WO2001033867A3 - A method for validating an application for use in a mobile communication device - Google Patents

A method for validating an application for use in a mobile communication device Download PDF

Info

Publication number
WO2001033867A3
WO2001033867A3 PCT/US2000/030320 US0030320W WO0133867A3 WO 2001033867 A3 WO2001033867 A3 WO 2001033867A3 US 0030320 W US0030320 W US 0030320W WO 0133867 A3 WO0133867 A3 WO 0133867A3
Authority
WO
Grant status
Application
Patent type
Prior art keywords
application
mobile communication
communication device
use
developer
Prior art date
Application number
PCT/US2000/030320
Other languages
French (fr)
Other versions
WO2001033867A2 (en )
Inventor
Robert L Geiger
Jyn-Han Lin
Peursem James E Van
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/04Network-specific arrangements or communication protocols supporting networked applications adapted for terminals or networks with limited resources or for terminal portability, e.g. wireless application protocol [WAP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/34Network-specific arrangements or communication protocols supporting networked applications involving the movement of software or configuration parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven

Abstract

A wireless domain (602) sets a security policy for all mobile communication devices (606) within the domain by use of a system entry proxy server (604). A developer makes an application or code segment available at a developer station (600). The application is certified by a certificate defining a developer security setting. The user of the mobile communication device initiates a download of the application so that it can be installed onto the mobile communication device. The application is downloaded through the system entry proxy server which authenticates the applications, then re-certifies it with a compact certificate including an operator defined security policy. In this way the operator can control which resources of the mobile communication device are accessed by all applications coming into the wireless domain.
PCT/US2000/030320 1999-11-03 2000-11-03 A method for validating an application for use in a mobile communication device WO2001033867A3 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16336199 true 1999-11-03 1999-11-03
US60/163,361 1999-11-03

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2424401A AU2424401A (en) 1999-11-03 2000-11-03 A method for validating an application for use in a mobile communication device

Publications (2)

Publication Number Publication Date
WO2001033867A2 true WO2001033867A2 (en) 2001-05-10
WO2001033867A3 true true WO2001033867A3 (en) 2001-09-27

Family

ID=22589702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/030320 WO2001033867A3 (en) 1999-11-03 2000-11-03 A method for validating an application for use in a mobile communication device

Country Status (1)

Country Link
WO (1) WO2001033867A3 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0212314D0 (en) * 2002-05-28 2002-07-10 Symbian Ltd Secure mobile wireless device
US20040002943A1 (en) * 2002-06-28 2004-01-01 Merrill John Wickens Lamb Systems and methods for application delivery and configuration management of mobile devices
FR2844662B1 (en) * 2002-09-12 2005-02-04 Sagem Method of updating remote software embeds in a mobile telephone and implementation system
DE60224590T2 (en) 2002-11-08 2009-01-15 Nokia Corp. Software integrity test at a mobile phone
US7308573B2 (en) 2003-02-25 2007-12-11 Microsoft Corporation Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architecture
EP1630679B1 (en) * 2003-05-15 2018-04-04 Vodafone Group PLC Linkage operation method, mobile communication terminal device, mail transmission/reception method, and communication system
US8701101B2 (en) 2007-03-30 2014-04-15 Blackberry Limited System and method for managing upgrades for a portable electronic device
EP1976249B1 (en) 2007-03-30 2009-03-11 Research In Motion Limited System and method for management of a portable electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US5406628A (en) * 1993-03-04 1995-04-11 Bell Communications Research, Inc. Public key authentication and key agreement for low-cost terminals
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5406628A (en) * 1993-03-04 1995-04-11 Bell Communications Research, Inc. Public key authentication and key agreement for low-cost terminals
US5371794A (en) * 1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network

Also Published As

Publication number Publication date Type
WO2001033867A2 (en) 2001-05-10 application

Similar Documents

Publication Publication Date Title
US6591095B1 (en) Method and apparatus for designating administrative responsibilities in a mobile communications device
US20130252583A1 (en) Authentication server and methods for granting tokens comprising location data
US20050202803A1 (en) Secure interaction between downloaded application code and a smart card in a mobile communication apparatus
US20090217348A1 (en) Methods and Apparatus for Wireless Device Registration
US20090217036A1 (en) Digital rights management
US20050113069A1 (en) User authentication through separate communication links
US20060090196A1 (en) Method, apparatus and system for enforcing security policies
US20050209972A1 (en) System and method for digital rights management of electronic content
US20070061886A1 (en) Digital rights management
US20060031681A1 (en) Method and system for controlling access to a wireless client device
US6766353B1 (en) Method for authenticating a JAVA archive (JAR) for portable devices
EP1361527A1 (en) Method for loading an application in a device, device and smart card therefor
US6775536B1 (en) Method for validating an application for use in a mobile communication device
US20030105961A1 (en) Avoiding attachment of an ineligible smart interchangeable cover to an electronic device
US8646063B2 (en) Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
US20030083055A1 (en) Local and remote access to radio parametric and regulatory data and methods therefor
JP2010532107A (en) Secure transfer of software sim credentials
CN101203000A (en) Method and system for downloading mobile terminal applied software
US20050234825A1 (en) Method for loading an application in a device, device and smart card therefor
US8191109B2 (en) Application verification
US20130283047A1 (en) System and method for securely using multiple subscriber profiles with a security component and a mobile telecommunications device
US20040185829A1 (en) Method for establishing a connection between a terminal and an operating mobile radio network, mobile radio network and terminal used in such a method
US20070283413A1 (en) Portable security policy and environment
KR20080021178A (en) Apparatus and method for downloading of sim data in mobile communication system
US20090196285A1 (en) Method and apparatus for provisioning dual mode wireless client devices in a telecommunications system

Legal Events

Date Code Title Description
AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase