WO2005125154A1 - Protocol conversion “bearer independent protocol (bip)”- tcp/ip for communication between sim and terminal - Google Patents
Protocol conversion “bearer independent protocol (bip)”- tcp/ip for communication between sim and terminal Download PDFInfo
- Publication number
- WO2005125154A1 WO2005125154A1 PCT/IB2005/001621 IB2005001621W WO2005125154A1 WO 2005125154 A1 WO2005125154 A1 WO 2005125154A1 IB 2005001621 W IB2005001621 W IB 2005001621W WO 2005125154 A1 WO2005125154 A1 WO 2005125154A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- http
- tcp
- smart card
- server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/04—Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/08—Protocols for interworking; Protocol conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/08—Protocols for interworking; Protocol conversion
- H04L69/085—Protocols for interworking; Protocol conversion specially adapted for interworking of IP-based networks with other networks
Definitions
- PROTOCOL CONVERSION "BEARER INDEPENDENT PROTOCOL (BIP) " - TCP/IP FOR COMMUNIC ATI ON BETWEEN SIM AND TERMINAL
- the present invention generally relates to the exchange of data between a first electronic device and a second electronic device, and more specifically to the exchange of HTTP (Hypertext Transfer Protocol) messages between a web server being implemented by or running on the first electronic device and a web browser running on the second electronic device.
- HTTP Hypertext Transfer Protocol
- the first electronic device according to the invention a portable device, and the second electronic device according to the invention is external to the portable device.
- the first electronic or portable device will be an integrated circuit card or smart card, in particular the ones compatible with ISO 7816-4, comprising platforms such as (U)SIM ((U) Subscriber Identification Module), UICC, R-
- the second electronic or external device will be a smart card terminal in the form of a mobile telephone.
- the portable device is a Multi Media Memory card or the external device is a
- PDA Personal Digital Assistant
- PC Personal Computer
- Background art Web servers such as HTTP or HTTPS servers can be embedded in portable devices like smart cards. Resources residing on the smart card can then be accessed via HTTP by an application running on the terminal to which the smart card is connected.
- HTTP is designed to transmit hypertext pages
- a web browser can be used on the terminal, e.g. as a user interface for smart card applications.
- the application layer Internet protocol HTTP is designed to be used over TCP/IP (Transmission Control Protocol/Internet Protocol) and standard browsers use TCP/IP to transmit HTTP messages.
- TCP/IP Transmission Control Protocol/Internet Protocol
- standard browsers use TCP/IP to transmit HTTP messages.
- transport layer level usually other protocols than TCP are used on transport layer level.
- current smart card solutions hosting a web server use proprietary protocols for transmission of HTTP messages.
- the object is achieved by a method of offering the services of an HTTP or HTTPS server, the server being implemented by or running on a first electronic device, to a second electronic device, where the first electronic device exchanges HTTP messages with the second electronic device over a communication channel between the first and the second electronic device according to the Bearer Independent Protocol.
- the HTTP messages communicated by the first electronic device to the second electronic device over the communication channel are determined to be further communicated within the second electronic device over TCP/IP to an application running on the second electronic device, and the HTTP messages received by the first electronic device from the second electronic device have been communicated within the second electronic device over TCP/IP.
- the application for exchanging the HTTP messages with the server can use TCP/IP, which is the standard protocol for exchanging HTTP messages.
- the application running on the second electronic device is a web browser and the HTTP or HTTPS server serves HTML, xHTML, cHTML or WML pages to this web browser.
- hypertext pages can be used, e.g., to form the user interface of an applica- tion running on the first electronic device.
- the DECLARE SERVICE command is used to notify the second electronic device that the first electronic device offers the services of the HTTP or HTTPS server. This allows the first electronic device to download into the database of the second elec- tronic device the information that the first electronic device provides the services of a web server.
- the user can be authenticated with a standard HTTP WWW-Authenticate delivering PIN-Type and/or PIN- Value attributes.
- a standard HTTP WWW-Authenticate delivering PIN-Type and/or PIN- Value attributes. This allows user identification by solely using HTTP messages understood by a web browser, rendering the use of other commands like APDU (Application Protocol Data Unit) commands unnecessary.
- APDU Application Protocol Data Unit
- the first electronic device is a smart card. In another preferred embodiment of the invention the first electronic device is a Multi Media Memory card.
- One preferred embodiment of the inventions is a computer program element comprising computer program code means to make a first electronic device execute the previously described method.
- Another preferred embodiment of the invention is an electronic device implementing or running an HTTP or HTTPS server and executing the previously described method.
- a further embodiment of the invention is a method of enabling an application running on a second electronic device to use the TCP/IP protocol for exchanging HTTP mes- sages with an HTTP or HTTPS server being implemented by or running on a first electronic device, a communication channel according to the Bearer Independent Protocol being used for exchanging the HTTP messages between the second electronic device and the first electronic device, on the second electronic device the communication channel being managed by a gateway which performs protocol conversion Bearer Independent Protocol - TCP/IP for messages being received from the HTTP or HTTPS server, and protocol conversion TCP/IP - Bearer Independent Protocol for messages being sent to HTTP or HTTPS server.
- the application running the second electronic device can then establish a TCP/IP con- nection to the gateway just as if the connection was established to the HTTP server directly, which makes the use of the Bearer Independent Protocol transparent to the application.
- an internal IP address and an internal domain name are allocated for the gateway and the internal domain name is mapped to the internal IP address, and the internal domain name is used in Uniform Resource Identifiers to indicate that the Uniform Resource Identifier identifies a resource on the first electronic device.
- the first electronic device is a smart card and the Uniform Resource Identifier comprises information to access standardized smart card applications such as (U)SIM and WIM applications.
- the application running on the second electronic device can serve for dis- playing a hypertext user interface of the smart card application.
- a command is sent to the first electronic device in order to open a communication channel when the application running on the second electronic device opens a TCP/IP socket to the gateway.
- the communication channel between the gateway and the HTTP server can then be used as a continuation of a TCP/IP connection between the application running on the second electronic device and the gateway.
- the TCP/IP socket is mapped to the opened channel.
- Each communication channel can then be used as a dedicated channel for one socket connection, simplifying the forwarding of HTTP messages in the gateway.
- the second electronic device is a web browser.
- a web browser is a standard application for displaying hypertext pages and accessing a web server using HTTP.
- the second electronic de- vice is a mobile telephone.
- the second electronic device is a PDA.
- the second electronic device is a PC.
- One preferred embodiment of the inventions is a Computer program element comprising computer program code means to make a device execute the previously described method.
- Another preferred embodiment of the invention is a device running an application and executing the previously described method.
- Fig. 1 is a schematic diagram showing how data is transmitted between a smart card and a remote server using the Bearer Independent Protocol and TCP/IP.
- Fig. 2 is a schematic diagram showing a preferred embodiment of the invention, in particular the components used for data transmission on the external device.
- Fig. 3 is a schematic diagram illustrating how data is exchanged between a smart card web server and a terminal web client using a routing table.
- Fig. 4 is a diagram showing the command sequence for the service declaration between smart card and terminal.
- Fig. 5 is a diagram showing the command sequence for the opening of a communication channel between the smart card and the terminal.
- Fig. 6 is a diagram showing the command sequence for sending data from the terminal web browser to the smart card.
- proactive UICC commands according to the Bearer Independent Protocol as defined in ETSI TS 102 223 (e.g. section 4.11 and section 6), in the following called “BIP commands", are used for communicating HTTP messages between the first electronic device and the external device.
- the Bearer Independent Protocol is the set of commands (OPEN CHANNEL, CLOSE CHANNEL, SEND DATA, RECEIVE DATA, and GET CHANNEL STATUS) and events (Data available, Channel status) which allows a smart card to establish a communication channel with a terminal, and through the terminal to a remote server or a remote device in a network. Between the smart card and the terminal existing lower protocol layers are used to exchange data on the communication channel. Between the terminal and the remote server or remote device different protocols can be used, to make the use of the Bearer Independent Protocol transparent to the remote server or remote device.
- FIG. 1 shows an example of a communication between a smart card 1 and remote server 13 through a terminal 2, using TCP/IP between the terminal and the remote server.
- the communication channel is established between the smart card 1 and the terminal 2.
- the terminal 2 receives data from the card 1 via the SEND command, which the terminal in step 102 inserts into TCP packets and sends them to the remote server 13 over a previously established TCP/IP connection.
- the terminal 2 receives data from the remote server 13 over the TCP/IP connection, strips the data from the TCP packets and sends it to the card 1 in step 104, where the card 1 is notified by the terminal 2 using a Data available event, whereupon the card 1 pulls the data from the terminal 2 sending a RECEIVE command.
- FIG. 2 shows how HTTP messages according to the invention are communicated between a server running on a first electronic device 1, like a web server running on a smart card, and an application 23 running on an external device 2, like a web browser on a smart card terminal.
- This browser can be, e.g., a browser for displaying HTML (Hypertext Modelling Language), xHTML (extensible HTML), cHTML (compact HTML) or WML (Wireless Markup Language) pages.
- HTML Hypertext Modelling Language
- xHTML extensible HTML
- cHTML compact HTML
- WML Wireless Markup Language
- the messages are not transmitted directly via a TCP/IP connection between the server and the browser 23, but via a gateway 24 residing on the terminal 2.
- HTTP messages between the server and the gateway 24 are communicated over communication channels using BIP commands.
- HTTP messages between the gateway 24 and the browser 23 are communicated over TCP/IP sockets. In other words, instead of establishing a TCP/IP connection to the server, the browser
- the gateway 24 forwards the HTTP messages received via the TCP/IP connection from the browser 23 to the server via the communication channel, and in the other direction it forwards the HTTP messages received from the server via the communication channel to the browser 23 via the TCP/IP connection.
- URI Uniforms Resource Identifiers
- the domain name denoting the smart card, in the example "localsmartcard” is mapped to an internal IP address which is assigned to the gateway. This mapping will be fixed e.g. in a static routing and DNS table 25 residing on the smart card.
- FIG. 3 show- ing that a web browser 23 communicates with a smart card web server 4 by consulting a routing table 25.
- a smart card 1 running a web server 4 may indicate this service to the terminal using the "DECLARE SERVICE" command, e.g. with the command sequence proposed in ETSI TS 102 223 (annex M) and as shown in Figure 4.
- the service declaration typically will be carried out at startup.
- the gateway triggers the opening of a communication channel, e.g. by using the command sequence proposed in ETSI TS 102 223, annex M, and as shown in Figure 5.
- the gateway sends an ENVELOPE(Local connection), to make the smart card 1 send an OPEN CHANNEL command to the terminal 2.
- ENVELOPE command is an APDU command used to transmit data to an application residing on the smart card 1, see e.g. ETSI TS 102 221, section 7.4.2.2; the OPEN CHANNEL command is a BIP command as defined in ETSI TS 102 223, section 6.4.27.
- the gateway opens a new communication channel each time the web browser opens a TCP/IP socket to the gateway.
- a socket represents an endpoint of communication on which a connection can be established.
- the gateway then preferably maps the opened socket to the opened channel, so that for each socket which the web browser intends to open to the web server 4 a dedicated communication channel is created between the web server 4 and the gateway 25. Once the communication channel is established, data can be exchanged between the web browser 23 and the web server 4.
- the gateway performs protocol conversion between the Bearer Independent Protocol and TCP/IP by sending the HTTP messages received via the TCP/IP socket from the web browser 23 to the web server 4 via the communication channel, and sending the HTTP messages received from the web server 4 via the communication channel to the web browser 23 via the TCP/IP socket.
- FIG. 6 An example of the command sequence for sending data from the web browser 23 to the web server 4 is given in Figure 6, in accordance with annex M of ETSI TS 102 223.
- the gateway after having received data from the web browser 23, sends an ENVELOPE command to the smart card to inform it that data has arrived and to make it send a RECEIVE DATA command.
- the RECEIVE DATA command is a BIP command as defined in ETSI TS 102 223, section 6.4.29. This command indicates to the gateway the maximum data length the smart card is willing to receive.
- the gateway transmits the data using a TERMINAL RESPONSE command.
- TERMINAL RESPONSE is an APDU command as defined in ETSI TS 102 221, section 10.1. Note that a channel identifier identifying the communication channel on which the communication takes place is transmitted as a parameter in both the ENVELOPE and RECEIVE DATA commands.
- a similar mechanism is employed for transmission of HTTP messages in the other direction, i.e. from the web server 4 to the web browser 23.
- a SEND DATA command will be sent from the smart card 1 to the gateway 24.
- the SEND DATA command is a BIP command as defined in ETSI TS 102 223, section 6.4.30. It will be used for transmitting the HTTP message from the web server 4 to the gateway 24, so that the latter can forward it via TCP/IP to the web browser 23.
- each of the components ⁇ authority>, ⁇ path> and ? ⁇ query> may be absent in a particular URI.
- ⁇ authority> denotes a top hierarchical element for a naming authority.
- the intended usage of a smart card URI generally is for local smart card content accessed by a terminal web browser 23. Therefore, the authority component could be a domain name like "localsmartcard”.
