Method for the authentication of applications
First Claim
1. A portable device, comprising:
- an electronic module; and
a security module connected to the electronic module,the electronic module being configured to connect by a network to a control server,the portable device being configured to transmit, to the control server, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module,the portable device being configured to receive, from the control server, a protection profile defining resources of the security module that can be used by at least one application,the electronic module being configured to receive, from the control server, the at least one application,the at least one application being at least one of loadable or executable via an application execution environment of the electronic module, the at least one application being configured to use resources stored in the security module;
the portable device being configured to receive, from the control server, a cryptogram, the cryptogram includinga digest of the at least one application, the identification data,the protection profile, andat least one of an identifier of the at least one application or an identifier of security module resources,the security module being configured to perform a verification operation of verifying the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module; and
the security module being configured to perform, based on the received protection profile and the verification, at least one ofreleasing one or more resources of said security module to the at least one application, orblocking the at least one application from accessing one or more resources of said security module,wherein, the portable device is configured such that,when the cryptogram is not received at the portable device,the at least one application requests, once the at least one application is loaded into the electronic module, the cryptogram from the server,the at least one application requesting the cryptogram from the server at the time of an initialization of the at least one application;
the at least one application transmits the received cryptogram to the security module;
the security module performs the verification operation when the cryptogram is accepted; and
the security module transmits a confirmation message to the control server via the at least one application, the confirmation message confirming acceptance or refusal of the cryptogram.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyzes and verifies identification data comprising at least an identifier of the equipment and an identifier of the security module, generates a cryptogram comprising a digest of the application, the identification data and instructions intended for the security module and transmits the cryptogram, via the network and the equipment, to the security module. The latter verifies the application by comparing the digest extracted from the cryptogram with a calculated digest, wherein, during at least one of initialization and activation of the application, the security module executes the instructions extracted from the cryptogram and either releases or blocks access to certain resources of said security module according to a result of the verification of the application.
31 Citations
13 Claims
-
1. A portable device, comprising:
-
an electronic module; and a security module connected to the electronic module, the electronic module being configured to connect by a network to a control server, the portable device being configured to transmit, to the control server, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module, the portable device being configured to receive, from the control server, a protection profile defining resources of the security module that can be used by at least one application, the electronic module being configured to receive, from the control server, the at least one application, the at least one application being at least one of loadable or executable via an application execution environment of the electronic module, the at least one application being configured to use resources stored in the security module; the portable device being configured to receive, from the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile, and at least one of an identifier of the at least one application or an identifier of security module resources, the security module being configured to perform a verification operation of verifying the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module; and the security module being configured to perform, based on the received protection profile and the verification, at least one of releasing one or more resources of said security module to the at least one application, or blocking the at least one application from accessing one or more resources of said security module, wherein, the portable device is configured such that, when the cryptogram is not received at the portable device, the at least one application requests, once the at least one application is loaded into the electronic module, the cryptogram from the server, the at least one application requesting the cryptogram from the server at the time of an initialization of the at least one application; the at least one application transmits the received cryptogram to the security module; the security module performs the verification operation when the cryptogram is accepted; and the security module transmits a confirmation message to the control server via the at least one application, the confirmation message confirming acceptance or refusal of the cryptogram. - View Dependent Claims (2, 3)
-
-
4. A control server for connecting by a network to a portable device which includes electronic module and a security module, the control server comprising:
-
a processor, the control sever being configured to, receive, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module; analyze and verify the identification data; create a protection profile based on the analysis and verification, such that the protection profile defines resources of the security module that can be used by at least one application and causes the security module to perform, based on the protection profile, at least one of releasing one or more resources of said security module to the at least one application, or blocking the at least one application from accessing one or more resources of the security module; transmit, from the control server to the portable device, the protection profile; transmit, from the control server to the portable device, the at least one application, generate, at the control server, a cryptogram such that the cryptogram includes a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources; transmit, to the portable device, the cryptogram; and receive, from the portable device, an indication of a result of a verification operation that includes comparing the digest included in the transmitted cryptogram and a digest determined by the security module, wherein the control server is further configured such that, when the at least one application and the cryptogram are not transmitted from the control server to the portable device at a same time, the control server receives, from the portable device, a request requesting the control server to send the cryptogram to the portable device, the request being received after the control server transmits the at least one application at a time of an initialization of the at least one application at the portable device; and the control server receives, at the control server, a confirmation message of acceptance or refusal of the cryptogram from the security module. - View Dependent Claims (5, 6, 7)
-
-
8. A method of operating a portable device, the portable device including electronic module and a security module, the electronic module being connected by a network to a control server, the electronic module being connected to the security module, the method comprising:
-
transmitting, from the portable device to the control server, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module; receiving, at the portable device from the control server, a protection profile defining resources of the security module that can be used by at least one application; receiving, at the electronic module from the control server, the at least one application, the at least one application being at least one of loadable and executable via an application execution environment of the electronic module, the at least one application being configured to use resources stored in the security module; receiving, at the portable device from the control server, a cryptogram, the cryptogram including a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application and an identifier of security module resources; performing a verification operation of verifying, by the security module, the at least one application by comparing the digest extracted from the received cryptogram with a digest determined by the security module; performing, by the security module, based on the received protection profile, at least one of releasing one or more resources of said security module to the at least one application, or blocking the at least one application from accessing one or more resources of said security module; and when the cryptogram is not received at the portable device, requesting by the at least one application, once the at least one application is loaded into the electronic module, the cryptogram from the server, the at least one application requesting the cryptogram from the server at the time of an initialization of the at least one application; transmitting the received cryptogram from the at least one application to the security module; and the verification operation being performed by the security module when the cryptogram is received and transmitting a confirmation message of acceptance or refusal of the cryptogram from the security module to the control server via the at least one application. - View Dependent Claims (9, 10)
-
-
11. A method of operating a control server, the control server being connected by a network to a portable device, the portable device including an electronic module and a security module, the method comprising:
-
receiving, at the control server from the portable device, via the network, identification data including at least an identifier of the electronic module and an identifier of the security module; analyzing and verifying, by the control server, the identification data; creating, at the control server, a protection profile based on the analysis and verification, such that the protection profile defines resources of the security module that can be used by at least one application and causes the security module to perform, based on the protection profile, at least one of releasing one or more resources of said security module to the at least one application, or blocking the at least one application from accessing one or more resources of the security module; transmitting, from the control server to the portable device, the protection profile; transmitting, from the control server at the portable device, the at least one application, the at least one application transmitted by the control server being at least one of loadable or executable via an application execution environment of the electronic module, and being configured to use resources stored in the security module; generating, at the control server, a cryptogram such that the cryptogram includes a digest of the at least one application, the identification data, the protection profile and at least one of an identifier of the at least one application or an identifier of security module resources; transmitting, from the control server to the portable device, the cryptogram; receiving, at the control server from the portable device, an indication of a result of a verification operation that includes comparing the digest included in the transmitted cryptogram and a digest determined by the security module; and when the cryptogram has not been transmitted from the control server to the portable device, receiving, from the portable device, a request requesting the control server to send the cryptogram to the portable device, the request being received after the control server transmits the at least one application at a time of an initialization of the at least one application at the portable device; and receiving, at the control server, a confirmation message of acceptance or refusal of the cryptogram from the security module. - View Dependent Claims (12, 13)
-
Specification