Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal and authentication method

A portable terminal and authentication device technology, which is applied in digital data authentication, user identity/authority verification, security devices, etc., can solve problems such as fraudulent terminal program messages, affecting the security of IC card portable terminals, etc., to ensure legitimacy, Effects of preventing impersonation and improving security

Active Publication Date: 2006-09-20
NTT DOCOMO INC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Moreover, even if the message sent to the illegal terminal program is not performed, there is a possibility that once the message received by the legitimate terminal program is stolen by the illegal terminal program
[0007] For these reasons, it is possible for the IC card of the portable terminal to perform message handover between objects that are not intended, which becomes an important factor affecting the security of the IC card and thus the portable terminal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and authentication method
  • Mobile terminal and authentication method
  • Mobile terminal and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] One embodiment of the present invention will be described below with reference to the accompanying drawings for illustration.

[0035] The mobile terminal 1 of the present embodiment includes at least an IC card 2 (corresponding to an authentication device) and a terminal program 3 (corresponding to a transmission source), as shown in FIG. 1 . The mobile terminal 1 is, for example, a mobile phone or a PDA (Personal Digital Assistance), but its function and use are not limited as long as it is a terminal device having a communication function. In addition, there may be a plurality of IC cards and terminal programs.

[0036] Portable terminal 1 is in order to prevent the sender of the message (remote message) sent from remote terminal 4 from masquerading, includes: remote connection part 11; Remote sender authentication part 12 (corresponding to remote authentication unit); corresponding to the unit). These constituent elements are connected by a bus (not shown), and si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a mobile terminal that performs transmission and reception of a message between an IC card and a terminal program, the security is improved by preventing an imposture of a source of a message or an interception of a message. A mobile terminal comprises an IC card and a terminal program. The terminal program generates a program identifier (i1 : 1) from a domain ID "i1" of the IC card and a port number "1" that can be updated in the IC card. Then, a message is transmitted, the source ID of which is the program identifier and the destination ID of which is the identifier "i1 : 0" of the IC card. Upon receipt of the message, the IC card collates the domain ID with the domain ID that the IC card has, as to the source ID. When they coincide, processing in accordance with the contents of the above-mentioned message is performed.

Description

technical field [0001] The present invention relates to an authentication technology of a program capable of accessing an IC card of a portable terminal. Background technique [0002] In recent years, TRON (The Real-time Operating system Nucleus) is being developed as one of the means to realize ubiquitous computing. In a mobile terminal with built-in IC (Integrated Circuit) card such as e-TRON card, a technology has been proposed to transfer and receive electronic right value (hereinafter referred to as "electronic value") including electronic ticket (hereinafter referred to as "electronic value") between terminals. , Send and receive electronic value directly between the IC cards of both parties. As an example of applying this technology to a charging system for insufficient electronic value, Japanese Unexamined Patent Publication No. 2003-337887 discloses an electronic value charging system that combines safety and simplicity. [0003] In order to realize such a system,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/08G06Q20/00G06F21/44G06K17/00H04L9/32H04W12/06H04W88/02
CPCH04W12/06H04L63/0853G07F7/1008G06Q20/4097G06Q20/341H04W88/02H04L63/126H04W12/128A63H5/00A63H33/26G09B1/38G09B1/40G09B5/04G09B19/06
Inventor 寺田雅之森谦作石井一彦本乡节之
Owner NTT DOCOMO INC