WO2016063659A1 - 情報処理装置、情報処理方法、およびプログラム - Google Patents
情報処理装置、情報処理方法、およびプログラム Download PDFInfo
- Publication number
- WO2016063659A1 WO2016063659A1 PCT/JP2015/076111 JP2015076111W WO2016063659A1 WO 2016063659 A1 WO2016063659 A1 WO 2016063659A1 JP 2015076111 W JP2015076111 W JP 2015076111W WO 2016063659 A1 WO2016063659 A1 WO 2016063659A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information processing
- processing apparatus
- application
- access
- identification information
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 189
- 238000003672 processing method Methods 0.000 title claims description 72
- 238000004891 communication Methods 0.000 claims abstract description 119
- 238000012545 processing Methods 0.000 claims description 81
- 238000000034 method Methods 0.000 description 71
- 230000008569 process Effects 0.000 description 55
- 230000000694 effects Effects 0.000 description 12
- 238000012217 deletion Methods 0.000 description 11
- 230000037430 deletion Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 11
- 238000009434 installation Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 9
- 230000004044 response Effects 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 4
- 238000000605 extraction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001151 other effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07737—Constructional details, e.g. mounting of circuits in the carrier the record carrier consisting of two or more mechanically separable parts
- G06K19/07741—Constructional details, e.g. mounting of circuits in the carrier the record carrier consisting of two or more mechanically separable parts comprising a first part operating as a regular record carrier and a second attachable part that changes the functional appearance of said record carrier, e.g. a contact-based smart card with an adapter part which, when attached to the contact card makes the contact card function as a non-contact card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3229—Use of the SIM of a M-device as secure element
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
- G06Q20/35765—Access rights to memory zones
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/363—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
Definitions
- the present disclosure relates to an information processing apparatus, an information processing method, and a program.
- Patent Document 1 a technique described in Patent Document 1 below can be cited.
- a dummy AID (Application ID) is assigned to an application that does not actually exist, and the service is managed using the dummy AID.
- the method of accessing and processing an application through a plurality of different communication paths is not limited to the method described in Patent Document 1.
- This disclosure proposes a new and improved information processing apparatus, information processing method, and program capable of controlling access from an application to a common file system according to a communication path.
- an access control unit that controls access from an application to a common file system that can be accessed from a plurality of applications, and the access control unit performs contact communication with an external processor Via a non-contact communication device capable of controlling access using first identification information associated with each of the plurality of applications and performing non-contact communication with an external device.
- a step of controlling access from an application to a common file system that can be accessed from a plurality of applications and in the step of controlling, contact communication is performed with an external processor.
- the access is controlled using the first identification information for identifying the application, which is associated with each of the plurality of applications, via a contactless communication device capable of performing contactless communication with an external device.
- access is controlled using second identification information for identifying an application related to non-contact communication that is associated with at least one of the plurality of applications.
- the step of controlling the access from the application to the common file system that can be accessed from a plurality of applications is executed by the computer, and in the step of controlling, contact communication is performed with an external processor.
- a contactless communication device that is associated with each of the plurality of applications and that is controlled by using first identification information for identifying the application and can perform contactless communication with an external device
- access is controlled using the second identification information for identifying an application related to non-contact communication, which is associated with at least one of the plurality of applications.
- FIG. 1 is an explanatory diagram illustrating an example of a hardware configuration of the information processing device 100 according to this embodiment.
- a reader / writer 200 (indicated as “R / W” in FIG. 1) that performs non-contact communication with the information processing apparatus 100 is also shown.
- non-contact communication includes NFC (Near Field Communication) that performs communication using a magnetic field (carrier wave) of a predetermined frequency such as 13.56 [MHz], for example.
- NFC Near Field Communication
- a magnetic field carrier wave
- a predetermined frequency such as 13.56 [MHz]
- the information processing apparatus 100 includes, for example, a UICC (Universal Integrated Circuit Card), a CLF (Contactless Front End), and a DH (Device Host).
- UICC Universal Integrated Circuit Card
- CLF Contactless Front End
- DH Device Host
- UICC and CLF communicate with each other via communication interfaces such as HCI (Host controller interface) and SWP (Single Wire Protocol), and UICC and DH communicate with each other via a communication interface based on, for example, ISO7816 standard.
- HCI Home controller interface
- SWP Single Wire Protocol
- FIG. 1 shows an example in which UICC communicates with CLF and DH through two different communication paths.
- FIG. 1 shows an example in which CLF and DH communicate via HCI (Host Controller Interface) or NCI (NFC Controller Interface).
- HCI Home Controller Interface
- NCI NFC Controller Interface
- the communication interfaces between the UICC, CLF, and DH are not limited to the examples shown above.
- the UICC and the CLF may communicate via a communication interface called DWP (Dual Wire Protocol) instead of the SWP shown in FIG.
- DWP Direct Wire Protocol
- DH external processor to be described later
- UICC can perform contact communication indirectly through other components, such as DH-CLF-UICC.
- the UICC plays a role of leading the processing related to the information processing method according to the present embodiment.
- the UICC performs, for example, contact communication (for example, communication according to ISO 7816 shown in FIG. 1) with DH (external processor described later) by the processing related to the information processing method according to the present embodiment, and CLF.
- the method of access control is changed depending on the case where non-contact communication is performed via (non-contact communication device). A specific example of processing related to the information processing method according to the present embodiment will be described later.
- the UICC includes, for example, a processor configured by an MPU (Micro Processing Unit), various processing circuits, and the like, and processing related to the information processing method according to the present embodiment is mainly performed by the processor.
- MPU Micro Processing Unit
- the UICC may include, for example, an application (hereinafter, may be referred to as “Application”, “AP”, or “Applet”) or a recording medium capable of storing various data.
- the recording medium included in the UICC has, for example, tamper resistance.
- perform the role which performs the process which concerns on the information processing method which concerns on this embodiment to lead is not restricted to UICC.
