WO2008054512A2 - Methods and systems for ic card application loading - Google Patents

Methods and systems for ic card application loading Download PDF

Info

Publication number
WO2008054512A2
WO2008054512A2 PCT/US2007/009776 US2007009776W WO2008054512A2 WO 2008054512 A2 WO2008054512 A2 WO 2008054512A2 US 2007009776 W US2007009776 W US 2007009776W WO 2008054512 A2 WO2008054512 A2 WO 2008054512A2
Authority
WO
WIPO (PCT)
Prior art keywords
key
transformation unit
application
specific
plaintext
Prior art date
Application number
PCT/US2007/009776
Other languages
French (fr)
Other versions
WO2008054512A3 (en
Inventor
Alan E. Johnson
Original Assignee
Stepnexus Holdings
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Stepnexus Holdings filed Critical Stepnexus Holdings
Priority to EP07867086A priority Critical patent/EP2016535A4/en
Publication of WO2008054512A2 publication Critical patent/WO2008054512A2/en
Publication of WO2008054512A3 publication Critical patent/WO2008054512A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • this application relates to smart card technology. More specifically, it relates to a systems and methods for smart card implementation of key encryption key - key transformation unit ("K2KTU").
  • K2KTU key encryption key - key transformation unit
  • an IC card (also referred to herein as a smart card) is the size of a conventional credit card or debit card and contains one or more integrated circuits, which can be in the form of one or more computer chips, including, for example, a processing element, a read-only-memory (ROM) element, an electrically erasable programmable read only-memory (EEPROM) element, an input/output (I/O) mechanism and other circuitry as may be required to support the smart card in its operations.
  • ROM read-only-memory
  • EEPROM electrically erasable programmable read only-memory
  • I/O input/output
  • an IC card may contain a single application (e.g., a debit or credit application, a purse or electronic money application, an affinity or loyalty program application, and the like) or it may contain multiple independent applications in its memory.
  • MULTOSTM is one example of an operating system that runs on smart cards, as well as other platforms, and allows multiple independent applications to be executed on a smart card. This allows a card user to run one or more of the multiple programs stored on the card regardless of the type of terminal (e.g., an ATM, an airport kiosk, a telephone, a point of sale (POS) device, and the like) into which the card may be inserted or swiped for use.
  • a conventional single application IC card such as a telephone card or an electronic cash card, is loaded with a single application at its personalization stage.
  • that single application cannot be modified or changed after the card is issued even if the modification is desired by the card user or card issuer.
  • a card user wanted a variety of application functions to be performed, such as both an electronic purse and a credit/debit function, the card user would be required to carry multiple physical single application cards on his or her person, which would be quite cumbersome and inconvenient.
  • a card user may have both a purse application and a credit/debit application on the same card so that the user could select which type of payment (i.e., by electronic cash or credit card) to use when making a purchase. It would be further beneficial to provide multiple applications to an IC card, where sufficient memory existed and in which an operating system capable of supporting multiple applications was present on the card. Although multiple applications could be pre-selected and placed in the memory of the card during its production stage, it would also be beneficial to have the ability to load and delete applications for the card post-production as needed.
  • FIG. 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOSTM IC card system.
  • an application load unit prime 10 is created to include an encrypted application load unit 100 using the application provider secret key ("AP_SK") 11 in combination with a key transformation unit (“KTU") prime 102.
  • KTU prime 102 is created by performing a triple DES operation (i.e., key-encryption-key, key encryption key (“KEK”), operation) on the standard KTU using a transport key.
  • the application load unit prime is then transmitted via typical methods to be loaded onto an IC card 18.
  • the KTU prime 102 must be translated (i.e., decrypted) at 152 back to the regular KTU 154.
  • This operation requires that a hardware security module (“HSM”) 15 be located locally at the personalization bureau.
  • the HSM 15 communicates securely with the application provider to perform a secure key ceremony 14 whereby the KEK 12, 12' transport key is exchanged. Once the HSM 15 has the transport key 12, it can translate the KTU prime 102 back to the regular KTU 154. Then, the regular application load unit can be used load the application to the target card.
  • HSM hardware security module
  • Figure 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOSTM IC card system
  • Figure 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain embodiments.
  • the terms application provider and personalization bureau are used as a matter of convenience, for consistency and clarity. However, as will become evident to those skilled in the art, the functions of both can be performed at either one of the facilities or even at a completely different facility including, for example, at the card issuer. Such variations are accommodated in many embodiments and fall within the scope of the invention.
  • Certain embodiments propose a new type of application load unit ("ALU") for use in the secure loading of applications and/or data onto IC cards (or smart cards).
  • ALU application load unit
  • This new type of ALU will be referred to as a confidential ALU prime.
  • the ALU prime can be created using combinations of conventional techniques augmented according to certain aspects of the invention.
  • the encrypted ALU can be combined with the KTU prime, which is an encrypted KTU using a KEK.
  • a new component can also be created and combined in the ALU prime. This new component, as discussed herein, will be referred to as a card-specific KEK KTU (K2KTU).
  • This new type of KTU is also a type of card-targeted KTU, but instead of the KTU containing the keys that were used to encrypt the ALU (as the regular KTU and KTU prime contain), the K2KTU contains the KEK used to create the KTU prime. In this way, no HSM will be necessary at the personalization facility.
  • one K2KTU can be created for each smart card to be loaded with a particular application; that is, the KEK may be individually encrypted under each Public Key of each target smart card.
  • a KEK can be provided that is common to all KTU primes and an application provider may create a K2KTU for a plurality smart cards independent of related ALU primes.
  • the KEK used should match and will typically remain constant over time although, in certain embodiments the KEK may be permitted to change on occasion.
  • the application provider can digitally sign each K2KTU using the same application provider secret key (AP_SK) that was used to create the application signature. This will ensure that only genuine K2KTUs are ultimately processed.
  • AP_SK application provider secret key
  • FIG. 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain aspects of the invention.
  • an application provider can create one or more ALU primes 20 using the AP_SK 21 and KEK 22 as described above and as is currently performed.
  • the application provider can then additionally create one or more K2KTUs 23, one for each target IC card 28 using the public key (MKD_PK) 240 of the target card 28, which can be obtained from storage 24 such as a database of card public keys that can be provided, for example, by a key management authority.
  • the application provider can further digitally sign each K2KTU 23 using its AP SK 21. Having secured the set of K2KTUs 23 for an application, the application provider can transmit the ALU primes 20 and the K2KTUs 23 to the personalization bureau via any secure or non-secure transmission means.
  • an ALU prime 25 can be selected for loading on a desired smart card 28.
  • a correct K2KTU 262 can be selected from the one or more K2KTUs 260 created for that application.
  • the K2KTU 262 can be loaded.
  • the order of these loads can be altered within the scope of certain embodiments.
  • load initiation e.g., using a "CREATE MEL" command
  • the certificate can be checked and the AP_PK extracted.
  • the application signature may then be checked.
  • the K2KTU signature can be verified using AP PK.
  • the K2KTU 262 can be decrypted using the smart card's secret key (MKD SK). Then the K2KTU 262 can be checked to ensure that this particular ALU is intended for the desired IC card 28.
  • the regular KTU can be decrypted using the KEK 22 contained within K2KTU 262. Once the regular KTU is translated from the KTU prime25 using the KEK 22, application load proceeds as normal.
  • no HSM need be present at the location of the card application terminal (i.e., no key ceremony is required) when the K2KTU component is used.
  • the application provider can create multiple K2KTUs 23 for an application or create multiple sets of K2KTUs 23 for an associated set of multiple applications and distribute the one or more confidential ALU primes 20 to a personalization bureau for more efficient batch processing of multiple IC cards.
  • the proper K2KTU can be selected from the proper set of K2KTUs (i.e., where each set of K2KTUs can be representative of a particular application, and each member K2KTU within a set is associated with a particular card to receive that application).
  • Certain embodiments of the invention provide methods for securely loading an application, comprising the steps of maintaining a plurality of cryptographic keys in an electronically addressable device, communicating one or more applications to the device, the one or more applications encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using a common key, wherein the common key and the one or more applications are furnished by a provider and the common key is common to a plurality of devices, and communicating the common key to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys.
  • each of the communicating the one or more applications and the communicating the common key is secured using selected ones of the plurality of cryptographic keys including a provider-specific key.
  • the plurality of cryptographic keys includes a device-specific public transport key.
  • the common key is communicated to the device upon verification of the device-specific public transport key by a key management authority.
  • the plurality of cryptographic keys includes a device-specific secret transport key operative to extract the common key from the second plaintext key transformation unit.
  • the plurality of cryptographic keys includes the common key and wherein the second plaintext key transformation unit is digitally signed using a secret key of the provider.
  • the communicating includes communicating one or more of the plurality of cryptographic keys to the provider, the one or more cryptographic keys including a device-specific public transport key, and identifying the device to the provider.
  • the device is one of a plurality of devices and further comprising the steps of encrypting each of the one or more applications using keys associated with the each application, encrypting the first plaintext key transformation unit using the common key, the plaintext key transformation unit including the associated keys and corresponding application-specific information, and for each of the plurality of devices, encrypting second plaintext key transformation units using public transport keys associated with each of the plurality of devices, the second plaintext key transformation units including the common key, information specific to the each application and device-specific information, and digitally signing each second key transformation unit using a private key of the provider.
  • the second plaintext key transformation units are encrypted using symmetric encryption.
  • the symmetric encryption is Triple DES.
  • the symmetric encryption is AES.
  • the plurality of cryptographic keys includes keys associated with the plurality of devices.
  • the device-specific secret key and the device-specific public key are provided using an asymmetric technique.
  • the asymmetric technique is RSA.
  • the plurality of cryptographic keys includes certified public and secret keys furnished by a certification authority, and further comprising the steps of encrypting a provider-specific public key using a certified secret key to obtain a provider-specific public key certificate, signing the encrypted application using a provider-specific secret key to obtain a digital signature, and signing the second key transformation unit using the provider-specific secret key to obtain a digital signature.
  • the step of verifying the provider-specific public key certificate with the certified public key is provided by a certification authority.
  • the method also comprises deriving the provider- specific public key from a decrypted public key certificate associated with the provider, and verifying the digital signatures of the application and second key transformation unit based on the derived provider-specific public key.
  • the decrypted public key certificate contains application-specific information.
  • the method also comprises decrypting the verified second plaintext key transformation unit using a verified device-specific private transport key, and verifying the resultant first plaintext key transformation unit is intended for the device, the verifying including comparing the identity of the device with a device identification in the first plaintext key transformation unit, confirming that the plurality of cryptographic keys includes the common key, decrypting the first plaintext key transformation unit associated with the application using the first key, associating the first plaintext key transformation unit with the decrypted second plaintext key transformation unit, and decrypting the application using the plurality of keys contained within the first plaintext key transformation unit.
  • a device comprising a computing device and storage, the device configured to receive an encrypted application, wherein the storage maintains a plurality of cryptographic keys including a device-specific private transport key and a common key and the computing device is configured to decrypt the encrypted application using the device-specific private transport key and the common key.
  • the encrypted application is encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using the common key, wherein the common key and the one or more applications are furnished by a provider.
  • the common key is provided to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys.
  • the encrypted application and the common key are provided to the device using selected ones of the plurality of cryptographic keys including a provider- specific key to secure communication of the encrypted application and the common key.
  • a method for secure application loading of an application to electronically addressable devices may comprise the steps of maintaining a plurality of cryptographic keys within the device, providing the device with one or more applications, encrypted using a plurality of cryptographic keys within a plaintext key transformation unit and said plaintext key transformation unit being encrypted using a non-device-specif ⁇ c key, each application and non-device-specific key being furnished by a provider, providing the device with the non-device-specific key within a plaintext key transformation unit, encrypted using a device-specific transport key resulting in the key-encryption-key key transformation unit.
  • the communication of the application and non-device-specific key are secured using selected ones of the plurality of cryptographic keys, including a provider-specific key associated with a provider.
  • the method may further comprise encrypting a plurality of applications intended for different devices using a plurality of keys, formatting the plurality of keys and application-specific information into a plaintext key transformation unit and encrypting said key transformation unit using a single non-device-specific key, formatting the non-device-specific key, application-specific information and device-specific information into a plaintext key transformation unit and encrypting said key transformation unit using each of the device-specific public transport keys of the plurality of devices resulting in the key-encryption-key key transformation units, digitally signing each key- encryption-key key transformation unit using a provider private key.

Abstract

Systems and methods are described that provide a new type of application load unit for use in the secure loading of applications and/or data onto integrated circuit cards or smart cards. Plaintext key transformation units can be created for each of a plurality of smart cards that are to be loaded with a desired or selected application. A plaintext key transformation unit may be individually encrypted using the public keys associated with target smart cards. An application provider can create one or more application load unit using known means and can then create one or more additional plaintext key transformation unit, one for each target smart card using corresponding public keys which can be obtained taken from a database of card public keys.

Description

METHODS AND SYSTEMS FOR IC CARD APPLICATION LOADING
BACKGROUND
Claim of Priority
[0001] This application claims priority to and incorporates by reference herein U.S. Provisional Application Serial No. 60/793,543 filed April 19, 2006 entitled "Methods and Systems for IC Card Application Loading."
Field of the Application
[0002] Generally, this application relates to smart card technology. More specifically, it relates to a systems and methods for smart card implementation of key encryption key - key transformation unit ("K2KTU").
Description of the Related Art
[0003] Integrated circuit ("IC") cards are becoming increasingly used for many different purposes in the world today. Typically, an IC card (also referred to herein as a smart card) is the size of a conventional credit card or debit card and contains one or more integrated circuits, which can be in the form of one or more computer chips, including, for example, a processing element, a read-only-memory (ROM) element, an electrically erasable programmable read only-memory (EEPROM) element, an input/output (I/O) mechanism and other circuitry as may be required to support the smart card in its operations. In addition to its native operating system, an IC card may contain a single application (e.g., a debit or credit application, a purse or electronic money application, an affinity or loyalty program application, and the like) or it may contain multiple independent applications in its memory. MULTOS™ is one example of an operating system that runs on smart cards, as well as other platforms, and allows multiple independent applications to be executed on a smart card. This allows a card user to run one or more of the multiple programs stored on the card regardless of the type of terminal (e.g., an ATM, an airport kiosk, a telephone, a point of sale (POS) device, and the like) into which the card may be inserted or swiped for use.
[0004] A conventional single application IC card, such as a telephone card or an electronic cash card, is loaded with a single application at its personalization stage. Typically, that single application cannot be modified or changed after the card is issued even if the modification is desired by the card user or card issuer. Moreover, if a card user wanted a variety of application functions to be performed, such as both an electronic purse and a credit/debit function, the card user would be required to carry multiple physical single application cards on his or her person, which would be quite cumbersome and inconvenient. Further, if an application developer or card user desired two different applications to interact or exchange data with each other, such as a purse application interacting with a frequent flyer loyalty application, the card user would be forced to swap multiple single application cards in and out of the card-receiving terminal, making the transaction difficult, lengthy and inconvenient.
[0005] Therefore, it would be beneficial to have the ability store multiple applications on the same IC card. For example, a card user may have both a purse application and a credit/debit application on the same card so that the user could select which type of payment (i.e., by electronic cash or credit card) to use when making a purchase. It would be further beneficial to provide multiple applications to an IC card, where sufficient memory existed and in which an operating system capable of supporting multiple applications was present on the card. Although multiple applications could be pre-selected and placed in the memory of the card during its production stage, it would also be beneficial to have the ability to load and delete applications for the card post-production as needed.
[0006] The increased flexibility and power of storing multiple applications on a single card create new challenges to be overcome concerning the integrity and security of the information (including application code and associated data) exchanged between the individual card and the application provider, as well as within the entire system when loading and deleting applications and associated data. It would be beneficial to have the capability in the IC card system to exchange data among cards, card issuers, system operators and application providers securely and to load and delete applications securely at any time from either a terminal or remotely over a telephone line, Internet or intranet connection or other wired or wireless data conduit. Because these data transmission lines are not typically secure lines, a number of security and entity-authentication techniques must be implemented to make sure that applications being sent over the transmission lines are only loaded on the intended cards.
[0007] However, typical processes used in the art today for securely transmitting data and/or applications to an IC card do not handle batch loading of the data and/or applications well because the information is targeted to an individual IC card using that IC card's public card. If a transmitting entity were desirous of populating multiple IC cards with the same data and/or application, an encrypted set of data would have to be created for each IC card separately. One example of this typical process is illustrated in commonly-owned U.S. Patent No. 6,230,267, which is also fully incorporated herein for all purposes. Another example is illustrated in commonly-owned U.S. Patent No. 6,632,888, which is also fully incorporated herein for all purposes.
[0008] Figure 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOS™ IC card system. As shown in Figure 1, an application load unit prime 10 is created to include an encrypted application load unit 100 using the application provider secret key ("AP_SK") 11 in combination with a key transformation unit ("KTU") prime 102. Typically the KTU prime 102 is created by performing a triple DES operation (i.e., key-encryption-key, key encryption key ("KEK"), operation) on the standard KTU using a transport key. The application load unit prime is then transmitted via typical methods to be loaded onto an IC card 18. However, prior to loading, the KTU prime 102 must be translated (i.e., decrypted) at 152 back to the regular KTU 154. This operation requires that a hardware security module ("HSM") 15 be located locally at the personalization bureau. The HSM 15 communicates securely with the application provider to perform a secure key ceremony 14 whereby the KEK 12, 12' transport key is exchanged. Once the HSM 15 has the transport key 12, it can translate the KTU prime 102 back to the regular KTU 154. Then, the regular application load unit can be used load the application to the target card.
[0009] A need exists for systems and methods that facilitate fast, efficient and inexpensive secure smart card application and data addition and deletion.
BRIEF DESCRIPTION OF THE DRAWINGS
[0010] Aspects and features of this application will become apparent to those ordinarily skilled in the art from the following detailed description of certain embodiments in conjunction with the accompanying drawings, wherein:
[0011] Figure 1 illustrates an example of a typical, secure application load process used in conjunction with the MULTOS™ IC card system; and
[0012] Figure 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain embodiments.
DETAILED DESCRIPTION
[0013] Embodiments will now be described in detail with reference to the drawings, which are provided as illustrative examples of certain embodiments so as to enable those skilled in the art to practice the embodiments and are not meant to limit the scope of the application. Where aspects of certain embodiments can be partially or fully implemented using known components or steps, only those portions of such known components or steps that are necessary for an understanding of the embodiments will be described, and detailed description of other portions of such known components or steps will be omitted so as not to obscure the embodiments. Further, certain embodiments are intended to encompass presently known and future equivalents to the components referred to herein by way of illustration.
[0014] As used herein, the terms application provider and personalization bureau are used as a matter of convenience, for consistency and clarity. However, as will become evident to those skilled in the art, the functions of both can be performed at either one of the facilities or even at a completely different facility including, for example, at the card issuer. Such variations are accommodated in many embodiments and fall within the scope of the invention.
[0015] Certain embodiments propose a new type of application load unit ("ALU") for use in the secure loading of applications and/or data onto IC cards (or smart cards). This new type of ALU, as discussed herein, will be referred to as a confidential ALU prime. In certain embodiments, the ALU prime can be created using combinations of conventional techniques augmented according to certain aspects of the invention. For example, the encrypted ALU can be combined with the KTU prime, which is an encrypted KTU using a KEK. In addition, a new component can also be created and combined in the ALU prime. This new component, as discussed herein, will be referred to as a card-specific KEK KTU (K2KTU). This new type of KTU is also a type of card-targeted KTU, but instead of the KTU containing the keys that were used to encrypt the ALU (as the regular KTU and KTU prime contain), the K2KTU contains the KEK used to create the KTU prime. In this way, no HSM will be necessary at the personalization facility.
[0016] In certain embodiments, one K2KTU can be created for each smart card to be loaded with a particular application; that is, the KEK may be individually encrypted under each Public Key of each target smart card. In certain embodiments, a KEK can be provided that is common to all KTU primes and an application provider may create a K2KTU for a plurality smart cards independent of related ALU primes. However, it will be appreciated that in certain embodiments, the KEK used should match and will typically remain constant over time although, in certain embodiments the KEK may be permitted to change on occasion.
[0017] In certain embodiments, to ensure the integrity of the K2KTU, the application provider can digitally sign each K2KTU using the same application provider secret key (AP_SK) that was used to create the application signature. This will ensure that only genuine K2KTUs are ultimately processed. This signature feature provides advantages including, for example, the ability to overcome one of the existing security weaknesses of the MULTOS™ application loading system whereby, in the current system, the regular KTUs (and thus the KTU primes) are not digitally signed by the application provider.
[0018] Figure 2 illustrates an example of a novel secure application load process used in conjunction with an IC card system according to certain aspects of the invention. As shown in Figure 2, an application provider can create one or more ALU primes 20 using the AP_SK 21 and KEK 22 as described above and as is currently performed. However, the application provider can then additionally create one or more K2KTUs 23, one for each target IC card 28 using the public key (MKD_PK) 240 of the target card 28, which can be obtained from storage 24 such as a database of card public keys that can be provided, for example, by a key management authority. The application provider can further digitally sign each K2KTU 23 using its AP SK 21. Having secured the set of K2KTUs 23 for an application, the application provider can transmit the ALU primes 20 and the K2KTUs 23 to the personalization bureau via any secure or non-secure transmission means.
[0019] As shown in Figure 2, at the personalization bureau, an ALU prime 25 can be selected for loading on a desired smart card 28. Based on the card ID (MCD_ID) 282, and, as applicable, an application ID, a correct K2KTU 262 can be selected from the one or more K2KTUs 260 created for that application. After loading the KTU prime 252 from the ALU prime 25 into the target IC card 28, the K2KTU 262 can be loaded. However, the order of these loads can be altered within the scope of certain embodiments. After load initiation (e.g., using a "CREATE MEL" command), the certificate can be checked and the AP_PK extracted. The application signature may then be checked. Following application signature check, the K2KTU signature can be verified using AP PK. The K2KTU 262 can be decrypted using the smart card's secret key (MKD SK). Then the K2KTU 262 can be checked to ensure that this particular ALU is intended for the desired IC card 28. Finally, the regular KTU can be decrypted using the KEK 22 contained within K2KTU 262. Once the regular KTU is translated from the KTU prime25 using the KEK 22, application load proceeds as normal.
[0020] In certain embodiments, no HSM need be present at the location of the card application terminal (i.e., no key ceremony is required) when the K2KTU component is used. Further, the application provider can create multiple K2KTUs 23 for an application or create multiple sets of K2KTUs 23 for an associated set of multiple applications and distribute the one or more confidential ALU primes 20 to a personalization bureau for more efficient batch processing of multiple IC cards. For a particular application (e.g., based on an applications ID) and a particular card (i.e., based on the card's ID), the proper K2KTU can be selected from the proper set of K2KTUs (i.e., where each set of K2KTUs can be representative of a particular application, and each member K2KTU within a set is associated with a particular card to receive that application).
Additional Descriptions of certain Aspects of the Invention
[0021] Certain embodiments of the invention provide methods for securely loading an application, comprising the steps of maintaining a plurality of cryptographic keys in an electronically addressable device, communicating one or more applications to the device, the one or more applications encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using a common key, wherein the common key and the one or more applications are furnished by a provider and the common key is common to a plurality of devices, and communicating the common key to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys. In some of these embodiments, each of the communicating the one or more applications and the communicating the common key is secured using selected ones of the plurality of cryptographic keys including a provider-specific key. In some of these embodiments, the plurality of cryptographic keys includes a device-specific public transport key. In some of these embodiments, the common key is communicated to the device upon verification of the device-specific public transport key by a key management authority.
[0022] In some of these embodiments, the plurality of cryptographic keys includes a device-specific secret transport key operative to extract the common key from the second plaintext key transformation unit. In some of these embodiments, the plurality of cryptographic keys includes the common key and wherein the second plaintext key transformation unit is digitally signed using a secret key of the provider. In some of these embodiments, the communicating includes communicating one or more of the plurality of cryptographic keys to the provider, the one or more cryptographic keys including a device- specific public transport key, and identifying the device to the provider. In some of these embodiments, the device is one of a plurality of devices and further comprising the steps of encrypting each of the one or more applications using keys associated with the each application, encrypting the first plaintext key transformation unit using the common key, the plaintext key transformation unit including the associated keys and corresponding application-specific information, and for each of the plurality of devices, encrypting second plaintext key transformation units using public transport keys associated with each of the plurality of devices, the second plaintext key transformation units including the common key, information specific to the each application and device-specific information, and digitally signing each second key transformation unit using a private key of the provider.
[0023] In some of these embodiments, the second plaintext key transformation units are encrypted using symmetric encryption. In some of these embodiments, the symmetric encryption is Triple DES. In some of these embodiments, the symmetric encryption is AES. In some of these embodiments, the plurality of cryptographic keys includes keys associated with the plurality of devices. In some of these embodiments, the device-specific secret key and the device-specific public key are provided using an asymmetric technique. In some of these embodiments, the asymmetric technique is RSA. In some of these embodiments, the plurality of cryptographic keys includes certified public and secret keys furnished by a certification authority, and further comprising the steps of encrypting a provider-specific public key using a certified secret key to obtain a provider-specific public key certificate, signing the encrypted application using a provider-specific secret key to obtain a digital signature, and signing the second key transformation unit using the provider-specific secret key to obtain a digital signature. In some of these embodiments, the step of verifying the provider-specific public key certificate with the certified public key.
[0024] In some of these embodiments, the method also comprises deriving the provider- specific public key from a decrypted public key certificate associated with the provider, and verifying the digital signatures of the application and second key transformation unit based on the derived provider-specific public key. In some of these embodiments, the decrypted public key certificate contains application-specific information. In some of these embodiments, the method also comprises decrypting the verified second plaintext key transformation unit using a verified device-specific private transport key, and verifying the resultant first plaintext key transformation unit is intended for the device, the verifying including comparing the identity of the device with a device identification in the first plaintext key transformation unit, confirming that the plurality of cryptographic keys includes the common key, decrypting the first plaintext key transformation unit associated with the application using the first key, associating the first plaintext key transformation unit with the decrypted second plaintext key transformation unit, and decrypting the application using the plurality of keys contained within the first plaintext key transformation unit.
[0025] In some of these embodiments, a device is employed that comprises a computing device and storage, the device configured to receive an encrypted application, wherein the storage maintains a plurality of cryptographic keys including a device-specific private transport key and a common key and the computing device is configured to decrypt the encrypted application using the device-specific private transport key and the common key. In some of these embodiments, the encrypted application is encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using the common key, wherein the common key and the one or more applications are furnished by a provider. In some of these embodiments, the common key is provided to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys. In some of these embodiments, the encrypted application and the common key are provided to the device using selected ones of the plurality of cryptographic keys including a provider- specific key to secure communication of the encrypted application and the common key.
[0026] In some of these embodiments, a method for secure application loading of an application to electronically addressable devices is provided. The method may comprise the steps of maintaining a plurality of cryptographic keys within the device, providing the device with one or more applications, encrypted using a plurality of cryptographic keys within a plaintext key transformation unit and said plaintext key transformation unit being encrypted using a non-device-specifϊc key, each application and non-device-specific key being furnished by a provider, providing the device with the non-device-specific key within a plaintext key transformation unit, encrypted using a device-specific transport key resulting in the key-encryption-key key transformation unit. In some of these embodiments, the communication of the application and non-device-specific key are secured using selected ones of the plurality of cryptographic keys, including a provider-specific key associated with a provider.
[0027] In some of these embodiments, the method may further comprise encrypting a plurality of applications intended for different devices using a plurality of keys, formatting the plurality of keys and application-specific information into a plaintext key transformation unit and encrypting said key transformation unit using a single non-device-specific key, formatting the non-device-specific key, application-specific information and device-specific information into a plaintext key transformation unit and encrypting said key transformation unit using each of the device-specific public transport keys of the plurality of devices resulting in the key-encryption-key key transformation units, digitally signing each key- encryption-key key transformation unit using a provider private key. [0028] Although the application has been particularly described with reference to embodiments thereof, it should be readily apparent to those of ordinary skill in the art that various changes, modifications, substitutes and deletions are intended within the form and details thereof, without departing from the spirit and scope of the application. Accordingly, it will be appreciated that in numerous instances some features of certain embodiments will be employed without a corresponding use of other features. Further, those skilled in the art will understand that variations can be made in the number and arrangement of inventive elements illustrated and described in the above figures. It is intended that the scope of the appended claims include such changes and modifications.

Claims

WHAT IS CLAIMED IS:
1. A method for securely loading an application, comprising the steps of: maintaining a plurality of cryptographic keys in an electronically addressable device; communicating one or more applications to the device, the one or more applications encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using a common key, wherein the common key and the one or more applications are furnished by a provider and the common key is common to a plurality of devices; and communicating the common key to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys, wherein each of the communicating the one or more applications and the communicating the common key is secured using selected ones of the plurality of cryptographic keys including a provider-specific key.
2. A method according to claim 1, wherein the plurality of cryptographic keys includes a device-specific public transport key.
3. A method according to claim 2, wherein the common key is communicated to the device upon verification of the device-specific public transport key by a key management authority.
4. A method according to claim 3, wherein the plurality of cryptographic keys includes a device-specific secret transport key operative to extract the common key from the second plaintext key transformation unit.
5. A method according to claim 1, wherein the plurality of cryptographic keys includes the common key and wherein the second plaintext key transformation unit is digitally signed using a secret key of the provider.
6. A method according to claim 1, wherein the communicating includes communicating one or more of the plurality of cryptographic keys to the provider, the one or more cryptographic keys including a device-specific public transport key; and identifying the device to the provider.
7. A method according to claim 1, wherein the device is one of a plurality of devices and further comprising the steps of encrypting each of the one or more applications using keys associated with the each application; encrypting the first plaintext key transformation unit using the common key, the plaintext key transformation unit including the associated keys and corresponding application-specific information; and for each of the plurality of devices, encrypting second plaintext key transformation units using public transport keys associated with each of the plurality of devices, the second plaintext key transformation units including the common key, information specific to the each application and device-specific information; and digitally signing each second key transformation unit using a private key of the provider.
8. A method according to claim 4, wherein the second plaintext key transformation units are encrypted using symmetric encryption.
9. A method according to claim 8, wherein the symmetric encryption is Triple DES.
10. A method according to claim 8, wherein the symmetric encryption is AES.
11. A method according to claim 8, wherein the plurality of cryptographic keys includes keys associated with the plurality of devices.
12. A method according to claim 4, wherein the device-specific secret key and the device- specific public key are provided using an asymmetric technique.
13. A method according to claim 12, wherein the asymmetric technique is RSA.
14. A method according to claim 7, wherein the plurality of cryptographic keys includes certified public and secret keys furnished by a certification authority, and further comprising the steps of: encrypting a provider-specific public key using a certified secret key to obtain a provider-specific public key certificate; signing the encrypted application using a provider-specific secret key to obtain a digital signature; and signing the second key transformation unit using the provider-specific secret key to obtain a digital signature.
15. A method according to claim 14, and further comprising the step of verifying the provider-specific public key certificate with the certified public key.
16. A method according to claim 15, and further comprising the steps of: deriving the provider-specific public key from a decrypted public key certificate associated with the provider; and verifying the digital signatures of the application and second key transformation unit based on the derived provider-specific public key.
17. A method according to claim 16, wherein the decrypted public key certificate contains application-specific information.
18. A method according to claim 16, and further comprising the steps of: decrypting the verified second plaintext key transformation unit using a verified device-specific private transport key; and verifying the resultant first plaintext key transformation unit is intended for the device, the verifying including comparing the identity of the device with a device identification in the first plaintext key transformation unit, confirming that the plurality of cryptographic keys includes the common key, decrypting the first plaintext key transformation unit associated with the application using the first key, associating the first plaintext key transformation unit with the decrypted second plaintext key transformation unit, and decrypting the application using the plurality of keys contained within the first plaintext key transformation unit.
19. A device comprising a computing device and storage, the device configured to receive an encrypted application, wherein: the storage maintains a plurality of cryptographic keys including a device-specific private transport key and a common key; and the computing device is configured to decrypt the encrypted application using the device-specific private transport key and the common key.
0. A device according to claim 19, wherein: the encrypted application is encrypted using cryptographic keys provided in a first plaintext key transformation unit, the first plaintext key transformation unit being encrypted using the common key, wherein the common key and the one or more applications are furnished by a provider; the common key is provided to the device in a second plaintext key transformation unit, the second plaintext key transformation unit being encrypted using one or more device-specific transport keys; and the encrypted application and the common key are provided to the device using selected ones of the plurality of cryptographic keys including a provider-specific key to secure communication of the encrypted application and the common key.
PCT/US2007/009776 2006-04-19 2007-04-19 Methods and systems for ic card application loading WO2008054512A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP07867086A EP2016535A4 (en) 2006-04-19 2007-04-19 Methods and systems for ic card application loading

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US79354306P 2006-04-19 2006-04-19
US60/793,543 2006-04-19

Publications (2)

Publication Number Publication Date
WO2008054512A2 true WO2008054512A2 (en) 2008-05-08
WO2008054512A3 WO2008054512A3 (en) 2008-10-02

Family

ID=39344803

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/009776 WO2008054512A2 (en) 2006-04-19 2007-04-19 Methods and systems for ic card application loading

Country Status (3)

Country Link
US (1) US7523495B2 (en)
EP (1) EP2016535A4 (en)
WO (1) WO2008054512A2 (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8670564B1 (en) 2006-08-14 2014-03-11 Key Holdings, LLC Data encryption system and method
US8201258B2 (en) * 2007-10-17 2012-06-12 Spansion Llc Secure personalization of memory-based electronic devices
ITMI20080536A1 (en) * 2008-03-28 2009-09-29 Incard Sa METHOD TO PROTECT A CAP FILE FOR AN INTEGRATED CIRCUIT CARD.
USRE47248E1 (en) * 2008-05-07 2019-02-19 Cina Solutions Inc. One card system
WO2010127003A1 (en) * 2009-04-28 2010-11-04 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US8397376B2 (en) 2010-08-26 2013-03-19 CPI Card Group—Colorado, Inc. System for automated production processing of smart cards
US8774410B1 (en) * 2011-12-23 2014-07-08 Emc Corporation Secret sharing in cryptographic devices via controlled release of plaintext information
US8898769B2 (en) 2012-11-16 2014-11-25 At&T Intellectual Property I, Lp Methods for provisioning universal integrated circuit cards
US8959331B2 (en) 2012-11-19 2015-02-17 At&T Intellectual Property I, Lp Systems for provisioning universal integrated circuit cards
US9036820B2 (en) 2013-09-11 2015-05-19 At&T Intellectual Property I, Lp System and methods for UICC-based secure communication
US9124573B2 (en) 2013-10-04 2015-09-01 At&T Intellectual Property I, Lp Apparatus and method for managing use of secure tokens
US9208300B2 (en) 2013-10-23 2015-12-08 At&T Intellectual Property I, Lp Apparatus and method for secure authentication of a communication device
US9240994B2 (en) 2013-10-28 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for securely managing the accessibility to content and applications
US9313660B2 (en) 2013-11-01 2016-04-12 At&T Intellectual Property I, Lp Apparatus and method for secure provisioning of a communication device
US9240989B2 (en) 2013-11-01 2016-01-19 At&T Intellectual Property I, Lp Apparatus and method for secure over the air programming of a communication device
US9413759B2 (en) 2013-11-27 2016-08-09 At&T Intellectual Property I, Lp Apparatus and method for secure delivery of data from a communication device
CN103761118B (en) * 2013-12-27 2018-05-04 北京大唐智能卡技术有限公司 A kind of smart card and the method for smartcard internal administration application
US9713006B2 (en) 2014-05-01 2017-07-18 At&T Intellectual Property I, Lp Apparatus and method for managing security domains for a universal integrated circuit card
US11610188B2 (en) 2020-04-15 2023-03-21 Capital One Services, Llc Systems and methods for ATM integrated card fabricator

Family Cites Families (127)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218582A (en) 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4259720A (en) 1978-01-09 1981-03-31 Interbank Card Association Security system for electronic funds transfer system
US4408203A (en) 1978-01-09 1983-10-04 Mastercard International, Inc. Security system for electronic funds transfer system
US4214230A (en) 1978-01-19 1980-07-22 Rolf Blom Personal identification system
FR2455320B1 (en) 1979-04-25 1986-01-24 Cii Honeywell Bull DEVICE FOR RECYCLING IDENTIFIABLE RECORDING MEDIA USING IDENTIFICATION DATA AND NON-VOLATILE DELETE MONOLITHIC MEMORY COMPOUNDS
US4321672A (en) 1979-11-26 1982-03-23 Braun Edward L Financial data processing system
US4302810A (en) 1979-12-28 1981-11-24 International Business Machines Corporation Method and apparatus for secure message transmission for use in electronic funds transfer systems
US4305059A (en) 1980-01-03 1981-12-08 Benton William M Modular funds transfer system
FR2480539B1 (en) 1980-04-09 1985-09-13 Cii Honeywell Bull METHOD AND SYSTEM FOR TRANSMITTING SIGNED MESSAGES
US4341951A (en) 1980-07-02 1982-07-27 Benton William M Electronic funds transfer and voucher issue system
FR2497617B1 (en) 1981-01-07 1989-08-18 Transac Develop Transactions A SECURITY METHOD AND DEVICE FOR TRIPARTITY COMMUNICATION OF CONFIDENTIAL DATA
US4423287A (en) 1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4453074A (en) 1981-10-19 1984-06-05 American Express Company Protection system for intelligent cards
US4906828A (en) 1983-02-28 1990-03-06 Paperless Accounting, Inc. Electronic money purse and fund transfer system
US4536647A (en) 1983-07-15 1985-08-20 Atalla Corporation Pocket banking terminal, method and system
US4759064A (en) 1985-10-07 1988-07-19 Chaum David L Blind unanticipated signature systems
US4926480A (en) 1983-08-22 1990-05-15 David Chaum Card-computer moderated systems
US4759063A (en) 1983-08-22 1988-07-19 Chaum David L Blind signature systems
US4605820A (en) 1983-11-10 1986-08-12 Visa U.S.A. Inc. Key management system for on-line communication
SE442249B (en) 1983-11-17 1985-12-09 Ericsson Telefon Ab L M PROCEDURE AND DEVICE FOR VERIFICATION OF PERSONAL IDENTIFICATION NUMBER AND CHECKING INSERT NUMBER SERIES IN IDENTIFICATION MEDIA
US4745267A (en) 1983-12-28 1988-05-17 Fairview Partners Fraudulent card intercept system
DE3579815D1 (en) 1984-02-09 1990-10-25 Toshiba Kawasaki Kk DATA PROCESSING TERMINAL.
US4630201A (en) 1984-02-14 1986-12-16 International Security Note & Computer Corporation On-line and off-line transaction security system using a code generated from a transaction parameter and a random number
JPS60144154U (en) 1984-03-07 1985-09-25 シャープ株式会社 portable computer
US4736094A (en) 1984-04-03 1988-04-05 Omron Tateisi Electronics Co. Financial transaction processing system using an integrated circuit card device
US4709137A (en) 1984-04-16 1987-11-24 Omron Tateisi Electronics Co. IC card and financial transaction processing system using IC card
US4727243A (en) 1984-10-24 1988-02-23 Telenet Communications Corporation Financial transaction system
GB2168514A (en) 1984-12-12 1986-06-18 Ibm Security module
US4650978A (en) 1985-01-23 1987-03-17 Rmh Systems, Inc. Off line cash card system and method
JPS61210488A (en) 1985-03-14 1986-09-18 Toppan Moore Co Ltd Ic card
JPS61264485A (en) 1985-05-18 1986-11-22 Hitachi Maxell Ltd Reader and writer for integrated circuit card
JPS61278989A (en) 1985-06-04 1986-12-09 Toppan Moore Co Ltd Reader/writer of ic card
JPH069067B2 (en) 1985-07-16 1994-02-02 カシオ計算機株式会社 IC card system
JPH0818473B2 (en) 1985-07-31 1996-02-28 トッパン・ムーア株式会社 IC card that can set confidentiality level
JPH0762862B2 (en) 1985-09-17 1995-07-05 カシオ計算機株式会社 Authentication method in IC card system
US4752677A (en) 1985-09-25 1988-06-21 Casio Computer Co., Ltd. Customer service system for use in IC card system
US4778983A (en) 1985-10-12 1988-10-18 Sanden Corporation Automatic vending machine
US4669596A (en) 1985-10-22 1987-06-02 Debitek, Inc. Vending machine accessory permitting dual mode machine operation with either money or coded cards
JPS62105293A (en) 1985-10-31 1987-05-15 Toshiba Corp Reading/writing device for portable recording medium
FR2591008B1 (en) 1985-11-30 1991-05-17 Toshiba Kk PORTABLE ELECTRONIC DEVICE
US4849614A (en) 1985-12-27 1989-07-18 Toppan Moore Company, Ltd. Composite IC card
FR2592510B1 (en) 1985-12-31 1988-02-12 Bull Cp8 METHOD AND APPARATUS FOR CERTIFYING SERVICES OBTAINED USING A PORTABLE MEDIUM SUCH AS A MEMORY CARD
JPS62179994A (en) 1986-02-04 1987-08-07 カシオ計算機株式会社 Electronic card
US4874935A (en) 1986-03-10 1989-10-17 Data Card Coprporation Smart card apparatus and method of programming same
JPS62222363A (en) 1986-03-25 1987-09-30 Omron Tateisi Electronics Co Automatic transaction processing device
JPS62254265A (en) 1986-04-28 1987-11-06 Hitachi Ltd Control system for automatic cash transaction machine
US4742215A (en) 1986-05-07 1988-05-03 Personal Computer Card Corporation IC card system
US4816654A (en) 1986-05-16 1989-03-28 American Telephone And Telegraph Company Improved security system for a portable data carrier
US4816653A (en) 1986-05-16 1989-03-28 American Telephone And Telegraph Company Security file system for a portable data carrier
US4839792A (en) 1986-06-20 1989-06-13 Kabushiki Kaisha Toshiba Portable electronic apparatus with a device for determining data validity
JP2537199B2 (en) 1986-06-20 1996-09-25 株式会社東芝 IC card
US4748668A (en) 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
FR2601535B1 (en) 1986-07-11 1988-10-21 Bull Cp8 METHOD FOR CERTIFYING THE AUTHENTICITY OF DATA EXCHANGED BETWEEN TWO DEVICES CONNECTED LOCALLY OR REMOTELY THROUGH A TRANSMISSION LINE
FR2601795B1 (en) 1986-07-17 1988-10-07 Bull Cp8 METHOD FOR DIVERSIFYING A BASE KEY AND FOR AUTHENTICATING A KEY THUS DIVERSIFIED AS HAVING BEEN PREPARED FROM A PREDETERMINED BASE KEY, AND SYSTEM FOR IMPLEMENTING IT
JPS6332658A (en) 1986-07-28 1988-02-12 Casio Comput Co Ltd Ic card system
JPH07104891B2 (en) 1986-08-05 1995-11-13 沖電気工業株式会社 Transaction processor
US4802218A (en) 1986-11-26 1989-01-31 Wright Technologies, L.P. Automated transaction system
JPS6373388A (en) 1986-09-16 1988-04-02 Fujitsu Ltd Area acquiring system for ic card for plural services
JPH087720B2 (en) 1986-09-16 1996-01-29 富士通株式会社 Area access method for IC cards for multiple services
JPS63120391A (en) 1986-11-10 1988-05-24 Hitachi Ltd Ic card
US4900904A (en) 1986-11-26 1990-02-13 Wright Technologies, L.P. Automated transaction system with insertable cards for downloading rate or program data
US4969188A (en) 1987-02-17 1990-11-06 Gretag Aktiengesellschaft Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
JPH0758500B2 (en) 1987-02-20 1995-06-21 株式会社東芝 Portable electronic device
EP0281058B1 (en) 1987-03-04 1993-02-03 Siemens Nixdorf Informationssysteme Aktiengesellschaft Data exchange system
FR2611962B1 (en) 1987-03-06 1989-06-09 Trt Telecom Radio Electr SYSTEM AND METHOD FOR APPLIED CRYPTOGRAPHY
JPS63236186A (en) 1987-03-24 1988-10-03 Mitsubishi Electric Corp Card issuing device
US4949257A (en) 1987-04-28 1990-08-14 Zvi Orbach Automated merchandising system for computer software
US4797920A (en) 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US4984270A (en) 1987-06-19 1991-01-08 The Exchange System Method and system for transmission of financial data
JPH0161764U (en) 1987-10-09 1989-04-19
US4853961A (en) 1987-12-18 1989-08-01 Pitney Bowes Inc. Reliable document authentication system
FR2626095B1 (en) 1988-01-20 1991-08-30 Sgs Thomson Microelectronics SECURITY SYSTEM FOR PROTECTING PROGRAMMING AREAS OF A CHIP CARD
US5005200A (en) 1988-02-12 1991-04-02 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5214702A (en) * 1988-02-12 1993-05-25 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5012076A (en) 1988-03-02 1991-04-30 Hitachi, Ltd. Transaction method wherein transaction amount is compared with account balance before ID is entered
US4987593A (en) 1988-03-16 1991-01-22 David Chaum One-show blind signature systems
US4995081A (en) 1988-03-21 1991-02-19 Leighton Frank T Method and system for personal identification using proofs of legitimacy
US4879747A (en) 1988-03-21 1989-11-07 Leighton Frank T Method and system for personal identification
US4891503A (en) 1988-03-29 1990-01-02 Gascard, Inc. Distributed authorization system
CA1321649C (en) 1988-05-19 1993-08-24 Jeffrey R. Austin Method and system for authentication
US4961142A (en) 1988-06-29 1990-10-02 Mastercard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
EP0355372B1 (en) 1988-07-20 1995-03-15 SPA Syspatronic AG Data carrier controlled terminal for a data exchange system
JP2695855B2 (en) 1988-08-26 1998-01-14 株式会社東芝 Portable electronic devices
JPH0622030B2 (en) 1988-10-03 1994-03-23 富士通株式会社 Transaction validity confirmation method
US5016274A (en) 1988-11-08 1991-05-14 Silvio Micali On-line/off-line digital signing
JPH02170272A (en) 1988-12-23 1990-07-02 Hitachi Maxell Ltd Collation system for secret information
JPH02214994A (en) 1989-02-15 1990-08-27 Hitachi Maxell Ltd Ic card
US4977595A (en) 1989-04-03 1990-12-11 Nippon Telegraph And Telephone Corporation Method and apparatus for implementing electronic cash
US4996711A (en) 1989-06-21 1991-02-26 Chaum David L Selected-exponent signature systems
FR2650097B1 (en) 1989-07-19 1992-12-31 Pailles Jean Claude CABLE MICROCIRCUIT CARD AND TRANSACTION METHOD BETWEEN A CORRESPONDING CABLE MICROCIRCUIT CARD AND A TERMINAL
FR2651347A1 (en) 1989-08-22 1991-03-01 Trt Telecom Radio Electr SINGLE NUMBER GENERATION METHOD FOR MICROCIRCUIT BOARD AND APPLICATION TO COOPERATION OF THE BOARD WITH A HOST SYSTEM.
FR2653248B1 (en) * 1989-10-13 1991-12-20 Gemolus Card International PAYMENT OR INFORMATION TRANSFER SYSTEM BY ELECTRONIC MEMORY CARD.
US5120939A (en) 1989-11-09 1992-06-09 At&T Bell Laboratories Databaseless security system
US4993068A (en) 1989-11-27 1991-02-12 Motorola, Inc. Unforgeable personal identification system
JPH0424889A (en) * 1990-05-21 1992-01-28 Toshiba Corp Ic card provided with personal identification function
DE59004248D1 (en) * 1990-07-20 1994-02-24 Siemens Nixdorf Inf Syst Procedure for preventing inadmissible deviations from the run log of an application in a data exchange system.
FR2666671B1 (en) * 1990-09-12 1994-08-05 Gemplus Card Int METHOD FOR MANAGING AN APPLICATION PROGRAM LOADED IN A MICROCIRCUIT MEDIUM.
US5131038A (en) 1990-11-07 1992-07-14 Motorola, Inc. Portable authentification system
JP3114991B2 (en) * 1990-11-30 2000-12-04 株式会社東芝 Data communication system
US5224162A (en) * 1991-06-14 1993-06-29 Nippon Telegraph And Telephone Corporation Electronic cash system
US5142578A (en) 1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
US5201000A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase
US5200999A (en) * 1991-09-27 1993-04-06 International Business Machines Corporation Public key cryptosystem key management based on control vectors
US5332889A (en) * 1992-12-18 1994-07-26 Datacard Corporation Integrated circuit card programming device
US5420405A (en) * 1993-02-26 1995-05-30 Chasek; Norman E. Secure, automated transaction system that supports an electronic currency operating in mixed debit & credit modes
US5485520A (en) * 1993-10-07 1996-01-16 Amtech Corporation Automatic real-time highway toll collection from moving vehicles
DE69431306T2 (en) * 1993-12-16 2003-05-15 Open Market Inc NETWORK-BASED PAYMENT SYSTEM AND METHOD FOR USING SUCH A SYSTEM
US5530232A (en) * 1993-12-22 1996-06-25 Datamark Services, Inc. Multi-application data card
US5511121A (en) * 1994-02-23 1996-04-23 Bell Communications Research, Inc. Efficient electronic money
US5715314A (en) * 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US5517011A (en) * 1994-11-21 1996-05-14 Oki Electric Industry Co. Ltd. Slotless card reader
US5705798A (en) * 1994-12-16 1998-01-06 Mastercard International Inc. System and method for processing a customized financial transaction card
US5708780A (en) * 1995-06-07 1998-01-13 Open Market, Inc. Internet server access control and monitoring systems
US6038551A (en) * 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US5889941A (en) * 1996-04-15 1999-03-30 Ubiq Inc. System and apparatus for smart card personalization
US7917760B2 (en) * 1997-02-21 2011-03-29 Multos Limited Tamper resistant module having separate control of issuance and content delivery
US6317832B1 (en) * 1997-02-21 2001-11-13 Mondex International Limited Secure multiple application card system and process
US6575372B1 (en) * 1997-02-21 2003-06-10 Mondex International Limited Secure multi-application IC card system having selective loading and deleting capability
US6005942A (en) * 1997-03-24 1999-12-21 Visa International Service Association System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6488211B1 (en) * 1997-05-15 2002-12-03 Mondex International Limited System and method for flexibly loading in IC card
US6385723B1 (en) * 1997-05-15 2002-05-07 Mondex International Limited Key transformation unit for an IC card
US6230267B1 (en) * 1997-05-15 2001-05-08 Mondex International Limited IC card transportation key set
US20020062451A1 (en) * 1998-09-01 2002-05-23 Scheidt Edward M. System and method of providing communication security
US8146142B2 (en) * 2004-09-03 2012-03-27 Intel Corporation Device introduction and access control framework
TWI418198B (en) * 2006-01-24 2013-12-01 Stepnexus Holdings Method and system for personalizing smart cards using asymmetric key cryptography

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of EP2016535A4 *

Also Published As

Publication number Publication date
US7523495B2 (en) 2009-04-21
WO2008054512A3 (en) 2008-10-02
US20080005559A1 (en) 2008-01-03
EP2016535A4 (en) 2010-06-23
EP2016535A2 (en) 2009-01-21

Similar Documents

Publication Publication Date Title
US7523495B2 (en) Methods and systems for IC card application loading
EP0985203B1 (en) Key transformation unit for an ic card
Hansmann et al. Smart card application development using Java
US6588673B1 (en) Method and system providing in-line pre-production data preparation and personalization solutions for smart cards
CA2306139C (en) Personalization of smart cards
US6230267B1 (en) IC card transportation key set
EP1977552B1 (en) Method and system for personalizing smart cards using asymmetric key cryptography
US7357309B2 (en) EMV transactions in mobile terminals
EP0976114B1 (en) Secure multiple application card system and process
US8627080B2 (en) Systems and methods for mutual authentication using one time codes
US8375212B2 (en) Method for personalizing an authentication token
EP0981807B1 (en) Integrated circuit card with application history list
CN101329786B (en) Method and system for acquiring bank card magnetic track information or payment application for mobile terminal
GB2358500A (en) Programming data carriers
EP1504424B1 (en) An authentication token
CN111801671A (en) Secure end-to-end personalization of smart cards
CN101330675A (en) Mobile payment terminal equipment
WO1997024831A1 (en) Multiple cryptographic key distribution
EP1053536A1 (en) System and method for controlling access to computer code in an ic card
US20200286085A1 (en) Security for contactless transactions
KR100901297B1 (en) System for Virtual Mechant Network Application
WO2015177310A1 (en) System and method for post-issuance enablement of asymmetric-key application loading on smartcards issued as symmetric-key application-loading smartcards
KR101145832B1 (en) Payment terminal and card payment method of a payment terminal via virtual merchant network
WO2014033269A1 (en) System and method for secure customization of a personal token during a personalization step
CN103155010B (en) For smart card being carried out personalized method for simplifying and the equipment being associated

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07867086

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007867086

Country of ref document: EP