EP1872507A2 - Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile - Google Patents

Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile

Info

Publication number
EP1872507A2
EP1872507A2 EP06743638A EP06743638A EP1872507A2 EP 1872507 A2 EP1872507 A2 EP 1872507A2 EP 06743638 A EP06743638 A EP 06743638A EP 06743638 A EP06743638 A EP 06743638A EP 1872507 A2 EP1872507 A2 EP 1872507A2
Authority
EP
European Patent Office
Prior art keywords
cryptographic
terminal
sim card
entity
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP06743638A
Other languages
German (de)
English (en)
French (fr)
Inventor
Sylvie Camus
David Picquenot
Anne-Sophie Dagorn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by France Telecom SA filed Critical France Telecom SA
Publication of EP1872507A2 publication Critical patent/EP1872507A2/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Definitions

  • the invention relates to the field of secure telecommunications, and in particular remote services secured by public key systems.
  • secure services include, for example, VPN connections to a corporate private network from an Internet network, online electronic signature, or SSL person authentication.
  • a cryptographic key of a public key algorithm includes a public part and a private part.
  • the public part is generally distributed without restriction to different users.
  • the validity of a certificate attests to the trust that one can have in the public key associated with an identity.
  • a standard certificate used on the Internet is the X.509v3. This standard defines a certificate including: - the public key to be certified;
  • attributes defining the rights of use of the key message signing key or secure Internet server key for example; and a cryptographic signature of these data by the private key of a certification authority issuing the certificate.
  • a PKI public key infrastructure (known as the Public Key Infrastructure) is used for certificate management.
  • a PKI infrastructure serves on the one hand to create certificates but also to manage their life (revocation, renewal ).
  • the VPN technique establishes an encrypted IP tunnel between the user's terminal and the corporate network.
  • the VPN technology is usually low * ed on an authentication and encryption architecture based on a password OTP (One Time Password) generated single use by a calculator, on a PKI architecture based on certificates and signature algorithms stored in the hard disk of the user's terminal, on a smart card inserted into a card reader connected to the user's terminal, or on a smart card integrated in a dongle connected to the USB port of the user's terminal.
  • OTP One Time Password
  • a smart card inserted into a card reader in credit card format, or integrated in a USB dongle requires the user to have an additional smart card causing additional cost and risk of being lost.
  • a smart card in credit card format requires the user to have a card reader.
  • a SIM card of his mobile phone needs to be transferred to a card reader of the terminal to be used during a certificate generation. This transfer operation is not easy, especially since the SIM card is in "micro-SIM" format of reduced dimensions.
  • the present invention aims to overcome these disadvantages.
  • the invention also aims to make it possible to exploit public key cryptography applications.
  • the invention thus relates to a cryptographic device comprising a terminal and a mobile telephone capable of exchanging data via a non-wired link, said cryptographic device being able to implement public key cryptographic protocols with other cryptographic entities, and the secret key of the cryptographic device being stored in the mobile phone and not in the terminal.
  • said terminal is able to establish a wired or non-wired link with another cryptographic entity and able to exchange data with said cryptographic entity via this link.
  • said other cryptographic entity is an access server to a computer network, and said data exchanges allow the terminal to authenticate with said server.
  • the invention also relates to a method for implementing a public key cryptographic operation, comprising a step of implementing public key cryptographic protocols between at least one cryptographic entity and a device comprising a mobile telephone storing a secret key of the device and comprising a terminal not storing said secret key, said terminal and said mobile phone exchanging data over a wireless link.
  • the data exchanges of said cryptographic protocols between said cryptographic entity and said device are carried out by a wired or non-wired link between said terminal and said other cryptographic entity.
  • said other cryptographic entity is an access server to a computer network and said data exchanges are authentication exchanges of said terminal with said server.
  • FIG. 1 represents a user station connected in VPN to a private network, according to the invention
  • FIG. 2 represents the different software layers implemented in the user station, according to the invention.
  • FIG. 3 details the implementation of various PKCS # 11 functions
  • FIG. 4 represents a user station connected to a signed documents publication server.
  • the invention proposes to exploit the capabilities of a smart card housed in a mobile terminal and having public key cryptography applications.
  • the smart card is then used as a cryptographic calculation tool in a PKI architecture, for example to implement authentication, encryption or signature functions.
  • a terminal connected to a network has a wireless link with the mobile terminal and a library of cryptographic functions.
  • a cryptographic function called in the library transmits a cryptographic operation command to the smart card via the wireless link.
  • the smart card executes the cryptographic operation and transmits its result to the terminal.
  • FIG. 1 shows a user station 6 according to the invention.
  • This user station 6 comprises a terminal 1 equipped with a communication module 8 in VPN with a private network 7 and having access to a SIM card 3 enabling the user to be authenticated in the private network 7.
  • the access of the user terminal 1 to the private network 7 is managed by a VPN gateway 4.
  • a server 44 has elements for forming a PKI infrastructure, such as a registration authority and a certification authority.
  • the connection between the terminal 1 and the SIM card 3 is performed via a wireless link 5, for example of the Bluetooth type, between the terminal 1 and a mobile terminal 2 in which a SIM card 3 of authentication of the mobile terminal 2 in a mobile network.
  • a wireless link 5 for example of the Bluetooth type
  • the mobile terminal 2 and the terminal 1 implement a set of protocols and procedures called SAP (SIM Access Profile) developed to provide access to a SIM card housed in a terminal, through the Bluetooth 5 link, in a completely transparent way.
  • SAP SIM Access Profile
  • the mobile terminal 2 comprises an SAP server module 20 which exchanges messages on one side with the SIM card 3 via a reader 21 in accordance with the ISO 7816-3 standard, and the other with the Bluetooth link 5 via a layer 22 implementing the Serial Cable Emulation Protocol (RFCOMM) emulating a serial link, and a low level layer 23 making it possible to establish a Bluetooth radio link with other terminals.
  • SAP server module 20 which exchanges messages on one side with the SIM card 3 via a reader 21 in accordance with the ISO 7816-3 standard, and the other with the Bluetooth link 5 via a layer 22 implementing the Serial Cable Emulation Protocol (RFCOMM) emulating a serial link, and a low level layer 23 making it possible to establish a Bluetooth radio link with other terminals.
  • RCOMM Serial Cable Emulation Protocol
  • the SIM card 3 has a number of public key cryptography applications, including cryptographic operations for authentication, encryption or signature.
  • An application using cryptographic tools 35 uses a PKCS # 11 module 24 having access on the one hand to a communication module 26 and to a PC / interface module. SC 25 with a SIM card. PKCS # 11 24 and PC / SC 25 modules are standard.
  • the modules 24 use a library 40 of public key cryptographic operations functions when the user application 35 requires a public key cryptography operation to be performed in the smart card 3 housed in the mobile terminal 2.
  • the modules 24 also use SIM card access and control functions, performed by the PC / SC interface module 25.
  • a function of the library 40 called via its programming interface by the user application 35, thus applies a cryptographic operation command on the interface module 25.
  • the interface module 25 transmits this command as a message to a virtual driver 27.
  • the virtual driver 27 relays and adapts this message to an SAP module 31.
  • the library 40 is essential to allow the use of public key cryptography applications available in the smart card 3 housed in the reader 2.
  • the library 40 is, for example, example installed on a terminal 1 of type
  • the SIM card 3 housed in the terminal 2 is provided with applications 41 of public key cryptography.
  • the cryptography operations proposed by the card can notably include the generation or the verification of signature, encryption / decryption of data, generation of certificates or authentication.
  • These applications 41 are for example in the form of JavaCard (registered trademark) applets installed in the SIM card or in the form of a WIM module (for "Wireless Identity Module” in English) integrated in the SIM card.
  • a WIM module is typically used by WAP browsers located in a mobile terminal.
  • Public key cryptography applications 41 of the card can then be exploited so that the terminal 1 can execute applications using cryptographic operations, such as the VPN or the electronic signature.
  • the programming interface of the library 40 may be of the CAPI or PKCS # 11 type.
  • the standard PKCS # 11 API is public and free to use.
  • This programming interface provides low-level cryptographic functions such as key generation and storage, electronic signature, or data encryption and decryption.
  • This programming interface is called in a number of software to open their cryptography features to third-party providers.
  • the CAPI programming interface is exclusively available on Windows platforms. This programming interface provides application security functions and signature verification and chain management functions for trusted certificates.
  • the CAPI programming interface pools cryptographic resources of different user applications. Libraries of cryptographic functions called CSP (for "Crypto Service Provider" in English) interface with CAPI to provide security services.
  • CSP for "Crypto Service Provider” in English
  • SIM 3 is implemented as an applet and the library 40 is of the type
  • PKCS # 11 The data is thus exchanged in the form of ADPU (for "Application Protocol Data Unit” in English).
  • the table in Figure 3 illustrates different PKCS # 11 functions and their implementation according to Javacard or WIM.
  • the table also specifies the functions used during an authentication intended to form a virtual private network.
  • the abbreviations used are: QRD: reference data qualifier, RD: reference data,
  • VD verification data
  • FP file path
  • HO high offset
  • LO reduced offset
  • Lc Length of the data field.
  • the terminal 1 comprises an SAP client module 31, which communicates with the SAP server module 20 via a layer 32 implementing the RFCOMM protocol and a low level layer 33 of Bluetooth 5 radio link establishment, these three layers being collected in a Bluetooth module
  • the SAP server 20 and client 31 modules only exchange messages with the SIM card 3, and apply commands to it, such as commands for switching the SIM card on and off.
  • the SAP client module 31 is designed to execute a connection procedure with the SAP server module 20 via a Bluetooth link, and a disconnect procedure.
  • the SAP server module 20 is designed to interrogate the SIM card reader 21 and the SIM card that can be read by the reader 21, and send back to the SAP client module 31 information on the state of the reader 21, the presence of a SIM card in the reader 21 and the state of the SIM card 3.
  • the SAP client module 31 is in particular designed to issue commands for the SIM card 3 for switching on / off, initialization and control containing APDU (Application Protocol Data Unit) messages, the SAP server module being designed to relay these commands for application to the SIM card via the reader 21.
  • the SAP server module is also designed to notify the SAP client module 31 of all status change events of the SIM card 3 housed in the reader 21, for example as a result of a user action of inserting or removing the card from the reader.
  • the PC / SC interface module 25 is designed to communicate with several readers 39 of smart cards (memory cards or microprocessor) or SIM cards 42, through drivers 38 adapted to the readers.
  • a virtual pilot 27 is designed to relay and adapt the messages exchanged between the interface module 25 and the SAP module 31, these messages containing information exchanged with the SIM card 3.
  • the exchange of messages between the virtual pilot 27 and the SAP client 31 is for example performed using an exchange memory or communication 28 in which the messages to be transmitted are inserted.
  • the virtual pilot 27 is designed as a driver 38. It notably enables the user to select a mobile terminal or to add a mobile terminal in order to pair it with its terminal 1.
  • the PC / SC interface module comprises a resource management module 37 and a service provider module 36.
  • the resource management module 37 is designed to detect accessible smart cards and make this information available to several applications such as the user application 35. This module 37 is also designed to manage requests for access to smart cards issued by applications, and order smart cards.
  • the service provider module 36 is designed to offer applications high-level functions, linking several commands applied to a smart card to perform a single function of access or processing of information provided by it, these functions including in particular cryptographic and authenticating functions.
  • Figure 4 illustrates the application of the invention to the signing of documents and their publication.
  • a document is selected by a user of the terminal 1.
  • An application of the terminal 1 requires the library to generate a cryptographic signature command to the SIM card 3. This command and the document are transmitted to the mobile terminal 2 and to the SIM card 3 according to the mechanisms described previously.
  • the SIM card 3 processes the command and performs the cryptographic signature from a cryptographic application that it stores.
  • the SIM card 3 transmits the signed document to the terminal 1.
  • the terminal 1 then transmits the signed document to a server 43 for publication of signed documents.
  • the person skilled in the art can notably consider a wireless proximity link of the IrDA (infrared) or non-contact NFC type (defined in the ISO 14443 standard). All that is required is then to provide the mobile terminal with a software module for accessing the SIM for scanning the IrDA or contactless ports if necessary, and for providing the terminal 1 with a PC / SC interface 25 specific to a communication with this scanning software module.
  • a mobile terminal 2 of the card emulation mode (“card emulation mode" in English) can be passed for a contactless card. If the SIM card 3 is connected to its contactless communication module, the module 25 of the terminal 1 will be able to access the cryptographic applications of the SIM card.
  • the invention has been described in its application to the formation of a VPN connection or to the publication of signed documents, the invention can also be applied to other applications and in particular to User authentication when connecting to any network, including an IP network such as the Internet.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)
EP06743638A 2005-04-21 2006-04-05 Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile Withdrawn EP1872507A2 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0504000 2005-04-21
PCT/FR2006/000753 WO2006111626A2 (fr) 2005-04-21 2006-04-05 Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile

Publications (1)

Publication Number Publication Date
EP1872507A2 true EP1872507A2 (fr) 2008-01-02

Family

ID=34955316

Family Applications (1)

Application Number Title Priority Date Filing Date
EP06743638A Withdrawn EP1872507A2 (fr) 2005-04-21 2006-04-05 Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile

Country Status (6)

Country Link
US (1) US20080285755A1 (ko)
EP (1) EP1872507A2 (ko)
JP (1) JP2008538668A (ko)
KR (1) KR20080007564A (ko)
CN (1) CN101167298A (ko)
WO (1) WO2006111626A2 (ko)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7949605B2 (en) * 2001-02-23 2011-05-24 Mark Itwaru Secure electronic commerce
US8600405B2 (en) 2008-08-12 2013-12-03 Apogee Technology Consultants, Llc Location-based recovery device and risk management system for portable computing devices and data
US8010636B2 (en) * 2008-12-02 2011-08-30 Verizon Patent And Licensing Inc. Generic broadband application and plug-ins
CN101753683B (zh) * 2008-12-03 2013-09-04 深圳富泰宏精密工业有限公司 手机防盗系统
CN102185846A (zh) * 2011-04-26 2011-09-14 深信服网络科技(深圳)有限公司 基于vpn的移动通讯终端安全访问数据的方法及系统
US9721243B2 (en) 2011-05-11 2017-08-01 Riavera Corp. Mobile payment system using subaccounts of account holder
US8616453B2 (en) 2012-02-15 2013-12-31 Mark Itwaru System and method for processing funds transfer between entities based on received optical machine readable image information
US9547861B2 (en) * 2011-05-11 2017-01-17 Mark Itwaru System and method for wireless communication with an IC chip for submission of pin data
US9715704B2 (en) 2011-05-11 2017-07-25 Riavera Corp Merchant ordering system using optical machine readable image representation of invoice information
US9734498B2 (en) 2011-05-11 2017-08-15 Riavera Corp Mobile image payment system using short codes
US9785935B2 (en) 2011-05-11 2017-10-10 Riavera Corp. Split mobile payment system
CA2835733A1 (en) 2011-05-11 2012-11-15 Mark Itwaru Mobile image payment system using short codes
US10223674B2 (en) 2011-05-11 2019-03-05 Riavera Corp. Customized transaction flow for multiple transaction types using encoded image representation of transaction information
US9600434B1 (en) 2011-12-30 2017-03-21 Bedrock Automation Platforms, Inc. Switch fabric having a serial communications interface and a parallel communications interface
US9437967B2 (en) 2011-12-30 2016-09-06 Bedrock Automation Platforms, Inc. Electromagnetic connector for an industrial control system
US8971072B2 (en) 2011-12-30 2015-03-03 Bedrock Automation Platforms Inc. Electromagnetic connector for an industrial control system
US8868813B2 (en) 2011-12-30 2014-10-21 Bedrock Automation Platforms Inc. Communications control system with a serial communications interface and a parallel communications interface
US9727511B2 (en) 2011-12-30 2017-08-08 Bedrock Automation Platforms Inc. Input/output module with multi-channel switching capability
US8862802B2 (en) 2011-12-30 2014-10-14 Bedrock Automation Platforms Inc. Switch fabric having a serial communications interface and a parallel communications interface
US11314854B2 (en) 2011-12-30 2022-04-26 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US11967839B2 (en) 2011-12-30 2024-04-23 Analog Devices, Inc. Electromagnetic connector for an industrial control system
US9467297B2 (en) 2013-08-06 2016-10-11 Bedrock Automation Platforms Inc. Industrial control system redundant communications/control modules authentication
US10834820B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Industrial control system cable
US10834094B2 (en) 2013-08-06 2020-11-10 Bedrock Automation Platforms Inc. Operator action authentication in an industrial control system
US9191203B2 (en) 2013-08-06 2015-11-17 Bedrock Automation Platforms Inc. Secure industrial control system
US11144630B2 (en) 2011-12-30 2021-10-12 Bedrock Automation Platforms Inc. Image capture devices for a secure industrial control system
US9596279B2 (en) 2013-02-08 2017-03-14 Dell Products L.P. Cloud-based streaming data receiver and persister
US9191432B2 (en) 2013-02-11 2015-11-17 Dell Products L.P. SAAS network-based backup system
US9442993B2 (en) 2013-02-11 2016-09-13 Dell Products L.P. Metadata manager for analytics system
US9787672B1 (en) * 2013-03-15 2017-10-10 Symantec Corporation Method and system for smartcard emulation
US9319088B2 (en) * 2013-05-09 2016-04-19 Intel Corporation Radio communication devices and methods for controlling a radio communication device
US10613567B2 (en) 2013-08-06 2020-04-07 Bedrock Automation Platforms Inc. Secure power supply for an industrial control system
JP2016019281A (ja) * 2014-07-07 2016-02-01 ベドロック・オートメーション・プラットフォームズ・インコーポレーテッド 産業用制御システムのオペレータ・アクション認証
US10003959B2 (en) * 2015-07-30 2018-06-19 Qualcomm Incorporated Subscriber identity module (SIM) access profile (SAP)
JP6449131B2 (ja) * 2015-10-23 2019-01-09 Kddi株式会社 通信装置、通信方法、およびコンピュータプログラム
JP6471112B2 (ja) 2016-02-29 2019-02-13 Kddi株式会社 通信システム、端末装置、通信方法、及びプログラム
JP7036705B2 (ja) * 2018-12-03 2022-03-15 Kddi株式会社 通信装置、通信方法、およびコンピュータプログラム
JP7021376B2 (ja) * 2021-01-06 2022-02-16 Kddi株式会社 通信装置、通信方法、およびコンピュータプログラム
CN114173312A (zh) * 2021-12-14 2022-03-11 乾讯信息技术(无锡)有限公司 一种无需任何物理连接的无线网络vpn密码机的实现方法

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6038551A (en) * 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
FR2748834B1 (fr) * 1996-05-17 1999-02-12 Gemplus Card Int Systeme de communication permettant une gestion securisee et independante d'une pluralite d'applications par chaque carte utilisateur, carte utilisateur et procede de gestion correspondants
AUPR966001A0 (en) * 2001-12-20 2002-01-24 Canon Information Systems Research Australia Pty Ltd A microprocessor card defining a custom user interface
JP2005045557A (ja) * 2003-07-22 2005-02-17 Sony Corp 通信装置
US7941660B2 (en) * 2003-11-13 2011-05-10 Gemalto Sa System and method for data communications allowing slave device to be network peers
US20050222961A1 (en) * 2004-04-05 2005-10-06 Philippe Staib System and method of facilitating contactless payment transactions across different payment systems using a common mobile device acting as a stored value device
US20060160569A1 (en) * 2005-01-14 2006-07-20 Mediatek Inc. Cellular phone and portable storage device using the same
US20060183462A1 (en) * 2005-02-11 2006-08-17 Nokia Corporation Managing an access account using personal area networks and credentials on a mobile device
US7128274B2 (en) * 2005-03-24 2006-10-31 International Business Machines Corporation Secure credit card with near field communications
US7706778B2 (en) * 2005-04-05 2010-04-27 Assa Abloy Ab System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2006111626A2 *

Also Published As

Publication number Publication date
CN101167298A (zh) 2008-04-23
US20080285755A1 (en) 2008-11-20
WO2006111626A3 (fr) 2006-12-14
KR20080007564A (ko) 2008-01-22
WO2006111626A2 (fr) 2006-10-26
JP2008538668A (ja) 2008-10-30

Similar Documents

Publication Publication Date Title
EP1872507A2 (fr) Procédé et dispositif d'acces a une carte sim logée dans un terminal mobile
US10380361B2 (en) Secure transaction method from a non-secure terminal
EP1004101B1 (fr) Terminal et systeme pour la mise en oeuvre de transactions electroniques securisees
EP2053827B1 (fr) Procédé de personnalisation sécurisé d'un chipset NFC
EP1909431B1 (fr) Procédé d'authentification mutuelle entre une interface de communication et un processeur hôte d'un chipset NFC
US7380125B2 (en) Smart card data transaction system and methods for providing high levels of storage and transmission security
EP3221815B1 (fr) Procédé de sécurisation d'un jeton de paiement.
EP1933252A1 (en) Dynamic OTP Token
US20090307142A1 (en) Trusted service manager (tsm) architectures and methods
EP1549011A1 (fr) Procédé et système de communication entre un terminal et au moins un équipment communicant
EP1862948A1 (en) IC card with OTP client
WO2009039771A1 (fr) Terminal de paiement mobile et procédé de paiement basé sur la technologie pki
WO2014064353A1 (fr) Procede de fourniture d'un service securise
WO2021007472A1 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
Mantoro et al. Smart card authentication for Internet applications using NFC enabled phone
US20120089830A1 (en) Method and device for digitally attesting the authenticity of binding interactions
EP1636767B1 (fr) Methode d'allocation de ressources securisees dans un modue de securite
Ortiz-Yepes Enhancing Authentication in eBanking with NFC-enabled mobile phones
Pisko Mobile electronic signatures: progression from mobile service to mobile application unit
Fernandes Reliable electronic certification on mobile devices
Laidi Using smart card in e-business applications: an e-business model
Giessmann Transparency and Security for Client-Side Encrypting Cloud Storage Applications
EP2411935A1 (en) Method and device for digitally attesting the authenticity of binding interactions

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070919

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

DAX Request for extension of the european patent (deleted)
RIN1 Information on inventor provided before grant (corrected)

Inventor name: DAGORN, ANNE-SOPHIE

Inventor name: CAMUS, SYLVIE

Inventor name: PICQUENOT, DAVID

17Q First examination report despatched

Effective date: 20100517

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20100928