The present invention relates to a method for operating contact-less identification media in a system with contact applications for contact cards, a converter module for contact-less communication and an installation having contact-less communication with contact-less identification media. Contact card systems with contact identification media are widely utilized and are known for various applications, e.g., as access cards for certain zones within a company, for time management, as access media for the use of devices, e.g., data facilities, as credit cards and also as check or value cards for obtaining various types of services.
Increasingly, there is the requirement or the demand to also be in a position to utilize contact-less identification media in such contact card systems, in order to be able to exploit their great advantages above all with respect to handling, as well as with regard to possible extensions of applications.
For this purpose, up until the present moment, a contact-less RF—application with RF—reading stations for contact-less communication had to be integrated into the system. This calls for a communication interface to the existing contact system in the host and to local control devices of the contact applications at the read/write stations, the specific commands of the RF—reading stations have to be programmed, and the physical integration of the RF—system, including power supply terminals, has to be implemented.
With this, the effort and expenditure for additional RF—reading stations of this kind becomes relatively great and correspondingly expensive.
Another possibility for the introduction of contact-less identification media is the utilization of hybrid media, which contain both communication types. Here, in principle, a contact card for a contact communication system is integrated into a card in the format of the contact card with a contact-less identification system for contact-less communication. Hybrid cards of this kind, with a dual function, however, are sophisticated and relatively expensive. In addition, the problem of servicing and maintaining two different systems in the host still remains.
It is now the objective of the present invention to create a much simpler and cheaper complement for contact card systems with contact-less identification media and to indicate methods and devices, which with much less effort and expenditure make the utilization of contact-less identification media in such a system possible and which also enable a step-by-step transformation into a contact-less system.
This objective is achieved with a method and device in accordance with the present invention.
With the initialized converter module, the communication with the initialized contact-less identification media is transformed or translated into a contact communication, which at the interface to the host computer precisely corresponds to the contact communication and—information of the system up until now, i.e., at the interface S for the system, an identical communication as with the contact cards appears. With this, the contact reading devices and the interface to the host also for contact-less identification media receive exactly the same communication as for contact cards, i.e., on the side of the existing system with host, contact application, contact reading devices and contact operating systems no modifications are necessary. The contact card operating system here in principle is integrated into the converter module.
In the following, the invention is further explained on the basis of Figures and examples. These illustrate:
a a system with host, contact card read/write station, contact cards and interface in between with corresponding contact communication,
a a complement in accordance with the invention with an initialized converter module for the communication with initialized contact-less identification media on the one hand and with a contact card read/write station on the other hand,
a an initialized read/write station with a converter module for the communication with contact-less identification media and with a contact interface to the host,
a a system with a read/write station for the communication with contact applications as well as with contact-less applications in contact-less identification media,
b–4b variants with an integrated applications computer in the reading stations and with a temporary connection to the host,
a the structure of a converter module with an RF—transmitter/receiver as a plug-in module into a contact card read/write station,
b the structure of a contact-less read/write station with integrated converter module and an applications computer as well as with an additional contact-less communication for contact-less applications,
a–c various possibilities for the initialization of converter modules or of read/write stations with converter module,
The
a depicts a contact card system of the familiar kind with contact card read/write stations C-WR and assigned contact identification media C-IM as application media, both of which comprise contacts 6 as well as with a contact card interface S and a connection to a host computer H, which contains contact applications C-App. From the contact medium C-IM through the reading station C-WR, up to the host H, to an application in an application computer App-uP (
In accordance with the present invention, an initialized converter module C-RF is interposed in series (as shown in
With this, the contact card operating system in principle (at least partially) is integrated into the converter module. The initialization of the converter module C-RF is defined, administered and executed within the scope of a hierarchic authorization system.
An embodiment of the foregoing is illustrated in
During the step-by-step introduction of additional contact-less identification media RF-IM, already existing contact card read/write stations C-WR with plug-in modules C-RF-Plug may, as required, be utilized both for contact card C-IM as well as for contact-less media RF-IM. For example, in a shopping center, with several cash register terminals, which are equipped with contact card reading stations C-WR, for the step-by-step introduction of contact-less identification media, individual cash register terminals may be retrofitted by means of the plug-in modules C-RF-Plug, i.e., the more purchasers want to pay with contact-less identification media, the more correspondingly retrofitted contact-less read/write stations may be made available in a simple manner.
The initialized plug-in module C-RF-Plug may also be implemented in two parts, with a first part, which is completely introduced into a contact card read/write station C-WR and a second part, which is affixed to the outside of the reading station C-WR and which carries out the communication K-RF with the contact-less identification media RF-IM.
a, as a further embodiment, illustrates a converter module C-RF, which by means of connections 7 is directly connected to the interface S with the contact communication K-C, I-C and which together with an integrated RF—transmitter/receiver forms an initialized (Ini) contact-less read/write station C-RF-WR. The design of the converter module C-RF and of the contact-less read/write station C-RF-WR is further explained in connection with
The initialization Ini for the generation of the compatibility of contact system C and contact-less system RF has to be implemented on the identification media RF-IM and at the RF—reading stations, i.e., on the converter module C-RF itself or else at the read/write stations C-RF-WR formed together with it or on the plug-in modules C-RF-Plug. This initialization is explained in further detail in connection with the Figures
b–3b illustrate analogous examples to the
a illustrates a converter module C-RF in a contact-less read/write station C-RF-WR, which comprises additional means for contact-less communication K-RF, I-RF with contact-less applications RF-App at an interface S(RF), e.g., to a host H with contact-less applications RF-App. If so required, the converter module C-RF is also capable of processing several types of contact communications (with different contact operating systems), e.g., two types of contact communication K-C1 and K-C2. For this purpose, the converter module C-RF also comprises means KW for the selection of the type of communication between different contact communications K-C1, K-C2 and contact-less communication K-RF. With the means of selection KW, it is assured that the correctly required type of communication in both directions, i.e., from the host to the identification medium RF-IM, as well as from the identification medium to the host, respectively, to the application is selected, translated and transmitted. Different types of RF—communication K-RF1, K-RF2 are also possible.
In doing so, the selection of the type of communication may take place automatically in correspondence with the type of application (C1-App, C2-App, RF1-App, RF2-App) or else it may also be settable.
The selection of the type of communication may take place in correspondence with a request from the side of the host H or from the application computer App-uP and, on the other hand, it may also take place in correspondence with a request from the side of the identification medium RF-IM.
Different operating systems K-C1, K-C2 may, e.g., be utilized by different providers of check—or value—or credit cards (of Bank1, Bank2, post) or also of companies for proprietary company applications (access, IT—access, canteen etc.).
The example of
Advantageously, contact systems make use of standardized types of communication. In doing so, the converter module C-RF is driven from a contact application C-App from an assigned host H or an application computer App-uP according to the rules and protocols of a standardized contact communication K-C with standardized contact information I-C and the converter module C-RF responds to the contact application C-App in accordance with the same rules and protocols.
The converter module C-RF may be driven and may respond according to standardization protocols in accordance with national or international organizations, such as ISO, IEC, IEEE, ANSI, CEN or CENELEC.
b illustrates an example with an application computer App-uP in the contact-less read/write station C-RF-WR with a temporary connection to a host H, wherein the applications of the application computer App-uP are capable of being carried out in a decentralized manner, i.e., independent of the host H. This example comprises a type of contact communication K-C with several applications C-App1, C-App2 and a type of RF—communication K-RF with several applications RF-App1, RF-App2, RF-App3. The means of selection KW, therefore, differentiates between the communication types K-C and K-RF.
The
For the implementation of the contact-less communication K-RF with the contact-less identification media RF-IM, the converter module C-RF also comprises an RF—transmitter/receiver 4 with an antenna 5.
The example of
The example of
The converter module C-RF with the parts 1=C communication part, 2=C/RF translation part and 3=RF communication part does not have to be implemented as a functional component. These parts 1, 2, 3 may also be implemented as separate components, if so required, comprising several sub-components. For example, the part 3 or also the parts 3 and 4 may form a component. In doing so, the part 3 may also process initialization information Ini-I, Ini-A-I, resp., contain it and with this ensure the compliance with the initialization standards and the rules of the authorization system A (refer to
For safeguarding the contact-less communication K-RF with the transmitted information I-RF between the converter module C-RF and the contact-less identification media RF-IM, an encryption cryp of the communication K-RF is preferably implemented.
For writing processes in case of the contact-less communication K-RF from the converter module C-RF to the contact-less identification media RF-IM, a shadow memory shad is preferably utilized in the identification media and on the converter module, as is illustrated in the
The encryption cryp serves for safeguarding against unauthorized monitoring and unauthorized intervention by third parties. With the shadow memory shad, it is assured that a writing process is carried out completely and correctly (or not at all) and that, e.g., in case of an interruption of the communication no data loss or errors are produced. These methods are described, e.g., in the WO 97/34265.
The
The converter module or the read/write station may also include means for autonomous power supply, such as batteries or solar cells. With this, e.g., a decentralized station, which includes an application computer App-uP with an application, such as, e.g., in
For the execution of applications, corresponding dialogue devices 11 may be assigned to the converter modules C-RF or to the contact-less read/write stations, as is illustrated in
With the Figures
As these different possibilities manifest, depending on the requirements and the application, a particularly suitable embodiment may be selected for the initialization or the registration of new applications. Of course, combinations of these are also conceivable, e.g., that a part of the authorization information A-I is fed-in through a network N from a central station, while the remainder of the authorization information, e.g., is fed-in locally with an authorization medium.
Regarding
a, b, c illustrate various possibilities for the initialization of reading stations C-RF-WR and plug-in modules C-RF-Plug or of converter modules C-RF. In these embodiments, the initialization may be contained in the converter module C-RF itself or in the complete reading station C-RF-WR, C-RF-Plug. In accordance with
In accordance with
According to
In this example, two sub-authorization systems UA1 and UA2 within the scope of the authorization system A are depicted.
A general initialization Ini (which does not take place within the scope of the authorization system A) of a plug-in module C-RF-Plug(Ini) for the communication with contact-less identification media RF-IM(Ini). A general initialization of this kind may, e.g., take place through unique production numbers of the identification media RF-IM and of the reading stations C-RF-WR and C-RF-Plug.
An initialization Ini-UA1 of a plug-in module C-RF-Plug(Ini-UA1) of the converter module C-RF(Ini-UA1) within the scope of the authorization system A and of the sub-authorization system UA1 for the communication with identification media RF-IM(Ini-UA1) and also with identification media RF-IM(UA1), which already prior to the extension of the contact system C are utilized within a contact-less system RF within the scope of the sub-authorization system UA1 and which therefore are already implicitly initialized.
An additional initialization Ini-UA2 within the scope of a second sub-authorization system UA2, wherein here a plug-in module C-RF-Plug(Ini-UA1, UA2) and a read/write station C-RF-WR(Ini-UA1, UA2) are initialized within the scope of both sub-authorization systems UA1 and UA2. The example in this context illustrates an identification medium RF-IM(Ini-UA1, UA2), which is initialized within the scope of UA1 and UA2 as well as an identification medium RF-IM(Ini-UA2), which is only initialized within the scope of the sub-authorization system UA2.
And at the bottom a pure contact-less read/write station RF-WR(UA1) and a corresponding identification medium RF-IM(UA1), which communicate within the contact-less system RF, not, however, with the contact system C.
Application Example:
Two independent users want to equip an existing contact system with additional contact-less identification media RF-IM, corresponding applications and with plug-in modules C-RF-Plug. Assigned to each of these independent users, respectively, is a sub-authorization system UA1, UA2, in which they are able to design their respective independent applications App1 in UA1 and App2 in UA2.
They have introduced two new customer bonus applications App1 in UA1 and App2 in UA2. In addition, it shall be determined that the discount in the case of the application App 2 is greater, if a customer also participates in the application App1, not, however, vice-versa. Customers, who only participate in the App1, therefore do not need cards with App2, i.e., identification media RF-IM(App1/UA1) are sufficient. Correspondingly, all those businesses may be equipped with plug-in modules C-RF-Plug(UA1, UA2), which within the scope of both sub-authorization systems are initialized or businesses may also be equipped with plug-in modules in accordance with requirements, which are only authorized within the scope of one sub-authorization system UA. The initialization within the scope of only one sub-authorization system forms an additional security measure for maintaining the independence of the applications. This would also make it possible to provide all customers with identification media RF-IM(App1/UA1, App2/UA2), which are initialized within the scope of both sub-authorization systems, because it is cheaper to re-equip the reading stations C-RF-Plug than a large number of identification media RF-IM.
With the schematically depicted installation according to
With respect to the assigned read/write stations WR, one first departs from a pure contact card system with contact card read/write stations C-WR (e.g., in accordance with
With regard to the identification media, possible expansion stages 31–35 are illustrated:
The existing installation only comprises contact identification media C-IM.
With the stage 31, in accordance with the invention additional initialized contact-less identification media RF-IM with a contact application in RF—language RF(C-App) are introduced.
In stage 32, RF-IM media are introduced, which contain several contact applications RF(C-App1), RF(C-App2).
In stage 33, RF-IM media are introduced, which contain more than one type of contact application with different kinds of contact communication K-C1, K-C2, (e.g., of different independent operators): RF(C1-App), RF(C2-App).
In stage 34, RF-IM media are introduced, which in addition to the contact applications RF(C-App) also contain pure contact-less applications RF-App.
Finally in stage 35 contact-less identification media RF-IM are introduced, which only contain contact-less applications RF-App.
These described expansion stages 31–35 in principle are capable of being implemented on any contact-less identification medium RF-IM, in that new applications are introduced and old applications are deleted, i.e., the contact-less identification media do not have to be replaced.
In parallel to this expansion, with respect to the contact-less identification media RF-IM and the applications contained therein (this also with regard to the number of media utilized), the assigned read/write stations may also be expanded and, if so required, also replaced step-by-step.
This results in a step-by-step transformation of a system with contact card applications into a contact-less system—without it being necessary to re-write the rules and protocols of a contact card communication in the system on the level of the host to the rules and protocols of a contact-less communication.
The new method in accordance with the invention for the introduction of contact-less identification media RF-IM comprises essential advantages:
An important advantage, above all, is also the fact that the contact-less identification media RF-IM may contain several, in particular also several independent applications, wherein this also includes several types of contact communication and contact-less communication (K-C1, K-C2 and K-RF1, K-RF2). For a user it is important, that with an identification medium of this kind he is able to cover several applications for his required fields of application and this in principle in any combination.
Applications of this kind, which are carried out at corresponding contact-less read/write stations C-RF-WR with appropriate dialogue devices 11, for example, are local and temporal access control, access to devices of the information—and communications technology (computers, videophones/picture-phones) and to IT—applications (data bases, networks, encryption techniques) as well as credit—and check—or value card applications.
Examples for the practical application of contact-less identification media may be: local access to secure rooms and to computer work places (Personal IT Access), access to networks and secure data bases, access to cash registers in shopping centres for the cashier, the obtaining of services and goods, e.g., at service stations and automatic food vending machines, multiple entrance cards for sports—and leisure facilities, parking buildings and for public transport, etc.
Preferably, an appropriate authorization system suitable for an installation or for a system of installations is defined, which at least records and administers all contact-less identification media RF-IM with all applications (RF(C-App) and RF-App) contained therein. In addition, contact applications of contact media C-IM and read/write stations belonging to these may also be recorded and administered.
For the application special advantages result, if a hierarchical authorization system A is defined, which ensures the utilization and description of the contact-less identification media RF-IM with independent, mutually non-influenceable applications, wherein the independent proprietors of the applications are capable of at any time autonomously and independently registering and also changing in the contact-less identification media RF-IM.
An authorization system A of this type, e.g., is described in the WO97/34265 for a contact-less communication system with contact-less applications. Here a hierarchical authorization system applicable to all identification media and to all assigned read/write stations is defined, with which every identification medium has to be initialized and with which the mutual non-influenceability of all independent applications is assured and wherein a proprietor of an independent application authorized by the proprietor of the system at any time is able to autonomously register his application in new identification media and in identification media, which already contain other independent applications. This also independent of the agreement of a central station of the proprietor of the system.
Within the framework of this description, the following designations are employed:
Number | Date | Country | Kind |
---|---|---|---|
0337/01 | Feb 2001 | CH | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CH02/00107 | 2/25/2002 | WO | 00 | 9/15/2003 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/069285 | 9/6/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6216954 | Kuwamoto et al. | Apr 2001 | B1 |
6259769 | Page et al. | Jul 2001 | B1 |
6769607 | Pitroda et al. | Aug 2004 | B1 |
Number | Date | Country |
---|---|---|
0 933 733 | Aug 1999 | EP |
1 096 422 | May 2001 | EP |
Number | Date | Country | |
---|---|---|---|
20040094625 A1 | May 2004 | US |