WO1999000774A9 - Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires - Google Patents
Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliairesInfo
- Publication number
- WO1999000774A9 WO1999000774A9 PCT/FR1998/001344 FR9801344W WO9900774A9 WO 1999000774 A9 WO1999000774 A9 WO 1999000774A9 FR 9801344 W FR9801344 W FR 9801344W WO 9900774 A9 WO9900774 A9 WO 9900774A9
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- link
- files
- target
- security module
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0806—Details of the card
- G07F7/0813—Specific details related to card security
- G07F7/0826—Embedded security module
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
Definitions
- Security module comprising means for creating links between main files and auxiliary files
- the invention relates to a security module arranged to cooperate with an information processing device and comprising information processing means and information storage means, the storage means storing a plurality of files.
- the term "security module” must be taken, either in its conventional sense, in which it designates a device intended, in a communication or information network, to be held by a body supervising the network and to store in a protected manner. secret and fundamental parameters of the network such as cryptographic keys, or as more simply designating a device allocated to various users of the network and allowing each of them to have access to it, the latter device being also likely to hold secret parameters.
- the security module may take the form of a portable object of the smart card type.
- the present invention relates in particular to micro-circuit cards and, more generally, portable objects equipped with integrated circuits comprising at least one microprocessor, a read-only memory (ROM) containing a card operating system and one or more non-volatile memories. programmable by the microprocessor. These non-volatile memories are used to store data and code.
- the microprocessor controls the transfer of information and, where appropriate, stores the data received from the outside or reads them for transmission to the outside.
- These objects have one or more means of communication.
- the memories can be of EPROM, EEPROM, FeRAM, SRAM or FLASH technology.
- This architecture defined in several levels is usually developed during the personalization of the card, that is to say before use. It is possible, however, to add other directories or other data files in use, but this depends on the available space remaining in the programmable non-volatile memory. Since this memory is limited in size, it is important not to waste any space and to define during customization only the necessary and sufficient place for the proper functioning of directories and data files.
- the structure in several levels can penalize the access times to data files or directories of low levels. Indeed, for to reach data from a directory of a lower level, it is necessary in many cases to select all top-level main directories. For example, to go from one directory to another of the same level, you have to go up a tree to a first common directory and then go back down, this by selecting intermediate directories. This successive selection mechanism is cumbersome and time-consuming.
- the present invention aims to solve these various problems: it provides a way to avoid the duplication in memory of identical data; it ensures the coherence of information shared between several files; finally, it optimizes the search for information in remote directories, in the tree of the files of the memory.
- link creation arranged to create a link between at least one main file and an auxiliary file, the main file having a determined content and being made accessible to the processing means in the storage means by means of location data, the link creation means associating the auxiliary file with said location data;
- connecting means arranged to provide processing means, when they execute an access request to access the auxiliary file, said content of the main file using said location data.
- Figure 1 shows a tree of several hierarchical levels in a map
- Figure 2 shows a typical organization of directories and data files in a map
- Figure 3 shows the detailed structure of two basic categories of files used in the invention
- FIG. 4 is a flowchart detailing the steps of a file creation procedure according to the invention.
- FIG. 5 is a diagram of a security module for which the invention is intended, cooperating with an information processing device.
- the information processing device 51 shown in FIG. 5 comprises, in a manner known per se, a microprocessor 52 to which a ROM 53, and a RAM 54, are connected, means 55 for cooperating, with or without physical contact, with a security module 58, and a transmission interface 57 allowing the information processing device to communicate with another similar device, either directly or through a communication network.
- the device 51 may also be equipped with storage means such as floppies or removable disks or not, input means (such as a keyboard and / or a pointing device of the mouse type) and display means, these various means are not shown in FIG. 5.
- the information processing device may be constituted by any computer apparatus installed on a private or public site and capable of providing information management or delivery means. of various goods or services, this device being permanently installed or portable, it may also be a telecommunications device.
- the security module 58 includes information processing means 59, a non-volatile memory 60, a volatile working memory RAM 64, and means 63 for cooperating with the information processing device.
- This module is arranged to define, in the memory 60, a secret area 61 in which information once recorded, are inaccessible from outside the module but only accessible to the processing means 59, and a free area 62 which is accessible from the outside of the module for reading and / or writing information.
