Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for operating a security element

一种安全元件、操作安全的技术,应用在安全装置、电气元件、传输系统等方向,能够解决过大、安全元件性能不利影响等问题,达到扩展功能、开销小的效果

Active Publication Date: 2016-03-09
JIEDE MOBILE SECURITY CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the problem can arise that the operating system of the secure element is "too large" for its actual use in the field, that is, it provides and supports functions that are not required for the actual use of the secure element
This "operating system overhead" can, for example, adversely affect the performance of the secure element in some cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for operating a security element
  • Method for operating a security element
  • Method for operating a security element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] figure 1 A schematic diagram of a preferred embodiment of a secure element ("SecureElement") according to the invention in the form of a chip card 20 in communication with an external entity in the form of a reading device or terminal 10 is shown. For example, the secure element 20 may be a SIM card. Advantageously, the secure element in the form of a chip card 20 is configured as a JavaCard TM . However, the invention can of course also be realized in the form of a secure element having another structural form and using another operating system.

[0027] exist figure 1 A secure element 20 in the form of a chip card 20 shown in FIG. 2 is designed to exchange data with the reading device 10 . The reading device 10 can be part of a mobile phone, for example. Here, the signal transmission, the mutual control and, in simple cases, the connection between the reader 10 and the chip card 20 are understood to mean the exchange of data. In information theory, data exchange...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for operating a security element (20), preferably in the form of a chip card, having a processor and a memory, and a corresponding security element (20) are described. The memory stores an operating system (25), which comprises an operating system kernel (25a) and at least one additional operating system module (25b, 25c) for providing optional operating system functionalities, and at least one access authorization which is associated with the operating system module (25b, 25c) and determines whether the operating system module (25b, 25c) can be accessed during operation of the security element (20). In this case, the method comprises the step of changing the access authorization to the operating system module (25b, 25c) in order to provide optional operating system functionalities in response to the reception of a message from a server. The message from the server is preferably an OTA message which is preferably transmitted from the server to the security element (20) via a mobile radio network.

Description

technical field [0001] The invention relates to a method for operating a security element and such a security element. In particular, the invention relates to a method of managing operating system modules on a secure element and such a secure element. Background technique [0002] Secure elements (“SecureElements”) are used in many fields, for example in the form of SIM cards for authenticating access to mobile radio networks or in the form of chip cards for carrying out electronic payment transactions. In this case, the use often takes place in the form of an interaction with a reading device or a terminal, such as a mobile phone or a terminal, which is provided for the corresponding application. Except in the case of very simply supported applications, it is generally required that the secure element has a processor on which at least one application program for executing the application runs. For this reason, many secure elements are equipped with an operating system in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/10
CPCH04W12/10H04W12/40H04W12/35H04W12/086H04W12/08H04L63/0428H04L63/10
Inventor M.罗斯纳C.马尔多纳多米兰达
Owner JIEDE MOBILE SECURITY CO LTD