Method of protecting a mobile terminal against attacks

Abstract : Recently, relay attacks has renewed interest, not least because of the rise of NFC applications in smartphones. In the context of the NFC ecosystem, relay attacks allow an attacker to lull an NFC reader by making it believe that the legitimate user is in its vicinity. The idea of such attacks is simple: forwarding the NFC commands intended for the Secure Element (SE) inside the closest smartphone to another far away SE. The invention relates to a method of detecting relay attacks. Unlike existing solutions based on distance bounding, our invention is based on the Trusted Execution Environment (TEE) that runs inside the smartphone. In our invention, we define specific mechanisms allowing TEE to verify whether a particular NFC response has been indeed computed by the Secure Element of the bounded smartphone. In addition, we enhance the TEE features by giving it control over the NFC communication, so that it can block NFC responses from being sent to the NFC reader. Thus, we prevent relay attacks by making the TEE blocking any NFC response that was not produced by the SE running inside its bounded mobile device.
Keywords : tee relay attack nfc
Type de document :
Brevet
France, N° de brevet: WO2016051059 A1. 2014
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-01332045
Contributeur : Mohamed Sabt <>
Soumis le : mercredi 15 juin 2016 - 10:42:50
Dernière modification le : mardi 5 février 2019 - 12:12:41

Identifiants

  • HAL Id : hal-01332045, version 1

Citation

Mohamed Sabt, Mohammed Achemlal. Method of protecting a mobile terminal against attacks. France, N° de brevet: WO2016051059 A1. 2014. 〈hal-01332045〉

Partager

Métriques

Consultations de la notice

112