Method of performing a secure application in an NFC device
First Claim
1. A method of executing a secure application in a Near Field Communication (NFC) device, the method comprising:
- establishing a contactless link between a first NFC device and a second NFC device, the first NFC device comprising a secure processor,transmitting a secure processor identifier identifying the secure processor of the first NFC device from the first NFC device to the second NFC device over the contactless link,transmitting an application identifier from the second NFC device to the first NFC device over the contactless link,transmitting secure processor authentication data for authenticating the secure processor of the first NFC device, from the secure processor to the second NFC device over the contactless link,transmitting the secure processor authentication data from the second NFC device to an application server,transmitting the secure processor authentication data and application authentication data for authenticating an application corresponding to the application identifier, from the application server to an authentication server, andin the authentication server, verifying the secure processor authentication data and the application authentication data and authorizing the first and second NFC devices to execute the application only if the secure processor and the application are authenticated by way of the secure processor authentication data and the application authentication data.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method of executing a secure application in an NFC device, the method comprising steps during which: a contactless link is established between first and second NFC devices, the first NFC device transmits by the contactless link an identifier of a secure processor of the first NFC device, the second NFC device transmits by the contactless link an application identifier, the secure processor transmits by the contactless link first authentication data allowing the authentication of the secure processor of the first NFC device, the second NFC device transmits to an application server the first authentication data, the application server transmits to an authentication server the first authentication data and second authentication data) to authenticate the application and authorizes the two NFC devices to execute the application only if the secure processor and the application are authenticated.
-
Citations
22 Claims
-
1. A method of executing a secure application in a Near Field Communication (NFC) device, the method comprising:
-
establishing a contactless link between a first NFC device and a second NFC device, the first NFC device comprising a secure processor, transmitting a secure processor identifier identifying the secure processor of the first NFC device from the first NFC device to the second NFC device over the contactless link, transmitting an application identifier from the second NFC device to the first NFC device over the contactless link, transmitting secure processor authentication data for authenticating the secure processor of the first NFC device, from the secure processor to the second NFC device over the contactless link, transmitting the secure processor authentication data from the second NFC device to an application server, transmitting the secure processor authentication data and application authentication data for authenticating an application corresponding to the application identifier, from the application server to an authentication server, and in the authentication server, verifying the secure processor authentication data and the application authentication data and authorizing the first and second NFC devices to execute the application only if the secure processor and the application are authenticated by way of the secure processor authentication data and the application authentication data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 21, 22)
-
-
11. A system for executing a secure application in a Near Field Communication NFC) device, comprising:
-
a first NFC device comprising an NFC component to establish a contactless communication with another NFC device, and a secure processor connected to the NFC component, a second NFC device connected to an application server to execute an application with another NFC device, and an authentication server accessible to the application server and to the first NFC device, the system being configured to; establish a contactless link between the first NFC device and the second NFC device; transmit an identifier of the secure processor of the first NFC device from the first NFC device to the second NFC device over the contactless link; transmit an application identifier from the second NFC device to the first NFC device over the contactless link; transmit secure processor authentication data for authenticating the secure processor of the first NFC device, from the first NFC device to the second NFC device over the contactless link; transmit the secure processor authentication data from the second NFC device to an application server; transmit the secure processor authentication data and application authentication data for authenticating an application corresponding to the application identifier from the application server to an authentication server; and in the authentication server, verify the secure processor authentication data and the application authentication data and authorize the first and second NFC devices to execute the application only if the secure processor and the application are authenticated by way of the secure processor authentication data and the application authentication data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification