Method of personalizing a NFC chipset
First Claim
1. A method for personalizing a secure processor in a Near Field Communication (NFC) system to execute a secure application, the method comprising steps of:
- establishing a communication link between a remote processor and a storage medium carried by a user, the storage medium memorizing in a secured way user identification data identifying the user,transmitting by the storage medium the user identification data stored in the storage medium to the remote processor,obtaining by the remote processor user personalization data corresponding to the user identification data, the user personalization data allowing a secure application to be executed in connection with the user identification data,obtaining by the remote processor using the user identification data, NFC system identification data identifying a NFC system of the user, the NFC system, the storage medium and the remote processor being distinct devices from one another, the NFC system comprising a secure processor and an NFC interface for contactless communications, the NFC system identification data comprising an encryption key of the secure processor,encrypting by the remote processor the user personalization data using the encryption key,transmitting by the remote processor the encrypted user personalization data to the NFC system,receiving and deciphering the encrypted user personalization data by the secure processor, andmemorizing in a secured way the user personalization data by the secure processor.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for personalizing a secure processor in a NFC system to execute a secure application, comprising steps of obtaining by a server identification data of a user memorized in a secure storage medium, personalization data corresponding to the user identification data, and identification data of a NFC system of the user, comprising an encryption key of the secure processor, encrypting by the server personalization data using the encryption key, transmitting to the NFC system encrypted personalization data, receiving by the secure processor encrypted personalization data, deciphering personalization data, and memorizing in a secured way personalization data by the secure processor.
154 Citations
36 Claims
-
1. A method for personalizing a secure processor in a Near Field Communication (NFC) system to execute a secure application, the method comprising steps of:
-
establishing a communication link between a remote processor and a storage medium carried by a user, the storage medium memorizing in a secured way user identification data identifying the user, transmitting by the storage medium the user identification data stored in the storage medium to the remote processor, obtaining by the remote processor user personalization data corresponding to the user identification data, the user personalization data allowing a secure application to be executed in connection with the user identification data, obtaining by the remote processor using the user identification data, NFC system identification data identifying a NFC system of the user, the NFC system, the storage medium and the remote processor being distinct devices from one another, the NFC system comprising a secure processor and an NFC interface for contactless communications, the NFC system identification data comprising an encryption key of the secure processor, encrypting by the remote processor the user personalization data using the encryption key, transmitting by the remote processor the encrypted user personalization data to the NFC system, receiving and deciphering the encrypted user personalization data by the secure processor, and memorizing in a secured way the user personalization data by the secure processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for personalizing a secure processor in a Near Field Communication (NFC) system to execute a secure application, the system comprising:
-
a NFC system of a user, comprising a secure processor and an NFC interface for contactless communications, and a remote processor configured to; receive user identification data identifying the user, by a communication link established with a storage medium carried by the user and memorizing in a secured way the user identification data, obtain user personalization data corresponding to the user identification data, obtain NFC system identification data identifying the NFC system using the user identification data, the NFC system identification data comprising an encryption key of the secure processor, and encrypt the user personalization data using the encryption key of the secure processor, and transmit to the NFC system the encrypted user personalization data, the secure processor being configured to receive and decipher the encrypted user personalization data, and to memorize in a secured way the user personalization data, wherein the NFC system, the remote processor and the storage medium are distinct devices from one another. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. An apparatus comprising a processor for personalizing a secure processor of a Near Field Communication (NFC) system in order to execute a secure application, the processor configured to:
-
receive user identification data identifying a user, by a communication link established with a storage medium carried by the user and memorizing in a secure way the user identification data, obtain user personalization data corresponding to the user identification data, obtain NFC system identification data identifying a NFC system of the user using the user identification data, the NFC system being separate from the storage medium, the identification data comprising an encryption key of a secure processor of the NFC system, and encrypt the user personalization data using the encryption key, and transmit to the NFC system the encrypted user personalization data, wherein the NFC system, the processor and the storage medium are distinct devices from one another. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
Specification