Enabling users to select between secure service providers using key escrow service

A technology of security services and security components, which is applied in the use of key escrow services to enable users to choose fields between security service providers, and can solve problems such as inaccessibility

Active Publication Date: 2013-06-12
GOOGLE LLC
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The problem with current NFC systems is that there is a tight coupling between the secure component an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enabling users to select between secure service providers using key escrow service
  • Enabling users to select between secure service providers using key escrow service
  • Enabling users to select between secure service providers using key escrow service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] overview

[0013] The methods and systems described herein enable an end user of a communication device, such as a mobile phone, to select a security service provider to use a security component stored on the communication device. In one embodiment, the system includes a key escrow service that manages keys for one or more users and one or more security service providers. Typically, the security component and one or more keys for the security component are installed on each user communication device when the communication device is manufactured. These keys, or corresponding keys, are provided to a key escrow service. Each user device also includes a service provider selector ("SPS") module or software application that enables the user to select from available security service providers. The SPS transmits information identifying the selected service provider to the user's secure component over the secure channel in response to the user's selection. The key escrow serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager ("TSM")) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector ("SPS") module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element.

Description

[0001] related application [0002] This application claims priority to US Provisional Patent Application No. 61 / 535,329, filed September 15, 2011, and entitled "Enabling Users To Select BetweenSecure Service Providers Using A Key Escrow Service." The entire text of the above priority application is hereby incorporated by reference in its entirety. technical field [0003] The present disclosure relates to systems and methods for enabling mobile device users to select from available trusted service managers ("TSMs") for completing secure transactions, communications, and other tasks. Background technique [0004] The current near-field communication (“NFC”) ecosystem relies on a piece of hardware commonly referred to as a “secure component” installed on the communication device to provide financial transactions, transportation ticketing, identification and authentication, physical security access, and other functions. safe operating environment. A secure component typicall...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/04H04W12/08H04W4/50
CPCH04W4/50H04L9/083H04L9/0877H04L9/0894H04L63/062H04W12/04H04L2209/80H04W12/35H04W12/082
Inventor 尼古拉斯·朱利安·佩里杰弗里·威廉姆·汉密尔顿
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products