- components that can play a leading role in processing related to the information processing method according to the present embodiment are “SIM (Subscriber Identity Module)” and “eUICC” (the UICC shown in FIG. "ESE” (when the UICC shown in FIG. 1 is not detachable and does not store information necessary for connection to a general public wireless line), etc. Good.
- the CLF corresponds to a non-contact communication device that can perform non-contact communication with an external device.
- the CLF includes an antenna for non-contact communication, for example, the CLF receives a carrier wave by the antenna, demodulates the signal, and performs a response to the external device through the antenna by performing load modulation.
- the CLF receives, for example, a carrier wave via the external antenna, demodulates the signal, and performs load modulation. A response is made to the external device via the external antenna.
- DH includes a processor composed of, for example, an MPU and various processing circuits.
- a processor included in the DH executes middleware (hereinafter, may be referred to as “Middleware”) and an application, and performs various processes.
- middleware hereinafter, may be referred to as “Middleware”
- the processor included in the DH corresponds to an “external processor” as viewed from the UICC.
- the information processing apparatus 100 has a hardware configuration shown in FIG.
- the UICC and CLF shown in FIG. 1 may be configured by one piece of hardware.
- the information processing apparatus when the UICC is connected to an external non-contact device having the same function as the CLF, the information processing apparatus according to the present embodiment may not include the CLF shown in FIG.
- the information processing device according to the present embodiment may not include the DH illustrated in FIG. That is, the “external processor” viewed from the UICC according to the present embodiment may be, for example, a processor included in the external device of the information processing apparatus according to the present embodiment.
- the information processing apparatus is the information processing apparatus 100 having the hardware configuration illustrated in FIG. 1 as an example.
- FIG. 2 is an explanatory diagram showing an example of the software configuration of the information processing device 100 according to this embodiment.
- the kernel As software constituting the information processing apparatus 100, as shown in FIG. 2, for example, the kernel (Kernel shown in FIG. 2), “Java Card Runtime Environment”, “Issor Security Domain” (hereinafter referred to as “ISD”). And various applications (Applet shown in FIG. 2). Moreover, the application which comprises the software which comprises the information processing apparatus 100 may be able to be added as shown by Addable in FIG. In addition, the application that configures the software that configures the information processing apparatus 100 may be erasable.
- the software of the information processing apparatus 100 is executed by, for example, a processor constituting the UICC.
- a processor or the like constituting the UICC shown in FIG. 1 is indicated as “H / W”.
- SWP a communication protocol such as SWP is implemented.
- Java Card Runtime Environment has a JavaCard VM (Virtual Machine) that interprets the Java (registered trademark) language and has a function of executing a program. By having the JavaCard function defined by Java Card Forum, it has the function of managing multiple programs as Applets and switching them appropriately.
- JavaCard VM Virtual Machine
- Java Card Forum By having the JavaCard function defined by Java Card Forum, it has the function of managing multiple programs as Applets and switching them appropriately.
- Issor Security Domain is a concept defined by an industry standardization organization, Global Platform (hereinafter referred to as “GP”). “Issor Security Domain” is logically present in the application execution environment such as “Java Card Runtime Environment”, and as a manager when installing Applet, various authority and UICC status management instead of Issuer (issuer) It is a person who has a role to do. In addition, “Issor Security Domain” includes, for example, a key value, an authentication algorithm, and an input / output command in order to check whether various authorities are possessed. “Issor Security Domain” is managed by “Java Card Runtime Environment” in the same manner as other Applets.
- “Supplementary Security Domain” (hereinafter referred to as “SD” in some cases) assists “Issor Security Domain” defined in GP. Can exist). “Supplementary Security Domain” is realized, for example, in Java (registered trademark) language.
- the information processing method according to the present embodiment is performed by using, for example, “Java Card Runtime Environment” or “Issuer Security Domain” executed by a processor configuring the UICC. Processing is realized.
- the software configuration of the information processing apparatus 100 according to the present embodiment is not limited to the example shown in FIG.
- the processing related to the information processing method according to the present embodiment is realized by a hardware configuration or a software configuration as shown in FIGS.
- FIG. 3 shows an example of an existing file system related to providing a service using an application.
- a shown in FIG. 3 shows an example of a file system related to a service provided by one service provider (hereinafter, sometimes referred to as “SP”). An example in which instances are associated is shown. Further, B shown in FIG. 3 shows an example of a file system that can correspond to services provided by a plurality of service providers, and shows an example in which a plurality of instances are associated with one class. Yes. Each instance has a file system.
- SP service provider
- a file system as shown in FIG. 3A may be used. However, with the diversification of services and the improvement of device performance, it is required to support services provided by a plurality of service providers.
- a file system as shown in FIG. 3B it is possible to support services provided by a plurality of service providers.
- an area for each of a plurality of service providers must be provided in the common file system of the instance. Therefore, for example, when a file system as shown in FIG. 3B is used, unique identification information such as AID of each service provider is assigned to the application corresponding to the service provided by each service provider. It cannot be associated with service providers.
- the area according to the present embodiment can be accessed only by an exclusive or specific service provider, for example, by information (data) indicating the start point to the end point or information (data) indicating access permission such as authority. It refers to memory space using memory addresses and logical fields.
- unique identification information such as AID can be associated with each application, and the common file system can be accessed from a plurality of applications. To do.
- FIG. 4 is an explanatory diagram for explaining the information processing method according to the present embodiment, and shows an example of a file system according to the present embodiment.
- “Owner” shown in FIG. 4 indicates, for example, a business operator that provides a mechanism related to the information processing method according to the present embodiment, and an instance of “Owner” is generated first.
- the personalization shown in FIG. 4 for example, an area setting, a service setting, an initial data setting, a key information setting, and the like can be given.
- the personalization according to the present embodiment refers to, for example, a method called Personalization Support defined by GP.
- GP Personalization Support
- a secure communication path can be established with an external device using a key held by the SD, and encryption and message signature can be given depending on conditions.
- an application belonging to the SD can borrow a key from the SD and realize secure data communication.
- node information By personalization, information such as area and service is registered as node information, for example.
- registering a higher management node is indicated as “initial”, and registering a service-specific node is indicated as “individual”.
- the node information according to the present embodiment is, for example, numerical information (data) used to indicate an access method, access authority, and vertical relationship with respect to a logical memory space.
- the node information is configured with key information as necessary.
- One example of node information can be found from the “FeliCa Card User's Manual Excerpt” (http://www.sony.co.jp/Products/felica/business/techsupport/data/card_usersmanual_2.0.pdf) it can.
- the common file system is a class variable, and each instance is associated with each service provider, for example.
- the common file system is a class variable, and each instance is associated with each service provider, etc., so that the application corresponding to the service provided by each service provider is It is possible to associate unique identification information such as AID.
- the common file system can be accessed from a plurality of applications.
- FIG. 5 is an explanatory diagram for explaining the information processing method according to the present embodiment, and shows an example of management of each instance in the information processing apparatus 100.
- ISD “Owner SD” which is SD corresponding to Owner
- SP1 SD which is SD corresponding to one service provider
- SP2 which is SD corresponding to other service providers.
- SD ".
- FIG. 5A Under the management of “Owner SD”, “Owner Applet” that is an application corresponding to Owner, and “SP1” that is an application corresponding to one service provider. “Applet” and “SP2 Applet”, which is an application corresponding to another service provider, are installed.
- the state shown in FIG. 5A is a state where “Owner Applet”, “SP1 Applet”, and “SP2 Applet” are linked to “Owner SD”.
- the SD linked to “SP1 Applet” is changed to “SP1 SD”
- the SD linked to “SP2 Applet” is changed to “SP2”. It may be changed to “SD”.
- the change of the association between Applet and SD is realized, for example, by a method called Content Extraction (hereinafter, sometimes referred to as “Extraction”) defined by GP.
- the information processing apparatus 100 controls access from the application to the common file system (access control processing).
- the information processing apparatus 100 performs, for example, contact communication with a processor (external processor) configuring DH and non-contact communication via a CLF (non-contact communication device).
- a processor external processor
- CLF non-contact communication device
- the first identification information according to the present embodiment is identification information for specifying an application.
- each application installed in the UICC can be associated with a unique ID such as AID. Therefore, AID is mentioned as 1st identification information which concerns on this embodiment, for example.
- the AID uses, for example, RID (Registered application provider IDentifier) that is a unique ID of the service provider, ID accompanying information called PIX (Proprietary application Identifier eXtension), and a value indicating the version of Applet.
- RID Registered application provider IDentifier
- PIX Proprietary application Identifier eXtension
- a value indicating the version of Applet Is calculated as follows.
- PIX for example, a value obtained by combining an identifier of a service provider and a system code (second identification information to be described later) can be given.
- the AID according to the present embodiment is not limited to the example shown above.
- the AID according to the present embodiment may be an AID defined by ISO7816-5.
- the AID according to the present embodiment may be a unique ID that can be uniquely calculated by some method.
- FIG. 6 is an explanatory diagram for explaining the information processing method according to the present embodiment, and shows an example of access control when contact communication is performed between the UICC and the DH.
- SE shown in FIG. 6 indicates a UICC secure element.
- the middleware executed by the DH processor selects an application using an AID (an example of identification information) according to the application executed by the processor. To do.
- UICC acquires AID selected by Middleware through contact communication with DH.
- AID which UICC acquires from DH by contact communication corresponds to the identification information acquired from an external processor.
- UICC which acquired AID selected by Middleware selects the application matched with AID (an example of the 1st discernment information) corresponding to the acquired AID.
- the UICC selects an application associated with an AID that matches the AID selected by the middleware. If the identification information selected by the middleware is not an AID, the UICC selects an application by specifying the AID corresponding to the identification information using a table in which the AID and another ID are associated with each other. It is also possible to do.
- the sent AID is shorter than the registered AID
- the Applet that matches the corresponding part in the registered AID is selected.
- the sent information is manufacturer identification information called IDm
- IDm manufacturer identification information
- UICC When an application is selected, UICC causes the selected application to access the common file system.
- the UICC may perform authentication using the key information.
- authentication is performed using key information, for example, only the service provider application that knows the key can access the common file system.
- individual files in the common file system may include those that require authentication and those that do not require authentication.
- the execution process according to the present embodiment may be performed as part of the process according to the information processing method according to the present embodiment, for example, or may be different from the process according to the information processing method according to the present embodiment. It may be performed as a process. Moreover, the execution process which concerns on this embodiment is performed by the processor which comprises UICC, for example. Note that the execution processing according to the present embodiment may be performed by, for example, a processor (external processor) configuring the DH, a processor provided in an external device of the information processing apparatus 100, or the like.
- the execution process according to the present embodiment is performed by executing a command set for each Applet shown in FIG. 6, for example.
- the command according to the present embodiment may be set on the class side having the common file system.
- Static method refers to a process that can be accessed without the need to instantiate a class defined in Java (registered trademark). Note that the above is an example in a specific execution environment, and the information processing method according to the present embodiment is not limited to the example described above.
- FIG. 7 is an explanatory diagram for explaining an example of the effect of the access control process according to the information processing method according to the present embodiment.
- FIG. 7A shows an example of the operation of an existing information processing apparatus when a UI (User Interface) application “SP1 UI AP” corresponding to one service provider is executed in DH.
- 7B shows an example of the operation of the information processing apparatus 100 according to the present embodiment when “SP1 UI AP” is executed.
- UI User Interface
- the information processing apparatus 100 it is possible to associate an AID with each application. Therefore, the user using the information processing apparatus 100 may execute “SP1 UI AP” in order to perform processing using “SP1 Applet” corresponding to one service provider.
- the information processing apparatus 100 that performs the access control process according to the first example can simplify the user's operation as compared with the case where the existing information processing apparatus is used. Can be improved.
- the information processing apparatus 100 that performs the access control process according to the first example can associate an AID with each application, it is also possible to adopt an existing control method using the AID. As a result, the access control of the information processing apparatus 100 can be controlled in accordance with each AID, so that security can be ensured in fine units.
- the access control performed by the information processing apparatus is only “Owner UI AP” associated with the AID, UIs for a plurality of SPs other than “SP1 UI AP” are included therein. Even if there is an AP, it is not a control target, and it is difficult to set optimum security individually.
- the second identification information according to the present embodiment for example, a system code defined in “Global Platform Card-Card Specification v2.2-Amendment C” (hereinafter, may be referred to as “SC”). Is mentioned. That is, the second identification information according to the present embodiment is identification information different from the first identification information according to the present embodiment.
- the second identification information according to the present embodiment is associated with, for example, at least one application among a plurality of applications.
- FIG. 8 is an explanatory diagram for explaining an example of the information processing method according to the present embodiment, and shows a table in which parameters called SC and IDm and parameters called PMm are associated with each other.
- FIG. 8 shows an example in which only the SC indicating “1234” is set, and other SCs are not set.
- AID there is no description of AID, but a specific AID is also associated with “1234”, another SC is set, and the other SC has another AID. Needless to say, it may be associated with an application.
- an ID can be searched using an IDm and an application can be called.
- association between one piece of information and other information according to the present embodiment is performed by a table as shown in FIG. 8, for example.
- the association between one information and other information according to the present embodiment is not limited to the table, and the one information and the other information are associated by any method that can be associated. It may be done.
- FIG. 9 is an explanatory diagram for explaining an example of the information processing method according to the present embodiment, and shows an example of access control when non-contact communication is performed with the reader / writer 200 via the CLF. ing.
- the reader / writer 200 When the reader / writer 200 performs polling, for example, the reader / writer 200 transmits a signal including a system code using a carrier wave.
- the CLF transmits the signal transmitted from the reader / writer 200 to the UICC by, for example, contact communication using SWP.
- the UICC selects an application associated with a system code (an example of second identification information) corresponding to a system code (an example of identification information) included in a signal transmitted from the reader / writer 200 acquired from the CLF. To do.
- the UICC selects, for example, an application associated with a system code that matches the system code included in the signal transmitted from the reader / writer 200. If the identification information included in the signal transmitted from the reader / writer 200 is not a system code, the UICC responds to the identification information using a table in which the system code is associated with another ID. It is also possible to specify the system code and select the application.
- UICC When an application is selected, UICC causes the selected application to access the common file system.
- UICC selects “Owner Applet” and causes “Owner Applet” to access the common file system. .
- the transaction process related to non-contact communication is performed in the UICC. That is, in the example shown in FIG. 9, the transaction processing related to “SP1 Applet” and “SP2 Applet” that are not associated with the system code is substituted by “Owner Applet”.
- the information processing apparatus 100 that performs the access control process according to the second example can perform non-contact communication via the CLF with the existing reader / writer 200 related to non-contact communication. Compatible with existing contactless communication.
- an application other than “Owner Applet” may be associated with a system code other than “1234”.
- the UICC selects an application associated with the system code corresponding to the system code acquired from the CLF from the plurality of applications.
- the information processing apparatus 100 When contact communication is performed with a processor (external processor) constituting the DH, the information processing apparatus 100 performs the access control process according to the first example shown in [2-2-1], for example. For example, the access control processing according to the second example shown in [2-2-2] is performed.
- the information processing apparatus 100 can control access from the application to the common file system according to the communication path.
- FIG. 10 shows a first example of processing related to the information processing method according to the present embodiment. It is a flowchart.
- FIG. 10 shows an example of processing when Applet is issued by an external device such as TSM (Trusted Service Manager).
- TSM Trusted Service Manager
- the TSM and the information processing apparatus 100 communicate using, for example, a public wireless line.
- processing related to key information exchange and authentication is omitted.
- the TSM transmits an “Owner SD” installation request to the information processing apparatus 100 (S102), and the ISD of the information processing apparatus 100 generates “Owner SD” in response to the installation request (S102).
- the ISD of the information processing apparatus 100 installs “Owner Applet” in response to the installation request for “Owner Applet” received from TSM (S104, S106).
- the ISD of the information processing apparatus 100 performs processing according to the installation request received from the TSM (S108), and the “Owner SD” of the information processing apparatus 100 is based on the installation request and various data received from the TSM. Processing related to personalization of “Owner Applet” is performed (S110 to S120).
- processing related to personalization of “Owner Applet” is performed (S110 to S120).
- step S116 of the processes related to personalization as described above, for example, area setting, service setting, initial data setting, key information setting, and the like are performed. As described above, these data can be safely delivered by adding encryption or a message signature with the key information of “Owner SD”.
- FIG. 11 is an explanatory diagram for explaining an example of processing related to the information processing method according to the present embodiment, and shows an example of processing related to setting of IDm.
- Applet IDm for example, a binary in which all values shown in A of FIG. 11 are set to 0 is set.
- a service provider (or an operator entrusted by the service provider) rewrites the value of IDm to an arbitrary value as shown in FIG. 11B.
- a service provider or an operator entrusted by the service provider rewrites the value of IDm to an arbitrary value as shown in FIG. 11B.
- the fixed value shown in B of FIG. 11 for example, a manufacturer code or the like can be cited.
- the fixed value of each service provider may be managed by, for example, an administrator who operates TSM.
- the information processing apparatus 100 may forcibly rewrite the IDm value as shown in FIG.
- the information processing apparatus 100 forcibly rewrites the value of IDm by, for example, a combination of a predetermined fixed value and a random number.
- the IDm value is forcibly rewritten from the initial value, whereby the IDm automatic numbering is realized, and the possibility of ensuring the uniqueness of the IDm can be increased.
- the ISD of the information processing apparatus 100 generates “SP SD” in response to the “SP SD” installation request received from the TSM (S122, S124).
- the “Owner SD” of the information processing apparatus 100 installs “SP Applet” in response to the installation request for “SP Applet” received from TSM (S126, S128).
- the “Owner SD” of the information processing apparatus 100 performs processing related to personalization of “SP Applet” based on various data received from the TSM (S130 to S140).
- SP Applet accepts processing from an entry point called “processData” in response to a personalization processing request, and holds node information to be registered by itself. Further, “SP Applet” performs a file registration process for the common file system based on the node information. Further, the “Owner SD” of the information processing apparatus 100 performs processing in response to the Content Extraction request received from the TSM, and transfers the authority of “SP Applet” belonging to the SD to “SP SD” (S142). .
- each applet is issued (installed) by performing the processing shown in FIG.
- FIG. 10 shows an example in which the installation right is given to “Owner SD”, but the authority given to the SD such as “Owner SD” depends on the operation of the information processing apparatus 100, and “Owner SD” Installation rights may not be given to.
- the installation right is not given to “Owner SD”, for example, Content Extension as shown in FIG. 5B is performed at the time of installation.
- FIG. 12 shows a second example of processing related to the information processing method according to the present embodiment. It is a flowchart which shows.
- FIG. 12 shows an example of processing when “SP Applet” is deleted and “SP SD” is deleted by an external device such as TSM.
- the TSM and the “SP SD” of the information processing apparatus 100 perform mutual authentication (S200).
- the TSM transmits a “SP Applet” deletion request (S202), and the “SP SD” of the information processing apparatus 100 performs processing related to the deletion of “SP Applet” in response to the deletion request. This is performed (S204 to S206).
- the deletion request is, for example, encrypted and message-signed according to the mutual authentication conditions, so that only the SP that knows the “SP SD” key can be sent.
- SP Applet executes a process to be performed at the time of deletion from an entry point called “uninstall method” that the “SP Applet” has when following a deletion request.
- the part registered by itself is deleted from the file system.
- the part registered by another Applet is not deleted, but if the node information is a superordinate concept file, the subordinate concept file is also automatically deleted. Needless to say.
- the node information to be registered even individual node information may be registered one by one, or only the highest concept may be registered.
- the ISD of the information processing apparatus 100 receives “SP SD” deletion request received from the TSM and deletes “SP SD” (S208, S210).
- the processing shown in FIG. 12 is performed, whereby “SP Applet” is deleted and “SP SD” is deleted.
- steps S208 and S210 may not be performed.
- FIG. 12 shows an example in which the deletion right is given to “SP SD”, but the right given to the SD such as “SP SD” depends on the operation of the information processing apparatus 100, and “SP The deletion right may not be given to SD ′′.
- SP SD when the deletion right is not given to “SP SD”, “SP SD” is deleted by ISD, for example.
- FIG. 13 is a third example of processing related to the information processing method according to the present embodiment. It is explanatory drawing which shows an example, and has shown the outline
- each Applet has node information (for example, information indicating an area or service indicating the start point to the end point) by the process related to personalization, and thus is common using the node information.
- the read data is encrypted using, for example, key information indicating the secret key of the upper SD of the applet, and the encrypted data is output from the UICC to DH, for example.
- the encrypted data may be transmitted to an external device such as a server of a service provider corresponding to Applet via, for example, a public wireless line. Further, the encrypted data may be shared with another Applet of the information processing apparatus 100.
- the shared Applet will hold the data temporarily and keep it even if the original Applet is deleted, so that the updated Applet can be installed again and returned appropriately Assumed.
- a similar mechanism can be constructed even if an application that can temporarily store encrypted data is deployed on DH.
- FIG. 14 is a block diagram illustrating an example of the configuration of the information processing apparatus 100 according to the present embodiment.
- the information processing apparatus 100 includes a control unit 102, for example.
- the information processing apparatus 100 may include, for example, a ROM (Read Only Memory, not shown), a RAM (Random Access Memory, not shown), a storage unit (not shown), and the like.
- the information processing apparatus 100 connects the above constituent elements by, for example, a bus as a data transmission path. Further, the information processing apparatus 100 may be provided with terminals for electrical connection with external components as indicated by “C6” and “C7” shown in the UICC of FIG.
- the information processing apparatus 100 performs contact communication with an external component by, for example, wired communication via a terminal for electrical connection with the external component.
- the information processing apparatus 100 is driven by obtaining power from a battery such as a secondary battery provided or an external power source.
- a ROM (not shown) stores control data such as a program and calculation parameters used by the control unit 102.
- a RAM (not shown) temporarily stores a program executed by the control unit 102.
- the storage unit (not shown) stores various data such as data related to the information processing method according to the present embodiment, such as the table shown in FIG. 8, and applications.
- examples of the storage unit (not shown) include a recording medium such as a nonvolatile memory.
- the storage unit (not shown) may be, for example, a tamper-resistant recording medium or may be detachable from the information processing apparatus 100.
- the information processing apparatus 100 has, for example, a hardware configuration (including modifications) shown in FIG. 1 and a software configuration shown in FIG. Needless to say, the hardware configuration example and the software configuration example of the information processing apparatus 100 are not limited to the above-described examples.
- the control unit 102 includes, for example, one or more processors configured with an arithmetic circuit such as an MPU, various processing circuits, and the like, and controls the information processing apparatus 100 as a whole.
- the control unit 102 includes, for example, an access control unit 110 and a processing unit 112, and plays a role of leading the processing related to the information processing method according to the present embodiment.
- the access control unit 110 plays a role of leading the access control processing according to the present embodiment, and controls access from the application to the common file system.
- the access control unit 110 performs, for example, the access control process according to the first example shown in [2-2-1] and the access control process according to the second example shown in [2-2-2]. .
- the processing unit 112 plays a role of leading execution processing according to the present embodiment, and performs processing using a common file system.
- the processing unit 112 performs various processes such as a process related to execution of a command corresponding to an application and a transaction process related to non-contact communication.
- the control unit 102 includes, for example, an access control unit 110 and a processing unit 112, thereby leading the processing related to the information processing method according to the present embodiment.
- the information processing apparatus 100 performs processing (for example, the access control process and the execution process) according to the information processing method according to the present embodiment, for example, with the configuration illustrated in FIG.
- the information processing apparatus 100 can control access from the application to the common file system according to the communication path, for example, with the configuration shown in FIG.
- the information processing apparatus 100 can exhibit the effects exhibited by performing the processing related to the information processing method according to the present embodiment as described above, for example.
- the information processing apparatus includes one or both of the access control unit 110 and the processing unit 112 illustrated in FIG. 14 separately from the control unit 102 (for example, realized by another processing circuit). )be able to.
- the access control process and the execution process are obtained by dividing the process related to the information processing method according to the present embodiment for convenience. Therefore, the configuration for realizing the processing according to the information processing method according to the present embodiment is not limited to the access control unit 110 and the processing unit 112 illustrated in FIG. 14, and the processing according to the information processing method according to the present embodiment is separated. It is possible to take a configuration according to the direction.
- the information processing apparatus according to the present embodiment can be configured not to include the processing unit 112. Even in a configuration that does not include the processing unit 112, the information processing apparatus according to the present embodiment, for example, performs access from the application to the common file system according to the communication path by the access control process in the access control unit 110. Can be controlled. Therefore, even if it is the structure which does not include the process part 112, the information processing apparatus which concerns on this embodiment can show
- the information processing apparatus has been described as the present embodiment, but the present embodiment is not limited to such a form.
- the present embodiment can be applied to processing ICs such as UICC, SIM, eUICC, eSE, and SD card.
- the present embodiment is a computer such as a tablet device, a communication device such as a mobile phone or a smartphone, a video / music playback device (or video / music recording / playback device), a game machine, a PC (Personal Computer), etc. It can be applied to various devices.
- a program for causing a computer to function as the information processing apparatus according to the present embodiment (for example, “the access control process”, “the access control process, and the execution process”) is applied to the information processing method according to the present embodiment.
- a program capable of executing such processing is executed by a processor or the like in the computer, whereby access from the application to the common file system can be controlled according to the communication path.
- the program according to the present embodiment may be, for example, a program that operates alone, or may be a library that is used by another program such as an application.
- a program for causing a computer to function as the information processing apparatus according to the present embodiment is provided.
- the present embodiment further includes a recording in which the program is stored.
- a medium can also be provided.
- An access control unit for controlling access from an application to a common file system that can be accessed from a plurality of applications
- the access control unit When contact communication is performed with an external processor, access is controlled using first identification information for identifying the application, which is associated with each of the plurality of applications,
- contactless communication is performed via a contactless communication device capable of contactless communication with an external device, an application related to contactless communication is associated with at least one of the plurality of applications.
- An information processing apparatus that controls access using second identification information for specifying the ID.
- the access control unit selects an application associated with the first identification information corresponding to the identification information acquired from the processor, and selects the selected application as the common
- the information processing apparatus according to (1) wherein the information processing apparatus causes access to a file system.
- the access control unit selects an application associated with the second identification information corresponding to the identification information acquired from the non-contact communication device.
- the information processing apparatus according to (1) or (2) wherein an application accesses the common file system.
- the information processing apparatus according to any one of (1) to (5), further including the processor. (7) The information processing apparatus according to claim 1, wherein the first identification information and the second identification information are different identification information.
- contactless communication is performed via a contactless communication device capable of contactless communication with an external device, an application related to contactless communication is associated with at least one of the plurality of applications.
- An information processing method executed by an information processing apparatus wherein access is controlled using second identification information for specifying the information.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
Abstract
Description
1.本実施形態に係る情報処理方法
2.本実施形態に係る情報処理装置
3.本実施形態に係るプログラム
まず、本実施形態に係る情報処理方法について説明する。以下では、本実施形態に係る情報処理方法に係る処理を、本実施形態に係る情報処理装置が行う場合を例に挙げる。
本実施形態に係る情報処理方法について説明する前に、本実施形態に係る情報処理方法に係る処理を行うことが可能な、本実施形態に係る情報処理装置のハードウェア構成例と、ソフトウェア構成例とについて説明する。
図1は、本実施形態に係る情報処理装置100のハードウェア構成の一例を示す説明図である。図1では、情報処理装置100と非接触通信を行うリーダ/ライタ200(図1では「R/W」と示している。)を併せて示している。
図2は、本実施形態に係る情報処理装置100のソフトウェア構成の一例を示す説明図である。
次に、本実施形態に係る情報処理方法について説明する。
まず、本実施形態に係る情報処理方法において用いられるファイルシステムの一例を挙げる。
次に、本実施形態に係る情報処理方法に係る処理について説明する。
外部のプロセッサとの間で接触通信が行われる場合、情報処理装置100は、複数のアプリケーションそれぞれに対応付けられている第1識別情報を用いて、アクセスを制御する。
AID=RID+PIX+Applet version
APがあっても制御対象にならず、個々に最適なセキュリティを設定することが困難になる。
CLFなどの非接触通信デバイスを介した非接触通信が行われる場合、情報処理装置100は、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスを制御する。
次に、本実施形態に係る状処理方法に係る処理の具体例を挙げる。
図10は、本実施形態に係る情報処理方法に係る処理の第1の例を示す流れ図である。図10は、TSM(Trusted Service Manager)などの外部装置によりAppletの発行が行われる場合における処理の一例を示している。TSMと情報処理装置100とは、例えば公衆無線回線などを利用して通信を行う。なお、図10では、鍵情報の交換や認証に係る処理については、省略している。
図12は、本実施形態に係る情報処理方法に係る処理の第2の例を示す流れ図である。図12は、TSMなどの外部装置により“SP Applet”の削除、および“SP SD”の削除が行われる場合における処理の一例を示している。
図13は、本実施形態に係る情報処理方法に係る処理の第3の例を示す説明図であり、Appletに係る情報のバックアップに係る処理の概要を示している。
次に、上述した本実施形態に係る情報処理方法に係る処理を行うことが可能な、本実施形態に係る情報処理装置の構成の一例について説明する。
コンピュータを、本実施形態に係る情報処理装置として機能させるためのプログラム(例えば、“上記アクセス制御処理”や、“上記アクセス制御処理、および上記実行処理”など、本実施形態に係る情報処理方法に係る処理を実行することが可能なプログラム)が、コンピュータにおいてプロセッサなどにより実行されることによって、通信路に応じて共通ファイルシステムへのアプリケーションからのアクセスを制御することができる。
(1)
複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するアクセス制御部を備え、
前記アクセス制御部は、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスを制御し、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスを制御する、情報処理装置。
(2)
前記アクセス制御部は、前記接触通信が行われる場合には、前記プロセッサから取得される識別情報に対応する前記第1識別情報に対応付けられているアプリケーションを選択し、選択されたアプリケーションを前記共通ファイルシステムへとアクセスさせる、(1)に記載の情報処理装置。
(3)
前記アクセス制御部は、前記非接触通信が行われる場合には、前記非接触通信デバイスから取得される識別情報に対応する前記第2識別情報に対応付けられているアプリケーションを選択し、選択されたアプリケーションを前記共通ファイルシステムへとアクセスさせる、(1)、または(2)に記載の情報処理装置。
(4)
前記共通ファイルシステムを用いて処理を行う処理部をさらに備える、(1)~(3)のいずれか1つに記載の情報処理装置。
(5)
前記非接触通信デバイスをさらに備える、(1)~(4)のいずれか1つに記載の情報処理装置。
(6)
前記プロセッサをさらに備える、(1)~(5)のいずれか1つに記載の情報処理装置。
(7)
前記第1識別情報と前記第2識別情報は異なる識別情報である、請求項1に記載の情報処理装置。
(8)
複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するステップを有し、
前記制御するステップでは、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスが制御され、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスが制御される、情報処理装置より実行される情報処理方法。
(9)
複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するステップをコンピュータに実行させ、
前記制御するステップでは、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスが制御され、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスが制御される、プログラム。
102 制御部
110 アクセス制御部
112 処理部
200 リーダ/ライタ
Claims (9)
- 複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するアクセス制御部を備え、
前記アクセス制御部は、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスを制御し、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスを制御する、情報処理装置。 - 前記アクセス制御部は、前記接触通信が行われる場合には、前記プロセッサから取得される識別情報に対応する前記第1識別情報に対応付けられているアプリケーションを選択し、選択されたアプリケーションを前記共通ファイルシステムへとアクセスさせる、請求項1に記載の情報処理装置。
- 前記アクセス制御部は、前記非接触通信が行われる場合には、前記非接触通信デバイスから取得される識別情報に対応する前記第2識別情報に対応付けられているアプリケーションを選択し、選択されたアプリケーションを前記共通ファイルシステムへとアクセスさせる、請求項1に記載の情報処理装置。
- 前記共通ファイルシステムを用いて処理を行う処理部をさらに備える、請求項1に記載の情報処理装置。
- 前記非接触通信デバイスをさらに備える、請求項1に記載の情報処理装置。
- 前記プロセッサをさらに備える、請求項1に記載の情報処理装置。
- 前記第1識別情報と前記第2識別情報は異なる識別情報である、請求項1に記載の情報処理装置。
- 複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するステップを有し、
前記制御するステップでは、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスが制御され、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスが制御される、情報処理装置より実行される情報処理方法。 - 複数のアプリケーションからアクセスされうる共通ファイルシステムへのアプリケーションからのアクセスを制御するステップをコンピュータに実行させ、
前記制御するステップでは、
外部のプロセッサとの間において接触通信が行われる場合には、複数の前記アプリケーションそれぞれに対応付けられる、アプリケーションを特定するための第1識別情報を用いてアクセスが制御され、
外部装置と非接触通信を行うことが可能な非接触通信デバイスを介した非接触通信が行われる場合には、複数の前記アプリケーションのうちの少なくとも1つのアプリケーションに対応付けられる、非接触通信に関するアプリケーションを特定するための第2識別情報を用いてアクセスが制御される、プログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/519,431 US10262254B2 (en) | 2014-10-22 | 2015-09-15 | Information processing apparatus, information processing method, and program |
JP2016555134A JP6503560B2 (ja) | 2014-10-22 | 2015-09-15 | 情報処理装置、情報処理方法、およびプログラム |
CN201580055781.7A CN107077633B (zh) | 2014-10-22 | 2015-09-15 | 信息处理装置、信息处理方法和程序 |
US16/289,920 US10803373B2 (en) | 2014-10-22 | 2019-03-01 | Information processing apparatus and information processing method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014215764 | 2014-10-22 | ||
JP2014-215764 | 2014-10-22 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/519,431 A-371-Of-International US10262254B2 (en) | 2014-10-22 | 2015-09-15 | Information processing apparatus, information processing method, and program |
US16/289,920 Continuation US10803373B2 (en) | 2014-10-22 | 2019-03-01 | Information processing apparatus and information processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016063659A1 true WO2016063659A1 (ja) | 2016-04-28 |
Family
ID=55760704
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/076111 WO2016063659A1 (ja) | 2014-10-22 | 2015-09-15 | 情報処理装置、情報処理方法、およびプログラム |
Country Status (4)
Country | Link |
---|---|
US (2) | US10262254B2 (ja) |
JP (2) | JP6503560B2 (ja) |
CN (1) | CN107077633B (ja) |
WO (1) | WO2016063659A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111008680A (zh) * | 2018-10-08 | 2020-04-14 | 英飞凌科技股份有限公司 | 用于实施近场通信的电路、方法和设备 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016063659A1 (ja) * | 2014-10-22 | 2016-04-28 | ソニー株式会社 | 情報処理装置、情報処理方法、およびプログラム |
TWI637337B (zh) * | 2017-02-10 | 2018-10-01 | 緯創資通股份有限公司 | 利用近場通訊之電子系統及網頁自動登入及安全交易方法 |
CN112733133B (zh) * | 2019-10-14 | 2024-04-19 | 中国移动通信有限公司研究院 | 嵌入式通用集成电路卡访问控制方法、装置及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005242445A (ja) * | 2004-02-24 | 2005-09-08 | Sony Corp | 半導体集積回路,携帯モジュールおよびメッセージ通信方法。 |
JP2012190454A (ja) * | 2011-03-08 | 2012-10-04 | Sony Corp | 情報処理装置、情報処理方法、およびプログラム |
JP2013526734A (ja) * | 2010-05-27 | 2013-06-24 | ジェムアルト エスアー | Nfcコントローラを用いた通信の管理方法 |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4729839B2 (ja) * | 2003-05-20 | 2011-07-20 | 株式会社日立製作所 | Icカード |
JP2005196412A (ja) * | 2004-01-06 | 2005-07-21 | Sony Corp | データ通信装置及びデータ通信装置のメモリ管理方法 |
JP2006012026A (ja) | 2004-06-29 | 2006-01-12 | Dainippon Printing Co Ltd | 携帯型情報記憶媒体及びそのプログラム |
US8583660B2 (en) * | 2005-03-18 | 2013-11-12 | Sony Corporation | Information processing apparatus, information processing method, and computer program |
CN100504921C (zh) * | 2006-06-29 | 2009-06-24 | 北京握奇数据系统有限公司 | 一种智能卡操作系统和方法 |
KR100862749B1 (ko) | 2007-10-15 | 2008-10-10 | 주식회사 케이티프리텔 | Uicc 응용 파일 제어 방법 및 그 장치 |
JP5527045B2 (ja) | 2010-06-28 | 2014-06-18 | ソニー株式会社 | 情報処理装置および方法、並びにプログラム |
KR20120011974A (ko) * | 2010-07-29 | 2012-02-09 | 삼성전자주식회사 | 복수 개의 인터페이스를 지원하는 스마트 카드 및 그것의 인터페이스 방법 |
JP5659051B2 (ja) * | 2011-03-17 | 2015-01-28 | 株式会社東芝 | 通信媒体、icカード、及び通信方法 |
WO2012162351A1 (en) * | 2011-05-23 | 2012-11-29 | Mastercard International, Inc. | Combicard transaction method and system having an application parameter update mechanism |
EP2857964B1 (en) | 2012-05-31 | 2020-09-16 | Sony Corporation | Information processing device, information processing method, and program |
WO2016063659A1 (ja) * | 2014-10-22 | 2016-04-28 | ソニー株式会社 | 情報処理装置、情報処理方法、およびプログラム |
-
2015
- 2015-09-15 WO PCT/JP2015/076111 patent/WO2016063659A1/ja active Application Filing
- 2015-09-15 CN CN201580055781.7A patent/CN107077633B/zh active Active
- 2015-09-15 US US15/519,431 patent/US10262254B2/en active Active
- 2015-09-15 JP JP2016555134A patent/JP6503560B2/ja active Active
-
2019
- 2019-03-01 US US16/289,920 patent/US10803373B2/en active Active
- 2019-03-12 JP JP2019045028A patent/JP6923582B2/ja active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005242445A (ja) * | 2004-02-24 | 2005-09-08 | Sony Corp | 半導体集積回路,携帯モジュールおよびメッセージ通信方法。 |
JP2013526734A (ja) * | 2010-05-27 | 2013-06-24 | ジェムアルト エスアー | Nfcコントローラを用いた通信の管理方法 |
JP2012190454A (ja) * | 2011-03-08 | 2012-10-04 | Sony Corp | 情報処理装置、情報処理方法、およびプログラム |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111008680A (zh) * | 2018-10-08 | 2020-04-14 | 英飞凌科技股份有限公司 | 用于实施近场通信的电路、方法和设备 |
Also Published As
Publication number | Publication date |
---|---|
US20190197383A1 (en) | 2019-06-27 |
JP2019153310A (ja) | 2019-09-12 |
CN107077633B (zh) | 2020-06-16 |
JP6503560B2 (ja) | 2019-04-24 |
JPWO2016063659A1 (ja) | 2017-08-03 |
US10262254B2 (en) | 2019-04-16 |
US10803373B2 (en) | 2020-10-13 |
CN107077633A (zh) | 2017-08-18 |
JP6923582B2 (ja) | 2021-08-18 |
US20170243105A1 (en) | 2017-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2183728B1 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
EP2731381B1 (en) | Method for changing the mobile network operator in an embedded sim on basis of special privilege | |
US11119791B2 (en) | Information processing apparatus, IC chip, information processing method, program, and information processing system | |
EP2508014B1 (en) | Methods, secure element, server, computer programs and computer program products for improved application management | |
JP6923582B2 (ja) | 情報処理装置、情報処理方法、およびプログラム | |
KR20120005411A (ko) | Nfc 장치에서의 보안 어플리케이션 실행 방법 | |
US10032050B2 (en) | Electronic device, system and method for NFC | |
EP3333701B1 (en) | Method for implementing host card emulation, terminal, and data routing method and apparatus | |
US11907931B2 (en) | Method and system for managing virtual electronic card, secure chip, terminal and storage medium | |
KR20130006257A (ko) | 내장 sim에서의 키 관리방법, 및 그를 위한 내장 sim과 기록매체 | |
WO2019155792A1 (ja) | 情報処理装置、情報処理方法、およびプログラム | |
JP6746244B2 (ja) | 情報処理装置、情報処理方法、プログラム、および情報処理システム | |
JP6801448B2 (ja) | 電子情報記憶媒体、認証システム、認証方法、及び認証アプリケーションプログラム | |
JP6515850B2 (ja) | 情報処理装置、icチップ、情報処理方法、プログラム、及び情報処理システム | |
JP2007249544A (ja) | 電子媒体およびそれを含む情報端末 | |
JP2016111596A (ja) | Icカードシステム,icカードおよびicカード管理装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15852213 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016555134 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15519431 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15852213 Country of ref document: EP Kind code of ref document: A1 |