[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2013123233A2 - Methods and apparatus for large scale distribution of electronic access clients - Google Patents

Methods and apparatus for large scale distribution of electronic access clients Download PDF

Info

Publication number
WO2013123233A2
WO2013123233A2 PCT/US2013/026194 US2013026194W WO2013123233A2 WO 2013123233 A2 WO2013123233 A2 WO 2013123233A2 US 2013026194 W US2013026194 W US 2013026194W WO 2013123233 A2 WO2013123233 A2 WO 2013123233A2
Authority
WO
WIPO (PCT)
Prior art keywords
access control
euicc
esim
clients
electronic access
Prior art date
Application number
PCT/US2013/026194
Other languages
French (fr)
Other versions
WO2013123233A3 (en
Inventor
David Haggerty
Jerrold Hauck
Ben JUANG
Li Li
Arun Mathias
Kevin Mclaughlin
Avinash NARASIMHAN
Chris SHARP
Vaid YOUSUF
Yang XIANGGYING
Original Assignee
Apple Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple Inc. filed Critical Apple Inc.
Priority to CN201380019098.9A priority Critical patent/CN104221347B/en
Priority to BR112014019937A priority patent/BR112014019937A8/en
Priority to KR1020147025521A priority patent/KR101618274B1/en
Priority to KR1020167011363A priority patent/KR101716743B1/en
Priority to MX2014009822A priority patent/MX342702B/en
Priority to EP13714036.4A priority patent/EP2815553B1/en
Priority to JP2014557779A priority patent/JP2015512209A/en
Priority to EP19173036.5A priority patent/EP3541106A1/en
Priority to RU2014137130/08A priority patent/RU2595904C2/en
Publication of WO2013123233A2 publication Critical patent/WO2013123233A2/en
Publication of WO2013123233A3 publication Critical patent/WO2013123233A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Definitions

