Procedure for the control of applications stored in a subscriber identity module
First Claim
1. In a data communication system that includes a data communication network, a terminal device connected to the data communication network, a subscriber identity module connected to the terminal device and containing a stored application for use by the terminal device and which makes use of the data communication network, and an application control server connected to the data communication network, a procedure for controlling the application stored in the subscriber identity module, comprising the steps of:
- storing in the subscriber identity module a key list comprising a plurality of keys associated with the stored application, said keys comprising a closing key for use in closing the application and an activation key for use in activating the application;
storing in the application control server a server key list corresponding to the key list stored in the subscriber identity module;
generating at the application control server one of an activating message including the activation key stored in the server key list and a closing message including the closing key stored in the server key list;
transmitting the generated one of the activating message and the closing message from the application control server to the subscriber identity module; and
checking, at the subscriber identity module after receipt from the application control server of the transmitted one of the activating message and the closing message, the key included in the received one of the activating message and the closing message against the key list stored in the subscriber identity module and, if the received key is found to match one of the stored keys, activating the application if the received key matches the activation key in the stored key list in the subscriber identity module and closing the application if the received key matches the closing key in the stored key list in the subscriber identity module.
2 Assignments
0 Petitions
Accused Products
Abstract
A procedure for the control of applications stored in a user'"'"'s subscriber identity module (SIM) in a data communication system that includes a data communication network, a terminal device connected to the data communication network and to which the subscriber identity module is connected, and an application control server that is connected to the data communication network. The subscriber identity module contains a stored application that makes use of the data communication network and that is used by way of the terminal device. A key list comprising one or more application-specific keys is stored in the user'"'"'s subscriber identity module, and a corresponding key list is also stored in the application control server which is operable to control applications stored in the subscriber identity modules of multiple users of the network. The application stored in the user'"'"'s subscriber identity module is activated and/or closed through the transmission, verification and use of keys stored in the key lists at the subscriber identity module and at the application control server.
-
Citations
9 Claims
-
1. In a data communication system that includes a data communication network, a terminal device connected to the data communication network, a subscriber identity module connected to the terminal device and containing a stored application for use by the terminal device and which makes use of the data communication network, and an application control server connected to the data communication network, a procedure for controlling the application stored in the subscriber identity module, comprising the steps of:
-
storing in the subscriber identity module a key list comprising a plurality of keys associated with the stored application, said keys comprising a closing key for use in closing the application and an activation key for use in activating the application;
storing in the application control server a server key list corresponding to the key list stored in the subscriber identity module;
generating at the application control server one of an activating message including the activation key stored in the server key list and a closing message including the closing key stored in the server key list;
transmitting the generated one of the activating message and the closing message from the application control server to the subscriber identity module; and
checking, at the subscriber identity module after receipt from the application control server of the transmitted one of the activating message and the closing message, the key included in the received one of the activating message and the closing message against the key list stored in the subscriber identity module and, if the received key is found to match one of the stored keys, activating the application if the received key matches the activation key in the stored key list in the subscriber identity module and closing the application if the received key matches the closing key in the stored key list in the subscriber identity module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
transmitting, from the application control server to the subscriber identity module, a message concerning opening of the application and including an application key k(n) for use in the application; and
linking, at the application control server, the application key k(n) to the unique identifier of the subscriber identity module.
-
-
6. A procedure in accordance with claim 1, further comprising the steps of:
-
verifying, at the application control server, whether there exists a right of access to the application using the subscriber identity module; and
transmitting from the application control server to the subscriber identity module, where it is verified that the right of access exists, special data needed to use the application.
-
-
7. A procedure in accordance with claim 1, wherein transmissions between the application control server and the subscriber identity module are encrypted.
-
8. A procedure in accordance with claim 1, further comprising the step of establishing between the terminal device, to which the subscriber identity module is connected, and the application control server a telecommunication connection via a mobile telephone communication network for carrying transmissions between the application control server and the subscriber identity module.
-
9. A procedure in accordance with claim 1, wherein the data communication network is a GSM network and the terminal device is a GSM telephone.
Specification