EP1590775A1 - Support de données - Google Patents

Support de données

Info

Publication number
EP1590775A1
EP1590775A1 EP04705384A EP04705384A EP1590775A1 EP 1590775 A1 EP1590775 A1 EP 1590775A1 EP 04705384 A EP04705384 A EP 04705384A EP 04705384 A EP04705384 A EP 04705384A EP 1590775 A1 EP1590775 A1 EP 1590775A1
Authority
EP
European Patent Office
Prior art keywords
data carrier
predetermined
identifier
program unit
activated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP04705384A
Other languages
German (de)
English (en)
Inventor
Klaus Vedder
Oliver Richter
Heiko Oester
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient GmbH
Original Assignee
Giesecke and Devrient GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient GmbH filed Critical Giesecke and Devrient GmbH
Publication of EP1590775A1 publication Critical patent/EP1590775A1/fr
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3576Multiple memory zones on card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Definitions

  • the invention relates to a data carrier with an integrated circuit in which a first programming unit and at least one further programming unit are implemented, which can be activated separately from one another.
  • a predetermined program unit In the case of a data carrier in which a plurality of program units are implemented, it may be necessary for a predetermined program unit to be specifically activated, while other program units are not activated or are being switched from the activated state to the idle state. This may be necessary, for example, if different external systems that are to work together with the data carrier are each supposed to work with a different predetermined program unit of the plurality of program units.
  • the targeted activation of a predetermined program unit can be effected, for example, by manual intervention by a user in the data carrier. If the user makes a mistake or deliberately makes the wrong intervention, an incorrect program unit is activated. This can lead to faults e.g. lead during program execution and even pose a security risk if the user activates program units to which he should actually not have access.
  • the object of the invention is to provide a data carrier of the type mentioned, in which a predetermined program unit is activated by a plurality of program units implemented in the data carrier with high security and reliability, and a method for the safe and reliable operation of a data carrier with several in the Create disk implemented program units.
  • Exactly one identifier is assigned to the data carrier according to the invention according to independent claim 1.
  • the identifier can be stored in the data carrier itself or outside of the data carrier.
  • a predetermined program unit from the plurality of program units is assigned via the identifier to an external system separate from the data carrier or to a number of such external systems.
  • the identifier contains information which is specific both for a predetermined program to be activated and for an associated - at least - one external system, so that the identifier establishes an association between the program unit to be activated and the one or more external systems.
  • the data carrier thus contains a number of programming units, which as a rule belong to different external systems or lists of external systems, but is personalized or individualized with respect to a single predetermined one of the plurality of program units. Personalization is achieved by assigning the identifier corresponding to the program unit to the data carrier, e.g. the identifier is stored in a suitable manner in the data carrier or in a location accessible for the data carrier.
  • the identifier defines the assignment between the program unit and the associated external system
  • the identifier is used to immediately activate the predetermined program unit. This ensures that only such a program unit can be activated for which the external system has been given the appropriate authorization via the associated identifier.
  • Activation of a predetermined program unit is particularly reliable and safe. The activation is achieved with a corresponding activation device.
  • a data carrier is created, in which a predetermined program is activated with great security and reliability.
  • the data carrier according to the invention is assigned two or more different identifiers instead of just one identifier.
  • the data carrier has an identifier selection unit with which a predetermined identifier of the two or more identifiers can be activated. Via at least two of the identifiers, preferably via each of the identifiers, an assignment between on the one hand exactly one respective predetermined program unit is defined by the programming unit and on the other hand at least one external system separate from the data carrier.
  • the data carrier according to claim 2 is thus personalized several times in that it has several identifiers, each of which defines an association between a program unit and an external system or a list of external systems.
  • the identifiers can be stored in the data carrier itself or outside or partly inside, partly outside the data carrier.
  • a predetermined identifier is activated. This is carried out with an appropriately configured identifier selection unit.
  • the program unit associated with this predetermined identifier is then automatically activated, analogously to the data carrier according to claim 1.
  • the associated program unit that is correct for the identifier is always activated for each identifier.
  • a data carrier is created in which a predetermined program unit is activated with great security and reliability.
  • the activation of the identifier is carried out using an identifier selection element, the value of which determines which identifier is to be subsequently activated.
  • the value preferably directly activates the identifier.
  • the identifier selection element can also have the function of an identification element by means of which the data carrier can be uniquely identified from a plurality of data carriers.
  • the data carrier also has an access
  • the identifier selection element thus also has the function of an access control element (for example secret code, secret number, access key) which is used to grant or deny access to the circuit of the data carrier.
  • the simultaneous identifier selection element and access Control element thus grants access to the circuit of the data carrier and also selects the correct identifier.
  • the access control device is preferably set up for the direct activation of the identifier selection depending on the identifier selection element.
  • the access control element i.e., for example, the secret number
  • the positive test result means that the access
  • Control element matches at least one of the identifiers of the data carrier.
  • the associated program unit is assigned exactly to an external system by the respective identifier.
  • the associated program is assigned to a list of several different external systems by the respective code.
  • the external system is a data network.
  • the external system is a radio network.
  • the external system can be a telephone network, in particular in particular a mobile phone network or a subsystem of such a mobile phone network.
  • the data carrier has a communication device for communicating with at least one external system from the external systems.
  • the communication device can in particular be set up for contactless or contact-based communication and for this purpose have an antenna (e.g. coil) or contact fields or both.
  • the data carrier can e.g. be designed as a chip card, in particular as a standard chip card as used for bank cards or as a mini chip card as used for example for mobile telephones.
  • the data carrier can be designed as a token, i.e. as a compact component with a compact housing the size of a conventional interface connector for computer applications, and which is intended for connection to an interface of an electronic device.
  • the data carrier can have the functionality of a telephone card, in particular a cell phone card, for example a SIM card for a GSM cell phone network, a SIM card for GPRS data services, a USIM card for a UMTS cell phone network, an ISIM card or one corresponding identity card for a similar mobile phone network or subsystem such as the IP multimedia subsystem.
  • SIM Subscriber Identity Module
  • GSM Global System for Mobile Communications, 2G
  • GPRS General Packet Radio System
  • USIM Universal SIM
  • UMTS Universal Mobile Telecommunication System
  • the identifier forms at least part of an information element by which the data carrier is uniquely identified.
  • the information element can be configured as a subscriber identity, by means of which the data carrier can be uniquely assigned to a predetermined user of the data carrier, so that the data carrier can be uniquely identified by the predetermined user.
  • unambiguous assignability or identifiability is understood to mean, in principle, unambiguous assignability or identifiability of a user or data carrier, at least in a predetermined, finite number of users or data carriers.
  • the information element can in particular be configured as the IMSI (International Mobile Subscriber Identity) or the TMSI (Temporary Mobile Subscriber Identity) of a predetermined user for a SIM, USIM or similar card for a mobile phone network or a subsystem of such a mobile phone network.
  • IMSI International Mobile Subscriber Identity
  • TMSI Temporal Mobile Subscriber Identity
  • the information element is designed as an authentication key with which the data carrier can be authenticated with respect to the external system or the list of external systems.
  • the authentication key can be designed as an authentication key for authentication to a data network, in particular a computer network or a telephone network, in particular a cell phone network or a subsystem thereof (for example GSM, GPRS, UMTS, 4G).
  • the authentication key can also be a key for a symmetrical or for an asymmetrical crypto-algorithm.
  • the authentication key can be a key Ki provided for a symmetrical crypto-algorithm, as it is used to authenticate a mobile phone card to a mobile phone network.
  • the mobile phone network can be a GSM, GPRS or UMTS mobile phone network or an IP multimedia subsystem or a similar mobile phone network.
  • the identifier has a country code by means of which at least one predetermined country from a plurality of countries can be clearly identified.
  • the identifier has a network code by means of which at least one predetermined network from a plurality of networks can be uniquely identified.
  • a country code contained in an information element or a network code contained in the information element is used as the identifier.
  • a country code contained in an IMSI namely the MCC (Mobile Country Code)
  • a network code contained in an IMSI namely the MNC (Mobile Network Code)
  • MCC Mobile Country Code
  • MNC Mobile Network Code
  • the country code for example the MCC
  • a country-specific program unit is activated.
  • the network code for example the MNC
  • a network-specific program unit is activated which is specific for one or more networks.
  • a combination of a country code and a network code can also be used as the identifier for activating the assigned program input.
