Publication: WOEC'96: Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2November 1996 Pages 1
Sep 15, 2010 In diesem Kapitel werden die beiden kontaktlosen Chipkartensysteme MIFARE und FeliCa vorgestellt. Why didn't we release Nitrokey HSM 2 earlier? The cryptographic computation is not implemented in software but in the embedded smart card. We had to wait.
- This alert has been successfully added and will be sent to:You will be notified whenever a record that you have chosen has been cited.To manage your alert preferences, click on the button below.Manage my AlertsPlease log in to your account
Save to Binder
Create a New Binder
An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems -- some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable. Designers of secure systems should consider the consequences with care.
- {1} DG Abraham, GM Dolan, GP Double, JV Stevens, 'Transaction Security System', in IBM Systems Journal v 30 no 2 (1991) 206-229. Digital Library
- {2} C Ajluni, 'Two New Imaging Techniques Promise To Improve IC Defect Identification', in Electronic Design v 43 no 14 (10 July 1995) pp 37-38.
- {3} A Anderson 〈[email protected]〉, message posted to USENET sci.crypt 26 Apr 1994, message-ID 〈[email protected]〉
- {4} RJ Anderson, 'Crypto in Europe -- Markets, Law and Policy' in Cryptography: Policy and Algorithms, Springer LNCS v 1029 pp 75-89. Digital Library
- {5} RJ Anderson 'Liability and Computer Security: Nine Principles', in Computer Security -- ESORICS 94, Springer LNCS v 875 pp 231-245.
- {6} RJ Anderson, 'Why Cryptosystems Fail', in Communications of the ACM v 37 no 11 (Nov 94) pp 32-40. Digital Library
- {7} RJ Anderson, SJ Bezuidenhoudt, 'On the Reliability of Electronic Payment Systems', in IEEE Transactions on Software Engineering v 22 no 5 (May 96) pp 294-301. Digital Library
- {8} RJ Anderson, RM Needham, 'Programming Satan's Computer', in Computer Science Today , Springer LNCS v 1000 pp 426-441.
- {9} RJ Anderson, RM Needham, 'Robustness Principles for Public Key Protocols', in Advances in Cryptology -- CRYPTO 95, Springer LNCS v 963 pp 236-247. Digital Library
- {10} M Blaze, 'Protocol Failure in the Escrowed Encryption Standard', in Proceedings of the 2nd ACM Conference on Computer and Communications Security (2-4 November 1994), ACM Press pp 59-67. Digital Library
- {11} S Blythe, B Fraboni, S Lall, H Ahmed, U de Riu, 'Layout Reconstruction of Complex Silicon Chips', in IEEE Journal of Solid-State Circuits v 28 no 2 (Feb 93) pp 138-145.
- {12} E Bovenlander, RL van Renesse, 'Smartcards and Biometrics: An Overview', in Computer Fraud and Security Bulletin (Dec 95) pp 8-12.
- {13} RM Best, 'Microprocessor for Executing Enciphered Programs', U.S. Patent No. 4,168,396, September 18, 1979.
- {14} RM Best, 'Preventing Software Piracy with Crypto-Microprocessors', in Proceedings of IEEE Spring COMPCON 80, pp 466-469.
- {15} RM Best, 'Crypto Microprocessor for Executing Enciphered Programs', U.S. Patent No. 4,278,837, July 14, 1981.
- {16} 'Soft Microcontroller Data Book', Dallas Semiconductor, Dallas, Texas, 1993.
- {17} 'Security Requirements for Cryptographic Modules' , FIPS PUB 140-1, Federal Information Processing Standards Publication, National Institute of Standards and Technology, U.S. Department of Commerce, January 11, 1994.
- {18} KE Gordon, RJ Wong, 'Conducting Filament of the Programmed Metal Electrode Amorphous Silicon Antifuse', in Proceedings of International Electron Devices Meeting, Dec 93; reprinted as pp 6-3 to 6-10, QuickLogic Data Book (1994).
- {19} P Gutmann, 'Secure Deletion of Data from Magnetic and Solid-State Memory', in Sixth USENIX Security Symposium Proceedings, San Jose, California, July 22-25, 1996, pp 77-89. Digital Library
- {20} D Kahn, 'The Codebreakers' (Macmillan 1967).
- {21} P Maes, marketing director, Gemplus, comment during a panel discussion at Cardis 94.
- {22} R Morris, talk given to Cambridge Protocols Workshop, 1994.
- {23} W Rankl, W Effing, 'Handbuch der Chipkarten', Carl Hanser Verlag, 1995; ISBN 3-446-17993-3.
- {24} B Schneier, 'Applied Cryptography - Protocols, Algorithms, and Source Code in C' (second edition), John Wiley & Sons, New York, 1996. Digital Library
- {25} GJ Simmons, invited talk at the 1993 ACM Conference on Computer and Communications Security, Fairfax, Virginia, Nov 3-5, 1993.
- {26} GJ Simmons, 'Subliminal Channels; Past and Present' European Transactions on Telecommunications v 5 no 4 (Jul/Aug 94) pp 456-473.
- {27} 'VISA Security Module Operations Manual', VISA, 1986.
- {28} SR White, L Comerford, 'ABYSS: A Trusted Architecture for Software Protection', in Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press pp 38-51.
- {29}SH Weingart, 'Physical Security for the µABYSS System', in Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp 52-58.
- {30} JM Wiesenfeld, 'Electro-optic sampling of high-speed devices and integrated circuits', in IBM Journal of Research and Development v 34 no 2/3 (Mar/May 1990) pp 141-161; see also subsequent articles in the same issue. Digital Library
Tamper resistance
Please enable JavaScript to view thecomments powered by Disqus.
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
Published in
205 pagesIn-Cooperation
Publisher
USENIX AssociationUnited StatesPublication History
Qualifiers
- Article
Funding Sources
Article Metrics
- Total CitationsView Citations
- Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Digital Edition
View this article in digital edition.
View Digital EditionSubscriber identity module for a mobile telephone has built in blocking function software Info
- Publication number
- DE10127123A1 DE10127123A1DE2001127123DE10127123ADE10127123A1DE 10127123 A1DE10127123 A1DE 10127123A1DE 2001127123 DE2001127123 DE 2001127123DE 10127123 ADE10127123 ADE 10127123ADE 10127123 A1DE10127123 A1DE 10127123A1
- Authority
- DE
- Germany
- Prior art keywords
- sim
- subscriber identification
- German (de)
- Other versions
- Wiebke Weirauch
- Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
- Vodafone GmbH
- Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
- Filing date
- Publication date
- Family has litigation
- CriticalVodafone GmbH
- Criticalpatent/DE10127123B4/en
- Criticalpatent/DE10127123A1/en
- Critical
- Criticalpatent/DE10127123B4/en
- Criticalhttps://patents.darts-ip.com/?family=7687164&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=DE10127123(A1)
- Critical
- Critical
- abstract238000004422calculation algorithmMethods0230000015654memoryEffects0
- H04--ELECTRIC COMMUNICATION TECHNIQUE
- H04W12/00--Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
- H04--ELECTRIC COMMUNICATION TECHNIQUE
- H04M1/00--Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/667--Preventing unauthorised calls from a telephone set
- H04M1/675--Preventing unauthorised calls from a telephone set by electronic means the user being required to insert a coded card, e.g. a smart card carrying an integrated circuit chip
Links
- H--ELECTRICITY
If the owner of the SIM card and the user of the SIM card are not the same,for example because the owner of the mobile terminal including a SIM cardfinally made available to another person for use, that person candial any number. This often leads to great damage to the ownerthe SIM card, because experience has shown that calls are often subject to charges Special tariffs are carried. In addition, calls with the mobile terminalwhich the owner of the SIM card would not have permitted. This disadvantage isgiven all conventional SIM cards that are currently available. The disadvantage isboth for prepaid cards - so-called prepaid cards - as well as for those witha license of the provider.
In the field, however, it is often desirable to have a field workeris reachable and apart from the emergency call can only call a central office. After thisIn the prior art, the problem was solved, for example, by the employeehad his own mobile terminal with SIM card and the company with which hewas busy billing his business calls. The evidence for theService calls are often sufficient, especially for the tax office, for tax purposesAppreciation not out. The tax office often assumes that the private is too highShare that is not regularly given. Another way to solve this problemsolve is to use multiple SIM cards and these as neededexchange. However, these solutions are all cumbersome and becometherefore not used by the users or only for a lack of alternatives.
The object of the invention is therefore, in particular, the disadvantages of the prior artto eliminate the technology and create a SIM card for mobile terminalswhich certain functions of the mobile terminal can be switched off,without the user being able to influence it.
According to the invention the object is achieved in thatSubscriber identification card (SIM) of the type mentioned at the beginning forMobile terminal devices blocking means for blocking certain functions and / orProperties of the mobile terminal are provided.
The SiM card according to the invention has the advantage over the prior art thatnow with only one SIM card certain functions of the mobile terminal for one Users can be locked. This allows a SIM card and possiblythe associated mobile terminal can be borrowed comfortably without the userall functions causing costs can be used. A company can do thatFor example, make sure that a sales representative only has the company numbercan select. The SIM card is only used for business purposes. The tax office must do soacknowledge the dialed numbers as business calls.
It has proven to be an advantageous embodiment of the invention if the locking meanscontain a locking algorithm in a chip of the subscriber identification cardis saved. Since the SIM card usually has a chip thatActuation of the mobile radio terminal can be read by this in any case, herea locking algorithm can also be provided in a suitable manner, which determinesFunctions of the device are blocked or only certain functions are permitted.
One aspect of the invention is that now in an inventionSubscriber identification card (SIM) the blocking agent tables with the to be blockedFunctions and / or properties included, the tables in one chipParticipant identification card are stored.
An advantageous embodiment can be if there is at least one telephone numbercan be blocked by the blocking means for the mobile radio terminal. Can be particularly advantageousbe when at least one area code is blocked. This allows theSIM card can be prevented that expensive dialing codes are used. InThe functions and / or to be blocked are a further advantageous embodimentProperties adjustable. This means that the mobile devices can also be used by childrenor young people are issued who have limited functionalityLearn how to use the mobile terminal. For example, they shouldbe reachable, also certain ones, e.g. B. the number of the parents, but not everyoneMay dial number. In a particularly suitable embodiment of the inventionthe function to be blocked is designed to be adjustable on one side.
In a further advantageous embodiment of the invention, theParticipant identification card has a credit which can be used for telephone calls. shecan be used as a prepaid card. The current credit forthe subscriber identification card is provided in a suitable manner so that it can be stored.
Further advantages result from the subject matter of the subclaims.
Fig. 1 shows an exemplary function offer a mobile radio terminal in a schematic diagram.
Fig. 2 shows functions in a schematic diagram an example of a mobile station, which are blocked with an inventive subscriber identification card (SIM).
Fig. 3 shows a schematic diagram of a subscriber identification card according to the invention.
In Fig. 1, an exemplary functional offer of a mobile radio terminal is shown in a schematic diagram. The functional scope of the mobile radio terminal is designated by 10 . The range of functions is essentially represented by the dialable telephone numbers 12 . The telephone numbers 12 in turn form two groups of numbers. One group is service numbers 14 . The other group of numbers are the pure call numbers 16 , with which another subscriber can be reached. The service numbers are numbers with which certain mobile radio services, such as emergency call 18 , traffic reports 20 , Internet access (WAP = English abbreviation for 'Wide Area Paging') 22 and other comparable services 24 , can be called up. The other services 24 are only indicated as points 26 . The phone numbers 16 are composed of an area code 28 and an individual number 30 . The area code 30 can be either a local area code or a paid area code. There is no further distinction here in the outline sketch. The number of area codes is arbitrary and is indicated by boxes 32 . Each area code 28 is followed by an individual number 30 . The number of individual numbers 30 is also arbitrary and is indicated by boxes 34 .
Fig. 2 shows functions in a schematic diagram an example of a mobile station, which are blocked with an inventive subscriber identification card (SIM). Fundamentally, it is the functional scope according to FIG. 1. The same components are therefore designated in FIG. 2 with the same reference numerals as in FIG. 1. In FIG. 2, some functions of the mobile radio terminal are blocked. The blocking of the functions is indicated by dotted lines. The blocking of functions can be fixed or can be provided in an adjustable manner.
Fig. 3 shows a schematic diagram of a subscriber identification card according to the invention (SIM) 38th A chip 40 is provided on the subscriber identification card 38 . The chip 40 has in particular an identification module 42 which contributes to the identification of the mobile radio terminal in the radio network. The chip 40 also contains a module 44 with a locking algorithm. The locking algorithm 44 accesses a module 46 with a locking table. The lock table 46 contains those data of the functions of the mobile radio terminal that may not be used. By the blocking algorithm 44 accessing the blocking table 46 and reading out the corresponding data, the assigned functions of the mobile radio terminal can be blocked. The lock table 46 can be changed as needed. It is also possible to encrypt the lock table so that it can only be changed with the aid of a code or a 'personal identification number' (PIN). The chip 40 of the subscriber identification card 38 also has a module 48 with a credit counter. With the credit counter 48 , a credit can be credited on the chip 40 , which credit can finally be telephoned. The chip card can thus be used as a prepaid card with which calls can be made until there is no credit left.
Claims (9)
1. subscriber identification card ( 38 ) (SIM) for mobile radio terminals in a mobile radio network, characterized by blocking means ( 44 , 46 ) for blocking at least one specific function and / or property ( 10 ) of the mobile radio terminal.
2. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to claim 1, characterized in that the blocking means contain a blocking algorithm ( 44 ) which is stored in a chip ( 40 ) of the subscriber identification card.
3. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to one of claims 1 or 2, characterized in that the blocking means contain tables (46) with the functions and / or properties to be blocked, the tables in a chip ( 40 ) Participant identification card ( 38 ) are stored.
4. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to one of claims 1 to 3, characterized in that at least one telephone number ( 12 ) is blocked by the blocking means ( 44 , 46 ) for the mobile radio terminal.
5. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to one of claims 1 to 4, characterized in that at least one area code ( 32 ) is blocked.
6. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to one of claims 1 to 5, characterized in that the functions and / or properties ( 10 ) to be blocked are adjustable.
7. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to claim 6, characterized in that the functions and / or properties ( 10 ) to be blocked are designed to be adjustable on one side.
8. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to one of claims 1 to 7, characterized in that the subscriber identification card has a credit which can be used by telephone.
9. subscriber identification card ( 38 ) (SIM) for mobile radio terminals according to claim 8, characterized in that the respective current credit for the subscriber identification card ( 38 ) can be stored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE2001127123DE10127123B4 (en) | 2001-06-05 | 2001-06-05 | Subscriber identification card (SIM) for mobile terminals with blocking function |
Publications (2)
Publication Number | Publication Date |
---|---|
DE10127123B4DE10127123B4 (en) | 2006-10-05 |
ID=7687164
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE (1) | DE10127123B4 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1802148A1 (en) * | 2005-12-23 | 2007-06-27 | Giesecke & Devrient GmbH | Method and apparatus for authorisation of modules of a mobile radio device |
DE102007014397A1 (en) * | 2007-03-26 | 2008-10-02 | Giesecke & Devrient Gmbh | Universal subscriber identity module card for operating Internet-enabled mobile station of e.g. global system for mobile communication, has dial-in controlling application allowing/preventing dial-up to be attempted using dial-in parameter |
EP2615807A1 (en) * | 2012-01-12 | 2013-07-17 | Alcatel Lucent | Method to protect a mobile against robbery |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1298618A (en) * | 1998-04-29 | 2001-06-06 | 西门子公司 | Selective utilization of services in a mobile radiotelephone system |
DE10019164A1 (en) * | 2000-04-12 | 2001-10-18 | Mannesmann Ag | SIM lock on certain IMSI areas of a SIM card for prepaid and postpaid cards |
- 2001-06-05DEDE2001127123patent/DE10127123B4/ennot_activeRevoked
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1538855A2 (en) * | 2003-12-01 | 2005-06-08 | Sony Ericsson Mobile Communications Japan, Inc. | Method of preventing access to a subscriber identity module in a mobile communication terminal |
CN100448309C (en) | 2003-12-01 | 2008-12-31 | 索尼爱立信移动通信日本株式会社 | Method of preventing access to a subscriber identity module and a mobile communication terminal device |
EP1802148A1 (en) * | 2005-12-23 | 2007-06-27 | Giesecke & Devrient GmbH | Method and apparatus for authorisation of modules of a mobile radio device |
DE102007014397A1 (en) * | 2007-03-26 | 2008-10-02 | Giesecke & Devrient Gmbh | Universal subscriber identity module card for operating Internet-enabled mobile station of e.g. global system for mobile communication, has dial-in controlling application allowing/preventing dial-up to be attempted using dial-in parameter |
DE10127123B4 (en) | 2006-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE41802E1 (en) | Missed call notification to cellular telephone using short text messaging | |
US6687362B1 (en) | Automatic address book update system | |
RU2126603C1 (en) | Telecommunication system | |
FI102235B (en) | Authentication keys control mobile communication system | |
US6671523B1 (en) | Method for operating a communication terminal | |
RU2111615C1 (en) | Unauthorized communication barring method for radiotelephone and radiotelephone system access control method | |
US8331907B2 (en) | Integrating GSM and WiFi service in mobile communication devices | |
DE69933863T2 (en) | Communication process and device | |
ES2308799T3 (en) | Terminal, authorization card and telecommunication network for a subscriber, as well as procedure for the modification of a profile of services associated to the subscriber. | |
JP3582169B2 (en) | Relay device between heterogeneous mobile communication networks | |
US20080242285A1 (en) | HOTLINE ROUTING OF PRE-ACTIVATED GSM SUBSCRIBERS USING PSEUDO-MSISDNs | |
US4759056A (en) | Personal-servicing communication system | |
OP8 | Request for examination as to paragraph 44 patent law | |
R082 | Change of representative | Representative=s name: BALS & VOGEL PATENTANWAELTE, DE |
R037 | Decision of examining division/fpc revoking patent now final |
|