The invention relates to a protocol for adapting the degree of interactivity between participant computer equipment items that are subjected to an interactive dialogue.
Currently used methods for exchanging information between computer terminals require the most advanced authentication protocols to be used, in order to provide these exchanges with a high degree of security.
Protocols of this type generally allow almost complete certainty as to the origin of the received information, without, however, using knowledge relating to the intrinsic qualities of the emitters of said information, or of the user or users of these emitters.
Specific computer equipment items, such as a terminal provided with a microprocessor card reader and a microprocessor card, in particular a descrambling terminal, also known as a decoder, and a card associated with said terminal, are, at best, capable of proposing an adaptation of the behavior of one of the equipment items as a function of specific qualities of the other of these equipment items, with which this equipment item enters into contact.
In this situation, only the terminal is capable of adapting its behavior, relative to the card, when it is brought into contact with a card, as a function of the connected card type.
The aforementioned adaptation is implemented by the terminal reading, in the memory of the card, information specific to the card.
The object of the present invention is to solve the drawbacks of the known prior art and, in particular, to allow adaptation of the behavior of at least one of the equipment items, either by authorization, or by prohibition or else by conditional authorization, of internal functions of each equipment item, as a function of the identification of the equipment item connected thereto.
In particular, the present invention relates to the use of an adaptive behavior of each interconnected computer equipment item, in an interactive dialogue, following a procedure of reciprocal authentication between computer equipment items, in order to implement an intercommunication procedure at a high level of security in the exchange of information, owing to the reciprocal authentication procedure used, on the one hand, and the reciprocal behavior adaptation procedure, on the other hand, of each equipment item.
The protocol for adapting the degree of interactivity between a participant computer equipment item and a reciprocal participant computer equipment item of a set of participant equipment items, which is the subject of the present invention, is implemented when this participant equipment item and this reciprocal participant equipment item are subjected to an interactive dialogue.
It is notable in so far as it consists in writing, into this participant equipment item, a list of identifiers of reciprocal participant equipment items, in writing, into this participant equipment item, a list of behavior identifiers, these behaviors being relevant in the interactive dialogue, and in writing, into this participant equipment items, at least one association between an equipment identifier and a behavior identifier.
When a participant equipment item and a reciprocal participant equipment item are in each other's presence, in order to execute the interactive dialogue, the protocol according to the present invention also consists in carrying out a procedure of authentication between the participant equipment item and the reciprocal participant equipment item, and in searching for the identifier of the authenticated reciprocal participant equipment item in the list of identifiers, in reading the associated behavior identifier, in applying, at the participant equipment item, the behavior or behaviors relative to the authenticated reciprocal participant equipment item, this behavior being selected as a function of the result of the authentication procedure and associated with the behavior identifier and with the identifier of the reciprocal participant equipment item.
The computer equipment item, in accordance with the subject of the present invention, comprises an input/output circuit allowing messages to be transmitted and/or received in an interactive dialogue with another computer equipment item, a calculation module connected to the input/output circuit, a working random access memory and at least one programmable, non-volatile memory,
It is notable in so far as it comprises, written into the non-volatile memory, at least a list of computer equipment item identifiers, accessible via the input/output circuit, a list of behavior identifiers that are relevant in the interactive dialogue, and at least one association between an equipment identifier and a behavior identifier.
The protocol and the computer equipment item that are the subjects of the present invention are used in order to render network transactions secure and, in particular, in station-to-station or multistation transactions, for terminals forming these equipment items interconnected in a network in accordance with the IP protocol, and in transactions between a microprocessor card reading terminal and a microprocessor card, interconnected in accordance with the ISO 7816 protocol, for example.
A better understanding of the protocol and the computer equipment item will be facilitated by reading the description and viewing the following drawings, in which:
a shows, by way of example, a flow chart of the implementation of the protocol according to the present invention, between a computer equipment item, serving as a participant equipment item, and another computer equipment item, provided in order to execute an interactive dialogue, this other equipment item serving, relative to this participant equipment item, as a reciprocal participant equipment item prior to the actual execution of this interactive dialogue, each of these computer equipment items adapting the degree of interactivity of this interactive dialogue relative to this other computer equipment item, the adaptations of the degree of interactivity of each computer equipment item relative to this other computer equipment item being independent, but related to the identity of the computer equipment item provided in order to execute this interactive dialogue, all of the computer equipment items provided executing, in accordance with the protocol according to the present invention, a reciprocal adaptation of the interactivity of this interactive dialogue;
b shows, purely by way of example, a preferred, non-limiting embodiment of the protocol according to the present invention, in which the authentication procedure is a procedure at more than one authentication level, in order to allow adaptation of the behaviors associated with the participant equipment item and/or with the reciprocal participant equipment item, as a function of the verified authentication level;
c shows, by way of example, a first, non-limiting embodiment of a list of equipment identifiers, a list of behavior identifiers and a list of associations between an equipment identifier and a behavior identifier for a first computer equipment item, equipment item A, and a second computer equipment item, equipment item B, one of these computer equipment items serving as a participant equipment item and the other of these computer equipment items serving as a reciprocal participant equipment item, wherein the interactive dialogue between these computer equipment items may itself be conducted by means of an IP protocol, by way of non-limiting example;
d shows, by way of example, a second, non-limiting embodiment of a list of equipment identifiers, a list of behavior identifiers, and a list of associations between an equipment identifier and a behavior identifier for a first computer equipment item, formed by a terminal, and a second computer equipment item, formed by a microprocessor card, the terminal forming the first computer equipment item being provided with a card reading device, and the terminal and the card executing the interactive dialogue in accordance with the ISO 7816 protocol, for example;
a shows, by way of example, a particular embodiment of the protocol according to the present invention for a set of computer equipment items interconnected in a network, each equipment item being capable of executing an interactive dialogue with one of the other computer equipment items of this set of equipment items, the protocol according to the present invention being implemented, as shown in
b shows, by way of example, a particular embodiment of the protocol according to the present invention for a set of computer equipment items, one of the equipment items serving as a participant equipment item, such as a terminal, and each of the other equipment items serving as a reciprocal participant, such as a card, relative to this participant equipment item:
a shows, by way of example, another particular embodiment of the protocol according to the present invention for a set of computer equipment items interconnected in a network, each equipment item being capable of executing an interactive dialogue with one of the other computer equipment items of this set of equipment items, the protocol according to the present invention being implemented so as to apply a common behavior of any equipment items of this set of equipment items relative to other equipment items of this set of equipment items, wherein the common behavior may correspond to a list resulting from a logical operation carried out on lists of behaviors of the equipment item in question;
b shows, purely by way of example, embodiments of a list of equipment identifiers, a list of behavior identifiers and a list of associations between an equipment identifier and a behavior identifier for the execution of the protocol according to the present invention, in accordance with the embodiment of
c and 4d illustrate purely by way of example, a mode for calculating the resulting list, the intersection of lists of behavior identifiers, for computer equipment items connected in a network for a terminal provided with a card reader and two separate cards, respectively;
e and 4f illustrate purely by way of example, a method of calculating the resulting list, the union of lists of behavior identifiers, for computer equipment items connected in a network for a terminal provided with a card reader and two separate cards, respectively;
A more detailed description of the protocol for adapting the degree of interactivity between computer equipment items according to the present invention will now be given with reference to
Referring to the aforementioned figure, it is mentioned that the protocol according to the invention is intended to be implemented between two or more computer equipment items of a set of computer equipment items.
In general it is mentioned, in the implementation of the protocol according to the present invention, that the term “participant equipment item” refers to any computer equipment item of this set of equipment items that initiates an interactive dialogue with another equipment item of this set of computer equipment items. For this reason, the other computer equipment item is referred to as a “reciprocal participant equipment item”, in this interactive dialogue.
Referring to the aforementioned
The aim of the protocol according to the present invention is, in particular, to adapt the degree of interactivity between the participant equipment item and the aforementioned reciprocal participant equipment item, when the participant equipment item and the reciprocal participant equipment item are subjected to the aforementioned interactive dialogue.
Referring to
The protocol according to the invention also consists in writing, into the participant equipment item, equipment item A, at least one association between an equipment identifier and a behavior identifier. The aforementioned association may itself be formed by a list of association.
The notion of a list of equipment identifiers, such as the aforementioned list of identifiers of reciprocal participant equipment items, encompasses all references to a given individual equipment item or to a class or defined set of equipment items, by way of a version, production or sale trademark, certification, authorization or other reference.
Following the aforementioned writing operations, the participant equipment item at least has a set of lists: the aforementioned list of identifiers of reciprocal participant equipment items, list of behavior identifiers and list of associations.
It will obviously be understood that the steps of writing the list of identifiers of reciprocal participant equipment items, the list of behavior identifiers and the list of associations are carried out at least once, in order to implement the protocol according to the present invention, and may obviously be repeated in order to update the equipment and/or behavior identifiers and the list of association between equipment identifier and a behavior identifier, as will be described below.
The writing operations are carried out in a secure manner.
Referring to
L_IDA=[IdB,IdC, . . . ,IdH]
wherein IdB to IdH are said each to denote an identifier of reciprocal participant equipment items.
Moreover, the participant equipment item A has a list of behavior identifiers, denoted by L_CA, confirming the equation:
L_CA=[RCA1,RCA2 . . . ,RCAk, . . . RCAn].
In the list of behavior identifiers, L_CA, RCAK designates an identifier of specific behaviors of the participant equipment item A relative to the reciprocal participant equipment item, equipment item B.
By way of non-limiting example, it is mentioned that each behavior identifier RCAk may itself be formed by a list of elementary behaviors also known as behavior references, each behavior identifier RCAK confirming the equation:
RCAk=[CA1,CA2, . . . ,CAp].
By way of non-limiting example, it is mentioned that the elementary behavior or behavior references CAp may correspond to behavior reference codes as will be described below.
Finally, the participant equipment item A has a list of associations between an equipment identifier and a behavior identifier, the aforementioned list of associations being denoted by L_ICA and confirming the equation:
L_ICA=[[IdB[RCA1]];[IdC[RCAk]]; . . . ].
The form of construction or structure of the list of associations is non-limiting.
In particular, it will be understood from
In view of the existence of the lists of equipment identifiers, the list of behavior identifiers and the list of associations, the protocol according to the present invention consists primarily in carrying out a procedure of authentication between the participant equipment item A and the reciprocal participant equipment item B.
It is noted from
The aforementioned authentication values are denoted by Auth(IdB).
The authentication procedure, at the participant equipment item A, then consists, as shown in
δ(Auth(IdB)).
The step of recovering the identifier IdB and confirming the authentication values Auth(IdB) may consist, as shown in
Following step 1 and after verification of the aforementioned authentication values, the protocol according to the invention may consist, in a test step 2, in searching for the identifier of the reciprocal participant equipment item in the list of equipment identifiers, i.e. in the aforementioned list L_IDA.
In the event of a negative response to the test step 2, wherein the identifier IdB is not found in the list of identifiers L_IDA, for example, the protocol according to the invention may consist, in a step 3, in having the participant equipment item A apply what is known as a “default” behavior relative to the reciprocal participant equipment item B. The aforementioned default behavior may advantageously be established and selected as a function of the result of the authentication procedure, in particular, of the confirmed authentication level.
By way of non-limiting example, it is mentioned that, although the authentication has been established for a given authentication level, the authentication values Auth(IdB) having been confirmed for the level in question, the protocol according to the invention may consist in sending a query from the participant equipment item A to the reciprocal participant equipment item B, so that said reciprocal participant equipment item B retransmits its equipment identifier value IdB, for example. Other procedures may be provided, such as the attribution, for example, in the single transaction, of a replacement identifier associated with the aforementioned authentication values Auth(IdB) and at the aforementioned authentication level.
In the event of a positive response to the step of test 2, the procedures of authentication and identification of the reciprocal participant equipment item B having been satisfied relative to the participant equipment item A, the protocol according to the invention may consist in recovering the behavior associated with the equipment identifier found and with the result of the authentication procedure. This operation is carried out in step 4 in
The aforementioned step 4 may then be followed by a step 5, consisting in applying at the participant equipment item A the behavior relative to the reciprocal participant equipment item.
Referring to
Referring to
In particular, it will be understood that this result is obtained owing to the implementation of the aforementioned list of equipment identifiers L_IDA, list of behavior identifiers L_CA and list of associations between an equipment identifier and a behavior identifier L_ICA, or by any corresponding data structure other than a list, allowing equipment identifiers, behavior identifiers and behavior references or elementary behaviors to be distinguished, as previously mentioned in the description.
In particular, it will obviously be understood that any behavior identifier RCAk formed by a plurality of coded values, each representative of an elementary behavior, such as CA1, CA2 . . . ,CAp, may be defined as a function of functional and/or technical specificities, i.e. reaction capacities of the reciprocal participant equipment item B, in the aforementioned interactive dialogue. This is the case, in particular, for each aforementioned coded value of elementary behavior, which behavior may be adapted to the technical/functional parameters of the reciprocal participant equipment item B or, if appropriate, to the reaction capacities of the reciprocal participant equipment item B, or even to the use of these technical/functional capacities by the authorized user of the aforementioned reciprocal participant equipment item B.
In a simplified, non-limiting embodiment, it is mentioned that the list of associations L_ICA may be replaced by bi-unique matching of an equipment identifier and a behavior identifier by the rank of the equipment identifier and the rank of the behavior identifier in the list of equipment identifiers L_IDA and the list of behavior identifiers L_CA, for example.
The protocol according to the present invention is not limited to an adaptation of the degree of interactivity between a participant equipment item and a reciprocal participant equipment item, as previously described with reference to
According to another, particularly notable aspect of the protocol according to the present invention, said protocol allows the adaptation of the degree of interactivity between a participant equipment item A and a reciprocal participant equipment item B in all sets of computer equipment items, each of the participant equipment items A and reciprocal participant equipment items B respectively, implementing, in a substantially independent manner, the protocol of adaptation of the degree of interactivity of one participant equipment item relative to the other, which allows the implementation of a reciprocal adaptation protocol of the interactivity between a participant equipment item and a reciprocal participant equipment item of a set of participant equipment items subjected to an interactive dialogue, as will now be described with reference to
a therefore shows a participant equipment item, equipment item A, and a reciprocal participant equipment item, equipment item B.
For each of the aforementioned equipment items, i.e. the participant equipment item A and the reciprocal participant equipment item B, the protocol according to the invention obviously consist in carrying out the steps of writing into the participant equipment item A and into the reciprocal participant equipment item B, respectively, a plurality of identifiers of reciprocal participant equipment items and participant equipment items, respectively.
It will therefore be understood that the participant equipment item A has the list of identifiers of reciprocal participant equipment items L_IDA and that the reciprocal participant equipment item B, for its part, has a list of identifiers of participant equipment items L_IDB.
The protocol according to the invention also consists in writing, into each participant equipment item, equipment item A, and into the reciprocal participant equipment item B, respectively, a list of behavior identifiers, the behaviors being relevant in the interactive dialogue.
Referring to
The protocol according to the invention also consists in writing a list of associations between an equipment identifier and a behavior identifier into each participant equipment item A and each reciprocal participant equipment item B. Under these conditions, referring to
For each participant equipment item and reciprocal participant equipment item, respectively, it will be recalled that the behavior identifiers of the lists of behavior identifiers L_CA and L_CB are denoted by RCAk and RCBh, respectively, for example.
When a participant equipment item A and a reciprocal participant equipment item B provided with all of the aforementioned lists are in each other's presence, in order to execute the interactive dialogue mentioned above in the description, the protocol according to the present invention consists in carrying out a procedure of reciprocal authentication between the participant equipment item A and the reciprocal participant equipment item B.
Generally, it is mentioned that the reciprocal authentication procedure may consist, in the event of the participant equipment item A requesting an interactive dialogue, in:
It is mentioned that the aforementioned operations of transmission of the identifiers and authentication values are carried out independently, wherein the transmission of the equipment identifier IdA and the authentication values Auth(IdA), by the participant equipment item A to the reciprocal participant equipment item B, may be carried out either prior to the implementation of step 1, involving the recovery and verification of authentication values Auth(IdB) of the reciprocal participant equipment item B by the participant equipment item A, or subsequently to this verification and conditionally thereon.
In the former case, the authentication procedures are independent and the protocol according to the present invention, of adapting the interactivity of the participant equipment item A relative to the reciprocal participant equipment item B, may be rendered completely independent of the protocol for adapting the interactivity of the reciprocal participant equipment item B relative to the participant equipment item A, or vice versa.
Following the transmission steps, bearing the reference numeral 0, for each of the participant equipment item A and the reciprocal participant equipment item B, respectively, each of these equipment items implements step 1, of recovering the identifier IdB of the reciprocal participant equipment item B, for the participant equipment item A, and of the identifier IdA of the participant equipment item A, respectively, for the reciprocal participant equipment item B, and of confirming the authentication δ(Auth(IdB)), δ(Auth)IdA)) of the authentication data Auth(IdB) and Auth(IdA), respectively, for the participant equipment item A and the reciprocal participant equipment item B, respectively.
Following step 1, and after verification of the aforementioned authentication values, the participant equipment item A and the reciprocal participant equipment item B implement step 2, of confirming the affiliation of the identifier of the reciprocal participant equipment item B and the participant equipment item A, respectively, i.e. IdB and IdA, respectively, to the list of identifiers possessed by the participant equipment item A and the reciprocal participant equipment item B, respectively.
The tests of step 2 verify respectively the following equations:
IdBεL_IDA?
IdAεL_IDB?
In the event of a negative response to the affiliation test 2, the participant equipment item A and the reciprocal participant equipment item B, respectively, may call a default behavior procedure 3, which may correspond to that defined above in the description referring to
In the event of a positive response to the affiliation test 2, the participant equipment item A and the reciprocal participant equipment item B, respectively, may call procedure 4, involving the recovery of the behavior of the participant equipment item A relative to the identifier IdB and of the reciprocal participant equipment item B, and the recovery of the behavior of the reciprocal participant equipment item B relative to the identifier IdA and the participant equipment item A, respectively, and then, finally, step 5, involving the application of the behavior associated with the reciprocal participant equipment item B by means of the equipment identifier IdB and with the participant equipment item A by means of the equipment identifier of this IdA, respectively. As in the case of
It will be understood, in particular, that steps 4, involving the recovery of the behavior of the participant equipment item A relative to the reciprocal participant equipment item B and of the behavior of the reciprocal participant equipment item B relative to the participant equipment item A, respectively, are implemented by identifying the identifiers IdB of the reciprocal participant equipment item B and the identifier IdA of the participant equipment item A, respectively, and reading the corresponding behavior identifiers in the lists of associations L_ICA and L_ICB, respectively, as mentioned above in the description referring to
A preferred, non-limiting embodiment of the protocol according to the present invention will now be described with reference to
It will be understood, in particular, that an implementation of this type allows adaptation of the behaviors associated with the participant equipment item and/or with the reciprocal participant equipment item as a function of the confirmed authentication level during the authentication procedure implemented either according to
In
It will also be noted that, in the first-mentioned case, equipment item A is the participant equipment item and equipment item B is the reciprocal participant equipment item, in a non-limiting manner.
In the embodiment of
It is mentioned, by way of non-limiting example, that the strong authentication level corresponds to an authentication procedure implementing, for example, algorithms that are particularly suitable for verifying a signature and deciphering, that the intermediate authentication level corresponds, for example, to the absence of verification of the strong authentication level, an intermediate authentication procedure then being introduced, and that the zero authentication level corresponds to the absence of verification of the strong authentication level and the intermediate authentication level, only the identifier IdB of the reciprocal participant equipment item B being said to belong to the list of equipment identifiers contained in the participant equipment item A, for example.
Referring to
The sub-step 01 is then followed by step 1, step 2 and optionally step 3, as in the above-described
By way of non-limiting example, it is mentioned that the step involving the recovery of the identifier IdB of the reciprocal participant equipment item B, then the verification of the authentication values, may then be carried out according to a high-authentication-level authentication procedure, the calculation and the signature verification, for example by means of suitable algorithms, being carried out during the aforementioned step 1.
The aforementioned step 1 is then followed by step 2 of the aforementioned test and step 3, as in
In the event of a positive response to the test 2 of the affiliation of the identifier IdB to the list of identifiers L_IDA, the authentication procedure according to the high authentication level may then be initiated.
In other words, step 4 of
Under these conditions, the aforementioned step 4 may comprise a test step 41, consisting in verifying to its true value the result of the verification of the authentication value, obtained following the aforementioned calculation of δ (Auth(IdB)).
In the event of a positive response to the aforementioned verification test 41, the test 41 is then followed by a step 42, allowing the behavior associated with the identifier IdB to be recovered in the verification of a strong authentication level.
The aforementioned step 42 is then followed by step 5, consisting in the application of the behavior associated with the identifier IdB by means of the participant equipment item A, as in
Conversely, in the event of a negative response to test 41, the strong authentication level not having been verified, the procedure relating to the intermediate authentication level may be called.
As shown in
The aforementioned carrier code is known as the PIN(IdB). It may, in any case, consist of an item of information present in the card or, if appropriate, of a code entered into the keyboard by the user, for example.
The test step 41 is then followed by a step 61, involving the recovery and verification of the aforementioned carrier code PIN(IdB).
The verification step may consist in a test step involving the verification of the value of the aforementioned carrier code, verifying the equation:
PIN(IdB)correct ?
The sub-steps 61 and 62 form, in fact, a step 6, corresponding to an intermediate-authentication-level authentication step.
In the event of a positive response to the verification test of the carrier code 62, the behavior associated with the identifier IdB for the aforementioned verified carrier code is then recovered. The recovered corresponding behavior is then applied in step 5.
Conversely, in the event of a negative response to the aforementioned test step 62, a step corresponding to a zero authentication level is called. It will be recalled that the zero authentication level may, by way of non-limiting example, simply consist in the subsequent verification of the affiliation of the identifier IdB to the aforementioned list of identifiers L_IDA.
Under these conditions, the behavior associated with the wrong PIN carrier code value and with the identifier IdB of the reciprocal participant equipment item is subsequently recovered, and, by returning to step 5, this behavior associated with the aforementioned identifier is then applied.
Various embodiments of lists of equipment identifiers, lists of behavior identifiers and lists of associations between an equipment identifier and a behavior identifier will now be presented with reference to
c shows the aforementioned lists attributed, by way of non-limiting example, to the participant equipment item A, the aforementioned lists being said to be identical to those attributed to the participant equipment item A of
Similarly,
As far as the structure of the behavior identifiers RCAk and RCBh, respectively, is concerned, it is mentioned that said identifiers may be formed by a list comprising at least one element forming a behavior reference or interactive dialogue acceptance, interactive dialogue refusal or interactive dialogue conditional acceptance elementary behavior.
By way of non-limiting example, it is mentioned that in order to fulfill a function of this type, each list defining a behavior identifier RCAk and RCBh, respectively, may comprise an elementary behavior value or a specific behavior reference value, placed, for example, at the head of the list, i.e. the head element of list CA1 and CB1, respectively, corresponding, for example, to an interactive dialogue acceptance, interactive dialogue refusal or interactive dialogue conditional acceptance coded value. The coded values may be of any kind, the acceptance of the interactive dialogue, the refusal of the interactive dialogue or else the conditional acceptance of this interactive dialogue being associated, on a mere reading, with each corresponding coded value.
By way of non-limiting example, in the event of the coded value corresponding to an interactive dialogue conditional acceptance coded value, the reading of this coded value at the head of the list allows a function of the elementary behaviors or successive behavior references CA2, . . . , CAp and CB2, . . . , CBq, respectively, to be called, for example.
Generally, it is mentioned that the aforementioned coded values of elementary behaviors, forming identifiers of behaviors RCAk and RCBh, respectively, may correspond to coded values for calling function primitives implemented by the participant equipment item A relative to the reciprocal participant equipment item B and function primitives of the reciprocal participant equipment item B implemented relative to the participant equipment item A, respectively.
It will be recalled that the aforementioned functions designate the functions of each equipment item and, if appropriate, the use of such functions by the user of each equipment item, as will be described below in the description.
d shows embodiments of the aforementioned lists in a more particular case, wherein the participant equipment item A is formed by a terminal and the reciprocal participant equipment item B is formed by a microprocessor card or a software module serving as a card of this type relative to the aforementioned terminal, the terminal being provided with a card reader and data being exchanged between the terminal and the card in accordance with the ISO 7816 protocol.
The embodiments of the list of equipment identifiers, the list of behavior identifiers and the list of associations between an equipment identifier and a behavior identifier will be described in the more particular, non-limiting case wherein the participant equipment item is formed by a decoder terminal and is a terminal for descrambling scrambled information and wherein the card forming the reciprocal participant equipment item is a dedicated card attributed to any authorized user of this descrambling terminal.
In an application of this type, it will be recalled that the scrambled information is transmitted in point-multipoint mode from an emission center, for example, and that the set formed by the participant equipment item A, the descrambling terminal, the reciprocal participant equipment item B and the microprocessor card allows access to this scrambled information to be controlled.
It will be recalled, in particular, that access to this information is controlled from access control messages, known as ECM messages, containing the cryptogram of a control word and access criteria transmitted periodically with the scrambled information.
Under these conditions, the dedicated microprocessor card serves as an access control module. The access control module comprises at least one security processor and a secure, programmable, non-volatile memory comprising access rights written into the aforementioned programmable, non-volatile memory.
The written access rights are managed from messages for managing access rights, these messages being transmitted with the scrambled information.
Finally, it will be recalled that access to this information is controlled by verifying the identity of at least one access control right written into the card and one of the access criteria transmitted by the access control messages, this identity verification being followed by deciphering by means of the reciprocal participant equipment item, i.e. by means of the microprocessor card, of the cryptogram of the control word from an operating key, in order to restore the original control word. The original control word is transmitted, after having being deciphered by the microprocessor card, i.e. by the reciprocal participant equipment item B, to the descrambling terminal, the participant equipment item A, in order to allow the scrambled information to be descrambled by said terminal from the restored control word.
d shows, by way of non-limiting example, the lists L_IDA and L_CA: the lists of equipment identifiers and the lists of behavior identifiers of the participant equipment item A, i.e. of the descrambling terminal. These lists are said to be identical to those described with reference to
The same is true as far as the reciprocal participant equipment item B is concerned, i.e. the card, for which the lists L_IDB and L_CB are identical to those of the reciprocal participant equipment item B shown in
Nevertheless, as far as the behaviors identified by the respective behavior identifiers RCAk and RCBh of the participant equipment item A and the reciprocal participant equipment item B are concerned, it is mentioned that in this situation these identifiers and, as a result of the specific embodiment of the intercommunication between the participant equipment item A and the reciprocal participant equipment item B formed by the card, these behaviors have a specific structure, which is that of a bit string at a value of zero or one.
The values indicated in
It will be understood, in particular, that in the embodiment relating to
It will be understood, in particular, that in the embodiment of
Various examples of behaviors of a descrambling terminal and of a microprocessor card, or subscription card, associated therewith, respectively, will now be given with reference to the aforementioned
Generally, and in the access control application, in particular, a dedicated microprocessor card that is attributed to a subscriber is capable of processing various actions that may be requested of it by means of the management messages transmitted during the access control procedure. By way of example, and in a non-limiting manner, it is mentioned that these actions comprise:
The above list is not exhaustive.
In accordance with the protocol according to the present invention, and referring to
If the bit of an action or a function has a value of zero, the card refuses to execute this action; however, if it has a value of one, the card may execute this action or this function.
Similarly, the terminal is also capable of carrying out various operations that are requested of it in the management messages, for example, or in its interactive dialogue with the microprocessor card, the descrambling terminal serving as the participant equipment item A and the microprocessor serving as the reciprocal participant equipment item B, for example.
The descrambling terminal is thus able to carry out the following operations:
The above list is not exhaustive.
As in the case of the reciprocal participant equipment item, various examples of behaviors of a descrambling terminal and of a microprocessor card serving as an access control module, each of these elements serving as the participant equipment item A and the reciprocal participant equipment item B, respectively, will now be given with reference to the elements of
The aforementioned examples relate, in particular, to the steps of the recovery of the identifiers, the verification of the authentication values, the testing to the true value of these authentication values, the application of a behavior associated with the authentication verified at the false value, and the application of the default behavior, as described above with reference to
Generally, it is mentioned that the notion of the participant equipment item and the reciprocal participant equipment item, respectively, is interchangeable between the descrambling terminal and the card associated therewith. This notion of interchangeability is justified by the fact that the procedures for adapting the interactivity may be rendered entirely independent of one another.
