Sie sind auf Seite 1von 14

US 20110183611A1

(19) United States


(12) Patent Application Publication (10) Pub. No.: US 2011/0183611 A1
Wane (43) Pub. Date: Jul. 28, 2011

(54) METHODS, SYSTEMS AND ARRANGEMENTS Publication Classi?cation


FOR WIRELESS COMMUNICATION WITH (51) Int Cl
NEAR-FIELD COM y l 1 \IICATION TERMINALS H04B 5/00 (200601)
52 US. Cl. ..................................................... .. 455/411
(75) Inventor: Ismaila Wane, Tucson, AZ (U S) ( )
(57) ABSTRACT
(73) Assignee? NXP B-Vw Eindhoven (NL) A variety of near-?eld devices, methods and systems are
implemented in various fashions. One implementation is
(21) Appl, No.1 12/994,007 directed to a mobile station (102) With an over-the-air (OTA)
transceiver (104) for communication With a trusted service
(22) PCT Filed. May 22 2009 manager. The mobile station also has a near-?eld communi
' cations transceiver (112) for communication With a terminal
reader using ?le-identi?ers of a ?rst siZe. A memory (106) is
(86) PCT N05 PCT/[130952145 used for storing ?les arranged according to tWo different sets
of ?les, the ?rst set of ?les identi?ed by ?le-identi?ers of a
371 (0)0) ?rst siZe and the second set of ?les identi?ed by ?le-identi
(2) (4) Date: Mar 181 2011 ?ers of a second siZe that is a different siZe from the ?rst siZe.
A processor (108) provides access by the OTA transceiver
(30) Foreign Application Priority Data (104) to the stored ?les. Access by the near-?eld communi
cations transceiver (112) is provided to the stored ?les by
May 22, 2008 (US) ..... . . . . . . . . . . . . . . . . . . .. 61/055432 running either a Java-based emulator for accessing the ?rst set

May 22, 2009 (1B) ................... .. PCT/IB2009/052145 0f ?les or Java APIs to access the second set of ?les.

{- 150
f 112 f 114
(- 102
r104
OTA Transceiver 1 I Legacy Commumcallon
\ / Protocol
\IV
OTA Transceiver

,116 K118
,/ \. \Ep
Xx \ // _\ '
OTA Transceiver _ New cgggggllcauon
\ V

Memory .'\/ /\ i
Processor
_//'

I l" /120 (122

45/ \ A; J. L _ I
l NFC Transceiver \ egacy Communication
\1 /, Protocol
r112 V
//
j," .1
NFC Transceiver r124 (126

. A- l\ . .
m. NFC Transceiver I New Commumcahon
_ / Protocol
Patent Application Publication Jul. 28, 2011 Sheet 1 0f 7 US 2011/0183611 A1

2:\ MOZUWCNI \i
21\

21
T
/

>1 7,
\/>hO\w_ UEOLl_2

Al.Ubw
Patent Application Publication Jul. 28, 2011 Sheet 3 of7 US 2011/0183611 A1

.UHmN

cn-rw

w? mm knew.
Patent Application Publication Jul. 28, 2011 Sheet 5 0f 7 US 2011/0183611 A1

FIG. 4

Terminal Reader

REQA

3-H: ATQA

ANTI<COLLISION

ild-N?.
D
CS

W
w
HSK
m
m
a
Mw

:ih-l.H-
Patent Application Publication Jul. 28, 2011 Sheet 6 0f 7 US 2011/0183611 A1

TReramidnerl 54 .------.----Y.--- ---..


US 2011/0183611A1 Jul. 28, 2011

METHODS, SYSTEMS AND ?le-identi?ers of a ?rst size and the second set of ?les iden
ARRANGEMENTS FOR WIRELESS ti?ed by ?le-identi?ers of a second size that is a different size
COMMUNICATION WITH NEAR-FIELD from the ?rst size. A processor is used for providing access by
COMMUNICATION TERMINALS the OTA transceiver to the stored ?les, and providing access
by the near-?eld communications transceiver to the stored
?les by running, as a default, a J ava-based emulator for
[0001] The present invention relates generally to Wireless accessing the ?rst set of ?les, and otherWise running one or
communications, and more speci?cally, to mobile stations more Java application-programming interfaces (APIs) to
that interface With near-?eld communications terminals. access the second set of ?les.
[0002] In order to ensure interoperability of transport sys [0008] Another embodiment of the present invention
tems, the American Public Transit Association (APTA) has relates to a method for use With a mobile station having an
published the Universal Transit Fare Card Standards (UTFS). over-the-air (OTA) transceiver for Wireless communication
[0003] For the applicative data protocol, the UTFS speci? With a trusted service manager, a near-?eld communications
cations rely on ISO 7816-4 standards. The UTFS and other transceiver for communication With a terminal reader that
ISO7816-4 based public transportation speci?cations are rap uses a data exchange protocol that includes ?le-identi?ers of
idly becoming standardized for mass transit organizations; a ?rst size, a memory for storing ?les and a processor. Files
hoWever, adhering system integrators are still using DESFire stored in the memory are arranged according to tWo different
plastic cards, Which not only meet the ISO 7816-4 speci?ca sets of ?les, the ?rst set of ?les identi?ed by ?le-identi?ers of
tions but also compete on cost-effectiveness compared to Java a ?rst size and the second set of ?les identi?ed by ?le-iden
cards. DESFire cards are massively deployed in advanced ti?ers of a second size. The processor is used to provide
public transportation around the World, and some government access by the OTA transceiver to the stored ?les, and provide
infrastructures (e. g., NASA and United States Department of access by the near-?eld communications transceiver to the
Defense). A DESFire card is a microprocessor-based card, stored ?les by running, as a default, a J ava-based emulator for
compliant to all 4 levels of ISO/IEC 144443A, running a accessing the ?rst set of ?les, and otherWise running one or
special purpose operating system (OS), referred as the DES more Java APIs to access the second set of ?les.
Fire OS. As a contactless card relying on NFC technology, a [0009] Another embodiment of the present invention
DESFire card can be typically read at a distance of ten cen relates to a system having a trusted service manager, a termi
timeters by a Proximity Coupling Device (PCD) or Terminal nal reader, and a mobile station. The mobile station has an
Reader. It features a memory capacity of four Kilobytes. The over-the-air (OTA) transceiver for Wireless communication
DESFire OS features the possibility to have several applica With the trusted service manager. The mobile station also has
tions and multiple ?les. a near-?eld communications transceiver for communication
[0004] Mobile Network Operators are also planning to roll With a terminal reader that uses a data exchange protocol that
out NFC enabled Mobile Stations While delegating the OTA includes ?le-identi?ers of a ?rst size. A memory stores ?les
provisioning of virtual cards into UICCs, emulating plastic arranged according to tWo different sets of ?les, the ?rst set of
cards. In the near future, NFC-value added services are going ?les identi?ed by ?le-identi?ers of a ?rst size and the second
to be deployed over Global System for Mobile (GSM) (25G), set of ?les identi?ed by ?le-identi?ers of a second size. A
Universal Mobile Telecommunications System (UMTS) processor is used for providing access by the OTA transceiver
(3G) and other next-generation netWorks in NFC-enabled to the stored ?les, and providing access by the near-?eld
Mobile Stations. A typical Mobile Station shall be composed communications transceiver to the stored ?les by running, as
of a UMTS Integrated Circuit Chip (UICC) and a NFC chip a default, a J ava-based emulator for accessing the ?rst set of
enabled handset leveraging both on Java technology. Along ?les, and otherWise running one or more Java APIs to access
With storing user subscriber information, the UICC can con the second set of ?les.
tain banking, event ticketing, transit, loyalty and other appli [0010] The above summary is not intended to describe each
cations provisioned over-the-air (OTA). embodiment or every implementation of the present disclo
[0005] The GSM Association (GSMA) refers entities hav sure. The ?gures and detailed description that folloW more
ing this important OTA provisioning role in the mobile NFC particularly exemplify various embodiments.
ecosystem as Trusted Service Managers. These Trusted Ser [0011] The invention may be more completely understood
vice Managers shall mainly rely on 3GPP, ETSI-SCP and in consideration of the folloWing detailed description of vari
Global Platform technical speci?cations for the OTA provi ous embodiments of the invention in connection With the
sioning mechanisms. Applications based on proprietary tech accompanying draWings, in Which:
nologies such as Mifare Classic and DESFire require other
provisioning mechanisms not addressed by the current tech [0012] FIG. 1A is a system that includes a mobile station
nical speci?cations. that communicates using either legacy protocols or neW pro
tocols, according to an example embodiment of the present
[0006] A variety of near-?eld communication related
devices, methods and systems are implemented in various invention;
fashions. [0013] FIG. 1B shoWs a Mobile Station deployed by a
[0007] One embodiment of the present invention includes a Mobile NetWork Operator for NFC-value added services pro
mobile station With an over-the-air (OTA) transceiver for visioning via a Trusted Service Manager, according to an
Wireless communication With a trusted service manager. The example embodiment of the present invention;
mobile station also has a near-?eld communications trans [0014] FIG. 2 shoWs memory organization for the Mifare
ceiver for communication With a terminal reader that uses a memory emulation, according to an example embodiment of
data exchange protocol that includes ?le-identi?ers of a ?rst the present invention;
size. A memory is used for storing ?les arranged according to [0015] FIG. 3 shoWs an example ?le system consistent With
tWo different sets of ?les, the ?rst set of ?les identi?ed by an embodiment of the present invention;
US 2011/0183611Al Jul. 28, 2011

[0016] FIG. 4 shows communications between the Service mobile device. Various ?les can be created or modi?ed during
Providers NFC Terminal and a Mobile Station emulating an initialization, such as personalized data for a particular
ISO 14443A card, according to an example embodiment of mobile station user or security information for verifying
the present invention; future transactions. Con?guration can also include subse
[0017] FIG. 5 shows applicative dialogs between a Termi quent modi?cation of stored ?les including, but not limited to,
nal Reader and the UICC hosting both the Mifare4Mobile updates to security information or to software applications.
Applet and the DESFire Applet, according to an example [0024] In a speci?c embodiment of the present invention,
embodiment of the present invention; and the mobile station includes a handset that allows for both
[0018] FIG. 6 shows that the Trusted Service Manager over-the-air (OTA) communications and near-?eld commu
needs to be granted create ?le rights into the UICC by the nications. As used herein OTA denotes communications
Mobile Network Operator, according to an example embodi capable of transmitting at distances exceeding a meter,
ment of the present invention. whereas, near-?eld communications (NFC) only operate a
[0019] While the invention is amenable to various modi? distances less than about a meter. A speci?c type of OTA
cations and alternative forms, speci?cs thereof have been communications are cellular-based communications, such as
shown by way of example in the drawings and will be GSM (2.5G) or UMTS (3G).
described in detail. It should be understood, however, that the [0025] One embodiment of the present invention relates to
intention is not to limit the invention to the particular embodi
a speci?c type of NFC chip (e.g., a smartcard) that complies
ments described. On the contrary, the intention is to cover all with ISO 14443A and also with ISO 14443-4. A particular
modi?cations, equivalents, and alternatives falling within the example provides Data Encryption Standard/Triple Data
scope of the invention including aspects de?ned by the Encryption Standard (DES/3DES) encryption of stored and
appended claims. transmitted data. A NFC IC chip using the Mifare-DESFire
[0020] The present invention is believed to be applicable to protocol is a speci?c example of such an embodiment. While
a variety of different types of processes, devices and arrange the invention is not so limited, the following discussion is
ments for use with wireless communications, and in particu directed toward such a speci?c embodiment.
lar, to approaches for use with mobile stations that commu
nicate using near-?eld communications and/or over-the-air [0026] Stored ?les in such a Mifare Objects include legacy
communications. While the present invention is not necessar
Mifare applications. The objects are essentially grouped into
two types:
ily so limited, various aspects of the invention may be appre
ciated through a discussion of examples using this context. [0027] Classic Mifare Objects: Mifare Classic 1 k and 4
[0021] Consistent with an example embodiment of the k applications; and
present invention, a mobile station is implemented. The [0028] DESFire Mifare Objects: DESFire applications
mobile station includes a cellular transceiver for wireless herein referred to as DESFire Applets.
communication with a trusted service manager. A near-?eld [0029] FIG. 1A is a system that includes a mobile station
communications (NFC) transceiver communicates with a ter that communicates using either legacy protocols or new pro
minal reader using a data exchange protocol (e.g., DES?re) tocols, according to an example embodiment of the present
that includes ?le-identi?ers of a ?rst size. A memory stores invention. Mobile Station 102 communicates with remote
?les arranged according to two different sets of ?les, the ?rst Station(s) 150 using one of two different transceivers. The
set of ?les (e.g., DES?re) identi?ed by ?le-identi?ers of a ?rst ?rst transceiver 104 is an OTA transceiver, whereas the sec
size and the second set of ?les identi?ed by ?le-identi?ers of ond transceiver 112 is an NFC transceiver. Processor 108
a second size (e. g., formatted according to Java, Global Sys provides access to memory 106 to Mobile Stations 102.
tem for Mobile (GSM) (2.5G) or Universal Mobile Telecom Remote stations 150 can include a number of different trans
munications System (UMTS) (3G)). A processor provides ceivers (112, 116, 120 and 124). These transceivers can be
access, by the cellular transceiver, to the stored ?les. The either OTA-based or NFC-based. The transceivers can be
processor also provides access, by the NFC transceiver, to the operated using either legacy protocols (114, 122) or new
stored ?les. The processor runs, as a default, a Java-based protocols (118, 126).
emulator for accessing the ?rst set of ?les. If a selection of a [0030] Memory 106 contains software code that, when
speci?c ?le is otherwise provided, the processor implements executed on processor 108, provides an interface to transceiv
the selected ?le, which may include one or more Java APIs ers operating according to either protocol. In a speci?c
associated with the second set of ?les. instance, the new protocol is a Java protocol operating using
[0022] Aspects of the invention can be useful for a mobile various Java ?les/applets. In a speci?c instance, the legacy
station that interfaces with systems using otherwise incom protocol is a non-Java protocol. For Remote Stations 150 that
patible communication protocol. In particular, the systems operate using the new protocol, access requests to the Java
may use ?le systems that have different ?le-identi?cation ?les/ applets are accomplished using ?le identi?ers that have
protocols. Software con?gured for one of the ?le-identi?ca a ?rst format. For Remote Stations 150 that operate using the
tion protocols would not properly handle data requests for legacy protocol, access requests to legacy ?les are accom
matted according to a different ?le-identi?cation protocol. plished using a second format. The second format includes a
The mobile station includes emulation software that emulates ?le/application identi?er that is not supported within the new
one of the ?le-identi?cation protocols. This can be particu format. Moreover, an implementation that used conventional
larly useful for use with external sources (e.g., terminal read mechanisms to decode the legacy format would either detect
ers) that are only con?gured to use the emulated ?le-identi an improper request or erroneously decode the request.
?cation protocols. Accordingly, the processor 108 uses the second format as the
[0023] Aspects of the invention can be useful for allowing default format. If processor 108 determines that the access
a Trusted Service Manager to con?gure the mobile station. request is consistent with the ?rst format, processor 108 uses
Con?guration can include, for example, initialization of the the conventional mechanisms.
US 2011/0183611A1 Jul. 28, 2011

[0031] In one embodiment, the processor 108 is further CHANNEL commands, Which are handled by the Java Card
con?gured to use conventional Java applets (associated With Runtime Environment (JCRE).
the neW protocol) to perform one or more functions associ [0039] The ISO 7816-5 speci?cations de?ne Application
ated With the legacy protocol. For example, one or more Identi?ers (AIDs) as parameters for an application selection
cryptography functions may be common (or similar) to both command via the ISO 7816-4 SELECT command. An AID
protocols. consists of the concatenation of an RID (Registered Applica
[0032] In a speci?c embodiment, transceiver 112 is imple tion Provider Identi?er) and a PIX (Proprietary Application
mented using a NFC transceiver that is poWered via a radio Identi?er Extension). The RID has a length of ?ve bytes,
frequency (RF) signal received from one of the remote sta Whereas the PIX has a variable length of betWeen Zero and
tions. In one instance, transceiver 104 is implemented using a eleven bytes. Thus, the length of an ISO 7816-5 compliant
cellular transceiver. The mobile station 102 can include vari AID varies betWeen ?ve to sixteen bytes. RIDs can be regis
ous functionality associated With the cellular transceiver tered through the ISO standardization group.
including, but not limited to, mobile phone, personal digital [0040] The Mifare4Mobile Applet uses the ISO781 6-5 reg
assistant, mobile television and Internet access. istered DESFire AID Which has the folloWing hexadecimal
[0033] FIG. 1B shoWs a Mobile Station deployed by a string value: D2 76 00 00 85 01 00.
Mobile Network Operator for NFC-value added services pro [0041] As the Trusted Service Managers on-card compo
visioning via a Trusted Service Manager, according to an nent, the Mifare4Mobile Applet is able to interface With the
example embodiment of the present invention. This system DESFire OS emulation and to provision DESFire Applets.
can be implemented Without infrastructure changes for the [0042] The Trusted Service Managers backend system is
Service Provider and its System Integrator, by leveraging composed of Secure OTA Channels, Secure Connectors and a
from legacy DESFire-based Terminal Readers. Physically, Core Platform. The OTA Channels are used for secure ses
the Mobile Station is composed of an NFC chip-enabled sions With Mobile Stations over the Mobile NetWork Opera
handset With a UICC. In a speci?c implementation, the tors Wireless netWork. The Connectors are used for secure
Mobile Station is a cellular device, such as a handheld phone Web-based sessions With Service Providers. The Core Plat
or similar communication device. form represents the central component of the Trusted Service
[0034] In a particular embodiment, the Mobile Station pro Managers backend system. This backend system embeds a
vides full compliance to all levels of ISO 14443A by operat secure and fast-queriable database to store provisioning-re
ing in a card emulation mode. The Mobile Station can also be lated information. Besides scalability and robustness, the
compliant With the ISO 14443-4 Protocol and Parameter backend system can include logic for communicating With
Selection (PPS) feature of a DESFire card, Which alloWs a Mobile Stations that host the Trusted Proxy and
non-symmetrical information interchange baud rate. Mifare4Mobile Applet.
[0035] The Mobile Station hosts tWo applications respon [0043] FIG. 2 shoWs memory organiZation for the Mifare
sible for the provisioning mechanisms of Mifare applications. memory emulation, according to an example embodiment of
These applications are the Trusted Proxy MIDlet and the the present invention. The memory organiZation includes four
Mifare4Mobile Applet. Kilobytes (KB) of EEPROM With 3480 bytes freely avail
[0036] The Trusted Proxy MIDlet is located in the Java able. Forty securely separated sectors support multi-applica
handset stack, Which features Java Speci?c Requests (JSR) tion. Thirty-tWo sectors are implemented as four blocks With
120, 177 and 257. The Trusted Proxy MIDlet is triggered by a length of sixteen bytes. Eight sectors are implemented as
a short message service (SMS)-PUSH from the Trusted Ser sixteen blocks With a length of sixteen bytes 2><48 bit keys per
vice Manager consistent With J SR 120. The Trusted Proxy sector for key hierarchy. Access conditions are con?gurable
MIDlet uses J SR 177 to forWard the Trusted Service Manag based on tWo-level key hierarchy.
ers Application Protocol Data Units (APDUs) to the [0044] To comply With the Mifare4Mobile solution, the
Mifare4Mobile Applet. The Trusted Proxy MIDlet also uses DESFire read-only seven-byte UID is required to be set into
the NFC push mechanism from JSR 257 for generating an the UICCs Mifare memory emulation before deployment.
alert indicating that an unauthorized reader attempted to com [0045] A DESFireApplet uses for its applicative data struc
municate With the DESFire emulated card. ture, the ISO 7816-4 de?ned Application Protocol Data Unit
[0037] The Mifare4Mobile Applet is a Card Application (APDU) protocol. These APDU-structured commands are
Toolkit Applet that can securely communicate over a Wireless referred to as DESFire commands. In terms of security, all
netWork With a trusted backend provisioning system via data are protected using cryptographic algorithms, such as
ENVELOPE APDUs. As de?ned by ISO 7816-4, an ENVE DES, 3DES or Advanced Encryption Standard (AES). HoW
LOPE APDU is used to transmit APDUs or part ofAPDUs or ever, a standard DESFire OS does not integrate With standard
other data strings that otherWise could not be transmitted by Java Card technology. Speci?cally, DESFire Applets are not
the available protocols. This transmission protocol is rein Java Card Applets. Consequently, legacy DESFire Applets
forced by the J SR 177, Which mandates that all APDUs com running on DESFire cards cannot be provisioned into Java
ing to the UMTS Integrated Circuit Chip (UICC) via the cards using ETSI-SCP speci?cations.
netWork need to be in ENVELOPE format. [0046] The DESFire OS emulation has the folloWing fea
[0038] As a Java Card application, the Mifare4Mobile tures
Applet can install and delete classic Mifare Objects. The [0047] 28 DESFire Applets
Mifare4Mobile Applet is provisioned into the UICC using [0048] 32 ISO7816-4 compliant ?les per DESFire
ETSI and Global Platform card speci?cations. It has the Applet
Default Selected application privilege When the UICC is [0049] 35 ISO7816-4 structured DESFire commands
emulating an ISO14443 card. This privilege alloWs it to [0050] Cryptographic services
handle any APDU commands during a proximity transaction [0051] Mifare-Standardized application identi?ers for
except the ISO 7816-4 de?ned SELECT and MANAGE DESFire Applets
US 2011/0183611A1 Jul. 28, 2011

[0052] Automatic maintenance of the Mifare Applica [0082] Six Security Level Commands:
tion Directory (MAD) [0083] Authenticate
[0053] The DESFire OS has an ISO 7816-4 compliant [0084] Change KeySettings
organization for its ?le system. [0085] Set Con?guration
[0054] As Java Card technology does not provide APIs for [0086] Get KeySettings
ISO 7816-4 ?le system, the Mifare4Mobile Applet relies on [0087] Change Key
its Toolkit functionality to read and Write in the GSM ?le [0088] Get KeyVersion
system. Thus, the Mifare4Mobile Apple can interface With [0089] Nine Application Level Commands:
the entire DESFire ?le system emulation, Which has a capac
[0090] Get FileIDs
ity of 896 ?les, and 28 directories Where a directory repre
[0091] Get FileSettings
sents a DESFire Applet. The emulation takes into account that
[0092] Change FileSettings
[0093] Create StdDataFile
a DESFire ?le is addressable by one-byte identi?er Whereas a [0094] Create BackupDataFile
GSM ?le is addressable by a tWo-byte identi?er. The security [0095] Create ValueFile
feature of the GSM ?le system via access conditions combin [0096] Create LinearRecordFile
ing Personal Identity Numbers (PINs) and Personal Unblock [0097] Create CyclicRecordFile
ing Keys (PUKs) is also leveraged by associating each DF [0098] Delete File
containing a DESFire Applet With a Card Holder Veri?cation [0099] Eleven Data Manipulation Commands:
(CHV) corresponding to the application key. [0100] Read Data
[0055] The DESFire emulation has tWo categories of ?les: [0101] Write Data
[0056] Dedicated File (DF) [0102] Get Value
[0057] Elementary File (EF) [0103] Credit
[0058] The root of the DESFire ?le system is in a DF [0104] Debit
relative to the MF of the GSM ?le system, Which has the [0105] Limited Credit
3F00 reserved value. Thus, the DF containing the DESFire [0106] Write Record
[0107] Read Records
?le system is referred to as DFMifare4Mobile With the value [0108] Clear RecordFile
XXXX. If desired, this value can be reserved by the appro [0109] Commit Transaction
priate standard body. [0110] Abort Transaction
[0059] A DESFire Applet has ?ve types of ?les divided into [0111] The Mifare4MobileApplet uses the Java Card cryp
three groups: tographic APIs to emulate the security features of a DESFire
[0060] Transparent card prior to data transmission. Encryption algorithms
[0061] StdDataFile include DES, 3DES and AES. Cryptographic checksum can
[0062] BackupDataFile also be supported.
[0112] Each application can include a key ?le. The four
[0063] ValueFile different ?le access rights featured in a DESFire card are also
[0064] Linear supported. These access rights are:
[0065] LinearRecordFile [0113] Read Access
[0066] Cyclic [0114] Write Access
[0067] CyclicRecordFile [0115] Read & Write Access
[0068] The DFMifare4Mobile can contain at least 28 DFs [0116] Change Access Rights
Where each DF is a DESFire Applet, containing up to 32 [0117] A one-byte access right key is associated to each
DESFire Applet ?les. ?le. The value OxE refers to Free access While OxF refers to
Never access conditions. Access to user data is granted on
[0069] FIG. 3 shoWs an example ?le system consistent With
an embodiment of the present invention. The ?le system the application level. For each application, a maximum of
includes both a GSM ?le system and a DESFire ?le system. fourteen user de?nable keys can be assigned to control access
The DESFire ?le system contains a DESFire Applet With ?ve to data stored in the DESFire emulation.
different ?les. [0118] Terminal Readers access DESFire cards via all four
levels of ISO 14 4443 and optional ISO 7816-4 commands
[0070] All commands and data frames exchanged betWeen
the Mobile Station and the Terminal Reader are using block (APDUs).
[0119] The DESFire OS uses a proprietary AID standard
format as de?ned in ISO 14443-4.
based on Mifare standards, Which assign a three-byte AID for
[0071] The Mifare4Mobile Applet implements all 35 DES a DESFire Applet. The Mifare Standardization group man
Fire commands (listed hereafter), Which are based on ISO dates the folloWing AID format convention for DESFire
71816-4 APDU structure. Applets:
[0072] Nine Proximity Integrated Circuit Chip (PICC)
Level Commands:
[0073] Create Application
DESFire AID Byte 0 DESFire AID Byte 1 DESFire AID Byte 2
[0074] Delete Application Nibble 0 Nibble 1 Nibble 2 Nibble 3 Nibble 4 Nibble 5
[0075] Get Application IDs OxF Mifare Classic AID 0x0 . . . OxF

[0076] Free Memory


[0077] GetDFNames [0120] The three-byte DESFire AID encapsulates the
[0078] Select Application Mifare Classic AID.
[007 9] Format PICC [0121] The ?rst nibble of the DESFire AID is ?xed to OxF
[0080] Get Version to indicate Mifare classic AID is used. The next four nibbles
[0081] GetCardUID hold the Mifare Classic AID. The last nibble ranges from Zero
US 2011/0183611A1 Jul. 28, 2011

to sixteen to support multiple DESFire AIDs Within the con card Master Key used to release memory. The Mifare4Mobile
text of one Mifare classic AID. The DESFire Applet AID Applet executes this command in response to authentication
OxFFFFFF is reserved as it is used to store general issuer of the host party (e.g., a Trusted Proxy of the Trusted Service
information. Manager).
[0122] In ISO 14443A card emulation mode, an NFC [0127] While the present invention has been described
enabled Mobile Station Would not understand the data above and in the claims that folloW, those skilled in the art Will
exchange protocol initiated by the NFC terminal reader recogniZe that many changes may be made thereto Without
(PCD) if no SELECT [AID] command conforming to both departing from the spirit and scope of the present invention.
ISO 7816-4 and ISO 7816-5 is issued. To remedy to this
problem, the emulating Mobile Station is required to set the 1. A mobile station comprising:
Mifare4Mobile Applet as the default selected Applet, Which an over-the-air transceiver for Wireless communication
acting as a proxy, forWards the APDUs of the NFC Terminal With a trusted service manager;
to the DESFire Applet. This implicit selection mechanism a near-?eld communications transceiver for communica
alloWs the Mobile Station to emulate a DESFire card via the tion With a terminal reader that uses a data exchange
Mifare4Mobile Applet. Accordingly, When a SELECT com protocol that includes ?le-identi?ers of a ?rst siZe;
mand is used, the selected application Will be use and When no a memory for storing ?les arranged according to tWo dif
SELECT command is used the Mifare4Mobile Applet is ferent sets of ?les; and
used. a processor con?gured to
[0123] FIG. 4 shoWs communications betWeen the Service provide access via the OTA transceiver to the stored
Providers NFC Terminal and a Mobile Station emulating an ?les, and
ISO 14443A card, according to an example embodiment of provide access via the near-?eld communications trans
the present invention. The NFC terminal, Which alWays ini ceiver to the stored ?les by
tiates dialog, probes the RF ?eld for type A cards With the When no selection command is provided, accessing
Request A (REQA) command. All cards in the ?eld respond the ?rst set of ?les using a Java-based emulator, and
to that command With the AnsWer to REQA (ATQA). The When a selection command is provided, accessing the
anti-collision mechanism alloWs the selection of the Mobile second set of ?les using one or more Java applica
Station. The exchanges described in FIG. 4 represent com tion-programming interfaces.
munications betWeen the Service Providers NFC Terminal 2. The mobile station of claim 1, Wherein the processor
and a Mobile Station emulating an ISO 14443A card. In a provide cryptographic functions using one of the Java APIs.
speci?c instance, these communications conform to all four 3. The mobile station of claim 1, Wherein the ?rst set of ?les
levels of the ISO 14443A standard. identi?ed by ?le-identi?ers of a ?rst siZe and the second set of
[0124] FIG. 5 shoWs applicative dialogs betWeen a Terrni ?les identi?ed by ?le-identi?ers of a second siZe that is a
nal Reader and the UICC hosting both the Mifare4Mobile different siZe from the ?rst siZe and Wherein the Java based
Applet and the DESFire Applet, according to an example emulator is con?gured to access 28 dedicated ?les each hav
embodiment of the present invention. The applicative data ing 32 elementary ?les.
transmission protocol is compliant to ISO 7816-4 standard. 4. The mobile station of claim 3, Wherein the processor
DESFire APDU commands are used. The exchanges shoWn uses one of personal identi?cation numbers, personal
in FIG. 5 describe applicative dialogs betWeen a Terminal unblocking keys and application keys for controlling access
Reader and the UICC hosting both the Mifare4Mobile Applet to each ?le.
and the DESFire Applet. Within the Terminal Reader RF
5. The mobile station of claim 3, Wherein the processor is
?eld, the Mobile Station, implicitly the UICC, is emulating an con?gured to alloW con?guration of the DES?re ?les via the
ISO 14443A card. Thus, the JCRE shall receive most APDUs
OTA transceiver and Wherein the OTA transceiver is a cellular
(except, for example, ENVELOPE APDUs). transceiver.
[0125] Service Providers provision actual DESFire Applets 6. The mobile station of claim 3, Wherein one or more of the
into plastic DESFire cards by programming them. This pre ?les contain transaction data for a user of the mobile station.
issuance method consists of using DESFire command sets
7. A method for use With a mobile station having an over
While leveraging on ETSI-SCP. InitialiZation data is loaded
the-air transceiver for Wireless communication With a trusted
into access right pre-con?gured ?les.
service manager, a near-?eld communications transceiver for
[0126] FIG. 6 shoWs that the Trusted Service Manager communication With a terminal reader that uses a data
needs to be granted create ?le rights into the UICC by the exchange protocol that includes ?le-identi?ers of a ?rst siZe,
Mobile NetWork Operator, according to an example embodi a memory for storing ?les and a processor, the method com
ment of the present invention. This is for the purposes of prising:
recreating the DESFire Applet into the GSM ?le system. The
arranging ?les stored in the memory according to tWo
Service Provider provides to the Trusted Service Manager the
different sets of ?les; and
required parameters including the application speci?c key for
recreating the DESFire Applet. AfterWards, the Trusted Ser using the processor to
vice Manager forWards the data to the Mifare4Mobile Applet. provide access by the OTA transceiver to the stored ?les,
Similar to an optional delegated management mechanism and
described in Global Platform card speci?cations 2.1.1, the provide access by the near-?eld communications trans
Trusted Service Manager provides a secure channel to the ceiver to the stored ?les by
Service Provider to install a DESFire Applet Without divulg running, as a default, a Java-based emulator for
ing its service Master Key. For that matter the Mifare4Mobile accessing the ?rst set of ?les, and
Applet uses a PICC level Change Key DESFire command, otherWise accessing the second set of ?les using one
Which alloWs for subsequent modi?cation of the DESFire or more Java application programming interfaces.
US 2011/0183611Al Jul. 28, 2011

8. The method of claim 7, further including the step of a processor for


providing cryptographic functions using one or more Java providing access by the OTA transceiver to the stored
APIs. ?les, and
9. The method of claim 7, Wherein the ?rst set of ?les providing access by the near-?eld communications
identi?ed by ?le-identi?ers of a ?rst siZe and the second set of transceiver to the stored ?les by
?les identi?ed by ?le-identi?ers of a second siZe and Wherein running, as a default, a Java-based emulator for
the Java based emulator is con?gured to access 28 dedicated accessing the ?rst set of ?les, and
otherWise running one or more Java application
?les each having 32 elementary ?les.
programming interfaces to access the second set
10. The method of claim 9, further including the step of of ?les.
controlling access to the ?les using one of a personal identi 14. The system of claim 13, Wherein the processor provide
?cation number, a personal unblocking key and an applica cryptographic functions using one or more of the Java APIs.
tion key. 15. The system of claim 13, Wherein the Java based emu
11. The method of claim 9, further including the step of lator is con?gured to access 28 dedicated ?les each having 32
con?guring the DES?re ?les via the OTA transceiver and elementary ?les.
Wherein the OTA transceiver is a cellular transceiver. 16. The system of claim 15, Wherein the processor control
12. The method of claim 9, Wherein one or more of the ?les access to each ?le using one of a personal identi?cation
contain transaction data for a user of the mobile station. number, a personal unblocking key and an application key.
13. A system comprising: 17. The system of claim 15, Wherein the processor is con
?gured to alloW con?guration of the DES?re ?les via the OTA
a trusted service manager; transceiver and Wherein the OTA transceiver is a cellular
a terminal reader; and transceiver.
a mobile station having 18. The system of claim 15, Wherein one or more of the ?les
an over-the-air transceiver for Wireless communication contain transaction data for a user of the mobile station.
With the trusted service manager; 19. The system of claim 13, Wherein the terminal reader
authenticates a user using data from the ?les stored in the
a near-?eld communications transceiver for communi memory and communicated using near-?eld communications
cation With a terminal reader that uses a data exchange transceiver.
protocol that includes ?le-identi?ers of a ?rst siZe; 20. The system of claim 13, Wherein the trusted service
a memory for storing ?les arranged according to tWo manager includes a server connected to another OTA
different sets of ?les, the ?rst set of ?les identi?ed by transceiver.
?le-identi?ers of a ?rst siZe and the second set of ?les
identi?ed by ?le-identi?ers of a second siZe; and

Das könnte Ihnen auch gefallen