EP1590775A1 - Support de données - Google Patents
Support de donnéesInfo
- Publication number
- EP1590775A1 EP1590775A1 EP04705384A EP04705384A EP1590775A1 EP 1590775 A1 EP1590775 A1 EP 1590775A1 EP 04705384 A EP04705384 A EP 04705384A EP 04705384 A EP04705384 A EP 04705384A EP 1590775 A1 EP1590775 A1 EP 1590775A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- data carrier
- predetermined
- identifier
- program unit
- activated
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3576—Multiple memory zones on card
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Definitions
- the invention relates to a data carrier with an integrated circuit in which a first programming unit and at least one further programming unit are implemented, which can be activated separately from one another.
- a predetermined program unit In the case of a data carrier in which a plurality of program units are implemented, it may be necessary for a predetermined program unit to be specifically activated, while other program units are not activated or are being switched from the activated state to the idle state. This may be necessary, for example, if different external systems that are to work together with the data carrier are each supposed to work with a different predetermined program unit of the plurality of program units.
- the targeted activation of a predetermined program unit can be effected, for example, by manual intervention by a user in the data carrier. If the user makes a mistake or deliberately makes the wrong intervention, an incorrect program unit is activated. This can lead to faults e.g. lead during program execution and even pose a security risk if the user activates program units to which he should actually not have access.
- the object of the invention is to provide a data carrier of the type mentioned, in which a predetermined program unit is activated by a plurality of program units implemented in the data carrier with high security and reliability, and a method for the safe and reliable operation of a data carrier with several in the Create disk implemented program units.
- Exactly one identifier is assigned to the data carrier according to the invention according to independent claim 1.
- the identifier can be stored in the data carrier itself or outside of the data carrier.
- a predetermined program unit from the plurality of program units is assigned via the identifier to an external system separate from the data carrier or to a number of such external systems.
- the identifier contains information which is specific both for a predetermined program to be activated and for an associated - at least - one external system, so that the identifier establishes an association between the program unit to be activated and the one or more external systems.
- the data carrier thus contains a number of programming units, which as a rule belong to different external systems or lists of external systems, but is personalized or individualized with respect to a single predetermined one of the plurality of program units. Personalization is achieved by assigning the identifier corresponding to the program unit to the data carrier, e.g. the identifier is stored in a suitable manner in the data carrier or in a location accessible for the data carrier.
- the identifier defines the assignment between the program unit and the associated external system
- the identifier is used to immediately activate the predetermined program unit. This ensures that only such a program unit can be activated for which the external system has been given the appropriate authorization via the associated identifier.
- Activation of a predetermined program unit is particularly reliable and safe. The activation is achieved with a corresponding activation device.
- a data carrier is created, in which a predetermined program is activated with great security and reliability.
- the data carrier according to the invention is assigned two or more different identifiers instead of just one identifier.
- the data carrier has an identifier selection unit with which a predetermined identifier of the two or more identifiers can be activated. Via at least two of the identifiers, preferably via each of the identifiers, an assignment between on the one hand exactly one respective predetermined program unit is defined by the programming unit and on the other hand at least one external system separate from the data carrier.
- the data carrier according to claim 2 is thus personalized several times in that it has several identifiers, each of which defines an association between a program unit and an external system or a list of external systems.
- the identifiers can be stored in the data carrier itself or outside or partly inside, partly outside the data carrier.
- a predetermined identifier is activated. This is carried out with an appropriately configured identifier selection unit.
- the program unit associated with this predetermined identifier is then automatically activated, analogously to the data carrier according to claim 1.
- the associated program unit that is correct for the identifier is always activated for each identifier.
- a data carrier is created in which a predetermined program unit is activated with great security and reliability.
- the activation of the identifier is carried out using an identifier selection element, the value of which determines which identifier is to be subsequently activated.
- the value preferably directly activates the identifier.
- the identifier selection element can also have the function of an identification element by means of which the data carrier can be uniquely identified from a plurality of data carriers.
- the data carrier also has an access
- the identifier selection element thus also has the function of an access control element (for example secret code, secret number, access key) which is used to grant or deny access to the circuit of the data carrier.
- the simultaneous identifier selection element and access Control element thus grants access to the circuit of the data carrier and also selects the correct identifier.
- the access control device is preferably set up for the direct activation of the identifier selection depending on the identifier selection element.
- the access control element i.e., for example, the secret number
- the positive test result means that the access
- Control element matches at least one of the identifiers of the data carrier.
- the associated program unit is assigned exactly to an external system by the respective identifier.
- the associated program is assigned to a list of several different external systems by the respective code.
- the external system is a data network.
- the external system is a radio network.
- the external system can be a telephone network, in particular in particular a mobile phone network or a subsystem of such a mobile phone network.
- the data carrier has a communication device for communicating with at least one external system from the external systems.
- the communication device can in particular be set up for contactless or contact-based communication and for this purpose have an antenna (e.g. coil) or contact fields or both.
- the data carrier can e.g. be designed as a chip card, in particular as a standard chip card as used for bank cards or as a mini chip card as used for example for mobile telephones.
- the data carrier can be designed as a token, i.e. as a compact component with a compact housing the size of a conventional interface connector for computer applications, and which is intended for connection to an interface of an electronic device.
- the data carrier can have the functionality of a telephone card, in particular a cell phone card, for example a SIM card for a GSM cell phone network, a SIM card for GPRS data services, a USIM card for a UMTS cell phone network, an ISIM card or one corresponding identity card for a similar mobile phone network or subsystem such as the IP multimedia subsystem.
- SIM Subscriber Identity Module
- GSM Global System for Mobile Communications, 2G
- GPRS General Packet Radio System
- USIM Universal SIM
- UMTS Universal Mobile Telecommunication System
- the identifier forms at least part of an information element by which the data carrier is uniquely identified.
- the information element can be configured as a subscriber identity, by means of which the data carrier can be uniquely assigned to a predetermined user of the data carrier, so that the data carrier can be uniquely identified by the predetermined user.
- unambiguous assignability or identifiability is understood to mean, in principle, unambiguous assignability or identifiability of a user or data carrier, at least in a predetermined, finite number of users or data carriers.
- the information element can in particular be configured as the IMSI (International Mobile Subscriber Identity) or the TMSI (Temporary Mobile Subscriber Identity) of a predetermined user for a SIM, USIM or similar card for a mobile phone network or a subsystem of such a mobile phone network.
- IMSI International Mobile Subscriber Identity
- TMSI Temporal Mobile Subscriber Identity
- the information element is designed as an authentication key with which the data carrier can be authenticated with respect to the external system or the list of external systems.
- the authentication key can be designed as an authentication key for authentication to a data network, in particular a computer network or a telephone network, in particular a cell phone network or a subsystem thereof (for example GSM, GPRS, UMTS, 4G).
- the authentication key can also be a key for a symmetrical or for an asymmetrical crypto-algorithm.
- the authentication key can be a key Ki provided for a symmetrical crypto-algorithm, as it is used to authenticate a mobile phone card to a mobile phone network.
- the mobile phone network can be a GSM, GPRS or UMTS mobile phone network or an IP multimedia subsystem or a similar mobile phone network.
- the identifier has a country code by means of which at least one predetermined country from a plurality of countries can be clearly identified.
- the identifier has a network code by means of which at least one predetermined network from a plurality of networks can be uniquely identified.
- a country code contained in an information element or a network code contained in the information element is used as the identifier.
- a country code contained in an IMSI namely the MCC (Mobile Country Code)
- a network code contained in an IMSI namely the MNC (Mobile Network Code)
- MCC Mobile Country Code
- MNC Mobile Network Code
- the country code for example the MCC
- a country-specific program unit is activated.
- the network code for example the MNC
- a network-specific program unit is activated which is specific for one or more networks.
- a combination of a country code and a network code can also be used as the identifier for activating the assigned program input.
- the activation device can be set up in such a way that only exactly one program unit can be activated at a time. This ensures that the different program units do not interfere with each other. In addition, an additional safeguard is achieved that a user only has access to the program unit to which he can explicitly access, i.e. the mechanism allows the program units to be additionally secured against accidental or improper access and thus makes the invention even more secure. Alternatively, the activation device can be set up in such a way that several program units are permitted to be activated simultaneously, so that the invention is more flexible.
- the first and the at least one further program unit can each be designed ⁇ as a specific program.
- each program unit can be a specific authentication algorithm of a different operator of an external system (for example a network) or a different list of several such operators.
- an authentication algorithm assigned to the external system depending on the associated identifier, and a subsequent If the authentication algorithm expires, the data carrier is authenticated to the external system, for example a mobile telephone network, or the data carrier is mutually authenticated to the external system and the external system to the data carrier.
- the identifier is specific to the authentication algorithm of a specific system operator (or operator list).
- an authentication algorithm specific to the network or the network operator is activated and started subsequently.
- the automatic activation prevents an external authentication algorithm from another network operator from being activated accidentally or intentionally. It is particularly advantageous that the fact that part of the IMSI is used for the activation ensures that the activation of an authentication algorithm is always in accordance with the authorizations assigned by the IMSI.
