WO2003041022A1 - Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application - Google Patents
Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application Download PDFInfo
- Publication number
- WO2003041022A1 WO2003041022A1 PCT/FR2002/003580 FR0203580W WO03041022A1 WO 2003041022 A1 WO2003041022 A1 WO 2003041022A1 FR 0203580 W FR0203580 W FR 0203580W WO 03041022 A1 WO03041022 A1 WO 03041022A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- subscriber
- key
- pub
- public key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- the present invention relates to the field of transactions between an application server and mobile equipment, in particular a telephone, equipped with a subscriber identification module, for example a SIM card.
- a subscriber identification module for example a SIM card.
- Such equipment makes it possible to exchange digital data in a secure form, for example in the form of an order packet in a format defined by the GSM 03.48 standard.
- the object of the invention is to propose a method for ensuring digital exchanges and transactions between an application server and a telephone identified with a high degree of security, by:
- the invention relates, in its most general sense, to a secure transaction method between a mobile telephone equipped with a subscriber identification module (SIM card) and an application server, characterized in that it comprises a step of secure exchange of public keys between the server and the subscriber and of registration by the subscriber of the public key Ks_pub of the server, and of registration on the server of the public key Ku_pub of the subscriber , a purchasing step downloadable applications consisting of preparing a digital request file on the mobile equipment, and transmitting to the server on the one hand said digital file in the form of a message and on the other hand transmitting an encrypted condensate, a step of transmission of an order by the server to the subscriber in the form of a signed digital file and in the form of a condensate of said file, and a step of transmission by the server to the subscriber of a downloadable application [MIDLET] comprising only part code
- FIG. 1 represents a general view of the architecture of the system implemented by the invention
- Figure 2 shows a schematic view of the transmission of the public key from the subscriber to the server
- Figure 3 shows a schematic view of the transmission of the public key from the server to the subscriber -
- Figure 4 shows a schematic view of the payment transaction
- FIG. 5 represents a schematic view of the order reception operation
- FIGS 6 and 7 show schematic views of rights protection operations
- FIGS. 8 and 9 represent schematic views of the operations for verifying the origin and the integrity of the loaded applications.
- the invention implements an application server (1) comprising a short message server
- SMS Session Management
- the subscriber receiving the services provided by the application server (2) is equipped with mobile equipment, for example a mobile telephone (3) equipped in a known manner by a subscriber identification module (4) in the form of a SIM card.
- the subscriber and the server exchange their respective public keys.
- a first step is to identify the subscriber by the application server.
- the public key calculated by the card is transmitted to the server using a secure SMS. This technique has the advantage of never removing the public key from the card.
- third-party certificates may be used.
- FIG. 2 represents a schematic view of the operation for generating the public and private keys of the subscriber.
- the subscriber identification module (4) generates a bi-key comprising: a private key Ku_priv a public key Ku-pub. This key pair generation is carried out in the SIM card, and is not transmitted to the environment of the card.
- the public key Ku_ ⁇ ub is transmitted to the server (1) in the order packet conforming to the GSM standard 03.48, in the "DATA" field, in the form of a short SMS secure message.
- the server also generates a Ks-priv key pair, Ks pub as shown in FIG. 3.
- Ks pub is encrypted with the subscriber's public key Ku_pub is transmitted to the subscriber in the form of a short SMS message.
- the JAVA JAM application engine of the mobile equipment decrypts the command packet and stores the public key Ks_pub of the server on the memory of the mobile equipment.
- the process includes downloadable application purchase operations [MIDLETs].
- the subscriber's request takes the form of a digital file which is transmitted to the server (1) via the MODEM channel.
- the mobile equipment calculates a condendate (5) [HASH] which is transmitted to the server in an encrypted form by an encryption function F (RES, Ku_priv) with the private key of the subscriber.
- the server verifies the integrity of the request and authenticates the sender of the request by recalculating the condensate of the digital file received on the Modem channel and by comparison with the condensate decrypted with the public key Ku_public of the user, previously recorded.
- the reception of commands is described with reference to FIG. 5.
- the commands are service instructions issued by the server (1) to one or more subscribers. This is for example an order loading an application [MIDLET] on a subscribed device, or deleting such an application. Orders from the RFS via the SMS channel must be signed, to be sure that an order, 'CLEAR' for example, has been sent by the operator.
- the server (1) prepares a digital file corresponding to the order and transmits it via the Modem channel or in the form of a short SMS message to the subscriber, in a form signed by a signature function F (Sign, Ks_pub). It also calculates a condensate transmitted to the subscriber.
- the subscriber's SIM card performs a validity test and executes the command if the test is positive.
- FIGs 6 and 7 show schematic views of rights protection operations. This operation prevents an application [MIDLET] from being used only by the person who purchased it.
- the server generates a random symmetric key when loading a file. This key is used to encrypt certain parts of the MIDLET.
- the MIDLET is then sent with the symmetric key encrypted by the client's public key.
- the symmetric key is then decrypted in the card which stores a couple [MIDLETID, symmetric key]
- the JAVA JAM application engine asks the card to decrypt (using the symmetric key) the coded pieces. We do not code the entire MIDLET because the bandwidth between the phone's RAM and the SIM card is quite low.
- FIGS. 8 and 9 represent schematic views of the operations for verifying the origin and the integrity of the loaded applications.
- the provenance check is carried out at loading, and the integrity check each time it is used.
- the server sends the MIDLET and its signature.
- the card decrypts the signature and saves the result of the HASH function in association with an ID from the MIDLET.
- the card then checks the validity of the signature and communicates the result to the JAM.
- the server On loading, the server sends the MIDLET and its signature.
- the card decrypts the signature is saved the result of the HASH function in association with an ID from the MIDLET
- the card then checks the validity of the signature and communicates the result to the JAM.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Finance (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0113523A FR2831362B1 (fr) | 2001-10-19 | 2001-10-19 | Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application |
FR0113523 | 2001-10-19 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003041022A1 true WO2003041022A1 (fr) | 2003-05-15 |
Family
ID=8868495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/003580 WO2003041022A1 (fr) | 2001-10-19 | 2002-10-18 | Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application |
Country Status (2)
Country | Link |
---|---|
FR (1) | FR2831362B1 (fr) |
WO (1) | WO2003041022A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7437563B2 (en) * | 2002-11-08 | 2008-10-14 | Nokia Corporation | Software integrity test |
JP2014225881A (ja) * | 2004-11-25 | 2014-12-04 | オランジュ | 端末ユーザ識別情報モジュールを接続した通信端末を保護する方法 |
CN101571899B (zh) * | 2009-06-04 | 2014-12-24 | 北京握奇数据系统有限公司 | 一种智能设备软件防盗版的方法和装置 |
CN113031973A (zh) * | 2021-03-01 | 2021-06-25 | 湖北亿咖通科技有限公司 | 一种付费车载应用的下载安装方法 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1536606A1 (fr) | 2003-11-27 | 2005-06-01 | Nagracard S.A. | Méthode d'authentification d'applications |
EP1705854A1 (fr) * | 2005-03-22 | 2006-09-27 | Research In Motion Limited | Procédé et dispositif permettant d'échanger des informations cryptographiques dans un système de communication mobile |
FI20065564A0 (fi) * | 2006-09-13 | 2006-09-13 | Eads Secure Networks Oy | Matkaviestimen autentikointi |
FI118841B (fi) | 2006-09-13 | 2008-03-31 | Eads Secure Networks Oy | Matkaviestimen autentikointi |
EP2204008B1 (fr) * | 2007-10-16 | 2019-03-27 | Nokia Technologies Oy | Approvisionnement de justificatif d'identité |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0910028A1 (fr) * | 1996-11-14 | 1999-04-21 | Matsushita Electric Industrial Co., Ltd. | Systeme de reglement electronique personnel, terminal de ce dernier et appareil permettant de gerer ce systeme |
US6223291B1 (en) * | 1999-03-26 | 2001-04-24 | Motorola, Inc. | Secure wireless electronic-commerce system with digital product certificates and digital license certificates |
WO2001055979A1 (fr) * | 2000-01-24 | 2001-08-02 | Smarttrust Systems Oy | Dispositif de paiement et procede de paiement securise |
-
2001
- 2001-10-19 FR FR0113523A patent/FR2831362B1/fr not_active Expired - Fee Related
-
2002
- 2002-10-18 WO PCT/FR2002/003580 patent/WO2003041022A1/fr not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0910028A1 (fr) * | 1996-11-14 | 1999-04-21 | Matsushita Electric Industrial Co., Ltd. | Systeme de reglement electronique personnel, terminal de ce dernier et appareil permettant de gerer ce systeme |
US6223291B1 (en) * | 1999-03-26 | 2001-04-24 | Motorola, Inc. | Secure wireless electronic-commerce system with digital product certificates and digital license certificates |
WO2001055979A1 (fr) * | 2000-01-24 | 2001-08-02 | Smarttrust Systems Oy | Dispositif de paiement et procede de paiement securise |
Non-Patent Citations (1)
Title |
---|
O'MAHONY ET AL.: "Electronic payment systems", 1997, ARTECH HOUSE, BOSTON, XP002113876 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7437563B2 (en) * | 2002-11-08 | 2008-10-14 | Nokia Corporation | Software integrity test |
JP2014225881A (ja) * | 2004-11-25 | 2014-12-04 | オランジュ | 端末ユーザ識別情報モジュールを接続した通信端末を保護する方法 |
CN101571899B (zh) * | 2009-06-04 | 2014-12-24 | 北京握奇数据系统有限公司 | 一种智能设备软件防盗版的方法和装置 |
CN113031973A (zh) * | 2021-03-01 | 2021-06-25 | 湖北亿咖通科技有限公司 | 一种付费车载应用的下载安装方法 |
CN113031973B (zh) * | 2021-03-01 | 2023-04-07 | 亿咖通(湖北)技术有限公司 | 一种付费车载应用的下载安装方法 |
Also Published As
Publication number | Publication date |
---|---|
FR2831362A1 (fr) | 2003-04-25 |
FR2831362B1 (fr) | 2004-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8464353B2 (en) | Method and system for content downloads via an insecure communications channel to devices | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
EP0973318A1 (fr) | Procédé pour payer à distance, au moyen d'un radiotéléphone mobile, l'acquisition d'un bien et/ou d'un service, et système et radiotéléphone mobile correspondants | |
CN113285803B (zh) | 一种基于量子安全密钥的邮件传输系统和传输方法 | |
EP3375133B1 (fr) | Procede de securisation et d'authentification d'une telecommunication | |
CN114143082B (zh) | 一种加密通信方法、系统及装置 | |
CN111756529A (zh) | 一种量子会话密钥分发方法及系统 | |
EP1714510A1 (fr) | Emission de cle publique par un terminal mobile | |
WO2010023298A2 (fr) | Procedes securises de transmission et de reception de donnees entre terminaux comprenant des moyens de communication en champ proche, et terminaux correspondants | |
EP1867189A1 (fr) | Communication securisee entre un dispositif de traitement de donnees et un module de securite | |
EP1008256B1 (fr) | Procede et systeme pour securiser les prestations de service diffusees sur un reseau informatique du type internet | |
CN113452687A (zh) | 基于量子安全密钥的发送邮件的加密方法和系统 | |
WO2003041022A1 (fr) | Procede de transaction securisee entre un telephone mobile equipe d'un module d'identification d'abonne (carte sim) et un serveur d'application | |
EP1400056A1 (fr) | Procede d'authentification cryptographique | |
WO2003107587A1 (fr) | Procede et dispositif d’interface pour echanger de maniere protegee des donnees de contenu en ligne | |
CN116707778A (zh) | 数据混合加密传输方法、装置和电子设备 | |
FR2980063A1 (fr) | Procede d'authentification | |
CN113438074B (zh) | 基于量子安全密钥的接收邮件的解密方法 | |
FR2776454A1 (fr) | Systeme de telephonie mobile avec carte de prepaiement | |
EP1587238A1 (fr) | Procédé de vérification dans un terminal radio de l'authenticité de certificats numériques et système d'authentification | |
WO2006072746A1 (fr) | Procede de securisation d’une communication entre une carte sim et un terminal mobile | |
CN112822015A (zh) | 信息传输方法及相关装置 | |
CN114727284B (zh) | 一种身份认证方法及系统 | |
WO2007077387A1 (fr) | Procede de distribution de contenus televisuels soumis a abonnement | |
US20050216740A1 (en) | Method and apparatus for reducing the use of signalling plane in certificate provisioning procedures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC (COMMUNICATION DATED 12-08-2004, EPO FORM 1205A) |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |