×

Method for the authentication of applications

  • US 8,261,365 B2
  • Filed: 11/26/2004
  • Issued: 09/04/2012
  • Est. Priority Date: 11/27/2003
  • Status: Active Grant
First Claim
Patent Images

1. An authentication method of at least one application working in an equipment connected by a network to a control server, said equipment being locally connected to a security module, said application being at least one of loadable and executable via an application execution environment of the equipment and the at least one application being configured to use resources stored in the security module, the method comprising:

  • receiving by the control server, via the network, identification data including at least an identifier of the equipment and an identifier of the security module;

    analyzing and verifying, by the control server, said identification data and, based on the analysis and verification, the control server creating a protection profile defining resources of the security module that can be used by the at least one application, the protection profile being created based on at least one of;

    an updating of a version of a software installed in the equipment,a downloading of a new application in the equipment,an updating period of the protection profile,a number of connection of the equipment to the network, anda technology used for accessing the network;

    generating, by the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources; and

    transmitting the at least one application and the cryptogram by the control server, via the network and the equipment, to the security module,wherein, when the at least one application and cryptogram are transmitted at a same time, the method includes,verifying, by the security module, the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module, the verification occurring periodically at a rate given by the control server, during at least one of a first initialization of the at least one application, a first use of the at least one application, and each initialization of the at least one application, the security module performs at least one of releasing and blocking access of certain resources of said security module to the at least one application based on the received protection profile, andwhen the at least one application and the cryptogram are not transmitted at a same time, the method includes,requesting by the at least one application, once loaded into the equipment from the control server via the network, the cryptogram from the server at the time of an initialization of the at least one application and transmitting the cryptogram to the security module, a confirmation message of acceptance or refusal of the cryptogram being transmitted by the security module to the server via the at least one application; and

    performing the verifying by the security module when the cryptogram is accepted.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×