Method and apparatus for authenticating an open system application to a portable IC device
First Claim
Patent Images
1. A system comprising:
- a portable integrated circuit device having stored thereon an authentication application and a definition of a list of trusted applications; and
a computer, coupled to communicate with the portable integrated circuit device, to,form a secure connection between the portable integrated circuit device and an application running on the computer,request, via the application running on the computer, that the portable integrated circuit device unlock itself,receive the list of trusted applications from the portable integrated circuit device, andidentify to the portable integrated circuit device whether the application is one of the applications in the list of trusted applications.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthiness is proven, the portable IC device authenticates itself to the application. Once such two-way authentication has been completed, trusted communication between the open system and the portable IC device can proceed, and private information that is maintained on the portable IC device can be unlocked and made available to the application.
116 Citations
6 Claims
-
1. A system comprising:
-
a portable integrated circuit device having stored thereon an authentication application and a definition of a list of trusted applications; and a computer, coupled to communicate with the portable integrated circuit device, to, form a secure connection between the portable integrated circuit device and an application running on the computer, request, via the application running on the computer, that the portable integrated circuit device unlock itself, receive the list of trusted applications from the portable integrated circuit device, and identify to the portable integrated circuit device whether the application is one of the applications in the list of trusted applications. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification