WO2006056669A1 - Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal - Google Patents
Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal Download PDFInfo
- Publication number
- WO2006056669A1 WO2006056669A1 PCT/FR2005/002726 FR2005002726W WO2006056669A1 WO 2006056669 A1 WO2006056669 A1 WO 2006056669A1 FR 2005002726 W FR2005002726 W FR 2005002726W WO 2006056669 A1 WO2006056669 A1 WO 2006056669A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- terminal
- key
- identification module
- securing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to a method of securing a telecommunication terminal connected to an identification module of a user of the terminal.
- mobile communication terminals intended to receive a secure authentication module of the user.
- These terminals are, for example, compliant with the GSM standard (Global System for Mobile Communications) or UMTS (Universal Mobile Telecommunications System). More generally, it also applies to any terminal comprising telecommunication means designed to receive such an authentication module.
- GSM Global System for Mobile Communications
- UMTS Universal Mobile Telecommunications System
- Many applications involving a public data network involve remote authentication of the user.
- Such applications require to determine the existence of a right of the user or to authenticate the information he provides, or to ensure the transmission by the network of confidential information to a well-identified user.
- These operations involve being able to identify the user reliably and securely.
- an electronic device such as a smart card or an authentication or security token is generally used, which stores keys and is capable of executing cryptographic procedures, especially identification procedures, to prove that it holds a key, or to decrypt a confidential message.
- SIM card Subscriber Identification Module
- the SIM card has the cryptographic features mentioned above. It can therefore be used in a _appliçat [ leave- the on_fajsant-generation - an electro 'nîq ⁇ r
- the signature can be on the terms of a transaction between a provider and user of the mobile phone, knowing that the user has been previously authenticated by his mobile phone by entering his code confidential or a confidential code dedicated to the function of generation of signature, and that this confidential code is verified by the SIM card.
- the SIM card can therefore be used in e-commerce applications to electronically sign a transaction, or in an application for transmitting a confidential message, by encrypting or decrypting the message with a key contained in this SIM card.
- the security offered by the SIM card is not enough on its own to provide convincing security, especially with the advent of third-generation mobile phones, that is to say with able to receive and contain several applications delivered by different providers. Indeed, in this context, it is not possible to ensure that the terminal used does not contain defects, viruses or Trojans, for example to retransmit encrypted messages to another terminal. It thus appears the need to prove remotely that the mobile terminal and software loaded into the terminal is intact and has the required security qualities.
- the mobile terminal can protect itself from viruses and horses from
- Trojan by agreeing to download new applications only if it can authenticate their origin and integrity, or if this is not the case, by driving them so that they can not in any way alter the whole of the terminal. It is also necessary to provide an authentication function allowing remote service providers to verify that the mobile terminal has the required security qualities. However, the SIM card is insufficient to offer such an authentication function since it is removable and can be installed in any terminal.
- La_demande de bFevet-FR-0304979 filed on April 23, '2003'const mT method of securing a mobile terminal connected to an execution module for identifying a user terminal comprising a step of a procedure for matching in which: the terminal transmits to the identification module connected to the terminal identification information of the terminal, and
- the identification module compares the identification information received from the terminal with terminal identification information stored in a memory and transmits the result of the comparison to the terminal. If the credentials are not recognized by the identification module, then functions requiring a high degree of security installed in the terminal are not accessible.
- SIMIet SIM
- EMV Europay, MasterCard, Visa
- the client-side application consists of two parts:
- the SIM designed to be safe, contains the most sensitive part of applications, containing keys and processes whose knowledge or alteration could lead to significant fraud for the benefit of the mobile user, for example.
- the mobile which has much more important and varied processing capabilities, contains the rest of the application needed for example for the user interfaces (display / keyboard) or the network interface. He can be too . s.ujeJLà jd ⁇ s.attacks-.variated but-of-gravity and range-less:
- the object of the invention is therefore to initialize a pairing between a SIM card and a mobile terminal under control of a third party entity capable of enabling the mobile as being able to support security applications.
- the object of the invention is therefore a method of securing a telecommunication terminal connected to a terminal identification module of a user, comprising a step of executing a procedure for pairing the terminal with the module.
- identification consisting of:
- the transmission of the pairing key to the second software is conditional on an authorization procedure of the telecommunications terminal; the procedure for enabling the terminal is carried out manually by an authorized agent, the said authorization procedure comprising a step of authenticating this agent with the second software by a password, transmitted by the second software for validation to the first software or an authentication server;
- the password is diversified according to the terminal
- the authorization procedure of the terminal is performed automatically by verification by the first software loaded on the identification module, or by an authentication server of the validity said identification and authentication means;
- the identification and authentication means comprise an RSA key pair and a certificate issued by a certification authority and the verification of the validity of said means comprises the authentication of the RSA key pair and the certificate;
- the identification module comprises at least a third software capable of operating with complementary software loaded on the terminal and such that it only responds to a request from its complementary software after having checked with the first software that the second software validly has a matching key;
- the pairing key is used to establish a session key for encrypting the exchanges between the terminal and the identification module;
- the verification of the matching key by the first software further comprises the positioning of flags marking a difference between the configuration recorded in the identification module and the current configuration of the telecommunications terminal; flags and configuration information can be read and securely protected by an authentication server;
- Another object is a security system of a telecommunication terminal connected to an identification module of a user of the terminal for the implementation of the method comprising:
- Another object of the invention is a telecommunication terminal comprising means of communication with a user identification module for implementing the method and further comprising means for loading, storing and executing data. software adapted to operate with software residing on the identification module and means for securely storing a pairing key connected to means for validating this pairing key by the software residing on the module of identification.
- Another object of the invention is a user identification module associated with a telecommunication terminal comprising means of communication with this telecommunications terminal, and means for securely loading and storing a pairing key. in concordance with a matching key stored on the terminal and software adapted to operate with software resident on the terminal, connected to means for validating the terminal matching key from the matching key module capable of authorizing the communication to verify the true value of the possession of the pairing key by the second software.
- _Un___autre_objel_de_rinvention is-a-product comprising -software ⁇ ⁇ a first module implemented on a telecommunications terminal and a second module implemented on an identification module of a telecommunications terminal user for implementation of the process.
- FIG. 1 is a block diagram of the elements used by a first embodiment of the invention
- FIG. 2 is a diagram of the data flows of this first embodiment
- FIG. 3 is a diagram of the data flows in a second embodiment; and - Figure 4 is a diagram of the data streams in a third embodiment.
- FIG. 1 The method according to the invention, FIG. 1, is implemented by a mobile telephone 1 designed to communicate with other terminals (not shown) or servers 2, managed by service operators, via a mobile telephone. 3.
- the latter comprises the terminal itself 4 and a removable identification device 5, for example of the microcircuit type. or microprocessor, and connection means 6 for connecting to such a card.
- this identification device 5 is called a "subscriber identification module" (SIM).
- FIG. 2 the first software is installed in the SIM card in a secure manner. This is done by creating a secure channel between the SIM card 5 and the server 2 of the software operator. This secure channel has, for example, been set up under the control of cryptographic keys of the network operator.
- An example of such a creation is the creation of a banking domain security zone on the SIM card by the operator, the latter assigning a temporary access key k t to this zone and then transferring this key kt to the bank.
- third-party operator usually a bank, to customize this area securely.
- This secure channel between the operator 2 and the SIM card 5 allows the operator to transfer at 11 to the first software personalization elements including a matching key k a .
- the personalization of the first software can be done in the operator 2 and then, a single transfer of the first software with its matching key k a is performed.
- the SIM card 5 having received its first software and the matching key k a , the second software is downloaded at 12, securely on the terminal.
- This secure transfer may, for example, use the presence on the terminal of a certificate belonging to the operator of the network.
- the operator transmits at 13 a pairing key k ' a to the second software.
- This pairing key k ' a is in correspondence with the pairing key k a of the first software.
- correspondence is meant that the key pair
- This pairing key k ' a is then stored permanently by the second software in a secure area.
- the second software issues-en-14-a query a ⁇ rès ⁇ ⁇ ⁇ ⁇ u pféTnier software, it checks at 15 and 16 that the second software on the terminal, does have the pairing key k 'is before answer in 17. If this is not the case, the first software refuses to work, thus rendering the security application unavailable.
- challenge-response and therefore does not allow an attacker to replay the captured data at first on an authorized mobile, to replace it with an unauthorized mobile.
- a process of the "challenge-response” type consists, for the first software, in sending a challenge, in the form of a random number, to the second software, the latter then encrypting it with its key k ' a and returning the result in 16 to the first software so that it verifies that the result corresponds to the expected value.
