EP1751907A1 - Transfert de donnees entre deux cartes a puce - Google Patents
Transfert de donnees entre deux cartes a puceInfo
- Publication number
- EP1751907A1 EP1751907A1 EP05735831A EP05735831A EP1751907A1 EP 1751907 A1 EP1751907 A1 EP 1751907A1 EP 05735831 A EP05735831 A EP 05735831A EP 05735831 A EP05735831 A EP 05735831A EP 1751907 A1 EP1751907 A1 EP 1751907A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- processing means
- data
- key
- card
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/229—Hierarchy of users of accounts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present invention relates to a secure transfer of data from a first data processing means connected to the terminal means to a second data processing means to be connected to the terminal means. More particularly, it relates to such a transfer of data when the first and second data processing means are smart cards, the first of which contains confidential data relating to a user of the card, to be transferred to the second card intended for replace the first.
- smart cards are SIM or ⁇ SIM (Subscriber Identity Module) cards and the terminal means is a mobile user terminal.
- the object of the present invention is to transfer confidential data from a first card to a second card without requiring the user to move around and by using secure communications through the terminal connected to the first card and the telecommunications network serving the terminal, while prohibiting the use of the first card after the data transfer.
- a method for transferring data from a first data processing means connected to the terminal means to a second data processing means to be connected to the terminal means comprises the following steps of: transmit a specific application identifier from an external means to the first processing means through the terminal means, in the first processing means, invoke the specific application designated by the transmitted identifier, read data relating to the specific application, encrypt the data to transmit encrypted data to the external means, and make the specific application inoperable before or after the encryption step, replace the first processing means with the second processing means, transmit the specific application identifier from the means external to the second processing means through the terminal means, and transmits the encrypted data from the means external to the second processing means so that the latter invokes the specific application designated by the identifier transmitted, decrypts the encrypted data and installs the decrypted data.
- the securing of the data can be carried out in the following manner.
- First keys and encrypted numbers are transmitted with the specific application identifier from the external means to the first processing means through the terminal means, the first processing means decrypts the first encrypted keys and numbers, and when the first decrypted number satisfies a first condition, invokes the specific application designated by the transmitted identifier, and encrypts the data read relating to the specific application using the first key
- second encrypted second key and number are transmitted with the specific application identifier from the means external to the second processing means through the terminal means
- the second encrypted key and number are decrypted in the second processing means, and when the second decrypted number satisfies a second condition
- the external means transmits the encrypted data to the second processing means and decrypts the encrypted data using the first re key before installing them.
- the transfer of the data is secure from the first processing means through the external means to the second means of processing is secure.
- the first and second keys may be different for asymmetric data encryption and decryption algorithms, or else be identical for symmetric data encryption and decryption algorithms.
- the inoperative nature of the specific application relating to the replacement, for example, of smart card as a means of data processing, can lead to erasure of the first key and number decrypted in the first means of processing after the encrypted data is transmitted to the external means, which renders the first means of processing unusable by any person malicious in particular in place of the authorized user.
- Erasure of the second key and number decrypted in the second processing means after the encrypted data has been decrypted preserves the secret means for generating the second key and number from any malicious person.
- an erasure of the first keys and number encrypted in the first of means of data processing and / or a signaling stopping the transfer process from the first data processing means to the external means render the first processing means unusable.
- the first and second numbers are random numbers produced by the first and second processing means and recovered in the external means before the transmission of the specific application identifier and the first key and number encrypted at the first processing means
- the first condition is an equality of the first decrypted number and a number read in the first of the processing means
- the second condition is an equality the second decrypted number and a number read in the second processing means.
- the first and second numbers are transfer accounts incremented with respective increments in the external means each time the latter is requested to designate a specific application, such as that designated by said identifier, and call it in the first processing means, then in the second processing means.
- the first condition is a superiority of the first deciphered number over a number read in the first processing means which, when satisfied, causes the number read in the first processing means to be replaced by the first deciphered number.
- the second condition is a superiority of the second deciphered number over a number read in the second processing means which, when satisfied, causes the number read in the second processing means to be replaced by the second deciphered number.
- a hash may be provided.
- the external means establishes and encrypts beforehand a first electronic coupon including, in addition to the first key and the first number, a hash key and a second electronic coupon including, in addition to the second key and the second number, the hash key, and pass the identifier specific application and the first coupon to the first processing means through the terminal means.
- the first processing means decrypts the first coupon and transmits the encrypted data in the form of blocks of predetermined maximum length and a fingerprint resulting from a hash applied to the encrypted data by external means and dependent on the hash key collected in the first coupon decrypted.
- the external means transmits the specific application identifier and the second coupon to the second processing means through the terminal means.
- the second processing means decrypts the second encrypted coupon.
- the data encrypted in the form of blocks is transmitted from the external means to the second processing means so that the latter for each block received determines a fingerprint which it compares to the fingerprint extracted from the received block and does not decrypt the data in the blocks unless the compared fingerprints for each block are identical.
- FIG. 1 is a schematic block diagram of a system for transferring data between two SIM cards by means of a security server and a transfer controller
- - Figure 2 is a schematic block diagram of two SIM cards, one of which must replace the other
- FIG. 5 is a schematic block diagram of another data transfer system for a smart card in a terminal of the personal computer type.
- the two data processing means between which data are to be transferred are CA and CB smart cards, also called microcontroller cards of the removable module type, called SIM cards (Subscriber Identity Module) ) or USIM, and the terminal means which receives the data processing means one after the other is a mobile user radiocommunication terminal TM.
- the mobile terminal TM is connected to the fixed network of a digital cellular radiocommunication network RR, for example of the GSM or UMTS type.
- Each SIM CA, CB microcontroller card comprises, as shown in detail in the card CA in FIG. 2, essentially a microprocessor PR and three memories M1, M2 and M3.
- the memory Ml is of the ROM type and includes an operating system for the card and very often a virtual machine of the JavaCard type on which the system is based. operating.
- the memory M1 contains an ATR data transfer application and an AIN data installation application specific to the invention.
- the ATR transfer application comprises a GTR transfer manager and at least one ITR transfer interface relating to a specific IAS application useful for the invention and is used to extract data to be transferred DTR relating to at least the specific IAS application by reading them from the CA card and transferring them to an external entity, called the CT transfer controller.
- the installation application IN comprises an installation manager GIN and at least one installation interface UN relating to the specific application IAS and is used to transfer the data DTR from the transfer controller CT into the second smart card CB. It will be assumed that the specific IAS application concerns a SIM card replacement.
- the invention adds to the set of preformatted commands according to the format of the communication protocol between a SIM card and a mobile terminal TM, two specific commands for transfer and installation in the form of APD ⁇ application protocol data units, for example according to ISO 7816-4.
- Each command is thus compatible with the asynchronous alternation communication protocol between the terminal TM and the smart card CA so as to transmit data from the transfer controller, for example in the form of a command of the "ENVELOPE" type without the TM terminal interprets them, and to the virtual machine included in the smart card so that it can interpret them.
- the memory M2 is a non-volatile memory of the EEPROM type including in particular the specific data to be transferred DTR which are in relation with specific applications and which can be keys and security codes and / or which can include personal data at the user with CA card, CB such as a user subscription profile, a directory of telephone numbers, a directory of electronic mail (e-mail) addresses, a confidential code, etc.
- the memory M2 is also used to save, at least temporarily, parameters transmitted by the transfer controller CT.
- the memory M2 in the card CA, CB also contains a secret encryption key KA, KB used to decrypt a transfer coupon message CTR transmitted by the transfer controller CT.
- the memory M3 is conventionally a RAM memory used for processing the data to be exchanged between the processor PR and the microcontroller included in the mobile terminal TM.
- the SIM card CA, CB also contains at least in a first embodiment a generator of random numbers GA which is implemented physically in or in connection with the processor PR of the smart card.
- the generator GA in the card CA, CB generates a random number RA, RB which is used to authenticate the controller CT.
- the random number generator is included as software in the ROM memory M1.
- the data transfer system implementing the invention comprises means external to the TM terminal containing the SIM card CA to be replaced: an SS security server and the transfer controller
- the radiocommunication network RR is shown diagrammatically in FIG. 1 by a base station BTS, a base station controller BSC and a switch of the mobile service MSC in the location area where the mobile terminal TM is provisionally located.
- the transfer controller CT and the security server SS are considered to be internal to the network RR; for example, the transfer controller and the security server are entities of the fixed part of the RR network which are linked or integrated into a nominal location register HLR connected to several pairs of switches of the mobile service MSC and location registers of the VLR visitors through the internal signaling network of the RR radio network.
- the telecommunications network RT connecting the mobile terminal TM to the transfer controller CT conventionally comprises a high speed packet network, such as the internet network, and a network switched telephone network or a packet switched network with mobility management and radio access of the GPRS type, or only the packet network.
- the transfer controller CT thus constitutes an OTA (Over The Air) platform which extracts specific DTR data through the radio link between the mobile terminal TM and the fixed network BTS, BSC, MSC of the radiocommunication network RR without the user of the CA card moves to a point of sale or to a specific data extraction reader.
- OTA Over The Air
- the transfer controller contains an application specific to the invention which can be divided into three parts intended to prepare a data transfer in response to a transfer request from the smart card CA initially included in the mobile terminal, to extract and transfer DTR specific data, and install the transferred DTR data in a second and new CB smart card.
- the messages exchanged between the transfer controller and a smart card CA, CB are short messages.
- the security server SS communicates with the transfer controller CT, via a signaling network or a packet network such as the Internet, or according to another variant is incorporated in a server also including the transfer controller CT.
- the main role of the security server SS is to establish a transfer coupon CTR and an installation coupon CIN and to encrypt data according to the respective encryption keys KA and KB which it has previously memorized during implementation.
- CA and CB card service Referring now to Figures 3A and 3B, the method for transferring data from the chip card CA to the chip card CB mainly comprises steps 1 to 27 according to a first embodiment of the invention. This process is described in the context of a specific application relating to the renewal of the old SIM card CA with the new SIM card CB that the user has withdrawn from a point of sale of the operator of the RR radio network. , or received by post. Initially in step 1, the transfer controller CT recovers the identities IDA and IDB of the two cards CA and CB.
- the operator codes this card delivery in the nominal location register HLR and enters the identity IDB of the second card there.
- CB and the HLR recorder automatically transmits the identities of the CA and CB cards to the transfer controller CT in the form of signed electronic certificates.
- the identity IDA, IDB of each card CA, CB includes in particular a serial number of the card, the international identity of the user IMSI (International Mobile Subscriber Identity), and the telephone number of the user MSISDN (Mobile Station ISDN Number) and depends on the type of card.
- the type of card concerns the type of processor PR, the number of bits per word processed by the processor, characteristics of the operating system or virtual machine, etc.
- the transfer controller CT recovers random numbers RA and RB produced by the random generators GA in the cards CA and CB.
- the random numbers RA and RB are previously determined in a source other than the cards CA and CB, such as the nominal location register HLR, and stored in the cards when they are put into service respectively, and are retrieved with the identity of the cards from the recorder HLR by the CT controller for changing cards.
- the transfer controller CT initiates the data transfer process proper by sending the recovered card identities IDA and IDB and the recovered random numbers RA and RB to the security server SS and by specifying the specific application IAS targeted by the transfer, in step 3.
- the specific application here is a replacement for a SIM card and is designated by an IAS identifier which is transmitted to the CT controller with the card identities during step 1, or alternatively with the RA and RB random numbers during step 2.
- the security server SS randomly generates in step 4, in response to the message transmitted by the controller CT in the previous step 3, a transfer key KC and a key. hash KMAC for MAC message authentication code which will be used in the CA card, then in the CB card. Then in the next step 5, the security server SS recovers transfer keys KA and B pre-stored in the cards CA and CB.
- the keys KA and KB are generated by an authentication center AUC which cooperate with the nominal location register HLR of the network RR and which is very often on the same platform as the HLR register.
- the authentication center authenticates users of the RR network and contributes to the confidentiality of data in transit in radio interfaces between mobile terminals and base stations by managing authentication and key determination algorithms.
- the security server SS can recover the keys KA and KB during the commissioning of the card CB intended to replace the card CA.
- the transfer keys KA and KB are provided by a database from which the security server SS reads them in step 5.
- the security server SS creates two electronic coupons CTR and CIN .
- the first coupon CTR is a data transfer coupon which includes the transfer key KC, the hash key KMAC and the random number RA, and which is encrypted according to an encryption algorithm ALC as a function of the key KA.
- the second coupon CIN is a data installation coupon which includes the hash key KMAC, the transfer key KC and the random number RB and which is encrypted according to the encryption algorithm ALC as a function of the key KB.
- the algorithm encrypting the coupon CTR is different from the algorithm encrypting the coupon CIN.
- the different encryption algorithms are respectively associated with the cards CA and CB and are transmitted in step 5 respectively with the keys KA and KB to the security server SS by the authentication center AUC which generates them.
- the security server SS submits the two encrypted coupons CTR and CIN to the transfer controller CT by transmitting them to it in step 7.
- the method then proceeds to steps 8 to 16 to extract DTR data from the specific application IAS in a secure manner in the card CA.
- the transfer controller CT calls the card CA and particularly the transfer manager GTR in it by means of the identity of card recovered IDA, in step 8
- the CT controller transmits during this call the IAS identifier of the specific application and the encrypted transfer coupon CTR.
- the transfer manager GTR in the card CA decrypts the coupon CTR, in step 1 9.
- the transfer manager GTR compares the random number RA recovered in the decrypted coupon CTR with the initial random number RA read in the memory M2 in step 10. If the random numbers RA compared are different, the manager GTR deletes the decrypted coupon CTR, that is to say the keys KC and KMAC and the random number RA, in the card CA, and the transfer process is stopped at an end step 28A which consists in signaling the stop of the transfer process from the card CA to the transfer controller CT, and optionally to display a data transfer failure message in the mobile terminal TM in order to invite the user to change his card under the control of the operator operator at a point of sale.
- the transfer manager GTR in the card CA calls the transfer interface ITR of the specific application designated by the IAS identifier received by the card CA, in step 11.
- the ITR transfer interface returns the DTR data which are specific to it and which must be transferred, and the GTR manager stores them in step 12 If certain KAS keys associated with the specific application AS have been stored outside the IAS application, in the EEPROM M2 memory, the GTR manager points the KAS keys in this memory and temporarily stores them in the buffer memory with the data read DTR, in step 13. After having stored the data DTR and possibly the associated keys KAS, the transfer manager GTR makes the specific application IAS permanently inoperable by erasing it in the ROM memory M1, in step 14.
- the transfer manager GTR entirely deletes the application ITR in the memory Ml and gives them es DTR and any associated keys KAS in the memory M2, the DTR data and the keys KAS being in buffer memory in the transfer manager.
- the operations in step 14 render the CA card unusable for conventional use in a mobile terminal TM, and avoid any copy of the CA card with the specific application IAS and the DTR data thereof.
- the transfer manager GTR proceeds to encrypt the data DTR and any associated keys KAS which are read in the buffer memory of the manager, according to an encryption algorithm AC and according to the transfer key KC.
- the AC encryption algorithm may be different from the ALC encryption algorithm in the CT transfer controller to improve security.
- the data which have just been encrypted in step 15 are transmitted by successive blocks BL having a predetermined maximum length expressed in bits to the transfer controller CT, in step 16.
- Each block BL contains in addition to the data DTR to be transmitted and the associated encrypted KAS keys, the number NBL of blocks to be transmitted, the block number in the block sequence to be transmitted, a condensed fingerprint EM which results from a one-way hash applied to the encrypted data and the associated encrypted keys contained in the block and depending on the hash key KMAC collected in the received coupon decrypted CTR, the random number RA and the key KMAC.
- the transfer manager GTR of the card CA successively transmits the blocks BL to the transfer controller CT which stores them temporarily in step 17.
- the transfer manager GTR erases the keys KC and KMAC and the random number RA and therefore the coupon CTR in the memory M2 of the card CA, in step 18.
- the specific application IAS is made inoperable after the step of encrypting 15 or after the training step 16.
- the manager GTR invites the user to replace the card CA by the card CB in the mobile terminal TM, by displaying a text message or by broadcasting a voice message in the terminal.
- the transfer controller CT periodically transmits a message until the CB card acknowledges it when the CB card has been inserted and has become active in the mobile terminal TM, in step 19.
- This message transmitted to the during the call of the CB card in step 19 contains the IAS identifier of the specific application AS, in this case the replacement of the SIM card, and the encrypted installation coupon CIN which includes the keys KMAC and KC and the random number RB which had been memorized in step 6.
- the transfer process is continued by steps 20 to 27 relating to the installation of the data DTR in the second card CB, as shown in FIG. 3B.
- the installation manager GIN decrypts the encrypted coupon CIN by means of the decryption algorithm ALD and depending on the key KB which was previously stored in the memory M2 during the commissioning of the card CB.
- the manager GIN compares the random number RB extracted from the deciphered received coupon CIN with the random number RB read in the memory M2 of the card CB, at step 21.
- the installation manager GIN deletes the deciphered installation coupon CIN in the card CB, i.e. the keys KC and KMAC and the number RB in the card CB, and the transfer process is stopped by signaling the transfer failure by the installation manager GIN in the card CB to the transfer controller CT.
- the installation manager GIN deletes the deciphered installation coupon CIN in the card CB, i.e.
- the installation manager GIN determines a condensed fingerprint EM according to the hashing algorithm already used in the card CA and according to the key KMAC contained in the deciphered coupon CIN, and compares the determined fingerprint with the fingerprint EM extracted from the received block BL, in step 23. If the compared fingerprints EM for one of the blocks received are different, the method stops by executing step 28B.
- the installation manager GIN verifies in step 24 that it has received all the BL blocks which had been transmitted by the card CA to the controller CT, by counting them, and by comparing the block count with the total number NBL of blocks. contained in each block received. If the number of blocks counted is incorrect, the process stops with step 28B. Alternatively, the order of steps 23 and 24 is reversed. On the other hand, if the fingerprints compared for each block are identical and the block count is correct, the GIN installation manager decrypts the specific application data encrypted DTR and possibly the encrypted keys KSA associated with these in the concatenated blocks according to a symmetric AD decryption algorithm of the AC encryption algorithm using the KC key included in the CIN coupon, in step 25.
- step 26 when all the BL blocks received have been decrypted, the GIN manager invokes the installation interface UN relating to the specific IAS application so as to transfer the decrypted DTR data and possibly the KAS external keys associated with the application.
- step 27 the installation manager GIN in the card CB deletes the keys KC and KMAC and the random number RB and therefore the coupon CIN in the memory M2 of the card CB.
- the chip card CB in the mobile terminal TM can then be used in a conventional manner by the user.
- the invention has the following advantages: - the confidential data to be transferred DTR comes only from the "source” card CA; - confidential data are specific to an IAS application and independent of the steps of the transfer process; - the confidential data of a specific IAS application are transferred all together and not only in part; - once extracted from the CA "source” card in secure form after steps 12 and 13, or 12 to 15 or 16, the confidential DTR data are no longer accessible or usable in the CA "source” card definitively; either they are deleted, or the specific IAS application which contains them is made permanently inoperable; the confidential data DTR are installed only once in steps 23 to 26 in the "target” card CB; the method of transferring confidential data is independent of the encryption algorithms chosen which can be symmetrical or asymmetrical; - after the encrypted data has been transmitted from the "source” card CA to the external transfer controller CT in step 17, the encrypted data is lost following any interruption of the transfer process before the installation of the encrypted data in the "target” card CB, which is
- the method for transferring data from the chip card CA into the chip card CB mainly comprises steps la to 27a, most of which are similar to those of the first achievement.
- no random number RA, RB is recovered by the transfer controller CT; consequently, the random generators GA are no longer necessary in the cards CA and CB and step 2 is omitted.
- step la the transfer controller CT recovers the identities IDA and IDB of the two cards CA and CB and in particular the serial numbers of the cards, the international identity of the user IMSI, the telephone number of the user MSISDN, for example in the form of signed electronic certificates, and the IAS identifier of 1 specific application relating to the replacement of the SIM card CA by the SIM card CB.
- step 3a the transfer controller CT initiates the data transfer process proper by sending the card identities IDA and IDB and the identifier of the specific application IAS targeted by the process.
- the security server SS randomly generates in step 4a, in response to the message transmitted by the controller CT in the previous step 3a, a transfer key KC and a hash key KMAC which will be used in the card CA, then in the CB card. Also in step 4a, the security server SS increments transfer accounts NA and NB respectively associated with the cards CA and CB with respective increments IA and IB which can be simply equal to 1, or be different, or else be generated randomly. The NA and NB transfer accounts will be incremented each time the security server SS is called upon to designate a specific application and call it in the CA card, then in the CB card replacing the CA card.
- a specific application other than card replacement is the installation of an application such as an applet in the card, or the change of the value of an account such as the loading of a currency credit when the card an electronic wallet function.
- the security server SS recovers transfer keys KA and KB specific to the cards CA and CB.
- the. SS security server creates two electronic coupons CTR and CIN.
- the first CTR coupon is a data transfer coupon that includes the KC transfer key, the KMAC hash key and the transfer account NA, and which is encrypted by an encryption algorithm ALC as a function of the key KA.
- the second coupon CIN is a data installation coupon which includes the hash key KMAC, the transfer key KC and the transfer account NB and which is encrypted according to the encryption algorithm ALC according to the key KB.
- the security server SS transmits the two encrypted coupons CTR and CIN to the transfer controller CT, in step 7a.
- the transfer controller CT calls the card CA and particularly the transfer manager GTR in the latter by means of the identity of card recovered IDA, in step 8a .
- the CT controller transmits during this call the IAS identifier of the specific application and the encrypted transfer coupon CTR.
- the transfer manager GTR in the card CA decrypts the coupon CTR, in step 9a .
- the transfer manager GTR compares the transfer account NA recovered in the deciphered coupon CTR to the internal transfer account NA read in the memory M2 of the card CA, in step 10a. If the recovered transfer account is equal to or less than the internal transfer account, this means that the entity which transmitted the recovered transfer account has not followed the transfer account update and is not the server SS security.
- the GTR manager erases the deciphered coupon CTR, that is to say the keys KC and KMAC and the transfer account NA, in the card CA, and the transfer process is stopped at an end step 28Aa.
- This stop consists in signaling the end of the process from the CA card to the transfer controller CT, and possibly displaying or broadcasting a message of data transfer failure in the mobile terminal TM in order to invite the user to make the change of his card under the control of the operator at a point of sale.
- the GTR transfer manager in the CA card replaces the value of the internal transfer account with the value of the transfer account recovered in the memory M2, and calls the transfer interface ITR of the specific application designated by the IAS identifier received by the card CA, in step 1a.
- the ITR transfer interface returns the DTR data which are specific to it and which must be transferred, and the manager GTR stores them in step 12a. If certain KAS keys associated with the specific application AS have been stored outside of the IAS application, in the EEPROM M2 memory, the GTR manager points the KAS keys in this memory and temporarily stores them in buffer memory with the data. read DTR, in step 13a.
- the transfer manager GTR After having stored the data DTR and possibly the associated keys KAS, the transfer manager GTR makes the specific application IAS permanently inoperable by erasing it in the ROM memory M1, in step 14a. If necessary, the GTR transfer manager deletes the ITR application entirely in the memory M1 and the DTR data and any associated keys KAS in the memory M2. In step 15a, the transfer manager GTR proceeds to encrypt the data DTR and any associated keys KAS which are read in the buffer memory of the manager, according to an encryption algorithm AC and according to the transfer key KC. The data which have just been encrypted in step 15a are transmitted by successive blocks BL of predetermined length to the transfer controller CT, in step 16a.
- Each block BL contains, in addition to the data to be transmitted and the associated encrypted keys KAS, the number NBL of blocks to be transmitted, the number of the block in the block sequence to be transmitted, a condensed fingerprint EM which results from a one-way hash applied on the data and associated encrypted keys contained in the block and depending on the KMAC key collected in the received coupon CTR, the updated transfer account NA read in the memory M2 and the key KMAC.
- the transfer manager GTR of the card CA successively transmits the blocks BL to the transfer controller CT which stores them temporarily in step 17a, deletes the keys KC and KMAC and the account transfer transfer NA in the memory M2 of the card CA, in step 18a, and invites the user to replace the card CA with the card CB in the mobile terminal TM, by displaying a text message or by broadcasting a voice message in the terminal.
- the transfer controller CT transmits periodically a message until the CB card acknowledges this when the CB card has been inserted and has become active in the mobile terminal TM, in step 19a.
- This message transmitted during the call of the CB card in step 19a contains the IAS identifier of the specific application AS, in this case the replacement of the SIM card, and the encrypted installation coupon CIN which includes the keys KMAC and KC and the transfer account NB and which had been memorized in step 6a.
- the transfer process is continued by steps 20a to 27a relating to the installation of the DTR data in the second card CB, as shown in FIG.
- step 20a in the chip card CB in response to the message transmitted by the controller CT through the network RR and the terminal TR, the installation manager GIN decrypts the coupon CIN by means of the algorithm ALD and in dependence on the key KB which has been previously stored in the memory M2 during the commissioning of the card CB.
- the manager GIN compares the transfer account NB recovered in the deciphered coupon CIN with the internal transfer account NB read in the memory M2 of the card CB, in step 21a. If the recovered transfer account is equal to or less than the internal transfer account, this means that the entity which transmitted the recovered transfer account did not follow the account update and is not the SS security server .
- the manager GIN deletes the deciphered installation coupon CIN in the card CB, that is to say the keys KC and KMAC and the transfer account NB in the card CB, and the transfer method is stopped by reporting the transfer failure by the manager GIN installation in the CB card to the CT transfer controller.
- the GIN transfer manager in the CB card replaces the value of the internal transfer account read by the value of the transfer account recovered NB, and establishes a confirmation command relayed by the mobile terminal TM to transmit it to the transfer controller CT which, in response to this confirmation command, transmits the data blocks transferred BL to the card CB, to the 'step 22a.
- the installation manager • GIN determines a condensed fingerprint EM according to the hashing algorithm already used in the card CA and according to the key KMAC contained in the deciphered coupon CIN, and compares the determined fingerprint to the fingerprint EM extracted from the received block BL, in step 23a.
- the installation manager GIN verifies in step 24a that it has received all the blocks BL which had been transmitted by the card CA to the controller CT, by counting them, and comparing the block count to the total number NBL of blocks contained in each block received. If the compared fingerprints EM for one of the blocks received are different, or if the number of blocks counted is incorrect, the method stops by executing step 28Ba.
- the GIN installation manager decrypts the specific application data encrypted DTR and possibly the encrypted keys KSA associated with these according to a decryption algorithm AD symmetrical to the encryption algorithm AC using the key KC included in the coupon CIN, in step 25a.
- the manager GIN calls the installation interface UN relating to the specific application IAS so as to transfer to it the decrypted data DTR and possibly the external keys KAS associated with the application.
- the installation manager GIN in the card CB deletes the keys KC and KMAC and the transfer account NB and therefore the coupon CIN in the card CB.
- the chip card CB in the mobile terminal TM can then be used in a conventional manner by the user.
- the ALC encryption algorithm and the ALD decryption algorithm in steps 6, 6a and 9-20, 9a-20a can be asymmetrical with a private encryption key pre-stored in the card to CA chip and a public encryption key retrieved by the security server SS in step 5, 5a.
- the encryption algorithm AC and the decryption algorithm AD in steps 15, 15a and 25, 25a can be asymmetric with a private transfer key pre-stored or generated in the security server SS in step 4 , 4a and a public transfer key pre-stored in the smart cards CA and CB or transmitted to them in step 20, 20a.
- the security server SS is deleted and the transfer controller CT performs functions of the security server.
- two removable data processing means between which DTR data are to be transferred are smart cards CA and CB
- the terminal means which receives one after the other the means removable data processing is a personal computer PC or a personal digital assistant (PDA) or any other electronic object, notably a portable one, which is connected to an RT telecommunications network and which can read a smart card connected to it.
- the RT network can include the Internet network and an access network such as the switched telephone network, or even constitute a local network, for example a wireless local area network WLAN (Wireless Local Area Network).
- the terminal PC is transparent to communications between the transfer controller CT and the card CA, CB with regard to the transfer of data and the commands relating thereto.
- connection between the card CA, CB and the terminal PC is conventional and can be an electrical contact link, a so-called contactless link, or a proximity radio link of the Bluetooth or WiFi type.
- the PC terminal and the smart cards CA and CB are respectively a bank terminal and credit cards, or a point of sale terminal and electronic purses.
- the data transfer according to the invention is used to update confidential data in the same single card, so that the CA and CB cards are considered to be confused in the preceding description and the figures, and the card replacement is eliminated in step 18, 18a.
- the encrypted data transmitted in the form of BL blocks by the single card in step 17, 17a are decrypted by means of the algorithm AD in the transfer controller CT which stores them temporarily, then in step 22, 22a, the processed data is encrypted using the AC algorithm and transmitted by the transfer controller CT to the single card.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0405172A FR2870412B1 (fr) | 2004-05-13 | 2004-05-13 | Transfert de donnees entre deux cartes a puce |
PCT/EP2005/051774 WO2005114896A1 (fr) | 2004-05-13 | 2005-04-21 | Transfert de donnees entre deux cartes a puce |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1751907A1 true EP1751907A1 (fr) | 2007-02-14 |
Family
ID=34945125
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05735831A Ceased EP1751907A1 (fr) | 2004-05-13 | 2005-04-21 | Transfert de donnees entre deux cartes a puce |
Country Status (7)
Country | Link |
---|---|
US (1) | US7222783B2 (fr) |
EP (1) | EP1751907A1 (fr) |
JP (1) | JP4734595B2 (fr) |
CN (1) | CN1985464B (fr) |
CA (1) | CA2566186A1 (fr) |
FR (1) | FR2870412B1 (fr) |
WO (1) | WO2005114896A1 (fr) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100477670B1 (ko) * | 2002-09-26 | 2005-03-18 | 삼성전자주식회사 | 스마트 카드를 이용한 모니터 보안 장치 및 그 방법 |
US20060143132A1 (en) * | 2004-11-30 | 2006-06-29 | Valenti William L | Method and apparatus to enable a market in used digital content |
DE102006049442A1 (de) * | 2006-10-16 | 2008-04-17 | Bundesdruckerei Gmbh | Verfahren zum Freischalten einer Chipkarte |
FR2908209B1 (fr) * | 2006-11-07 | 2009-02-13 | Oberthur Card Syst Sa | Entite electronique portable et procede de personnalisation d'une telle entite electronique |
US10311427B2 (en) * | 2006-12-29 | 2019-06-04 | Google Technology Holdings LLC | Method and system for monitoring secure application execution events during contactless RFID/NFC communication |
US8474050B2 (en) | 2007-04-13 | 2013-06-25 | At&T Intellectual Property I, L.P. | System and apparatus for transferring data between communication elements |
US8712474B2 (en) * | 2007-04-20 | 2014-04-29 | Telefonaktiebolaget L M Ericsson (Publ) | Secure soft SIM credential transfer |
FR2922701B1 (fr) * | 2007-10-23 | 2009-11-20 | Inside Contacless | Procede de personnalisation securise d'un chipset nfc |
US8286883B2 (en) | 2007-11-12 | 2012-10-16 | Micron Technology, Inc. | System and method for updating read-only memory in smart card memory modules |
US8162227B2 (en) | 2007-11-12 | 2012-04-24 | Micron Technology, Inc. | Intelligent controller system and method for smart card memory modules |
US8156322B2 (en) * | 2007-11-12 | 2012-04-10 | Micron Technology, Inc. | Critical security parameter generation and exchange system and method for smart-card memory modules |
EP2128830A1 (fr) * | 2008-05-30 | 2009-12-02 | Gemplus | Procédé et dispositif électronique pour transférer des données d'application depuis un dispositif électronique source vers un dispositif électronique de destination |
US10289826B2 (en) * | 2009-03-03 | 2019-05-14 | Cybrsecurity Corporation | Using hidden secrets and token devices to control access to secure systems |
US8370645B2 (en) | 2009-03-03 | 2013-02-05 | Micron Technology, Inc. | Protection of security parameters in storage devices |
US8213990B2 (en) * | 2009-06-05 | 2012-07-03 | Mediatek Inc. | System for providing remote subscriber identity card to mobile station and methods thereof |
DE102009040027A1 (de) * | 2009-09-03 | 2011-03-10 | Giesecke & Devrient Gmbh | Verfahren und System zum Aktivieren eines tragbaren Datenträgers |
US9647984B2 (en) * | 2010-08-05 | 2017-05-09 | Gemalto Sa | System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device |
EP2461613A1 (fr) | 2010-12-06 | 2012-06-06 | Gemalto SA | Procédés et système pour la manipulation de données d'une UICC |
US9408066B2 (en) | 2010-12-06 | 2016-08-02 | Gemalto Inc. | Method for transferring securely the subscription information and user data from a first terminal to a second terminal |
US8863256B1 (en) | 2011-01-14 | 2014-10-14 | Cisco Technology, Inc. | System and method for enabling secure transactions using flexible identity management in a vehicular environment |
WO2013000144A1 (fr) * | 2011-06-30 | 2013-01-03 | 深圳市君盛惠创科技有限公司 | Procédé pour fournir un service applicatif, passerelle de protocole d'application sans fil et système associé |
EP2775439A1 (fr) * | 2013-03-05 | 2014-09-10 | Gemalto SA | Procédé de transfert d'unités de valeur entre deux cartes à puce |
EP2800054A1 (fr) * | 2013-05-02 | 2014-11-05 | Giesecke & Devrient GmbH | Procédé et système pour fournir des données d'image codées visuellement |
KR102133450B1 (ko) * | 2013-05-30 | 2020-07-13 | 삼성전자 주식회사 | 프로파일 설정 방법 및 장치 |
US10003959B2 (en) * | 2015-07-30 | 2018-06-19 | Qualcomm Incorporated | Subscriber identity module (SIM) access profile (SAP) |
CN106550031B (zh) * | 2016-10-25 | 2019-07-23 | Oppo广东移动通信有限公司 | 数据备份的方法及装置 |
US20190259007A1 (en) * | 2018-02-20 | 2019-08-22 | Trivver, Inc. | Systems and methods for facilitating a time varying cryptocurrency transfer over a decentralized network through smart contracts associated with cryptocurrency blockchain technology |
CN112910491B (zh) * | 2021-01-28 | 2022-08-02 | 维沃移动通信有限公司 | 终端的双卡通信方法、装置、设备及存储介质 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2856492B2 (ja) * | 1990-03-30 | 1999-02-10 | シャープ株式会社 | プログラム処理装置 |
WO1995024690A1 (fr) * | 1994-03-08 | 1995-09-14 | Oki Electric Industry Co., Ltd. | Systeme de traitement des transactions et procede de traitement des transactions |
WO1997001253A1 (fr) * | 1995-06-21 | 1997-01-09 | Mci Communications Corporation | Reseau de communication avec carte d'identification d'abonne remplaçable |
DE19523466C1 (de) * | 1995-06-28 | 1997-04-03 | Informatikzentrum Der Sparkass | Verfahren zur gegenseitigen Authentifikation von elektronischen Partnern mit einem Rechnersystem |
JPH11250141A (ja) * | 1998-03-04 | 1999-09-17 | Nippon Telegr & Teleph Corp <Ntt> | リアルタイムコンテンツの配信方法 |
JP2000224342A (ja) * | 1999-02-04 | 2000-08-11 | Nippon Telegr & Teleph Corp <Ntt> | 通話端末用携帯メモリ記録消去・転記方法及びプログラムを記録した記録媒体 |
WO2000067177A2 (fr) * | 1999-04-30 | 2000-11-09 | X.Com Corporation | Systeme et procede d'echange electronique de valeurs entre des usagers distribues |
DE10039861C2 (de) * | 2000-08-10 | 2002-11-07 | T Mobile Deutschland Gmbh | Verfahren zum vereinfachten Austausch einer SIM-Karte bei Teilnehmern eines digitalen Mobilkommunikationsnetzes |
JP4090680B2 (ja) * | 2000-10-18 | 2008-05-28 | 株式会社エヌ・ティ・ティ・データ | Icカード、登録装置、及びサービス提供システム |
JP3763349B2 (ja) * | 2001-04-03 | 2006-04-05 | 日本電気株式会社 | 加入者カードを用いる携帯電話機 |
JP2003050952A (ja) * | 2001-08-07 | 2003-02-21 | Dainippon Printing Co Ltd | 商品発注受取システム |
JP3754004B2 (ja) * | 2002-05-20 | 2006-03-08 | システムニーズ株式会社 | データ更新方法 |
JP3686055B2 (ja) * | 2002-08-30 | 2005-08-24 | 株式会社エヌ・ティ・ティ・データ | コンテンツ転送装置 |
-
2004
- 2004-05-13 FR FR0405172A patent/FR2870412B1/fr not_active Expired - Fee Related
-
2005
- 2005-03-23 US US11/086,279 patent/US7222783B2/en not_active Expired - Fee Related
- 2005-04-21 JP JP2007512152A patent/JP4734595B2/ja not_active Expired - Fee Related
- 2005-04-21 EP EP05735831A patent/EP1751907A1/fr not_active Ceased
- 2005-04-21 WO PCT/EP2005/051774 patent/WO2005114896A1/fr active Application Filing
- 2005-04-21 CN CN2005800236812A patent/CN1985464B/zh not_active Expired - Fee Related
- 2005-04-21 CA CA002566186A patent/CA2566186A1/fr not_active Abandoned
Non-Patent Citations (1)
Title |
---|
See references of WO2005114896A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2005114896A1 (fr) | 2005-12-01 |
JP4734595B2 (ja) | 2011-07-27 |
CA2566186A1 (fr) | 2005-12-01 |
US20050279826A1 (en) | 2005-12-22 |
US7222783B2 (en) | 2007-05-29 |
CN1985464B (zh) | 2012-05-09 |
FR2870412B1 (fr) | 2006-09-15 |
CN1985464A (zh) | 2007-06-20 |
JP2007537518A (ja) | 2007-12-20 |
FR2870412A1 (fr) | 2005-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005114896A1 (fr) | Transfert de donnees entre deux cartes a puce | |
EP1547426B1 (fr) | Identification d un terminal aupres d un serveur | |
CN107453862B (zh) | 私钥生成存储及使用的方案 | |
US8302173B2 (en) | Providing a user device with a set of access codes | |
US7362869B2 (en) | Method of distributing a public key | |
EP1190399B1 (fr) | Procede de pre-controle d'un programme contenu dans une carte a puce additionnelle d'un terminal | |
US20030236983A1 (en) | Secure data transfer in mobile terminals and methods therefor | |
AU761400B2 (en) | Procedure and system for the processing of messages in a telecommunication system | |
JP2010259074A (ja) | ワイヤレスアプリケーションプロトコルに基づく機密セッションの設定 | |
CN1799018A (zh) | 基于接近令牌单元对应用服务的安全访问 | |
US20110123027A1 (en) | Use of a mobile telecommunication device as an electronic health insurance card | |
EP1157575B1 (fr) | Authentification dans un reseau de radiotelephonie | |
US20140079219A1 (en) | System and a method enabling secure transmission of sms | |
RU2395930C2 (ru) | Последующая реализация функциональности модуля идентификации абонента в защищенном модуле | |
EP2335376A2 (fr) | Procedes securises de transmission et de reception de donnees entre terminaux comprenant des moyens de communication en champ proche, et terminaux correspondants | |
CN110401531B (zh) | 一种基于sm9算法的协同签名和解密*** | |
CN102231883A (zh) | Rfid-sim卡电信数据传输内容加密***及方法 | |
US9277403B2 (en) | Authentication method and device | |
CN101820593A (zh) | 一种智能sim卡及通过该卡实现数据短消息传输和处理的方法 | |
WO2016207715A1 (fr) | Gestion securisee de jetons électroniques dans un telephone mobile. | |
CN103023642B (zh) | 一种移动终端及其数字证书功能实现方法 | |
JP2022533274A (ja) | 耐量子simカード | |
CN115865530B (zh) | 文件管理方法、文件管理***及计算机存储介质 | |
GB2412544A (en) | Visual verification of the user of a mobile device | |
FR2853785A1 (fr) | Entite electronique securisee avec compteur modifiable d'utilisations d'une donnee secrete |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20061212 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
17Q | First examination report despatched |
Effective date: 20090224 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: GEMALTO SA |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20130329 |