JP2005524910A - デバイスにアプリケーションをローディングする方法、デバイス、及びそのデバイス用のスマートカード - Google Patents
デバイスにアプリケーションをローディングする方法、デバイス、及びそのデバイス用のスマートカード Download PDFInfo
- Publication number
- JP2005524910A JP2005524910A JP2004504156A JP2004504156A JP2005524910A JP 2005524910 A JP2005524910 A JP 2005524910A JP 2004504156 A JP2004504156 A JP 2004504156A JP 2004504156 A JP2004504156 A JP 2004504156A JP 2005524910 A JP2005524910 A JP 2005524910A
- Authority
- JP
- Japan
- Prior art keywords
- application
- certificate
- attribute certificate
- stored
- smart card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/54—Link editing before load time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3265—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Accounting & Taxation (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Stored Programmes (AREA)
Abstract
Description
本発明を第1の側面から見れば、アプリケーションをデバイスにローディングする方法が備えられる。
デバイスに署名のあるアプリケーションをダウンロードする工程と、
そのデバイスに格納された前もって定義された属性証明書にそのアプリケーションの 署名を結合する工程と、
前記属性の証明書に結合されたそのアプリケーションをインストールする工程とを有する。
そのインタフェースユニットを制御するアプリケーションにリンク可能な少なくとも1つの前もって定義された属性証明書を格納する手段を含むか、或いは該手段に接続可能である。
Claims (24)
- デバイス(1)にアプリケーション(2)をローディングする方法であって、
前記デバイス(1)に署名のある前記アプリケーション(2)をダウンロードする工程と、
前記デバイス(1)に格納された前もって定義された属性証明書(14)に前記アプリケーション(2)の前記署名を結合する工程と、
前記属性の証明書(14)に結合された前記アプリケーション(2)をインストールする工程とを有することを特徴とする方法。 - 前記アプリケーション(2)の前記署名は、次に前記アプリケーション(2)を前もって定義された属性証明書(14)に結合するルート証明書に結合されていることを特徴とする請求項1に記載の方法。
- 前記格納されたルート証明書(13)に対して前記アプリケーション(2)は認証されることを特徴とする請求項2に記載の方法。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、ファイルに格納され、各々のファイル特性(15)に同じ値をもたせることでリンクされることを特徴とする請求項2又は3に記載の方法。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、PKCS#15構造(10)で格納されることを特徴とする請求項4に記載のデバイス。
- 前記前もって定義された属性証明書(14)はフラッシュメモリ(5)に格納されることを特徴とする請求項1乃至5のいずれかに記載の方法。
- 前記前もって定義された属性証明書(14)はスマートカード(6)に格納されることを特徴とする請求項1乃至5のいずれかに記載の方法。
- 前記スマートカード(6)はSIMカードであることを特徴とする請求項7に記載の方法。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、SIMアプリケーションツールキットにより変更可能であることを特徴とする請求項8に記載の方法。
- インタフェースユニット(4)を介してアクセスが制御される機能ユニット(3)と関連してアプリケーション(2)を格納し実行する手段(9)を有したデバイス(1)であって、
前記インタフェースユニット(4)を制御する前記アプリケーション(2)にリンク可能な少なくとも1つの前もって定義された属性証明書(14)を格納する手段(5、6)を含むか、或いは前記手段(5,6)に接続可能であることを特徴とするデバイス。 - 前記前もって定義された属性証明書(14)は、前記デバイスに格納されているルート証明書(13)にリンクされることを特徴とする請求項10に記載のデバイス。
- 前記前もって定義された属性の証明書(14)と前記ルート証明書(13)とは、ファイルに格納され、各々のファイル特性(15)に同じ値をもたせることでリンクされることを特徴とする請求項11に記載のデバイス。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、PKCS#15構造(10)で格納されることを特徴とする請求項12に記載のデバイス。
- 前記アプリケーション(2)を認証し、格納されたルート証明書(13)に前記アプリケーション(2)をリンクするように構成された機密保護チェック手段をさらに有することを特徴とする請求項11乃至13のいずれかに記載のデバイス。
- 前記前もって定義された属性証明書(14)を格納するフラッシュメモリ(5)をさらに有することを特徴とする請求項10乃至14のいずれかに記載のデバイス。
- 前記前もって定義された属性証明書(14)を格納するスマートカード(6)を接続可能であることを特徴とする請求項10乃至14のいずれかに記載のデバイス。
- 前記スマートカード(6)はSIMカードであることを特徴とする請求項16に記載のデバイス。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、SIMアプリケーションツールキットにより変更可能であることを特徴とする請求項17に記載のデバイス。
- 前記デバイスは移動体電話であることを特徴とする請求項10乃至18のいずれかに記載のデバイス。
- インタフェースユニット(4)を介してアクセスが制御される機能ユニット(3)と関連してアプリケーション(2)を格納し実行する手段(9)を有したデバイス(1)に接続可能なスマートカード(6)であって、
前記インタフェースユニット(4)を制御する前記アプリケーション(2)にリンク可能な少なくとも1つの前もって定義された属性証明書(14)を格納する手段を含むことを特徴とするスマートカード。 - 前記前もって定義された属性証明書(14)は、前記スマートカード(6)に格納されているルート証明書(13)にリンクされることを特徴とする請求項20に記載のスマートカード。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、ファイルに格納され、各々のファイル特性(15)に同じ値をもたせることでリンクされることを特徴とする請求項21に記載のスマートカード。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、PKCS#15構造(10)で格納されることを特徴とする請求項21又は22に記載のスマートカード。
- 前記前もって定義された属性証明書(14)と前記ルート証明書(13)とは、SIMアプリケーションツールキットにより変更可能であることを特徴とする請求項20に記載のスマートカード。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02445054A EP1361527A1 (en) | 2002-05-07 | 2002-05-07 | Method for loading an application in a device, device and smart card therefor |
US38115702P | 2002-05-16 | 2002-05-16 | |
PCT/EP2003/003976 WO2003096238A1 (en) | 2002-05-07 | 2003-04-16 | Method for loading an application in a device, device and smart card therefor |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2005524910A true JP2005524910A (ja) | 2005-08-18 |
JP2005524910A5 JP2005524910A5 (ja) | 2006-06-01 |
JP4584707B2 JP4584707B2 (ja) | 2010-11-24 |
Family
ID=29421915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2004504156A Expired - Fee Related JP4584707B2 (ja) | 2002-05-07 | 2003-04-16 | デバイスにアプリケーションをインストールする方法、デバイス、及びそのデバイス用のスマートカード |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1361527A1 (ja) |
JP (1) | JP4584707B2 (ja) |
KR (1) | KR101030819B1 (ja) |
CN (1) | CN1653460B (ja) |
AU (1) | AU2003229687A1 (ja) |
WO (1) | WO2003096238A1 (ja) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006085647A1 (ja) * | 2005-02-14 | 2006-08-17 | Matsushita Electric Industrial Co., Ltd. | アプリケーション実行装置、管理方法、プログラム |
JP2008129788A (ja) * | 2006-11-20 | 2008-06-05 | Canon Inc | 情報処理装置及び情報処理装置の制御方法、情報処理システム |
KR100928693B1 (ko) | 2005-01-14 | 2009-11-27 | 노키아 코포레이션 | 모바일 장치의 자동 맞춤 처리 또는 자동 구성 |
JP2011517859A (ja) * | 2007-08-06 | 2011-06-16 | モンセーヌ,ベルナール ドゥ | 認証、データ転送およびフィッシング対策のためのシステムおよび方法 |
JP2017046038A (ja) * | 2015-08-24 | 2017-03-02 | Kddi株式会社 | 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム |
JP2018014770A (ja) * | 2017-10-30 | 2018-01-25 | Kddi株式会社 | 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005045735A1 (en) | 2003-11-07 | 2005-05-19 | Nokia Corporation | Method and device for controlling installation of applications using operator root certificates |
EP1564957B1 (en) * | 2004-02-11 | 2007-08-22 | Sony Ericsson Mobile Communications AB | Method and apparatus for providing dynamic security management |
GB2422919B (en) * | 2004-11-02 | 2009-05-27 | T Mobile Int Ag & Co Kg | Software application security access management in mobile communication devices |
US8504849B2 (en) | 2004-12-21 | 2013-08-06 | Sandisk Technologies Inc. | Method for versatile content control |
US8051052B2 (en) | 2004-12-21 | 2011-11-01 | Sandisk Technologies Inc. | Method for creating control structure for versatile content control |
US8601283B2 (en) | 2004-12-21 | 2013-12-03 | Sandisk Technologies Inc. | Method for versatile content control with partitioning |
US7243856B2 (en) * | 2005-03-24 | 2007-07-17 | Sandisk Il Ltd.. | Loading internal applications on a smartcard |
KR100646379B1 (ko) | 2005-06-09 | 2006-11-23 | 에스케이 텔레콤주식회사 | 보안 플랫폼에서 보안 데이터를 제어하는 방법 및 이동통신단말기 |
EP1737178A1 (en) | 2005-06-24 | 2006-12-27 | Axalto SA | Method and system using a portable object for providing an extension to a server |
US7748031B2 (en) | 2005-07-08 | 2010-06-29 | Sandisk Corporation | Mass storage device with automated credentials loading |
KR100862389B1 (ko) | 2006-05-03 | 2008-10-13 | 노키아 코포레이션 | 운영자 루트 인증서를 이용하여 어플리케이션 설치를제어하는 방법 및 장치 |
US8245031B2 (en) | 2006-07-07 | 2012-08-14 | Sandisk Technologies Inc. | Content control method using certificate revocation lists |
JP2009543208A (ja) * | 2006-07-07 | 2009-12-03 | サンディスク コーポレイション | 証明書連鎖を使用するコンテンツ管理システムおよび方法 |
US8266711B2 (en) | 2006-07-07 | 2012-09-11 | Sandisk Technologies Inc. | Method for controlling information supplied from memory device |
US8639939B2 (en) | 2006-07-07 | 2014-01-28 | Sandisk Technologies Inc. | Control method using identity objects |
US8613103B2 (en) | 2006-07-07 | 2013-12-17 | Sandisk Technologies Inc. | Content control method using versatile control structure |
US8140843B2 (en) | 2006-07-07 | 2012-03-20 | Sandisk Technologies Inc. | Content control method using certificate chains |
WO2008014800A1 (en) | 2006-07-31 | 2008-02-07 | Telecom Italia S.P.A. | A system for implementing security on telecommunications terminals |
KR100806186B1 (ko) * | 2007-01-08 | 2008-02-22 | 에스케이 텔레콤주식회사 | 스마트 카드에서 시큐리티 도메인의 키를 초기화하는 방법및 이동통신 단말기 |
KR100781136B1 (ko) * | 2007-04-03 | 2007-11-30 | 주식회사 스마트카드연구소 | Usim 카드에서의 애플리케이션 관리 시스템 및 방법 |
US9104618B2 (en) | 2008-12-18 | 2015-08-11 | Sandisk Technologies Inc. | Managing access to an address range in a storage device |
US8555067B2 (en) | 2010-10-28 | 2013-10-08 | Apple Inc. | Methods and apparatus for delivering electronic identification components over a wireless network |
EP2506175B1 (en) * | 2011-03-30 | 2019-01-30 | Irdeto B.V. | Enabling a software application to be executed on a mobile station |
DE102011015710A1 (de) | 2011-03-31 | 2012-10-04 | Giesecke & Devrient Gmbh | Verfahren zum Aktualisieren eines Datenträgers |
DE102011015711A1 (de) * | 2011-03-31 | 2012-10-04 | Giesecke & Devrient Gmbh | Aktualisierung einer Datenträgerapplikation |
US8832447B2 (en) * | 2011-08-10 | 2014-09-09 | Sony Corporation | System and method for using digital signatures to assign permissions |
CN102625309A (zh) * | 2012-01-18 | 2012-08-01 | 中兴通讯股份有限公司 | 访问控制方法及装置 |
CN102663292A (zh) * | 2012-03-26 | 2012-09-12 | 大唐微电子技术有限公司 | 一种实现智能卡应用部署的方法及系统 |
US10038565B2 (en) | 2012-12-20 | 2018-07-31 | GM Global Technology Operations LLC | Methods and systems for bypassing authenticity checks for secure control modules |
US9819682B2 (en) | 2013-03-15 | 2017-11-14 | Airwatch Llc | Certificate based profile confirmation |
KR102337990B1 (ko) | 2014-09-18 | 2021-12-13 | 삼성전자주식회사 | 권한 설정 토큰을 이용하는 전자 장치 |
CN108768664B (zh) * | 2018-06-06 | 2020-11-03 | 腾讯科技(深圳)有限公司 | 密钥管理方法、装置、系统、存储介质和计算机设备 |
KR102254146B1 (ko) * | 2018-08-16 | 2021-05-21 | 주식회사 페스카로 | 전자식 제어기의 펌웨어 업데이트 방법, 시스템 및 프로그램 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02291043A (ja) * | 1989-03-07 | 1990-11-30 | Addison M Fischer | ディジタル方式により署名および証明するための方法 |
JPH1083310A (ja) * | 1996-06-11 | 1998-03-31 | Internatl Business Mach Corp <Ibm> | プログラム・コードの配布方法及びシステム |
JP2000148469A (ja) * | 1998-06-29 | 2000-05-30 | Sun Microsyst Inc | モジュラ―アプリケ―ション間のサ―ビスへのアクセス制御 |
WO2000059225A1 (en) * | 1999-03-26 | 2000-10-05 | Motorola Inc. | Secure wireless electronic-commerce system with wireless network domain |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
DE19911221B4 (de) * | 1999-03-12 | 2005-10-27 | T-Mobile Deutschland Gmbh | Verfahren zur Verteilung von Schlüsseln an Teilnehmer von Kommunikationsnetzen |
GB2365561B (en) * | 1999-12-14 | 2004-06-16 | Ibm | Conditional access control |
US20020026578A1 (en) * | 2000-08-22 | 2002-02-28 | International Business Machines Corporation | Secure usage of digital certificates and related keys on a security token |
KR20020027987A (ko) * | 2000-10-06 | 2002-04-15 | 황금용 | 음란물 차단방법 및 차단장치 |
KR20010008028A (ko) * | 2000-11-03 | 2001-02-05 | 박상관 | 피씨 보안 및 피케이아이 솔루션 기능을 갖는 스마트 카드판독 시스템 및 그 제어 방법 |
-
2002
- 2002-05-07 EP EP02445054A patent/EP1361527A1/en not_active Ceased
-
2003
- 2003-04-16 JP JP2004504156A patent/JP4584707B2/ja not_active Expired - Fee Related
- 2003-04-16 AU AU2003229687A patent/AU2003229687A1/en not_active Abandoned
- 2003-04-16 WO PCT/EP2003/003976 patent/WO2003096238A1/en active Application Filing
- 2003-04-16 KR KR1020047017908A patent/KR101030819B1/ko not_active IP Right Cessation
- 2003-04-16 CN CN038103419A patent/CN1653460B/zh not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02291043A (ja) * | 1989-03-07 | 1990-11-30 | Addison M Fischer | ディジタル方式により署名および証明するための方法 |
JPH1083310A (ja) * | 1996-06-11 | 1998-03-31 | Internatl Business Mach Corp <Ibm> | プログラム・コードの配布方法及びシステム |
JP2000148469A (ja) * | 1998-06-29 | 2000-05-30 | Sun Microsyst Inc | モジュラ―アプリケ―ション間のサ―ビスへのアクセス制御 |
WO2000059225A1 (en) * | 1999-03-26 | 2000-10-05 | Motorola Inc. | Secure wireless electronic-commerce system with wireless network domain |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100928693B1 (ko) | 2005-01-14 | 2009-11-27 | 노키아 코포레이션 | 모바일 장치의 자동 맞춤 처리 또는 자동 구성 |
US8719566B2 (en) | 2005-02-14 | 2014-05-06 | Panasonic Corporation | Application executing device, managing method, and program |
JP4806396B2 (ja) * | 2005-02-14 | 2011-11-02 | パナソニック株式会社 | アプリケーション実行装置、管理方法、プログラム |
US8122263B2 (en) | 2005-02-14 | 2012-02-21 | Panasonic Corporation | Application executing device, managing method, and program |
US8214639B2 (en) | 2005-02-14 | 2012-07-03 | Panasonic Corporation | Application executing device, managing method, and program |
WO2006085647A1 (ja) * | 2005-02-14 | 2006-08-17 | Matsushita Electric Industrial Co., Ltd. | アプリケーション実行装置、管理方法、プログラム |
JP2008129788A (ja) * | 2006-11-20 | 2008-06-05 | Canon Inc | 情報処理装置及び情報処理装置の制御方法、情報処理システム |
US7937754B2 (en) | 2006-11-20 | 2011-05-03 | Canon Kabushiki Kaisha | Information processing apparatus, control method for the apparatus, and information processing system |
JP2011517859A (ja) * | 2007-08-06 | 2011-06-16 | モンセーヌ,ベルナール ドゥ | 認証、データ転送およびフィッシング対策のためのシステムおよび方法 |
US8578166B2 (en) | 2007-08-06 | 2013-11-05 | Morgamon SA | System and method for authentication, data transfer, and protection against phishing |
JP2017046038A (ja) * | 2015-08-24 | 2017-03-02 | Kddi株式会社 | 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム |
WO2017033602A1 (ja) * | 2015-08-24 | 2017-03-02 | Kddi株式会社 | 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム |
JP2018014770A (ja) * | 2017-10-30 | 2018-01-25 | Kddi株式会社 | 車載コンピュータシステム、車両、管理方法、及びコンピュータプログラム |
Also Published As
Publication number | Publication date |
---|---|
EP1361527A1 (en) | 2003-11-12 |
KR20050026924A (ko) | 2005-03-16 |
CN1653460B (zh) | 2011-05-18 |
WO2003096238A1 (en) | 2003-11-20 |
AU2003229687A1 (en) | 2003-11-11 |
KR101030819B1 (ko) | 2011-04-22 |
CN1653460A (zh) | 2005-08-10 |
JP4584707B2 (ja) | 2010-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4584707B2 (ja) | デバイスにアプリケーションをインストールする方法、デバイス、及びそのデバイス用のスマートカード | |
US7900048B2 (en) | Method for loading an application in a device, device and smart card therefor | |
JP4303284B2 (ja) | セキュリティエレメントにコマンドを出す方法及び移動端末 | |
KR101435295B1 (ko) | 이동 디바이스 상에 다단계 가상 sim 프로비져닝 및 설정을 수행하기 위한 방법 및 시스템 | |
CA2923740C (en) | Software code signing system and method | |
CN1946222B (zh) | 移动通信终端的软件认证装置及其方法 | |
WO2003021991A1 (en) | Method of verifying downloaded software and corresponding device | |
KR20050053668A (ko) | 전자 장치에의 데이터 로딩 | |
US20100299748A1 (en) | Method for alteration of integrity protected data in a device, computer program product and device implementing the method | |
JP4176533B2 (ja) | 端末装置及びプログラム | |
US20110145840A1 (en) | Method and device for permitting secure use of program modules | |
US8191150B2 (en) | Method and arrangement relating to a communication device | |
WO2006000529A1 (en) | Method for associating an application with a subscriber identity module | |
Chandrasiri | First Steps to Software Defined Radio Standards: MExE, the Mobile Execution Environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20060404 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20060404 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20091016 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100106 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100323 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100603 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20100625 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20100723 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20100816 |
|
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20100902 |
|
R150 | Certificate of patent or registration of utility model |
Free format text: JAPANESE INTERMEDIATE CODE: R150 Ref document number: 4584707 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
FPAY | Renewal fee payment (event date is renewal date of database) |
Free format text: PAYMENT UNTIL: 20130910 Year of fee payment: 3 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
LAPS | Cancellation because of no payment of annual fees |