The present invention relates generally to communications over a computer network and more particularly to secure and reliable end-to-end communication between an integrated circuit card and a remote entity over an IP-based wireless wide area network and the Internet.
Data communication over the networks used for mobile telephony is becoming increasingly common. Systems initially established for carrying voice conversation are now often used for services that include web surfing on the Internet, communication with a variety of media including data, audio and video. The latest generation wireless wide area networks provide great performance and functionality enhancements that make such services efficient and practical.
In several of the predominant standards for wireless communication, the wireless component, e.g., the mobile telephone, includes an integrated circuit card. Integrated circuit cards are small personal computing devices that are used to protect very sensitive information.
In the case of wireless networks, integrated circuit cards may be installed into a wireless component, known herein as a mobile station, and provides mission critical services such as authentication, authorization and accounting.
The integrated circuit cards used in mobile telephony are referred to by several different acronyms and identifying phrases. A subscriber identification module (SIM) is a smart card used in a communication device. At first, each GSM handset carries a SIM in order to access GSM network. Now many other mobile phones for other networks have SIMs as well. SIMs are also used in TV set-top boxes and PDAs. The SIMs for 3G networks, such as UMTS, are called USIMs (Universal SIM). The SIMs used for CDMA networks are called Removable-User Identity Module (RUIM). These smart cards are security devices. Their primary purposes are authentication, authorization, and accounting (AAA). They also provide other services such as creation of session keys for encryption, data encryption and decryption, and secure storage for personal information. The user's identity is in the smart card and, hence, physically separated from the handset. This provides security and portability.
The Universal Integrated Circuit Card (UICC) is an application development platform based on 2G platform, 3G platform, or higher platforms. The SIM, USIM, and RUIM are examples of Network Access Applications (NAA) built on top of the UICC. For convenience, in the rest of this document, we may use the terms UICC, (U)SIM, and smart card interchangeably to represent any UICC in a mobile device, where the UICC supports at least one NAA.
The functions such as authentication, authorization, and accounting provided by an integrated circuit card may be provided to allow a user to access services located on a remote entity on the Internet. While very important and sensitive information and services are provided by the integrated circuit card the security of that information is somewhat compromised when it is transmitted via the mobile station and the wireless wide area network without end-to-end security. To provide end-to-end security using standard Internet security protocols such as SSL and TLS requires a reliable end-to-end communications scheme from the integrated circuit card to the remote entity.
It is therefore desirable to provide a system and method for reliable end-to-end communication between an integrated card, e.g., a UICC, and the remote entity. Such end-to-end communication should be provided with minimal intervention of the wireless terminal and allow the integrated circuit card to act as a node on the network.
One international standards collaboration project for wireless wide area networks, the 3rd Generation Partnership Project (3GPP), introduced a protocol, CAT_TP, to address the issue of end-to-end security between an integrated circuit card used in a wireless mobile station and a remote entity. CAT_TP provides a reliable and full-duplex communication channel between an integrated circuit card and a remote entity. CAT_TP is an additional transport layer located on top of the standard Internet transport protocol (UDP/TCP). To communication between the integrated circuit card and the remote entity using CAT_TP, a client executing on the remote entity implements the CAT_TP protocol. CAT_TP is described in ETSI TS 102 124: “Smart Cards: Transport Protocol for UICC Based Applications, Stage 1”, V 6.0.0 (2003-2) and ETSI TS 102 127: “Smart Cards: Transport Protocol for UICC Based Applications, Stage 2”, V 6.0.0 (2004-1).
This solution is undesirable for at least two reasons. First, it increases the overhead associated with data communication because it adds an additional transport layer, the CAT_TP layer. Second, it imposes a requirement on all remote entities, namely, to add the CAT_TP layer, which is not an Internet standard layer, on top of existing communications layers, such as TCP or UDP. Thus, such remote entities are required to treat wireless clients differently from non-wireless clients.
From the foregoing it will be apparent that there is still a need for an improved method to provide support for cryptographic communications protocols such as SSL/TLS on resource-constrained devices so as to enable secure communications end-to-end between the UICC device and the remote node.
