专利摘要:
A method comprising: emulating, by an NFC (Near Field Communication) router (202) an NFC device (102), in response to a command from a NFC device processing device (206) , an RF card emulation transaction comprising sending by the NFC router a command addressed to first and second secure elements (210, 212) of the NFC device to check the presence of NFC transaction applications in the first and second secure elements; receiving, by the NFC router (202), responses from the first and second secure elements (210, 212) indicating the NFC transaction applications stored by the first and second secure elements; and receiving, by the NFC router (202), a new RF message from an NFC terminal (106) concerning an NFC transaction and routing the new RF message to the first or second secure element based on the responses.
公开号:FR3040226A1
申请号:FR1557765
申请日:2015-08-17
公开日:2017-02-24
发明作者:Nieuwenhuyze Olivier Van;Jean-Marc Grimaud;Brahim Arach Mohammed
申请人:Proton World International NV;STMicroelectronics Rousset SAS;
IPC主号:
专利说明:

NPC DEVICE HAVING MULTIPLE SECURE ELEMENTS
Field
The present description relates to the field of NFC communications, and in particular an NFC device provided with several secure elements and a method for routing messages in such a device.
Presentation of the prior art
Mobile phones and other types of mobile devices are increasingly equipped with NFC (Near Field Communication) interfaces, which enable them to perform electromagnetic transponder functions in addition to their own. other functions. In particular, such devices are capable of emulating the functions of an electromagnetic transponder, which could be of the contactless card type, or of the non-contact reader type. Such functionalities improve for example the mobile device by allowing it to be used for various applications, for example as an electronic wallet making payments to access services such as transport networks.
To emulate the operation of a contactless card, the mobile device is generally equipped with a front-end integrated circuit (CLF), also called NFC router. This router is equipped with a radio-frequency (RF) transceiver front-end device coupled to a short-range antenna to adapt to the communication capabilities of an electromagnetic transponder. In certain applications, one or more secure elements (SE) or integrated secure elements (eSE), which are either integrated in the mobile device or contained in a microcircuit of the module USIM (universal subscriber identification module) or pSD (micro -secured digital), can be used to provide authentication and other functions.
The NFC router includes an NFC routing table, which indicates to which hardware element the NFC messages received by the NFC router are to be routed. For example, certain NFC messages, such as those concerning certain types of electronic payments, must be routed to a secure element of the mobile device. For example, a VISA application can run in communication with a secure element of a USIM module (the name "VISA" may correspond to registered trademarks).
In some cases, the mobile device comprises more than one secure element, and there may be one or more applications stored by each secure element that are capable of handling a given transaction. In such a case, it is desirable that the mobile device is able to select the application to use among the applications available on all the secure elements.
However, there is a difficulty in that the NFC router is not aware of the list of applications stored by each secure element. In addition, when an RF message is received and needs to be routed to a secure element, it is not allowed to query, and there is also no time for that, all secure elements so obtain the lists of applications available on each secure element. There is therefore a need in the art for a solution that meets some or all of these difficulties. summary
An object of embodiments of the present disclosure is to at least partially meet one or more needs of the interior art.
In one aspect, there is provided a method comprising: emulating, by an NFC (near-field communication) router of an NFC device, in response to a command from an NFC device processing device, an emulation transaction of RF card (radio frequency), the emulation comprising the transmission, by the NFC router, of a command addressed to the first and second secure elements of the NFC device to check the presence of one or more NFC transaction applications in the first and second secure elements; receiving, by the NFC router, responses from the first and second secure elements indicating said one or more NFC transaction applications stored by the first and second secure elements; and receiving, by the NFC router, a new RF message from an NFC terminal relating to an NFC transaction and routing the new RF message to the first or second secure element based on the responses.
According to one embodiment, the method further comprises: generating a global list of available NFC transaction applications based on the responses; and providing the global list to the NFC terminal in response to the new RF message.
According to one embodiment, the method further comprises, after generating the global list of available NFC transaction applications, storing the list in a memory of the NFC router.
According to one embodiment, the global list of available NFC transaction applications is generated by the processing device of the NFC device.
According to one embodiment, said one or more NFC transaction applications are payment applications, and the control includes a PPSE selection command (proximity payment system environment). According to one embodiment, each of said one or more NFC transaction applications is associated with a system code value, and the control includes an interrogation message including a system code value.
According to one embodiment, the method further comprises checking the presence of one or more NFC transfer applications on the first and second secure elements by accessing, via the NFC router or the processing device, one or more bits of a SAK value (selection acknowledgment, type A) of each secure element, stored in a register of the NFC router.
According to one embodiment, the method further comprises generating a routing table on the basis of said responses, and storing the routing table in a memory of the NFC router.
According to one embodiment, the method further comprises, before routing the new RF message to the first or second secure element, a selection of the first or second secure element to which the new RF message is to be routed on the basis of the routing table.
According to one embodiment, the method further comprises, before routing the new RF message to the first or second secure element, responding to the new RF message by communicating identifiers of at least two of the transaction applications to the new RF message. NFC terminal, and receive from the NFC terminal a selection of one of the NFC transaction applications.
According to one embodiment, each of the first and second secure elements stores an NFC payment transaction application.
According to another aspect, there is provided a digital storage medium storing instructions which, when executed by a processing device, cause the implementation of the aforementioned method.
In another aspect, there is provided an NFC (Near Field Communication) device including an NFC router adapted to: emulate, in response to a command from an NFC device processing device, an RF card emulation transaction ( radio frequency), the 1-a transaction emulation comprising the transmission, by the NFC router, of a command addressed to first and second secure elements of the NFC device to check the presence of one or more NFC transaction applications in the first and second secure elements; receiving responses from the first and second secure elements indicating said one or more NFC transaction applications stored by the first and second secure elements, a global list of available NFC transaction applications being generated based on the responses; and receiving a new RF message from an NFC terminal relating to an NFC transaction and routing the new RF message to the first or second secure element based on the global list of available NFC transaction applications.
According to one embodiment, the processing device or the NFC router is adapted to generate a global list of available NFC transaction applications based on said responses, and to provide the global list to the NFC terminal in response to the new RF message.
Brief description of the drawings
The foregoing and other features and advantages will become apparent upon reading the following detailed description of illustrative and not limiting embodiments, with reference to the accompanying drawings, in which: FIG. 1 schematically illustrates an NFC device capable of NFC communications according to an exemplary embodiment of the present description; FIG. 2 diagrammatically illustrates the NFC device of FIG. 1 in more detail according to an exemplary embodiment of the present description; FIG. 3 schematically illustrates components of the NFC device of FIG. 2 in even more detail according to an example embodiment of the present description; Fig. 4 is a flowchart illustrating an exemplary operation in an RF message routing method according to an exemplary embodiment of the present disclosure; FIG. 5 illustrates an example of a data packet of an F-type NFC message according to an example embodiment; and Figure 6 illustrates an NFC routing table according to an exemplary embodiment.
detailed description
Figure 1 schematically illustrates an NFC device 102, which is a device capable of NFC communications. For example, the device 102 is a mobile device, such as a mobile phone, a smartphone, a tablet computer, a digital media player or the like, equipped with NFC circuits (not shown in Figure 1).
On the left-hand side of FIG. 1, the NFC device 102 is shown in communication with a reader 104, comprising an NFC transponder 106. For example, the reader 104 is disposed at an entrance barrier of a zone to limited access, such as a transportation network or similar. Alternatively, the reader 104 may be arranged at a point of sale in a store or restaurant. When used with such a reader, the NFC circuitry of the NFC device 102 operates for example in a tag emulation mode.
On the right side of FIG. 1, the NFC device 102 is shown in communication with another NFC device 108 via an NFC interface. For example, like the NFC device 102, the NFC device 108 is a device capable of NFC communications, which could be a mobile device such as a mobile phone, a smartphone, a tablet computer, a digital media player or the like, equipped with NFC circuitry. When communicating with another NFC device, the NFC circuitry of the NFC device 102 operates for example in a peer-to-peer mode, and communications are initiated by one or other of the NFC devices.
Figure 2 schematically illustrates the NFC device 102 in more detail according to an exemplary embodiment.
As illustrated, the device 102 includes, for example, an NFC router (NFC ROUTER) 202, also known in the art as a contactless front end (CLF). The NFC router 202 is coupled to an NFC antenna 204, and together the router 202 and the antenna 204 provide NFC circuitry to emulate the behavior of an NFC transponder.
The NFC router 202 is also for example coupled to a host processing device (P) 206 of the NFC device 102. The device 206 comprises for example one or more processors under the control of instructions stored in an instruction memory (INSTR MEM ) 208. The instruction memory 208 is for example a flash memory, and stores one or more applications (not shown in Figure 2), which have been loaded into the device. The NFC router 202 is also for example coupled to other devices, among which a secure element (SE) 210 and a circuit USIM 212 (universal subscriber identification module) are illustrated. The secure element 210 is for example an integrated SE (eSE) coupled to the NFC router via an SWP (single-wire protocol) link and the USIM circuit 212 is for example a UICC (universal integrated circuit card) coupled to the NFC router via an SWP link, and is coupled additionally to the host processing device 206. Although not shown in FIG. 2, there may be other secure elements such as one or more pSDs. .
The host processing device 206 is also for example coupled to one or more antennas 214, which allow telecommunications in a cellular network, and / or wireless communications in accordance with other standards such as Wifi, Bluetooth, etc. standards.
The NFC router 202 comprises, for example, one or more memories storing an NFC routing table 218 and a PPSE list 220 (proximity payment system environment) of available NFC payment transaction applications stored by the secure elements 210, 212. as will be described in more detail below. The NFC routing table 218 defines rules for the processing of NFC messages received by the NFC router 202. In particular, the messages can be considered as being addressed either to the processing device 206 or to one of the secure elements 210, 212 Said one or more memories of the NFC router 202 also stores, for example, a register 221 in which a SAK value (type selection acknowledgment, type A) is for example memorized in association with each secure element, as will be described more in detail below.
In operation, the routing table 218 could be configured to route all RF communications associated with payments to a specific secure element, such as the item 210. In such a case, when the NFC device 102 comes within the scope of a NFC terminal, as the terminal 104 of Figure 1, the terminal sends an RF polling message to the NFC device. For example, the NFC router 202 detects, based on an identifier in the interrogation message, that the communication concerns a payment, and based on the NFC routing table 218, routes the communication to an appropriate secure element automatically. as the element 210. The NFC terminal then transmits a Select PPSE selection command to the secure element. A PPSE application of the secure element responds by providing a list of available payment applications on the secure element, along with their application identifiers (AIDs). The payment applications are for example presented to the NFC terminal in a preference order defined by the user. The NFC terminal then selects an appropriate payment application based on the capabilities of the NFC terminal. In the case where there is more than one payment application in the secure element 210 which is compatible with the NFC terminal, the NFC terminal selects for example the application having the highest priority. In particular, a user of the NFC device has, for example, indicated a priority among the payment applications before the transaction is executed. The priority is for example represented by the order of the transactions in the list returned by the application PPSE, the highest application in the list having the highest priority, and the lowest application in the list having the highest priority. lowest priority.
The payment transaction will then be executed using the application hosted by the highest priority secure element that is supported by the NFC terminal. In a particular example, the application having the highest priority is a "national" payment application, linked for example to the bank account of the user's device, and a lower priority application is an "international" payment application. , as a VISA application. An NFC terminal located in the country of origin of the user will for example support both national applications and international applications, and the national application will be selected in view of its higher priority. An NFC terminal in another country does not support the national application, and so the international application will be selected to execute the transaction.
The aforementioned procedure works well when there is only one secure element capable of handling a given type of transaction. However, in some cases, there may be more than one secure element on the NFC device that is capable of doing this. For example, secure elements 210 and 212 may both store applications capable of handling payments or other types of transactions, as will now be described with reference to FIG.
Figure 3 schematically illustrates components of the NFC device of Figure 2 in more detail according to an exemplary embodiment. In particular, FIG. 3 illustrates the NFC router (NFC ROUTER) 202, the device host (DEVICE HOST) 206, and the secure elements (SE1) 210 and (SE2) 212. The two secure elements 210, 212 memorize by example a PPSE application (proximity payment system environment). In addition, the secure element 210 stores, for example, NFC transaction applications APP1 and APP2, and the secure element 212 stores, for example, NFC transaction applications APP2 and APP3. The term "NFC transaction application" is used herein to refer to an application that is executed on a secure element and allows a transaction to take place via the NFC interface, such as a secure payment transaction, or another form of financial or private transaction.
The APP1 and APP3 applications are for example payment applications, APP1 being for example a VISA application, and APP3 being for example a MasterCard application (the name "MasterCard" may correspond to a registered trademark name).
The APP2 applications in the two secure elements are for example identical. However, they are for example configured for accounts and / or payment circumstances of a different nature. For example, the two APP2 applications are transfer payment applications such as the MIFARE Classic 1K applications (the MIFARE name is likely to correspond to a registered trademark name). However, these applications can be configured for use on different transport networks, and / or in different countries.
Based on an RF interrogation message from an NFC terminal and concerning a payment or transfer transaction, the NFC router 202 is not able to determine which of the secure elements should be used to implement the NFC terminal. transaction.
FIG. 4 is a flowchart of a method of routing an RF message according to an exemplary embodiment. The method includes, for example, operations 401 to 404 for generating a global list of available NFC applications, and an operation 405 in which the list of available applications is provided to an NFC terminal in response to a new RF message. The data intended to form the global list of available NFC transaction applications are for example collected by the NFC return 202 in response to a command from the host device 206, and integrate data retrieved from each secure element and optionally from other sources.
In an operation 401, a command is issued from the host device 206 to the NFC router 202, to generate a global list of available NFC transaction applications. This command is for example generated periodically, for example every hour, so that the list of available applications is always relatively up to date. In some embodiments, a command is generated in response to the host device detecting a new AID application identifier stored by the host device to reflect a change in the applications, such as adding a new application .
In an operation 402, the NFC router 202 for example obtains details of payment applications on a first secure element of the NFC device by performing an emulation of an RF card emulation session. For example, the first element is the element 210. The emulation is for example a card emulation in host controller interface (HCI) mode, and involves requesting a list of applications to the first secure element. For example, the emulation is based on a type A or type B communication defined by the NFC ISO / IEC 14443 standard. This step involves, for example, emulating an RF card emulation transaction by sending a HCI command, as defined in ETSI specification TS 102 622. For example, a V12.1.0 version of this ETSI (European Institute for Telecommunications Standards) specification is available on the website http://www.etsi.org , the content of which is considered included here within the limits permitted by law. In particular, the emulation of an RF card emulation transaction comprises, for example, the activation, by the NFC router 202, of a communication link between the NFC router 202 and the first secure element, if this link is disabled. The communication link between the NFC router 202 and each secure element is for example an SWP (single-wire protocol) link.
The NFC router 202 then requests, for example, the first secure element of the NFC device, a list of payment applications that are stored by it and are available to manage NFC transactions. For example, this request takes the form of a "SELECT PPSE" command transmitted by the NFC router 202 to the first secure element of the NFC device. The realization of a SELECT PPSE command involves for example first sending an event message EVT_CARD_ACTI-VATION on the basis of a card emulation of the RF type A or B, depending on the configuration of the device. secure element. This event is defined by the specification ETSI TS 102 622. The message is for example based on a message structure HCP (Host Controller Protocol) having the following format:
Heading: _a byte (bits bl to b8) - type: b8, b7 - instruction: b6 to bl
Data: unlimited size (but for example, split into packets for transmission on the SWP according to ETSI specification TS 102 613).
For example, the eight bits of the EVT_SEND_DATA are 0x50.
As for a real RF transaction, the command encapsulates, for example, a Select PPSE application request IS07816 called EVT_SEND_DATA, as defined by ETSI specification TS 102 622. The following is a specific example of the hexadecimal values forming an ISO- Select to be included in an EVT_SEND_DATA command to select the PPSE (CRC value removed): "00 a4 04 00 0e 32 50 41 59 2e 53 59 53 2e 44 44 46 30 31 00"
An application stored by the first secure element, which is for example a PPSE application, for example responds to the Select PPSE request by providing a list of all available NFC payment transaction applications stored by the secure element. The response is, for example, an APDU (Application Protocol Data Block) response, which is for example also encapsulated in an HCI command EVT_SEND_DATA. As a specific example in which an Interac payment application is present on the secure element (the name "Interac" may correspond to one or more registered trademark names), the response to the order
For example, the above PPSE Select is the following message, presented as hexadecimal values, based on an example in which there is a single payment application: "6F 2C 84 0E 32 50 41 59 2E 53 59 53 2E 44 44 46 30 31 A5 IA BF 0C 17 61 15 4F 07 A0 00 00 02 77 10 10 87 01 01 50 07 49 4E 54 45 52 41 43 ". This answer can be analyzed as follows: PICC Success
Data (46 bytes)
Label 6F: FCI Template Length: 2C Label 84: Dedicated File Name (DF)
Length: 0E
Value: 32 50 41 59 2E 53 59 53 2E 44 44 46 30 31 Label A5: FCI proprietary model (first application)
Length: ΙΑ BFOC Label: FCI Discretionary Data Length: 17 Label 61: Application Model Length: 15 Label 4F: Application Identifier
Length: 07
Value: AO 00 00 02 77 10 10 Label 87: Application Priority Indicator
Length: 01 Value: 01 Label 50: Application label Length: 07
Value: 49 4E 54 45 52 41 43 ASCII value: INTERAC Label A5: FCI owner template (second application) ........ etc. SW1 SW2: 90 00 where PICC stands for proximity integrated circuit card. As illustrated in this example, the portion Label A5 is for example repeated for each application that is on the secure element. Those skilled in the art will understand that one or more of the fields of this response may be optional and that one or more additional fields may be present, depending on the application. The response for example indicates at least the AID application identifier of each payment transaction application that is present. The format of the command and the way in which it must be analyzed are for example described in more detail in the EMVCo specification, and in particular in the Contactless EMV document, Book B (version 2.5), table 3-2, whose entire content is considered included here within the limits allowed by law. The use of the Select PPSE command as described above allows the PPSE application stored on the secure elements to provide information regarding payment applications. In some embodiments, the NFC router 202 or the host device 206 is also adapted to obtain information regarding other types of applications stored by the secure elements.
For example, for transfer applications such as MIFARE Classic, the NFC router or the host device for example reads part of a SAK value (type A acknowledgment) that the secure element stores in a register of the NFC router 202. In particular, a bit of the SAK value indicates for example the moment when a MIFARE Classic application, or a similar application according to ISO / IEC 14443 part 3, is present on the secure element.
For applications such as FeliCa applications associated with a system code, an F-type card emulation is for example used with certain system codes to check whether certain applications are present on a secure element. In particular, the NFC router for example sends a query request to the secure element containing a system code, and receives a response indicating whether or not an application associated with this system code is on the secure element. This operation is repeated, for example, until one or more positive results are obtained making it possible to identify one or more FeliCa applications, or similar applications comprising an SAK.
FIG. 5 illustrates an example of the format of an F type interrogation message according to the ISO / IEC 1809 NFC standard. As illustrated, the data packet comprises, for example, a preamble (PRE) 502 which for example has a length of 38 bits or more, a synchronization field (SYNC) 504, which for example has a length of 6 bits or more, a field of length (L) 506, which has for example a length of 8 bits and which indicates the total length of the frame, a payload (PAYLOAD) 508, and a cyclic redundancy code (CRC) field 509. The payload 508 comprises, for example, subfields comprising an instruction code (INS) 510, and one or more data fields. FIG. 5 illustrates the case of an interrogation message in which the data fields comprise two system code fields (SCI, SC2) 512 and 514 which are intended to select a specific application, a request code field (RC ) 516 used to request additional information, and a time slot number TSN 518 used for anticollision purposes in the case where several cards are present in the field.
In the case of an interrogation message, the values of the fields PRE and SYNC are not, for example, taken into account since they are used to detect the start of frame and the transmission speed. The other fields have for example the following hexadecimal values: 06 00 FF FF 00 00 09 21, where the instruction code INS 510 is for example equal to 0x00, and the fields 512 and 514 are both by default at the value 0xFF , corresponding to generic values, which means that all other values are accepted (the prefix "Ox" is used here to indicate that the characters correspond to hexadecimal values). Another example of the system code field SCI, SC2 is 0x00 0x02.
Referring again to FIG. 4, in a subsequent operation 403, it is determined whether or not there are other secure elements to access. In the example of Figure 3, there are two secure elements 210, 212, and so after the secure element 210 has been accessed, there will be yet another secure element 212 remaining. If there is another secure element that has not yet been accessed, the method returns for example to the operation 402, and this operation is repeated for the other secure element.
Once all the secured elements have been accessed, the next operation is operation 404, in which a global list 220 of NFC transaction applications is for example constructed by the NFC router 202, based on applications provided by each secure element. For example, the global list of applications 220 corresponds to a global list of PPSE applications, which lists the NFC payment applications present on the secure elements. Such a list has, for example, the same format as the PPSE response from each secure element (see the example of the APDU response given above), but lists the applications stored by each of the secure elements of the NFC device. This list is then for example stored in a memory of the NFC router.
Rather than being generated by the NFC router 202, in some embodiments the global list of applications 220 could be generated by the device host 206 if for example the NFC router 202 communicates the application lists provided by the NFC router 202. secure elements to the host device 206. In addition, rather than being memorized by the NFC router, the list 220 could be stored by a memory of the device host 206.
The NFC router 202 or the device host 206 also generates, for example, or modifies the NFC routing table 218, based on the identified applications stored by each secure element.
Fig. 6 is a table illustrating an example of the NFC routing table 218.
In the example of Figure 6, the routing table 218 has five entries. The first entry ENTRY1 corresponds for example to a VISA payment application having a hexadecimal application identifier of "A0000000031010", and located in the UICC 212, the UICC 212 thus being the target for messages addressed to this application. The second input ENTRY2 corresponds for example to a FeliCa application having a hexadecimal system code of "0002", and located in the UICC 212, the UICC 212 thus being the target for messages addressed to this application. The third input ENTRY3 corresponds for example to a MasterCard application having a hexadecimal application identifier of "A0000000041010", and located in the eSE 210, the eSE 210 thus being the target for messages addressed to this application. The fourth input ENTRY4 corresponds for example to a MIFARE Classic application, which uses an RF routing type A and is not associated with any AID or system code, and which is located in the eSE 210, the eSE 210 thus being the target for messages addressed to this application. The fifth input ENTRY5 corresponds for example to a FeliCa application having a system code in hexadecimal "0003", and which is located in the eSE 210, the eSE 210 thus being the target for messages addressed to this application.
During the generation of the routing table 218 and the global list 220 of NFC transaction applications, a check is for example made to avoid conflicts between the applications. For example, if there is more than one payment application identified as having the same application identifier AID, a selection is made so that only one of these applications appears in the list of applications 220 and in the routing table 218. For example, the user of the NFC device is prompted by the device host 206 to make this selection. In addition, if more than one transfer application is identified stored on the secure elements, again a selection is made for example among the applications, for example by inviting the user to make this selection.
Referring again to FIG. 4, in operation 405 which may take place at any time after the global list of NFC applications has been constructed in operation 404, a new RF message is received from an NFC terminal. , and routed based on the constructed global list of NFC transaction applications 220 and / or based on the routing table 218.
For example, if the list 220 includes only one NFC transaction application capable of handling the given RF transaction, the NFC router 202 routes, for example, the RF message directly to the secure element on which the NFC transaction application is memorized.
Otherwise, if the list 220 includes more than one NFC transaction application capable of handling the RF transaction, then the NFC router 202 responds for example to the NFC terminal with a message including the NFC identifiers of the available transaction applications that can handle the NFC. NFC transaction. For example, the NFC terminal issues a SELECT PPSE command to the NFC router, and the NFC router responds directly to the NFC terminal by transmitting a list of NFC payment applications available in the secure items. If there is only one NFC transaction application that is compatible with the NFC terminal, the NFC terminal selects for example this NFC transaction application. Otherwise, if there is more than one transaction application that is compatible with the NFC terminal, then the NFC terminal selects for example the application with the highest priority, which is for example the highest application. on the PPSE list. The NFC router 202 then sends for example a new RF message to the selected transaction application, which is routed by the NFC router 202 to the secure element storing the NFC transaction application.
Rather than the global transaction application list 220 being stored by the NFC router 202, as previously mentioned, in some embodiments this list could be stored by a memory of the host device 206. In this case, the table For example, the NFC router 202 routing routine 218 is configured to route SELECT PPSE requests received from NFC terminals to the host device 206, so that the host device 206 can respond to such requests by providing the list of applications 220. payment stored by secure items.
An advantage of the embodiments described herein is that one can select between several NFC transaction applications stored by different secure elements when a new NFC message is received. This is achieved by constructing a global list of NFC transaction applications securely available by emulating, in response to a command from the host device, an RF card emulation transaction.
With the description thus made of an illustrative embodiment, various alterations, modifications and improvements will readily occur to those skilled in the art.
For example, although in the examples the transaction applications stored by the secure elements are payment applications, it will be clear to one skilled in the art that the applications could be intended for carrying out other types of transactions.
In addition, it will be apparent to those skilled in the art that the various elements described in connection with the various embodiments may be combined, in alternative embodiments, in various combinations.
权利要求:
Claims (14)
[1" id="c-fr-0001]
A method comprising: emulating, by an NFC (near-field communication) router (202) of an NFC device (102), in response to a command from a processing device (206) of the NFC device, a transaction for emulating an RF (radio frequency) card, the emulation comprising the transmission, by the NFC router (202), of a command addressed to first and second secure elements (210, 212) of the NFC device for checking the presence one or more NFC transaction applications in the first and second secure elements; receiving, by the NFC router (202), responses from the first and second secure elements (210, 212) indicating said one or more NFC transaction applications stored by the first and second secure elements; and receiving, by the NFC router (202), a new RF message from an NFC terminal (106) concerning an NFC transaction and routing the new RF message to the first or second secure element based on the responses.
[2" id="c-fr-0002]
The method of claim 1, further comprising: generating a global list (220) of available NFC transaction applications based on the responses; and providing the global list (220) to the NFC terminal in response to the new RF message.
[3" id="c-fr-0003]
The method of claim 2, further comprising, after generating the global list (220) of available NFC transaction applications, storing the list in a memory of the NFC router (202).
[4" id="c-fr-0004]
The method of claim 2 or 3, wherein the global list (220) of available NFC transaction applications is generated by the processing device (206) of the NFC device.
[5" id="c-fr-0005]
The method of any one of claims 1 to 4, wherein said one or more NFC transaction applications are payment applications, and wherein the command comprises a PPSE selection command (proximity payment system environment). .
[6" id="c-fr-0006]
The method of any one of claims 1 to 5, wherein each of said one or more NFC transaction applications is associated with a system code value, and the command comprises an interrogation message comprising a system code value.
[7" id="c-fr-0007]
The method of any one of claims 1 to 6, further comprising verifying the presence of one or more NFC transfer applications on the first and second secure elements by accessing, by the NFC router (202) or by the processing device (206), at one or more bits of a SAK value (selection acknowledgment, type A) of each secure element stored in a register (221) of the NFC router (202).
[8" id="c-fr-0008]
The method of any one of claims 1 to 7, further comprising generating a routing table (218) based on said responses, and storing the routing table in a memory of the NFC router (202). ).
[9" id="c-fr-0009]
The method of claim 8, further comprising, before routing the new RF message to the first or second secure element (210, 212), a selection of the first or second secure element to which the new RF message is to be routed based on the routing table (218).
[10" id="c-fr-0010]
The method of any of claims 1 to 9, further comprising, before routing the new RF message to the first or second secure element (210, 212), responding to the new RF message by communicating identifying at least two of the transaction applications at the NFC terminal (106), and receiving from the NFC terminal a selection of one of the NFC transaction applications.
[11" id="c-fr-0011]
The method of any one of claims 1 to 10, wherein each of the first and second secure elements (210, 212) stores an NFC payment transaction application.
[12" id="c-fr-0012]
12. Digital storage medium storing instructions which, when executed by a processing device, bring about the implementation of the method of any one of claims 1 to 11.
[13" id="c-fr-0013]
A near field communication (NFC) device comprising: an NFC router (202) adapted to: emulate, in response to a command from a processing device (206) of the NFC device, an RF card emulation transaction (radio frequency), the emulation of the transaction comprising the transmission, by the NFC router (202), of a command addressed to first and second secure elements (210, 212) of the NFC device to check the presence of a or multiple NFC transaction applications in the first and second secure elements; receiving responses from the first and second secure elements (210, 212) indicating said one or more NFC transaction applications stored by the first and second secure elements, a global list (220) of available NFC transaction applications being generated according to the answers; and receiving a new RF message from an NFC terminal (106) regarding an NFC transaction and routing the new RF message to the first or second secure element based on the global list of available NFC transaction applications.
[14" id="c-fr-0014]
The apparatus of claim 13, wherein the processing device (206) or the NFC router (202) is adapted to generate a global list (220) of NFC transaction applications available on the basis of said responses, and to provide the global list (220) at the NFC terminal in response to the new RF message.
类似技术:
公开号 | 公开日 | 专利标题
US10063283B2|2018-08-28|Method and apparatus for selecting an application of a device having an NFC interface
FR3040226A1|2017-02-24|
EP1596342B1|2007-11-14|Method and apparatus for recharging a contactless IC card
EP1668938B1|2009-02-11|Method for matching a mobile telephone with a personal card
WO2008129225A1|2008-10-30|Method for communicating and transmitting a message relating to a transaction for a contactless application, terminal, secured module and associated systems
EP2764481B1|2016-05-11|Method and system for executing a contactless transaction allowing multiple applications and multiple instances of the same application
JP2013140453A5|2013-11-14|
CN104823383A|2015-08-05|Method and system of generating nfc-transaction remotely
EP2920986B1|2020-01-01|Nfc device comprising configurable notification means
CN104580162B|2019-10-22|User account matching method and device, the method and device for initiating unpaired message
JP2012010207A5|2013-08-01|
WO2009083658A1|2009-07-09|Radiofrequency dispensing of electronic tickets
EP1817890A1|2007-08-15|Method, system and microcontroller card for communicating application services from a microcontroller card to a terminal
EP0989529B1|2003-03-26|Smart card for accessing a remote application, terminal and associated communication system and method for accessing this remote application using this smart card
FR3012236A1|2015-04-24|
JP6980120B2|2021-12-15|Resource transfer methods, equipment, computer equipment and storage media
FR2913546A1|2008-09-12|METHOD OF EXCHANGING DATA BETWEEN A CONTACTLESS COMMUNICATION TERMINAL AND A MOBILE TELEPHONY TERMINAL.
US9071640B2|2015-06-30|Method of selecting an application installed on a secured module, an associated terminal and an associated security module
EP3627419A1|2020-03-25|Secure transaction using a mobile device
US9953198B2|2018-04-24|Systems and methods for a cloud connected transponder
CN103559466B|2017-07-14|NFC application processing methods, terminal and server
CN106940852A|2017-07-11|The acquisition methods and terminal device of a kind of accounts information
Korhonen2017|NFC Payment & Security Threats
FR2964486A1|2012-03-09|Mobile terminal i.e. cellular radio terminal, has radio frequency identification tag configuration application launched when detected radio frequency identification tag is determined to be blank by determination unit
CN106572133A|2017-04-19|Method and device for providing and obtaining real time terminal information
同族专利:
公开号 | 公开日
CN205407821U|2016-07-27|
EP3133852B1|2020-11-25|
US20170055109A1|2017-02-23|
CN106470049A|2017-03-01|
EP3133852A1|2017-02-22|
CN106470049B|2019-08-27|
US9894469B2|2018-02-13|
FR3040226B1|2018-06-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
EP2590107A1|2011-11-03|2013-05-08|STMicroelectronics Application GmbH|Method of managing incoming commands related to contactless applications within a wireless apparatus such as a NFC enabled mobile phone|
EP2600639A1|2011-12-01|2013-06-05|Broadcom Corporation|Systems and methods for providing secure NFC application support in battery on and battery off modes|
US20150020160A1|2011-12-21|2015-01-15|Morpho|Method for Routing Within a Mobile Terminal Emulating a Contactless Payment Card|
US20150111495A1|2013-10-17|2015-04-23|Proton World International N.V.|Nfc routing method|
DE602007008313D1|2006-05-10|2010-09-23|Inside Contactless|Method for forwarding incoming and outgoing data to an NFC chipset|
JP4462341B2|2007-12-18|2010-05-12|ソニー株式会社|Information processing apparatus and method, and program|
EP2106107B1|2008-03-27|2012-04-18|Motorola Mobility, Inc.|Method and apparatus for automatic near field communication application selection in an electronic device|
EP2305002A4|2008-07-20|2015-04-08|Samsung Electronics Co Ltd|Method and system for managing multiple applications in near field communication|
EP2211481B1|2009-01-26|2014-09-10|Motorola Mobility LLC|Wireless communication device for providing at least one near field communication service|
EP2211480B1|2009-01-26|2013-10-23|Motorola Mobility LLC|Wireless communication device for providing at least one near field communication service|
AU2010244100B2|2009-05-03|2016-06-23|Smk-Logomotion Corporation|A payment terminal using a mobile communication device, such as a mobile phone; a method of direct debit payment transaction|
EP2390817A1|2010-05-27|2011-11-30|Gemalto SA|Method of managing communications with a nfc controller|
KR101073937B1|2010-11-24|2011-10-17|에이큐 주식회사|A mobile phone with nfc communication function|
US8977195B2|2011-01-06|2015-03-10|Texas Insruments Incorporated|Multiple NFC card applications in multiple execution environments|
EP2530661A1|2011-05-31|2012-12-05|Avance Pay AG|Electronic system for quickly and securely processing transactions with mobile devices|
EP2584769B1|2011-10-21|2020-04-01|BlackBerry Limited|Mobile communications device providing NFC applet compatibility features and related methods|
FR2985343B1|2012-01-03|2014-01-03|Inside Secure|METHOD FOR EXECUTING AN APPLICATION IN AN NFC DEVICE|US10223628B2|2016-03-01|2019-03-05|Proton World International N.V.|Application selection in a mobile terminal|
CN107818464A|2016-09-14|2018-03-20|百度在线网络技术(北京)有限公司|A kind of NFC payment realized in mobile terminal and device|
CN107911319B|2017-11-22|2021-05-11|中兴通讯股份有限公司|Routing method of multiple security modules, NFC controller and NFC equipment|
CN110191054B|2019-05-06|2021-07-13|Oppo广东移动通信有限公司|Route processing method and device, storage medium and electronic equipment|
法律状态:
2016-07-20| PLFP| Fee payment|Year of fee payment: 2 |
2017-02-24| PLSC| Search report ready|Effective date: 20170224 |
2017-07-20| PLFP| Fee payment|Year of fee payment: 3 |
2017-09-08| CA| Change of address|Effective date: 20170807 |
2018-07-20| PLFP| Fee payment|Year of fee payment: 4 |
2020-05-08| ST| Notification of lapse|Effective date: 20200406 |
优先权:
申请号 | 申请日 | 专利标题
FR1557765A|FR3040226B1|2015-08-17|2015-08-17|NFC DEVICE HAVING MULTIPLE SECURE ELEMENTS|
FR1557765|2015-08-17|FR1557765A| FR3040226B1|2015-08-17|2015-08-17|NFC DEVICE HAVING MULTIPLE SECURE ELEMENTS|
EP16154963.9A| EP3133852B1|2015-08-17|2016-02-10|Nfc device with multiple secure elements|
CN201620144224.4U| CN205407821U|2015-08-17|2016-02-25|A near field communication device|
CN201610105871.9A| CN106470049B|2015-08-17|2016-02-25|NFC device and near field communication method with multiple safety elements|
US15/080,373| US9894469B2|2015-08-17|2016-03-24|NFC device with multiple secure elements|
[返回顶部]