摘要:
A method for executing an application in an NFC device, including steps during which: a contactless link is established between a first and a second NFC devices, the first NFC device transmits through the contactless link an identifier memorized by the first NFC device, the second NFC device transmits through the contactless link an application identifier, the second NFC device transmits to an application server the identifier of the first NFC device and the application identifier, the application server transmits to an authentication server the identifier of the first NFC device and the application identifier, the authentication server verifies the identification data, and if the first NFC device and the application are identified, the authentication server authorizes the two NFC devices to execute the application by transmitting to the application server an identifier of a user of the first NFC device, corresponding to the identifier of the first NFC device.
摘要:
A method for executing an application in an NFC device, including steps during which: a contactless link is established between a first and a second NFC devices, the first NFC device transmits through the contactless link an identifier memorized by the first NFC device, the second NFC device transmits through the contactless link an application identifier, the second NFC device transmits to an application server the identifier of the first NFC device and the application identifier, the application server transmits to an authentication server the identifier of the first NFC device and the application identifier, the authentication server verifies the identification data, and if the first NFC device and the application are identified, the authentication server authorizes the two NFC devices to execute the application by transmitting to the application server an identifier of a user of the first NFC device, corresponding to the identifier of the first NFC device.
摘要:
In a general aspect, a method can include: installing in a non-secure device a customized module for managing communications with a secure element, transmitting to the secure element first authentication data for authenticating the customized module, the customized module generating and transmitting to the secure element second authentication data for authenticating the customized module, if the secure element determines that the first and second authentication data are consistent with each other, establishing a secure communication link between the customized module and the secure element, by using the first or second authentication data, the non-secure device transmitting a command to the secure element, for an application installed in the secure element, and the secure element executing the command only if the command is sent via the secure communication link.
摘要:
The present invention relates to a method for executing a command by a secure element from a non-secure device, the method including steps of: installing in the non-secure device a customized module for managing communications with the secure element, transmitting to the secure element first authentication data for authenticating the customized module, the customized module generating and transmitting to the secure element second authentication data for authenticating the customized module, if the secure element determines that the first and second authentication data are consistent with each other, establishing a secure communication link between the customized module and the secure element, by using the first or second authentication data, the non-secure device transmitting a command to the secure element, for an application installed in the secure element, and the secure element executing the command only if the command is sent via the secure communication link.