专利摘要:
A method of managing a mobile communication profile stored in a non-volatile memory of a secure element and implemented by said secure element, characterized in that it comprises: a reading (S11) of the state of an indicator stored in said non-volatile memory of the secure element indicating whether said profile can be deleted, - a determination (S12) of the active or inactive state of said profile, and - if said indicator indicates that the profile can be deleted and if it is determined that the profile is inactive, a deletion (S22) of said profile.
公开号:FR3039738A1
申请号:FR1557218
申请日:2015-07-28
公开日:2017-02-03
发明作者:Alexis Michel;Tomasz Wozniak
申请人:Oberthur Technologies SA;
IPC主号:
专利说明:

BACKGROUND OF THE INVENTION The invention relates to the general field of secure elements in which profiles can be recorded, in particular the secure elements installed within terminals. The invention applies in particular and in a nonlimiting manner to the secure elements of the eUICC type (embedded integrated circuit circuit (UICC)) integrated in terminals.
EUICC secure elements are described in GSMA - SGP.02 - "Remote Provisioning Architecture for Embedded UICC Technical Specification" - Version 2.0. It may be noted that these elements make it possible to replace a traditional SIM card ("Subscriber Identity Module") with a microcircuit installed permanently in a terminal. Indeed, the authentication functions with a mobile operator ("MNO: Mobile Network Operator") are implemented in a similar manner by an eUICC and by a SIM card.
EUICC elements differ from traditional UICC elements in that they include profiles that enable authentication to different mobile operators. As a guide, a device equipped with a secure element of this type can be marketed with a profile called "provisioning profile" already recorded in the secure element. The provisioning profile makes it possible to subsequently select a mobile operator and download a new profile corresponding to that mobile operator. This download is made from a security domain server ("SM-SR: Subscription Manager - Secure Routing").
The eUICC elements are therefore particularly suitable for communication between electronic devices ("M2M: Machine To Machine") in which it may be preferable to fix, for example by welding, the secure element.
The infrastructure required to manage profiles in eUICC elements includes at least one mobile phone operator, a Security Domain Preparation Server ("SM-DP: Subscription Manager - Data Preparation") which encrypts the profiles that will be downloaded by the user. eUICC element, a SM-SR security domain server, and finally the eUICC element itself.
In the present application, the notion of "profile" must be interpreted in a broad sense, namely as a set of at least one file and / or data. A profile within the meaning of the invention may in particular comprise at least one of:
A standard file as defined by the specifications of 3GPP or ETSI for UICC and their applications and in particular by 3GPP 31.102 and ETSI 102.221;
A proprietary file
A configuration file for an operating system
A Java Card application and associated personalization elements;
Data such as transport protocol keys, authentication algorithm parameters, ...
An eUICC element includes a privileged security domain ("ISD-P: Issuer Security Domain - Root") configured to manage profiles and one or more security domains ("ISD-P: Issuer Security Domain - Profile") each comprising a profile.
A security domain therefore comprises at least the same data as a profile (data and / or application), and it may be noted that a privileged security domain also includes encryption keys and applications. By abuse of language, in the present application, the expression privileged security domain targets both the memory area that includes these keys and these applications, as well as the software module having security domain management functions that is obtained. from the privileged security domain.
It has been observed that the provisioning profile is no longer used once a profile has been downloaded and this downloaded profile has been activated, since its main function is to allow the downloading of a profile. Other profiles downloaded later may also have a temporary utility. This is the case for profiles that are limited for a period of time (for example a limited consumption time), a period (validity of the profile during a limited period of time) or associated data transfer limits (data quota). These profiles are nevertheless all retained by the eUICC secure element.
Also, each profile is associated with a pair of data well known to those skilled in the art under the acronyms IMSI ("International Mobile Subscriber Identity") and Ki (encryption key). Mobile network operators have a limited number of IMSI / Ki pairs at their disposal. Each unused profile stored in an ellICC element therefore corresponds to an unused IMSI / Ki pair. This is disadvantageous for mobile operators who wish to reuse IMSI / KI pairs.
The storage of unused profiles is also problematic in view of the amount of memory occupied in an eUICC secure element by the unused profiles.
This storage also poses security problems since secret data specific to mobile operators are stored with the profiles.
Finally, if a large number of profiles are stored in an eUICC security element, manual management of these profiles can be confusing. This confusion can occur if a user uses an interface to select a profile to be activated from all the profiles saved in the secure element. The invention aims in particular to overcome some of these drawbacks, and in particular to improve the processing of unused profiles stored in the secure elements.
Object and summary of the invention
The present invention responds to this need by proposing a method for managing a mobile communication profile stored in a non-volatile memory of a secure element and implemented by said secure element, characterized in that it comprises: reading the state of an indicator stored in said non-volatile memory of the secure element indicating whether said profile can be deleted, - a determination of the active or inactive state of said profile, and - if said indicator indicates that the profile can be deleted and if it is determined that the profile is inactive, a deletion of said profile.
This method therefore allows the deletion of a profile at the initiative of the secure element that verifies the two conditions: the indicator indicates that the profile can be deleted and the profile is inactive.
By deleting this inactive profile, if this profile is associated with an IMSI / KI pair, this pair can be retrieved for another secure element. It is also possible to free up memory space and clarify the management of many profiles by a user.
In addition, security issues related to the storage of secret information in the profiles are solved.
It may be noted that in prior art solutions for eUICC elements, a profile deletion is performed only after receiving a deletion instruction issued by a SM-SR security domain server: There is no reading of an indicator that indicates whether the profile can be deleted since this indicator is not present in the secure elements according to the prior art. Here, the indicator is stored in the non-volatile memory of the secure element, and it is always present and readable when the profile is not deleted.
The non-volatile memory may be an EEPROM ("electrically erasable programmable read-only memory") or a FLASH memory.
It can also be noted that in solutions according to the prior art, the management of the profiles is performed by a security domain server which can only perform deletions if the secure element is connected to a network for mobile communication. On the contrary, in the invention, even in the event of an interruption in the connection to the network, it is possible for the secure element to verify that the conditions necessary for the deletion of a profile are such that the deletion of the profile can be Implementation. This avoids keeping unnecessary profiles in the event of an interruption in the network connection.
This results in a deletion implemented automatically by the secure element which may not be connected to a mobile communication network. The deletion is thus initiated without receiving a message from outside and in particular from a security domain server, for example a message of the "delete" type.
According to a particular mode of implementation, the method comprises a preliminary step of attributing to said indicator a state indicating that the profile can be deleted, said allocation being implemented during a personalization phase of the secure element comprising a recording of said profile.
A personalization phase is a phase well known to those skilled in the art in which a secure element is configured by recording in its non-volatile memory data specific to the secure element, in particular a mobile communication profile.
This particular mode of implementation makes it possible to automatically delete a profile as soon as it is deactivated, since during the registration or the installation of this profile (during the personalization phase), the indicator is put into a state which indicates that the profile can be deleted. This particular mode of implementation is particularly well suited for temporary profiles that should only be kept until they are replaced.
According to a particular mode of implementation, which said customization phase is implemented prior to a phase of use of the secure element, and the personalization phase comprises a connection to a reader electrically feeding the secure element, a authentication and / or cryptographic securing of a session with the reader, said registration of the profile and said allocation to said flag of a state indicating that the profile can be deleted during this session, a closure of said session, and a disconnection from the card to the reader.
The use phase of the secure element includes the use by the end user of the secure element after the profile has been assigned to that end user and the secure element has been delivered to a user (e.g. in a terminal). According to a particular mode of implementation, said customization phase is implemented during a phase of use of the secure element, and the personalization phase comprises an authentication and / or a security of a session on a data channel. mobile communication, said registration of the profile during this session and said allocation to said flag of a state indicating that the profile can be deleted, and a closure of said session.
Here, the customization phase is done remotely so "over the air" according to the Anglo-Saxon expression well known to those skilled in the art.
According to a particular mode of implementation, the mobile communication profile is a provisioning profile.
This particular mode of implementation makes it possible to automatically delete this provisioning profile as soon as a new profile has been downloaded and activated.
According to a particular mode of implementation, the method comprises a preliminary step of comparison by said secure element of an operating variable associated at least with said profile to a threshold associated at least with said profile, said and said threshold operating variable being memorized in said non-volatile memory of the secure element and, if said threshold is reached by said operating variable, an allocation to said flag of a state indicating that the profile can be deleted.
In this particular mode of implementation, the allocation to the indicator of a state indicating that the profile can be deleted is made after the registration of the profile, and this attribution is made while the profile and the element secure have already been used. Also, the comparison and the allocation are made on the initiative of the secure element since the operating variable is its own and it can be measured or read by the secure element. In other words, the comparison and the allocation are made without receiving a message to cause the attribution from the outside.
Also, the operating variable associated with the secure element may be an operating variable of a terminal in which the secure element is integrated and with which it is therefore associated.
According to a particular mode of implementation, said variable is a communication operating time and said threshold is a maximum operating duration in communication, or said variable is a quantity of data and said threshold is a maximum quantity of data, or said variable is a duration of activation of the profile and said threshold is a maximum duration of activation of the profile.
This particular mode of implementation applies in particular to the limited mobile communication profiles with respect to a call duration or a quantity of data exchanged with the outside, or a duration during which the profile is activated. These variables can be tracked by the secure element that is used when communicating with the outside.
According to a particular mode of implementation, said profile is registered in a security domain further comprising said indicator, and the deletion of said profile comprises a deletion of the security domain comprising said profile.
According to a particular mode of implementation, said reading of the state of the indicator, said determination of the state of the profile and said deletion are implemented using a privileged security domain, for example of the ISD-R type. .
According to a particular mode of implementation, said secure element is an eUICC element according to the GSMA standard - SGP.02 - "Remote Provisioning Architecture for Embedded UICC Technical Specification" - Version 2.0.
There is also provided a computer program comprising instructions for performing the steps of a method as defined above when said program is executed by a processor.
There is also provided a processor-readable recording medium on which is recorded a computer program comprising instructions for executing the steps of a method as defined above.
It may be noted that the computer programs mentioned in this presentation can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in any other desirable form.
In addition, the recording (or information) media mentioned in this disclosure may be any entity or device capable of storing the program. For example, the medium may comprise storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM such as an EEPROM, or a magnetic recording medium, for example a floppy disk (floppy). say) or a hard drive. On the other hand, the recording media may correspond to a transmissible medium such as an electrical or optical signal, which may be conveyed via an electrical or optical cable, by radio or by other means. The program according to the invention can be downloaded in particular on an Internet type network.
Alternatively, the recording media may correspond to an integrated circuit in which the program is incorporated, the circuit being adapted to execute or to be used in the execution of the method in question.
There is also provided a secure element comprising a non-volatile memory in which is recorded a mobile communication profile, characterized in that an indicator indicating whether said profile can be deleted is stored in said non-volatile memory of the secure element, and said secure element comprises a module for reading said indicator, a module for determining the active or inactive state of said profile, and a module for deleting said profile if said reader module indicates that the profile can be deleted and if said determination module indicates that the profile is inactive.
This secure element can be configured for the implementation of each of the implementation modes of the method as defined above.
It is also proposed a terminal comprising said secure element.
BRIEF DESCRIPTION OF THE DRAWINGS Other features and advantages of the present invention will emerge from the description given below, with reference to the accompanying drawings which illustrate an example devoid of any limiting character.
In the figures: FIG. 1 schematically represents different steps of a method according to an implementation mode of the invention, FIG. 2 schematically represents a terminal equipped with a secure element according to a mode of embodiment of the invention, and - Figure 3 is an example of an embodiment of the invention.
Detailed description of an embodiment
An exemplary embodiment of the invention will now be described in which a method of managing a mobile communication profile stored in a non-volatile memory of a secure element, this method being implemented by the secure element. In this example the secure element is of type eUICC.
It should be noted that the invention applies to any security element, including secure elements other than eUICC elements but which also allow the storage of profiles in a secure manner.
FIG. 1 diagrammatically shows steps of a method for managing a profile registered in a secure element of the eUICC type. This method can be implemented at any time during the operation of the secure element.
This method comprises a reading S11 of an indicator stored in a non-volatile memory of the secure element, more precisely with said profile. This flag has two states, a status that indicates that the profile can be deleted (state "1"), and a status that indicates that the profile can not be deleted (state "0").
An indicator that the profile can be deleted is a deletion without receiving a "delete" message from a security domain server. Also, an indicator indicating that the profile can not be deleted does not prevent, as conceived, a deletion of the profile according to the prior art on the basis of a "delete" message received from outside and in particular a "delete" message sent by a security domain server.
The method further comprises a step S12 in which it is determined whether the profile is active or inactive.
This can be done by means of an ISD-R privileged security domain which manages the activity of a profile by means of commands ("ENABLE / DISABLE") and which therefore has the information relating to the activity or inactivity of the profile.
If said flag indicates that the profile can be deleted and if it is determined that the profile is idle, the profile is deleted (step S20). This deletion is implemented by the privileged security domain ISD-R ("DELETE" command).
FIG. 2 diagrammatically shows a terminal 1 equipped with a secure element 2 according to one embodiment of the invention. This secure element 2 can implement the method described with reference to FIG. 1. The secure element 2 comprises a non-volatile memory 3 in which a computer program PRG has been stored which includes instructions for executing the steps. of the method described with reference to FIG.
More precisely, the program PRG comprises an instruction II for reading the indicator of a profile for the implementation of step S11, an instruction 12 for determining the activity of a profile for the implementation of the step S12, and a delete instruction 13 for implementing step S20.
Several mobile communication profiles are stored in the memory 3. More precisely, the memory 3 comprises, in this example, three security domains: first security domain DSI containing a first profile PI, a second security domain DS2 containing a second profile P2, and a third security domain DS3 containing a third profile P3. The first DSI security domain, the second DS2 security domain, and the third DS3 security domain are of the ISD-P type.
In the example illustrated in the figure, only the first profile PI is active and this is represented in the figure by a strong line connecting the first security domain DSI to a privileged security domain DSP ISD-R type. The second profile P2 and the third profile P3 are inactive and this is represented in the figure by broken lines which connect the second security domain DS2 to the privileged security domain DSP and the third security domain DS3 to the privileged security domain DSP.
In each DSI, DS2 or DS3 security domain, an indicator (referenced ID1, ID2, ID3 in the figure) is registered to display a value of "0" or "1". The "1" state of this flag indicates that the profile associated with the indicator (that is, stored in the same security domain) can be deleted. The "0" state of this flag indicates that the profile associated with the indicator (stored in the same security domain) can not be deleted.
FIG. 2 also schematically shows the context in which the invention is implemented. The terminal 1 and its secure element 2 are here in communication with a security domain server 4 of the SM-SR / SM-DP type, and this security domain server 4 is itself in communication with a mobile telephone operator 5.
The first profile PI is, in this example, the profile associated with this mobile operator 5. This first profile PI, which is active, is a non-deletable profile since the indicator ID1 associated with it reads "0".
The second profile P2 is not active and it is also non-deletable since the indicator ID2 associated with it reads "0".
This is not the case for the third profile P3 which is not active and which is suppressable since the indicator ID3 associated with it reads "1". Therefore, the implementation of the method according to the invention by the execution of instructions II to 13 will lead to the deletion of the third profile P3, removing the entire third security domain DS3.
It may be noted that the terms "suppressible / non-suppressible" used in the above paragraphs should be understood here as referring to a deletion within the meaning of the invention in which both conditions are satisfied (indicator and activity). As is conceivable, a prior art deletion ordered by a mobile operator or a security domain server is still possible for any profile.
A deletable profile targets a profile that can be deleted by the secure element without receiving a "delete" type message from a security domain server. Also, a non-deletable profile can however be deleted, as it is conceived, during a deletion of the profile according to the prior art on the basis of a message received from the outside and in particular a "delete" type message sent by a security domain server.
FIG. 3 is an exemplary implementation of a profile management method that can be implemented with a secure element as described with reference to FIG. 2.
This figure shows the various steps of this method and the elements associated with each of these steps: the secure element 2, the terminal 1, the security domain server 4 and finally the mobile operator 5 .
Also, the example illustrated in this figure corresponds to the management of a provisioning profile, here an initial provisioning profile recorded during the manufacture and configuration of the secure element.
In a first step A1, a provisioning profile is recorded with an indicator in a security domain of a memory of the secure element 2. During this same step A1, this indicator is assigned the state "1". : This provisioning profile can be deleted, and it will be deleted if this profile is disabled and another profile is enabled. This profile is the only profile available and is active at this point.
In a subsequent step A2, the provisioning profile is used to indicate to the terminal 1 that another profile associated with the telephony operator 5 is requested.
It may be noted that the attribution of the state "1" to said indicator which is made during step A1 is necessarily implemented before the start of step A2.
The terminal receives in step B2 the request from the other profile and transmits this request to the security domain server 4. This request is received and then sent to the mobile operator 5 (step C2). The mobile operator receives this request in step D2.
During a step D3, the mobile operator transmits data comprising the other requested profile to the security domain server 4. This step is retransmitted (step C3) by the security domain server to the terminal 1 which itself retransmits it (step B3) to the security element 2 which records it during the step A3. The security element then transmits (step A4) a registration confirmation to the mobile operator, and this confirmation is retransmitted by the terminal (step B4) by the security domain server (step C4). to be received by the mobile operator (step D4).
Then, the security domain server triggers the activation of the profile that has been registered during a step C5, and in step A5, the secure element receives this activation instruction.
The newly registered profile is activated by the privileged security domain of the secure element in step A6, and this step includes disabling the provisioning profile.
In step A7, the secure element transmits an indication that the provisioning profile has been disabled and the other profile has been enabled. The security server receives this indication in step C7 and this indication is transmitted to the mobile operator who receives it in step D7. The secure element can then send the terminal a refresh command (step A8). In step B8, the terminal processes this refresh command and can connect to the mobile operator 5.
The following steps A9, A10 and A11 are analogous to the steps SU, S12 and S20 described with reference to FIG. 1. These steps include reading the Provisioning Profile Indicator (step A9), determining the status inactive the provisioning profile (step A10) and finally the deletion of the provisioning profile (step Garlic). In step A12, the secure element transmits a confirmation of deletion of the provisioning profile to the security domain server that receives it and retransmits (step C12) to the mobile operator (step DI2). The mobile operator can then reuse some of the information related to the profile, and in particular the IMSI / KI data pair. The invention is not limited to the deletion of a provisioning profile. It is also possible to save profiles with an indicator that has a status indicating that the profile can not be deleted, and to change the status of that flag later to indicate that the profile is removable.
Such a change of state can be achieved at the initiative of the secure element and this can comprise a comparison between an operating variable associated with the secure element and a threshold stored in the non-volatile memory of the secure element. . If the threshold is reached by said operating variable, then said flag is assigned a status indicating that the profile can be deleted.
The variable may be a communication operating time and said threshold is a maximum operating duration in communication (for example a few hours), or said variable is a quantity of data and said threshold is a maximum quantity of data (for example a few giga -bytes of data), or said operating variable is a duration of activation of the profile and said threshold is a maximum duration of activation of the profile (for example a few days).
权利要求:
Claims (14)
[1" id="c-fr-0001]
1. A method of managing a mobile communication profile (PI, P2, P3) stored in a non-volatile memory of a secure element (2) and implemented by said secure element, characterized in that it comprises: a reading (S11) of the state of an indicator (ID1, ID2, ID3) recorded in said non-volatile memory of the secure element indicating whether said profile can be deleted, - a determination (S12) of the state active or inactive of said profile, and - if said indicator indicates that the profile can be deleted and if it is determined that the profile is inactive, a deletion (S22) of said profile.
[2" id="c-fr-0002]
2. Method according to claim 1, comprising a preliminary step of assigning to said indicator a state indicating that the profile can be deleted, said allocation being implemented during a personalization phase of the secure element comprising a record of said profile. .
[3" id="c-fr-0003]
3. Method according to claim 2, wherein said personalization phase is implemented prior to a use phase of the secure element, and the personalization phase comprises a connection to a reader electrically feeding the secure element, a authentication and / or cryptographic securing of a session with the reader, said registration of the profile and said allocation to said flag of a state indicating that the profile can be deleted during this session, a closure of said session, and a disconnection from the card to the reader.
[4" id="c-fr-0004]
4. Method according to claim 2, wherein said customization phase is implemented during a use phase of the secure element, and the personalization phase comprises an authentication and / or securing a session on a channel. mobile communication, said registration of the profile during this session and said allocation to said indicator of a state indicating that the profile can be deleted, and a closure of said session.
[5" id="c-fr-0005]
5. Method according to one of claims 2 to 4, wherein the mobile communication profile is a provisioning profile.
[6" id="c-fr-0006]
6. Method according to claim 1, comprising a preliminary step of comparison by said secure element of an operating variable associated at least with said profile to a threshold associated at least with said profile, said threshold and said operating variable being stored in said memory. non-volatile element of the secure element and, if said threshold is reached by said operating variable, an allocation to said indicator of a state indicating that the profile can be deleted.
[7" id="c-fr-0007]
The method of claim 6, wherein said variable is a communication operation time and said threshold is a maximum communication operation time, or said variable is a data amount and said threshold is a maximum amount of data, or said variable is a duration of activation of the profile and said threshold is a maximum duration of activation of the profile.
[8" id="c-fr-0008]
The method according to any of claims 1 to 7, wherein said profile is registered in a security domain (DSI, DS2, DS3) further comprising said flag (ID1, ID2, ID3), and deleting said profile. includes a deletion of the security domain comprising said profile.
[9" id="c-fr-0009]
The method according to any one of claims 1 to 8, wherein said reading of the state of the indicator, said determination of the state of the profile and said deletion are implemented using a privileged security domain ( DSP).
[10" id="c-fr-0010]
The method according to any one of claims 1 to 9, wherein said secure element is an eUICC element according to GSMA - SGP.02 - "Remote Provisioning Architecture for Embedded UICC Technical Specification" - Version 2.0.
[11" id="c-fr-0011]
11. Computer program comprising instructions (II, 12, 13) for performing the steps of a method according to one of claims 1 to 10 when said program is executed by a processor.
[12" id="c-fr-0012]
12. A processor-readable recording medium on which is recorded a computer program comprising instructions for executing the steps of a method according to any one of claims 1 to 10.
[13" id="c-fr-0013]
13. Secure element comprising a non-volatile memory in which is recorded a mobile communication profile (PI, P2, P3), characterized in that an indicator indicating whether said profile can be deleted is stored in said non-volatile memory of the secure element, and said secure element comprises a module for reading said indicator, a module for determining the active or inactive state of said profile, and a module for deleting said profile if said reading module indicates that the profile can be deleted and if said determining module indicates that the profile is inactive.
[14" id="c-fr-0014]
Terminal comprising said secure element according to claim 13.
类似技术:
公开号 | 公开日 | 专利标题
EP3117640B1|2018-08-29|Embedded subscriber identity module capable of managing communication profiles
FR3039738A1|2017-02-03|METHOD OF MANAGING A PROFILE RECORDED IN A SECURE ELEMENT, AND CORRESPONDING SECURE ELEMENT
FR3029728A1|2016-06-10|METHOD FOR PROVIDING A SUBSCRIBER PROFILE FOR A SECURE MODULE
EP3542563B1|2020-11-11|Installation of a profile in an embedded subscriber identity module
EP1551193A1|2005-07-06|Method for the automatic customization of a mobile terminal according to its user's identification module, and customizable mobile terminal therefor
FR3013479A1|2015-05-22|NOTIFICATION METHOD FOR CONFIGURING A SECURE ELEMENT
EP3395089B1|2019-11-27|Embedded subscriber identity module comprising communication profiles
EP1958471A1|2008-08-20|Downloading data in portable communicating objects in a radiocommunications network during a campaign
FR3046011A1|2017-06-23|METHOD FOR CONTROLLING AN INBOX SUBSCRIBER IDENTITY MODULE
EP1967023A1|2008-09-10|Processing proprietary data transmitted over a radio communication network to a mobile terminal under the control of a smart card
WO2015082852A1|2015-06-11|Methods for updating a cache memory of a telecommunications terminal
FR3046017A1|2017-06-23|METHOD FOR MANAGING CONNECTIONS BETWEEN A SET OF SECURE ELEMENTS AND A SERVER
WO2015092307A1|2015-06-25|Method for testing and updating the system of a terminal by means of a subscriber identity module and associated devices
EP3656142A1|2020-05-27|Loading of a new subscription profile into an embedded subscriber identification module
EP3195638B1|2018-07-04|Method for administering life cycles of communication profiles
WO2005121956A1|2005-12-22|System and method for assisting in the execution of a function or set of functions implemented by a telecommunication service
EP3278542B1|2019-01-02|System and method for executing an application on a terminal provided with a chip card
WO2021019162A1|2021-02-04|Dynamic adaption of a secure element execution environment to profiles
EP2424315A1|2012-02-29|Method for updating a database of subscribers registered on an OTA platform, corresponding card and OTA platform
WO2021234250A1|2021-11-25|Method for notifying a mobile terminal
FR3087988A1|2020-05-01|MANAGING SIMULTANEOUSLY ACTIVE SUBSCRIBER PROFILES IN AN EUICC CARD USING SEVERAL SEPARATE LINKS
FR2944123A1|2010-10-08|Smartcard e.g. global system for mobile communication subscriber identity module card, for use in portable telephone, has register memorizing explicit information representing absence or presence of component in card
FR3046016A1|2017-06-23|METHOD FOR MANAGING CONNECTIONS BETWEEN A SECURE ELEMENT AND A SERVER
FR3038176A1|2016-12-30|PROVIDING AND MANAGING PROFILES ON A SECURE ELEMENT, SECURE ELEMENT AND ASSOCIATED SERVER
FR2924297A1|2009-05-29|METHOD FOR MANAGING THE USER INTERFACE OF A MOBILE TERMNINAL ASSOCIATED WITH A SECURITY MODULE AND ASSOCIATED MOBILE TERMINAL
同族专利:
公开号 | 公开日
US20170034699A1|2017-02-02|
US10582383B2|2020-03-03|
FR3039738B1|2018-06-22|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
KR20130048699A|2011-11-02|2013-05-10|주식회사 케이티|Method and embedded uicc for managing euicc status, and device for providing communication service using the euicc|
DE102012018540A1|2012-09-19|2014-03-20|Giesecke & Devrient Gmbh|Subscriber identity module for authenticating a subscriber to a communication network|
US20100275250A1|2009-04-24|2010-10-28|Yahoo! Inc.|Account recovery via aging of account data points|
KR20160002321A|2014-06-30|2016-01-07|삼성전자주식회사|Method and apparatus for receiving/transmitting a profile for communication service in a mobile communication system|
US9510188B2|2014-12-10|2016-11-29|Telefonaktiebolaget Lm Ericsson |Methods providing wireless device subscription information and related network nodes and wireless devices|
EP3297309B1|2015-04-13|2019-06-19|Samsung Electronics Co., Ltd.|Technique for managing profile in communication system|
US9398452B1|2015-04-24|2016-07-19|Motorola Solutions, Inc.|Bootstrapping secure connections for deployable networks|US9867037B2|2016-03-24|2018-01-09|Verizon Patent And Licensing Inc.|Profile deletion codes in subscription management systems|
US20190181901A1|2017-12-08|2019-06-13|T-Mobile Usa, Inc.|Local profile assistant and application programming interface|
US10530756B1|2018-01-16|2020-01-07|Sprint Spectrum L.P.|Profile-deletion control for an embedded universal integrated circuit card|
EP3609208A1|2018-08-06|2020-02-12|Giesecke+Devrient Mobile Security GmbH|Secure element allowing download to and deletion of profiles|
法律状态:
2016-10-27| PLFP| Fee payment|Year of fee payment: 2 |
2017-02-03| PLSC| Search report ready|Effective date: 20170203 |
2017-06-21| PLFP| Fee payment|Year of fee payment: 3 |
2018-06-21| PLFP| Fee payment|Year of fee payment: 4 |
2018-07-20| CD| Change of name or company name|Owner name: IDEMIA FRANCE, FR Effective date: 20180618 |
2018-07-20| CJ| Change in legal form|Effective date: 20180618 |
2020-06-23| PLFP| Fee payment|Year of fee payment: 6 |
2021-06-23| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
申请号 | 申请日 | 专利标题
FR1557218A|FR3039738B1|2015-07-28|2015-07-28|METHOD OF MANAGING A PROFILE RECORDED IN A SECURE ELEMENT, AND CORRESPONDING SECURE ELEMENT|
FR1557218|2015-07-28|FR1557218A| FR3039738B1|2015-07-28|2015-07-28|METHOD OF MANAGING A PROFILE RECORDED IN A SECURE ELEMENT, AND CORRESPONDING SECURE ELEMENT|
US15/220,994| US10582383B2|2015-07-28|2016-07-27|Method of managing a profile stored in a secure element, and corresponding secure element|
[返回顶部]