Data processing method, system and apparatus for processing a variety of demands from a service provider

ABSTRACT

An IC card issuer issues an IC card and requests a card memory area operator to lend part of a memory area of the IC card to another card memory area user. The card memory area operator provides a memory area division apparatus and various data to the memory area division apparatus under the control of an operator communication apparatus  12.  The card memory area user divides the memory area of the IC card into a memory area to be used by the IC card issuer and a memory area to be used by the card memory area user. The operation file registration apparatus writes file data for the card memory area user to the memory area of the card memory area user obtained by the above division.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 10/018,440 filed on Feb. 28, 2002, now U.S. Pat. No. 7,046,810which claims priority to International Application PCT/JP01/02992, filedon Apr. 6, 2001, which claims priority to Japanese Patent ApplicationNo. 2000-110561, filed on Apr. 6, 2000, the disclosures of which areherein incorporated by reference.

BACKGROUND

The present invention relates to a data processing method, system andapparatus that processes a variety of demands from a plurality ofservice providers by using a single IC (integrated circuit) card.

In the past, in an IC card system, an IC card carried by an individualhas been recorded with personal information and used for passing throughsubway and train turnstiles, controlling entry to and exiting fromrooms, etc.

Similar kinds of card-shaped media, for example, pre-paid cards, servicecards issued by various stores, and user cards issued by softwaremanufacturers are also in use.

These cards, including the IC cards, are individually issued andsupplied by the respective service providers (businesses) relating tothe cards.

Note that by making it possible to give an IC card the capacity toenable it to sufficiently store information relating to several servicesin its built-in memory, several businesses could share use of a singleIC card.

In this way, businesses that individually issued cards up until nowcould reduce the load of issuing the cards and could secure a largenumber of users, which are difficult for individual businesses tosecure. On the users' side, a reduction in the number of cards that auser carries and manages, relieves the user of the trouble of carryingand managing a large number of cards.

When an IC card is shared by several businesses in this way, however, itbecomes necessary to deal with a variety of requests. That is, somebusinesses might desire the convenience of an IC card, as if the cardwas issued by itself, even when sharing an IC card with otherbusinesses. Also, specific businesses might not want to share an ICcard. Furthermore, a reduction in the number of businesses that share acard may also be requested.

The present invention considers the issues above and provides a dataprocessing method, system and apparatus for processing a variety ofdemands from a service provider when a plurality of businesses share asingle IC card.

SUMMARY

To attain the above object, a data processing method of a first aspectof the present invention comprises a data processing method forprocessing data so that a portable device including an integratedcircuit storing memory area division data and first area management keydata which is authorized to perform at least one of a write operation toa memory area of said integrated circuit and a rewrite operation to thememory area conditional on the use of the first area management key datamakes a second service provider provide a service using part of saidmemory area of said integrated circuit when issued by a first serviceprovider providing a service using said memory area, comprising having amemory area operation unit managing said memory area division dataencrypt first module data including second area management key data bythe memory area division data for dividing by and provide the same tothe first service provider; having the issuer of the portable device,that is, said first service provider, encrypt second module dataincluding the encrypted first module by using said first area managementkey data and provide the same to said memory area operation unit; and,under the control of the memory area operation unit, providing theencrypted second module data to the integrated circuit, decrypting thesecond module data by using the first area management key data in theintegrated circuit, decrypting the first module data in the decryptedsecond module by using the memory area division data, and dividing thememory area to a first memory area to be used for service of the firstservice provider and a second memory area to be used for service of thesecond service provider by using the second area management key dataobtained by the decrypting.

In the above first data processing method, the second memory area usedfor service of the second service provider is suitably formedconditional on the second module being decrypted in the integratedcircuit and the integrated circuit obtaining the second area managementkey data.

At this time, since the first module is encrypted by memory areadivision data, the content of the second area management key dataincluded in the second module can be kept secret from the first serviceprovider. Therefore, the first service provider cannot illicitlygenerate the second module without the permission of the memory areaoperation unit.

Further, the second module is encrypted by first area management keydata, and the first area management key data is kept secret from thesecond service provider. Therefore, the memory area operation unitcannot illicitly generate a second module without permission from thefirst service provider.

Namely, since the second module cannot be generated without using boththe first management key data and memory area division data, theintegrated circuit cannot obtain second area management key datanecessary for generating the second memory area.

Further, since both of the memory area division data and the first areamanagement key data are kept secret from the second service provider,the second service provider cannot generate a second module.

Due to this, insofar as the first service provider, memory areaoperation unit, and second service provider suitably tie up to performprocessing, the second memory area is not formed in the integratedcircuit, and greater security can be provided.

Furthermore, the data processing method of the first aspect of thepresent invention preferably has the integrated circuit divide thememory area into the first memory area wherein at least one of a writeoperation and a rewrite operation is authorized conditional on use ofthe first area management key data and the second memory area wherein atleast one of a write operation and a rewrite operation is authorizedconditional on use of the second area management key data.

Further, the data processing method of the first aspect of the presentinvention preferably has the integrated circuit further store firstsystem key data and authorize at least one of a write operation to thememory area and a rewrite operation in the memory area conditional onuse of the first system key data and the first area management key data;has the memory area operation unit encrypt first module data furtherincluding second system key data by the key data for dividing andprovide the same to the first service provider; has the first serviceprovider encrypt second module data including the encrypted first moduleand division condition information indicating the condition for dividingthe memory area for use by another service provider by using the firstarea management key data and provide it to the memory area operationunit; and has the integrated circuit decrypt the second module data byusing the first area management key data, decrypt the first module datain the decrypted second module by using the key data for dividing, anddivide the memory area by using the second system key data, second areamanagement key data, and division condition information obtained by thedecrypting.

Further, a data processing system of a second aspect of the presentinvention comprises a data processing system for processing so that aportable device including an integrated circuit storing memory areadivision data and first area management key data which is authorized toperform at least one of a write operation to a memory area of saidintegrated circuit and a rewrite operation to the memory areaconditional on the use of the first area management key data makes asecond service provider provide a service using part of said memory areaof said integrated circuit when issued by a first service providerproviding a service using said memory area, wherein the system has amemory area operation processing apparatus used by a memory areaoperation unit which manages the memory area division data, a firstservice provider processing apparatus used by the issuer of the portabledevice, that is, the first service provider, and a second serviceprovider processing apparatus used by the first service provider; thememory area operation processing apparatus encrypts first module dataincluding second area management key data by the memory area divisiondata and sends the same to the first service provider processingapparatus; the first service provider processing apparatus encryptssecond module data including the received encrypted first module byusing the first area management key data and sends the same to thememory area operation processing apparatus; the memory area operationprocessing apparatus provides the received encrypted second module datato the integrated circuit; and the integrated circuit decrypts thesecond module data by using the first area management key data, decryptsthe first module data in the decrypted second module by using the memoryarea division data, and divides the memory area to a first memory areato be used for service of the first service provider and a second memoryarea to be used for service of the second service provider by using thesecond area management key data obtained by the decrypting under controlof the memory area operation unit.

Further, a portable device according to a third aspect of the presentinvention is a portable device mounting an integrated circuit used for afirst service provider providing a service wherein the integratedcircuit comprises a memory means for storing key data for dividingmanaged by a memory area operation unit performing processing to make asecond service provider provide a service using a part of a memory areaof the integrated circuit and first area management key data; an inputmeans for inputting a module including second area management key dataissued by the memory area operation unit which is encrypted by thememory area operation unit by using the memory area division data andfurthermore encrypted by the first service provider by using the firstarea management key data; and a processing means for decrypting theinput module by using the key data for dividing and the first areamanagement key data, dividing a memory area of the memory means to afirst memory area and a second memory area by using the second areamanagement key data in the decrypted module, authorizing at least one ofa write operation to the first memory area and a rewrite operation inthe memory area conditional on use of the first area management key dataand authorizing at least one of a write operation to the second memoryarea and a rewrite operation in the memory area conditional on use ofthe second area management key data.

Further, a data processing apparatus according to a fourth aspect of thepresent invention is a data processing apparatus for processing so thata portable device including an integrated circuit storing memory areadivision data, a system code for identifying a first service provider,and first area management key data which is authorized to perform atleast one of a write operation to a memory area of said integratedcircuit and a rewrite operation to the memory area conditional on theuse of the first area management key data makes a second serviceprovider provide a service using part of said memory area of saidintegrated circuit when issued by a first service provider providing afirst service using said memory area, wherein the apparatus has a memorymeans, processing means, and input/output means; the memory means storesrejection information for specifying a service provider which canprovide service by the same integrated circuit indicated by the firstservice provider and the second service provider; the processing meansencrypts a first module including second management key data by usingthe memory area division data; the input/output means outputs theencrypted first module to provide it to the first service provider,receives as input a second module including the encrypted first moduleand encrypted in the first service provider by using the first areamanagement key data, and outputs the second module to provide it to amemory area division apparatus for dividing the memory area undercontrol of the second service provider so that a part of the memory areaof the integrated circuit can be used by the second service provider;the processing means generates a registerable system code listindicating the system code added to the first service provider which canprovide service by the same integrated circuit as the second serviceprovider based on the rejection information; and the input/output meansoutputs the system code list to provide it to the memory area divisionapparatus.

Further, a data processing apparatus according to a fifth aspect of thepresent invention is a data processing apparatus for processing so thata portable device including an integrated circuit storing distributionkey data, a system code for identifying a first service provider, andfirst area management key data which is authorized to perform at leastone of a write operation to a memory area of said integrated circuit anda rewrite operation to the memory area conditional on the use of thefirst area management key data makes a second service provider provide aservice using part of said memory area of said integrated circuit whenissued by a first service provider providing a first service using saidmemory area, wherein the apparatus has a memory means, input/outputmeans, and processing means; the memory means stores a module includingsecond area management key data issued by a memory area operation unitfor managing processing of the data processing apparatus and encryptedby the memory area operation unit by using the distribution key data anda registerable system code list indicating the system code added to thefirst service provider which can provide service by the same integratedcircuit as the second service provider; the input/output means receivesas input the system code from the integrated circuit; and the processingmeans outputs the module to the integrated circuit via the input/outputmeans when it judges that the input system code is indicated in theregisterable system code list.

Further, a data processing apparatus according to a sixth aspect of thepresent invention is a data processing apparatus for performingprocessing to write file data in a second memory area of an integratedcircuit having a first memory area wherein at least one of a writeoperation and rewrite operation of file data used for providing a firstservice is authorized conditional on use of first area management keydata and a second memory area wherein at least one of a write operationand rewrite operation of file data used for providing a second serviceis authorized conditional on use of second area management key data,comprising a memory means storing third area management data and filekey data which is issued by the second service provider, used at thetime of writing the file data to a third memory area, and encrypted bythe third area management key data when a plurality of third memoryareas are defined in the second memory area, third memory management keydata used for performing at least one of a write operation to a thirdmemory area and a rewrite operation in the third memory area is definedfor each of the plurality of third memory areas, and said integratedcircuit stores said third area management key data; an output means foroutputting the encrypted file key data to the integrated circuit; and awriting means for writing file data to be used for providing the secondservice to the second memory area of the integrated circuit by using thefile key data.

Further, a portable unit issuing method according to a seventh aspect ofthe present invention comprises issuing a portable unit including anintegrated circuit storing memory area division data and first areamanagement key data and authorizing at least one of a write operation toa memory area in said integrated circuit and a rewrite operation in thememory area conditional on use of the first area management key data andrequesting a memory area operation unit managing the memory areadivision data to divide the memory area of the integrated circuit to afirst memory area wherein at least one of a write operation and re-writeoperation in the memory area is authorized conditional on use of thefirst area management key data and a second memory area wherein at leastone of a write operation and a rewrite operation in the memory area isauthorized conditional on use of the second area management key data byusing the memory area division data.

Further, a program according to an eighth aspect of the presentinvention is a program for making a computer execute processing so thata portable device including an integrated circuit storing memory areadivision data, a system code for identifying a first service provider,and first area management key data which is authorized to perform atleast one of a write operation to a memory area of said integratedcircuit and a rewrite operation to the memory area conditional on theuse of the first area management key data makes a second serviceprovider provide a service using part of said memory area of saidintegrated circuit when issued by a first service provider providing afirst service using said memory area, comprising making the computerexecute a routine for receiving as input the system code from theintegrated circuit; a routine for referring to a registerable systemcode list indicating the system code given to the first service providerwhich can provide a service by the same integrated circuit as the secondservice provider and judging whether the input system code is indicatedin the registerable system code list; and a routine for outputting tothe integrated circuit a module including second area management dataissued by a memory area operation unit managing execution of the programand encrypted by the memory area operation unit by using the memory areadivision data and further encrypted by the first service provider byusing the first area management key data when judging that the inputsystem code is indicated in the registerable system code list.

Further, a data processing method according to a ninth aspect of thepresent invention is a data processing method for processing so that aportable device including an integrated circuit storing distribution keydata, a system code for identifying a first service provider, and firstarea management key data which is authorized to perform at least one ofa write operation to a memory area of said integrated circuit and arewrite operation to the memory area conditional on the use of the firstarea management key data makes a second service provider provide aservice using part of said memory area of said integrated circuit whenissued by a first service provider providing a first service using saidmemory area, comprising a routine of inputting the system code from theintegrated circuit; a routine of referring to a registerable system codelist indicating the system code given to the first service providerwhich can provide service by the same integrated circuit as the secondservice provider and judging whether the input system code is indicatedin the registerable system code list; and a routine of outputting to theintegrated circuit a module including second area management data issuedby a memory area operation unit managing execution of the program andencrypted by the memory area operation unit by using the distributionkey data and further encrypted by the first service provider by usingthe first area management key data when it judges that the input systemcode is indicated in the registerable system code list.

Further, a program according to a tenth aspect of the present inventionis a program for making a computer execute processing for writing filedata to a second memory area of an integrated circuit having a firstmemory area wherein at least one of a write operation and rewriteoperation of file data used for providing a first service is authorizedconditional on use of first area management key data and a second memoryarea wherein at least one of a write operation and rewrite operation offile data used for providing a second service is authorized conditionalon use of second area management key data, comprising making thecomputer execute a routine of outputting to the integrated circuit filekey data which is issued by a second service provider, used at the timeof writing the file data in a third memory area, and encrypted by athird area management data when a plurality of third memory areas aredefined in the second memory area, a third memory management key dataused for performing at least one of a write operation to a third memoryarea and a rewrite operation in the third memory area is defined foreach of the plurality of third memory areas, and the integrated circuitstores the third area management key data and a routine of writing filedata used for providing the second service in the second memory area ofthe integrated circuit by using the file key data.

Further, a data processing method according to an eleventh aspect of thepresent invention is a data processing method for performing processingfor writing file data to a second memory area of an integrated circuithaving a first memory area wherein at least one of a write operation andrewrite operation of file data used for providing a first service isauthorized conditional on use of first area management key data and asecond memory area wherein at least one of a write operation and rewriteoperation of file data used for providing a second service is authorizedconditional on use of second area management key data, comprising aroutine of outputting to the integrated circuit file key data which isissued by a second service provider, used at the time of writing thefile data in a third memory area, and encrypted by a third areamanagement data when a plurality of third memory areas are defined inthe second memory area, a third memory management key data used forperforming at least one of a write operation of data to a third memoryarea and a rewrite operation of data in the third memory area is definedfor each of the plurality of third memory areas, and the integratedcircuit stores the third area management key data and a routine ofwriting file data used for providing the second service in the secondmemory area of the integrated circuit by using the file key data.

Additional features and advantages are described herein, and will beapparent from, the following Detailed Description and the figures.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a view of the overall configuration of a communication systemaccording to an embodiment of the present invention;

FIG. 2 is a block diagram showing the functions of the IC card shown inFIG. 1;

FIG. 3 is a block diagram explaining how data is stored in a memory ofthe IC card shown in FIG. 2 after issuance by an IC card issuer andbefore processing by a card memory area operator 22;

FIG. 4 is a block diagram showing the functions of an issuercommunication apparatus 11 shown in FIG. 1;

FIG. 5 is a block diagram showing the functions of an operatorcommunication apparatus 12 shown in FIG. 1;

FIG. 6 is a block diagram of the functions of a memory area divisionregistration apparatus 14 shown in FIG. 1;

FIG. 7 is a block diagram showing the functions of an operation fileregistration apparatus 15 shown in FIG. 1;

FIG. 8 is a flowchart explaining the overall operation of thecommunication system shown in FIG. 1;

FIG. 9 is a flowchart explaining the package data generation processingof step ST1 shown in FIG. 8;

FIG. 10A, FIG. 10B, and FIG. 10C are views explaining package data Pfand Pj;

FIG. 11 is a flowchart explaining the delivery and setting of a memoryarea division apparatus at step ST2 shown in FIG. 8;

FIG. 12 is a view explaining first issued data;

FIG. 13 is a flowchart explaining what follows the setting of the memoryarea division registration apparatus 14 at step ST3 shown in FIG. 8;

FIG. 14A is a view explaining an area code acquisition request;

FIG. 14B is a view explaining an apparatus code list;

FIG. 14C is a view explaining an area management code list;

FIG. 15A is a view explaining a registerable system code list;

FIG. 15B is a view explaining area registration permission data;

FIG. 16 is a view explaining data stored in the memory of the memoryarea division apparatus after completing step ST3 shown in FIG. 8;

FIG. 17 is a view explaining what follows the setting of an operationfile registration apparatus at step ST4 shown in FIG. 8;

FIG. 18 is a view explaining how data is stored in the operation fileregistration apparatus after completing step ST4 shown in FIG. 8;

FIG. 19A and FIG. 19B are views explaining file registration permissiondata;

FIG. 20 is a flowchart explaining memory area division processing of theIC card by the memory area division apparatus performed at step ST5shown in FIG. 8;

FIG. 21 is a flowchart continued from FIG. 20;

FIG. 22 is a view explaining a state after dividing the memory area ofthe IC card;

FIG. 23 is a view explaining a state after defining an area (“AREA”) inthe memory area of the IC card;

FIG. 24 is a view explaining registration processing of file data to theIC card by the operation file registration apparatus performed at stepST6 shown in FIG. 8;

FIG. 25 is a view explaining the memory area of the IC card after theregistration of the file data;

FIG. 26 is a block diagram explaining division of a memory space in anIC card system explained with reference to an embodiment of the presentinvention;

FIG. 27 is a block diagram showing the IC card system shown in FIG. 26;

FIG. 28 is a simplified diagram explaining the memory space of the ICcard shown in FIG. 26;

FIG. 29 is a simplified diagram of the memory space after division;

FIG. 30 is a simplified diagram explaining pre-processing of rejectionprocessing in the IC card system shown in FIG. 26;

FIG. 31 is a simplified diagram explaining processing continued from theprocessing in FIG. 30;

FIG. 32 is a simplified diagram explaining processing continued from theprocessing in FIG. 31; and

FIG. 33 is a simplified diagram explaining registration processing inthe IC card system shown in FIG. 26.

DETAILED DESCRIPTION

Below, the best mode for carrying out the present invention will beexplained with reference to the attached drawings.

FIG. 1 is a view of the overall configuration of a communication system1 according to an embodiment of the present invention.

As shown in FIG. 1, the communication system 1 comprises, for example,an issuer communication apparatus 11 to be used by an IC card issuer 21,an operator communication apparatus 12 to be used by a card memory areaoperator 22, a manufacturer communication apparatus 13 to be used by anapparatus manufacturer 23, and a memory area division registrationapparatus 14 and an operation file registration apparatus 15 to be usedby a card memory area user 24.

In the communication system 1, when the IC card issuer 21 issues an ICcard 16 to a card holder 26, it registers file data related to theservices provided by the card memory area user 24 in the IC card 16based on predetermined conditions so that the card holder 26 can receiveservices from both the IC card issuer 21 and the card memory area user24 by using a single IC card 16.

As shown in FIG. 1, in the communication system 1, the issuercommunication apparatus 11, the operator communication apparatus 12, themanufacturer communication apparatus 13, the memory area divisionregistration apparatus 14, and the operation file registration apparatus15 are connected via a network 17.

In FIG. 1, the IC card issuer 21 issues the IC card 16 and provides itsown services for the IC card 16.

The card memory area operator 22 receives a request from the IC cardissuer 21 and provides the card memory area user 24 a memory area thatthe IC card issuer 21 does not use in the memory area of the memory(semiconductor memory) in the IC card 16 issued by the IC card issuer21.

The apparatus manufacturer 23 receives a request from the card memoryarea operator 22, produces the memory area division registrationapparatus 14, and delivers the same to the card memory area user 24.

The card memory area user 24 issues a request to the card memory areaoperator 22 and provides its own services for the memory area of the ICcard 16.

The card holder 26 is issued the IC card 16 by the IC card issuer 21 andreceives the services provided by the IC card issuer 21. When the cardholder 26 wants to receive services provided by the card memory areauser 24 after the issuance of the IC card 16, it is possible to storefile data related to the services of the card memory area user 24 in theIC card 16. The file data is stored by using the memory area divisionregistration apparatus 14 and the operation file registration apparatus15 to receive the services of the card memory area user 24.

Because the single IC card 16 includes the services of the IC cardissuer 21 and the card memory area user 24, the communication system 1is configured so that it is difficult for an unauthorized person toillicitly write and rewrite data in a memory area where the file datarelated to the services of the IC card issuer 21 and the card memoryarea user 24 is stored.

Note that in FIG. 1, there is only one IC card issuer 21, card memoryarea user 24, and card holder 26 shown in the example. The presentinvention, however, can be used with one or more IC card issuer 21, cardmemory area user 24, and card holder 26.

Also, the correspondence of the components of the present embodiment andthe components of the claims is, for example, that the IC card issuer 21and the issuer communication apparatus 11 correspond to the firstservice provider of the present invention. Furthermore, the card memoryarea user 24 corresponds to the second service provider of the presentinvention. The operator communication apparatus 12 and the card memoryarea operator 22 correspond to the memory area operator of the presentinvention.

Also, the area management key data K_AM_(i) corresponds to the firstarea management key data of the present invention and the areamanagement key data K_AM_F corresponds to the second area management keydata of the present invention.

Furthermore, the IC card 16 corresponds to the portable device providedwith an integrated circuit of the present invention.

Note that in the present embodiment, the IC card 16 is shown as anexample of the portable device of the present invention. However, theportable device of the present invention may also be a portabletelephone device, portable information terminal apparatus, or othersimilar devices, provided with an IC (integrated circuit).

Also, package data Pf corresponds to the first module of the presentinvention, while package data Pj corresponds to the second module of thepresent invention.

Also, an uppermost area AREA_MU_(i) corresponds to a first memory areaof the present invention, while an uppermost area AREA_MU_F correspondsto a second area memory area of the present invention. Also, a lowerlayer of the area AREA of the uppermost area AREA_MU_F corresponds tothe third memory area of the present invention.

First, the components of the communication system 1 shown in FIG. 1 willbe explained.

Referring to FIG. 2, a block diagram shows the functions of the IC card16 of FIG. 1.

In FIG. 2, the IC card 16 comprises, for example, an input/outputinterface 31, a memory 32, and a processor 33.

The input/output interface 31 is an interface for inputting/outputtingdata and requests by a non-contact method or a contact method betweenthe memory area division registration apparatus 14 and the operationfile registration apparatus 15 when mounted in the memory area divisionregistration apparatus 14 and the operation file registration apparatus15, respectively.

The memory 32 is for example a semiconductor memory which stores datarelated to services provided by the IC card issuer 21, the card memoryarea user 24 and data related to an operation by the card memory areaoperator 22 as discussed below.

The processor 33 performs processing related to the functions of the ICcard 16.

FIG. 3, is a view explaining how data is stored in the memory 32 of theIC card 16 shown in FIG. 2 after the issuance of the IC card 16 by theIC card issuer 21, and before operation processing by the card memoryarea operator 22.

As shown in FIG. 3, the memory 32 stores a system code SYSC_(i) assignedto the IC card issuer 21 and system key data SYS_K_(i) linked with thesystem code SYSC_(i).

Also, as shown in FIG. 3, the memory 32 for example has a hierarchicalstructure wherein the uppermost memory area AREA_MU_(i) is the uppermostlayer and a plurality of areas AREA_(i) are defined as lower layersthereof. An area AREA_(i) may be furthermore defined as a lower layer ofthe area AREA shown in FIG. 3.

The uppermost area management key data K_MU_(i) is assigned to theuppermost memory area AREA_MU_(i).

The areas AREA_(i) are assigned the area management code AMC_(i) andarea management key data K_AM_(i).

Also, a plurality of file data FILE_(i) for performing processingrelated to services provided by the IC card issuer 21 are set (stored)in the area AREA_(i).

Also, in correspondence to the file data FILE_(i), the memory 32 storesservice codes SC_(i) assigned to services provided by using the filedata and file management key data K_FM_(i) used for setting the filedata FILE_(i).

Referring to FIG. 4, a block diagram shows the functions of the issuercommunication apparatus 11 of FIG. 1.

As shown in FIG. 4, the issuer communication apparatus 11 comprises forexample a communication interface 41, a memory 42, and a processor 43.

The issuer communication apparatus 11, as shown in FIG. 3, performsprocessing for encrypting the package data Pf received from theoperation communication apparatus 12 by using the system key dataSYS_K_(i) stored in the memory 32 of the IC card 16 in a secured state(secret state) so as to generate the package data Pj as will beexplained later.

Note that the system key data SYS_K_(i) is known only by the IC cardissuer 21 and kept secret from the card memory area operator 22, theapparatus manufacturer 23, and the card memory area user 24 shown inFIG. 1.

The communication interface 41 is an interface for sending/receivingdata with the operation communication apparatus 12 via the network 17.

The memory 42 stores the data shown in FIG. 3, which is stored in the ICcard 16 issued by the IC card issuer 21.

The processor 43 performs processing operations (generation of Pj)related to the lending of the memory 32 with the operation communicationapparatus 12 as will be explained later.

Referring to FIG. 5, a block diagram shows the functions of the operatorcommunication apparatus 12 of FIG. 1.

As shown in FIG. 5, the operator communication apparatus 12 comprises,for example, a communication interface 51, a memory 52, and a processor53.

The operator communication apparatus 12 manages a variety of processingfor lending a memory area of the memory 32 of the IC card 16 to the cardmemory area user 24.

The communication interface 51 is an interface for sending/receivingdata between the issuer communication apparatus 11, the memory areadivision registration apparatus 14, and the operation file registrationapparatus 15 via the network 17.

The memory 52 stores a system code SYSC_F related to a new memory areato be formed by dividing the memory area of the memory 32 and system keydata SYS_K_F corresponding to the system code SYSC_F etc. Also, thememory 52 stores division key data K_D.

The processor 53 performs various processing operations for lending amemory area of the memory 32 to the card memory area user 24 as will beexplained later.

Referring to FIG. 6, a block diagram shows the functions of the memoryarea division registration apparatus 14 of FIG. 1.

The memory area division registration apparatus 14 is for exampleprovided to a store etc. of the card memory area user 24. Note that thememory area division registration apparatus 14 may also be provided at astore or similar location of the operator communication apparatus 12.

Also, the memory area division registration apparatus 14 is produced bythe apparatus manufacturer 23 and delivered to the card memory area user24.

As shown in FIG. 6, the memory area division registration apparatus 14,for example, comprises a communication interface 61, a card interface62, an operator 63, a memory 64, and a processor 65.

The communication interface 61 is an interface for sending/receivingdata with the operator communication apparatus 12 via the network 17.

The card interface 62 is an interface connected to the input/outputinterface 31 of the IC card 16 shown in FIG. 2 which inputs/outputs dataand requests from/to the input/output interface 31 when the IC card 16is mounted in the memory area division registration apparatus 14.

The operator 63 is used, for example, when the card holder 26, whovisited a store of the card memory area user 24, inputs an instruction.

The memory 64 stores data required for processing of the processor 65.

The processor 65 performs processing for dividing the memory area ofmemory 32 to form a memory area for writing file data related to theservices of the card memory area user 24.

Referring to FIG. 7, a block diagram shows the functions of theoperation file registration apparatus 15 of FIG. 1.

The operation file registration apparatus 15 is, for example, providedat a store or similar location of the card memory area user 24.

As shown in FIG. 7, the memory area division registration apparatus 14for example comprises a communication interface 71, a card interface 72,an operator 73, a memory 74, and a processor 75.

The communication interface 71 is an interface for sending/receivingdata with the operator communication apparatus 12 via the network 17.

The card interface 72 is an interface connected to the input/outputinterface 31 of the IC card 16 shown in FIG. 2 which inputs/outputs dataand requests to/from the input/output interface 31 when the IC card 16is mounted in the operation file registration apparatus 15.

The operator 73 is used by a card holder 26, who visits a store of thecard memory area user 24, to input an instruction.

The memory 74 stores data required for processing of the processor 75.

The processor 75 performs processing for writing file data, related tothe services provided by the memory area division registration apparatus14, in the memory area divided by the above memory area divisionregistration apparatus 14.

Below, an example of the operation of the communication system 1 shownin FIG. 1 will be explained.

First, an outline of the overall operation of the communication systemshown in FIG. 1 will be explained.

FIG. 8 is a flowchart for explaining the overall operation of thecommunication system 1 shown in FIG. 1.

Step ST1

The operator communication apparatus 12 generates package data Pfincluding a system code SYSC_F used at the time of dividing the memoryarea of the memory 32 of the IC card 16 and uppermost area managementkey data K_MU_F, encrypts it by division key data K_D and sends it. Theissuer communication apparatus 11 encrypts the package data Pf by usingthe system key data SYS_K_(i) to generate package data Pj, which is sentto the operator communication apparatus 12.

The package data Pj is held by the operator communication apparatus 12.

Step ST2

The memory area division registration apparatus 14 is delivered from theapparatus manufacturer 23 to the card memory area user 24.

Also, the system code SYSC_(i) and the package data Pj, etc. are sentfrom the operator communication apparatus 12 to the memory area divisionregistration apparatus 14 and stored in the memory area divisionregistration apparatus 14.

Step ST3

A registerable system code list RPSL and area registration permissiondata INF_ARP are sent from the operator communication apparatus 12 tothe memory area division registration apparatus 14 and stored in thememory area division registration apparatus 14.

The registerable system code list RPSL includes a system code of the ICcard 16 to which file data of services related to the card memory areauser 24 can be registered by using the memory area division registrationapparatus 14.

The area registration permission data INF_ARP is used for registering anarea AREA_F defined in a new memory area obtained by dividing the memoryarea of the IC card 16.

Step ST4

The area management key data K_QM_F is provided by a secured path fromthe operator communication apparatus 12 to the operation fileregistration apparatus 15.

Here, the area management data K_AM_F is used at the time of writingfile data in one or more areas AREA_F defined in the new memory areaformed by dividing the memory area of the IC card 16.

Also, file registration permission data FRP is generated in theoperation file registration apparatus 15.

Step ST5

For example, when the card holder 26 loads the IC card 16 in the memoryarea division registration apparatus 14, the memory area divisionapparatus divides the memory area of the memory 32 of the IC card 16 byperforming predetermined processing to define a memory area used by theIC card issuer 21 (the uppermost area AREA_MU_(i) shown in FIG. 3) and anew memory area used by the card memory area user 24 (the uppermost areamanagement key data area_MU_F).

Step ST6

When the card holder loads the IC card 16 in the operation fileregistration apparatus 15, file data related to the service providerprovided by the card memory area user 24 is written by using the fileregistration permission data FRP into the new memory area defined atstep ST5.

As a result, the card holder 26 can receive services from both the ICcard issuer 21 and the card memory area user 24 by using a single ICcard 16.

Below, each of the steps shown in FIG. 8 will be explained in detail byusing a flowchart.

First, package data generation processing of the step ST1 shown in FIG.8 will be explained.

FIG. 9 is a flowchart for explaining the processing.

Step ST21

The processor 53 of the operator communication apparatus 12 shown inFIG. 1 and FIG. 5, as shown in FIG. 10A, divides the memory area of thememory 32 and generates the package data Pf including the system codeSYSC_F of the uppermost area AREA_MU_F and the corresponding system keydata SYS_K_F.

Step ST22

The processor 53 of the operator communication apparatus 12, as shown inFIG. 10B, encrypts the package data Pf generated at step ST1 by usingdivision key data K_D read from the memory 52.

Step ST23

The package data Pf generated at step ST22 is sent to the issuercommunication apparatus 11 via the communication interface 51 of theoperator communication apparatus 12 and the network 17.

The package data Pf is received by the communication interface 41 of theissuer communication apparatus 11 shown in FIG. 4.

Step ST24

The processor 43 of the operator communication apparatus 11 shown inFIG. 4 generates the package data Pj. The package data Pj includes thedivision block number data for defining a memory capacity of the memoryarea requested to be operated by (lent to) the card memory area operator22 in memory 32 and the package data Pf received at step ST23.

Step ST25

The processor 43 of the issuer communication apparatus 11 encrypts thepackage data Pj generated at step ST24 by the uppermost area managementkey data K_MU_(i) read from the memory 42.

Step ST26

The processor 43 of the issuer communication apparatus 111 sends to theoperator communication apparatus 12 the system code SYSC_(i), rejectioninformation RI_(i), and the package data Pj encrypted at step ST25 viathe communication interface 41 and the network 17.

These are received by the communication interface 51 of the operatorcommunication apparatus 12 shown in FIG. 5.

Here, the rejection information RI_(i) is the information that specifiedwhich parties services are rejected by the IC card issuer 21 when usingthe same IC card 16.

Step ST27

The processor 53 of the operator communication apparatus 12 shown inFIG. 5 writes in the memory 52 the system code SYSC_(i), the rejectioninformation RI_(i), and the encrypted package data Pj received at stepST26.

Next, delivery and setting of the memory area division registrationapparatus 14 at step ST2 shown in FIG. 8 will be explained.

FIG. 11 is a flowchart for explaining the processing.

Step ST31

The card memory area user 24 orders the memory area divisionregistration apparatus 14 from the card memory area operator 22.

Step ST32

When the card memory area operator 22 receives the order at step ST31,it issues an apparatus code AC (registration machine code) to the memoryarea division registration apparatus 14 to be delivered to the cardmemory area user 24 and notifies the card memory area user 24 of same.

Step ST33

The card memory area user 24 uses the apparatus code AC notified at stepST32 to request delivery of the memory area division registrationapparatus 14 to the apparatus manufacturer.

The above steps ST31 to ST33 are performed by using a personal computerof the card memory area user 24, telephone, and mail.

Step ST34

The apparatus manufacturer 23 inquires about the legitimacy of theapparatus code AC to the card memory area operator 22 when needed inaccordance with the delivery request received at step ST33 and deliversthe memory area division registration apparatus 14, storing theapparatus code AC, to the card memory area user 24.

Step ST35

When the card memory area operator 22 receives, for example, a deliverycompletion notice of the memory area division registration apparatus 14from the card memory area user 24, it reads the system code SYSC_(i),the encrypted package data Pj, and first issuance data INF_1 from thememory 52 under the control of the processor 53 of the operatorcommunication apparatus 12 shown in FIG. 5 and sends the same to thememory area division registration apparatus 14 via the communicationinterface 51 and the network 17.

The data is received by the communication interface 61 of the memoryarea division registration apparatus 14 shown in FIG. 6.

Here, the first issuance data INF_1 is, for example, as shown in FIG.12, data obtained by encrypting module data including the uppermost areamanagement data K_MU_F and the system code SYSC_F by the upper most areamanagement key data K_MU_F.

Step ST36

The processor 65 of the memory area division registration apparatus 14shown in FIG. 6 writes in the memory 64 the system code SYSC_(i), theencrypted package data Pj, and the first issuance data information INF_1received at step ST35.

Next, a continuation of the setting of the memory area divisionregistration apparatus 14 at step ST3 in FIG. 8 will be explained.

FIG. 13 is a flowchart for explaining the processing.

Step ST41

The card memory area user 24 operates the operator 63 of the memory areadivision registration apparatus 14 shown in FIG. 14 to input an areamanagement code acquisition instruction. Due to this, an area managementcode acquisition request REQ_AMC shown in FIG. 14A is sent to theoperator communication apparatus 12 via the communication interface 61and the network 17.

The area management code acquisition request is received by thecommunication interface 51 of the operator communication apparatus 12shown in FIG. 5.

As shown in FIG. 14A, the area management code acquisition requestRE_AMC indicates the apparatus code AC, rejection information RI_F,number of registration areas, number of blocks of each of theregistration areas, and number of service codes.

Here, the apparatus code AC is notified to the card memory area user 24from the card memory area operator 22 at step ST32 shown in FIG. 11.

The rejection information RI_F is the information for specifying a partyfor which provision of services using the same IC card 16 is rejected bythe IC card issuer 21.

The number of registration areas is the number of areas AREA_F that thecard memory area user 24 desires to use for storing file data relatingto its own services and is defined after division of the memory 32 ofthe IC card 16.

The number of blocks of each of the registration areas is the number ofblocks assigned to the area, AREA.

The number of service codes is the number of service codes which thecard memory area user 24 desires to use for storing file data relatingto its own services.

Step ST42

When the processor 53 of the operator communication apparatus 12 shownin FIG. 5 receives the area management code acquisition request at stepST41, it generates an apparatus code list MCL and an area managementcode list ACL and stores the same in the memory 52.

The apparatus code list ACL indicates, as shown in FIG. 14B, theapparatus code AC assigned to the memory area division registrationapparatus 14, the area management code AMC_F (application code) assignedto one or more areas AREA defined in the memory management area dividedby the memory area division registration apparatus 14, and the rejectioninformation RI_F received at step ST41 in correspondence.

Furthermore, the area management code list AMCL is, as shown in FIG.14C, generated for every area management code AMC_F (application code)indicated by the apparatus code list ACL in FIG. 14B and indicates thearea management code AMC_F (application key), the area management keydata K_AM_F corresponding to the corresponding area AREA_F, and filedata written in the area, AREA_F.

Step ST43

The processor 53 of the operator communication apparatus 12 shown inFIG. 5 uses the same IC card 16 as that of the card memory area user 24to specify the IC card issuer 21, which can provide services based onthe rejection information RI_(i) stored in the memory 52 at step ST27shown in FIG. 9 and the rejection information RI_F stored at step ST41.

Step ST44

The processor 53 of the operator communication apparatus 12 uses thesystem code assigned to the IC card issuer 21 specified at step ST43 togenerate a registerable system code list RPSL.

The registerable system code list RPSL indicates, as shown in FIG. 15A,the apparatus code AC assigned to the memory area division registrationapparatus 14 and the system code SC assigned to one or more IC cardissuers 21 specified at step ST43 in correspondence.

Step ST45

The processor 53 of the operator communication apparatus 12 encrypts thearea management code list AMCL generated at step ST42 and shown in FIG.14C by the uppermost area management key data K_MU_F to generate arearegistration permission data INF_ARP.

Step ST46

The processor 53 of the operator communication apparatus 12 sends theregisterable system code list RPSL and the area registration permissiondata INF_ARP generated at step ST45 to the memory area divisionregistration apparatus 14 via the communication interface 51 and thenetwork 17.

These are received by the communication interface 61 of the memory areadivision registration apparatus 14 shown in FIG. 6.

Step ST47

The processor 65 of the memory area division registration apparatus 14shown in FIG. 6 stores the registerable system code list RPSL and thearea registration permission data INF_ARP received at step ST46 in thememory 64.

At the stage of completing the above steps up to the step ST3 shown inFIG. 8, the memory 64 of the memory area division registration apparatus14 stores, as shown in FIG. 16, the encrypted package data Pj shown inFIG. 10C, the encrypted first issuance data INF_1 shown in FIG. 16, theregisterable system code list RPSL shown in FIG. 15A, and the encryptedarea registration permission data INF_ARP shown in FIG. 15B.

Next, a continuation of the setting of the operation file registrationapparatus 15 of step ST4 shown in FIG. 8 will be explained.

FIG. 17 is a flowchart for explaining the processing.

Step ST51

The processor 53 of the operator communication apparatus 12 shown inFIG. 5 sends the area management key data K_AM_F issued at the time ofgenerating the apparatus code list ACL at step ST42 shown in FIG. 13 viathe communication interface 51 and the network 17 to the operation fileregistration apparatus 15 or uses other means to notify the card memoryarea user 24.

Step ST52

The processor 53 of the operator communication apparatus 12 sends thearea management code AMC_F issued at the time of generating the aboveapparatus code list ACL and the service code SC via the communicationinterface 51 and the network 17 to the operation file registrationapparatus 15.

Step ST53

The processor 53 of the operator communication apparatus 12 shown inFIG. 7 generates, as shown in FIG. 19A, the file registration permissiondata FRP indicating the service codes SC and the file management keydata K_FM_F determined by the card memory area user 24 in accordancewith the service code SC for one or more the service codes SC receivedat step ST52.

Step ST54

The processor 53 of the operator communication apparatus 12 shown inFIG. 7 encrypts the file registration permission data FRP generated atstep ST53 by using the area management key data K_AM_F received at stepST51 and stores the same in the memory 52 as shown in FIG. 19B.

At the stage of completing the above processing up to the step ST4 shownin FIG. 8, the memory 52 of the operation file registration apparatus 15stores, as shown in FIG. 18, the area management code AMC_F, the areamanagement key data K_AM_F, and the encrypted file registrationpermission data FRP shown in FIG. 19B.

Next, the memory area division processing of the IC card 16 by thememory area division registration apparatus 14 performed at step ST5shown in FIG. 8 will be explained.

FIG. 20 and FIG. 21 are flowcharts for explaining the processing.

Step ST61

The IC card holder 26 visits a store of the card memory area user 24carrying the IC card 16 and loads the IC card 16 in the memory areadivision registration apparatus 14.

Subsequently, the system code SYSC_(i) stored in the memory 32 of the ICcard 16 is read and output to the memory area division registrationapparatus 14 via the input/output interface 31.

The system code SYSC_(i) is input to the card interface 62 of the memoryarea division registration apparatus 14 shown in FIG. 6.

Step ST62

The processor 65 of the memory area division registration apparatus 14shown in FIG. 6 reads from the memory 64 the package data Pj and thefirst issuance data INF_1 corresponding to the system code SYSC_(i)input at step ST61.

Step ST63

The processor 65 of the memory area division registration apparatus 14outputs to the IC card 16 the encrypted package data Pj and firstissuance data INF_1 read at step ST62 via the card interface 62.

Step ST64

The processor 33 of the IC card 16 shown in FIG. 2 first uses theuppermost area management key data K_MU_(i) to decrypt the package dataPj input at step ST62 to obtain division condition information includedin the package data Pj and the encrypted package data Pf.

Next, the processor 33 uses the division key data K_D to decrypt thepackage data Pf to obtain the system key data SYS_K_F and the uppermostarea management key data K_MU_F included in the package data Pf.

Step ST65

The processor 33 of the IC card 16 encrypts by using the system key dataSYS_K_F and the uppermost area management key data K_MU_F to generatedegenerate key data K_A1, performs mutual authentication with the memoryarea division registration apparatus 14 by using the degenerate key dataK_A1, and proceeds to the processing of step ST66 when both of the ICcard 16 and the memory area division registration apparatus 14 confirmthe legitimacy of each other.

In the above mutual authentication, for example, the memory areadivision registration apparatus 14 encrypts by using the system key dataSYS_K_F and the uppermost area management key data K_MU_F to generatedegenerate key data K_A2. Then, the memory area division registrationapparatus 14 generates a random number R1 and encrypts the random numberR1 by using the degenerate key data K_A2 to generate data R1 a. Then,the memory area division registration apparatus 14 outputs the randomnumber R1 and the data R1 a to the IC card 16. The IC card 16 verifieswhether the data obtained by decrypting the data R1 a using thedegradation data K_A1 matches with the random number R1 and, when itmatches, certifies that the memory area division registration apparatus14 is the legitimate party. Also, by processing data using the randomnumber generated by the IC card 16, the memory area divisionregistration apparatus 14 certifies that the IC card 16 is thelegitimate party.

Step ST66

The processor 33 of the IC card 16 shown in FIG. 2 divides the memoryarea of the memory 32 and, as shown in FIG. 22, forms the uppermost areaAREA_MU_(i) assigned to the IC card issuer 21 and the uppermost areaAREA_MU_F assigned to the card memory area user 24.

Step ST67

The processor 33 of the IC card 16 stores (sets) the uppermost areamanagement key data K_MU_F in correspondence with the uppermost areaAREA_MU_F of the memory 32.

Step ST68

The processor 33 of the IC card 16 uses the uppermost area managementkey data K_MU_F, stored at step ST67, to decrypt the first issuance dataINF_1 shown in FIG. 12 and input at step ST63.

Step ST69

The processor 33 of the IC card 16 stores in the memory 32 the systemcode SYSC_F included in the first issuance data INF_1 obtained bydecrypting the data at step ST68.

Step ST70

The processor 65 of the memory area division registration apparatus 14judges whether the system code SYSC_(i) received from the IC card 16 atstep ST61 in FIG. 2 is included in the registerable system code listRPSL shown in FIG. 15A stored in the memory 64 at step ST47 in FIG. 13.If the system code is included, the processor 65 judges whether the datarelated to the services provided by the card memory area user 24 can beregistered in the IC card 16 and proceeds to the processing step ST71.

In the communication system 1, as explained at steps ST43 and ST44,based on the rejection information RI_(i) and the rejection informationRI_F, an IC card issuer 21 is capable of providing services by using thesame IC card 16 as that of the card memory area user 24 to generate theregisterable system code list RPSL.

As a result, the IC card issuer 21 and the card memory area user 24 canexclude an undesirable party from providing services by using the sameIC card 16.

Step ST71

The processor 65 of the memory area division registration apparatus 14,which can be registered at step ST70, outputs to the IC card 16 theencrypted area registration permission data INF_ARP shown in FIG. 15stored in the memory 64 at step ST47 in FIG. 13 via the card interface62.

The IC card 16 receives as input data, the encrypted area registrationpermission data INF_ARP via the input/output interface 31 shown in FIG.2.

As explained above, the area registration permission data INF_ARP isencrypted by the uppermost area AREA_MU_F.

Step ST72

The processor 33 of the IC card 16 shown in FIG. 2 decrypts theencrypted area registration permission information INF_RP input via theinput/output interface 31 at step ST71 by using the uppermost areamanagement key data K_MU_F read from the memory 64.

Step ST73

The processor 33 of the IC card 16 shown in FIG. 2 stores the areamanagement key code AMC_F and the area management key data K_AM_F in thearea registration permission information INF_RP decrypted at step ST72in correspondence with the uppermost area AREA_MU_F formed at step ST66in the memory 32 as shown in FIG. 23.

Next, the registration of file data to the IC card 16 by the operationfile registration apparatus 15 performed at step ST6 shown in FIG. 8will be explained.

FIG. 24 is a flowchart for explaining the processing.

Step ST81

The IC card holder 26 visits a store of the card memory area user 24carrying the IC card 16 and loads the IC card 16 in the operation fileregistration apparatus 15.

Due to this, the processor 75 of the operation file registrationapparatus 15 shown in FIG. 7 sends a file search request includinginformation for specifying the card memory area user 24, such as aservice code SC or system code SYSC_F, via the card interface 72 to theIC card 16.

Step ST82

When the input/output interface 31 receives the file search request atstep ST81, the processor 33 of the IC card 16 shown in FIG. 2 searcheswhether or not file data of services relating to the card memory areauser 24 is stored in the memory 32 based on the above informationincluded in the file search request.

Step ST83

When it is judged that the file data of the services relating to thecard memory area user 24 is not stored in the memory 32 by the filesearch at step ST82, the processor 33 of the IC card 16 notifies thatthe file does not exist to the operation file registration apparatus 15via the input/output interface 31.

Step ST84

When a notice of no file is received at step ST83, the processor 75 ofthe operation file registration apparatus 15 shown in FIG. 7 outputsfile registration permission data FRP encrypted by the area managementkey data K_AM_F shown in FIG. 19B stored in the memory 74 at step ST54shown in FIG. 17 via the card interface 72 to the IC card 16.

The IC card 16 shown in FIG. 2 receives as input data, the fileregistration permission data FRP via the input/output interface 31.

Step ST85

The processor 33 of the IC card 16 shown in FIG. 2 decrypts the fileregistration permission data FRP input at step ST84 by using the areamanagement key data K_AM_F, uses the file management key data K_FM_F inthe decrypted file registration permission data FRP, and writes filemanagement key data K_FM_F related to the service of the card memoryarea user 24 in the uppermost area AREA_MU_F shown in FIG. 23. As aresult, the uppermost area AREA_MU_F becomes as shown in FIG. 25.

Step ST86

The processor 33 of the IC card 16 shown in FIG. 2 writes the filemanagement key data K_FM_F and the service code SC in the fileregistration permission data FRP decrypted at step ST85 incorrespondence with the file data written at step ST85 in the memory 32.

In the communication system 1, for example, the card memory areaoperator 22 shown in FIG. 1 pays for the cost of receiving the loan ofthe memory area of the memory 32 of the IC card 16 to the IC card issuer21 for example in units of blocks of the memory area.

Also, the card memory area operator 22 bills the cost for use of part ofthe memory area of the memory 32 of the IC card 16 for the service ofthe card memory area user 24 as a license fee, a service code SCregistration use fee, an area AREA registration fee, etc. to the cardmemory area user 24.

As explained above, according to the communication system 1, when the ICcard issuer 21 issues the IC card 16 to the card holder 26, file datarelating to services provided by the card memory area user 24 can beregistered in the unused memory area of the memory 32 of the IC card 16based on predetermined conditions.

As a result, the card holder 26 can receive services of both the IC cardissuer 21 and the card memory area user 24 by using a single IC card 16.

Also, according to the communication system 1, as explained above, thepackage data Pj is generated through the processing of the issuercommunication apparatus 11 by using the Pf generated by the operatorcommunication apparatus 12, provided to the IC card 16 via the operatorcommunication apparatus 12 and the memory area division registrationapparatus 14, and decrypted in the IC card 16. Consequently, the systemcode SYSC_F and the system key data SYS_K_F necessary for writing thefile data to the memory area (uppermost area AREA_MU_F) used by the cardmemory area user 24 can be kept secret from the IC card issuer 21. Also,since the package data Pj is decrypted by using the system key dataSYS_K_(i) in the IC card 16, the system key data SYS_K_(i) necessary forwriting the file data to the memory area (uppermost area AREA_MU_F) usedby the IC card issuer 21 can be kept secret from the card memory areaoperator 22 and the card memory area user 24.

Also, according to the communication system 1, by respectively definingthe areas AREA_(i) and AREA_F in the uppermost area AREA_MU_(i) and theAREA_MU_F and by using the area management data K_AM_(i) and K_AM_F towrite the file data to the AREA_F, illicit writing to the memory areacan be further prevented.

Namely, according to the communication system 1, by dividing the memoryarea of the IC card 16 and keeping secret the key data used for a writeoperation of data on each of the divided memory areas from unauthorizedpersons, unauthorized access to the memory area is prevented.

As a result, it becomes possible for the unused area, which is not usedby the IC card issuer 21 in the memory area of the IC card 16, to besafely used by a card memory area user 24 other than the IC card issuer21 and thereby improves the convenience of the IC card 16.

The present invention is not limited to the above embodiment.

For example, in the above embodiment, setting various data to the memoryarea division registration apparatus 14 and the card memory area user 24from the operator communication apparatus 12 after delivering the memoryarea division registration apparatus 14 and operation file registrationapparatus 15 to the card memory area user 24 was explained. However, theinformation may be set before delivering the memory area divisionregistration apparatus 14 and the operation file registration apparatus15 to the card memory area user 24 under the control of the card memoryarea operator 22.

Also, an example of configuring the memory area division registrationapparatus 14 and the operation file registration apparatus 15 asseparate apparatuses was explained in the above embodiment. However, theapparatuses 14 and 15 may be realized as a single apparatus.

Also, in the above embodiment, an example of setting the memory areadivision registration apparatus 14 and the operation file registrationapparatus 15 in a store of the card memory area user 24 was explained.The apparatuses 14 and 15 may also be set in a store of the operatorcommunication apparatus 12.

Also, in the above embodiment, exclusive apparatuses were used as thememory area division registration apparatus 14 and the operation fileregistration apparatus 15, but the apparatuses may be realized by apersonal computer, or other similar device, of the card memory area user24 under the condition that it is an apparatus having a function ofkeeping secret data in accordance with need.

Below, an IC card system of an embodiment related to the abovecommunication system 1 will be explained.

(1) Configuration of Embodiment (1-1) Basic Configuration

FIG. 27 is a block diagram of the configuration of an IC card systemaccording to the present embodiment.

In FIG. 27, an IC card 3A/3B corresponds to the IC card 16 shown in FIG.1.

Also, a card provider 2 corresponds to the card issuer 21 and the issuercommunication apparatus 11 shown in FIG. 1.

Also, a lending business 5 and a management server 5A correspond to thecard memory area operator 22 and the operator communication apparatus 12in FIG. 1.

Also, an area user 6 corresponds to the card memory area user 24 shownin FIG. 1.

Furthermore, an operation terminal 8 corresponds to the memory areadivision registration apparatus 14 and the operation file registrationapparatus 15 shown in FIG. 1.

In the IC card system 101, the card provider 2 issues a non-contact typeIC card 3A/3B free of charge or by purchase by a user and performsprocessing of for example cashing, passage of turnstiles at trainstations, etc., by access from the provider terminal 4A to 4N by usingthe IC card 3A/3B. Also, a memory space of the IC card 3A/3B left overafter the above use for a service relating to its own business is lentto a area user 6 desiring to use it by management of the lendingbusiness 5 or by its own management. Due to this, the IC card system 101becomes capable of providing a variety of services not only to the cardprovider but to the area user 6 by the IC card 3A/3B. Note that in theIC card system 101, a series of processing is executed by a computerunder management of the card provider 2, the lending business 5, thearea user 6, etc. However, in the explanation below, for a simplerexplanation and easy understanding, the configuration of the IC cardsystem 101 will be explained by suitably setting the card provider 2,lending business 5, and area user 6, etc., as main components.

Namely, in the IC card system 101, a card manufacturer 7 produces the ICcard 3A/3B upon order by the card provider 2 and delivers it to the cardprovider 2. At this time, the IC card 3A/3B is issued by recording acard code Ccd notified from the card provider 2 and a divisionprocessing key notified from the lending business 5. Here, the card codeCcd is an identification code unique to the IC card 3A/3B and selectedby the card provider 2 by a later explained procedure. The divisionprocessing key is a key unique to the IC card 3A/3B relating toprocessing for preparing a system area separately. When the cardprovider 2 entrusts management of empty areas of the IC card 3A/3B tothe lending business 5, the card provider 2 notifies the card code Ccdto the lending business 5, pays a license fee, obtains permission fromthe lending business 5, and issues the IC card 3A/3B.

On the other hand, the card provider 2 is the entity issuing the IC card3A/3B and selects the card code Ccd, notifies the same to the cardmanufacturer 7, and receives the IC card 3A/3B from the cardmanufacturer 7. Also, when the IC card 3A/3B is delivered from the cardmanufacturer 7, the card provider 2 accesses the IC card 3A/3B by anexclusive access apparatus, that is, a reader/writer, and sets theservices to be usable by the IC card 3A/3B. Here, in the processing, thecard provider 2 sets a system area in the memory space of the IC card3A/3B by transfer of data encrypted by using a predetermined key andsets a user area of a predetermined number of blocks (n blocks).

The card provider 2 records data necessary for accessing the user area,data necessary for updating the system area, data for specifying recordsof the system area, etc., in the system area and records files necessaryfor services expected to be provided in the user area.

Namely, the card provider 2 records area management informationindicating the recording positions of the files and not recorded areasin units of block in the system area and enables access to desired filesrequested from an external apparatus by the area management information.Also, a file key for encrypting processing corresponding to the files,an application key applied to one service by a plurality of files, anarea management key as a key for releasing encrypting corresponding tothe card provider 2, and a system key for encrypting processing of alldata to be input/output are recorded. As a result, in the blocks of theuser area set in the IC card 3A/3B, encrypting of data input from theprovider terminal 4A and 4B is released by a combination of thecorresponding system key, the application key, the area management key,and the file key so that it is made possible to write in a predeterminedmemory space.

Also, the system key, the area management key, the application key, thearea management key serving as a key for managing the file key, etc. arerecorded. The system key etc. is updated only by access using the filemanagement key, the application key and the file key.

Also, application codes unique to the services and a system code forspecifying recording of the system area are recorded to enable thevariety of services provided by the IC card 3A/3B to be identified bythe application code and system code. Note that the IC card 3A/3B isconfigured so that files relating to one service are recorded insuccessive blocks, an address of the head block of the successive blocksis assigned to the application code, and thus, corresponding files arerecorded in the memory space by using the application code as areference. The files are made accessible by the area managementinformation after being recorded.

If the IC card 3A/3B is usable by configuring the system area and userarea as explained above, the card provider 2 provides the IC card 3A/3Bto the card user for a fee or free of charge. Furthermore, when there isan access using the IC card 3A/3B from the provider terminals 4A and 4Bserving as terminal apparatuses of services offered by the card provider2, a predetermined service is provided.

Thus, the provider terminals 4A and 4B modulate information to be usedfor transmission by a predetermined carrier in a built-in reader/writerto drive a built-in antenna so as to repeatedly emit a call to the ICcard 3A/3B at a predetermined cycle. Here, when the IC card 3A is heldclose to the antenna and a response to the call is sent from the IC card3A, the reader/writer executes processing for mutual authentication withthe IC card 3A and judges whether or not mutual data communication withthe IC card 3A is possible.

When it is judged by the mutual authentication that mutual datacommunication is possible, the provider terminals 4A and 4B detect aresponse of the IC card 3A/3B to the call using the system code andthereby judge whether it is an IC card 3A/3B having a system areacorresponding thereto or not. Furthermore, by obtaining a response ofthe IC card 3A/3B to the call using the system management key and theapplication code, it is judged whether the IC card 3A/3B relates to itsown service. When judged to be an IC card 3A/3B relating to its ownservice as explained above, the provider terminals 4A and 4B access theuser area by transferring encrypted data by a combination of the systemkey, area management key, application key, and file key.

For example when offering a service by electronic money, they executeprocessing for detecting an amount recorded on the IC card 3A,subtracting an amount used by the user from the balance and recordingthis in the IC card 3A. Also, when the card provider 2 issues points forpurchases made by the user and offers a variety of services inaccordance with the points, it executes processing for updating pointsrecorded on the IC card 3A in accordance with the amount of the purchaseby the user.

The IC card 3A/3B is a non-contact type IC card which starts to operateby power induced by the built-in loop antenna and performs processing ona high frequency signal induced to the loop antenna by a predeterminedsignal processing circuit so as to receive the call from thereader/writer. The IC card 3A/3B sends a response to the call, furtherexecutes processing for mutual authentication upon request from thereader/writer for the response, and thus, judges whether data exchangeis possible with the reader/writer.

Furthermore, it transmits a collation result of the system code andapplication code recorded in the system area to the reader/writer inresponse to a call using the system code and application code from thereader/writer and therefore, can execute a series of processing onlywhen relating to a service scheduled to be provided by thereader/writer.

As a result, when confirmation is obtained by the reader/writer in thisway, the IC card 3A/3B accesses corresponding files in accordance withaccess using the successively input system key, area management key,application key, and file key and thereby executes a series ofprocessing by the file. Also, it secures an area for recording the fileby updating the system area by gaining access using the area managementkey and the system management key and updates the system area byreceiving registration of the file key, application code, andapplication key.

(1-2) Division of Area

The card provider 2 yields the management right of the unused areas ofthe memory space of the IC card 3A/3B to the lending business 5 or lendsthe memory space to the area user 6 which desires to use the IC card3A/3B by the lending business 5 while holding the management right inits own hands. As a result, in this IC card system 101, even a terminalof the area user 6, that is, the operation terminal 8, can use servicesprovided by the area user 6. Due to this, services of electronic money,ticketing, etc., offered by different businesses can be utilized asdesired by the user by, for example, the IC card 3A/3B of a commuter'spass.

Thus, the operation terminal 8 is installed in a store of the user 6,provides services relating to an operation by the area user 6, and setsthe IC card 3A/3B to be able to use the services of the area user 6 byan operation by the user in addition to the provision of these services.

FIG. 26 is a block diagram of a series of processing in the case oftransferring the management right of the unused areas therein to thelending business 5. Here, in the present embodiment, as shown in FIG.28, the processing divides an empty area of the memory space into apredetermined number of blocks, separately sets a system area(hereinafter, referred to as a new system area) formed by setting themanager as the lending business in the divided areas in the same way asexplained above with reference to FIG. 27, and manages the divided areasby the new system area.

Thus, the lending business 5 records data necessary for forming the newsystem area in the IC card 3A/3B by access to the IC card 3B by theoperation terminal 8 using the system area set by the card provider 2.At this time, the lending business 5 secures a user area correspondingto the number of blocks authorized by the card provider 2. Furthermore,the lending business 5 prevents the secret information of the new systemarea, that is, the system management key, area management key, etc.,from being kept secret from a third party including the card provider 2,and thereby makes the user area used by the area user 6 unaccessibleeven by the card provider 2.

Therefore, the lending business 5 specifically removes informationrelating to a file to be recorded on the user area and encryptsinformation comprising the new system area. The encryption is performedby an encrypting key corresponding to a division processing key togenerate a package Pf and sends the package Pf to the card provider 2together with information specifying the IC card 3A/3B. Note that theinformation here is prepared by information obtained by removinginformation related to specific services, such as a file key,application key, application code, etc. from various information of theabove system area explained with reference to FIG. 28 arranged in aformat corresponding to the configuration of the system area. Due tothis, the lending business 5 keeps the area management key, systemmanagement key, etc. set in the new system area secret from the cardprovider 2 and provides information used for generating the system areato the card provider 2.

Subsequently, in the IC card system 101, by inputting/outputtinginformation encrypted to enable release of the encrypting by a key forreleasing encrypting recorded in the system area, that is, the systemkey, with the first terminal apparatus corresponding to the recording ofthe system area explained with reference to FIG. 28, that is, theprovider terminal 4A/4B, the IC card 3A/3B, in which the memory space isaccessed in accordance with the recording of the system area by thefirst terminal apparatus, is designed to encrypt information of the newsystem area corresponding to the system area to enable release of theencrypting by a predetermined area division key recorded in the IC card3A/3B to generate encrypted information.

After the predetermined server adds dummy data to the thus notifiedpackage Pj in accordance with blocks lent to the lending business, thecard provider 2 generates encrypted information by encrypting theinformation using the area management key and the system key and furtherencrypting the information by setting the application code etc. andsystem management key etc. so as to record the encrypted information insuccessive predetermined blocks in the memory space by management of thesystem area explained above with reference to FIG. 28. As a result, thecard provider 2 generates a package Pj relating to the sameconfiguration as a data stream sent from the provider terminals 4A and4B when recording a file relating to a predetermined application to theblocks lent to the lending business 5 and provides the package Pjtogether with the mutual authentication key and system code to thelending business 5. Consequently, the card provider 2 keeps the areamanagement key and system management key etc. of the original systemarea, which it manages itself, secret from the lending business 5 andprovides the package Pj generating the new system area and acorresponding user area to the lending business 5 together with themutual authentication key etc.

As a result, the lending business 5 obtains from the card provider 2 thepackage Pj relating to the area setting processing for a predeterminednumber corresponding to the charging processing together with the mutualauthentication key etc. by advance processing and provides the same tothe area user 6 conditional on executing charging processing for settingareas at the card provider 2 and obtaining permission from the cardprovider 2.

As opposed to this, the operation terminal 8 executes processing formutual authentication relating to the new system area with the IC card3B in the same way as the provider terminals 4A and 4B by settings inadvance and receives the mutual authentication key from the area user 6and executes processing for mutual authentication with the IC card 3B bythe mutual authentication key when mutual authentication is notobtained. Here, when mutual authentication has been achieved, the ICcard 3B notifies that fact to the area user 6 since it is an IC card towhich a new system area is not yet set.

Accordingly, the area user 6 instructs to secure an area correspondingto the IC card 3B by sending the package Pj to the operation terminal 8.Due to the instruction, the operation terminal 8 uses the record of theprevious system area related to usage of the provider terminals 4A and4B and records information of the package Pj in a predetermined area ofthe IC card 3B. As a result, in the IC card system 101, the IC card 3Bis made to secure a user area corresponding to the new system area.Also, corresponding to the encrypting processing of the package Pf bythe card provider 2 at this time, it releases encrypting by the systemkey and area management key set in the original system area of the ICcard 3B, the records by releasing encrypting by the division processingkey and thereby forms the same new system area as the system area of theprovider terminals 4A and 4B.

Also, the system sets the user area to be hard to access even by thecard provider 2 by various kinds of keys set in the new system area andaccordingly can completely entrust management of the memory space to thelending business 5.

As a result, in the IC card system 101, by setting the new system areaby the lending business 5 in the memory space of the IC card 3A/3B anddividing the memory space as explained above, the management right ofthe divided memory space is transferred from the card provider 2 to thelending business 5.

Due to this, in the IC card system 101, in the same way as execution bythe card provider 2 by management of the memory space by the originalsystem area using the provider terminals 4A and 4B, and by themanagement of the memory space by the new system area using an exclusiveterminal apparatus by the lending business 5, the lending business 5 canalso provide a variety of services by managing the IC card 3A/3B.

In the above way, in the IC card system 101, a management computer atthe card provider 2 side comprises a second encrypting means for furtherencrypting the encrypted information, that is, the package Pj, to enablerelease of the encrypted information by the area management key recordedin the previous system area, to generate the second encryptinginformation, that is, the package Pj. The management computer furthercomprises an input means for an operation terminal 8 to input thepackage Pj to the IC card 3A/3B by access of the IC card 3A/3Bcorresponding to the recording in the first system area, that is, theprevious system area, by access of the IC card 3A/3B using the mutualauthentication key of the provider terminals 4A and 4B by the operationterminal 8. Moreover, the computer releases the encrypted information ofthe package Pj in the IC card 3A/3B and records information of the newsystem area in the memory space of the IC card 3A/3B by access of the ICcard 3A/3B corresponding to the first terminal apparatus.

(1-3) Lending of Memory Space

The lending business 5 lends memory space to the area user 6, whichdesires to use the IC card 3A/3B with respect to the divided memoryspace, when dividing the memory space of the IC card 3A/3B and receivingpart of the management right in this way or with respect to theentrusted memory space when the lending of the memory space is entrustedby the card provider 2 while the card provider 2 keeps the managementright at its own hands. As a result, in the IC card system 101, evenmore types of businesses can offer a variety of services using the ICcard 3A/3B in common.

In the lending processing, when the card provider 2 and area user 6 donot desire to provide services using a single IC card 3A/3B in common,the lending business 5 limits the lending of the memory space byrejection processing. Due to this, for example, the memory space of theIC card 3A/3B is not lent for a service of a certain provider in a rivalrelationship with the card provider 2. Further, lending processing isselectively performed for an IC card 3A/3B relating to a rate desired bythe area user 6. Due to this, the area user 6 can reject lending forexample for an IC card 3A/3B at a high lending rate.

(1-3-1) Registration of Service

FIG. 30 is a block diagram for explaining pre-processing of therejection processing in the IC card system 101. Namely, in the IC cardsystem 101, the lending business 5 obtains from the IC card issuer 21,lending conditions together with the card code Ccd as to the IC card3A/3B entrusted to be lent at the time of requesting production of theIC card 3A/3B to the card manufacturer 7 by the card provider 2 etc.Here, the lending conditions include rejection conditions of theapplication (APL), price of the area, and expiration date; the rejectionconditions of an application include sectors and businesses for whichlending is rejected and other data specifying services (for example, anapplication code); and the price of the area includes data forspecifying a fee of one block relating to lending. Also, the expirationdate is composed of data for specifying a lending period. As a result,when lending is rejected in this way, for example, prohibiting use ofthe IC card 3A/3B by rival businesses may be considered.

The lending business 5 records the obtained card code Ccd and thelending conditions in a management server 5A and thereby prepares a cardcode list formed by recording the card code Ccd and the lendingcondition of the IC card 3A/3B. Furthermore, the lending business 5approves the card code Ccd for access from the card manufacturer 7.

Furthermore, the lending business 5 has the area user 6, which desiresto use the IC card 3A/3B, set the operation terminal 8 and makes theoperation terminal 8 function as a registration apparatus so that thearea user 6 can register services. The area user 6 can access the ICcard 3A/3B from the operation terminal 8 and use it for a variety ofservices.

The lending business 5 records information of the services to beregistered from the operation terminal 8 in the management server 5A togenerate a registration machine code list and an application code listshown in FIG. 31 and executes the rejection processing by judgement madeby comparing these lists with the card code list.

Namely, when the lending business 5 authorizes the area user 6 to usethe IC card 3A/3B under a contract formed with the area user 6, itissues an unused registration machine code Mcd to the area user 6 whenthere is an issuance request of a unique registration machine code Mcdfrom the area user 6 to the operation terminal 8. When issuing theregistration machine code Mcd in this way, the management server 5Arecords a business code indicating that the operation terminal 8relating to the registration machine code Mcd is related to the areauser 6 and an application (APL) code of the services which the operationterminal 8 is scheduled to operate and prepares a registration machinecode list. Note that when starting a new services of the area user 6 bythe existing operation terminal 8, this can be dealt with by updatingcontents of a corresponding registration machine code at the time ofrequesting to obtain the application code related to the new services.

In the IC card system 101, when the registration machine code Mcd isnotified from the lending business 5 to the area user 6, as explainedabove, the area user 6 asks a registration machine manufacturer 10 foran operation terminal 8 by the registration machine code Mcd. In thiscase, by the request for permission from the registration machinemanufacturer 10, the lending business 5 approves production of theoperation terminal 8 with the registration machine code Mcd. Thus, inthe IC card system 101, the registration machine manufacturer 10produces the operation terminal 8 by recording the registration machinecode Mcd. Then, the operation terminal 8 is delivered to the area user6, and a license fee is charged in this case.

In the IC card system 101, for an operation terminal 8 delivered to thearea user 6 explained above, when the area user 6 requests issuance ofan application code relating to the new services by the operationterminal 8, the lending business 5 selects an unused application code,notifies the same, and updates contents of the registration machine codelist by the application code. Furthermore, the number of blocks of theIC card 3A/3B relating to lending set by the contract, rejectionconditions of the IC card (rejection conditions of a card code) whichthe lending business 5 does not desire to use, etc. are recorded in themanagement server 5A along with a corresponding application key so as toprepare the application (APL) code list. Note that in FIG. 31, therejection conditions of the card code are records of card codes of theIC cards which the lending business 5 does not desire to use,specifically, card codes and usage fees that are blocked for use. As aresult, where a rival business of the area user 6 is the card provider2, a case of a high usage rate, etc. may be considered.

When preparing a list in this way, as shown in FIG. 32, the lendingbusiness 5 compares conditions for recording to the card code list withconditions for recording to the application code list for everyapplication code and card code and thereby prepares a list ofregistration permission information for registering services to the ICcard 3A/3B except for combinations of registration of services by thearea user 6 which the card provider 2 does not desire and combinationsof registration of services to the IC card 3A/3B which the area userdoes not desire etc.

At this time, the lending business 5 sends the registration permissioninformation from the operation terminal 8 to the IC card 3A/3B, recordsan application code and an application key corresponding to the IC card3A/3B in the IC card 3A/3B, and prepares a list by recording theregistration permission information so that the number of blocks forrecording corresponding files can be secured. Note that when the lendingbusiness 5 is only entrusted with lending of a memory space, since thearea management information, system key, and system management keyrecorded in the system area necessary for preparing such registrationpermission information are known only by the card provider 2,information of the application code, application key, and number ofblocks are notified to the card provider 2 and registration informationis generated through encryption by the card provider 2. As opposed tothis, when providing services in a memory space corresponding to thesystem area by registering the information to the system area managed bythe lending business, since area management information, system key, andsystem management key recorded in the system area are known only by thelending business 5, the registration information is generated byprocessing of the lending business 5 by itself.

When data exchange is started between the operation terminal 8 and theIC card 3A/3B in a state where the application registration list isprepared in advance as explained above, when the system area relating tothe operation terminal 8 is not formed in the IC card 3A/3B, the systemarea is formed and then existence of a record of an application coderelating to the services of the operation terminal 8 is confirmed in theoperation terminal 8. Here, when the application code is not recorded inthe IC card 3A/3B, it is considered that files relating to the servicesof the operation terminal 8 are not yet registered in the IC card 3A/3B.At this time, when a plurality of services are provided by the operationterminal 8, the operation terminal 8 issues a command to the IC card3A/3B to successively read the application code and detects serviceswhich are not yet registered from the read application code.Furthermore, existence of provision of detected services which are notyet registered, is confirmed for the user which carries the IC card3A/3B. If the user desires a service here, the registration machine codeand service code are notified to the lending business 5 via the areauser 6.

Furthermore, when searching through the application registration list byusing a search result of the registration machine code list by theregistration machine code as a reference and recording registrationpermission information as a registerable service, the registrationpermission information of the corresponding application is notified fromthe application registration list to the operation terminal 8. On theother hand, when registration permission information of thecorresponding application is not registered, since registration isdifficult due to the above rejection processing, the user is informed ofit via the operation terminal 8.

In the IC card system 101, a registration key K used for registering afile necessary for providing a service is also notified from the areauser at the time of notifying the registration permission information tothe operation terminal 8. The operation terminal 8 accesses the IC card3B by the registration permission information to enable registration ofa file and file key relating to a service. Then, by accessing the ICcard 3B using the registration key K notified from the area user 6, thefile and corresponding file key relating to the service are registered.Thus, in the IC card system 101, the area user 6 uses the memory spacelent from the lending business 5 or the area user 6 uses the memoryspace lent from the card provider 2 and the lent memory space is managedby the file key kept by the area user 6, so a variety of services can beprovided.

When the services become available in this way, the operation terminal 8prints a sticker indicating the newly usable service by a built-inprinter and provides the sticker to the user of the IC card 3B. As aresult, in the IC card system 101, even in the case where a large numberof services are recorded in the IC card 3B, the user can confirm theavailable services by adhering the stickers on the IC card 3B. Note thatinstead of printing such a sticker, it is possible to directly print theinformation on the IC card 3B.

As explained above, when a service becomes available by the IC card 3B,the lending business 5 performs charging relating to collection of feesat the time of registration in the area user 6 and charging relating topayment of the registration fee in the card provider 2. Furthermore, theregistration is listed for each card code of the IC cards and recordsleft. The lending business 5 performs charging for use of the card forexample in units of months by periodic tabulation of the records.

Note that the series of processing of the data processing method of thepresent invention can be executed by hardware, but can also be executedby software (program). When executing the series of processing bysoftware, it is possible to install the software from a storage mediumor downloaded it via a network into a computer incorporating a programcomprising the software in exclusive hardware or a general-use personalcomputer capable of executing a variety of functions by installation ofa variety of programs etc.

As explained above, according to the present invention, it is possibleto provide a data processing method, system, and apparatus which candeal with a variety of demands including security aspects of a serviceprovider when a plurality of businesses share a single IC card.

It should be understood that various changes and modifications to thepresently preferred embodiments described herein will be apparent tothose skilled in the art. Such changes and modifications can be madewithout departing from the spirit and scope of the present subjectmatter and without diminishing its intended advantages. It is thereforeintended that such changes and modifications be covered by the appendedclaims.

1. A portable device usable with a plurality of different serviceproviders including an integrated circuit for storing memory areadivision data and first area management key data, wherein the portabledevice is authorized to perform at least one of a write operation to amemory area of said integrated circuit and a rewrite operation to thememory area provided that the first area management key data requires asecond service provider to provide a second service using part of saidmemory area of said integrated circuit when said portable device isissued by a first service provider providing a first service using saidmemory area, wherein the portable device includes a memory areaoperation unit for managing the key memory area division data, whereinthe memory area operation unit encrypts first module data includingsecond area management key data by the key memory area division data,and provides the same to the first service provider, wherein the firstservice provider encrypts second module data including the encryptedfirst module data by using said first area management key data andprovides the same to the memory area operation unit, and wherein thememory area operation unit controls, providing the encrypted secondmodule data to the integrated circuit, decrypting the second module databy using the first area management key data in the integrated circuit,decrypting the first module data in the decrypted second module data byusing the key memory area division data, and dividing the memory area toa first memory area to be used for the services of the first serviceprovider and a second memory area to be used for the services of thesecond service provider by using the second area management key dataobtained from the decryption of the data.
 2. A data processing methodfor a portable device usable with a plurality of different serviceproviders including an integrated circuit for storing memory areadivision data and first area management key data, is authorized toperform at least one of a write operation to a memory area of saidintegrated circuit and a rewrite operation to the memory area providedthat the first area management key data requires a second serviceprovider to provide a service using part of said memory area of saidintegrated circuit when said portable device is issued by a firstservice provider providing a service using said memory area, said dataprocessing method comprising: having a memory area operation unitmanaging said key memory area division data encrypt first module dataincluding second area management key data by the key memory areadivision data, and providing the same to the first service provider,having the issuer of the portable device, which is said first serviceprovider, encrypt second module data including the encrypted firstmodule data by using said first area management key data and providingthe same to said memory area operation unit, and under the control ofthe memory area operation unit, providing the encrypted second moduledata to the integrated circuit, decrypting the second module data byusing the first area management key data in the integrated circuit,decrypting the first module data in the decrypted second module data byusing the key memory area division data, and dividing the memory area toa first memory area to be used for the services of the first serviceprovider and a second memory area to be used for the services of thesecond service provider by using the second area management key dataobtained from the decryption of the data.
 3. The method of claim 2,further comprising: under the control of the memory area operation unit,providing the encrypted second module data to the integrated circuit. 4.The method of claim 2, further comprising: under the control of thememory area operation unit, decrypting the second module data by usingthe first area management key data in the integrated circuit.
 5. Themethod of claim 2, further comprising: under the control of the memoryarea operation unit, decrypting the first module data in the decryptedsecond module data by using the key memory area division data.
 6. Themethod of claim 2, further comprising: under the control of the memoryarea operation unit, dividing the memory area to a first memory area tobe used for the services of the first service provider and a secondmemory area to be used for the services of the second service providerby using the second area management key data obtained from thedecryption of the data.