Method For Securing A Telecommunications Terminal Which Is Connected To A Terminal User Identification Module
2 Assignments
0 Petitions
Accused Products
Abstract
A method of securing a telecommunication terminal that is connected to a module used to identify a user of the terminal is described. The method includes a step including executing a procedure in which the terminal is matched to the identification module, consisting in: securely loading a first software program including a data matching key onto the identification module; securely loading a second software program which can operate in conjunction with the first software program onto the telecommunication terminal; transmitting a data matching key that corresponds to that of the first software program to the second software program; storing the transmitted data matching key in the secured storage zone of the telecommunication terminal; and conditionally submitting every response from the first software program to a request from the second software program upon verification at the true value of the valid possession of the data matching key by the second program.
32 Citations
36 Claims
-
1-16. -16. (canceled)
-
17. Method for securing a telecommunications terminal which is connected to a terminal user identification module, comprising a step for carrying out a procedure for pairing the terminal with the identification module, involving:
-
loading in a secure manner a first item of software which comprises a pairing key on the identification module;
loading in a secure manner a second item of software which is capable of operating in conjunction with the first item of software on the telecommunications terminal;
transmitting a pairing key which corresponds to that of the first item of software to the second item of software, storing the pairing key transmitted in a secure storage zone of the telecommunications terminal;
prior to any response from the first item of software to a request from the second item of software, verifying that the pairing key of the second item of software stored on the communications terminal is valid;
responding to the request when and only when the second item of software is in valid possession of the pairing key. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 30, 31, 32, 33, 34, 35, 36)
-
-
26. System for securing a telecommunications terminal which is connected to a terminal user identification module, comprising:
-
means for secure loading and storage of a first item of software comprising a pairing key in the identification module;
means for secure loading of a second item of software which is capable of operating in conjunction with the first item of software on the telecommunications terminal, means for secure loading and storage of a pairing key of the second item of software, and means for communicating between the first and the second item of software comprising means for validating the pairing key of the second item of software which are capable of authorising communication only upon verification that the second item of software is in valid possession of the pairing key.
-
-
27. Telecommunications terminal which comprises means for communicating with a user identification module, comprising
means for loading, storing and implementing a second item of software which is capable of operating with a first item of software which is present on the identification module, and means for secure storage of a pairing key, which means are connected to means for validating this pairing key using the first item of software which is present on the identification module.
-
28. User identification module which comprises means for communicating with a telecommunications terminal, comprising
means for secure loading and storage of a pairing key which corresponds to a pairing key which is stored on the terminal, and a first item of software which is capable of operating with a second item of software which is present on the terminal, means for validating the pairing key of the terminal from the pairing key of the module, which means are capable of authorising communication only after verification that the second item of software is in valid possession of the pairing key.
Specification