Information processing apparatus, information processing method, program, and information processing system

ABSTRACT

An information processing apparatus includes: processing sections that have respective identification information and that perform processing corresponding to a request from another information processing apparatus; and a reporting section that stores the respective identification information of the processing sections and, instead of the processing sections, that reports the identification information to the another information processing apparatus in response to a request for reporting the identification information, the request being issued from the another information processing apparatus.

CROSS REFERENCES TO RELATED APPLICATIONS

The present application claims priority to Japanese Priority PatentApplication JP 2008-146501 filed in the Japan Patent Office on Jun. 4,2008, the entire content of which is hereby incorporated by reference.

BACKGROUND

The present application relates to information processing apparatuses,information processing methods, programs, and information processingsystems. In particular, the present application relates to aninformation processing apparatus, an information processing method, aprogram, and an information processing system which are capable ofquickly obtaining identification information.

For example, Japanese Unexamined Patent Application Publication No.2003-317042 discloses an IC (integrated circuit) card that has secureelements for storing secure data of applications, such as electronicmoney. A reader/writer that reads/writes data from/to an IC cardperforms contactless communication based on NFC (near fieldcommunication) standards with a secure element or secure elements.

When an IC card has multiple secure elements, the reader/writertypically has to select, from the security elements, one secure elementwith which communication is to be actually performed.

In order to select one secure element with which communication is to beactually performed from the secure elements, the reader/writer requestsall of the secure elements to report the identification numbers thereof.In response to the request, each secure element reports itsidentification information to the reader/writer at timing indicated by atime slot randomly selected by the secure element.

SUMMARY

However, since the secure elements randomly and individually select thetime slots, the time slots selected by the security elements may matcheach other. In this case, collision occurs as in a case in whichmultiple IC cards are present in the vicinity of the reader/writer, asdisclosed in Japanese Unexamined Patent Application Publication No.2003-317042, and it becomes difficult for the reader/writer to quicklyobtain the identification numbers of all the secure elements.

Accordingly, it is desirable to make it possible to quickly obtainingthe identification information.

In an embodiment, there is provided an information processing apparatus.The information processing apparatus includes: processing sections thathave respective identification information and that perform processingcorresponding to a request from another information processingapparatus; and a reporting section that stores the respectiveidentification information of the processing sections and, instead ofthe processing sections, that reports the identification information tothe another information processing apparatus in response to a requestfor reporting the identification information, the request being issuedfrom the another information processing apparatus.

According to another embodiment, there is provided an informationprocessing apparatus. The information processing apparatus includes: anobtaining section that obtains identification information of processingsections from a reporting section instead of the processing sections,the processing sections and the reporting section being included inanother information processing apparatus, the processing sectionsholding the identification information, and the reporting sectionobtaining the identification information from the processing sectionsand storing the identification information; a selecting section thatselects, from the obtained identification information of the processingsections, the identification information of the processing section to beprocessed; and an executing section that causes the processing sectioncorresponding to the selected identification information to executepredetermined processing.

According to yet another embodiment, there is provided an informationprocessing system. The information processing system includes: a firstinformation processing apparatus that has a reporting section andprocessing sections, the reporting section obtaining identificationinformation of the processing sections and storing the obtainedidentification information; and a second information processingapparatus that issues, to the first information processing apparatus, arequest for reporting the identification information. The reportingsection in the first information processing apparatus, instead of theprocessing sections, reports the stored identification information tothe second information processing apparatus in response to a requestissued from the second information processing apparatus. The secondinformation processing apparatus specifies the processing section byusing the identification information selected from the reportedidentification information and issues a request for predeterminedprocessing to the specified processing section. Of the processingsections in the first information processing apparatus, the processingsection specified by the second information processing apparatusperforms the predetermined processing.

According to another embodiment, a reporting section obtainsidentification information of processing sections and stores theidentification information; the reporting section, instead of theprocessing sections, reports the identification information to anotherinformation processing apparatus in response to a request for reportingthe identification information, the request being issued from theanother information processing apparatus; and, of the processingsections, the processing section specified by the identificationinformation reported to the another information processing apparatusperforms processing corresponding to a request issued from the anotherinformation processing apparatus.

According to still another embodiment, an obtaining section obtainsidentification information of processing sections from a reportingsection instead of the processing sections, the processing sections andthe reporting section being included in another information processingapparatus, the processing sections holding the identificationinformation, and the reporting section obtaining the identificationinformation from the processing sections and storing the identificationinformation; a selecting section selects, from the obtainedidentification information of the processing sections, theidentification information of the processing section to be processed;and an executing section causes the processing section corresponding tothe selected identification information to execute predeterminedprocessing.

According to a further embodiment, a reporting section in a firstinformation processing apparatus obtains identification information ofprocessing sections in the first information processing apparatus andstores the obtained identification information; and a second informationprocessing apparatus issues, to the first information processingapparatus, a request for reporting the identification information. Thereporting section in the first information processing apparatus, insteadof the processing sections, reports the stored identificationinformation to the second information processing apparatus in responseto a request issued from the second information processing apparatus.The second information processing apparatus specifies the processingsection by using the identification information selected from thereported identification information and issues a request forpredetermined processing to the specified processing section. Of theprocessing sections in the first information processing apparatus, theprocessing section specified by the second information processingapparatus performs the predetermined processing.

As described above, according to an embodiment, it is possible toquickly obtain the identification information.

Additional features and advantages are described in, and will beapparent from, the following Detailed Description and the figures.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a block diagram showing the configuration of an informationprocessing system according to one embodiment;

FIG. 2 is a block diagram showing the configuration of a contactlesscommunication device according to one embodiment;

FIG. 3 is a block diagram showing the configuration of an externalcontactless communication device according to one embodiment;

FIGS. 4A and 4B show packet structures of an SE ON request and an SE ONresponse, respectively;

FIGS. 5A and 5B show packet structures of a polling request and apolling response, respectively;

FIGS. 6A and 6B show packet structures of a store polling data requestand a store polling data response, respectively;

FIGS. 7A and 7B show packet structures of a get polling data request anda get polling data response, respectively;

FIG. 8 is a flowchart illustrating processing for storing identificationinformation;

FIG. 9 illustrates the stored identification information;

FIG. 10 illustrates the stored identification information;

FIG. 11 is a flowchart illustrating processing when a secure element isattached;

FIG. 12 is a flowchart illustrating processing when a secure element isdetached;

FIG. 13 illustrates the stored identification information;

FIG. 14 is a flowchart illustrating access processing performed by theexternal contactless communication device;

FIG. 15 is a flowchart illustrating processing for storing theidentification information;

FIG. 16 is a flowchart illustrating access processing performed by theexternal contactless communication device;

FIG. 17 illustrates the stored identification information;

FIG. 18 illustrates the identification information to be transmitted;

FIG. 19 illustrates the identification information to be transmitted;

FIG. 20 illustrates the identification information to be transmitted;

FIG. 21 illustrates the identification information to be transmitted;

FIG. 22 is a block diagram showing the configuration of a contactlesscommunication device according to another embodiment;

FIGS. 23A to 23D illustrates commands;

FIG. 24 is a flowchart illustrating processing for storing theidentification information;

FIG. 25 is a block diagram showing the configuration of a contactlesscommunication device according to yet another embodiment;

FIG. 26 is a flowchart illustrating access processing performed by theexternal contactless communication device;

FIG. 27 is a block diagram showing the configuration of a contactlesscommunication device according to another embodiment;

FIG. 28 is a flowchart illustrating processing for storing theidentification information; and

FIG. 29 is a flowchart illustrating access processing performed by theexternal contactless communication device.

DETAILED DESCRIPTION

The present application will be described below with reference to theaccompanying drawings according to an embodiment.

FIG. 1 is a diagram showing an information processing system accordingto an embodiment. This information processing system 1 includes acontactless communication device 11 serving as an information processingapparatus and an external contactless communication device 12 serving asanother information processing apparatus. Examples of the contactlesscommunication device 11 include an IC card and a mobile phone, and oneexample of the external countless communication device 12 is areader/writer placed at a shop, a ticket gate for a transportationsystem, or the like. The contactless communication device 11 and theexternal contactless communication device 12 perform contactlesscommunication with each other, for example, based on an NFC (near fieldcommunication) standard.

A user carries the contactless communication device 11 and holds itagainst the external contactless communication device 12 to cause thecontactless communication device 11 to execute contactless communicationwith the external contactless communication device 12. In response, theexternal contactless communication device 12 can execute processing,such as billing and other predetermined processing, on the contactlesscommunication device 11.

FIG. 2 shows the configuration of the contactless communication device11 according to the embodiment. The contactless communication device 11includes an antenna 31, a front end (FE) 32, a main controller (MC) 33,and secure elements (SE) 34-1 to 34-3. The secure elements (SE) 34-1 to34-3 are simply referred to as “secure elements 34”, unless they shouldbe distinguished from each other. The same applies to other sections.

The antenna 31 transmits/receives electromagnetic waves to/from anantenna (not shown) of the external contactless communication device 12.The front end 32 serves as a reporting section that stores respectiveidentification information of the secure elements 34 and, instead of thesecure elements 34, reports the identification information to theexternal contactless communication device 12 in response to a requestfor reporting the identification information, the request being issuedfrom the external contactless communication device 12. The front end 32has terminals RF-DATA to which the antenna 31 is connected andtransmits/receives a signal to/from the external contactlesscommunication device 12 via the antenna 31. The front end 32 also has avolatile or nonvolatile memory 41, which stores identificationinformation of the main controller 33 and the identification informationof the secure elements 34-1 to 34-3.

The front end 32 further has terminals DATAB, DATA1, DATA2, and DATA3,which are individually connected to terminals DATA of the maincontroller 33 and the secure elements 34-1 to 34-3 through correspondinglines 51 and 52-1 to 52-3.

When the contactless communication device 11 is powered on and thesecure element(s) 34 is attached or detached, the main controller 33serves as a control section that collects the identification informationof the secure element(s) 34, supplies the collected identificationinformation and the identification information of the main controller 33to the front end 32, and causes the identification information be storedin the memory 41 therein. The memory 42 in the main controller 33 holdsa unit identification number (IDB) and an application number (SCB) ofthe main controller 33 as the identification information.

In order to check connections, a terminal ST of the secure element 34-1is connected to a terminal ST1 of the main controller 33 through a line61-1, a terminal ST of the secure element 34-2 is connected to aterminal ST2 of the main controller 33 through a line 61-2, and aterminal ST of the secure element 34-3 is connected to a terminal ST3 ofthe main controller 33 through a line 61-3. Thus, the main controller 33can check connection states of the secure elements 34.

As described above, the terminals ST1, ST2, and ST3 of the maincontroller 33 are individually connected to the secure elements 34-1,34-2, and 34-3 on a one-to-one basis. The terminals DATA1, DATA2, andDATA3 of the front end 32 are individually connected to the terminalsDATA of the secure elements 34-1 to 34-3 on a one-to-on basis. Thus, theterminals DATA1, DATA2, and DATA3 of the front end 32 correspond to theterminals ST1, ST2, and ST3 of the main controller 33, respectively.

The secure elements 34-1 to 34-3 hold their individual identificationinformation in respective nonvolatile memories 43-1 to 43-3 and serve asprocessing sections for performing processing corresponding to requestsissued from the external contactless communication device 12. The secureelements 34 perform processing based on predetermined applications. Ofthe secure elements 34, the secure element 34-1 holds, in thenonvolatile memory 43-1, a unit identification number (ID1) and anapplication number (SC1) of the secure element 34-1 as theidentification information.

Similarly, the secure element 34-2 holds, in the nonvolatile memory43-2, a unit identification number (ID2) and an application number (SC2)of the secure element 34-2 as the identification information, and thesecure element 34-3 holds, in the nonvolatile memory 43-3, a unitidentification number (ID3) and an application number (SC3) of thesecure element 34-3 as the identification information.

In the same manner as the memories 41 and 42, the memories 43-1 to 43-3store computer programs for executing various types of processing, asappropriate.

Power is supplied to terminals VDD of the front end 32, the maincontroller 33, and the secure elements 34-1 to 34-3 through a line 62.The main controller 33 and the secure elements 34-1 to 34-3 haveactivating and deactivating functions. For example, as defined by NFC-WI(near field communication wired interface) (ISO/IEC28361), in a state inwhich power is supplied to the terminal VDD, each of the main controller33 and the secure elements 34-1 to 34-3 is activated when a pulse isinput to the terminal DATA and is deactivated when no pulse is input tothe terminal DATA.

In the contactless communication device 11, at least one of the secureelements 34 is fixed and one or more of the secure elements 34 aredetachably attached.

For example, as shown in FIG. 3, the external contactless communicationdevice 12 has a functional configuration that includes an obtainingsection 91, a selecting section 92, a setting section 93, and anexecuting section 94.

The obtaining section 91 obtains the identification information from thefront end 32 instead of the secure elements 34-1 to 34-3, the front end32 obtaining the identification information from the secure elements34-1 to 34-3 and storing the identification information. The obtainingsection 92 selects, from the obtained multiple pieces of identificationinformation, the identification information of the secure element 34 tobe processed.

The setting section 93 sets, of the individual communication lines forthe secure elements 34-1 to 34-3 connected to the front end 32, thecommunication line for the secure element 34 corresponding to theselected identification information. The executing section 94 causes thesecure element 34 corresponding to the selected identificationinformation to execute predetermined processing.

Packet structures of commands used by the information processing system1 will now be described with reference to FIGS. 4A to 7B.

FIGS. 4A and 4B show packet structures of an SE ON request and an SE ONresponse, respectively. As shown in FIG. 4A, an SE number (No.) isattached to the SE ON request. The SE number indicates the number of theterminal DATA1, DATA2, or DATA3 of the front end 32. As shown in FIG.4B, a status indicating a state is attached to the SE ON response.

Upon receiving the SE ON request, the front end 32 sets a specifiedterminal line of the lines 52-1 to 52-3 connected to the terminalsDATA1, DATA2, and DATA3, i.e., the communication line for the specifiedsecure element 34, and sends an SE ON response indicating the set state.When a corresponding communication line is not set, the secure element34 is put into a deactivated state, and when a correspondingcommunication line is set, the secure element 34 is put into anactivated state.

Upon receiving the SE ON (OFF) request, the front end 32 performssetting so as to prevent the secure element 34 from responding to apolling request or another command. For example, the front end 32performs setting so that a polling request is not transferred to thesecure element 34.

FIGS. 5A and 5B show packet structures of a polling request and apolling response, respectively. As shown in FIG. 5A, an SC, an option,and a TSN are attached to the polling request. The SC states the numberof an application of the secure element 34. The secure element 34 havingan application stated by the SC sends a response. However, when the SCstates FFFFh, all secure elements 34 that have received the pollingrequests send responses.

The TSN states one time slot number of, for example, 0 to 15. The secureelement 34 that has received the polling request sends a response attiming indicated by the time slot number that is smaller than or equalto the value stated by the received polling request. For example, whenthe TSN states the maximum number (15) of the time slot number, thesecure element 34 that has received the polling request sends a responseat timing indicated by the time slot number having any value of 0 to 15.The option in the polling request is used as appropriate.

As shown in FIG. 5B, an ID, a PAD, and an SC are attached to the pollingresponse. The ID states the unit identification number of the secureelement 34. The SC states the application number of the secure element34. The PAD has padding of predetermined data.

FIGS. 6A and 6B show packet structures of a store polling data requestand a store polling data response, respectively. As shown in FIG. 6A,the number “Num” of pieces of identification information and specificidentification information, including unit identification numbers ID1,ID2, . . . , and IDn and application numbers SC1, SC2, . . . , and SCn,are attached to the store polling data request.

As shown in FIG. 6B, a status indicating a state is attached to thestore polling data response.

Upon receiving the store polling data request, the front end 32 storesthe identification information, stated thereby, in the memory 41 andsends the store polling data response stating the stored state.

FIGS. 7A and 7B show packet structures of a get polling data request anda get polling data response, respectively. For issuing a request forreading the identification information stored in the memory 41 in thefront end 32, the external contactless communication device 12 outputsthe get polling data request shown in FIG. 7A.

Upon receiving the get polling data request, the front end 32 sends theget polling data response. As shown in FIG. 7B, the get polling dataresponse states the number “Num” of pieces of identification information(of the secure elements 34) and the specific identification information,including the unit identification numbers ID1, ID2, . . . , and IDn andthe application numbers SC1, SC2, . . . , and SCn.

Only the front end 32 responds to the store polling data request and theget polling data request, and the secure elements 34 do not respondthereto.

Processing in which the contactless communication device 11 stores theidentification information of the secure elements 34 into the memory 41in the front end 32 will now be described with reference to FIG. 8. Theprocessing in which the identification information of the secureelements 34 is stored in the memory 41 is executed when the contactlesscommunication device 11 is powered on and the secure element(s) 34 isattached or detached.

In step S1, the main controller 33 checks the connections of the secureelements 34. Specifically, the main controller 33 determines whether ornot the secure elements 34-1 to 34-3 are connected to the terminals ST1to ST3.

In step S2, the main controller 33 detects a difference between thedetermined connection state and a state stored in the front end 32. Thememory 41 stores the identification information of the correspondingconnection targets in association with the terminals DATAB, DATA1,DATA2, and DATA3.

FIG. 9 is a table showing an example of the identification informationstored in the memory 41. In this example, the unit identification numberand the application number of the main controller 33 connected to theterminal DATAB with terminal number 0 are IDB and SCB, respectively; theunit identification number and the application number of the secureelement 34-1 connected to the terminal DATA1 with terminal number 1 areID1 and SC1, respectively; the unit identification number and theapplication number of the secure element 34-2 connected to the terminalDATA2 with terminal number 2 are ID2 and SC2, respectively; and the unitidentification number and the application number of the secure element34-3 connected to the terminal DATA3 with terminal number 3 are ID3 andSC3, respectively.

In contrast, for example, if the secure element 34 is not connected tothe terminal DATA1 with terminal number 1, the storage state of thememory 41 becomes as shown in FIG. 10. That is, a unit identificationnumber and an application number are not stored with respect to terminalnumber 1.

In this state, when the secure element 34-1 is newly connected to theterminal DATA1 with terminal number 1, a difference between theconnection state and the previously stored state is that the new secureelement 34 is connected to the terminal DATA1 with terminal number 1.Accordingly, processing for further storing the identificationinformation of the new secure element 34 is further executed.

Although the identification information of the main controller 33 andthe identification information of at least one fixed secure element 34should always be stored, it is now assumed that no secure elements 34are connected to the terminals DATA1 to DATA3. In this case, when thesecure elements 34 are newly connected to the terminals DATA2 and DATA3,processing for storing the identification information of the secureelements 34 newly connected to the terminals DATA2 and DATA3 is furtherperformed. FIG. 8 shows an example of processing in such a case.

That is, the main controller 33 checks the states of the terminals ST2and ST3 to determine that new secure elements 34 are connected thereto.In step S3, the main controller 33 output an SE ON request (SE2) to thefront end 32.

In step S31, the front end 32 receives the SE ON request (SE2) and thenswitches the communication line to the secure element 34-2 (SE2). Thus,only the communication line 52-2 of the lines 52-1 to 52-3 is enabled.Specifically, only the secure element 34-2 is activated and the othersecure elements 34-1 and 34-3 are left in the deactivated states. As aresult, compared to a case in which all secure elements 34 are always inthe activated states, unwanted power consumption is reduced. In stepS32, the front end 32 sends an SE ON response to the main controller 33.

In step S4, the main controller 33 receives the SE ON response tothereby make it possible to know that the communication line is switchedto the line for the secure element 34-2. In step S5, the main controller33 outputs a polling request. In step S33, the front end 32 receives thepolling request via the terminal DATAB and then transfers the pollingrequest to the secure element 34-2 through the communication line 52-2set in step S31.

In step S51, the secure element 34-2 receives the polling request andthen reads the unit identification number ID2 and the applicationnumber, SC2 stored in the memory 43-2, as the identificationinformation. In step S52, the secure element 34-2 sends a pollingresponse.

In step S34, the front end 32 receives the polling response and thentransfers the polling response to the main controller 33. At this point,the front end 32 puts the secure element 34-2 into the deactivatedstate. With this arrangement, the power consumption can be reduced. Instep S6, the main controller 33 receives the polling response. As aresult, the main controller 33 can know the identification informationof the secure element 34-2 connected to the terminal ST2 (and alsoconnected to the terminal DATA2 of the front end 32).

Similar processing is also executed on the secure element 34 connectedto the terminal ST3.

That is, in step S7, the main controller 33 output an SE ON request(SE3) to the front end 32.

In step S35, the front end 32 receives the SE ON request (SE3) and thenswitches the communication line to the line for the secure element 34-3.That is, only the communication line 52-3 of the lines 52-1 to 52-3 isenabled. Specifically, only the secure element 34-3 is put into theactivated state and the other secure elements 34-1 and 34-2 are left inthe deactivated states. As a result, unwanted power consumption isreduced. In step S36, the front end 32 sends an SE ON response to themain controller 33.

In step S8, the main controller 33 receives the SE ON response tothereby make it possible to know that the communication line is switchedto the line for the secure element 34-3. In step S9, the main controller33 outputs a polling request. In step S37, the front end 32 receives thepolling request via the terminal DATAB and then transfers the pollingrequest to the secure element 34-3 through the communication line 52-3set in step S35.

In step S71, the secure element 34-3 receives the polling request andthen reads the unit identification number ID3 and the application numberSC3, stored in the memory 43-3, as the identification information. Instep S72, the secure element 34-3 sends a polling response.

In step S38, the front end 32 receives the polling response and thentransfers the polling response to the main controller 33. At this point,the front end 32 puts the secure element 34-3 into the deactivatedstate. With this arrangement, the power consumption can be reduced. Instep S10, the main controller 33 receives the polling response. Withthis arrangement, the main controller 33 can know the identificationinformation of the secure element 34-3 connected to the terminal ST3(and also connected to the terminal DATA3 of the front end 32).

In step S11, the main controller 33 outputs a store polling data requestto the front end 32. As shown in FIG. 6A, the store polling data requeststates the number of pieces of identification information and theidentification information. In step S39, the front end 32 receives thestore polling data request and then stores the identificationinformation, stated thereby, in the memory 41. Consequently, the storagestate of the memory 41 becomes as shown in FIG. 10.

In step S40, the front end 32 sends a store polling data response. Instep S12, the main controller 33 receives the store polling dataresponse to make it possible to know that the storage state of thememory 41 is updated.

For example, in a case in which the storage state of the memory 41 is asshown in FIG. 10, (i.e., a case in which the secure elements 34-2 and34-3 are connected), when the secure element 34-1 is newly connected,processing as shown in FIG. 11 is executed.

In step S101, the main controller 33 checks the connections of thesecure elements 34. Specifically, the main controller 33 determineswhether or not the secure elements 34-1 to 34-3 are connected to theterminals ST1 to ST3.

In step S102, the main controller 33 detects a difference between thedetermined connection state and the state stored in the front end 32. Inthis case, the storage state of the memory 41 is as shown in FIG. 10. Asa result, it is determined that the new secure element 34 is connectedto the terminal ST1.

In step S103, the main controller 33 output an SE ON request (SE1) tothe front end 32.

In step S121, the front end 32 receives the SE ON request (SE1) and thenswitches the communication line to the line for the secure element 34-1.Thus, only the communication line 52-1 of the lines 52-1 to 52-3 isenabled. Specifically, only the secure element 34-1 is put into theactivated state and the other secure elements 34-2 and 34-3 are left inthe deactivated states. As a result, unwanted power consumption isreduced. In step S122, the front end 32 sends an SE ON response to themain controller 33.

In step S104, the main controller 33 receives the SE ON response tothereby make it possible to know that the communication line isswitched. In step S105, the main controller 33 outputs a pollingrequest. In step S123, the front end 32 receives the polling request viathe terminal DATAB and then transfers the polling request to the secureelement 34-1 through the communication line 52-1 set in step S121.

In step S141, the secure element 34-1 receives the polling request andthen reads the unit identification number ID1 and the application numberSC1, stored in the memory 43-1, as the identification information. Instep S142, the secure element 34-1 sends a polling response.

In step S124, the front end 32 receives the polling response and thentransfers the polling response to the main controller 33. At this point,the front end 32 puts the secure element 34-1 into the deactivatedstate. With this arrangement, the power consumption can be reduced. Instep S106, the main controller 33 receives the polling response. As aresult, the main controller 33 can know the identification informationof the secure element 34-1 connected to the terminal ST1 (and alsoconnected to the terminal DATA1 of the front end 32).

In step S107, the main controller 33 outputs a store polling datarequest to the front end 32. The store polling data request states thenumber of pieces of identification information and the identificationinformation. In step S125, the front end 32 receives the store pollingdata request and then stores the identification information, statedthereby, in the memory 41. Consequently, the storage state of the memory41 becomes as shown in FIG. 9.

In step S126, the front end 32 sends a store polling data response. Instep S108, the main controller 33 receives the store polling dataresponse to make it possible to check that the storage state of thememory 41 is updated.

For example, in a case in which the storage state of the memory 41 is asshown in FIG. 9, (i.e., a case in which the secure elements 34-1, 34-2,and 34-3 are connected), when the secure element 34-2 is detached,processing as shown in FIG. 12 is executed.

That is, in step S201, the main controller 33 checks the connections ofthe secure elements 34. Specifically, the main controller 33 determineswhether or not the secure elements 34-1 to 34-3 are connected to theterminals ST1 to ST3.

In step S202, the main controller 33 detects a difference between thedetermined connection state and the state stored in the front end 32. Inthis case, the storage state of the memory 41 is as shown in FIG. 9. Asa result, it is determined that the secure element 34-2 connected to theterminal ST2 has been detached.

In step S203, the main controller 33 outputs a store polling datarequest to the front end 32. The store polling data request states thenumber of pieces of identification information and the identificationinformation. In step S211, the front end 32 receives the store pollingdata request and then stores the identification, stated thereby, in thememory 41. Consequently, the storage state of the memory 41 becomes astate in which only the identification information corresponding toterminal number 2 is not stored, as shown in FIG. 13.

In step S212 shown in FIG. 12, the front end 32 sends a store pollingdata response. In step S204, the main controller 33 receives the storepolling data response to make it possible to check that the storagestate of the memory 41 is updated.

Processing for a case in which the external contactless communicationdevice 12 accesses the contactless communication device 11 will now bedescribed with reference to FIG. 14.

In step S261, the obtaining section 91 of the external contactlesscommunication device 12 outputs a get polling data request. In stepS281, the front end 32 receives the get polling data request and thenreads the identification information stored in the memory 41. Asdescribed above with reference to FIG. 8, the memory 41 pre-stores theidentification information of the secure elements 34 held by thecontactless communication device 11. In step S282, the front end 32sends a get polling data response. The get polling data response statesthe read identification information.

The front end 32 does not transfer the get polling data request to anysecure element 34 and thus the secure element 34 does not respond to theget polling data request. That is, the front end 32, instead of thesecure element 34, responds to the polling data request for collectingthe identification information. This arrangement prevents occurrence ofcollision due to simultaneous outputting of responses from the front end32 and the secure element 34. This makes it possible to quickly andreliably supply the identification information to the externalcontactless communication device 12.

Each secure element 34 is in the deactivated state, until it receives anSE ON request from the front end 32. Thus, for example, compared to acase in which all secure elements 34 are left in the activated states inpreparation for a request issued from the external contactlesscommunication device 12, it is possible to reduce the power consumption.

In step S262, the obtaining section 91 of the external contactlesscommunication device 12 receives the get polling data response. In stepS263, the selecting section 92 of the external contactless communicationdevice 12 selects the identification information of the secure element34 to be processed. For example, when the secure element 34 to beprocessed is assumed to be the secure element 34-3, the selectingsection 92 selects the identification information of the secure element34-3.

In step S264, the setting section 93 of the external contactlesscommunication device 12 outputs an SE ON request (SE3). In step S283,the front end 32 receives the SE ON request (SE3) and then switches thecommunication line to the line for the secure element 34-3. That is, ofthe lines 52-1 to 52-3, only the communication line 52-3 connected tothe terminal DATA3 is enabled. Specifically, only the secure element34-3 is put into the activated state and the other secure elements 34-1and 34-2 are left in the deactivated states.

In step S284, the front end 32 sends an SE ON response. In step S265,the setting section 93 of the external contactless communication device12 receives the SE ON response. As a result, the external contactlesscommunication device 12 can check that the communication line isswitched to the line for the secure element 34-3.

In step S266, the executing section 94 of the external contactlesscommunication device 12 outputs a command for executing predeterminedprocessing to the secure element 34-3. In the example shown in FIG. 14,in order to read data from the secure element 34-3, the executingsection 94 specifies the secure element 34-3 and outputs a read request(SE3). In step S285, the front end 32 receives the read request (SE3)and then transfers the read request to the secure element 34-3.

Since the command is addressed to the secure element 34-3, the secureelement 34-3 receives the command in step S291 and reads the specifieddata. In step S292, the secure element 34-3 sends a read response andoutputs the read data to the external contactless communication device12. In step S286, the front end 32 receives the read response and thentransfers the read response to the external contactless communicationdevice 12.

In step S267, the executing section 94 of the external contactlesscommunication device 12 receives the read response. As described above,the external contactless communication device 12 allows a predeterminedone of the secure elements 34, held by the contactless communicationdevice 11, to execute predetermined processing.

Although the above description has been given of a case in which theexternal contactless communication device 12 uses the get polling datarequest to collect the identification information, the polling requestcan also be used to collect the identification information. In such acase, the identification-information collection processing of the frontend 32 is performed as shown in FIG. 15.

The processing shown in FIG. 15 is basically the same as the processingshown in FIG. 8. That is, processing in steps S321 to S332 (shown inFIG. 15) at the main controller 33, steps S351 to S360 at the front end32, steps S381 and S382 at the secure element 34-2, and steps S401 andS402 at the secure element 34-3 is analogous to the processing in stepsS1 to S12 (shown in FIG. 8) at the main controller 33, steps S31 to S40at the front end 32, steps S51 and S52 at the secure element 34-2, andsteps S71 and S72 at the secure element 34-3. The processing shown inFIG. 15 is different from the processing shown in FIG. 8 in that,subsequent to step S332, the main controller 33 executes processing insteps S333 and S334 and the front end 32 executers processing in stepsS361 and S362 correspondingly.

That is, in step S332, the main controller 33 receives a store pollingdata response from the front end 32 and checks that the identificationinformation is stored in the memory 41 in the front end 32. Thereafter,in step S333, the main controller 33 outputs an SE ON (OFF) request. Instep S361, the front end 32 receives the SE ON (OFF) request and thenperforms setting so as to prevent the secure elements 34 from respondingto a polling request. Specifically, the front end 32 performs setting sothat a polling request is not transferred to the secure elements 34.