- the method thus described makes it possible to ensure that the second software is valid and is the one that has been correctly loaded on the terminal.
- the authorization is done in an agency, by authorized personnel, figures 3 and 4.
- the steps 10 to 12 of loading of the two software modules and the matching key k a in the SIM module are identical to those of the method described above.
- Step 12 of loading the second software is done in an agency with an authorized staff that verifies that the terminal is properly configured to receive the security application. It may be noted that, for the quality of this verification, the terminal must have sufficient means of verification and presentation of the results.
- the second software requests at 21 the agent to authenticate with a password that is sent at 22 to the server 2 of the operator for control. If the control is positive, the server 23 sends the pairing key k ' a to the second software which stores it in a secure storage area.
- the authorized agent launches the second software on the terminal. This one asks the agent to authenticate in 21 thanks to a password which is sent in 25 to the SIM card 5 for control.
- the SIM card 5 sends at 26 the pairing key k ' a to the second software which stores it in a secure storage area.
- the password of the agent can be diversified according to the terminal 4 or the SIM card 5.
- the diversifier can be, for example, the serial number of the SIM card, or the terminal, or other .
- the diversifier is then transmitted to the operator who deduces the password and transmits it to the authorized agent in a secure manner, by means totally independent of the terminal and its SIM card.
- the manual authorization by an agent in an agency can be replaced by a terminal control based on on the authentication of the keys and the certificate either by the operator or by the SIM card.
- This mode of authentication is well known to those skilled in the art will not be described in more detail.
- a second application is composed of a third software loaded on the SIM card and its complementary software running on the terminal.
- This application does not worry about pairing but is conditioned to a successful pairing.
- the third software only responds to a request from its complementary software after verifying with the first software that the second software validly has a matching key, in other words, that the matching is valid.
- This check may, for example, consist of checking the state of a flag operated by the first software after the success or failure of the matching procedure.
- a first function is to secure the means of connection between the terminal and the SIM card by encrypting the transferred data (protection against attacks of the type "man in the middle").
- the matching keys k a and k ' a are then used to define a transfer key kj for encrypting the data exchanged between the terminal and the SIM card.
- a second function is to check the software configuration of the terminal.
- the second software can transmit to the SIM information on the hardware and software configuration of the terminal (for example, configuration tables, the digest of programs such as the operating system of the mobile phone) via the secure connection means described above. .
- the first software of the SIM card thus has the possibility of comparing these "current" configuration data with the values previously stored, and, if there are differences, to position flags according to the difference noted.
- the up-side-SIM trotsnostiJogiciel r r -a-while-the-possibility-of-teste ⁇ these drapea ⁇ xr ⁇ Td ⁇ "decide whether to continue or to stop.
- the security system of a telecommunication terminal connected to an identification module of a user of the terminal therefore comprises:
- communication means between the first and the second software comprising means for validating the pairing key of the second software able to authorize the communication to verify the true value of the possession of the matching key by the second software.
- the telecommunication terminal comprising means of communication with a user identification module also comprises means for loading, storing and executing software adapted to operate with software resident on the identification module and means for securely storing a pairing key connected to means for validating this pairing key by the software residing on the identification module.
- the identification module of a user associated with the telecommunication terminal comprises means for securely loading and storing a matching key in accordance with a pairing key stored on the terminal and software adapted to operate with software residing on the terminal, connected to validation means of the terminal pairing key from the module matching key able to allow communication between the two software only if the key pairing tejminaLesLvalide.
- the method described is implemented by a software product comprising a first module implemented on a telecommunication terminal and a second module implemented on a user identification module of the telecommunication terminal.
- the method and the system thus described thus advantageously make it possible, by matching a terminal with its SIM card, to reinforce the security of the applications whose first module is loaded on the SIM card and the second, complementary module is loaded into the terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007542028A JP2008522470A (ja) | 2004-11-25 | 2005-11-02 | 端末ユーザ識別情報モジュールを接続した通信端末を保護する方法 |
EP05815221A EP1815638A1 (fr) | 2004-11-25 | 2005-11-02 | Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal |
CN200580044725XA CN101088249B (zh) | 2004-11-25 | 2005-11-02 | 用于保护与终端用户标识模块相连的电信终端的方法 |
US11/791,483 US8588415B2 (en) | 2004-11-25 | 2005-11-02 | Method for securing a telecommunications terminal which is connected to a terminal user identification module |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0412760 | 2004-11-25 | ||
FR0412760 | 2004-11-25 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006056669A1 true WO2006056669A1 (fr) | 2006-06-01 |
Family
ID=34954782
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2005/002726 WO2006056669A1 (fr) | 2004-11-25 | 2005-11-02 | Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal |
Country Status (5)
Country | Link |
---|---|
US (1) | US8588415B2 (fr) |
EP (1) | EP1815638A1 (fr) |
JP (3) | JP2008522470A (fr) |
CN (1) | CN101088249B (fr) |
WO (1) | WO2006056669A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008031926A2 (fr) * | 2006-09-13 | 2008-03-20 | Eads Secure Networks Oy | Authentification de station mobile |
CN101529796B (zh) * | 2006-09-13 | 2012-07-25 | 伊兹安全网络有限公司 | Tetra网络中的移动台验证 |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE0300670L (sv) * | 2003-03-10 | 2004-08-17 | Smarttrust Ab | Förfarande för säker nedladdning av applikationer |
US20090307140A1 (en) * | 2008-06-06 | 2009-12-10 | Upendra Mardikar | Mobile device over-the-air (ota) registration and point-of-sale (pos) payment |
US20090307486A1 (en) * | 2008-06-09 | 2009-12-10 | Garret Grajek | System and method for secured network access utilizing a client .net software component |
WO2010035070A1 (fr) * | 2008-09-29 | 2010-04-01 | Nokia Corporation | Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis |
TWI413878B (zh) * | 2009-07-10 | 2013-11-01 | Wistron Corp | 具延伸功能的電子系統及其相關方法 |
US8862767B2 (en) | 2011-09-02 | 2014-10-14 | Ebay Inc. | Secure elements broker (SEB) for application communication channel selector optimization |
US8965330B2 (en) * | 2011-10-21 | 2015-02-24 | Microsoft Corporation | Split billing for a mobile device |
US10440034B2 (en) * | 2012-02-07 | 2019-10-08 | Apple Inc. | Network assisted fraud detection apparatus and methods |
GB2504968B (en) * | 2012-08-15 | 2016-09-14 | Eseye Ltd | Multi IMSI system and method |
CN102843669B (zh) * | 2012-08-17 | 2019-03-15 | 中兴通讯股份有限公司 | 数据访问方法和装置 |
US20160066184A1 (en) * | 2014-08-29 | 2016-03-03 | Intel Corporation | Pairing Computing Devices According To A Multi-Level Security Protocol |
CN105376412A (zh) * | 2015-12-01 | 2016-03-02 | 小米科技有限责任公司 | 信息处理的方法及装置 |
JP6613909B2 (ja) * | 2016-01-15 | 2019-12-04 | 富士通株式会社 | 相互認証方法、認証装置および認証プログラム |
CN105721164A (zh) * | 2016-02-18 | 2016-06-29 | 四川长虹电器股份有限公司 | 一种sim卡的手机身份认证的系统及方法 |
US11087304B2 (en) * | 2016-03-14 | 2021-08-10 | Jpmorgan Chase Bank, N.A. | Systems and methods for device authentication |
US10650130B2 (en) | 2017-11-06 | 2020-05-12 | Ubs Business Solutions Ag | System and method for facilitating authentication via a short-range wireless token |
JP6522842B1 (ja) * | 2018-10-05 | 2019-05-29 | さくら情報システム株式会社 | 情報処理装置、方法及びプログラム |
CN109743176B (zh) * | 2018-12-28 | 2020-07-28 | 百富计算机技术(深圳)有限公司 | 一种pos终端的证书更新方法、服务器及pos终端 |
JP6650543B1 (ja) * | 2019-03-25 | 2020-02-19 | さくら情報システム株式会社 | 情報処理装置、方法及びプログラム |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6124799A (en) * | 1995-12-12 | 2000-09-26 | Bellsouth Intellectual Property Corporation | Methods and apparatus for locking communications devices |
EP1289326A1 (fr) * | 2001-08-30 | 2003-03-05 | Motorola, Inc. | Procédé de vérification de logiciel téléchargé et appareil correspondant |
FR2831362A1 (fr) * | 2001-10-19 | 2003-04-25 | Babel Software | Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application |
US20040043792A1 (en) | 2002-08-28 | 2004-03-04 | Nokia Corporation | Identity module for terminal equipment using prepaid applications |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5721781A (en) * | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
US7917760B2 (en) * | 1997-02-21 | 2011-03-29 | Multos Limited | Tamper resistant module having separate control of issuance and content delivery |
US6317832B1 (en) * | 1997-02-21 | 2001-11-13 | Mondex International Limited | Secure multiple application card system and process |
US6575372B1 (en) * | 1997-02-21 | 2003-06-10 | Mondex International Limited | Secure multi-application IC card system having selective loading and deleting capability |
US6606491B1 (en) * | 1998-06-26 | 2003-08-12 | Telefonaktiebolaget Lm Ericsson (Publ) | Subscriber validation method in cellular communication system |
US7729986B1 (en) * | 1999-07-30 | 2010-06-01 | Visa International Service Association | Smart card transactions using wireless telecommunications network |
JP4617533B2 (ja) * | 2000-03-14 | 2011-01-26 | ソニー株式会社 | 情報提供装置および方法、情報処理装置および方法、並びにプログラム格納媒体 |
JP3921057B2 (ja) * | 2001-05-11 | 2007-05-30 | 株式会社エヌ・ティ・ティ・ドコモ | アクセス方法および通信端末 |
EP1451786A1 (fr) * | 2001-12-10 | 2004-09-01 | Beamtrust A/S | Procede de distribution d'une cle publique |
US20040159700A1 (en) * | 2001-12-26 | 2004-08-19 | Vivotech, Inc. | Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device |
JP2003338812A (ja) * | 2002-05-22 | 2003-11-28 | Uchida Ryuichi | 暗号化システム |
JP2004040717A (ja) * | 2002-07-08 | 2004-02-05 | Matsushita Electric Ind Co Ltd | 機器認証システム |
US20040019564A1 (en) * | 2002-07-26 | 2004-01-29 | Scott Goldthwaite | System and method for payment transaction authentication |
FR2847756B1 (fr) * | 2002-11-22 | 2005-09-23 | Cegetel Groupe | Procede d'etablissement et de gestion d'un modele de confiance entre une carte a puce et un terminal radio |
JP2004193722A (ja) * | 2002-12-09 | 2004-07-08 | Dainippon Printing Co Ltd | 記録担体を搭載した携帯可能な通信端末及びこれを使ったサービス提供システム |
ITRM20030100A1 (it) * | 2003-03-06 | 2004-09-07 | Telecom Italia Mobile Spa | Tecnica di accesso multiplo alla rete, da parte di terminale di utente interconnesso ad una lan e relativa architettura di riferimento. |
JP2004297759A (ja) * | 2003-03-11 | 2004-10-21 | Seiko Epson Corp | 無線通信ネットワークシステムにおける接続認証 |
FR2854303A1 (fr) * | 2003-04-23 | 2004-10-29 | France Telecom | Procede de securisation d'un terminal mobile et applications de procede, l'execution d'applications necessitant un niveau de securite eleve |
EP1523188A1 (fr) * | 2003-10-06 | 2005-04-13 | Canal + Technologies | Appariement de module de Sécurité portable |
US7357309B2 (en) * | 2004-01-16 | 2008-04-15 | Telefonaktiebolaget Lm Ericsson (Publ) | EMV transactions in mobile terminals |
US20050227669A1 (en) * | 2004-04-08 | 2005-10-13 | Ixi Mobile (R&D) Ltd. | Security key management system and method in a mobile communication network |
US20060093149A1 (en) * | 2004-10-30 | 2006-05-04 | Shera International Ltd. | Certified deployment of applications on terminals |
-
2005
- 2005-11-02 CN CN200580044725XA patent/CN101088249B/zh not_active Expired - Fee Related
- 2005-11-02 JP JP2007542028A patent/JP2008522470A/ja not_active Withdrawn
- 2005-11-02 US US11/791,483 patent/US8588415B2/en not_active Expired - Fee Related
- 2005-11-02 EP EP05815221A patent/EP1815638A1/fr not_active Withdrawn
- 2005-11-02 WO PCT/FR2005/002726 patent/WO2006056669A1/fr active Application Filing
-
2012
- 2012-01-13 JP JP2012005048A patent/JP2012114937A/ja not_active Withdrawn
-
2014
- 2014-06-18 JP JP2014125675A patent/JP5895252B2/ja not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6124799A (en) * | 1995-12-12 | 2000-09-26 | Bellsouth Intellectual Property Corporation | Methods and apparatus for locking communications devices |
EP1289326A1 (fr) * | 2001-08-30 | 2003-03-05 | Motorola, Inc. | Procédé de vérification de logiciel téléchargé et appareil correspondant |
FR2831362A1 (fr) * | 2001-10-19 | 2003-04-25 | Babel Software | Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application |
US20040043792A1 (en) | 2002-08-28 | 2004-03-04 | Nokia Corporation | Identity module for terminal equipment using prepaid applications |
Non-Patent Citations (1)
Title |
---|
See also references of EP1815638A1 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008031926A2 (fr) * | 2006-09-13 | 2008-03-20 | Eads Secure Networks Oy | Authentification de station mobile |
WO2008031926A3 (fr) * | 2006-09-13 | 2008-06-26 | Eads Secure Networks Oy | Authentification de station mobile |
EP2418822A1 (fr) * | 2006-09-13 | 2012-02-15 | Cassidian Finland OY | Authentification de station mobile |
US8230218B2 (en) | 2006-09-13 | 2012-07-24 | Eads Secure Networks Oy | Mobile station authentication in tetra networks |
CN101529796B (zh) * | 2006-09-13 | 2012-07-25 | 伊兹安全网络有限公司 | Tetra网络中的移动台验证 |
Also Published As
Publication number | Publication date |
---|---|
JP5895252B2 (ja) | 2016-03-30 |
US20070286373A1 (en) | 2007-12-13 |
JP2008522470A (ja) | 2008-06-26 |
JP2014225881A (ja) | 2014-12-04 |
CN101088249A (zh) | 2007-12-12 |
EP1815638A1 (fr) | 2007-08-08 |
JP2012114937A (ja) | 2012-06-14 |
US8588415B2 (en) | 2013-11-19 |
CN101088249B (zh) | 2012-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1687953B1 (fr) | Méthode d'authentification d'applications | |
WO2006056669A1 (fr) | Procede de securisation d'un terminal de telecommunication connecte a un module d'identification d'un utilisateur du terminal | |
FR2854303A1 (fr) | Procede de securisation d'un terminal mobile et applications de procede, l'execution d'applications necessitant un niveau de securite eleve | |
EP2820795B1 (fr) | Procede de verification d'identite d'un utilisateur d'un terminal communiquant et systeme associe | |
EP2545721B1 (fr) | Protection contre un deroutement d'un canal de communication d'un circuit nfc | |
EP2912594B1 (fr) | Procédé de fourniture d'un service sécurisé | |
EP0973318A1 (fr) | Procédé pour payer à distance, au moyen d'un radiotéléphone mobile, l'acquisition d'un bien et/ou d'un service, et système et radiotéléphone mobile correspondants | |
EP1549011A1 (fr) | Procédé et système de communication entre un terminal et au moins un équipment communicant | |
EP2545722B1 (fr) | Detection d'un deroutement d'un canal de communication d'un dispositif de telecommunication couple a un circuit nfc | |
WO2002102018A1 (fr) | Procede d'authentification entre un objet de telecommunication portable et une borne d'acces public | |
CN111404696A (zh) | 协同签名方法、安全服务中间件、相关平台及系统 | |
EP2545724A1 (fr) | Protection d'un module de securite dans un dispositif de telecommunication couple a un circuit nfc | |
WO2011110438A1 (fr) | Protection d'un canal de communication entre un module de securite et un circuit nfc | |
EP3117641A1 (fr) | Procédé de contrôle d'accès à une zone réservée avec contrôle de la validité d'un titre d'accès stocké dans la mémoire d'un terminal mobile | |
EP3479325B1 (fr) | Procédé d'authentification de données de paiement, dispositifs et programmes correspondants. | |
EP1400090B1 (fr) | Procede et dispositif de securisation des communications dans un reseau informatique | |
FR2894101A1 (fr) | Entite electronique portable destinee a etablir une communication voix sur ip securisee | |
FR2850772A1 (fr) | Procede et dispositif de securisation de transactions electroniques effectuees sur un terminal non securise | |
FR3099974A1 (fr) | Procédé de transmission d’une information numérique | |
WO2012107369A1 (fr) | Procede et dispositif de connexion a un service distant depuis un dispositif hote | |
FR2850813A1 (fr) | Dispositif de securisation de transactions electroniques effectuees sur un terminal non securise |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005815221 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007542028 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11791483 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580044725.X Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2005815221 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11791483 Country of ref document: US |