CA2332283A1 - Method for accessing an object using a "web" browser cooperating with a smart card, and architecture for implementing the method - Google Patents
Method for accessing an object using a "web" browser cooperating with a smart card, and architecture for implementing the method Download PDFInfo
- Publication number
- CA2332283A1 CA2332283A1 CA002332283A CA2332283A CA2332283A1 CA 2332283 A1 CA2332283 A1 CA 2332283A1 CA 002332283 A CA002332283 A CA 002332283A CA 2332283 A CA2332283 A CA 2332283A CA 2332283 A1 CA2332283 A1 CA 2332283A1
- Authority
- CA
- Canada
- Prior art keywords
- object file
- network
- interface means
- embedded system
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/105—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/59—Providing operational support to end devices by off-loading in the network or by emulation, e.g. when they are unavailable
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/289—Intermediate processing functionally located close to the data consumer application, e.g. in same machine, in same home or in same sub-network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
Abstract
The invention relates to a method and an architecture for securely accessing virtual objects (Obv i) distributed in systems connected to the internet network (RI), and for obtaining an instance of same. This access is performed via a smart card (2a), through a "web" browser (10).
The terminal (1) and the smart card (2a) each comprise a specific protocol layer (13, 23a). The latter comprises intelligent agents (132, 232a1) for establishing two-way data exchange sessions, thereby allowing the smart card (2a) to have a"web" server functionality. The smart card (2a) also comprises intelligent agents, called script translators, and a virtual file management system (8) cooperating with a specialized script-translating intelligent agent (7).
Each virtual object (Obv,) is associated with a virtual file of the virtual file management system (8). The specialized intelligent agent (7) presents the browser (10) with a list of the accessible virtual objects (Obv i) and generates methods for accessing these objects.
The terminal (1) and the smart card (2a) each comprise a specific protocol layer (13, 23a). The latter comprises intelligent agents (132, 232a1) for establishing two-way data exchange sessions, thereby allowing the smart card (2a) to have a"web" server functionality. The smart card (2a) also comprises intelligent agents, called script translators, and a virtual file management system (8) cooperating with a specialized script-translating intelligent agent (7).
Each virtual object (Obv,) is associated with a virtual file of the virtual file management system (8). The specialized intelligent agent (7) presents the browser (10) with a list of the accessible virtual objects (Obv i) and generates methods for accessing these objects.
Claims (15)
1. Embedded system, equipped with a chip comprising information processing means and information storage means and designed to cooperate with a network through a terminal, characterized in that:
- it stores at least one object file containing information associated with an object located in the network and making it possible to create an instance of this object;
- it comprises network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network; and - it comprises object file interface means, designed to establish a correspondence between information passing through the network interface means and assigned to at least said object file, and information exchanged with said object file.
- it stores at least one object file containing information associated with an object located in the network and making it possible to create an instance of this object;
- it comprises network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network; and - it comprises object file interface means, designed to establish a correspondence between information passing through the network interface means and assigned to at least said object file, and information exchanged with said object file.
2. Embedded system according to claim 1, wherein the object file comprises a piece of autonomous software executable in browser software.
3. Embedded system according to claim 1, wherein said network interface means are designed to cooperate with the matching network interface means located in the terminal, so that the embedded system behaves like a client capable of connecting to at least one server of the network.
4. Method for instantiating an object located in a network, characterized in that it uses an embedded system, equipped with a chip comprising information processing means and information storage means, and designed to cooperate with a network through a terminal, the embedded system storing at least one object file containing information associated with an object located in the network and making it possible to create an instance of this object, and comprising network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network, and object file interface means designed to establish a correspondence between information passing through the network interface means and assigned to at least said object file, and information exchanged with said object file, the method also being characterized in that it makes it possible to describe a set of sessions between agents using an object file, by means of at least the following steps:
- establishing a list of the agents implemented;
- for each agent, defining call arguments necessary to the agent.
- establishing a list of the agents implemented;
- for each agent, defining call arguments necessary to the agent.
5. Method according to claim 4, wherein a call argument describes the opening of a session with another agent.
6. Method according to claim 4, wherein an agent modifies the list of arguments used by another agent.
7. Method for instantiating an object located in a network, characterized in that it uses an embedded system, equipped with a chip comprising information processing means and information storage means and designed to cooperate with a network through a terminal, the embedded system storing at least one object file containing information associated with an object located in the network and making it possible to create an instance of this object, and comprising network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network, and object file interface means designed to establish a correspondence between information passing through the network interface means and assigned to at least said object file and information exchanged with said object file, the method also being characterized in that it implements sessions between agents described by an object file executed from the information server of the embedded system by means of at least the following steps:
- identification of an object file;
- execution of this object file.
- identification of an object file;
- execution of this object file.
8. Method according to claim 7, wherein the object file is executed by instantiating the first agent associated with the object file.
9. Method according to claim 7, wherein the object file is executed by instantiating one or more agents referenced by the object file.
10. Method for instantiating an object located in a network, characterized in that it uses an embedded system, equipped with a chip comprising information processing means and information storage means and designed to cooperate with a network through a terminal, the embedded system storing at least one object file containing information associated with an object located in a network and making it possible to create an instance of this object, and comprising network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network, and object file interface means designed to establish a correspondence between information passing through the network interface means and assigned to at least said object file and information exchanged with said object file, the method also being characterized in that it implements sessions between agents described by an object file executed from browser software by means of at least the following steps:
- loading by the browser software of an object file and a specific software capable of implementing it;
- execution of the specific software by the browser software.
- loading by the browser software of an object file and a specific software capable of implementing it;
- execution of the specific software by the browser software.
11. Method according to claim 10, wherein the specific software is embodied in any interpreted language executable by the browser software.
12. Method according to claim 10, wherein the object file interpreter is embodied in browser software.
13. Method for instantiating an object located in a network, characterized in that it uses an embedded system, equipped with a chip comprising information processing means and information storage means and designed to cooperate with a network through a terminal, the embedded system storing at least one object file containing information associated with an object located in the network and making it possible to create an instance of this object, and comprising network interface means designed to cooperate with matching network interface means located in the terminal, so that the embedded system constitutes an information server in the network, and object file interface means designed to establish a correspondence between information passing through t:he network interface means and assigned to at least said object file, and information exchanged with said object file, the method also being characterized in that it enables the embedded system to make it possible to implement sessions between agents described by an object file executed from browser software, and in that it comprises the step that consists of identifying, by mews of a universal resource identifier, a specific software implementing the browser software.
14. Method according to claim 13, wherein the universal resource identifier is integrated into a hypertext document.
15. Method according to claim 13, wherein said specific software is loaded by a method available in the browser software and deduced from the universal resource identifier.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR99/03172 | 1999-03-15 | ||
FR9903172A FR2791159B1 (en) | 1999-03-15 | 1999-03-15 | METHOD FOR ACCESSING AN OBJECT USING A WEB-BASED BROWSER COOPERATING WITH A CHIP CARD AND ARCHITECTURE FOR IMPLEMENTING THE METHOD |
PCT/FR2000/000625 WO2000056030A1 (en) | 1999-03-15 | 2000-03-15 | System for accessing an object using a 'web' browser co-operating with a smart card |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2332283A1 true CA2332283A1 (en) | 2000-09-21 |
CA2332283C CA2332283C (en) | 2011-03-08 |
Family
ID=9543203
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2332283A Expired - Fee Related CA2332283C (en) | 1999-03-15 | 2000-03-15 | Method for accessing an object using a "web" browser cooperating with a smart card, and architecture for implementing the method |
Country Status (10)
Country | Link |
---|---|
US (1) | US6944650B1 (en) |
EP (1) | EP1076972A1 (en) |
JP (2) | JP3794926B2 (en) |
KR (1) | KR100693196B1 (en) |
CN (1) | CN100385889C (en) |
AU (1) | AU776016C (en) |
CA (1) | CA2332283C (en) |
FR (1) | FR2791159B1 (en) |
HK (1) | HK1036539A1 (en) |
WO (1) | WO2000056030A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100858703B1 (en) * | 2002-04-13 | 2008-09-17 | 주식회사 케이티프리텔 | Automatic input service method of smart card base |
Families Citing this family (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2793576B1 (en) * | 1999-05-11 | 2001-11-16 | Gemplus Card Int | RADIOTELEPHONE TERMINAL WITH A CHIP CARD WITH A BROWSER |
US6668271B1 (en) | 1999-05-19 | 2003-12-23 | Richo Company, Ltd. | System for distributing, installing and running web applications (agents) |
US7933968B1 (en) * | 2000-06-20 | 2011-04-26 | Koninklijke Philips Electronics N.V. | Token-based personalization of smart appliances |
FR2805059A1 (en) * | 2000-02-10 | 2001-08-17 | Bull Cp8 | METHOD FOR LOADING A SOFTWARE PART IN A CHIP CARD, PARTICULARLY OF THE TYPE SAID "APPLET" |
FR2805107B1 (en) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | METHOD FOR MANAGING MULTIMEDIA DATA TRANSMISSIONS VIA AN INTERNET-TYPE NETWORK, ESPECIALLY TELEPHONE DATA, AND CHIP CARD FOR IMPLEMENTING THE METHOD |
FR2805108B1 (en) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | METHOD FOR REGISTERING A USER ON A DIRECTORY SERVER OF AN INTERNET TYPE NETWORK AND / OR LOCATING A USER ON THIS NETWORK, AND CHIP CARD FOR IMPLEMENTING THE METHOD |
US7421480B2 (en) * | 2000-02-28 | 2008-09-02 | O2 Micro International Limited | Personal computing environment using mozilla |
FR2815801B1 (en) | 2000-10-20 | 2004-10-29 | Trusted Logic | PROTOCOL FOR TRANSMITTING A PLURALITY OF LOGIC FLOWS OF MULTIPLE EXCHANGE OF COMMAND / RESPONSE TORQUES ON A SINGLE PHYSICAL EXCHANGE CHANNEL BETWEEN MASTER AND SLAVE AND APPLIQUET TRACKING AND MONITORING SYSTEM |
US6824064B2 (en) | 2000-12-06 | 2004-11-30 | Mobile-Mind, Inc. | Concurrent communication with multiple applications on a smart card |
FR2820848B1 (en) * | 2001-02-13 | 2003-04-11 | Gemplus Card Int | DYNAMIC MANAGEMENT OF LIST OF ACCESS RIGHTS IN A PORTABLE ELECTRONIC OBJECT |
EP1361511A4 (en) | 2001-02-16 | 2012-03-21 | Sony Corp | Data processing method and its apparatus |
JP4765174B2 (en) * | 2001-02-16 | 2011-09-07 | ソニー株式会社 | Application execution apparatus, communication system, and application execution method |
EP1233333A1 (en) * | 2001-02-19 | 2002-08-21 | Hewlett-Packard Company | Process for executing a downloadable service receiving restrictive access rights to al least one profile file |
US7861091B2 (en) * | 2001-02-28 | 2010-12-28 | O2Micro International Limited | Smart card enabled secure computing environment system |
US20020143700A1 (en) * | 2001-03-29 | 2002-10-03 | Wu Guangdian Guordon | Method and apparatus for individual-centric use of the internet |
DE60203277T2 (en) * | 2001-04-30 | 2006-03-30 | Activcard Ireland Ltd. | METHOD AND SYSTEM FOR AUTHENTICATING A PERSONAL SECURITY DEVICE COMPRISING AT LEAST ONE REMOTE COMPUTER SYSTEM |
US7363486B2 (en) * | 2001-04-30 | 2008-04-22 | Activcard | Method and system for authentication through a communications pipe |
US20020162021A1 (en) * | 2001-04-30 | 2002-10-31 | Audebert Yves Louis Gabriel | Method and system for establishing a remote connection to a personal security device |
TW552786B (en) * | 2001-04-30 | 2003-09-11 | Activcard | Method and system for remote activation and management of personal security devices |
US7225465B2 (en) * | 2001-04-30 | 2007-05-29 | Matsushita Electric Industrial Co., Ltd. | Method and system for remote management of personal security devices |
US8543823B2 (en) | 2001-04-30 | 2013-09-24 | Digimarc Corporation | Digital watermarking for identification documents |
US20020174206A1 (en) * | 2001-05-21 | 2002-11-21 | Moyer Alan L. | Web-based file manipulating system |
US20020194499A1 (en) * | 2001-06-15 | 2002-12-19 | Audebert Yves Louis Gabriel | Method, system and apparatus for a portable transaction device |
FR2826826B1 (en) * | 2001-06-28 | 2003-09-26 | Cit Alcatel | SUBSCRIBER IDENTIFICATION MODULE AND ASSOCIATED TERMINAL |
FR2828358B1 (en) * | 2001-08-02 | 2004-01-16 | Gemplus Card Int | METHOD AND DEVICE FOR COMPATIBILITY OF COMMUNICATION ON A NETWORK OF TERMINALS, FOR EXAMPLE TO ENABLE A DIALOGUE WITH AN APPLICATION ON A CHIP CARD |
DE60210630T2 (en) * | 2001-08-24 | 2007-05-03 | Windmill Microsystems Holding B.V. | REMOTE DATA DETECTION DEVICE WITH ELECTRONIC POST VIA PUBLIC AND PRIVATE NETWORKS AND METHOD AND COMPUTER PROGRAM THEREFOR |
FR2830151A3 (en) * | 2001-09-25 | 2003-03-28 | Bahia 21 Corp | Portable personal digital assistant Internet communications having temporary network connection with communications mechanism software application operating network server. |
US6868480B2 (en) | 2001-09-28 | 2005-03-15 | Ui Evolution, Inc. | Removable active application specific medium |
US7346783B1 (en) * | 2001-10-19 | 2008-03-18 | At&T Corp. | Network security device and method |
US7162631B2 (en) * | 2001-11-02 | 2007-01-09 | Activcard | Method and system for scripting commands and data for use by a personal security device |
CN100363895C (en) * | 2001-12-05 | 2008-01-23 | 微软公司 | Configuration and management system for movable and imbedded equipment |
US7783901B2 (en) * | 2001-12-05 | 2010-08-24 | At&T Intellectual Property Ii, L.P. | Network security device and method |
ATE509326T1 (en) | 2001-12-18 | 2011-05-15 | L 1 Secure Credentialing Inc | MULTIPLE IMAGE SECURITY FEATURES FOR IDENTIFYING DOCUMENTS AND METHOD FOR PRODUCING THEM |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
FR2834850B1 (en) * | 2002-01-17 | 2004-03-19 | Gemplus Card Int | METHOD FOR LOADING DATA OR APPLICATIONS IN A MOBILE STATION EQUIPMENT USING A PRO-ACTIVE SIM CARD |
US20030135618A1 (en) * | 2002-01-17 | 2003-07-17 | Ravikumar Pisupati | Computer network for providing services and a method of providing services with a computer network |
US20100174717A1 (en) * | 2002-02-28 | 2010-07-08 | Olivier Fambon | Interative serialisation procedure for structured software objects |
US20030167399A1 (en) * | 2002-03-01 | 2003-09-04 | Yves Audebert | Method and system for performing post issuance configuration and data changes to a personal security device using a communications pipe |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
EP1614064B1 (en) | 2003-04-16 | 2010-12-08 | L-1 Secure Credentialing, Inc. | Three dimensional data storage |
US20050149732A1 (en) | 2004-01-07 | 2005-07-07 | Microsoft Corporation | Use of static Diffie-Hellman key with IPSec for authentication |
US8127137B2 (en) | 2004-03-18 | 2012-02-28 | Digimarc Corporation | Watermark payload encryption for media including multiple watermarks |
SE528373C2 (en) * | 2004-08-25 | 2006-10-31 | Smarttrust Ab | Procedure and systems for device management |
GB2430582B (en) * | 2005-09-26 | 2008-04-09 | Nec Technologies | Method of managing connectivity status for a mobile radio communications device, and such a device |
EP1791055A1 (en) | 2005-11-23 | 2007-05-30 | Incard SA | IC card file system |
DE102007026870A1 (en) * | 2007-06-11 | 2008-12-18 | Giesecke & Devrient Gmbh | Resource access mediated by a security module |
CN101413803B (en) * | 2007-10-19 | 2011-07-27 | 神达电脑股份有限公司 | Navigation system and structure for providing terminal user content |
CN101415015B (en) * | 2007-10-19 | 2014-06-04 | 神达电脑股份有限公司 | Navigation system and architecture for providing terminal user content |
KR100873211B1 (en) * | 2007-10-26 | 2008-12-10 | 주식회사 케이티프리텔 | Smart card storing initial screen information, mobile communication terminal with smart card and method for setting initial screen using smart card |
US8316150B2 (en) | 2007-10-31 | 2012-11-20 | Time Warner Cable Inc. | System and method for remotely accessing cablecard |
US8280986B2 (en) * | 2007-11-23 | 2012-10-02 | Lg Electronics Inc. | Mobile terminal and associated storage devices having web servers, and method for controlling the same |
US8140855B2 (en) * | 2008-04-11 | 2012-03-20 | Microsoft Corp. | Security-enhanced log in |
CN101576989A (en) * | 2009-06-09 | 2009-11-11 | 阿里巴巴集团控股有限公司 | Method for realizing payment in mobile terminal and mobile device |
KR101088168B1 (en) | 2009-06-12 | 2011-12-02 | (주) 케이비씨테크 | Smart card having Web-based operating system using SCWS and mobile equipment using the same |
CN102073634B (en) | 2009-11-20 | 2013-10-23 | 中国银联股份有限公司 | Smart card file system and file selection method thereof |
JP2011150560A (en) * | 2010-01-22 | 2011-08-04 | Kddi Corp | System and method for protecting software, software conversion method and program |
KR101089023B1 (en) | 2010-08-06 | 2011-12-01 | 삼성에스디에스 주식회사 | Smart card, anti-virus system and scanning method using the same |
FR2975551B1 (en) | 2011-05-16 | 2013-09-27 | Ethertrust | METHOD FOR SECURING AN AUTHENTICATION ARCHITECTURE, MATERIAL DEVICES AND CORRESPONDING SOFTWARE |
JP2013037554A (en) * | 2011-08-09 | 2013-02-21 | Mega Chips Corp | Memory system, security memory and information protection method |
ITMI20120561A1 (en) * | 2012-04-05 | 2013-10-06 | St Microelectronics Srl | METHOD TO PROTECT AN APPLICATION PROGRAM |
CN106412126A (en) * | 2016-12-05 | 2017-02-15 | 深圳中兴网信科技有限公司 | Docker image description information display method and display device |
US11531971B2 (en) * | 2020-09-02 | 2022-12-20 | Capital One Services, Llc | Computer-based systems and device configured for electronic authentication and verification of documents and methods thereof |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5465401A (en) * | 1992-12-15 | 1995-11-07 | Texas Instruments Incorporated | Communication system and methods for enhanced information transfer |
US5694471A (en) * | 1994-08-03 | 1997-12-02 | V-One Corporation | Counterfeit-proof identification card |
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5742845A (en) * | 1995-06-22 | 1998-04-21 | Datascape, Inc. | System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network |
US5812765A (en) * | 1996-03-22 | 1998-09-22 | Axxs Technologies Corporation | Multi-media remote data access terminals and system |
US6282522B1 (en) * | 1997-04-30 | 2001-08-28 | Visa International Service Association | Internet payment system using smart card |
EP1050145A1 (en) * | 1997-06-13 | 2000-11-08 | Gemplus | Smart card, cordless telephone, system and method for access and communication by internet |
US5983273A (en) * | 1997-09-16 | 1999-11-09 | Webtv Networks, Inc. | Method and apparatus for providing physical security for a user account and providing access to the user's environment and preferences |
US6226744B1 (en) * | 1997-10-09 | 2001-05-01 | At&T Corp | Method and apparatus for authenticating users on a network using a smart card |
US6247644B1 (en) * | 1998-04-28 | 2001-06-19 | Axis Ab | Self actuating network smart card device |
FR2781067B1 (en) * | 1998-07-10 | 2000-09-22 | Gemplus Card Int | CHIP CARD ORGANIZATION SYSTEMS FOR USE AS A SERVER IN AN INTERNET-TYPE NETWORK |
FR2782435B1 (en) * | 1998-08-13 | 2000-09-15 | Bull Cp8 | COMMUNICATION METHOD BETWEEN A USER STATION AND A NETWORK, PARTICULARLY AN INTERNET TYPE, AND IMPLEMENTATION ARCHITECTURE |
FI109756B (en) * | 1998-09-21 | 2002-09-30 | Nokia Corp | A method of utilizing local resources in a communication system, a communication system and wireless communication |
FR2790629A1 (en) * | 1999-02-19 | 2000-09-08 | Bull Cp8 | METHOD FOR ACTIVATING LOCALIZED APPLICATIONS IN A CHIP CARD BY A BROWSER OF THE TYPE SAID "WEB" |
FR2805108B1 (en) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | METHOD FOR REGISTERING A USER ON A DIRECTORY SERVER OF AN INTERNET TYPE NETWORK AND / OR LOCATING A USER ON THIS NETWORK, AND CHIP CARD FOR IMPLEMENTING THE METHOD |
FR2805059A1 (en) * | 2000-02-10 | 2001-08-17 | Bull Cp8 | METHOD FOR LOADING A SOFTWARE PART IN A CHIP CARD, PARTICULARLY OF THE TYPE SAID "APPLET" |
FR2805107B1 (en) * | 2000-02-10 | 2002-04-05 | Bull Cp8 | METHOD FOR MANAGING MULTIMEDIA DATA TRANSMISSIONS VIA AN INTERNET-TYPE NETWORK, ESPECIALLY TELEPHONE DATA, AND CHIP CARD FOR IMPLEMENTING THE METHOD |
FR2805062B1 (en) * | 2000-02-10 | 2005-04-08 | Bull Cp8 | METHOD FOR TRANSMITTING HIGH-FLOW DATA STREAMS OVER AN INTERNET-TYPE NETWORK BETWEEN A SERVER AND A CHIP-CARD TERMINAL, IN PARTICULAR A MULTIMEDIA DATA STREAM |
-
1999
- 1999-03-15 FR FR9903172A patent/FR2791159B1/en not_active Expired - Fee Related
-
2000
- 2000-03-15 US US09/700,428 patent/US6944650B1/en not_active Expired - Fee Related
- 2000-03-15 JP JP2000605361A patent/JP3794926B2/en not_active Expired - Fee Related
- 2000-03-15 KR KR1020007012833A patent/KR100693196B1/en not_active IP Right Cessation
- 2000-03-15 WO PCT/FR2000/000625 patent/WO2000056030A1/en active IP Right Grant
- 2000-03-15 CN CNB008005907A patent/CN100385889C/en not_active Expired - Fee Related
- 2000-03-15 EP EP00910949A patent/EP1076972A1/en not_active Withdrawn
- 2000-03-15 AU AU32982/00A patent/AU776016C/en not_active Ceased
- 2000-03-15 CA CA2332283A patent/CA2332283C/en not_active Expired - Fee Related
-
2001
- 2001-10-26 HK HK01107459.8A patent/HK1036539A1/en not_active IP Right Cessation
-
2005
- 2005-11-07 JP JP2005321802A patent/JP2006134335A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100858703B1 (en) * | 2002-04-13 | 2008-09-17 | 주식회사 케이티프리텔 | Automatic input service method of smart card base |
Also Published As
Publication number | Publication date |
---|---|
AU3298200A (en) | 2000-10-04 |
JP2002539546A (en) | 2002-11-19 |
JP2006134335A (en) | 2006-05-25 |
CN1300494A (en) | 2001-06-20 |
EP1076972A1 (en) | 2001-02-21 |
FR2791159A1 (en) | 2000-09-22 |
FR2791159B1 (en) | 2001-05-04 |
KR20010043648A (en) | 2001-05-25 |
AU776016C (en) | 2005-03-24 |
CA2332283C (en) | 2011-03-08 |
JP3794926B2 (en) | 2006-07-12 |
US6944650B1 (en) | 2005-09-13 |
KR100693196B1 (en) | 2007-03-13 |
CN100385889C (en) | 2008-04-30 |
AU776016B2 (en) | 2004-08-26 |
WO2000056030A1 (en) | 2000-09-21 |
HK1036539A1 (en) | 2002-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2332283A1 (en) | Method for accessing an object using a "web" browser cooperating with a smart card, and architecture for implementing the method | |
US5812768A (en) | System for allocating adaptor to server by determining from embedded foreign protocol commands in client request if the adapter service matches the foreign protocol | |
DE69814900T2 (en) | METHOD AND SYSTEM FOR SUPPORTING DISTRIBUTED SOFTWARE DEVELOPMENT WITHOUT AWARENESS OF THE DISTRIBUTED CHARACTERISTICS OF THE SOFTWARE | |
DE69327448T2 (en) | Method and device for subtasks in a distributed processing system | |
EP0817445B1 (en) | Apparatus and method for indentifying server computer aggregation topologies | |
US6321274B1 (en) | Multiple procedure calls in a single request | |
US7080120B2 (en) | System and method for collaborative processing of distributed applications | |
DE602004004300T2 (en) | Method, system and computer program for sending and receiving messages through an individual communication channel | |
EP1027796B1 (en) | Distributed web application server | |
DE69632987T2 (en) | Method and apparatus for multiple protocol operation in a user / provider system | |
CA2210817C (en) | Client object api and gateway to enable oltp via the internet | |
US7058954B1 (en) | System and method for facilitating dynamic loading of stub information to enable a program operating in one address space to invoke processing of a remote method or procedure in another space | |
US5822563A (en) | Process for simulating a server architecture from a client architecture | |
EP0812088A3 (en) | Preserving state in stateless network protocols | |
KR20010110736A (en) | Method for loading a software component in a smart card, in particular applet | |
EP1092198A2 (en) | Combining services in an internet-type network | |
CA2329044A1 (en) | On-board system comprising network interface means, and method for activating applications located in said on-board system | |
US7974990B2 (en) | Managing program applications | |
US6785705B1 (en) | Method and apparatus for proxy chaining | |
US20030079047A1 (en) | Integraton adaptor and proxy based composite application provisioning method and apparatus | |
US20020174169A1 (en) | Process for operating a distributed computer network comprising several distributed computers | |
CA2213213A1 (en) | Method and apparatus for performing efficient corba transactions | |
DE60221118T2 (en) | SERVICE APPLICATION ARCHITECTURE FOR SERVICE PROVIDERS OF INTEGRATED COMMUNICATION NETWORKS | |
US20020178141A1 (en) | Method and apparatus for remote inter-language method calling | |
US6823358B1 (en) | Enabling multiple client access to a process-based system or program from a single java virtual machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20150316 |