WO2001008087A1 - Smart card architecture incorporating peripherals - Google Patents

Smart card architecture incorporating peripherals Download PDF

Info

Publication number
WO2001008087A1
WO2001008087A1 PCT/FR2000/002046 FR0002046W WO0108087A1 WO 2001008087 A1 WO2001008087 A1 WO 2001008087A1 FR 0002046 W FR0002046 W FR 0002046W WO 0108087 A1 WO0108087 A1 WO 0108087A1
Authority
WO
WIPO (PCT)
Prior art keywords
secure component
electronic device
device manager
card
interface
Prior art date
Application number
PCT/FR2000/002046
Other languages
French (fr)
Inventor
Denis Praca
Original Assignee
Gemplus
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus filed Critical Gemplus
Priority to EP00954696A priority Critical patent/EP1210689A1/en
Priority to AU67057/00A priority patent/AU6705700A/en
Publication of WO2001008087A1 publication Critical patent/WO2001008087A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features

Definitions

  • the invention relates to the internal architecture of a smart card integrating various types of peripheral.
  • the invention proposes in particular to increase the level of security of such a card and to facilitate its use.
  • Smart cards with and / or contactless are intended for carrying out various operations such as, for example, banking operations, telephone communications, various identification operations, or operations of the telebilietic type.
  • the majority of chip card manufacturing methods are based on the assembly of an integrated circuit chip in a subassembly called a micromodule which is connected to a communication interface and inserted, that is to say placed in a cavity formed in the card body, using techniques known to those skilled in the art.
  • the integrated circuit chip is a secure component capable of communicating only with a card reader.
  • Contact cards include metallizations flush with the surface of the card, arranged at a precise location on the card body, defined by the usual standard ISO 7816. These metallizations are intended to come into contact with a read head of a reader for electrical data transmission.
  • Contactless cards include an antenna for exchanging information with the outside world thanks to an electromagnetic coupling between the card's electronics and a receiving or reading device. This pairing can be done in read mode or in read / write mode, and data transmission takes place by radio frequency or microwave.
  • hybrid cards or "co bicards” which include both metallizations flush with the surface of the card and an antenna embedded in the body of the card. This type of card can therefore exchange data with the outside either in contact mode or without contact.
  • devices that can be associated with a smart card. This is for example a display, a keyboard, a loudspeaker or a piezoelectric vibrator, a radio frequency communication interface, or components for measuring the environment such as such as temperature, ionizing radiation or other, or biometric measurement components such as a fingerprint sensor, microphone and voice processing system, or the like.
  • These peripherals must necessarily communicate with the integrated circuit chip of the card in order to exchange data.
  • the integrated circuit chips used in smart cards are secure components designed to establish communication only with a card reader.
  • the present invention provides another solution for integrating peripherals into a smart card which allows standard secure components to be used.
  • the invention proposes to integrate a device manager provided with a reader function in order to provide the interface with the secure component of the card.
  • This reader function can be identical to those performed by standard smart card readers.
  • the card's external communications interface is shared between an external reader when the card is used like a conventional smart card, and a reader function integrated in the device manager.
  • the latter therefore presents itself as a card reader for the secure component.
  • the invention more particularly consists in a portable electronic device, of the smart card type, integrating at least one peripheral and comprising at least one secure component and an external communications interface, characterized in that it also comprises a peripheral manager. comprising at least one smart card reader function for communicating with the secure component.
  • the device management function is implemented by an executable program stored in the secure component.
  • the secure component comprises a plurality of executable programs intended for the implementation of different applications, each executable program comprising a specific part of instructions intended to be executed by the device manager.
  • the device manager constitutes an interface between the secure component and the user, and includes a function for selecting the applications allowing the latter to choose the application to be implemented.
  • the secure component and the device manager are connected to the parallel communication interface.
  • the device includes means for disconnecting or inhibiting the device manager when the external communication interface is requested to communicate with the secure component.
  • the secure component has two input-output communication ports, a first port for communication with the external interface and a second port for communication with the device manager.
  • the secure component and the device manager are connected to the serial communication interface, the device manager managing the transmissions. data between the external interface and the secure component.
  • the device manager includes a transparent operating mode when the external communications interface is requested to communicate with the secure component.
  • the peripherals are chosen from a display, a keyboard, a biometric sensor.
  • the present invention makes it possible to produce a smart card integrating peripherals while using standard secure components, which represents a significant cost saving.
  • the architecture proposed by the present invention makes it possible to use different secure components corresponding to different applications from the same device manager on the same standard card.
  • the smart card obtained according to the present invention retains all of its standard characteristics and can be used like a conventional smart card.
  • Figure 1 is a diagram of the architecture of the card according to a first embodiment of the invention
  • FIG. 2 is a diagram of the architecture of the card according to a second embodiment of the invention.
  • FIG. 3 is a diagram of the architecture of the card according to a third embodiment of the invention.
  • the applications of the invention are multiple and variable.
  • the most direct applications can be, for example, an electronic wallet with display of the balance on a screen, or a smart card for medical records with direct and rapid display of certain data such as blood group or vaccination record.
  • the peripheral or peripherals are controlled by a peripheral manager which constitutes an interface with the secure component of the card while behaving in its respect like a card reader.
  • the device manager includes a microprocessor for managing signals from the devices. For example, on a smart card integrating a screen and a keyboard as peripherals, it is possible to display information on the screen by pressing keys on the keyboard. The device manager then receives a signal from the keyboard that it processes by searching for the corresponding information in the secure component.
  • the device manager indeed includes an executable program which transforms the signals coming from the peripherals into a smart card command code.
  • the device manager therefore behaves like a smart card reader with regard to the secure component.
  • the above executable program is stored in the secure component.
  • the data permanently stored in the device manager can advantageously be limited to the instructions necessary for reading the file of the secure component containing said executable program, as well as to the instructions for launching the execution of this contained program. in this file.
  • the device manager may be desirable to provide the device manager with a program allowing in particular the keyboarding of a digital code, or the calculation of a biometric or other signature.
  • the device manager may be advantageous to have the device manager execute a new biometric signature calculation algorithm or to modify the nature of the messages displayed on a screen.
  • the secure component comprises a plurality of programs executables capable of implementing the various applications and transmitting the appropriate instructions to the device manager.
  • the device manager can advantageously serve as an interface between the secure component and the user so that the latter chooses the application to be implemented. To this end, it includes a program for selecting the different applications.
  • the secure component comprises one file per application, each file containing a specific executable program for managing the peripherals.
  • the interface between the secure component of the card and the device manager can be organized in different ways, but nevertheless still using the signals available on a standard secure component.
  • Figure 1 illustrates schematically the architecture of the card according to a first embodiment of the invention.
  • the device manager and the secure component are connected to the card's communication interface in parallel.
  • the communication interface consists of metal contact pads for application to a contact smart card. Nevertheless, an equivalent scheme can be envisaged for an application to a contactless smart card, the communication interface then being constituted by an antenna.
  • the device manager has a smart card reader function in order to read and write data to memory space on the card. Preferably, when the card is inserted into an external smart card reader, the device manager immediately disconnects from the contacts so as not to interfere in the transmission of external data.
  • the device manager includes means for detecting (detecting) the connection to an external reader, for example by detecting the supply voltage; as well as means for disconnecting the contacts, for example by means of a signal coming from the detection means of an external reader and acting on the logic gates which will disconnect it from the contacts.
  • This embodiment advantageously allows the use of a standard secure component without any modification.
  • FIG. 2 schematically illustrates the architecture of the card according to a second embodiment of the invention.
  • the device manager and the secure component are also connected to the communication interface of the card in parallel.
  • This embodiment uses a second input / output port generally present on secure components but rarely used.
  • This second input / output port constitutes a direct interface between the secure component and the device manager. It is however necessary to integrate into the secure component, at the time of its conception, the microcode necessary for the management of this second input / output port.
  • This embodiment allows greater data security because the secure component controls the information circulating at the interface with the device manager.
  • Such an architecture is also more flexible because it allows direct control of the information sent from the secure component to the peripherals.
  • FIG. 3 schematically illustrates the architecture of the card according to a third embodiment of the invention.
  • the device manager and the secure component are connected to the communication interface of the serial card, the device manager filtering the commands of the secure component.
  • This embodiment allows a simplification of the external interface of the smart card. Indeed, it is no longer necessary to share access to the secure component between the external communications interface and the device manager, the latter operating in a transparent mode when the card is inserted in an external reader.
  • detection means such as those previously described can be used.
  • means are provided ensuring a direct connection between the secure component and the contacts, these means being controlled by a signal coming from the above detection means in response to the detection of an external reader.
  • this architecture is particularly advantageous in the context of a contactless smart card application when the card's external interface is of the radio frequency type. Indeed, the device manager being located between the external interface and the secure component, it may be able to manage the interruptions coming from any device and from an external communication terminal according to predetermined priorities.

Abstract

The invention concerns a portable electronic device, such as a smart card incorporating at least a peripheral and comprising at least a security component and an external communication interface. The invention is characterised in that it further comprises a peripheral manager including at least a smart card reading function to communicate with the security component.

Description

ARCHITECTURE DE CARTE A PUCE INTEGRANT DES PERIPHERIQUES CHIP CARD ARCHITECTURE INTEGRATING PERIPHERALS
L'invention concerne l'architecture interne d'une carte à puce intégrant divers types de périphérique.The invention relates to the internal architecture of a smart card integrating various types of peripheral.
L'invention propose notamment d'augmenter le niveau de sécurité d'une telle carte et de faciliter son utilisation.The invention proposes in particular to increase the level of security of such a card and to facilitate its use.
Les cartes à puce avec et/ou sans contact sont destinées à la réalisation de diverses opérations telles que, par exemple, des opérations bancaires, des communications téléphoniques, diverses opérations d'identification, ou des opérations de type télébiliétique .Smart cards with and / or contactless are intended for carrying out various operations such as, for example, banking operations, telephone communications, various identification operations, or operations of the telebilietic type.
La majorité des procédés de fabrication de carte à puce est basée sur l'assemblage d'une puce de circuit intégré dans un sous-ensemble appelé micromodule qui est relié à une interface de communication et encarté, c' est à dire placé dans une cavité ménagée dans le corps de carte, en utilisant des techniques connues de l'homme du métier. La puce de circuit intégré est un composant sécurisé apte à communiquer uniquement avec un lecteur de carte.The majority of chip card manufacturing methods are based on the assembly of an integrated circuit chip in a subassembly called a micromodule which is connected to a communication interface and inserted, that is to say placed in a cavity formed in the card body, using techniques known to those skilled in the art. The integrated circuit chip is a secure component capable of communicating only with a card reader.
Les cartes à contact comportent des métallisations affleurant la surface de la carte, disposées à un endroit précis du corps de carte, défini par la norme usuelle ISO 7816. Ces métallisations sont destinées à venir au contact d'une tête de lecture d'un lecteur en vue d'une transmission électrique de données.Contact cards include metallizations flush with the surface of the card, arranged at a precise location on the card body, defined by the usual standard ISO 7816. These metallizations are intended to come into contact with a read head of a reader for electrical data transmission.
Les cartes sans contact comportent une antenne permettant d'échanger des informations avec l'extérieur grâce à un couplage électromagnétique entre l'électronique de la carte et un appareil récepteur ou lecteur. Ce couplage peut être effectué en mode lecture ou en mode lecture/écriture, et la transmission de données s'effectue par radiofréquence ou par hyperfréquence .Contactless cards include an antenna for exchanging information with the outside world thanks to an electromagnetic coupling between the card's electronics and a receiving or reading device. This pairing can be done in read mode or in read / write mode, and data transmission takes place by radio frequency or microwave.
Il existe également des cartes hybrides ou « co bicards » qui comportent à la fois des métallisations affleurant la surface de la carte et une antenne noyée dans le corps de la carte. Ce type de carte peut donc échanger des données avec l'extérieur soit en mode contact, soit sans contact. Les périphériques qui peuvent être associés à une carte à puce sont multiples. Il s'agit par exemple d'un afficheur, d'un clavier, d'un haut-parleur ou d'un vibreur piézo-électrique, d'une interface de communication par radiofréquences, ou de composants de mesure de l'environnement telle que la température, des radiations ionisantes ou autre, ou de composants de mesure biométrique telle qu'un capteur d'empreinte digitale, un microphone et un système de traitement de la voix, ou autre. Ces périphériques doivent nécessairement communiquer avec la puce de circuit intégré de la carte afin d'échanger des données. Or, les puces de circuit intégré utilisées dans les cartes à puce sont des composants sécurisés prévus pour établir une communication uniquement avec un lecteur de carte.There are also hybrid cards or "co bicards" which include both metallizations flush with the surface of the card and an antenna embedded in the body of the card. This type of card can therefore exchange data with the outside either in contact mode or without contact. There are many devices that can be associated with a smart card. This is for example a display, a keyboard, a loudspeaker or a piezoelectric vibrator, a radio frequency communication interface, or components for measuring the environment such as such as temperature, ionizing radiation or other, or biometric measurement components such as a fingerprint sensor, microphone and voice processing system, or the like. These peripherals must necessarily communicate with the integrated circuit chip of the card in order to exchange data. However, the integrated circuit chips used in smart cards are secure components designed to establish communication only with a card reader.
Ainsi, dans une architecture standard utilisant des composants standards, la communication entre la puce de circuit intégré de la carte et un quelconque périphérique est impossible. II existe déjà des cartes à puce intégrant un ou plusieurs périphériques. En général, la puce de circuit intégré est alors conçue pour gérer le périphérique intégré. Ainsi, pour chaque application, il est nécessaire de développer un nouveau composant pour le circuit intégré afin de lui permettre de gérer un écran, un clavier ou tout autre périphérique prédéterminé .Thus, in a standard architecture using standard components, communication between the integrated circuit chip of the card and any peripheral is impossible. There are already smart cards integrating one or more peripherals. In general, the integrated circuit chip is then designed to manage the integrated device. Thus, for each application, it is necessary to develop a new component for the integrated circuit to allow it to manage a screen, keyboard or any other predetermined device.
Cette solution, bien que performante, présente un inconvénient majeur du fait qu'il faille développer et fabriquer un composant électronique différent pour chaque application de périphérique. En effet, la solution proposée consistait à programmer la puce de circuit intégré de la carte pour piloter le périphérique tout en conservant ses caractéristiques sécurisées .This solution, although effective, has a major drawback in that it is necessary to develop and manufacture a different electronic component for each peripheral application. Indeed, the proposed solution consisted in programming the integrated circuit chip of the card to control the device while retaining its secure characteristics.
La présente invention propose une autre solution pour intégrer des périphériques à une carte à puce qui permette d'utiliser les composants sécurisés standards. Ainsi, l'invention propose d'intégrer un gestionnaire de périphériques muni d'une fonction lecteur afin de réaliser l'interface avec le composant sécurisé de la carte. Cette fonction lecteur peut être identique à celles réalisées par les lecteurs de cartes à puce standards .The present invention provides another solution for integrating peripherals into a smart card which allows standard secure components to be used. Thus, the invention proposes to integrate a device manager provided with a reader function in order to provide the interface with the secure component of the card. This reader function can be identical to those performed by standard smart card readers.
Selon une particularité de l'invention, l'interface de communications externes de la carte est partagée entre un lecteur externe lorsque la carte est utilisée comme une carte à puce classique, et une fonction lecteur intégrée dans le gestionnaire de périphérique. Ce dernier se présente donc comme un lecteur de carte pour le composant sécurisé.According to a feature of the invention, the card's external communications interface is shared between an external reader when the card is used like a conventional smart card, and a reader function integrated in the device manager. The latter therefore presents itself as a card reader for the secure component.
L' invention consiste plus particulièrement dans un dispositif électronique portable, du type carte à puce, intégrant au moins un périphérique et comportant au moins un composant sécurisé et une interface de communications externes, caractérisé en ce qu'il comporte en outre un gestionnaire de périphériques comprenant au moins une fonction de lecteur de carte à puce pour communiquer avec le composant sécurisé.The invention more particularly consists in a portable electronic device, of the smart card type, integrating at least one peripheral and comprising at least one secure component and an external communications interface, characterized in that it also comprises a peripheral manager. comprising at least one smart card reader function for communicating with the secure component.
Selon un mode de réalisation préférentiel, la fonction de gestion des périphériques est mise en œuvre par un programme exécutable stocké dans le composant sécurisé .According to a preferred embodiment, the device management function is implemented by an executable program stored in the secure component.
Selon un mode de réalisation, le composant sécurisé comprend une pluralité de programmes exécutables destinés à la mise en œuvre de différentes applications, chaque programme exécutable comprenant une partie spécifique d'instructions destinée à être exécutée par le gestionnaire de périphériques.According to one embodiment, the secure component comprises a plurality of executable programs intended for the implementation of different applications, each executable program comprising a specific part of instructions intended to be executed by the device manager.
Selon une caractéristique, le gestionnaire de périphériques constitue une interface entre le composant sécurisé et l'utilisateur, et comporte une fonction de sélection des applications permettant à ce dernier de choisir l'application à mettre en œuvre.According to one characteristic, the device manager constitutes an interface between the secure component and the user, and includes a function for selecting the applications allowing the latter to choose the application to be implemented.
Selon un premier mode de réalisation, le composant sécurisé et le gestionnaire de périphériques sont reliés à l'interface de communication en parallèle.According to a first embodiment, the secure component and the device manager are connected to the parallel communication interface.
Selon une particularité de ce mode, le dispositif comporte des moyens de déconnexion ou d' inhibition du gestionnaire de périphériques lorsque l'interface de communication externe est sollicitée pour communiquer avec le composant sécurisé.According to a feature of this mode, the device includes means for disconnecting or inhibiting the device manager when the external communication interface is requested to communicate with the secure component.
Selon un deuxième mode de réalisation, le composant sécurisé présente deux ports de communication d'entrée-sortie, un premier port pour une communication avec l'interface externe et un second port pour une communication avec le gestionnaire de périphériques.According to a second embodiment, the secure component has two input-output communication ports, a first port for communication with the external interface and a second port for communication with the device manager.
Selon un troisième mode de réalisation, le composant sécurisé et le gestionnaire de périphériques sont reliés à l'interface de communication en série, le gestionnaire de périphériques gérant les transmissions de données entre l' interface externe et le composant sécurisé .According to a third embodiment, the secure component and the device manager are connected to the serial communication interface, the device manager managing the transmissions. data between the external interface and the secure component.
Selon une caractéristique, le gestionnaire de périphériques comporte un mode de fonctionnement transparent lorsque l'interface de communications externes est sollicitée pour communiquer avec le composant sécurisé.According to one characteristic, the device manager includes a transparent operating mode when the external communications interface is requested to communicate with the secure component.
Selon les applications, les périphériques sont choisis parmi un afficheur, un clavier, un capteur biométrique.Depending on the applications, the peripherals are chosen from a display, a keyboard, a biometric sensor.
La présente invention permet de réaliser une carte à puce intégrant des périphériques tout en utilisant des composants sécurisés standards, ce qui représente un gain de coût important.The present invention makes it possible to produce a smart card integrating peripherals while using standard secure components, which represents a significant cost saving.
En outre, l'architecture proposée par la présente invention permet d'utiliser différents composants sécurisés correspondant à différentes applications à partir d'un même gestionnaire de périphériques sur une même carte standard.In addition, the architecture proposed by the present invention makes it possible to use different secure components corresponding to different applications from the same device manager on the same standard card.
Il est ainsi possible de développer des cartes à puce « multi applications » selon les puces de circuit intégré insérées dans une même carte.It is thus possible to develop “multi-application” smart cards according to the integrated circuit chips inserted in the same card.
En outre, la carte à puce obtenue selon la présente invention conserve toutes ses caractéristiques standards et peut être utilisée comme une carte à puce classique .In addition, the smart card obtained according to the present invention retains all of its standard characteristics and can be used like a conventional smart card.
D'autres particularités et avantages de l'invention apparaîtront à la lecture de la description qui suit donnée à titre d'exemple illustratif et non limitatif et faite en référence aux figures annexées dans lesquelles : La figure 1 est un schéma de l'architecture de la carte selon un premier mode de réalisation de l'invention ;Other particularities and advantages of the invention will appear on reading the following description given by way of illustrative and non-limiting example and made with reference to the appended figures in which: Figure 1 is a diagram of the architecture of the card according to a first embodiment of the invention;
La figure 2 est un schéma de l'architecture de la carte selon un deuxième mode de réalisation de l' invention ;FIG. 2 is a diagram of the architecture of the card according to a second embodiment of the invention;
La figure 3 est un schéma de l'architecture de la carte selon un troisième mode de réalisation de l' invention ;FIG. 3 is a diagram of the architecture of the card according to a third embodiment of the invention;
Les applications de l'invention sont multiples et variables .The applications of the invention are multiple and variable.
Ainsi, par exemple, avec une carte munie d'un écran, il est possible de visualiser les données en dehors d'une infrastructure de lecteur de carte. Les applications les plus directes peuvent être, par exemple, un porte-monnaie électronique avec visualisation du solde sur un écran, ou une carte à puce de dossier médical avec visualisation directe et rapide de certaines données comme le groupe sanguin ou le carnet de vaccination.Thus, for example, with a card provided with a screen, it is possible to view the data outside of a card reader infrastructure. The most direct applications can be, for example, an electronic wallet with display of the balance on a screen, or a smart card for medical records with direct and rapid display of certain data such as blood group or vaccination record.
Selon le principe de l'invention, le ou les périphériques sont pilotés par un gestionnaire de périphériques qui constitue une interface avec le composant sécurisé de la carte en se comportant à son égard comme un lecteur de carte.According to the principle of the invention, the peripheral or peripherals are controlled by a peripheral manager which constitutes an interface with the secure component of the card while behaving in its respect like a card reader.
Le gestionnaire de périphériques comporte un microprocesseur pour la gestion des signaux en provenance des périphériques. Par exemple, sur une carte à puce intégrant un écran et un clavier comme périphériques, il est possible d'afficher une information sur l'écran en appuyant sur des touches du clavier. Le gestionnaire de périphériques reçoit alors un signal provenant du clavier qu'il traite en recherchant l'information correspondante dans le composant sécurisé.The device manager includes a microprocessor for managing signals from the devices. For example, on a smart card integrating a screen and a keyboard as peripherals, it is possible to display information on the screen by pressing keys on the keyboard. The device manager then receives a signal from the keyboard that it processes by searching for the corresponding information in the secure component.
Le gestionnaire de périphériques comprend en effet un programme exécutable qui transforme les signaux en provenance des périphériques en code de commande de carte à puce. Le gestionnaire de périphériques se comporte donc comme un lecteur de carte à puce à l'égard du composant sécurisé.The device manager indeed includes an executable program which transforms the signals coming from the peripherals into a smart card command code. The device manager therefore behaves like a smart card reader with regard to the secure component.
Selon un mode de réalisation préférentiel, le programme exécutable ci-dessus est stocké dans le composant sécurisé. Dans ce cas, les données stockées de manière permanente dans le gestionnaire de périphériques peuvent avantageusement se limiter aux instructions nécessaires à la lecture du fichier du composant sécurisé contenant ledit programme exécutable, ainsi qu'aux instructions de lancement de l'exécution de ce programme contenu dans ce fichier.According to a preferred embodiment, the above executable program is stored in the secure component. In this case, the data permanently stored in the device manager can advantageously be limited to the instructions necessary for reading the file of the secure component containing said executable program, as well as to the instructions for launching the execution of this contained program. in this file.
Ainsi par exemple, il peut être souhaitable de munir le gestionnaire de périphériques d'un programme permettant notamment la saisie au clavier d'un code numérique, ou le calcul d'une signature biométrique ou autre. Par exemple, il peut être intéressant de faire exécuter au gestionnaire de périphériques un nouvel algorithme de calcul de signature biométrique ou de modifier la nature des messages affichés sur un écran.For example, it may be desirable to provide the device manager with a program allowing in particular the keyboarding of a digital code, or the calculation of a biometric or other signature. For example, it may be advantageous to have the device manager execute a new biometric signature calculation algorithm or to modify the nature of the messages displayed on a screen.
Grâce à l'invention, il «est possible de faire évoluer en sécurité les programmes contenus dans ledit fichier du composant sécurisé. L'accès à ce fichier peut être libre en lecture, mais sa modification ne pourra être effectuée que par une autorité ayant des droits d'accès en écriture sur ce fichier, comme l'émetteur de la carte par exemple.Thanks to the invention, it is "possible to make the programs contained in said file of the secure component evolve safely. The access to this file can be free in reading, but its modification can be carried out only by an authority having rights of access in writing on this file, like the issuer of the card for example.
Dans le cas d'une carte « multi-applications », le composant sécurisé comporte une pluralité de programmes exécutables aptes a mettre en œuvre les différentes applications et a transmettre les instructions adéquates au gestionnaire de périphériques.In the case of a “multi-application” card, the secure component comprises a plurality of programs executables capable of implementing the various applications and transmitting the appropriate instructions to the device manager.
Le gestionnaire de périphériques peut avantageusement servir d' interface entre le composant sécurise et l'utilisateur afin que ce dernier choisisse l'application a mettre en œuvre. Il comporte a cet effet un programme de sélection des différentes applications . Afin de sécuriser cette carte « multi- applications », le composant sécurise comporte un fichier par application, chaque fichier contenant un programme exécutable spécifique de gestion des périphériques .The device manager can advantageously serve as an interface between the secure component and the user so that the latter chooses the application to be implemented. To this end, it includes a program for selecting the different applications. In order to secure this “multi-application” card, the secure component comprises one file per application, each file containing a specific executable program for managing the peripherals.
L' interface entre le composant sécurise de la carte et le gestionnaire de périphériques peut s'organiser de différentes manières, mais en utilisant néanmoins toujours les signaux disponibles sur un composant sécurise standard.The interface between the secure component of the card and the device manager can be organized in different ways, but nevertheless still using the signals available on a standard secure component.
La figure 1 illustre sche atiquement l' architecture de la carte selon un premier mode de réalisation de 1' invention .Figure 1 illustrates schematically the architecture of the card according to a first embodiment of the invention.
Dans ce mode de réalisation, le gestionnaire de périphériques et le composant sécurise sont relies a l'interface de communication de la carte en parallèle.In this embodiment, the device manager and the secure component are connected to the card's communication interface in parallel.
Dans l'exemple illustre, l'interface de communication est constituée par des plages de contact métalliques pour une application a une carte a puce a contact. Néanmoins, un schéma équivalent peut être envisage pour une application a une carte a puce sans contact, l'interface de communication étant alors constituée par une antenne. Le gestionnaire de périphériques possède une fonction lecteur de carte à puce afin de lire et d' écrire des données dans un espace mémoire de la carte . De préférence, lors de l'insertion de la carte dans un lecteur de carte à puce externe, le gestionnaire de périphériques se déconnecte immédiatement des contacts pour ne pas interférer dans la transmission de données externes . A cet effet, le gestionnaire de périphériques comporte des moyens de détection (détecteur) de la connexion à un lecteur externe, par exemple en détectant la tension d'alimentation ; ainsi que des moyens de déconnexion des contacts, par exemple par l'intermédiaire d'un signal provenant des moyens de détection d'un lecteur externe et agissant sur les portes logiques qui vont le déconnecter des contacts.In the example illustrated, the communication interface consists of metal contact pads for application to a contact smart card. Nevertheless, an equivalent scheme can be envisaged for an application to a contactless smart card, the communication interface then being constituted by an antenna. The device manager has a smart card reader function in order to read and write data to memory space on the card. Preferably, when the card is inserted into an external smart card reader, the device manager immediately disconnects from the contacts so as not to interfere in the transmission of external data. To this end, the device manager includes means for detecting (detecting) the connection to an external reader, for example by detecting the supply voltage; as well as means for disconnecting the contacts, for example by means of a signal coming from the detection means of an external reader and acting on the logic gates which will disconnect it from the contacts.
Ce mode de réalisation permet avantageusement d'utiliser un composant sécurisé standard sans la moindre modification.This embodiment advantageously allows the use of a standard secure component without any modification.
La figure 2 illustre schématiquement l'architecture de la carte selon un deuxième mode de réalisation de 1' invention .FIG. 2 schematically illustrates the architecture of the card according to a second embodiment of the invention.
Dans ce mode de réalisation, le gestionnaire de périphériques et le composant sécurisé sont également reliés à l'interface de communication de la carte en parallèle .In this embodiment, the device manager and the secure component are also connected to the communication interface of the card in parallel.
Ce mode de réalisation exploite cependant un second port d' entrée / sortie généralement présent sur les composants sécurisés mais rarement utilisés. Ce second port d' entrée / sortie constitue une interface directe entre le composant sécurisé et le gestionnaire de périphériques . Il est cependant nécessaire d' intégrer dans le composant sécurisé, au moment de sa conception, le microcode nécessaire à la gestion de ce second port d'entrée / sortie. Ce mode de réalisation permet une plus grande sécurité des données car le composant sécurisé maîtrise les informations circulant à l'interface avec le gestionnaire de périphériques. Une telle architecture est également plus souple car elle permet un contrôle direct des informations envoyées du composant sécurisé vers les périphériques.This embodiment, however, uses a second input / output port generally present on secure components but rarely used. This second input / output port constitutes a direct interface between the secure component and the device manager. It is however necessary to integrate into the secure component, at the time of its conception, the microcode necessary for the management of this second input / output port. This embodiment allows greater data security because the secure component controls the information circulating at the interface with the device manager. Such an architecture is also more flexible because it allows direct control of the information sent from the secure component to the peripherals.
La figure 3 illustre schématiquement l'architecture de la carte selon un troisième mode de réalisation de 1' invention . Dans ce mode de réalisation, le gestionnaire de périphériques et le composant sécurisé sont reliés à l'interface de communication de la carte en série, le gestionnaire de périphériques filtrant les commandes du composant sécurisé. Ce mode de réalisation permet une simplification de l'interface externe de la carte à puce. En effet, il n'est alors plus nécessaire de partager l'accès au composant sécurisé entre l'interface de communications extérieures et le gestionnaire de périphériques, ce dernier fonctionnant selon un mode transparent lorsque la carte est insérée dans un lecteur externe.FIG. 3 schematically illustrates the architecture of the card according to a third embodiment of the invention. In this embodiment, the device manager and the secure component are connected to the communication interface of the serial card, the device manager filtering the commands of the secure component. This embodiment allows a simplification of the external interface of the smart card. Indeed, it is no longer necessary to share access to the secure component between the external communications interface and the device manager, the latter operating in a transparent mode when the card is inserted in an external reader.
A cet effet, des moyens de détection tels que ceux précédemment décrits peuvent être utilisés. En revanche, il est prévu des moyens assurant une connexion directe entre le composant sécurisé et les contacts, ces moyens étant commandés par un signal provenant des moyens de détection ci-dessus en réponse à la détection d'un lecteur externe. En outre, cette architecture est particulièrement avantageuse dans le cadre d'une application de carte à puce sans contact lorsque l'interface externe de la carte est de type radiofréquence . En effet, le gestionnaire de périphériques étant situé entre l'interface externe et le composant sécurisé, il peut être en mesure de gérer les interruptions provenant d'un périphérique quelconque et d'une borne de communication extérieure selon des priorités prédéterminées. For this purpose, detection means such as those previously described can be used. On the other hand, means are provided ensuring a direct connection between the secure component and the contacts, these means being controlled by a signal coming from the above detection means in response to the detection of an external reader. In addition, this architecture is particularly advantageous in the context of a contactless smart card application when the card's external interface is of the radio frequency type. Indeed, the device manager being located between the external interface and the secure component, it may be able to manage the interruptions coming from any device and from an external communication terminal according to predetermined priorities.

Claims

REVENDICATIONS
1. Dispositif électronique portable, du type carte à puce, intégrant au moins un périphérique et comportant au moins un composant sécurisé et une interface de communications externes, caractérisé en ce qu' il comporte en outre un gestionnaire de périphériques comprenant au moins une fonction de lecteur de carte à puce pour communiquer avec le composant sécurisé.1. Portable electronic device, of the smart card type, incorporating at least one peripheral and comprising at least one secure component and an external communications interface, characterized in that it also comprises a peripheral manager comprising at least one smart card reader to communicate with the secure component.
2. Dispositif électronique selon la revendication 1, caractérisé en ce que la fonction de gestion des périphériques est mise en œuvre par un programme exécutable stocké dans le composant sécurisé.2. Electronic device according to claim 1, characterized in that the peripheral management function is implemented by an executable program stored in the secure component.
3. Dispositif électronique selon l'une des revendications 1 à 2, caractérisé en ce que le composant sécurisé contient une pluralité de programmes exécutables destinés à la mise en œuvre de différentes applications, chaque programme exécutable comprenant une partie spécifique d'instructions destinée à être exécutée par le gestionnaire de périphériques.3. Electronic device according to one of claims 1 to 2, characterized in that the secure component contains a plurality of executable programs intended for the implementation of different applications, each executable program comprising a specific part of instructions intended to be executed by the device manager.
4. Dispositif électronique selon la revendication 3, caractérisé en ce que le gestionnaire de périphériques constitue une interface entre le composant sécurisé et l'utilisateur et comporte une fonction de sélection des applications permettant à ce dernier de choisir l'application à mettre en œuvre. 4. Electronic device according to claim 3, characterized in that the device manager constitutes an interface between the secure component and the user and includes a function for selecting the applications allowing the latter to choose the application to be implemented.
5. Dispositif électronique selon l'une quelconque des revendications 1 à 4, caractérisé en ce que le composant sécurisé et le gestionnaire de périphériques sont reliés à l'interface de communication en parallèle.5. Electronic device according to any one of claims 1 to 4, characterized in that the secure component and the device manager are connected to the communication interface in parallel.
6. Dispositif électronique selon la revendication 5, caractérisé en ce qu' il comporte des moyens de déconnexion ou d'inhibition du gestionnaire de périphériques lorsque l'interface de communication externe est sollicitée pour communiquer avec le composant sécurisé.6. Electronic device according to claim 5, characterized in that it comprises means for disconnecting or inhibiting the device manager when the external communication interface is requested to communicate with the secure component.
7. Dispositif électronique selon l'une quelconque des revendications 1 à 6, caractérisé en ce que le composant sécurisé présente deux ports de communication d' entrée-sortie, un premier port pour une communication avec l'interface externe et un second port pour une communication avec le gestionnaire de périphériques.7. Electronic device according to any one of claims 1 to 6, characterized in that the secure component has two input-output communication ports, a first port for communication with the external interface and a second port for a communication with the device manager.
8. Dispositif électronique selon l'une quelconque des revendications 1 à 4, caractérisé en ce que le composant sécurisé et le gestionnaire de périphériques sont reliés à l'interface de communication en série, le gestionnaire de périphériques gérant les transmissions de données entre l'interface externe et le composant sécurisé .8. Electronic device according to any one of claims 1 to 4, characterized in that the secure component and the device manager are connected to the serial communication interface, the device manager managing the data transmissions between the external interface and secure component.
9. Dispositif électronique selon la revendication 8, caractérisé en ce que le gestionnaire de périphériques comporte un mode de fonctionnement transparent lorsque l'interface de communication externe est sollicitée pour communiquer avec le composant sécurisé. 9. Electronic device according to claim 8, characterized in that the device manager includes a transparent operating mode when the external communication interface is requested to communicate with the secure component.
10. Dispositif électronique selon l'une quelconque des revendications précédentes, caractérisé en ce que les périphériques sont choisis parmi un afficheur, un clavier, un capteur biométrique. 10. Electronic device according to any one of the preceding claims, characterized in that the peripherals are chosen from a display, a keyboard, a biometric sensor.
PCT/FR2000/002046 1999-07-28 2000-07-13 Smart card architecture incorporating peripherals WO2001008087A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP00954696A EP1210689A1 (en) 1999-07-28 2000-07-13 Smart card architecture incorporating peripherals
AU67057/00A AU6705700A (en) 1999-07-28 2000-07-13 Smart card architecture incorporating peripherals

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR99/09818 1999-07-28
FR9909818A FR2797074B1 (en) 1999-07-28 1999-07-28 CHIP CARD ARCHITECTURE INCLUDING PERIPHERALS

Publications (1)

Publication Number Publication Date
WO2001008087A1 true WO2001008087A1 (en) 2001-02-01

Family

ID=9548636

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2000/002046 WO2001008087A1 (en) 1999-07-28 2000-07-13 Smart card architecture incorporating peripherals

Country Status (5)

Country Link
EP (1) EP1210689A1 (en)
CN (1) CN1365484A (en)
AU (1) AU6705700A (en)
FR (1) FR2797074B1 (en)
WO (1) WO2001008087A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1304665A3 (en) * 2001-10-22 2004-01-28 Kabushiki Kaisha Toshiba Apparatus and method for controlling a card device
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US7725369B2 (en) 2003-05-02 2010-05-25 Visa U.S.A. Inc. Method and server for management of electronic receipts
US7857216B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system for providing interactive cardholder rewards image replacement
US7874492B2 (en) 2001-12-04 2011-01-25 Visa U.S.A. Inc. Method and system for facilitating memory and application management on a secured token
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US8119282B2 (en) 2005-06-16 2012-02-21 Exide Technologies Gmbh Pole bridge for a battery
CN102549605A (en) * 2009-08-05 2012-07-04 金雅拓股份有限公司 Electronic circuit for interconnecting a smartcard chip
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
US8548923B2 (en) 2002-10-07 2013-10-01 Sonia Reed Method and system for facilitating data access and management on a secure token
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
FR3033437A1 (en) * 2015-03-06 2016-09-09 Oberthur Technologies METHOD OF BLOCKING INTERNAL COMMUNICATIONS TO AN ELECTRONIC DEVICE
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US11132691B2 (en) 2009-12-16 2021-09-28 Visa International Service Association Merchant alerts incorporating receipt data

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8637144B2 (en) 2007-10-04 2014-01-28 W. L. Gore & Associates, Inc. Expandable TFE copolymers, method of making, and porous, expended articles thereof
EP3493118A1 (en) * 2017-12-04 2019-06-05 Gemalto Sa Method for producing a portable electronic device with interface switching and corresponding device
FR3082030B1 (en) * 2018-06-05 2021-04-23 Idemia France CUSTOMIZABLE CHIP CARD AND CUSTOMIZATION PROCESS
CN109242055A (en) * 2018-07-13 2019-01-18 深圳市文鼎创数据科技有限公司 Smart card peripheral device, command processing method, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0385290A1 (en) * 1989-03-01 1990-09-05 Hartmut Hennige Method and device to simplify the use of a plurality of credit cards and the like
DE4406704C1 (en) * 1994-03-02 1995-07-20 Angewandte Digital Elektronik Smart card
FR2734937A1 (en) * 1995-05-30 1996-12-06 Syseca INTELLIGENT CHIP CARD SYSTEM
EP0779598A2 (en) * 1995-12-14 1997-06-18 Hitachi, Ltd. Multichip IC card and IC card system using it

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0385290A1 (en) * 1989-03-01 1990-09-05 Hartmut Hennige Method and device to simplify the use of a plurality of credit cards and the like
DE4406704C1 (en) * 1994-03-02 1995-07-20 Angewandte Digital Elektronik Smart card
FR2734937A1 (en) * 1995-05-30 1996-12-06 Syseca INTELLIGENT CHIP CARD SYSTEM
EP0779598A2 (en) * 1995-12-14 1997-06-18 Hitachi, Ltd. Multichip IC card and IC card system using it

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6886083B2 (en) 2001-10-22 2005-04-26 Kabushiki Kaisha Toshiba Apparatus and method for controlling a card device
EP1304665A3 (en) * 2001-10-22 2004-01-28 Kabushiki Kaisha Toshiba Apparatus and method for controlling a card device
US7874492B2 (en) 2001-12-04 2011-01-25 Visa U.S.A. Inc. Method and system for facilitating memory and application management on a secured token
US8010405B1 (en) 2002-07-26 2011-08-30 Visa Usa Inc. Multi-application smart card device software solution for smart cardholder reward selection and redemption
US8015060B2 (en) 2002-09-13 2011-09-06 Visa Usa, Inc. Method and system for managing limited use coupon and coupon prioritization
US10460338B2 (en) 2002-09-13 2019-10-29 Visa U.S.A. Inc. Network centric loyalty system
US9852437B2 (en) 2002-09-13 2017-12-26 Visa U.S.A. Inc. Opt-in/opt-out in loyalty system
US8626577B2 (en) 2002-09-13 2014-01-07 Visa U.S.A Network centric loyalty system
US8239261B2 (en) 2002-09-13 2012-08-07 Liane Redford Method and system for managing limited use coupon and coupon prioritization
US9430666B2 (en) 2002-10-07 2016-08-30 Visa International Service Association Method and system for facilitating data access and management on a secure token
US8548923B2 (en) 2002-10-07 2013-10-01 Sonia Reed Method and system for facilitating data access and management on a secure token
US8386343B2 (en) 2003-05-02 2013-02-26 Visa U.S.A. Inc. Method and user device for management of electronic receipts
US9087426B2 (en) 2003-05-02 2015-07-21 Visa U.S.A. Inc. Method and administration system for management of electronic receipts
US7725369B2 (en) 2003-05-02 2010-05-25 Visa U.S.A. Inc. Method and server for management of electronic receipts
US7827077B2 (en) 2003-05-02 2010-11-02 Visa U.S.A. Inc. Method and apparatus for management of electronic receipts on portable devices
US7987120B2 (en) 2003-05-02 2011-07-26 Visa U.S.A. Inc. Method and portable device for management of electronic receipts
US8554610B1 (en) 2003-08-29 2013-10-08 Visa U.S.A. Inc. Method and system for providing reward status
US8793156B2 (en) 2003-08-29 2014-07-29 Visa U.S.A. Inc. Method and system for providing reward status
US7857216B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system for providing interactive cardholder rewards image replacement
US7857215B2 (en) 2003-09-12 2010-12-28 Visa U.S.A. Inc. Method and system including phone with rewards image
US9141967B2 (en) 2003-09-30 2015-09-22 Visa U.S.A. Inc. Method and system for managing reward reversal after posting
US8407083B2 (en) 2003-09-30 2013-03-26 Visa U.S.A., Inc. Method and system for managing reward reversal after posting
US8244648B2 (en) 2003-09-30 2012-08-14 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US8005763B2 (en) 2003-09-30 2011-08-23 Visa U.S.A. Inc. Method and system for providing a distributed adaptive rules based dynamic pricing system
US9710811B2 (en) 2003-11-06 2017-07-18 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US7653602B2 (en) 2003-11-06 2010-01-26 Visa U.S.A. Inc. Centralized electronic commerce card transactions
US8119282B2 (en) 2005-06-16 2012-02-21 Exide Technologies Gmbh Pole bridge for a battery
CN102549605A (en) * 2009-08-05 2012-07-04 金雅拓股份有限公司 Electronic circuit for interconnecting a smartcard chip
US11132691B2 (en) 2009-12-16 2021-09-28 Visa International Service Association Merchant alerts incorporating receipt data
US8650124B2 (en) 2009-12-28 2014-02-11 Visa International Service Association System and method for processing payment transaction receipts
US8429048B2 (en) 2009-12-28 2013-04-23 Visa International Service Association System and method for processing payment transaction receipts
WO2016142612A1 (en) * 2015-03-06 2016-09-15 Cpmix Sarl Method of blocking internal communications inside an electronic device
FR3033437A1 (en) * 2015-03-06 2016-09-09 Oberthur Technologies METHOD OF BLOCKING INTERNAL COMMUNICATIONS TO AN ELECTRONIC DEVICE

Also Published As

Publication number Publication date
AU6705700A (en) 2001-02-13
CN1365484A (en) 2002-08-21
FR2797074A1 (en) 2001-02-02
FR2797074B1 (en) 2001-10-12
EP1210689A1 (en) 2002-06-05

Similar Documents

Publication Publication Date Title
WO2001008087A1 (en) Smart card architecture incorporating peripherals
FR2615984A1 (en) SMARTCARD
EP2390823A1 (en) Bank card with display screen
EP0682792B1 (en) Method for communicating with a portable data medium
EP2186042A1 (en) Behavioural method and device for preventing the use of a contactless portable device without the bearer's authorisation
EP2065857A2 (en) Microprocessor card, telephone comprising such a card and method of executing a command on such a card
FR2904880A1 (en) SECURITY DEVICE INTEGRATED WITH CONTACTLESS OBJECT OF SECURE DOCUMENT TYPE WITH RADIO FREQUENCY DEVICE.
FR2954546A1 (en) "MULTI-APPLICATION CHIP CARD WITH BIOMETRIC VALIDATION."
FR2686171A1 (en) MEMORY MEMORY CARD FOR MICROCOMPUTER WITH FACILITIES FOR EXECUTING INTERNAL PROGRAMS.
WO2015124535A1 (en) Electronic transaction method and system via a portable accessory
WO2001084512A1 (en) Multiple application smart card
FR2938094A1 (en) USB KEY WITH NON-CONTACT DRIVE FUNCTIONS AND NON-CONTACT CHIP CARD EMULATION
CA2261620C (en) Man-machine interface for a smart card reader
EP2118825B1 (en) Portable electronic entity and communication method
EP1316077B1 (en) Secret code security access to data processing means
EP1048003A1 (en) System for safe communication without contact between a terminal and a portable object such as a chip card
EP3671519A1 (en) Transaction securisation using a smartcard
EP1058917B1 (en) Loading block computer programmes
EP2058746A1 (en) Portable electronic entity, host station and associated method
EP1025531A1 (en) System for communication without contact by induction between a terminal and a portable object
FR3099272A1 (en) Securing method, and associated electronic device
FR3116931A1 (en) Method of contactless interactions with a payment terminal, payment terminal and corresponding computer program.
EP3757892A1 (en) Method for radiofrequency communication between a reader and a device connected to a peripheral, with radiofrequency field measurement
WO2024061933A1 (en) Contactless chip card provided with a three-dimensional position sensor
CN117788140A (en) Method and device for controlling quota, electronic equipment and storage medium

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2000954696

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 10048004

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 008109346

Country of ref document: CN

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: 2000954696

Country of ref document: EP

WWW Wipo information: withdrawn in national office

Ref document number: 2000954696

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP