Method for the authentication of applications
First Claim
1. An authentication method of at least one application working in an equipment connected by a network to a control server, said equipment being locally connected to a security module, said application being at least one of loadable and executable via an application execution environment of the equipment and the at least one application being configured to use resources stored in the security module, the method comprising:
- receiving by the control server, via the network, identification data including at least an identifier of the equipment and an identifier of the security module;
analyzing and verifying, by the control server, said identification data and, based on the analysis and verification, the control server creating a protection profile defining resources of the security module that can be used by the at least one application, the protection profile being created based on at least one of;
an updating of a version of a software installed in the equipment,a downloading of a new application in the equipment,an updating period of the protection profile,a number of connection of the equipment to the network, anda technology used for accessing the network;
generating, by the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources; and
transmitting the at least one application and the cryptogram by the control server, via the network and the equipment, to the security module,wherein, when the at least one application and cryptogram are transmitted at a same time, the method includes,verifying, by the security module, the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module, the verification occurring periodically at a rate given by the control server, during at least one of a first initialization of the at least one application, a first use of the at least one application, and each initialization of the at least one application, the security module performs at least one of releasing and blocking access of certain resources of said security module to the at least one application based on the received protection profile, andwhen the at least one application and the cryptogram are not transmitted at a same time, the method includes,requesting by the at least one application, once loaded into the equipment from the control server via the network, the cryptogram from the server at the time of an initialization of the at least one application and transmitting the cryptogram to the security module, a confirmation message of acceptance or refusal of the cryptogram being transmitted by the security module to the server via the at least one application; and
performing the verifying by the security module when the cryptogram is accepted.
3 Assignments
0 Petitions
Accused Products
Abstract
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application.
45 Citations
14 Claims
-
1. An authentication method of at least one application working in an equipment connected by a network to a control server, said equipment being locally connected to a security module, said application being at least one of loadable and executable via an application execution environment of the equipment and the at least one application being configured to use resources stored in the security module, the method comprising:
-
receiving by the control server, via the network, identification data including at least an identifier of the equipment and an identifier of the security module; analyzing and verifying, by the control server, said identification data and, based on the analysis and verification, the control server creating a protection profile defining resources of the security module that can be used by the at least one application, the protection profile being created based on at least one of; an updating of a version of a software installed in the equipment, a downloading of a new application in the equipment, an updating period of the protection profile, a number of connection of the equipment to the network, and a technology used for accessing the network; generating, by the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources; and transmitting the at least one application and the cryptogram by the control server, via the network and the equipment, to the security module, wherein, when the at least one application and cryptogram are transmitted at a same time, the method includes, verifying, by the security module, the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module, the verification occurring periodically at a rate given by the control server, during at least one of a first initialization of the at least one application, a first use of the at least one application, and each initialization of the at least one application, the security module performs at least one of releasing and blocking access of certain resources of said security module to the at least one application based on the received protection profile, and when the at least one application and the cryptogram are not transmitted at a same time, the method includes, requesting by the at least one application, once loaded into the equipment from the control server via the network, the cryptogram from the server at the time of an initialization of the at least one application and transmitting the cryptogram to the security module, a confirmation message of acceptance or refusal of the cryptogram being transmitted by the security module to the server via the at least one application; and performing the verifying by the security module when the cryptogram is accepted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a security module including resources that are accessed locally by at least one application installed in an equipment, the equipment being connected by a network to a control server, wherein the equipment includes means for reading and transmitting data, the transmitted data including at least one of an identifier of the equipment and an identifier of the security module, and the security module includes, means for reception, storage and analysis of a cryptogram and of the at least one application received with the cryptogram, the cryptogram and the at least one application being transmitted by the control server, wherein the control server analyzes and verifies the transmitted at least one of the identifier of the equipment and the identifier of the security module, and the control server creates a protection profile defining resources of the security module that can be used by the at least one application, the protection profile being created based on at least one of; an updating of a version of a software installed in the equipment, a downloading of a new application in the equipment, an updating period of the protection profile, a number of connection of the equipment to the network, and a technology used for accessing the network, and wherein the cryptogram includes a digest of the at least one application, at least one of the identifier of the equipment and the identifier of the security module, the protection profile means for verifying said at least one application, and means for identification of security module resources, and means for extraction and execution, wherein when the at least one application and cryptogram are received at a same time, the means for extraction and execution perform at least one of releasing and blocking certain resources of the security module to the at least one application according to the received protection profile, and verifying the at least one application, the verification occurring periodically at a rate given by the control server, during at least one of a first initialization of the at least one application, a first use of the at least one application, and each initialization of the at least one application, and when the at least one application and the cryptogram are not received at a same time, the at least one application, once loaded into the equipment from the control server via the network, requests the cryptogram from the server at the time of its initialization and transmits the cryptogram to the security module, the confirmation message of acceptance or refusal of the cryptogram being transmitted by the security module to the server via the at least one application, and the means for extraction and execution perform at least one of releasing and blocking certain resources of the security module to the at least one application according to the received protection profile, and verifying the at least one application, the verification occurring periodically at a rate given by the control server, during at least one of a first initialization of the at least one application, a first use of the at least one application, and each initialization of the at least one application. - View Dependent Claims (14)
-
Specification