Thus, if the procedure of authentication of the descrambling terminal by means of the card has not been achieved, i.e. in the event of a negative response to test 2 of
The same is true if, following the procedure of authentication of the card by means of the descrambling terminal, the participant equipment item A, said terminal has not authenticated the card, the reciprocal participant equipment item B; or if it has authenticated it, said terminal knows the identifier IdB of the card, i.e. of the reciprocal participant equipment item B. It will be recalled that, in the particular case of access control, the identifier IdB of the card may be formed by the unique address UA thereof. Each element, the participant equipment item A and the reciprocal participant equipment item B, i.e. the terminal and the card, is thus capable of selecting the behavior to be applied relative to the other element: the card or the terminal, respectively.
The following may thus be examples of behavior:
A behavior of this type may be applied by the card, i.e. by the reciprocal participant equipment item B, if said item has authenticated the descrambling terminal, the participant equipment item A, and if the identifier of the terminal IdA is associated with a behavior identifier relative to terminals that are considered to have been “blacklisted”.
It is mentioned, by way of non-limiting example, that the specific behavior value corresponds to a bit string, all of the bits of which have a value of zero, except for the bit corresponding to the authentication of the descrambling terminal, the participant equipment item A.
It will be understood that, in this situation, the bit string that is representative of the behavior, i.e. the bit chain identified by RCBh, has a series of values of one and zero, as a function of the actions or functions of the validated card.
A behavior of this type is applied by the card, the reciprocal participant equipment item B, if said item has authenticated the terminal, the participant equipment item A, and if the identifier of the terminal IdA is in the list, known by the card, of terminals that are considered to have been written into the list of authorized terminals, as a result of the behaviors associated therewith.
Consequently, no specific behavior may be selected. In this situation, the default behavior is applied. By way of example, for this default behavior, all of the actions of the reciprocal participant card B may be authorized.
This situation corresponds to the negative response to the step of test 2 of
The aforementioned behavior is then applied by the terminal if said terminal has authenticated the card and if the identifier of the card, i.e. the unique address UA thereof, is associated with a behavior identifier relative to cards that are considered to have been “blacklisted”.
It will be understood that, in the example given above in the description, as in the case of the card, the descrambling terminal, the participant equipment item A, may obviously have card identifiers that are considered to have been “blacklisted”, which, although they are authorized to initiate the interactive dialogue, have lost the facility to initiate this interactive dialogue as a result, in particular, of the failure to adhere to constraints established for the execution of this interactive dialogue.
It will be understood, in particular, that this facility may be withdrawn if the card comprises an application for managing an electronic token facility or electronic wallet, when a debit balance, in terms of the number of tokens per user of the card, for example, has been reached excessively frequently.
Thus, according to a particularly notable aspect of the protocol for adapting the interactivity of the participant equipment item and the reciprocal participant equipment item according to the present invention, it is possible not only to adapt the nature or the degree of interactivity and the interactivity of equipment items communicating in an interactive dialogue as a function of functionalities or actions of each of these equipment items relative to another equipment item, but also, if appropriate, of a use of these functions or actions by the user of said items.
The aforementioned behavior is then applied by the terminal, the participant equipment item A, if said terminal has authenticated the card at the step of test 2 and if the identifier of the card IdB=UA is contained in the list, known by the terminal, of cards that are considered to have been written into the list of authorized cards, as a result of the behaviors associated therewith.
Under these conditions, and in the event of a positive response to the step of test 2 relating to the participant equipment item A of
Under these conditions, the behavior of the descrambling terminal, the participant equipment item A, may correspond to an invalidation of the processing relating to the exchange with the card of messages relating to the management of the access titles written on the card, i.e. to the invalidation of EMM-type messages, such as management messages, for example. The selection of the other validated processing for the descrambling terminal, the participant equipment item A, depends on the desired functionalities relative to this type of card. In particular, and in order to ensure the use of the card by the user who has acquired this card during the period authorized by the pre-written rights, the transmission of access control messages, known as ECM messages, to the card is obviously valid.
This behavior is applied by the terminal, the participant equipment item A, if said terminal has authenticated the card, the reciprocal participant equipment item B, and if the type of card corresponds to a non-rechargeable, pre-charged card.
A behavior of this type is applied by the terminal relative to the card if said terminal has authenticated the card and if, in response to the affiliation test of step 2, the identifier of the card IdB does not belong to the list L_IDA of the terminal. Under these conditions, no specific behavior may be selected for the terminal, the participant equipment item A, relative to the card, the reciprocal participant equipment item B. Under these conditions, the default behavior may be, by way of non-limiting example:
Finally, and in the implementation of the protocol according to the present invention, it is mentioned that, in a specific preferred, non-limiting embodiment, the steps consisting in writing, into each participant equipment item or each reciprocal participant equipment item, the list of equipment identifiers, the list of behavior identifiers and the list of associations between an equipment identifier and a behavior identifier are preferably implemented by means of the transmission of messages for managing access rights, known as EMM messages, as mentioned above in the description. It will be understood, in particular, that the aforementioned writing procedures may relate either to the first writing of the aforementioned lists into existing equipment items or, conversely, the updating of existing lists, as described above.
Specific examples of behaviors that are suitable, more particularly, for managing a descrambling terminal, serving as a participant equipment item A, for example, and a dedicated card, allocated to an authorized user and serving as the reciprocal participant equipment item B, if the procedure of authentication between the descrambling terminal and the card is a procedure at more than one authentication level, will now be given.
In the aforementioned case, the procedure, or operating mode, of the protocol according to the present invention is strictly in accordance with the protocol described with reference to
Under these conditions, the protocol according to the invention may, for example, consist, in accordance with the authentication level achieved and as a function of the identity of the reciprocal participant equipment item:
It will be understood, in particular, that in order to authorize impulse buying, this authorization is rendered consequential on the verification of a strong authentication level in order, for example, to ensure the security of transactions relating to impulse buying.
Embodiments of the protocol according to the present invention, allowing adaptation of the interactivity between a plurality of computer equipment items of a given set of computer equipment items, will now be presented with reference to
a relates to the application of the protocol according to the present invention to a set of N equipment items connected in a network, for example, and each capable of executing an interactive dialogue with another equipment item of this set of equipment items.
In
In a situation of this type, the protocol according to the present invention consists in attributing to an equipment item, equipment item A, for example, the role of the participant equipment item for all transactions, by transmitting a query message to another equipment item of this set of equipment items.
In
The protocol according to the invention also consists in attributing, to this other equipment item, equipment item D, and, for this transaction, transaction 1, the role of the reciprocal participant equipment item.
It also consists in attributing, to the participant equipment item A, the role of the reciprocal participant, for all other transactions that are separate from this transaction, transaction 1, on receipt by this equipment item, the participant equipment item A, of a query message issuing from another, separate equipment item belonging to the set of the aforementioned equipment items.
It will be understood from
The protocol according to the present invention therefore consists in successively applying this protocol between any equipment items, any other equipment items and any other, separate equipment items belonging to the set of equipment items to which the role of the participant equipment item and/or the role of the reciprocal participant equipment item has been attributed in succession.
The protocol according to the present invention therefore allows a suitable interactive dialogue to be executed between any equipment items of this set of equipment items by means of pairs of equipment items, to which the roles of participant and reciprocal participant, respectively, have been attributed. It will be understood, in particular, that the sequence of the transactions and the order number attributed to said transactions are not representative of the time sequence of said transactions. A table relating to
Another embodiment of the protocol according to the present invention, in the case of the use of a terminal and a plurality of cards intended to conduct an interactive dialogue with this terminal, will now be presented with reference to
In this situation, a descrambling terminal of this type, for example, or a bank card-reading terminal, for example, which is intended to execute an interactive dialogue with a plurality of these cards, in succession, will be considered.
b shows, by way of non-limiting example, a terminal, in the form of a computer equipment item A forming a participant equipment item, for example, and a plurality of cards B, C, D, E intended to enter into communication in succession with the terminal A. It will be understood, in particular, that the cards may be introduced in succession into the card reader of the terminal A or, conversely, that each card may be coupled to a card reader and to an auxiliary system, not shown in the drawing, the auxiliary system provided with the card being able to enter into communication in succession with the terminal A, for example.
According to one aspect of the protocol according to the present invention, the role of participant equipment item for each successive transaction, for example, is attributed to the terminal A.
Under these conditions, the equipment item A is the participant equipment item ei1, ei2, ei3, ei4 for each of the successive transactions.
Conversely, each equipment item B, C, D, E is then, consequently, the reciprocal participant equipment item for the corresponding transaction, transactions 3, 4, 1, 2, as shown in
A more detailed description of different variations of the protocol according to the present invention for a given set N of equipment items connected in a network, for example, and each capable of executing an interactive dialogue with another equipment item of this set of equipment items, will now be given in succession with reference to
Referring to
Referring to
By way of non-limiting example, it will be recalled that equipment item A, serving as the participant equipment item, has the list of equipment identifiers L_IDA, the list of behavior identifiers L_CA comprising the various behavior identifiers RCAk and the list of associations L_ICA between an equipment identifier and a behavior identifier. The aforementioned lists correspond, for example, to the lists that have already been defined in relation to
The same is true of equipment item B, which has the list of equipment identifiers L_IDB, the list of behavior identifiers L_CB, the behavior identifiers RCBh and the list of associations L_ICB. These lists also correspond to the lists possessed by equipment item B in
Similarly, and by way of non-limiting example, equipment item C has:
a list of associations between an equipment identifier and a behavior identifier verifying the equation:
L_ICC=[[IdA[RCC]];[IdB[RCC]]; . . . ].
All of the aforementioned lists are shown in
Referring to
It then consists in applying the protocol between the equipment item to which the role of participant equipment item has been attributed, i.e. equipment item A, and each of the other equipment items, equipment item B and equipment item C of the subset of equipment items.
Under these conditions, in accordance with the protocol according to the invention, said protocol comprises, at the participant equipment item A, a procedure of authentication between the participant equipment item and each of the other equipment items of the plurality of equipment items to which the role of reciprocal participant equipment item has been attributed, i.e. to equipment items B and C. This authentication procedure is implemented from step 1, which is shown in
Following the authentication procedure, a procedure for distinguishing the behavior of the participant equipment item A relative to each of the other equipment items of the number of other equipment items, equipment items B and C, to which the role of reciprocal participant equipment item has been attributed, is called.
The distinguishing procedure comprises a test step 2 comparable to that implemented in
The aforementioned steps 4, involving the recovery of the behavior, may then be followed by a procedure 5 for determining the common behavior of the participant equipment item A relative to each of the other equipment items B and C, to which the role of reciprocal participant equipment item has been attributed.
This operation for calculating the common behavior CCABC corresponds to a logical operation performed on the behaviors associated with each of the reciprocal participant equipment items B and C. It is shown in step 5 of
It will be understood that, for a behavior of the participant equipment item A relative to each of the other reciprocal participant equipment items B and C, respectively, formed by a behavior identifier designating a list of elementary behaviors of this participant equipment item, the procedure for determining the common behavior consists in calculating, by means of the aforementioned logical operation performed on the aforementioned lists, the list of elementary behaviors resulting from the logical operation performed on the lists defining these behaviors.
Thus, in the preceding equation, CCABC designates the common behavior of A relative to B and C, and RCAx and RCAy designate the behavior identifiers of the participant terminal A relative to the reciprocal participant equipment item B and the reciprocal participant equipment item C, respectively.
In a first embodiment as shown in
CCABC=RCA1∩RCAp.
It is in fact possible to calculate the intersection of the lists of all of the behaviors allocated to each of the reciprocal participant equipment items, and therefore to the identifiers IdB and IdC, and to retain the most favorable resulting list.
Although the operating mode of
In this situation, only the nature of the list of associations L_ICA is modified, in so far as the behavior identifiers are formed not by lists, but by bit strings having a specific value, strings b and c, for example, as shown in the aforementioned
Thus, each bit string is considered in turn as a list element or an equivalent data structure.
The logical operation performed on the behaviors identified by the behavior identifiers, such as behaviors b and c, for example, may then be implemented in a similar manner to that shown in
Under these conditions, the common behavior CCABC verifies the equation:
CCABC=b∩c=bitand(b, c)
In the preceding equation, it is mentioned that the bitand function designates the intersection operation, i.e. the bit-to-bit logical operation AND between elements b and c, for example.
The logical operation performed on behaviors shown by lists is obviously not limited to the operation of list intersection.
By way of non-limiting example, it is mentioned that the procedure for determining the common behavior may consist in calculating the list resulting from the union of the behavior lists.
As shown in
CCABC=RCA1URCAp.
As far as the implementation of the protocol according to the invention in a terminal, such as a descrambling terminal and a plurality of cards associated therewith, is concerned, the operation performed on the behaviors designated by b and c in
CCABC=bUc=bitor(b,c).
It is mentioned that the bitor equation shows the bit-to-bit operation OR between elements b and c. The result of the operation, in the example given in
Another embodiment of the protocol according to the present invention, for a given set of N equipment items connected in a network, for example, each equipment item being capable of executing an interactive dialogue with another equipment item of this set, will now be described with reference to
As in
As in
In particular, it is mentioned that the elementary behavior identified by the behavior identifier, with which an equipment identifier is associated, may itself be formed by a list of elementary behaviors or behavior references, which may be behaviors that are independent of the functionalities of each computer equipment item A, B or C.
Referring to
The protocol according to the invention also consists in attributing, to the set formed by the other equipment items to which this query message is addressed, the aforementioned equipment items B and C for the transaction in question, the role of the reciprocal participant equipment item relative to the participant equipment item A.
It then consists in applying the protocol according to the invention between equipment item A, to which the role of the participant equipment item has been attributed, and the set formed by the other equipment items forming the subset of equipment items to which the role of the reciprocal participant equipment item has been attributed, the protocol comprising, at the participant equipment item, a procedure 1 for authenticating each of the other equipment items, to which the role of the reciprocal participant equipment items B and C has been attributed.
It is mentioned from
As a function of the result of the aforementioned authentication procedure 1, performed for each of the reciprocal participant equipment items and verified authentication levels, each reciprocal participant equipment item is considered as being capable, individually, of executing an interactive dialogue with the participant equipment item A.
According to a notable aspect of the specific embodiment of the protocol according to the present invention, as shown in
As a function of the result of this joint authentication procedure, the subset of the reciprocal participant equipment items B and C is authenticated as a joint reciprocal participant equipment item for executing the transaction relative to the participant equipment item A.
In
δCC=δ(Auth(IdB))ANDδ(Auth(IdC))
The joint authentication procedure 11 may then be followed by a joint procedure 2 authorizing the subset of the reciprocal participant equipment items to execute the interactive dialogue relative to the participant equipment item A.
As shown in
In the event of a negative response to the joint authorization test 2, the procedure for applying the default behavior 3 may be called, wherein this procedure may, for example, correspond to the default behavior procedure 3, described above in the description with reference to
Conversely, in the event of a positive response to the joint authorization test, a procedure 4 for distinguishing or recovering the joint behavior of the participant equipment item A relative to the subset of the reciprocal participant equipment items B, C, to which subset the role of joint reciprocal participant has been attributed, is called, this distinguishing procedure corresponding substantially to a procedure for recovering the joint behavior, as will be described below in the description.
The step 4 for distinguishing the joint behavior is then followed by a procedure 5 for applying the joint behavior of the participant equipment item relative to the other equipment items forming the subset to which the role of the joint reciprocal participant has been attributed. The protocol according to the present invention allows a joint behavior of any equipment items of a set of equipment items to be applied relative to all of the plurality of equipment items forming a subset of this set of equipment items, to which subset the role of the joint reciprocal participant has been attributed.
A specific embodiment will be described with reference to
b shows list structures allowing the implementation of the protocol according to the present invention, as described above in the description referring to
Referring to
Referring to
It will be understood that, in step 4, starting from the composed identifier (IdB, IdC), behaviors defined in the list of associations L_ICA, for example, i.e. the behavior identifiers RCA1, RCAk are called for the aforementioned corresponding composed identifier of the equipment items (IdB, IdC).
Step 4 is then followed by a step 5, consisting in applying the joint behavior.
Referring to
It will obviously be understood that, as a function of the coded values of elementary behaviors or behavior references CA1, CA2, . . . CAp forming each behavior identifier, the aforementioned logical product corresponds to a joint behavior as a function of the logic applied to the aforementioned product.
By way of non-limiting example, it is mentioned that the aforementioned elementary behaviors or behavior references may correspond to highly advanced functional behaviors.
The elementary behavior CA1 may thus consist of a coded value forming a common element that is held by all of the users of the participant equipment items and the reciprocal participant equipment items, this common element consisting, for example, of a code or a password allowing each user, using the equipment item in his possession, to take part in the aforementioned transaction. The other successive behaviors CA2 to CAp may, for example, correspond to highly diverse functional parameters, such as the use of a common language among a plurality of languages for the transaction, the use of specific enciphering/deciphering parameters for the transaction or the like.
The implementation of the protocol according to the present invention, in the definition of a joint behavior, allows adaptation to extremely diverse situations, such as teleconferences, secure multistation transactions or the like.
Number | Date | Country | Kind |
---|---|---|---|
02/07954 | Jun 2002 | FR | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/FR03/01964 | 6/25/2003 | WO | 12/23/2004 |