(19)
(11) EP 0 987 651 A1

(12) EUROPEAN PATENT APPLICATION
published in accordance with Art. 158(3) EPC

(43) Date of publication:
22.03.2000 Bulletin 2000/12

(21) Application number: 98901547.4

(22) Date of filing: 06.02.1998
(51) International Patent Classification (IPC)7G06K 19/073, G07B 15/00
(86) International application number:
PCT/JP9800/512
(87) International publication number:
WO 9836/377 (20.08.1998 Gazette 1998/33)
(84) Designated Contracting States:
FR GB

(30) Priority: 13.02.1997 JP 2885997

(71) Applicant: Rohm Co., Ltd.
Kyoto-shi Kyoto 615-8585 (JP)

(72) Inventors:
  • HIKITA, Junichi
    Ukyo-ku Kyoto-shi Kyoto 615-0045 (JP)
  • IKEFUJI, Yoshihiro
    Ukyo-ku Kyoto-shi Kyoto 615-0045 (JP)
  • TAGUCHI, Haruo
    Ukyo-ku 615-0045 5 (JP)

(74) Representative: Prüfer, Lutz H., Dipl.-Phys. et al
Harthauser Strasse 25d
81545 München
81545 München (DE)

   


(54) PORTABLE MESSAGE UNIT STORAGE MEMBER AND ITS USING METHOD


(57) A message unit storage part (3) has a plurality of data holding parts the number of which is equal to the value of the message unit. A message unit adding/rewriting information storage part (13) stores the message unit adding/rewriting information. A collation part (11) collates the given information with the message unit adding/rewriting information. A message unit changing part (7) can change the states of the respective data holding parts from 1st states to 2nd states only. However, the data changing part (7) may also change the states of the respective data holding parts from the 2nd states to the 1st states in accordance with the collation results of the collation part (11). That is, the states of the respective data holding parts can be normally changed from the 1st states to the 2nd states (change in the direction in which the message unit decreases) only. Thus, a message unit storage member which is difficult to alter can be provided.




Description

Technical Field



[0001] The present invention relates to a portable point storing member and a method of using the same, and particularly a point storing member having improved secrecy and a method of using the same.

Background Art



[0002] It has been proposed to employ a data communication system using IC cards in ticket barriers of a ski lift and a railroad, an automatic cargo sorting system and others.

[0003] Fig. 12 shows a data communication system using IC cards, and particularly a structure of a communication system using non-contact IC cards. This system is formed of an interrogator 40 (e.g., mounted in a gate of a ski lift) and a non-contact IC card 100.

[0004] Interrogator 40 is controlled by a controller 48 to issue a high-frequency carrier wave generated by an oscillator circuit (OSC) 49 from an antenna 41. When non-contact IC card 100 approaches interrogator 40, an antenna 23 of non-contact IC card 100 receives this high-frequency carrier wave. A power producing circuit 25 converts the received high-frequency wave into a DC power, and supplies it to other circuit portions. Thereby, non-contact IC card 100 can start the operation when it approaches interrogator 40.

[0005] Information transmission from interrogator 40 to non-contact IC card 100 is performed by modulating the above high-frequency carrier wave by a modulator-demodulator circuit 46. A controller 35 performs necessary processing such as change of contents of a memory 37 and return of information based on the demodulated information.

[0006] Information is also transmitted from non-contact IC card 100 to interrogator 40. Since an oscillator circuit is not employed in non-contact IC card 100, the information is sent in the following manner. Interrogator 40 issues non-modulated high-frequency carrier wave, and modulator-demodulator circuit 33 in non-contact IC card 100 changes an impedance of resonance circuit 22. Interrogator 40 handles this impedance change as the impedance change of resonance circuit 42 on its own side, and modulator-demodulator circuit 46 detects and demodulates it. Controller 48 obtains the demodulated information, and performs necessary processing.

[0007] When non-contact IC card 100 moves away from interrogator 40, the power supply is interrupted so that non-contact IC card 100 stops the operation. Since memory 37 is a nonvolatile memory, the stored information is held even when the power supply is interrupted.

[0008] Memory 37 in non-contact IC card 100 described above may store predetermined points, and the data in memory 37 may be changed in accordance with the used points, whereby the IC card can be used as a prepaid card.

[0009] Data is communicated in an encrypted form between the interrogator and the IC card. Thereby, it is possible to prevent unauthorized change of the contents in the IC card which was once used.

[0010] However, the communication system using the IC cards in the prior art suffers from the following problems. Although the communication data is encrypted as described above, the data can be altered if the encryption algorithm is interpreted. Therefore, it is difficult to ensure the secrecy of the system only by the encryption.

[0011] In particular, if the interrogator is located in a place open to the public, and particularly, in a public telephone or the like, the telephone set internally provided with the interrogator may be stolen. When stolen, instructions and commands to be sent between the interrogator and the IC card may be analyzed.

[0012] An object of the invention is to overcome the above problems, and particularly to provide a portable point storing member, which can suppress illegal use, as well as a method of using the same.

Disclosure of the Invention



[0013] For achieving the above object, an aspect of the invention provides a portable point storing member for storing points corresponding to moneys, including changing means for reading the stored points in accordance with an externally applied read instruction, and changing the stored points in accordance with an externally applied point changing instruction, wherein change of the points in a direction of increasing the points is inhibited by a circuit structure.

[0014] According to the invention, the data change which increases the points can be reliably prevented. Thereby, it is possible to provide the point storing member, of which illegal use is difficult.

[0015] Preferably, the portable point storing member further includes point rewrite information storing means for storing, in advance, point rewrite information, wherein the circuit structure is switched to allow change of the points in the direction of increasing the points when applied information matches with the point rewrite information.

[0016] According to the invention, the point change which increases the points can be prevented only when it is necessary.

[0017] According to another aspect, a portable point storing member includes point storing means storing points corresponding to moneys, and having data holding portions equal in number to the points for holding write data, read means for reading out the points stored in the point storing means in accordance with an externally applied read instruction, and point changing means allowing change of each of the data holding portions in the point storing means only from a first state to a second state in accordance with an externally applied point changing instruction.

[0018] According to the above aspect, since the data holding portions can be changed only from the first state to the second state, illegal data change can be reliably prevented.

[0019] More preferably, the portable point storing member further includes point rewrite information storing means for storing point rewrite information, and collating means for collating applied information with the point rewrite information. The point changing means can change each of the data holding portions from the first state to the second state, and can also change each of the data holding portions from the second state to the first state in accordance with a result of collation by the collating means.

[0020] According to the invention, each data holding portion can be changed from the second state to the first state only when the applied information corresponds to the point rewrite information which is already stored. Thereby, illegal data change can be reliably prevented.

[0021] According to still another aspect of the invention, a method of using a portable point storing member includes the steps of storing, in advance, points corresponding to moneys in the point storing member having portability; reading the points stored in the point storing member in accordance with an externally applied read instruction; and changing the points in accordance with an externally applied point changing instruction, wherein changing of the points in a direction of increasing the points is inhibited by a circuit structure.

[0022] Further preferably, in the method of using the portable point storing member, the point storing member stores, in advance, point rewrite information, and the circuit structure is switched to allow the point change in the direction of increasing the points when applied information matches with the point rewrite information.

[0023] According to yet another aspect, a method of using a portable point storing member includes the steps of storing points corresponding to moneys in the point storing member having portability; reading the points stored in the point storing member in accordance with an externally applied read instruction; and changing the points in accordance with an externally applied point changing instruction, wherein the point storing means has data holding portions corresponding in number to the points, each of the data holding portions is allowed to change only from a first state to a second state, and the point storing member stores the points in accordance with the states of the respective data holding portions.

[0024] More preferably, in the method of using the portable point storing member, the point storing member stores, in advance, point rewrite information, and each of the data holding portions can be changed from the first state to the second state, and can also be changed from the second state to the first state when applied information matches with the point rewrite information.

[0025] According to further another aspect of the invention, a point storing member includes storing means for storing the points, changing means for changing the points stored in the storing means, and inhibiting means for inhibiting increase of the points by the changing means.

[0026] Further preferably, the point storing member includes input means for receiving data to be verified, and comparing means for comparing the received data with a predetermined cryptogram. The inhibiting means inhibits increasing of the points in accordance with a result of the comparison by the comparing means.

Brief Description of the Drawings



[0027] 

Fig. 1 shows functional blocks in a point storing member 1 of an embodiment of the invention;

Fig. 2 schematically shows a structure of an IC card 10 of an embodiment of the invention;

Fig. 3 shows a memory 50 and a controller 60 in Fig. 2 in greater detail;

Fig. 4 schematically shows a structure of memory 50;

Fig. 5 shows, by way of example, voltages for reading, writing, erasing and disabling;

Fig. 6 shows relationships between a read change circuit 61, a cryptogram collating portion 63 and a memory area selection detecting circuit 67;

Fig. 7 shows a cryptogram collating portion 63 in greater detail;

Fig. 8 is a flow chart showing operation of IC card 10;

Fig. 9 is a flow chart following Fig. 8;

Fig. 10 is a flow chart following Fig. 9;

Fig. 11 is a flow chart following Fig. 8; and

Fig. 12 is a block diagram showing structures of IC card 100 and interrogator 40 in the prior art.


Best Mode for Carrying Out the Invention



[0028] The invention will be described in greater detail with reference to the accompanying drawings.

[1. Function Blocks of IC Card]



[0029] Referring to Fig. 1, description will now be given on a point storing member 1 of an embodiment of the invention. Point storing member 1 has portability, and includes a point storing portion 3, a read portion 5, a point changing portion 7, a point rewrite information storing portion 13 and a collating portion 11.

[0030] Point storing portion 3 is a portion for storing points corresponding to moneys, and have data holding portions, which can hold write data and are equal in number to the points. Read portion 5 reads out the points stored in point storing portion 3 in accordance with a read instruction which is externally applied. Point changing portion 7 can change each data holding portion in point storing portion 3 from an unwritten state (first state), where the write data is not held, to a written state (second state), where the write data is held, based on an externally applied point change instruction.

[0031] Point rewrite information storing portion 13 stores point rewrite information, i.e., information for point rewriting. Collating portion 11 collates the applied information with the above point rewrite information. Point changing portion 7 can change each data holding portion from the unwritten state to the written state, and further can change each data holding portion from the written state to the unwritten state based on a result of the collation by collating portion 11.

[0032] Assuming that the data holding portions in the unwritten state correspond in number to remaining points, the data change which increases the points can be reliably prevented, and the points can be increased only when such information is applied that matches with the point rewrite information which has been stored in advance.

[2. Specific Structure of IC Card]



[0033] A non-contact IC card employing the invention will now be described with reference to Fig. 2.

[0034] Non-contact IC card 10 has a whole structure similar to that in the prior art, and includes an antenna 23, a resonance circuit 22, a power producing circuit 25, a modulator-demodulator circuit 33, a controller 60 and a memory 50 which are arranged within a casing 11. The manner of arranging these portions and parts in casing 11 as well as manners of power supply and data transmission are the same as those in the prior art, and therefore will not be discussed below.

[0035] Fig. 3 is a block diagram specifically showing controller 60 and memory portion 50 shown in Fig. 2. Memory 50 has a point area 51, a setting information area 52, a secret information area 53 and a secret data area 54. Point area 51 is an area for storing the points. Setting information area 52 is an area for storing setting information. Secret data area 53 is an area for storing a cryptogram of an IC card user. Secret data area 54 is an area for storing secret data of an IC card manufacturer.

[0036] As shown in Fig. 3, point area 51 can store data of 128 bytes (1024 bits). Setting information area 52 can store data of 32 bytes, secret data area 53 can store data of 3 bytes, and secret data area can store data of 3 bytes.

[2.1 Memory Portion 50]



[0037] The memory structure of memory portion 50 will now be described with reference to Figs. 4 and 5. In this embodiment, an EEPROM is employed as the nonvolatile memory. Memory portion 50 is formed of cells C11 (see Fig. 4) arranged in a matrix form (not shown).

[0038] For changing the data of cell C11 (for performing the data writing by placing data "O" therein, and performing the data erasing by placing data "1" therein), and for reading out the data, voltages are applied to a bit line BL, a select line SL and a word line WL as shown in Fig. 5.

[0039] For setting memory cell C11 to the written state (i.e., for keeping data "0" therein), a voltage of 20 V is applied to bit line BL, a voltage of 0 V is applied to select line SL and a voltage of 20 V is applied to word line WL so that a line AG is set to an open state. Thereby, electrons are injected into a floating gate of cell C11 so that cell 11 holds the data "0".

[0040] For setting memory cell C11 to the erased state (i.e., for keeping data "1" in memory cell C11), voltages opposite to those for keeping the data "0" are applied. More specifically, 0 V is applied to bit line BL, 20 V is applied to select line SL and 20 V is applied to word line WL so that line AG is set to the open state (or 0 V). Thereby, electrons are discharged from the floating gate of cell C11, and data "1" is kept therein.

[0041] For reading information from memory cell C11, a voltage of 5 V is applied to select line SL, a voltage of 5 V is applied to word line WL, and a sense amplifier (not shown) is connected to bit line BL. The result of detection by the sense amplifier changes depending on whether memory cell C11 has stored "0" or "1". Thereby, it is possible to determine whether memory cell C11 has stored data "1" or data "0".

[0042] As described above, each memory cell in point area 51 stores the data. "0" or "1", and each of the memory cells forms the data holding portion. Further, point area 51 has the memory cells equal in number to the points which were set in advance. For 1000 points, point area 51 has memory cells of 1000 bits.

[0043] Setting information area 52, secret data area 53 and secret data area 54 are configured to hold data of ordinary bit lengths, similarly to the prior art.

[2.2 Controller 60]



[0044] Controller 60 will now be described with reference to Fig. 3. Controller 60 has a main controller 69, an address decoder 65, a memory area selection detecting circuit 67, a cryptogram collating portion 63 and a read change circuit 61.

[0045] Main controller 69 designates an address based on the data applied from modulator-demodulator circuit 33, and applies the address to address decoder 65. Further, it applies an instruction for reading, writing or erasing to read change circuit 61. Further, main controller 69 applies a cryptogram to be collated to cryptogram collating portion 63. The address selected by address decoder 65 is detected by memory area selection detecting circuit 67, which applies the selected address to cryptogram collating portion 63 and read changing portion 61.

[2.2.1 Read Changing Circuit 61]



[0046] Read change circuit 61 applies the read voltage, write voltage or erase voltage shown in Fig. 5 or a disabling voltage, which will be described later, to memory portion 50 in accordance with an instruction applied from main controller 69.

[0047] Read change circuit 61 will now be described with reference to Fig. 6. Read change circuit 61 has selected address specifying terminals Ts1 - Ts3, a mode terminal Te and a mode terminal Tf. Selected address specifying terminals Ts1 - Ts3 are supplied with a signal, which specifies the selected area, from memory area selection detecting circuit 67. More specifically, when point area 51 is selected, a voltage "High" is applied to selected address specifying terminal Ts1. When setting information area 52 is selected, the voltage "High" is applied to selected address specifying terminal Ts2. When secret data area 53 is selected, the voltage "High" is applied to selected address specifying terminal Ts3.

[0048] Mode terminals Te and Tf receive signals from cryptogram collating portion 63. In this embodiment, read change circuit 61 selects one from the following three modes in accordance with the voltages applied to the two mode terminals.

[0049] When both mode terminals Tf and Te are supplied with voltages "Low", a mode "0, 0" (normal mode) is selected.

[0050] When mode terminals Tf and Te are supplied with voltages "Low" and "High", respectively, a mode "0, 1" (point rewriting mode) is selected.

[0051] When mode terminals Tf and Te are supplied with voltages "High" and "Low", respectively, a mode "1, 0" (initializing mode) is selected.

[0052] Read change circuit 61 applies the disabling voltage to each of the area in memory 50 in accordance with the voltages applied to selected address specifying terminals Ts1 - Ts3 and mode terminals Te and Tf.

[0053] In the respective modes, read change circuit 61 can apply the following voltages. In mode "0, 0", if the selected address which is specified by selected address specifying terminals Ts1 - Ts3 is point area 51 or setting information area 52, the write voltage shown in Fig. 5 can be issued. However, the erase voltage cannot be issued.

[0054] In mode "1, 0", if the selected address which is specified by selected address specifying terminals Ts1 - Ts3 is point area 51 or setting information area 52, the write voltage and erase voltage shown in Fig. 5 can be issued. However, if selected address specifying terminals Ts1 - Ts3 specify secret data areas 53 or 54, the write voltage or the erase voltage shown in Fig. 5 cannot be issued. Thus, the writing and erasing shown in Fig. 5 can be performed only by point area 51 or setting information area 52.

[0055] In mode "1, 0", if the selected address specified by selected address specifying terminals Ts1 - Ts3 is point area 51, setting information area 52 or secret data area 53, the erase voltage shown in Fig. 5 can be issued. However, if the selected address is secret data area 54, the erase voltage cannot be issued. The write voltage cannot be issued for any one of the areas.

[0056] Data lines of secret data areas 53 and 54 are connected to cryptogram collating portion 63 as shown in Fig. 3. Therefore, the cryptogram which is read out is not applied to main controller 69, and the cryptogram stored in secret data areas 53 and 54 can be prevented from being externally read out.

[2.2.2 Cryptogram Collating Portion 63]



[0057] Cryptogram collating portion 63 is enabled when it receives a detection signal from memory area selection detecting circuit 67, and thereby determines whether the cryptogram stored in secret data area 53 or 54 matches with the signal applied from main controller 69. When they match with each other, voltage "High" is applied to mode terminals Te and Tf of read change circuit 61.

[0058] Cryptogram collating portion 63 will now be described in greater detail with reference to Fig. 7. Cryptogram collating portion 63 has comparators 71 and 73, and a data converting circuit 75. Comparator 73 applies the voltage "High" to mode terminal Tf when it receives from main controller 69 the cryptogram which matches with a cryptogram of an IC card manufacturer stored in secret data area 54.

[0059] Comparator 71 applies the voltage "High" to mode terminal Te when it receives from main controller 69 a cryptogram, which matches with a cryptogram formed by coalescing the data applied from data converting circuit 75 with the data applied from secret data area 53.

[0060] For example, when secret data area 54 has stored a cryptogram "10100000" and the IC card user has stored "1010" in secret data area 53 as his/her own cryptogram or pass word, the collation is performed as follows. Data converting circuit 75 converts the cryptogram "10100000" in secret data area 54. When the result of conversion is "01011111", comparator 71 is supplied with a cryptogram "101001011111", which is a combination of the cryptogram "1010" of the IC card user stored in secret data area 53 and "01011111" following the cryptogram "1010". Comparator 71 determines whether the input data applied from main controller 69 for collation matches with the above cryptogram "101001011111" or not.

[0061] Comparator 71 may be configured such that the cryptogram stored in secret data area 53 is compared with data obtained by removing the data sent from data converting circuit 75 from the data applied from main controller 69.

[0062] In this embodiment, the IC card user is required to obtain the data, which is prepared by converting the cryptogram in secret data area 54 by data converting circuit 75, from the IC card manufacturer, and apply the same, as the cryptogram to be collated, to main controller 69 after adding thereto his/her own cryptogram.

[0063] According to this embodiment, as described above, the cryptogram of secret data area 54 is converted and added to the cryptogram in secret data area 53 for comparison with the cryptogram data applied from main controller 69 for collation. Accordingly, the IC card manufacturer can store the cryptograms, which are different from each other and are dedicated to the IC card users, respectively, in secret data areas 53. Thereby, no confusion occurs even when two IC card users accidentally stored the same cryptogram in secret data areas 53, respectively. Thus, one of the users cannot erase the data in the IC card of the other user.

[0064] The specific comparator actually performing the collation is determined by a signal supplied from memory area selection detecting circuit 67. If the detected area is secret data area 54, the signal enabling the collating operation is applied to comparator 73. If the detected area is secret data area 53, the signal enabling the collating operation is applied to comparators 71 and 73.

[3. Processing in IC Card]



[0065] Processing of reading, writing and erasing the data as well as cryptogram collation will now be described with reference to Figs. 8 to 11. In the initial state (step ST1 which is not shown), mode terminals Te and Tf of read change circuit 61 are supplied with the voltages "Low", and the operation is in the mode "0, 0".

[0066] Then, main controller 69 determines whether the instruction applied from modulator-demodulator circuit 33 is the read instruction, remaining point removing instruction, data changing instruction or initializing instruction (step ST3).

[3.1 Read Operation]



[0067] When the applied instruction is the read instruction, all the addresses in point area 51 are selected (step ST5). The read instruction is issued (step ST7). Thereby, all the data in point area 51 is read and applied to main controller 69 (step ST8). Main controller 69 counts and temporarily stores the bits (remaining points) holding data "1" in the applied data (step ST9). Then, all the addresses in setting information area 52 are selected (step ST11). Then, the read signal is issued to read change circuit 61 (step ST13). Thereby, the setting information stored in setting information area 52 is applied to main controller 69 (step ST14). Main controller 69 temporarily stores the applied setting information (step ST15). Main controller 69 issues the temporarily stored data to modulator-demodulator circuit 33 (step ST17).

[0068] Thereby, it is possible to issue externally the remaining points stored in point area 51 as well as the setting information stored in setting information area 52.

[3.2 Point Removing Processing]



[0069] Description will now be given on the case where the instruction for removing the remaining points is applied in step ST3. In this case, main controller 69 reads out the remaining points which was temporarily stored in step ST9 (step ST19). The leading address of the memory cells in point area 51 holding data "1" is selected (step ST21). Main controller 69 applies the write signal (i.e., signal for holding data "0") to read change circuit 61 (step ST23).

[0070] Read change circuit 61 which received the write signal determines whether the current state allows application of the write voltage or not, in accordance with the voltages applied to the select address specifying terminals and the mode terminals shown in Fig. 6. In this case, the selected address is point area 51, and the mode terminals were in the mode "0, 0" in step ST1 so that it is determined that the writing can be performed, and the write voltage shown in Fig. 5 is issued (step ST24).

[0071] Then, main controller 69 decrements the remaining points which were temporarily stored in step ST9 (step ST25). Then, a message to the effect that the remaining point removing processing is completed is issued to modulator-demodulator circuit 33 (step ST27). When the instruction of removing the remaining points is issued, therefore, it is possible to change in the decrementing direction the points stored in point area 51 by a specified value. In this manner, the points which have been stored in point area 51 are read out, or the data can be changed in the direction of reducing the points in accordance with the point removing instruction.

[3.3 Data Changing Processing]



[0072] Description will now be given on the case where the data changing instruction is applied in step ST3. The data changing instruction is an instruction for changing the data in point area 51 or setting information area 52, and includes a collation instruction for collating the cryptogram stored in the secret data area.

[0073] In this case, main controller 69 selects the addresses in secret data areas 53 and 54 (step ST51 in Fig. 9). Then, data to be verified is issued to cryptogram collating portion 63 (step ST53). Main controller 69 issues the read signal to read change circuit 61 (step ST55). Thereby, read change circuit 61 applies the read voltage (step ST56). Cryptogram collating portion 63 collates the cryptogram read from secret data areas 53 and 54 with the verification target data applied from main controller 69 (step ST57).

[0074] More specifically, the cryptogram stored in secret data area 54 is applied to data converting circuit 75 (see Fig. 7). Data converting circuit 75 converts this cryptogram based on a predetermined rile, and applies the result of conversion to comparator 71. Comparator 71 is also supplied with the cryptogram stored in secret data area 53. Comparator 71 coalesces the data applied from data converting circuit 75 with the data applied from secret data area 53, and determines whether the resultant data matches with the applied verification target data. When matching occurs, comparator 71 applies the voltage "High" to mode terminal Te for read change circuit 61. Thereby, read change circuit 61 enters mode "0, 1" (step ST61 in Fig. 10).

[0075] Main controller 69 selects all the addresses in point area 51 and setting information area 52 (step ST63). Then, it issues the erase signal to read change circuit 61 (step ST65). In this case, the erase voltage can be issued from read change circuit 61 because mode "0, 1" is selected, and the addresses in point area 51 and setting information area 52 are selected. Accordingly, read change circuit 61 applies the erase voltage (step ST66). When the erase voltage is applied, all the bits in point area 51 and setting information area 52 hold "1".

[0076] Then, main controller 69 selects only the required bit(s) in point area 51 and setting information area 52 (step ST67). For example, it is necessary to write the data and time of erasing in setting information area 52 again. In this case, the bits holding data "0" are selected.

[0077] Main controller 69 issues the write signal to read change circuit 61 (step ST69). Read change circuit 61 applies the write voltage (step ST70). Thereby, only the selected bits hold the data "0". Main controller 69 applies the end message to modulator-demodulator circuit 33 (step ST71).

[0078] When the verification target data applied in step ST59 shown in Fig. 9 causes mismatching, main controller 69 selects all the addresses in point area 51 and setting information area 52 (step ST73 in Fig. 10). Then, the erase signal is issued to read change circuit 61 (step ST75). Read change circuit 61 does not issue the erase voltage, but issues the disabling voltage (step ST77) because the current mode is mode "0, 0". Accordingly, contents of point area 51 and setting information area 52 do not change.

[0079] In the embodiment described above, the disabling voltage is provided by placing the ground potential on line AG, and setting the other lines to the open state.

[0080] Main controller 69 selects only the required bits in point area 51 and setting information area 52 (step ST79). Main controller 69 issues the write signal to read change circuit 61 (step ST 81). Since the current mode is "0, 0", and the selected address relates to point area 51 and setting information area 52, read change circuit 61 does not issue the write voltage, but issues the disabling voltage (step ST83). Accordingly, contents of point area 51 and setting information area 52 do not change. Main controller 69 issues a message to the effect that rewriting could not be performed (step ST85).

[0081] When the cryptogram-mismatching occurs, read change circuit 61 does not apply the write voltage and the erase voltage even if main controller 69 issues the erase signal and the write signal to read change circuit 61.

[0082] As described above, the data in point area 51 and setting information area 52 can be changed only when the applied cryptogram matches with the cryptogram data which has already been entered or applied by the IC card user and the IC card manufacturer. Accordingly, the IC card described above can have high secrecy.

[3.4 Initializing Operation]



[0083] Description will now be given on the case where the initializing instruction is issued in step ST3 shown in Fig. 8 with reference to Fig. 11. The initializing instruction acts to set all the data in point area 51, setting information area 52 and secret data area 53 other than secret data area 54 to "1", and is given from the IC card manufacturer.

[0084] In this case, main controller 69 selects the address of secret data area 54 (step ST31), and issues verification target data to cryptogram collating portion 63 (step ST32). Main controller 69 issues the read signal to read change circuit 61 (step ST33). Read change circuit 61 applies the read voltage (step ST34). The cryptogram is collated in cryptogram collating portion 63 (step ST35). In this case, comparator 73 is supplied with data stored in secret data area 54, and determines whether the verification target data applied from main controller 69 matches with the cryptogram stored in secret data area 54 or not (step ST36).

[0085] When it is determined in step ST36 shown in Fig. 11 that the verification target data matches with the cryptogram, cryptogram collating portion 63 applies the voltage "High" to mode terminal Tf of read change circuit 61 (step ST37). Thereby, read change circuit 61 enters mode "1, 0".

[0086] Then main controller 69 selects all the addresses in point area 51, setting information area 52 and secret data area 53 (step ST38). Further, it issues the erase signal to read change circuit 61 (step ST39). Since read change circuit 61 is in mode "1, 0", read change circuit 61 applies the erase voltage (step ST41). Thereby, all the data in point area 51, setting information area 52 and secret data area 53 are initialized. Main controller 69 issues the end message to modulator-demodulator 33 (step ST42).

[0087] When mismatching occurs in the step ST36 shown in Fig. 11, the voltage "High" is not applied to mode terminal Tf of read change circuit 61. Accordingly, read change circuit 61 remains in mode "0, 0". Main controller 69 selects all the addresses in point area 51, setting information area 52 and secret data area 53 (step ST43). Further, it issues the erase signal to read change circuit 61 (step ST44). In this state, since read change circuit 61 is in the mode "0, 0", and the selected addresses relate to point area 51, setting information area 52 and secret data area 53. Therefore, read change circuit 61 applies the disabling voltage (step ST45). Thus, all the data in point area 51, setting information area 52 and secret data area 53 are not initialized. Main controller 69 issues a message to the effect that the initialization is impossible to modulator-demodulator circuit 33 (step ST46).

[0088] As described above, the initialization can be performed only when the applied verification target data matches with the cryptogram stored in secret data area 54, even when the initializing instruction is issued.

[3.5 Cryptogram Storing Processing]



[0089] In this embodiment, the IC card user stores the cryptogram or password in secret data area 53, and for this purpose, the data in secret data area 53 can be changed only one time after the data in secret data area 53 is initialized. When the data change instruction for changing the data in secret data area 53 is applied to main controller 69 after the initialization, main controller 69 allows the data change only one time so that the predetermined cryptogram can be stored in secret data area 53. More specifically, the above processing can be achieved through the steps from step ST61 to step ST70 in Fig. 10.

[0090] Main controller 69 stores whether the data in secret data area 53 is already changed or not, and will ignore the instruction for changing the data in secret data area 53 when this instruction is issued again.

[4. Other Embodiments]



[0091] The embodiment described above relates to the non-contact IC card employing the invention. However, the invention can likewise to applied to contact IC card.

[0092] Main controller 69 may form a CPU, or may be partially or entirely formed of a logic circuit. This is true also with respect to read change circuit 61, cryptogram collating portion 63, memory area selection detecting circuit 67 and others.

[0093] According to the invention, point area 51 is provided with the memory cells corresponding in number to the intended points, as already described. In the mode "0, 0", the data change is allowed to change the memory cell of point area 51 only from the unwritten state holding the data "1" to the written state not holding the write data "1". Thereby, forgery of the IC card can be prevented more reliably.

[0094] An ordinary read-out device provides only the instruction, which changes the data in point area 51 only in the decrementing direction, for the IC card side. Therefore, damages caused by so-called "impersonation" can be prevented.

[0095] The structure of memory 50 is not restricted to the foregoing, but may have such a structure that point area 51 and setting information area 52 are in one memory, and secret data areas 53 and 54 are formed in another memory.

[0096] Secret data areas 53 and 54 for providing the cryptograms in two stages are not essential, and only one of them maybe employed.

[0097] The embodiment has been described in connection with the case where the EEPROM is used as memory portion 50. However, another structure may be used for memory portion 50 provided that its allows change of data, and a flash memory, a ferroelectric memory or the like may be used.

[0098] Further, the present invention is similarly applicable to any storage other than these to which date is written electrically, for example, a storage to which date is written optically, provided that it allows switching between writing and erasure.

[0099] In this embodiment, if mismatching is found as a result of collation by the cryptogram collating portion, each of mode terminals Te and Tf, which are input terminals of read change circuit 61 with respect to cryptogram collating portion 63, remains in "Low". Accordingly, read change circuit 61 merely applies the disabling voltage to memory portion 50, and there is no possibility that the data is forged.

[0100] When the signal which acts to erase the data in point area 51 is applied, data "0" may be held in all the bits in point area 51 and setting information area 52 so that the card cannot be reused until the cryptogram is applied to secret data area 54.

[0101] In the above embodiment, the voltages "High" are applied to mode terminals Te and Tf of read change circuit 61 only when cryptogram collating portion 63 issues the matching signal. Thereby, read change circuit 61 ignores the data change signal sent from main controller 69. Alternatively, the collation mismatching signal may be applied to main controller 69, and main controller 69 may determine, based on this, that the data change cannot be performed so that the data change signal may not be not issued to read change circuit 61. Also, the message to the effect may be displayed.

[0102] In this embodiment, the disabling voltage is applied by placing the ground potential on line AG and setting the other lines in the open state. However, the voltage is not restricted to the above provided that neither writing nor erasing is performed. For example, 0 V may be applied to bit line BL for inhibiting the writing, and 0 V maybe applied to selected line SL for inhibiting the erasing.

[0103] In this embodiment, the state where data "0" is written is the written state, the state where data "1" is written is the unwritten state, and the data "0" is the written data. However, the state where data "1" is written is the written state, and thus the data "1" maybe the written data.

[0104] In this embodiment, the state where electrons are injected into the floating gate is the state where data "0" is held. Alternatively, the state where the electrons are removed from the floating gate may be the state where the data "0" is held.

[0105] In this embodiment, if the data "1" is held in the initial state, data "0" is set in the bit for reducing the points. Alternatively, data "0" may be held in the initial state, and the data "1" may be set in the bit for reducing the points.

[0106] In this embodiment, the voltages "Low" are usually applied to mode terminals Te and Tf so that only the rewriting for reducing the points in point area 51 is allowed, and erasing of the write data is allowed when the voltages "High" are applied to mode terminals Te and Tf. Alternatively, the voltages "High" may be usually applied to mode terminals Te and Tf, and erasing of the write data may be allowed when the voltages "Low" are applied to mode terminals Te and Tf.

[0107] In this embodiment, the disabling voltage is provided by placing the ground potential on line AG and setting the other lines in the open state. However, line AG may be kept at the ground potential.

[0108] In the above embodiment, point area 51 forms, e.g., a point storing portion. Main controller 69, address decoder 65 and read change circuit 61 form, e.g., a read portion. Main controller 69, address decoder 65 and read change circuit 61 form, e.g., a point changing portion. Secret data area 53 forms a point rewrite information storing portion. Cryptogram collating portion 63 forms a collating portion.

[0109] In the above embodiment, the expression to the effect that inhibition is performed by the circuit structure means that a specific circuit structure is employed for disabling specific processing. More specifically, a logic circuit or an electric circuit is used for physically inhibiting specific processing.

[0110] In this embodiment, the number of the data holding portions in the unwritten state ("1") is handled as the remaining points. However, the number of the data holding portions in the written state ("0") may be handled as the remaining points. Thus, all the data holding portions may be set to "0" in the all reset state, and "0" may be changed to "1" in accordance with reduction of the points.

Industrial Applicability



[0111] As described above, the invention can provide the point storing member of which illegal use is difficult, and therefore can be advantageously applied to the fields of manufacturing and selling IC cards.


Claims

1. A portable point storing member for storing points corresponding to moneys, comprising:

changing means for reading said stored points in accordance with an externally applied read instruction, and changing said stored points in accordance with an externally applied point changing instruction, wherein

change of said points in a direction of increasing said points is inhibited by a circuit structure.


 
2. The portable point storing member according to claim 1, further comprising point rewrite information storing means for storing, in advance, point rewrite information, wherein

said circuit structure is switched to allow change of the points in the direction of increasing said points when applied information matches with said point rewrite information.


 
3. A portable point storing member comprising:

point storing means for storing points corresponding to moneys, and having data holding portions equal in number to said points for holding write data;

read means for reading out the points stored in said point storing means in accordance with an externally applied read instruction; and

point changing means for allowing change of each of said data holding portions in said point storing means only from a first state to a second state in accordance with an externally applied point changing instruction.


 
4. The portable point storing member according to claim 3, further comprising:

point rewrite information storing means for storing point rewrite information; and

collating means for collating applied information with said point rewrite information, wherein

said point changing means can change each of said data holding portions from said first stale to said second state, and can also change each of said data holding portions from said second state to said first state in accordance with a result of collation by said collating means.


 
5. A method of using a portable point storing member, comprising the steps of:

storing, in advance, points corresponding to moneys in the point storing member having portability; reading the points stored in said point storing member in accordance with an externally applied read instruction; and changing said points in accordance with an externally applied point changing instruction, wherein

changing of the points in a direction of increasing the points is inhibited by a circuit structure.


 
6. The method of using the portable point storing member according to claim 5, wherein

said point storing member stores, in advance, point rewrite information, and

said circuit structure is switched to allow the point change in the direction of increasing the points when applied information matches with said point rewrite information.


 
7. A method of using a portable point storing member, comprising the steps of:

storing points corresponding to moneys in the point storing member having portability; reading the points stored in said point storing member in accordance with an externally applied read instruction; and changing said points in accordance with an externally applied point changing instruction, wherein

said point storing member has data holding portions corresponding in number to said points,

each of said data holding portions is allowed to change only from a first state to a second state, and

said point storing member stores the points in accordance with the states of the respective data holding portions.


 
8. The method of using the portable point storing member according to claim 7, wherein

said point storing member stores, in advance, point rewrite information, and

each of said data holding portions can be changed from said first state to said second state, and can also be changed from said second state to said first state when applied information matches with said point rewrite information.


 
9. A point storing member comprising:

storing means for storing points;

changing means for changing the points stored in said storing means; and

inhibiting means for inhibiting increasing of said points by said changing means.


 
10. The point storing member according to claim 9, further comprising:

input means for receiving data to be verified; and

comparing means for comparing said received data with a predetermined cryptogram, wherein

said inhibiting means inhibits increasing of said points in accordance with a result of the comparison by said comparing means.


 


Amended claims under Art. 19.1 PCT


1. (Amended) A portable point storing member for storing points corresponding to moneys, comprising:

a first cryptogram storing portion staring a first cryptogram set by a first person concerned with manufacturing of said point storing member;

a second cryptogram storing portion storing a second cryptogram set by a second person different from said first person and concerned with use of said point storing member;

changing means for reading said stored points in accordance with an externally applied read instruction, and changing said stored points in accordance with an externally applied point changing instruction; and

determining means for determining whether said changing means should be allowed to change the points in a point increasing direction or not, based on said first and second cryptograms.

2. (Deleted)

3. (Amended) A portable point storing member comprising:

point storing means for storing points corresponding to moneys, and having data holding portions equal in number to said points for holding write data;

read means for reading out the points stored in said point storing means in accordance with an externally applied read instruction;

a first cryptogram storing portion storing a first cryptogram set by a first person concerned with manufacturing of said point storing member;

a second cryptogram storing portion storing a second cryptogram set by a second person different from said first person and concerned with use of said point storing member;

point changing means for allowing change of each of said data holding portions in said point storing means between a first state and a second state in accordance with an externally applied point changing instruction; and

determining means for determining whether said changing means should be allowed to change the points or not based on said first and second cryptograms.

4. (Deleted)

5. (Amended) A method of using a portable point storing member, comprising the steps of:

storing, in advance, points corresponding to moneys, a first cryptogram set by a first person concerned with manufacturing of said point storing member and a second cryptogram set by a second person different from said first person and concerned with use of said point storing member; reading the points stored in said point storing member in accordance with an externally applied read instruction; and changing said points in accordance with an externally applied point changing instruction, wherein

changing of the points in a direction of increasing the points based on said point changing instruction is performed after determining whether said point changing instruction is to be followed or not, based on said first and second cryptograms.

6. (Deleted)

7. (Amended) A method of using a portable point storing member, comprising the steps of:

storing points corresponding to moneys in the point storing member having portability; reading the points stored in said point storing member in accordance with an externally applied read instruction; and changing said points in accordance with an externally applied point changing instruction, wherein

said point storing member has data holding portions corresponding in number to said points,

said point storing member stores the points in accordance with the states of the respective data holding portions, and is allowed to change only from the first state to the second state,

said point storing member stores, in advance, point rewrite information,

said point rewrite information includes a first cryptogram set by a first person concerned with manufacturing of said point storing member and a second cryptogram set by a second person different from said first person and concerned with use of said point storing member, and

said point storing member is used such that each of said data holding portions is changed from the second state to the first state only when applied information matches with said point rewrite information.

8. (Amended) The method of using the portable point storing member according to claim 7, wherein

said point rewrite information is supplied such that data relating to said first cryptogram is supplied in accordance with timing different from that of supply of data relating to said second cryptogram.

9. (Amended) A point storing member comprising:

storing means for storing points;

a first cryptogram storing portion storing a first cryptogram set by a first person concerned with manufacturing of said point storing member;

a second cryptogram storing portion storing a second cryptogram set by a second person different from said first person and concerned with use of said point storing member;

changing means for changing the points stored in said storing means;

input means for receiving data to be verified; and

comparing means for comparing the data received via said input means with said fist and second cryptograms, wherein

it is determined whether said changing means should increase said points or not, based on a result of the comparison by said comparing means.

10. (Deleted)


 




Drawing





































Search report