Pre-control of a program in an additional chip card of a terminal
First Claim
1. A process for pre-controlling the execution of a program contained in a second chip card, inserted in a terminal, in addition to a first chip card, containing data and connected to a telecommunication network to which the terminal is linked, comprising the step of authenticating one of the first and second cards by the other, prior to the execution of the program, by means of the following steps:
- applying an identifier of the program which is transmitted from the second card to the first card and a key to an algorithm, contained in the first card, to produce a result, andcomparing the result and a certificate which is transmitted by the second card to the first card in order to execute the program only in case the latter two are equal.
2 Assignments
0 Petitions
Accused Products
Abstract
Prior to the execution of a program contained in a second chip card inserted in a terminal such as a mobile radio telephone terminal, in addition to a first chip card containing data and connected to a telecommunication network to which the terminal is linked, one of the cards is authenticated by the other, or the two cards are authenticated mutually. This double authentication ensures the authenticity of the program for its overall execution in the terminal and the origin of the second card, distributed through conventional channels, for the network operator.
47 Citations
18 Claims
-
1. A process for pre-controlling the execution of a program contained in a second chip card, inserted in a terminal, in addition to a first chip card, containing data and connected to a telecommunication network to which the terminal is linked, comprising the step of authenticating one of the first and second cards by the other, prior to the execution of the program, by means of the following steps:
-
applying an identifier of the program which is transmitted from the second card to the first card and a key to an algorithm, contained in the first card, to produce a result, and comparing the result and a certificate which is transmitted by the second card to the first card in order to execute the program only in case the latter two are equal. - View Dependent Claims (2, 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
4. A process for pre-controlling the execution of a program contained in a second chip card, inserted in a terminal, in addition to a first chip card, containing data and connected to a telecommunication network to which the terminal is linked, comprising the step of authenticating one of the first and second cards by the other, prior to the execution of the program, by means of the following steps:
-
selecting a key from a table of keys contained in the first card as a function of a program identifier transmitted from the second card to the first card; transmitting a random number from the first card to the second card; applying the transmitted random number and the key to an algorithm contained in the second card to produce a signature that is transmitted to the first card; applying the random number and the key to an algorithm contained in the first card to produce a result; and comparing the result to the signature transmitted to the first card so as to execute the program only when the two are equal.
-
-
8. A process for pre-controlling the execution of a program contained in a second chip card, inserted in a terminal, in addition to a first chip card, containing data and connected to a telecommunication network to which the terminal is linked, comprising the step of authenticating one of the first and second cards by the other, prior to the execution of the program, by means of the following steps:
-
selecting a key in a table of keys contained in a first card as a function of a program identifier transmitted by the second card to the first card; reading a random number from the first card into the second card; applying the random number and the key to an algorithm contained in the first card so as to produce a signature transmitted to the second card; applying the random number and the key to an algorithm contained in the second card so as to produce a result; and comparing the result to the signature transmitted to the second card so as to execute the program or read its content only when the two are equal.
-
Specification