APPLICATION AUTHENTIFICATION METHOD Russian patent published in 2009 - IPC H04L29/06 

Abstract RU 2364049 C2

FIELD: communication facilities.

SUBSTANCE: invention concerns mobile communications. Claimed method involves reception of data including at least equipment (CB) ID (IMEISV) and security module (SIM) ID (IMSI), by control server (CSE) over network (NET); analysis and check of the data by control server (CSE); generation of cryptogram (CRY) including checksum (FIN 1) of application (APP), equipment (CB) and security module (SIM) ID data and commands (INS RES) for the security module; the cryptogram (CRY) is transferred over the network (NET) and equipment (CB) to security module (SIM); application (APP) is checked by comparison of checksum (FIN1) retrieved from obtained cryptogram (CRY) with checksum (FIN2) defined by security module. During initiation and/or activation of application (APP) security module (SIM) performs commands (INS-RES) retrieved from cryptogram (CRY) and, respectively, provides or blocks access to certain resources (RES) of security module (SIM) depending on the result of the check performed earlier in respect of that application (APP).

EFFECT: eliminated possibility of improper use of applications in mobile devices.

18 cl, 10 dwg

Similar patents RU2364049C2

Title Year Author Number
SECURE ELECTRONIC ENTITY FOR AUTHORISING TRANSACTION 2013
  • Oben Yan-Loik
  • Dyukros Kristof
  • Deper Terri
  • Goven David
  • Riko Ruben
RU2651245C2
METHOD FOR IDENTIFYING ONLINE USER AND DEVICE THEREOF 2020
  • Poliakov Denis Leonidovich
  • Shliantiaev Aleksandr Viktorovich
  • Lagutkin Nikolai Sergeevich
RU2740308C1
METHOD FOR IDENTIFICATION OF AN ONLINE USER AND HIS DEVICE 2021
  • Lagutkin Nikolai Sergeevich
  • Shliantiaev Aleksandr Viktorovich
  • Poliakov Denis Leonidovich
RU2780029C1
METHOD OF DETECTING UNAUTHORIZED ACCESS TO SOFTWARE AND NOTIFICATION THEREOF 2015
  • Aabye, Christian
  • Youdale, Robert
  • Nosseir, Mohamed
  • Singh, Brijendra
  • Hillar, Paul
RU2705019C2
METHOD FOR AUTHENTICATION OF SUBSCRIBERS OF CELLULAR NETWORK OPERATOR 2014
  • Donetskij Vitalij Aleksandrovich
  • Balanda Vitalij Yurevich
  • Prasolov Nikita Mikhajlovich
  • Maznyak Aleksej Nikolaevich
RU2589356C2
TRUSTED REMOTE ATTESTATION AGENT (TRAA) 2010
  • Nakhari Khadi
RU2537795C2
METHODS AND SYSTEMS OF CLOUD TRANSACTIONS 2014
  • Vong Erik
  • Flurshajm Kristian
  • Makhotin Oleg
  • Lopes Eduardo
  • Sharma Sandzhiv
  • Dzhounz Kristofer
  • Guglani Abkhishek
  • Sevanto Yarkko Oskari
  • Patel Bkharatkumar
  • Or Tai Lung Bernnet
  • Ngo Khao
  • Aabaj Kristian
  • Shits Dzhon
RU2686014C1
TRUSTED INTEGRITY MANAGER (TIM) 2010
  • Tavo Sebast'En
  • Nakhari Khadi
  • Djupra Ehrik
RU2523304C2
METHOD OF WIRELESS PERSONALISATION OF CHIP CARDS IN TELECOMMUNICATIONS 2009
  • Kaliner Shtefan
RU2473185C2
ON-LINE COMMERCIAL TRANSACTIONS 2006
  • Dzhonson Brjus Eh.
  • Vebster-Lehm Chung
RU2402814C2

RU 2 364 049 C2

Authors

Ksontini Rashe

Kantini Renato

Dates

2009-08-10Published

2004-11-26Filed