Enabling secure application distribution on a (E)UICC using short distance communication techniques
First Claim
1. A method performed in a system comprising a first wireless device including a first security application, a second wireless device and a network node, for enabling distribution of the first security application to the second wireless device, the method comprising:
- receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device;
sending, from the first wireless device, the hardware identifier of the second wireless device and information identifying the first security application to the network node;
receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the first security application;
sending, from the network node to the first wireless device, a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier;
receiving, in the first wireless device, a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier;
authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device;
sending, from the network node, a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device;
receiving, in the first wireless device, a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; and
sending the second security application associated with the first security application of the first wireless device from the network node to the second wireless device;
wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data;
receiving, in the first wireless device, user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device;
sending, from the first wireless device, instructions to the network node to cancel the authorization to the second wireless device;
receiving, in the network node, instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; and
cancelling, in the network node, the authorization to the second wireless device.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides for methods and devices for enabling distribution of a first security application comprised in the first wireless device to the second wireless device. One method comprises the steps of receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device, sending, from the first wireless device, the hardware identifier and information identifying the first security application to the network node, receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the security application and authorizing, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device.
43 Citations
33 Claims
-
1. A method performed in a system comprising a first wireless device including a first security application, a second wireless device and a network node, for enabling distribution of the first security application to the second wireless device, the method comprising:
-
receiving, in the first wireless device, using a short distance communication technology, a hardware identifier of the second wireless device; sending, from the first wireless device, the hardware identifier of the second wireless device and information identifying the first security application to the network node; receiving, in the network node, from the first wireless device, the hardware identifier of the second wireless device and the information identifying the first security application; sending, from the network node to the first wireless device, a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; receiving, in the first wireless device, a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorising, in the network node, the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device; sending, from the network node, a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; receiving, in the first wireless device, a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; and sending the second security application associated with the first security application of the first wireless device from the network node to the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data; receiving, in the first wireless device, user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device; sending, from the first wireless device, instructions to the network node to cancel the authorization to the second wireless device; receiving, in the network node, instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; and cancelling, in the network node, the authorization to the second wireless device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, performed in a first wireless device, of enabling distribution of a first security application comprised in the first wireless device to a second wireless device, the method comprising:
-
receiving, using a short distance communication technology, a hardware identifier of the second wireless device; and sending the hardware identifier and information identifying the first security application to a network node, thereby enabling the network node to; send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device; and send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device; receiving a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; receiving a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data; receiving user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device; and sending instructions to the network node to cancel the authorization to the second wireless device, thereby enabling the network node to cancel the authorization to the second wireless device. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method performed in a network node of enabling distribution of a first security application comprised in a first wireless device to a second wireless device, the method comprising:
-
receiving, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; sending to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorising the second wireless device to receive and/or activate a second security application associated with a security application of the first wireless device; sending a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; sending the second security application associated with the first security application of the first wireless device to the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data; receiving instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; and cancelling the authorization to the second wireless device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, performed in a second wireless device, of enabling distribution of a first security application comprised in a first wireless device to the second wireless device, the method comprising:
-
receiving, using a short distance communication technology, information identifying the first security application of the first wireless device; and sending a hardware identifier of the second wireless device and information identifying the first security application to a network node, thereby enabling the network node to; send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data.
-
-
21. A system, comprising a first wireless device, a second wireless device and a network node, for enabling distribution of a first security application comprised in the first wireless device to the second wireless device, comprising:
-
the first wireless device, comprising; communication circuitry for short distance communication; processing circuitry configured to; i. receive, using the communication circuitry, a hardware identifier of the second wireless device; ii. send, using the communication circuitry, the hardware identifier and information identifying the security application to a network node, thereby enabling the network node to authorise the second wireless device to get access to a second security application associated with the security application of the first wireless device; iii. receive a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; iv. receive a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; v. receive user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device; and vi. send, using the communication circuitry, instructions to the network node to cancel the authorization to the second wireless device; and the network node, comprising; communication circuitry for short distance communication; processing circuitry configured to; i. receive, using the communication circuitry, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; ii. send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; iii. authorise the second wireless device to access a security application associated with a second security application of the first wireless device; iv. send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; and v. send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device; vi. receive instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; vii. cancel the authorization to the second wireless device; the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data. - View Dependent Claims (22)
-
-
23. A first wireless device, for enabling distribution of a first security application comprised in the first wireless device to a second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; receive, using the communication circuitry, a hardware identifier of the second wireless device; send, using the communication circuitry, the hardware identifier and information identifying the security application to a network node, thereby enabling the network node to; send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorise the second wireless device to get access to a second security application associated with the security application of the first wireless device; and send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device; receive a first confirmation from the network node that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; receive a second confirmation that the second security application associated with the first security application is authorized in the second wireless device; receive user input to cancel the authorization to access the second security application, associated with the first security application, in the second wireless device; and send, using the communication circuitry, instructions to the network node to cancel the authorization to the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A network node, for enabling distribution of a first security application comprised in a first wireless device to a second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; receive, using the communication circuitry, from the first wireless device, a hardware identifier of the second wireless device and information identifying the security application; send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorise the second wireless device to access a security application associated with a second security application of the first wireless device; send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device; receive instructions from the first wireless device to cancel the authorization to the second wireless device to access the second security application associated with the first security application; cancel the authorization to the second wireless device; wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A second wireless device, for enabling distribution of a first security application comprised in a first wireless device to the second wireless device, comprising:
-
communication circuitry for short distance communication; processing circuitry configured to; receive, using a short distance communication technology, information identifying the first security application of the first wireless device; and send a hardware identifier of the second wireless device and information identifying the first security application to a network node, thereby enabling the network node to send to the first wireless device a first confirmation that the hardware identifier is received in the network node and/or that it is a correct hardware identifier; authorise the second wireless device to receive and/or activate a second security application associated with the first security application of the first wireless device; and send a second confirmation to the first wireless device that the second security application associated with the first security application is authorized in the second wireless device; send the second security application associated with the first security application of the first wireless device from the network node to the second wireless device wherein the first security application and the second security application are both software applications executed by a processor in a secured environment such that, when executed, the first security application and the second security application restrict access to sensitive data.
-
Specification