WO2010035070A1 - Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis - Google Patents
Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis Download PDFInfo
- Publication number
- WO2010035070A1 WO2010035070A1 PCT/IB2008/053962 IB2008053962W WO2010035070A1 WO 2010035070 A1 WO2010035070 A1 WO 2010035070A1 IB 2008053962 W IB2008053962 W IB 2008053962W WO 2010035070 A1 WO2010035070 A1 WO 2010035070A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- response
- challenge
- subscriber identity
- identity device
- locked
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/20—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/21—Services signaling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- Embodiments of the present invention relate generally to mobile communication technology and, more particularly, relate to methods, apparatuses, and computer program products for locking a removable device to a specific host device.
- a removable subscriber identity device that uniquely identifies a subscriber to a network operator and/or that allows for a communication device to access the operator's network may be inserted into a communication device, such as, for example, a cellular telephone.
- a communication device such as, for example, a cellular telephone.
- This removable subscriber identity device may, for example, be embodied as a subscriber identity module (SIM) card, a universal integrated circuit card (UICC), and/or the like.
- SIM subscriber identity module
- UICC universal integrated circuit card
- network operators often desire to prevent device users from swapping subscriber identity devices due to the common practice of subsidizing sales of communication devices to consumers.
- network operators often sell communication devices to consumers at a price below the actual cost of the communication device to the network operator in exchange for the consumer signing a service contract with the network operator.
- network operators may desire to lock the communication device to the operator, such as by locking a removable subscriber identity device to the communication device, such that the consumer is tied to using the communication device on the operator's network so that the network operator receives a return on its investment in selling the subsidized communication device.
- a method, apparatus, and computer program product are therefore provided, which may lock a removable device to a specific host device.
- a method, apparatus, and computer program product may be provided to enable, for example, the locking of a subscriber identity device, such as, for example, a universal integrated circuit card, to a communication device, such as, for example, to a mobile terminal.
- a subscriber identity device such as, for example, a universal integrated circuit card
- a communication device such as, for example, to a mobile terminal.
- Embodiments of the invention may provide for locking a removable device such that non-static information may be used for lock validation purposes so as to inhibit man-in-the-middle attacks attempting to gather information needed to clone the removable device so that an imposter removable device may be used.
- a method may include establishing a plurality of challenge-response pairings with a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device.
- Each challenge-response pairing may comprise a challenge and a corresponding response.
- the method may further include selecting an unused challenge-response pairing from the plurality of challenge-response pairings.
- the method may also include marking the selected challenge-response pairing as used.
- the method may further include sending the challenge from the selected challenge- response pairing to a connected subscriber identity device.
- the method may additionally include receiving a response from the connected subscriber identity device.
- the method may also include determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a comparison of the received response to the response in the selected challenge-response pairing.
- a computer program product includes at least one computer-readable storage medium having computer-readable program instructions stored therein.
- the computer-readable program instructions may include first, second, third, fourth, fifth, and sixth program instructions.
- the first program instruction is establishing a plurality of challenge-response pairings with a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device. Each challenge-response pairing may comprise a challenge and a corresponding response.
- the second program instruction is for selecting an unused challenge-response pairing from the plurality of challenge-response pairings.
- the third program instruction is for marking the selected challenge-response pairing as used.
- the fourth program instruction is for sending the challenge from the selected challenge-response pairing to a connected subscriber identity device.
- the fifth program instruction is for receiving a response from the connected subscriber identity device.
- the sixth program instruction is for determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a comparison of the received response to the response in the selected challenge-response pairing.
- an apparatus may include a processor configured to establish a plurality of challenge-response pairings with a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device. Each challenge-response pairing may comprise a challenge and a corresponding response.
- the processor may also be configured to select an unused challenge-response pairing from the plurality of challenge-response pairings.
- the processor may further be configured to mark the selected challenge-response pairing as used.
- the processor may additionally be configured to send the challenge from the selected challenge- response pairing to a connected subscriber identity device.
- the processor may also be configured to receive a response from the connected subscriber identity device.
- the processor may further be configured to determine whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a comparison of the received response to the response in the selected challenge-response pairing.
- an apparatus may include means for establishing a plurality of challenge-response pairings with a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device.
- Each challenge-response pairing may comprise a challenge and a corresponding response.
- the apparatus may further include means for selecting an unused challenge-response pairing from the plurality of challenge-response pairings.
- the apparatus may also include means for marking the selected challenge-response pairing as used.
- the apparatus may further include means for sending the challenge from the selected challenge- response pairing to a connected subscriber identity device.
- the apparatus may additionally include means for receiving a response from the connected subscriber identity device.
- the apparatus may also include means for determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a comparison of the received response to the response in the selected challenge-response pairing.
- a method may include instructing a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device to generate a public key pair.
- the public key pair may be comprised of a private key and a corresponding public key and the private key may be stored in the locked subscriber identity device.
- the method may further include receiving the public key from the locked subscriber identity device.
- the method may also include sending a validation request to a connected subscriber identity device.
- the method may additionally include receiving a certificate in response to the validation request from the connected subscriber identity device.
- the method may further include determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a validation of the received certificate using the public key.
- FIG. 1 illustrates a block diagram of a system for locking a removable device to a specific host device according to an exemplary embodiment of the present invention
- FIG. 2 is a schematic block diagram of a mobile terminal according to an exemplary embodiment of the present invention
- FIGs. 3-4 are flowcharts according to exemplary methods for locking a removable device to a specific host device according to exemplary embodiments of the present invention.
- FIG. 1 illustrates a block diagram of a system 100 for locking a removable device to a specific host device according to an exemplary embodiment of the present invention.
- "exemplary" merely means an example and as such represents one example embodiment for the invention and should not be construed to narrow the scope or spirit of the invention in any way. It will be appreciated that the scope of the invention encompasses many potential embodiments in addition to those illustrated and described herein. As such, while FIG. 1 illustrates one example of a configuration of a system for locking a removable device to a specific host device, numerous other configurations may also be used to implement embodiments of the present invention.
