Method of protecting a mobile terminal against attacks - Archive ouverte HAL Accéder directement au contenu
Brevet Année : 2014

Method of protecting a mobile terminal against attacks

Résumé

Recently, relay attacks has renewed interest, not least because of the rise of NFC applications in smartphones. In the context of the NFC ecosystem, relay attacks allow an attacker to lull an NFC reader by making it believe that the legitimate user is in its vicinity. The idea of such attacks is simple: forwarding the NFC commands intended for the Secure Element (SE) inside the closest smartphone to another far away SE. The invention relates to a method of detecting relay attacks. Unlike existing solutions based on distance bounding, our invention is based on the Trusted Execution Environment (TEE) that runs inside the smartphone. In our invention, we define specific mechanisms allowing TEE to verify whether a particular NFC response has been indeed computed by the Secure Element of the bounded smartphone. In addition, we enhance the TEE features by giving it control over the NFC communication, so that it can block NFC responses from being sent to the NFC reader. Thus, we prevent relay attacks by making the TEE blocking any NFC response that was not produced by the SE running inside its bounded mobile device.

Mots clés

Fichier non déposé

Dates et versions

hal-01332045 , version 1 (15-06-2016)

Identifiants

  • HAL Id : hal-01332045 , version 1

Citer

Mohamed Sabt, Mohammed Achemlal. Method of protecting a mobile terminal against attacks. France, N° de brevet: WO2016051059 A1. 2014. ⟨hal-01332045⟩
89 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More