Systems and methods for providing security to different functions
First Claim
1. A communication system for providing secure mobile terminal functions, the system comprising:
- a mobile network;
a mobile terminal coupled to the mobile network;
a function capsule including a first function; and
a smartcard coupled to the mobile terminal, the smartcard having a first key and a second key;
wherein the first key is used to authenticate an intended user of the mobile terminal to the mobile network and to download the function capsule from the mobile network to the mobile terminal; and
wherein the second key is used to authenticate the intended user to the function capsule on the mobile terminal.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function.
-
Citations
29 Claims
-
1. A communication system for providing secure mobile terminal functions, the system comprising:
-
a mobile network;
a mobile terminal coupled to the mobile network;
a function capsule including a first function; and
a smartcard coupled to the mobile terminal, the smartcard having a first key and a second key;
wherein the first key is used to authenticate an intended user of the mobile terminal to the mobile network and to download the function capsule from the mobile network to the mobile terminal; and
wherein the second key is used to authenticate the intended user to the function capsule on the mobile terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for providing secure functions to a mobile client, the method comprising:
-
transmitting a first random number from within a mobile network to a mobile client;
using a first key in the mobile client to compute a first response based on the transmitted first random number;
transmitting the first response to the mobile network;
using a copy of the first key in the mobile network to calculate a first value based on the first random number;
determining whether the first response agrees with the first value;
terminating access of the mobile client to the mobile network if the first response does not agree with the first value;
downloading a function capsule from the mobile network to the mobile client if the first response agrees with the first value;
providing a second random number from the downloaded function capsule to the mobile client;
using a second key in the mobile client to compute a second response based on the second random number;
using a copy of the second key in the downloaded function capsule to calculate a second value based on the second random number;
determining whether the second response agrees with the second value;
denying access of the mobile client to the downloaded function capsule if the second response does not agree with the second value; and
granting access of the mobile client to the downloaded function capsule if the second response agrees with the second value. - View Dependent Claims (27, 28, 29)
-
Specification