METHOD OF MANAGING PROFILES IN A SECURE ELEMENT

    公开(公告)号:US20180198797A1

    公开(公告)日:2018-07-12

    申请号:US15740377

    申请日:2016-06-28

    Abstract: Method of managing profiles in a secure element, the secure element including a first profile associated with a first communication network and a second profile associated with a second communication network, the first profile being active. The method includes steps of deactivation of the first profile and activation of the second profile. The steps of deactivation and of activation are implemented following the detection of a failure during a local verification pertaining to the first profile for the use of this the first profile. A local verification may be a verification in the secure element of the authorization of access of a user to the first profile, for example three failures of PIN or PUK code or of biometric authentication data.

    Method and a server for managing profiles

    公开(公告)号:US09883386B2

    公开(公告)日:2018-01-30

    申请号:US15314004

    申请日:2015-05-26

    CPC classification number: H04W12/04 H04L67/306 H04W8/18 H04W12/08

    Abstract: A method that may be performed by a profile management server for managing the profiles of a secure entity, such as an embedded universal integrated circuit card. The method may include sending a message to the secure entity in order to modify the active profile of the entity; initializing and starting a timer; and in the event that the server does not receive a message indicating which profile is active in the secure entity before the expiry of a predetermined duration after the starting of the timer, then starting an audit procedure for determining which profile is actually active in the secure entity.

    METHOD FOR SENDING SECURITY INFORMATION
    34.
    发明申请

    公开(公告)号:US20170364907A1

    公开(公告)日:2017-12-21

    申请号:US15627473

    申请日:2017-06-20

    Abstract: A method and apparatus for sending security information are disclosed. The method is performed by a terminal that performs operations, which may include: during a current transaction, receiving first transaction data coming from an electronic device with which the terminal is co-operating; detecting an event encountered by the terminal during the current transaction; generating a transaction message including an indicator indicating that the first data is included in a field of the message; inserting security information in the field of the transaction message as a replacement for the first transaction data, the security information being representative of the event; and sending the transaction message including the security information to a remote server.

    METHOD FOR CONSULTING THE STATUS OF A RESOURCE OF AN ELECTRONIC DEVICE, ASSOCIATED ELECTRONIC ENTITY AND ELECTRONIC DEVICE PROVIDED WITH SUCH AN ELECTRONIC ENTITY

    公开(公告)号:US20170230807A1

    公开(公告)日:2017-08-10

    申请号:US15502014

    申请日:2015-07-27

    Abstract: Disclosed is a method for consulting, by an electronic entity (EE), the status of a resource (S, K) of an electronic device provided with a contactless module (CLF) and the electronic entity (EE), including the following steps: transmission, by the electronic entity (EE), of a resource (S, K) status request;—reception of a piece of resource (S, K) status information in response to the request;—storing of the resource (S; K) status information (INF);—execution of at least a part of an application (APPL) by a processor of the electronic entity (EE);—calling, as a result of the execution of the application (APPL), of a programming interface (API), resulting in the reading of the piece of stored resource (S, K) status information. An associated electronic entity and electronic device provided with such an electronic entity are also proposed.

    EMBEDDED SUBSCRIBER IDENTITY MODULE CAPABLE OF MANAGING COMMUNICATION PROFILES

    公开(公告)号:US20170215063A1

    公开(公告)日:2017-07-27

    申请号:US15125397

    申请日:2015-03-09

    CPC classification number: H04W8/183 H04B1/3816 H04L67/303 H04W8/04

    Abstract: Devices, systems, and methods related to an embedded subscriber identity module (eUICC) suitable for co-operating with a communication device (T) are described. The module may include a communication profile (P1) configured to enable the embedded subscriber identity module to communicate with a telecommunications network (R) when the profile (P1) is active; a reception module (PSM) for receiving, from a remote server (SM-SR) of the mobile telephone network (R), a communication profile management request; and a profile manager module (MGP). The profile manager module may be configured such as, on receiving the management request, to determine whether a rule from a predefined set of at least one rule (RL) is applicable; and if so, to execute an action specified by the applicable rule in association with a communication profile of the embedded subscriber identity module.

    Delegation of access rights to an account after the disappearance of the user
    38.
    发明授权
    Delegation of access rights to an account after the disappearance of the user 有权
    在用户消失后授权对帐户的访问权限

    公开(公告)号:US09558357B2

    公开(公告)日:2017-01-31

    申请号:US13946606

    申请日:2013-07-19

    Inventor: Marc Bertin

    CPC classification number: G06F21/60 G06F21/604 G06F21/6218

    Abstract: A management process for access to secure data includes: storing secure data associated with a first user and authentication data of said first user, managing access to the secure data of the first user, as a function of the authentication data of this first user. The process includes: storing, in the secure data of the first user, a heritage rule and a list of at least one second user and, for each second user of said list, an rule for access to secure data of the first user, storing authentication data for each second user of said list, and when the heritage rule is satisfied, managing access, by said at least one second user, to the secure data of the first user, as a function of the authentication data of the second user and of the rule for access of the second user.

    Abstract translation: 用于访问安全数据的管理过程包括:存储与第一用户相关联的安全数据和所述第一用户的认证数据,根据该第一用户的认证数据来管理对第一用户的安全数据的访问。 该过程包括:在第一用户的安全数据中存储遗产规则和至少一个第二用户的列表,并且对于所述列表的每个第二用户,存储用于访问第一用户的安全数据的规则,存储 所述列表的每个第二用户的认证数据,以及当满足遗产规则时,根据所述第二用户的认证数据来管理所述至少一个第二用户对所述第一用户的安全数据的访问,以及 的第二用户的访问规则。

    NOTIFICATION METHOD FOR CONFIGURING A SECURE ELEMENT
    39.
    发明申请
    NOTIFICATION METHOD FOR CONFIGURING A SECURE ELEMENT 审中-公开
    用于配置安全元件的通知方法

    公开(公告)号:US20160295344A1

    公开(公告)日:2016-10-06

    申请号:US15038403

    申请日:2014-11-21

    Abstract: Notification devices and methods for configuring a secure element incorporated into a terminal connected to a network are disclosed. The devices and methods may perform steps implemented by an application of the secure element, such as obtaining at least one item of information that can be used to configure the secure element stored in a memory of the terminal outside the secure element, sending the item of information and an identifier of the secure element to a configuration system, and obtaining configuration data originating from the configuration system, the configuration data being supplied to the secure element depending on the item of information.

    Abstract translation: 公开了用于配置结合到连接到网络的终端中的安全元件的通知装置和方法。 设备和方法可以执行由安全元件的应用实现的步骤,诸如获得可用于配置存储在安全元件外部的终端的存储器中的安全元件的至少一个信息项, 信息和安全元件的标识符,以及从配置系统获得的配置数据,根据信息项提供给安全元件的配置数据。

    ELECTRONIC ASSEMBLY COMPRISING A DISABLING MODULE
    40.
    发明申请
    ELECTRONIC ASSEMBLY COMPRISING A DISABLING MODULE 审中-公开
    包含禁用模块的电子组件

    公开(公告)号:US20160162687A1

    公开(公告)日:2016-06-09

    申请号:US15044652

    申请日:2016-02-16

    Abstract: An electronic assembly for an electronic device may include a detection module to detect a security anomaly of a Rich-OS operating system and a disabling module to disable at least one secure function of the electronic device in response to the detection. The disablement nevertheless allows use of the electronic device in fail-soft mode. The electronic assembly may be implemented such that these two modules are dependent on a trusted operating system, and the trusted operating system and the Rich-OS operating system may be stored in a memory of the electronic assembly and executed on the electronic assembly.

    Abstract translation: 用于电子设备的电子组件可以包括检测模块,用于检测Rich-OS操作系统的安全异常,以及禁用模块,以响应于该检测来禁用电子设备的至少一个安全功能。 然而,禁用允许在故障软件模式下使用电子设备。 可以实现电子组件,使得这两个模块依赖于可信操作系统,并且可信操作系统和Rich-OS操作系统可以存储在电子组件的存储器中并在电子组件上执行。

Patent Agency Ranking