×

Method for managing the security of applications with a security module

  • US 8,001,615 B2
  • Filed: 11/03/2004
  • Issued: 08/16/2011
  • Est. Priority Date: 11/04/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing security of at least one additional application associated to a main application with a security module of an equipment connected, via a network, to a control server managed by an operator, the main application and the additional applications use resources as data or functions stored in the security module locally connected to said equipment, comprising:

  • the equipment, periodically sending via the network to the control server identification data including at least a type and software version of the equipment and a type and software version of the security module,analyzing and verifying by the control server the identification data upon an occurrence of at least one;

    after each connection of the equipment to the network,after each updating of the software version of the equipment,after at least one of each activation and deactivation of the additional application on the equipment,after each updating of the software version of the security module,after each updating of resources on the security module, andperiodically at a rate given by the control server,generating, by the control server, a cryptogram from a result of the verification of the identification data by comparing the identification data to a subscriber database content,transmitting, by the control server, the cryptogram, via the network and the equipment, to the security module,receiving and analyzing the cryptogram by the security module for acting on specific applications according to instructions included in the cryptogram, andselectively activating or deactivating at least one resource as data or functions stored in said security module by executing the instructions included in the cryptogram and using the selected resource to condition the functioning of the at least one additional application stored in the equipment according to criteria established by at least one of a supplier of said additional application or the operator managing the control server,wherein the resources as data or functions of the security module used by the main application are left active for connection of the equipment to the network so as to obtain further cryptograms from the control server.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×