CA2294469A1 - Chip card for executing non-modifiable system program routines and their associated replacement program routines, and a method for operating the chip card - Google Patents

Chip card for executing non-modifiable system program routines and their associated replacement program routines, and a method for operating the chip card Download PDF

Info

Publication number
CA2294469A1
CA2294469A1 CA002294469A CA2294469A CA2294469A1 CA 2294469 A1 CA2294469 A1 CA 2294469A1 CA 002294469 A CA002294469 A CA 002294469A CA 2294469 A CA2294469 A CA 2294469A CA 2294469 A1 CA2294469 A1 CA 2294469A1
Authority
CA
Canada
Prior art keywords
routine
chip card
system program
routines
replacement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002294469A
Other languages
French (fr)
Inventor
Markus Weinlander
Rainer Worz
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2294469A1 publication Critical patent/CA2294469A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The inventive chip card (CK) has an operating system (H) for executing nonmodifiable system program routines (U). Before a system program routine (U) is executed, said operating system (H) requests a check routine (OMF) and allocates said check routine (OMF) an ID code, said ID code (Q11) identifying the corresponding system program routine (U). Using the check routine (OMF) and the ID code, the operating system (H) checks whether a replacement program routine (U') has been allocated (Q12) to the system program routine (U), and if this is the case (Q31), executes said replacement program routine (U'). In the event that no replacement program routine has been allocated (Q32), the system program routine (U) is executed (Q41). The non-modifiable system program routines (U) are stored especially in a non-volatile read-only memory (S1, ROM) and the replacement program routines (U') especially in a write read memory (S2, EEPROM) of the chip card (CK).

Description

DEC-20-99 16:19 Wordsmith P.02 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time' 4:12:06 PM Page 2 of 22 Chip Card for Executing Non-modifiable System Program Routines and Their Associated Replacement Program Routines, and a Method for Operating the Chip Card EP 0 451 936 A1 describes a program control system for a transportable data storage unit, in particular, for a chip card.
With the aid of a communications program, a program for priority monitoring, and a table, the programs can be replaced by alternative programs if such an exchange is requested by way of an instruction from the read/write device.
In the case of chip cards, the data, programs rmztines, and the like that are stored in the non-volatile read memory of the chip card cannot be modified subsequently. This presents a particular problem if the programming on the basis of which the chip card is manufactured has not been finalized, or if i~ intended that subsequent modifications can be installed. Particularly in the case of system program routines that are used, fevr example, to provide for cryptographic security or interface operation functions, it is frequently desirable to be able to make such subsequent modifications or adaptations as may be required for a particular application.

DEC-20-99 16:19 Wordsmith P.03 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 3 of 22 As a rule, the program routines, in particular tree system program routines, which can, for example, be component of an operating system of the chip card, can be stored in a non-volatile read memory in the chip card. Such a non-volatile read memory is, for example, the so-called read-only memory (KOM) or a non-volatile read memory that can be reprogrammed but only at great expense (EPROM).
It is a disadvantage that in order to modify ~vroc~ram routines or data stored in the non-volatile read memory of the chip card, it may be necessary to replace all the memory module by a newly programmed memory modmle. In the case of chip cards, this poses a special problem if the memory modules have already been integrated and sealed into the chip card, which means that the chip card is rendered unusable and a new one has to be mane-factured.
It is the objective of the present invention to make the non changeable system program routines of a chip card adaptable.
This objective has been achieved with the method for operating a chip card according to the present invention, as is described in Claim 1, and a chip card, as described in Claim ~, which is used to carry out the method according to the present invention.
DEC-20-99 16:19 Wordsmith P.04 R-378 Job-131 From: Collett Calverley 613 849 2280 To: Robert J. Cleland Date: Time: 4:12:08 PM Page 4 of 22 The advantage of the present invention is the fact that the non-changeable system prcgram routines can be repla~Jed selectively by replacement program routines. According to the present invention, when this is done, it can be established whether or not a replacement program routine is associated with a non-changeable system program routine by using a check routine incorporated in the chip card. Should this be the case then, according to the present invention, the replacement program routine is executed, whereas in the other case the originally stored system program routine will be used.
It is an added advantage that instr~zctions of the processing unit in the chip card, in particular operating system instructions, which serve to call up the non-changeable sy.~tem program routines are stored as modified. This means, for example, that the operating system can be developed and programmed as was usually the case. Then, in particular, the jump addresses that are used to call up the system program routines are repla~~~e~~ by new j ump addresses which lead to the check routines according to the present invention. This can be effected, for example, by a modified compiler. A code is transferred as the transfer parameter to the check routine and this code fl:~gs the system program routine that was to have been executed ~-~riginally. Each code is associated with a specific system program routine. In particular, only the jump addresses that ~,a17up those system DEC-20-99 16:19 Wordsmith P.05 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 5 of 22 program routines which are to be replaced by replacement program routines are modified. Because of this, when the chip card is programmed, two classes of system program ro~ztinPS can be established, i.e., "replaceable" and "non-replaceable."
It is advantageous that a code that identifi.e~; .~ system program routine, for example, a so-called "identifier," serves as a search criterion of the check routine, in particwla.r in a pointer table.
In this, the appropriate codes are associated, for example, with the memory addresses with which the corresponding replacement program routines can be called up and executed. And it is an advantage that a plurality of pointer tables that are linked to each other can be chained together. It is advantageous that an additional second pointer table for branching b.~~_k into the original system program routines serves the check routine in the event that no appropriate replacement program r~m;tine could be found. Thus, the operating system remains fully functional by means of the system program routines, even without replacement program routines.
One advantage of the ~~hip card according to the present invention is the fact that the system program routines care be stored in a non-volatile read memory such as a so-called ROM so as to be invariable. In contrast to this, the replacement program routines are stored in a read-write in memory such as an FEPROM

DEC-20-99 16:19 Wordsmith P.O6 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 6 of 22 [electrically erasable read-only mernory]. In this connection, it is advantageous that replacement programs routines that are intended to replace specific system program r~~ufi~nes can still be stored at any time subsequently, even when the chip card is being operated. This provides for a high level of adaptability and flexibility in the way that. the chip card accc~r~~ing to the present invention is used. Furthermore, a more rapid developmental process for the chip card as possible since when installing the software in the hardware, in particular the system pro~.~ram routines, it is not essential that all the details have to be known conclusively.
For example, a system program routine can exist as a type of place holder, and can be incorporated later as a replac-,ement program routine for a particular application.
Additional and advantageous versions of the present invention are described in the corresponding secondary ~~lairra.
The present invention will be described in greater detail below on the basis of embodiments that are shown in the drawings appended hereto. These drawings show the following:
Figure 1: the schematic structure of a chip card according to the present invention, with a non-volatile read memory for system program routines and a read-write memory for replacement program routines;

DEC-20-99 16:19 Wordsmith P.O7 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 7 of 22 Figure 2: an example of a flowchart for the method according to the present. invention that is used to operate a chip card.
Figure 1 is a diagram showing the structure oi- a chip card CK
according to the present invention with an operating system H that serves to execute at least the non-changeable system program routines U, U1...Un. In the method according to the present invention, before a system program routines U is executed, the operating system H calls up a check routine OMF and transfers a code ID which flags the particular system pro~~ram routine to this.
The OMF check routine is also referred to as the overload management function. Calling up the check routine OMF is indicated in Figure 1 by the dashed line and arrow that i:~ designated Q11.
Using the check routine OMF and the code ID thar_ has been transferred, according to the present invention, the operating system H checks as to whether or not a corresponding replacement program routine U' is associated with the system program routine U. This is indicated in Figure 1 by the dashed line and arrow that is designated Q12. If a replacement program routine U' can be associated with the current system program routine U, this is executed, as is indicated by the dashed arrow Q.31. If this is not the case, the origina_L system program i:outine U is executed, as is indicated by the dashed arrows Q32 and Q41.

DEC-20-99 16:19 Wordsmith P.08 R-378 Job-131 From: Collect Calverley 613 649 2280 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 8 of 22 In particular, the system program routines U, U1...Un are stored so as to be invariable in a non-volatile read memory S1 of the chip card CK so as to execute the method arc~rding to the present invention. The non-volatile read memory S1 can be a so-called ROM, for example. The memory addresses A, A1...An of the non-volatile read memory S1. prcvide the direct or indirect starting addresses for calling up the system program routines U, LJl...Un.
Furthermore, in the example shown in Figure 1, the replacement program routines U', U1', U4' are stored, in Fvarticular, in a read-write memory S2 of the chip card acc~~rding to the present invention, the memory addresses A', A1', A4' providing the corresponding starting addresses. As an example, the read-write memory S2 can be a so-called EEPROM.
In one advantageous embodiment of the method according to the present invention, the operating system instructions Hl...H3 within the operating system H serve, particu~yarly, to call up non-changeable program routines U. In the example shown in Figure 1, this is the jump instruction "CALL." As a rule, this type of jump instruction has a direct or indirect jump address JMP, which results in branching to a system program U and to its execution.
When this occurs, in the example shown in figure 2, the jump instruction that bears the reference number H% causes direct execution of the system program routine U2. For this reason, the system program routine U2 cannot be replaced by a corresponding DEC-20-99 16:19 Wordsmith P.09 R-378 Job-131 From: Collect Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 9 of 22 replacement program routine. In contrast to this, the jump instructions that bear the reference numbers H1 and H3 serve to call up the system program routines IJ1 and U3 when, according t.o the present invention, before these are executed a check is performed in order to ascertain whether or not a corresponding replacement program routine U' which is meant to been executed in place of the system program routine has been assigned. As an example, in the case of the jump instructions designated H1 and H3, the original jump addresses JMP which serve to branch directly to the memory addresses A1 and A3 of the system program routines U1 and U3 are each replaced by a jump address JMP, which branch es to check routine OMF. In such a case, the cod es ID1 or ID3 that are shown symbolically in Figure 1 enclosed in brackets, are transferred, in particular, as parameters to the check routine OMF
so that this can check whether or not appropriately associated replacement program routines U' are present..
In another advantageous embodiment of the method according to the present invention, a memory address A' is assigned to each of the codes ID of the system program routine U to whi~:h a replacement program routine U' is assigned. At the memory address A', the operating system H branches to the corresponding replacement program routine U', which executes this routine. In the chip card CK according to the present invention, which is used to perform the method according to the present invention, a first associ_ati~~n _g_ DEC-20-99 16:19 Wordsmith P.10 R-378 Job-131 From: Collett Calverley 613 648 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 10 of 22 means T1 serves to provide the association between the corresponding codes ID and the replacement program routines U'.
These are stored i.n the read-write memory ~2 in the form of a first pointer table. It is advantageous that the first association means T1 serve to associate the codes ID1 t.o the memory addresses A' of the read-write memory S2, which branch to the appropriate replacement program routines U'. In this case, as a rule, the memory addresses A' provide the direct or indirect starting addresses in the read-write memory S2, where the corresponding replacement program routines U' are stored.
In the example shown in Figure l, the replacement program routines U1' or U4' are associated with the system program routines U1 and U4. According to the present invention, the replacement program routines U1' or U4' are executed in place of the system program routines LJ1 and U4. The corresponding memory addresses A1' or A4' of the read-write memory S2 are associated with the codes IDl and ID4 which the system program routines U1 or U4 flag, by means of the first pointer table T12, and these branch to the replacement program routines U1' or U4' As an example, on execution of the operating system instruction H1, the operating system H searches for the c~_~de ID1 in the first pointer table T1, using the check function OMF. In the example shown in Figure 1 the memory address Al', by which the operating _g_ DEC-20-99 16:19 Wordsmith P.11 R-3T8 Job-131 From: Collett CaNerley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 11 of 22 system H branches to the replacement program routine U1', which is stored in the read-write memory S2, and then executes, is associated with this.
In one preferred embodiment of the chip card CK according to the present invention, this incorporates second association means T2 which are stored in the non-volatile memory S1, in particular in the form of a second pointer table. In the event that the operating system establishes the fact that nc.~ replacement program routine U' is associated with the current system program routine U
when it is checking by means of the first association means T1, by way of the check routine OMF, then the the se,-.ond association means T2 are invoked. The second association means T2 provide the association between the corresponding codes ID and the original system program routines U. It is an advantage that when this is done, the memory addresses A of the non-volatile read memory S1 which branch to the corresponding system program routines U in the non-volatile read memory S1, are associated with the codes ID.
It is preferred that only the codes ID, ID1, ID3...IDm of the system program routines U, U1, U3...Um are contained in the second association means T2, which are also meant t~> bE replaceable by the replacement program routines U'. In particular, these are the system program routines U, U1, U3...Um in which the original jump DEC-20-99 16:19 Wordsmith P.12 R-378 Job-131 From: Collect Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:08 PM Page 12 of 22 addresses of the operating system instructions H1, H3 in the operating system H that are to be called up are replaced by the jump addresses JMP, OMF of the check function OMF.
In the example shown in Figure 1, when executing the operating system instruction H3, the operating system H checks by way of the check function OMF and the flagging code ID3 whether an appropriate replacement program routine is associated with the system program routine U3. Since that is not the case here, according to the present invention, the code ID3 is searched for in the second pointer table and branches by means of the memory address A3 that is associated there to the system program routine U3 in the non-volatile read memory S1, and executes this.
It is advantageous that the check routine OMF be stored in the non-volatile read memory S1 and is, in particular, a component part of the operating system H. In particular, this also includes the system program routines U and the second association means T2 which, it is preferred, are similarly stored in the non-volatile read memory S1. A data processing unit P of the chip card CK
serves to operate the operating system H. In this connection, the data processing unit P also incorporates a microprocessor.
Figure 2 shows an example of a flow chart for a preferred embodiment of the method ar_cording to the present. invention, i.zsed DEC-20-99 16:19 Wordsmith P.13 R-378 Job-131 From: Collett Calverley 613 649 2260 To: Robert J. Cleland Date: Time: 4:12:06 PM Page 13 of 22 to operate a chip card CK. The reference nurnk~ers used relate to those used in Figure 1. According to the method according to the present invention, before a non-changeable system program routs.ne U is executed, the check routine OMF is called ~~p and a code ID
that flags the particular system program routine U is transferred to this and associated with it. The call up c:f the check routine OMF is indicated symbolically in Figure 2 by the blocks Q1, Q2, and the arrow Q11. By using the check routine OMF and the code ID, the operating system H ascertains whether or not a replacement system program routine U' has been associated with the system program routine U, which it does by searching for the code ID in the first pointer table T1. This is indi~.~ated, for example, by the arrow Q12 and the rhombus Q3. If the code ID is found in the first pointer table T1, the replacement program routine that is stored in the read-write memory S2 is executed, as indicated by the arrow Q31 and the block Q6. If, on the ot.hPr hand, the code ID is not found in the first pointer table T1, then it is sought in the second pointer table T2, and the origirual system program routine U that is stored in the non-volatile memory S1 is executed. This is indicated symbolically in Figure 2 by the arrows Q32 and Q41, and by the blocks Q4 and Q5.

Claims (10)

Claims
1.Method for operating a chip card (CK) with an operating system (H) in which the operating system a) prior to execution of a non-changeable system program routine (U, U1, U3...Um) al) calls up (Q11) a check routine (OMF) and a2) transfers a code (ID, ID1, ID3) to the check routine (OMF), which flags (Q11) the particular system program routine, and b) by means of the check routine (OMF) and the code (ID) checks whether or not a replacement program routine (U1', U4') is associated (Q2, Q21, Q3) with the system program routine (U1, U3...Um), and b1) should this be the case (Q31), executes (Q6) the replacement system program routine (U1', U4'), and b2) should this not be the case (Q32) executes (Q4, Q41, Q5) the system program routine (U, U3, Um), and c) in the operating system (H), in the case of operating system instructions (H1, H3, CALL), which serve to call up non-changeable program routines (U1, U3...Um), at least the original jump address is replaced (Q1) by a jump address (UMP) that branches to the check routine (OMF).
2. Method as defined in one of the preceding Claims, a storage address (S2, T1, A') being associated with the codes (the ID, ID1, ID4) of the system program routines (U1, U4) to which a replacement program routine (U') is associated, with which the operating system (H) branches at least to the corresponding replacement program routine (U', U1', U4').
3. Chip card (CK) for performing the method as defined in one of the preceding Claims, with a) a non-volatile read memory (S1) at least for storing the non-changeable system program routines (U, U1...Un), and b) a read-write memory (S2) at least for storing the replacment program routines (U', U1', U4').
4. Chip card (CK) as defined in Claim 3, with first association means (T1) with which an association between the appropriate codes (ID1, ID4) and the replacement program routine (U', U1', U4') can be effected (Q31) in order to check whether or not a replacement program routine (U1', U4') is associated for checking (Q3) whether or not a replacement program routine (U1', U4') is associated with the current system program routine (U1, U3...Um).
5. Chip card (CK) as defined in Claim 4, the first association means (T1) serving to associate the codes (1D1, ID4) to memory addresses (A', A1', A4') of the read-write memory (S2) that branch to the corresponding replacement program routines (U', U1', U4').
6. Chip card (CK) as defined in one of the Claims 3 to 5, with second association means (T2) with which an association between the corresponding codes (ID1, ID3...IDm) and the system program routines (U1, U3...Um) can be effected in order to check (Q3) for the case that no replacement program routine (U1', U4') is associated with a system program routine (U1, U3...Um).
7. Chip card (CK) as defined in Claim 6, the second association means (T2) serving to associate the codes (ID1, ID3...IDm) to memory addresses (A, A1, A3...Am) of the non-volatile read memory (S1) that branch to the corresponding system program routines (U1, U3...Um).
8. Chip card (CK) as defined in one of the Claims 4 to 7, the first association means (T1) being stored in the read-write memory (S2) in the form of a first pointer table.
9. Chip card (CK) as defined in one of the Claim 6 to 8, the second association means (T2) being stored in the non-volatile read memory (S1) in the form of a second pointer table.
10. Chip card (CK) as defined in one of the Claims 3 to 9, the check routine (OMF) being stored in the non-volatile read memory (S1).
CA002294469A 1997-06-23 1998-06-23 Chip card for executing non-modifiable system program routines and their associated replacement program routines, and a method for operating the chip card Abandoned CA2294469A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19726584 1997-06-23
DE19726584.7 1997-06-23
PCT/DE1998/001719 WO1998059325A2 (en) 1997-06-23 1998-06-23 Chip card for executing non-modifiable system program routines and replacement program routines allocated thereto, and method for operating the chip card

Publications (1)

Publication Number Publication Date
CA2294469A1 true CA2294469A1 (en) 1998-12-30

Family

ID=7833367

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002294469A Abandoned CA2294469A1 (en) 1997-06-23 1998-06-23 Chip card for executing non-modifiable system program routines and their associated replacement program routines, and a method for operating the chip card

Country Status (3)

Country Link
EP (1) EP0992027A2 (en)
CA (1) CA2294469A1 (en)
WO (1) WO1998059325A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001056848A (en) * 1999-08-19 2001-02-27 Nec Corp Command execution control method for ic card, ic card, and recording medium where ic card program is recorded
DE10336568B4 (en) * 2003-08-08 2019-06-19 Giesecke+Devrient Mobile Security Gmbh Operating system for a portable data carrier
DE102006051336A1 (en) 2006-10-31 2008-05-08 Giesecke & Devrient Gmbh Portable data carrier e.g. chip card, function executing method for use in e.g. mobile telephone, involves calling incompatibility routine of data carrier, when incompatibility of function with mobile telephone is found
JP5795921B2 (en) * 2011-09-21 2015-10-14 株式会社東芝 IC card, portable electronic device, and IC card control method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH03240127A (en) * 1990-02-17 1991-10-25 Hitachi Maxell Ltd Program control system
FR2667417B1 (en) * 1990-10-02 1992-11-27 Gemplus Card Int MICROPROCESSOR CARD DESIGNED TO RECEIVE MULTIPLE PROGRAMS IN PROGRAMMABLE MEMORY.
FR2683357A1 (en) * 1991-10-30 1993-05-07 Philips Composants MICROCIRCUIT FOR PROTECTED PROGRAMMABLE MEMORY CHIP CARD.
EP0583006B2 (en) * 1992-08-13 2006-11-29 Matsushita Electric Industrial Co., Ltd. IC card with hierarchical file structure

Also Published As

Publication number Publication date
EP0992027A2 (en) 2000-04-12
WO1998059325A2 (en) 1998-12-30
WO1998059325A3 (en) 1999-04-22

Similar Documents

Publication Publication Date Title
US5339430A (en) System for dynamic run-time binding of software modules in a computer system
US4607332A (en) Dynamic alteration of firmware programs in Read-Only Memory based systems
JP3689368B2 (en) Method of loading an application into a multi-application embedded system with data processing resources, corresponding system and execution method
US5832273A (en) System for deleting redundant instructions from high level language source code containing in-line assembly instructions
EP0543588A2 (en) Generating and processing computer programs
JP5457496B2 (en) Memory management of portable data storage media
AU4516493A (en) System for changing software during computer operation
US7805718B2 (en) Optimisation of a compiler generated program code
JP2003501741A (en) Porting various source languages to execution media
CA2294469A1 (en) Chip card for executing non-modifiable system program routines and their associated replacement program routines, and a method for operating the chip card
JP2002524792A (en) Method of linking on a chip card program modules post-loaded into the work memory of a processor
CN100375029C (en) Memory disposition methods and systems
US5241634A (en) Method of handling system calls to an operating system of a computer by system service routines stored as firmware
CN1115630C (en) Micro computer
CN110990018B (en) Compiling method and compiling system of embedded system
US5093917A (en) Method for passing data parameters between a calling program and a called subroutine in a command analysis table of a computer stored data base system
JP2555920B2 (en) Online real-time processor
JP2001519940A (en) Microcomputer
JP2021006966A (en) Semiconductor device, control method, and program
JP7284003B2 (en) Semiconductor device, IC card, control method and program
CN115291918A (en) Code upgrading method and device for smart card, electronic equipment and storage medium
JP2003076558A (en) Method and program for controlling program execution
KR950005242B1 (en) Processing shared variables for chill concurrent processing in general-purpose operating system
CN117272378A (en) Resource data processing method and device and electronic equipment
CN115269119A (en) Multi-system smart card and application implementation method

Legal Events

Date Code Title Description
FZDE Discontinued