Movatterモバイル変換


[0]ホーム

URL:


US20160191510A1 - Security and privacy enhancements for security devices - Google Patents

Security and privacy enhancements for security devices
Download PDF

Info

Publication number
US20160191510A1
US20160191510A1US15/060,678US201615060678AUS2016191510A1US 20160191510 A1US20160191510 A1US 20160191510A1US 201615060678 AUS201615060678 AUS 201615060678AUS 2016191510 A1US2016191510 A1US 2016191510A1
Authority
US
United States
Prior art keywords
aka
security
sim
sim device
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/060,678
Inventor
Mats Näslund
Tomas Goldbeck-Löwe
Karl Norrman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Telefonaktiebolaget LM Ericsson AB
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget LM Ericsson ABfiledCriticalTelefonaktiebolaget LM Ericsson AB
Priority to US15/060,678priorityCriticalpatent/US20160191510A1/en
Publication of US20160191510A1publicationCriticalpatent/US20160191510A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A tamper-resistant security device, such as a subscriber identity module or equivalent, has an AKA (Authentication and Key Agreement) module for performing an AKA process with a security key stored in the device, as well as means for external communication. The tamper-resistant security device includes an application that cooperates with the AKA module and an internal interface for communications between the AKA module and the application. The application cooperating with the AKA module is preferably a security and/or privacy enhancing application. For increased security, the security device may also detect whether it is operated in its normal secure environment or a foreign less secure environment and set access rights to resident files or commands that could expose the AKA process or corresponding parameters accordingly.

Description

Claims (22)

1. A Subscriber Identity Module (SIM) device for use in a mobile terminal, comprising:
memory configured to store user credentials including at least a security key;
a hardware or computer-implemented Authentication and Key Agreement (AKA) module configured to perform AKA processing with the security key;
an external hardware communications interface configured to receive AKA processing commands from the mobile terminal and to return processing results performed in the SIM device in response to the AKA processing commands;
a hardware or computer-implemented security and/or privacy enhancing application configured to cooperate with the AKA module and to perform (i) enhanced security pre-processing of an AKA input parameter associated with an AKA processing command received via the external hardware communications interface and/or (ii) enhanced security post-processing of an AKA output parameter associated with the AKA processing received from the AKA module to generate a further AKA input and/or output parameter which has an enhanced security as compared to the received AKA input and/or output parameter; and
an application interface internal to the SIM device between the AKA module and the security and/or privacy enhancing application,
wherein the SIM device is configured to perform all the AKA processing and steps related to security enhancing in the SIM device.
US15/060,6782002-10-072016-03-04Security and privacy enhancements for security devicesAbandonedUS20160191510A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/060,678US20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US41627202P2002-10-072002-10-07
PCT/SE2003/001461WO2004032557A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US10/530,293US20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US14/309,221US9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices
US15/060,678US20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/309,221ContinuationUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices

Publications (1)

Publication NumberPublication Date
US20160191510A1true US20160191510A1 (en)2016-06-30

Family

ID=32069944

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US10/530,293AbandonedUS20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US14/309,221Expired - LifetimeUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices
US15/060,678AbandonedUS20160191510A1 (en)2002-10-072016-03-04Security and privacy enhancements for security devices

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US10/530,293AbandonedUS20060288407A1 (en)2002-10-072003-09-17Security and privacy enhancements for security devices
US14/309,221Expired - LifetimeUS9282095B2 (en)2002-10-072014-06-19Security and privacy enhancements for security devices

Country Status (9)

CountryLink
US (3)US20060288407A1 (en)
EP (1)EP1550341B1 (en)
KR (1)KR101047641B1 (en)
CN (1)CN100477834C (en)
AT (1)ATE350872T1 (en)
AU (1)AU2003265034A1 (en)
BR (1)BRPI0315078B1 (en)
DE (1)DE60310968T2 (en)
WO (1)WO2004032557A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12425867B2 (en)2019-08-162025-09-23Interdigital Patent Holdings, Inc.Registration and security enhancements for a WTRU with multiple USIMs

Families Citing this family (56)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040103325A1 (en)*2002-11-272004-05-27Priebatsch Mark HerbertAuthenticated remote PIN unblock
US7181196B2 (en)2003-05-152007-02-20Lucent Technologies Inc.Performing authentication in a communications system
US8345882B2 (en)*2003-11-112013-01-01Siemens AktiengesellschaftMethod for safeguarding data traffic between a first terminal and a first network and a second terminal and a second network
EP1536606A1 (en)2003-11-272005-06-01Nagracard S.A.Method for authenticating applications
ATE428278T1 (en)2004-06-172009-04-15Ericsson Telefon Ab L M SECURITY IN MOBILE COMMUNICATION SYSTEMS
US7765404B2 (en)*2004-06-292010-07-27Nokia CorporationProviding content in a communication system
US8046662B2 (en)2004-08-202011-10-25Broadcom CorporationMethod and system for decoding control data in GSM-based systems using inherent redundancy
US7716565B2 (en)*2004-08-202010-05-11Broadcom CorporationMethod and system for decoding video, voice, and speech data using redundancy
CN100459787C (en)*2004-08-292009-02-04华为技术有限公司Safety guarantee method for user card
US7574610B2 (en)*2004-09-302009-08-11Microsoft CorporationSecurity state watcher
SK4042004A3 (en)*2004-11-232006-08-03Silentel, S. R. O.System and device for secure mobile communication
GB0428084D0 (en)*2004-12-222005-01-26Nokia CorpMethod for producing authentication information
CN100581104C (en)*2005-01-072010-01-13华为技术有限公司 A Method of Key Negotiation in IP Multimedia Service Subsystem Network
GB0504865D0 (en)*2005-03-092005-04-13Nokia CorpUser authentication in a communications system
US8126145B1 (en)2005-05-042012-02-28Marvell International Ltd.Enhanced association for access points
DE102005026982A1 (en)*2005-06-102006-12-14Siemens Ag Method for agreeing a security key between at least one first and a second communication subscriber for securing a communication connection
KR20080066811A (en)*2005-10-212008-07-16노키아 코포레이션 Device, computer program product and method for security authentication response in mobile terminal
JP4435076B2 (en)*2005-11-182010-03-17フェリカネットワークス株式会社 Mobile terminal, data communication method, and computer program
US8045958B2 (en)*2005-11-212011-10-25Research In Motion LimitedSystem and method for application program operation on a wireless device
KR100734856B1 (en)*2005-12-052007-07-03한국전자통신연구원 Universal authentication method using SAS
US20070204323A1 (en)*2006-02-242007-08-30Rockwell Automation Technologies, Inc.Auto-detection capabilities for out of the box experience
DE602006006787D1 (en)*2006-02-272009-06-25Research In Motion Ltd Method for personalizing a standardized IT policy
KR101359324B1 (en)*2006-03-272014-02-24텔레콤 이탈리아 소시에떼 퍼 아찌오니System for enforcing security policies on mobile communications devices
EP1933528B9 (en)*2006-12-122018-05-23OrangeSecure service access from a communication apparatus with a personal device
ITMI20070996A1 (en)*2007-05-172008-11-18Incard Sa METHOD FOR CHECKING THE EXECUTION OF AN APPLICATION FOR AN IC CARD
WO2008151663A1 (en)*2007-06-122008-12-18Telefonaktiebolaget Lm Ericsson (Publ)Method and apparatuses for authentication and reauthentication of a user with first and second authentication procedures
US8230035B2 (en)*2007-10-042012-07-24Alcatel LucentMethod for authenticating mobile units attached to a femtocell that operates according to code division multiple access
FR2929060B1 (en)*2008-03-182014-09-12Eads Secure Networks MANAGING USER IDENTITY IN A SYSTEM
KR101512322B1 (en)2008-06-042015-04-15삼성전자주식회사Method for sharing human behavior, Apparatus and System thereof
US8006101B2 (en)*2008-06-202011-08-23General Instrument CorporationRadio transceiver or other encryption device having secure tamper-detection module
US9270700B2 (en)*2008-12-122016-02-23Microsoft Technology Licensing, LlcSecurity protocols for mobile operator networks
US8881235B2 (en)2008-12-152014-11-04Koninklijke Kpn N.V.Service-based authentication to a network
KR101224717B1 (en)*2008-12-262013-01-21에스케이플래닛 주식회사Method for Protecting Software License, System, Server, Terminal And Computer-Readable Recording Medium with Program therefor
DE102009026953A1 (en)*2009-06-162010-12-23Bundesdruckerei Gmbh Method for registering a mobile device in a mobile network
US8433918B2 (en)*2009-10-142013-04-30Texas Instruments IncorporatedMethods and systems for improving the security of password-based authentication protocols for IEEE 802.11 networks
US9264448B2 (en)*2010-01-202016-02-16Blackberry LimitedApparatus, and an associated method, for facilitating secure operations of a wireless device
US8555067B2 (en)*2010-10-282013-10-08Apple Inc.Methods and apparatus for delivering electronic identification components over a wireless network
US9450759B2 (en)2011-04-052016-09-20Apple Inc.Apparatus and methods for controlling distribution of electronic access clients
EP2730112A4 (en)*2011-07-082015-05-06Nokia Corp METHOD AND APPARATUS FOR AUTHENTICATING SUBSCRIBERS TO LONG-TERM EVOLUTION TELECOMMUNICATION NETWORKS OR UNIVERSAL MOBILE TELECOMMUNICATION SYSTEM
US8434158B2 (en)*2011-08-292013-04-30Maxim Integrated Products, Inc.Systems and methods for detecting and thwarting unauthorized access and hostile attacks on secured systems
US8843739B2 (en)*2012-04-042014-09-23Lockheed Martin CorporationAnti-tamper device, system, method, and computer-readable medium
GB201207816D0 (en)2012-05-042012-06-13Vodafone Ip Licensing LtdTelecommunication networks
KR20150084970A (en)2012-11-222015-07-22코닌클리즈케 케이피엔 엔.브이.System to detect behaviour in a telecommunications network
EP2929670B1 (en)2012-12-102019-07-03Koninklijke KPN N.V.System to protect a mobile network
CN103200184B (en)*2013-03-142016-04-20电子科技大学A kind of mobile terminal safety assessment method
KR102144509B1 (en)*2014-03-062020-08-14삼성전자주식회사Proximity communication method and apparatus
US9693225B2 (en)*2014-04-112017-06-27Blackberry LimitedMethod and apparatus for a dual radio user equipment
WO2015160674A1 (en)*2014-04-172015-10-22Mavenir Systems, Inc.Gsm a3/a8 authentication in an ims network
CN104158721A (en)*2014-07-152014-11-19神州数码融信软件有限公司Basic information interaction system
CN106302936B (en)*2015-05-182019-10-25腾讯科技(深圳)有限公司A kind of labeling method of user identifier, device and system
ES2797788T3 (en)*2016-09-122020-12-03Deutsche Telekom Ag Subscriber identification system
EP3499834B1 (en)*2016-09-192021-12-01Huawei Technologies Co., Ltd.Key negotiation method and apparatus
KR101890740B1 (en)2017-02-092018-08-22충남대학교산학협력단System and method for analysing Robustness test of Bluetooth Low Energy
US10592710B1 (en)2018-10-022020-03-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
CN109768856A (en)*2018-11-192019-05-17北京计算机技术及应用研究所It is a kind of for encrypting the portable security device of moneytary operations
DE102021005869A1 (en)2020-11-262022-06-02Giesecke+Devrient Mobile Security Gmbh Method for changing an access right in a UICC

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010003071A1 (en)*1998-06-192001-06-07Silvano MansuttiMultifunctional electronic palmtop computer
US20010046839A1 (en)*2000-04-072001-11-29Antti Latva-AhoConnecting access points in wireless telecommunication systems
US20020099871A1 (en)*2001-01-252002-07-25Vargas Garrett R.Sim manager API
US6591116B1 (en)*1999-06-072003-07-08Nokia Mobile Phones LimitedMobile equipment and networks providing selection between USIM/SIM dependent features
US20030236987A1 (en)*2002-06-252003-12-25Griffin Daniel C.Base cryptographic service provider (CSP) methods and apparatuses
US20040260791A1 (en)*2001-06-252004-12-23Belhassen JerbiMethod for transmitting data

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3483055A (en)1966-03-281969-12-09Robert Wayne EshbaughMethod for forming a fiber glass racket frame
US4748668A (en)*1986-07-091988-05-31Yeda Research And Development Company LimitedMethod, apparatus and article for identification and signature
JPH087720B2 (en)*1986-09-161996-01-29富士通株式会社 Area access method for IC cards for multiple services
FR2673016B1 (en)*1991-02-191993-04-30Gemplus Card Int METHOD FOR PROTECTING AN INTEGRATED CIRCUIT AGAINST FRAUDULENT USES.
JPH0697931A (en)*1992-09-141994-04-08Fujitsu LtdPersonal communication terminal registration control system
US5422953A (en)*1993-05-051995-06-06Fischer; Addison M.Personal date/time notary device
AU1265195A (en)*1993-12-061995-06-27Telequip CorporationSecure computer memory card
US5668878A (en)*1994-02-281997-09-16Brands; Stefanus AlfonsusSecure cryptographic methods for electronic transfer of information
FR2718312B1 (en)*1994-03-291996-06-07Rola Nevoux Method for the combined authentication of a telecommunications terminal and a user module.
US5537474A (en)*1994-07-291996-07-16Motorola, Inc.Method and apparatus for authentication in a communication system
JPH08139718A (en)1994-11-041996-05-31Hitachi Ltd Cryptographic device and communication method between terminals using the same
EP0723251A3 (en)*1995-01-201998-12-30Tandem Computers IncorporatedMethod and apparatus for user and security device authentication
US5651068A (en)*1995-03-081997-07-22Hewlett-Packard CompanyInternational cryptography framework
DE19530339A1 (en)1995-08-181997-02-20Degussa Fumed silica, process for its production and use
US5602918A (en)*1995-12-221997-02-11Virtual Open Network Environment Corp.Application level security system and method
EP0795844A1 (en)*1996-03-111997-09-17Koninklijke KPN N.V.Method of securely modifying data on a smart card
FI106605B (en)*1997-04-162001-02-28Nokia Networks Oy authentication method
ATE429748T1 (en)*1998-01-022009-05-15Cryptography Res Inc LEAK RESISTANT CRYPTOGRAPHIC METHOD AND APPARATUS
US6470454B1 (en)*1998-03-312002-10-22International Business Machines CorporationMethod and apparatus for establishing computer configuration protection passwords for protecting computer configurations
US6141756A (en)*1998-04-272000-10-31Motorola, Inc.Apparatus and method of reading a program into a processor
FR2780177B1 (en)*1998-06-172001-10-05Schlumberger Ind Sa SOFTWARE PROTECTION SYSTEM
US6816968B1 (en)*1998-07-102004-11-09Silverbrook Research Pty LtdConsumable authentication protocol and system
SG77270A1 (en)*1998-10-162000-12-19Matsushita Electric Industrial Co LtdDigital content protection system
US7047416B2 (en)*1998-11-092006-05-16First Data CorporationAccount-based digital signature (ABDS) system
FI107860B (en)1999-02-092001-10-15Sonera Smarttrust Oy Procedure and systems for a telecommunications system and a subscriber identity module
US6507907B1 (en)*1999-02-262003-01-14Intel CorporationProtecting information in a system
US6516414B1 (en)*1999-02-262003-02-04Intel CorporationSecure communication over a link
JP3389186B2 (en)*1999-04-272003-03-24松下電器産業株式会社 Semiconductor memory card and reading device
US6687375B1 (en)*1999-06-022004-02-03International Business Machines CorporationGenerating user-dependent keys and random numbers
WO2000077974A1 (en)1999-06-112000-12-21Liberate TechnologiesHierarchical open security information delegation and acquisition
KR100769437B1 (en)*1999-09-012007-10-22마츠시타 덴끼 산교 가부시키가이샤 Distribution system, semiconductor memory card, receiving device, computer readable recording medium and receiving method
EP1081891A3 (en)1999-09-022002-05-22Compaq Computer CorporationAutokey initialization of cryptographic devices
JP4602627B2 (en)*2000-03-092010-12-22パナソニック株式会社 Management device, editing device, audio data management system including recording medium, management device, editing device, recording medium, and method
IL135246A0 (en)*2000-03-232003-06-24Cipherit LtdMethods and systems for efficient chained certification
US6950521B1 (en)*2000-06-132005-09-27Lucent Technologies Inc.Method for repeated authentication of a user subscription identity module
US7149308B1 (en)*2000-11-132006-12-12Stealthkey, Inc.Cryptographic communications using in situ generated cryptographic keys for conditional access
JP3637869B2 (en)*2000-11-222005-04-13日本電気株式会社 Chain key broadcast receiving system and chain key broadcast receiving method
JP2002163584A (en)*2000-11-242002-06-07Fujitsu Ltd Card payment method and system using portable information terminal
CN1720578A (en)*2000-12-072006-01-11三因迪斯克公司 System, method and apparatus for playback of recorded audio, video or other content from non-volatile memory card, compact disk or other media
JP4019303B2 (en)2001-02-022007-12-12日本電気株式会社 ENCRYPTION DEVICE AND DECRYPTION DEVICE USING ENCRYPTION KEY INCLUDED IN ELECTRONIC WATERMARK AND METHOD THEREOF
US20060072747A1 (en)*2001-03-302006-04-06Wood Matthew DEnhancing entropy in pseudo-random number generators using remote sources
SE0101295D0 (en)2001-04-102001-04-10Ericsson Telefon Ab L M A method and network for delivering streaming data
JP2002329180A (en)*2001-04-272002-11-15Toshiba Corp Memory card having wireless communication function and data communication method thereof
FI114180B (en)*2001-06-122004-08-31Nokia Corp Improved method and device arrangement for encrypting data transmission at the interface of the radio network terminal equipment and such terminal equipment
US7444476B2 (en)*2001-07-242008-10-28Texas Instruments IncorporatedSystem and method for code and data security in a semiconductor device
JP2003051819A (en)*2001-08-082003-02-21Toshiba Corp Microprocessor
US20030056100A1 (en)*2001-09-142003-03-20Rodney BeatsonMethod and system for authenticating a digitized signature for execution of an electronic document
DE10200041B4 (en)*2002-01-032021-03-25Vodafone Holding Gmbh Authentication system and procedure between two communication units
US20030159067A1 (en)*2002-02-212003-08-21Nokia CorporationMethod and apparatus for granting access by a portable phone to multimedia services

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20010003071A1 (en)*1998-06-192001-06-07Silvano MansuttiMultifunctional electronic palmtop computer
US6591116B1 (en)*1999-06-072003-07-08Nokia Mobile Phones LimitedMobile equipment and networks providing selection between USIM/SIM dependent features
US20010046839A1 (en)*2000-04-072001-11-29Antti Latva-AhoConnecting access points in wireless telecommunication systems
US20020099871A1 (en)*2001-01-252002-07-25Vargas Garrett R.Sim manager API
US20040260791A1 (en)*2001-06-252004-12-23Belhassen JerbiMethod for transmitting data
US20030236987A1 (en)*2002-06-252003-12-25Griffin Daniel C.Base cryptographic service provider (CSP) methods and apparatuses

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12425867B2 (en)2019-08-162025-09-23Interdigital Patent Holdings, Inc.Registration and security enhancements for a WTRU with multiple USIMs

Also Published As

Publication numberPublication date
US20060288407A1 (en)2006-12-21
EP1550341B1 (en)2007-01-03
EP1550341A1 (en)2005-07-06
DE60310968D1 (en)2007-02-15
KR20050083729A (en)2005-08-26
AU2003265034A1 (en)2004-04-23
US20140304768A1 (en)2014-10-09
DE60310968T2 (en)2007-10-11
CN1689367A (en)2005-10-26
CN100477834C (en)2009-04-08
ATE350872T1 (en)2007-01-15
BR0315078A (en)2005-08-16
WO2004032557A1 (en)2004-04-15
US9282095B2 (en)2016-03-08
KR101047641B1 (en)2011-07-08
BRPI0315078B1 (en)2019-08-20

Similar Documents

PublicationPublication DateTitle
US9282095B2 (en)Security and privacy enhancements for security devices
CN1969580B (en)Security in a mobile communications system
US7444513B2 (en)Authentication in data communication
KR101158956B1 (en)Method for distributing certificates in a communication system
CN1857024B (en)Enhanced security design for cryptography in mobile communication systems
US8726019B2 (en)Context limited shared secret
JP4504192B2 (en) Secure access to subscription modules
US20100135491A1 (en)Authentication method
CN101990201B (en)Method, system and device for generating general bootstrapping architecture (GBA) secret key
US7913096B2 (en)Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
TW200527877A (en)Method and application for authentication of a wireless communication using an expiration marker
US20020169958A1 (en)Authentication in data communication
US12382286B2 (en)Security authentication method and apparatus applied to Wi-Fi
Lunde et al.Using SIM for strong end-to-end Application Authentication
Pashalidis et al.Using GSM/UMTS for single sign-on
KR100932275B1 (en) Restriction Method of Subscriber Identity Module Using TPM and Mobile Terminal for the Same
Stirparo et al.Bluetooth technology: security features, vulnerabilities and attacks
WiederkehrApproaches for simplified hotspot logins with Wi-Fi devices
BodriagovA secure mobile phone-based interactive logon in Windows
ErikssonSecurity in Unlicensed Mobile Access
HK1164019A (en)Service-based authentication to a network

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp