The invention is related to a method for the initialisation or extension of an application, i.e. for the transmission of information associated with an application to terminals, resp., read—and write stations of a system with mobile data carriers within the framework of a hierarchical authorisation system as well as a mobile data carrier. Systems with mobile data carriers (e.g., contact requiring and in preference contact-less identification media, chip cards or value cards, etc.) make it possible for the user to carry out corresponding applications at assigned read and write stations, such as the access to services (PC—access and goods), resp., the access to protected zones, buildings, events, etc.
An example for a system of this kind with contact-less identification media, resp., mobile data carriers and a hierarchical authorisation system is described in the WO 97/34265.
Above all in larger systems these applications time and again have to be extended, added to and modified at the various terminals, i.e., new or extended applications App have to be set-up in certain terminals. This renewal and adaptation of application programs up until now is only able to take place in two manners:
It now is the objective of the invention to find a new simple method for changing and setting-up applications in terminals and above all also in decentralised terminals. This objective is achieved in accordance with the invention by a method according to claim 1 and by a mobile data carrier according to claim 28.
In doing so, a new application App is loaded into a selected, authorised terminal WRZ of the system. The data carriers IM are presented at the authorised terminal, checked by it and if so required loaded with the new application information lex. If these loaded data carriers IMex are presented at further terminals WR of the system, then once again the data carrier is checked by the terminal and, if the new application App is associated with the terminal, then the application App, resp., the corresponding application information Iex is loaded into the terminal and in the following also executed by the terminal.
The dependent claims relate to advantageous further developments of the invention comprising particular advantages with respect to applications, security and adaptation to further conditions. In the following, the invention is further explained on the basis of Figures and examples.
a, b, c are schematic representations of the method in accordance with the invention with the transmission of a new application from an authorised terminal WRZ to a data carrier IMex, from the data carrier to another terminal WR and the execution of the application with further data carriers IM,
a, b are schematic representations of the implementation of the method according to the invention the construction of an authorised terminal WRZ, of a data carrier IMex and of a terminal WR with the transmitted application information Iex,
a, b, c are schematic representations that illustrate the distribution of application information to the terminals WR and to the data carriers IMex as well as the execution of applications,
The
A new or extended application App is loaded into a selected, authorised terminal WRZ (step 10 in
The execution of an application by a terminal WR immediately following the transmission of this application from the data carrier IMex to the terminal WR makes possible the implementation of applications with individual application profiles ind.
The data carrier IMex, however, is also capable of being utilised solely as a postman for the transmission of the application information Iex, without it being destined for the application App itself (without it being able to execute this application itself).
By means of flag/pointers F/P, it is possible to define or to verify, whether application information Iex is present on a data carrier IMex. In particular one has to differentiate between the following flag/pointers F/P:
Within the framework of the transmission of application information Iex between the elements WR, WRZ and IMex one is able to differentiate whether these appear as active (i.e., making the application information Iex available as sender of their own accord) or passive (i.e., receiving the application information Iex as receiver).
The utilisation, i.e., the setting of flag/pointers F/P is a possibility for the implementation of active elements WR, WRZ, IMex. Thus during the step 15 (transmission of the application information Iex to the terminal WR), depending on requirements the terminal WR (active) is able to request from the data carrier, whether application information Iex is present (in that, e.g., the flag/pointer F/P-IMex is checked and if so required evaluated) or the data carrier IMex (active) is able to inform the terminal WR, that an application information Iex is present (in that, e.g., the flag/pointer F/P-IMex is transmitted to the terminal WR for a possibly required evaluation). This is also applicable in analogy for the sending back of status information Ist.
For the transmission of the application information Iex to the data carriers IMex and for the transmission from the data carriers IMex onto the terminals WR, an adequate authorisation is necessary. I.e., the transmission may only take place to, resp., by authorised data carriers IMex, resp., terminals WR, for which the application is destined and in such a manner, that the required security is assured. This authorisation is capable of being implemented in various ways and adapted, resp., selected according to the security requirements in correspondence with the type and the importance of the application, for example with the authorisation rules of the security level SL-IM corresponding to the system A, which are associated with the data carrier IMex, and security level SL-WR, which are associated with the terminals WR and which control the transmission of the new application information lex and its subsequent execution. In doing so, it is important, that the rules of the authorisation system A prevent, that it is possible for a security level SL-IM or SL-WR in a data carrier or in a terminal to be increased or changed. With this, the distribution of the applications App to the terminals WR and their utilisation is checked and restricted by means of the data carriers IM.
It is hereby possible to define the characteristics of the security level SL within the framework of the authorisation system A following or extending already present hierarchy levels, e.g., of organisation levels OL in accordance with WO 97/34265, or by new levels (with new principles) independent of existing levels.
There is, however, also the possibility, that the security levels SL are defined not within the framework of the authorisation system A, but rather within the framework of an additional, independent security authorisation system SA.
Further security—and controlling elements form identification data ID-IM und ID-WR or additional personal codes pers, as is further explained in
It is also possible to introduce a separate encryption cryp2 for the application. In doing so, the application information is encrypted with cryp2 in the authorised terminal WRZ, transmitted in encrypted form in the data carrier IMex and the transmitted application information Iex is only decoded again in the terminal WR with cryp2 (
It is also possible, that for different independent applications App1, App2 of independent users and the assigned terminals WR also independent of one another encryptions cryp2 are selected. This encryption cryp2 of the application is independent of an encryption cryp1 of the contact-less communication Rf-K in contact-less systems, as is illustrated with the example of
The new applications transmitted in accordance with the invention, resp., the corresponding application information Iex are to be understood as application extensions Appu (Update) of existing applications in the terminals WR or as new, not yet present applications Appn.
For the controlling of the authorisation and authentication at the authorized terminals WRZ or at the terminals WR associated with an application, the data carrier IMex may contain special identification data ID-IM. In this manner, the data carriers IMex are able to be defined for the transmission of selected application information Iex by means of identification data ID-IM.
And for the controlling of the authorisation and authentication at the terminal WR, special identification data ID-WR of the terminal are able to serve, with which the terminals WR are defined for the receiving of certain application information Iex.
During the transmission of the new application information Iex to the data carriers IMex and from the data carriers to the terminals WR, as an additional security requirement also a personal identification of the owner of the data carrier or of the owner of the terminal with a personal code pers (e.g., a PIN-Code or a biometric code) may be prescribed.
In order to prevent, that a newer application is inadvertently overwritten by an older application, it is possible to provide a control mechanism, e.g., with respect to time or by means of a version number. If an earlier application version App1a initialised by a data carrier IMex has been replaced by a later, new, modified version App1b, then it must be prevented, that this newly installed version subsequently once again is capable of being replaced by the old version App1a, e.g., if this old version is later presented at the terminal WR by another data carrier IMex, which still contains the old version. It is possible to achieve this by means of a time control, e.g., by dating the applications with respect to time and by means of the condition, that a younger application App1b with the point in time tb is not able to be replaced by an older version App1a with the point in time ta: Condition tb>ta. Another possibility consists in a controlling by means of a version number vn and the condition, that a younger application App1b with the version vb may not be deleted, resp., replaced by an older application App1 with the version va: Condition vb>va.
An important aspect for the controlled propagation is the possibility of transforming a terminal WRd, WRh into an authorised terminal WRZd, WRZh, without the terminal having to be connected with a host computer H and without the application information Iex having to be transmitted into the terminal by means of an additional, special transmission authorisation medium AM. This leads to further cost reductions during the introduction, resp., initialisation of new applications, because it is possible to make do without the linking of the individual terminals WR to the host computer H or without the transmission on site into every individual terminal WR by means of a transmission authorisation medium AM. The users of a system, i.e., the holders of the identification media (data carriers) IMex, propagate a new application in the system in the simplest possible manner: by the utilisation of the system.
In analogy to this controlled propagation in accordance with the virus principle, it is also possible to carry out a controlled deletion of an application App, independent of how and from where this application has been loaded into, resp., transmitted to a terminal WR.
In this, it is also possible for a terminal WR to be transformed into an authorised terminal WRZ only temporarily. Thus it is possible for a transformed authorised terminal WRZ (e.g., WRZd) after a certain time period or on the basis of certain criteria to be transformed back into a normal terminal WRd again, e.g., after the application information Iex has been transmitted to a predefined number of data carriers IMex or in dependence of certain status information Ist.
Also here it is applicable, that an authorised terminal, e.g., WRZd, does not have to transmit application information Iex to all IMex, but solely if it is meant for this.
It is also possible, that a terminal WR is transformed into an authorised terminal WRZ solely for the transmission of status information.
The
The authorised terminal Rf-WRZ contains a data memory MEM as well as a microprocessor uP-WR for the storage, resp., processing of the application information Iex as well as for the communication and for further security—and control functions. In this, the application information Iex=Idat, Ipar, Icod may contain:
This
One data carrier without application microprocessor uP-IM, with a memory MEM for the application information Iex and one data carrier, which in addition comprises an application microprocessor uP-IM. This makes it possible, that the data carrier IMex itself is capable of executing an application or a part of an application. In doing so, the corresponding program code Icod is not transmitted to the terminal WR, but remains in the data carrier IMex and is executed, resp., controlled by the application processor uP-IM of the data carrier, which with this forms an extension of the application processor uP-WR, possibly also of the App HW/SW. The compliance with the rules of the authorisation system A, however, also in the case of an extension of this kind is carried out through the terminal WR, i.e., the application data Idat necessary for this (in general that processed by the application Icod) has to be made available to the terminal WR by the data carrier IMex prior to the execution of an application.
a depicts the transmission of the application information Iex=Idat, Ipar, Icod by the authorised terminal Rf-WRZ onto the data carrier Rf-IMex and
Die Terminals WR may contain a logical communication—and application interface LCAI (Logical Communication and Application Interface), through which application information Iex is loaded into the terminals and is capable of being read out.
The terminals WR in this example contain a logical communication—and application interface LCAI, which ensures, that the microprocessor of the terminal WR understands the application information Iex, e.g., the language of the program code Icod and is capable of processing it in compliance with the rules of the authorisation system A. The logical communication—and application interface LCAI comprises in essence three tasks:
The API represents a software interface for the standardised access to functions of a program, so that the logical rules for the execution of the application are complied with.
Correspondingly the writing (12) of application information Iex onto a data carrier IMex has to be carried out through the logical communication—and application interface LCAI. In analogy, also the transmission (15) of application information Iex from the data carrier IMex to a terminal WR has to be carried out through the logical communication—and application interface LCAI, where in addition also the controlling of the security level SL may take place.
a further illustrates two possibilities of transmitting the application information Iex in a controlled, authorised manner in compliance with the rules of the authorisation system A to an authorised terminal WRZ for the first time. The transmission may be carried out by a transmission authorisation medium AM (which contains the application information Iex and simultaneously serves for the authorisation according to the authorisation system A) or by a host computer H. In case of a transmission through the host computer H, the rules of the authorisation system A have to be complied with in a different manner, e.g., in that the communication between the host computer H and the authorised terminal WRZ is explicitly enabled by an authorisation medium AM2, in preference through a contact-less communication Rf-K with the WRZ. Here already the transmission (10) of the application information Iex into the authorised terminal WRZ is able to take place through the logical communication—and application interface LCAI of the terminal, this as an additional security measure.
The logical communication—and application interface LCAI is an important element for the compliance with the rules of the authorisation system A over all levels and for all terminals WR, WRZ and data carriers IM of the system.
It is also possible, that terminals are provided, which do not yet contain any application, so-called generic terminals g-WR with an application microprocessor uP-WR, into which an application Iex is temporarily loaded and also executed by a data carrier IMex. Subsequently this application information Iex may be deleted again. Thus in principle any data carrier IM is capable of bringing along its application itself, e.g., for a one-time access or for the implementation of applications with individual application profiles ind.
A further advantage of generic terminals g-WR consists in the fact, that they have to have a relatively flexible application processor uP-WR. This may be made available to a data carrier IM, IMex, which itself does not have an application processor uP-IM, i.e., the uP-WR is capable of being utilised for the simulation of a not present uP-IM. This makes possible the simultaneous utilisation of data carriers IM, IMex with and without application processor uP-IM within the same system.
The
a describes the prior art for contact-less systems. Here a strict separation between the program code Icod in the terminal WR and the application data Idat in the data carrier IM takes place. The compliance with the authorisation rules A is carried out in the terminal WR by means of the determination of a function f(A, Icod, Idat) by the application processor uP-WR of the terminal.
b describes a new possibility in accordance with the method according to the invention. The up until now strict separation between the program code Icod1 in the terminal WR or WRZ and the application data Idat in the data carrier IMex is eliminated. Parts of the program code Icod2 (or also the complete program code) here are contained in the data carrier IMex. The program code Icod2 like the application data Idat is transmitted to the terminal WR, WRZ. The compliance with the rules is carried out in the terminal WR through the determination of a function f(A, Icod1, Icod2, Idat) with separate processing of Icod1, Icod2, or a function f(A, Icod1+Icod2, Idat) with combined processing of Icod1 and Icod2, by the application processor uP-WR of the terminal.
c describes a further new possibility, if the data carrier IMex also has an application processor uP-IM at its disposal. In this case, in the data carrier IMex a function f1(Icod2, Idat) is able to be determined by the uP-IM, which may be utilised for the determination of the function f2 in the terminal. This function f2 may be: f2(A, f1, Icod1, Icod2, Idat) or f2(A, f1, Icod1) or in the simplest form f2(A, f1). In the simplest form, in the terminal WR, WRZ only the compliance with the rules of the authorisation system A is carried out and there is no processing of Idat, Icod1 and Icod2 in the terminal, but only in the data carrier IMex.
The
After the applications have been installed in the terminals WR, corresponding sending back of status information Ist by the data carriers IMex to the authorised terminals WRZ takes place and from these to the central host computer H, e.g.: the application App1 is installed in the terminal WR8, is sent back to WRZ3 and H.
In practice, in most instances several data carriers IMex will present the same application Iex to a selected terminal WR, where of course this application only has to be transmitted to this terminal once. Equally the same status information Ist with respect to the writing of a certain application into a selected terminal WR may be sent back by several data carriers IMex to the authorised terminals WRZ (and to the host computer H). After all required applications have been installed in all required terminals WR, this application in principle is able to be deleted on the data carriers IMex and in the authorised terminal WRZ, resp., further transmissions to the IMex may be stopped. And after all necessary status information messages Ist have been sent back, it is also possible to stop the sending back of further status information.
The sending back of status information with respect to the execution of applications at the terminals WR is also capable of being continued if so required, this to such an extent and for how long such messages are required.
Depending on the requirements, it is also possible, that the application information Iex is only temporarily present on the data carriers IMex, in the terminals WR and/or in the authorised terminals WRZ and and that it is subsequently deleted. In this, the application information Iex may be temporarily present during a predefinable time period or for a certain number or types of processes or until a certain condition has been fulfilled.
Examples for the initialisation of applications in terminals according to the invention: These may concern new applications Appn or an update of existing applications, which are replaced, resp., completed by a modified, extended application Appu.
One example for an update application Appu: The access to a room shall take place by the checking of the reference number of a data carrier IM1 and by the entering of a PIN-Code by the owner of this data carrier IM1. This existing application is to be extended, so that the access is only possible, if within a short time period (e.g., 30 seconds) a second authorised data carrier IM2 is presented and the PIN-Code of this second person is entered at the terminal. This extended application Appu is adapted in such a manner, that the checking process is respectively run through twice. The functional equipment App HW/SW for the physical execution of this application has to already be present at the terminal WR.
As a further example of an application extension Appu, an existing 4-digit PIN-Code as access condition could be replaced by a 6-digit PIN-Code with the Appu.
Example of a new application Appn: The access up until now was implemented by checking the reference number of a data carrier IM. Now, additionally also the entering and verifying the PIN-Code of the owner of the data carrier IM shall take place. For this purpose, through a data carrier IMex a new application Appn is installed in the terminal WR, wherein the necessary functional equipment App HW/SW is already present at the terminal or is capable of being simulated, e.g., with a PSOC (Programmable System on Chip), a module comprising a microprocessor and an analogue part, wherein the functionality of the analogue part is capable of being defined and changed by the microprocessor within certain limits (i.e., in the broadest sense, by means of software the hardware of the module is simulated). With new applications Appn therefore also a new and extended exploitation of existing equipment, resp., functional equipment is capable of being set-up at the terminals WR.
The adaptation of a characteristic value of a functional device is illustrated as an example of an application by an update of an application Appu in combination with a re-configuration of the App HW/SW. The application shall consist of the automatic opening of a door, in that, e.g., a relay clears a contact, a locking pin is mechanically moved and a motor opens the door. For the compensation of the aging and wear of these components, the terminal WR is capable of being re-configured through application information Iex. For this purpose, an update of the application parameters Ipar of the functional devices (relay, motor) belonging to the App HW/SW is transmitted to the terminal WR, as a result of which the relay and the motor are operated with new reference values (e.g., with an increased current), this in order to prevent, that in case of an operation with the old reference values the relay does not clear the locking pin, resp., the door jams.
The data carriers IMex may also comprise application information Iex with individual application profiles ind.
For example, it is possible that individual access times for every person are only stored on their own data carrier IM, while only the general access condition is written into the terminals WR as an application. Or it is also possible to initialise applications Iex with an individual profile ind, which depending on the owner of the data carrier IMex are different. For example, the access to a room is to be differently controlled in the terminal WR. For a certain circle of closer employees only the checking of the reference number of their data carriers is necessary, while for other persons also a checking of their PIN-Code in addition to the reference numbers is required.
Temporary access card for selective access: For an access system to production facilities of a daughter company in country b new access cards are to be established, with which persons responsible from the central office in country a are able to carry out unannounced control visits in country b. For this purpose, in the central office data carriers IMex are capable of being loaded with the corresponding application information Iex at an authorised terminal WRZ. In country b, the data carriers IMex are presented at the terminals there, the application is temporarily initialised and also executed, i.e., the access is permitted for the duration of the planned control visit.
A further example: An application is to consist of the access clearance for an EDP centre, wherein the data carrier of the card owner is checked. This access clearance is now to be tightened by a new, extended application App, with which the access control additionally requires a personal code pers (PIN-Code or biometric code) of the owner of the data carrier. Furthermore, certain data or information is to be issued or displayed. If the terminal does not have a display, then there is the possibility of attaching a display unit next to the terminal, which, e.g., like the data carrier is to communicate with the terminal in a contact-less manner. This makes it possible to make do without a cabling of the display unit (with the terminal WR or with a host computer H). In case of an extension of this kind, the terminal has to be brought into a position to address the display unit, i.e., the terminal, resp., its corresponding parameters Ipar have to be reconfigured in such a manner, that the communication is possible both with a data carrier IMex as well as with the display unit. The application information Iex required for this purpose is transmitted into the terminal WR through a data carrier IMex. In the case of an application with an individual application profile ind furthermore, e.g., on the basis of the application information Iex on the data carrier IMex it is decided, whether the display unit is a component part of the application App and how it is to be addressed by the terminal WR.
A further enhancement of the access security is capable of being initialised, e.g., with an additional tightening by a further application App2, with which the access is only permitted in twos, i.e, in the extended application App2 the terminal checks the data carrier of a first person and this person's personal code and subsequently the data carrier of a second person and that person's personal code, whereupon solely in case of a matching of all data the access to the EDP centre is enabled.
Within the framework of this description, the following terms are utilised:
Number | Date | Country | Kind |
---|---|---|---|
2307/01 | Dec 2001 | CH | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CH02/00701 | 12/17/2002 | WO |