- the ⁇ path> component identifies the resource within the scope of the scheme and authority.
- a complete syntax of the path component for the local smart card can be de- picted as follows:
- df stands for a smart card Dedicated File, which corresponds to a directory in the smart card file system
- ef stands for a smart card Elememtary File, which corresponds to a smart card data file.
- USIM Universal Subscriber Identity Module
- WEVI Wired Identity Module
- ADF Application Dedicated File
- the ⁇ query> component is a string of information to be interpreted by the resource.
- a proposed syntax is:
- ⁇ http_query> n*[BYTE]
- the ⁇ state> component is a string that could be used as an indication to the smart card framework at which entry point to begin the execution of an application which creates dynamic content as response to an HTTP request.
- the smart card server 4 can provide means to enable this security conditions as they are defined for local terminal-application APDU protocols. E.g., it may issue a request in order to ask the user a PIN (Personal Identity Number).
- PIN Personal Identity Number
- the authorization is performed between the client application 23 and the smart card server 4, using the standard HTTP authorization exchange, which is briefly depicted in the following:
- the smart card server 4 will respond to an HTTP request with an HTTP response message containing a Status-Line with a status code "401" (Unauthorized) and a WWW- Authenticate field consisting of at least one challenge that indicates the authentication scheme(s) and parameters applicable to the Request-URL
- the smart card server 4 challenges with a PIN request using a WWW- Authenticate field as follows:
- ⁇ PESfName> string can have different values depending on the type of PIN being asked (e.g. "PIN1", "CHV1")
- the response will be sent to the client application 23.
- the client application 23 should then perform the corresponding dialog with the user (e.g. request PIN or password) and send back the request including an Authorization request header containing the Authorization credentials.
- the PEST value is passed in the response data field.
- the username if present, may be ignored by the smart card server 23.
- the browser 23 displays the following HTML page:
- the access verification in this case is PEST verification.
- the VERIFY PIN command must be sent with the following data:
- the browser sends the following HTTP GET request to the smart card:
- the smart card gateway sends the request in BEP commands.
- the command data is:
- the smart card server 4 may then retrieve the corresponding resource (e.g. content of a file) and send it back with the following HTTP Response sent in BEP commands:
- the gateway 24 When receiving the response, the gateway 24 will encapsulate it in a TCP/IP packet and send it as an HTTP response packet to the browser.
- the URI field can be in absolute form. (e.g. http://localsmartcard 12Al) respecting the rules for smart card URIs as defined in this document.
- the HTTP version which should be implemented on the smart card web server 4 is
- HTTP- Version field should be "HTTP/1.1”.
- the smart card web server 4 will ignore the non-supported fields.
- the smart card server 4 should support the following status codes:
- Client Error Status-Code 401 Unauthorized I 403 Forbidden 1 404 Not Found 1 405 Method Not Allowed 1 413 Request Entity Too Large 1 414 Request-URI Too Large
- Server Error Status-Code 500 Internal Server Error I 505 HTTP Version not supported
- the following table lists the RESPONSE header fields for each of the HTTP request messages that should be supported by the corresponding sending/receiving entities.
- the smart card web server may support the following ENTITY header fields, for each of the HTTP request messages.
- Content-Type HTTP header field should be included by the smart card server depending on the resource being transferred within the HTTP response.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/629,546 US8447836B2 (en) | 2004-06-15 | 2005-06-10 | Protocol conversion “Bearer Independent Protocol (BIP)”—TCP/IP for communication between SIM and terminal |
AT05750686T ATE440436T1 (en) | 2004-06-15 | 2005-06-10 | PROTOCOL CONVERSION ßBEARER INDEPENDENT PROTOCOL (BIP)ß - TCP/IP FOR COMMUNICATION BETWEEN SIM AND END DEVICE |
EP05750686A EP1757070B1 (en) | 2004-06-15 | 2005-06-10 | Protocol conversion "bearer independent protocol (bip)" - tcp/ip for communication between sim and terminal |
DE602005016109T DE602005016109D1 (en) | 2004-06-15 | 2005-06-10 | PROTOCOL CONVERSION "BEARER INDEPENDENT PROTOCOL (BIP)" - TCP / IP FOR COMMUNICATION BETWEEN SIM AND DEVICE |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04291503.3 | 2004-06-15 | ||
EP04291503 | 2004-06-15 | ||
EP04292033.0 | 2004-08-11 | ||
EP04292033A EP1608123A1 (en) | 2004-06-15 | 2004-08-11 | Method and device for communicating HTTP messages with portable devices |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005125154A1 true WO2005125154A1 (en) | 2005-12-29 |
Family
ID=34970683
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2005/001621 WO2005125154A1 (en) | 2004-06-15 | 2005-06-10 | Protocol conversion “bearer independent protocol (bip)”- tcp/ip for communication between sim and terminal |
Country Status (6)
Country | Link |
---|---|
US (1) | US8447836B2 (en) |
EP (2) | EP1608123A1 (en) |
AT (1) | ATE440436T1 (en) |
DE (1) | DE602005016109D1 (en) |
ES (1) | ES2334367T3 (en) |
WO (1) | WO2005125154A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101335758B (en) * | 2008-07-24 | 2011-09-21 | 中兴通讯股份有限公司 | Method and system for access service in SIM card by dual-processor terminal |
JP2012509606A (en) * | 2008-11-20 | 2012-04-19 | 日本電気株式会社 | Communication between client and server in mobile radio communication device |
JP4930377B2 (en) * | 2005-11-21 | 2012-05-16 | 日本電気株式会社 | Communication method between (U) SIM card and client in server mode |
CN102594892A (en) * | 2012-02-22 | 2012-07-18 | 中兴通讯股份有限公司 | Data access method and device |
JP2012531846A (en) * | 2009-06-30 | 2012-12-10 | 中▲興▼通▲訊▼股▲ふぇん▼有限公司 | Data transmission method and terminal |
US9924454B2 (en) | 2007-06-14 | 2018-03-20 | Nokia Technologies Oy | Method, apparatus and system for establishing connection |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102005024122A1 (en) * | 2005-05-25 | 2006-11-30 | Infineon Technologies Ag | Radio-communication arrangement, has data processing device determining whether data is addressed to circuit card, and web-server-program receiving data from circuit card and transmitting to network according to Internet-protocol |
US8532136B1 (en) * | 2005-10-19 | 2013-09-10 | American Megatrends, Inc. | Communication with a handset via a private network |
US8559987B1 (en) * | 2005-12-31 | 2013-10-15 | Blaze Mobile, Inc. | Wireless bidirectional communications between a mobile device and associated secure element |
DE102006024882A1 (en) * | 2006-05-24 | 2007-11-29 | Sagem Orga Gmbh | smart card |
DE102006041526A1 (en) * | 2006-09-05 | 2008-03-20 | Giesecke & Devrient Gmbh | Portable data carrier for communication with a telecommunication terminal |
EP1903466A1 (en) * | 2006-09-20 | 2008-03-26 | Axalto SA | A method for communicating with a personal token, comprising encapsulating a request inside a response |
EP1903465A1 (en) * | 2006-09-20 | 2008-03-26 | Axalto SA | A SIP communication with a secure personal token for interacting with personal data |
EP1933528B9 (en) * | 2006-12-12 | 2018-05-23 | Orange | Secure service access from a communication apparatus with a personal device |
DE102007050836A1 (en) * | 2007-10-24 | 2009-04-30 | Giesecke & Devrient Gmbh | Internet smart card |
US8316150B2 (en) * | 2007-10-31 | 2012-11-20 | Time Warner Cable Inc. | System and method for remotely accessing cablecard |
US7882249B2 (en) * | 2008-01-07 | 2011-02-01 | Sandisk Il Ltd. | Methods and systems for communicating with storage systems using slim IP stacks |
US8028122B2 (en) * | 2008-01-07 | 2011-09-27 | Sandisk Il Ltd. | Methods and systems for classifying storage systems using fixed static-IP addresses |
DE102008004384A1 (en) * | 2008-01-15 | 2009-07-16 | Giesecke & Devrient Gmbh | Secure data communication |
DE102008004693A1 (en) | 2008-01-16 | 2009-08-13 | Giesecke & Devrient Gmbh | Portable data carrier with CAT interpreter |
EP2107807A1 (en) | 2008-04-04 | 2009-10-07 | Irdeto Access B.V. | Conditional access system and smartcard for use in conditional access system |
DE102009004181A1 (en) * | 2008-04-11 | 2009-10-15 | Giesecke & Devrient Gmbh | Processing client requests |
EP2299747A4 (en) * | 2008-07-10 | 2014-06-25 | Sk Planet Co Ltd | Personalized service system based on smart car and method thereof, and smart card applied to the same |
EP2182696A1 (en) * | 2008-10-31 | 2010-05-05 | Gemalto SA | Method of establishing a link between the applications of a subscriber authentication card and an IMS network |
CN101594614B (en) * | 2009-06-30 | 2011-07-13 | 中兴通讯股份有限公司 | Data downloading methods and terminal |
UY32806A (en) * | 2009-08-04 | 2010-09-30 | Telefonica Sa | SYSTEM AND PROCEDURE FOR CONTENT ACCESS CONTROL |
EP2293525A1 (en) * | 2009-09-02 | 2011-03-09 | Gemalto SA | Method for a secure device to resolve an IP address of a target server |
KR101166797B1 (en) * | 2009-09-22 | 2012-07-26 | 에스케이플래닛 주식회사 | System and method for browsing based on smart card, and smart card applied to the same |
US9497632B2 (en) * | 2009-10-01 | 2016-11-15 | T-Mobile Usa, Inc. | System and method for pairing a UICC card with a particular mobile communications device |
EP2395427A1 (en) * | 2010-06-08 | 2011-12-14 | Gemalto SA | Method for connecting to a remote server from a browser enabled with a browser's extension on a host device |
FR2963518B1 (en) * | 2010-07-29 | 2012-09-07 | Myriad France | METHOD FOR CONNECTION BETWEEN A MMSIM CARD AND AN APPLICATION |
ES2524967T3 (en) * | 2010-10-19 | 2014-12-16 | Vodafone Holding Gmbh | Contactless short-range communication device and procedure |
US8606319B2 (en) | 2010-10-20 | 2013-12-10 | Blackberry Limited | Card application toolkit support for IP multimedia subsystem |
US8983541B2 (en) | 2010-10-20 | 2015-03-17 | Blackberry Limited | Card application toolkit support for IP multimedia subsystem |
KR101863677B1 (en) * | 2010-10-27 | 2018-07-13 | 에스케이플래닛 주식회사 | System and method for interfacing between terminal and smart card |
EP2461613A1 (en) | 2010-12-06 | 2012-06-06 | Gemalto SA | Methods and system for handling UICC data |
US9408066B2 (en) | 2010-12-06 | 2016-08-02 | Gemalto Inc. | Method for transferring securely the subscription information and user data from a first terminal to a second terminal |
CN103270807B (en) * | 2010-12-23 | 2017-06-27 | 黑莓有限公司 | Support in card tool box for IP multimedia subsystem |
EP2661697B1 (en) * | 2011-01-07 | 2018-11-21 | Seven Networks, LLC | System and method for reduction of mobile network traffic used for domain name system (dns) queries |
WO2012145817A1 (en) | 2011-04-26 | 2012-11-01 | Research In Motion Limited | Transmission of the pdp content activation rejection cause codes to the uicc |
US8964973B2 (en) | 2012-04-30 | 2015-02-24 | General Electric Company | Systems and methods for controlling file execution for industrial control systems |
US8973124B2 (en) | 2012-04-30 | 2015-03-03 | General Electric Company | Systems and methods for secure operation of an industrial controller |
US9046886B2 (en) | 2012-04-30 | 2015-06-02 | General Electric Company | System and method for logging security events for an industrial control system |
CN102724315B (en) * | 2012-06-21 | 2016-06-08 | 惠州Tcl云创科技有限公司 | The remote-operated method and system of smart card are realized based on smart card web page server |
US9094433B2 (en) * | 2012-06-27 | 2015-07-28 | Qualcomm Incorporated | Systems and methods for bearer independent protocol gateway optimization |
US9172544B2 (en) * | 2012-10-05 | 2015-10-27 | General Electric Company | Systems and methods for authentication between networked devices |
US8898769B2 (en) | 2012-11-16 | 2014-11-25 | At&T Intellectual Property I, Lp | Methods for provisioning universal integrated circuit cards |
US8959331B2 (en) | 2012-11-19 | 2015-02-17 | At&T Intellectual Property I, Lp | Systems for provisioning universal integrated circuit cards |
US9036820B2 (en) | 2013-09-11 | 2015-05-19 | At&T Intellectual Property I, Lp | System and methods for UICC-based secure communication |
US9124573B2 (en) | 2013-10-04 | 2015-09-01 | At&T Intellectual Property I, Lp | Apparatus and method for managing use of secure tokens |
