×

Enabling secure application distribution on a (E)UICC using short distance communication techniques

  • US 9,848,325 B2
  • Filed: 11/03/2014
  • Issued: 12/19/2017
  • Est. Priority Date: 07/14/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method performed in a system comprising a first wireless device including a first security application, a second wireless device and a network node, for enabling distribution of the first security application to the second wireless device, the method comprising:

  • receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device;

    sending, from the first wireless device, the hardware identifier of the second wireless device and information identifying the first security application to the network node;

    receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the first security application;

    sending, from the network node to the first wireless device, a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier;

    receiving, in the first wireless device, a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier;

    authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device;

    sending, from the network node, a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device;

    receiving, in the first wireless device, a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; and

    sending the second security application associated with the first security application of the first wireless device from the network node to the second wireless device;

    wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data;

    receiving, in the first wireless device, user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device;

    sending, from the first wireless device, instructions to the network node to cancel the authorization to the second wireless device;

    receiving, in the network node, instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; and

    cancelling, in the network node, the authorization to the second wireless device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×