  • the present disclosure relates generally to the field of wireless communication and data networks. More particularly, the invention is directed to, inter alia, methods and apparatus for large scale distribution of electronic access control clients.
  • Access control is required for secure communication in most prior art wireless radio communication systems.
  • one simple access control scheme might comprise: (i) verifying the identity of a communicating party, and (ii) granting a level of access commensurate with the verified identity,
  • access control is governed by an access control client, referred to as a Universal Subscriber Identity Module (USiM) executing on a physical Universal Integrated Circuit Card (UICC) (also referred to as a "SIM card”).
  • UICC Universal Integrated Circuit Card
  • SIM card Subscriber Identity Module
  • the USIM access control client authenticates the subscriber to the UMTS cellular network. After successful authentication, the subscriber is allowed access to the cellular network.
  • access control client refers generally to a logical entity, either embodied within hardware or software, suited for controlling access of a first device to a network.
  • access control clients include the aforementioned US!M, CDMA Subscriber identification Modules (CSIM), IP Multimedia Services Identity Module (ISIM), Subscriber Identity Modules (SIM), Removable User Identity Modules (RUIM), etc.
  • Prior SIM card based approaches suffer from a number of disabilities. For instance, traditional UICCs support only a single USIM (or more generally "SIM") access control client. If a user wants to authenticate to a cellular network using a different SIM, the user must physically exchange the SIM card in the device with a different SIM card.
  • Some devices have been designed to house two SIM cards at the same time (Dual-S!M phones); however, such Dual-SIM phones do not address the fundamental physical limitations of SIM card devices. For example, information stored within one SIM card cannot be easily consolidated with information stored within another SIM card. Existing Dual-SIM devices cannot access the contents of both SIM cards simultaneously.
  • SIM card accessing a SIM card requires a perceptible amount of time for the user; switching between SIM cards to transfer information is undesirable, and is present in both traditional and Dual-SIM devices.
  • SIM card issuers and activation entities are generally network-specific, and not ubiquitous for different users in different networks. Specifically, a given user within a given network must activate their phone or obtain replacement SIM cards from a very specific entity authorized to issue the SIM. This can greatly restrict a user's ability to rapidly obtain a valid access privilege, such as when roaming across other networks, replacing their phone, etc.
  • the present disclosure provides, inter alia, for large scale distribution of electronic access control clients.
  • a method for large scale distribution of electronic access control clients includes: establishing ownership of one or more electronic access control clients; determining if one or more electronic access control clients have not been previously duplicated; encrypting the one or more electronic access control clients for transfer to a second device; and exchanging the encrypted one or more electronic access control clients.
  • the apparatus includes: a processor; and a non-transitory computer-readable medium that includes instructions which when executed by the processor: establish ownership of one or more electronic access control clients; determine if one or more electronic access control clients have not been previously duplicated; encrypt the one or more electronic access control clients for transfer to a second device; and exchange the encrypted one or more electronic access control clients.
  • a mobile device for transacting an electronic access control client includes: a wireless interface configured to communicate with a wireless network; a processor in data communication with the interface; and a secure element in data communication with the interface.
  • the secure element includes: a secure processor; secure storage in data communication with the secure processor and having a plurality of access control clients useful for authentication with at least the network stored thereon; and logic in data communication with the secure processor, the logic configured to store, access, and transfer to or from the apparatus the plurality of access control clients; and user interface logic in communication with at least the secure element and configured to enable a user of the apparatus to select one of the stored plurality access control clients, and authenticate the apparatus to the network so as to enable communication therewith.
  • a wireless system is also disclosed.
  • the apparatus includes a storage medium having a computer program disposed thereon, the program configured to, when executed: distribute electronic access control clients.
  • a network architecture for providing wireless mobile devices with electronic access clients includes: a plurality of brokers; and a plurality of manufacturers in data communication with the plurality of brokers.
  • a given user mobile device may be serviced by multiple ones of the brokers; and any one of the brokers may order electronic access clients from one or more of the manufacturers.
  • the apparatus includes: at least one processor: and first logic in data communication with the at least one processor, the first logic configured to cause the apparatus to perform encryption and decryption of an access client; second logic in data communication with the at least one processor, the second logic configured to cause the apparatus to ensure that the access client is not duplicated; and third logic in data communication with the at least one processor, the third logic configured to cause the apparatus to establish at least one of trust, ownership, and/or verification of a user of the access client.
  • An electronic access control client revocation procedure is further disclosed.
  • the procedure includes: determining if a signing certificate authority that issued a certificate is compromised, the certificate associated with one or more devices storing the certificate; determining at the one or more devices a certificate service request created when an initial request for the certificate was created; requesting a new certificate using the determined certificate service request; and issuing a new certificate based on the requesting.
  • the one or more devices can use a previous used private key as part of the requesting, and the new certificate is issued containing a previous public key corresponding to the previous private key.
  • FIG. 1 is a logical block diagram of one exemplary electronic Universal integrated Circuit Card (eUICC) useful in conjunction with various aspects of the present disclosure.
  • eUICC electronic Universal integrated Circuit Card
  • FIG. 2 is a logical block diagram of one exemplary electronic Subscriber Identity Module (eS!M) directory structure useful in conjunction with various aspects of the present disclosure.
  • eS!M electronic Subscriber Identity Module
  • FIG. 3 is a logical block diagram representing one exemplary state machine for Subscriber Identity Module (SIM) Dedicated Files (SDF) useful in conjunction with various aspects of the present disclosure.
  • SIM Subscriber Identity Module
  • SDF Dedicated Files
  • FIG. 4 is a logical block diagram representing one exemplary state machine for eSIM operation useful in conjunction with various aspects of the present disclosure.
  • FIG, 5 is a graphical representation of one exemplary eSIM broker network useful with various embodiments of the present disclosure.
  • FIG, 6 is a logical block diagram of one exemplary tiered security protocol useful with various embodiments of the present disclosure.
  • FIG. 7 is a graphical representation of one exemplary data structure comprising three (3) pieces, useful in conjunction with various aspects of the present disclosure.
  • FIG. 8 is a graphical representation of one exemplary OEM certificate hierarchy, useful in conjunction with various aspects of the present disclosure.
  • FIG. 9 is a logical flow diagram illustrating one exemplary logical sequence for delivering an eSIM to a device without personalization.
  • FIG. 10 is a logical flow diagram illustrating one exemplary logical sequence for delivering an eSIM to a device with pre-personaiization.
  • FIG. 1 1 is a logical flow diagram illustrating one exemplary logical sequence for delivering a batch of eSIMs to a device.
  • FIG. 12 is a logical representation of an electronic Universal Integrated Circuit Card (eUICC) apparatus.
  • FiG. 13 is a logical representation of an electronic Subscriber Identification Module (eSIM) depot apparatus.
  • FIG. 14 is a logical flow diagram illustrating one exemplary user apparatus.
  • FIG.15 is a logical flow diagram illustrating one embodiment of a method for large scale distribution of electronic access control clients.
  • SIMs Subscriber Identity Modules
  • client and “UE” include, but are not limited to wireless-enabled cellular telephones, smartphones (such as for example an iPhoneTM), wireless enabled personal computers (PCs), mobile devices such as handheld computers, PDAs, personal media devices (PMDs), wireless tablets (such as for example an iPadTM), so-called “phablets”, or any combinations of the foregoing.
  • smartphones such as for example an iPhoneTM
  • PCs wireless enabled personal computers
  • PMDs personal media devices
  • tablet such as for example an iPadTM
  • so-called “phablets” so-called “phablets”, or any combinations of the foregoing.
  • SIM Subscriber Identity Module
  • SIM embedded Multimedia Services Identity Module
  • profile a logical entity, either embodied within hardware or software, suited for controlling access of a first device to a network.
  • access control clients include the aforementioned USIM, CDMA Subscriber Identification Modules (CSIM), IP Multimedia Services Identity Module (IS1M), Subscriber Identity Modules (SIM), Removable User Identity Modules (RUIM), etc., or any combinations of the foregoing.
  • subscriber identity module e.g., eSIM
  • subscriber identity module e.g., eSIM
  • identity of a single individual i.e., the various features of the disclosure may be practiced on behalf of a group of individuals such as a family, or intangible or fictitious entity such as an enterprise
  • any tangible "module" equipment or hardware e.g., any tangible "module" equipment or hardware.
  • the UICC is emulated as a virtual or electronic entity such as e.g., a software application, hereafter referred to as an Electronic Universal Integrated Circuit Card (eUICC), that is contained within a secure element (e.g., secure microprocessor or storage device) in the UE.
  • eUICC Electronic Universal Integrated Circuit Card
  • the eUICC is capable of storing and managing multiple SIM elements, referred hereafter as Electronic Subscriber Identity Modules (eSIM).
  • Each eSIM is a software emulation of a typical USIM, and contains analogous programming and user data associated therewith.
  • the eUICC selects an eSIM based upon the eSlM's ICC-ID. Once the eUICC selects the desired eSIM(s), the UE can initiate an authentication procedure to obtain wireless network services from the eSlM's corresponding network operator.
  • eUICC Software Architecture Referring now to FIG. 1 one exemplary electronic Universal Integrated Circuit
  • eUICC eUICC
  • Examples of an exemplary eUICC are described within co-owned, co-pending U.S. Patent Application No. 13/093,722 tiled on April 25, 201 1 , and entitled "APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS", previously incorporated by reference in its entirety, although it will be appreciated that other may be used consistent with the present disclosure.
  • FIG. 1 illustrates one exemplary Java CardTM eUICC architecture.
  • Other examples of Operating Systems (OS) for use on smart card applications include 01
  • the OS provides an interface between application software and hardware.
  • the OS includes services and functionality configured for: input Output (I/O), Random Access Memory (RAM), Read Only Memory (ROM), non-volatile memory (NV) (EEPROM, flash), etc.
  • the OS may also provide cryptographic services used by higher layers, memory and file management, and communication protocols.
  • Java Card Virtual Machine (a byte code interpreter); Java Card run time environment (JCRE) (which manages card resources, applet execution and other runtime features); and Java Application Programming Interfaces (APIs) (a set of customized classes for programming smart card applications).
  • JCVM Java Card Virtual Machine
  • JavaRE Java Card run time environment
  • APIs Java Application Programming Interfaces
  • the JCVM has an on-card component (the byte code interpreter), and an off- card counterpart (the converter). Some compilation tasks may be performed by the converter due to card resource restrictions.
  • the Java compiler creates class files from source code.
  • the converter preprocesses the class files and creates a CAP file.
  • the converter verifies that the load images of the Java classes are well formed, checks for Java card language subset violations, and also performs some other tasks.
  • a CAP file contains an executable binary representation of the classes in a Java package.
  • the converter also generates export files, which contain public API information. Only the CAP file is loaded into the card.
  • Another commonly used format is IJC, which can be converted from CAP files. IJC files may be slightly smaller in size compared to CAP files.
  • downloading an applet to a card requires an Application Protocol Data Unit (APDU) exchange to load the content of the CAP file into the persistent memory of the card.
  • APDU Application Protocol Data Unit
  • the on card installer would also link the classes in the CAP file with other classes on the card. Thereafter the installation process creates an instance of the applet and registers the instance with the JCRE. Applets are held in a suspended state until selected.
  • a Global Platform provides a secure protocol to manage applications.
  • the GP operates within a secure issuer security domain, which is an on-card representation of the card issuer.
  • the card may also execute other security domains for e.g., application providers.
  • the eUiCC is a non-removable component of a device.
  • the eUICC executes a secure bootstrap OS.
  • the bootstrap OS ensures that the eUICC is secure, and manages execution of the security protocols therein. Examples of a secure bootstrap OS are described within co-owned, copending U.S. Patent Application No. 13/080,521 filed on April 5, 201 1 and entitled "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS", previously incorporated by reference in its entirety.
  • MNOs Mobile Network Operators
  • eSIMs may customize eSIMs to support various degrees of service differentiation. Common examples of customization include, without limitation, proprietary file structures and/or software applications. Due to the configurability of eSIMs, eSIMs can vary significantly in size.
  • eSIMs can be freely exchanged between devices according to a secure transaction. Subscribers do not require a "physical card" to move SIMs among devices; however, the actual transaction of eS!Ms must be securely protected e.g., via specific security protocols.
  • an eSIM is encrypted for a specific receiver before being delivered.
  • each eSIM may include a meta-data section that is plaintext. A cryptographic signature may further be used to ensure integrity of the plain text content. This meta-data section may be freely provided (even to unsecure entities), to assist in non-secure storage, etc.
  • the eSIM directory structure has been modified to support the flexibility offered by eSIMs.
  • the eSIM directory structure include inter alia: (i) EFeSimDir which contains a list of eSIMs installed; (ii) EFcsn which contains the card serial number that giobally uniquely identifies the eUICC; (iii) DFsecurity stores security related data and the private key corresponding to one or more eUICC certificates.
  • the DFsecurity information includes: (i) DFepcf W which contains eUICC platform level PCF; (ii) EFoemcert which contains the root certificate and common name of the OEM (OEM credential can be used for special operations such as factory refurbishment); (iii) EfeUICCcert which is the certificate of the eUICC; (iv) EFsLlcert which is the root certificate of server L I appliances; (v) 5 EFsLIcert which is the root certificate of server L2 appliances; and (vi) EFsL3cert which is the root certificate of server L3 appliances.
  • the directory structure further includes SIM Dedicated Files (SDF) which contain file structures that are specific to an eSIM.
  • SDF SIM Dedicated Files
  • Each SDF is located directly under the MF.
  • Each SDF has a name attribute and a SID 10 (eSIM ID), such as the Integrated Circuit Card Identifier (ICCID).
  • eSIM ID such as the Integrated Circuit Card Identifier (ICCID).
  • ICCID Integrated Circuit Card Identifier
  • each SDF further contains DFprofiles and DFcodes.
  • all profile PCF related EFs are stored under DFppcf, which is stored under DFprofile.
  • DFprofile information includes: (i) EFname which is a description of the eSIM (such as name and version of the eSIM); (ii) 5 EFtype which describes the type of the eSIM (e.g., regular, bootstrap, and test).
  • Software applications may use this information to e.g., display an icon when a bootstrap eSIM is in use; (iii) EFsys_ver which is the minimum version number of the eUICC software to necessary to support the eSIM; (iv) EFnvjnin which indicates the minimum amount of non volatile memory required by the eSIM; (v) EFramjnin0 which indicates the minimum amount of volatile memory required; (vi) EFnvjrsvd which indicates the amount of non volatile memory reserved for over the air transactions (OTA); and (vii) EFratnj-svd which indicates the amount of volatile memory reserved for OTA.
  • EFsys_ver which is the minimum version number of the eUICC software to necessary to support the eSIM
  • EFnvjnin which indicates the minimum amount of non volatile memory required by the eSIM
  • EFramjnin0 which indicates the minimum amount of volatile memory required
  • EFnvjrsvd which indicates the
  • DFcode information contains a set of keys for5 each eSIM. These values cannot be read out of eUICC under most circumstances.
  • One exceptional use case is the export operation which cryptographically wraps and exports the entire eSIM. Since the entire eSIM is encrypted, the values of keys remain secured.
  • the DFcode information comprises: (i) ExEFgPinx/gPukx which contains a global PIN (Personal Identification Number) and0 PU (PIN Unlock Key); (ii) EFuPin/uPuk contains the universal PIN and PU ; (iii) EFadminx contains ADMIN codes; and (iv) EFolax which contains OTA codes, in some variants, there may also be an ADFusim which contains additional elements such as: (i) EFk which stores K, the 128-bit shared authentication key; (ii) EFopc which stores OPc, which is derived from the subscriber key and operator variant algorithm configuration field OP (some variants may store OP instead of OPc); (iii) EFauthpar which specifies the length of RES; (iv) EFalgid which specifies the network authentication algorithm (for example, Milenage); (v) EFsqn which stores SQN; and (vi) EFsqn which stores
  • the SDF state machine comprises the following states: CREATION, INITIALISATION, OPERATIONAL (ACTIVATED), OPERATIONAL (DEACTIVATED), and TERMINATION.
  • the SDF When an eSIM is first installed, the SDF is created (CREATION) and then initialized (INITIALISATION) with the file structure data included in the eSIM. Once the eSIM has been installed, the SDF transitions to the DEACTIVATED state. During the deactivated state, none of the files are available. Once an eSIM is selected, the SDF transitions from the DEACTIVATED state to the ACTIVATED state; the ACTIVATED state enables access to the files of the SDF. When an eSIM is deselected (either implicitly or explicitly) the SDF transitions from the ACTIVATED state back to the DEACTIVATED state.
  • the eSIM state machine comprises the following states: INSTALLED, SELECTED, LOCKED, DEACTIVATED, EXPORTED, and DELETED.
  • an entry for the eSIM is created in the eUICC registry; the entry indicates one or more associated SDF and applications.
  • the SDF are set to the DEACTIVATED state and applications are set to an INSTALLED state.
  • the eSIM transitions to the SELECTED state.
  • the SDFs transition to the ACTIVATED state and the applications are transitioned to a SELECTABLE state. If an eSIM is deselected, the eSIM transitions back to the INSTALLED state. Under certain circumstances, the eSIM may enter a LOCKED state. For example, if the eUICC PCF is changed such thai an installed eSIM may no longer be used, then the eSIM will transition to the LOCKED state. In the LOCKED state, the SDF are set to the DEACTIVATED state and applications are set to the LOCKED state. Other miscellaneous states include, the EXPORTED state (i.e., where the eSIM is exported and may no longer be selected), and the DELETED state (i.e., where the eSIM is deleted).
  • NAA Network Authentication Algorithms
  • MNOs Mobile Network Operators
  • the eUICC may include common packages for NAAs. During eSIM installation, an instance of each NAA app can be created for each eSIM from the pre-loaded packages, to reduce overall loading time of eSIM, and unnecessary memory consumption on eUICC.
  • NAA include without limitation: Milenage, COMP 128 V I , COMP 128 V2, COMP128 V3, and COMP128 V4, and certain proprietary algorithms. There are a larger number of proprietary algorithms still in use (due to known attacks on COMF128 V ! ).
  • network authentication is based on the well known Authentication and Key Agreement (AKA) protocol.
  • AKA Authentication and Key Agreement
  • eS!Ms may be patched with a replacement algorithm via e.g., a secure software update. Thereafter, the MNO may enable the replacement algorithm via an existing OTA mechanism.
  • FIG. 5 shows a high level view of one exemplary eSIM broker network useful with various embodiments of the present disclosure.
  • the broker network comprises a distributed network of brokers and manufacturers, such that a device may be serviced by multiple brokers, and a broker may order eSIMs from multiple eSIM manufacturers.
  • the primary broker provides discovery services to devices, such that the device can identify an appropriate broker. Thereafter, the device can communicate directly with the identified broker for eSIM operations (e.g., such as purchase, installation, export, and import).
  • eSIM operations e.g., such as purchase, installation, export, and import.
  • large scale distribution networks must be scalable to handle large bursts of provisioning traffic (such as can occur on a so-called "launch day” of a given mobile user device).
  • One suggested scheme for reducing overall network traffic entails pre-personalizing eSIMs (where possible) prior to launch day. For example so-called "SIM-in" units are already assigned an eSIM at shipment; this pre-assigned eSIM can be pre-personalized for the unit by, for example, encrypting the corresponding eSIM profile with a key specific to the eUICC of the unit.
  • the brokering network can flexibly adapt to various business models. Specifically, for various legal and antitrust reasons, various components of the foregoing broker network may be handled by different parties. Accordingly, security aspects of eSIM traffic needs to be carefully monitored and evaluated.
  • Each eSIM contains valuable user and MNO information.
  • an eSIM may include the shared authentication key (K for USIM and Ki for SIM), which if compromised could be used for SIM cloning.
  • eSIMs may also contain applications that may have sensitive user data such as bank account information.
  • eUICC software requires further countermeasures for device recovery.
  • exemplary solutions should be able to handle device recovery so as to preclude such draconian measures.
  • the server eUICC and client eUICC software comprise a so-called "stack" of software layers.
  • Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer.
  • each software layer further communicates with its own layers.
  • the device application processor AP may be compromised (e.g., "jaiibroken", etc.); consequently, it is recognized that trust relationships exist between the client eUICC and corresponding server eUICC (or other secure entity); i.e., the AP is not trusted.
  • the security software protocol comprises a Level I (LI), Level 2 (L2), and Level 3 (L3).
  • LI security performs encryption and decryption of eSIM Data. LI operations are limited to secure execution environments (e.g., an eUICC or Hardware Security Module (HSM)).
  • eSIM data can be stored in plain text (i.e., unencrypted) within the logical LI boundary; outside of the LI boundary the eSIM data is always securely encrypted.
  • L2 security ensures that an eSIM cannot be duplicated. The L2 boundary ensures that one and only one copy of an eSIM exists. Within the L2 boundary multiple copies may exist.
  • L2 security may further embed a challenge into the encrypted eSIM payload; a recipient of the eSIM will compare the received challenge to the challenge stored earlier before installing the eSIM to ensure that its eSIM is not stale (i.e., is the current one and only eSIM).
  • L3 security is responsible for establishing trust, ownership, and verification of the user.
  • the eUICC may store information to indicate ownership associated with the eSIM.
  • so-called "challenges” are a critical resource used to associate a specific eSIM instance with an eUICC.
  • each eUICC maintains a certain number of challenges for each profile agent, which is the logical entity that maintains L2 security. By verifying that a challenge is valid, the eUICC can be sure that the eSIM is not a stale eSIM (i.e., an invalid duplicate). A number of challenges are created for each eSIM to be personalized. The eUICC deletes a challenge when a matching eSIM is received.
  • an eUICC creates (or is given) a number of challenges which is provided to the network; the challenges are also saved in non volatile memory of the eUICC. Subsequently thereafter, the network can generate an eSIM for the eUICC which is bound to the pre-generated challenge. When the eUICC receives an eSIM later during device activation, the eUICC can verify that the received eSIM contains the appropriate challenge.
  • the eUICC In a DOS attack, the eUICC is continuously triggered to generate challenges until all of its challenge resources are exhausted. Accordingly, in one such variant, the eUICC additionally performs a session handshake to authenticate a profile server/agent before processing requests that would trigger eU!CC to create a challenge. Additionally, in the unlikely case that resources are exhausted and eUICC is unable to create new challenges, the eUICC may store a separate set of reserved challenges specifically designated for freeing up another set of challenges. In some cases, the eUICC may additionally include an Original Equipment Manufacturer (OEM) credential, which the OEM can use to further control challenge operation.
  • OEM Original Equipment Manufacturer
  • the exemplary data structure comprises three (3) pieces, one for each of the LI , L2, and L3 security levels.
  • overall network operation can be distributed over multiple entities according to a wide variety of options.
  • various network entities may perform only one or two of the security layers (e.g., a eSIM vendor may only handle L2, etc.); this flexibility easily and advantageously accommodates virtually any business arrangement.
  • each eSIM profile component 702 is encrypted with a symmetric key, and the symmetric key is encrypted with the L I public key of the destined eSIM receiver.
  • the eSIM may further includes a plain text section for metadata (such as a text string of the ICCID).
  • the encrypted symmetric key, meta data, and encrypted eSIM content is hashed and signed with the public key of the "donating" LI entity.
  • the associated L 3 certificate is appended, e.g., at the end, for verification.
  • the batch descriptor component 704 of FIG. 7 contains L2 information for the eSIM. It has a plain text section including a Globally Unique Identifier (GUID), a challenge for the destined eSIM receiver, a unique ID of the eSIM receiver, a URL to retrieve the profile, and the URL to post an installation result to.
  • the batch descriptor also includes a plain text section of an array of elements that consist of: an ICCID for each profile, and a hashed portion of the profile (the metadata section and the encrypted eSIM content).
  • the hash does not include the symmetric key, such that a batch descriptor can be created without waiting for an actual profile to be generated.
  • a batch descriptor only contains one ICCID and profile hash.
  • a much larger array is expected.
  • the data content of the batch descriptor is hashed and signed with a L2 public key, and an associated L2 certificate is appended at the end.
  • the L3 owner component 706 contains L3 information for the eSIM.
  • the principal field identifies the user account associated with the eSIM (e.g., abc@me.com), the service name identifies the service provider to authenticate the user account with.
  • the hash of batch descriptor is included to associate the L2 and L3 data structures. The data may be stored in plain text, hashed and signed with L3 public key. The L3 certificate is appended at the end.
  • a trusted third party issues certificates for certified eUICCs.
  • Each eUICC contains a private key and an associated certificate, issued by this entity or a subordinate key authority of this entity.
  • one trusted third party may issue certificates for certified LI , L2, and L3 appliances; or alternately, separate third party entities may issue certificates for L I , L2, or L3 appliances.
  • the eUICC has preioaded (or may be provided OTA from a trusted entity) the root Certificate Authority (CA) of the third parties, and can verify messages received from the server appliances based on the appropriate CA.
  • CA Certificate Authority
  • the Root Certificate Authority has a set of intermediate CAs that perform a subset of tasks (e.g., issuing e.g., iOS or comparable device certificates).
  • an eUICC CA is charged with eSIM specific operations.
  • the eUICC CA may issue certificates for a set of servers; as shown the certificates include e.g., factory refurbishing servers for eUICC maintenance, and activation servers for signing eUICC PCF.
  • the Root CA together with the common name of the eUICC CA are used by the client eUICC to verify the OEM signed messages.
  • each client eUICC stores the following security related data: (i) eUICC certificate that is used for eUICC LI , L2, and L3 operations (each eUICC stores a certificate that is used for both Li , L2, and L3 security related operations); (ii) an eUICC private key that is associated with the eUICC certificate; (iii) OEM credentials that include the root certificate of OEMs and the common name of the OEM eUICC CA; (iv) and root certificates of third parties that can certify server appliances.
  • certificates in the eUICC may need to be replaced if a signing CA is compromised; for example, if an eUICC CA or server CA is compromised (e.g., a private key has been compromised/lost), two (2) revocation procedures are described below.
  • a signing CA that issues eUICC certificates is compromised, the eUICC certificate stored in affected eUICCs should be replaced. Specifically, when the initial certificate request was created for the eUICC, the Certificate Signing Request (CSR) was saved. If the signing CA is compromised, a new certificate can be requested for the eUICC, using the initial CSR. By keeping the same CSR, the eUICC can use the same private key, and a new certificate will be issued containing the same eUICC public key. The OEM can sign the new certificate with the OEM ' s private key.
  • CSR Certificate Signing Request
  • the broker can check a revocation list of bad eUICC CAs and reject the request with a specific error to indicate that the certificate needs to be replaced.
  • the AP can retrieve the new eUICC certificate via existing OEM services and send the new certificate to eUICC (the AP does not have to be trusted in this scenario).
  • the eUICC verifies the OEM signature and ensures that the received public key matches its previously stored public key in the eUICC.
  • the eUICC additionally includes eUICC certificates.
  • the epoch is in one variant increased when a new certificate is issued. The eUICC can verify that the eUICC epoch in the received certificate is higher than that of the current certificate, before storing the new certificate.
  • each server certificate is additionally associated with an epoch. If a CA is compromised, the root CA reissues certificates for ail legitimate entities, and increases the epoch of each new certificate. Since the number of server certificates will not be large, reissuing certificates can be handled in existing systems.
  • the eUICC saves the expected epoch of server LI , L2, and L3 certificates in nonvolatile memory.
  • eUICC When a received certificate contains a higher epoch, eUICC must update the corresponding NV epoch and reject any future certificates with a lower epoch; i.e., the eUICC will reject rogue servers that have not been signed since the CA was compromised.
  • the server may also maintain an eUfCC blacklist for compromised eUICCs. Requests from blacklisted eU!CC are in one embodiment rejected by the server.
  • PCF Policy Control Functions
  • eUfCC platform level eUfCC platform level
  • profile level eUfCC platform level
  • the eUICC PCF may only be updated by OEM
  • the Profile PCF is controlled by MNOs and is a part of the eSIM.
  • the profile PCF is included as a part of the export import package.
  • the eUICC PCF may include: (i) a SIM lock policy that specifies the types of eSIMs that the eUICC may activate; (ii) a secret code that can be used to authorize deletion of all eSIMs in an eUICC; (iii) a list of common names of server (LI , L2, and L3) that specify a cluster of server appliances that the eUICC may communicate with (e.g., based on business considerations or methods) (i.e., an inclusive listing); (iv) a list of common names of server (LI , L2, and L3) that specify a cluster of server appliances that the eUICC may not communicate with (i.e., an exclusive listing).
  • a SIM lock policy that specifies the types of eSIMs that the eUICC may activate
  • a secret code that can be used to authorize deletion of all eSIMs in an eUICC
  • a list of common names of server (LI , L2, and L3) that specify
  • the profile PCF may include: (i) a list of common names of servers (LI , L2, and L3) that specify a cluster of depots that the eUICC may export the eSIM to (inclusive); (ii) a list of common names of servers (L I , L2, and L3) that specify a cluster of depots that the eUICC may MOT export the eSilvl to (exclusive); (iii) notification URLs and operation types which specify URLs that are sent notifications upon completion of a specified eSIM operation; (iv) auto-expiration parameters where the AP may delete the eSIM once profile has expired; (v) classes of server appliances (L I , L2, and L3) that may be assigned different classes indicating the security levels implemented (a profile may choose to only communicate with server components above certain levels); (vi) an epoch of server certificates (LI , L2 and L3) which are checked during installation (e.g., the eUICC only installs profiles if the epoch
  • the client eUICC is in the illustrated embodiment responsible for ail three levels of securities; however, for clarity, the client eUICC is separated into three logical entities to capture functional requirements within the eUICC. Moreover, while there may be separate sets of credentials for LI , L2, and L3 within the client eUICC, it is appreciated that the same (i.e., one credential) may be used since the client device is a single device. eSl Delivery, No Personalization -
  • FIG. 9 illustrates one exemplary logical sequence for delivering an eSIM to a device without personalization.
  • the device identifies the server broker via discovery process (not shown). Once the device attempts to communicate with the server broker, there are three main operations: (i) the device queries the server backend about available eSIM options; (ii) the device requests that the server personalizes an eSIM if the requested eSIM has not been pre-personalized; and (iii) the device downloads the actual eSIM and install it.
  • getProfikOptiom is used by the device to query the server backend about available eSIM options.
  • the eUICC associated with the device is identified by its Uniqueld, which for example can be the card serial number.
  • the broker utilizes sales information to determine one or more eSIM options available to the device. For unlocked devices, there may be a very targe set of available eSIMs; thus, in some embodiments, common options that are likely to be chosen by the user are displayed (e.g., based on location, cost, etc.).
  • the server returns an array of profile providers (MNO) and profile types (e.g. prepaid/postpaid) that is valid for the device.
  • MNO profile providers
  • profile types e.g. prepaid/postpaid
  • the type of eS!Ms available to the user may be considered private information, therefore in some variants the getProfileOptions API further requires the device eUICC L3 to sign the unique identifier of the eUICC, and include the signed identifier in the API.
  • the server broker (or broker server) can verify the signature before processing the request. This prevents a malicious party from retrieving users' profile options by sending the masqueraded requests.
  • the communication between the device broker and the server broker uses a security protocol (e.g., transport layer security (TLS)) to prevent capture and replay attacks.
  • TLS transport layer security
  • a getProfileOptions contains two L3 tokens to verify the current and new ownership of the eSIM.
  • the current L3 token may be a unique identifier or so-called "faux card" scratch code.
  • the new L3 token can be information used to associate a user account with an eSIM, for example, a sign-on token for an iCloud account (e.g., where the device has logged into a user account to retrieve a token). Both L3 tokens are signed by the eUICC L3.
  • the server broker validates the L3 tokens using an associated authentication service. For example, it may communicate with a network server (e.g., the Assignee's iCloud server) or a third party service to validate the sign-on token.
  • the server broker After authenticating the token passed by the device, the server broker generates a one time code (OTC) and pass the OTC back to the device.
  • OTC one time code
  • the device can use the OTC as a proof that the server has already performed L3 authentication.
  • the complete data binary large object may include the generated OTC, unique device identifier (e.g. card serial number (CSN)), principal, service provider, and a timestamp to indicate validity of the OTC.
  • CSN card serial number
  • the BLOB is hashed and signed by the broker. In one variant, the hashing is performed with a symmetric key to improve overall performance. If getProfileOptions returns an array of eSIMs, the user is prompted to make a selection.
  • the device would call personalizeProfile to request the server backend to personalize an eSIM.
  • personalizeProfile Before the device sends the personalization request to the server, there is a session handshake between the eUICC profile agent and server profile agent for authentication.
  • the device broker and eUICC create a session, based on the profile option that the user has chosen, and the current L3 code and new L3 code sent by the server broker.
  • the eUICC can save this information to fill in the profile request sent subsequently thereafter.
  • the eUICC profile agent generates a session id, which will be echoed back by the server agent for authentication subsequent thereto.
  • the device broker can now pass a session request generated by eUICC to the server broker.
  • the server broker can check the request. For example, the server broker determines if the requesting eUICC, represented by unique ID, is serviceable. Since the unique ident!tifer is included in plaintext, the server broker can retrieve the information even though a more thorough verification of the request is performed by server profile agent.
  • the server broker passes the request to the profi!e agent.
  • the profile agent verifies the request cryptograph ically, by verifying the eUICC L2 certificate and using the eUICC L2 public key to verify the L2 signature. Once verification passes, the server profile agent creates a SessionRespo e, including a plaintext section containing: the received session identifier and unique identifier, a L2 signature (generated by hashing the plain text section and signing the hash using server profile agent's private key), and the server profile agent's certificate.
  • the session response is sent from server profile agent to the server broker, which then forwards the session response to the device broker.
  • the device broker passes the response to the eUICC in a prepareProfileRequest message.
  • the eUICC L2 verifies the sessionReponse by verifying the server profile agent's certificate and the L2 signature.
  • the eUICC L2 also verifies that the session identifier and unique identifier match the information in eUICC.
  • the eUICC creates a challenge for the personalized profile request.
  • the challenge is committed to non-volatile memory.
  • the eUICC then creates the profile request BLOB, including LI , L2 and L3 related information. Detailed structures are listed in APPENDIX A hereto, incorporated by reference herein.
  • the server broker performs L3 verification and includes L3 owner information (e.g. principal and service provider) to associate the eSIM with; the server profile agent creates a batch descriptor, and the server profile locker personalizes the eSIM for the eUICC.
  • L3 owner information e.g. principal and service provider
  • the personalized eSIM may be distributed to a content delivery network (CDN) for performance optimization.
  • CDN content delivery network
  • the device broker After the device broker receives the profile descriptor and associated L3 owner information, it retrieves the associated profile via getProfile by providing the received GUID (Globally Unique Identifier).
  • getProfile Globally Unique Identifier
  • the call flows shows three separate calls, processL3 Owner, processProfileDescriptor and installProflle, however it is appreciated that in actual implementation, these three logical calls can be combined within a single transaction.
  • the eUICC performs L3, L2, and LI verification; once verified, the eSI is installed. The associated challenge is deleted.
  • the L3 Owner information ts saved together with the eSIM to indicate proper ownership. L3 Owner information can be provided at a later point if the user exports the eSIM.
  • the eUICC returns the installation results to the server.
  • Server infrastructure can use the notification to trigger a purge of cached content in the content delivery network (CDN). In some cases, this information may also be used for notification services indicating e.g., successful installation, partial installation, unsuccessful installation, etc.
  • CDN content delivery network
  • FIG. 30 illustrates one exemplary logical sequence for delivering an eSIM to a device with pre-personalization. Similar to the scheme of FIG. 9, delivering a pre- personalized eSIM requires three (3) stages.
  • a factory broker instructs the eUICC to create a challenge for eSIM pre-personalization later.
  • the device is not yet associated with a MNO, or eSIM type; rather these fields are populated with a special value to indicate that a selection will be made later.
  • the complete content of the profile request BLOB is saved for personalization use later.
  • the second stage is triggered automatically by e.g., shipment notification, device sale, etc.
  • the L2 ⁇ client profile agent) in the distribution center acts as a proxy for the client eUICC L2. While the eUICC profile request BLOB does not contain a MNO and eSIM type, the client profile agent can regenerate the BLOB by replacing these fields with updated information.
  • the client profile agent can create its own challenge and replace the eUICC challenge.
  • the client profile agent will sign the content with its own private key (otherwise ail L2s would require unique challenges).
  • the BLOB will contain the eUICC's LI signature, the eUICC stilt needs to decrypt the personalized eSIM.
  • the new profile request BLOB is sent to the server broker using the existing personalizeProfik request.
  • the procedure is no different than the procedure of FIG. 9.
  • the disclosed pre-personalization process can use the same interface.
  • the server broker will return a batch descriptor to the client and personalize the eSIM.
  • the client profile agent would create a new batch descriptor with the eUICC's challenge, to be used when the eUlCC requests the profile later.
  • the device when the user powers up the device, the device performs getProflleOptions to check available eSIM options.
  • the response would include a valid batch descriptor and the device no longer needs to call personalizeProfile. It would use information in the descriptor to directly retrieve the eSIM via getProfile request.
  • FIG. 1 1 illustrates one exemplary logical sequence for deiivering a large number (batch) of eSIMs e.g., between two entities.
  • the client broker and server broker are secure entities which have a secure communication via e.g., Virtual Private Network (VPN). "Batching" is supported such that a client may place an order for a large quantity of eSIMs.
  • VPN Virtual Private Network
  • the profiles do not need to be personalized if the batch descriptor is returned; rather, the client may request actual profiles at a later stage as desired.
  • the hash of profile content is calculated over the encrypted profile (wrapped with a symmetric key) and profile metadata, neither of which requires profile to be personalized. This also does not require L I to store the symmetric key per eUICC, which would otherwise burden LI with additional storage requirement that is difficult to meet.
  • the encrypted eSIM wrapped with a symmetric key
  • the symmetric key would be wrapped with a LI RFS (remote file system) key and the wrapped key may be saved in off-storage together with the encrypted eSIM.
  • LI RFS remote file system
  • an eSIM is stored to a client device
  • the user may choose to export an eSIM off the device and later import the eSIM to the same or a different device.
  • One objective is to support eSIM swap.
  • Another objective is to free up eUICC memory to store additional eSIMs.
  • exporting there are three possible scenarios: (i) exporting to a cloud, (ii) exporting to an AP (for off-board storage), and (iii) device-to-device eSIM transfer.
  • the user may import from a cloud, AP, or another device.
  • user account information is associated to the eSIM (unless the user opts out).
  • the account information includes sufficient information for L3 authentication.
  • each eSIM may include a unique password, the user must have the password to prove their ownership.
  • OEM credentials is yet another option.
  • the AP retrieves a list of installed profiles from eUICC; for each profile, eUICC also returns the associated principal and a nonce generated for anti-replay.
  • the AP uses information contained in the principal to obtain a single sign-on (SSO) token from the service provider, where the user would be prompted to enter username and password for the purpose.
  • SSO token is passed together with principal and nonce to the server broker in export request.
  • the server broker can process the authentication with the service provider, using the SSO token supplied by the device. Once authentication passes, the flow mirrors eSIM delivery to the device, except that the client and server roles are reversed.
  • the server broker initiates a session with the eUICC, creates a request BLOB for the export.
  • the request it includes the nonce that the eUICC generated, to indicate that the operation has passed L3 authentication.
  • the eUICC verifies the request BLOB, encrypts the eSIM with the server agent's public key, creates a batch descriptor and L3 owner information for the eSIM.
  • the eSIM together with L3 and L2 information can be sent to the server.
  • the eUICC may save the encrypted copy to help recovery from connection loss (i.e., if the encrypted eSiM never reached the server).
  • the AP may save a copy of the encrypted eSIM for retransmission in the event of a connection failure. Servers may return acknowledgements which triggers the AP to clean up the stored copy.
  • export can also be initiated from a web portal. If the user loses his device, he may use a web portal to export eSI s from his device. In this case, the web portal would communicate with the device to initiate export operation. The flow is similar except that the user would use web portal instead of AP to obtain the SSO token for ownership verification. Apparatus -
  • FIG. 12 illustrates one exemplary embodiment of a eUICC appliance 1200 in accordance with the present disclosure.
  • the eUICC appliance may comprise a standalone entity, or be incorporated with other network entities such as e.g., servers.
  • the eUICC appliance 1200 generally includes a network interface 1202 for interfacing with the communications network, a processor 1204, and one or more storage apparatus 1206.
  • the network interface is shown connecting to the MNO infrastructure, so as to provide access to other eUICC appliances, and direct or indirect access to one or more mobile devices, although other configurations and functionalities may be substituted.
  • the eUICC appliance is capable of: (i) establishing communications with another eUICC (either a eUICC appliance or client device), (ii) securely storing an eSIM, (iii) retrieving a securely stored eSI , (iv) encrypting an eSIM for delivery to another specific eUICC, and (v) sending multiple eS!Ms to/from an eSIM depot.
  • eSIM Depot -
  • FIG. 13 illustrates one exemplary embodiment of an eSIM depot 1300 in accordance with the present disclosure.
  • the eSIM depot 1300 may be implemented as a stand-alone entity, or be incorporated with other network entities (e.g., an eUICC appliance 1200, etc.).
  • the eSIM depot 1300 generally includes a network interface 1302 for interfacing with the communications network, a processor 1304, and a storage apparatus 1306.
  • the eSIM depot 304 is capable of: (i) inventory management of eSIMs (e.g., via associated metadata), (ii) responding to requests for encrypted eSIMs (e.g., from other eSIM depots, and/or eU!CC appliances 1200), (iii) managing subscriber requests for eSIMs.
  • the eSIM when an eSIM is stored at an eSIM depot 1300 by a user, the eSIM may be stored with an intended destination (e.g., to facilitate transfer to another device), or parked indefinitely. In either case, the eSIM depot can provide the eSIM to the eUICC appliance for secure storage and for subsequent encryption for the destination device.
  • an intended destination e.g., to facilitate transfer to another device
  • the eSIM depot can provide the eSIM to the eUICC appliance for secure storage and for subsequent encryption for the destination device.
  • FIG. 1 exemplary user apparatus 1400 in accordance with various aspects of the present disclosure is illustrated.
  • the exemplary UE apparatus of FIG. 14 is a wireless device with a processor subsystem 1402 such as a digital signal processor, microprocessor, field-programmable gate array, or plurality of processing components mounted on one or more substrates.
  • the processing subsystem may also comprise an internal cache memory.
  • the processing subsystem is in communication with a memory subsystem 1404 including memory which may for example, comprise SRAM, flash, and/or SDRAM components.
  • the memory subsystem may implement one or a more of DMA type hardware, so as to facilitate data accesses as is well known in the art.
  • the memory subsystem contains computer-executable instructions which are executable by the processor subsystem.
  • the device includes one or more wireless interfaces 1406 adapted to connect to one or more wireless networks.
  • the multiple wireless interfaces may support different radio technologies such as GSM, CDMA, UMTS, LTE/LTE-A, WiMAX, WLAN, Bluetooth, etc. by implementing the appropriate antenna and modem subsystems of the type well known in the wireless arts.
  • the user interface subsystem 1408 includes any number of well-known I/O including, without limitation: a keypad, touch screen (e.g., multi-touch interface), LCD display, backlight, speaker, and/or microphone. However, it is recognized that in certain applications, one or more of these components may be obviated.
  • PCMCIA card-type client embodiments may lack a user interface (as they could piggyback onto the user interface of the host device to which they are physically and/or electrically coupled).
  • the device includes a secure element 1410 which contains and operates the eUiCC application.
  • the eUICC is capable of storing and accessing a plurality of access control clients to be used for authentication with a network operator.
  • the secure element includes a secure processor executing software stored in a secure media.
  • the secure media is inaccessible to all other components (other than the secure processor).
  • the exemplary secure element may be further hardened to prevent tampering (e.g., encased in resin) as previously described.
  • the exemplary secure element 1410 is capable of receiving and storing one or more access control clients.
  • the secure element stores an array or plurality of eSIMs associated with a user (e.g., one for work, one for personal, several for roaming access, etc.), and/or according to another logical scheme or relationship (e.g., one for each of multiple members of a family or business entity, one for each of personal and work use for the members of the family, and so forth).
  • Each eSIM includes a small file system including computer readable instructions (the eSIM program), and associated data (e.g., cipher keys, integrity keys, etc.)
  • the secure element is further adapted to enable transfer of eSIMs to and/or from the mobile device.
  • the mobile device provides a GUI- based acknowledgement to initiate transfer of an eSIM.
  • the mobile device sends a request for activation to an activation service.
  • the mobile device can use the eSIM for standard Authentication and Key Agreement (AKA) exchanges.
  • AKA Authentication and Key Agreement
  • FIG. 15 illustrates one embodiment of a method for large scale distribution of electronic access control clients.
  • a first device establishes ownership of one or more electronic access control clients.
  • the first device determines if one or more electronic access control clients have not been previously duplicated.
  • the first device encrypts the one or more electronic access control clients for transfer to the second device.
  • the first device and second device exchange or transfer the encrypted one or more electronic access control clients.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

