Security architecture for using host memory in the design of a secure element

A security element and memory technology, applied in security devices, electrical components, computer security devices, etc., can solve problems such as scalability and non-ideal processes

Active Publication Date: 2013-03-20
NXP BV
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, eSEs with integrated non-volatile memory are typically implemented in older, less ideal processes
For example, prior art eSEs with non-volatile memory can b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security architecture for using host memory in the design of a secure element
  • Security architecture for using host memory in the design of a secure element
  • Security architecture for using host memory in the design of a secure element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention, including structures, systems, and methods, may be practiced without these specific details. Descriptions and characterizations are the ordinary meanings used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components and circuits have not necessarily been described in detail so as not to unnecessarily obscure aspects of the present invention.

[0024] References in the specification to "one embodiment," "an embodiment," "an exemplary embodiment," and the like indicate that the embodiment may include a particular feature, structure, or characteristic. But each embodiment does not necessarily include a specific feature, structure or c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security architecture for using host memory in the design of a secure element, wherein embodiments of a security architecture for securely storing applications, such as Near Field Communication (NFC) applications, in host memory of a mobile device are provided. The mobile device includes a host application processor, a non-volatile memory, a NFC controller, and an embedded Secure Element (eSE). The eSE is configured to encrypt code and state data associated with a NFC application; store the code and the state data, after having been encrypted, in the non-volatile memory as a binary large object (blob); load the blob from the non-volatile memory in response to an action performed by the host application processor or the NFC controller; decrypt and authenticate the code and the state data; and execute the code to exchange data with a contactless communication device via the NFC controller. The non-volatile memory is external to the eSE.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to US Provisional Patent Application 61 / 486,625, filed May 16, 2011, and US Patent Application 13 / 173,931, filed June 30, 2011, the entire contents of which are hereby incorporated by reference. technical field [0003] The present application relates generally to security architectures and, more particularly, to security for near field communication applications. Background technique [0004] Near Field Communication (NFC) is a wireless communication technology that allows data to be exchanged between two devices separated by up to ten centimeters. In the near future, NFC-enabled mobile devices are expected to be ubiquitous. NFC-enabled mobile devices can be used as both contactless cards and card readers to provide payment, Capabilities for royalty, ticketing, and access control applications, just to name a few. Generally, there is no need for the owner of an NFC-enabled mobile devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04B5/00H04L9/32H04W4/80
CPCH04W4/008H04L63/0492G06F21/51H04L63/123H04W12/12H04W12/10H04W88/02H04W4/80H04W12/122H04W12/106
Inventor 马克·比埃
Owner NXP BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products