  • the activation device can be set up in such a way that only exactly one program unit can be activated at a time. This ensures that the different program units do not interfere with each other. In addition, an additional safeguard is achieved that a user only has access to the program unit to which he can explicitly access, i.e. the mechanism allows the program units to be additionally secured against accidental or improper access and thus makes the invention even more secure. Alternatively, the activation device can be set up in such a way that several program units are permitted to be activated simultaneously, so that the invention is more flexible.
  • the first and the at least one further program unit can each be designed ⁇ as a specific program.
  • each program unit can be a specific authentication algorithm of a different operator of an external system (for example a network) or a different list of several such operators.
  • an authentication algorithm assigned to the external system depending on the associated identifier, and a subsequent If the authentication algorithm expires, the data carrier is authenticated to the external system, for example a mobile telephone network, or the data carrier is mutually authenticated to the external system and the external system to the data carrier.
  • the identifier is specific to the authentication algorithm of a specific system operator (or operator list).
  • an authentication algorithm specific to the network or the network operator is activated and started subsequently.
  • the automatic activation prevents an external authentication algorithm from another network operator from being activated accidentally or intentionally. It is particularly advantageous that the fact that part of the IMSI is used for the activation ensures that the activation of an authentication algorithm is always in accordance with the authorizations assigned by the IMSI.
  • the authentication algorithm can be asymmetric, e.g. RSA
  • a symmetrical crypto-algorithm for example milenage, is preferably used for mobile radio applications.
  • the program units can be menu control algorithms from different system operators.
  • the data carrier is a chip card for a mobile phone or for a Personal Digital Assistant (PDA)
  • PDA Personal Digital Assistant
  • a different menu with, for example, a different menu structure is displayed on the screen of the respective device depending on the identifier. This means that a different menu is activated depending on the identifier.
  • a menu specific to the country specified is activated for a USIM card, depending on the country code MCC contained in the IMSI, and then started.
  • a menu control algorithm specific for the network operator is activated, for example with menu structures or graphic designs special for the network operator.
  • the country code MCC can be used to activate an authentication algorithm.
  • the program units that can be selected via the identifier can also be different types of program units.
  • the integrated circuit of the data carrier can be a pure logic circuit.
  • the integrated circuit can additionally have a memory.
  • the identifier can be at least partially stored in the memory.
  • the identifier can be stored outside the data carrier, for example in a memory belonging to the external system. If the data carrier is designed as a cell phone card, the identifier can be stored, for example, in the identity card (for example SIM card), in the cell phone to be operated with the card or at a trust center or in some cases in one of the three locations.
  • the program unit can be implemented at least partially in hardware form. Alternatively or additionally, the program unit can be implemented at least partially in software form.
  • the data carrier according to the invention is preferably operated in such a way that, before activating a program unit, the identifier is read from a memory — located in or outside the data carrier — and, once this has been done, the predetermined program unit is automatically activated using the identifier.
  • the identifier is read out together with a subscriber identity, by means of which the data carrier can be uniquely assigned to a predetermined user of the data carrier.
  • the identifier can be embedded in the subscriber identity.
  • the identifier is stored in the memory, or the identifiers are preferably during a personalization step which is carried out before the data carrier is put into operation, in particular before the program unit is activated depending on the identifier and, if appropriate, before the predetermined identifier is read out and, if appropriate, before the identifier is activated.
  • the data carrier is made at least partially identifiable to other data carriers, that is to say individualized. For example, by storing the identifier of the system operator X in a plurality of chip cards, this plurality of chip cards is individualized compared to chip cards without this identifier.
  • Such a step of “individualization” is usually referred to as personalization, even if no person-specific data can be saved.
  • the data stored in the memory during the personalization step can be specific for a person or for a chip card issuer or for an operator of an external system with which the chip card is to work, or for combinations of person, issuer and operator.
  • FIG. 1 schematically shows the activation of an authentication algorithm C as a function of an identifier MNC which stands for a network X and which forms part of an IMSI1;
  • FIG. 2 schematically shows the activation of a program unit D as a function of an identifier MNC which is used for a list of networks W,
  • FIG. 3 schematically shows the activation of a menu control algorithm I as a function of an identifier MCC which stands for a country group CI and which forms part of an IMSI3;
  • FIG. 4 schematically shows the activation of a subscriber identifier IMSI2 as a function of the PIN on a mobile phone card.
  • FIG. 1 shows schematically, in the case of a mobile phone card in a mobile phone, the activation of an authentication algorithm C 2 as a function of a network code MNC 1, which stands for a network X, and which forms part of an IMSI1 6.
  • the network code MNC 1 is used as an identifier 1 to activate an authentication algorithm C 2 by a number of au Identification algorithms A, B, C and D are used.
  • the associated IMSI1 6 including the network code MNC 1 contained in the IMSI1 6 is checked.
  • the network code MNC 1 has the value X.
  • the authentication algorithm C 2 of the operator of the network X is activated immediately.
  • FIG. 2 shows schematically, in the case of a mobile phone card, the activation of a program input D 2 as a function of a network code MNC 1, to which a list of networks W, Z is assigned, and which forms part of an IMSI26.
  • the network code MNC 1 is used as identifier 1 for activating a program unit 2 of a plurality of program units A, B, C and D.
  • an IMSI26 with a network code MNC 1 is stored in the mobile phone card.
  • a list of networks W, Z is assigned to the network code MNC 1.
  • the program unit D 2 is activated immediately.
  • the program unit D 2 is an algorithm specific to the list of networks W, Z specified in the IMSI21.
  • FIG. 3 shows schematically, in the case of a mobile phone card, the activation of a menu control algorithm I 2 as a function of a country code MCC 1 used as an identifier, which stands for a country group CI and which forms part of an IMSI 3 6.
  • a country group CI with several countries is assigned to the country code MCC 1.
  • the value CI of the country code MCC 1 is determined and in response to the Determination immediately activated the menu control algorithm 12 specific for the country group CI.
  • the IMSI 6 is stored in a memory of the mobile phone card.
  • the respective IMSI 6 is read out from the memory and checked, and as soon as this happens, the program unit 2 is automatically activated immediately, which corresponds to the identifier 1 in the IMSI 6.
  • the IMSI 6 can be replaced by another IMSI 6 (e.g. via the air interface) during the life cycle of the card, which, if the identifier 1 is thereby changed, usually. another specific program unit 2 is also activated.
  • FIG. 4 shows schematically the activation of a subscriber identifier IMSI2 6 as a function of the PIN 4 in a cell phone card in a cell phone.
  • Three subscriber identities IMSI1, IMSI2 and IMSI3 are stored on the mobile phone card (SIM card).
  • SIM card mobile phone card
  • the three subscriber identities are, for example, different identities for private and business uses of the owner of the mobile phone, for which the charges are to be billed separately and / or for the separate telephone books, are stored on the SIM card.
  • the cell phone user enters a PIN 4 into the cell phone.
  • the PIN 4 is assigned to an identifier 1 by which part of an IMSI2 6 is formed.
  • the IMSI2 6 sub-identity is automatically activated. This activates in particular the identifier 1 contained in the IMSI2 6.
  • the further course of the process may be that shown in FIG. 2, for example.
  • the network code MNC 1 is used as identifier 1.
  • the algorithm D 2 is activated immediately.
  • an identifier 1 belonging to the PIN 4 for example MNC W, Z, is immediately activated and then in response to the activation of identifier 1, for example MNC W, Z, the associated one Algorithm 2, eg D, activated immediately.
  • the authentication key Ki 6.1 is loaded from the memory of the SIM card and, in response to the loading of the key Ki 6, one of several authentication algorithms stored on the SIM card is automatically activated and played.
  • a table specifies the values of the key Ki 6, 1 for which authentication algorithm 2 is activated and called.
  • the identifier 1 matches the information element 6 and is designed as the authentication key Ki 6.
  • the authentication key Ki 6.1 can be replaced by another authentication key Ki 6.1 in the course of the life cycle of the chip card (SIM card).
  • the desired authentication key Ki 6.1 can, for example, be selected via the PIN 4, as described above for the IMSI. This selection via the PIN 4 can in particular be carried out automatically, so that as soon as the correct PIN 4 has been entered, the correct authentication key Ki 6.1 is activated immediately and automatically and the correct authentication algorithm 2 is then activated immediately and automatically.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un support de données comprenant un circuit intégré dans lequel sont implémentées au moins deux unités de programme qui sont assignées à différents systèmes externes et qui peuvent être activées séparément. A ce support de données est attribuée précisément une identification (1) par l'intermédiaire de laquelle est définie une affectation entre précisément une des unités de programme et au moins un système externe. En fonction de l'identification (1), l'unité de programme (2) est activée directement. Dans une variante, plusieurs identifications sont attribuées au support de données et, en fonction d'un élément de sélection d'identification (4), une des identifications est activée directement dans un premier temps, puis son unité de programme est activée directement. L'invention permet ainsi de protéger l'activation d'unités de programme de sorte qu'un utilisateur ne puisse accéder, par erreur ou intentionnellement, à des unités de programme auxquelles il ne devrait normalement pas avoir accès.
EP04705384A 2003-01-28 2004-01-27 Support de données Ceased EP1590775A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE2003103226 DE10303226A1 (de) 2003-01-28 2003-01-28 Datenträger
DE10303226 2003-01-28
PCT/EP2004/000690 WO2004068425A1 (fr) 2003-01-28 2004-01-27 Support de donnees

Publications (1)

Publication Number Publication Date
EP1590775A1 true EP1590775A1 (fr) 2005-11-02

Family

ID=32694987

Family Applications (1)

Application Number Title Priority Date Filing Date
EP04705384A Ceased EP1590775A1 (fr) 2003-01-28 2004-01-27 Support de données

Country Status (3)

Country Link
EP (1) EP1590775A1 (fr)
DE (1) DE10303226A1 (fr)
WO (1) WO2004068425A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101501010B1 (ko) 2013-09-23 2015-03-18 글로벌더원코리아(주) 차량용 매트의 재봉장치

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0786915A2 (fr) * 1996-01-23 1997-07-30 Kokusai Denshin Denwa Co., Ltd Dispositif d'identification d'un abonné/terminal mobile
DE19828735A1 (de) * 1998-06-29 1999-12-30 Giesecke & Devrient Gmbh Mobilfunksystem mit dynamisch änderbarer Identität
WO2002021872A1 (fr) * 2000-09-08 2002-03-14 Transatel Procede et dispositif de connexion d'un terminal a plusieurs reseaux de telecommunications

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19811646C2 (de) * 1998-03-18 2002-11-14 Kathrin Schier Multifunktions-Chipkarte
DE19831345C2 (de) * 1998-07-13 2002-01-24 Siemens Ag Verfahren und Funk-Kommunikationssystem zum Rufen einer Mobilstation
IT1317991B1 (it) * 2000-06-23 2003-07-21 Ipm Ind Politecnica Meridiona Dispositivo lettore di smart card con interfaccia usb per collegamento a personal computer e simili
DE10123346A1 (de) * 2001-05-14 2002-11-28 Cambiz Seyed-Asgari Verfahren zur Codierung und Decodierung von Zugangscodes für elektronische durch Zugangscodes gesicherte Systeme
DE10159398A1 (de) * 2001-12-04 2003-06-12 Giesecke & Devrient Gmbh Speichern von und Zugreifen auf Daten in einem Mobilgerät und einem Benutzermodul

