摘要:
A solution for controlling activities to be carried out in a network element in a flexible and safe manner. A data transmission network includes a network element, which includes data transfer means for transmitting and receiving data from the data transmission network, which data includes one or more commands: processing means for processing the data provided in a specified format; and control means for modifying the received command into a format required by the processing means. The control means includes a driver the origin of which can be verified with the help of an electronic signature; and one or more functions that control the operation of the processing means, which can only be initiated by the driver the origin of which has been verified with the help of the electronic signature.
摘要:
The invention relates to a method for loading a program module (L1, L2, L3) in a terminal, in which one or several programs (A, B) are running, and in which method subroutines (P1, P2, P3) are stored in said program modules (L1, L2, L3). The program modules (L1, L2, L3) are provided with first tags (T1, T2, T3), wherein to start binding, the program makes a call (7) to a subroutine (P1, P2, P3). The call (7) is supplemented with the first tags (T1, T2, T3) to select the program module (L1, L2, L3) for binding, in which the called subroutine (P1, P2, P3) is stored. The tags (T1, T2, T3) are supplemented with second tags (LT1, LT2, LT3). The call (7) is also supplemented with said second call data (PKx, PKy, PKz). In connection with the binding, said first tags (T1, T2, T3) stored in the program modules are compared with the first tags (T1, T2, T3) transmitted in the call (7), and the second tags (LT1, LT2, LT3) are compared with the second call data (PKx, PKy, PKz) transmitted in the call (7), wherein the program module to be bound is selected to be the program module which matches with the first tags (T1, T2, T3) and the second call data (PKx, PKy, PKz) transmitted in the call. The invention also relates to a terminal (MT).
摘要:
Devices, methods, and computer code products are disclosed in which access to private keys required to create digital signatures for delimited information is controlled by permissions in the device. The permissions can be used to check the identity of an application to determine if the application has access to a digital key and permission to generate a digital signature.
摘要:
Devices, methods, and computer code products are disclosed in which access to private keys required to create digital signatures for delimited information is controlled by permissions in the device. The permissions can be used to check the identity of an application to determine if the application has access to a digital key and permission to generate a digital signature.
摘要:
The invention relates to a method for checking the integrity of a message transmitted between a sender in a transmitting end and a recipient in a receiving end, in which method an authentication value is calculated for the first message and a random string is generated. According to a method in the transmitting end an authentication value is generated from a message to be sent and the random string. A check code is formed from the authentication value and the random sting. The first message is transferred from a sender to a recipient through a first channel, and the check code is transferred through a second secure channel. In the receiving end a message is received through a first channel and the check code is received through a second secure channel. In the receiving end an authentication check formed at least based of the received message. The integrity of the received message is checked by comparing the predetermined check values in the receiving end.
摘要:
An approach is provided for generating a relevant social graph. A social graph identifying people associated with a user is retrieved. A communication history from a device associated with the user is retrieved. Information regarding a respective occurrence of each identified person in the communication history is determined. A relevant social graph is generated based, at least in part, on the determined occurrence information.
摘要:
According to the present invention, a method for controlling a mobile terminal device is provided, wherein said device comprises a smartcard module and a near field communication module. In a first operation a smartcard operation on said mobile terminal device is started which results in an activation or switching on of said smartcard module. The smartcard application may be started by a user or based on the location of said mobile terminal device. That is the case for instance if the mobile terminal device is located in the area of a point of sales terminal, the smartcard application will automatically starts. Further, time controlled starting of certain applications is conceivable. Then it may be determined if said started smartcard application is an application for performing data transactions with external entities and in case of an affirmative determination a connection between said smartcard module and said NFC-module will be activated.
摘要:
According to the present invention, a method for controlling a mobile terminal device is provided, wherein said device comprises a smartcard module and a near field communication module. In a first operation a smartcard operation on said mobile terminal device is started which results in an activation or switching on of said smartcard module. The smartcard application may be started by a user or based on the location of said mobile terminal device. That is the case for instance if the mobile terminal device is located in the area of a point of sales terminal, the smartcard application will automatically starts. Further, time controlled starting of certain applications is conceivable. Then it may be determined if said started smartcard application is an application for performing data transactions with external entities and in case of an affirmative determination a connection between said smartcard module and said NFC-module will be activated.
摘要:
The invention relates to a method for checking the integrity of a message transmitted between a sender in a transmitting end and a recipient in a receiving end, in which method an authentication value is calculated for the first message and a random string is generated. According to a method in the transmitting end an authentication value is generated from a message to be sent and the random string. A check code is formed from the authentication value and the random sting. The first message is transferred from a sender to a recipient through a first channel, and the check code is transferred through a second secure channel. In the receiving end a message is received through a first channel and the check code is received through a second secure channel. In the receiving end an authentication check formed at least based of the received message. The integrity of the received message is checked by comparing the predetermined check values in the receiving end.
摘要:
Method, system and computer program product for secure ticketing in a communications device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write security element to securely transmit and store critical data utilized by users of a communications device. Using the present invention, third-parties can prevent the fraudulent use of third-party services without detection.