The present invention relates to a method for authorized granting of a service in accordance with the preamble of claim 1 and to a portable device for carrying out said method in accordance with the preamble of claim 11.
In this document the term “electronic card” or “electronic medium” or “medium” for short is generally taken to include electronic identity cards with an identifying characteristic, and these are also sometimes referred to by terms such as smartcard, chip card, electronic ticket, proximity cards, vicinity cards and employee badges. Proximity cards and vicinity cards are standardized by ISO, these standards being defined in ISO 14443 [1] and ISO 15693 [2], in addition the proximity cards and vicinity cards also include proprietary brands such as LEGIC prime for example.
The terms and definitions given in the list of abbreviations and acronyms are an integral part of this document in the sense of a glossary. This means that not all acronyms and terms are specifically explained elsewhere in the document. The widely-used English expressions have been employed both here and in the original German document within the text and in the glossary for the individual units. Likewise the function implemented with a component is in some cases provided with the same reference symbol as the component itself. To avoid any uncertainty, as in the original German version, the normally-used English expressions, such as. “challenge/response” are also employed in this translation for the individual units and methods.
Proximity Cards PICC can transmit data to a proximity card detector PCD at a range of between 1 and 10 cm. Thus, in order to be granted access to a zone, a person is obliged to move the card into the vicinity of the Proximity Card Detector PCD. This is especially disadvantageous when entering a garage since the window of the vehicle must be lowered to do so. There is especially the danger of the card falling on the floor when being manipulated in this way.
Personal identification details and/or authorizations are stored on a smartcard. The term identification details and/or authorizations also includes keys in the cryptographic sense. These identification details or authorizations, if necessary together with further interaction by a user, allow access to a location or allow a service or information to be obtained.
The term “service” in this document includes both the classical term from telecommunications, such as a supplementary service for example. The term “service” in this document is also understood to include any access to a location or to a service or for obtaining information or for obtaining money.
Smartcards possess an air interface, e.g. in accordance with ISO/IEC 14443 [1], and/or a contact interface, e.g. in accordance with ISO 7816 [3]. Both interfaces are designed for communication in the near field. In the case of a wireless connection this near field covers around 10 cm. Communication with such cards is not possible over a greater distance.
Chip card devices for accepting a chip card, with which a wireless connection to a terminal for a payment or access to an object is enabled are known for example from EP 0 159 539 A1 [9], U.S. Pat. No. 6,142,369 [10], U.S. Pat. No. 6,250,557 B1 [11] or DE 198 41 862 A1 [12]. In U.S. Pat. No. 6,250,557 B1 [11] there is provision, if a plurality of chip cards is inserted, for each chip card to be provided with its own IP address. In many cases a mobile telephone is provided as a chip card device, featuring slots for further chip cards, i.e. in addition to the SIM card slot.
For communication over greater distances, but not via a public switched telecommunication network such as GSM, so-called “combi boosters” are known, made by Nedap [4, 5] for example. A “booster” is an electronic portable device (=electronic wallet), into which a proximity card can be inserted. An identifier, mostly a personal identifier—referred to below as a “personified” identifier—is transferred from the proximity card via the air interface into the wallet. This wallet sends the received identifier on another frequency, e.g. on the ISM band of 2.45 GHz, to a static receiver unit. The received identifier is evaluated in a background system and, if the identifiers match, a release signal for granting access is generated. The wallet in this case can also contain a further identifier, so that access is only possible with the relevant wallet and the card. With the proprietary variant mentioned at the start it should be noted in this case that the connection cannot be terminated in the wallet unless a corresponding proprietary chip is built into the wallet. The reason for this the Layer 1/Layer 2 transmission used and not disclosed by scrambling.
Such a system is also desirable for access control in which a person carries such a wallet with an electronic card inserted into it. The above solution for parking lot entry is not satisfactory for further applications for the following reasons:
To grant an individual service, such as withdrawing cash from an ATM, a method is disclosed in 101 04 409 B4 [6] in which the ATM reads a code from the mobile telephone, preferably a bar code. This code contains a unique address for example, such as a MAC address for a first authentication for example. The further steps for dispensing the cash are undertaken via radio communication, e.g. via Bluetooth.
Such portable electronic devices have also already been proposed, such as in European Patent Application EP 05013418.8 [7] for example, in which the aforementioned disadvantage relating to the greatly restricted autonomy is remedied by “waking” of the electronic wallet by a near field. Following the “waking” with a first lower frequency of the portable electronic device there is intermittent bidirectional communication with an access point at a higher frequency. After a certain time without communication there can be provision for the portable device to return to the sleep state again. This enables a significantly great autonomy to be achieved.
The solution still does not satisfactorily remedy the disadvantage listed above under b), since this solution is restricted to a specific physical access and to a specific smartcard with a specific service.
The underlying object of the present invention is to create a method for a medium containing an identifier for granting a service, such as admission to a zone for example or for authorized use of service, with this method on the one hand overcoming the disadvantages stated above and also enabling the following:
The object of the invention is also to specify a portable device suitable for executing the above method.
This object is achieved for the method by the features specified in claim 1 and for the portable device by the features specified in claim 11.
The method defined in claim 1 provides a user with secure access to services in a modular manner. “Near field” of the first communication link means that the medium is in the direct vicinity within the range of up to a few millimeters from the portable device. By means of a plurality of media each containing at least one service-specific identifier service-specific authorization data can thus be requested for obtaining a service or for access to a zone. For a body issuing a medium such as a smartcard this has the advantage that the stored identifier assigned to a service can be administered independently of other identifiers. The function and the security are guaranteed despite the “portable device” vehicle because of the secure end-to-end connection, meaning that the portable device is not involved in the end-to-end data encryption. The bidirectional communication between the portable device and the access point makes it possible, with a conventional card reader located in the access point, for the card issued in the portable device to be emulated in the access point. On the one hand his allows existing access points to continue to be used and on the other hand the interface between access point and an assigned server or network management system does not have to be disclosed. This makes it possible to decouple access to a service from the actual means embodied for transmission to an access point such as a card reader for example.
In a development of the method an input means can be arranged on the portable device for authentication of the user based on a user interaction. A biometric sensor, e.g. a fingerprint sensor or keys can be arranged as the input means. The unit can be configured by means of entries made via the keys. Expediently a display is also to be provided, e.g. an LCD display. Both “challenges” and also “responses” for the authentication, which are needed for authentication of a user, can be shown on the display. The display also serves to display operating states relating to the portable device and also in relation to the granting of a service. The control elements are used not only for the above-mentioned authentication and/or configuring, but allow access to a possibly chargeable service based on an active deliberate action.
Further advantageous embodiments of the invention are specified in further claims.
The invention is explained in more detail below with reference to the drawing. The figures show:
An overview of the principal function of the inventive method and of the components involved is given below with reference to
I) That authorization exists for access to a service.
II) That the authorization is authentic.
III) That smartcard rightfully carries this authorization.
IV) That the response is current.
It is pointed out once more at this juncture that such a real access zone 50 in accordance with
The wallet 20 only shown in summary in
The first communication link 40 between smartcard 10 and portable device can for example be made wirelessly in accordance with ISO 14443: To this end a person only needs to hold the smartcard 10 and the portable device together, as is shown in summary in the upper part of
In especially sensitive zones there is even today a statuary duty to carry identification. To this end a wallet 20 is provided with a transparent cover 28 so that the picture assigned to a person is visible on the smartcard to third parties. The wallet 20, provided with portable device 30 and smartcard 10 can thus be worn visibly as an item of clothing. The mechanical design of the wallet 20 can be found in
For the case in which an electrical connection such as that defined in ISO 7816 [3] for example is required between smartcard 10 and portable device 30, the wallet 20 depicted in
In the case of a wireless connection between smartcard 10 and portable device 30 the wallet merely functions as a mechanical connection so that the two parts are protected against accidental loss.
In practical operation a user will establish a connection between different smartcards 10 and the portable device 30 in order to use the system. When a wallet 20 is used an insertion opening with a ramp 25 is provided which facilitates insertion.
Also arranged on the portable device 30 is a crypto controller 35 with at least one Secure Application Module SAM 351. These crypto controllers 15 and 35 provide a secure connection 40 between smartcard 10 and portable device 30 and also between portable device and access point 60. Contained in the crypto controller 15 for such an application can be a biometric authentication e.g. fingerprint details and/or keys for further biometric authentication methods. Likewise so-called digital identity credentials can be stored in the crypto controllers 15 and 35. A secure end-to-end connection in a form of tunneling is implemented between the crypto controller 15 between smartcard 10 and access point 60. The underlying methods can be found in the prior art, the security is preferably implemented using an asymmetrical PKI method or using the symmetrical so-called 3DES method. The communication link 70 between access point 60 and portable device 30 can be realized with:
Instead of or in addition to the aforementioned radio interface in accordance with ISO 14443, an NFC interface can also be provided which includes the interface as defined in ISO 14443. At this juncture it is pointed out, to avoid misunderstandings, that the interface unit 312, as defined in ISO 14443 for example, has an entirely different function from the interface unit 322. In this way an emulation for card readers already installed is possible, without the relevant smartcard 10 having to be suitable for them, since this is dependent on the portable device 30 and not on the smartcard 10 coupled to the device at the time.
For interaction between a user and the portable device 30 the following are to be provided as an alternative or cumulatively:
The functional complexity contained in such a device requires configuration for most applications. This configuration is preferably undertaken via a wired interface unit 314, e.g. USB.
It is possible to use this wired interface in addition to or as an alternative to the second wireless communication link 70, e.g. for an access to service granted via a personal computer such as specific content of chargeable Internet pages.
The above modular system for access to the various services is shown in tabular form in
The physical communication links provided for each such service are now defined. The “permission carrier” of a relevant service is a specific smartcard MF1, MF2, . . . , on which an identifier specifying the personified service is contained. In this case there can be provision, provided this is allowed by the service providers, for a number of identifiers each specifying a service to be stored on a smartcard 10, each in their own section.
The above-mentioned assignment is either solely stored on the smartcard 10 or also stored on the portable device 30. As already stated, this assignment or configuration of the device is preferably undertaken via a wired interface unit 314 such as USB for example. In this way, for initiation of the use of a service the communication link type used for it is selected.
The functions of a card reader associated with classic technology can be freely distributed by the present disclosed embodiment of the invention between the portable device 30 and the access point 60 and thus allow a very flexible adaptation to the very widest range of applications, this relating in particular to the location of the so-called termination.
The present invention is implemented with a very wide variety of card systems such as Legic or Mifare for example. It can also be used for different cards of the same system, namely if the difference only relates to the issuer or the owner of the card.
Number | Date | Country | Kind |
---|---|---|---|
05028644.2 | Dec 2005 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP06/12212 | 12/19/2006 | WO | 00 | 6/27/2008 |