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0786915A2 (fr) * 1996-01-23 1997-07-30 Kokusai Denshin Denwa Co., Ltd Dispositif d'identification d'un abonné/terminal mobile
DE19828735A1 (de) * 1998-06-29 1999-12-30 Giesecke & Devrient Gmbh Mobilfunksystem mit dynamisch änderbarer Identität
WO2002021872A1 (fr) * 2000-09-08 2002-03-14 Transatel Procede et dispositif de connexion d'un terminal a plusieurs reseaux de telecommunications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2004068425A1 *

Also Published As

Publication number Publication date
WO2004068425A1 (fr) 2004-08-12
DE10303226A1 (de) 2004-08-12

Similar Documents

Publication Publication Date Title
DE69637053T2 (de) Personalisierung von Teilnehmeridentifikationsmodulen für Mobiltelefone über Funk
EP2898714B1 (fr) Module d'identite pour l'authentification d'un utilisateur dans un reseau de communication
DE69736384T2 (de) Verwaltung von authentifizierungsschlüsseln in einem mobilen kommunikationssystem
DE69730712T2 (de) Kommunikationssystem mit gesicherter, unabhängiger verwaltung mehrerer anwendungen pro gebraucherkarte, gebraucherkarte und verwaltungsverfahren dafür
DE602005000552T2 (de) Drahtlose Zugangskontrolle für Telematik- und Sprachdienste
EP2910039B1 (fr) Procédé pour introduire des données d'identité d'abonné dans un module d'identités d'abonné
DE112015003902T5 (de) Durchsetzen von Dienstrichtlinien in eingebetteten UICC-Karten
WO2015158434A1 (fr) Procédé et dispositif pour faire fonctionner un terminal mobile dans un réseau de radiotéléphonie
EP2673731B1 (fr) Procédé de programmation d'une puce pour terminal mobile
DE102005062131A1 (de) Autorisierungsmodul für Mobilfunkgeräte mit NFC-Funktionalität
DE19645937A1 (de) Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung
EP1377091A1 (fr) Contrôle d'accès à des applications dans une carte à puce dans un réseau de télécommunications
WO2000069204A1 (fr) Procede pour la protection de la premiere utilisation d'une carte a puce microprocesseur
EP2688327B1 (fr) Activation de données d'identité de participants
EP1875765B1 (fr) Procede pour rejeter un appel d'urgence sur des terminaux de telephonie mobile
EP1590775A1 (fr) Support de données
EP1860595B1 (fr) Carte à puce dotée dýau moins deux identités
DE19645936A1 (de) Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung
DE10132585A1 (de) Mobiltelefon
DE102021005869A1 (de) Verfahren zum Ändern eines Zugriffsrechts in einer UICC
EP1869921B1 (fr) Procede pour ameliorer la securite contre l'utilisation abusive d'une carte a puce et carte a puce pour realiser ce procede
EP3085134B1 (fr) Procédé et dispositifs de gestion de souscriptions sur un élément de sécurité
WO2007036341A1 (fr) Deblocage de cartes de telephonie mobile
EP3085049B1 (fr) Procede et appareil d'activation d'un abonnement pour communication sur un réseau sans fil
WO2004064363A1 (fr) Procede de rejet d'appels entrants en fonction d'un controle du numero d'appelant effectue sur la carte sim

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050829

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL LT LV MK

DAX Request for extension of the european patent (deleted)
RIN1 Information on inventor provided before grant (corrected)

Inventor name: OESTER, HEIKO

Inventor name: RICHTER, OLIVER

Inventor name: VEDDER, KLAUS

17Q First examination report despatched

Effective date: 20110407

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20111103