WO2009002043A2 - System for controlling smart card and method thereof - Google Patents
System for controlling smart card and method thereof Download PDFInfo
- Publication number
- WO2009002043A2 WO2009002043A2 PCT/KR2008/003442 KR2008003442W WO2009002043A2 WO 2009002043 A2 WO2009002043 A2 WO 2009002043A2 KR 2008003442 W KR2008003442 W KR 2008003442W WO 2009002043 A2 WO2009002043 A2 WO 2009002043A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- applet
- delete
- key
- mobile terminal
- management server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0433—Key management protocols
Definitions
- the present invention relates to a system and method for managing smart cards .
- a smart card is an electronic card in which an Integrated Circuit (IC) chip, provided with a micro processor and an operating system which have self-arithmetic functions, memory, and an encryption algorithm, is attached onto the surface of a plastic card, which has the same material and size as a general credit card.
- IC Integrated Circuit
- smart cards can store and process a large amount of information and operations, and provide excellent security function, the necessity for smart cards has increased.
- a smart card can be used for finance, communication, medical services, security services, and broadcasting.
- SCMS Smart card Management System
- the SCMS is a system for managing all the data of a card as related to the type, manufacture and memory, and individual characteristics of each card, and managing applets for application to the card.
- an object of the present invention is to provide a system and method for managing smart cards, which causes a third organization to possess master keys, used to grant the right to manage respective smart cards, thereby effectively managing of the smart cards .
- the deletion of the applet should be approved by an affiliated company which provided the applet. Therefore, another object of the present invention is to provide a system and method for managing smart cards, which secures the independence of additional services provided by an affiliated company.
- a system for managing smart cards includes a key management server for managing at least one master key used to grant the right to manage a smart card which operates in conjunction with a mobile terminal, and generating an installation key, used to grant the right to install or store a predetermined applet, based on the master key; and a card management server for receiving the generated installation key, and providing the applet to the mobile terminal based on the installation key in response to a request from the mobile terminal .
- a system for managing smart cards includes a key management server for managing at least one master key used to grant the right to manage a smart card which operates in conjunction with a mobile terminal, and generating a delete key used to grant the right to delete an installed or stored applet based on the master key; and a card management server for receiving the generated delete key, and providing approval to the mobile terminal to delete the applet based on the delete key in response to a delete request from the mobile terminal.
- a method of managing smart cards includes receiving an applet transmission message, including an applet requested by a mobile terminal, from an applet management server; performing cross-certification in conjunction with the mobile terminal based on a pre-stored installation key used to grant the right to install the applet included in the received applet transmission message; and transmitting the applet transmission message to the mobile terminal if the cross- certification is successful.
- a method of managing smart cards includes receiving an applet delete approval message, approving deletion of an applet requested by a mobile terminal, from an applet management server; generating a delete key used to grant the right to delete the applet when receiving the applet delete approval message; and transmitting an applet delete approval message including the generated delete key to a card management server.
- FIG. 1 is a diagram showing an example of the schematic configuration of a system according to an embodiment of the present invention
- FIG. 2 is a first flowchart showing a method of managing smart cards according to an embodiment of the present invention.
- FIG. 3 is a second flowchart showing a method of managing smart cards according to an embodiment of the present invention. description of reference numerals of principal elements in the drawings>
- a smart card may indicate any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card, and a Removable User Identification Module (RUIM) card, which are capable of being installed on the mobile terminal or detachably attached to the mobile terminal.
- SIM Subscriber Identification Module
- USIM Universal Subscriber Identification Module
- UAM User Identification Module
- RUIM Removable User Identification Module
- the present invention proposes to grant the right to mange a smart card to a third organization instead of a mobile communication company which provides the smart card and an affiliated company which provides an application (herein after referred to as an 'applet') used for additional services .
- the present invention causes a third organization to possess and manage a master key which can grant the right to manage a smart card.
- FIG. 1 is a diagram showing an example of the schematic configuration of a system according to an embodiraent of the present invention.
- a system for managing smart cards according to the present invention may include a smart card 110, a mobile terminal 120, a card management server 130, a key management server 140, an applet management server 150, and a database 151.
- the smart card 110 may include terminal information, related to the mobile terminal, and applets, used for various additional services. Therefore, the mobile terminal 120 may- request an applet to be installed or stored in the smart card 110 or may request an installed or stored applet to be deleted.
- the key management server 130 may possess and manage master keys, each of which matches a smart card which operates in conjunction with a mobile terminal, and which grant the right to install and store a predetermined applet in the smart card or delete the predetermined applet from the smart card.
- the key management server 140 can generate an installation key, used to grant only the right to install or store an applet in a smart card corresponding to the master key, based on the master key.
- the key management server 140 can generate a delete key, used to grant only the right to delete the applet installed or stored in a smart card corresponding to a master key, based on the master key.
- the applet management server 150 may be a server managed by an affiliated company.
- the applet management server 150 can search a database for an applet and then provide the found applet. Further, the applet management server 150 can determine whether to delete the applet according to an applet delete request.
- the database 151 operates in conjunction with the applet management server 150, and can construct and manage an applet desired to be installed or stored in the smart card 110.
- the present invention can install or store an applet in a smart card based on the installation key and can delete the installed or stored applet based on the delete key, both the installation key and the delete key being derived from the master key.
- the present invention causes a third organization to possess a master key used to grant the right to manage a smart card, thereby effectively managing the smart card.
- FIG. 2 is a first flowchart showing a method of managing smart cards according to an embodiment of the present invention.
- the key management server can generate an installation key, used to grant the right to install or store an applet in a smart card corresponding to one of the master keys, based on the master key at step S210.
- the key management server can provide the generated installation key to a mobile terminal at step S220 beforehand.
- the mobile terminal can generate an applet request message requesting the applet desired to be installed or stored in a smart card which operates in conjunction with the mobile terminal.
- the mobile terminal can transmits the generated applet request message to the card management server at step S230.
- the card management server can transmit the applet request message to the applet management server at step S240.
- the applet management server can search the database for an applet corresponding to the applet request message at step S250.
- the applet management server can generate an applet transmission message transmitting the found applet.
- the applet management server can transmit the generated applet transmission message to the card management server at step S260.
- the card management server can perform cross-certification in conjunction with the mobile terminal based on the pre-stored installation key at step S270. If the cross-certification is successful, the card management server can provide the applet transmission message which it has received to the mobile terminal at step S280.
- the mobile terminal can extract the applet included in the applet transmission message and then install or store the extracted applet in the smart card at step S290.
- the present invention can generate and provide an installation key, used to grant only the right to install or store an applet in a smart card, beforehand in a process of registering the smart card. Therefore, the present invention can freely install or store an applet in response to a user' s request . Meanwhile, in the case of deleting an applet installed or stored in a smart card, the present invention proposes a method of securing the independence of additional services corresponding to the applet. For this purpose, the present invention can receive approval to delete an applet, corresponding to relevant additional services, from an affiliated company for providing additional services, and then generate and provide a delete key used to grant only the right to delete an applet.
- FIG. 3 is a second flowchart showing a method of managing smart cards according to an embodiment of the present invention.
- the mobile terminal can generate an applet delete request message requesting deletion of an applet installed or stored in a smart card which operates in conjunction with the mobile terminal in response to a request from a user.
- the mobile terminal can transmit the generated applet delete request message to the card management server at step S310.
- the card management server can receive the applet delete request message, and then transmit the received applet delete request message to the key management server at step S320.
- the key management server can transmit the applet delete request message to the applet management server at step S330.
- the applet management server can determine whether to delete the applet corresponding to the applet delete request message. That is, when it is decided to delete the applet, the applet management server can generate an applet delete approval message used to delete the applet . Thereafter, the applet management server can transmit the generated applet delete approval message to the key- management server at step S340.
- the key management server When the key management server receives the applet delete approval message, the key management server can generate a delete key used to grant the right to delete an applet corresponding to the applet delete approval message at step S350.
- the delete key may mean a temporarily generated key to which only the right to delete a single applet is granted, and which can be used for a predetermined time period. The reason for this is to protect other applets installed or stored in the smart card.
- the key management server can add the generated delete key to the applet delete approval message.
- the key management server can transmit the applet delete approval message, to which the delete key has been added, to the card management server at step S360.
- the card management server When the card management server receives the applet delete approval message including the delete key, the card management server can perform cross-certification in conjunction with the mobile terminal, based on the delete key, at step S370. If the cross-certification is successful, the card management server can transmit the applet delete approval message to the mobile terminal at step S380.
- the mobile terminal when the mobile terminal receives the applet delete approval message, the mobile terminal can delete a predetermined applet installed or stored in the smart card, based on the applet delete approval message at step S390.
- an approval to delete the applet is required from the affiliated company which provided the applet, so that the affiliated company can secure the independence of additional services.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
- Lock And Its Accessories (AREA)
Abstract
A system for managing smart cards is disclosed. A system for managing smart cards, comprises a key management server for managing at least one master key used to grant the right to manage a smart card which operates in conjunction with a mobile terminal, and generates an installation key, used to grant the right to install or store a predetermined applet, based on the master key, and a card management server for receiving the generated installation key, and provides the applet to the mobile terminal based on the installation key in response to a request from the mobile terminal.
Description
[DESCRIPTION]
[invention Title]
SYSTEM FOR CONTROLLING SMART CARD AND METHOD THEREOF
[Technical Field]
The present invention relates to a system and method for managing smart cards .
[Background Art] A smart card is an electronic card in which an Integrated Circuit (IC) chip, provided with a micro processor and an operating system which have self-arithmetic functions, memory, and an encryption algorithm, is attached onto the surface of a plastic card, which has the same material and size as a general credit card.
Since smart cards can store and process a large amount of information and operations, and provide excellent security function, the necessity for smart cards has increased. For example, such a smart card can be used for finance, communication, medical services, security services, and broadcasting.
A Smart card Management System (SCMS) for installing, deleting, and updating an application (hereinafter referred to as an 'applet')/ thereby enabling various types of
additional services to be used, has become required for smart cards .
Here, the SCMS is a system for managing all the data of a card as related to the type, manufacture and memory, and individual characteristics of each card, and managing applets for application to the card.
Meanwhile, not only terminal information but also various applets are installed in a smart card. Therefore, a collision about the right to manage a smart card between a mobile communication company, which provides the smart card, and an affiliated company, which provides applets, is unavoidable.
Therefore, research into a system and method for effectively managing a smart card on which various applets are installed must be performed.
[Disclosure]
Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a system and method for managing smart cards, which causes a third organization to possess master keys, used to grant the right to manage respective smart cards, thereby effectively managing of the smart cards .
In order to delete an applet installed or stored in a smart card, the deletion of the applet should be approved by an affiliated company which provided the applet. Therefore, another object of the present invention is to provide a system and method for managing smart cards, which secures the independence of additional services provided by an affiliated company.
For this purpose, a system for managing smart cards according to an aspect of the present invention, includes a key management server for managing at least one master key used to grant the right to manage a smart card which operates in conjunction with a mobile terminal, and generating an installation key, used to grant the right to install or store a predetermined applet, based on the master key; and a card management server for receiving the generated installation key, and providing the applet to the mobile terminal based on the installation key in response to a request from the mobile terminal .
A system for managing smart cards according to another aspect of the present invention, includes a key management server for managing at least one master key used to grant the right to manage a smart card which operates in conjunction with a mobile terminal, and generating a delete key used to grant the right to delete an installed or stored applet based on the master key; and a card management server for receiving
the generated delete key, and providing approval to the mobile terminal to delete the applet based on the delete key in response to a delete request from the mobile terminal.
A method of managing smart cards according to another aspect of the present invention, includes receiving an applet transmission message, including an applet requested by a mobile terminal, from an applet management server; performing cross-certification in conjunction with the mobile terminal based on a pre-stored installation key used to grant the right to install the applet included in the received applet transmission message; and transmitting the applet transmission message to the mobile terminal if the cross- certification is successful.
A method of managing smart cards according to another aspect of the present invention, includes receiving an applet delete approval message, approving deletion of an applet requested by a mobile terminal, from an applet management server; generating a delete key used to grant the right to delete the applet when receiving the applet delete approval message; and transmitting an applet delete approval message including the generated delete key to a card management server.
[Description of Drawings]
FIG. 1 is a diagram showing an example of the schematic configuration of a system according to an embodiment of the present invention;
FIG. 2 is a first flowchart showing a method of managing smart cards according to an embodiment of the present invention; and
FIG. 3 is a second flowchart showing a method of managing smart cards according to an embodiment of the present invention. description of reference numerals of principal elements in the drawings>
110: smart card
120: mobile terminal
130: card management server 140: key management server
150: applet management server
151: database
[Best Model
[Mode for Invention]
A system and method for managing smart cards according to an embodiment of the present invention with reference to attached FIGS. 1 to 3 will be described in detail below.
Here, a smart card may indicate any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card, and a Removable User Identification Module (RUIM) card, which are capable of being installed on the mobile terminal or detachably attached to the mobile terminal.
The present invention proposes to grant the right to mange a smart card to a third organization instead of a mobile communication company which provides the smart card and an affiliated company which provides an application (herein after referred to as an 'applet') used for additional services .
For this purpose, the present invention causes a third organization to possess and manage a master key which can grant the right to manage a smart card.
FIG. 1 is a diagram showing an example of the schematic configuration of a system according to an embodiraent of the present invention. As shown in FIG. 1, a system for managing smart cards according to the present invention may include a smart card 110, a mobile terminal 120, a card management server 130, a key management server 140, an applet management server 150, and a database 151.
The smart card 110 may include terminal information, related to the mobile terminal, and applets, used for various additional services. Therefore, the mobile terminal 120 may- request an applet to be installed or stored in the smart card 110 or may request an installed or stored applet to be deleted.
The key management server 130 may possess and manage master keys, each of which matches a smart card which operates in conjunction with a mobile terminal, and which grant the right to install and store a predetermined applet in the smart card or delete the predetermined applet from the smart card.
The key management server 140 can generate an installation key, used to grant only the right to install or store an applet in a smart card corresponding to the master key, based on the master key. The key management server 140 can generate a delete key, used to grant only the right to delete the applet installed or stored in a smart card corresponding to a master key, based on the master key. The applet management server 150 may be a server managed by an affiliated company. The applet management server 150 can search a database for an applet and then provide the found applet. Further, the applet management server 150 can determine whether to delete the applet according to an applet delete request.
The database 151 operates in conjunction with the applet management server 150, and can construct and manage an applet desired to be installed or stored in the smart card 110. The present invention can install or store an applet in a smart card based on the installation key and can delete the installed or stored applet based on the delete key, both the installation key and the delete key being derived from the master key. As described above, the present invention causes a third organization to possess a master key used to grant the right to manage a smart card, thereby effectively managing the smart card.
FIG. 2 is a first flowchart showing a method of managing smart cards according to an embodiment of the present invention.
As shown in FIG. 2, since the key management server possesses master keys corresponding to respective smart cards which have been previously registered, the key management server can generate an installation key, used to grant the right to install or store an applet in a smart card corresponding to one of the master keys, based on the master key at step S210.
The key management server can provide the generated installation key to a mobile terminal at step S220 beforehand.
When a user requires an applet, the mobile terminal can generate an applet request message requesting the applet desired to be installed or stored in a smart card which operates in conjunction with the mobile terminal.
The mobile terminal can transmits the generated applet request message to the card management server at step S230. The card management server can transmit the applet request message to the applet management server at step S240.
When the applet management server receives the applet request message, the applet management server can search the database for an applet corresponding to the applet request message at step S250. The applet management server can generate an applet transmission message transmitting the found applet.
The applet management server can transmit the generated applet transmission message to the card management server at step S260.
Therefore, when the card management server receives the applet transmission message, the card management server can perform cross-certification in conjunction with the mobile terminal based on the pre-stored installation key at step S270.
If the cross-certification is successful, the card management server can provide the applet transmission message which it has received to the mobile terminal at step S280.
Finally, when the mobile terminal receives the applet transmission message, the mobile terminal can extract the applet included in the applet transmission message and then install or store the extracted applet in the smart card at step S290.
The present invention can generate and provide an installation key, used to grant only the right to install or store an applet in a smart card, beforehand in a process of registering the smart card. Therefore, the present invention can freely install or store an applet in response to a user' s request . Meanwhile, in the case of deleting an applet installed or stored in a smart card, the present invention proposes a method of securing the independence of additional services corresponding to the applet. For this purpose, the present invention can receive approval to delete an applet, corresponding to relevant additional services, from an affiliated company for providing additional services, and then generate and provide a delete key used to grant only the right to delete an applet.
FIG. 3 is a second flowchart showing a method of managing smart cards according to an embodiment of the present invention.
As shown in FIG. 3, when a user wants to delete an applet, the mobile terminal can generate an applet delete request message requesting deletion of an applet installed or stored in a smart card which operates in conjunction with the mobile terminal in response to a request from a user.
The mobile terminal can transmit the generated applet delete request message to the card management server at step S310.
The card management server can receive the applet delete request message, and then transmit the received applet delete request message to the key management server at step S320. The key management server can transmit the applet delete request message to the applet management server at step S330.
When the applet management server receives the applet delete request message, the applet management server can determine whether to delete the applet corresponding to the applet delete request message. That is, when it is decided to delete the applet, the applet management server can generate an applet delete approval message used to delete the applet .
Thereafter, the applet management server can transmit the generated applet delete approval message to the key- management server at step S340.
When the key management server receives the applet delete approval message, the key management server can generate a delete key used to grant the right to delete an applet corresponding to the applet delete approval message at step S350.
Here, the delete key may mean a temporarily generated key to which only the right to delete a single applet is granted, and which can be used for a predetermined time period. The reason for this is to protect other applets installed or stored in the smart card.
Therefore, the key management server can add the generated delete key to the applet delete approval message.
The key management server can transmit the applet delete approval message, to which the delete key has been added, to the card management server at step S360.
When the card management server receives the applet delete approval message including the delete key, the card management server can perform cross-certification in conjunction with the mobile terminal, based on the delete key, at step S370.
If the cross-certification is successful, the card management server can transmit the applet delete approval message to the mobile terminal at step S380.
In the result, when the mobile terminal receives the applet delete approval message, the mobile terminal can delete a predetermined applet installed or stored in the smart card, based on the applet delete approval message at step S390.
As described above, in the present invention, in order to delete an applet installed or stored in the smart card, an approval to delete the applet is required from the affiliated company which provided the applet, so that the affiliated company can secure the independence of additional services.
The system and method for managing smart cards according to the present invention can be modified and applied in various forms within the scope of the technical spirit of the present invention, and is not limited to the above-described embodiments. Further, the preferred embodiments and drawings of the present invention have been disclosed not for the purpose of limiting the scope of the technical spirit of the present invention but for the purpose of describing the present invention in detail. In the above- described present invention, since it will be understood by those skilled in the art that various substitutions, modifications, and changes may be made without departing from
the technical spirit of the invention, the present invention is not limited to the embodiments and attached drawings, and the scope of the present invention must be determined by- including all the following claims and equivalents .
Claims
[CLAIMS]
[Claim l]
A system for managing smart cards, comprising: a key management server for managing at least one master key used to grant a right to manage a smart card which operates in conjunction with a mobile terminal, and generating an installation key, used to grant a right to install or store a predetermined applet, based on the master key,- and a card management server for receiving the generated installation key, and providing the applet to the mobile terminal based on the installation key in response to a request from the mobile terminal.
[Claim 2] The system according to claim 1, further comprising an applet management server for, when the applet desired to be installed or stored in the smart card which operates in conjunction with the mobile terminal is requested by the mobile terminal, searching for the requested applet, and then providing the found applet to the card management server. [Claim 3]
The system according to claim 1, wherein the key management server generates the installation key, used to grant only a right to install or store the applet in the smart card corresponding to the master key, based on the master key, and then providing the generated installation key- to the mobile terminal . [Claim 4]
The system according to claim I7 wherein the smart card is any one of a Subscriber Identification Module (SIM) card, a Universal Subscriber Identification Module (USIM) card, a User Identification Module (UIM) card, and a Removable User Identification Module (RUIM) card, which can be installed on the mobile terminal or detachably attached to the mobile terminal. [Claim 5]
A system for managing smart cards, comprising: a key management server for managing at least one master key used to grant a right to manage a smart card which operates in conjunction with a mobile terminal, and generating a delete key used to grant a right to delete an installed or stored applet based on the master key; and a card management server for receiving the generated delete key, and providing approval to the mobile terminal to delete the applet based on the delete key in response to a delete request from the mobile terminal. [Claim 6]
The system according to claim 5, further comprising an applet management server for, when the applet installed or stored in the smart card which operates in conjunction with the mobile terminal is requested to be deleted by the mobile terminal, determining whether to delete the applet requested to be deleted, and notifying the card management server of a determination result. [Claim 7]
The system according to claim 5, wherein the key management server generates the delete key, used to grant only the right to delete the applet installed or stored in the smart card corresponding to the master key, based on the master key, and then providing the generated delete key to the mobile terminal. [Claim 8]
The system according to claim 7, wherein the delete key is a temporarily generated key to which only the right to delete a single applet is granted and which can be used only for a predetermined time period. [Claim 9]
A method of managing smart cards, comprising: receiving an applet transmission message, including an applet requested by a mobile terminal, from an applet management server; performing cross-certification in conjunction with the mobile terminal based on a pre-stored installation key used to grant a right to install the applet included in the received applet transmission message; and transmitting the applet transmission message to the mobile terminal if the cross-certification is successful. [Claim lθ]
The method according to claim 9, wherein the reception of the applet transmission message comprises : receiving an applet request message, requesting the applet desired to be installed in a smart card which operates in conjunction with the mobile terminal, from the mobile terminal ; transmitting the applet request message to the applet management server; and receiving the applet transmission message, including the applet, from the applet management server as a response to the applet request message. [Claim ll]
A method of managing smart cards, comprising: receiving an applet delete approval message, approving deletion of an applet requested by a mobile terminal, from an applet management server; generating a delete key used to grant a right to delete the applet when receiving the applet delete approval message; and transmitting an applet delete approval message including the generated delete key to a card management server. [Claim 12]
The method according to claim 11, wherein the reception of the applet delete approval message comprises: receiving an applet delete request message, requesting deletion of an applet installed or stored in a smart card which operates in conjunction with the mobile terminal, from the mobile terminal; transmitting the received applet delete request message to the applet management server; and receiving the applet delete approval message generated by the applet management server as a response to the applet delete request message. [Claim 13]
The method according to claim 11, wherein the transmission of the applet delete approval message comprises: Generating the applet delete approval message including the delete key; transmitting the generated applet delete approval message, including the delete key to the card management server; and wherein, the card management server performs cross-certification in conjunction with the mobile terminal based on the delete key included in the received applet delete approval message when the applet delete approval message is received and, if the cross-certification is successful, transmits the applet delete approval message to the mobile terminal .
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08766403A EP2162830A4 (en) | 2007-06-22 | 2008-06-18 | System for controlling smart card and method thereof |
JP2010513112A JP5485880B2 (en) | 2007-06-22 | 2008-06-18 | System and method for managing smart cards |
US12/666,219 US10360409B2 (en) | 2007-06-22 | 2008-06-18 | System for controlling smart card and method thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2007-0061691 | 2007-06-22 | ||
KR1020070061691A KR101030489B1 (en) | 2007-06-22 | 2007-06-22 | system for controlling smart card and method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009002043A2 true WO2009002043A2 (en) | 2008-12-31 |
WO2009002043A3 WO2009002043A3 (en) | 2009-02-12 |
Family
ID=40186145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2008/003442 WO2009002043A2 (en) | 2007-06-22 | 2008-06-18 | System for controlling smart card and method thereof |
Country Status (5)
Country | Link |
---|---|
US (1) | US10360409B2 (en) |
EP (1) | EP2162830A4 (en) |
JP (1) | JP5485880B2 (en) |
KR (1) | KR101030489B1 (en) |
WO (1) | WO2009002043A2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2043016A1 (en) * | 2007-09-27 | 2009-04-01 | Nxp B.V. | Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications |
KR101095163B1 (en) * | 2008-08-27 | 2011-12-16 | 에스케이플래닛 주식회사 | System working together by terminal and smart card for processing widget and method thereof |
EP2273748A1 (en) * | 2009-07-09 | 2011-01-12 | Gemalto SA | Method of managing an application embedded in a secured electronic token |
KR101959529B1 (en) * | 2012-07-13 | 2019-03-18 | 에스케이플래닛 주식회사 | Service operation system based on applet and method there of |
KR102210402B1 (en) * | 2014-01-17 | 2021-02-02 | 에스케이플래닛 주식회사 | Apparatus and method for issuing applet |
KR102557344B1 (en) * | 2016-05-26 | 2023-07-18 | 강우찬 | Method of data processing in automatic meter reading system using an applet on universal subscriber identify module and apparatus for the same |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
DE69824437T2 (en) | 1997-10-14 | 2005-06-23 | Visa International Service Association, Foster City | PERSONALIZING CHIP CARDS |
JP2001312325A (en) | 2000-04-28 | 2001-11-09 | Hitachi Ltd | Method and system for issuing program license key |
US6880084B1 (en) * | 2000-09-27 | 2005-04-12 | International Business Machines Corporation | Methods, systems and computer program products for smart card product management |
JP2002258966A (en) | 2001-02-28 | 2002-09-13 | Dainippon Printing Co Ltd | Program download system for general-use subscriber identifying module |
US20040015958A1 (en) | 2001-05-15 | 2004-01-22 | Veil Leonard Scott | Method and system for conditional installation and execution of services in a secure computing environment |
KR100863517B1 (en) * | 2002-04-13 | 2008-10-15 | 주식회사 케이티프리텔 | Smart card management apparatus and method to use wireless communication network |
JP2004030238A (en) | 2002-06-26 | 2004-01-29 | Dainippon Printing Co Ltd | Ic card region lending management system |
KR100489783B1 (en) * | 2003-03-06 | 2005-05-16 | 송대석 | Smart-card and the management method for optional applet |
JP4557969B2 (en) | 2003-03-31 | 2010-10-06 | エヌエックスピー ビー ヴィ | How to grant smart card change rights |
KR100583244B1 (en) * | 2003-07-31 | 2006-05-25 | 에스케이 텔레콤주식회사 | Service applet of smart card for off-line |
KR101089383B1 (en) * | 2004-04-06 | 2011-12-02 | 주식회사 비즈모델라인 | Card Terminal for Loading Applicationor Data |
US20060093149A1 (en) * | 2004-10-30 | 2006-05-04 | Shera International Ltd. | Certified deployment of applications on terminals |
EP1839282A1 (en) * | 2004-12-07 | 2007-10-03 | Philips Intellectual Property & Standards GmbH | System and method for application management on multi-application smart cards |
US7628322B2 (en) | 2005-03-07 | 2009-12-08 | Nokia Corporation | Methods, system and mobile device capable of enabling credit card personalization using a wireless network |
EP1811421A1 (en) * | 2005-12-29 | 2007-07-25 | AXSionics AG | Security token and method for authentication of a user with the security token |
US8239684B2 (en) * | 2007-03-28 | 2012-08-07 | Nec Corporation | Software IC card system, management server, terminal, service providing server, service providing method, and program |
JP2010205376A (en) * | 2009-03-06 | 2010-09-16 | Sony Corp | Information processor, data recording system, information processing method, and program |
EP2378739B1 (en) * | 2010-04-15 | 2015-04-01 | BlackBerry Limited | Method and system for transmitting an application to a device |
US9202083B2 (en) * | 2012-05-22 | 2015-12-01 | Partnet, Inc. | Systems and methods for verifying uniqueness in anonymous authentication |
-
2007
- 2007-06-22 KR KR1020070061691A patent/KR101030489B1/en active IP Right Grant
-
2008
- 2008-06-18 JP JP2010513112A patent/JP5485880B2/en active Active
- 2008-06-18 EP EP08766403A patent/EP2162830A4/en not_active Withdrawn
- 2008-06-18 WO PCT/KR2008/003442 patent/WO2009002043A2/en active Application Filing
- 2008-06-18 US US12/666,219 patent/US10360409B2/en active Active
Non-Patent Citations (2)
Title |
---|
None |
See also references of EP2162830A4 |
Also Published As
Publication number | Publication date |
---|---|
KR20090002220A (en) | 2009-01-09 |
EP2162830A4 (en) | 2011-06-15 |
US10360409B2 (en) | 2019-07-23 |
KR101030489B1 (en) | 2011-04-25 |
EP2162830A2 (en) | 2010-03-17 |
JP2010531016A (en) | 2010-09-16 |
WO2009002043A3 (en) | 2009-02-12 |
JP5485880B2 (en) | 2014-05-07 |
US20110004873A1 (en) | 2011-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8391837B2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
US10032147B2 (en) | Managing information relating to secure module applications | |
US8768303B2 (en) | Telecommunications chip card and mobile telephone device | |
US8725211B2 (en) | Trusted service manager managing reports of lost or stolen mobile communication devices | |
US10462647B2 (en) | Communication control method and apparatus, terminal, and network platform | |
US10360409B2 (en) | System for controlling smart card and method thereof | |
KR20020025001A (en) | Method of remotely controlling a portable terminal | |
EP2626823A1 (en) | Location based selection in mobile wallets | |
US7516479B2 (en) | Data communicating apparatus and method for managing memory of data communicating apparatus | |
CN110163658B (en) | Virtual resource data processing method and device, computer equipment and storage medium | |
EP2365464A1 (en) | Method for generating smart card secret key | |
KR101445137B1 (en) | Method for providing smart card sevice information based near field communication | |
CN1307501C (en) | Dynamic management of access lists in a portable electronic object | |
JP2006191384A (en) | Mobile and content transmission method | |
US8281150B2 (en) | Smart card and access method thereof | |
US8200989B2 (en) | External memory access device and method of accessing external memory | |
KR100984520B1 (en) | system for managing smart card and method thereof | |
KR20060133760A (en) | Data managing method in network system and network system therof | |
US20100287180A1 (en) | Apparatus and Method for Issuing Certificate with User's Consent | |
CN106933615A (en) | The awakening method and device of APP applications | |
KR102101649B1 (en) | Method for providing multi number service | |
JP2008071108A (en) | Authentication system, authentication device, management device, authentication management method, and authentication management program | |
JP2004153351A (en) | Portable terminal, network server, and system and method for displaying personal data for certificate to use them | |
JP6505893B2 (en) | Portable electronic devices | |
JP2008011098A (en) | Attribute information verification method, revocation information generating apparatus, service provision source apparatus, and attribute information verification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08766403 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010513112 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008766403 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12666219 Country of ref document: US |