KR101842666B1 (en) * | 2013-10-10 | 2018-05-14 | 구글 엘엘씨 | Systems, methods, and computer program products for managing communications |
US9208300B2 (en) | 2013-10-23 | 2015-12-08 | At&T Intellectual Property I, Lp | Apparatus and method for secure authentication of a communication device |
US9240994B2 (en) | 2013-10-28 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for securely managing the accessibility to content and applications |
US9240989B2 (en) | 2013-11-01 | 2016-01-19 | At&T Intellectual Property I, Lp | Apparatus and method for secure over the air programming of a communication device |
US9313660B2 (en) | 2013-11-01 | 2016-04-12 | At&T Intellectual Property I, Lp | Apparatus and method for secure provisioning of a communication device |
US9197717B2 (en) | 2013-11-27 | 2015-11-24 | At&T Intellectual Property I, Lp | Server-side scheduling for media transmissions according to client device states |
US9413759B2 (en) | 2013-11-27 | 2016-08-09 | At&T Intellectual Property I, Lp | Apparatus and method for secure delivery of data from a communication device |
US9713006B2 (en) | 2014-05-01 | 2017-07-18 | At&T Intellectual Property I, Lp | Apparatus and method for managing security domains for a universal integrated circuit card |
US10462258B2 (en) * | 2014-08-27 | 2019-10-29 | Huawei Technologies Co., Ltd. | Resource download method, electronic device, and apparatus |
KR102264992B1 (en) | 2014-12-31 | 2021-06-15 | 삼성전자 주식회사 | Method and Device for allocating a server in wireless communication system |
EP3076701A1 (en) * | 2015-03-31 | 2016-10-05 | Gemalto Sa | Method and chip for detecting a corruption of at least one configuration parameter |
US10135791B2 (en) | 2015-08-25 | 2018-11-20 | Anchorfree Inc. | Secure communications with internet-enabled devices |
CN107454058A (en) * | 2017-06-29 | 2017-12-08 | 广州视源电子科技股份有限公司 | Data sending method, system, readable storage medium and computer equipment |
CN111464550B (en) * | 2020-04-10 | 2021-12-28 | 南京铱迅信息技术股份有限公司 | HTTPS transparent protection method for message processing equipment |
CN114430548B (en) * | 2020-10-15 | 2023-07-21 | 中移互联网有限公司 | Service processing method, device and system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2823408B1 (en) * | 2001-04-09 | 2003-05-30 | Gemplus Card Int | METHOD FOR TRANSMITTING DATA BY A MOBILE STATION HAVING A STEP OF DETERMINING THE MDS |
DE10139745A1 (en) * | 2001-08-13 | 2003-02-27 | Siemens Ag | Method and device for establishing a communication link |
US7280847B2 (en) * | 2002-07-26 | 2007-10-09 | Way Systems Inc | System and method for mobile transactions using the bearer independent protocol |
JP2006505992A (en) * | 2002-11-08 | 2006-02-16 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Method and apparatus for permitting remote access in a data network |
US20080010456A1 (en) * | 2003-01-31 | 2008-01-10 | Jacques Seif | Communication between a smart card and a server |
US20050138004A1 (en) * | 2003-12-17 | 2005-06-23 | Microsoft Corporation | Link modification system and method |
US20050259673A1 (en) * | 2004-05-18 | 2005-11-24 | Axalto Inc. | Method and system for end-to-end communication between a universal integrated circuit card and a remote entity over an IP-based wireless wide area network and the internet |
-
2004
- 2004-08-11 EP EP04292033A patent/EP1608123A1/en not_active Withdrawn
-
2005
- 2005-06-10 WO PCT/IB2005/001621 patent/WO2005125154A1/en active Application Filing
- 2005-06-10 DE DE602005016109T patent/DE602005016109D1/en active Active
- 2005-06-10 EP EP05750686A patent/EP1757070B1/en not_active Not-in-force
- 2005-06-10 AT AT05750686T patent/ATE440436T1/en not_active IP Right Cessation
- 2005-06-10 US US11/629,546 patent/US8447836B2/en not_active Expired - Fee Related
- 2005-06-10 ES ES05750686T patent/ES2334367T3/en active Active
Non-Patent Citations (3)
Title |
---|
"Smart cards; Card Application Toolkit (CAT) (Release 6); ETSI TS 102 223", ETSI STANDARDS, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE, SOPHIA-ANTIPO, FR, vol. SCP-WG3, no. V640, March 2004 (2004-03-01), XP014016223, ISSN: 0000-0001 * |
BADRA M ET AL: "Toward SSL integration in SIM smartcards", WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2004. WCNC. 2004 IEEE ATLANTA, GA, USA 21-25 MARCH 2004, PISCATAWAY, NJ, USA,IEEE, vol. 2, 21 March 2004 (2004-03-21), pages 889 - 894, XP010708248, ISBN: 0-7803-8344-3 * |
REES J ET AL: "WEBCARD: A JAVA CARD WEB SERVER", SMART CARD RESEARCH AND ADVANCED APPLICATIONS. IFIP WORKING CONFERENCE ON SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 20 September 2000 (2000-09-20), pages 197 - 207, XP001013569 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4930377B2 (en) * | 2005-11-21 | 2012-05-16 | 日本電気株式会社 | Communication method between (U) SIM card and client in server mode |
US9924454B2 (en) | 2007-06-14 | 2018-03-20 | Nokia Technologies Oy | Method, apparatus and system for establishing connection |
CN101335758B (en) * | 2008-07-24 | 2011-09-21 | 中兴通讯股份有限公司 | Method and system for access service in SIM card by dual-processor terminal |
JP2012509606A (en) * | 2008-11-20 | 2012-04-19 | 日本電気株式会社 | Communication between client and server in mobile radio communication device |
US8948101B2 (en) | 2008-11-20 | 2015-02-03 | Nec Corporation | Client-server communications in mobile radio communications device |
JP2012531846A (en) * | 2009-06-30 | 2012-12-10 | 中▲興▼通▲訊▼股▲ふぇん▼有限公司 | Data transmission method and terminal |
CN102594892A (en) * | 2012-02-22 | 2012-07-18 | 中兴通讯股份有限公司 | Data access method and device |
Also Published As
Publication number | Publication date |
---|---|
ES2334367T3 (en) | 2010-03-09 |
US8447836B2 (en) | 2013-05-21 |
EP1608123A1 (en) | 2005-12-21 |
US20070239857A1 (en) | 2007-10-11 |
EP1757070A1 (en) | 2007-02-28 |
EP1757070B1 (en) | 2009-08-19 |
DE602005016109D1 (en) | 2009-10-01 |
ATE440436T1 (en) | 2009-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8447836B2 (en) | Protocol conversion “Bearer Independent Protocol (BIP)”—TCP/IP for communication between SIM and terminal | |
KR100723006B1 (en) | Method for registering a user on an internet-type network directory server and/or for locating a user on said network, and smart card therefor | |
CN102333110B (en) | VPN network client for mobile device having fast reconnect | |
CN102316153B (en) | VPN network client for mobile device having dynamically constructed display for native access to web mail | |
CN102333075B (en) | VPN network client for mobile device having fast reconnect | |
FI109756B (en) | A method of utilizing local resources in a communication system, a communication system and wireless communication | |
US6606663B1 (en) | Method and apparatus for caching credentials in proxy servers for wireless user agents | |
JP3795754B2 (en) | Communication method between a user device and a network, in particular the Internet, and an architecture for the implementation of the communication method | |
CN102316094B (en) | Multi-service VPN network client for mobile device having integrated acceleration | |
CN102333306B (en) | Multi-service vpn network client for mobile device having integrated acceleration | |
US6977917B2 (en) | Method and apparatus for mapping an IP address to an MSISDN number within a service network | |
CN101010927A (en) | Protocol conversion 'bearer independent protocol (bip)'-TCP/IP for communication between SIM and terminal | |
KR100644616B1 (en) | Method for single-sign-on based on markup language, and system for the same | |
US20050014489A1 (en) | System, apparatus, and method for providing a mobile server | |
US20020049675A1 (en) | System and user interface for managing users and services over a wireless communications network | |
US7752322B2 (en) | System for ubiquitous network presence and access without cookies | |
US20050153683A1 (en) | Plug and play mobile services | |
US20100138525A1 (en) | Method for providing a uicc with an operator dns ip address | |
US20090119364A1 (en) | Method and system for exchange of data between remote servers | |
Kumar et al. | WAP: present and future | |
US7743405B2 (en) | Method of authentication via a secure wireless communication system | |
US20100223462A1 (en) | Method and device for accessing services and files | |
JP5191076B2 (en) | Information providing apparatus and method | |
Urien | Programming internet smartcard with XML scripts | |
Ruggaber et al. | Using WAP as the enabling technology for CORBA in mobile and wireless environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005750686 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580023401.8 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2005750686 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11629546 Country of ref document: US Ref document number: 2007239857 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 11629546 Country of ref document: US |