- the authentication algorithm can be asymmetric, e.g. RSA
- a symmetrical crypto-algorithm for example milenage, is preferably used for mobile radio applications.
- the program units can be menu control algorithms from different system operators.
- the data carrier is a chip card for a mobile phone or for a Personal Digital Assistant (PDA)
- PDA Personal Digital Assistant
- a different menu with, for example, a different menu structure is displayed on the screen of the respective device depending on the identifier. This means that a different menu is activated depending on the identifier.
- a menu specific to the country specified is activated for a USIM card, depending on the country code MCC contained in the IMSI, and then started.
- a menu control algorithm specific for the network operator is activated, for example with menu structures or graphic designs special for the network operator.
- the country code MCC can be used to activate an authentication algorithm.
- the program units that can be selected via the identifier can also be different types of program units.
- the integrated circuit of the data carrier can be a pure logic circuit.
- the integrated circuit can additionally have a memory.
- the identifier can be at least partially stored in the memory.
- the identifier can be stored outside the data carrier, for example in a memory belonging to the external system. If the data carrier is designed as a cell phone card, the identifier can be stored, for example, in the identity card (for example SIM card), in the cell phone to be operated with the card or at a trust center or in some cases in one of the three locations.
- the program unit can be implemented at least partially in hardware form. Alternatively or additionally, the program unit can be implemented at least partially in software form.
- the data carrier according to the invention is preferably operated in such a way that, before activating a program unit, the identifier is read from a memory — located in or outside the data carrier — and, once this has been done, the predetermined program unit is automatically activated using the identifier.
- the identifier is read out together with a subscriber identity, by means of which the data carrier can be uniquely assigned to a predetermined user of the data carrier.
- the identifier can be embedded in the subscriber identity.
- the identifier is stored in the memory, or the identifiers are preferably during a personalization step which is carried out before the data carrier is put into operation, in particular before the program unit is activated depending on the identifier and, if appropriate, before the predetermined identifier is read out and, if appropriate, before the identifier is activated.
- the data carrier is made at least partially identifiable to other data carriers, that is to say individualized. For example, by storing the identifier of the system operator X in a plurality of chip cards, this plurality of chip cards is individualized compared to chip cards without this identifier.
- Such a step of “individualization” is usually referred to as personalization, even if no person-specific data can be saved.
- the data stored in the memory during the personalization step can be specific for a person or for a chip card issuer or for an operator of an external system with which the chip card is to work, or for combinations of person, issuer and operator.
- FIG. 1 schematically shows the activation of an authentication algorithm C as a function of an identifier MNC which stands for a network X and which forms part of an IMSI1;
- FIG. 2 schematically shows the activation of a program unit D as a function of an identifier MNC which is used for a list of networks W,
- FIG. 3 schematically shows the activation of a menu control algorithm I as a function of an identifier MCC which stands for a country group CI and which forms part of an IMSI3;
- FIG. 4 schematically shows the activation of a subscriber identifier IMSI2 as a function of the PIN on a mobile phone card.
- FIG. 1 shows schematically, in the case of a mobile phone card in a mobile phone, the activation of an authentication algorithm C 2 as a function of a network code MNC 1, which stands for a network X, and which forms part of an IMSI1 6.
- the network code MNC 1 is used as an identifier 1 to activate an authentication algorithm C 2 by a number of au Identification algorithms A, B, C and D are used.
- the associated IMSI1 6 including the network code MNC 1 contained in the IMSI1 6 is checked.
- the network code MNC 1 has the value X.
- the authentication algorithm C 2 of the operator of the network X is activated immediately.
- FIG. 2 shows schematically, in the case of a mobile phone card, the activation of a program input D 2 as a function of a network code MNC 1, to which a list of networks W, Z is assigned, and which forms part of an IMSI26.
- the network code MNC 1 is used as identifier 1 for activating a program unit 2 of a plurality of program units A, B, C and D.
- an IMSI26 with a network code MNC 1 is stored in the mobile phone card.
- a list of networks W, Z is assigned to the network code MNC 1.
- the program unit D 2 is activated immediately.
- the program unit D 2 is an algorithm specific to the list of networks W, Z specified in the IMSI21.
- FIG. 3 shows schematically, in the case of a mobile phone card, the activation of a menu control algorithm I 2 as a function of a country code MCC 1 used as an identifier, which stands for a country group CI and which forms part of an IMSI 3 6.
- a country group CI with several countries is assigned to the country code MCC 1.
- the value CI of the country code MCC 1 is determined and in response to the Determination immediately activated the menu control algorithm 12 specific for the country group CI.
- the IMSI 6 is stored in a memory of the mobile phone card.
- the respective IMSI 6 is read out from the memory and checked, and as soon as this happens, the program unit 2 is automatically activated immediately, which corresponds to the identifier 1 in the IMSI 6.
- the IMSI 6 can be replaced by another IMSI 6 (e.g. via the air interface) during the life cycle of the card, which, if the identifier 1 is thereby changed, usually. another specific program unit 2 is also activated.
- FIG. 4 shows schematically the activation of a subscriber identifier IMSI2 6 as a function of the PIN 4 in a cell phone card in a cell phone.
- Three subscriber identities IMSI1, IMSI2 and IMSI3 are stored on the mobile phone card (SIM card).
- SIM card mobile phone card
- the three subscriber identities are, for example, different identities for private and business uses of the owner of the mobile phone, for which the charges are to be billed separately and / or for the separate telephone books, are stored on the SIM card.
- the cell phone user enters a PIN 4 into the cell phone.
- the PIN 4 is assigned to an identifier 1 by which part of an IMSI2 6 is formed.
- the IMSI2 6 sub-identity is automatically activated. This activates in particular the identifier 1 contained in the IMSI2 6.
- the further course of the process may be that shown in FIG. 2, for example.
- the network code MNC 1 is used as identifier 1.
- the algorithm D 2 is activated immediately.
- an identifier 1 belonging to the PIN 4 for example MNC W, Z, is immediately activated and then in response to the activation of identifier 1, for example MNC W, Z, the associated one Algorithm 2, eg D, activated immediately.
- the authentication key Ki 6.1 is loaded from the memory of the SIM card and, in response to the loading of the key Ki 6, one of several authentication algorithms stored on the SIM card is automatically activated and played.
- a table specifies the values of the key Ki 6, 1 for which authentication algorithm 2 is activated and called.
- the identifier 1 matches the information element 6 and is designed as the authentication key Ki 6.
- the authentication key Ki 6.1 can be replaced by another authentication key Ki 6.1 in the course of the life cycle of the chip card (SIM card).
- the desired authentication key Ki 6.1 can, for example, be selected via the PIN 4, as described above for the IMSI. This selection via the PIN 4 can in particular be carried out automatically, so that as soon as the correct PIN 4 has been entered, the correct authentication key Ki 6.1 is activated immediately and automatically and the correct authentication algorithm 2 is then activated immediately and automatically.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE2003103226 DE10303226A1 (de) | 2003-01-28 | 2003-01-28 | Datenträger |
DE10303226 | 2003-01-28 | ||
PCT/EP2004/000690 WO2004068425A1 (fr) | 2003-01-28 | 2004-01-27 | Support de donnees |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1590775A1 true EP1590775A1 (fr) | 2005-11-02 |
Family
ID=32694987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP04705384A Ceased EP1590775A1 (fr) | 2003-01-28 | 2004-01-27 | Support de données |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1590775A1 (fr) |
DE (1) | DE10303226A1 (fr) |
WO (1) | WO2004068425A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101501010B1 (ko) | 2013-09-23 | 2015-03-18 | 글로벌더원코리아(주) | 차량용 매트의 재봉장치 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0786915A2 (fr) * | 1996-01-23 | 1997-07-30 | Kokusai Denshin Denwa Co., Ltd | Dispositif d'identification d'un abonné/terminal mobile |
DE19828735A1 (de) * | 1998-06-29 | 1999-12-30 | Giesecke & Devrient Gmbh | Mobilfunksystem mit dynamisch änderbarer Identität |
WO2002021872A1 (fr) * | 2000-09-08 | 2002-03-14 | Transatel | Procede et dispositif de connexion d'un terminal a plusieurs reseaux de telecommunications |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE19811646C2 (de) * | 1998-03-18 | 2002-11-14 | Kathrin Schier | Multifunktions-Chipkarte |
DE19831345C2 (de) * | 1998-07-13 | 2002-01-24 | Siemens Ag | Verfahren und Funk-Kommunikationssystem zum Rufen einer Mobilstation |
IT1317991B1 (it) * | 2000-06-23 | 2003-07-21 | Ipm Ind Politecnica Meridiona | Dispositivo lettore di smart card con interfaccia usb per collegamento a personal computer e simili |
DE10123346A1 (de) * | 2001-05-14 | 2002-11-28 | Cambiz Seyed-Asgari | Verfahren zur Codierung und Decodierung von Zugangscodes für elektronische durch Zugangscodes gesicherte Systeme |
DE10159398A1 (de) * | 2001-12-04 | 2003-06-12 | Giesecke & Devrient Gmbh | Speichern von und Zugreifen auf Daten in einem Mobilgerät und einem Benutzermodul |
-
2003
- 2003-01-28 DE DE2003103226 patent/DE10303226A1/de not_active Withdrawn
-
2004
- 2004-01-27 WO PCT/EP2004/000690 patent/WO2004068425A1/fr active Search and Examination
- 2004-01-27 EP EP04705384A patent/EP1590775A1/fr not_active Ceased
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0786915A2 (fr) * | 1996-01-23 | 1997-07-30 | Kokusai Denshin Denwa Co., Ltd | Dispositif d'identification d'un abonné/terminal mobile |
DE19828735A1 (de) * | 1998-06-29 | 1999-12-30 | Giesecke & Devrient Gmbh | Mobilfunksystem mit dynamisch änderbarer Identität |
WO2002021872A1 (fr) * | 2000-09-08 | 2002-03-14 | Transatel | Procede et dispositif de connexion d'un terminal a plusieurs reseaux de telecommunications |
Non-Patent Citations (1)
Title |
---|
See also references of WO2004068425A1 * |
Also Published As
Publication number | Publication date |
---|---|
WO2004068425A1 (fr) | 2004-08-12 |
DE10303226A1 (de) | 2004-08-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69637053T2 (de) | Personalisierung von Teilnehmeridentifikationsmodulen für Mobiltelefone über Funk | |
EP2898714B1 (fr) | Module d'identite pour l'authentification d'un utilisateur dans un reseau de communication | |
DE69736384T2 (de) | Verwaltung von authentifizierungsschlüsseln in einem mobilen kommunikationssystem | |
DE69730712T2 (de) | Kommunikationssystem mit gesicherter, unabhängiger verwaltung mehrerer anwendungen pro gebraucherkarte, gebraucherkarte und verwaltungsverfahren dafür | |
DE602005000552T2 (de) | Drahtlose Zugangskontrolle für Telematik- und Sprachdienste | |
EP2910039B1 (fr) | Procédé pour introduire des données d'identité d'abonné dans un module d'identités d'abonné | |
DE112015003902T5 (de) | Durchsetzen von Dienstrichtlinien in eingebetteten UICC-Karten | |
WO2015158434A1 (fr) | Procédé et dispositif pour faire fonctionner un terminal mobile dans un réseau de radiotéléphonie | |
EP2673731B1 (fr) | Procédé de programmation d'une puce pour terminal mobile | |
DE102005062131A1 (de) | Autorisierungsmodul für Mobilfunkgeräte mit NFC-Funktionalität | |
DE19645937A1 (de) | Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung | |
EP1377091A1 (fr) | Contrôle d'accès à des applications dans une carte à puce dans un réseau de télécommunications | |
WO2000069204A1 (fr) | Procede pour la protection de la premiere utilisation d'une carte a puce microprocesseur | |
EP2688327B1 (fr) | Activation de données d'identité de participants | |
EP1875765B1 (fr) | Procede pour rejeter un appel d'urgence sur des terminaux de telephonie mobile | |
EP1590775A1 (fr) | Support de données | |
EP1860595B1 (fr) | Carte à puce dotée dýau moins deux identités | |
DE19645936A1 (de) | Verfahren und System zum personenabhängigen Steuern einer Telekommunikations-Endeinrichtung | |
DE10132585A1 (de) | Mobiltelefon | |
DE102021005869A1 (de) | Verfahren zum Ändern eines Zugriffsrechts in einer UICC | |
EP1869921B1 (fr) | Procede pour ameliorer la securite contre l'utilisation abusive d'une carte a puce et carte a puce pour realiser ce procede | |
EP3085134B1 (fr) | Procédé et dispositifs de gestion de souscriptions sur un élément de sécurité | |
WO2007036341A1 (fr) | Deblocage de cartes de telephonie mobile | |
EP3085049B1 (fr) | Procede et appareil d'activation d'un abonnement pour communication sur un réseau sans fil | |
WO2004064363A1 (fr) | Procede de rejet d'appels entrants en fonction d'un controle du numero d'appelant effectue sur la carte sim |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050829 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
DAX | Request for extension of the european patent (deleted) | ||
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: OESTER, HEIKO Inventor name: RICHTER, OLIVER Inventor name: VEDDER, KLAUS |
|
17Q | First examination report despatched |
Effective date: 20110407 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20111103 |