throbber
DOJ EX. 1035
`
`1/29
`
`DOJ EX. 1035
`
`

`

`dnaS.wIUanGreAdnmmN
`Space Admlmsiration
`
`Goddard Space Flight Center
`Greenbelt, Maryiand 20771
`
`G02 I027
`
`2/29
`
`DOJ EX. 1035
`
`

`

`.SdE3CLir.amS
`
`
`
`..!.-lt..11..u/..
`
`3/29
`
`DOJ EX. 1035
`
`

`

`For a complete listing
`
`.mTwWHsflCMrAemf0
`turn to the back of this book
`
`HummaC
`
`icatzons Library,
`
`G02 I029
`
`4/29
`
`DOJ EX. 1035
`
`

`

`Smart Cards
`
`00JTJ
`rwrw
`
`
`
` HmmMWmmuaLM
`
`Artech House
`
`Boston as London
`
`G02 1030
`
`5/29
`
`DOJ EX. 1035
`
`

`

`Library of Congress Cataloging-in—Publication Data
`Zoreda, José Luis.
`Smart cards 1 Jose Luis Zoreda
`Includes bibliographical references and index.
`ISBN 0-89006687-6
`1. Smart cards. I. Otén. Jest‘: Manuel.
`TK7895.S62086
`1994
`‘
`OO6—dc20
`
`II. Title.
`
`A catalogue record for this book is available from the Brifish Library
`
`© 1994 ARTECH HOUSE, INC.
`685 Canton Street
`Norwoud, MA 02062
`
`All rights reserved. Prmtcd and bound in the United States of America. No part of this book may be
`reproduced or utilized in any form or by any means, electronie or mechanical. including photocopy- 1
`ing, recording, or by any information storage and retneval system, without permission in writing “
`from the publisher.
`
`International Standard Book N_umI:1er: o-39005-537-5
`Library of Congress Catalog Card Number: 94-7671
`
`10937654321
`
`G02 I {)3 l
`
`6/29
`
`DOJ EX. 1035
`
`

`

`.-i‘,4.1-,-A-...
`
`G02 1032
`
`Contents
`
`Preface
`
`Chapter 1 Old Cards and New Cards
`1.1
`Contents of the Book
`1.2 Basic Card Types
`1.2.1 Magnetic Stripe Cards
`1.2.2 Optical Cards
`1.2.3 Chip Cards
`Communicating With Cards
`Plastic Cards and Magnetic Stripe Cards
`1.4.1 Origin of Plastic Credit Cards
`1.4.2 Automatic Teller Machines
`

`Electronic POIIIIIS pf Sale
`1.4 3
`1.4.4 On-Line and Off-Line Systems
`1.4.5
`Interchangeability
`1.4.6
`Point-of-Sale Dilemma
`1.5 Costs
`1.6 Conclusions
`
`_
`
`>4
`
`\D®‘--JG\G'\Lll-P-L»-li..nJ-—--Z:
`
`Chapter 2 Data Storage Cards
`2.1 Magnetic Stripe Cards
`2.1.1
`Coercivity
`2.1.2 Magnetic Stripe Encoding
`2.1.3 Magnetic Stripe Reading
`2.1.4 High-Coercivity Stripes
`2.1.5
`Fraud in Financial Magnetic Stripe Cards
`2.1.6 Magnetic Stripe Security
`2.I.7 Nonfinancial Magnetic Stripe Cards
`Optical Cards
`2.2.1 Optical Card Standards
`
`vii
`
`
`
`
`
` .i..:&:':.£'::a.=s?..;.@e'»;_«"_,.'.T'?.'¢E‘¢#l..’.5'-
`
`
`
`- -
`
`P.
`
`._Lg.
`
`
`
`7/29
`
`DOJ EX. 1035
`
`

`

`2.2.2 Writing and Reading Optical Cards
`2.2.3
`Formatting Optical Cards
`2.2.4
`Error Correction in Optical Cards
`2.2.5 Optical Card Applications
`2.2.6
`Erasable Optical Cards
`Chip-Based Storage Cards
`Conclusions
`
`2.3
`2.4
`
`Chapter 3 Chip Cards
`3.1
`Origin of Chip Cards
`3.1.1
`First Chip Card Manufacturers
`3.1.2
`Early Experiences
`3.1.3 Chip Cards for Public Phones
`Card Security
`3.2.1
`PIN in Magnetic Stripe Cards
`3.2.2 Message Encryption and Decryption
`3.2.3
`Secret Codes in Smart Cards
`3.2.4 Cryptography in Smart Cards
`Chips for Cards
`1
`3.3.1
`Integration Scale in Microelectronics
`3.3.2 Card Chip Security
`3.3.3 Card Chip Manufacturers
`Smart Cards and Sinan Devices
`3.4.1
`Reduced-Size Cards
`3.4.2
`Smart Keys
`3.4.3
`Smart Disks
`3.4.4 Contactless Cards
`Conclusions
`
`3.5
`
`Chapter 4 Anatomy of a Smart Card
`4.1
`Inside a Card
`4.2
`Memory
`4.2.1 Volatile Memory
`4.2.2 Nonvolatile Memory
`4.2.3 UserlApplication'Memory
`CPU and Operating System
`4.3.1 Card Mask
`4.3.2 Wired Logic and Microprocessors
`Other Circuits
`4.4.1
`Reset Circuit and ATR
`4.4.2 Clock and Synchronization Circuits
`4.4.3 Communication Circuits
`
`G02 1033
`
`8/29
`
`DOJ EX. 1035
`
`

`

`Design and Manufacturing: an Example
`4.5.1 Chip Design
`4.5.2 Chip Manufacturing
`Contacts and Embedding
`4.6.1 Contact Manufacturing and Location
`4.6.2 Contact Function
`
`4.6.3 Chip Card Body
`4.7 Conclusions
`
`The Language of Smart Cards
`Chapter 5
`5.1
`Instruction Set and Smart Card Operating System
`5.2 Answer to Reset
`5.2.]
`First ATR Character, Elementary Time Unil
`5.2.2
`Second ATR Character, Interface and Historical Characters
`5.2.3
`Extra Interface Characters
`5.2.4 Global Interface Bytes
`5.2.5 Historical Characters
`5.2.6
`TCK Character, End of ATR
`Protocol Type Selection
`Protocol Type T = 0
`5.4.!
`Command Structure
`
`Procedure Byte
`5.4.2
`5.4.3 Communications Protocol in 78I6f4
`5.4.4 Other Protocols
`
`Memory Structure
`5.5.1
`Structure ofRAM
`
`Structure of Nonvolatile Memory
`5.5.2
`5.5.3 Memory Zones
`5.5.4 Hierarchical Memory Structure
`Security
`5.6.1 Cryptographic Algorithms
`5.6.2 Keys
`5.6.3 Key Functions
`5.6.4
`Security in ISO 7816/4
`5.7 Conclusions
`
`Programming 21 Smart Card
`Chapter 6
`6.1
`Software Functions
`
`6.2 WritingfReading Unit
`GUTI GC2 Smart Card
`6.3.1
`EEPROM Structure
`6.3.2 Answer to Reset
`
`9/29
`
`DOJ EX. 1035
`
`

`

`Chapter 4
`
`Anatomy of a Smart Card
`
`-33-
`~.
`'ifi§‘_._In this chapter. we will take a fascinating trip through the microscopic world of card
`. microekectronics. We W111 give you the ability to peer into the lCs‘1ncluded in a smart
`_; card and into their functional blocks. Some details on microcircuit nianufacturing are also
`: reviewed. ISO standards, as far as hardware 15 concerned. will-Be included here and there
`. throughout the chapter.
`.
`-
`'
`L
`'
`Smart cards are the main subject of this book. However, it seems interesting to
`include here some references to non—ISD related devices sharing the same manufacturing
`'- technolog1es, but having different applications. Technologies of data banks, memory
`.‘cartridges. and similar storage devices on the one hand and battery-powered chip cards
`3' on‘ the other hand are mentioned below.
`
`~.
`-.-
`
`4.: INSIDE A CARD
`
`_ Chip cards from the outside can be easily distinguished from common credit cards by a
`_dnne-sized golden plate located near the edge. The plate is divided into eight areas (some
`.. cards, such as McCorquodale and Gemplus. have only six; see Section 4 6). These are
`the:__contacts employed by the microcircuit to communicate with the outer world. If the
`contacts were transparent, a dark. shiny,
`l—mm’ gadget couldbe seen behind them. -This
`isithe microcircuit. Looking inside (see Figure 4.1), several connected large and small
`' rectangular blocks may be found:
`"
`'0 "Memory areas;
`"“‘ II -Central processing unit (CPU);
`‘‘ 9 Protection circuits;
`at Reset circuit;
`1'-0 Clock;
`4 4" Input-output area.
`
`G02 1095
`
`10/29
`
`DOJ EX. 1035
`
`

`

`
`."*7"-‘-J-iw-_'.-‘-‘t=:‘..'-In-aRHr.'a...:._'~.--'
`
`
`"V-‘ML‘ér¥uf‘-A1-lrfl"I'r‘1‘-in-l!'\.'."I%ill.‘-J33hH‘nu’!-.-:.-«.1.-:-r.‘.-'....'-.:-.-._g.--v--.-....-‘>1~‘=v--»«-
`
`
`
`
`
`‘r-x‘:-rt"-”--v"-..-oi-.
`
`vknlxvh-r'1h‘."rr-_'..,¢;..-‘\J_~1=*-
`
`
`
`-.'-i.'5sv:~'~r'
`1-...9',z\.:(-up
`
`-_
`
`Figure 4.1 inside a smart card. behind contacts, a rrtic rocircuit divided into several blocks with different functions
`maybefound.
`-
`'
`'
`'
`‘
`.
`'
`‘
`The specific areas found inside the chip depend on the card model. Memory cards have
`no CPU. whereas other cards may lack reset circuitry or clock.
`
`4.2 NIEMORY
`
`Therlargest microcircuit areas are- occupied by different kinds of memory. Cards must
`hold data, code, and other permanently stored information in ‘order to perform their tasks. ‘
`In standard deslctop computers, data and instructions managed by CPUs are stored iii 1.
`electronic lCs, where theycan be randomly accessed: under this form; data are compiled:
`4
`modified, read. written‘, and moved. This data crunching is at'Lhe ‘very heart-of computing:
`Once the task is finished. however, intermediate results are no longer needed andmust
`be erased to allow space for the next task. Hence, the internal memory of computers is .
`erasable. Moreover, it is usually dynamic; that is, data are lost upon power removal. When ‘
`the power is on. the memory must be refreshed every now and then (every few.mi_1liseconds.
`in fact) to keep data stored in their place.
`I
`Support for permanent data backup in computers is given by external peripherals,
`usually hard disks, floppy disks, or similar magnetic media. Fast, inexpensive _dynamic :3;
`, .
`
`"‘Q-‘.7-n-w
`
`G02 I096
`
`11/29
`
`DOJ EX. 1035
`
`

`

`__.,
`'-
`
`'
`
`memory and magnetic permanent media make a perfect team for handling data in comput-
`It is worth mentioning that, in practice, magnetically stored code cannot be directly
`_‘
`- executed by microprocessors (i.e., a magnetic stripe card could not store an executable
`-
`; 53;“ program, though it could store the program code); besides, the seek access time of hard
`
`disks is measured in milliseconds whereas the access time ofdynamic memory is measured
`
`innanoseconds, some million times faster.
`,
`'
`Smart and memory cards usually need permanent or nonvolatile memory for most
`» ‘,3 applications and memory zones. Small chunks of volatile memory may also be included
`_.
`"as intermediate memory storage for direct code execution and scratch pad data handling
`(Figure 4.2). The use of dynamic memory is not realistic for permanent storage, even in
`_ artery-powered cards. Instead, nonvolatile IC technologies for internal card memory are
`
`.
`
`G02 [G97
`
`storage devices share this technology. An important difference. however, arises from
`storage capacity. Smart cards require at most a few kilobytes of storage memory. Some
`IC memory cards, such as PCMCIA cards, require several megabytes. These devices are
`
`(Oerating system)
`
`E5
`
`I
`E
`
`RAM
`(Scrath pad)
`7
`eepnomrspsom
`(Nonvolatile)
`'
`7 ..._._....-_..._.
`
`\\“
`
`h___
`
`,
`
`LIL
`
`12/29
`
`DOJ EX. 1035
`
`

`

`used as nonerasable (read-only) data banks or even as high-density removable storage for
`smaller and smaller portable computers.
`.
`-
`-
`-
`IC memory technologies, like most electronic systems, are based on silicon. Several
`silicon technologies are currently used in cards. Volatile Memory includes dynamic random
`access memory (DRAM) and static random access memory (SRAM). Nonvolatile Memory
`includes read-only memory (ROM) and erasable, programmable read—only - memory
`(EPROM). The nonvolatile categories are actually a bunch of different technologies sharing
`nonvolatility and little else. Details are discussed in the following sections.
`
`4_.2.1'_vo1atiIe Memory
`
`Dynamic and static RAM may be«employed.inside a‘ card for several uses. Unless the
`card is battery powered, the contents of these types of memory are lost in the sh_ort; or
`long term (usually 1n the short _term). The difference between dynamic and static RAM
`is that static RAM need not be refreshed, allowing data storage with very low power
`consumption. Nevertheless, data are lost if power is removed (i.c., if the battery runs out).
`SRAM may be used in cards containing batteries to keep some relevant though noncritical
`data such as time and date.
`‘
`DRAM is employed in cards as a working area (scratch pad) when the card is
`inserted into a reader (i.c., it __has an external power supply). Cards use that volatile memory
`in a RAM stack where intennediate results of calculations_ or_data encryption processes
`are stored. After finishing every step, data are erased and DRAE/l"is used in new ical'cula'4
`Lions. DRAM is preferred over-_ SRAM for itssimpler, more reliable design (a bit is made .
`of a single metal oxide siliconZtransistorlanached to a capacitor}. _SRAM features low fl
`voltage and power consumption,--but its iirEj._hitecture»(fodr transistors, two ii-esistorsper
`’
`cell) reduces storage density andlincreascs the cost—per—bit ratio.
`'
`Although RAM is usually associatedwith volatile memory,_ ‘new technologies for '
`achieving nonvolatile RAM are being-developed. For e;rarrrple,"'ferroclectronic RAM
`(based on ferroelectric materials like‘-leat'l_ ziirconate titanate) might be a breakthrough in
`memory technologies by combining the .pe_i‘fonnance of‘DIR.AM with the nonvolatility
`goal.
`-
`—
`--
`-
`‘
`‘
`‘
`'
`
`4.2.2 Nonvolatile Memory
`
`Most memory zones in cards are based on nonvolatile memory. Data stored in this memory
`are not lost when power is removed (e.g., when the card is unplugged from the writing]
`reading unit). Storage, however, need not be permanent: in fact, many memory zones
`must be updated when the card is operating; other zones must always keep the same
`information (e.g., the card mask; see below). Several nonvolatile memory technologies
`may be found in cards to account for these different needs.
`.-
`-
`
`‘
`
`*
`'
`
`G02 [G98
`
`13/29
`
`DOJ EX. 1035
`
`

`

`Pennanent information can be stored in ROM. Either the information is recorded
`at the same time as the chip is created or is included in a further prograriuning step.
`In the first case, the information (data, code, program, etc.) is included in the same
`photolithographic masking process used to manufacture the chip (hence the name masked
`ROM). Strictly speaking, this is the only ROM; memory created by other ROM technolog-
`ies is written at least once. Masked ROM is an inexpensive, reliable, and high-density
`technology. Its major drawback comes from its own irreversibility: code errors and revi-
`sions imply costly modifications in the manufacturing chain.
`The above situation is avoided by the use of write—once, read—many technologies.
`Programmable ROMS (PROM) allow customer programming by blowing specific fuses
`in the assembled chip. Again, the memory is permanent; once the information is written,
`it remains in the chip forever. A further step in flexibility (and a new letter in the acronym)
`_is offered by EPROMs. In this case, the PROM may be erased by an extemal action,
`iisually ultraviolet light exposure. This memory is easily identified in acompiiter mother
`-- board by its small
`transparent windows on the top of the chip. A major advance in
`-, nonvolatile technologies notwithstanding, ERROMS and PROMS are functionally identical
`‘
`in a chip card. For one thing. it is quite difficult to expose an embedded chip to ultraviolet
`‘ radiation without destroying‘ the card! The use of EPROMs in cards derives from other
`reasons, mainly reliability and simplicity (one transistor technology).
`1'
`" Finally, let us look at electrically erasable, programmable ROM (El-EPROM). A
`tvvo-transistor technology, EEPROM provides nonvolatile memory that is erasable and
`rewritable by electric signals. EEPROM may be used as RAM. Though its higher cost
`precludes its application in desktop computers, it is a perfect candidate for accomplishing
`most memory requirements in IC cards. A minor problem of El-3PROMs is that erasing
`and writing operations usually require higher voltage than reading. ISO standards include
`a‘ 2lV power supply for these ‘operations; though current cards often disregard this facility.
`r The regular power supply (5V) is used instead, its voltage being internally increased as
`needed.
`-
`‘
`
`’_
`
`
`
`"..r.r.
`
`..
`
`'~'Flash memory is a simpler EEPROM technology (one dual gate transistor per cell),
`“
`and is an alternative to classical EEPROMS. It features higher density, lowercost, and
`greater ‘reliability. Besides. writing and erasing can be obtained at lower voltages than
`standard EEPROM. Its drawback is that sing1e—bit erasure is not possible: flash memory
`must be block-erased. Hence,
`this memory may be used in memory zones where the
`information is modified as a whole; it cannot be employed when the updating of a single
`'piece of data is required.
`'- " ' Memory complexity affects the size of the memory cells as well. Using a ROM
`cell as area unit, EPROM arid EEPROM cells would cover two and six units. respectively.
`_ This is ‘not as bad as SRAM. with sixteen units.
`
`.
`
`4.2.3 UserlApplication Memory
`
`Several kinds of memory are used in a single IC card. From the issuer or user point of
`view, however, the most important (perhaps the only important) memory is the user!
`
`( ‘:02 I099
`
`14/29
`
`DOJ EX. 1035
`
`

