Method for exporting on a secure server data comprised on a UICC comprised in a terminal

Information

  • Patent Grant
  • 9294919
  • Patent Number
    9,294,919
  • Date Filed
    Monday, December 5, 2011
    12 years ago
  • Date Issued
    Tuesday, March 22, 2016
    8 years ago
Abstract
A method for exporting on a UICC in a terminal. An export request signed by the UICC, is transmitted by the terminal to a secure server. The server verifies the signed export request by comparing the signature and the identity of the UICC. The server sends a signed export certificate to the UICC via the terminal. An export package containing the data is prepared, signed and encrypted by the UICC, and sent to the terminal. The terminal transmits the export package to the server. The server signs an acknowledgment message and transmits it to the UICC via the terminal. In the UICC, the data that have been exported is destroyed, and a signed acknowledge message is sent to the server via the terminal. The server makes the data available for a further transfer to a new terminal or UICC.
Description

The present invention relates to a method for exporting on a secure server data comprised on a UICC (Universal Integrated Circuit Card) comprised in a terminal.


Secure elements, like UICCs, embed Sim applications. The secure elements can be installed, fixedly or not, in terminals, like for example mobile phones. In some cases, the terminals are constituted by machines that communicate with other machines for M2M (Machine to Machine) applications.


A UICC can be in the format of a smart card, or may be in any other format such as for example but not limited to a packaged chip as described in PCT/SE2008/050380, or any other format. It can be used in mobile terminals in GSM and UMTS networks for instance. The UICC ensures network authentication, integrity and security of all kinds of personal data.


In a GSM network, the UICC contains mainly a SIM application and in a UMTS network it is the USIM application. A UICC may contain several other applications, making it possible for the same smart card to give access to both GSM and UMTS networks, and also provide storage of a phone book and other applications. It is also possible to access a GSM network using an USIM application and it is possible to access UMTS networks using a SIM application with mobile terminals prepared for this. With the UMTS release 5 and later stage network like LTE, a new application, the IP multimedia Services Identity Module (ISIM) is required for services in the IMS (IP Multimedia Subsystem). The telephone book is a separate application and not part of either subscription information module.


In a CDMA network, the UICC contains a CSIM application, in addition to 3GPP USIM and SIM applications. A card with all three features is called a removable user identity card, or R-UIM. Thus, the R-UIM card can be inserted into CDMA, GSM, or UMTS handsets, and will work in all three cases.


In 2G networks, the SIM card and SIM application were bound together, so that “SIM card” could mean the physical card, or any physical card with the SIM application.


The UICC smart card consists of a CPU, ROM, RAM, EEPROM and I/O circuits. Early versions consisted of the whole full-size (85×54 mm, ISO/IEC 7810 ID-1) smart card. Soon the race for smaller telephones called for a smaller version of the card.


Since the card slot is standardized, a subscriber can easily move their wireless account and phone number from one handset to another. This will also transfer their phone book and text messages. Similarly, usually a subscriber can change carriers by inserting a new carrier's UICC card into their existing handset. However, it is not always possible because some carriers (e.g. in U.S.) SIM-LOCK the phones that they sell, thus preventing competitor carriers' cards being used.


The integration of the ETSI framework and the Application management framework of Global Platform is standardized in the UICC configuration.


UICCs are standardized by 3GPP and ETSI.


A UICC can normally be removed from a mobile terminal, for example when the user wants to change his mobile terminal. After having inserted his UICC in his new terminal, the user will still have access to his applications, contacts and credentials (network operator).


It is also known to solder or weld the UICC in a terminal, in order to get it dependent of this terminal. This is done in M2M (Machine to Machine) applications. The same objective is reached when a chip (a secure element) containing the SIM or USIM applications and files is contained in the terminal. The chip is for example soldered to the mother-board of the terminal or machine and constitutes an e-UICC.


The present invention also applies to such soldered UICCs or to such chips containing the same applications than the chips comprised in UICCs. A parallel can be done for UICCs that are not totally linked to devices but that are removable with difficulty because they are not intended to be removed, located in terminals that are distant or deeply integrated in machines. A special form factor of the UICC (very small for example and therefore not easy to handle) can also be a reason to consider it as in fact integrated in a terminal. The same applies when a UICC is integrated in a machine that is not intended to be opened. Such a welded UICC or chips containing or designed to contain the same applications than UICCs will generally be called embedded UICCs or embedded secure elements (in contrast to removable UICCs or removable secure elements). This also applies to UICCs or secure elements that are removable with difficulty.


The present invention concerns the export of sensitive data out of a secure component (UICC chip) to be sent into a secure vault (e.g. a secure server), with no risk of cloning the data, and no direct data link between the UICC and the secure server. More precisely, the invention concerns a method for exporting on a secure server data comprised on a UICC comprised in a terminal.


When changing terminals, like mobile terminals, for example mobile phones, wireless terminals or connected terminals, users want the facility to keep along the services that were enable in their old terminal. These services, such as the cellular services or banking services, are relying on keys and sensitive data loaded in a UICC of the terminal.


If the secure component (UICC) is removable, such as a classic SIM card, and if the new terminal supports such a removable component, then the user can just remove the secure component from the old terminal and insert it in the new terminal.


But if the UICC is not removable (embedded UICC) or if the new terminal does not support this type of component, then there are needs to be a way to move all the keys and data related to that service to the secure component of the new terminal.


Another problem that arises in the case of embedded UICCs is that the old and the new terminal are sometimes not available at the same time. The user wants to secure its sensitive (personal) data and keys before buying his new terminal.


The invention provides a way to securely export the keys and data related to a service to a secure vault, for further download into another (or the same) terminal, in such a way that the keys and data cannot be cloned.


Furthermore, the invention addresses the problem that it may not be possible to establish a direct IP link between the secure vault and the secure component.


To this purpose, the present invention proposes a method for exporting on a secure server data comprised on a UICC comprised in a terminal. The method consists in:

    • On export request, signing an export request by the UICC, the signed export request being transmitted by the terminal to the server;
    • Verifying, at the level of the server, the signed export request by comparing the signature and the identity of the UICC;
    • If the verification is positive, sending by the server an signed export certificate to the UICC via the terminal;
    • Verifying the export certificate in the UICC and, if positive, preparing an export package containing the data, the export package being signed and encrypted by the UICC;
    • Sending the export package to the terminal; and set the exported data as “unusable” in the UICC;
    • Transmitting from the terminal to the server the export package;
    • Receive the package and verify the signature at the level of the server;
    • Signing an acknowledgment message and transmit it to the UICC via the terminal;
    • In the UICC, verifying the acknowledgment message and, if the signature of the server is recognized, destroying the data that have been exported and sending a signed acknowledge message to the server via the terminal;
    • Verifying the signature of the acknowledge message in the server and, if the signature is recognized, making the data available for a further transfer to a new terminal or UICC.


The UICC is preferably embedded in the terminal and the export request is preceded by a selection of the data to be exported.







The invention will be better understood by reading the following description of FIG. 1 representing a flow chart of a preferred embodiment of the present invention.


The invention integrates an asynchronous connection between the secure component (UICC) and the secure vault constituted for example by a remote server.


In FIG. 1, the end-user of a terminal selects first the data to be exported. These data are for example phone numbers or private keys that the user wants to secure for being able to transfer them later on another (or the same) terminal.


This can be done by selecting an application id or a service id on the UICC. This can be done by the user through an application on the terminal, or automatically through the terminal. This corresponds to an export request formulated by the end-user. Such an export request could also be formulated by the remote server or by the terminal.


Optionally, when selecting the data/service to be exported from the UICC, the user/terminal may have to present a code or to authenticate towards the UICC or the service in order to get access to the data.


The terminal then initiates the export session on the secure component by sending him an “INIT EXPORT SESSION” order.


In response, the UICC returns a “Signed Export request” to the terminal. This request is uniquely identified and signed by the UICC.


The “Signed Export request” is transmitted asynchronously to the server through a network, like an IP, cellular, OTA or OTI network.


At reception, the server verifies the “signed export request”, by comparing the signature and the identity of the UICC. The invention does not mandate any particular security scheme, but requires that the server can verify the signature of the UICC.


The server generates then an “Export Certificate”. This certificate is uniquely signed by the server, and uniquely identifies the UICC. With this certificate, the server confirms that the UICC is genuine, and that the export process can be initiated.


The “Export certificate” is transmitted asynchronously to the UICC by the terminal.


The UICC then verifies the “Export Certificate”. The invention does not specify a particular security scheme, but the UICC must have the ability to verify a signature from the server.


The UICC increases an “Export Counter”. This counter is maintained by the UICC.


The UICC prepares an “Export Package”. This export package is encrypted and signed by the UICC. In addition, the “Export Package” includes the “Export Counter”. The Export Package is sent to the terminal. If necessary (as shown in the diagram), due to I/O limitation between the terminal and the UICC, the Export Package can be sent through multiple commands. After having been sent to the terminal, the image of the transmitted package kept at the level of the UICC is rendered inactive (for avoiding a possible duplication of the package).


The “Export Package” is then transmitted asynchronously to the server. Since it is encrypted, only the server can read it.


Once received, the server decrypts and verifies the Export Package. For each UICC, the server maintains a copy of the Export counter. The Export Counter in the Export Package must be higher than the copy of the export counter maintained by the server, otherwise the export package is rejected. Once the export package has been accepted, the server updates its copy of the Export Counter to match the value in the Export Package.


The server then generates a Signed Ack. This Ack is uniquely signed by the server, and includes the value of the export counter. When having sent this command, the received package is rendered inactive at the level of the server.


The Signed Ack is transmitted asynchronously to the UICC (i.e. through the terminal).


The UICC verifies the received Signed Ack and, if it matches, destroys its copy (image) of the data that have been exported.


The UICC then generates a Signed Destroy Ack, which is uniquely signed by the UICC, and includes the value of the export counter.


The Signed Destroy Ack is transmitted asynchronously to the server.


The server then verifies the Signed Destroy Ack. If it matches, the exported data are available to be imported into another UICC in a new terminal or in the same one later.


The advantages of the present invention are the following:

    • At every point of the process, the invention provides a nice way to interrupt and rollback the process. Therefore there is no risk of losing the data.
    • All the process can be done through an asynchronous connection (such as e-mail). There is no need for the UICC to be directly connected to the server.
    • It is not possible to have cloned information. The data are available in the server only after confirmation that they have been destroyed in the UICC.

Claims
  • 1. A method for exporting on a secure server data comprised on a UICC in a terminal, said method comprising: on export request, signing an export request by said UICC, said signed export request being transmitted by said terminal to said server;verifying, at the level of said server, said signed export request by comparing the signature and the identity of said UICC;if said verification is positive, sending by said server a signed export certificate to said UICC via said terminal;verifying said export certificate in said UICC and, if said verification is positive, preparing an export package containing said data, said export package being signed and encrypted by said UICC;sending said export package to said terminal and setting the exported data as “unusable” in the UICC;transmitting from said terminal to said server said export package;receiving said package and verifying said signature at the level of said server;signing an acknowledgment message and transmitting it to said UICC via said terminal;in said UICC, verifying said acknowledgment message and, if the signature of said server is recognized, destroying the data that have been exported and sending a signed acknowledge message to said server via said terminal; andverifying the signature of said acknowledge message in said server and, if said signature is recognized, making said data available for a transfer.
  • 2. A method according to claim 1, wherein said UICC is embedded in said terminal.
  • 3. A method according to claim 1, wherein said export request is preceded by a selection of the data to be exported.
Priority Claims (1)
Number Date Country Kind
10306359 Dec 2010 EP regional
Parent Case Info

This disclosure is a national phase of PCT/EP2011/071778, a continuation of U.S. application Ser. No. 13/312,309, filed Dec. 6, 2011, and claims priority of European Application No. 10306359.0, filed Dec. 6, 2010, the disclosures of which are hereby incorporated by reference.

PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/EP2011/071778 12/5/2011 WO 00 12/11/2013
Publishing Document Publishing Date Country Kind
WO2012/076480 6/14/2012 WO A
US Referenced Citations (56)
Number Name Date Kind
6978152 Yamaashi et al. Dec 2005 B1
7024390 Mori et al. Apr 2006 B1
7146161 Chou Dec 2006 B2
7349719 Buniatyan Mar 2008 B2
7363056 Faisy Apr 2008 B2
20020186845 Dutta et al. Dec 2002 A1
20040131186 Kasuya et al. Jul 2004 A1
20040235523 Schrire et al. Nov 2004 A1
20050021875 Bouthemy et al. Jan 2005 A1
20050164737 Brown Jul 2005 A1
20050186954 Kenney Aug 2005 A1
20050239504 Ishii et al. Oct 2005 A1
20050266883 Chatrath Dec 2005 A1
20060049243 Sakamura et al. Mar 2006 A1
20060079284 Lu et al. Apr 2006 A1
20060086785 Sakata Apr 2006 A1
20060196931 Holtmanns et al. Sep 2006 A1
20060199614 Hyacinthe Sep 2006 A1
20070105532 Martin et al. May 2007 A1
20070239857 Mahalal et al. Oct 2007 A1
20080090614 Sicher et al. Apr 2008 A1
20080130879 Heinonen et al. Jun 2008 A1
20080261561 Gehrmann Oct 2008 A1
20080292074 Boni et al. Nov 2008 A1
20080319823 Ahn et al. Dec 2008 A1
20090159692 Chew et al. Jun 2009 A1
20090163175 Shi et al. Jun 2009 A1
20090191857 Horn et al. Jul 2009 A1
20090191917 Zappulla et al. Jul 2009 A1
20090191918 Mardiks Jul 2009 A1
20090215431 Koraichi Aug 2009 A1
20090217348 Salmela et al. Aug 2009 A1
20090307142 Mardikar Dec 2009 A1
20100179907 Atkinson Jul 2010 A1
20110028126 Lim et al. Feb 2011 A1
20110035584 Meyerstein et al. Feb 2011 A1
20110059773 Neumann et al. Mar 2011 A1
20110126183 Bernard et al. May 2011 A1
20110136482 Kaliner Jun 2011 A1
20110237190 Jolivet Sep 2011 A1
20110302641 Hald et al. Dec 2011 A1
20110320600 Froeding et al. Dec 2011 A1
20120028609 Hruska Feb 2012 A1
20120108295 Schell et al. May 2012 A1
20120113865 Zhao et al. May 2012 A1
20120190354 Merrien et al. Jul 2012 A1
20120297473 Case et al. Nov 2012 A1
20130318355 Girard et al. Nov 2013 A1
20130324091 Girard et al. Dec 2013 A1
20130329683 Berard et al. Dec 2013 A1
20140019760 Vergnes et al. Jan 2014 A1
20140024343 Bradley Jan 2014 A1
20140031083 Vergnes et al. Jan 2014 A1
20140057680 Proust et al. Feb 2014 A1
20140066011 Bradley Mar 2014 A1
20140141747 Merrien et al. May 2014 A1
Foreign Referenced Citations (57)
Number Date Country
101080051 Nov 2007 CN
101179401 May 2008 CN
101309518 Nov 2008 CN
10 2008 033 976 Jan 2010 DE
1 650 717 Apr 2006 EP
1 965 596 Sep 2008 EP
2 056 523 May 2009 EP
2 076 071 Jul 2009 EP
2 871 020 Dec 2005 FR
2 457 221 Aug 2009 GB
2002-236572 Aug 2002 JP
2005-323128 Nov 2005 JP
2006-050554 Feb 2006 JP
2006-107316 Apr 2006 JP
2008-519343 Jun 2008 JP
2010-501092 Jan 2010 JP
2010-532107 Sep 2010 JP
2011-525311 Sep 2011 JP
2012-528534 Nov 2012 JP
2002-0066032 Aug 2002 KR
2003-0044260 Jun 2003 KR
10-0489783 May 2005 KR
10-2005-0095424 Sep 2005 KR
2007-0095048 Sep 2007 KR
10-2008-0014285 Feb 2008 KR
10-2008-0015870 Feb 2008 KR
10-2009-0056019 Jun 2009 KR
10-2010-0095648 Aug 2010 KR
10-2010-011642 Oct 2010 KR
02082715 Oct 2002 WO
03104997 Dec 2003 WO
2004021296 Mar 2004 WO
2007058241 May 2007 WO
2008128874 Oct 2008 WO
WO 2008123827 Oct 2008 WO
2009055910 May 2009 WO
2009092115 Jul 2009 WO
2009091837 Jul 2009 WO
2009095295 Aug 2009 WO
2009103623 Aug 2009 WO
2009141024 Nov 2009 WO
2009141035 Nov 2009 WO
2009149788 Dec 2009 WO
2010052332 May 2010 WO
2010068016 Jun 2010 WO
2010138592 Dec 2010 WO
2011139795 Nov 2011 WO
2011159549 Dec 2011 WO
2012012526 Jan 2012 WO
2012058092 May 2012 WO
2012058099 May 2012 WO
2012058429 May 2012 WO
2012058446 May 2012 WO
2012058450 May 2012 WO
2012061516 May 2012 WO
2012061561 May 2012 WO
2012065112 May 2012 WO
Non-Patent Literature Citations (56)
Entry
Office Action (Notice of Reasons for Rejection) issued on Aug. 19, 2014, by the Japan Patent Office in Japanese Patent Application No. 2013-542497, and an English Translation of the Office Action. (9 pages).
Office Action (Notice of Preliminary Rejection) issued on Jun. 27, 2014, by the Korean Intellectual Property Office, in Korean Patent Application No. 10-2013-7017637, and an English Translation of the Office Action. (7 pages).
Office Action (Notice of Preliminary Rejection) issued on Aug. 19, 2014, by the Korean Intellectual Property Office in Korean Patent Application No. 10-2013-7016486, and an English Translation of the Office Action. (6 pages).
Office Action (Notice of Reasons for Rejection) issued on Aug. 5, 2014, by the Japan Patent Office in Japanese Patent Application No. 2013-542474, and an English Translation of the Office Action. (4 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,823, mailed Jan. 5, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (25 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,846, mailed Feb. 10, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (26 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,065, mailed Dec. 18, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (26 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,744, mailed Dec. 12, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (33 pages).
Notice of Allowance issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,752, mailed Jan. 21, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (30 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,766, mailed Mar. 17, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (33 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,039, mailed Mar. 17, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (35 pages).
Office Action (Notice of Preliminary Rejection) issued on Feb. 25, 2015, by the Korean Patent Office in Korean Patent Application No. 10-2013-0717638, and an English Translation of the Office Action. (7 pages).
International Search Report (PCT/ISA/210) issued on Feb. 15, 2012, by the European Patent Office as the International Searching Authority for International Application No. PCT/EP2011/071778.
Written Opinion (PCT/ISA/237) issued on Feb. 15, 2012, by the European Patent Office as the International Searching Authority for International Application No. PCT/EP2011/071778.
English translation of Office Action issued by the Korean Patent Office on Aug. 28, 2014 in corresponding Korean Application No. 10-2013-7016004. (3 pages).
English translation of Office Action issued by the Korean Patent Office on Apr. 16, 2015 in corresponding Korean Application No. 10-2013-7016004. (2 pages).
Office Action issued by the Russian Patent Office dated Dec. 29, 2014 in corresponding Russian Application No. 2013131034, and English translation of Office Action. (6 pages).
Partial European Search Report issued on Jul. 22, 2011, by the European Patent Office in the European Application No. 10 30 6359. (7 pages).
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Apr. 15, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542477. (3 pages).
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set; An example algorithm set for the 3GPP authentication and key generation functions f1 , f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm Specification (Release 11)”, 3GPP TS 35.206 V11.0.0 (Sep. 2012), pp. 1-31.
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Feasibility Study on Remote Management of USIM Application on M2M Equipment; (Release 8)”, 3GPP TR 33.812 V1.0.0 (Sep. 2008), pp. 1-80.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 22, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071674. (8 pages).
Madlmayr et al., “The Benefit of using SIM Application Toolkit in the Context of Near Field Communication Applications” International Conference on the Management of Mobile Business, (Jul. 2007), (8 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071660. (6 pages).
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Jun. 17, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542492. (3 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Mar. 28, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071737. (6 pages).
An English Translation of the Office Action (Notice of Reasons for Rejection) issued on Apr. 30, 2014, by the Japan Patent Office in the Japanese Patent Application No. 2013-542496. (2 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071781. (11 pages).
“Smart Cards; Card Application Toolkit (CAT) (Release 9)”, ETSI TS 102 223, vol. SCP TEC, No. V9.2.0, (Oct. 1, 2010), pp. 1-209.
“IP Based Over-the Air Handset Configuration Management (IOTA-HCM), 3rd Generation Partnership Project 2 3GPP2”, 3GPP2 C.S0040, Version 1.0, Jul. 18, 2003, pp. 1-68.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 22, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071675. (12 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 4, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071731. (12 pages).
“3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service aspects; Service principles (Release 11)”, 3GPP TS 22.101 V11.0.0 (Sep. 2010), pp. 1-60.
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 16, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071919. (7 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Feb. 27, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071664. (8 pages).
Written Opinion of the International Preliminary Examining Authority (Form PCT/IPEA/408) issued on Dec. 13, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071664. (5 pages).
Notification of Transmittal of the International Preliminary Report on Patentability (Forms PCT/IPEA/416 and PCT/IPEA/409) issued on Mar. 8, 2013, by the European Patent Office in the International Application No. PCT/EP2011/071664. (14 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 12, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071695 and comments filed by the Applicant on May 31, 2012. (10 pages).
International Search Report (Form PCT/ISA/210) and the Written Opinion of the International Searching Authority (Form PCT/ISA/237) issued on Apr. 5, 2012, by the European Patent Office in the International Application No. PCT/EP2011/071785. (9 pages).
Vergnes et al., U.S. Appl. No. 13/992,103, entitle “Method for Exporting Data of a Javacard Application Stored in a UICC to a Host” filed Jun. 6, 2013.
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/312,309, mailed Sep. 25, 2013, U.S. Patent and Trademark Office, Alexandria, VA. (13 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/312,309, mailed Apr. 24, 2014, U.S. Patent and Trademark Office, Alexandria, VA. (13 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,744, mailed Jun. 2, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (35 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,823, mailed Jul. 13, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (21 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,912, mailed Jul. 23, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (45 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,103, mailed Jul. 13, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (42 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,065, mailed Jul. 30, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (32 pages).
Office Action issued by the Chinese Patent Office on Aug. 19, 2015 in corresponding Chinese Application No. 201180058922.2, and English language translation of Office Action (16 pages).
Office Action issued by the Chinese Patent Office on Nov. 4, 2015 in corresponding Chinese Application No. 201180058688.3 (5 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,766, mailed Oct. 1, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (27 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/992,039, mailed Oct. 1, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (28 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 13/991,846, mailed Oct. 15, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (23 pages).
Office Action issued by the U.S. Patent and Trademark Office in the U.S. Appl. No. 14/603,889, mailed Oct. 23, 2015, U.S. Patent and Trademark Office, Alexandria, VA. (36 pages).
Office Action issued by the Chinese Patent Office on Aug. 27, 2015 in corresponding Chinese Application No. 201180058683.0, and English language translation of Office Action. (17 pages).
Office Action issued by the U.S. Patent and Trademark Office in U.S. Appl. No. 13/992,103, mailed Nov. 25, 2015, U.S. Patent and Trademark Office, Alexandria, VA (22 pages).
Office Action issued Nov. 17, 2015 by the Chinese Patent Office in corresponding Chinese Patent Application No. 201180058925.6 (10 pages).
Related Publications (1)
Number Date Country
20140122872 A1 May 2014 US
Continuation in Parts (1)
Number Date Country
Parent 13312309 Dec 2011 US
Child 13991689 US