WO2009060393A2 - Sharing or reselling nfc applications among mobile communication devices - Google Patents
Sharing or reselling nfc applications among mobile communication devices Download PDFInfo
- Publication number
- WO2009060393A2 WO2009060393A2 PCT/IB2008/054613 IB2008054613W WO2009060393A2 WO 2009060393 A2 WO2009060393 A2 WO 2009060393A2 IB 2008054613 W IB2008054613 W IB 2008054613W WO 2009060393 A2 WO2009060393 A2 WO 2009060393A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile communication
- mox
- communication device
- mol
- appx
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3574—Multiple applications on card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/43—Security arrangements using identity modules using shared identity modules, e.g. SIM sharing
Definitions
- the invention relates to a method for sharing or reselling NFC applications being stored in a source mobile communication device with or to a destination mobile communication device.
- the invention further relates to a telecommunication system comprising at least one Service Provider, at least one Trusted Service Manager and a plurality of mobile communication devices, e.g. NFC mobile phones, being equipped to store NFC applications of the Service Providers.
- a telecommunication system comprising at least one Service Provider, at least one Trusted Service Manager and a plurality of mobile communication devices, e.g. NFC mobile phones, being equipped to store NFC applications of the Service Providers.
- the invention further relates to a Trusted Service Manager.
- the invention further relates to a Service Provider.
- the invention further relates to a computer program product directly loadable into the memory of a mobile communication device being equipped with a memory device.
- the invention further relates to a mobile communication device being adapted to process the computer program product mentioned in the above paragraph.
- SmartMX architecture combines coprocessors for RSA, ECC, DES and AES and enables implementation of operating systems including Java Open Platform and MULTOS.
- the ability of SmartMX cards to run the MIFARE protocol concurrently with other contactless transmission protocols implemented by the User Operating System enables the combination of new services and existing applications based on MIFARE (e.g. ticketing) on a single Dual Interface controller based smart card.
- SmartMX cards are able to emulate MIFARE Classic devices and thereby makes this interface compatible with any installed MIFARE Classic infrastructure.
- the contactless interface can be used to communicate via any protocol, particularly the MIFARE protocol and self defined contactless transmission protocols.
- SmartMX enables the easy implementation of state-of-the-art operating systems and open platform solutions including JCOP (the Java Card Operating System) and offers an optimized feature set together with the highest levels of security.
- JCOP the Java Card Operating System
- Mobile NFC Near Field Communication
- UICC hardware-based secure identity token
- MNO Mobile Network Operator
- OTA Over The Air
- SP Service Provider
- Customer e.g. banks, public transport companies, loyalty programs owners etc.
- Retailer/Merchant - service dependent e.g. operates a NFC capable Point of Sales (POS) terminal.
- POS Point of Sales
- TSM Trusted Service Manager
- Handset, NFC Chipset and UICC Manufacturer produce Mobile NFC/Communication devices and the associated UICC hardware.
- Reader Manufacturer produces NFC reader devices.
- TSM Trusted Service Manager
- the TSM does not participate in the transaction stage of the service, thus ensuring that the Service Providers' existing business models are not disrupted.
- the TSM can be managed by one MNO, a consortium of MNOs, or by independent Trusted Third Parties. The number of operating TSMs in one market will depend on the national market needs and circumstances.
- Service Providers like banks, public transport companies, loyalty programs owners etc. provide contactless services to their subscribed customers who use these services in their mobile communication devices, e.g. NFC mobile phones.
- Contactless services comprise e.g. the provision of transport passes, cinema tickets, coupons, etc. which can be subsumed by the generic terms "applications” and “services”.
- application will be used in a broad sense that comprises all contactless services and applications and particularly NFC services and applications.
- a customer buys applications from Service Providers for instance by ordering them from the website of a Service Provider.
- the customer inputs a unique identification number of his/her mobile communication device, e.g. the telephone number of a NFC mobile phone, so that the Service Provider knows unambiguously where to send the application.
- the Service Provider transmits the purchased application to the customer's mobile communication device via a Trusted Service Manager which securely distributes and manages the Service Provider's applications and transmits them to the mobile communication device.
- the applications When the applications are received by the mobile communication device they are stored in a secure memory element of the mobile communication device and can be consumed by the customer by positioning the mobile communication device within the range of transmission of a reading device which reads and processes the application in an appropriate manner, e.g. by giving the user access to an entrance of a concert hall.
- the present invention applies to a Mobile NFC ecosystem with Trusted Service Manager (TSM) as disclosed in the above referenced GSMA white book. Particularly, it takes into account the specific role of the TSM which acts as the single point of contact for the Service Providers to access their customer base through the MNOs and manages the secure download and life-cycle management of the Mobile NFC application on behalf of the Service Provider.
- TSM Trusted Service Manager
- the GSMA white book defines the role of the TSM in theory, for successful applications in practice there are still a couple of obstacles and problems to overcome.
- the issue that has to be addressed by the present invention is that it would be desirable for a customer to share or resell applications being stored in his mobile communication device with other people like friends or relatives.
- the Service Provider (particularly, if it is still the owner of the application) must grant the right to the customer to do so. It has also been taken into account that a Service Provider should have the technical possibility to charge the customer for sharing/reselling an application.
- a method for sharing or reselling applications being stored in a source mobile communication device with or to a destination mobile communication device comprising: at the source mobile communication device, transmitting a sharing or reselling request to a Trusted Service Manager which request comprises information about the application to be shared/resold and the destination mobile communication device; at the Trusted Service Manager, extracting from the request the application to be shared/resold and the destination communication device; connecting to a repository that contains information about applications associated with mobile communication devices in which the applications are installed and with the Service Providers which have provided said applications; retrieving from the repository the Service Provider that has provided the application to be shared/resold; and sending a query to said Service Provider asking if reselling or sharing the application with/to the destination mobile communication device is possible; at the Service Provider, processing said query by checking whether reselling or sharing the application with/to destination mobile communication device is possible or not, and in the affirmative, sending an installation request to the Trusted Service Manager which installation request comprises an adapted version of the application to be shared/
- a telecommunication system comprising at least one Service Provider, at least one Trusted Service Manager and a plurality of mobile communication devices, e.g. NFC mobile phones, being equipped to store applications provided by the Service Providers, wherein the Service Providers, the Trusted Service Manager and the mobile communication devices comprise computing units and software code portions for performing the steps of the above method.
- a telecommunication system comprising at least one Service Provider, at least one Trusted Service Manager and a plurality of mobile communication devices, e.g. NFC mobile phones, being equipped to store applications provided by the Service Providers, wherein the Service Providers, the Trusted Service Manager and the mobile communication devices comprise computing units and software code portions for performing the steps of the above method.
- a Trusted Service Manager being adapted to: receive from a source mobile communication device a sharing or reselling request which request comprises information about an application to be shared/resold and a destination mobile communication device; extract from the request the application to be shared/resold and the destination communication device; connect to a repository that contains information about applications associated with mobile communication devices in which the applications are installed and with Service Providers which have provided said applications; retrieve from the repository the Service Provider that has provided the application to be shared/resold; send a query to said Service Provider asking if reselling or sharing the application with/to the destination mobile communication device is possible; compile an adapted application received from the Service Provider into a setup-message and send it to the destination mobile communication device; send update instructions to the source mobile communication device according the Service Provider's SPx installation instructions; and update the repository according the Service Provider's installation instructions and update instructions.
- a Service Provider being adapted to provide applications via a Trusted Service Manager to mobile communication devices, wherein the Service Provider is further adapted to: receive a query from the Trusted Service Manager asking if reselling or sharing the application with/to a destination mobile communication device is possible; process said query by checking whether reselling or sharing the application with/to destination mobile communication device is possible or not, and in the affirmative, send an installation request to the Trusted Service Manager which installation request comprises an adapted version of the application to be shared/resold, and send update instructions to the Trusted Service Manager instructing it how to proceed with the application to be shared/resold in a source mobile communication device.
- a computer program product according to the invention can be characterized in the way defined below, that is: A computer program product being directly loadable into the memory of a mobile communication device being equipped with a memory device for storing applications which have been provided to the mobile communication device by Service Providers, wherein the computer program product comprises software code portions for performing - when running on the mobile communication device - the steps of transmitting a sharing or reselling request to a Trusted Service Manager which request comprises information about an application to be shared/resold and a destination mobile communication device; installing applications in the memory device according to a setup-message of a Trusted Service Manager; and updating application that are stored in the memory device according to update instructions of a Trusted Service Manager.
- a mobile communication device according to the invention comprises an arithmetic-logic unit and a memory and processes the computer program product according to the above paragraph.
- the characteristic features according to the invention provide the advantage that a customer of a Service Provider is enabled to share or resell applications like NFC services that he/she has installed in his/her mobile communication device with other customers and their mobile communication devices, respectively, without violating the concept of a Trusted Service Manager to be the single point of contact for the Service Providers to access their customer base through Mobile Network Operators.
- the measures as claimed in claim 2, claim 3, claim 5 or claim 6, respectively, provide the advantage that they rely on well-defined highly accessible network infrastructure and services.
- Fig. 1 shows a schematic diagram of a telecommunication system in which context the invention is embedded as well as the steps of the method according to the present invention.
- Fig. 2 shows a schematic diagram of the status of the telecommunication system when the steps of the method according to the invention have been completed.
- FIG. 1 schematically shows a Mobile NFC ecosystem as disclosed in the above referenced GSMA white book.
- the system comprises a Mobile Network Operator MNO, a couple of Service Providers SPl, SP2, SPx, mobile communication devices MOl, MOx and a Trusted Service Manager TSM.
- the mobile communication device MOl is assigned to a customer CUl who has registered the mobile communication device MOl at the Mobile Network Operator MNO.
- the mobile communication device MOx is assigned to a customer CUx who has registered the mobile communication device MOx at the Mobile Network Operator MNO.
- the Mobile Network Operator MNO provides the full range mobile services to the customers CUl, CUx and their mobile communication devices MOl, MOx, respectively, particularly provides UICC and NFC terminals plus Over The Air (OTA) transport services for the mobile communication devices MOl, MOx.
- the mobile communication devices MOl, MOx are equipped with memory devices MIFl, MIFx being adapted to securely store applications APPl, APP2, APPx in memory device MIFx and APP4 in memory device MIFl.
- the memory devices MIFl, MIFx advantageously comprise MIFARE memory cards (e.g. a MIFARE Standard Ik memory card as shown in Fig. 1) or smartcards like SmartMX cards.
- the mobile communication devices MOl, MOx equipped with said memory devices MIFl, MIF2 are preferably configured as NFC mobile phones.
- the application APPl is provided by Service Provider SPl
- the applications APP2 and APP4 are provided by Service Provider SP2
- the application APPx is provided by the Service Providers SPx.
- the Service Providers SPl, SP2, SPx are e.g. banks, public transport companies, loyalty programs owners etc..
- the Trusted Service Manager TSM securely distributes and manages the Service Providers' SPl, SP2, SPx applications APPl, APP2, APP4, APPx to the Mobile Network Operator's MNO customer base as will be explained in more detail below.
- a Service Provider e.g. Service Provider SPx wants to install a new application APPx (ticket, access control, coupon, etc.) in a memory device MIFx of the mobile communication device MOx it sends an installation request INST via a first communication channel Cl to the Trusted Service Manager TSM.
- the installation request INST comprises the application APPx to be installed, an identifier of the Service Provider SPx and a unique identifier of the target mobile communication devices MOx, e.g. an assigned telephone number.
- the first communication channel Cl is e.g. configured as a computer network such as the Internet.
- the preferred data transmission protocol between the Service Provider SPx and the Trusted Service Manager TSM is HTTPS.
- the Trusted Service Manager TSM receives the installation request INST from the Service Provider SPx it extracts the application APPx and the identifier of the mobile communication device MOx and - provided that the memory device MIFx of the mobile communication device MOx is a MIFARE memory - assigns under its own discretion one or more destination sectors and the associated sector key(s) of the memory device MIFx.
- the Trusted Service Manager TSM compiles the application APPx, the sector key(s) and the sector number(s) of the destination sectors into a setup-message SU.
- the Trusted Service Manager TSM may encrypt the setup-message SU. Then the Trusted Service Manager TSM sends the setup-message SU via a second communication channel C2, e.g. an over-the-air (OTA) service of the Mobile Network Operator MNO to the mobile communication device MOx.
- OTA over-the-air
- SMS SMS
- the mobile phone MOx there is a software application running being designed to extract all the data from the received setup-message SU, if necessary decrypting it first, and writing the extracted application APPx into the assigned destination sector(s) of the memory device MIFx by using the extracted sector key(s).
- the Trusted Service Manager TSM receives the installation request INST from the Service Provider SPx and extracts the application APPx and the identifier of the mobile communication device MOx it further writes (WRT) these data into a repository REP so that it can retrieve all Service Providers SPx that are associated with a specific mobile communication device MOx.
- the repository REP shown in Fig. 1 presently contains one application APP4 assigned to the mobile communication device MOl, which application APP4 has been delivered by the Service Provider SP2, and three applications APPl, APP2, APPx assigned to the mobile communication device MOx, which applications have been delivered by the Service Providers SPl, SP2 and SPx, respectively.
- the repository REP could for instance be configured as a data base, a file system or the like.
- the customer CUx wants to share or resell e.g. the application APPx with the customer CUl he/she selects the application APPx and the destination mobile communication device MOl of the customer CUl (e.g. either by inputting a sequence of key strokes or by selection from menus of the user interface of the mobile communication device MOx) and gets his/her mobile communication device MOx to send a request SR to the Trusted Service Manager TSM to share/resell the application APPx with the mobile communication device MOl .
- the application APPx wants to share or resell e.g. the application APPx with the customer CUl he/she selects the application APPx and the destination mobile communication device MOl of the customer CUl (e.g. either by inputting a sequence of key strokes or by selection from menus of the user interface of the mobile communication device MOx) and gets his/her mobile communication device MOx to send a request SR to the Trusted Service Manager TSM to share/resell
- the Trusted Service Manager TSM retrieves (RTR) the application APPx for finding out by which Service Provider it has been provided (in the present example Service Provider SPx) and sends a query QU to the Service Provider SPx asking if reselling or sharing the application APPx with/to destination mobile communication device MOl is possible. If the Service Provider SPx agrees it sends an installation request INST comprising an adapted version APPx' of the original application, its own identifier (i.e. SPx) and the unique identifier of the target mobile communication device MOl. Further, the Service Provider sends update instructions UPD to the Trusted Service Manager TSM instruction how to proceed with the application APPx in the source mobile communication device MOx. Update instructions comprise e.g. the instruction to delete the application APPx from the source mobile communication device MOx or to update a value (e.g. number of remaining tickets) that is contained in the application APPx.
- the Trusted Service manager TSM updates its repository REP according the Service Provider's SPx instructions.
- the Trusted Service manager TSM further compiles the adapted application APPx', and if necessary sector key(s) and target the sector number(s) of the memory device MIFl into a setup-message SU and sends it via the Mobile Network Operator MNO to the destination mobile communication device MOl.
- the Trusted Service manager TSM also sends the update instructions UPD via the Mobile Network Operator MNO to the source mobile communication device MOx.
- Fig. 2 shows the state of the Mobile NFC ecosystem after the sharing/reselling request has been completed. It is assumed that the uptdate instructions had been deleting instructions.
- application APPx has been deleted from the memory device MIFx of the source mobile communication device MOx and that adapted application APPx' has been stored in the memory device MIFl of the destination mobile communication device MOx. Further, the information in the repository has been updated accordingly.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200880115061.5A CN101855887B (en) | 2007-11-06 | 2008-11-05 | Share or resell NFC applications between mobile communication devices |
| US12/741,760 US9208483B2 (en) | 2007-11-06 | 2008-11-05 | Sharing or reselling NFC applications among mobile communications devices |
| EP08846850A EP2218244A2 (en) | 2007-11-06 | 2008-11-05 | Sharing or reselling nfc applications among mobile communication devices |
| JP2010531638A JP5651473B2 (en) | 2007-11-06 | 2008-11-05 | Sharing or reselling NFC applications between mobile communication devices |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP07291329.6 | 2007-11-06 | ||
| EP07291329 | 2007-11-06 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2009060393A2 true WO2009060393A2 (en) | 2009-05-14 |
| WO2009060393A3 WO2009060393A3 (en) | 2009-07-02 |
Family
ID=40539192
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2008/054613 Ceased WO2009060393A2 (en) | 2007-11-06 | 2008-11-05 | Sharing or reselling nfc applications among mobile communication devices |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US9208483B2 (en) |
| EP (1) | EP2218244A2 (en) |
| JP (1) | JP5651473B2 (en) |
| CN (1) | CN101855887B (en) |
| WO (1) | WO2009060393A2 (en) |
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011006142A1 (en) * | 2009-07-09 | 2011-01-13 | Cubic Corporation | Id application for nfc-enabled mobile device |
| CN102254259A (en) * | 2010-05-21 | 2011-11-23 | 英特尔公司 | Method and apparatus for conducting trusted remote payment transactions |
| GB2506263A (en) * | 2012-08-31 | 2014-03-26 | Jpmorgan Chase Bank Na | Ecosystem for controlling applications in a mobile communications system |
| US8725211B2 (en) | 2007-09-27 | 2014-05-13 | Gemalto Sa | Trusted service manager managing reports of lost or stolen mobile communication devices |
| EP2768199A1 (en) * | 2013-02-14 | 2014-08-20 | Deutsche Telekom AG | Method for transferring authorization information through a telecommunications network or an authorization associated with a telecommunication terminal. Telecommunications terminal, system. Computer program and a computer program product |
| US8856024B2 (en) | 2010-10-26 | 2014-10-07 | Cubic Corporation | Determining companion and joint cards in transit |
| US8942677B2 (en) | 2009-07-09 | 2015-01-27 | Cubic Corporation | Transit account management with mobile device messaging |
| US8991699B2 (en) | 2009-09-08 | 2015-03-31 | Cubic Corporation | Association of contactless payment card primary account number |
| US9208483B2 (en) | 2007-11-06 | 2015-12-08 | Gemalto Sa | Sharing or reselling NFC applications among mobile communications devices |
| US9430211B2 (en) | 2012-08-31 | 2016-08-30 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| US9479571B2 (en) | 2012-09-18 | 2016-10-25 | Google Inc. | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US9652628B2 (en) | 2011-11-01 | 2017-05-16 | Google Inc. | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| EP2653977A4 (en) * | 2010-12-17 | 2017-08-30 | Samsung Electronics Co., Ltd | Method and apparatus for automatically sharing an application among a plurality of clients |
| US10230762B2 (en) | 2012-08-31 | 2019-03-12 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| EP4060588A4 (en) * | 2021-02-05 | 2022-09-21 | Shenzhen Goodix Technology Co., Ltd. | METHOD AND SYSTEM FOR MANAGING VIRTUAL ELECTRONIC CARDS, SECURITY CHIP, TERMINAL AND STORAGE MEDIA |
Families Citing this family (31)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9247050B2 (en) * | 2008-05-30 | 2016-01-26 | Ringcentral, Inc. | Telecommunications services activation |
