Supercharge Your Innovation With Domain-Expert AI Agents!

Method for configuring secure element, and configurable secure element

A technology of security components and software packages, which is applied in security devices, security communication devices, electrical components, etc., and can solve problems such as complex personalized processing

Inactive Publication Date: 2016-01-27
NXP BV
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This known method employs relatively sophisticated means to ensure that personalization is secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for configuring secure element, and configurable secure element
  • Method for configuring secure element, and configurable secure element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] According to this document, key generation for e.g. smart card applications can be implemented on the card. Personalization of smart cards is made easier and less expensive since the personalization is performed on the card rather than off the card through a specific security device. Note that the methods disclosed herein can be applied to secure elements embedded in smart cards as well as secure elements embedded in mobile devices, such as NFC enabled mobile phones. More specifically, the methods disclosed herein are capable of executing virtual smart card applications such as The application is very beneficial for use in mobile devices.

[0031] figure 1 An example of a mobile device 100 including a secure element 102 is shown. In addition to the secure element 102, the mobile device 100 may also include an NFC controller 106 and an NFC antenna 108 to establish near field communication between the mobile device 100 and an NFC reader device (not shown). For exampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

There is disclosed a method for configuring a secure element, the method comprising: storing an application in the secure element; storing a master key in the secure element; storing a key derivation program in the secure element; generating, by the key derivation program, at least one application key for use by the application, wherein said generating comprises deriving the application key from the master key and an identifier of the secure element. Furthermore, a corresponding key derivation program, computer program product and configurable secure element are disclosed.

Description

technical field [0001] This article deals with methods for configuring secure elements. Furthermore, this article also relates to correspondingly configurable security elements. Background technique [0002] Smart cards and mobile devices such as smartphones can be used to perform a wide variety of transactions. For example, smart cards and mobile devices can replace traditional public transport tickets or shopping cards. To implement these functions, smart cards or mobile devices usually contain a secure element. The secure element may be, for example, an embedded chip, more specifically a tamper-resistant integrated circuit with installed or pre-installed smart card-level applications, such as payment applications with predetermined functions and predetermined security levels. Furthermore, a secure element can implement security functions, such as encryption functions and authentication functions. [0003] In order to use a secure element in a transaction, the secure e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/34G07F7/10
CPCG06Q20/341G06Q20/355G06Q20/3558G07F7/1008H04L9/0866H04L2209/805H04L2463/061H04W12/041H04L9/0877
Inventor 迪米特里·华尼兹蒂埃里·让-卢克·格鲁德
Owner NXP BV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More