- a removable device refers to measures taken to ensure that functionality of the specific host device is limited unless the specific host device is operationally coupled to the removable device to which it is locked. In this regard, unauthorized use of the specific host device may be prevented. Accordingly, a “locked” device refers to a device which is locked to a specific host device. For example, a subscriber identity device, such as a uniform integrated circuit card (UICC), may be locked to a specific mobile communication device, such as, for example, a cellular communication device.
- UICC uniform integrated circuit card
- a "subscriber identity device” as used herein refers to a removable device and/or an application embodied on the removable device that uniquely identifies a subscriber to a network operator and/or that allows for a communication device to access an operator's network.
- a subscriber identity device may be connected, such as, for example by inserting the subscriber identity device into a receptor slot, to a specific host device, such as a communication device (e.g., a mobile terminal).
- a specific host device such as a communication device (e.g., a mobile terminal).
- a subscriber identity device may be connected to another device through non-physical means, and may accordingly be connected to a specific host device through a wireless connection.
- the subscriber identity device may, for example, be embodied as a subscriber identity module (SIM) card, a universal integrated circuit card (UICC), and/or the like.
- SIM subscriber identity module
- UICC universal integrated circuit card
- Embodiments of the present invention may provide for locking a subscriber identity device or other removable device to a specific host device, such as a communication device, so as to inhibit a man-in-the-middle attack.
- a man-in-the- middle attack describes a situation in which a hacker may analyze communication between a communication device and a connected subscriber identity device to determine what kind of locking mechanism is used and what information is exchanged as the locking information. If a hacker determines this information, then the hacker may substitute an imposter subscriber identity device for the locked subscriber identity device simply by intercepting lock validation communications and sending back valid responses.
- Embodiments of the invention may prevent such attacks by using locking information that is non-static such that each response received from a connected subscriber identity device in response to a lock validation challenge may be different or at least the repetition period is long enough that it is not practical for a hacker to collect all possible combinations of challenges and responses.
- the system 100 may include a communication device 102, network management entity 104, and remote computing device 106 configured to communicate over a network 108.
- the network management entity 104 may be embodied as any computing device or plurality of computing devices configured to provide and/or manage access to the network 108 by computing devices, such as a communication device 102.
- the network management entity 104 may, for example, be embodied as an access point or base station.
- the remote computing device 106 may be any computing device, mobile or fixed, configured to communicate with other computing devices, such as a communication device 102 or network management entity 104, over the network 108.
- the communication device 102 may be embodied as any computing device configured to communicate with an operationally coupled subscriber identity device 120.
- the communication device 102 may further be configured to communicate with a network management entity 104 and/or a remote computing device 106 over the network 108.
- the communication device 102 and/or remote computing device 106 may be embodied as a mobile computing device, such as, for example a mobile terminal 10 depicted in FIG. 2.
- FIG. 2 illustrates a block diagram of a mobile terminal 10 representative of one embodiment of a communication device 102 and/or a remote computing device 106 in accordance with embodiments of the present invention. It should be understood, however, that the mobile terminal illustrated and hereinafter described is merely illustrative of one type of communication device 102 and/or remote computing device 106 that may benefit from embodiments of the present invention and, therefore, should not be taken to limit the scope of the present invention.
- While several embodiments of the electronic device are illustrated and will be hereinafter described for purposes of example, other types of electronic devices, such as mobile telephones, mobile computers, portable digital assistants (PDAs), pagers, laptop computers, desktop computers, gaming devices, televisions, and other types of electronic systems, may employ embodiments of the present invention.
- PDAs portable digital assistants
- pagers pagers
- laptop computers desktop computers
- gaming devices televisions, and other types of electronic systems
- the mobile terminal 10 may include an antenna 12 (or multiple antennas 12) in communication with a transmitter 14 and a receiver 16.
- the mobile terminal may also include a controller 20 or other processor(s) that provides signals to and receives signals from the transmitter and receiver, respectively.
- These signals may include signaling information in accordance with an air interface standard of an applicable cellular system, and/or any number of different wireless networking techniques, comprising but not limited to Wireless- Fidelity (Wi-Fi), wireless local access network (WLAN) techniques such as Institute of Electrical and Electronics Engineers (IEEE) 802.11, and/or the like.
- these signals may include speech data, user generated data, user requested data, and/or the like.
- the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, access types, and/or the like. More particularly, the mobile terminal may be capable of operating in accordance with various first generation (IG), second generation (2G), 2.5G, third-generation (3G) communication protocols, fourth-generation (4G) communication protocols, and/or the like.
- IG first generation
- 2G second generation
- 2.5G third-generation
- 3G third-generation
- 4G fourth-generation
- the mobile terminal may be capable of operating in accordance with 2G wireless communication protocols IS- 136 (Time Division Multiple Access (TDMA)), Global System for Mobile communications (GSM), IS-95 (Code Division Multiple Access (CDMA)), and/or the like.
- TDMA Time Division Multiple Access
- GSM Global System for Mobile communications
- CDMA Code Division Multiple Access
- the mobile terminal may be capable of operating in accordance with 2.5G wireless communication protocols General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), and/or the like. Further, for example, the mobile terminal may be capable of operating in accordance with 3 G wireless communication protocols such as Universal Mobile Telecommunications System (UMTS), Code Division Multiple Access 2000 (CDMA2000), Wideband Code Division Multiple Access (WCDMA), Time Division-Synchronous Code Division Multiple Access (TD-SCDMA), and/or the like. The mobile terminal may be additionally capable of operating in accordance with 3.9G wireless communication protocols such as Long Term Evolution (LTE) or Evolved Universal Terrestrial Radio Access Network (E-UTRAN) and/or the like. Additionally, for example, the mobile terminal may be capable of operating in accordance with fourth-generation (4G) wireless communication protocols and/or the like as well as similar wireless communication protocols that may be developed in the future.
- GPRS General Packet Radio Service
- EDGE Enhanced Data GSM Environment
- 3 G wireless communication protocols such as Universal
- NAMPS Narrow-band Advanced Mobile Phone System
- TACS Total Access Communication System
- mobile terminals may also benefit from embodiments of this invention, as should dual or higher mode phones (e.g., digital/analog or TDMA/CDMA/analog phones). Additionally, the mobile terminal 10 may be capable of operating according to Wireless Fidelity (Wi-Fi) protocols.
- Wi-Fi Wireless Fidelity
- the controller 20 may comprise circuitry for implementing audio/video and logic functions of the mobile terminal 10.
- the controller 20 may comprise a digital signal processor device, a microprocessor device, an analog-to-digital converter, a digital-to-analog converter, and/or the like. Control and signal processing functions of the mobile terminal may be allocated between these devices according to their respective capabilities.
- the controller may additionally comprise an internal voice coder (VC) 20a, an internal data modem (DM) 20b, and/or the like.
- the controller may comprise functionality to operate one or more software programs, which may be stored in memory.
- the controller 20 may be capable of operating a connectivity program, such as a web browser.
- the connectivity program may allow the mobile terminal 10 to transmit and receive web content, such as location-based content, according to a protocol, such as Wireless Application Protocol (WAP), hypertext transfer protocol (HTTP), and/or the like.
- WAP Wireless Application Protocol
- HTTP hypertext transfer protocol
- the mobile terminal 10 may be capable of using a Transmission Control
- TCP/IP Protocol/Internet Protocol
- the mobile terminal 10 may also comprise a user interface including, for example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a user input interface, and/or the like, which may be operationally coupled to the controller 20.
- a user interface including, for example, an earphone or speaker 24, a ringer 22, a microphone 26, a display 28, a user input interface, and/or the like, which may be operationally coupled to the controller 20.
- “operationally coupled” may include any number or combination of intervening elements (including no intervening elements) such that operationally coupled connections may be direct or indirect and in some instances may merely encompass a functional relationship between components.
- the mobile terminal may comprise a battery for powering various circuits related to the mobile terminal, for example, a circuit to provide mechanical vibration as a detectable output.
- the user input interface may comprise devices allowing the mobile terminal to receive data, such as a keypad 30, a touch display (not shown), a joystick (not shown), and/or other input device.
- the keypad may comprise numeric (0-9) and related keys (#, *), and/or other keys for operating the mobile terminal.
- the mobile terminal 10 may also include one or more means for sharing and/or obtaining data.
- the mobile terminal may comprise a short-range radio frequency (RF) transceiver and/or interrogator 64 so data may be shared with and/or obtained from electronic devices in accordance with RF techniques.
- the mobile terminal may comprise other short-range transceivers, such as, for example, an infrared (IR) transceiver 66, a BluetoothTM (BT) transceiver 68 operating using BluetoothTM brand wireless technology developed by the BluetoothTM Special Interest Group, a wireless universal serial bus (USB) transceiver 70 and/or the like.
- IR infrared
- BT BluetoothTM
- USB wireless universal serial bus
- the Bluetooth transceiver 68 may be capable of operating according to ultra-low power Bluetooth technology (e.g., WibreeTM) radio standards.
- the mobile terminal 10 and, in particular, the short-range transceiver may be capable of transmitting data to and/or receiving data from electronic devices within a proximity of the mobile terminal, such as within 10 meters, for example.
- the mobile terminal may be capable of transmitting and/or receiving data from electronic devices according to various wireless networking techniques, including Wireless Fidelity (Wi-Fi), WLAN techniques such as IEEE 802.1 1 techniques, and/or the like.
- Wi-Fi Wireless Fidelity
- WLAN techniques such as IEEE 802.1 1 techniques
- the mobile terminal 10 may comprise memory, such as a subscriber identity module (SIM) 38, a removable user identity module (R-UIM), a universal subscriber identity module (USIM), internet protocol multimedia services identity module (ISIM), and/or the like, which may store information elements related to and/or for validating a mobile subscriber to a network operator and/or to the mobile terminal 10 and may be embodied on a removable subscriber identity device, such as, for example, a universal integrated circuit card (UICC).
- SIM subscriber identity module
- R-UIM removable user identity module
- USIM universal subscriber identity module
- ISIM internet protocol multimedia services identity module
- the mobile terminal may comprise other removable and/or fixed memory.
- the mobile terminal 10 may include volatile memory 40 and/or non- volatile memory 42.
- volatile memory 40 may include Random Access Memory (RAM) including dynamic and/or static RAM, on-chip or off-chip cache memory, and/or the like.
- RAM Random Access Memory
- Non-volatile memory 42 which may be embedded and/or removable, may include, for example, read-only memory, flash memory, magnetic storage devices (e.g., hard disks, floppy disk drives, magnetic tape, etc.), optical disc drives and/or media, non-volatile random access memory (NVRAM), and/or the like.
- NVRAM non-volatile random access memory
- the memories may store one or more software programs, instructions, pieces of information, data, and/or the like which may be used by the mobile terminal for performing functions of the mobile terminal.
- the memories may comprise an identifier, such as an international mobile equipment identification (IMEI) code, capable of uniquely identifying the mobile terminal 10.
- IMEI international mobile equipment identification
- the communication device 102 and remote computing device 106 are not limited to being embodied as a mobile terminal 10 and may be embodied as any computing device, mobile or fixed, and accordingly may be embodied as a server, desktop computer, laptop computer, mobile terminal 10, and/or the like.
- the network 108 may comprise one or more wireless networks, wireline networks, cellular networks, or combination thereof and may comprise the internet. It will be appreciated that while FIG. 1 illustrates only a single network management entity 104 and remote computing device 106, the system 100 may comprise multiple network management entities 104 and/or multiple remote computing devices 106. Further, while FIG. 1 illustrates an exemplary embodiment of a system for locking a removable device to a specific host device, other embodiments are possible.
- the communication device 102 may not be configured to communicate with remote computing devices over a network 108.
- a subscriber identity device 120 may be locked to the communication device 102 so as to control access to subscriber services other than network communication services.
- the communication device 102 may include various means, such as a processor 110, memory 112, communication interface 114, user interface 116, and validation query unit 118 for performing the various functions herein described.
- These means of the communication device 102 as described herein may be embodied as, for example, hardware elements (e.g., a suitably programmed processor, combinational logic circuit, and/or the like), computer code (e.g., software or firmware) embodied on a computer-readable medium (e.g. memory 1 12) that is executable by a suitably configured processing device (e.g., the processor 110), or some combination thereof.
- the processor 110 may, for example, be embodied as various means including a microprocessor, a coprocessor, a controller, or various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field programmable gate array).
- the processor 110 may be configured to execute instructions stored in the memory 112 or otherwise accessible to the processor 110.
- the processor 110 may comprise a plurality of general purpose and/or special purpose processors configured to operate cooperatively to provide the functionalities described herein.
- the memory 112 may include, for example, volatile and/or non- volatile memory.
- the memory 112 may be configured to store information, data, applications, instructions, or the like for enabling communication device 102 to carry out various functions in accordance with exemplary embodiments of the present invention.
- the memory 112 may be configured to buffer input data for processing by the processor 110.
- the memory 112 may be configured to store instructions for execution by the processor 110.
- the memory 112 may comprise one or more databases that store information in the form of static and/or dynamic information.
- the memory 112 may store, for example, challenge-response pairings. This stored information may be stored and/or used by the validation query unit 118 during the course of performing its functionalities.
- the communication interface 114 may be embodied as any device or means embodied in hardware, software, firmware, or a combination thereof that is configured to receive and/or transmit data from/to a network, such as the network 108, and/or any other device, such as a network management entity 104 and/or remote computing device 106, in communication with the communication device 102. Additionally or alternatively, the communication interface 1 14 may be configured to receive and/or transmit data from/to a subscriber identity device 120 connected to the communication device 102. In one embodiment, the communication interface 114 may be at least partially embodied as or otherwise controlled by the processor 110.
- the communication interface 114 may include, for example, an antenna, a transmitter, a receiver, a transceiver and/or supporting hardware or software for enabling communications with other entities of the system 100, such as a network management 104 and/or remote computing device 106 via the network 108.
- the communication interface 114 may be configured to receive and/or transmit data using any protocol that may be used for communications between the communication device 102 and other computing devices of the system 100, such as a network management entity 104 and/or a remote computing device 106, over the network 108.
- the communication interface 114 may additionally be in communication with the memory 112, user interface 116, and/or validation query unit 118, such as via a bus.
- the user interface 116 may be in communication with the processor 110 to receive an indication of a user input and/or to provide an audible, visual, mechanical, or other output to the user.
- the user interface 116 may include, for example, a keyboard, a mouse, a joystick, a display, a touch screen display, a microphone, a speaker, and/or other input/output mechanisms.
- elements of the user interface may be reduced or even eliminated.
- the user interface 116 may further be in communication with the memory 112, communication interface 116, and/or validation query unit 118, such as via a bus.
- the validation query unit 118 may be embodied as various means, such as hardware, software, firmware, or some combination thereof and, in one embodiment, may be embodied as or otherwise controlled by the processor 110. In embodiments where the validation query unit 118 is embodied separately from the processor 110, the validation query unit 118 may be in communication with the processor 110. The validation query unit 118 may be configured to initiate locking of a subscriber identity device 120 to the communication device 102. The validation query unit 118 may additionally be configured to validate a connected subscriber identity device 120 as being a subscriber identity device 120 locked to the communication device 102. In an exemplary embodiment, the validation query unit 118 may be configured to establish a plurality of challenge-response pairings with a locked subscriber identity device 120.
- This plurality of challenge-response pairings may comprise or otherwise be referred to as one or more lists of challenge-response pairings.
- list has no bearing on how the challenge-response pairings are stored or otherwise organized in memory, but rather is used herein as a way to refer to a group of challenge-response pairings.
- the validation query unit 118 may be configured to establish the plurality of challenge-response pairings in a secure environment during initiation of locking a subscriber identity device 120 to the communication device 102.
- a secure environment may be an environment in which it is known that there is no man-in- the-middle that can intercept communications passed between the communication device 102 and the locked subscriber identity device 120.
- Each challenge-response pairing may comprise a challenge and a corresponding response calculated by the locked subscriber identity device 120 in response to the challenge.
- a challenge may comprise any random value.
- the challenge may comprise a 16 byte value.
- the response may comprise a value calculated by the locked subscriber identity device 120 according to an authentication algorithm embodied on the locked subscriber identity device 120 based at least in part upon the challenge value. In this regard, there may be only one correct response value for any given challenge value.
- the validation query unit 118 may be configured to establish a list comprising a predefined number of challenge-response pairings (e.g., 20) or may be configured to establish challenge-response pairings for a duration of time, such as, for example, a predefined period of time or the duration of the initiation of locking the subscriber identity device 120 to the communication device 102.
- a predefined number of challenge-response pairings e.g. 20
- the validation query unit 118 may be configured to establish a list comprising a predefined number of challenge-response pairings (e.g., 20) or may be configured to establish challenge-response pairings for a duration of time, such as, for example, a predefined period of time or the duration of the initiation of locking the subscriber identity device 120 to the communication device 102.
- the validation query unit 118 may establish the plurality of challenge- response pairings by generating a plurality of challenge values and sending each challenge value to the locked subscriber identity device 120.
- the validation query unit 1 18 may generate the challenge values randomly or may generate the challenge values in some predefined order, such as sequentially.
- the challenge value may be sent to the locked subscriber identity device 120 as a parameter of an authenticate command recognized by the subscriber identity device 120.
- This authenticate command may, for example, be used by a network operator and/or a network management entity 104 to validate a communication device 102 and/or a subscriber identity device 120 connected to the communication device 102 prior to providing the communication device 102 with a network communication service.
- the validation query unit 118 may then receive a response to the sent challenge from the locked subscriber identity device 120 and pair the received response with the sent challenge to comprise a challenge-response pairing. Since the locked subscriber identity device 120 may calculate the response according to an algorithm embodied on the locked subscriber identity device 120 such that there is only one correct response value for any given challenge, the validation query unit 118 may establish a plurality of challenge-response pairings that may be used to validate a connected subscriber identity device 120 as being the locked subscriber identity device 120 without any knowledge of the algorithm used by the locked subscriber identity device 120 to calculate a response to a received challenge. The validation query unit 120 may then store each challenge-response pairing in a memory, such as the memory 112.
- the validation query unit 120 may be configured to validate a subscriber identity device 120 connected to the communication device 102 as being the subscriber identity device 120 which was locked to the communication device 102.
- the validation query unit 118 may be configured to validate a connected subscriber identity device 120 each time the communication device 102 is powered on, when a user of the communication device 102 attempts to use a functionality of the communication device 102, and/or periodically. If the validation query unit 118 successfully validates a connected subscriber identity device 120 as being the subscriber identity device 120 that was locked to the communication device 102, then the validation query unit 118 may continue to allow full functionality and access to the communication device 102.
- the validation query unit 118 may reject the connected subscriber identity device 120 such that functionality of and/or access to the communication device 102 is limited.
- the validation query unit 118 may be configured to select an unused challenge- response pairing from the plurality of challenge-response pairings and use the selected challenge-response pairing to validate the connected subscriber identity device 120.
- each challenge-response pairing may be stored, such as in memory 112, in association with an indication of whether the challenge- response pairing has previously been used to validate a connected subscriber identity device 120.
- the validation query unit 118 may be configured to mark the selected challenge-response pairing as "used." Marking the selected challenge-response pairing as used may comprise changing the indication stored in association with the challenge-response pairing to reflect that the pairing has been used. Additionally or alternatively, marking the selected challenge-response pairing as used may comprise deleting the selected challenge-response pairing from memory such that the selected challenge-response pairing is no longer stored in the plurality of challenge-response pairings.
- the challenge- response pairing is implicitly marked as used since the pairing is no longer stored with the plurality of challenge-response pairings available for validating a connected subscriber identity device 120. Accordingly, each of the plurality of stored challenge-response pairings may be used for validation purposes only once, or if reused, the repetition period may be long enough that it is not practical for a man-in-the-middle to collect all possible combinations.
- a challenge- response pairing may be reused in some circumstances, such as, for example, once all possible challenge values have been exhausted, when the unused challenge- response pairings have been exhausted, and/or in embodiments wherein used challenge-response pairings are deleted, when a challenge-response pairing comprising the particular challenge value is again established and/or collected by the validation query unit 118.
- reuse will not occur for a period such that the repetition period is long enough that it is not practical for a man-in-the-middle to collect all combinations.
- a man-in-the-middle intercepting communications between the communication device 102 and the subscriber identity device 120 may not be able to clone a locked subscriber identity device 120 simply by sending an intercepted response in response to a received challenge.
- the validation query unit 1 18 may be configured to send the challenge from the selected challenge-response pairing, such as in an authenticate command, to the connected subscriber identity device 120.
- the validation query unit 118 may further be configured to receive a response from the connected subscriber identity device in response to the sent challenge and determine whether the connected subscriber identity device 120 is the locked subscriber identity device 120 based at least in part upon a comparison of the received response to the response in the selected challenge-response pairing. In this regard, if the received response and the response in the selected challenge-response pairing are the same, the validation query unit 118 may determine that the connected subscriber identity device 120 and the locked subscriber identity device 120 are the same.
- the validation query unit 118 may determine that the connected subscriber identity device 120 is an imposter. As it will be appreciated that the plurality of challenge-response pairings may be exhausted, the validation query unit 118 may, in an exemplary embodiment, be configured to validate a connected subscriber identity device 120 using a challenge-response pairing only after first exhausting other means of validating the connected subscriber identity device 120. In this regard, the validation query unit 118 may be configured to first validate that other locking information of a connected subscriber identity device 120 match the subscriber identity device 120 locked to the communication device 102.
- This other locking information may comprise static information identifying a subscriber identity device 120, such as, for example, a UICC identification value, an international mobile subscriber identity (IMSI) value, and/or the like.
- the validation query unit 118 may be configured to validate a connected subscriber identity device 120 using a stored challenge-response pairing only if the other locking information of the connected subscriber identity device 120 matches the locked subscriber identity device 120. If the other locking information does not match, then the validation query unit 118 may determine the connected subscriber identity device 120 is an imposter without using a challenge-response pairing from the plurality of challenge-response pairings.
- the validation query unit 118 may further be configured to collect additional challenge-response pairings following locking of a subscriber identity device 120 to the communication device 102.
- the validation query unit 118 may be configured to collect additional pairings after a connected subscriber identity device 120 has been validated as being the locked subscriber identity device 120 so that the collected additional challenge-response pairings may be used to validate a connected subscriber identity device 120 in the future.
- the validation query unit 118 may be configured to collect additional challenge-response pairings by generating a challenge value, ensuring that the generated challenge value is not already represented in the plurality of challenge-response pairings, and sending the challenge to the locked subscriber identity device 120.
- the validation query unit 120 may receive a response to the challenge from the subscriber identity device 120 and pair the received response to the sent challenge to comprise a challenge-response pairing.
- the validation query unit 118 may then save the challenge-response pairing as part of the plurality of challenge-response pairings, such as in memory 112.
- the validation query unit 118 may be configured to collect additional challenge-response pairings based at least in part upon the response of a connected subscriber identity device 120 to network authentication challenges received from a network management entity 104.
- the validation query unit 118 may be configured to receive an authenticate command comprising a challenge value from a network management entity 104.
- the validation query unit 118 may then be configured to send the authenticate command to the connected subscriber identity device 120 and to receive a response to the authenticate command from the subscriber identity device 120.
- the validation query unit 118 may be configured to send the received response to the authenticate command to the network management entity 104 so that the network management entity 104 may validate the communication device 102 for access to the network 108 based at least in part upon the identity of the connected subscriber identity device 120.
- the validation query unit 118 may be configured to determine whether the challenge value received from the network management entity 104 is in the plurality of challenge-response pairings. If the received challenge value is not in the plurality of challenge-response pairings, the validation query unit 118 may be configured to pair the challenge received from the network management entity 104 with the response received from the connected subscriber identity device 120 to form a challenge-response pairing if the network management entity 104 validates the communication device 102.
- the validation query unit 118 may then save the challenge-response pairing as part of the plurality of challenge-response pairings, such as in memory 112. In some embodiments, however, the validation query unit 118 may be configured to form and/or save the challenge-response pairing only if the validation query unit 118 has independently validated the connected subscriber identity device 120 (e.g., before of the network authentication challenge or following receipt of the network authentication challenge and prior to saving the challenge-response pairing).
- the validation query unit 118 may be configured to collect additional challenge-response pairings if the number of unused challenge-response pairings in the plurality of challenge-response pairings equals a first predefined number.
- the validation query unit 118 may be configured to continue to collect additional challenge-response pairings until the number of unused challenge-response pairings in the plurality of challenge-response pairings equals a second predefined number.
- the first predefined number may be 15 and the second predefined number may be 20.
- the validation query unit 118 may be configured to collect additional challenge-response pairings through either or both of the above described methods until the number of unused challenge-response pairings equals 20. Even in such an embodiment, however, the validation query unit 118 may be configured to collect challenge-response pairings that may be established based at least in part upon the response of a connected subscriber identity device 120 to network authentication challenges received from a network management entity 104 regardless of the number of challenge-response pairings in the plurality of challenge-response pairings.
- the validation query unit 118 may be configured to establish two lists of challenge-response pairings.
- the first list may comprise a list of more trusted challenge-response pairings that may be harder (e.g., a "hard list") for a man-in-the-middle to intercept and fake.
- the first list may comprise challenge-response pairings established in a secure environment during initiation of locking a subscriber identity device 120 to the communication device 102 as these pairings should be unknown to any man-in- the-middle since they were established in a secure environment.
- the first list may additionally comprise challenge-response pairing collected by the validation query unit 118 through validated network authentication commands, such as described above.
- the second list may comprise a list of less trusted challenge-response pairings that may be somewhat easier for a man-in-the-middle to intercept and fake (e.g., a "soft list").
- the challenge-response pairings comprising the second list may be collected subsequent to locking a subscriber identity device 120 to the communication device 102. Accordingly, these pairings may comprise challenges and responses that may have been intercepted or perhaps faked by a man-in-the-middle. So as to avoid unnecessarily using a pairing from the hard list of challenge-response pairings, the validation query unit 118 may be configured to first validate a connected subscriber identity device 120 as being the locked subscriber identity device 120 using a challenge from the soft list.
- the validation query unit 118 may then use a challenge from the hard list. Other criteria may also trigger the validation query unit 118 to validate a connected subscriber identity device 120 as being the locked subscriber identity device 120 when there is reason to be more cautious in validating a connected subscriber identity device 120, such as when there is cause to be suspicious that a response value from the soft list may be faked.
- Such criteria may comprise, for example, when a communication device 102 is first powered on, following an over-the-air update of firmware on the subscriber identity device 120 and/or the communication device 102, as well as other criteria that may be established based upon the operating parameters and/or functionalities provided by a particular embodiment of the communication device 102.
- the subscriber identity device 120 may include various means, such as a processor 122, memory 124, and validation response unit 126 for performing the various functions herein described.
- These means of the subscriber identity device 120 as described herein may be embodied as, for example, hardware elements (e.g., a suitably programmed processor, combinational logic circuit, and/or the like), computer code (e.g., software or firmware) embodied on a computer-readable medium (e.g. memory 124) that is executable by a suitably configured processing device (e.g., the processor 122), or some combination thereof.
- the processor 122 may, for example, be embodied as various means including a microprocessor, a coprocessor, a controller, or various other processing elements including integrated circuits such as, for example, an ASIC (application specific integrated circuit) or FPGA (field programmable gate array).
- the processor 122 may be configured to execute instructions stored in the memory 124 or otherwise accessible to the processor 122. Although illustrated in FIG. 1 as a single processor, the processor 122 may comprise a plurality of general purpose and/or special purpose processors configured to operate cooperatively to provide the functionalities described herein.
- the memory 124 may include, for example, volatile and/or non- volatile memory.
- the memory 124 may be configured to store information, data, applications, instructions, or the like for enabling the subscriber identity device 120 to carry out various functions in accordance with exemplary embodiments of the present invention.
- the memory 124 may be configured to buffer input data for processing by the processor 122.
- the memory 124 may be configured to store instructions for execution by the processor 122.
- the memory 124 may comprise one or more databases that store information in the form of static and/or dynamic information.
- the memory 122 may store, for example, received challenges.
- the memory 122 may store algorithms, values, and/or data otherwise necessary to facilitate calculation of a response to a received authenticate command or other challenge. This stored information may be stored and/or used by the validation response unit 126 during the course of performing its functionalities.
- the validation response unit 126 may be embodied as various means, such as hardware, software, firmware, or some combination thereof and, in one embodiment, may be embodied as or otherwise controlled by the processor 122. In embodiments where the validation response unit 126 is embodied separately from the processor 122, the validation response unit 126 may be in communication with the processor 122.
- the validation response unit 126 may be configured to receive a challenge from a connected communication device 102. The challenge, may be received, for example, as a parameter to an authenticate command.
- the validation response unit 126 may be configured to calculate an appropriate response to the challenge and send the calculated response to the communication device 102.
- the validation response unit 126 may be embodied as or otherwise comprise logic for implementing an algorithm to calculate responses to received challenges so that the subscriber identity device 120 may be validated by a connected communication device 102 and/or a network management entity 104.
- a connected subscriber identity device 120 may be validated as a locked subscriber identity device 120 in a manner to inhibit man-in-the-middle attacks.
- Other embodiments may additionally or alternatively utilize a public key pair to validate a connected subscriber identity device 120 as the locked subscriber identity device 120.
- the validation query unit 118 may be configured to instruct a locked subscriber identity device 120 during initiation of locking the subscriber identity device 120 to generate a public key pair comprised of a private key and a corresponding public key. As before, the initiation of locking the subscriber identity device 120 may take place in a secure environment.
- the validation response unit 126 may be configured to generate the public key pair and store the private key locally, such as in the memory 124.
- the validation response unit 126 may be configured to send the public key to the communication device 102, where it may be received and stored in memory 112 by the validation query unit 118.
- the validation query unit 118 may be configured to send a validation request to a connected subscriber identity device 120.
- the format of the validation request is not important so long as the subscriber identity device 120 is configured to receive the validation request and understand that the request is for information that may be used to validate the subscriber identity device 120. Accordingly, the validation response unit 126 may be configured to receive the validation request and calculate a certificate based at least in part upon the private key.
- the validation response unit 126 may further be configured to send the calculated certificate to the communication device 102.
- the validation query unit 118 may be configured to receive the certificate and determine whether the connected subscriber identity device 120 is the locked subscriber identity device 120 based at least in part upon a validation of the received certificate using the public key.
- FIGs. 3-4 are flowcharts of a system, method, and computer program product according to an exemplary embodiment of the invention. It will be understood that each block or step of the flowcharts, and combinations of blocks in the flowcharts, may be implemented by various means, such as hardware, firmware, and/or software including one or more computer program instructions. For example, one or more of the procedures described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above may be stored by a memory device of a mobile terminal, server, or other computing device and executed by a processor in the computing device.
- the computer program instructions which embody the procedures described above may be stored by memory devices of a plurality of computing devices.
- any such computer program instructions may be loaded onto a computer or other programmable apparatus to produce a machine, such that the instructions which execute on the computer or other programmable apparatus create means for implementing the functions specified in the flowchart block(s) or step(s).
- These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block(s) or step(s).
- the computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer- implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block(s) or step(s).
- blocks or steps of the flowcharts support combinations of means for performing the specified functions, combinations of steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that one or more blocks or steps of the flowcharts, and combinations of blocks or steps in the flowcharts, may be implemented by special purpose hardware-based computer systems which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions.
- FIG. 3 one exemplary method for locking a removable device to a device according to an exemplary embodiment of the present invention is illustrated in FIG. 3. The method may include the validation query unit 118 establishing a plurality of challenge-response pairings with a locked subscriber identity device 120 in a secure environment during initiation of locking the subscriber identity device, at operation 300.
- Operation 310 may comprise the validation query unit 118 selecting an unused challenge-response pairing from the plurality of challenge-response pairings. The validation query unit 118 may then mark the selected challenge-response pairing as used, at operation 320.
- Operation 330 may comprise the validation query unit 118 sending the challenge from the selected challenge-response pairing to a connected subscriber identity device 120. The validation query unit 118 may then receive a response from the connected subscriber identity device 120, at operation 340.
- Operation 350 may comprise the validation query unit 118 determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a comparison of the received response to the response in the selected challenge- response pairing.
- FIG. 4 illustrates another exemplary method for locking a removable device to a device according to an exemplary embodiment of the present invention.
- the method may include the validation query unit 118 instructing a locked subscriber identity device in a secure environment during initiation of locking the subscriber identity device 120 to generate a public key pair, at operation 400.
- the public key pair may comprise a private key and a corresponding public key.
- Operation 410 may comprise the validation query unit 118 receiving the public key from the locked subscriber identity device 120.
- the validation query unit 118 may then send a validation request to a connected subscriber identity device 120, at operation 420.
- Operation 430 may comprise the validation query unit 118 receiving a certificate in response to the validation request from the connected subscriber identity device 120.
- Operation 440 may comprise the validation query unit 118 determining whether the connected subscriber identity device is the locked subscriber identity device based at least in part upon a validation of the received certificate using the public key.
- a suitably configured processor may provide all or a portion of the elements of the invention.
- all or a portion of the elements of the invention may be configured by and operate under control of a computer program product.
- the computer program product for performing the methods of embodiments of the invention includes a computer-readable storage medium, such as the non-volatile storage medium, and computer-readable program code portions, such as a series of computer instructions, embodied in the computer-readable storage medium.
- Embodiments of the invention may provide several advantages to users, manufacturers, and/or vendors of a computing device, such as a mobile terminal 10.
- Embodiments of the invention may provide for locking a removable device to a device so as to inhibit man-in-the-middle attacks that may be used to clone the removable device so that the locked removable device may be replaced with an imposter device.
- embodiments of the invention may provide for locking a removable device with non-static information such that the appropriate response by the locked removable device to each challenge is different.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
L'invention porte sur un procédé, un appareil et un produit programme d'ordinateur qui peuvent verrouiller un dispositif amovible à un dispositif hôte précis. L'appareil peut comprendre un processeur configuré pour établir une pluralité de paires défi-réponse avec un dispositif d'identité d'abonné verrouillé. Le processeur peut également être configuré pour sélectionner une paire défi-réponse inutilisée dans la pluralité de paires défi-réponse. Le processeur peut en outre être configuré pour marquer la paire défi-réponse sélectionnée comme étant utilisée. Le processeur peut de plus être configuré pour envoyer le défi provenant de la paire défi-réponse sélectionnée à un dispositif d'identité d'abonné connecté et recevoir une réponse provenant du dispositif d'identité d'abonné connecté. Le processeur peut également être configuré pour déterminer si le dispositif d'identité d'abonné connecté est le dispositif d'identité d'abonné verrouillé sur la base au moins en partie d'une comparaison de la réponse reçue à la réponse dans la paire défi-réponse sélectionnée. L'invention porte également sur des procédés et des produits programmes d'ordinateur correspondants.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2008/053962 WO2010035070A1 (fr) | 2008-09-29 | 2008-09-29 | Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/IB2008/053962 WO2010035070A1 (fr) | 2008-09-29 | 2008-09-29 | Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010035070A1 true WO2010035070A1 (fr) | 2010-04-01 |
Family
ID=40379771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2008/053962 WO2010035070A1 (fr) | 2008-09-29 | 2008-09-29 | Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2010035070A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2938111A1 (fr) * | 2014-04-21 | 2015-10-28 | ACER Incorporated | Procédés de contrôle d'accès utilisateur sur un dispositif de communication mobile et appareils les utilisant |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0427465A2 (fr) * | 1989-11-09 | 1991-05-15 | AT&T Corp. | Système de sécurité sans base de données |
US5812764A (en) * | 1997-01-30 | 1998-09-22 | International Business Machines | Password management system over a communications network |
GB2335568A (en) * | 1998-03-18 | 1999-09-22 | Nec Technologies | Method for enabling the locking of a mobile phone hand set to a specified network by the network operator |
US20040043792A1 (en) * | 2002-08-28 | 2004-03-04 | Nokia Corporation | Identity module for terminal equipment using prepaid applications |
EP1755061A2 (fr) * | 2005-08-15 | 2007-02-21 | Assa Abloy Identification Technology Group AB | Protection des données "non-promiscuous" dans un transpondeur RFID |
US20070286373A1 (en) * | 2004-11-25 | 2007-12-13 | France Telecom | Method For Securing A Telecommunications Terminal Which Is Connected To A Terminal User Identification Module |
-
2008
- 2008-09-29 WO PCT/IB2008/053962 patent/WO2010035070A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0427465A2 (fr) * | 1989-11-09 | 1991-05-15 | AT&T Corp. | Système de sécurité sans base de données |
US5812764A (en) * | 1997-01-30 | 1998-09-22 | International Business Machines | Password management system over a communications network |
GB2335568A (en) * | 1998-03-18 | 1999-09-22 | Nec Technologies | Method for enabling the locking of a mobile phone hand set to a specified network by the network operator |
US20040043792A1 (en) * | 2002-08-28 | 2004-03-04 | Nokia Corporation | Identity module for terminal equipment using prepaid applications |
US20070286373A1 (en) * | 2004-11-25 | 2007-12-13 | France Telecom | Method For Securing A Telecommunications Terminal Which Is Connected To A Terminal User Identification Module |
EP1755061A2 (fr) * | 2005-08-15 | 2007-02-21 | Assa Abloy Identification Technology Group AB | Protection des données "non-promiscuous" dans un transpondeur RFID |
Non-Patent Citations (1)
Title |
---|
MENEZES A ET AL: "Handbook of Applied Cryptography , IDENTIFICATION AND ENTITY AUTHENTICATION", HANDBOOK OF APPLIED CRYPTOGRAPHY; [CRC PRESS SERIES ON DISCRETE MATHEMATICES AND ITS APPLICATIONS], BOCA RATON, FL, CRC PRESS.; US, 1 January 1997 (1997-01-01), pages 385 - 424, XP002262234, ISBN: 978-0-8493-8523-0 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2938111A1 (fr) * | 2014-04-21 | 2015-10-28 | ACER Incorporated | Procédés de contrôle d'accès utilisateur sur un dispositif de communication mobile et appareils les utilisant |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2514169B1 (fr) | Système, procédé et appareil permettant d'effectuer une recherche fiable de réseau, de capacité et de service | |
US10492045B2 (en) | Dynamic provisioning of device configuration files for electronic subscriber identity modules | |
US11635954B2 (en) | Method for authenticating and updating EUICC firmware version and related apparatus | |
US20220078616A1 (en) | Method and apparatus for discussing digital certificate by esim terminal and server | |
US20110093938A1 (en) | Methods, apparatuses, and computer program products for bootstrapping device and user authentication | |
EP3648487B1 (fr) | Procédé de mise à jour de micrologiciel, et appareil associé | |
US20110223860A1 (en) | System and Method for Configuring Devices for Wireless Communication | |
US20120096519A1 (en) | Methods and Apparatuses for Avoiding Denial of Service Attacks By Rogue Access Points | |
WO2008104934A1 (fr) | Dispositif, procédé, et produit-programme informatique pour la mise en place d'un verrouillage d'opérateur | |
CN104170424A (zh) | 用于订阅共享的方法和装置 | |
US11722934B2 (en) | Device for wireless communication handover | |
EP3956792B1 (fr) | Génération de clé cryptographique pour dispositif de communication mobile | |
WO2010023506A1 (fr) | Procédés, appareils, produits-programmes informatiques et systèmes pour l'appariement et l'association sécurisés de dispositifs sans fil | |
US20240187865A1 (en) | Electronic subscriber identity module transfer eligibility checking | |
WO2017012204A1 (fr) | Procédé de connexion sans fil, terminal, point d'accès sans fil, et support de stockage informatique | |
US8621191B2 (en) | Methods, apparatuses, and computer program products for providing a secure predefined boot sequence | |
KR101148488B1 (ko) | 서비스를 위한 구성 설정을 자동 발견하기 위한 방법, 장치 및 컴퓨터 판독 가능 매체 | |
US11231920B2 (en) | Electronic device management | |
US20220174490A1 (en) | System, method, storage medium and equipment for mobile network access | |
WO2010035070A1 (fr) | Procédés, appareils et produits programmes d'ordinateur pour verrouiller un dispositif amovible à un dispositif hôte précis | |
CN104243415B (zh) | 一种能力调用方法和设备 | |
CN105122723B (zh) | 用于管理设备的方法及装置 | |
CN110061833B (zh) | 一种身份位置的绑定更新方法及装置 | |
EP2100236B1 (fr) | Procédé, appareil et programme informatique pour fournir une synchronisation intelligente |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08807848 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08807848 Country of ref document: EP Kind code of ref document: A1 |