METHOD AND SYSTEM FOR ACTIVATING A PORTABLE DATA CARRIER
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for activating a portable data carrier (1) in which a first portable data carrier (1) is supplied in an inactive state to a user, after the user has requested the first data carrier (1) with the aid of a second portable data carrier (2) from a central instance, whereby the first and the second data carrier (1, 2) have access to authentication data for mutual authentication. In the method according to the invention a communication connection is set up between the first and the second data carrier (1, 2), via which the first and the second data carrier (1, 2) mutually authenticate each other on the basis of the authentication data and establish a cryptographically secured end-to-end connection. Via this end-to-end connection then the second data carrier (2) activates the first data carrier (1) by transmitting activation data to the first data carrier (1).
34 Citations
28 Claims
-
1-14. -14. (canceled)
-
15. A method for activating a first portable data carrier with the aid of a second portable data carrier, comprising the steps:
-
a communication connection is set up between the first and the second data carrier, via which the first and the second data carrier mutually authenticate each other on the basis of authentication data and establish a cryptographically secured end-to-end connection; an activation of the first data carrier is carried out, by the second data carrier activating the first data carrier via the end-to-end connection by transmitting activation data; the first portable data carrier is supplied in an inactive state to a user, after the user has requested the first data carrier with the aid of a second portable data carrier from a central instance, so that, to the first portable data carrier authentication data are applied which permit a mutual authentication exclusively with the second portable data carrier, so that the first and the second portable data carrier have access to the authentication data; and within the framework of the activation all authorizations and functionalities present on the second data carrier are transferred from the latter to the first portable data carrier and the latter is immediately ready for use, and usable with all functionalities after the conclusion of the activation. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for activating a portable data carrier, the system comprising a first and a second portable data carrier, which are configured so as to enable the following steps to be carried out:
-
the first data carrier is supplied in an inactive state to a user, after the user has requested the first data carrier with the aid of the second data carrier from a central instance, so that the first portable data carrier authentication data are applied that permit a mutual authentication exclusively with the second portable data carrier, so that the first and the second data carrier have access to the authentication data; a communication connection is set up between the first and the second data carrier, via which the first and the second data carrier mutually authenticate each other on the basis of the authentication data and establish a cryptographically secured end-to-end connection; the second data carrier activates the first data carrier via the end-to-end connection by transmitting activation data to the first data carrier. - View Dependent Claims (28)
-
Specification