METHOD, SYSTEM AND TRUSTED SERVICE MANAGER FOR SECURELY TRANSMITTING AN APPLICATION TO A MOBILE PHONE
First Claim
1. A method for transmitting at least one of a service and an application from a Service Provider via a Trusted Service Manager to a mobile phone having a memory device comprising a plurality of memory sectors, wherein the sectors are protected against unauthorized access by sector keys, wherein the method comprises:
- at the Service Provider, sending a request that contains the service or application together with a unique identifier of the mobile phone, to the Trusted Service Manager via a first communication channel;
at the Trusted Service Manager, extracting the service or application and the unique identifier of the mobile phone from the received request;
assigning at least one destination sector and an associated sector key of the memory device to the service or application;
compiling the service or application, the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message;
encrypting the setup-message; and
transmitting the setup-message via a second communication channel of a Mobile Network Operator, to the mobile phone.
10 Assignments
0 Petitions
Accused Products
Abstract
A Trusted Service Manager (TSM) receives via a first communication channel from a Service Provider (SP) a request (REQ(MIA)) that contains an application (MIA) together with a unique identifier of a mobile phone (MOB), particularly its telephone number. The mobile phone (MOB) is equipped with a memory device (MIF) that comprises multiple memory sectors being protected by sector keys. Preferably the memory device (MIF) is a MIFARE device. The TSM extracts the application (MIA) and the unique identifier from the received request, assigns destination sector(s) and associated sector key(s) of the memory device (MIF), compiles the application (MIA), the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message (SU(MIA)), encrypts the setup-message and transmits it to either the mobile phone via a second communication channel or the Service Provider via the first communication channel (CN). If the setup-message (SU(MIA)) is transmitted to the Service Provider, the Service Provider sends it over the second communication channel to the mobile phone.
153 Citations
14 Claims
-
1. A method for transmitting at least one of a service and an application from a Service Provider via a Trusted Service Manager to a mobile phone having a memory device comprising a plurality of memory sectors, wherein the sectors are protected against unauthorized access by sector keys, wherein the method comprises:
-
at the Service Provider, sending a request that contains the service or application together with a unique identifier of the mobile phone, to the Trusted Service Manager via a first communication channel; at the Trusted Service Manager, extracting the service or application and the unique identifier of the mobile phone from the received request;
assigning at least one destination sector and an associated sector key of the memory device to the service or application;
compiling the service or application, the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message;
encrypting the setup-message; and
transmitting the setup-message via a second communication channel of a Mobile Network Operator, to the mobile phone. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 13, 14)
-
-
2. A method for transmitting at least one of a service and an application from a Service Provider via a Trusted Service Manager to a mobile phone having a memory device comprising a plurality of memory sectors wherein the sectors are protected against unauthorized access by sector keys, wherein the method comprises:
-
at the Service Provider, sending a request that contains the service or application together with a unique identifier of the mobile phone to the Trusted Service Manager via a first communication channel; at the Trusted Service Manager, extracting the service or application and the unique identifier of the mobile phone from the received request;
assigning at least one destination sector and associated sector key of the memory device to the service or application;
compiling the service or application, the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message;
encrypting the setup-message; and
transmitting the setup-message via the first communication channel to the Service Provider;at the Service Provider, transmitting the setup-message via a second communication channel of a Mobile Network Operator, to the mobile phone.
-
-
10. A Trusted Service Manager being adapted to receive from a Service Provider—
- via a first communication channel request that contains an application together with a unique identifier of a mobile phone, wherein the mobile phone is equipped with a memory device comprising a plurality of memory sectors wherein the sectors are protected against unauthorized access by sector keys;
extracting the application and the unique identifier of the mobile phone from the received request;
assigning at least one destination sector and associated sector key of the memory device to the application;
compiling the application, the sector key(s) and the sector number(s) of the destination sector(s) into a setup-message;encrypting the setup-message; and
transmitting the setup-message to at least one of the mobile phone via a second communication channel, and the Service Provider via the first communication channel.
- via a first communication channel request that contains an application together with a unique identifier of a mobile phone, wherein the mobile phone is equipped with a memory device comprising a plurality of memory sectors wherein the sectors are protected against unauthorized access by sector keys;
-
11. A computer program product being directly loadable into the memory of a mobile phone being equipped with a memory device being equipped with a memory device comprising a plurality of memory sectors wherein the sectors are protected against unauthorized access by sector keys, wherein the computer program product comprises software code portions for performing—
- when running on the mobile phone—
the steps of decrypting a setup-message;
extracting from the setup-message an application, at least one destination sector of the memory device and associated sector key(s); and
storing the application in the destination sector(s) of the memory device by using the extracted sector key(s). - View Dependent Claims (12)
- when running on the mobile phone—
Specification