Method for allocating secured resources in a security module

The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resour...

Full description

Saved in:
Bibliographic Details
Main Authors CANTINI RENATO, JOLY STEPHANE, KSONTINI RACHED, TAZI MEHDI
Format Patent
LanguageEnglish
Published 11.01.2007
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resource allocation method of a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by the application suppliers, this method comprising the following steps: generation of a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by the operator, introduction of at least one public key of the operator in the security module, reception by the operator of a request from a supplier, this request comprising at least the public key of the supplier, transmission by the operator of a resource reservation instruction to the security module together with the public key of the supplier, transmission by the operator of the security module's public key to the supplier, establishment of a secure communication channel between the supplier and the security module.
Bibliography:Application Number: US20040562036