×

Method for the authentication of applications

  • US 9,143,888 B2
  • Filed: 07/16/2014
  • Issued: 09/22/2015
  • Est. Priority Date: 11/27/2003
  • Status: Active Grant
First Claim
Patent Images

1. A mobile device, comprising:

  • equipment; and

    a security module connected to the equipment,the equipment being configured to connect by a network to a control server,the mobile device being configured to transmit, to the control server, via the network, identification data including at least an identifier of the equipment and an identifier of the security module,the mobile device being configured to receive, from the control server, a protection profile defining resources of the security module that can be used by at least one application,the equipment being configured to receive, from the control server, the at least one application,the at least one application being at least one of loadable and executable via an application execution environment of the equipment, the at least one application being configured to use resources stored in the security module;

    the mobile device being configured to receive, from the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources,the security module being configured to perform a verification operation of verifying the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module; and

    the security module being configured to perform at least one of releasing and blocking access of certain resources of said security module to the at least one application based on the received protection profile,wherein, the mobile device is configured such that,when the at least one application and the cryptogram are not received at the mobile device at a same time,the at least one application requests, once the at least one application is loaded into the equipment, the cryptogram from the server,the at least one application requesting the cryptogram from the server at the time of an initialization of the at least one application;

    the at least one application transmits the cryptogram to the security module; and

    the security module transmits a confirmation message of acceptance or refusal of the cryptogram from the security module to the control server via the at least one application, andthe security module performs the verification operation when the cryptogram is accepted.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×