The accompanying drawings illustrate a preferred embodiment of the invention. In the drawings,
The SIM card 100 is arranged for use with a mobile communication terminal (not illustrated) such as a GSM enabled mobile telephone. The SIM card 100 comprises a processing device 110, a memory device 120, an I/O device 130, corresponding to a regular SIM controller 108 with regular SIM functionality.
The I/O device 130 comprises an interface between the SIM card and the mobile communication terminal, typically including electric connections provided on the surface of the SIM card.
The memory device 120 may comprise volatile and non-volatile memory portions, such as, e.g., RAM, ROM, EEPROM, and Flash memory.
The SIM card 100 also comprises a wireless communication device 140, in particular an interrogatable transponder 140.
The interrogatable transponder 140 is an active RFID tag. The transponder 140 is operatively controllable by the processing device 110, indicated by the line referred to by I/O. This communication line between the processing unit 110 and the transponder 140 enables the SIM card 100 to trigger events in the RFID tag and vice versa. It could also transmit certain amounts of data.
In particular, the power of the transponder 140 is controlled by the processing device 110, giving the possibility of turning the tag on and off as desired, operatively controlled by the processing device 110.
More specifically, the transponder may be operatively enabled or disabled, controlled by an on/off signal provided by the mobile communication terminal via the I/O device 130.
In one embodiment, the on/off signal is provided by a user via a user interface, such as a keyboard, in the mobile terminal. In another embodiment, the on/off signal is provided to the mobile communication terminal by a mobile communication operator, in particular by a command transmitted to the mobile communication terminal by the operator.
In either case, the resulting remote enabling/disabling function of the RFID tag involves a security improvement, as the existing problem of tracing or copying continuously activated RFID tags may be overcome or reduced.
The transponder 140 comprises identification data contained in a memory 144. The identification data may be configured or set by the processing device 110.
In particular, the identification data is provided to the transponder by the mobile communication terminal via the I/O device 130.
The identification data is preferably transmitted to the mobile communication terminal by a mobile communication operator.
By this feature, the identification data stored in the RFID tag may be changed or re-written with new data supplied and transmitted by the mobile communication operator. This leads to the useful result that if the RFID tag is illegally/fraudulently copied, the operator will have the possibility of writing a new ID into the RFID tag without having to physically change the SIM card.
The memory 144 may comprise volatile and non-volatile memory portions, such as, e.g., RAM, ROM, EEPROM, and Flash memory.
When the transponder 140 is interrogated by an external interrogating RF device (not illustrated), the transponder 140 is arranged to transmit, via the antenna 150, a RF signal coded with the identification data contained in the memory 144.
This embodiment mainly corresponds to the embodiment illustrated in
The SIM card 200 is arranged for use with a mobile communication terminal (not illustrated) such as a GSM enabled mobile telephone.
The memory device 220 may comprise volatile and non-volatile memory portions, such as, e.g., RAM, ROM, EEPROM, and Flash memory.
The SIM card 200 also comprises a wireless communication device 140, in particular an interrogatable transponder 140, comprising an antenna 250 and the RFID functionality provided by the processing device 210, the memory devices 220 and the I/O devices 230.
The interrogatable transponder 240 constitutes an active RFID tag, operatively controllable by the processing device 210.
The transponder 240 comprises identification data contained in the memory 220. The identification data may be configured or set by the processing device 210.
When the transponder 240 is interrogated by an external interrogating RF device (not illustrated), the transponder 240 is arranged to transmit, via the antenna 250, a RF signal coded with the identification data contained in the memory 220.
This second embodiment is made possible since the basic architecture of both active RFID tags and SIM cards are so similar. This embodiment proposes a slightly more powerful SIM card controller with an external RFID antenna. In this case there is no need for communication between two separate cards or modules. As appears from
A mobile terminal 300, such as a mobile telephone 300, is provided with a subscriber identity module as disclosed above.
The mobile terminal 300 brings many new opportunities by merging the services typically provided by RFID tags with the infrastructure provided by GSM.
The idea is that events initiated by the RFID will trigger events in the mobile phone and its services, and vice versa.
Adopting the RFID technology in the SIM cards used in mobile phones avoids many practical problems that IrDA and Bluetooth have, such as pairing and alignment, bringing a fast, easy and secure way to wirelessly interact with other systems.
The method is a Public Key Infrastructure (PKI) based process for execution by a subscriber identity module, i.e. for execution by the processing device in such a subscriber identity module, according to the invention. The purpose of the method is to provide secure data communication between the subscriber identity module and an external interrogating device, such as, e.g., a RFID reader (an RFID communication/interrogation device) of a door access system.
The method utilizes a private key stored in SIM card with the purpose of providing a secure communication between the external communication device and the RFID transponder included in the SIM card. This means that the RFID transponder and thus the RFID enabled SIM card can make use of the entire PKI infrastructure that is already behind the SIM card to increase the communication security between the RFID tag and the reader.
When a RFID transponder identifies itself to an external reader, the reader will then have enough information to retrieve the correspondent mobile phone's public key in order to start a communication session with the tag and possibly exchange a shared key to encrypt further communication between the tag and the reader.
The subscriber identity module or SIM card is operatively arranged in a mobile terminal such as a GSM mobile telephone. The SIM card comprises, in accordance with the detailed description of one of the embodiments disclosed in
The method starts at the initiation step 400. The method further comprises the following steps, preferably performed in the indicated order:
In step 410, the RFID part of the SIM card is interrogated by the external interrogating device. Upon this interrogation, as a result of the interrogation, the SIM card transmits the identification data.
Next, in step 420, an encrypted message is received from the external communication device. The message is encrypted with a public key associated with the identification data transmitted in the foregoing step 410. The public key is provided by the external interrogating device, preferably by a search in a database, in order to match the identification with the corresponding public key.
Next, in step 430, the encrypted message is decrypted using the private key.
Next, in step 440, the decrypted message is used as a shared key.
In step 450 this shared key is used to encrypt further data communication between the subscriber identity module and the external interrogating device.
In particular, the encryption is performed by using a predetermined symmetric key algorithm such as 3DES, which is supported by the SIM card and the reader.
The physical dimensions and connection terminals of the SIM card 200 is preferably designed in accordance with the starndards GSM 11.11 and ISO 7816, and thus, they are not further described in the present specification. The antenna 250 is realised as a wire loop extending along the edge of the card 200, preferably as a multiturn loop. The number of turns is preferably 3, as illustrated in
Use examples
The following examples illustrate useful applications for the present invention.
Access Control Use
The SIM card according to the invention may be used as an authentication token for an access control system. Likewise, a mobile terminal which includes a SIM card according to the invention may also be used as an authentication token for an access control system.
In such an exemplary use scenario, a mobile phone equipped with an RFID enabled SIM card according to the invention is detected by an RFID reader at a door which is provided with an access control system. A number received by the RFID reader at the door is recognized in the access control system as a valid number, which means that the mobile telephone is a registered telephone in the access control system. The access control system will then send a challenge to the phone via the GSM network. The user is asked to type a PIN number, if the PIN number is correct a signal is sent via RFID and the door is opened. In this case the user is authenticated with something he has (mobile phone with RFID tag) with something he has (PIN number).
Mobile Commerce Use
The SIM card according to the invention may be used as an authentication token for a mobile commerce system such as the Telenor MobilHandel. Likewise, a mobile terminal which includes a SIM card according to the invention may also be used as an authentication token for such a mobile commerce system.
In such an exemplary use scenario, a user, provided with a mobile phone equipped with an RFID enabled SIM card according to the invention, is located in front of a cash register in a commerce establishment. After deciding which good he wants to purchase, the RFID tag in the mobile phone is read by the machine, and since the machine now knows to which phone number this tag belongs to, a request for purchase is sent via GSM using a M-Commerce service to the mobile phone. The user will then accept the transaction typing his PIN number, which is then sent back to the M-Commerce service and back to the cash register where the goods are dispensed.
In both above cases the RFID tag number is directly linked with the mobile phone number in a central database. So whenever the tag is detected most of the services provided by a mobile phone can potentially be used.
The SIM card according to the invention, or a mobile terminal which includes a SIM card according to the invention, may be used as an authentication token for other purposes as well.
Electronic Key Scenario
In an electronic key scenario, an electronic key is sent to a mobile phone through an SMS. A door is controlled by an access control system which is configured to recognize an RFID enabled SIM card in a mobile telephone, according to the invention. The access control system is further configured to recognize the electronic key when the mobile phone is present. When the user arrives at the door, holding the mobile phone which exposes both values (key and RFID number) the door will automatically be opened.
Security and Privacy Use
When a mobile phone is stolen, the RFID enabled SIM card can be deactivated remotely, avoiding any possible misuse. The RFID enabled SIM card could also be deactivated through the mobile phone to avoid been detected when this is not wanted.
Business Issues
The invention solves a problem for any business that wishes to adopt the RFID technology, in a way that there will not be a need to distribute RFID cards to the user, because potentially everyone with a mobile phone will already have a card.
Users will also benefit from such solution in a way that they will only need to carry their mobile phones in order to authenticate towards different services.
As most of the services offered by mobile phones, one of the biggest barriers to adopt the solution is that the market penetration has to be big enough to present an attractive alternative to already established businesses. This means that the solution should be able to function properly in all the mobile phones, and this is never an easy task.
Users will also have to renew their SIM cards, and this is implies a cost for Mobile Operators.
The above detailed description has explained the invention by way of example. A person skilled in the art will realize that numerous variations and alternatives to the detailed embodiment exist within the scope of the invention, as set forth by the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
20041347 | Mar 2004 | NO | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/NO05/00102 | 3/21/2005 | WO | 00 | 1/19/2007 |