| US9230259B1 (en) | 2009-03-20 | 2016-01-05 | Jpmorgan Chase Bank, N.A. | Systems and methods for mobile ordering and payment |
| US8447699B2 (en) * | 2009-10-13 | 2013-05-21 | Qualcomm Incorporated | Global secure service provider directory |
| EP2508014B1 (en) * | 2009-12-04 | 2018-04-04 | Telefonaktiebolaget LM Ericsson (publ) | Methods, secure element, server, computer programs and computer program products for improved application management |
| US8352749B2 (en) | 2010-12-17 | 2013-01-08 | Google Inc. | Local trusted services manager for a contactless smart card |
| US8807440B1 (en) | 2010-12-17 | 2014-08-19 | Google Inc. | Routing secure element payment requests to an alternate application |
| US9691055B2 (en) | 2010-12-17 | 2017-06-27 | Google Inc. | Digital wallet |
| US8335921B2 (en) | 2010-12-17 | 2012-12-18 | Google, Inc. | Writing application data to a secure element |
| KR101741551B1 (en) * | 2010-12-20 | 2017-06-15 | 엘지전자 주식회사 | Mobile terminal and Method for controlling application thereof |
| US9191813B2 (en) * | 2010-12-30 | 2015-11-17 | Mozido Corfire—Korea, Ltd. | System and method for managing OTA provisioning applications through use of profiles and data preparation |
| US10168413B2 (en) * | 2011-03-25 | 2019-01-01 | T-Mobile Usa, Inc. | Service enhancements using near field communication |
| CN102325217A (en) * | 2011-07-11 | 2012-01-18 | 惠州Tcl移动通信有限公司 | Mobile terminal, software sharing system and sharing method thereof |
| US8255687B1 (en) | 2011-09-15 | 2012-08-28 | Google Inc. | Enabling users to select between secure service providers using a key escrow service |
| US8171525B1 (en) | 2011-09-15 | 2012-05-01 | Google Inc. | Enabling users to select between secure service providers using a central trusted service manager |
| US8313036B1 (en) | 2011-09-16 | 2012-11-20 | Google Inc. | Secure application directory |
| IN2014KN00998A (en) * | 2011-10-12 | 2015-09-04 | C Sam Inc | |
| US10373152B2 (en) * | 2011-12-13 | 2019-08-06 | Visa International Service Association | Integrated mobile trusted service manager |
| US10949815B2 (en) | 2011-12-13 | 2021-03-16 | Visa International Service Association | Integrated mobile trusted service manager |
| CA2788051C (en) * | 2011-12-15 | 2015-11-24 | Research In Motion Limited | Method and device for managing a secure element |
| KR101419138B1 (en) * | 2011-12-30 | 2014-07-11 | 에스케이씨앤씨 주식회사 | Master trusted service manager |
| CN103188328A (en) * | 2011-12-30 | 2013-07-03 | 中国移动通信集团广东有限公司 | Mobile terminal application program sharing method, server and system |
| US8385553B1 (en) | 2012-02-28 | 2013-02-26 | Google Inc. | Portable secure element |
| CN102662699A (en) * | 2012-03-27 | 2012-09-12 | 惠州Tcl移动通信有限公司 | Method for updating NFC (Near Field Communication) firmware of mobile terminal and mobile terminal |
| US8429409B1 (en) | 2012-04-06 | 2013-04-23 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
| CN103517091B (en) * | 2012-06-20 | 2016-12-28 | 华为终端有限公司 | A kind of content share method and relevant device |
| US9264413B2 (en) * | 2012-12-06 | 2016-02-16 | Qualcomm Incorporated | Management of network devices utilizing an authorization token |
| KR102230266B1 (en) * | 2013-11-11 | 2021-03-19 | 삼성전자주식회사 | Method and electronic device for sharing applications among a plurality of electronic devices |
| US10171558B2 (en) * | 2014-09-12 | 2019-01-01 | Microsoft Technology Licensing, Llc | Cross device application discovery and control |
| CN107862516A (en) * | 2016-09-21 | 2018-03-30 | 中国移动通信有限公司研究院 | A kind of Application share method and relevant device and system |
| CN108153558B (en) * | 2017-12-06 | 2022-01-07 | Oppo广东移动通信有限公司 | Method for uniformly customizing terminal software version, electronic device and readable storage medium |
| CN110062016B (en) | 2018-01-18 | 2023-05-09 | 阿里巴巴集团控股有限公司 | Method and device for trusted service management |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5629980A (en) * | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
| US5594227A (en) * | 1995-03-28 | 1997-01-14 | Microsoft Corporation | System and method for protecting unauthorized access to data contents |
| AUPQ268999A0 (en) | 1999-09-07 | 1999-09-30 | Keycorp Limited | Application management for multi application devices |
| SG145548A1 (en) * | 2001-01-31 | 2008-09-29 | Ntt Docomo Inc | Method and apparatus for delivering program to storage module of mobile terminal |
| JP2004030063A (en) * | 2002-06-24 | 2004-01-29 | Access:Kk | Method of transferring electronic ticket, electronic ticket management device, user portable terminal device, method of handling electronic ticket, program for these, and program recording medium |
| KR20050102636A (en) * | 2003-02-04 | 2005-10-26 | 릴라이언스 인포컴 리미티드 | Mobile telephony application platform |
| US20050222961A1 (en) * | 2004-04-05 | 2005-10-06 | Philippe Staib | System and method of facilitating contactless payment transactions across different payment systems using a common mobile device acting as a stored value device |
| US8433693B2 (en) * | 2007-04-02 | 2013-04-30 | Microsoft Corporation | Locking semantics for a storage system based on file types |
| US8391837B2 (en) * | 2007-07-24 | 2013-03-05 | Nxp B.V. | Method, system and trusted service manager for securely transmitting an application to a mobile phone |
| WO2009060393A2 (en) | 2007-11-06 | 2009-05-14 | Gemalto Sa | Sharing or reselling nfc applications among mobile communication devices |
-
2008
- 2008-11-05 WO PCT/IB2008/054613 patent/WO2009060393A2/en not_active Ceased
- 2008-11-05 JP JP2010531638A patent/JP5651473B2/en not_active Expired - Fee Related
- 2008-11-05 EP EP08846850A patent/EP2218244A2/en not_active Withdrawn
- 2008-11-05 CN CN200880115061.5A patent/CN101855887B/en not_active Expired - Fee Related
- 2008-11-05 US US12/741,760 patent/US9208483B2/en not_active Expired - Fee Related
Cited By (29)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8725211B2 (en) | 2007-09-27 | 2014-05-13 | Gemalto Sa | Trusted service manager managing reports of lost or stolen mobile communication devices |
| US9208483B2 (en) | 2007-11-06 | 2015-12-08 | Gemalto Sa | Sharing or reselling NFC applications among mobile communications devices |
| US10121288B2 (en) | 2009-07-09 | 2018-11-06 | Cubic Corporation | Transit account management with mobile device messaging |
| US8942677B2 (en) | 2009-07-09 | 2015-01-27 | Cubic Corporation | Transit account management with mobile device messaging |
| US9996985B2 (en) | 2009-07-09 | 2018-06-12 | Cubic Corporation | Distribution and enablement of reloadable prepaid cards in transit |
| WO2011006142A1 (en) * | 2009-07-09 | 2011-01-13 | Cubic Corporation | Id application for nfc-enabled mobile device |
| US8991699B2 (en) | 2009-09-08 | 2015-03-31 | Cubic Corporation | Association of contactless payment card primary account number |
| US9665864B2 (en) | 2010-05-21 | 2017-05-30 | Intel Corporation | Method and device for conducting trusted remote payment transactions |
| CN102254259A (en) * | 2010-05-21 | 2011-11-23 | 英特尔公司 | Method and apparatus for conducting trusted remote payment transactions |
| EP2388744A3 (en) * | 2010-05-21 | 2013-07-10 | Intel Corporation | Method and device for conducting trusted remote payment transactions |
| US11935030B2 (en) | 2010-05-21 | 2024-03-19 | Intel Corporation | Method and device for conducting trusted remote payment transactions |
| US8856024B2 (en) | 2010-10-26 | 2014-10-07 | Cubic Corporation | Determining companion and joint cards in transit |
| EP2653977A4 (en) * | 2010-12-17 | 2017-08-30 | Samsung Electronics Co., Ltd | Method and apparatus for automatically sharing an application among a plurality of clients |
| US9887871B2 (en) | 2010-12-17 | 2018-02-06 | Samsung Electronics Co., Ltd | Method and apparatus for automatically sharing an application among a plurality of clients |
| US10114976B2 (en) | 2011-11-01 | 2018-10-30 | Google Llc | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US9652628B2 (en) | 2011-11-01 | 2017-05-16 | Google Inc. | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US9928382B2 (en) | 2011-11-01 | 2018-03-27 | Google Llc | Systems, methods, and computer program products for managing secure elements |
| US10230762B2 (en) | 2012-08-31 | 2019-03-12 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| US9430211B2 (en) | 2012-08-31 | 2016-08-30 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| US10630722B2 (en) | 2012-08-31 | 2020-04-21 | Jpmorgan Chase Bank, N.A. | System and method for sharing information in a private ecosystem |
| GB2506263B (en) * | 2012-08-31 | 2020-10-21 | Jpmorgan Chase Bank Na | System And Method for Sharing Information In A Private Ecosystem |
| GB2506263A (en) * | 2012-08-31 | 2014-03-26 | Jpmorgan Chase Bank Na | Ecosystem for controlling applications in a mobile communications system |
| US10057773B2 (en) | 2012-09-18 | 2018-08-21 | Google Llc | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US9479571B2 (en) | 2012-09-18 | 2016-10-25 | Google Inc. | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US10924279B2 (en) | 2012-09-18 | 2021-02-16 | Google Llc | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| US11601273B2 (en) | 2012-09-18 | 2023-03-07 | Google Llc | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements |
| EP2768199A1 (en) * | 2013-02-14 | 2014-08-20 | Deutsche Telekom AG | Method for transferring authorization information through a telecommunications network or an authorization associated with a telecommunication terminal. Telecommunications terminal, system. Computer program and a computer program product |
| EP4060588A4 (en) * | 2021-02-05 | 2022-09-21 | Shenzhen Goodix Technology Co., Ltd. | METHOD AND SYSTEM FOR MANAGING VIRTUAL ELECTRONIC CARDS, SECURITY CHIP, TERMINAL AND STORAGE MEDIA |
| US11907931B2 (en) | 2021-02-05 | 2024-02-20 | Shenzhen GOODIX Technology Co., Ltd. | Method and system for managing virtual electronic card, secure chip, terminal and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2009060393A3 (en) | 2009-07-02 |
| JP2011508466A (en) | 2011-03-10 |
| EP2218244A2 (en) | 2010-08-18 |
| JP5651473B2 (en) | 2015-01-14 |
| CN101855887B (en) | 2014-07-23 |
| CN101855887A (en) | 2010-10-06 |
| US9208483B2 (en) | 2015-12-08 |
| US20100323681A1 (en) | 2010-12-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9208483B2 (en) | Sharing or reselling NFC applications among mobile communications devices | |
| EP2206067B1 (en) | Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications | |
| US8725211B2 (en) | Trusted service manager managing reports of lost or stolen mobile communication devices | |
| US9843933B2 (en) | Method of accessing applications in a secure mobile environment | |
| US8799574B2 (en) | Method and devices for installing and retrieving linked MIFARE applications | |
| US8391837B2 (en) | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |
| US8943494B2 (en) | Method for installing and managing NFC applications with pictures | |
| WO2009147548A2 (en) | Method for storing nfc applications in a secure memory device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200880115061.5 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08846850 Country of ref document: EP Kind code of ref document: A2 |
|
| REEP | Request for entry into the european phase |
Ref document number: 2008846850 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2008846850 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010531638 Country of ref document: JP |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 12741760 Country of ref document: US |