Method for allocating secured resources in a security module
First Claim
1. Resource allocation method for a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by application suppliers, the method comprising:
- generating a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by an authority;
introducing at least one public key of the authority in the security module;
receiving, by the operator, a request from a supplier and transmission of the request to the authority, this request comprising at least the supplier'"'"'s public key;
transmitting, by the authority of at least the public key of the supplier to the operator;
transmitting, by the operator, a resource reservation instruction to the security module together with the supplier'"'"'s public key;
transmitting, by the operator of the public key of the security module, to the supplier;
establishing a secure communication channel between the supplier and the security module;
loading of an application in the security module by the supplier; and
at least one of deactivating and clearing, by the operator, of at least part of the memory zone dedicated to a predefined resource when the clearing conditions are met.
1 Assignment
0 Petitions
Accused Products
Abstract
The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resource allocation method of a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by the application suppliers, this method comprising the following steps: generation of a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by the operator, introduction of at least one public key of the operator in the security module, reception by the operator of a request from a supplier, this request comprising at least the public key of the supplier, transmission by the operator of a resource reservation instruction to the security module together with the public key of the supplier, transmission by the operator of the security module'"'"'s public key to the supplier, establishment of a secure communication channel between the supplier and the security module.
-
Citations
12 Claims
-
1. Resource allocation method for a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by application suppliers, the method comprising:
-
generating a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by an authority;
introducing at least one public key of the authority in the security module;
receiving, by the operator, a request from a supplier and transmission of the request to the authority, this request comprising at least the supplier'"'"'s public key;
transmitting, by the authority of at least the public key of the supplier to the operator;
transmitting, by the operator, a resource reservation instruction to the security module together with the supplier'"'"'s public key;
transmitting, by the operator of the public key of the security module, to the supplier;
establishing a secure communication channel between the supplier and the security module;
loading of an application in the security module by the supplier; and
at least one of deactivating and clearing, by the operator, of at least part of the memory zone dedicated to a predefined resource when the clearing conditions are met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification