Patent application number | Description | Published |
20090307358 | Transmission of Data Between A Server and A Communicating Object - Transmission of data between a download server and a communicating object through a communications network is initiated by a registration server, by transmitting connection parameters received from the download server to the communicating object via a first data channel opened by a first agent of the communicating object after attaching the object to the network. As a function of the connection parameters, a second agent in the communicating object opens a second data channel to the download server so as to transmit the data therein. As long as the first data channel is open, other servers can initiate a transmission via the registration server. | 12-10-2009 |
20110092253 | METHOD FOR ACTIVATING THE SUBSCRIPTION OF AN UICC DEVICE - The invention provides a method for activating the subscription of an UICC, said UICC comprising an activation application, said method comprising the step of activating the subscription of the holder of the UICC by sending a message to an activation server, said message being sent by the activation application to the activation server by using an IP based communication. | 04-21-2011 |
20120117219 | METHOD OF MANAGING AN APPLICATION EMBEDDED IN A SECURED ELECTRONIC TOKEN - The invention is a method of managing an application embedded in a secured electronic token. The token is intended to receive a message from a server machine. The message has a header and a body. The token comprises an agent able to manage the message. The method comprises the steps of:
| 05-10-2012 |
20120190354 | UICCs EMBEDDED IN TERMINALS OR REMOVABLE THERE FROM - The invention proposes several improvements related to the management of secure elements, like UICCs embedding Sim applications, these secure elements being installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications. | 07-26-2012 |
20130305339 | METHOD OF LOADING DATA INTO A PORTABLE SECURE TOKEN - The invention is a method for loading data into a portable secure token comprising a plurality of security domains. A first security domain comprises a first administration agent and a second security domain comprises a second administration agent. A remote application server comprises a first data to be provided to the second administration agent. A syndication server, which is distinct from the remote application server, contains a list which comprises a reference to the first data. The list is sent in response to a polling request that is sent by the first administration agent. This list is comprised in a polling response which is sent by the syndication server. | 11-14-2013 |
20130329683 | METHOD FOR REMOTELY DELIVERING A FULL SUBSCRIPTION PROFILE TO A UICC OVER IP - The invention proposes a method consisting in: | 12-12-2013 |
20140122872 | METHOD FOR EXPORTING ON A SECURE SERVER DATA COMPRISED ON A UICC COMPRISED IN A TERMINAL - A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC. | 05-01-2014 |
20140141747 | METHOD FOR TRANSMITTING A SIM APPLICATION OF A FIRST TERMINAL TO A SECOND TERMINAL - A method for transmitting a SIM application of a first terminal to a second terminal, the SIM application being stored in a secure element included in the first terminal, with access to the SIM application being locked by a PIN code. The method includes exporting the SIM application from the first terminal to a distant site, by including the PIN code as well as a remote loading code. A user of the second terminal is asked to enter the remote loading code in the second terminal. In the event the remote loading code entered by the user matches the remote loading code that has been exported, the installation of the SIM application in a secure element of the second terminal is authorized. Otherwise, the SIM application is not installed in the secure element of the second terminal. | 05-22-2014 |
20140250501 | SECURE ELEMENT COMPRISING SEPARATED CONTAINERS AND CORRESPONDING METHOD - The invention is a secure element comprising a virtual machine able to work in admin mode and in runtime mode. The secure element comprises two enhanced containers. Each of said enhanced containers can be either in an activated state or in a disabled state. Only one of the enhanced containers can be in activated state at any given time. The virtual machine is adapted to access each of the enhanced containers when working in admin mode. The virtual machine cannot access an enhanced container which is in disabled state when working in runtime mode. | 09-04-2014 |