Telecommunications device security
First Claim
1. A method for processing encrypted data received by a terminal, the method comprising:
- providing a security platform in the terminal, the security platform including a normal execution environment and a secure execution environment, the secure execution environment being loaded with at least one secure application component adapted to execute only in the secure execution environment;
identifying secure protocols used in encrypting the encrypted data;
determining whether the secure execution environment is loaded with secure application components associated with the secure protocols used in encrypting the encrypted data;
loading new secure application components associated with the secure protocols used in encrypting the encrypted data that are not already loaded in the secure execution environment;
obtaining key information for decrypting the encrypted data using the new secure application components; and
decrypting the encrypted data in the normal execution environment using the key information.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment and a secure execution environment The mobile terminal enables the software of the terminal in the secure execution environment to be updated. The terminal may be provided with minimal software initially in the secure execution environment, and is operable to subsequently update the software by over the air transmission of software. Also disclosed is a method for managing rights in respect of broadcast, multicast and/or unicast (downloaded) data. The method defines a service protection platform implemented on mobile terminals having both normal execution environment and secure execution environment. Service protection is provided by separating the operation of service protection application components into those that operate in the normal environment and those that are adapted to execute only in the secure execution environment.
-
Citations
25 Claims
-
1. A method for processing encrypted data received by a terminal, the method comprising:
-
providing a security platform in the terminal, the security platform including a normal execution environment and a secure execution environment, the secure execution environment being loaded with at least one secure application component adapted to execute only in the secure execution environment; identifying secure protocols used in encrypting the encrypted data; determining whether the secure execution environment is loaded with secure application components associated with the secure protocols used in encrypting the encrypted data; loading new secure application components associated with the secure protocols used in encrypting the encrypted data that are not already loaded in the secure execution environment; obtaining key information for decrypting the encrypted data using the new secure application components; and decrypting the encrypted data in the normal execution environment using the key information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for processing encrypted data received by a terminal, the system comprising:
-
a normal execution environment in the terminal, and a secure execution environment in the terminal, wherein the secure execution environment is configured to; evaluate the encrypted data to identify secure application components that are not loaded in the secure execution environment, wherein the secure application components are not loaded are new secure application components; obtain the new secure application components by downloading the new secure application components from an application server and loading the new secure application components in the secure execution environment; obtain key information for decrypting the encrypted data using at least the new secure application components loaded in the secure execution environment; wherein the encrypted data is decrypted in the normal execution environment. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for processing encrypted data received by a terminal, the method comprising:
-
providing a securing platform on the terminal, the security platform including a normal execution environment and a secure execution environment, where a secure application component is loaded in the secure execution environment and executes only in the secure execution environment, wherein the secure application component corresponds to a secure protocol; obtaining key information necessary for decrypting the encrypted data; processing the key information with the secure application component to obtain decryption information, wherein the secure application is amended or replaced when amendment or replacement is needed to process the key information, wherein a new secure application component is automatically downloaded when the new secure application component is needed to process the key information; and decrypting the encrypted data in the normal execution environment using the decryption information. - View Dependent Claims (24, 25)
-
Specification