Local trusted services manager for a contactless smart card
First Claim
1. A computer-implemented method for implementing trusted service managers (TSM) locally in secure elements of computing devices used for contactless communications, comprising:
- storing, a TSM software application in a secure element of a computing device used for contactless communication, a private encryption key assigned to the TSM software application, and a corresponding public encryption key;
transmitting, by the TSM software application in the secure element of the computing device, a request for application data to a registered remote non-TSM computer configured to access the public key;
receiving, in the computing device from the remote non-TSM computer, the requested application data for installation in the secure element of the computing device, the requested application data comprising at least one of a software application, other than the TSM application, executable in the secure element or data to support an existing software application, other than the TSM application, in the secure element, the received requested application data having been encrypted by the remote non-TSM computer using the public encryption key;
decrypting, by the TSM software application in the secure element of the computing device, the received encrypted application data using the private key stored in the secure element of the computing device; and
writing, by the TSM software application in the secure element of the computing device, the decrypted application data to one or more memory blocks of the secure element.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
177 Citations
26 Claims
-
1. A computer-implemented method for implementing trusted service managers (TSM) locally in secure elements of computing devices used for contactless communications, comprising:
-
storing, a TSM software application in a secure element of a computing device used for contactless communication, a private encryption key assigned to the TSM software application, and a corresponding public encryption key; transmitting, by the TSM software application in the secure element of the computing device, a request for application data to a registered remote non-TSM computer configured to access the public key; receiving, in the computing device from the remote non-TSM computer, the requested application data for installation in the secure element of the computing device, the requested application data comprising at least one of a software application, other than the TSM application, executable in the secure element or data to support an existing software application, other than the TSM application, in the secure element, the received requested application data having been encrypted by the remote non-TSM computer using the public encryption key; decrypting, by the TSM software application in the secure element of the computing device, the received encrypted application data using the private key stored in the secure element of the computing device; and writing, by the TSM software application in the secure element of the computing device, the decrypted application data to one or more memory blocks of the secure element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product, comprising:
-
a non-transitory computer-executable secure element having computer-readable program instructions embodied thereon that when executed by a computing device perform a method for implementing a trusted service managers (TSM) locally in secure elements of computing devices used for contactless communications, the computer-executable program instructions comprising; computer-executable program instructions to transmit a request for application data to a registered remote non-TSM computer configured to access a public key stored in the secure element and assigned to the computing program product; computer-executable program instructions to receive, from the remote non-TSM computer, the requested application data for installation in the secure element of the computing device, the received requested application data having been encrypted by the remote non-TSM computer using the public encryption key, the application data comprising at least one of a software application, other than the TSM application, executable in the secure element or data to support an existing software application, other than the TSM application, in the secure element; computer-executable program instructions to decrypt the received encrypted application data using a private key corresponding to the public key and stored in the secure element; computer-executable program instructions to write the decrypted application data to one or more memory blocks of the secure element. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer-implemented system for implementing a trusted service manager (TSM) locally within secure elements of computing devices used for contactless communications, the system comprising:
-
a computing device comprising a secure element having a TSM software application resident therein, the TSM software application configured to execute in the secure element of the computing device and to; store a private encryption key assigned to a TSM software application and a corresponding public encryption key in the secure element; transmit a request for application data to a registered remote non-TSM computer configured to access the public key; receive from the remote non-TSM computer the requested application data for installation in the secure element, the requested application data encrypted by the non-TSM computer using the public key, the application data comprising at least one of a software application, other than the TSM application, executable in the secure element or data to support an existing software application, other than the TSM application, in the secure element; write the requested application data received from the remote non-TSM computer to the secure element. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification