Claims
- 1. A method for securing a session over a short distance wireless link between a terminal and a user equipment, said terminal and said user equipment both comprising cryptographic computing means, said terminal and said user equipment further both comprising a display and input means, wherein said terminal and said user equipment can be connected through said short distance wireless link, said method comprising:
generating a secret in one of said terminals or said user equipments, displaying said secret or the hash value of said secret on the display of said terminal or said user equipment, entering said secret or the hash value of said secret on the input means of the other one of said terminals or user equipments, using said shared secret to guarantee the authenticity of at least a part of said session over said short distance wireless link.
- 2. The method of claim 1, wherein said cryptographic computing means in said user equipment use a smart card in said user equipment.
- 3. The method of claim 1, wherein said cryptographic computing means in said terminal are part of a browser in said terminal.
- 4. The method of claim 2, wherein said secret comprises a first random word generated in said smart card, said random word being displayed on said display of said user equipment and then entered by the user of said user equipment on said terminal, said method further comprising:
generating a challenge in said terminal, computing in said terminal a first message authentication code based on said first random word and on said first challenge, transmitting said first message authentication code over said wireless interface to said user equipment, generating a response to said challenge in said user equipment, computing in said user equipment a second message authentication code based on said first random word and on said response, transmitting said second message authentication code over said wireless interface to said terminal.
- 5. The method of claim 1, further comprising:
encrypting in said terminal at least one first message comprising said secret with the public key of said user equipment, sending said first message over said wireless interface to said user equipment, decrypting said first message in said user equipment, verifying said secret in said user equipment.
- 6. The method of claim 5, wherein said first message further comprises a second secret used for securing subsequent messages in said session.
- 7. The method of claim 6, further comprising a preliminary step of transmitting a user certificate stored in a smart card in said user equipment to said terminal over said wireless interface, said user certificate comprising said public key of said user.
- 8. The method of claim 7, wherein said first message is obtained by encrypting in said terminal said first secret and said second secret with the user public key obtained from said user certificate, said encrypted first and second secrets being decrypted in said user equipment, said second secret being used for securing at least a part of the subsequent messages in said session.
- 9. The method of claim 8, further comprising a preliminary step of sending a user identifier to said terminal, wherein said user identifier can be used to select said user certificate from the set of received certificates.
- 10. The method of claim 9, further comprising a step of comparing said first random word received in said message with the hash value of said random word that was entered before.
- 11. The method of claim 4, wherein said first challenge is computed in said terminal from the following components:
a random word generated in said terminal, a random word generated in a server with which said terminal wants to establish a secure connection, a certificate of said server, a secret computed in said terminal from another random word generated in said terminal, from said random word generated in said terminal and from said random word generated in a server.
- 12. The method of the preceding claim, wherein said response is computed from the following components:
the private key of the user stored in said smart card, a random word generated in said terminal, a random word generated in a server with which said terminals wants to establish a secure connection, a certificate of said server, a secret computed in said terminal from another random word generated in said terminal, from said random word generated in said terminal and from said random word generated in a server.
- 13. The method of claim 1, wherein said secret is generated in said terminal, said method further comprising:
entering a user identifier in said terminal, generating a first secret in said terminal, displaying a hash value computed from said secret, on the display of said terminal, entering said hash value in said user equipment, transmitting a user certificate stored in said smart card to said terminal over said wireless interface, wherein said user identifier can be obtained from said user certificate, generating said secret in said terminal, encrypting in said terminal said first secret and said second secret with the user public key obtained from said user certificate, transmitting said encrypted secrets to said user equipment, decrypting said encrypted first and second random words in said user equipment, comparing in said user equipment the hash value of said first secret with said hash value, that was entered before, generating a first challenge in said terminal, computing in said terminal a first message authentication code based on said second secret and on said first challenge, transmitting said first message authentication code to said mobile equipment, generating a response in said user equipment comprising a smart card, computing in said user equipment a second message authentication code based on said second secret and on said response, transmitting said second message authentication code over said wireless interface to said terminal.
- 14. The method of claim 13, wherein said first challenge is computed in said terminal from the following components:
a random word generated in said terminal, a random word generated in a server with which said terminal wants to establish a secure connection, a certificate of said server, a secret computed in said terminal from another random word generated in said terminal, from said random word generated in said terminal and from said random word generated in a server.
- 15. The method of claim 14, wherein said response is computed from the following components:
the private key of the user stored in said smart card, a random word generated in said terminal, a random word generated in a server with which said terminals wants to establish a secure connection, a certificate of said server, a secret computed in said terminal from another random word generated in said terminal, from said random word generated in said terminal and from said random word generated in a server.
- 16. The method of claim 1, wherein said mobile equipment is a digital mobile phone.
- 17. The method of claim 16, wherein said wireless interface is a Bluetooth interface.
- 18. The method of claim 16, wherein said wireless interface is a HomeRF interface.
- 19. The method of claim 16, wherein said wireless interface is an IrdA interface.
- 20. A smart card having thereon a computer program comprising instructions to be executed by processing means in said smart card for causing the smart card to perform a process comprising at least the following steps:
generating a secret, preparing an instruction for displaying said secret on the display of the equipment in which said smart card may be used, waiting until a broadcast message arrives, checking if said secret has been used for computing said broadcast message.
- 21. The smart card of claim 20, further comprising a random number generator, said secret being generated by said random number generator.
- 22. The smart card of claim 20, said process further comprising the following steps:
if said secret has been used for computing said broadcast message, computing a response to said broadcast message, preparing an instruction for sending said response to the sender of said broadcast message.
- 23. The smart card of claim 22, said secret being used for computing said response.
- 24. The smart card of claim 22, further comprising a counter, the value in said counter being modified each time one of said broadcast message arrives, said response being sent only if the value in said counter has not reached a predetermined limit.
- 25. The smart card of claim 20, further comprising a GSM-part.
- 26. A computer program on a carrier and comprising computer executable instructions for causing a computer including a short distance wireless interface to execute a process comprising the following steps:
getting a message to be sent over said wireless interface, getting a secret entered by a user on the input means of said computer, computing a message authentication code from said message using said secret, broadcasting said message authentication code listening on said wireless interface until a message arrives, verifying if the message has been computed with said secret.
- 27. A computer program on a carrier and comprising computer executable instructions for causing a computer including a short distance wireless interface to execute a process comprising the following steps:
generating a first secret, displaying said secret, or the hash value of said secret, on the display of said computer, listening on said wireless interface until a broadcast message arrives, extracting a public key from said broadcast message, generating a second secret, encrypting said first and said second secret with said public key, sending said encrypted first and second secret to the sender of said broadcast message, listening on said wireless interface until a second message arrives, checking if said second secret has been used for computing said second message. A smart card having thereon a computer program comprising instructions to be executed by processing means in said smart card for causing the smart card to perform a process comprising at least the following steps:
getting a first secret entered in said smart card via the keypad of a user equipment, broadcasting a user certificate stored in said smart card, waiting for a message, decrypting said message with the private key of the user extracting a second secret from said message, verifying if the sender of said message knows said first secret, computing a response with said second secret.
- 28. The smart card of claim 28, said process further comprising the following steps:
if said secret has been used for computing said broadcast message, computing a response to said broadcast message, preparing an instruction for sending said response to the sender of said broadcast message.
- 29. The smart card of claim 29, said secret being used for computing said response.
- 30. The smart card of claim 28, further comprising a GSM-part.
Parent Case Info
[0001] This application is a continuation application of PCT/EP00/09121 filed on Sep. 9, 2000, whose content is included by reference. It claims priority of European Patent Application EP00109220.4, filed Apr. 28, 2000, whose content is included by reference.
Continuations (1)
|
Number |
Date |
Country |
| Parent |
PCT/EP00/09121 |
Sep 2000 |
US |
| Child |
10260590 |
Sep 2002 |
US |