`

`application memory (UAM). UAM is EPROM or EEPROM that holds the specific informa-
`tion on every application. The irifon-nation is usually a data set including user data, issuer
`data, and operations (transactions) performed by the card. In some applications, UAM
`may also contain executable functions (EXEC functions). Code is included in UAM, for
`example, when the.standard ROM program (the mask; see next section) is not able to
`perform some operations, or simply when the issuer .wants to take advantage ,0f-‘l.l'llS
`option for security or speed. UAM size in cuirent cards varies from 1K to 16K (some,
`' manufacturers are developing 64K UAMS)..
`UAM is protected by the microprocessor, which filters data flow, manages data
`storage and reading, and runs the preprogramrned executable functions, if any. -A number,
`of cards have UAM divided into several zones. Memory zones are in turn divided into
`files and recordsand are protected by special hardware. A typical partition is given below
`(Figure 4.3).
`‘
`The Manufacturer zone. includes microcircuit andfor card ID data, which are stored
`during manufacture and hardware-protected against further access.,
`_.
`In the Secret zone the data cannot be accessed from the outside. Only the microproces-
`sor can take advantage of them: This z.one_holds. for example, secret codes such as the
`issuer key and the user PIN. Protection is provided via hardware, as in the previous case,
`or by means of an internal program
`_
`.
`__
`The Status zcmelcontains access attempts to the card. either through user PIN or
`through issuer key. Other secret codes may also be _included. Attempts are sequentially;
`stored, allowing __the card _to.decide its._self-blocking ior self-destruction accorg:Iing'
`to
`preprogranuned‘cr'iteria.‘Fpllowing the issuer instnictions. for example, the card may self:
`block after three consecutive wrong user. Pl'Ns_or may ffcomn'u'_t suicide," after an-single
`wrongjssuer key._
`-
`r.
`.
`Older [C cards requlrecithe separation offree access data zones and protected diota .
`zones (e.g., by PIN or_ issuer k_ey)..At present, many cards permit the definitionof every
`file. either free or protected by any key combination. Therefore. free and confidential
`zones are currently found in the same memory_ zone. Definition of file attributes _'is
`customarily performed by the issuer and protected by the issuer key.
`The Transaction zone contains most variable data (c.g., commercial transactions,
`hence the name). Data format, files, and record structure depend on the application.
`Typically, a secret code is required to access the zone. New card models allow different '
`protection for reading and writing in the same _file. For example, some data may be freely ‘
`read, but permission is required to modify them This feature is quite interesting in a
`number of instances (e.g., in electronic purses). Actually, there is no difference between .'
`transaction, free. and confidential zones. They are usually separated for historical reasons.
`since old cards had a fixed memory arrangement where these zones were predefined.
`
`_
`
`.
`
`_ 4.3 CPU AND OPERATING SYSTEM
`
`Microciicuits of current smart cards are almost complete computer systems without key-
`board and display. In fact, some non-ISO active cards such as super smart cards include
`
`.
`
`.
`
`‘
`
`G02 I 100
`
`15/29
`
`DOJ EX. 1035
`
`

`

`
`
`..40...um.
`
`....mo.u§_&<w3:
`
`_.
`
`
`
`
`
`.Hanna.S$uuBmEo_E
`
`
`
`nHi.n_L..._.fl4....!Lr:T...F..k.,
`
`Hum
`
`0“???
`
`
`
`amuoumuu._n_
`
`
`
`.nI...1|.....aT..|l...:..
`
`
`
`
`
`__m_..EmUm:oU_...u...E:wEmax._o=$_
`
`uB_a.2Z555
`
`»._.E5&..§E
`
`m.E%3:0
`
`
`
`_.0oEoE:o_Eu._umm.uum=nomucus_mu§__.._.n.vuunufi
`
`
`
`
`
`16/29
`
`DOJ EX. 1035
`
`

`

`
`
`
`
`.-....-..-.;.....~.—-;-..-..-.»i.a-.....i-7..71..
`
`
`
`
`
`keyboard; display, and battery inside the same ca_rd_~sized device. The core of_ the card
`microcircuit is the microprocessor, usually called CPU. This CPU is able to execute an
`instruction set that ultimately defines the capabilities of the card. The instruction set is
`permanently wired into the card. Card chip manufacturers (see Section 3.3.3) use only a
`few architectures in smart card CPUs: H813 10 (Hitachi). 62'?xx (Oki). ST8 {Thomson},
`8051 (Inte_1),_ and 6805 (Motorola). All of them employ 8-bit instructions and have a 16-
`bit data bus: Quite recently. Gemplus has introduced a reduced instruction set computer
`(RISC) processor for smart cards. Higher level functions are alsqperrnanently stored in
`the card rneinory, indicating to the_ CPU what to do, when, and how to do it.' These’
`functions could belconsidered the smart card operating system (ASCOS). The S§'3Q'S allows
`the CPU to manage the UAM according to external commands the user invokes from_ an
`interface device. When a card is provided with a microprocessor. it always takes care of
`memory management and _dara security by itself. Any external access to card memory; or
`functions is performed through the CPU. The SCOS is also used to define EXEC functions
`eventually stored in the UAM.
`-I
`1
`
`4.3.1 Card Mask
`
`F
`
`From the ’oLitside. 'card behavior;is greatly determined by its SCOS. Different SCéSs
`applied to the same CPU results in cards with different capabilities. whilelthe opposite"
`situation, providing that CPUs of similar perfonnance are used, may remain unnoticed.
`In the cards‘ world, the SCOS is t1fadi_tioi'ially known as the card mask.
`The 'CPU1_and SCOS_togetlier make quite a powerful team. These cards are.- in
`practice, independent computing systems. Programmed logic allows the card to make; its
`own decisions concemingaccess to stored data‘ (readirig and__writing), no—answer condition‘
`in uncertain sitiiatidns. or self-bldcking. In summary, smart cards are characterized by:
`0 _ High Securify. Data a'cEess is‘;‘ih'c:iroughly controlled by the CPU, and is only permitted
`7 when predefined conditions are met.
`‘
`..
`.
`.
`.
`.
`-
`'
`or High Flexibility. Data management may be altered depending on external require-
`ments. thus allowing specific tailoring of the application.
`‘
`'
`'
`‘ '
`Multiple Seryices. Several applications (services) may share the same card. The
`CPU controls each application by itself or through EXEC functions. The applications
`may be independent or related and may be prepared by the same issuer oriby
`different ones.
`\
`'
`'
`
`The SCOS is stored in ROM, a safe place to avoid eventual modificatioiis. {The
`SCOS is sometimes called standard ROM program.) ROM is manufactured or prepared
`at the same time as the chip itself (see above). It can only be accessed and used by the
`card CPU._Being aconstant part of the riiicrocircuit for every smart card, card masks {are
`usually identified by their ROM design. ROM size typically varies from 2K to 16K. Some
`cards employ EEPROM for the SCOS zone; these are usually used for the design and
`development of new functions and applications. They also offer higher security against
`
`G02] 10?.
`
`17/29
`
`DOJ EX. 1035
`
`

`

`electronic scanning microscopy, since EEPROM information is erased by electron beams.
`In most cases these cards are not commercially available. The highest flexibility in
`commercial cards is currently demonstrated by several manufacturers who have developed
`selectable SCOSs (different operating systems for the same card).
`Besides ROM, the CPU employs other kinds of memory for different uses. Most
`important for CPU internal data handling is a volatile RAM called RAM stack. RAM size
`in current smart cards varies from 128 to 768 bytes. Intermediate results and encryption
`processes are temporarily stored in this memory. The memory is freed afterwards for the
`next task. The contents of this memory are lost when power is removed.
`
`4.3.2 Wired Logic and Microprocessors
`
`Many cards lack a microprocessor and many applications are nicely accomplished by not-
`so—smart cards. When designing an application where cards are involved, the first question
`to ask is how sma.rt the cards need to be. IC cards are divided into three fundamental
`
`categories, ultimately depending on the way data are protected from fraudulent access.
`A sorted list for increasing IQ might be (1) dumb cards‘, (2) wired logic cards, and (3)
`smart cards.
`
`Dumb cards have a memory circuit and are provided with reading and writing functions,
`but lack access control. Communications with external peripherals are usually synchronous.
`Advanced models of these cards are equipped -with EEPROM (rewiitable) memory ranging
`from 256 bytes to tens of kilobytes. Moreover; many data cartridges and memory banks
`should be included in this category, since they have no control over their stored data.
`‘
`The second group, wired logic cards, features an access control unit, but card
`capabilities‘are limited to some prerecorded functions. Several types, ‘described below,
`can be found, depending on the way access control is achieved.
`'
`Memory in EPROM cards is split into two or more zones, according to memory
`addresses. Data reading is allowed in every zone; however, one of the zones (read-only)
`does not allow writing. Protection of this zone is achieved by blowing an internal metallic
`or logic fuse. The issuer stones hisfher data in the proiectable zone and blows the fuse.
`creating soirie logic states (specific voltages) in the protection circuit gate. This action
`precludes any further writing and addressing of the zone. However, the circuit allows
`reading orders. These cards are chiefly employed in public telephone services or for ID
`purposes.
`-
`A certain device (e.g., a diode array) inside programmable logic array (PLAJ cards
`is programmed with an access logic. The FLA compares a keyed access code with an
`intemal code recorded in amemory zone. Access is allowed when matching is found.
`Some memory zones (e.g., where the code is stored) are restricted. Several applications
`may share the card, each one having its own FLA. For example, a memory zone may
`contain the issuer key and the user PIN. A logic may be defined in the PLA in such a
`way that the zone can never be rewritten, but can be read when the issuer key is introduced.
`
`G02 I l(]3
`
`18/29
`
`DOJ EX. 1035
`
`

`

`
`
`
`
`“s...‘:...'¢..\
`
`
`
`""'r.9!*‘ac.-.—-...._:.-«—..-_-.-:.----uu5.=_-w|xn-mt~-—~-e.-I.t-umnt..:.-t':.-'.:.:..—.
`
`Similarly, another zone may be written via PIN, whereas reading is reserved for die issuer
`key.
`-
`-
`'
`.Some. other cards (hybrid cards) combine both protection systems; An area of the
`memory is protected by a fuse; whereas other zones are-free or protected by PLAs. In
`these cards, the fuse-protected zone is usually-employed to store user and issuer codes and
`application ID, while the PLA zone-programmed with all possible access combinations--is
`used for transactions. Memory in these cards may be EPROM or EEPROM.
`The third group. smart cards, includes a microprocessor in the chip. The presence
`of the microprocessor opens new possibilities for memory management, as mentioned
`above. New cards allow a floppy-disk-like memory management, including directories,
`files, and records. The memory may contain data andfor executable code (EXEC functions).
`Moreover, the microprocessor allows asynchronous corrimunication between the card and
`its interface device (writing/reading unit), increasing the system security.
`
`-—l
`
`4.4 OTHER cincurrs
`
`__;.\,.tcd=~at’».'*~*-.md-.-~ii-_.-..,
`
`i,t.:_v...-_a--.--
`3..~-
`
`#5V‘.,
`P..
`+\- '.'
`is tr:
`3'J
`'2
`3
`
`In our journey around the card chip, several other circuits may also be seen. Besides
`metallic fuses for data protection (see previous section), the card may have protection
`circuits to avoid electric damage of card parts or counterfeiting. For example; it may be’
`protected against voltage fluctuations in power supply or signals beyond the ranges allowed
`by the ISO standards; Moreover, the card requires extra circuits for three basic tasks:
`reset, -synchronisation, and communications.
`
`4.4.1 Reset Circuit and ATR
`
`Any computing system performs a reset operatioriwhen switched on. Through reset, the
`computer comes to'life- and realizes its own electronic existence. In cards, this operation
`is performed through an internaispeeific reset signal, triggered by an external command
`from the interface device. The reset signal may be either the same signal sent by the
`external command or a new signal generated by an internal reset circuit. In the second
`case, the external reset asks the internal reset circuit to generate the signal and to set up
`the different devices-included in the card.
`'
`'
`-
`The most important fact in reset operations is that the command, either internal or
`external. also produces a specific answer, called answer to reset (ATR), which is sent
`back to the interface device. ATR is defined by a standard protocol (ISO 7816/3). It
`includes enough information identifying the card type and sometimes the card model and
`the application (Hello, I'm a standard card manufactured by Z22, I have a microprocessor,
`my working frequency is XXX. etc.). Any ISO card, therefore, can be properly identified
`by any reader, regardless of its brand and application. This feature is most useful for the
`external system in order to decide whether the card belongs to an application or not;
`
`G02 I
`
`I 04
`
`19/29
`
`DOJ EX. 1035
`
`

`

`
`
`“‘1-"-W"-“wt-“-~_-'"':"<'aEl-3-||l9III'"-'rvw--B1'11.‘-\'\¢'I'i""‘vr<
`
`
`
`
`
`furthermore, the same writinglreading unit may be simultaneously used for several applica-
`tions and services using cards from different manufacturers.
`
`4.4.2 Clock and Synchronization Circuits
`log between the card and the interface device, require signal
`ATRs, as well as any other dia
`ard‘ 5 internal operations and
`synchronization. Timing signals are used to synchronize the c
`communications. These timing signals may come from an external clock provided by the
`interface device. The card is directly driven by the clock or through internal timing and
`buffer circuits (buffers are needed to avoid delays within the microcircuit devices).
`Alternatively. the card may be provided with an internal clock. The internal clock
`frequency need not be the same as that employed in reset. In fact, the ATR signal provides
`the specific clock frequency of the card. This information may be used to select the
`e usual frequency of current cards ranges from
`frequency for eventual communications. Th
`5 to 14 MHz
`
`4.4.3 Communication Circuits
`Communications to and from the card are performed by an inputloutput (I/0) port, which
`makes use of one of the contacts (Le. a bidirectional bitw_ise U0 port). The port may
`work in synchronous or asynchronous mode. There is_ some spurious electrical resistance
`in the circuit for signal flow from the card to the outside and vice versa. Indeed. the
`electrical continuity is performed by the interface device contacts pressing on the golden
`card contacts. Dirtiness in contacts produces ohmic resistance. To avoid signal degradation
`and electrical noise. the I/O port may include an internal amplifier.
`
`4.5 DESIGN AND MANUFACTURING: AN EXAMPLE
`
`ed to manufacture IC cards
`There are no substantial differences in the techniques employ
`y other general-purpose microelectronic lCs, except for hardware protec-
`compared to an
`tions and sensors discussed in the previous chapter. Detailed descriptions of IC manufactur-
`ing processes are beyond the scope of this book. Instead. we will describe the design
`steps of a specific card and will browse through hardware manufacturing.
`
`4._S.1 Chip Design
`Let us design a simple card for prepaid public telephone calls. First, we must define card
`capabilities and performance. In this case. the following characteristics are needed.
`9
`It should allow storage of data related to the phone company (issuer), charge unit
`price, card serial number. and so forth.
`
`G02 I I05
`
`20/29
`
`DOJ EX. 1035
`
`

`

`
`
`'1-=_=;:~:-we.--=-r-r-=;*_'-_=_--_.
`
`
`
`
`
`'
`
` ._____
`
`The above information must be protected; that is, it may not be altered after being
`recorded by the issuer.
`Data access should be controlled.
`A memory zone is needed to store credit! (number of allowable c_all units) and used
`units. This zone, obviously. must be accessed for reading and writing.
`Finally, there must be a predefined working logic. In this case, (a limited number
`of instructions is required: reset. bitwise reading and writing, and bit addressing’.
`The nei-it step is a block (functional) design based on the above characteristics. Figure
`4.4 shows the block diagram of our card. The blocks are:
`’
`"
`0 An EPROM consisting of 256 one-bit ,words. Words are addressed by a binarivi
`counter controlling row and column decoders. Our memory is_ thus addressed_as a
`16 X 16 matrix, where every element is accessed by its row and column coordinates.
`to A small instruction decoder which generates card control signals. In our case. the
`required signals are writing and reading bit operations, counter increments. and
`FCSEI.
`
`._
`
`EPROM
`
`Free
`Read—only
`
`Total '
`
`160 bits
`96 bits
`
`255 bits
`
`Figure 4.4 Electronic components of a PLA memory card
`
`
`
`
`
`<*‘'.'r1*§'€'I':‘a-tia«‘§'a:'¢"r."i¢:a‘I4'.'R'.73-tiri":'~,l';‘5.2.-ma.
`
`G02 l I06
`
`21/29
`
`DOJ EX. 1035
`
`

`

`Two memory zones are defined inside the memory. The first zone has 160 read!
`write bits, whereas the second zone has 96 read-only bits. A protection block is
`added for detection and inhibition of writing operations in the protected zone.
`A timing circuit that produces two signals. Both are used to adapt the voltage levels
`of memory cells before reading.
`A writing/reading amplifier to send data from

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket