WO2002058019A1 - Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise - Google Patents
Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise Download PDFInfo
- Publication number
- WO2002058019A1 WO2002058019A1 PCT/FR2002/000230 FR0200230W WO02058019A1 WO 2002058019 A1 WO2002058019 A1 WO 2002058019A1 FR 0200230 W FR0200230 W FR 0200230W WO 02058019 A1 WO02058019 A1 WO 02058019A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- smart card
- terminal
- tool
- private
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
- G07F7/0886—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
Definitions
- the invention relates to a method for creating secure private data files.
- the invention also relates to smart cards intended to communicate with a terminal. It also relates to telecommunications terminals and in particular mobile telephones equipped with a subscriber identification smart card, provided with a communication program with the mobile telephone.
- bank account numbers • subscription numbers to services, secret codes or passwords and, of course, telephone numbers whose volume increases simply because It is increasingly common to join a mobile phone number to a number on the fixed telephone network.
- Paper calendars can remain an interesting solution, of course insofar as personal information is only telephone numbers and this information does not require frequent changes (updates).
- the present invention aims to solve this problem.
- the present invention therefore relates to a method for creating one or more data files, secure private (s), mainly characterized in that it comprises the following steps:
- a smart card reader terminal fitted with a display screen 'and a man machine interface, capable of establishing communication with a smart card and being controlled by it and a card comprising a communication program capable of establishing communication sessions with this terminal, loading a support tool for the generation and / or consultation of data from private files 5 on the smart card, and the implementation of an operation to authorize any consultation or update after verification of secret information.
- the tool comprises:
- the tool includes: the provision of a storage space to store confidential information and constitute a set of private files.
- the assistance tool for generating and / or consulting file data implements the following commands which allow the card to control the terminal: 25 - display request '' an information message,
- the subject of the invention is also a smart card comprising a processing unit and one or more program memories comprising programs including, the operating system of
- the card and at least one suitable communication program to establish communication sessions and to control a terminal provided with a man-machine interface, mainly characterized in that it includes a tool for assisting in the generation and / or consultation of file data, and authorizing any consultation or updates to this file data after verification of secret information.
- the tool comprises a securing operation for during a step of initialization of said support tool • enter the secret information to be stored in the card.
- the tool provides a storage space for storing confidential information and constituting a set of private files.
- FIG. 1 illustrates the steps implemented by the assistance tool for generating and / or consulting data from private files on a smart card
- FIG. 2 illustrates the steps implemented by the assistance tool for generating and / or consulting data from private files on a smart card
- Figure 3 illustrates a first example of submenu
- FIG. 4 illustrates a second example of a submenu
- FIG. 5 illustrates a third example of a submenu
- FIG. 6 illustrates a fourth example of a sub-menu
- FIG. 7, illustrates a functional diagram of a smart card
- FIG. 8 illustrates a terminal provided with a smart card.
- the application smart cards currently developed are similar to a computer in that they have an operating system and one or more application programs that can be loaded or downloaded. These smart cards have the means to communicate with a communication terminal.
- the operating system is protected by the very fact that it is memorized in read-only memory (ROM memory). The operating system is therefore not modifiable inside the card.
- Chip cards which are intended to communicate with a terminal. have a communication program with the terminal. It is an application program, just like a banking or telephony application program.
- the application programs are generally stored in electrically programmable memory. These programs can thus be updated and some downloaded using the terminal.
- SIM cards which are subscriber identification cards. These cards include in memory a communication program known by the acronym STK (from SIM TOOL KIT) and which corresponds to the communication protocol with • terminals. GSM 11-14 standard 98 mobile telephony.
- This communication program allows communications between the card and the terminal and between the card and the terminal user through the man-machine interface of the terminal.
- the user has at his disposal a menu which takes place on the screen and the terminal keyboard for dialoguing with the card through the terminal.
- the man-machine interface can include a display screen or a printer.
- the method according to the invention provides a tool to assist in the generation and / or consultation of data from private files loaded into the smart card.
- this tool is in the form of a function added to the communication program with a terminal (telecommunications or other) residing in the card. It is a program of assistance for the generation and the private files of data consultation for the holder of 'the card.
- This tool includes the implementation of commands used • by the card to control the terminal. Piloting is carried out in particular by the execution of an application residing in the card.
- commands used are: demand. display of an information message; - the request to enter information and return the data entered; the request to display a menu and return the number of the item selected by the user in this menu.
- the display commands can be print commands or equivalent intended for the user.
- the card thus has a secure electronic safe function due to the implementation of a password consultation authorization operation and the intrinsic security of the card.
- the secret information can be a password, a fingerprint, .
- the secret data can be stored encrypted or encrypted, 'in particular on the basis of the password.
- the data is decrypted.
- the tool for assisting in the generation and / or consultation of data from private files stored on a smart card includes security by the very fact of being in a smart card.
- the operating system of a smart card is in ROM memory (non-volatile memory) and it is the operating system of the card which launches the execution of the application programs and therefore of the tool program.
- This tool program can also be stored in the card's non-volatile memory.
- the tool has a second security for private files since it allows the card holder to choose secret information which includes a password. and possibly a user name to protect said files.
- the tool may also include additional security since a card intended for communicate with a telecommunications terminal, any session of the terminal can only be opened after presentation of a secret code (PIN code: Personal Identifier Number) and validation by the card of this 5 secret code.
- PIN code Personal Identifier Number
- the tool firstly implements a securing operation B] I) figure 1 and B] II) figure 2.
- this step includes initialization B] I) Figure 1;
- this step consists of verifying secret information which the user has entered and which has been stored in the card during initialization B] II) FIG. 2.
- the tool allows the user to initialize his smart card - "Initialization phase".
- the step can be optional on certain terminals or deactivated.
- the tool ' then has according to the invention
- This information is chosen by the user and saved on the card.
- the tool then controls the display of free information fields on the screen to allow the user to type one or more menus which are saved on the card (step C]).
- FIGS. 1 and 2 Several fields have been illustrated in FIGS. 1 and 2 for entering submenus.
- the tool also makes it possible, before entering any user name and password, to order the display of an IDT information field for entering the holder identification.
- the identity of the holder could be accessible as soon as the mobile is switched on without having to satisfy a PIN code check.
- the tool then allows the user, at any time, to consult his private files in the various menus and ' submenus to search for information stored in the card (B] II) figure 2).
- the tool After validation of the secret code (PIN CODE) (step A] figure 2), the tool controls the display of the terminal screen to request the entry of the secret information IS. The user must then type on the terminal keyboard the name he has chosen and the password.
- the tool then performs a verification of the secret information IS compared to the information recorded on the card (in step B] II) Figure
- Figures 3, 4, 5 and 6 illustrate examples of information which can be recorded on the card and which can be read on the display screen by scrolling through the corresponding menu.
- FIG. 3 illustrates an example of menu 1 in which the user has stored information relating to computer hardware.
- the ' Name of the submenu field is login / password.
- Sub-directories are reserved for the various IT equipment, with each information sub-directory.
- PC is illustrated as well as the information recorded concerning said PC.
- FIG. 4 illustrates an example of menu 2 in which the user has stored information concerning the bank cards of the holder.
- FIG. 5 illustrates an example of menu 3 in which the user has stored information concerning the official identity documents of the holder. (passport, identity card, driving license, etc.).
- the_card. smart thus has a secure electronic diary function.
- FIG. 7 illustrates the functional diagram of a smart card CP.
- the card comprises a central unit U connected to a non-volatile program memory Ml and at least one electrically programmable program memory M2.
- the memory M1 includes the operating system of the card CP and possibly the communication program with the telecommunication terminal. It also includes the program carrying out the additional function which has just been described.
- the smart card can perform this function in association with the telecommunications terminal which then becomes a human-machine interface for the user.
- FIG. 8 illustrates the diagram of a terminal T.
- This terminal has the functions of a smart card reader which enable it to communicate with the smart card CP. It has a screen E and a keyboard C.
- the terminal T is a mobile telephone
- the card is a SIM card
- the communication program is the STK protocol (SIM TOOL KIT).
- the terminal can be a terminal in which the smart card does not reside but must be inserted by a user of the terminal. It may for example be a bank terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02700344A EP1358640A1 (fr) | 2001-01-22 | 2002-01-21 | Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR01/00826 | 2001-01-22 | ||
FR0100826A FR2819909B1 (fr) | 2001-01-22 | 2001-01-22 | Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002058019A1 true WO2002058019A1 (fr) | 2002-07-25 |
Family
ID=8859095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/000230 WO2002058019A1 (fr) | 2001-01-22 | 2002-01-21 | Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1358640A1 (fr) |
FR (1) | FR2819909B1 (fr) |
WO (1) | WO2002058019A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102004005043A1 (de) * | 2004-01-30 | 2005-08-25 | Giesecke & Devrient Gmbh | System mit einem Endgerät und einem tragbaren Datenträger |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4758718A (en) * | 1985-02-27 | 1988-07-19 | Hitachi, Ltd. | High security IC card with an updatable password |
EP0490455A2 (fr) * | 1990-12-10 | 1992-06-17 | THOMSON multimedia | Méthode et dispositif pour faire l'interface entre cartes à puce et terminaux |
FR2730330A1 (fr) * | 1995-02-02 | 1996-08-09 | Cohen Solal Bernard Simon | Systeme d'information universel interactif par appareil et carte multi-services |
WO1996038825A1 (fr) * | 1995-05-30 | 1996-12-05 | Syseca S.A. | Carte a puce intelligente securisee |
WO1997022092A2 (fr) * | 1995-12-14 | 1997-06-19 | Venda Security Corporation | Carte de donnees personnelles protegees et procede d'utilisation de cette carte |
EP0984404A2 (fr) * | 1998-09-02 | 2000-03-08 | International Business Machines Corporation | Stockage des objets de données dans une mémoire de carte à puce |
FR2786051A1 (fr) * | 1998-11-16 | 2000-05-19 | Dassault Automatismes | Procede de mise a niveau des equipements destines au traitement des cartes sante et au paiement electronique des actes medicaux |
-
2001
- 2001-01-22 FR FR0100826A patent/FR2819909B1/fr not_active Expired - Fee Related
-
2002
- 2002-01-21 EP EP02700344A patent/EP1358640A1/fr not_active Withdrawn
- 2002-01-21 WO PCT/FR2002/000230 patent/WO2002058019A1/fr not_active Application Discontinuation
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4758718A (en) * | 1985-02-27 | 1988-07-19 | Hitachi, Ltd. | High security IC card with an updatable password |
EP0490455A2 (fr) * | 1990-12-10 | 1992-06-17 | THOMSON multimedia | Méthode et dispositif pour faire l'interface entre cartes à puce et terminaux |
FR2730330A1 (fr) * | 1995-02-02 | 1996-08-09 | Cohen Solal Bernard Simon | Systeme d'information universel interactif par appareil et carte multi-services |
WO1996038825A1 (fr) * | 1995-05-30 | 1996-12-05 | Syseca S.A. | Carte a puce intelligente securisee |
WO1997022092A2 (fr) * | 1995-12-14 | 1997-06-19 | Venda Security Corporation | Carte de donnees personnelles protegees et procede d'utilisation de cette carte |
EP0984404A2 (fr) * | 1998-09-02 | 2000-03-08 | International Business Machines Corporation | Stockage des objets de données dans une mémoire de carte à puce |
FR2786051A1 (fr) * | 1998-11-16 | 2000-05-19 | Dassault Automatismes | Procede de mise a niveau des equipements destines au traitement des cartes sante et au paiement electronique des actes medicaux |
Also Published As
Publication number | Publication date |
---|---|
FR2819909A1 (fr) | 2002-07-26 |
EP1358640A1 (fr) | 2003-11-05 |
FR2819909B1 (fr) | 2003-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FR2748834A1 (fr) | Systeme de communication permettant une gestion securisee et independante d'une pluralite d'applications par chaque carte utilisateur, carte utilisateur et procede de gestion correspondants | |
WO2006053958A9 (fr) | Support personnel de mémoire de masse portatif et système informatique d'accès sécurisé a un espace utilisateur via un réseau | |
FR2779018A1 (fr) | Terminal et systeme pour la mise en oeuvre de transactions electroniques securisees | |
CA2309293A1 (fr) | Procede, carte a puce et terminaux pour effectuer des transactions a travers un reseau de telecommunication | |
EP0614303A1 (fr) | Procédé pour délivrer un numéro de téléphone associé à un abonnement téléphonique, postes téléphoniques et téléphone mobile mettant en oeuvre ce procédé | |
CA2293546A1 (fr) | Carte a puce, telephone sans fil, systeme et procede d'acces et de communication par internet | |
EP1862948A1 (fr) | Carte CI avec client OTP | |
EP1460593B1 (fr) | Terminal de paiement securise | |
EP1362276A1 (fr) | Gestion dynamique de listes de droits d'acces dans un objet electronique portable | |
EP1364349A1 (fr) | Procede de stockage securise de donnees personnelles et de consultation, carte a puce, terminal et serveur pour la mise en oeuvre du procede | |
WO2009016327A2 (fr) | Gestion et partage de coffres-forts dematerialises | |
EP1064769A1 (fr) | Terminal de telecommunication lecteur de carte a puce | |
EP1142193A1 (fr) | Procede de chargement securise de donnees entre des modules de securite | |
EP1358640A1 (fr) | Procede pour la creation de fichiers de donnees, prives securises et carte a puce comportant un fichier prive securise | |
CA2468890A1 (fr) | Procede de securisation d'un acces a une ressource numerique | |
EP2813962A1 (fr) | Méthode de contrôle d'accès à un type de services spécifique et dispositif d'authentification pour le contrôle de l'accès à un tel type de services. | |
EP1076886B1 (fr) | Procede pour effectuer une transaction securisee au moyen d'une carte a puce a travers un reseau de telecommunication | |
EP2471237B1 (fr) | Dispositif électronique nomade configuré pour établir une communication sans fil sécurisé | |
CA2652140A1 (fr) | Procede d'activation d'un terminal | |
FR2863443A1 (fr) | Procede de sauvegarde des donnees d'un telephone mobile | |
FR3114714A1 (fr) | Procédé d’accès à un ensemble de données d’un utilisateur. | |
EP1578064B1 (fr) | Procédé d'accès à un service par l'intermédiaire d'un terminal relié à un réseau de communication | |
FR2853785A1 (fr) | Entite electronique securisee avec compteur modifiable d'utilisations d'une donnee secrete | |
FR3080693A1 (fr) | Authentification mutuelle d'un dispositif ou d'un systeme contenant des donnees sensibles ou confidentielles commandable par un utilisateur | |
WO2002037435A1 (fr) | Carte a puce avec descripteur d'application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2002700344 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002700344 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002700344 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |