专利摘要:
The invention discloses an improved Narrowband Internet of Things device (UE) supporting resource sharing for integrated Subscriber Identity Modules (iSIM). The object of the invention to further reduce the cost per UE by reducing the chip area and energy consumption of an integrated UICC chip will be solved therein that identical components of the modem and the iSIM are designed as shared components, whereas a secure hardware arbiter securely manages any access to said shared components by the modem or the iSIM and prevents any kind of information leaking.
公开号:EP3694241A1
申请号:EP19195307.4
申请日:2019-09-04
公开日:2020-08-12
发明作者:Martin FRÖHLICH
申请人:Shenzhen Goodix Technology Co Ltd;
IPC主号:H04W12-00
专利说明:
[0001] The invention relates to an improved Narrowband Internet of Things device (UE) supporting resource sharing for integrated Subscriber Identity Modules (iSIM).
[0002] There are standards describing the "classical" SIM/UICC or the embedded version eSIM, see: https://www.gsma.com/esim/. Consumer benefits of such eSIMs include, that a simpler device setup is possible without the need to insert or replace a SIM card; devices can operate independently of a tethered smartphone, with their own subscriptions; and a range of new, enhanced mobile-connected devices benefit from the standardized eSIM.
[0003] So far, integrated SIMs (iSIMs) are not yet standardized.
[0004] All 3GPP based cellular user equipments (UE), also known as Narrowband Internet of Things devices, such as mobile phone, require a mechanism to prove their identity against the cellular network and to exchange keys for a secure connection.
[0005] Therefore, the Universal Integrated Circuit Card (UICC - the hardware), with a USIM application (the software) running on it, is used. The UICC is a high secure hardware module that is connected (wired) to the UE. The USIM application contains all secret keys and provider specific information. The USIM application is provisioned by the cellular operator.
[0006] The secret keys inside the USIM application stored on the UICC must not be read out. The keys are used to authenticate the UE against the core network with the help of a cryptographic algorithm. Furthermore, the USIM application generates the secret session keys for the UE.
[0007] Thus, each UE requires a USIM application (running on the UICC) to attach to a core network successfully.
[0008] The modem to UICC communication is done via wired serial interface which is standardized in ISO/IEC 7816-3.
[0009] The disadvantage of a separate UICC is it's embodiment as a separated secure hardware element, a SIM card, which is required in a UE. This causes additional system costs. Cost sensitive systems require a solution where the UICC becomes part of the modem inside the UE. Thus, the integration of the UICC (with the USIM application) is called for integrated Subscriber Identity Modules (iSIM).
[0010] A quite simple solution for an iSIM is just to put the UICC chip and the modem chip in one package (SIP - System in Package) or to have the UICC chip as part of the modem chip (figure 1).
[0011] The objective of the invention is to further reduce the cost per UE by reducing the chip area and energy consumption of an integrated UICC chip.
[0012] The objective of the invention will be solved by an improved Narrowband Internet of Things device (UE) comprising a modem and an integrated Subscriber Identity Module (iSIM) both combined on a modem chip, wherein identical components of the modem and the iSIM are designed as shared components, whereas a secure hardware arbiter securely manages any access to said shared components by the modem or the iSIM and prevents any kind of information leaking.
[0013] Integrated Subscriber Identity Modules (iSIMs) require for network authentication and provisioning cryptographic functions like AES, HMAC, Elliptic Curve Cryptography or true random numbers. Secure hardware modules, including iSIMs, provide special hardware accelerator to support such functions. Those special hardware accelerators are also used in the modem, e. g. for secure boot, firmware encryption and integrity checking, for encryption of the network packets, or end-to-end data protection with DTLS-Datagram Transport Layer Security.
[0014] The usage of shared hardware components requires a secure hardware arbiter that prevents any access of a used component by the other module, either the modem or the iSIM and prevents any kind of information leaking.
[0015] In a preferred embodiment of the inventive UE, the hardware arbiter comprises a timer for preventing blocking of said shared components. If an attacker can execute code on a modem or an application processor, he allocates the resource or component and, in the worst case, never releases that resource or component again, thus blocking the entire system. With the timer, the arbiter can specify that a resource can only be used for a certain time. After the timer has expired, the resource is forced to be released again.
[0016] So, in a further preferred embodiment of the inventive UE, the hardware arbiter ensures real-time operating and hence preventing the blocking of a shared component. A blocked component can be released either through a request of the modem for example or after the timer has expired. This prevents that the system fails entirely and ensures a real-time operating.
[0017] In another embodiment of the inventive UE, the hardware arbiter provides reset and/or RAM cryptography procedures for securely removing all information that remains after usage of said shared components by the modem or the iSIM.
[0018] In an embodiment of the inventive UE the shared components are cryptographic accelerators. Cryptographic accelerators are suitable because they can be reset easily to remove all remaining information. The securely removing of information in registers after usage can be done by a reset. These components are rarely. An access protection module will grand access only to one party - iSIM or modem. The other has to wait till the usage was finished.
[0019] If asymmetric cryptography is used, which is based on elliptic curves, one need RAM, which as such has no reset. For securely removing the information inside the RAM there is either the possibility to overwrite the RAM with random data by means of a routine. Or alternatively an XOR mask with a random value can be used. All data written to RAM will be XOR-ed with the XOR mask. The XOR mask, which is stored in a register, is then reset. Only if one knew the value of the XOR mask, a recovery of the RAM would be possible.
[0020] To summarize, the arbiter must prevent any kind of information leaking.
[0021] The invention will be explained in more detail using exemplary embodiments.
[0022] The appended drawings show Fig. 1 Basic components of an iSIM (state-of-the-art); Fig. 2 Secure component sharing via a secure arbiter.
[0023] Figure 2 illustrates the inventive UE with a modem chip which comprises a modem and an iSIM. The modem and the iSIM share components which are used by both - the modem and the iSIM. A shared component can be typically cryptographic accelerators which is used e.g. for AES, HMAC, Elliptic Curve Cryptography or true random number generator. For example, an AES core is used by the iSIM for data-encryption or data-decryption or session key generation. After the network authentication and provisioning the iSIM releases the AES core. The secure hardware arbiter ensures that all information is removed after said usage. Afterwards, the modem uses the AES core for data (packet data) encryption or decryption. It is important, that the hardware arbiter prevents any access of the AES core by the respective other component (modem or iSIM) if it is used.
[0024] It is also important that the hardware arbiter obfuscate the access time to prevent side channel attacks, because the execution time of asymmetric crypto accelerators is key dependent. This is done by some hardware that generates randomly non operation cycles or stops the clock for some cycles.
[0025] The modem is booting and uses the AES for the firmware image decryption and the ECC module to verify the firmware signature. Afterwards the modem starts the iSIM. The iSIM does the same with the firmware. The modem tries to connect to the network. The modem receives the authenticate data from the network and sends the data to the iSIM. The iSIM uses the AES to check the authentication data, generates the response and the session keys for the modem. The modem uses the session keys to encrypt and/or decrypt the network data. List of Reference Signs
[0026] 1modem chip2modem3integrated Subsciber Identity Module4serial interface5secure hardware arbiter6shared component
权利要求:
Claims (5)
[0001] An improved Narrowband Internet of Things device - UE - comprising a modem (2) and an integrated Subscriber Identity Module (3) - iSIM - both combined on a modem chip (1), wherein identical components of the modem (2) and the iSIM (3) are designed as shared components (6), whereas a secure hardware arbiter (5) securely manages any access to said shared components (6) by the modem (2) or the iSIM (3) and prevents any kind of information leaking.
[0002] The improved UE according to claim 1, wherein the hardware arbiter (5) comprises a timer for preventing blocking of said shared components (6).
[0003] The improved UE according to claim 2, wherein the hardware arbiter (5) ensures real-time operating.
[0004] The improved UE according to claim 1, wherein the hardware arbiter (5) provides reset and/or RAM cryptography procedures for securely removing all information that remains after usage of said shared components (6) by the modem (2) or the iSIM (2).
[0005] The improved UE according to claim 1, wherein the shared components (6) are cryptographic accelerators.
类似技术:
公开号 | 公开日 | 专利标题
JP6533203B2|2019-06-19|Mobile device supporting multiple access control clients and corresponding method
KR101959492B1|2019-03-18|Methods and apparatus for user authentication and human intent verification in mobile devices
US9626520B2|2017-04-18|Policy based techniques for managing access control
JP6492115B2|2019-03-27|Encryption key generation
US9485230B2|2016-11-01|Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card |
US9659160B2|2017-05-23|System and methods for authentication using multiple devices
US9954826B2|2018-04-24|Scalable and secure key management for cryptographic data processing
US10003582B2|2018-06-19|Technologies for synchronizing and restoring reference templates
US9094191B2|2015-07-28|Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
US9609024B2|2017-03-28|Method and system for policy based authentication
TWI475899B|2015-03-01|Apparatus and methods for storing electronic access clients
JP2015165702A|2015-09-17|Method and apparatus for trusted federated identity management and data access authorization
Mulliner et al.2013|SMS-based one-time passwords: attacks and defense
US9264426B2|2016-02-16|System and method for authentication via a proximate device
Nafi et al.2013|A newer user authentication, file encryption and distributed server based cloud computing security architecture
JP2016076940A|2016-05-12|Management method for contents on preservation element connected to device
US9930527B2|2018-03-27|Methods and apparatus for storage and execution of access control clients
US10440034B2|2019-10-08|Network assisted fraud detection apparatus and methods
US9325708B2|2016-04-26|Secure access to data in a device
EP3280090B1|2020-08-26|User authentication method and device
US20160248595A1|2016-08-25|User Authentication System
AU2006210510B2|2010-05-13|Secure bootstrapping for wireless communications
US20160044493A1|2016-02-11|Simulacrum of physical security device and methods
CN1708942B|2010-11-03|Secure implementation and utilization of device-specific security data
EP1856836B1|2014-08-27|Network assisted terminal to sim/uicc key establishment
同族专利:
公开号 | 公开日
WO2020160804A1|2020-08-13|
US20210160690A1|2021-05-27|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2020-07-10| PUAI| Public reference made under article 153(3) epc to a published international application that has entered the european phase|Free format text: ORIGINAL CODE: 0009012 |
2020-07-10| STAA| Information on the status of an ep patent application or granted ep patent|Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
2020-08-12| AX| Request for extension of the european patent|Extension state: BA ME |
2020-08-12| AK| Designated contracting states|Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
2021-02-05| STAA| Information on the status of an ep patent application or granted ep patent|Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
2021-03-10| 17P| Request for examination filed|Effective date: 20210201 |
2021-03-10| RBV| Designated contracting states (corrected)|Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
2021-10-08| STAA| Information on the status of an ep patent application or granted ep patent|Free format text: STATUS: EXAMINATION IS IN PROGRESS |
2021-11-10| 17Q| First examination report despatched|Effective date: 20211007 |
优先权:
申请号 | 申请日 | 专利标题
EP19155419||2019-02-05||PCT/EP2019/081215| WO2020160804A1|2019-02-05|2019-11-13|Improved ue with an integrated subscriber identity modulesby resource sharing|
US17/169,422| US20210160690A1|2019-02-05|2021-02-06|Ue with integrated subscriber identity modules by resource sharing|
[返回顶部]