METHOD OF PERFORMING A SECURE APPLICATION IN AN NFC DEVICE
First Claim
1. A method of executing a secure application in an NFC device, the method comprising:
- establishing a contactless link between a first NFC device and a second NFC device,transmitting, by the first NFC device over the contactless link, an identifier of a secure processor of the first NFC device,transmitting, by the second NFC device over the contactless link, an application identifier,transmitting, by the secure processor over the contactless link, first authentication data allowing the authentication of the secure processor of the first NFC device,transmitting, by the second NFC device, the first authentication data to an application server,transmitting, by the application server, the first authentication data and second authentication data allowing for the authentication of the application corresponding to the application identifier to an authentication server, andverifying, by the authentication server the authentication data and authorizing the two NFC devices to execute the application only if the secure processor and the application are authenticated.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.
-
Citations
15 Claims
-
1. A method of executing a secure application in an NFC device, the method comprising:
-
establishing a contactless link between a first NFC device and a second NFC device, transmitting, by the first NFC device over the contactless link, an identifier of a secure processor of the first NFC device, transmitting, by the second NFC device over the contactless link, an application identifier, transmitting, by the secure processor over the contactless link, first authentication data allowing the authentication of the secure processor of the first NFC device, transmitting, by the second NFC device, the first authentication data to an application server, transmitting, by the application server, the first authentication data and second authentication data allowing for the authentication of the application corresponding to the application identifier to an authentication server, and verifying, by the authentication server the authentication data and authorizing the two NFC devices to execute the application only if the secure processor and the application are authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An ensemble comprising:
-
a secure processor, and an NFC component coupled to the secure processor and configured to establish a contactless communication with an NFC device, wherein the secure processor comprises a software component associated with a secure processor identifier, configured to; establish a contactless communication with an NFC device by the intermediary of an NFC controller, and transmit by the contactless link an identifier, receive by the contactless link an application identifier, and transmit by the contactless link authentication data of the software component. - View Dependent Claims (13, 14, 15)
-
Specification