Method for allocating secured resources in a security module
The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resour...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
11.01.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resource allocation method of a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by the application suppliers, this method comprising the following steps: generation of a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by the operator, introduction of at least one public key of the operator in the security module, reception by the operator of a request from a supplier, this request comprising at least the public key of the supplier, transmission by the operator of a resource reservation instruction to the security module together with the public key of the supplier, transmission by the operator of the security module's public key to the supplier, establishment of a secure communication channel between the supplier and the security module. |
---|---|
AbstractList | The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account the security imperatives of the different intervening parties, such as the operator and application suppliers. This aim is achieved by a resource allocation method of a security module of an apparatus connected to a network, this network being administrated by an operator, said resources being used by the application suppliers, this method comprising the following steps: generation of a pair of asymmetric keys and storage of the private key in the security module, the public key being stored by the operator, introduction of at least one public key of the operator in the security module, reception by the operator of a request from a supplier, this request comprising at least the public key of the supplier, transmission by the operator of a resource reservation instruction to the security module together with the public key of the supplier, transmission by the operator of the security module's public key to the supplier, establishment of a secure communication channel between the supplier and the security module. |
Author | CANTINI RENATO TAZI MEHDI JOLY STEPHANE KSONTINI RACHED |
Author_xml | – fullname: CANTINI RENATO – fullname: JOLY STEPHANE – fullname: KSONTINI RACHED – fullname: TAZI MEHDI |
BookMark | eNrjYmDJy89L5WSw8U0tychPUUjLL1JIzMnJT04sycxLVyhOTS4tSk1RKEotzi8tSk4tVsjMU0iECGeWVCrk5qeU5qTyMLCmJeYUp_JCaW4GZTfXEGcP3dSC_PjU4oLE5NS81JL40GAjAwNzAwNLQwNDR0Nj4lQBAMIGMn8 |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US2007009101A1 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US2007009101A13 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 13:14:20 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US2007009101A13 |
Notes | Application Number: US20040562036 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070111&DB=EPODOC&CC=US&NR=2007009101A1 |
ParticipantIDs | epo_espacenet_US2007009101A1 |
PublicationCentury | 2000 |
PublicationDate | 20070111 |
PublicationDateYYYYMMDD | 2007-01-11 |
PublicationDate_xml | – month: 01 year: 2007 text: 20070111 day: 11 |
PublicationDecade | 2000 |
PublicationYear | 2007 |
RelatedCompanies | SWISSCOM MOBILE AG |
RelatedCompanies_xml | – name: SWISSCOM MOBILE AG |
Score | 2.6681576 |
Snippet | The aim of this invention is to provide a method to allocate resources on a security module of a portable apparatus such as a telephone, taking into account... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CHECKING-DEVICES COIN-FREED OR LIKE APPARATUS ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY JAMMING OF COMMUNICATION PHYSICS SECRET COMMUNICATION |
Title | Method for allocating secured resources in a security module |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20070111&DB=EPODOC&locale=&CC=US&NR=2007009101A1 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfR3ZSsNAcCj1fNOoeFRZUPIW3DTZpAGD2BwUoQe2kb6VHBsp1KQ0Kf6-u5tE-9THnYFhdmF27hmAJxx2EzXCRDE0nCh6GKYKs5OpgimxIiOlCYlEgezIGAT6-5zMW7BqemHEnNAfMRyRSVTM5L0U__X6P4jlitrK4jlaMlD-6s9sV268Y5OvTpfdvu1Nxu7YkR3HDqby6KPCcd2ovjFf6YAb0nzSvvfZ530p612l4p_B4YTRy8pzaNFMghOn2b0mwfGwTnlLcCRqNOOCAWs5LC7gZSgWPyNmcSKeOecsZ1-o4MFzmqBNHZMv0DJDYQVm1jb6zpPtil7Co-_NnIHCGFr83X8RTHe5166gneUZvQZkpoTQWA17VKM65cPhu5aOeyY7WSQy8A109lG63Y--g9MqkKkqqtqBdrnZ0numgcvoQTzcLzO-iRw |
link.rule.ids | 230,309,786,891,25594,76903 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfR3LTsJAcELwgTetGh-om2h6a2xpt4VEYqSFoEIhAoZb08fWkGBLaIm_7-xClRPHnUkms5vMznsG4EH1a5EWqFQxdTVSDN-PFbSTmaIy2gjMmEU0EAWyrtmdGG9TOi3BvOiFEXNCf8RwRJSoEOU9F__14j-I5YjayuwxmCEofe6Mm45ceMcWX50uO61mezhwBrZs283JSHY_1jiuG7UX9JX2LHQKhbP02eJ9KYttpdI5hv0h0kvyEyixRIKKXexek-Cwv0l5S3AgajTDDIEbOcxO4akvFj8TtDgJz5xzlpMvkvHgOYvIchOTz8gsIf4ajNY2-U6j1ZydwX2nPba7CjLk_d3fm4y2udfPoZykCbsAYsWUslDz60xnBuPD4WsNQ61beGrQwFQvobqL0tVu9B1UuuN-z-u9uu_XcLQOamqKplWhnC9X7Aa1cR7cikf8BcJ0jAY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Method+for+allocating+secured+resources+in+a+security+module&rft.inventor=CANTINI+RENATO&rft.inventor=JOLY+STEPHANE&rft.inventor=KSONTINI+RACHED&rft.inventor=TAZI+MEHDI&rft.date=2007-01-11&rft.externalDBID=A1&rft.externalDocID=US2007009101A1 |