Methods and apparatus for large scale distribution of electronic access control clients, in one aspect, a tiered security software protocol is disclosed. In one exemplary embodiment, a server electronic Universal integrated Circuit Card (eUlCC) and client eUiCC software comprise a so-called "stack" of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. The tiered security software protocol is configured for large scale distribution of electronic Subscriber Identity Modules (eS!Ms).

Description

METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS
Priority
This application claims priority to U.S. Patent Application Serial No. 13/767,593 filed contemporaneously herewith on February 14, 2013 and entitled "METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS", which claims priority to U.S. Provisional Patent Application Serial No. 61/598,819 filed February 14, 2012 and entitled "METHODS AND APPARATUS FOR LARGE SCALE DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS", each of the foregoing being incorporated herein by reference in its entirety.
Related Applications
This application is related to co-owned, co-pending U.S. Patent Application Serial Nos. 13/457,333 filed on April 26, 2012, and entitled "ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS", 13/464,677 filed on May 4, 2012, and entitled "METHODS AND APPARATUS FOR PROVIDING MANAGEMENT CAPABILITIES FOR ACCESS CONTROL CLIENTS", 13/095,716 filed on April 27, 201 1 , and entitled "APPARATUS AND METHODS FOR DISTRIBUTING AND STORING ELECTRONIC ACCESS CLIENTS", 13/080,558 filed on April 5, 201 1, and entitled "APPARATUS AND METHODS FOR CONTROLLING DISTRIBUTION OF ELECTRONIC ACCESS CLIENTS", 12/952,082 filed on November 22, 2010 and entitled "WIRELESS NETWORK AUTHENTICATION APPARATUS AND METHODS", 12/952,089 filed on November 22, 2010 and entitled "APPARATUS AND METHODS FOR PROVISIONING SUBSCRIBER IDENTITY DATA IN A WIRELESS NETWORK", 1 3/183,023 filed on July 14, 201 1 and entitled "VIRTUAL SUBSCRIBER IDENTITY MODULE DISTRIBUTION SYSTEM", and 12/353,227 filed on January 13, 2009, and entitled "POSTPONED CARRIER CONFIGURATION", 13/093,722 filed on April 25, 201 1, and entitled "APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS", 13/109,851 filed on May 17, 201 1 and entitled "'METHODS AND APPARATUS FOR ACCESS CONTROL CLIENT ASSISTED ROAMING", 13/079,614 filed on April 4, 201 1 and entitled "MANAGEMENT SYSTEMS FOR MULTIPLE ACCESS CONTROL ENTITIES", 13/1 1 1,801 filed on May 19, 201 1 and entitled "METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK" 13/080,521 filed on April 5, 201 1 and entitled "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS", 13/078,81 1 filed on April 1 , 201 1 and entitled "ACCESS DATA PROVISIONING APPARATUS AND METHODS". 13/287,874 filed on November 2, 201 1 and entitled "METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROM A MALFUNCTIONING DEVICE", 13/080,533 filed on April 5, 201 1 and entitled "SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS", and 13/294,63 1 filed on November I I , 201 1 and entitled "APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATION", each of the foregoing being incorporated herein by reference in its entirety. Background
1. Technological Field
The present disclosure relates generally to the field of wireless communication and data networks. More particularly, the invention is directed to, inter alia, methods and apparatus for large scale distribution of electronic access control clients.
2. Description of Related Art
Access control is required for secure communication in most prior art wireless radio communication systems. As an example, one simple access control scheme might comprise: (i) verifying the identity of a communicating party, and (ii) granting a level of access commensurate with the verified identity, Within the context of an exemplary cellular system (e.g., Universal Mobile Telecommunications System (UMTS)), access control is governed by an access control client, referred to as a Universal Subscriber Identity Module (USiM) executing on a physical Universal Integrated Circuit Card (UICC) (also referred to as a "SIM card"). The USIM access control client authenticates the subscriber to the UMTS cellular network. After successful authentication, the subscriber is allowed access to the cellular network. As used hereinafter, the term "'access control client" refers generally to a logical entity, either embodied within hardware or software, suited for controlling access of a first device to a network. Common examples of access control clients include the aforementioned US!M, CDMA Subscriber identification Modules (CSIM), IP Multimedia Services Identity Module (ISIM), Subscriber Identity Modules (SIM), Removable User Identity Modules (RUIM), etc.
Prior SIM card based approaches suffer from a number of disabilities. For instance, traditional UICCs support only a single USIM (or more generally "SIM") access control client. If a user wants to authenticate to a cellular network using a different SIM, the user must physically exchange the SIM card in the device with a different SIM card. Some devices have been designed to house two SIM cards at the same time (Dual-S!M phones); however, such Dual-SIM phones do not address the fundamental physical limitations of SIM card devices. For example, information stored within one SIM card cannot be easily consolidated with information stored within another SIM card. Existing Dual-SIM devices cannot access the contents of both SIM cards simultaneously.
Moreover, accessing a SIM card requires a perceptible amount of time for the user; switching between SIM cards to transfer information is undesirable, and is present in both traditional and Dual-SIM devices.
Additionally, existing SIM card issuers and activation entities are generally network-specific, and not ubiquitous for different users in different networks. Specifically, a given user within a given network must activate their phone or obtain replacement SIM cards from a very specific entity authorized to issue the SIM. This can greatly restrict a user's ability to rapidly obtain a valid access privilege, such as when roaming across other networks, replacing their phone, etc.
More recently, electronic SIMs (so-called eSIMs) have been developed, such as by the Assignee hereof. These electronic SIMs provide enhanced flexibility in terms of changeout with another eSIM, transfer to another device, etc. However, existing network infrastructure for distribution and activation of SIMs has not kept pace with these advances, and hence Accordingly, new solutions and infrastructure are needed to leverage the enhanced flexibility provided by electronic access clients (e.g., eSlMs), and to support secure and ubiquitous distribution thereof. Summary
The present disclosure provides, inter alia, for large scale distribution of electronic access control clients.
Firstly, a method for large scale distribution of electronic access control clients is disclosed, in one exemplary embodiment, the method includes: establishing ownership of one or more electronic access control clients; determining if one or more electronic access control clients have not been previously duplicated; encrypting the one or more electronic access control clients for transfer to a second device; and exchanging the encrypted one or more electronic access control clients.
An apparatus for large scale distribution of electronic access control clients is also disclosed. In one exemplary embodiment, the apparatus includes: a processor; and a non-transitory computer-readable medium that includes instructions which when executed by the processor: establish ownership of one or more electronic access control clients; determine if one or more electronic access control clients have not been previously duplicated; encrypt the one or more electronic access control clients for transfer to a second device; and exchange the encrypted one or more electronic access control clients.
A mobile device for transacting an electronic access control client is further disclosed. In one embodiment, the device includes: a wireless interface configured to communicate with a wireless network; a processor in data communication with the interface; and a secure element in data communication with the interface. In one variant, the secure element includes: a secure processor; secure storage in data communication with the secure processor and having a plurality of access control clients useful for authentication with at least the network stored thereon; and logic in data communication with the secure processor, the logic configured to store, access, and transfer to or from the apparatus the plurality of access control clients; and user interface logic in communication with at least the secure element and configured to enable a user of the apparatus to select one of the stored plurality access control clients, and authenticate the apparatus to the network so as to enable communication therewith.
A wireless system is also disclosed.
Additionally, a computer readable apparatus is disclosed, in one embodiment, the apparatus includes a storage medium having a computer program disposed thereon, the program configured to, when executed: distribute electronic access control clients.
Additionally, a network architecture for providing wireless mobile devices with electronic access clients is disclosed. In one embodiment, the architecture includes: a plurality of brokers; and a plurality of manufacturers in data communication with the plurality of brokers. In one variant, a given user mobile device may be serviced by multiple ones of the brokers; and any one of the brokers may order electronic access clients from one or more of the manufacturers.
Apparatus for providing electronic access clients to one or more mobile devices, is also disclosed. In one embodiment, the apparatus includes: at least one processor: and first logic in data communication with the at least one processor, the first logic configured to cause the apparatus to perform encryption and decryption of an access client; second logic in data communication with the at least one processor, the second logic configured to cause the apparatus to ensure that the access client is not duplicated; and third logic in data communication with the at least one processor, the third logic configured to cause the apparatus to establish at least one of trust, ownership, and/or verification of a user of the access client.
An electronic access control client revocation procedure is further disclosed. In one embodiment, the procedure includes: determining if a signing certificate authority that issued a certificate is compromised, the certificate associated with one or more devices storing the certificate; determining at the one or more devices a certificate service request created when an initial request for the certificate was created; requesting a new certificate using the determined certificate service request; and issuing a new certificate based on the requesting. In one variant, the one or more devices can use a previous used private key as part of the requesting, and the new certificate is issued containing a previous public key corresponding to the previous private key. Other features and advantages will immediately be recognized by persons of ordinary skill in the art with reference to the attached drawings and detailed description of exemplary embodiments as given below. Brief Description of the Drawings
FIG. 1 is a logical block diagram of one exemplary electronic Universal integrated Circuit Card (eUICC) useful in conjunction with various aspects of the present disclosure.
FIG. 2 is a logical block diagram of one exemplary electronic Subscriber Identity Module (eS!M) directory structure useful in conjunction with various aspects of the present disclosure.
FIG. 3 is a logical block diagram representing one exemplary state machine for Subscriber Identity Module (SIM) Dedicated Files (SDF) useful in conjunction with various aspects of the present disclosure.
FIG. 4 is a logical block diagram representing one exemplary state machine for eSIM operation useful in conjunction with various aspects of the present disclosure.
FIG, 5 is a graphical representation of one exemplary eSIM broker network useful with various embodiments of the present disclosure.
FIG, 6 is a logical block diagram of one exemplary tiered security protocol useful with various embodiments of the present disclosure.
FIG. 7 is a graphical representation of one exemplary data structure comprising three (3) pieces, useful in conjunction with various aspects of the present disclosure.
FIG. 8 is a graphical representation of one exemplary OEM certificate hierarchy, useful in conjunction with various aspects of the present disclosure.
FIG. 9 is a logical flow diagram illustrating one exemplary logical sequence for delivering an eSIM to a device without personalization.
FIG. 10 is a logical flow diagram illustrating one exemplary logical sequence for delivering an eSIM to a device with pre-personaiization.
FIG. 1 1 is a logical flow diagram illustrating one exemplary logical sequence for delivering a batch of eSIMs to a device.
FIG. 12 is a logical representation of an electronic Universal Integrated Circuit Card (eUICC) apparatus. FiG. 13 is a logical representation of an electronic Subscriber Identification Module (eSIM) depot apparatus.
FIG. 14 is a logical flow diagram illustrating one exemplary user apparatus. FIG.15 is a logical flow diagram illustrating one embodiment of a method for large scale distribution of electronic access control clients.
Ail Figures C Copyright 2012-2013 Apple Inc. All rights reserved.
Detailed Description
Reference is now made to the drawings, wherein like numerals refer to like parts throughout.
Description of Exemplary Embodiments
Exemplary embodiments and aspects of the present disclosure are now described in detail. While these embodiments and aspects are primarily discussed in the context of Subscriber Identity Modules (SIMs) of a GSM, GPRS/EDGE, or UMTS cellular network, it will be recognized by those of ordinary skill that the present disclosure is not so limited. In fact, the various features of the disclosure are useful in any network (whether wireless cellular or otherwise) that can benefit from storing and distributing access control clients to devices.
As used herein, the terms "client" and "UE" include, but are not limited to wireless-enabled cellular telephones, smartphones (such as for example an iPhone™), wireless enabled personal computers (PCs), mobile devices such as handheld computers, PDAs, personal media devices (PMDs), wireless tablets (such as for example an iPad™), so-called "phablets", or any combinations of the foregoing.
As used hereinafter, the term "Subscriber Identity Module (SIM)", "electronic
SIM (eSIM)", "profile", and "access control client" refer generally to a logical entity, either embodied within hardware or software, suited for controlling access of a first device to a network. Common examples of access control clients include the aforementioned USIM, CDMA Subscriber Identification Modules (CSIM), IP Multimedia Services Identity Module (IS1M), Subscriber Identity Modules (SIM), Removable User Identity Modules (RUIM), etc., or any combinations of the foregoing. it will also be recognized that while the term "subscriber identity module" is used herein (e.g., eSIM), this term in no way necessarily connotes or requires either (i) use by a subscriber per se (i.e., the various features of the disclosure may be practiced by a subscriber or non-subscriber); (ii) identity of a single individual (i.e., the various features of the disclosure may be practiced on behalf of a group of individuals such as a family, or intangible or fictitious entity such as an enterprise); or (iii) any tangible "module" equipment or hardware.
Exemplary eUICC and eSIM operation - Various features and functions of the present disclosure are now discussed with respect to one exemplary implementation. In the context of the exemplary embodiment of the present disclosure, instead of using a physical UiCC as in the prior art, the UICC is emulated as a virtual or electronic entity such as e.g., a software application, hereafter referred to as an Electronic Universal Integrated Circuit Card (eUICC), that is contained within a secure element (e.g., secure microprocessor or storage device) in the UE. The eUICC is capable of storing and managing multiple SIM elements, referred hereafter as Electronic Subscriber Identity Modules (eSIM). Each eSIM is a software emulation of a typical USIM, and contains analogous programming and user data associated therewith. The eUICC selects an eSIM based upon the eSlM's ICC-ID. Once the eUICC selects the desired eSIM(s), the UE can initiate an authentication procedure to obtain wireless network services from the eSlM's corresponding network operator. eUICC Software Architecture - Referring now to FIG. 1 one exemplary electronic Universal Integrated Circuit
Card (eUICC) useful in conjunction with the present disclosure is shown. Examples of an exemplary eUICC are described within co-owned, co-pending U.S. Patent Application No. 13/093,722 tiled on April 25, 201 1 , and entitled "APPARATUS AND METHODS FOR STORING ELECTRONIC ACCESS CLIENTS", previously incorporated by reference in its entirety, although it will be appreciated that other may be used consistent with the present disclosure.
FIG. 1 illustrates one exemplary Java Card™ eUICC architecture. Other examples of Operating Systems (OS) for use on smart card applications include 01
(without limitation) MULTOS and proprietary OSs, Java Card being merely illustrative. The OS provides an interface between application software and hardware. Generally, the OS includes services and functionality configured for: input Output (I/O), Random Access Memory (RAM), Read Only Memory (ROM), non-volatile memory (NV) (EEPROM, flash), etc. The OS may also provide cryptographic services used by higher layers, memory and file management, and communication protocols.
The exemplary Java implementation is composed of three pieces: a Java Card Virtual Machine (JCVM) (a byte code interpreter); Java Card run time environment (JCRE) (which manages card resources, applet execution and other runtime features); and Java Application Programming Interfaces (APIs) (a set of customized classes for programming smart card applications).
The JCVM has an on-card component (the byte code interpreter), and an off- card counterpart (the converter). Some compilation tasks may be performed by the converter due to card resource restrictions. Initially, the Java compiler creates class files from source code. The converter preprocesses the class files and creates a CAP file. The converter verifies that the load images of the Java classes are well formed, checks for Java card language subset violations, and also performs some other tasks. A CAP file contains an executable binary representation of the classes in a Java package. The converter also generates export files, which contain public API information. Only the CAP file is loaded into the card. Another commonly used format is IJC, which can be converted from CAP files. IJC files may be slightly smaller in size compared to CAP files.
Typically, downloading an applet to a card requires an Application Protocol Data Unit (APDU) exchange to load the content of the CAP file into the persistent memory of the card. The on card installer would also link the classes in the CAP file with other classes on the card. Thereafter the installation process creates an instance of the applet and registers the instance with the JCRE. Applets are held in a suspended state until selected.
The foregoing procedure may additionally implement one or more layers of security. In one exemplary embodiment, a Global Platform (GP) provides a secure protocol to manage applications. The GP operates within a secure issuer security domain, which is an on-card representation of the card issuer. The card may also execute other security domains for e.g., application providers.
in one exemplary embodiment, the eUiCC is a non-removable component of a device. During operation, the eUICC executes a secure bootstrap OS. The bootstrap OS ensures that the eUICC is secure, and manages execution of the security protocols therein. Examples of a secure bootstrap OS are described within co-owned, copending U.S. Patent Application No. 13/080,521 filed on April 5, 201 1 and entitled "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS", previously incorporated by reference in its entirety. It is further appreciated that different Mobile Network Operators (MNOs) may customize eSIMs to support various degrees of service differentiation. Common examples of customization include, without limitation, proprietary file structures and/or software applications. Due to the configurability of eSIMs, eSIMs can vary significantly in size.
Unlike prior art SIM cards, eSIMs can be freely exchanged between devices according to a secure transaction. Subscribers do not require a "physical card" to move SIMs among devices; however, the actual transaction of eS!Ms must be securely protected e.g., via specific security protocols. In one exemplary embodiment, an eSIM is encrypted for a specific receiver before being delivered. In some variants, in addition to the encrypted content, each eSIM may include a meta-data section that is plaintext. A cryptographic signature may further be used to ensure integrity of the plain text content. This meta-data section may be freely provided (even to unsecure entities), to assist in non-secure storage, etc. eSIM Software Architecture -
Referring now to FIG. 2, one exemplary electronic Subscriber identity Module (eSIM) directory structure, embodied within the exemplary eUICC, is disclosed. As shown, the eSIM directory structure has been modified to support the flexibility offered by eSIMs. For example, the eSIM directory structure include inter alia: (i) EFeSimDir which contains a list of eSIMs installed; (ii) EFcsn which contains the card serial number that giobally uniquely identifies the eUICC; (iii) DFsecurity stores security related data and the private key corresponding to one or more eUICC certificates. In one such variant, the DFsecurity information includes: (i) DFepcf W which contains eUICC platform level PCF; (ii) EFoemcert which contains the root certificate and common name of the OEM (OEM credential can be used for special operations such as factory refurbishment); (iii) EfeUICCcert which is the certificate of the eUICC; (iv) EFsLlcert which is the root certificate of server L I appliances; (v) 5 EFsLIcert which is the root certificate of server L2 appliances; and (vi) EFsL3cert which is the root certificate of server L3 appliances.
In one exemplary embodiment, the directory structure further includes SIM Dedicated Files (SDF) which contain file structures that are specific to an eSIM. Each SDF is located directly under the MF. Each SDF has a name attribute and a SID 10 (eSIM ID), such as the Integrated Circuit Card Identifier (ICCID). As shown, each SDF further contains DFprofiles and DFcodes. Furthermore, in one variant, all profile PCF related EFs are stored under DFppcf, which is stored under DFprofile.
In one exemplary embodiment, DFprofile information includes: (i) EFname which is a description of the eSIM (such as name and version of the eSIM); (ii) 5 EFtype which describes the type of the eSIM (e.g., regular, bootstrap, and test).
Software applications may use this information to e.g., display an icon when a bootstrap eSIM is in use; (iii) EFsys_ver which is the minimum version number of the eUICC software to necessary to support the eSIM; (iv) EFnvjnin which indicates the minimum amount of non volatile memory required by the eSIM; (v) EFramjnin0 which indicates the minimum amount of volatile memory required; (vi) EFnvjrsvd which indicates the amount of non volatile memory reserved for over the air transactions (OTA); and (vii) EFratnj-svd which indicates the amount of volatile memory reserved for OTA.
In one exemplary embodiment, DFcode information contains a set of keys for5 each eSIM. These values cannot be read out of eUICC under most circumstances. One exceptional use case is the export operation which cryptographically wraps and exports the entire eSIM. Since the entire eSIM is encrypted, the values of keys remain secured. In one exemplary embodiment, the DFcode information comprises: (i) ExEFgPinx/gPukx which contains a global PIN (Personal Identification Number) and0 PU (PIN Unlock Key); (ii) EFuPin/uPuk contains the universal PIN and PU ; (iii) EFadminx contains ADMIN codes; and (iv) EFolax which contains OTA codes, in some variants, there may also be an ADFusim which contains additional elements such as: (i) EFk which stores K, the 128-bit shared authentication key; (ii) EFopc which stores OPc, which is derived from the subscriber key and operator variant algorithm configuration field OP (some variants may store OP instead of OPc); (iii) EFauthpar which specifies the length of RES; (iv) EFalgid which specifies the network authentication algorithm (for example, Milenage); (v) EFsqn which stores SQN; and (vi) EFlpinx/lp kx which stores the P!N and PU code for the local PIN.
It will be appreciated by those of ordinary skill reading this disclosure that the foregoing files, structures, or elements are merely exemplary, and may be substituted with others possessing the desired functionality or structure.
Referring now to FIG. 3, one exemplary state machine for SDF operation is illustrated. As shown, the SDF state machine comprises the following states: CREATION, INITIALISATION, OPERATIONAL (ACTIVATED), OPERATIONAL (DEACTIVATED), and TERMINATION.
When an eSIM is first installed, the SDF is created (CREATION) and then initialized (INITIALISATION) with the file structure data included in the eSIM. Once the eSIM has been installed, the SDF transitions to the DEACTIVATED state. During the deactivated state, none of the files are available. Once an eSIM is selected, the SDF transitions from the DEACTIVATED state to the ACTIVATED state; the ACTIVATED state enables access to the files of the SDF. When an eSIM is deselected (either implicitly or explicitly) the SDF transitions from the ACTIVATED state back to the DEACTIVATED state.
Referring now to FIG. 4 one exemplary state machine for eSIM operation is illustrated. As shown, the eSIM state machine comprises the following states: INSTALLED, SELECTED, LOCKED, DEACTIVATED, EXPORTED, and DELETED.
During eSIM installation (INSTALLED), an entry for the eSIM is created in the eUICC registry; the entry indicates one or more associated SDF and applications.
During the INSTALLED state, the SDF are set to the DEACTIVATED state and applications are set to an INSTALLED state.
Once the eSIM is selected, the eSIM transitions to the SELECTED state. During the selected state, the SDFs transition to the ACTIVATED state and the applications are transitioned to a SELECTABLE state. If an eSIM is deselected, the eSIM transitions back to the INSTALLED state. Under certain circumstances, the eSIM may enter a LOCKED state. For example, if the eUICC PCF is changed such thai an installed eSIM may no longer be used, then the eSIM will transition to the LOCKED state. In the LOCKED state, the SDF are set to the DEACTIVATED state and applications are set to the LOCKED state. Other miscellaneous states include, the EXPORTED state (i.e., where the eSIM is exported and may no longer be selected), and the DELETED state (i.e., where the eSIM is deleted).
Network Authentication Algorithms - Network Authentication Algorithms (NAA) are generally mandatory for operation with Mobile Network Operators (MNOs). While different implementations of NAA exist, the functionality is not substantially different. In certain embodiments, the eUICC may include common packages for NAAs. During eSIM installation, an instance of each NAA app can be created for each eSIM from the pre-loaded packages, to reduce overall loading time of eSIM, and unnecessary memory consumption on eUICC.
Common examples of NAA include without limitation: Milenage, COMP 128 V I , COMP 128 V2, COMP128 V3, and COMP128 V4, and certain proprietary algorithms. There are a larger number of proprietary algorithms still in use (due to known attacks on COMF128 V ! ). in one embodiment, network authentication is based on the well known Authentication and Key Agreement (AKA) protocol.
In the unlikely event that a NAA is compromised, replacement NAA schemes may require a software update. During such an event, eS!Ms may be patched with a replacement algorithm via e.g., a secure software update. Thereafter, the MNO may enable the replacement algorithm via an existing OTA mechanism.
Exemplary eSIM Broker Network -
FIG. 5 shows a high level view of one exemplary eSIM broker network useful with various embodiments of the present disclosure. In one exemplary embodiment, the broker network comprises a distributed network of brokers and manufacturers, such that a device may be serviced by multiple brokers, and a broker may order eSIMs from multiple eSIM manufacturers. In some embodiments, there may exist eUICC and/or eSIM profile policies that limit the group of brokers that a device may communicate with for certain eSIM operations. For example, a MNO may require devices that are subsidized by the MNO only communicates with brokers owned by the MNO.
In one such variant, the primary broker provides discovery services to devices, such that the device can identify an appropriate broker. Thereafter, the device can communicate directly with the identified broker for eSIM operations (e.g., such as purchase, installation, export, and import).
Those of ordinary skill in the related network arts will recognize that multiple practical issues arise during the operation of large scale distribution networks, such as that represented by FIG. 5. Specifically, large scale distribution networks must be scalable to handle large bursts of provisioning traffic (such as can occur on a so-called "launch day" of a given mobile user device). One suggested scheme for reducing overall network traffic entails pre-personalizing eSIMs (where possible) prior to launch day. For example so-called "SIM-in" units are already assigned an eSIM at shipment; this pre-assigned eSIM can be pre-personalized for the unit by, for example, encrypting the corresponding eSIM profile with a key specific to the eUICC of the unit.
Other considerations include system reliability, for example, the broker network must be able to recover from various equipment failures. One solution is geographic redundancy where multiple data centers across different locations have duplicate content; however, the network of data centers may actively synchronize with each other to avoid eSIM cloning. Such network synchronization would require extraordinary amounts of network bandwidth. In alternate solutions, each data center may have a separate set of eSIMs; however this requires an significant eSIM overhead.
Ideally, the brokering network can flexibly adapt to various business models. Specifically, for various legal and antitrust reasons, various components of the foregoing broker network may be handled by different parties. Accordingly, security aspects of eSIM traffic needs to be carefully monitored and evaluated. Each eSIM contains valuable user and MNO information. For example, an eSIM may include the shared authentication key (K for USIM and Ki for SIM), which if compromised could be used for SIM cloning. Similarly, eSIMs may also contain applications that may have sensitive user data such as bank account information. Moreover, it is further appreciated that eUICC software requires further countermeasures for device recovery. Unlike physical SlMs, if the eUICC software goes into an unrecoverable state, the entire device will need to be replaced (which is much more costly than changing a SIM card). Accordingly, exemplary solutions should be able to handle device recovery so as to preclude such draconian measures.
Finally, the network operation should provide for a "good" user experience. Excessive response times, unreliable operation, excessive software crashes, etc. can significantly detract from the overall user experience. Exemplary Security Protocol -
Accordingly, a tiered security software protocol is disclosed herein to address various of the foregoing issues. In one exemplary embodiment, the server eUICC and client eUICC software comprise a so-called "stack" of software layers. Each software layer is responsible for a set of hierarchical functions which are negotiated with its corresponding peer software layer. Moreover, each software layer further communicates with its own layers. It is further appreciated that in some cases, the device application processor (AP) may be compromised (e.g., "jaiibroken", etc.); consequently, it is recognized that trust relationships exist between the client eUICC and corresponding server eUICC (or other secure entity); i.e., the AP is not trusted.
In one exemplary embodiment, a three (3) tiered system is disclosed. As illustrated in FIG. 6, the security software protocol comprises a Level I (LI), Level 2 (L2), and Level 3 (L3). LI security performs encryption and decryption of eSIM Data. LI operations are limited to secure execution environments (e.g., an eUICC or Hardware Security Module (HSM)). Within LI , eSIM data can be stored in plain text (i.e., unencrypted) within the logical LI boundary; outside of the LI boundary the eSIM data is always securely encrypted. L2 security ensures that an eSIM cannot be duplicated. The L2 boundary ensures that one and only one copy of an eSIM exists. Within the L2 boundary multiple copies may exist. Moreover, L2 security may further embed a challenge into the encrypted eSIM payload; a recipient of the eSIM will compare the received challenge to the challenge stored earlier before installing the eSIM to ensure that its eSIM is not stale (i.e., is the current one and only eSIM). L3 security is responsible for establishing trust, ownership, and verification of the user. For each eSIM, the eUICC may store information to indicate ownership associated with the eSIM.
In one exemplary implementation, so-called "challenges" are a critical resource used to associate a specific eSIM instance with an eUICC. Specifically, each eUICC maintains a certain number of challenges for each profile agent, which is the logical entity that maintains L2 security. By verifying that a challenge is valid, the eUICC can be sure that the eSIM is not a stale eSIM (i.e., an invalid duplicate). A number of challenges are created for each eSIM to be personalized. The eUICC deletes a challenge when a matching eSIM is received.
Consider the following pre-persona!ization scenario, an eUICC creates (or is given) a number of challenges which is provided to the network; the challenges are also saved in non volatile memory of the eUICC. Subsequently thereafter, the network can generate an eSIM for the eUICC which is bound to the pre-generated challenge. When the eUICC receives an eSIM later during device activation, the eUICC can verify that the received eSIM contains the appropriate challenge.
However, one drawback of the foregoing scheme is that a fixed number of challenges can be easily compromised with a denial of service (DOS) attack. In a DOS attack, the eUICC is continuously triggered to generate challenges until all of its challenge resources are exhausted. Accordingly, in one such variant, the eUICC additionally performs a session handshake to authenticate a profile server/agent before processing requests that would trigger eU!CC to create a challenge. Additionally, in the unlikely case that resources are exhausted and eUICC is unable to create new challenges, the eUICC may store a separate set of reserved challenges specifically designated for freeing up another set of challenges. In some cases, the eUICC may additionally include an Original Equipment Manufacturer (OEM) credential, which the OEM can use to further control challenge operation.
Referring now to FIG. 7, one exemplary data structure for an eSIM is illustrated. As shown, the exemplary data structure comprises three (3) pieces, one for each of the LI , L2, and L3 security levels. By decoupling security components into distinct levels, overall network operation can be distributed over multiple entities according to a wide variety of options. For example, various network entities may perform only one or two of the security layers (e.g., a eSIM vendor may only handle L2, etc.); this flexibility easily and advantageously accommodates virtually any business arrangement.
As shown in FIG. 7, because asymmetric encryption (i.e., where each entity has a distinct and unique key) is much slower than symmetric operation (where entities share a key), each eSIM profile component 702 is encrypted with a symmetric key, and the symmetric key is encrypted with the L I public key of the destined eSIM receiver. The eSIM may further includes a plain text section for metadata (such as a text string of the ICCID). The encrypted symmetric key, meta data, and encrypted eSIM content is hashed and signed with the public key of the "donating" LI entity. The associated L 3 certificate is appended, e.g., at the end, for verification.
The batch descriptor component 704 of FIG. 7 contains L2 information for the eSIM. It has a plain text section including a Globally Unique Identifier (GUID), a challenge for the destined eSIM receiver, a unique ID of the eSIM receiver, a URL to retrieve the profile, and the URL to post an installation result to. The batch descriptor also includes a plain text section of an array of elements that consist of: an ICCID for each profile, and a hashed portion of the profile (the metadata section and the encrypted eSIM content). In one embodiment, the hash does not include the symmetric key, such that a batch descriptor can be created without waiting for an actual profile to be generated. For device side operation, a batch descriptor only contains one ICCID and profile hash. For server to server batching transfer, a much larger array is expected. The data content of the batch descriptor is hashed and signed with a L2 public key, and an associated L2 certificate is appended at the end.
The L3 owner component 706 contains L3 information for the eSIM. The principal field identifies the user account associated with the eSIM (e.g., abc@me.com), the service name identifies the service provider to authenticate the user account with. The hash of batch descriptor is included to associate the L2 and L3 data structures. The data may be stored in plain text, hashed and signed with L3 public key. The L3 certificate is appended at the end.
As used herein, there are three (3) types of certificates: eUICC certificates, server appliance certificates, and OEM certificates. In one embodiment, a trusted third party issues certificates for certified eUICCs. Each eUICC contains a private key and an associated certificate, issued by this entity or a subordinate key authority of this entity. In some embodiments, one trusted third party may issue certificates for certified LI , L2, and L3 appliances; or alternately, separate third party entities may issue certificates for L I , L2, or L3 appliances. Where multiple third parties exist, the eUICC has preioaded (or may be provided OTA from a trusted entity) the root Certificate Authority (CA) of the third parties, and can verify messages received from the server appliances based on the appropriate CA.
Referring now to FIG. 8, one exemplary OEM certificate hierarchy is illustrated. The Root Certificate Authority (CA) has a set of intermediate CAs that perform a subset of tasks (e.g., issuing e.g., iOS or comparable device certificates). As shown, an eUICC CA is charged with eSIM specific operations. The eUICC CA may issue certificates for a set of servers; as shown the certificates include e.g., factory refurbishing servers for eUICC maintenance, and activation servers for signing eUICC PCF. The Root CA together with the common name of the eUICC CA are used by the client eUICC to verify the OEM signed messages.
In accordance with the foregoing, in one exemplary embodiment, each client eUICC stores the following security related data: (i) eUICC certificate that is used for eUICC LI , L2, and L3 operations (each eUICC stores a certificate that is used for both Li , L2, and L3 security related operations); (ii) an eUICC private key that is associated with the eUICC certificate; (iii) OEM credentials that include the root certificate of OEMs and the common name of the OEM eUICC CA; (iv) and root certificates of third parties that can certify server appliances. In some variants, certificates in the eUICC may need to be replaced if a signing CA is compromised; for example, if an eUICC CA or server CA is compromised (e.g., a private key has been compromised/lost), two (2) revocation procedures are described below.
According to a first exemplary revocation procedure, if a signing CA that issues eUICC certificates is compromised, the eUICC certificate stored in affected eUICCs should be replaced. Specifically, when the initial certificate request was created for the eUICC, the Certificate Signing Request (CSR) was saved. If the signing CA is compromised, a new certificate can be requested for the eUICC, using the initial CSR. By keeping the same CSR, the eUICC can use the same private key, and a new certificate will be issued containing the same eUICC public key. The OEM can sign the new certificate with the OEM's private key. When the eUICC sends requests to a server broker, the broker can check a revocation list of bad eUICC CAs and reject the request with a specific error to indicate that the certificate needs to be replaced. The AP can retrieve the new eUICC certificate via existing OEM services and send the new certificate to eUICC (the AP does not have to be trusted in this scenario).
Thereafter, the eUICC verifies the OEM signature and ensures that the received public key matches its previously stored public key in the eUICC. In some variants, in order to prevent denial of service (DOS) attacks or replay attacks, the eUICC additionally includes eUICC certificates. The epoch is in one variant increased when a new certificate is issued. The eUICC can verify that the eUICC epoch in the received certificate is higher than that of the current certificate, before storing the new certificate.
Unfortunately, revoking server certificates in eUICC can be challenging due to various eUICC resource constraints; i.e., processing a large revocation list may be untenable for an eUICC. To avoid maintaining revocation lists, in a second revocation scheme, each server certificate is additionally associated with an epoch. If a CA is compromised, the root CA reissues certificates for ail legitimate entities, and increases the epoch of each new certificate. Since the number of server certificates will not be large, reissuing certificates can be handled in existing systems. At the client eUICC, the eUICC saves the expected epoch of server LI , L2, and L3 certificates in nonvolatile memory. When a received certificate contains a higher epoch, eUICC must update the corresponding NV epoch and reject any future certificates with a lower epoch; i.e., the eUICC will reject rogue servers that have not been signed since the CA was compromised. In some variants, the server may also maintain an eUfCC blacklist for compromised eUICCs. Requests from blacklisted eU!CC are in one embodiment rejected by the server.
Policy Control Functions -
Within the context of the foregoing security solution, there are two (2) levels of Policy Control Functions (PCF): (i) eUfCC platform level, and (ii) profile level. In one exemplary embodiment, the eUICC PCF may only be updated by OEM, whereas the Profile PCF is controlled by MNOs and is a part of the eSIM. In one such variant, when an eSIM is exported and/or imported, the profile PCF is included as a part of the export import package. Referring now to the eUICC PCF, the eUICC PCF may include: (i) a SIM lock policy that specifies the types of eSIMs that the eUICC may activate; (ii) a secret code that can be used to authorize deletion of all eSIMs in an eUICC; (iii) a list of common names of server (LI , L2, and L3) that specify a cluster of server appliances that the eUICC may communicate with (e.g., based on business considerations or methods) (i.e., an inclusive listing); (iv) a list of common names of server (LI , L2, and L3) that specify a cluster of server appliances that the eUICC may not communicate with (i.e., an exclusive listing).
Similarly, the profile PCF may include: (i) a list of common names of servers (LI , L2, and L3) that specify a cluster of depots that the eUICC may export the eSIM to (inclusive); (ii) a list of common names of servers (L I , L2, and L3) that specify a cluster of depots that the eUICC may MOT export the eSilvl to (exclusive); (iii) notification URLs and operation types which specify URLs that are sent notifications upon completion of a specified eSIM operation; (iv) auto-expiration parameters where the AP may delete the eSIM once profile has expired; (v) classes of server appliances (L I , L2, and L3) that may be assigned different classes indicating the security levels implemented (a profile may choose to only communicate with server components above certain levels); (vi) an epoch of server certificates (LI , L2 and L3) which are checked during installation (e.g., the eUICC only installs profiles if the epoch of eUICC server certificates are equal to or above the specified epoch); (vii) L3 service names that L3 authentication may use, and/or a list of service names that L3 authentication cannot use; (viii) a minimum version of eUICC system (where the eSIM may only be installed on eUICC systems above the specified the minimum version); (ix) a minimum RAM size required for the eSIM (not including OTA operations); (x) a minimum RAM size reserved for OTA; (xi) a minimum non-volatile (NV) a memory size required for the eSIM (excluding the space served for OTA); (xii) a minimum NV size reserved for OTA
Example Operation - Within the context of the foregoing components (e.g., eUICC, eSIM, Broker
Network, Security Protocol, etc.), the following exemplary messaging sequences are disclosed. In the sequence diagrams hereinafter, three entities are presented: a broker, a profile agent, and a profile locker, to represent the entities that are responsible for L3, L2, L ! securities respectively. However, it is appreciated that these are logical entities and different network topologies may be subsume or further differentiate the foregoing functions thereof.
The client eUICC is in the illustrated embodiment responsible for ail three levels of securities; however, for clarity, the client eUICC is separated into three logical entities to capture functional requirements within the eUICC. Moreover, while there may be separate sets of credentials for LI , L2, and L3 within the client eUICC, it is appreciated that the same (i.e., one credential) may be used since the client device is a single device. eSl Delivery, No Personalization -
FIG. 9 illustrates one exemplary logical sequence for delivering an eSIM to a device without personalization. First, the device identifies the server broker via discovery process (not shown). Once the device attempts to communicate with the server broker, there are three main operations: (i) the device queries the server backend about available eSIM options; (ii) the device requests that the server personalizes an eSIM if the requested eSIM has not been pre-personalized; and (iii) the device downloads the actual eSIM and install it.
In the first stage, getProfikOptiom is used by the device to query the server backend about available eSIM options. The eUICC associated with the device is identified by its Uniqueld, which for example can be the card serial number. The broker utilizes sales information to determine one or more eSIM options available to the device. For unlocked devices, there may be a very targe set of available eSIMs; thus, in some embodiments, common options that are likely to be chosen by the user are displayed (e.g., based on location, cost, etc.). The server returns an array of profile providers (MNO) and profile types (e.g. prepaid/postpaid) that is valid for the device. in some scenarios, the type of eS!Ms available to the user may be considered private information, therefore in some variants the getProfileOptions API further requires the device eUICC L3 to sign the unique identifier of the eUICC, and include the signed identifier in the API. The server broker (or broker server) can verify the signature before processing the request. This prevents a malicious party from retrieving users' profile options by sending the masqueraded requests. In some variants, the communication between the device broker and the server broker uses a security protocol (e.g., transport layer security (TLS)) to prevent capture and replay attacks.
In one embodiment, a getProfileOptions contains two L3 tokens to verify the current and new ownership of the eSIM. The current L3 token may be a unique identifier or so-called "faux card" scratch code. The new L3 token can be information used to associate a user account with an eSIM, for example, a sign-on token for an iCloud account (e.g., where the device has logged into a user account to retrieve a token). Both L3 tokens are signed by the eUICC L3. The server broker validates the L3 tokens using an associated authentication service. For example, it may communicate with a network server (e.g., the Assignee's iCloud server) or a third party service to validate the sign-on token.
To optimize performance and avoid duplicate authentication, after authenticating the token passed by the device, the server broker generates a one time code (OTC) and pass the OTC back to the device. The device can use the OTC as a proof that the server has already performed L3 authentication. The complete data binary large object (BLOB) may include the generated OTC, unique device identifier (e.g. card serial number (CSN)), principal, service provider, and a timestamp to indicate validity of the OTC. The BLOB is hashed and signed by the broker. In one variant, the hashing is performed with a symmetric key to improve overall performance. If getProfileOptions returns an array of eSIMs, the user is prompted to make a selection.
In the second stage, the device would call personalizeProfile to request the server backend to personalize an eSIM. Before the device sends the personalization request to the server, there is a session handshake between the eUICC profile agent and server profile agent for authentication. The device broker and eUICC create a session, based on the profile option that the user has chosen, and the current L3 code and new L3 code sent by the server broker. The eUICC can save this information to fill in the profile request sent subsequently thereafter. The eUICC profile agent generates a session id, which will be echoed back by the server agent for authentication subsequent thereto.
The device broker can now pass a session request generated by eUICC to the server broker. The server broker can check the request. For example, the server broker determines if the requesting eUICC, represented by unique ID, is serviceable. Since the unique ident!tifer is included in plaintext, the server broker can retrieve the information even though a more thorough verification of the request is performed by server profile agent.
If the request is appropriate, then the server broker passes the request to the profi!e agent. The profile agent verifies the request cryptograph ically, by verifying the eUICC L2 certificate and using the eUICC L2 public key to verify the L2 signature. Once verification passes, the server profile agent creates a SessionRespo e, including a plaintext section containing: the received session identifier and unique identifier, a L2 signature (generated by hashing the plain text section and signing the hash using server profile agent's private key), and the server profile agent's certificate.
The session response is sent from server profile agent to the server broker, which then forwards the session response to the device broker. The device broker passes the response to the eUICC in a prepareProfileRequest message. The eUICC L2 verifies the sessionReponse by verifying the server profile agent's certificate and the L2 signature. The eUICC L2 also verifies that the session identifier and unique identifier match the information in eUICC. Once verification passes, the eUICC creates a challenge for the personalized profile request. The challenge is committed to non-volatile memory. The eUICC then creates the profile request BLOB, including LI , L2 and L3 related information. Detailed structures are listed in APPENDIX A hereto, incorporated by reference herein.
Thereafter, the profile request BLOB is sent to the server backend. The server broker performs L3 verification and includes L3 owner information (e.g. principal and service provider) to associate the eSIM with; the server profile agent creates a batch descriptor, and the server profile locker personalizes the eSIM for the eUICC. The personalized eSIM may be distributed to a content delivery network (CDN) for performance optimization.
After the device broker receives the profile descriptor and associated L3 owner information, it retrieves the associated profile via getProfile by providing the received GUID (Globally Unique Identifier).
Once the device broker has retrieved a profile descriptor and profile, it instructs the client eUICC to install the eSIM The call flows shows three separate calls, processL3 Owner, processProfileDescriptor and installProflle, however it is appreciated that in actual implementation, these three logical calls can be combined within a single transaction. The eUICC performs L3, L2, and LI verification; once verified, the eSI is installed. The associated challenge is deleted. The L3 Owner information ts saved together with the eSIM to indicate proper ownership. L3 Owner information can be provided at a later point if the user exports the eSIM.
Once the profile is installed, the eUICC returns the installation results to the server. Server infrastructure can use the notification to trigger a purge of cached content in the content delivery network (CDN). In some cases, this information may also be used for notification services indicating e.g., successful installation, partial installation, unsuccessful installation, etc. eSIM Delivery, Pre-personalization -
FIG. 30 illustrates one exemplary logical sequence for delivering an eSIM to a device with pre-personalization. Similar to the scheme of FIG. 9, delivering a pre- personalized eSIM requires three (3) stages.
initially, during manufacture of the client device, a factory broker instructs the eUICC to create a challenge for eSIM pre-personalization later. However, unlike the scheme of FIG. 9, the device is not yet associated with a MNO, or eSIM type; rather these fields are populated with a special value to indicate that a selection will be made later. The complete content of the profile request BLOB is saved for personalization use later.
The second stage is triggered automatically by e.g., shipment notification, device sale, etc. The L2 {client profile agent) in the distribution center acts as a proxy for the client eUICC L2. While the eUICC profile request BLOB does not contain a MNO and eSIM type, the client profile agent can regenerate the BLOB by replacing these fields with updated information. The client profile agent can create its own challenge and replace the eUICC challenge. The client profile agent will sign the content with its own private key (otherwise ail L2s would require unique challenges). The BLOB will contain the eUICC's LI signature, the eUICC stilt needs to decrypt the personalized eSIM. The new profile request BLOB is sent to the server broker using the existing personalizeProfik request. Hereinafter, the procedure is no different than the procedure of FIG. 9.
Moreover, it is further appreciated that even if a MNO would like to support its own brokering system, the disclosed pre-personalization process can use the same interface. The server broker will return a batch descriptor to the client and personalize the eSIM. The client profile agent would create a new batch descriptor with the eUICC's challenge, to be used when the eUlCC requests the profile later.
Finally, in the last stage, when the user powers up the device, the device performs getProflleOptions to check available eSIM options. As an eSIM is already pre- personalized, the response would include a valid batch descriptor and the device no longer needs to call personalizeProfile. It would use information in the descriptor to directly retrieve the eSIM via getProfile request. eSIM Delivery, Batch Delivery -
FIG. 1 1 illustrates one exemplary logical sequence for deiivering a large number (batch) of eSIMs e.g., between two entities. In one embodiment, the client broker and server broker are secure entities which have a secure communication via e.g., Virtual Private Network (VPN). "Batching" is supported such that a client may place an order for a large quantity of eSIMs.
in this scenario, when the profile agent receives a request to personalize profiles, the profiles do not need to be personalized if the batch descriptor is returned; rather, the client may request actual profiles at a later stage as desired. In batch descriptor operation, the hash of profile content is calculated over the encrypted profile (wrapped with a symmetric key) and profile metadata, neither of which requires profile to be personalized. This also does not require L I to store the symmetric key per eUICC, which would otherwise burden LI with additional storage requirement that is difficult to meet. In one embodiment, the encrypted eSIM (wrapped with a symmetric key) can be stored off-storage. The symmetric key would be wrapped with a LI RFS (remote file system) key and the wrapped key may be saved in off-storage together with the encrypted eSIM. eSIM Export -
Finally, once an eSIM is stored to a client device, the user may choose to export an eSIM off the device and later import the eSIM to the same or a different device. One objective is to support eSIM swap. Another objective is to free up eUICC memory to store additional eSIMs. When exporting, there are three possible scenarios: (i) exporting to a cloud, (ii) exporting to an AP (for off-board storage), and (iii) device-to-device eSIM transfer. Similarly, the user may import from a cloud, AP, or another device. During eSIM installation, user account information is associated to the eSIM (unless the user opts out). The account information includes sufficient information for L3 authentication. For example, it may include a principal (e.g. x2z@yahoo.com) and the associated service provider for authentication, if no account information is associated with the eSIM, the user may export the eSIM with other authentication methods. One such embodiment, includes a physical button that is securely connected to eUICC to prove physical possession of the device, in another embodiment, each eSIM includes a unique password, the user must have the password to prove their ownership. Using OEM credentials is yet another option.
When the user exports an eSIM, the AP retrieves a list of installed profiles from eUICC; for each profile, eUICC also returns the associated principal and a nonce generated for anti-replay. When the user chooses to export a profile, the AP uses information contained in the principal to obtain a single sign-on (SSO) token from the service provider, where the user would be prompted to enter username and password for the purpose. The SSO token is passed together with principal and nonce to the server broker in export request. The server broker can process the authentication with the service provider, using the SSO token supplied by the device. Once authentication passes, the flow mirrors eSIM delivery to the device, except that the client and server roles are reversed. At a high level, the server broker initiates a session with the eUICC, creates a request BLOB for the export. In the request, it includes the nonce that the eUICC generated, to indicate that the operation has passed L3 authentication. The eUICC verifies the request BLOB, encrypts the eSIM with the server agent's public key, creates a batch descriptor and L3 owner information for the eSIM. The eSIM together with L3 and L2 information can be sent to the server.
Once eUICC encrypts the eSIM for export, the eUICC gives up ownership of the eSIM and no longer uses the eSIM or exports the eSIM to any other entities, ϊη some cases, the eUICC may save the encrypted copy to help recovery from connection loss (i.e., if the encrypted eSiM never reached the server). Alternatively, the AP may save a copy of the encrypted eSIM for retransmission in the event of a connection failure. Servers may return acknowledgements which triggers the AP to clean up the stored copy.
In some embodiments, export can also be initiated from a web portal. If the user loses his device, he may use a web portal to export eSI s from his device. In this case, the web portal would communicate with the device to initiate export operation. The flow is similar except that the user would use web portal instead of AP to obtain the SSO token for ownership verification. Apparatus -
Various apparatus useful in conjunction with the above described methods are now described in greater detail. eUICC Appliance - FIG. 12 illustrates one exemplary embodiment of a eUICC appliance 1200 in accordance with the present disclosure. The eUICC appliance may comprise a standalone entity, or be incorporated with other network entities such as e.g., servers. As shown, the eUICC appliance 1200 generally includes a network interface 1202 for interfacing with the communications network, a processor 1204, and one or more storage apparatus 1206. The network interface is shown connecting to the MNO infrastructure, so as to provide access to other eUICC appliances, and direct or indirect access to one or more mobile devices, although other configurations and functionalities may be substituted.
In one configuration, the eUICC appliance is capable of: (i) establishing communications with another eUICC (either a eUICC appliance or client device), (ii) securely storing an eSIM, (iii) retrieving a securely stored eSI , (iv) encrypting an eSIM for delivery to another specific eUICC, and (v) sending multiple eS!Ms to/from an eSIM depot. eSIM Depot -
FIG. 13 illustrates one exemplary embodiment of an eSIM depot 1300 in accordance with the present disclosure. The eSIM depot 1300 may be implemented as a stand-alone entity, or be incorporated with other network entities (e.g., an eUICC appliance 1200, etc.). As shown, the eSIM depot 1300 generally includes a network interface 1302 for interfacing with the communications network, a processor 1304, and a storage apparatus 1306.
in the illustrated embodiment of FIG. 1300, the eSIM depot 304 is capable of: (i) inventory management of eSIMs (e.g., via associated metadata), (ii) responding to requests for encrypted eSIMs (e.g., from other eSIM depots, and/or eU!CC appliances 1200), (iii) managing subscriber requests for eSIMs.
For example, when an eSIM is stored at an eSIM depot 1300 by a user, the eSIM may be stored with an intended destination (e.g., to facilitate transfer to another device), or parked indefinitely. In either case, the eSIM depot can provide the eSIM to the eUICC appliance for secure storage and for subsequent encryption for the destination device.
User Apparatus - Referring now to FIG. 1 , exemplary user apparatus 1400 in accordance with various aspects of the present disclosure is illustrated.
The exemplary UE apparatus of FIG. 14 is a wireless device with a processor subsystem 1402 such as a digital signal processor, microprocessor, field-programmable gate array, or plurality of processing components mounted on one or more substrates. The processing subsystem may also comprise an internal cache memory. The processing subsystem is in communication with a memory subsystem 1404 including memory which may for example, comprise SRAM, flash, and/or SDRAM components. The memory subsystem may implement one or a more of DMA type hardware, so as to facilitate data accesses as is well known in the art. The memory subsystem contains computer-executable instructions which are executable by the processor subsystem.
In one exemplary embodiment, the device includes one or more wireless interfaces 1406 adapted to connect to one or more wireless networks. The multiple wireless interfaces may support different radio technologies such as GSM, CDMA, UMTS, LTE/LTE-A, WiMAX, WLAN, Bluetooth, etc. by implementing the appropriate antenna and modem subsystems of the type well known in the wireless arts.
The user interface subsystem 1408 includes any number of well-known I/O including, without limitation: a keypad, touch screen (e.g., multi-touch interface), LCD display, backlight, speaker, and/or microphone. However, it is recognized that in certain applications, one or more of these components may be obviated. For example, PCMCIA card-type client embodiments may lack a user interface (as they could piggyback onto the user interface of the host device to which they are physically and/or electrically coupled).
In the illustrated embodiment, the device includes a secure element 1410 which contains and operates the eUiCC application. The eUICC is capable of storing and accessing a plurality of access control clients to be used for authentication with a network operator. The secure element includes a secure processor executing software stored in a secure media. The secure media is inaccessible to all other components (other than the secure processor). Moreover, the exemplary secure element may be further hardened to prevent tampering (e.g., encased in resin) as previously described. The exemplary secure element 1410 is capable of receiving and storing one or more access control clients. In one embodiment, the secure element stores an array or plurality of eSIMs associated with a user (e.g., one for work, one for personal, several for roaming access, etc.), and/or according to another logical scheme or relationship (e.g., one for each of multiple members of a family or business entity, one for each of personal and work use for the members of the family, and so forth). Each eSIM includes a small file system including computer readable instructions (the eSIM program), and associated data (e.g., cipher keys, integrity keys, etc.)
The secure element is further adapted to enable transfer of eSIMs to and/or from the mobile device. In one implementation, the mobile device provides a GUI- based acknowledgement to initiate transfer of an eSIM.
Once the user of the mobile device opts to activate an eSIM, the mobile device sends a request for activation to an activation service. The mobile device can use the eSIM for standard Authentication and Key Agreement (AKA) exchanges.
Methods -
Various methods useful in conjunction with the above described methods are now described in greater detail
FIG. 15 illustrates one embodiment of a method for large scale distribution of electronic access control clients.
At step 1502, a first device establishes ownership of one or more electronic access control clients.
At step 1504, the first device determines if one or more electronic access control clients have not been previously duplicated.
At step 1506, the first device encrypts the one or more electronic access control clients for transfer to the second device.
At step 1508, the first device and second device exchange or transfer the encrypted one or more electronic access control clients.
Myriad other schemes for large scale distribution of electronic access control clients will be recognized by those of ordinary skill given the present disclosure.
It will be recognized that while certain aspects of the disclosure are described in terms of a specific sequence of steps of a method, these descriptions are only illustrative of the broader methods of the disclosure, and may be modified as required by the particular application. Certain steps may be rendered unnecessary or optional under certain circumstances. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps permuted. All such variations are considered to be encompassed within the disclosure disclosed and claimed herein.
While the above detailed description has shown, described, and pointed out novel features of the disclosure as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the disclosure. The foregoing description is of the best mode presently contemplated of carrying out the disclosure. This description is in no way meant to be limiting, but rather should be taken as illustrative of the general principles of the disclosure. The scope of the disclosure should be determined with reference to the claims

Claims

WHAT IS CLAIMED IS:
1 . User mobile apparatus, comprising:
a wireless interface configured to communicate with a wireless network;
a processor in data communication with the wireless interface;
a secure element in data communication with the wireless interface, the secure element comprising:
a secure processor;
secure storage in data communication with the secure processor and having a plurality of access control clients useful for authentication with at least the network stored thereon; and
computerized logic in data communication with the secure processor, the logic configured to store, access, and transfer to or from the apparatus the plurality of access control clients; and
user interface logic in communication with at least the secure element and configured to enable a user of the apparatus to select one of the stored plurality access control clients, and authenticate the apparatus to the network so as to enable communication therewith.
2. The apparatus of Claim 1, wherein the secure storage is inaccessible to all components of the apparatus other than the secure processor.
3. The apparatus of Claim 2, wherein the secure element is configured to receive and store the one or more access control clients as different electronic subscriber identity modules (eSIMs) associated with a common user, each of the different eSIMs comprising a different user context.
4. The apparatus of Claim 1 , wherein each access control client comprises a limited capability file system including computer readable instructions and associated cryptographic data.
5. The apparatus of Claim 1 , wherein the secure element comprises a limited capability file system including computer readable instructions, and each access control client comprises unique cryptographic data specific to that access control client.
6. The apparatus of Claim 1 , wherein the secure element further comprises logic configured to cause the apparatus to send a request for activation to an activation service of the network.
7. The apparatus of Claim 1 , wherein the secure element further comprises logic configured to enable communication by the apparatus with a plurality of electronic access control client broker entities that are each part of a network of brokers and manufacturers, the communication configured to enable the apparatus to obtain one or more encrypted access control clients.
8. A method for distribution of multiple electronic access controi clients for use on mobile wireless devices, the method comprising:
establishing ownership of one or more electronic access control clients;
determining if the one or more electronic access control clients have not been previously duplicated;
when not previously duplicated, encrypting the one or more electronic access control clients for transfer to one of the mobile wireless devices; and
exchanging the encrypted one or more electronic access control clients.
9. The method of Claim 8, wherein the establishing ownership comprises evaluating an level 3 (L3) security certificate.
10. The method of Claim 8, wherein the determining of previous duplication comprises at least one of: (i) an evaluation, (ii) a response to a challenge question, and/or (iii) prompt issued by an Electronic Universal Integrated Circuit Card (eUICC).
1 1 . The method of Claim 10, wherein the encrypting comprises encrypting using a key specific to the eUICC.
12. The method of Claim 10, wherein the exchanging the encrypted one or more electronic access control clients comprises exchanging the encrypted one or more clients for one or more clients disposed on the one mobile wireless device.
13. Apparatus for large-scale distribution of electronic access control clients, comprising:
a processor; and
a non-transitory computer-readable medium in data communication with the processor and that includes instructions configured to, when executed by the processor, cause the apparatus to:
establish ownership of one or more electronic access control clients; determine if the one or more electronic access control clients have been previously duplicated; when no previous duplication has been determined, encrypt the one or more electronic access control clients for transfer to a second device; and transfer the encrypted one or more electronic access control clients to the second device.
14. The apparatus of Claim 13, wherein the apparatus comprises a networked server accessible by a plurality of similar apparatus, the apparatus in communication with a plurality of user mobile devices via a wireless network.
15. A network architecture for providing wireless mobile devices with electronic access clients, the network architecture comprising:
a plurality of brokers; and
a plurality of manufacturers in data communication with the plurality of brokers; wherein a given user mobile device may be serviced by multiple ones of the brokers; and
wherein any one of the brokers may order electronic access clients from one or more of the manufacturers.
16. The network architecture of Claim 15, wherein the plurality of brokers comprises a primary broker that provides at least discovery services to mobile devices, such that a mobile device can identify an appropriate broker before communicating therewith.
17. Apparatus for providing electronic access clients to one or more mobile devices, the apparatus comprising:
at least one processor: and
first logic in data communication with the at least one processor, the first logic configured to cause the apparatus to perform encryption and decryption of an access client;
second logic in data communication with the at least one processor, the second logic configured to cause the apparatus to ensure that the access client is not duplicated; and
third logic in data communication with the at least one processor, the third logic configured to cause the apparatus to establish at least one of trust, ownership, and/or verification of a user of the access client.
18. The apparatus of Claim 17, wherein the first logic comprises logic within an Eiectronic Universal Integrated Circuit Card (eUICC) or Hardware Security Module (HSM). Within LI .
19. The apparatus of Claim 1 , wherein the second logic is configured to embed a challenge into an encrypted payload encrypted by the first logic.
20. An electronic access control client revocation procedure, comprising: determining if a signing certificate authority that issued a certificate is compromised, the certificate associated with one or more devices storing the certificate;
determining at the one or more devices a certificate service request created when an initial request for the certificate was created;
requesting a new certificate using the determined certificate service request; and
issuing a new certificate based on the requesting;
wherein the one or more devices can use a previous used private key as part of the requesting, and the new certificate is issued containing a previous public key corresponding to the previous private key.
21 . An apparatus for distribution of multiple electronic access control clients for use on mobile wireless devices, the apparatus comprising:
means for establishing ownership of one or more electronic access control clients;
means for determining if the one or more electronic access control clients have not been previously duplicated;
means configured to, when it is determined that the one or more electronic access control clients have not previously duplicated, encrypt the one or more eiectronic access control clients for transfer to one of the mobile wireless devices; and
means for exchanging the encrypted one or more clients for one or more clients disposed on the one mobile wireless device.
22. The apparatus of Claim 21 , wherein the establishing ownership comprises evaluating a level 3 (L3) security certificate.
23. The apparatus of Claim 21 , wherein the determining if the one or more electronic access control client have not been previously duplicated comprises at least one of: (i) an evaluation, (ii) a response to a challenge question, and/or (iii) prompt issued by an Electronic Universal integrated Circuit Card (eUICC).
24. The apparatus of Claim 23, wherein the encrypting uses at least a key specific to the eUICC.
PCT/US2013/026194 2012-02-14 2013-02-14 Methods and apparatus for large scale distribution of electronic access clients WO2013123233A2 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
CN201380019098.9A CN104221347B (en) 2012-02-14 2013-02-14 Support the mobile device and corresponding method of multiple access control clients
BR112014019937A BR112014019937A8 (en) 2012-02-14 2013-02-14 METHOD AND DEVICE FOR LARGE-SCALE DISTRIBUTION OF ELECTRONIC ACCESS CUSTOMERS
KR1020147025521A KR101618274B1 (en) 2012-02-14 2013-02-14 Mobile apparatus supporting a plurality of access control clients, and corresponding methods
KR1020167011363A KR101716743B1 (en) 2012-02-14 2013-02-14 Mobile apparatus supporting a plurality of access control clients, and corresponding methods
MX2014009822A MX342702B (en) 2012-02-14 2013-02-14 Mobile apparatus supporting a plurality of access control clients, and corresponding methods.
EP13714036.4A EP2815553B1 (en) 2012-02-14 2013-02-14 Mobile apparatus supporting a plurality of access control clients, and corresponding methods
JP2014557779A JP2015512209A (en) 2012-02-14 2013-02-14 Mobile device supporting multiple access control clients and corresponding method
EP19173036.5A EP3541106A1 (en) 2012-02-14 2013-02-14 Methods and apparatus for euicc certificate management
RU2014137130/08A RU2595904C2 (en) 2012-02-14 2013-02-14 Methods and device for large-scale propagation of electronic access clients

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201261598819P 2012-02-14 2012-02-14
US61/598,819 2012-02-14
US13/767,593 US9247424B2 (en) 2012-02-14 2013-02-14 Methods and apparatus for large scale distribution of electronic access clients
US13/767,593 2013-02-14

Publications (2)

Publication Number Publication Date
WO2013123233A2 true WO2013123233A2 (en) 2013-08-22
WO2013123233A3 WO2013123233A3 (en) 2013-10-24

Family

ID=48045663

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2013/026194 WO2013123233A2 (en) 2012-02-14 2013-02-14 Methods and apparatus for large scale distribution of electronic access clients

Country Status (8)

Country Link
US (2) US9247424B2 (en)
JP (2) JP2015512209A (en)
KR (2) KR101716743B1 (en)
CN (1) CN104221347B (en)
BR (1) BR112014019937A8 (en)
MX (1) MX342702B (en)
RU (1) RU2595904C2 (en)
WO (1) WO2013123233A2 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015163623A1 (en) * 2014-04-22 2015-10-29 Samsung Electronics Co., Ltd. Method and apparatus for provisioning profiles
JP2015201205A (en) * 2014-04-04 2015-11-12 アップル インコーポレイテッド TAMPER PREVENTION FOR ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) TYPE PARAMETERS
CN105814540A (en) * 2013-11-21 2016-07-27 苹果公司 System and method for policy control functions management mechanism
TWI554123B (en) * 2014-05-23 2016-10-11 蘋果公司 Electronic subscriber identity module provisioning
JP2016195382A (en) * 2015-02-23 2016-11-17 アップル インコーポレイテッド Technique for dynamically supporting separate authentication algorithm
EP3136252A1 (en) * 2014-05-23 2017-03-01 Huawei Technologies Co., Ltd. Euicc management method, euicc, sm platform and system
JP2017517192A (en) * 2014-04-29 2017-06-22 クアルコム,インコーポレイテッド Remote station for deriving derived keys in system-on-chip devices
CN107660346A (en) * 2015-03-25 2018-02-02 三星电子株式会社 Method and apparatus for download profile in a wireless communication system
JP2018512752A (en) * 2015-03-22 2018-05-17 アップル インコーポレイテッド Method and apparatus for user authentication and human intention verification in a mobile device
EP3324655A1 (en) * 2016-11-17 2018-05-23 Gemalto SA Method for managing a patch of a sofware component in a euicc
EP3337219A4 (en) * 2015-08-14 2018-06-20 ZTE Corporation Carrier configuration processing method, device and system, and computer storage medium
US10114629B2 (en) 2013-12-05 2018-10-30 Huawei Device (Dongguan) Co., Ltd. Method and device for downloading profile of operator
JP2019083557A (en) * 2013-05-30 2019-05-30 サムスン エレクトロニクス カンパニー リミテッド Profile setting method and apparatus
US10439823B2 (en) 2015-04-13 2019-10-08 Samsung Electronics Co., Ltd. Technique for managing profile in communication system
US10623952B2 (en) 2014-07-07 2020-04-14 Huawei Technologies Co., Ltd. Method and apparatus for authorizing management for embedded universal integrated circuit card

Families Citing this family (139)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060266157A1 (en) * 2003-09-05 2006-11-30 Dai Nippon Toryo Co., Ltd. Metal fine particles, composition containing the same, and production method for producing metal fine particles
US8756488B2 (en) 2010-06-18 2014-06-17 Sweetlabs, Inc. Systems and methods for integration of an application runtime environment into a user computing environment
EP2461613A1 (en) * 2010-12-06 2012-06-06 Gemalto SA Methods and system for handling UICC data
JP5834150B2 (en) 2012-02-07 2015-12-16 アップル インコーポレイテッド Network-assisted fraud detection apparatus and method
US9231931B2 (en) * 2012-05-23 2016-01-05 Kt Corporation Method and apparatus of constructing secure infra-structure for using embedded universal integrated circuit card
US8775925B2 (en) 2012-08-28 2014-07-08 Sweetlabs, Inc. Systems and methods for hosted applications
KR102067474B1 (en) 2012-08-29 2020-02-24 삼성전자 주식회사 Method for managing shared files and subscriber identidy apparatus embedded in user terminal using the method
US9083689B2 (en) 2012-12-28 2015-07-14 Nok Nok Labs, Inc. System and method for implementing privacy classes within an authentication framework
US9172687B2 (en) * 2012-12-28 2015-10-27 Nok Nok Labs, Inc. Query system and method to determine authentication capabilities
US9219732B2 (en) 2012-12-28 2015-12-22 Nok Nok Labs, Inc. System and method for processing random challenges within an authentication framework
US9306754B2 (en) 2012-12-28 2016-04-05 Nok Nok Labs, Inc. System and method for implementing transaction signing within an authentication framework
US9015482B2 (en) 2012-12-28 2015-04-21 Nok Nok Labs, Inc. System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices
CN104969245B (en) 2013-02-06 2018-10-19 苹果公司 Device and method for safety element transaction and asset management
FR3002398B1 (en) * 2013-02-18 2015-04-03 Oberthur Technologies METHOD OF CREATING A PROFILE IN A SECURITY DOMAIN OF A SECURE ELEMENT
US9584544B2 (en) * 2013-03-12 2017-02-28 Red Hat Israel, Ltd. Secured logical component for security in a virtual environment
US9787672B1 (en) * 2013-03-15 2017-10-10 Symantec Corporation Method and system for smartcard emulation
US9396320B2 (en) 2013-03-22 2016-07-19 Nok Nok Labs, Inc. System and method for non-intrusive, privacy-preserving authentication
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US9961077B2 (en) 2013-05-30 2018-05-01 Nok Nok Labs, Inc. System and method for biometric authentication with device attestation
US9294503B2 (en) 2013-08-26 2016-03-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9100175B2 (en) 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
US9350550B2 (en) 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US10498530B2 (en) 2013-09-27 2019-12-03 Network-1 Technologies, Inc. Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
US10700856B2 (en) * 2013-11-19 2020-06-30 Network-1 Technologies, Inc. Key derivation for a module using an embedded universal integrated circuit card
US9749440B2 (en) 2013-12-31 2017-08-29 Sweetlabs, Inc. Systems and methods for hosted application marketplaces
US10263903B2 (en) 2014-02-05 2019-04-16 Ibasis, Inc. Method and apparatus for managing communication flow in an inter-network system
WO2015126136A1 (en) * 2014-02-21 2015-08-27 Samsung Electronics Co., Ltd. Method and apparatus for authenticating client credentials
US9635014B2 (en) 2014-02-21 2017-04-25 Samsung Electronics Co., Ltd. Method and apparatus for authenticating client credentials
US10263980B2 (en) * 2014-03-06 2019-04-16 Telefonaktiebolaget Lm Ericsson (Publ) Network node, device and methods for providing an authentication module
US9542558B2 (en) * 2014-03-12 2017-01-10 Apple Inc. Secure factory data generation and restoration
DE102014005566A1 (en) * 2014-04-16 2015-10-22 Giesecke & Devrient Gmbh Method and device for operating a mobile terminal in a mobile radio network
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
US9577999B1 (en) 2014-05-02 2017-02-21 Nok Nok Labs, Inc. Enhanced security for registration of authentication devices
US10019247B2 (en) 2014-05-15 2018-07-10 Sweetlabs, Inc. Systems and methods for application installation platforms
US10089098B2 (en) * 2014-05-15 2018-10-02 Sweetlabs, Inc. Systems and methods for application installation platforms
US9537858B2 (en) * 2014-05-15 2017-01-03 Apple Inc. Methods and apparatus to support globalplatform™ usage on an embedded UICC (eUICC)
DE102015209400B4 (en) * 2014-05-30 2022-05-12 Apple Inc. Handling of application identifiers of electronic subscriber identity modules
US9439062B2 (en) 2014-05-30 2016-09-06 Apple Inc. Electronic subscriber identity module application identifier handling
WO2015184064A1 (en) * 2014-05-30 2015-12-03 Apple Inc. Secure storage of an electronic subscriber identity module on a wireless communication device
US9451445B2 (en) 2014-05-30 2016-09-20 Apple Inc. Electronic subscriber identity module selection
DE102014008268A1 (en) * 2014-06-06 2015-12-17 Giesecke & Devrient Gmbh Methods and apparatus for managing subscription profiles on a security element
KR102160597B1 (en) * 2014-07-17 2020-09-28 삼성전자 주식회사 Method and apparatus for provisioning profile of embedded universal integrated circuit card
KR102191017B1 (en) * 2014-07-19 2020-12-15 삼성전자주식회사 Method and server device for provisioning an embedded SIM
US9875347B2 (en) 2014-07-31 2018-01-23 Nok Nok Labs, Inc. System and method for performing authentication using data analytics
US10148630B2 (en) 2014-07-31 2018-12-04 Nok Nok Labs, Inc. System and method for implementing a hosted authentication service
US9749131B2 (en) 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
EP3171566B1 (en) 2014-08-13 2019-10-09 Huawei Technologies Co., Ltd. Method, device and system for security domain management
KR102311027B1 (en) * 2014-08-14 2021-10-08 삼성전자 주식회사 A method and apparatus for profile downloading of group devices
US9756071B1 (en) 2014-09-16 2017-09-05 A10 Networks, Inc. DNS denial of service attack protection
US9736154B2 (en) 2014-09-16 2017-08-15 Nok Nok Labs, Inc. System and method for integrating an authentication service within a network architecture
US10255429B2 (en) 2014-10-03 2019-04-09 Wells Fargo Bank, N.A. Setting an authorization level at enrollment
US9537886B1 (en) 2014-10-23 2017-01-03 A10 Networks, Inc. Flagging security threats in web service requests
US10743181B1 (en) 2014-12-23 2020-08-11 Wells Fargo Bank, N.A. System for binding multiple sim cards to an electronic device
US9520911B2 (en) * 2014-12-23 2016-12-13 Wellsfargo Bank, N.A. System for binding multiple SIM cards to an electronic device
US9584318B1 (en) 2014-12-30 2017-02-28 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack defense
WO2016108096A1 (en) * 2014-12-30 2016-07-07 Stmicroelectronics S.R.L. Methods for providing a response to a scp80 command requesting the execution of a proactive command, related universal integrated circuit card, mobile device, server and computer program product
US9900343B1 (en) 2015-01-05 2018-02-20 A10 Networks, Inc. Distributed denial of service cellular signaling
US9853977B1 (en) 2015-01-26 2017-12-26 Winklevoss Ip, Llc System, method, and program product for processing secure transactions within a cloud computing system
EP3251390B1 (en) * 2015-01-27 2021-08-11 Nokia Solutions and Networks Oy Handling of certificates for embedded universal integrated circuit cards
US9848013B1 (en) * 2015-02-05 2017-12-19 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack detection
US10063591B1 (en) 2015-02-14 2018-08-28 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
KR102333395B1 (en) * 2015-02-17 2021-12-03 삼성전자 주식회사 Method and apparatus for receiving profile information at a terminal in a wireless communication system
US9940141B2 (en) * 2015-02-23 2018-04-10 Apple Inc. Method and apparatus for selecting bootstrap ESIMs
DE102015003977A1 (en) * 2015-03-26 2016-09-29 Giesecke & Devrient Gmbh Method for loading a profile
EP3082355A1 (en) * 2015-04-17 2016-10-19 Gemalto Sa A method for controlling remotely the permissions and rights of a target secure element
US9760728B2 (en) 2015-04-22 2017-09-12 Gemalto Sa System and method for managing logical channels for accessing several virtual profiles in a secure element
EP3284275B1 (en) * 2015-05-18 2022-05-11 Apple Inc. PRE-PERSONALIZATION OF eSIMs TO SUPPORT LARGE-SCALE eSIM DELIVERY
EP3374923B1 (en) 2015-05-22 2021-08-25 Huawei Device Co., Ltd. Cryptographic unit for public key infrastructure (pki) operations
US9526009B1 (en) 2015-05-29 2016-12-20 Qualcomm Incorporated Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card
EP3104635B1 (en) * 2015-06-09 2020-02-12 Deutsche Telekom AG Method for an improved installation of a secure-element-related service application in a secure element being located in a communication device, system and telecommunications network for an improved installation of a secure-element-related service application in a secure element being located in a communication device, program comprising a computer readable program code, and computer program product
US10003974B2 (en) * 2015-06-19 2018-06-19 Apple Inc. Electronic subscriber identity module management under multiple certificate authorities
DE102015008117A1 (en) * 2015-06-23 2016-12-29 Giesecke & Devrient Gmbh subscription management
US9686081B2 (en) * 2015-07-01 2017-06-20 Cisco Technology, Inc. Detecting compromised certificate authority
US10694023B2 (en) * 2015-07-10 2020-06-23 Rohde & Schwarz Gmbh & Co. Kg Testing methods and systems for mobile communication devices
US10516988B2 (en) * 2015-09-11 2019-12-24 Huawei Technologies Co., Ltd. Profile processing method, profile processing apparatus, user terminal, and eUICC
US10277587B2 (en) * 2015-10-08 2019-04-30 Apple Inc. Instantiation of multiple electronic subscriber identity module (eSIM) instances
KR102621499B1 (en) * 2015-11-13 2024-01-09 삼성전자주식회사 Method and device for downloading a profile to an embedded universal integrated circuit card (eUICC) of a terminal
US10356614B2 (en) 2015-11-20 2019-07-16 Apple Inc. Secure electronic subscriber identity module (eSIM) restoration
CN105516962B (en) * 2015-12-03 2019-03-05 中国联合网络通信集团有限公司 Account-opening method and system based on eUICC
EP3176695A1 (en) * 2015-12-04 2017-06-07 Gemalto Sa Method for managing a package in a secure element
US10505984B2 (en) 2015-12-08 2019-12-10 A10 Networks, Inc. Exchange of control information between secure socket layer gateways
US10469594B2 (en) 2015-12-08 2019-11-05 A10 Networks, Inc. Implementation of secure socket layer intercept
KR102490497B1 (en) * 2015-12-28 2023-01-19 삼성전자주식회사 Method and apparatus for receiving/transmitting profile in communication system
US10523447B2 (en) 2016-02-26 2019-12-31 Apple Inc. Obtaining and using time information on a secure element (SE)
US10680833B2 (en) 2016-02-26 2020-06-09 Apple Inc. Obtaining and using time information on a secure element (SE)
US10630490B2 (en) 2016-02-26 2020-04-21 Apple Inc. Obtaining and using time information on a secure element (SE)
CN105657818B (en) * 2016-03-11 2019-04-12 宇龙计算机通信科技(深圳)有限公司 Register method, register device and the mobile terminal of embedded user identification module
KR102468974B1 (en) 2016-03-21 2022-11-22 삼성전자주식회사 Method and apparatus for controlling electronic device
US10848320B2 (en) 2016-03-25 2020-11-24 Apple Inc. Device-assisted verification
US10021558B2 (en) * 2016-03-29 2018-07-10 Qualcomm Incorporated System and methods for using embedded subscriber identity module (eSIM) provisioning processes to provide and activate device configuration packages on a wireless communication device
US10863558B2 (en) * 2016-03-30 2020-12-08 Schweitzer Engineering Laboratories, Inc. Communication device for implementing trusted relationships in a software defined network
CN107925868B (en) * 2016-04-12 2019-09-27 华为技术有限公司 A kind of method for remote management and equipment
US10764066B2 (en) * 2016-05-18 2020-09-01 Apple Inc. EUICC secure timing and certificate revocation
US10574465B2 (en) * 2016-05-18 2020-02-25 Apple Inc. Electronic subscriber identity module (eSIM) eligibility checking
US9900765B2 (en) 2016-06-02 2018-02-20 Apple Inc. Method and apparatus for creating and using a roaming list based on a user roaming plan
US10116634B2 (en) 2016-06-28 2018-10-30 A10 Networks, Inc. Intercepting secure session upon receipt of untrusted certificate
US10158666B2 (en) 2016-07-26 2018-12-18 A10 Networks, Inc. Mitigating TCP SYN DDoS attacks using TCP reset
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10979890B2 (en) 2016-09-09 2021-04-13 Ibasis, Inc. Policy control framework
US10506439B2 (en) * 2016-09-16 2019-12-10 Apple Inc. Secure control of profile policy rules
FR3056788A1 (en) * 2016-09-29 2018-03-30 Orange MANAGING A MULTI-SIM OFFER WITH MULTIPLE ACTIVATION CODES
FR3056781A1 (en) * 2016-09-29 2018-03-30 Orange ASSIGNING PROFILES TO A PLURALITY OF TERMINALS WITH IMPLANTED SIM CARDS
EP3525389B1 (en) * 2016-10-04 2021-02-17 Nec Corporation Embedded sim management system, node device, embedded sim management method, program, and information registrant device
US9992607B2 (en) 2016-10-07 2018-06-05 Microsoft Technology Licensing, Llc eSIM identification data
CN108229213B (en) * 2016-12-15 2020-07-07 中国移动通信有限公司研究院 Access control method and system and electronic equipment
US10091195B2 (en) 2016-12-31 2018-10-02 Nok Nok Labs, Inc. System and method for bootstrapping a user binding
US10237070B2 (en) 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
EP3603141B1 (en) 2017-03-30 2021-02-17 iBasis, Inc. Esim profile switching without sms
US10334427B2 (en) * 2017-04-07 2019-06-25 Apple Inc. In-advance eSIM management notification
EP3416086A1 (en) * 2017-06-15 2018-12-19 Gemalto Sa Method for managing an instance of a class
US10524116B2 (en) 2017-06-27 2019-12-31 Ibasis, Inc. Internet of things services architecture
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
WO2019119544A1 (en) * 2017-12-18 2019-06-27 华为技术有限公司 Method and device for accessing data of embedded sim card
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
CN108880821B (en) * 2018-06-28 2021-07-13 中国联合网络通信集团有限公司 Authentication method and equipment of digital certificate
US10516978B1 (en) 2018-08-31 2019-12-24 At&T Intellectual Property I, L.P. Network based carrier managed long-term evolution advanced device indication for long-term evolution or other next generation network
US11432124B2 (en) 2018-08-31 2022-08-30 At&T Intellectual Property I, L.P. Storing tracking area identities onto a universal integrated circuit card in advanced networks
CN109246687A (en) * 2018-09-27 2019-01-18 努比亚技术有限公司 ESIM test method, mobile terminal, system and readable storage medium storing program for executing
US10911945B1 (en) * 2018-11-19 2021-02-02 Sprint Spectrum L.P. Automated eUICC service profile configuration in view of operational issue with respect to eUICC service profile
JP6499368B1 (en) * 2018-12-14 2019-04-10 日本通信株式会社 Online service provision system
JP6499367B1 (en) * 2018-12-14 2019-04-10 日本通信株式会社 Online service provision system
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication
KR102208142B1 (en) * 2019-07-30 2021-01-27 시큐리티플랫폼 주식회사 Method and system for issuing and using device certificate based on distributed code
US10645076B1 (en) * 2019-08-07 2020-05-05 Capital One Services, Llc Automatic identity management with third party service providers
US12101630B2 (en) 2019-08-18 2024-09-24 Apple Inc. Mobile device authentication without electronic subscriber identity module (eSIM) credentials
US11272336B2 (en) * 2019-09-12 2022-03-08 Amdocs Development Limited System, method, and computer program for transferring subscriber identity module (SIM) information for SIM card or eSIM activation
KR102224094B1 (en) 2019-10-28 2021-03-08 주식회사 서연이화 Tether anchor assembly for child seat fixture
US11516003B2 (en) * 2020-04-03 2022-11-29 Apple Inc. Electronic subscriber identity module transfer credential wrapping
JP2022023707A (en) * 2020-07-27 2022-02-08 エヌ・ティ・ティ・コミュニケーションズ株式会社 SIM, communication device, and application writing method
CN112770314B (en) 2020-12-03 2024-04-09 上海途鸽数据科技有限公司 Method and device for establishing communication connection
CN112911580B (en) * 2021-01-29 2023-11-07 陕西富莱尔软件科技有限公司 eSIM configuration method and system based on cloud service activation
US12127305B2 (en) 2021-05-10 2024-10-22 Apple Inc. Off-line profile provisioning for wireless devices
US11750502B2 (en) 2021-09-01 2023-09-05 Schweitzer Engineering Laboratories, Inc. Detection of in-band software defined network controllers using parallel redundancy protocol
US11336564B1 (en) 2021-09-01 2022-05-17 Schweitzer Engineering Laboratories, Inc. Detection of active hosts using parallel redundancy protocol in software defined networks
US12126613B2 (en) 2021-09-17 2024-10-22 Nok Nok Labs, Inc. System and method for pre-registration of FIDO authenticators
WO2023091613A1 (en) * 2021-11-17 2023-05-25 X70.Io Ltd. Method for securing security token and smartcard into processing device, and system, terminal and computer-readable medium for the same

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
FR2849230B1 (en) * 2002-12-24 2005-04-22 Francois Bangui METHOD AND APPARATUS FOR VERIFYING THE INTEGRITY OF A SOFTWARE APPLICATION WITHOUT AN ENCRYPTION / DECRYMENT KEY
US20040230965A1 (en) 2003-02-28 2004-11-18 Harri Okkonen Mobile handset network that facilitates interaction between a generic intelligent responsive agent and a service broker server
US7139781B2 (en) * 2003-04-29 2006-11-21 International Business Machines Corporation Managing filesystem versions
CA2566801A1 (en) * 2004-07-14 2006-01-19 Matsushita Electric Industrial Co., Ltd. Method for authenticating and executing an application program
US7929703B2 (en) 2005-12-28 2011-04-19 Alcatel-Lucent Usa Inc. Methods and system for managing security keys within a wireless network
KR100764153B1 (en) 2006-03-15 2007-10-12 포스데이타 주식회사 Method and apparatus for detecting counterfeiting of portable subscriber station in portable internet system
KR20080013581A (en) * 2006-08-09 2008-02-13 삼성전자주식회사 Staion capable of collection information for security in wireless network and method therefor
US7908292B2 (en) 2006-12-05 2011-03-15 Nokia Corporation Metadata broker
WO2008087743A1 (en) * 2007-01-16 2008-07-24 Telefonaktiebolaget Lm Ericsson (Publ) Control device, reproducing device, permission server, method for controlling control device, method for controlling reproducing device, and method for controlling permission server
WO2008088923A1 (en) 2007-01-19 2008-07-24 Taproot Systems, Inc. Point of presence on a mobile network
US9112909B2 (en) 2008-02-13 2015-08-18 Futurewei Technologies, Inc. User and device authentication in broadband networks
US8924714B2 (en) * 2008-06-27 2014-12-30 Microsoft Corporation Authentication with an untrusted root
JP4844613B2 (en) * 2008-09-30 2011-12-28 ブラザー工業株式会社 Wireless network connection method, wireless communication apparatus, and program
EP2175454B1 (en) * 2008-10-13 2012-12-12 Vodafone Holding GmbH Method and terminal for providing controlled access to a memory card
EP2197167B1 (en) * 2008-12-12 2017-07-12 Vodafone Holding GmbH Device and method for short range communication
US8285985B2 (en) * 2008-12-15 2012-10-09 Sap Ag Systems and methods for detecting exposure of private keys
US9736675B2 (en) 2009-05-12 2017-08-15 Avaya Inc. Virtual machine implementation of multiple use context executing on a communication device
CN101562814A (en) * 2009-05-15 2009-10-21 中兴通讯股份有限公司 Access method and system for a third-generation network
US8213990B2 (en) * 2009-06-05 2012-07-03 Mediatek Inc. System for providing remote subscriber identity card to mobile station and methods thereof
US8811969B2 (en) 2009-06-08 2014-08-19 Qualcomm Incorporated Virtual SIM card for mobile handsets
US20110314388A1 (en) 2010-06-18 2011-12-22 Nokia Corporation Method and apparatus for generating a collaborative playlist
CA2745975C (en) * 2010-07-09 2016-02-23 Research In Motion Limited Utilization of a microcode interpreter built in to a processor
US8924715B2 (en) * 2010-10-28 2014-12-30 Stephan V. Schell Methods and apparatus for storage and execution of access control clients
US9100393B2 (en) * 2010-11-04 2015-08-04 Apple Inc. Simulacrum of physical security device and methods
US8627422B2 (en) * 2010-11-06 2014-01-07 Qualcomm Incorporated Authentication in secure user plane location (SUPL) systems
CN101986767B (en) * 2010-11-12 2014-04-09 中兴通讯股份有限公司 Double network and double standby terminal, power-on method thereof and power-off method thereof
JP2013544471A (en) * 2010-11-15 2013-12-12 インターデイジタル パテント ホールディングス インコーポレイテッド Certificate validation and channel binding
US8621168B2 (en) * 2010-12-17 2013-12-31 Google Inc. Partitioning the namespace of a contactless smart card
US8707022B2 (en) * 2011-04-05 2014-04-22 Apple Inc. Apparatus and methods for distributing and storing electronic access clients
EP2705455B1 (en) * 2011-05-06 2015-11-18 Nokia Technologies Oy Determination of apparatus configuration and programming data
US8898459B2 (en) * 2011-08-31 2014-11-25 At&T Intellectual Property I, L.P. Policy configuration for mobile device applications
EP2587715B1 (en) * 2011-09-20 2017-01-04 BlackBerry Limited Assisted certificate enrollment
WO2013048084A2 (en) * 2011-09-28 2013-04-04 주식회사 케이티 Profile management method, embedded uicc, and device provided with the embedded uicc

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE49465E1 (en) 2013-05-30 2023-03-14 Samsung Electronics Co., Ltd. Method and apparatus for setting profile
JP2019083557A (en) * 2013-05-30 2019-05-30 サムスン エレクトロニクス カンパニー リミテッド Profile setting method and apparatus
KR101793527B1 (en) 2013-11-21 2017-11-06 애플 인크. System and method for policy control functions management mechanism
KR101881717B1 (en) 2013-11-21 2018-07-24 애플 인크. System and method for policy control functions management mechanism
KR20170125113A (en) * 2013-11-21 2017-11-13 애플 인크. System and method for policy control functions management mechanism
CN105814540A (en) * 2013-11-21 2016-07-27 苹果公司 System and method for policy control functions management mechanism
JP2017500642A (en) * 2013-11-21 2017-01-05 アップル インコーポレイテッド System and method for policy control function management mechanism
US10251054B2 (en) 2013-11-21 2019-04-02 Apple Inc. System and method for policy control functions management mechanism
US10387134B2 (en) 2013-12-05 2019-08-20 Huawei Device Co., Ltd. Method and device for downloading profile of operator
US10768918B2 (en) 2013-12-05 2020-09-08 Huawei Device Co., Ltd. Method and device for downloading profile of operator
US10114629B2 (en) 2013-12-05 2018-10-30 Huawei Device (Dongguan) Co., Ltd. Method and device for downloading profile of operator
JP2015201205A (en) * 2014-04-04 2015-11-12 アップル インコーポレイテッド TAMPER PREVENTION FOR ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) TYPE PARAMETERS
JP2016212889A (en) * 2014-04-04 2016-12-15 アップル インコーポレイテッド TAMPER PREVENTION FOR ELECTRONIC SUBSCRIBER IDENTITY MODULE (eSIM) TYPE PARAMETERS
WO2015163623A1 (en) * 2014-04-22 2015-10-29 Samsung Electronics Co., Ltd. Method and apparatus for provisioning profiles
US10075205B2 (en) 2014-04-22 2018-09-11 Samsung Electronics Co., Ltd. Method and apparatus for provisioning profiles
JP2017517192A (en) * 2014-04-29 2017-06-22 クアルコム,インコーポレイテッド Remote station for deriving derived keys in system-on-chip devices
US9730072B2 (en) 2014-05-23 2017-08-08 Apple Inc. Electronic subscriber identity module provisioning
JP2017520953A (en) * 2014-05-23 2017-07-27 アップル インコーポレイテッド Provisioning an electronic subscriber identity module
TWI554123B (en) * 2014-05-23 2016-10-11 蘋果公司 Electronic subscriber identity module provisioning
US9998925B2 (en) 2014-05-23 2018-06-12 Apple Inc. Electronic subscriber identity module provisioning
US10484030B2 (en) 2014-05-23 2019-11-19 Huawei Technologies Co., Ltd. EUICC management method, eUICC, SM platform, and system
EP3136252A1 (en) * 2014-05-23 2017-03-01 Huawei Technologies Co., Ltd. Euicc management method, euicc, sm platform and system
US10033422B2 (en) 2014-05-23 2018-07-24 Huawei Technologies Co., Ltd. eUICC management method, eUICC, SM platform, and system
TWI621360B (en) * 2014-05-23 2018-04-11 蘋果公司 Electronic subscriber identity module provisioning
EP3136252A4 (en) * 2014-05-23 2017-05-10 Huawei Technologies Co. Ltd. Euicc management method, euicc, sm platform and system
US10623952B2 (en) 2014-07-07 2020-04-14 Huawei Technologies Co., Ltd. Method and apparatus for authorizing management for embedded universal integrated circuit card
JP2016195382A (en) * 2015-02-23 2016-11-17 アップル インコーポレイテッド Technique for dynamically supporting separate authentication algorithm
US10785645B2 (en) 2015-02-23 2020-09-22 Apple Inc. Techniques for dynamically supporting different authentication algorithms
US10856148B2 (en) 2015-03-22 2020-12-01 Apple Inc. Methods and apparatus for user authentication and human intent verification in mobile devices
US10405181B2 (en) 2015-03-22 2019-09-03 Apple Inc. Methods and apparatus for user authentication and human intent verification in mobile devices
JP2018512752A (en) * 2015-03-22 2018-05-17 アップル インコーポレイテッド Method and apparatus for user authentication and human intention verification in a mobile device
EP3277002A4 (en) * 2015-03-25 2018-05-09 Samsung Electronics Co., Ltd. Method and apparatus for downloading profile in wireless communication system
KR102570563B1 (en) 2015-03-25 2023-08-28 삼성전자주식회사 Method and apparatus for downloading profile in wireless communication system
CN107660346A (en) * 2015-03-25 2018-02-02 三星电子株式会社 Method and apparatus for download profile in a wireless communication system
KR20220137593A (en) * 2015-03-25 2022-10-12 삼성전자주식회사 Method and apparatus for downloading profile in wireless communication system
CN107660346B (en) * 2015-03-25 2021-04-13 三星电子株式会社 Method and apparatus for downloading profile in wireless communication system
US10939279B2 (en) 2015-03-25 2021-03-02 Samsung Electronics Co., Ltd. Method and apparatus for downloading profile in wireless communication system
EP3562184A1 (en) * 2015-04-13 2019-10-30 Samsung Electronics Co., Ltd. Technique for managing profile in communication system
US10965470B2 (en) 2015-04-13 2021-03-30 Samsung Electronics Co., Ltd. Technique for managing profile in communication system
US10439823B2 (en) 2015-04-13 2019-10-08 Samsung Electronics Co., Ltd. Technique for managing profile in communication system
US10645568B2 (en) 2015-08-14 2020-05-05 Zte Corporation Carrier configuration processing method, device and system, and computer storage medium
EP3337219A4 (en) * 2015-08-14 2018-06-20 ZTE Corporation Carrier configuration processing method, device and system, and computer storage medium
WO2018091254A1 (en) * 2016-11-17 2018-05-24 Gemalto Sa Method for managing a patch of a package
EP3324655A1 (en) * 2016-11-17 2018-05-23 Gemalto SA Method for managing a patch of a sofware component in a euicc

Also Published As

Publication number Publication date
JP2015512209A (en) 2015-04-23
KR101618274B1 (en) 2016-05-04
US9247424B2 (en) 2016-01-26
RU2014137130A (en) 2016-04-10
RU2595904C2 (en) 2016-08-27
KR20140129161A (en) 2014-11-06
US20130227646A1 (en) 2013-08-29
JP6533203B2 (en) 2019-06-19
MX342702B (en) 2016-10-10
WO2013123233A3 (en) 2013-10-24
KR20160052803A (en) 2016-05-12
KR101716743B1 (en) 2017-03-15
JP2017050875A (en) 2017-03-09
CN104221347B (en) 2017-03-29
MX2014009822A (en) 2014-09-11
CN104221347A (en) 2014-12-17
BR112014019937A8 (en) 2017-07-11
US20160226877A1 (en) 2016-08-04
BR112014019937A2 (en) 2017-06-20
US9843585B2 (en) 2017-12-12

Similar Documents

Publication Publication Date Title
US9843585B2 (en) Methods and apparatus for large scale distribution of electronic access clients
JP6262278B2 (en) Method and apparatus for storage and computation of access control client
US9788209B2 (en) Apparatus and methods for controlling distribution of electronic access clients
TWI469654B (en) Methods and apparatus for delivering electronic identification components over a wireless network
EP2815553B1 (en) Mobile apparatus supporting a plurality of access control clients, and corresponding methods
US20120331292A1 (en) Electronic access client distribution apparatus and methods
JP2014158300A (en) Apparatus and methods for storing electronic access clients

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13714036

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2014557779

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2014/009822

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 2013714036

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20147025521

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2014137130

Country of ref document: RU

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13714036

Country of ref document: EP

Kind code of ref document: A2

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112014019937

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112014019937

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20140812