×

Method for the authentication of applications

  • US 9,531,681 B2
  • Filed: 08/13/2015
  • Issued: 12/27/2016
  • Est. Priority Date: 11/27/2003
  • Status: Active Grant
First Claim
Patent Images

1. A portable device, comprising:

  • an electronic module; and

    a security module connected to the electronic module,the electronic module being configured to connect by a network to a control server,the portable device being configured to transmit, to the control server, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module,the portable device being configured to receive, from the control server, a protection profile defining resources of the security module that can be used by at least one application,the electronic module being configured to receive, from the control server, the at least one application,the at least one application being at least one of loadable or executable via an application execution environment of the electronic module, the at least one application being configured to use resources stored in the security module;

    the portable device being configured to receive, from the control server, a cryptogram, the cryptogram includinga digest of the at least one application, the identification data,the protection profile, andat least one of an identifier of the at least one application or an identifier of security module resources,the security module being configured to perform a verification operation of verifying the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module; and

    the security module being configured to perform, based on the received protection profile and the verification, at least one ofreleasing one or more resources of said security module to the at least one application, orblocking the at least one application from accessing one or more resources of said security module,wherein, the portable device is configured such that,when the cryptogram is not received at the portable device,the at least one application requests, once the at least one application is loaded into the electronic module, the cryptogram from the server,the at least one application requesting the cryptogram from the server at the time of an initialization of the at least one application;

    the at least one application transmits the received cryptogram to the security module;

    the security module performs the verification operation when the cryptogram is accepted; and

    the security module transmits a confirmation message to the control server via the at least one application, the confirmation message confirming acceptance or refusal of the cryptogram.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×