- Each zone of the non-volatile memory 60 may comprise a non-modifiable portion ROM and an modifiable portion EPROM, EEPROM, or constituted by RAM of the "flash" type, that is to say having the characteristics of an EEPROM with in addition, access times identical to those of a conventional RAM.
- non-volatile memory self-programmable As a security module 58, it will be possible to use a microprocessor with non-volatile memory self-programmable, as described in US Patent No. 4,382,279 in the name of the Applicant. As indicated in Column 1, lines 13-25 of this patent, the self-programmable nature of the memory corresponds to the possibility for a program fi located in this memory, to modify another program fj also located in this memory in a program gj. Although the means to implement this self-programming may vary according to the technique used to design the information processing means 59, it is recalled that, in the case where these processing means are constituted by a microprocessor associated with a processor. nonvolatile memory and according to the aforementioned patent, these means may include:
- the microprocessor of the security module 58 is replaced - or at least supplemented by - logic circuits implanted in a semiconductor chip. Indeed, such circuits are able to perform calculations, including authentication and signing, through the wired electronics, not microprogrammed. They can in particular be of ASIC type (of the English "Application Specifies Integrated Circuit").
- ASIC Application Specifies Integrated Circuit
- the security module 58 will be designed in monolithic form on a single chip.
- the security character of the security module may result from its location in a tamperproof enclosure.
- the non-volatile memory of the cards is organized into files which can be, as recalled above, of two types: directory or elementary file of data.
- Each elementary file includes a header and a body containing information.
- the level of hierarchy is specified in the header, there are also the references of the file, the state or phase of life of the map, the access conditions and the size
- the header contains all the information that makes it possible to manage the information stored in the body
- Two or three levels are currently used With reference to FIG. and in general, the higher level is called “CARD”, and the lower levels "APPLICATION” or "SERVICE”
- the same card can be used for various applications such as the bank, the municipality, the medical file, the cellular radiotelephone, which are represented by level directories APPLICATION
- applications such as the bank, the municipality, the medical file, the cellular radiotelephone, which are represented by level directories APPLICATION
- level directories APPLICATION
- parts such as public transport, access to the pool and library, payment for parking, which are represented by SERVICE level directories,
- Figure 2 illustrates an example of the hierarchical links between files in the programmable memory of a card
- the CARD directory contains two directories APPLICATION 1 and 2 and the elementary file C1
- the directory APPLICATION 1 contains two directories SERVICE A1-S1 and A1-S2 A1-1
- the SERVICE A1-S2 directory has a single elementary data file A1S1-1
- the APPLICATION 2 directory has two directories SERVICE A2-S1 and A2-S2
- the directory SERVICE A2-S1 has two elementary files of data A2S1-1 and A2S1-2
- the SERVICE A2-S2 directory has a basic A2S2-1 data file.
- the same information is used by two different directories
- the bank details of an individual carrying a card name and address of the holder, name and contact details of the bank, account number, credit information etc. can be stored in a basic file, included in the directory. corresponding to the banking application, for example the elementary file A1-1 in the directory APPLICATION 1, described in Figure 2
- the map can also serve as a city map, this application is managed by the directory APPLICATION 2 It allows to pay for public transportation, access to the municipal library and some cultural activities paying (theater, cinema ). These services are managed by the two directories SERVICE A2-S1 and A2-S2, hierarchically dependent on the directory APPLICATION 2.
- the card serves as means of payment, to pay for example the journeys made in the public transport, the money is debited directly to the bank account whose coordinates are specified in the basic file A1-1. It is therefore necessary to make accessible from the directory SERVICE A2-S1 of the directory APPLICATION 2, the information elementary file A1 -1 APPLICATION 1. This access is symbolized by the arrow in Figure 2.
- the solution consisting in reproducing data n ' is not satisfactory.
- Another example concerns secret keys and confidential codes: their values can be identical when accessing different directories that are not hierarchically dependent. The problem is important if RSA type keys (inventors Rivest, Shamir and Adleman) stored on more than 1024 bits are used.
- a final example concerns basic ratification files: these basic files are used to memorize good or bad key or code presentations. Consolidation of several basic ratification files for different keys saves space and increases security.
- One way to achieve the invention is to create and manage so-called "Link" files whose body is confused with that of other files.
- the invention consists in being able to share the same file body between several files. This can be done by specifying, either in the header of the file, or in its body, the address where the data are actually located.
- two files are represented, namely a target file 30 and a link file 31.
- the description that follows concerns both the case where these files are data files and the one where they represent directories. These directories contain either a tree of subdirectories giving access to data files, data files that are directly attached to them, or both.
- the term "data” includes both non-executable data and executable or program data.
- the target file 30 is organized, in this example, into two parts comprising a header 32 and a body 33.
- the header 32 includes a first group of parameters known per se, namely: a type, which indicates whether the file is a directory or a data file;
- an identifier which designates the file within a directory which contains it; it is for example a name or a number; and access conditions that give a list of access rights to this determined file, for any user: they specify for example whether the file is accessible or not read or write; in a manner known per se, the delivery of these rights may be subject to the presentation of keys or passwords.
- the header 32 includes a second group of parameters that are specific to the invention, namely:
- a ⁇ Link> parameter which can take two values: either the value 1, which indicates that this file is a link-file or the value 0 which indicates that it is not a link-file; here, this parameter has the value 0;
- Link ⁇ which can take two values: either the value 1, which indicates that this file is a target file, or the value 0 which indicates that it is not a target file; here, this parameter has the value 1;
- a parameter A-Link which can take two values: either the value 1, which indicates that this file can be linked to a link-file, or the value 0 which prevents it;
- CA-Link parameter which defines the conditions of creation that the user will have to respect when he wants to create a link between this file and a file-link: they will be able for example to define keys or passwords to present by the user.
- the header 32 finally includes a reference RC indicating to the microprocessor of the card a binary value of a memory address RC from which is stored the body 33 mentioned above.
- the body 33 is stored in memory immediately after the header 32, so that the mention of the reference RC is not necessary.
- the body 33 contains either a tree of sub-directories giving access to files data, either data files that are directly attached to it, or both;
- the body 33 contains a set of data directly accessible for reading or modification, or executable by the microprocessor of the card.
- the organization of the target file 30 may be different from that in two parts (header and body) shown in FIG. 3.
- the parameters of the header 32 may be divided into specific places of the body.
- the link file 31 it comprises only one part, namely a header which has the same structure as that 32 of the target file 30, but has a content that differs in the following way:
- the "reference" is not that relating to a possible body attached to the link-file, but an RFC reference specifying the location in memory of a target file thus linked to this link-file. In this example, it is the target file 30.
- the reference RFC is preferably "physical” and consists of a binary value of a memory address from which the above-mentioned target file 32 is stored, or alternatively "Logical" and consisting of a path specifying the identifiers of one or more directories from which the target file 32 is accessible.
- the microprocessor In the very particular case of a dynamic management of the memory of the card, it can be reorganized by the microprocessor to optimize the memory occupancy.
- the location of the files can therefore fluctuate, as well as their location addresses.
- only the logical reference of the target file is easily usable because the physical addresses may constantly change. Taking as an example the case mentioned above, the logical reference is: [MAP ⁇ APPLICATION 1 ⁇ Data file A1-1].
- link-file has no body, but is linked to a specific target file, whose body will thus be made available to the link-file.
- a second link-file different from the link-file 31, could be linked, not directly to a target-file, but for example to the link-file 31. The situation would then be the following :
- the parameter CA-Link would advantageously be used in the header of the first link-file to control the conditions of creation of the second link-file.
- a microprocessor program In operation, during the selection of a file by the user, a microprocessor program reads its header and tests its ⁇ Link> parameter. If it is equal to 0, the operation is in accordance with the prior art: the body is directly attached to this header.
- the file is a link-file.
- the program reads accordingly the RFC reference of this link-file specifying the address or the path of a target file containing a body indirectly attached to the header of the link-file.
- the program carries out the following checks, by consulting the respective headers of the link-file and the target-file:
- the program continues its procedure of access to the contents of the file-link. If the body size of the target file is "zero byte", that is, if it does not contain anything, the program aborts and the card returns an error message. Otherwise, the program searches the information contained in this body, from the address RC.
- the program searches the information contained in this body, from the address RC.
- the file A1-1 in the application directory 1 was created as a target file, and that the files A2S1-1, A2S1-2, A2S2-1 service directories A2-S1 and A2-S2 have been created as link-files. As a result, selecting a link-file such as A2S1-1 will give access to the contents of target file A1-1.
- the conditions of access to the body of the Target-file must in all cases be respected, when executing a link between file-link and target-file Several strategies are possible The easiest way is to obey the access conditions defined in the header of the Target-file so access to the information in the target-file via the link-file is granted only if the conditions of the target-file are respected
- Another strategy is to take into account the access conditions of the target-file during the creation of the link-file. It must then be verified that the access conditions entered in the header of the link-file include all the conditions. access of the target file to which he is going to be heir
- a third strategy is applicable when the conditions of access are expressed in the form of a binary value it consists in cumulating the two conditions of access Concretely, this operation can be realized by performing a logical AND between the two values L ' access to information in the target-file via the link-file is granted only if both the access conditions of the Target and link files are respected.
- the reader understands that the objective, at the level of access control, is to prohibit any possibility of circumventing the access conditions of a file by linking it to a file that has conditions of access. More favorable access Other strategies, known to those skilled in the art, may be used to ensure access security
- An important security enhancement is to use the A-Link parameter of a target-file to prevent it from being inherited from another file. If the value of this parameter is "1", when creating a link-file attached to this target-file, the operation is carried out and the content of the body of the target-file is accessible by the link-file If, however, the value of this field is "0", this file- target can not be linked to any other When an attempt is made to create a link-file designating a file whose A-Link field is equal to "0", the operation is refused and the card returns an error message
- the solution consists in either prohibiting the deletion of the target file to which one or more Link files are attached, or warning the user of the card that some files are no longer operational after this deletion.
- a first method is to test the value> Link ⁇ . If this value is 1, the file being erased is a Target file. The operation is then either prohibited or carried out but with a warning; in the latter case, the control terminal of the card must erase all the linked files linked to the deleted target file.
- the counter is incremented.
- the counter is decremented.
- the value of the counter can be emitted with the other header information: the user can thus know the number of link files attached to the selected target file.
- the program of the card is equipped with a command, activatable from outside the card, to exchange the respective statuses "link" and "target” two files.
- a file-Target become a file-Link can be deleted without consequence for the other files-Link.
- the content of the new target file is then constituted by that of the old target file. This is especially easy when the file bodies are physically separate headers.
- the execution of this command is subject to the verification of the access conditions defined in the header of the old target file, and possibly to the verification of the conditions for creating links between files. , defined by the CA-Link parameter in the directory of the new target file.
- the value of the CP-Link counter of the old target file is stored in the CP-Link counter of the new target file.
- Figure 4 illustrates a method of creating a file, whether it is a file-link or not. It includes, in addition to steps specific to the invention and relating to the file-link, certain steps known in themselves and relating to the creation of any file, whatever its nature.
- a file creation order is received by the card, along with creation data: this data defines in particular the type and identifier of the file to be created and, if it is a file -link, the RFC reference ( Figure 3) of a target file to which it must be linked.
- the operating system of the card verifies that the creation of a new file is possible in the current directory, also called "current" (step 2). Indeed, the creation of a new file is possibly subject to the proper prior presentation of keys defined by the access conditions of the header of the current directory. Then, we check that there is enough memory in the current directory to hold the new file (step 3). If one of these tests is negative, the creation order is interrupted (step 13), and the card then returns a message corresponding to the origin of the stop.
- the operating system tests whether it is the creation of a normal file or the creation of a link file (step 4).
- An important difference between a normal file and a link-file, and on which the test can be carried out resides in the creation data, and mainly in the precise indication of the location of the Target-file (physical or logical address). If it is not a link file, the program jumps directly to step 12 described below.
- the information corresponding to the designated target file is searched for and analyzed in step 5; then the operating system performs a number of tests to ensure that the link between the designated target file and the link file to be created is possible. First, it is verified using the creation data that the target file exists (step 6).
- step 13 the creation operation is interrupted and the card sends an error message (step 13).
- step 7 the A-Link parameter of the localized Target file is tested. If its value is "1", the operation can be completed. Otherwise, the target file can not be linked to any other file.
- the creation operation is then interrupted and the card sends an error message.
- step 8 the operating system tests whether any keys defined in the conditions for creating the link file, that is to say defined by the CA-Link parameter of the Target-file, were previously presented. If this is not the case, the creation operation is interrupted.
- step 9 the operating system of the card verifies that the file types eWes access conditions to the information are compatible. For this, the TYPE parameter of the Target-file is compared to that transmitted in the creation data. If the values are different, or at least incompatible, as for example in the case of a creation order to link a data file and a directory, or a link between a "public" type data file and a data file of type "secret", then the creation operation is interrupted and the card sends an error message. This test is optional because another solution consists in forcing the received data for the link file to be created, to the same value as those of the designated Target file: the compatibility is in this case certain.
- a last test carried out concerns the conditions of access to the information contained in the Target file (etapelO). It is necessary to avoid circumventing the conditions of access of the Target-file by a file-Link which would have more favorable conditions of access.
- One of the strategies described previously is to prohibit the creation of a file-Link having access conditions less restrictive than those of the file-Target: the creation operation is then interrupted and the card sends an error message (step 13).
- Another strategy consists of modifying, and thus modifying, the access conditions of the link file to make them at least as restrictive as those of the target-file. In this case, the test of step 10 becomes a calculation operation with modification, if necessary, access conditions transmitted in the command. Once the test steps are completed, the creation of the link file can take place.
- step 11 the header of the target file is updated. This mainly concerns the parameter> Link ⁇ or Cp-Link. If this is the> Link ⁇ parameter, the program checks whether it has the value at "1", or else sets it to this value. If it is instead the counter Cp-Link, it is incremented by one unit.
- step 12 a new file is actually created, and the values of the header parameters of this file are determined in working memory from the creation data. These values are written in nonvolatile programmable memory. If it is a link-file that is created, a reference related to the location of the target-file (physical or logical address) is written. Once all these steps are completed, the card renders a correct status message and the newly created file is operational.
- a particularly interesting application of the invention and relating to directories-link is that where an electronic wallet directory is used by the card to allow payments.
- This directory contains basic files containing keys, credit debit zones, password validation zones, etc.
- Such a directory can be used in various applications (transport, restaurant, central purchasing): each they must therefore contain a directory-link linked to the electronic wallet directory, which then becomes a target-directory.
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11505329A JP2000503157A (ja) | 1997-06-26 | 1998-06-25 | メインファイルと補助ファイルとの間にリンク生成手段を備えたセキュリティモジュール |
AU83439/98A AU8343998A (en) | 1997-06-26 | 1998-06-25 | Security module comprising means generating links between main files and auxi liary files |
EP98933716A EP0944880A1 (fr) | 1997-06-26 | 1998-06-25 | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires |
BR9806014-7A BR9806014A (pt) | 1997-06-26 | 1998-06-25 | Módulo de segurança compreendendo meios de criação de ligações entre arquivos principais e arquivos auxiliares. |
CA002264896A CA2264896A1 (fr) | 1997-06-26 | 1998-06-25 | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires |
NO990893A NO990893L (no) | 1997-06-26 | 1999-02-25 | Sikkerhetsmodul omfattende midler for generering av lenker mellom filer og hjelpefiler |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR97/07996 | 1997-06-26 | ||
FR9707996A FR2765362B1 (fr) | 1997-06-26 | 1997-06-26 | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999000774A1 WO1999000774A1 (fr) | 1999-01-07 |
WO1999000774A9 true WO1999000774A9 (fr) | 2007-07-26 |
Family
ID=9508465
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1998/001344 WO1999000774A1 (fr) | 1997-06-26 | 1998-06-25 | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires |
Country Status (12)
Country | Link |
---|---|
EP (1) | EP0944880A1 (fr) |
JP (1) | JP2000503157A (fr) |
KR (1) | KR20000068374A (fr) |
CN (1) | CN1231042A (fr) |
AR (1) | AR016092A1 (fr) |
AU (1) | AU8343998A (fr) |
BR (1) | BR9806014A (fr) |
CA (1) | CA2264896A1 (fr) |
FR (1) | FR2765362B1 (fr) |
NO (1) | NO990893L (fr) |
TW (1) | TW434504B (fr) |
WO (1) | WO1999000774A1 (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4565703B2 (ja) | 2000-05-16 | 2010-10-20 | グローリー株式会社 | データ記憶装置およびデータ記憶方法 |
WO2005121976A1 (fr) * | 2004-06-14 | 2005-12-22 | Sony Corporation | Dispositif de gestion d’informations et procede de gestion d’informations |
JP5124733B2 (ja) * | 2006-04-25 | 2013-01-23 | キヤノンItソリューションズ株式会社 | サーバ装置および情報共有システムおよびプログラムおよび記録媒体 |
CN102306170A (zh) * | 2011-08-23 | 2012-01-04 | 北京握奇数据系统有限公司 | 一种存储及处理智能卡公共信息的方法及装置 |
JP6947166B2 (ja) * | 2016-03-23 | 2021-10-13 | ソニーグループ株式会社 | 情報処理装置及び情報処理方法 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63253493A (ja) * | 1987-04-09 | 1988-10-20 | Mitsubishi Electric Corp | 情報記録システム |
EP0332117B1 (fr) * | 1988-03-09 | 1994-05-11 | Kabushiki Kaisha Toshiba | Appareil électronique portatif |
JP3017736B2 (ja) * | 1988-03-09 | 2000-03-13 | 株式会社東芝 | 携帯可能電子装置 |
JPH04373040A (ja) * | 1991-06-21 | 1992-12-25 | Fujitsu Ltd | ファイル管理方式 |
FR2696854A1 (fr) * | 1992-10-09 | 1994-04-15 | Kudelski Sa Fabrique Enreg Nag | Système de traitement d'information utilisant un ensemble de cartes à mémoire. |
FR2703800B1 (fr) * | 1993-04-06 | 1995-05-24 | Bull Cp8 | Procédé de signature d'un fichier informatique, et dispositif pour la mise en Óoeuvre. |
JPH0756781A (ja) * | 1993-08-20 | 1995-03-03 | Fujitsu Ltd | ファイル管理方式 |
JPH0778098A (ja) * | 1993-09-08 | 1995-03-20 | Fujitsu Ltd | ファイル管理システム |
DE69402955T2 (de) * | 1994-02-08 | 1997-08-14 | Belle Gate Investment B.V., Den Haag | Datenauswechselsystem mit tragbaren Datenverarbeitungseinheiten |
JPH07262214A (ja) * | 1994-03-18 | 1995-10-13 | Hitachi Ltd | リンク情報管理方法 |
JP2912840B2 (ja) * | 1994-12-07 | 1999-06-28 | 富士通株式会社 | ファイル管理システム |
-
1997
- 1997-06-26 FR FR9707996A patent/FR2765362B1/fr not_active Expired - Fee Related
-
1998
- 1998-06-19 TW TW087109858A patent/TW434504B/zh not_active IP Right Cessation
- 1998-06-25 CN CN98800895A patent/CN1231042A/zh active Pending
- 1998-06-25 AR ARP980103062A patent/AR016092A1/es unknown
- 1998-06-25 EP EP98933716A patent/EP0944880A1/fr not_active Withdrawn
- 1998-06-25 CA CA002264896A patent/CA2264896A1/fr not_active Abandoned
- 1998-06-25 BR BR9806014-7A patent/BR9806014A/pt not_active IP Right Cessation
- 1998-06-25 JP JP11505329A patent/JP2000503157A/ja active Pending
- 1998-06-25 WO PCT/FR1998/001344 patent/WO1999000774A1/fr not_active Application Discontinuation
- 1998-06-25 KR KR1019997001615A patent/KR20000068374A/ko not_active Application Discontinuation
- 1998-06-25 AU AU83439/98A patent/AU8343998A/en not_active Abandoned
-
1999
- 1999-02-25 NO NO990893A patent/NO990893L/no not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
BR9806014A (pt) | 1999-10-13 |
WO1999000774A1 (fr) | 1999-01-07 |
FR2765362A1 (fr) | 1998-12-31 |
TW434504B (en) | 2001-05-16 |
AR016092A1 (es) | 2001-06-20 |
KR20000068374A (ko) | 2000-11-25 |
CA2264896A1 (fr) | 1999-01-07 |
NO990893D0 (no) | 1999-02-25 |
FR2765362B1 (fr) | 2001-08-17 |
AU8343998A (en) | 1999-01-19 |
JP2000503157A (ja) | 2000-03-14 |
EP0944880A1 (fr) | 1999-09-29 |
NO990893L (no) | 1999-03-17 |
CN1231042A (zh) | 1999-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0423035B1 (fr) | Système de paiement ou de transfert d'informations par carte à mémoire électronique porte-monnaie | |
EP0018889B1 (fr) | Procédé pour prolonger la validité d'une zone de travail de la mémoire d'un support d'enregistrement | |
EP0507669B1 (fr) | Procédé de paiement électronique par carte à puce à l'aide de jetons numérotés et carte pour sa mise en oeuvre | |
EP0089876B1 (fr) | Procédé et dispositif de protection d'un logiciel livré par un fournisseur à un utilisateur | |
EP0990204B1 (fr) | Carte a puce comprenant des moyens pour gerer une memoire virtuelle, procede et protocole de communication associes | |
EP0552079B2 (fr) | Carte à mémoire de masse pour microordinateur | |
FR2681165A1 (fr) | Procede de transmission d'information confidentielle entre deux cartes a puces. | |
FR2673476A1 (fr) | Procede securise de chargement de plusieurs applications dans une carte a memoire a microprocesseur. | |
FR2716021A1 (fr) | Procédé et système de transaction par carte à puce. | |
EP0565389A1 (fr) | Procédé de personnalisation d'une carte à puce | |
EP0552077B1 (fr) | Carte à mémoire de masse pour microordinateur avec facilités d'exécution de programmes internes | |
WO2001084512A1 (fr) | Carte a puce multi-applicatives | |
FR2817055A1 (fr) | Execution d'une application dans un objet electronique portable a faible capacite de memoire | |
WO1999000774A9 (fr) | Module de securite comportant des moyens de creation de liens entre des fichiers principaux et des fichiers auxiliaires | |
EP1388134A1 (fr) | Procede et systeme de gestion de donnes destinees a etre stockees dans une carte a puce programmable | |
EP0838053B1 (fr) | Procede et dispositif permettant a un programme fige de pouvoir evoluer | |
EP2912640B1 (fr) | Procédé de gestion d'identifiants dans une carte a circuit integré et carte a circuit integré correspondante | |
CA2046320C (fr) | Procede de generation d'un nombre aleatoire dans un systeme a objets portatifs electroniques, et systeme pour la mise en oeuvre du procede | |
FR2806813A1 (fr) | Systeme de gestion de memoire pour cartes a puce permettant a un utilisateur d'avoir acces a certaines prestations dans le cadre notamment d'une gestion informatisee des services de la ville | |
EP0910839B1 (fr) | Procede de stockage des unites de valeur dans une carte a puce de facon securisee et systeme de transaction monetaire avec de telles cartes | |
EP1129430B2 (fr) | Procede et dispositif de controle du cycle de vie d'un objet portatif, notamment d'une carte a puce | |
FR2789774A1 (fr) | Procede de comparaison securise de deux registres memoire, et module de securite mettant en oeuvre ce procede | |
FR2933214A1 (fr) | Procede de basculement entre deux versions d'une meme application au sein d'un dispositif de traitement de l'information et ledit dispositif | |
EP0609156A1 (fr) | Système détecteur de falsification d'informations mémorisées | |
FR2795583A1 (fr) | Module de securite |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 98800895.5 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU BR CA CN JP KR NO SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1998933716 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 1999 505329 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2264896 Country of ref document: CA Ref document number: 2264896 Country of ref document: CA Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1019997001615 Country of ref document: KR Ref document number: 09242976 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 83439/98 Country of ref document: AU |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1998933716 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1019997001615 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998933716 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1019997001615 Country of ref document: KR |