EP1872507A2 - Method and device for accessing a sim card housed in a mobile terminal - Google Patents
Method and device for accessing a sim card housed in a mobile terminalInfo
- Publication number
- EP1872507A2 EP1872507A2 EP06743638A EP06743638A EP1872507A2 EP 1872507 A2 EP1872507 A2 EP 1872507A2 EP 06743638 A EP06743638 A EP 06743638A EP 06743638 A EP06743638 A EP 06743638A EP 1872507 A2 EP1872507 A2 EP 1872507A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- cryptographic
- terminal
- sim card
- entity
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Definitions
- the invention relates to the field of secure telecommunications, and in particular remote services secured by public key systems.
- secure services include, for example, VPN connections to a corporate private network from an Internet network, online electronic signature, or SSL person authentication.
- a cryptographic key of a public key algorithm includes a public part and a private part.
- the public part is generally distributed without restriction to different users.
- the validity of a certificate attests to the trust that one can have in the public key associated with an identity.
- a standard certificate used on the Internet is the X.509v3. This standard defines a certificate including: - the public key to be certified;
- attributes defining the rights of use of the key message signing key or secure Internet server key for example; and a cryptographic signature of these data by the private key of a certification authority issuing the certificate.
- a PKI public key infrastructure (known as the Public Key Infrastructure) is used for certificate management.
- a PKI infrastructure serves on the one hand to create certificates but also to manage their life (revocation, renewal ).
- the VPN technique establishes an encrypted IP tunnel between the user's terminal and the corporate network.
- the VPN technology is usually low * ed on an authentication and encryption architecture based on a password OTP (One Time Password) generated single use by a calculator, on a PKI architecture based on certificates and signature algorithms stored in the hard disk of the user's terminal, on a smart card inserted into a card reader connected to the user's terminal, or on a smart card integrated in a dongle connected to the USB port of the user's terminal.
- OTP One Time Password
- a smart card inserted into a card reader in credit card format, or integrated in a USB dongle requires the user to have an additional smart card causing additional cost and risk of being lost.
- a smart card in credit card format requires the user to have a card reader.
- a SIM card of his mobile phone needs to be transferred to a card reader of the terminal to be used during a certificate generation. This transfer operation is not easy, especially since the SIM card is in "micro-SIM" format of reduced dimensions.
- the present invention aims to overcome these disadvantages.
- the invention also aims to make it possible to exploit public key cryptography applications.
- the invention thus relates to a cryptographic device comprising a terminal and a mobile telephone capable of exchanging data via a non-wired link, said cryptographic device being able to implement public key cryptographic protocols with other cryptographic entities, and the secret key of the cryptographic device being stored in the mobile phone and not in the terminal.
- said terminal is able to establish a wired or non-wired link with another cryptographic entity and able to exchange data with said cryptographic entity via this link.
- said other cryptographic entity is an access server to a computer network, and said data exchanges allow the terminal to authenticate with said server.
- the invention also relates to a method for implementing a public key cryptographic operation, comprising a step of implementing public key cryptographic protocols between at least one cryptographic entity and a device comprising a mobile telephone storing a secret key of the device and comprising a terminal not storing said secret key, said terminal and said mobile phone exchanging data over a wireless link.
- the data exchanges of said cryptographic protocols between said cryptographic entity and said device are carried out by a wired or non-wired link between said terminal and said other cryptographic entity.
- said other cryptographic entity is an access server to a computer network and said data exchanges are authentication exchanges of said terminal with said server.
- FIG. 1 represents a user station connected in VPN to a private network, according to the invention
- FIG. 2 represents the different software layers implemented in the user station, according to the invention.
- FIG. 3 details the implementation of various PKCS # 11 functions
- FIG. 4 represents a user station connected to a signed documents publication server.
- the invention proposes to exploit the capabilities of a smart card housed in a mobile terminal and having public key cryptography applications.
- the smart card is then used as a cryptographic calculation tool in a PKI architecture, for example to implement authentication, encryption or signature functions.
- a terminal connected to a network has a wireless link with the mobile terminal and a library of cryptographic functions.
- a cryptographic function called in the library transmits a cryptographic operation command to the smart card via the wireless link.
- the smart card executes the cryptographic operation and transmits its result to the terminal.
- FIG. 1 shows a user station 6 according to the invention.
- This user station 6 comprises a terminal 1 equipped with a communication module 8 in VPN with a private network 7 and having access to a SIM card 3 enabling the user to be authenticated in the private network 7.
- the access of the user terminal 1 to the private network 7 is managed by a VPN gateway 4.
- a server 44 has elements for forming a PKI infrastructure, such as a registration authority and a certification authority.
- the connection between the terminal 1 and the SIM card 3 is performed via a wireless link 5, for example of the Bluetooth type, between the terminal 1 and a mobile terminal 2 in which a SIM card 3 of authentication of the mobile terminal 2 in a mobile network.
- a wireless link 5 for example of the Bluetooth type
- the mobile terminal 2 and the terminal 1 implement a set of protocols and procedures called SAP (SIM Access Profile) developed to provide access to a SIM card housed in a terminal, through the Bluetooth 5 link, in a completely transparent way.
- SAP SIM Access Profile
- the mobile terminal 2 comprises an SAP server module 20 which exchanges messages on one side with the SIM card 3 via a reader 21 in accordance with the ISO 7816-3 standard, and the other with the Bluetooth link 5 via a layer 22 implementing the Serial Cable Emulation Protocol (RFCOMM) emulating a serial link, and a low level layer 23 making it possible to establish a Bluetooth radio link with other terminals.
- SAP server module 20 which exchanges messages on one side with the SIM card 3 via a reader 21 in accordance with the ISO 7816-3 standard, and the other with the Bluetooth link 5 via a layer 22 implementing the Serial Cable Emulation Protocol (RFCOMM) emulating a serial link, and a low level layer 23 making it possible to establish a Bluetooth radio link with other terminals.
- RCOMM Serial Cable Emulation Protocol
- the SIM card 3 has a number of public key cryptography applications, including cryptographic operations for authentication, encryption or signature.
- An application using cryptographic tools 35 uses a PKCS # 11 module 24 having access on the one hand to a communication module 26 and to a PC / interface module. SC 25 with a SIM card. PKCS # 11 24 and PC / SC 25 modules are standard.
- the modules 24 use a library 40 of public key cryptographic operations functions when the user application 35 requires a public key cryptography operation to be performed in the smart card 3 housed in the mobile terminal 2.
- the modules 24 also use SIM card access and control functions, performed by the PC / SC interface module 25.
- a function of the library 40 called via its programming interface by the user application 35, thus applies a cryptographic operation command on the interface module 25.
- the interface module 25 transmits this command as a message to a virtual driver 27.
- the virtual driver 27 relays and adapts this message to an SAP module 31.
- the library 40 is essential to allow the use of public key cryptography applications available in the smart card 3 housed in the reader 2.
- the library 40 is, for example, example installed on a terminal 1 of type
- the SIM card 3 housed in the terminal 2 is provided with applications 41 of public key cryptography.
- the cryptography operations proposed by the card can notably include the generation or the verification of signature, encryption / decryption of data, generation of certificates or authentication.
- These applications 41 are for example in the form of JavaCard (registered trademark) applets installed in the SIM card or in the form of a WIM module (for "Wireless Identity Module” in English) integrated in the SIM card.
- a WIM module is typically used by WAP browsers located in a mobile terminal.
- Public key cryptography applications 41 of the card can then be exploited so that the terminal 1 can execute applications using cryptographic operations, such as the VPN or the electronic signature.
- the programming interface of the library 40 may be of the CAPI or PKCS # 11 type.
- the standard PKCS # 11 API is public and free to use.
- This programming interface provides low-level cryptographic functions such as key generation and storage, electronic signature, or data encryption and decryption.
- This programming interface is called in a number of software to open their cryptography features to third-party providers.
- the CAPI programming interface is exclusively available on Windows platforms. This programming interface provides application security functions and signature verification and chain management functions for trusted certificates.
- the CAPI programming interface pools cryptographic resources of different user applications. Libraries of cryptographic functions called CSP (for "Crypto Service Provider" in English) interface with CAPI to provide security services.
- CSP for "Crypto Service Provider” in English
- SIM 3 is implemented as an applet and the library 40 is of the type
- PKCS # 11 The data is thus exchanged in the form of ADPU (for "Application Protocol Data Unit” in English).
- the table in Figure 3 illustrates different PKCS # 11 functions and their implementation according to Javacard or WIM.
- the table also specifies the functions used during an authentication intended to form a virtual private network.
- the abbreviations used are: QRD: reference data qualifier, RD: reference data,
- VD verification data
- FP file path
- HO high offset
- LO reduced offset
- Lc Length of the data field.
- the terminal 1 comprises an SAP client module 31, which communicates with the SAP server module 20 via a layer 32 implementing the RFCOMM protocol and a low level layer 33 of Bluetooth 5 radio link establishment, these three layers being collected in a Bluetooth module
- the SAP server 20 and client 31 modules only exchange messages with the SIM card 3, and apply commands to it, such as commands for switching the SIM card on and off.
- the SAP client module 31 is designed to execute a connection procedure with the SAP server module 20 via a Bluetooth link, and a disconnect procedure.
- the SAP server module 20 is designed to interrogate the SIM card reader 21 and the SIM card that can be read by the reader 21, and send back to the SAP client module 31 information on the state of the reader 21, the presence of a SIM card in the reader 21 and the state of the SIM card 3.
- the SAP client module 31 is in particular designed to issue commands for the SIM card 3 for switching on / off, initialization and control containing APDU (Application Protocol Data Unit) messages, the SAP server module being designed to relay these commands for application to the SIM card via the reader 21.
- the SAP server module is also designed to notify the SAP client module 31 of all status change events of the SIM card 3 housed in the reader 21, for example as a result of a user action of inserting or removing the card from the reader.
- the PC / SC interface module 25 is designed to communicate with several readers 39 of smart cards (memory cards or microprocessor) or SIM cards 42, through drivers 38 adapted to the readers.
- a virtual pilot 27 is designed to relay and adapt the messages exchanged between the interface module 25 and the SAP module 31, these messages containing information exchanged with the SIM card 3.
- the exchange of messages between the virtual pilot 27 and the SAP client 31 is for example performed using an exchange memory or communication 28 in which the messages to be transmitted are inserted.
- the virtual pilot 27 is designed as a driver 38. It notably enables the user to select a mobile terminal or to add a mobile terminal in order to pair it with its terminal 1.
- the PC / SC interface module comprises a resource management module 37 and a service provider module 36.
- the resource management module 37 is designed to detect accessible smart cards and make this information available to several applications such as the user application 35. This module 37 is also designed to manage requests for access to smart cards issued by applications, and order smart cards.
- the service provider module 36 is designed to offer applications high-level functions, linking several commands applied to a smart card to perform a single function of access or processing of information provided by it, these functions including in particular cryptographic and authenticating functions.
- Figure 4 illustrates the application of the invention to the signing of documents and their publication.
- a document is selected by a user of the terminal 1.
- An application of the terminal 1 requires the library to generate a cryptographic signature command to the SIM card 3. This command and the document are transmitted to the mobile terminal 2 and to the SIM card 3 according to the mechanisms described previously.
- the SIM card 3 processes the command and performs the cryptographic signature from a cryptographic application that it stores.
- the SIM card 3 transmits the signed document to the terminal 1.
- the terminal 1 then transmits the signed document to a server 43 for publication of signed documents.
- the person skilled in the art can notably consider a wireless proximity link of the IrDA (infrared) or non-contact NFC type (defined in the ISO 14443 standard). All that is required is then to provide the mobile terminal with a software module for accessing the SIM for scanning the IrDA or contactless ports if necessary, and for providing the terminal 1 with a PC / SC interface 25 specific to a communication with this scanning software module.
- a mobile terminal 2 of the card emulation mode (“card emulation mode" in English) can be passed for a contactless card. If the SIM card 3 is connected to its contactless communication module, the module 25 of the terminal 1 will be able to access the cryptographic applications of the SIM card.
- the invention has been described in its application to the formation of a VPN connection or to the publication of signed documents, the invention can also be applied to other applications and in particular to User authentication when connecting to any network, including an IP network such as the Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0504000 | 2005-04-21 | ||
PCT/FR2006/000753 WO2006111626A2 (en) | 2005-04-21 | 2006-04-05 | Method and device for accessing a sim card housed in a mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1872507A2 true EP1872507A2 (en) | 2008-01-02 |
Family
ID=34955316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06743638A Withdrawn EP1872507A2 (en) | 2005-04-21 | 2006-04-05 | Method and device for accessing a sim card housed in a mobile terminal |
Country Status (6)
Country | Link |
---|---|
US (1) | US20080285755A1 (en) |
EP (1) | EP1872507A2 (en) |
JP (1) | JP2008538668A (en) |
KR (1) | KR20080007564A (en) |
CN (1) | CN101167298A (en) |
WO (1) | WO2006111626A2 (en) |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1237108A3 (en) | 2001-02-23 | 2003-08-13 | Navaho Networks Inc. | Secure electronic commerce |
US8600405B2 (en) | 2008-08-12 | 2013-12-03 | Apogee Technology Consultants, Llc | Location-based recovery device and risk management system for portable computing devices and data |
US8010636B2 (en) * | 2008-12-02 | 2011-08-30 | Verizon Patent And Licensing Inc. | Generic broadband application and plug-ins |
CN101753683B (en) * | 2008-12-03 | 2013-09-04 | 深圳富泰宏精密工业有限公司 | Mobile phone antitheft system |
CN102185846A (en) * | 2011-04-26 | 2011-09-14 | 深信服网络科技(深圳)有限公司 | Method and system based on VPN (Virtual Private Network) for safely visiting data of mobile communication terminal |
US9721243B2 (en) | 2011-05-11 | 2017-08-01 | Riavera Corp. | Mobile payment system using subaccounts of account holder |
US8616453B2 (en) | 2012-02-15 | 2013-12-31 | Mark Itwaru | System and method for processing funds transfer between entities based on received optical machine readable image information |
US9734498B2 (en) | 2011-05-11 | 2017-08-15 | Riavera Corp | Mobile image payment system using short codes |
US9785935B2 (en) | 2011-05-11 | 2017-10-10 | Riavera Corp. | Split mobile payment system |
US9715704B2 (en) | 2011-05-11 | 2017-07-25 | Riavera Corp | Merchant ordering system using optical machine readable image representation of invoice information |
US9547861B2 (en) * | 2011-05-11 | 2017-01-17 | Mark Itwaru | System and method for wireless communication with an IC chip for submission of pin data |
MX2013013164A (en) | 2011-05-11 | 2014-09-01 | Mark Itwaru | Mobile image payment system using short codes. |
US10223674B2 (en) | 2011-05-11 | 2019-03-05 | Riavera Corp. | Customized transaction flow for multiple transaction types using encoded image representation of transaction information |
US11144630B2 (en) | 2011-12-30 | 2021-10-12 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US9467297B2 (en) | 2013-08-06 | 2016-10-11 | Bedrock Automation Platforms Inc. | Industrial control system redundant communications/control modules authentication |
US8971072B2 (en) | 2011-12-30 | 2015-03-03 | Bedrock Automation Platforms Inc. | Electromagnetic connector for an industrial control system |
US8862802B2 (en) | 2011-12-30 | 2014-10-14 | Bedrock Automation Platforms Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US11314854B2 (en) | 2011-12-30 | 2022-04-26 | Bedrock Automation Platforms Inc. | Image capture devices for a secure industrial control system |
US9437967B2 (en) | 2011-12-30 | 2016-09-06 | Bedrock Automation Platforms, Inc. | Electromagnetic connector for an industrial control system |
US8868813B2 (en) | 2011-12-30 | 2014-10-21 | Bedrock Automation Platforms Inc. | Communications control system with a serial communications interface and a parallel communications interface |
US9727511B2 (en) | 2011-12-30 | 2017-08-08 | Bedrock Automation Platforms Inc. | Input/output module with multi-channel switching capability |
US10834094B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Operator action authentication in an industrial control system |
US11967839B2 (en) | 2011-12-30 | 2024-04-23 | Analog Devices, Inc. | Electromagnetic connector for an industrial control system |
US12061685B2 (en) | 2011-12-30 | 2024-08-13 | Analog Devices, Inc. | Image capture devices for a secure industrial control system |
US9191203B2 (en) | 2013-08-06 | 2015-11-17 | Bedrock Automation Platforms Inc. | Secure industrial control system |
US10834820B2 (en) | 2013-08-06 | 2020-11-10 | Bedrock Automation Platforms Inc. | Industrial control system cable |
US9600434B1 (en) | 2011-12-30 | 2017-03-21 | Bedrock Automation Platforms, Inc. | Switch fabric having a serial communications interface and a parallel communications interface |
US9596279B2 (en) | 2013-02-08 | 2017-03-14 | Dell Products L.P. | Cloud-based streaming data receiver and persister |
US9191432B2 (en) | 2013-02-11 | 2015-11-17 | Dell Products L.P. | SAAS network-based backup system |
US9442993B2 (en) | 2013-02-11 | 2016-09-13 | Dell Products L.P. | Metadata manager for analytics system |
US9787672B1 (en) * | 2013-03-15 | 2017-10-10 | Symantec Corporation | Method and system for smartcard emulation |
US9319088B2 (en) | 2013-05-09 | 2016-04-19 | Intel Corporation | Radio communication devices and methods for controlling a radio communication device |
US10613567B2 (en) | 2013-08-06 | 2020-04-07 | Bedrock Automation Platforms Inc. | Secure power supply for an industrial control system |
CN111293495B (en) | 2014-07-07 | 2022-05-24 | 基岩自动化平台公司 | Industrial control system cable |
JP2016019281A (en) * | 2014-07-07 | 2016-02-01 | ベドロック・オートメーション・プラットフォームズ・インコーポレーテッド | Operator action authentication in industrial control system |
US10003959B2 (en) * | 2015-07-30 | 2018-06-19 | Qualcomm Incorporated | Subscriber identity module (SIM) access profile (SAP) |
JP6449131B2 (en) * | 2015-10-23 | 2019-01-09 | Kddi株式会社 | COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMPUTER PROGRAM |
JP6471112B2 (en) | 2016-02-29 | 2019-02-13 | Kddi株式会社 | COMMUNICATION SYSTEM, TERMINAL DEVICE, COMMUNICATION METHOD, AND PROGRAM |
JP7036705B2 (en) * | 2018-12-03 | 2022-03-15 | Kddi株式会社 | Communication equipment, communication methods, and computer programs |
JP7021376B2 (en) * | 2021-01-06 | 2022-02-16 | Kddi株式会社 | Communication equipment, communication methods, and computer programs |
CN114173312A (en) * | 2021-12-14 | 2022-03-11 | 乾讯信息技术(无锡)有限公司 | Method for realizing wireless network VPN cipher machine without any physical connection |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6038551A (en) * | 1996-03-11 | 2000-03-14 | Microsoft Corporation | System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer |
FR2748834B1 (en) * | 1996-05-17 | 1999-02-12 | Gemplus Card Int | COMMUNICATION SYSTEM ALLOWING SECURE AND INDEPENDENT MANAGEMENT OF A PLURALITY OF APPLICATIONS BY EACH USER CARD, USER CARD AND CORRESPONDING MANAGEMENT METHOD |
AUPR966001A0 (en) * | 2001-12-20 | 2002-01-24 | Canon Information Systems Research Australia Pty Ltd | A microprocessor card defining a custom user interface |
JP2005045557A (en) * | 2003-07-22 | 2005-02-17 | Sony Corp | Communication device |
US7941660B2 (en) * | 2003-11-13 | 2011-05-10 | Gemalto Sa | System and method for data communications allowing slave device to be network peers |
US20050222961A1 (en) * | 2004-04-05 | 2005-10-06 | Philippe Staib | System and method of facilitating contactless payment transactions across different payment systems using a common mobile device acting as a stored value device |
US20060160569A1 (en) * | 2005-01-14 | 2006-07-20 | Mediatek Inc. | Cellular phone and portable storage device using the same |
US20060183462A1 (en) * | 2005-02-11 | 2006-08-17 | Nokia Corporation | Managing an access account using personal area networks and credentials on a mobile device |
US7128274B2 (en) * | 2005-03-24 | 2006-10-31 | International Business Machines Corporation | Secure credit card with near field communications |
US7706778B2 (en) * | 2005-04-05 | 2010-04-27 | Assa Abloy Ab | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone |
-
2006
- 2006-04-05 KR KR1020077024508A patent/KR20080007564A/en not_active Application Discontinuation
- 2006-04-05 JP JP2008507112A patent/JP2008538668A/en not_active Abandoned
- 2006-04-05 US US11/918,684 patent/US20080285755A1/en not_active Abandoned
- 2006-04-05 CN CNA2006800116209A patent/CN101167298A/en active Pending
- 2006-04-05 WO PCT/FR2006/000753 patent/WO2006111626A2/en active Application Filing
- 2006-04-05 EP EP06743638A patent/EP1872507A2/en not_active Withdrawn
Non-Patent Citations (1)
Title |
---|
See references of WO2006111626A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2006111626A2 (en) | 2006-10-26 |
CN101167298A (en) | 2008-04-23 |
JP2008538668A (en) | 2008-10-30 |
KR20080007564A (en) | 2008-01-22 |
US20080285755A1 (en) | 2008-11-20 |
WO2006111626A3 (en) | 2006-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1872507A2 (en) | Method and device for accessing a sim card housed in a mobile terminal | |
US10380361B2 (en) | Secure transaction method from a non-secure terminal | |
EP1004101B1 (en) | Terminal and system for implementing secure electronic transactions | |
EP2053827B1 (en) | Method for secure personalisation of an NFC chipset | |
EP3221815B1 (en) | Method for securing a payment token | |
EP1909431B1 (en) | Mutual authentication method between a communication interface and a host processor of an NFC chipset | |
US7380125B2 (en) | Smart card data transaction system and methods for providing high levels of storage and transmission security | |
EP1933252A1 (en) | Dynamic OTP Token | |
US20090307142A1 (en) | Trusted service manager (tsm) architectures and methods | |
EP1549011A1 (en) | Communication method and system between a terminal and at least a communication device | |
EP1862948A1 (en) | IC card with OTP client | |
WO2009039771A1 (en) | Mobile payment terminal and payment method based on pki technology | |
EP2912594A1 (en) | Method of providing a secured service | |
WO2021007472A1 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
Mantoro et al. | Smart card authentication for Internet applications using NFC enabled phone | |
US20120089830A1 (en) | Method and device for digitally attesting the authenticity of binding interactions | |
EP1636767B1 (en) | A method for allocation of secure resources in a security module | |
Ortiz-Yepes | Enhancing Authentication in eBanking with NFC-enabled mobile phones | |
Pisko | Mobile electronic signatures: progression from mobile service to mobile application unit | |
Fernandes | Reliable electronic certification on mobile devices | |
Laidi | Using smart card in e-business applications: an e-business model | |
Giessmann | Transparency and Security for Client-Side Encrypting Cloud Storage Applications | |
EP2411935A1 (en) | Method and device for digitally attesting the authenticity of binding interactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20070919 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: DAGORN, ANNE-SOPHIE Inventor name: CAMUS, SYLVIE Inventor name: PICQUENOT, DAVID |
|
17Q | First examination report despatched |
Effective date: 20100517 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20100928 |