AU2000275203A1 - Method for securing communications between a terminal and an additional user equipment - Google Patents

Method for securing communications between a terminal and an additional user equipment

Info

Publication number
AU2000275203A1
AU2000275203A1 AU2000275203A AU7520300A AU2000275203A1 AU 2000275203 A1 AU2000275203 A1 AU 2000275203A1 AU 2000275203 A AU2000275203 A AU 2000275203A AU 7520300 A AU7520300 A AU 7520300A AU 2000275203 A1 AU2000275203 A1 AU 2000275203A1
Authority
AU
Australia
Prior art keywords
terminal
secret
user equipment
wireless link
securing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2000275203A
Inventor
Levente Buttyan
Eric Lauper
Edwin Wiedmer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Swisscom Mobile AG
Original Assignee
Swisscom Mobile AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Swisscom Mobile AG filed Critical Swisscom Mobile AG
Publication of AU2000275203A1 publication Critical patent/AU2000275203A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/388Payment protocols; Details thereof using mutual authentication without cards, e.g. challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

Method for securing a session over a radio or infrared wireless link ( 101 ) between a terminal ( 11 ) and a mobile equipment ( 10 ), said session being secured with a SIM card ( 100 ) in said mobile equipment ( 10 ). The terminal ( 11 ) and the mobile equipment ( 10 ) both comprise a display and a keyboard or keypad and can be mutually connected through said short distance wireless link ( 101 ). The method comprises the following steps: generating a secret in one of said terminals or said smart cards, displaying this secret on the display of said terminal ( 11 ) or said user equipment ( 10 ), entering said secret or the hash value of said secret on the input means of the other one of said terminals ( 11 ) or user equipments ( 10 ), using said shared secret for securing at least a part of said session over said short distance wireless link ( 101 ).
AU2000275203A 2000-04-28 2000-09-18 Method for securing communications between a terminal and an additional user equipment Abandoned AU2000275203A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP00109220 2000-04-28
EP00109220 2000-04-28
PCT/EP2000/009121 WO2001084761A1 (en) 2000-04-28 2000-09-18 Method for securing communications between a terminal and an additional user equipment

Publications (1)

Publication Number Publication Date
AU2000275203A1 true AU2000275203A1 (en) 2001-11-12

Family

ID=8168586

Family Applications (2)

Application Number Title Priority Date Filing Date
AU2000275203A Abandoned AU2000275203A1 (en) 2000-04-28 2000-09-18 Method for securing communications between a terminal and an additional user equipment
AU65897/01A Abandoned AU6589701A (en) 2000-04-28 2001-04-23 Method for transmitting payment information between a terminal and a third equipment

Family Applications After (1)

Application Number Title Priority Date Filing Date
AU65897/01A Abandoned AU6589701A (en) 2000-04-28 2001-04-23 Method for transmitting payment information between a terminal and a third equipment

Country Status (6)

Country Link
US (1) US7409552B2 (en)
EP (2) EP1277299B1 (en)
AT (2) ATE472208T1 (en)
AU (2) AU2000275203A1 (en)
DE (2) DE60044586D1 (en)
WO (2) WO2001084761A1 (en)

Families Citing this family (97)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
AU4365801A (en) 2000-03-15 2001-09-24 Mastercard International Inc Method and system for secure payments over a computer network
US7409543B1 (en) * 2000-03-30 2008-08-05 Digitalpersona, Inc. Method and apparatus for using a third party authentication server
US6824064B2 (en) * 2000-12-06 2004-11-30 Mobile-Mind, Inc. Concurrent communication with multiple applications on a smart card
EP1391073B8 (en) * 2001-05-01 2018-09-05 OneSpan International GmbH Method and system for increasing security of a secure connection
US7444513B2 (en) 2001-05-14 2008-10-28 Nokia Corporiation Authentication in data communication
US8209753B2 (en) * 2001-06-15 2012-06-26 Activcard, Inc. Universal secure messaging for remote security tokens
US20040218762A1 (en) * 2003-04-29 2004-11-04 Eric Le Saint Universal secure messaging for cryptographic modules
WO2003012671A1 (en) 2001-07-31 2003-02-13 Mobile-Mind, Inc. Communications network with smart card
US7362869B2 (en) 2001-12-10 2008-04-22 Cryptomathic A/S Method of distributing a public key
US8140854B2 (en) * 2002-02-13 2012-03-20 Passlogy Company Ltd User authentication method and user authentication system
WO2003077581A1 (en) * 2002-03-08 2003-09-18 Sony Ericsson Mobile Communications Ab Security protection for data communication
CN1650301A (en) * 2002-03-19 2005-08-03 运通卡国际股份有限公司 Method and system for conducting a transaction using a proximity device
DE10216601A1 (en) * 2002-04-15 2003-10-30 Giesecke & Devrient Gmbh Program assurance procedures
EP1397014A1 (en) * 2002-09-04 2004-03-10 SCHLUMBERGER Systèmes WIM (WAP Identification module) Primitives for handling the secure socket layer protocol (SSL)
US7325134B2 (en) 2002-10-08 2008-01-29 Koolspan, Inc. Localized network authentication and security using tamper-resistant keys
US7574731B2 (en) * 2002-10-08 2009-08-11 Koolspan, Inc. Self-managed network access using localized access management
US7853788B2 (en) 2002-10-08 2010-12-14 Koolspan, Inc. Localized network authentication and security using tamper-resistant keys
US7607015B2 (en) * 2002-10-08 2009-10-20 Koolspan, Inc. Shared network access using different access keys
US7895443B2 (en) * 2002-11-05 2011-02-22 Safenet, Inc. Secure authentication using hardware token and computer fingerprint
DE60224590T2 (en) * 2002-11-08 2009-01-15 Nokia Corp. SOFTWARE INTEGRITY TEST FOR A MOBILE PHONE
US20040156367A1 (en) * 2003-02-11 2004-08-12 Magis Networks, Inc. Hierarchically distributed scheduling apparatus and method
CN1774687A (en) * 2003-04-14 2006-05-17 松下电器产业株式会社 Client end server authenticationn using challenge response principle
US8270609B2 (en) * 2003-06-13 2012-09-18 Broadcom Corporation Mechanism for secure transmission of signals in wireless communication devices
US20050021940A1 (en) * 2003-06-13 2005-01-27 Kenneth Ma Authentication mechanism for wireless communication devices
US7934005B2 (en) * 2003-09-08 2011-04-26 Koolspan, Inc. Subnet box
US7827409B2 (en) * 2003-10-07 2010-11-02 Koolspan, Inc. Remote secure authorization
US7725933B2 (en) * 2003-10-07 2010-05-25 Koolspan, Inc. Automatic hardware-enabled virtual private network system
KR100661313B1 (en) * 2003-12-03 2006-12-27 한국전자통신연구원 Multimedia communication system based on session initiation protocol capable of providing mobility using lifelong number
US7409715B2 (en) * 2003-12-10 2008-08-05 Alcatel Lucent Mechanism for detection of attacks based on impersonation in a wireless network
US8060745B2 (en) * 2003-12-16 2011-11-15 Seiko Epson Corporation Security for wireless transmission
US7549048B2 (en) * 2004-03-19 2009-06-16 Microsoft Corporation Efficient and secure authentication of computing systems
US7853793B2 (en) * 2004-05-03 2010-12-14 Piotr Cofta Trusted signature with key access permissions
KR101192875B1 (en) * 2004-05-19 2012-10-18 프랑스 뗄레꽁 Method And System For Generating A List Signature
EP1622333A1 (en) * 2004-07-29 2006-02-01 Sun Microsystems France S.A. Method and apparatus for minimally onerous and rapid authentification
WO2006027430A1 (en) * 2004-08-16 2006-03-16 France Telecom Method for carrying out authentication between entities communicating with one another over a telecommunications network
JP4736398B2 (en) * 2004-10-22 2011-07-27 日本電気株式会社 Authentication method between secret terminals, secret information delivery method, apparatus, system, and program
US8117452B2 (en) * 2004-11-03 2012-02-14 Cisco Technology, Inc. System and method for establishing a secure association between a dedicated appliance and a computing platform
JP2006155045A (en) 2004-11-26 2006-06-15 Sony Corp Electronic value information transmission system, and electronic value information transmission method
KR20070103046A (en) * 2005-02-04 2007-10-22 소프트뱅크비비 가부시키가이샤 Electronic money settling system, and electronic money settling method
EP1849119B1 (en) * 2005-02-18 2019-07-10 EMC Corporation Derivative seeds
US7356539B2 (en) 2005-04-04 2008-04-08 Research In Motion Limited Policy proxy
US9143323B2 (en) * 2005-04-04 2015-09-22 Blackberry Limited Securing a link between two devices
EP1710948B1 (en) * 2005-04-04 2007-03-14 Research In Motion Limited Securing a Communicaton Link Between Devices
US8316416B2 (en) 2005-04-04 2012-11-20 Research In Motion Limited Securely using a display to exchange information
US7827376B2 (en) * 2005-06-27 2010-11-02 Lenovo (Singapore) Pte. Ltd. System and method for protecting hidden protected area of HDD during operation
US7836306B2 (en) * 2005-06-29 2010-11-16 Microsoft Corporation Establishing secure mutual trust using an insecure password
EP1752937A1 (en) * 2005-07-29 2007-02-14 Research In Motion Limited System and method for encrypted smart card PIN entry
GB2435951A (en) * 2006-02-23 2007-09-12 Barclays Bank Plc System for PIN servicing
US8670566B2 (en) * 2006-05-12 2014-03-11 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral output device
DE102006028938B3 (en) * 2006-06-23 2008-02-07 Siemens Ag Method for transmitting data
US7958368B2 (en) * 2006-07-14 2011-06-07 Microsoft Corporation Password-authenticated groups
US20080046739A1 (en) * 2006-08-16 2008-02-21 Research In Motion Limited Hash of a Certificate Imported from a Smart Card
US8341411B2 (en) 2006-08-16 2012-12-25 Research In Motion Limited Enabling use of a certificate stored in a smart card
FR2910666B1 (en) * 2006-12-26 2013-02-08 Oberthur Card Syst Sa PORTABLE ELECTRONIC DEVICE AND METHOD OF SECURING SUCH A DEVICE
US8307411B2 (en) * 2007-02-09 2012-11-06 Microsoft Corporation Generic framework for EAP
KR100858146B1 (en) 2007-02-21 2008-09-10 주식회사 케이티프리텔 Method for personal authentication using mobile and subscriber identify module and device thereof
US20100293379A1 (en) * 2007-05-31 2010-11-18 Beijing Transpacific Ip Technology Development Ltd method for secure data transmission in wireless sensor network
US7907735B2 (en) 2007-06-15 2011-03-15 Koolspan, Inc. System and method of creating and sending broadcast and multicast data
WO2009038511A1 (en) * 2007-09-21 2009-03-26 Telefonaktiebolaget Lm Ericsson (Publ) All in one card
US8001381B2 (en) 2008-02-26 2011-08-16 Motorola Solutions, Inc. Method and system for mutual authentication of nodes in a wireless communication network
CA2630388A1 (en) * 2008-05-05 2009-11-05 Nima Sharifmehr Apparatus and method to prevent man in the middle attack
EP2160030B1 (en) * 2008-08-27 2016-12-21 Irdeto B.V. Multi-vendor conditional access system
ES2365887B1 (en) * 2009-05-05 2012-09-03 Scytl Secure Electronic Voting S.A. METHOD OF VERIFICATION OF DEFRYING PROCESSES
DE102009027681A1 (en) * 2009-07-14 2011-01-20 Bundesdruckerei Gmbh Method and reading attributes from an ID token
US8819792B2 (en) 2010-04-29 2014-08-26 Blackberry Limited Assignment and distribution of access credentials to mobile communication devices
WO2012002852A1 (en) * 2010-06-29 2012-01-05 Telefonaktiebolaget L M Ericsson (Publ) Methods, server, merchant device, computer programs and computer program products for setting up communication
US8644515B2 (en) * 2010-08-11 2014-02-04 Texas Instruments Incorporated Display authenticated security association
DE102010035098A1 (en) * 2010-08-23 2012-02-23 Giesecke & Devrient Gmbh Method for authenticating a portable data carrier
US8839357B2 (en) * 2010-12-22 2014-09-16 Canon U.S.A., Inc. Method, system, and computer-readable storage medium for authenticating a computing device
US9087428B1 (en) 2011-04-07 2015-07-21 Wells Fargo Bank, N.A. System and method for generating a customized user interface
US9589256B1 (en) 2011-04-07 2017-03-07 Wells Fargo Bank, N.A. Smart chaining
US9292840B1 (en) * 2011-04-07 2016-03-22 Wells Fargo Bank, N.A. ATM customer messaging systems and methods
US20140173287A1 (en) * 2011-07-11 2014-06-19 Takeshi Mizunuma Identifier management method and system
FI20115945A0 (en) * 2011-09-28 2011-09-28 Onsun Oy payment
US10263782B2 (en) * 2011-10-12 2019-04-16 Goldkey Corporation Soft-token authentication system
EP2611070A1 (en) * 2011-12-28 2013-07-03 Gemalto SA Method for establishing secure card history and audit for property hand-over
US20130311382A1 (en) 2012-05-21 2013-11-21 Klaus S. Fosmark Obtaining information for a payment transaction
US9642005B2 (en) * 2012-05-21 2017-05-02 Nexiden, Inc. Secure authentication of a user using a mobile device
JP2014048414A (en) * 2012-08-30 2014-03-17 Sony Corp Information processing device, information processing system, information processing method and program
US9398448B2 (en) * 2012-12-14 2016-07-19 Intel Corporation Enhanced wireless communication security
CN103208151B (en) * 2013-04-03 2016-08-03 天地融科技股份有限公司 Process the method and system of operation requests
JP6187251B2 (en) * 2013-12-27 2017-08-30 富士通株式会社 Data communication method and data communication apparatus
CN103987037A (en) * 2014-05-28 2014-08-13 大唐移动通信设备有限公司 Secret communication implementation method and device
FR3026875B1 (en) * 2014-10-01 2016-11-25 Avencis METHODS FOR CONFIGURING A TERMINAL DEVICE CONNECTED TO A NETWORK TO ENABLE STRONG AUTHENTICATION OF A USER
US9609512B2 (en) * 2014-10-09 2017-03-28 Userstar Information System Co., Ltd. Wireless authentication system and wireless authentication method
US9317845B1 (en) 2014-12-23 2016-04-19 Mastercard International Incorporated Flexible electronic payment transaction process
EP3048776B2 (en) * 2015-01-22 2021-03-17 Nxp B.V. Methods for managing content, computer program products and secure element
DE102015006751A1 (en) * 2015-05-26 2016-12-01 Giesecke & Devrient Gmbh Method for providing a personal identification code of a security module
DE102015225792B3 (en) * 2015-12-17 2017-04-13 Volkswagen Aktiengesellschaft A method and system for secure communication between a mobile device coupled to a smartphone and a server
US10084797B2 (en) * 2016-10-03 2018-09-25 Extreme Networks, Inc. Enhanced access security gateway
US10313134B2 (en) * 2016-10-27 2019-06-04 Denso Corporation System and method for authenticating and authorizing devices
CN106533669B (en) * 2016-11-15 2018-07-13 百度在线网络技术(北京)有限公司 The methods, devices and systems of equipment identification
CN111954878A (en) 2018-04-10 2020-11-17 维萨国际服务协会 System and method for secure device connection
KR102009863B1 (en) * 2018-12-05 2019-08-12 주식회사 후본 System for entrance security and method using the same
FR3092414B1 (en) * 2019-02-01 2021-01-08 Idemia Identity & Security France Authentication process, server and electronic identity device
JP7394867B2 (en) * 2019-05-10 2023-12-08 エヌイーシー ラボラトリーズ ヨーロッパ ゲーエムベーハー Methods and systems for device identification and monitoring

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4637051A (en) * 1983-07-18 1987-01-13 Pitney Bowes Inc. System having a character generator for printing encrypted messages
US5001752A (en) * 1989-10-13 1991-03-19 Fischer Addison M Public/key date-time notary facility
CZ9700881A3 (en) * 1994-10-27 2001-11-14 International Business Machines Corporation Method and apparatus for secure identification of a mobile user in a communication system and portable input means for making the same
CA2192017C (en) * 1995-12-08 2000-04-25 Masayuki Ohki Ic card reader/writer and method of operation thereof
FI980427A (en) * 1998-02-25 1999-08-26 Ericsson Telefon Ab L M Procedure, arrangement and device for verification
US6173400B1 (en) * 1998-07-31 2001-01-09 Sun Microsystems, Inc. Methods and systems for establishing a shared secret using an authentication token

Also Published As

Publication number Publication date
WO2001084763A2 (en) 2001-11-08
EP1277301B1 (en) 2004-07-21
EP1277299B1 (en) 2010-06-23
US20030041244A1 (en) 2003-02-27
WO2001084761A1 (en) 2001-11-08
AU6589701A (en) 2001-11-12
DE60104411T2 (en) 2005-09-22
DE60044586D1 (en) 2010-08-05
ATE271733T1 (en) 2004-08-15
ATE472208T1 (en) 2010-07-15
EP1277299A1 (en) 2003-01-22
US7409552B2 (en) 2008-08-05
DE60104411D1 (en) 2004-08-26
EP1277301A2 (en) 2003-01-22
WO2001084763A3 (en) 2002-03-28

Similar Documents

Publication Publication Date Title
AU2000275203A1 (en) Method for securing communications between a terminal and an additional user equipment
IL131020A (en) Subscribe identity module mobile station and method for performing a smart card function
AU2824499A (en) Method for loading data onto chip cards and devices adapted thereto
TW429721B (en) Method for two party authentication and key agreement
HK1083578A1 (en) Test system for checking transmission processes in a mobile radio network, and method for authenticating a mobile telephone using one such test system
WO2002077955A3 (en) Advertising terminal
AU2003292074A1 (en) Method for operating terminals of a mobile radio communication system
WO2002060210A8 (en) Method for enabling pki functions in a smart card
IL157048A0 (en) Method and apparatus for providing authentication in a communication system
IS1887B (en) Wireless communications equipment equipped with additional reader chip cards
WO2002073874A3 (en) Method and system for establishing a wireless communications link
WO2001099369A3 (en) Method and system for electronic device authentication
EP0957651A3 (en) Mobile telephone with cypher card
WO2005073931A3 (en) Transactional device with anticipated pretreatment
PT2257095E (en) Inter-working function for the authentication of a terminal in a wireless local area network
MXPA04004839A (en) Authentication of a mobile telephone.
AU1225097A (en) Method of updating user card in cellular radio system
KR20020087665A (en) Method for conducting in a PDA
WO2001076177A3 (en) Method and apparatus for a mobile station application to identify specified events
CA2412148A1 (en) Authentication system, mobile terminal, and authentication method
TW364101B (en) Mobile radio-telephone terminal
WO2001069838A3 (en) Method, and associated apparatus, for generating security keys in a communication system
MXPA03011489A (en) Method and system for establishing a wireless communications link.
WO2003061247A3 (en) Loading data in a mobile station equipment using a proactive sim card
EP1391809A4 (en) Service providing method and integrated circuit