In a preferred embodiment, the invention provides a system and a method for providing reliable end-to-end communication between a UICC and a remote node on a network without requiring implementation of special purpose protocols at the remote node. The UICC operates to transmit a command using a first protocol from the UICC to the terminal to request the terminal to open a data channel to the network. The wireless terminal operates to, in response to the request to open a data channel, attempt to open a channel to the network. Upon indication that a data channel has successfully been opened: the UICC operates to transmit datagrams of a second protocol to the wireless terminal using the first protocol. The wireless terminal operates to receive the datagrams from the UICC and to transmit the datagrams received from the UICC to the network using the second protocol. The wireless terminal operates to receive datagrams of the second protocol from the remote entity and to transmit the datagrams from the remote entity to the UICC using the first protocol. In an embodiment of the invention, the first protocol is Bearer Independent Protocol and it provides a mechanism to enable the UICC to request a terminal to manage a data channel to the network wherein to manage includes executing at least one function selected from the set including open channel, close channel, send data on the channel, and receive data on the channel. The second protocol may be, for example, the Internet Protocol (IP).
In an embodiment the UICC communicates in a reliable manner to the remote entity over the data channel using the second protocol to transmit a packet of a third protocol wherein the third protocol provides mechanisms for reliable communication. The third protocol may, for example, be the Transmission Control Protocol (TCP).
The UICC may further be assigned an IP address according to a method selected from pre-assigning the IP address to the UICC, or transmitting from the UICC to the wireless terminal an indication that the UICC does not have an IP address and operating the wireless terminal to assign the UICC with an IP address according to a method selected from obtaining a new IP address from the network and assigning the new IP address to the UICC, assigning the UICC a default address, and assigning the UICC a private address.
In an embodiment of the invention, the wireless terminal routes the datagrams using an IP routing capability to transmit the datagrams received from the UICC to a destination and to transmit the datagrams from the remote entity to the UICC.
Other aspects and advantages of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the invention.
In the following detailed description, reference is made to the accompanying drawings that show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that the various embodiments of the invention, although different, are not necessarily mutually exclusive. For example, a particular feature, structure, or characteristic described herein in connection with one embodiment may be implemented within other embodiments without departing from the spirit and scope of the invention. In addition, it is to be understood that the location or arrangement of individual elements within each disclosed embodiment may be modified without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims, appropriately interpreted, along with the full range of equivalents to which the claims are entitled. In the drawings, like numerals refer to the same or similar functionality throughout the several views.
1.0 Introduction
As shown in the drawings for purposes of illustration, the invention is embodied in a novel integrated circuit card for use with mobile terminals, e.g. Universal Integrated Circuit Cards, and software for such a card for reliable communications with remote nodes over a computer network. A UICC implemented according to the invention provides reliable end-to-end communication with a remote node on the Internet without imposing additional overhead associated with the introduction of communications layers having the special purpose of providing for such communication. Rather, the UICC according to the invention uses standard communications protocols to provide reliable communication end-to-end with a remote entity on the Internet. There is no additional software or hardware requirements imposed on the remote entity beyond those used to communicate with other nodes on the Internet.
2.0 Design Overview
The electronic circuitry 113 provides communications functionality for the mobile station 103 with a wireless network 117 via a wireless link to a wireless telephony antenna 119. And the microprocessor provides some of the control functionality of the mobile station 103, such as managing operations of the mobile station 103 and managing communications protocols used to communicate with the wireless network 117. The UICC 101 is connected to the electronic circuitry 113 so as to allow communication between the UICC 101 and the mobile station 103.
The wireless network 117 is composed of a complex communications infrastructure for providing connections to other stations, for example, other mobile stations or land-based telephone systems. One such station may be an Internet gateway 121 which gives the wireless network 117 access to the Internet. As commonly known, very many computers are connected via the Internet. In the scenario presented herein, the user of a mobile station uses the infrastructure illustrated in
The UICC 101 is a smart card having a central processing unit 203, a read-only memory (ROM) 205, a random access memory (RAM) 207, a non-volatile memory (NVM) 209, and a communications interface 211 for receiving input and placing output to a mobile station 103, particularly the electronics 113 of the mobile station 103, to which the UICC device 101 is connected. These various components are connected to one another, for example, by bus 213. In one embodiment of the invention, the communications module 405 (described herein below), as well as other software modules described herein below, would be stored on the resource-constrained device 101 in the ROM 205. In alternative embodiments, the software modules stored in ROM 205 would be stored in a flash memory or other types of non-volatile memory. For purposes of illustration, the invention is described using the ROM example. However, that should not be construed as a limitation on the scope of the invention and wherever ROM is used, flash memory and other types of non-volatile memory can be substituted as an alternative.
The ROM 205 would also contain some type of operating system, e.g., a Java Virtual Machine. Alternatively, the communications module 405 would be part of the operating system. During operation, the CPU 203 operates according to instructions in the various software modules stored in the ROM 205.
Thus, according to the invention the CPU 203 operates according to the instructions in the communications module 405 to perform the various operations of the communications module 405 described herein below.
3.0 Wireless Wide Area Networks
The wireless wide area network (WWAN) (also called cellular network) 117 provides national and international wireless communication coverage for voice and data communications. The first generation (1G) wireless networks, constructed in late 70's and early 80's, were analog networks used for voice communications.
The second generation (2G) wireless networks are digital networks. They replaced the 1G networks in 1990's with significant improvements of capacity and voice quality. In addition, the 2G networks provide basic data services, such as simple Internet applications based on Wireless Application Protocol (WAP) and text messaging with Short Message Service (SMS). The 2G networks are circuit-switched networks, which provides very limited data transfer rate. The most popular 2G networks are Global System for Mobile Communications (GSM) networks.
As a step forward to the 3G systems, many operators move to the second-and-a-half-generation wireless networks (2.5G). The 2.5G networks are packet-switched networks that provide packet data services. The data transfer rate (up to 144 Kbps) is nearly 10 times of the 2G networks. The 2.5G networks are often a software upgrade on top of existing 2G systems. Two leading 2.5G network protocols are General Packet Radio Services (GPRS) and Code Division Multiple Access 2000 1×(CDMA 2000 1×).
The third generation (3G) wireless wide area networks will provide further improved network capacity; and high-speed packet data and high quality voice services. The 3G systems are packet-switched digital systems. Many new services, such as high speed Internet access, video streaming and multi-media messaging will come with the realization of 3G networks. (In Europe, 3G systems are often referred to as Universal Mobile-Telecommunication System (UMTS).)
The fourth generation (4G) wireless wide area networks are on the horizon as well. Some telecommunication operators may consider bypassing 3G and going to 4G directly for 4G's offering of higher speed and financial advantages. 4G networks are also packet-switched digital systems.
The 2.5G, 3G and 4G networks are IP-based, that is, the communications within the network are based on Internet Protocols (IP). Such IP-based networks can have gateways to the Internet by connecting to other wired or wireless networks.
In
The mobile station communicates wirelessly to a base station 119 which is connected to a Serving GPRS Support Node (SGSN) 301. The base station 119 and the SGSN 301 provide relay functionality for relaying information transmitted between the mobile station 103 and the gateway 121.
The mobile station 103 may also implement one or more upper communications layers for implementing communication with applications running on remote nodes on the Internet.
The nodes 119, 301, and 121 implement various communications layers for communication at various levels amongst each other. These communication layers are described in greater detail in 3GPP TS 23.060: “Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS); Service description; Stage 2” V6.1.0 (2003-06), incorporated herein by reference in its entirety.
4.0 UICC-Terminal Interface
The 3GPP's TS 102 221 (ETSI TS 102 221: “Smart cards; UICC-Terminal interface; Physical and logical characteristics”, incorporated herein by reference) specifies that the mobile station 103 communicates to the UICC 101 using the T=0 or T=1 protocols, which are specified in ISO/IEC 7816-3 (ISO/IEC 7816-3 (1997): “Information technology—Identification cards—Integrated circuit(s) cards with contacts—Part 3: Electronic signals and transmission protocols”, incorporated herein by reference). With such protocols, the mobile station 103 always initiates commands to the UICC. The UICC has no mechanism to initiate a communication with the terminal.
A network SIM card according to the invention provides reliable communication between the SIM and remote entities via a GPRS network. The approach is applicable to other packet switch wireless WAN as well, such as 3G network. The communication between the SIM and remote entities uses standard Internet TCP/IP protocols and, hence, provide reliable data transmission layer. This enables using standard Internet security protocols such as SSL or TLS to secure the communication channel and, hence, provide end-to-end communication security between SIM and a remote entity.
The architecture according to the invention for realizing this end-to-end secure and reliable communication is described herein in conjunction with
Formerly known as SIM Application Toolkit, the Card Application Toolkits (CAT) enables a UICC to interact and to initiate a communication with the terminal through a set of proactive commands. This enables the applications inside the UICC to interact and operate with the terminal, which support the required mechanisms, for example display and user interactions. CAT is described in ETSI TS 102 223: “Smart Cards; Card Application Toolkit (CAT)”, V6.3.0 (2004-01).
CAT is still based on the T=0 and T=1 communication protocols. CAT adds a new status response word SW1. This status response has the same meaning as the normal ending (‘90 00’) and can be used with any command that expect a normal ending. In addition, this new status allows the UICC 101 to tell the mobile station 103 that the UICC 101 wants to send or do something. The mobile station 103 then uses the FETCH function of CAT to find out what action the UICC 101 wants to occur. This exchange enables the UICC 101 to initiate a communication, and to interact and operate with the mobile station 103.
The Bearer Independent Protocol (BIP) is a subset of CAT. BIP is a set of proactive commands {OPEN CHANNEL, CLOSE CHANNEL, SEND DATA, RECEIVE DATA, and GET CHANNEL STATUS} and events {Data available, Channel status}. BIP allows the UICC 101 to establish a data channel with the mobile station 103 to the outside world, e.g., via the Internet. Establishing a BIP data channel enables the UICC 101 to communicate, through the mobile station 103, either to a remote Server in the Internet 125 or to a remote device in the WWAN 117 (as shown in and described in conjunction with
As discussed herein above, one implementation of this architecture uses existing SIM standard Bearer Independent Protocol (BIP) as the link layer to carry IP datagrams. If other physical links, such as USB, are available for SIM in the future, the link layer may be replaced. However, the fundamentals of this architecture and layers above the link layer will remain the same.
5.0 Network Smart Card
5.1 Introduction
A network smart card is a smart card that is an Internet node and is described in greater detail in co-pending patent application Ser. No. 10/848,738. A network smart card has Internet protocols (TCP/IP) and security protocols (SSL/TLS) built into the card. The network smart card can establish and maintain secure Internet connections with another Internet nodes. The card does not dependent on a proxy on the host to enable Internet communications. It does not require local or remote Internet clients or servers to be modified in order to communicate with the smart card either.
Similar to other smart cards, the user information is stored on the network smart card. The smart card only gives out information to the trusted client or server at the user's authorization. The network smart card can be used to secure Internet online transactions and to provide other Internet applications, such as a web server.
5.2 Protocol Stacks
A Network UICC card according to the invention are smart cards with both (U)SIM card and network smart card functionalities. This enables a (U)SIM card to have a end-to-end reliable communication with the remote entity over the Internet. The Internet security protocol, such as SSL or TLS, further secures this reliable communication. The Internet protocol stack forms the upper part of the communication protocol stack. The lower part of the protocol stacks on the UICC 101 and the mobile station 103 depend on the physical and link layers that connect the UICC 101 and the mobile station 103.
Application programs 401 executing on the network enabled UICC 101 communicates over the network with application programs 403 executing on the remote entity 127.
To enable such communication, the network enabled UICC 101 has a communications module 405 implementing various communications protocols including, for example, SSL/TLS, TCP, IP, and a link layer. Co-pending patent applications 10/923,374 and 10/848,738 describe the implementation of SSL/TLS, TCP and IP on a resource-constrained device such as a smart card. Below these layers is a physical layer 407 for communicating raw-data to the mobile station 103. The actual choices of link layer and physical layer depends on the particular UICC 101 and mobile station 103 and would typically be specified by the mobile station 103.
According to the architecture of the present invention, communications at the applications layer are carried either on SSL/TLS or TCP channels opened from the UICC 101 to the remote entity 127. The communication module 405 accepts data from the applications 401 and encapsulates the data in TCP packets for the TCP layer. The TCP packets are then further encapsulated by the communications module 405 to IP datagrams which the communications module 405 transmits to the mobile station 103 over the link layer.
A GPRS mobile station 103 contains software and hardware modules, e.g., including a communications module 409, with the capability to communicate with the UICC 101 using the link layer protocol established for communication between the UICC 101 and the GPRS mobile station 103. The mobile station 103, further, has software and hardware modules for communication using the Internet Protocol (IP) over the network (the wireless network and the Internet) to a remote entity 127. The mobile station 103 is a conventional wireless terminal, for example, a GSM cellular telephone, that may accept a UICC and is therefore not described in greater detail herein.
The Bearer Independent Protocol (BIP) is one possible link layer for communication between the UICC 101 and the wireless mobile station 103.
The mobile station 103 communications module communicates with the Internet using IP over the WWAN 117 using the network protocol, link layer and physical protocols 407 specified by the WWAN 117. Thus, the communications module 409 sends the IP datagrams, received from the UICC on the BIP channel between the UICC and the mobile station, to the Internet. These IP datagrams carry the TCP packets end-to-end from the UICC 103 to the remote entity 127. While the mobile station 103 forwards IP datagrams, the mobile station 103 performs no manipulation of the IP datagrams.
The physical layer for communication between a standard smart card to mobile station are the ISO 7816-3 and 4 protocols. These protocols have the following limitations:
In an alternative embodiment of the invention, the link layer is a communications protocol known as Peer I/O described in the co-pending patent application 10/848,738, titled “SECURE NETWORKING USING A RESOURCE-CONSTRAINED DEVICE”, filed May 19, 2004, assigned to the assignee of the present invention, and the entire disclosure of which is incorporated herein by reference. The features of Peer I/O include:
The keys of Peer 10 are two Finite State Machines, one on the card side—the Peer IO client; and the other on the terminal side—the Peer IO server.
For the UICC card, BIP provides some of the Peer IO functionalities, for example the proactive command and regular polling. BIP is a more general communication protocol. The Peer IO is a more efficient communication protocol. For example, for forwarding data from the network to the SIM card, three commands are sent between the terminal and the SIM card as the following:
With Peer IO, only the terminal sends one command:
In addition, BIP requires the application to call SEND DATA or RECEIVE DATA multiple times in order to send or receive data whose length is longer than 256. Peer IO hides this from the application and separates the application from the communication logic. The present invention does not require a Peer IO implementation. However, the Peer IO is an optimization feature.
6.0 Communications Module on UICC 101
6.1 Overview
6.2 Open a Connection
A first sequence 701 illustrates the communication between these three nodes for the establishment of a communications channel between the UICC 101 and the remote entity 127.
The UICC 101 uses a link layer command to direct the mobile station 103 to open a communications channel to the Internet 125. In one embodiment, the UICC 101 uses the BIP layer OPEN CHANNEL command to request the mobile station 103 to open a channel. The parameters for OPEN CHANNEL include the following (ETSI TS 102 223: “Smart Cards; Card Application Toolkit (CAT)”, V6.3.0 (2004-01).):
To open an Internet (IP) channel, the UICC 101 sends OPEN CHANNEL command to the mobile station 103 with parameters include the following, step 703:
The mobile station 103 in turn executes a communications sequence 705 with the gateway 121 to establish the communications channel to the Internet 125. The sequence 705 is specific as to the particular wireless network used, i.e., each wireless operator may have its particular method for establishing a connection to the Internet. The sequence 705 is merely exemplary and is not specific to the present invention.
The mobile station 103 informs the UICC 101 of the success or failure of the open channel using TERMINAL RESPONSE command, step 707. If the channel open is successful, the TERMINAL RESPONSE command includes a Channel Identifier that identifies this channel for subsequent communication; and the terminal has activated the packet data service in behalf of the UICC.
6.3 IP Address for the UICC 101
The UICC 101 needs an IP address in order to communicate over the Internet. The UICC 101 may have a pre-assigned IP address, in which case, the UICC 101 will inform the mobile station 103 in the OPEN CHANNEL command. If the UICC 101 does not have an IP address, it informs the mobile station 103 in the OPEN CHANNEL command. The mobile station 103 can assign the UICC 101 an IP address using one of various methods, such as the following methods:
After assigning an IP address to the UICC 101, the mobile station 103 can use one of various methods to send the IP address back to the UICC 101. The following lists a few of such methods:
6.4 IP Routing by Terminal Equipment
The mobile station 103 equipment's IP layer needs to forward IP datagrams from the UICC 101 to the TCP layer of the mobile station 103 or to the network, and forward to the card the IP datagrams which are generated by the mobile station 103 or received from the network. This requires the mobile station 103 to have the IP routing capability and to treat the module of the mobile station 103 that implements BIP as a network interface. The BIP specification concerning the UICC/Terminal interface transport level implies this routing requirement when the transport level parameter is not present.
Sending a message to a remote entity 127
Returning now to
The sequence 709 is an example of a sequence wherein the UICC 101 is sending data. The UICC 101 sends a SEND DATA command containing data a parameter “store”, step 711. Upon receiving a SEND DATA command with a “store” parameter, the mobile station 103 may store the data sent in the SEND DATA command in a transmit buffer and transmit the data later so as to optimize the transmission. The mobile station 103 responds with a TERMINAL RESPONSE message, step 733, to report the status of the execution of the SEND DATA command received in step 711. The UICC 101 then sends another SEND DATA command with data and the parameter “immediate”, step 735. The “immediate” parameter indicates to the mobile station 103 to transmit the previously stored data (from step 733) and the data sent in step 735 together and immediately, step 737. The mobile station 103 again responds with a TERMINAL RESPONSE message, step 739, to report status of execution of the previously received SEND DATA command. The illustrated sequence 709 is merely one example of many possible sequences to transmit data over an established data channel. For example, in alternative sequences SEND DATA commands with “store” and “immediate” parameters may be transmitted in an entirely different order or may not even contain both SEND DATA commands with “store” and “immediate” parameters.
To separate applications from the concern of sending and managing multiple SEND DATA commands, Peer 10 client logic (described in the co-pending patent application 10/848,738) may be implemented. Using Peer IO enables an application to send data of any length that the application is capable of. Using Peer IO also separates applications from the communication logic.
Once the IP BIP channel is successfully opened, the UICC 101 can receive messages through the BIP channel from the remote entity 127 over the Internet 125 as illustrated by sequence 713. When the mobile station 103 receives data from the Internet 125 having the UICC 101 as destination, step 715, the mobile station 103 sends an ENVELOP command, step 717, to inform the UICC 101 that data is available for it. The CAT command to receive data is RECEIVE DATA, with which the UICC 101 requests the mobile station 103 to receive data with the requested data length through the data channel set previously and identified by the Channel Identifier from step 707, step 719. In the case of packet/datagram transmission, for example, IP BIP channel, the mobile station 103 will handle one datagram at a time. In the case that the requested data cannot be included in one TERMINAL RESPONSE command because of the APDU size limit, the mobile station 103 informs the UICC 101 of the remaining data length, e.g., step 721. In response, when ready to receive the additional data, the UICC 101 use another RECEIVE DATA to fetch the remaining data, step 723, and the mobile station 103 sends the remaining data in an additional TERMINAL RESPONSE command, step 725.
Note, with Peer IO, the mobile station 103 sends only one command:
If the data length exceeds the APDU size limit, more than one {RECEIVE DATA, TERMINAL RESPONSE} command pair in BIP case or more than one PUT PACKET command is required in Peer IO alternative embodiment. However, with Peer IO, this is hidden from the application programs 401.
6.5 Check Channel Status
The UICC 101 uses GET CHANNEL STATUS command to check the status of the communication channel. The mobile station 103 uses TERMINAL RESPONSE to return the requested channel information.
6.6 Close the Connection
Returning to
From the foregoing it will be apparent that the invention provides a novel and advantageous method for providing end-to-end reliable communication from a UICC to a remote note on the Internet without burdening the remote node with the overhead of special protocols for communication with a UICC.
Although specific embodiments of the invention has been described and illustrated, the invention is not to be limited to the specific forms or arrangements of parts so described and illustrated. For example, the invention is applicable to other resource-constrained devices and is applicable to other communications protocols. The invention is limited only by the claims.
This invention claims priority pursuant to 35 USC 119 to provisional application 60/572,021 filed on May 18, 2004. In co-pending application 10/848,738, titled “SECURE NETWORKING USING A RESOURCE-CONSTRAINED DEVICE”, filed May 19, 2004, assigned to the assignee of the present invention, and the entire disclosure of which is incorporated herein by reference, there is described a system and method for secure communication between a resource-constrained device and a remote entity over a network. In co-pending application 10/923,374, titled “A METHOD OF SUPPORTING SSL/TLS PROTOCOLS IN A RESOURCE-CONSTRAINED DEVICE”, filed Aug. 20, 2004, assigned to the assignee of the present invention, and the entire disclosure of which is incorporated herein by reference, there is described a system and method for implementing the SSL/TLS protocols on a resource-constrained device.
Number | Date | Country | |
---|---|---|---|
60572021 | May 2004 | US |