Telecommunications device security
First Claim
Patent Images
1. A terminal for use with a cellular or mobile telecommunications network, the terminal comprising:
- a trusted component implemented to perform functionality for providing one or more trusted services that each enable access to one or more capabilities according to a corresponding service interface for the trusted service,a terminal platform upon which a normal execution environment and a trusted area are implemented, andan interface controller implemented within the trusted area and communicatively connected to the trusted component via a communications channel, the interface controller operating to intercept all communications being sent to the trusted component requesting access to any of the one or more trusted services according to the corresponding service interfaces and to restrict access to the trusted component for each intercepted communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A terminal (1) for use with a cellular or mobile telecommunications network (3) includes authentication means (15) such as a SIM, USIM, UICC etc. for authenticating the terminal with the network. The terminal further includes a normal execution environment (30) and a secure execution environment (34). An interface controller (46) is provided in the secure execution environment and intercepts all communications directed to the authentication means to control access to the authentication means by these communications.
-
Citations
44 Claims
-
1. A terminal for use with a cellular or mobile telecommunications network, the terminal comprising:
-
a trusted component implemented to perform functionality for providing one or more trusted services that each enable access to one or more capabilities according to a corresponding service interface for the trusted service, a terminal platform upon which a normal execution environment and a trusted area are implemented, and an interface controller implemented within the trusted area and communicatively connected to the trusted component via a communications channel, the interface controller operating to intercept all communications being sent to the trusted component requesting access to any of the one or more trusted services according to the corresponding service interfaces and to restrict access to the trusted component for each intercepted communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method of controlling access in a mobile terminal for use with a cellular or mobile telecommunications network, the method including:
-
providing a trusted component in the mobile terminal that is implemented to perform functionality to provide one or more trusted services that each enable access to one or more capabilities according to a corresponding service interface for the trusted service; implementing an interface controller within a trusted area that is implemented on a terminal platform of the terminal upon which a normal execution environment is implemented; communicatively connecting the interface controller to the trusted component via a communications channel such that the interface controller operates to intercept all communications being sent to the trusted component requesting access to any of the one or more trusted services according to the corresponding service interfaces; and restricting access to the trusted component for each intercepted communication. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification