B2 (en) 2000-02-08 2007-03-06 Fitsense Technology, Inc. Intelligent data network with power management capabilities
US20020099953A1 (en) * 2000-11-30 2002-07-25 International Business Machines Corporation Debugging of chipcards
US20020129259A1 (en) * 2001-03-06 2002-09-12 Chatterton Scott Johnson System and method for accessing peripheral devices
US20030018523A1 (en) * 2001-07-20 2003-01-23 Ethan Rappaport Rewards program using electronically encoded instruments
US6779059B2 (en) * 2001-08-21 2004-08-17 O2Micro International Limited Reconfigurable flash media reader system
JP2003069573A (en) * 2001-08-23 2003-03-07 Allied Tereshisu Kk System and method for managing network equipment using information recording medium
JP2003087238A (en) * 2001-09-11 2003-03-20 Hitachi Ltd Security realizing system in domestic network
US20030064812A1 (en) * 2001-10-02 2003-04-03 Ethan Rappaport Smart card enhanced toys and games
US7092915B2 (en) * 2002-01-07 2006-08-15 International Business Machines Corporation PDA password management tool
US7506172B2 (en) * 2002-01-07 2009-03-17 Igt Gaming device with biometric system
US7976384B2 (en) 2002-02-27 2011-07-12 Igt Contactless card reading in a gaming machine
FR2836611A1 (en) * 2002-02-28 2003-08-29 Bull Sa Network communication method for distributed software architecture, involves storing asynchronous messages sent by card agent to standard agent or vice-versa in storage unit of network by intermediate agent
US20030177366A1 (en) * 2002-03-18 2003-09-18 Sun Microsystem, Inc., A Delaware Corporation Method and apparatus for dynamic personal identification number management
EP1369762A1 (en) * 2002-05-29 2003-12-10 Dialog Semiconductor GmbH Active subscriber information module
US7167843B2 (en) * 2002-06-05 2007-01-23 Sun Microsystems, Inc. Apparatus for private personal identification number management
US7162456B2 (en) * 2002-06-05 2007-01-09 Sun Microsystems, Inc. Method for private personal identification number management
JP4326189B2 (en) * 2002-06-10 2009-09-02 健 坂村 Autonomous IC card and communication system
US20040059913A1 (en) * 2002-09-13 2004-03-25 Sun Microsystems, Inc., A Delaware Corporation Accessing for controlled delivery of digital content in a system for digital content access control
US20040083370A1 (en) * 2002-09-13 2004-04-29 Sun Microsystems, Inc., A Delaware Corporation Rights maintenance in a rights locker system for digital content access control
US7913312B2 (en) 2002-09-13 2011-03-22 Oracle America, Inc. Embedded content requests in a rights locker system for digital content access control
US7380280B2 (en) * 2002-09-13 2008-05-27 Sun Microsystems, Inc. Rights locker for digital content access control
US7363651B2 (en) 2002-09-13 2008-04-22 Sun Microsystems, Inc. System for digital content access control
US20040059939A1 (en) * 2002-09-13 2004-03-25 Sun Microsystems, Inc., A Delaware Corporation Controlled delivery of digital content in a system for digital content access control
US7398557B2 (en) * 2002-09-13 2008-07-08 Sun Microsystems, Inc. Accessing in a rights locker system for digital content access control
US20040054629A1 (en) * 2002-09-13 2004-03-18 Sun Microsystems, Inc., A Delaware Corporation Provisioning for digital content access control
US7240365B2 (en) * 2002-09-13 2007-07-03 Sun Microsystems, Inc. Repositing for digital content access control
US20040064719A1 (en) * 2002-09-13 2004-04-01 Sun Microsystems, Inc., A Delaware Corporation Accessing for digital content access control
ITTO20020939A1 (en) * 2002-10-30 2004-04-30 Tecnost Sistemi S P A DISTRIBUTED SYSTEM FOR ISSUE OF VALUES AND SECURITIES
US7392404B2 (en) * 2002-12-20 2008-06-24 Gemalto, Inc. Enhancing data integrity and security in a processor-based system
US7867083B2 (en) 2003-03-25 2011-01-11 Igt Methods and apparatus for limiting access to games using biometric data
US8123616B2 (en) 2003-03-25 2012-02-28 Igt Methods and apparatus for limiting access to games using biometric data
US20040199787A1 (en) * 2003-04-02 2004-10-07 Sun Microsystems, Inc., A Delaware Corporation Card device resource access control
US7577849B2 (en) * 2003-04-02 2009-08-18 Microsoft Corporation Keyed-build system for controlling the distribution of software
GB2400196A (en) * 2003-04-02 2004-10-06 Nec Technologies Restricting access to a mobile phone, laptop etc. using an authorization procedure involving a separate transceiver
US7823133B2 (en) * 2003-04-23 2010-10-26 Stmicroelectronics, Inc. Smart card device and method for debug and software development
US6783078B1 (en) 2003-05-09 2004-08-31 Stmicroelectronics, Inc. Universal serial bus (USB) smart card having read back testing features and related system, integrated circuit, and methods
US7080789B2 (en) * 2003-05-09 2006-07-25 Stmicroelectronics, Inc. Smart card including a JTAG test controller and related methods
US7181649B2 (en) * 2003-05-09 2007-02-20 Stmicroelectronics, Inc. Universal serial bus (USB) smart card having enhanced testing features and related system, integrated circuit, and methods
US7373522B2 (en) * 2003-05-09 2008-05-13 Stmicroelectronics, Inc. Smart card with enhanced security features and related system, integrated circuit, and methods
US7143224B2 (en) * 2003-05-09 2006-11-28 Stmicroelectronics, Inc. Smart card for performing advance operations to enhance performance and related system, integrated circuit, and methods
US7369982B2 (en) * 2003-06-04 2008-05-06 Stmicroelectronics, Inc. Multi-mode smart card emulator and related methods
AU2003260500A1 (en) * 2003-09-09 2005-03-29 Pirelli And C. S.P.A. Method and system for remote card access, computer program product therefor
US7155548B2 (en) * 2003-11-04 2006-12-26 Texas Instruments Incorporated Sequential device control with time-out function
US7941660B2 (en) * 2003-11-13 2011-05-10 Gemalto Sa System and method for data communications allowing slave device to be network peers
CN1294490C (en) * 2003-12-31 2007-01-10 宏碁股份有限公司 Data processing method between smart card having multiple application program and terminal machine
US7828652B2 (en) 2004-02-12 2010-11-09 Igt Player verification method and system for remote gaming terminals
US7191288B2 (en) 2004-02-24 2007-03-13 Sun Microsystems, Inc. Method and apparatus for providing an application on a smart card
US7165727B2 (en) * 2004-02-24 2007-01-23 Sun Microsystems, Inc. Method and apparatus for installing an application onto a smart card
US7140549B2 (en) 2004-02-24 2006-11-28 Sun Microsystems, Inc. Method and apparatus for selecting a desired application on a smart card
US7374099B2 (en) 2004-02-24 2008-05-20 Sun Microsystems, Inc. Method and apparatus for processing an application identifier from a smart card
DE102004015535B4 (en) * 2004-03-30 2009-01-29 Infineon Technologies Ag Data transmission interface and method
US7328849B2 (en) * 2004-04-21 2008-02-12 Stmicroelectronics, Inc. Smart card providing data mapping for multiple applications and related methods
US8234421B2 (en) * 2004-04-21 2012-07-31 Stmicroelectronics, Inc. Smart card with selectively allocatable data buffers and associated methods
US8046508B2 (en) 2004-04-21 2011-10-25 Stmicroelectronics, Inc. Smart card with self-detachment features and related methods
US7904607B2 (en) * 2004-04-21 2011-03-08 Stmicroelectronics, Inc. Smart card with self-reconfiguration features and related methods
US20050263596A1 (en) * 2004-05-12 2005-12-01 Solicore, Inc. Portable charger, including portable sleeve, for an electronically readable card
GR1005023B (en) * 2004-07-06 2005-10-11 Atmel@Corporation Method and system for rnhancing security in wireless stations of local area network (lan)
EP1630712A1 (en) * 2004-08-24 2006-03-01 Sony Deutschland GmbH Method for operating a near field communication system
FR2878677B1 (en) * 2004-11-30 2007-02-02 Gemplus Sa APPLICATION SERVICE COMMUNICATION FROM A MICROCONTROLLER CARD TO A TERMINAL
WO2006086729A1 (en) * 2005-02-11 2006-08-17 Axalto, Inc. System and method for data communications allowing slave devices to be network peers
US20060214003A1 (en) * 2005-03-15 2006-09-28 Neil Morrow Method and apparatus for contactless ICC connectivity
WO2006111781A1 (en) 2005-04-18 2006-10-26 Nokia Corporation Storage card having selectable contact elements and method of its operation
KR20130069853A (en) * 2005-05-19 2013-06-26 넥스테스트 시스템즈 코포레이션 System for testing smart cards and method for same
US7506804B2 (en) * 2005-05-27 2009-03-24 U.S. Bancorp Licensing, Inc. System and method for an integrated payment and reward card
KR100729755B1 (en) * 2005-08-25 2007-06-20 주식회사 엠픽사 Complex memory card having function of communication and the method thereof
JP4979912B2 (en) * 2005-08-31 2012-07-18 フェリカネットワークス株式会社 Information processing system, client, server, program, information processing method
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US7853987B2 (en) * 2006-10-10 2010-12-14 Honeywell International Inc. Policy language and state machine model for dynamic authorization in physical access control
US8166532B2 (en) * 2006-10-10 2012-04-24 Honeywell International Inc. Decentralized access control framework
US20080155239A1 (en) * 2006-10-10 2008-06-26 Honeywell International Inc. Automata based storage and execution of application logic in smart card like devices
EP1927939A1 (en) * 2006-11-30 2008-06-04 Cassis International PTE Ltd. Secure MMC standard smartcard with multi-application operation capability, process of operation
US8213902B2 (en) * 2007-08-02 2012-07-03 Red Hat, Inc. Smart card accessible over a personal area network
US8219804B2 (en) * 2007-09-13 2012-07-10 Ricoh Company, Ltd. Approach for managing device usage data
US9092387B2 (en) 2008-12-10 2015-07-28 Micron Technology, Inc. Non-volatile memory device capable of initiating transactions
US9032058B2 (en) 2009-03-13 2015-05-12 Assa Abloy Ab Use of SNMP for management of small footprint devices
US20100235900A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Efficient two-factor authentication
US8342415B2 (en) * 2010-03-17 2013-01-01 Inside Secure Method of conducting a transaction using an NFC device
FR2957173B1 (en) * 2010-03-04 2013-10-18 Inside Contactless METHOD FOR CONDUCTING A TRANSACTION USING AN NFC DEVICE
CN102082667B (en) * 2010-11-17 2013-11-13 曙光云计算技术有限公司 Method for switching master mode and slave mode of encryption card and encryption card
CN102542688A (en) * 2010-12-28 2012-07-04 中国银联股份有限公司 Electronic payment device and electronic payment system using same
US9043796B2 (en) * 2011-04-07 2015-05-26 Microsoft Technology Licensing, Llc Asynchronous callback driven messaging request completion notification
CN102521779A (en) * 2011-12-26 2012-06-27 东信和平智能卡股份有限公司 Electronic transaction smart card and electronic transaction system
KR101272582B1 (en) * 2012-11-14 2013-06-28 주식회사 하이소닉 Smart toy drive system for portable device
US20160379017A1 (en) * 2013-12-27 2016-12-29 Intel Corporation Apparatus, system and techniques for a smart card computing device and associated host devices
US9324065B2 (en) 2014-06-11 2016-04-26 Square, Inc. Determining languages for a multilingual interface
US10496975B2 (en) 2014-07-23 2019-12-03 Square, Inc. Point of sale system with secure and unsecure modes
US11080674B1 (en) 2014-09-19 2021-08-03 Square, Inc. Point of sale system
US11080675B1 (en) 2015-09-08 2021-08-03 Square, Inc. Point-of-sale system having a secure touch mode

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4777355A (en) * 1986-12-24 1988-10-11 Mitsubishi Denki Kabushiki Kaisha IC card and system for checking the functionality thereof
EP0356237A2 (en) * 1988-08-26 1990-02-28 Hitachi Maxell Ltd. Integrated Circuit Card
EP0427465A2 (en) * 1989-11-09 1991-05-15 AT&T Corp. Databaseless security system
FR2667419A1 (en) * 1990-10-02 1992-04-03 Gemplus Card Int Memory-card application-program debugging process and debugging system
FR2701133A1 (en) * 1993-02-04 1994-08-05 Gemplus Card Int Method of communication with a portable medium.
EP0662674A1 (en) * 1994-01-10 1995-07-12 France Telecom Transactions system comprising terminals and memory cards and corresponding memory cards

Family Cites Families (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3977785A (en) * 1975-01-06 1976-08-31 Xerox Corporation Method and apparatus for inhibiting the operation of a copying machine
FR2386080A1 (en) * 1977-03-31 1978-10-27 Cii Honeywell Bull ACCOUNTING SYSTEM FOR PREDETERMINED HOMOGENEOUS UNITS
US4278837A (en) * 1977-10-31 1981-07-14 Best Robert M Crypto microprocessor for executing enciphered programs
US4168396A (en) * 1977-10-31 1979-09-18 Best Robert M Microprocessor for executing enciphered programs
US4465901A (en) * 1979-06-04 1984-08-14 Best Robert M Crypto microprocessor that executes enciphered programs
US4631666A (en) * 1982-10-25 1986-12-23 Burroughs Corporation Data transfer network for variable protocol management
US4926480A (en) * 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4562306A (en) * 1983-09-14 1985-12-31 Chou Wayne W Method and apparatus for protecting computer software utilizing an active coded hardware device
US4598810A (en) * 1984-04-17 1986-07-08 Abm Industries, Inc. Apparatus and method for vending and accepting return of re-usable articles
US4748561A (en) * 1984-05-14 1988-05-31 Mark Brown Method of protecting computer software
GB2163577B (en) * 1984-08-23 1988-01-13 Nat Res Dev Software protection device
US4650975A (en) * 1984-08-30 1987-03-17 Casio Computer Co., Ltd. IC card and an identification system thereof
US4890319A (en) * 1984-09-21 1989-12-26 Scientific-Atlantic, Inc. Method for controlling copying of protected information transmitted over a communications link
US4688169A (en) * 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4796025A (en) * 1985-06-04 1989-01-03 Simplex Time Recorder Co. Monitor/control communication net with intelligent peripherals
JPH0635227B2 (en) * 1985-07-31 1994-05-11 トツパン・ム−ア株式会社 IC card having means for reading update information and history information
US4937740A (en) * 1985-09-18 1990-06-26 Cadre Technologies, Inc. Real time software analyzing system for storing selective m-bit addresses based upon correspondingly generated n-bit tags
US4816653A (en) * 1986-05-16 1989-03-28 American Telephone And Telegraph Company Security file system for a portable data carrier
GB2191029B (en) * 1986-05-29 1990-12-12 Almex Systems Ltd Electronic pass
US4890321A (en) * 1986-07-08 1989-12-26 Scientific Atlanta, Inc. Communications format for a subscription television system permitting transmission of individual text messages to subscribers
US4725079A (en) * 1986-07-11 1988-02-16 Scientific Games, Inc. Lottery ticket integrity number
JPH07104891B2 (en) * 1986-08-05 1995-11-13 沖電気工業株式会社 Transaction processor
FR2605770A1 (en) * 1986-10-28 1988-04-29 Cga Hbs System for using restaurant credit
US4939353A (en) * 1987-01-22 1990-07-03 Kabushiki Kaisha Toshiba Processing system for enabling data communication with a self-diagnose device
JP2753565B2 (en) * 1988-01-26 1998-05-20 日立マクセル株式会社 IC card data transmission method
US5195130A (en) * 1988-05-05 1993-03-16 Transaction Technology, Inc. Computer and telephone apparatus with user friendly computer interface and enhanced integrity features
US5247575A (en) * 1988-08-16 1993-09-21 Sprague Peter J Information distribution system
JP3028815B2 (en) * 1988-08-19 2000-04-04 株式会社東芝 Transmission method of portable electronic device and portable electronic device
FR2637710A1 (en) * 1988-10-07 1990-04-13 B Et Dev Method and device for high-security multifunction electronic control comprising a microchip card
FR2642202B1 (en) * 1989-01-25 1994-02-18 Urba 2000 ELECTRONIC PAYMENT SYSTEM FOR TRANSPORT AND PUBLIC SERVICES BY MICROCIRCUIT CARDS
US5247164A (en) * 1989-01-26 1993-09-21 Hitachi Maxell, Ltd. IC card and portable terminal
US5123045A (en) * 1989-08-18 1992-06-16 Massachusetts Institute Of Technology Comprehensive software protection system
JPH0378082A (en) * 1989-08-21 1991-04-03 Hitachi Ltd Reservation transaction processing method
FR2651347A1 (en) * 1989-08-22 1991-03-01 Trt Telecom Radio Electr SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM.
FR2653248B1 (en) * 1989-10-13 1991-12-20 Gemolus Card International PAYMENT OR INFORMATION TRANSFER SYSTEM BY ELECTRONIC MEMORY CARD.
US5149945A (en) * 1990-07-05 1992-09-22 Micro Card Technologies, Inc. Method and coupler for interfacing a portable data carrier with a host processor
DE9013392U1 (en) * 1990-09-21 1991-04-25 Siemens Nixdorf Informationssysteme Ag, 4790 Paderborn, De
FR2667171B1 (en) * 1990-09-25 1994-08-26 Gemplus Card Int PORTABLE MEDIUM WITH EASILY PROGRAMMABLE MICRO-CIRCUIT AND METHOD FOR PROGRAMMING THIS MICRO-CIRCUIT.
JP2690229B2 (en) * 1991-11-26 1997-12-10 三菱電機株式会社 Non-contact IC card
US5406380A (en) * 1991-12-30 1995-04-11 Management Graphics, Inc. Film recorder with interface for user replaceable memory element
US5448045A (en) * 1992-02-26 1995-09-05 Clark; Paul C. System for protecting computers via intelligent tokens or smart cards
JPH05250523A (en) * 1992-03-06 1993-09-28 Toshiba Corp Processing system
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
FR2689997B1 (en) * 1992-04-08 1997-06-13 Innovatron Sa CONTACTLESS DATA EXCHANGE SYSTEM BETWEEN A TERMINAL AND A MODULAR PORTABLE ASSEMBLY.
US5440631A (en) * 1992-04-24 1995-08-08 Fijitsu Limited Information distribution system wherein storage medium storing ciphered information is distributed
JP2659896B2 (en) * 1992-04-29 1997-09-30 インターナショナル・ビジネス・マシーンズ・コーポレイション Structured document copy management method and structured document copy management device
ATE237854T1 (en) * 1992-10-26 2003-05-15 Intellect Australia Pty Ltd HOST-USER TRANSACTION SYSTEM
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5539882A (en) * 1992-12-16 1996-07-23 International Business Machines Corporation Method and system for an efficient multiple access polling protocol for interactive communication
US5490077A (en) * 1993-01-20 1996-02-06 Francotyp-Postalia Gmbh Method for data input into a postage meter machine, arrangement for franking postal matter and for producing an advert mark respectively allocated to a cost allocation account
US5420405A (en) * 1993-02-26 1995-05-30 Chasek; Norman E. Secure, automated transaction system that supports an electronic currency operating in mixed debit & credit modes
FR2705810B1 (en) * 1993-05-26 1995-06-30 Gemplus Card Int Chip card chip provided with a means of limiting the number of authentications.
US5386369A (en) * 1993-07-12 1995-01-31 Globetrotter Software Inc. License metering system for software applications
US5790885A (en) * 1993-09-10 1998-08-04 Oki Electric Industry Co., Ltd. Method for controlling IC card reader/writer to transmit same character frame upon receiving echo back character indicating an error exists in received character frame
US5650761A (en) * 1993-10-06 1997-07-22 Gomm; R. Greg Cash alternative transaction system
CA2129075C (en) * 1993-10-18 1999-04-20 Joseph J. Daniele Electronic copyright royalty accounting system using glyphs
GB2283349A (en) * 1993-10-29 1995-05-03 Ibm Transaction processing system
AU689820B2 (en) * 1993-12-28 1998-04-09 Nec Corporation IC card radio modem and communication system using the same
US5509074A (en) * 1994-01-27 1996-04-16 At&T Corp. Method of protecting electronically published materials using cryptographic protocols
US5461217A (en) * 1994-02-08 1995-10-24 At&T Ipm Corp. Secure money transfer techniques using smart cards
US5664231A (en) * 1994-04-29 1997-09-02 Tps Electronics PCMCIA interface card for coupling input devices such as barcode scanning engines to personal digital assistants and palmtop computers
US6041316A (en) * 1994-07-25 2000-03-21 Lucent Technologies Inc. Method and system for ensuring royalty payments for data delivered over a network
US5537474A (en) * 1994-07-29 1996-07-16 Motorola, Inc. Method and apparatus for authentication in a communication system
US5761309A (en) * 1994-08-30 1998-06-02 Kokusai Denshin Denwa Co., Ltd. Authentication system
US5500517A (en) * 1994-09-02 1996-03-19 Gemplus Card International Apparatus and method for data transfer between stand alone integrated circuit smart card terminal and remote computer of system operator
US6297724B1 (en) * 1994-09-09 2001-10-02 The Whitaker Corporation Lighting control subsystem for use in system architecture for automated building
US5544086A (en) * 1994-09-30 1996-08-06 Electronic Payment Services, Inc. Information consolidation within a transaction network
US5841866A (en) * 1994-09-30 1998-11-24 Microchip Technology Incorporated Secure token integrated circuit and method of performing a secure authentication function or transaction
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
US5530520A (en) * 1994-12-15 1996-06-25 Xerox Corporation Method of allocating copyright revenues arising from reprographic device use
CA2160942A1 (en) * 1994-12-16 1996-06-17 Alexander Gibson Fraser Method of protecting proprietary rights in works of authorship
FI99071C (en) * 1995-02-15 1997-09-25 Nokia Mobile Phones Ltd Procedure for use of applications in a mobile telephone as well as a mobile telephone
PT819287E (en) * 1995-02-17 2000-04-28 Europay International Societe TRANSACTION MANAGEMENT SYSTEM CONTROLLED BY AN INTEGRATED CIRCUIT
US6012634A (en) * 1995-03-06 2000-01-11 Motorola, Inc. Dual card and method therefor
US5590197A (en) * 1995-04-04 1996-12-31 V-One Corporation Electronic payment system and method
DE19518930A1 (en) * 1995-05-23 1996-11-28 Siemens Ag Connection control method for interactive services
US5692132A (en) * 1995-06-07 1997-11-25 Mastercard International, Inc. System and method for conducting cashless transactions on a computer network
US5689565A (en) * 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
US5852290A (en) * 1995-08-04 1998-12-22 Thomson Consumer Electronics, Inc. Smart-card based access control system with improved security
CA2160496A1 (en) * 1995-10-13 1997-04-14 Allan M. Brown Electronic funds acceptor for vending machines
US5796832A (en) * 1995-11-13 1998-08-18 Transaction Technology, Inc. Wireless transaction and information system
US5811771A (en) * 1996-05-22 1998-09-22 Dethloff; Juergen Method and system for paying with a portable data medium having security against over charging and unauthorized use
US5742756A (en) * 1996-02-12 1998-04-21 Microsoft Corporation System and method of using smart cards to perform security-critical operations requiring user authorization
US5761306A (en) * 1996-02-22 1998-06-02 Visa International Service Association Key replacement in a public key cryptosystem
US5937068A (en) * 1996-03-22 1999-08-10 Activcard System and method for user authentication employing dynamic encryption variables
US5889941A (en) * 1996-04-15 1999-03-30 Ubiq Inc. System and apparatus for smart card personalization
US5822517A (en) * 1996-04-15 1998-10-13 Dotan; Eyal Method for detecting infection of software programs by memory resident software viruses
US5915226A (en) * 1996-04-19 1999-06-22 Gemplus Card International Prepaid smart card in a GSM based wireless telephone network and method for operating prepaid cards
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US5987018A (en) * 1996-05-02 1999-11-16 Motorola, Inc Radio unit, method of communicating between radio units over a communications channel and method of preparing a sequence of data cells for transmission over a radio channel
US6662286B2 (en) * 1996-06-28 2003-12-09 Sony Corporation Information processing method and information processing apparatus
US5844218A (en) * 1996-07-16 1998-12-01 Transaction Technology, Inc. Method and system for using an application programmable smart card for financial transactions in multiple countries
US5923884A (en) * 1996-08-30 1999-07-13 Gemplus S.C.A. System and method for loading applications onto a smart card
US5892902A (en) * 1996-09-05 1999-04-06 Clark; Paul C. Intelligent token protected system with network authentication
EP0829828A1 (en) * 1996-09-13 1998-03-18 Koninklijke KPN N.V. Multiple tickets in smart cards
MY126363A (en) * 1996-10-25 2006-09-29 Gemalto Sa Using a high level programming language with a microcontroller
US5844497A (en) * 1996-11-07 1998-12-01 Litronic, Inc. Apparatus and method for providing an authentication system
US5901303A (en) * 1996-12-27 1999-05-04 Gemplus Card International Smart cards, systems using smart cards and methods of operating said cards in systems
US6055211A (en) * 1997-07-03 2000-04-25 Microchip Technology Incorporated Force page zero paging scheme for microcontrollers using data random access memory
US6003014A (en) * 1997-08-22 1999-12-14 Visa International Service Association Method and apparatus for acquiring access using a smart card
US6006303A (en) * 1997-08-28 1999-12-21 Oki Electric Industry Co., Inc. Priority encoding and decoding for memory architecture

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4777355A (en) * 1986-12-24 1988-10-11 Mitsubishi Denki Kabushiki Kaisha IC card and system for checking the functionality thereof
EP0356237A2 (en) * 1988-08-26 1990-02-28 Hitachi Maxell Ltd. Integrated Circuit Card
EP0427465A2 (en) * 1989-11-09 1991-05-15 AT&T Corp. Databaseless security system
FR2667419A1 (en) * 1990-10-02 1992-04-03 Gemplus Card Int Memory-card application-program debugging process and debugging system
FR2701133A1 (en) * 1993-02-04 1994-08-05 Gemplus Card Int Method of communication with a portable medium.
EP0662674A1 (en) * 1994-01-10 1995-07-12 France Telecom Transactions system comprising terminals and memory cards and corresponding memory cards

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8498898B1 (en) * 1999-03-19 2013-07-30 Citicorp Development Center, Inc. System and method for point of use reward determination
FR2809894A1 (en) * 2000-05-31 2001-12-07 France Telecom CRYPTOGRAPHY METHOD, MICROCIRCUIT FOR CHIP CARD AND CHIP CARDS INCLUDING SUCH MICROCIRCUIT
US7802098B2 (en) 2000-05-31 2010-09-21 France Telecom Sa Cryptography method and smart cards microcircuit
KR100829654B1 (en) * 2000-05-31 2008-05-16 프랑스 텔레콤 Cryptography method and smart card microcircuit
WO2001093216A1 (en) * 2000-05-31 2001-12-06 France Telecom Cryptography method and smart card microcircuit
US7147146B2 (en) 2000-06-20 2006-12-12 Fraunhafer-Gesellschaft zur Foerderung der angewandten Forschung e.V. Control of communication in access and entry systems
WO2001099038A1 (en) * 2000-06-20 2001-12-27 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e. V. Control of communication in access and entry systems
WO2002039369A1 (en) * 2000-11-10 2002-05-16 Cp8 Technologies Communication protocol between a proactive smart card and its host terminal
FR2816785A1 (en) * 2000-11-10 2002-05-17 Bull Cp8 Communication protocol for smart card uses additional communication layer to provide additional commands for reading proactive smart card
US7344074B2 (en) 2002-04-08 2008-03-18 Nokia Corporation Mobile terminal featuring smart card interrupt
EP1493125A4 (en) * 2002-04-08 2007-12-26 Nokia Corp Mobile terminal featuring smart card interrupt
EP1493125A1 (en) * 2002-04-08 2005-01-05 Nokia Corporation Mobile terminal featuring smart card interrupt
WO2003085594A1 (en) 2002-04-08 2003-10-16 Nokia Corporation Mobile terminal featuring smart card interrupt
US7150407B1 (en) 2002-06-20 2006-12-19 Infineon Technologies Ag System for interchanging data between at least two contactless data storage media
WO2004001657A1 (en) * 2002-06-20 2003-12-31 Infineon Technologies Ag System for the data exchange between at least two contactless data carriers
FR2862407A1 (en) * 2003-11-14 2005-05-20 Iteon Communication protocol for smart card and terminal enables execution of tasks in terminal or card, and communication of results
EP1719288A1 (en) * 2004-02-27 2006-11-08 Research In Motion Limited System and method for communicating asynchronously with web services using message set definitions
EP1719288A4 (en) * 2004-02-27 2007-05-09 Research In Motion Ltd System and method for communicating asynchronously with web services using message set definitions
US7894431B2 (en) 2004-02-27 2011-02-22 Research In Motion Limited System and method for communicating asynchronously with web services using message set definitions
US7929523B2 (en) 2004-02-27 2011-04-19 Research In Motion Limited System and method for communicating asynchronously with synchronous web services using a mediator service
FR2873218A1 (en) * 2004-05-14 2006-01-20 Infineon Technologies Ag COMMUNICATION SYSTEM

Also Published As

Publication number Publication date
EP1002291A2 (en) 2000-05-24
US7127529B2 (en) 2006-10-24
AU8456898A (en) 1999-01-25
DE69826009D1 (en) 2004-10-07
US6157966A (en) 2000-12-05
EP1002291B1 (en) 2004-09-01
WO1999001960A3 (en) 1999-04-29
DE69826009T2 (en) 2005-09-01
US20010000814A1 (en) 2001-05-03

Similar Documents

Publication Publication Date Title
US6157966A (en) System and method for an ISO7816 complaint smart card to become master over a terminal
US5942738A (en) Smart IC card system and smart IC card with transaction management program stored therein
US7011247B2 (en) Method of communication between a smart card and a host station
US7540409B2 (en) Method for accessing a smart card from a host device
US6769622B1 (en) System and method for simulating universal serial bus smart card device connected to USB host
US6564995B1 (en) Smart card application-selection
US7912914B2 (en) Transaction processing systems
JPH11505049A (en) Card interface
US20070084925A1 (en) Contactless ic card with operating system used in contact type cards and reader for such contactless cards
WO1995004328A1 (en) Device and method for ic cards
WO2001096990A2 (en) Usb-compliant personal key using a smartcard processor and a smartcard reader emulator
PL321735A1 (en) Transactions managing system controled by an integrated circuit
US6082615A (en) Reader for smart IC card
JP2003526128A (en) Method and apparatus for selecting a reconfigurable communication protocol between an IC card and a terminal
KR100374526B1 (en) Simplified use of smart cards
JPH08297634A (en) Card reader terminal and execution method of plurality of applications of said terminal
JPH11353425A (en) Ic card terminal device
From K Await Command
US20030136829A1 (en) IC card terminal
From Ulllted States Patent [19][11] Patent Number: 6,157,966
KR19990082861A (en) Keyboard with card processing function and control method thereof
US6574677B1 (en) Method for using smart card on HPC
WO1998052152A2 (en) Communication between interface device and ic card
Osborne et al. A jc-bioapi compliant smart card with biometrics for secure access control
KR101069650B1 (en) Smart Card

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 1998935222

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1999506817

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 1998935222

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: CA

WWG Wipo information: grant in national office

Ref document number: 1998935222

Country of ref document: EP