ATE339859T1 - Verfahren zur verwendung von in einem teilnehmeridentitatsmodul gespeicherten anwendung und zur sicherheitsbehandlung damit verbundener information - Google Patents
Verfahren zur verwendung von in einem teilnehmeridentitatsmodul gespeicherten anwendung und zur sicherheitsbehandlung damit verbundener informationInfo
- Publication number
- ATE339859T1 ATE339859T1 AT00903728T AT00903728T ATE339859T1 AT E339859 T1 ATE339859 T1 AT E339859T1 AT 00903728 T AT00903728 T AT 00903728T AT 00903728 T AT00903728 T AT 00903728T AT E339859 T1 ATE339859 T1 AT E339859T1
- Authority
- AT
- Austria
- Prior art keywords
- subscriber identity
- identity module
- sim
- stored
- information associated
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Social Psychology (AREA)
- Mobile Radio Communication Systems (AREA)
- Exchange Systems With Centralized Control (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Credit Cards Or The Like (AREA)
- Telephone Function (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FI990256A FI107860B (fi) | 1999-02-09 | 1999-02-09 | Menetelmä ja järjestelmä tietoliikennejärjestelmässä ja tilaajaidentiteettimoduuli |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE339859T1 true ATE339859T1 (de) | 2006-10-15 |
Family
ID=8553688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT00903728T ATE339859T1 (de) | 1999-02-09 | 2000-02-09 | Verfahren zur verwendung von in einem teilnehmeridentitatsmodul gespeicherten anwendung und zur sicherheitsbehandlung damit verbundener information |
Country Status (9)
Country | Link |
---|---|
EP (1) | EP1151625B1 (de) |
AT (1) | ATE339859T1 (de) |
AU (1) | AU2551500A (de) |
DE (1) | DE60030687T2 (de) |
DK (1) | DK1151625T3 (de) |
ES (1) | ES2269100T3 (de) |
FI (1) | FI107860B (de) |
HK (1) | HK1040343A1 (de) |
WO (1) | WO2000048416A1 (de) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE522260C2 (sv) * | 1999-10-01 | 2004-01-27 | Ericsson Telefon Ab L M | Metod, system och säkerhetsadapter för att exekvera säker dataöverföring i ett trådlöst nät |
DK174672B1 (da) * | 1999-11-09 | 2003-08-25 | Orange As | System til elektronisk udlevering af en personlig identifikationskode |
US6986052B1 (en) * | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
GB0020323D0 (en) * | 2000-08-17 | 2000-10-04 | Simoco Int Ltd | Short data messages in mobile communications systems |
IL140267A0 (en) | 2000-12-13 | 2003-09-17 | Milsys Ltd | Dual processor trusted computing environment |
FR2826212B1 (fr) * | 2001-06-15 | 2004-11-19 | Gemplus Card Int | Procede de chargement a distance d'une cle de cryptage dans un poste d'un reseau de telecommunication |
DE10159398A1 (de) | 2001-12-04 | 2003-06-12 | Giesecke & Devrient Gmbh | Speichern von und Zugreifen auf Daten in einem Mobilgerät und einem Benutzermodul |
EP1320273A1 (de) * | 2001-12-12 | 2003-06-18 | SCHLUMBERGER Systèmes | System und Verfahren zum Laden von Daten auf eine SmartCard über ein Telekommunikationsnetz |
NZ533176A (en) | 2001-12-25 | 2005-10-28 | Ntt Docomo Inc | Device and method for restricting content access and storage |
EP1367843A1 (de) * | 2002-05-30 | 2003-12-03 | SCHLUMBERGER Systèmes | Sichere Interaktion zwischen einem heruntergeladenen Anwendungskode und einer Chipkarte in einem Mobilkommunikationsgerät |
US20060288407A1 (en) | 2002-10-07 | 2006-12-21 | Mats Naslund | Security and privacy enhancements for security devices |
BRPI0315450B1 (pt) | 2002-10-31 | 2019-12-17 | Ericsson Telefon Ab L M | circuito eletrônico à prova de violação para implementação em um dispositivo, dispositivo implementado com um circuito eletrônico à prova de violação, e, método de gerenciamento de dados de segurança para um dispositivo |
AT500770A1 (de) * | 2003-02-20 | 2006-03-15 | Siemens Ag Oesterreich | Autorisierung von transaktionen |
DE10347751B4 (de) * | 2003-10-14 | 2005-10-27 | Siemens Ag | Verfahren und Anordnungen zur Verschlüsselung von Speicherdateien auf mobilen Endgeräten |
JP4348173B2 (ja) | 2003-12-17 | 2009-10-21 | 株式会社エヌ・ティ・ティ・ドコモ | 通信端末 |
EP1596615B1 (de) * | 2004-05-10 | 2020-02-19 | Vodafone Holding GmbH | Sim-karte mit veränderbarem speicher und methode dafür |
WO2006007879A1 (en) | 2004-07-22 | 2006-01-26 | Telecom Italia S.P.A. | Method and system for improving robustness of secure messaging in a mobile communications network |
US8170603B2 (en) | 2006-08-28 | 2012-05-01 | Sony Ericsson Mobile Communications Ab | Differentiated access to a data item store |
US8171529B2 (en) * | 2009-12-17 | 2012-05-01 | Intel Corporation | Secure subscriber identity module service |
DE102012014549B4 (de) | 2012-07-21 | 2018-05-09 | Audi Ag | Schaltungsanordnung für eine Mobilfunkeinrichtung eines Kraftwagens |
CN105913247A (zh) * | 2016-03-31 | 2016-08-31 | 宇龙计算机通信科技(深圳)有限公司 | 一种esim卡的空间管理方法及装置 |
GB2552788B (en) * | 2016-08-05 | 2019-11-27 | Eseye Ltd | Loading security information |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0748135B1 (de) * | 1993-06-15 | 1998-10-28 | Celltrace Communications Limited | Telekommunikationssystem |
US5544246A (en) * | 1993-09-17 | 1996-08-06 | At&T Corp. | Smartcard adapted for a plurality of service providers and for remote installation of same |
FI99071C (fi) * | 1995-02-15 | 1997-09-25 | Nokia Mobile Phones Ltd | Menetelmä sovellusten käyttämiseksi matkaviestimessä ja matkaviestin |
FI105637B (fi) * | 1997-07-02 | 2000-09-15 | Sonera Oyj | Menetelmä tilaajaidentiteettimoduulille tallennettujen sovellusten hallintaan |
FI980085A0 (fi) * | 1998-01-16 | 1998-01-16 | Finland Telecom Oy | Kryptering av kortmeddelanden och annullering av krypteringen |
-
1999
- 1999-02-09 FI FI990256A patent/FI107860B/fi not_active IP Right Cessation
-
2000
- 2000-02-09 ES ES00903728T patent/ES2269100T3/es not_active Expired - Lifetime
- 2000-02-09 DK DK00903728T patent/DK1151625T3/da active
- 2000-02-09 WO PCT/FI2000/000092 patent/WO2000048416A1/en active IP Right Grant
- 2000-02-09 AT AT00903728T patent/ATE339859T1/de not_active IP Right Cessation
- 2000-02-09 EP EP00903728A patent/EP1151625B1/de not_active Revoked
- 2000-02-09 DE DE60030687T patent/DE60030687T2/de not_active Expired - Lifetime
- 2000-02-09 AU AU25515/00A patent/AU2551500A/en not_active Abandoned
-
2002
- 2002-02-01 HK HK02100818.8A patent/HK1040343A1/zh unknown
Also Published As
Publication number | Publication date |
---|---|
AU2551500A (en) | 2000-08-29 |
EP1151625B1 (de) | 2006-09-13 |
DK1151625T3 (da) | 2007-01-08 |
FI107860B (fi) | 2001-10-15 |
FI990256A0 (fi) | 1999-02-09 |
HK1040343A1 (zh) | 2002-05-31 |
DE60030687T2 (de) | 2007-10-04 |
WO2000048416A1 (en) | 2000-08-17 |
ES2269100T3 (es) | 2007-04-01 |
FI990256A (fi) | 2000-08-10 |
EP1151625A1 (de) | 2001-11-07 |
DE60030687D1 (de) | 2006-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE339859T1 (de) | Verfahren zur verwendung von in einem teilnehmeridentitatsmodul gespeicherten anwendung und zur sicherheitsbehandlung damit verbundener information | |
RU2258324C2 (ru) | Способ активации функций pki на интеллектуальной карте | |
CN110100422B (zh) | 基于区块链智能合约的数据写入方法、装置及存储介质 | |
ATE189351T1 (de) | Verfahren zur personalisierung einer aktiven karte | |
EP1705599A3 (de) | Datensicherheitsdienste mit algorithmusunabhängiger Architektur | |
RU97102357A (ru) | Способ секретного использования цифровых подписей в коммерческой криптографической системе | |
EP0802654A3 (de) | Verschlüsselungsverfahren, Entschlüsselungsverfahren und Beglaubigungsverfahren | |
DE59912267D1 (de) | Verfahren zur authentisierung einer chipkarte innerhalb eines nachrichtenübertragungs-netzwerks | |
GB2339518A (en) | Method for secure key management using a biometric | |
DE58909106D1 (de) | Datenträger-gesteuertes Endgerät in einem Datenaustauschsystem. | |
KR960703248A (ko) | 데이터 보호 시스템(data protection system) | |
NO970084D0 (no) | Fremgangsmåte ved sikker bruk av digitale signaturer ved et kommersielt kryptografisystem | |
CA2289452A1 (en) | Initial secret key establishment including facilities for verification of identity | |
ATE268925T1 (de) | Sichere systeme zum drucken von authentifizierenden digitalen unterschriften | |
BR9811871A (pt) | Processo para a comprovação da autencidade de um portador de dados | |
US5481612A (en) | Process for the authentication of a data processing system by another data processing system | |
WO2001037478A3 (en) | Encryption key management system using multiple smart cards | |
DK0990226T3 (da) | System til sikret læsning og bearbejdning af data på intelligente databærere | |
CN113849797A (zh) | 数据安全漏洞的修复方法、装置、设备及存储介质 | |
DE60302631D1 (de) | System und Verfahren zum Verteilen von kryptographischen Schlüsseln, Zugangspunkt und System zum Verteilen eines Authentifizierungskodes | |
GB9920502D0 (en) | Portable terminal | |
CN115499178A (zh) | 一种基于区块链技术的隐私存证系统及方法 | |
CN110545325A (zh) | 一种基于智能合约的数据加密分享方法 | |
CN110113152B (zh) | 基于非对称密钥池对和数字签名的量子通信服务站密钥协商方法和系统 | |
DE60032158D1 (de) | Verfahren zur absicherung von transaktionsdaten und system zur durchführung des verfahrens |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RER | Ceased as to paragraph 5 lit. 3 law introducing patent treaties |