Method and apparatus for authenticating an open system application to a portable IC device
First Claim
Patent Images
1. An apparatus comprising:
- a processor; and
a nonvolatile memory, coupled to the processor, that stores both data and a program that, when a request to access the data is received from a requesting application executing on a computer coupled to the apparatus, causes the processor to allow access to the data only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained by the apparatus.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthiness is proven, the portable IC device authenticates itself to the application. Once such two-way authentication has been completed, trusted communication between the open system and the portable IC device can proceed, and private information that is maintained on the portable IC device can be unlocked and made available to the application.
183 Citations
15 Claims
-
1. An apparatus comprising:
-
a processor; and
a nonvolatile memory, coupled to the processor, that stores both data and a program that, when a request to access the data is received from a requesting application executing on a computer coupled to the apparatus, causes the processor to allow access to the data only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained by the apparatus. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method implemented in a device, the method comprising:
-
receiving, from a requesting application executing on a computer coupled to the device, a request;
allowing the requesting application to access data stored on the device only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained on the device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. One or more computer readable media having stored thereon instructions that, when executed by one or more processors of a device, cause the device to:
-
receive, from a requesting application executing on a computer coupled to the device, a request;
allow the requesting application to access data stored on the device only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained on the device. - View Dependent Claims (12, 13, 14, 15)
-
Specification