In step S362, the front end 32 outputs an SE ON (OFF) response. In stepS334, the main controller 33 receives the SE ON (OFF) response.Consequently, the main controller 33 confirms that a polling request isnot transferred to the secure element 34.

When the identification-information collection processing of the frontend 32 is performed using the polling request, as described above,access processing performed by the external contactless communicationdevice 12 becomes as shown in FIG. 16.

That is, in step S431, the obtaining section 91 of the externalcontactless communication device 12 outputs a polling request. In thiscase, the SC in the polling request shown in FIG. 5A states FFFFh andthe TSN states the maximum value (15 in this example) of the slotnumber. In step S451, the front end 32 receives the polling request andthen sends a poling response (shown in FIG. 5B) at timing indicated bythe time slot number within the maximum value.

The front end 32 associates the time slot numbers to which the pollingresponse is to be sent with the terminal numbers of the front end 32.Specifically, as shown in FIG. 17, time slot numbers 0, 1, 2, and 3 areassociated with the terminals DATAB, DATA1, DATA2, and DATA3,respectively. In the example shown in FIG. 17, the time slot number ofthe main controller 33 having the unit identification number IDB and theapplication number SCB is 0, the time slot number of the secure element34-2 having the unit identification number ID2 and the applicationnumber SC2 is 2, and the time slot number of the secure element 34-3having the unit identification number ID3 and the application number SC2is 3.

Thus, in step S452, at the time slot with number 0, the front end 32outputs a polling response stating the identification number IDB and theapplication number SCB to the external contactless communication device12. In step S453, at the time slot with number 2, the front end 32outputs a polling response stating the identification number ID2 and theapplication number SC2 to the external contactless communication device12. In step S454, at the time slot with number 3, the front end 32outputs a polling response stating the identification number ID3 and theapplication number SC2 to the external contactless communication device12. That is, identification information as shown in FIG. 18 istransmitted to the external contactless communication device 12.

However, for example, when the TSN stated in the polling request is 1,only the times slots with numbers 0 and 1 can be used and the time slotswith numbers 2 and 3 cannot be used. As a result, as shown in FIG. 19,at the time slot with number 0, only a polling response stating theidentification number IDB and the application number SCB is output.Thus, when the identification information is to be collected, it ispreferable that the maximum value of the time slot number be set in theTSN.

When the SC in the polling request specifies a predetermined applicationnumber other than FFFFh, only identification information correspondingto the application number is output. For example, in a case in which theidentification information shown in FIG. 17 is stored in the memory 41,when SC2 is specified as the SC, the identification number ID2 and theapplication number SC2 are output as a polling response at timingindicated by the time slot with number 2 and the identification numberID3 and the application number SC2 are output as a polling response attiming indicated by the time slot with number 3, as shown in FIG. 20.

For example, in a state in which the identification information shown inFIG. 13 is stored in the memory 41, when SC1 is specified as the SC, apolling response (as shown in FIG. 21) with identification number ID1 isoutput at timing indicated by the time slot with number 1.

In steps S432 to S434, the obtaining section 91 of the externalcontactless communication device 12 receives the polling responsesthrough the time slots with numbers 0, 2, and 3 shown in FIG. 17. Thenumbers of the time slots are preset so that they do not overlap eachother in association with the terminals DATAB, DATA1, DATA2, and DATA3of the front end 32, and thus no collision occurs.

In this case, as described above, since the secure elements 34 are setin step S361 in FIG. 15 so as not to respond to any polling request, thepolling request is executed by only the front end 32 and is not executedby the secure elements 34. That is, the front end 32, instead of thesecure elements 34, responds to the polling request for collecting theidentification information, and thus, the polling response generated bythe front end 32 does not collide with the polling responses generatedby the secure elements 34.

Thus, the external contactless communication device 12 can quickly andreliably obtain the identification information.

In step S435, the selecting section 92 of the external contactlesscommunication device 12 selects the identification information of thesecure element 34 to be processed. For example, when the secure element34 to be processed is assumed to be the secure element 34-3, theselecting section 92 selects the identification information of thesecure element 34-3.

In step S436, the setting section 93 of the external contactlesscommunication device 12 outputs an SE ON request (SE3). In step S455,the front end 32 receives the SE ON request (SE3) and then switches thecommunication line to the line for the secure element 34-3. That is, ofthe lines 52-1 to 52-3, only the communication line 52-3 connected tothe terminal DATA3 is enabled. More specifically, only the secureelement 34-3 is put into the activated state and the other secureelements 34-1 and 34-2 are left in the deactivated states.

In step S456, the front end 32 sends an SE ON response. In step S437,the setting section 93 of the external contactless communication device12 receives the SE ON response. Consequently, the external contactlesscommunication device 12 can check that the communication line isswitched to the line for the secure element 34-3.

In step S438, the executing section 94 of the external contactlesscommunication device 12 outputs a command for executing predeterminedprocessing to the secure element 34-3. In the example shown in FIG. 16,in order to read data from the secure element 34-3, the executingsection 94 specifies the secure element 34-3 and outputs a read request(SE3). In step S457, the front end 32 receives the read request (SE3)and then transfers the read request to the secure element 34-3.

Since the command is addressed to the secure element 34-3, the secureelement 34-3 receives the command in step S471 and reads specified data.In step S472, the secure element 34-3 sends a read response and outputsthe read data to the external contactless communication device 12. Instep S458, the front end 32 receives the read response and thentransfers the read response to the external contactless communicationdevice 12.

In step S439, the executing section 94 of the external contactlesscommunication device 12 receives the read response. With thisarrangement, the external contactless communication device 12 allows apredetermined one of the secure elements 34, held by the contactlesscommunication device 11, to execute predetermined processing.

In the embodiment shown in FIG. 2, in order to detect connections, thesecure elements 34 are individually connected to the main controller 33through the lines 61-1 to 61-3. As shown in FIG. 22, however, the maincontroller 33 and the secure elements 34 may be connected in a loopedmanner. That is, in the example shown in FIG. 22, a terminal STO of themain controller 33 is connected to a terminal ST1 of thesubsequent-stage secure element 34-1 through a line 131, and a terminalSTO of the secure element 34-1 is connected to a terminal ST1 of thesubsequent-stage secure element 34-2 through a line 132. Similarly, aterminal STO of the secure element 34-2 is connected to a terminal ST1of the subsequent-stage secure element 34-3 through a line 133, and aterminal STO of the secure element 34-3 is connected to a terminal ST1of the subsequent-stage main controller 33 through a line 134.

When the main controller 33 outputs a command shown in FIG. 23A from theterminal STO to the subsequent-stage secure element 34-1 through theline 131, the secure element 34-1 receives the command via the terminalST1. The secure element 34-1 then attaches its identificationinformation to the received command, as shown in FIG. 23B, and outputsthe resulting command to the subsequent-stage secure element 34-2 viathe terminal STO.

Similarly, the secure element 34-2 receives the command via the terminalST1, attaches the identification information of the secure element 34-2to the received command, as shown in FIG. 23C, and outputs the resultingcommand to the subsequent-stage secure element 34-3 via the terminalSTO. The secure element 34-3 receives the command via the terminal ST1,attaches the identification information of the secure element 34-3 tothe received command, as shown in FIG. 23D, and outputs the resultingcommand to the subsequent-stage main controller 33 via the terminal STO.

Thus, the main controller 33 can detect the identification informationof all of the connected secure elements 34 from the signals input viathe terminal ST1.

It is now assumed that the secure elements 34-2 and 34-3 are connectedand the secure element 34-1 is not connected. In this case, theprocessing for storing the identification information in the memory 41in the embodiment shown in FIG. 22 becomes as shown in FIG. 24.

That is, in step S501, the main controller 33 outputs aconnection-checking command via the terminal STO. This command is inputto the secure element 34-2 via the terminal ST1. In step S541, thesecure element 34-2 receives the connection-checking command. The secureelement 34-2 then attaches its identification information, stored in thememory 43-2, to the connection-checking command and transfers theresulting connection-checking command.

This connection-checking command is then input to the secure element34-3 via the terminal ST1. In step S561, the secure element 34-3receives the connection-checking command. The secure element 34-3 thenattaches its identification information, stored in the memory 43-3, tothe connection-checking command and transfers the resultingconnection-checking command.

This connection-checking command is then input to the main controller 33via the terminal ST1. In step S502, the main controller 33 detects theidentification information attached to the input connection-checkingcommand.

As a result of the above-described processing, the main controller 33can know that the secure elements 34-2 and 34-3 are currently connectedand can also know the identification information thereof. Thus, the maincontroller 33 detects a difference between the determined connectionstate and the state stored in the front end 32.

In step S503, the main controller 33 outputs a store polling datarequest to the front end 32. As shown in FIG. 6A, the store polling datarequest states the number of pieces of identification information andthe identification information. In step S521, the front end 32 receivesthe store polling data request and then stores the identificationinformation, stated thereby, in the memory 41.

In step S522, the front end 32 sends a store polling data response. Instep S504, the main controller 33 receives the store polling dataresponse to make it possible to check that the storage state of thememory 41 is updated.

When the identification information is collected in the memory 41 in thefront end 32, as describe above, subsequent access processing performedby the external contactless communication device 12 becomes similar tothat in the case shown in FIG. 14.

When the identification information is stored in the memory 41 and thenprocessing that is similar to steps S333, S334, S361, and S362 shown inFIG. 15 is performed, the subsequent access processing performed by theexternal contactless communication device 12 becomes similar to that inthe case shown in FIG. 16.

FIG. 25 shows an embodiment in which the front end 32, the maincontroller 33, and the secure elements 34-1 to 34-3 according to theembodiment shown in FIG. 22 are connected through a bus 111 instead ofthe lines 51 and 52-1 to 52-3. Other configurations are analogous tothose in the case shown in FIG. 22.

In this embodiment, the processing for storing the identificationinformation in the memory 41 is executed in the same manner describedabove with reference to FIG. 24.

Access processing performed by the external contactless communicationdevice 12 in the embodiment shown in FIG. 25 will now be described withreference to FIG. 26.

In step S611, the obtaining section 91 of the external contactlesscommunication device 12 outputs a get polling data request. In stepS631, the front end 32 receives the get polling data request and thenreads the identification information stored in the memory 41. Asdescribed above, the memory 41 stores the pre-collected identificationinformation of the secure elements 34 held by the contactlesscommunication device 11. In step S632, the front end 32 sends a getpolling data response. This get polling data response states the readidentification information.

Since the front end 32 does not transfer the get polling data request toany secure element 34, the secure element 34 does not respond to the getpolling data request. This arrangement prevents occurrence of collisiondue to simultaneous outputting of responses from the front end 32 andthe secure element 34.

In step S612, the obtaining section 91 of the external contactlesscommunication device 12 receives the get polling data response. In stepS613, the selecting section 92 of the external contactless communicationdevice 12 selects the identification information of the secure element34 to be processed. For example, when the secure element 34 to beprocessed is assumed to be the secure element 34-3, the selectingsection 92 selects the identification information of the secure element34-3.

In step S614, the executing section 94 of the external contactlesscommunication device 12 outputs a command for executing predeterminedprocessing to the secure element 34-3. In the example shown in FIG. 26,in order to read data from the secure element 34-3, the executingsection 94 specifies the secure element 34-3 and outputs a read request(SE3). In step S633, the front end 32 receives the read request (SE3)and then transfers the read request to the secure element 34-3.

Since the command is addressed to the secure element 34-3, the secureelement 34-3 receives the command in step S651 and reads specified data.In step S652, the secure element 34-3 sends a read response and outputsthe read data to the external contactless communication device 12. Instep S634, the front end 32 receives the read response and thentransfers the read response to the external contactless communicationdevice 12.

In step S615, the executing section 94 of the external contactlesscommunication device 12 receives the read response. With thisarrangement, the external contactless communication device 12 allows apredetermined one of the secure elements 34, held by the contactlesscommunication device 11, to execute predetermined processing.

FIG. 27 shows an embodiment in which the front end 32, the maincontroller 33, and the secure elements 34-1 to 34-3 according to theembodiment shown in FIG. 2 are connected through a bus 111 instead ofthe lines 51 and 52-1 to 52-3. Other configurations are analogous tothose in the case shown in FIG. 2.

The processing for collecting the identification information and storingthe identification information in the memory 41 in the front end 32 inthe embodiment shown in FIG. 27 will now be described with reference toFIG. 28.

In step S731, the main controller 33 outputs a polling request. Sincethe front end 32 is disabled to make a response even when it receivesthe polling request, and thus does not output a polling response.

In step S791 and S811, the secure elements 34-2 and 34-3 receive thepolling request, and then send polling responses at timings indicated bynumbers within the time slot numbers stated in the polling request. Forexample, when the secure element 34-2 selects a smaller number and thesecure element 34-3 selects a larger number, the secure element 34-2sends a polling response earlier than the secure element 34-3.

In step S792, the secure element 34-2 reads the unit identificationnumber ID2 and the application number SC2, stored in the memory 43-2, asthe identification information, and outputs the polling response statingthe identification information. In step S732, the main controller 33receives the polling response.

In step S812, the secure element 34-3 reads the unit identificationnumber ID3 and the application number SC3, stored in the memory 43-3, asthe identification information, and outputs a polling response statingthe identification information. In step S733, the main controller 33receives the polling response.

In the manner described above, the main controller 33 obtains theidentification information of all of the secure elements 34.

When the secure elements 34-2 and 34-3 select the same time slot number,collision occurs. In this case, the main controller 33 repeatedlyoutputs a polling request until it can receive polling responses fromall of the secure elements 34.

In step S734, the main controller 33 outputs a store polling datarequest to the front end 32. As described above, the store polling datarequest states the number of pieces of identification information andthe identification information. In step S761, the front end 32 receivesthe store polling data request and then stores the identificationinformation, stated thereby, in the memory 41.

In step S762, the front end 32 sends a store polling data response. Instep S735, the main controller 33 receives the store polling dataresponse to make it possible to check that the storage state of thememory 41 is updated.

After receiving the store polling data response from the front end 32and checking that the identification information is stored in the memory41 in the front end 32, the main controller 33 outputs an SE ON (OFF)request in step S736. In step S763, the front end 32 receives the SE ON(OFF) request and then performs setting so as to prevent the secureelements 34 from responding to a polling request sent from the externalcontactless communication device 12. Specifically, the front end 32performs setting so that a polling request sent from the externalcontactless communication device 12 is not transferred to the secureelements 34.

This arrangement has an advantage that is similar to that in the case instep S361 shown in FIG. 15. That is, in step S831 described below andshown in FIG. 29, the external contactless communication device 12outputs a polling request in which FFFFh is set in the SC, and both ofthe front end 32 and the secure element 34 send polling requests,thereby preventing the occurrence of collision.

In step S764, the front end 32 outputs an SE ON (OFF) response. In stepS737, the main controller 33 receives the SE ON (OFF) response. As aresult, the main controller 33 confirms that the polling request fromthe external contactless communication device 12 is not transferred tothe secure element 34.

When the identification-information collection processing of the frontend 32 is performed using the polling request, as described above,access processing performed by the external contactless communicationdevice 12 becomes as shown in FIG. 29.

In FIG. 29, processing corresponding to steps S436, S437, S455, and S456shown in FIG. 16 is eliminated. Other processing in FIG. 29 is analogousto that in the case shown in FIG. 16. That is, the processing in stepsS431 to S435, S438, and S439 (shown in FIG. 16) at the externalcontactless communication device 12, steps S451 to S454, S457, and S458at the front end 32, and steps S471 and S472 at the secure element 34-3is analogous to processing in steps S831 to S837 (shown in FIG. 29) atthe external contactless communication device 12, steps S851 to S856 atthe front end 32, and steps S871 and S872 at the secure element 34-3.

In the embodiment shown in FIG. 27, since the front end 32 and thesecure elements 34 are connected through the bus 111, the communicationline is not switched to an individual line. Thus, processingcorresponding to steps S436, S437, S455, and S456 shown in FIG. 16 iseliminated.

In an example shown in FIG. 28, collision can occur during collection ofthe identification information to be stored in the memory 41. However,when the external contactless communication device 12 collects theidentification information, no collision occurs. This makes it possibleto quickly and reliably supply the identification information to theexternal contactless communication device 12.

Although a case in which the present application is applied to theinformation processing system 1 including the contactless communicationdevice 11 and the external contactless communication device 12 has beendescribed above by way of example, the present application is alsoapplicable to information processing apparatuses other than thecontactless communication device 11 and the external contactlesscommunication device 12 in an embodiment. The present application isalso applicable to contactless communication that does not comply withthe NFC standard in an embodiment.

The above-described series of processing can be executed by hardware orsoftware. When the series of processing is executed by software, aprogram included in the software is installed from a program storagemedium to, for example, a computer incorporated in dedicated hardware orto a general-purpose personal computer that is capable of executingvarious functions through installation of programs.

Examples of the program storage medium that stores the program thatbecomes executable by a computer through installation thereto include aremovable medium (which is a package medium) and a ROM and a hard diskthat temporarily or permanently store the program. Examples of theremovable medium include a magnetic disk (including a flexible disk), anoptical disk (including a CD-ROM [compact disk-read only memory], a DVD[digital versatile disc], and a magneto-optical disk), and asemiconductor memory. The program is stored on the storage mediumthrough a wired or wireless communication media (such as a localnetwork, the Internet, and/or digital satellite broadcast) via areporting section (serving as an interface, such as a router or modem),as appropriate.

Herein, the steps for describing the program not only include processingthat is time-sequentially performed according to the described sequence,but also include processing that is concurrently or individuallyexecuted without being necessarily time-sequentially processed.

It should be understood that various changes and modifications to thepresently preferred embodiments described herein will be apparent tothose skilled in the art. Such changes and modifications can be madewithout departing from the spirit and scope and without diminishing itsintended advantages. It is therefore intended that such changes andmodifications be covered by the appended claims.

The application is claimed as follows:
 1. An information processingapparatus comprising: processing sections that each include a firstterminal and a second terminal, that have respective identificationinformation, and that perform processing corresponding to a request fromanother information processing apparatus; a reporting section thatincludes a first memory that stores the respective identificationinformation of the processing sections and, instead of the processingsections, that reports the identification information to the anotherinformation processing apparatus in response to a request for reportingthe identification information, the request being issued from theanother information processing apparatus; and a controlling section thatincludes a second memory and is separate from the reporting section andthe processing sections, the second memory being different from thefirst memory; wherein the reporting section is connected to each of thecontrolling section and the first terminal of each of the respectiveprocessing sections through a plurality of individual wiredcommunication lines, wherein each one of the plurality of individualwired communication lines connected to the each of the controllingsection and the processing sections is separate from each otherindividual wired communication line of the plurality of individual wiredcommunication lines, and wherein the controlling section collects theidentification information of the processing sections through the secondterminal of each of the respective processing sections, stores theidentification information in the second memory, and causes thereporting section to store the collected identification information inthe first memory, which is different from the second memory.
 2. Theinformation processing apparatus according to claim 1, wherein theinformation processing apparatus and the another information processingapparatus perform contactless communication with each other, and thereporting section prevents the processing sections from responding tothe request for reporting the identification information.
 3. Theinformation processing apparatus according to claim 2, wherein thereporting section mediates communication between the another informationprocessing apparatus and the processing sections.
 4. The informationprocessing apparatus according to claim 3, wherein the reporting sectionselectively connects to one of the processing sections through one ofthe individual wired communication lines.
 5. The information processingapparatus according to claim 4, wherein the controlling section collectsthe identification information of the processing sections when power isturned on and stores the identification information in the secondmemory, and the processing sections are attached or detached and thatcauses the reporting section to store the collected identificationinformation in the first memory, which is different from the secondmemory.
 6. The information processing apparatus according to claim 5,wherein the controlling section obtains the identification informationby individually specifying one of the individual wired communicationlines for the processing sections and causes the reporting section tostore the obtained identification information.
 7. The informationprocessing apparatus according to claim 6, wherein the contactlesscommunication is based on a near field communication standard.
 8. Theinformation processing apparatus according to claim 3, wherein thereporting section and the processing sections store, as theidentification information, numbers for identifying the processingsections and numbers of applications held by the processing sections. 9.The information processing apparatus according to claim 5, wherein thecontrolling section is individually connected to the processing sectionsin order to check connections with the processing sections.
 10. Theinformation processing apparatus according to claim 5, wherein thecontrolling section is connected to the processing sections in a loopedmanner in order to check connections with the processing sections; andeach processing section attaches the identification information of theprocessing section to a command sent from a previous stage and outputs aresulting command.
 11. The information processing apparatus according toclaim 10, wherein the controlling section outputs the command to theprocessing sections through the looped connection, causes the processingsections to attach the identification information of the processingsections to the command and to output the resulting command, obtains theoutput command, and causes the reporting section to store the obtainedidentification information in the first memory, which is different fromthe second memory.
 12. An information processing method for aninformation processing apparatus, the method comprising: causing areporting section that includes a first memory to obtain identificationinformation of processing sections that each include a first terminaland a second terminal and to store the identification information,wherein the reporting section is connected to each of a controllingsection, which includes a second memory, and the first terminal of eachof the respective processing sections through a plurality of individualwired communication lines, the second memory being different from thefirst memory, wherein each one of the plurality of individual wiredcommunication lines connected to the each of the controlling section andthe processing sections is separate from each other individual wiredcommunication line of the plurality of individual wired communicationlines, wherein the controlling section is separate from the reportingsection and the processing sections, and wherein the controlling sectioncollects the identification information of the processing sectionsthrough the second terminal of each of the respective processingsections, stores the identification information in the second memory,and causes the reporting section to store the collected identificationinformation in the first memory, which is different from the secondmemory; causing the reporting section, instead of the processingsections, to report the identification information to anotherinformation processing apparatus in response to a request for reportingthe identification information, the request being issued from theanother information processing apparatus; and causing, of the processingsections, the processing section specified by the identificationinformation reported to the another information processing apparatus toperform processing corresponding to the request issued from the anotherinformation processing apparatus.
 13. A non-transitory computer readablestorage medium storing a computer program for causing a computer toexecute processing comprising: causing a reporting section that includesa first memory to obtain identification information of processingsections that each include a first terminal and a second terminal and tostore the identification information, wherein the reporting section isconnected to each of a controlling section, which includes a secondmemory, and the first terminal of each of the respective processingsections through a plurality of individual wired communication lines,the second memory being different from the first memory, wherein eachone of the plurality of individual wired communication lines connectedto the each of the controlling section and the processing sections isseparate from each other individual wired communication line of theplurality of individual wired communication lines, wherein thecontrolling section is separate from the reporting section and theprocessing sections, and wherein the controlling section collects theidentification information through the second terminal of each of therespective processing sections, stores the identification information inthe second memory, of the processing sections and causes the reportingsection to store the collected identification information in the firstmemory, which is different from the second memory; causing the reportingsection, instead of the processing sections, to report theidentification information to another information processing apparatusin response to a request for reporting the identification information,the request being issued from the another information processingapparatus; and causing, of the processing sections, the processingsection specified by the identification information reported to theanother information processing apparatus to perform processingcorresponding to a request issued from the another informationprocessing apparatus.
 14. An information processing apparatuscomprising: an obtaining section that obtains identification informationof processing sections that each include a first terminal and a secondterminal from a reporting section instead of the processing sections,the processing sections, the reporting section, and a controllingsection being included in another information processing apparatus, theprocessing sections holding the identification information, and thereporting section obtaining the identification information from theprocessing sections and storing the identification information; aselecting section that selects, from the obtained identificationinformation of the processing sections, the identification informationof the processing section to be processed; and an executing section thatcauses the processing section corresponding to the selectedidentification information to execute predetermined processing, whereinthe reporting section that includes a first memory is connected to thecontrolling section and the first terminal of each of the respectiveprocessing sections through a plurality of individual wiredcommunication lines, wherein each one of the plurality of individualwired communication lines connected to the each of the controllingsection, which includes a second memory, and the processing sections isseparate from each other individual wired communication line of theplurality of individual wired communication lines, the second memorybeing different from the first memory, wherein the controlling sectionis separate from the reporting section and the processing sections, andwherein the controlling section collects the identification informationof the processing sections through the second terminal of each of therespective processing sections, stores the identification information inthe second memory, and causes the reporting section to store thecollected identification information in the first memory, which isdifferent from the second memory.
 15. The information processingapparatus according to claim 14, further comprising a setting sectionthat sets, of individual communication lines for the processing sectionsconnected to the reporting section, the individual wired communicationline for the processing section corresponding to the selectedidentification information.
 16. An information processing methodcomprising: causing an obtaining section to obtain identificationinformation of processing sections that each include a first terminaland a second terminal from a reporting section that includes a firstmemory instead of the processing sections, the processing sections, thereporting section, and a controlling section, which includes a secondmemory, being included in another information processing apparatus, theprocessing sections holding the identification information, thereporting section obtaining the identification information from theprocessing sections and storing the identification information, and thesecond memory being different from the first memory, wherein thereporting section is connected to each of the controlling section andthe first terminal of each of the respective processing sections througha plurality of individual wired communication lines, wherein each one ofthe plurality of individual wired communication lines connected to theeach of the controlling section and the processing sections is separatefrom each other individual wired communication line of the plurality ofindividual wired communication lines, wherein the controlling section isseparate from the reporting section and the processing sections, andwherein the controlling section collects the identification informationof the processing sections through the second terminal of each of therespective processing sections, stores the identification information inthe second memory, and causes the reporting section to store thecollected identification information in the first memory, which isdifferent from the second memory; causing a selecting section to select,from the obtained identification information of the processing sections,the identification information of the processing section to beprocessed; and causing an executing section to cause the processingsection corresponding to the selected identification information toexecute predetermined processing.
 17. A non-transitory computer readablestorage medium storing a computer program for causing a computer toexecute processing comprising: obtaining identification information ofprocessing sections that each include a first terminal and a secondterminal from a reporting section that includes a first memory insteadof the processing sections, the processing sections, the reportingsection, and a controlling section, which includes a second memory,being included in another information processing apparatus, theprocessing sections holding the identification information, thereporting section obtaining the identification information from theprocessing sections and storing the identification information, and thesecond memory being different from the first memory, wherein thereporting section is connected to each of the controlling section andthe first terminal of each of the respective processing sections througha plurality of individual wired communication lines, wherein each one ofthe plurality of individual wired communication lines connected to theeach of the controlling section and the processing sections is separatefrom each other individual wired communication line of the plurality ofindividual wired communication lines, wherein the controlling section isseparate from the reporting section and the processing sections, andwherein the controlling section collects the identification informationof the processing sections through the second terminal of each of therespective processing sections, stores the identification information inthe second memory, and causes the reporting section to store thecollected identification information in the first memory, which isdifferent from the second memory; selecting, from the obtainedidentification information of the processing sections, theidentification information of the processing section to be processed;and causing the processing section corresponding to the selectedidentification information to execute predetermined processing.
 18. Aninformation processing system comprising: a first information processingapparatus that has a reporting section that includes a first memory, acontrolling section that includes a second memory, and processingsections that each include a first terminal and a second terminal, thereporting section obtaining identification information of the processingsections and storing the obtained identification information, and thesecond memory being different from the first memory; and a secondinformation processing apparatus that issues, to the first informationprocessing apparatus, a request for reporting the identificationinformation; wherein the reporting section in the first informationprocessing apparatus, instead of the processing sections, reports thestored identification information to the second information processingapparatus in response to a request issued from the second informationprocessing apparatus, wherein the reporting section is connected to eachof the controlling section and the first terminal of each of therespective processing sections through a plurality of individual wiredcommunication lines, wherein each one of the plurality of individualwired communication lines connected to the each of the controllingsection and the processing sections is separate from each otherindividual wired communication line of the plurality of individual wiredcommunication lines, wherein the controlling section is separate fromthe reporting section and the processing sections, and wherein thecontrolling section collects the identification information of theprocessing sections through the second terminal of each of therespective processing sections, stores the identification information inthe second memory, and causes the reporting section to store thecollected identification information in the first memory, which isdifferent from the second memory, the second information processingapparatus specifies the processing section by using the identificationinformation selected from the reported identification information andissues a request for predetermined processing to the specifiedprocessing section, and of the processing sections in the firstinformation processing apparatus, the processing section specified bythe second information processing apparatus performs the predeterminedprocessing.
 19. An information processing method comprising: causing areporting section that includes a first memory in a first informationprocessing apparatus to obtain identification information of processingsections that each include a first terminal and a second terminal in thefirst information processing apparatus and to store the obtainedidentification information; and causing a second information processingapparatus to issue, to the first information processing apparatus, arequest for reporting the identification information; wherein thereporting section in the first information processing apparatus, insteadof the processing sections, reports the stored identificationinformation to the second information processing apparatus in responseto a request issued from the second information processing apparatus,and wherein the reporting section is connected to each of a controllingsection, which includes a second memory, and the first terminal of eachof the respective processing sections through a plurality of individualwired communication lines, the second memory being different from thefirst memory, wherein each one of the plurality of individual wiredcommunication lines connected to the each of the controlling section andthe processing sections is separate from each other individual wiredcommunication line of the plurality of individual wired communicationlines, wherein the controlling section is separate from the reportingsection and the processing sections, and wherein the controlling sectioncollects the identification information of the processing sectionsthrough the second terminal of each of the respective processingsections, stores the identification information in the second memory,and causes the reporting section to store the collected identificationinformation in the first memory, which is different from the secondmemory, the second information processing apparatus specifies theprocessing section by using the identification information selected fromthe reported identification information and issues a request forpredetermined processing to the specified processing section, and of theprocessing sections in the first information processing apparatus, theprocessing section specified by the second information processingapparatus performs the predetermined processing.
 20. The informationprocessing apparatus according to claim 1, wherein each of theindividual wired communication lines are connected to a terminal at thereporting section and a terminal at one of the processing sections. 21.A front end apparatus comprising: a first memory that stores respectiveidentification information of a main controller, which includes a secondmemory, and a plurality of secure processing sections that each includea first terminal and a second terminal, the second memory beingdifferent from the first memory; and an interface including a pluralityof terminals, wherein each of the main controller and the plurality ofsecure processing sections are individually connected to the terminalsvia a plurality of individual wired communication lines, wherein eachone of the plurality of individual wired communication lines connectedto the each of the main controller and the first terminal of each of therespective plurality of secure processing sections is separate from eachother individual wired communication line of the plurality of individualwired communication lines, and wherein the main controller collects theidentification information of the plurality of secure processingsections through the second terminal of each of the respectiveprocessing sections, stores the identification information in the secondmemory, and causes the first memory, which is different from the secondmemory, to store the collected identification information.
 22. Theinformation processing apparatus according to claim 1, wherein at leastone of the processing sections is configured to receive the request fromthe another information processing apparatus directly from the reportingsection and independent of the controlling section.