Delegated management of smart card applications
First Claim
1. A method of delegated loading of an application onto a smart card, said method comprising:
- assigning a security domain of the smart card to an application provider;
providing a key set to application provider for the security domain assigned to the application provider, wherein the key set is not known to the issuer of said smart card;
approving of said application by an issuer of said smart card, wherein the approving of said application by an issuer of said smart card, comprises;
certifying said application;
creating a data authentication pattern for said application;
creating a command for loading said application;
adding said data authentication pattern to said load command;
creating a command for installing said application;
adding said data authentication pattern to said install command; and
delivering said commands to said application provider;
inserting the smart card into the card acceptance device subsequent to the steps of approving said application, creating said application authentication pattern, and appending said application authentication pattern, and prior to the steps of receiving the load command, and verifying said load command, wherein said delegated loading is performed after issuance of said smart card to a consumer;
receiving a load command from the application provider via a card acceptance device, said load command including an indication of an application to be loaded and an appended command authentication pattern;
verifying said load command using said command authentication pattern;
receiving said application from the application provider via said card acceptance device, said application including an appended application authentication pattern;
verifying said application using said application authentication pattern; and
loading said application into memory of said smart card, whereby said application provider is allowed to load said application onto said smart card.
2 Assignments
0 Petitions
Accused Products
Abstract
A smart card architecture includes a run-time environment, a card manager, one or more security domains, a provider application and an issuer application. One or more APIs provide communication. The life cycle of the card and card manager includes states: Pre-production, Ready, Initialized, Secured, Locked and Terminated. The life cycle of an application includes states: Installed, Selectable, Personalized, Blocked, Locked and Deleted. A card registry keeps track of card manager and application data elements. The functionality of a security domain on a smart card is extended to allow it to perform delegated management of smart card applications: delegated loading, installation and/or deletion of an application. A provider of an application is assured of more direct control and management of their application, yet an issuer still maintains some control over the management of the card. The card issuer empowers application providers to initiate changes to the issuer'"'"'s smart cards that are pre-approved by the card issuer. A method of delegated loading of an application onto a smart card first receives a load command from an application provider via a card acceptance device. The load command includes an indication of an application to be loaded and an appended command authentication pattern. Next, the load command is verified using the command authentication pattern. Then, an application is received from an application provider via the card acceptance device; the application also includes an appended application authentication pattern which is used to verify the application. Finally, the application is loaded into memory of the smart card.
281 Citations
16 Claims
-
1. A method of delegated loading of an application onto a smart card, said method comprising:
-
assigning a security domain of the smart card to an application provider;
providing a key set to application provider for the security domain assigned to the application provider, wherein the key set is not known to the issuer of said smart card;
approving of said application by an issuer of said smart card, wherein the approving of said application by an issuer of said smart card, comprises;
certifying said application;
creating a data authentication pattern for said application;
creating a command for loading said application;
adding said data authentication pattern to said load command;
creating a command for installing said application;
adding said data authentication pattern to said install command; and
delivering said commands to said application provider;
inserting the smart card into the card acceptance device subsequent to the steps of approving said application, creating said application authentication pattern, and appending said application authentication pattern, and prior to the steps of receiving the load command, and verifying said load command, wherein said delegated loading is performed after issuance of said smart card to a consumer;
receiving a load command from the application provider via a card acceptance device, said load command including an indication of an application to be loaded and an appended command authentication pattern;
verifying said load command using said command authentication pattern;
receiving said application from the application provider via said card acceptance device, said application including an appended application authentication pattern;
verifying said application using said application authentication pattern; and
loading said application into memory of said smart card, whereby said application provider is allowed to load said application onto said smart card. - View Dependent Claims (2, 3, 4)
recalculating said command authentication pattern from said load command using said cryptographic technique, whereby said command authentication pattern and said recalculated command authentication pattern may be compared to provide verification of said load command.
-
-
3. A method as recited in claim 1 further comprising:
-
receiving an install command from an application provider via a card acceptance device, said install command including an indication of an application to be installed and an appended install authentication pattern;
verifying said install command using said install authentication pattern; and
installing said application on said smart card, whereby said application provider is allowed to install said application onto said smart card.
-
-
4. A method as recited in claim 3 further comprising:
-
receiving a load command from an application provider via a card acceptance device, said load command including an indication of an application to be loaded and an appended load authentication pattern;
verifying said load command using said load authentication pattern; and
loading said application on said smart card, whereby said application provider is allowed to load said application onto said smart card.
-
-
5. A system for delegated loading of an application onto a smart card, said system comprising:
-
a host computer under control of an application provider;
a software application included in said host computer to be loaded onto a smart card, said application including an appended application authentication pattern produced by an issuer of said smart card that verifies said application to said smart card;
a smart card acceptance device linked to said host computer; and
a smart card included in said card acceptance device, said smart card including code arranged to verify said application using said application authentication pattern, whereby said application provider is allowed to load said application onto said smart card. - View Dependent Claims (6, 7, 8, 9, 10, 11)
computer code to assign a smart card security domain to the application provider;
computer code for providing a key set to the application provider for the security domain assigned to the application provider, wherein the key is not known to the issuer of the smart card.
-
-
7. A system as recited in claim 6 further comprising:
-
a load command included in said host computer said load command comprising an appended command authentication pattern and code for loading said software application; and
code within said smart card arranged to verify said load command using said command authentication pattern, whereby said application provider provides said load command to said smart card.
-
-
8. A system as recited in claim 7 further comprising:
-
an install command included in said host computer said install command comprising an appended install authentication pattern and code for installing said software application; and
code within said smart card arranged to verify said install command using said install authentication pattern, whereby said application provider provides said install command to said smart card.
-
-
9. A system as recited in claim 6 further comprising:
-
an install command included in said host computer that has an appended install authentication pattern; and
code within said smart card arranged to verify said install command using said install authentication pattern, whereby said application provider is provide said install command to said smart card.
-
-
10. A method as recited in claim 6 wherein said cryptographic technique provides authentication and integrity for said application.
-
11. The system as recited in claim 5 further comprising:
-
a network connection linked to the smart card issuer;
computer readable code for sending the application from application provider to the smart card issuer;
computer readable code for receiving the approved application and an appended application authentication pattern from the smart card issuer; and
a storage device for storing the application and the appended application authentication pattern.
-
-
12. A method of delegated installation of an application on a smart card from an application provider, said method comprising:
-
sending an application from the application provider to a smart card issuer for approval;
receiving an approval application with an appended install authentication pattern from the smart card issuer;
storing the approved application and appended install authentication pattern at the application provider;
loading the stored approved application onto a smart card from the application provider;
receiving an install command from an application provider via a card acceptance device, said install command including an indication of said application to be installed, install parameters and an appended install authentication pattern;
verifying said install command using said install authentication pattern; and
installing the approved application on said smart card, whereby said application provider is allowed to install said application on said smart card. - View Dependent Claims (13, 14, 15, 16)
recalculating said install authentication pattern from said install command using said cryptographic technique, whereby said install authentication pattern and said recalculated install authentication pattern may be compared to provide verification of said install command.
-
-
14. A method as recited in claim 12 further comprising:
-
approving of said install command by an issuer of said smart card;
creating said install authentication pattern;
appending said install authentication pattern to said install command, whereby said smart card is reliably assured that said install command has been approved by said issuer; and
inserting the smart card into the card acceptance device subsequent to recalculating said install authentication pattern creating said install authentication pattern, and appending said install authentication pattern.
-
-
15. A method as recited in claim 14 wherein said delegated install is performed after issuance of said smart card to a consumer.
-
16. A method as recited in claim 15 further comprising:
-
assigning a security domain of the smart card to the application provider; and
providing a key set to the application provider for the security domain assigned to the application provider, wherein the key set is not known to an issuer of said smart card.
-
Specification