Unlock instant, AI-driven research and patent intelligence for your innovation.

Assessing the security module's resistance to attacks that divert communication channels

A technology of security modules and communication channels, applied in the field of transactions

Active Publication Date: 2016-12-07
PROTON WORLD INT
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Contactless Card Emulation in Mobile Telecommunications Devices May Create Vulnerabilities in Transaction Security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Assessing the security module's resistance to attacks that divert communication channels
  • Assessing the security module's resistance to attacks that divert communication channels
  • Assessing the security module's resistance to attacks that divert communication channels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In different drawings, the same elements are assigned the same reference numerals. For the sake of clarity, only those elements and steps helpful for understanding the embodiments are shown and will be described. Specifically, coding and communication protocols used for near-field transmission or telecommunications in GSM mode will not be detailed, and the embodiments are compatible with conventional protocols. In addition, the circuits forming the mobile communication device will not be described in detail, and the embodiments here are also compatible with conventional programmable devices.

[0027] figure 1 The type of mobile telecommunication equipment (for example, mobile phone) to which the embodiment is applied is very briefly shown as an example. The different elements (keyboard, display, speakers, etc.) that interface with the user are not shown because these elements will not be modified by the implementation of the embodiments to be described.

[0028] The devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for assessing the resistance of a security module against an attempt to divert a communication pipe between a gate of this security module and a gate of a near-field communication router present in a telecommunication device to which the security module is intended to be connected, including the steps of: connecting the security module to a near-field communication router emulator; having the emulator send at least one command to the security module, this command simulating the fact that the pipe used is not connected to a near-field communication gate; and determining whether the security module accepts the commands.

Description

[0001] Cross references to related applications [0002] This application claims the priority rights of French Patent Application No. 11 / 52921 filed on April 5, 2011, entitled "ASSESSING THE RESISTANCE OF A SECURITY MODULE AGAINST ATTACKS BY COMMUNICATlON PIPEDIVERSION", which is legally permitted by reference The maximum range is combined here. Technical field [0003] This embodiment generally relates to transactions performed through mobile telecommunication devices of the cell phone type. [0004] The present embodiment is more specifically applied to the evaluation of the resistance of such a device further equipped with a near field communication circuit to an attack in which a communication channel between the near field communication circuit (NFC) and the security module of the device is transferred. Background technique [0005] Mobile phones are increasingly commonly equipped with a near field communication interface that enables the mobile phone to combine electromagnetic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/12H04W24/06
CPCH04L63/0492H04L63/1433H04W24/06H04W12/126
Inventor T·胡奎O·范涅宇文胡伊泽
Owner PROTON WORLD INT