IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0253460
(2005-10-19)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
14 인용 특허 :
104 |
초록
▼
A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthin
A secure communication channel between an open system and a portable IC device is established. An application running on the open system desiring access to the information on the portable IC device authenticates itself to the portable IC device, proving that it is trustworthy. Once such trustworthiness is proven, the portable IC device authenticates itself to the application. Once such two-way authentication has been completed, trusted communication between the open system and the portable IC device can proceed, and private information that is maintained on the portable IC device can be unlocked and made available to the application.
대표청구항
▼
The invention claimed is: 1. An apparatus comprising: a processor; and a nonvolatile memory, coupled to the processor, that stores both data and a program that, when a request to access the data is received from a requesting application executing on a computer coupled to the apparatus, causes the p
The invention claimed is: 1. An apparatus comprising: a processor; and a nonvolatile memory, coupled to the processor, that stores both data and a program that, when a request to access the data is received from a requesting application executing on a computer coupled to the apparatus, causes the processor to allow access to the data only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained by the apparatus. 2. An apparatus as recited in claim 1, wherein the apparatus comprises a smart card. 3. An apparatus as recited in claim 1, wherein the program further causes the processor to: send, to the requesting application, a challenge; receive a response to the challenge from the requesting application; verify the response; and determine whether the requesting application is an application on the list of trusted applications only after the response is verified. 4. An apparatus as recited in claim 1, wherein the program further causes the processor to allow the requesting application to prove that the requesting application is an application on the list of trusted applications by: sending a definition of a set of trusted applications to the requesting application; and receiving an indication from the requesting application that the requesting application is an application on the list of trusted applications. 5. An apparatus as recited in claim 4, wherein the definition of the set of trusted applications is a list of rules that implicitly define the list of trusted applications. 6. A method implemented in a device, the method comprising: receiving, from a requesting application executing on a computer coupled to the device, a request; allowing the requesting application to access data stored on the device only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained on the device. 7. A method as recited in claim 6, wherein the device comprises a smart card. 8. A method as recited in claim 6, further comprising: sending, to the requesting application, a challenge; receiving a response to the challenge from the requesting application; verifying the response; and determining whether the requesting application is an application on the list of trusted applications only after the response is verified. 9. A method as recited in claim 6, further comprising allowing the requesting application to prove that the requesting application is an application on the list of trusted applications by: sending a definition of a set of trusted applications to the requesting application; and receiving an indication from the requesting application that the requesting application is an application on the list of trusted applications. 10. A method as recited in claim 9, wherein the definition of the set of trusted applications is a list of rules that implicitly define the list of trusted applications. 11. One or more computer readable media having stored thereon instructions that, when executed by one or more processors of a device, cause the device to: receive, from a requesting application executing on a computer coupled to the device, a request; allow the requesting application to access data stored on the device only if the requesting application can prove that the requesting application is an application on a list of trusted applications maintained on the device. 12. One or more computer readable media as recited in claim 11, wherein the device comprises a smart card. 13. One or more computer readable media as recited in claim 11, wherein the instructions further cause the one or more processors to: send, to the requesting application, a challenge; receive a response to the challenge from the requesting application; verify the response; and determine whether the requesting application is an application on the list of trusted applications only after the response is verified. 14. One or more computer readable media as recited in claim 11, wherein the instructions further cause the one or more processors to allow the requesting application to prove that the requesting application is an application on the list of trusted applications by: sending a definition of a set of trusted applications to the requesting application; and receiving an indication from the requesting application that the requesting application is an application on the list of trusted applications. 15. One or more computer readable media as recited in claim 14, wherein the definition of the set of trusted applications is a list of rules that implicitly define the list of trusted applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.