[go: up one dir, main page]

WO2013065991A1 - Method and euicc for providing a policy control function - Google Patents

Method and euicc for providing a policy control function Download PDF

Info

Publication number
WO2013065991A1
WO2013065991A1 PCT/KR2012/008759 KR2012008759W WO2013065991A1 WO 2013065991 A1 WO2013065991 A1 WO 2013065991A1 KR 2012008759 W KR2012008759 W KR 2012008759W WO 2013065991 A1 WO2013065991 A1 WO 2013065991A1
Authority
WO
WIPO (PCT)
Prior art keywords
pcf
euicc
engine
rule
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2012/008759
Other languages
French (fr)
Korean (ko)
Inventor
이진형
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KT Corp
Original Assignee
KT Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from KR1020120117969A external-priority patent/KR102012340B1/en
Application filed by KT Corp filed Critical KT Corp
Publication of WO2013065991A1 publication Critical patent/WO2013065991A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the present invention provides a method for providing a policy control function (PCF: Policy Control Function, hereinafter "PCF") of the embedded UICC (eUICC), and eUICC for the same It is about.
  • PCF Policy Control Function
  • a UICC Universal Integrated Circuit Card
  • the UICC may store the personal information of the user and the operator information on the mobile communication provider to which the user subscribes.
  • the UICC may include an International Mobile Subscriber Identity (IMSI) for identifying a user.
  • IMSI International Mobile Subscriber Identity
  • the UICC is also called a Subscriber Identity Module (SIM) card in the case of the Global System for Mobile communications (GSM) scheme, and a Universal Subscriber Identity Module (USIM) card in the case of the Wideband Code Division Multiple Access (WCDMA) scheme.
  • SIM Subscriber Identity Module
  • GSM Global System for Mobile communications
  • USBMA Wideband Code Division Multiple Access
  • the user mounts the UICC on the user's terminal
  • the user is automatically authenticated using the information stored in the UICC so that the user can conveniently use the terminal.
  • the user replaces the terminal the user can easily replace the terminal by mounting the UICC removed from the existing terminal to a new terminal.
  • Terminals requiring miniaturization for example, terminals for machine-to-machine (M2M) communication, have difficulty in miniaturization of terminals when manufactured in a structure capable of detachable UICC.
  • M2M machine-to-machine
  • an eUICC structure has been proposed which is a removable UICC.
  • the eUICC should contain user information using the UICC in IMSI format.
  • the existing UICC can be attached to or detached from the terminal, and the user can open the terminal regardless of the type of terminal or the mobile communication provider.
  • the manufactured terminal can be assigned IMSI in the eUICC only when the premise that the terminal is used only for a specific mobile communication provider is satisfied.
  • Both the mobile operator and the terminal manufacturer ordering the terminal have to pay attention to the product inventory and there is a problem that the product price increases.
  • the user is inconvenient to change the mobile operator for the terminal. Therefore, even in the case of eUICC, there is a need for a method for allowing a user to open a terminal regardless of a mobile communication provider.
  • PM Profile Manager
  • SMs are mainly discussed as being responsible for information management for eUICC, information management for various mobile operators, and authentication and remote information changes for mobile operators. It has not been decided yet.
  • An object of the present invention is to define the function and structure of the Policy Control Function (PCF) of the eUICC.
  • PCF Policy Control Function
  • Another object of the present invention is to provide a method for providing a Policy Control Function (PCF) of an eUICC.
  • PCF Policy Control Function
  • Another object of the present invention is to provide a detailed structure of the Policy Control Function (PCF) of the eUICC and a method of operating the PCF through the same.
  • PCF Policy Control Function
  • the present invention is an embedded Universal Integrated Circuit Card (eUICC) for providing a policy control function (PCF), PCF Rule (PCF Rule) for containing the policy information; And an PCUI engine that performs a policy based on the PCF rule when an eUICC external entity attempts to access a PCF application target.
  • eUICC embedded Universal Integrated Circuit Card
  • PCF policy control function
  • PCF Rule PCF Rule
  • the present invention provides a method for providing a Policy Control Function (PCF) of an embedded Universal Integrated Circuit Card (eUICC), wherein the PCF engine in the eUICC accesses an eUICC resource of an external entity. If this is attempted (S600), querying the PCF rule to be applied (S602); And (S602 ⁇ S608) performing the PCF Enforcement on the basis of the PCF rule by the PCF engine.
  • PCF Policy Control Function
  • eUICC embedded Universal Integrated Circuit Card
  • Figure 1 shows the overall service architecture including the eUICC to which the present invention is applied.
  • FIG. 2 shows a system architecture of an SM separation environment to which the present invention may be applied.
  • FIG. 3 is a diagram illustrating a basic structure and operation of a PCF and an eUICC for the same according to an embodiment of the present invention.
  • FIG. 4 is a diagram illustrating an example of a PCF rule structure according to an embodiment of the present invention.
  • FIG. 5 is a diagram illustrating an example of a PCF application target according to an embodiment of the present invention.
  • FIG. 6 is a diagram illustrating an example of a PCF operation process according to a PCF providing method according to an embodiment of the present invention.
  • M2M (Machine-to-Machine) terminal which is actively discussed in the current GSMA, should be small in size.
  • a module for attaching the UICC to the M2M terminal must be separately inserted. If the M2M terminal is manufactured, it is difficult to miniaturize the M2M terminal.
  • the eUICC mounted on the M2M terminal includes information on a mobile network operator (hereinafter referred to as “MNO”) that uses the UICC. It must be stored in the UICC in the form of an identifier (International Mobile Subscriber Identity, IMSI).
  • MNO mobile network operator
  • the terminal manufactured from the time of manufacturing the M2M terminal can be assigned IMSI in the eUICC only if the premise that the terminal is used only in a specific MNO is established, both the M2M terminal or the MNO ordering the UICC or the M2M manufacturer manufacturing the M2M terminal have a lot of attention to the product inventory. There is a problem that can not only be assigned to the product price will rise, which is a big obstacle to the expansion of M2M terminal.
  • the eUICC or eSIM that is integrally mounted on the terminal has many issues regarding the authority to open, additional service business initiative, and subscriber information security due to the physical structure difference.
  • the international standardization bodies of GSMA and ETSI are conducting standardization activities on relevant elements such as carriers, manufacturers and SIM manufacturers, as well as necessary elements including top-level structures.
  • the central point of the issue is SM, called Subscription Manager, which issues and subscribes operator information (which can be used in other expressions such as Operator Credential, MNO Credential, Profile, eUICC Profile, Profile Package, etc.) to eSIM.
  • Subscription Refers to an entity or its function / role that plays an overall administrative role for eSIM, such as handling a process for a change or MNO change.
  • SM has been classified into SM-DP (Data Preparation), which plays a role in generating operator information, and SM-SR (Secure Routing), which directly carries operator information on eSIM. Proposed a scheme to transmit the data, but the details are insufficient.
  • eSIM attaches the IC chip on the terminal circuit board at the terminal manufacturing stage, and then attaches the SIM data (open information, additional service information, etc.) in software form to OTA (Over The Air) or offline (technology-based connection such as USB to PC). Is a new concept of SIM technology in the manner of issuing through.
  • IC chips used in eSIM generally support hardware-based Crypto Co-Processor (CCP) to provide hardware-based public key generation, and APIs that can be utilized in application (eg applet) based SIM platform (eg , Java Card Platform, etc.).
  • Java Card Platform Java Card Platform is one of the platforms that can provide services and load multiple applications, such as smart cards.
  • SIM requires a SIM service management platform that is responsible for loading and managing applications.
  • the SIM service management platform issues data to the SIM memory area through authentication and security with management keys.
  • the Global Platform and Remote File Management (RFM) and RAM (Remote Application Management) of ETSI TS 102.226 It is a standard technology of the service management platform.
  • eSIM is responsible for issuing communication and additional service data remotely through management keys (UICC OTA Key, GP ISD Key, etc.).
  • management keys UICC OTA Key, GP ISD Key, etc.
  • SM-DP securely builds IMSI, K, OPc, additional service applications, additional service data, etc. in addition to the operation profile (or operator information) to make a credential package.
  • SM-DP SR is responsible for securely downloading the credential package generated by SM-DP to eSIM through SIM remote management technology such as Over-The-Air (OTA) or GP Secure Communication Protocol (GP SCP).
  • OTA Over-The-Air
  • GP SCP GP Secure Communication Protocol
  • MNO1 is SM1
  • SM1 is SM4
  • SM4 forms a trust relationship with the eSIM, thereby forming a trust relationship between the MNO and eSIM.
  • a mobile network operator refers to a mobile communication operator, and refers to an entity that provides a communication service to a customer through a mobile network.
  • eUICC Supplier means a person who supplies eUICC module and embedded software (firmware and operating system, etc.).
  • Device Vendor includes a device's provider, in particular a wireless modem function via a mobile network driven by the MNO, and consequently means a supplier of a device requiring a UICC (or eUICC) form.
  • a device's provider in particular a wireless modem function via a mobile network driven by the MNO, and consequently means a supplier of a device requiring a UICC (or eUICC) form.
  • Provisioning refers to a process of loading a profile into an eUICC
  • a provisioning profile refers to a profile used by a device to connect to a communication network for the purpose of provisioning another provisioning profile and an operation profile.
  • Subscription means a commercial relationship for providing a service between a subscriber and a wireless communication service provider.
  • eUICC access credentials refer to data in the eUICC that allows secure communication between the eUICC and external entities to be set up to manage profiles on the eUICC.
  • Profile access credentials are data that resides within a profile or within an eUICC, and means data that allows secure communications to be set up between the eUICC and external entities to protect or manage the profile structure and its data. .
  • a profile is a combination of file structures, data, and applications that can be provisioned or managed within an eUICC. It is a combination of operator information, operation profiles, provisioning profiles for provisioning, and other policy control functions (PCFs). It means all information that can exist in eUICC such as profile.
  • PCFs policy control functions
  • Operation Profile or operator information refers to all kinds of profiles related to Operational Subcription.
  • An Active Profile is called an Active Profile when a file or application is selectable by the UICC-Terminal interface under the control of the PCF associated with the MNO.
  • a PCF Rule Policy Control Function Rule is a rule defined by the MNO that controls the management of provisioning or operational profiles in the eUICC. Policy Control Function Rules can be in the network, the eUICC platform, or in a provisioning or operational profile.
  • PCF Policy Control Function
  • Policy Control Function Rules can be executed in the eUICC platform and / or at the Subscription Manager level or the MNO level.
  • the Control Authority refers to an entity authorized by the MNO of update / delete / activate / deactivate remotely during the swap of an Operational or Provisioning Profile.
  • the SM Subscribescription Manager
  • the SM is a subscription management device, an entity that performs management functions of the eUICC, and is authorized by the MNO of update / delete / activate / deactivate remotely during the swap of Operational or Provisioning Profiles. This means entity.
  • Figure 1 shows the overall service architecture including the eSIM (eUICC) to which the present invention is applied.
  • eSIM eUICC
  • the eUICC system architecture to which the present invention can be applied may include a plurality of MNO systems, one or more SM systems, an eUICC manufacturer system, a device manufacturer system including an eUICC, an eUICC, and the like for each entity or subject.
  • MNO systems one or more SM systems
  • eUICC manufacturer system an eUICC manufacturer system
  • device manufacturer system including an eUICC, an eUICC, and the like for each entity or subject.
  • the dashed line in FIG. 1 shows the trust circle, and the two solid lines represent the secure link.
  • the MNO and eUICC must be able to decode the MNO Credentials information, that is, the profile (operation profile, provisioning profile, etc.).
  • the profile operation profile, provisioning profile, etc.
  • the only exception to this could be a third party authorized by a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.
  • Subscriptions cannot be switched within the eUICC outside of operator policy control.
  • the user must be aware of any changes in the MNO content and its active subscription, must be able to avoid security risks, and have a level of security that is compatible with the current UICC model.
  • the MNO credential or profile may mean a subscription credential including K, algorithm, algorithm parameters, supplementary service application, supplementary service data, and the like.
  • MNO credentials or profiles must be done in a secure manner from end to end.
  • the transmission can be made in successive steps without breaking the security chain, and all steps in the transmission chain must be made under the recognition and approval of the MNO.
  • No entity in the transport chain should be able to clearly see the MNO credential, but the only exception may be a third party authorized by a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.
  • the operator must have complete control over his credentials and the operator must have strong supervision and control over the SM operation.
  • SM functions must be provided by the MNO or a third party, if provided by the third party, there may be a commercial relationship established between the SM and the MNO.
  • the SM has no direct relationship with the MNO subscriber for subscription management.
  • the MNO has a relationship with the subscriber and should be the entry point for the customer subscription, it is not intended to piggyback on the contractual relationship an M2M service provider (the M2M service provider is an MNO subscriber) may have with its customers.
  • the donor and receiving MNOs may or may not have a prior agreement with each other. There must be a mechanism to approve pre-contracts.
  • the donor operator's policy control function can be defined for the condition of removing his / her credential, and the policy control function (PCF) can implement this function.
  • the architecture introduces a feature defined as SM, and SM's primary role is to prepare and deliver a package or profile containing the MNO credentials to the eUICC.
  • the SM function may be provided directly by the MNO, or the MNO may contract with a third party to obtain the SM service.
  • SM can be divided into two sub-functions such as SM-SR and SM-DP.
  • SM-SR and SM-DP functions may be provided by other entities or may be provided by the same entity. Therefore, it is necessary to clearly demarcate the functions of SM-DP and SM-SR, and to define an interface between these entities.
  • SM-DP is responsible for secure preparation of package or profile to be delivered to eUICC, and works with SM-SR for actual transmission.
  • the key functions of the SM-DP are 1) managing the functional characteristics and certification levels of the eUICC, and 2) one of the MNO credentials or profiles (e.g., IMSI, K, supplementary service applications, supplementary service data). Some of these are potentially managed by the MNO, and 3) the ability to calculate the OTA package for download by the SM-SR. Can be added.
  • SM-DP can have a significant amount of background processing, and the requirements for performance, scalability and reliability are expected to be important.
  • SM-SR is responsible for securely routing and delivering the credential package to the corresponding eUICC.
  • the key features of the SM-SR are 1) managing OTA communication with the eUICC via a ciphered VPN, and 2) other SM-SR to form an end-to-end up to the eUICC.
  • To manage communication with eUICC 3) to manage eUICC data used for SM-SR OTA communication provided by eUICC provider, and 4) to protect communication with eUICC by filtering only allowed entities. (Firewall function).
  • the SM-SR database is provided by eUICC vendors, device (such as M2M terminal) vendors, and potentially MNOs, and can be used by MNOs through the SM-SR mesh network.
  • the circle of trust enables end-to-end security links during provisioning profile delivery, while the SM-SR shares the trust circle for secure routing of the provisioning profile and eUICC discovery.
  • MNOs can be linked with SM-SR and SM-DP entities in a trusted circle, or they can provide this functionality themselves.
  • EUICC and MNO Credentials to prevent illegal use of eUICC (cloning, illegal use of credentials, denial of service, illegal MNO context changes, etc.) without violating MNO's contractual and legal obligations with respect to its customers. There is a need for a secure end-to-end link between.
  • 110 represents a trust circle formed between SMs, more specifically, between SM-SR members, 120 represents a trust circle of MNO partners, and 130 represents an end-to-end trust link.
  • FIG. 2 illustrates a configuration in which an SM-SR and an SM-DP are located in a system in an SM separation environment.
  • the SM is divided into an SM-DP for safely preparing various profiles (operation profile, provisioning profile, etc.) related to the eUICC, and an SM-SR for routing the SM-SR. It can be linked with the SR in a trust relationship, SM-DP is linked to the MNO system.
  • the arrangement of the SM-DP and the MNO system may be implemented differently from FIG. 2.
  • the SM-DP may be linked with the SM-SR
  • the MNO system may be linked with the SM-DP.
  • eSIM is a different SIM-based service, such as profiles are issued and managed internally by eSIM from eSIM external entities (MNOs, manufacturers, service providers, etc.), and unlike multiple SIMs, multiple profiles can be loaded simultaneously.
  • MNOs eSIM external entities
  • multiple profiles can be loaded simultaneously.
  • MNOs manufacturers, service providers, etc.
  • the entity that issues and manages the profile to the eSIM manages the security policy for the eSIM itself or the profile that is issued and managed by the eSIM.
  • PCF and Policy Control Function Policy Control Function
  • the present invention proposes a highly scalable PCF providing method in an eSIM environment.
  • the highly scalable PCF providing method in the eSIM environment proposed by the present invention will be described in more detail below.
  • eSIM is described and described as eUICC.
  • FIG. 3 is a diagram illustrating the basic structure and operation of the PCF 310 and the eUICC 300 for the same according to an embodiment of the present invention.
  • a policy control function (PCF) 310 includes a PCF rule 311 and a PCF engine 312. .
  • PCF 310 basic operation according to an embodiment of the present invention is performed as follows.
  • the eUICC external object 30 may interwork with the PCF engine 320. After applying the PCF through (S300), if the access to the PCF application object 320 is authorized based on this, the eUICC external entity 30 may access the PCF application object 320 (S302).
  • the eUICC external entity 30 described herein is an entity performing an operation on the eUICC 300, and may include one or more of a mobile network operator (MNO), a manufacturer, a service provider, a subscription manager (SM), and the like. It may also be a device equipped with the eUICC 300.
  • MNO mobile network operator
  • SM subscription manager
  • the eUICC 300 for providing the PCF is based on the PCF rule 311 and the PCF rule 311 that records the policy information, and when the eUICC external entity 30 attempts to access the PCF application target 320. PCF engine 312, etc. that perform the policy.
  • the PCF rule 311 mentioned above is a file in one or more forms of an extensible type length value (TLV) and an eXtensible Markup Language (XML) including policy information to be applied by the PCF engine 3120.
  • TLV extensible type length value
  • XML eXtensible Markup Language
  • FIG. 4 is a diagram illustrating an example of a PCF rule 311 structure according to an embodiment of the present invention.
  • the PCF rule 311 is an extensible file type, and includes a target, an action to be applied to the protected object, secret information necessary for the action, and a secret information base. You can define one or more of the security methods of.
  • the target mentioned above may be, for example, one of a file, an application, a profile, or the PCF rule itself.
  • Actions to be applied to the above-mentioned targets include, for example, Read, Write, Update, Lock, Unlock, Delete, Delete, It may include one or more of Backup and Select.
  • the above-mentioned confidential information may include, for example, a user PIN (Personal Identification Number) and various credentials defined in the eUICC environment.
  • the various credentials are, for example, eUICC Access Credential, Profile Access Credential, Profile Protection Credential, Authorized OEM Credential It may include one or more of an OEM Credential, a Service Provider Credential, an Application Access Credential, and the like.
  • the above-mentioned security method stores information about the security method utilizing the confidential information. For example, whether it is encryption, authentication, integrity, etc.
  • One or more provisionable security functions and security algorithm information applied to provide the security function may be stored.
  • the security algorithm information may include, for example, information about 3DES CBC Mode, PKCS # 1, SHA-1, and the like.
  • field (s) necessary for PCF application may be added.
  • the PCF engine 312 described above may be a software module such as an applet that performs a policy based on the PCF rule 311.
  • the PCF engine 312 when attempting to access the PCF application target 320, that is, eUICC resources of the eUICC external object 30, the authority for the operation of the eUICC external object 30 is obtained so that the eUICC external object ( 30) can be performed to perform the operation.
  • the PCF engine 312 may perform one or more security associations among encryption, authentication, and integrity verification based on the PCF rule 311. Can be.
  • the eUICC external entity 30 operates in conjunction with the PCF engine 320 when attempting to access the PCF application object 320. After obtaining the authority for, and performing the corresponding action. At this time, when the eUICC external object 30 outside the eUICC 300 attempts to access a specific file, profile, etc., the eUICC external object 30 works with the PCF engine 312 based on the PCF rule 311.
  • One or more security associations may be performed, such as encryption, authentication, and integrity verification.
  • the PCF engine 312 managing the file updates the file outside of the eUICC 300. It performs security operation (eg authentication) necessary for operation and can update the file only when it is successful.
  • security operation eg authentication
  • the PCF engine 312 managing the profile is external to the eUICC 300 and the corresponding profile. It performs a security operation based on the associated credential, and can only perform a backup operation if it succeeds.
  • the PCF application object 320 mentioned above may be, for example, a common file for various management purposes in the eUICC 300, a profile mounted in the eUICC 300, and details (eg, a file, an application, etc.) present in each profile. And the like.
  • This PCF application target 320 will be described in more detail with reference to FIG. 5.
  • FIG. 5 is a diagram illustrating an example of a PCF application target 320 according to an embodiment of the present invention.
  • the PCF may be applied to the entire eUICC 300.
  • the common files for various management purposes in the eUICC 300 eg, the eUICC identifier, profile list, currently active profile list, and profile information mounted in the eUICC 300.
  • the entire profile mounted on the eUICC 300 can be applied to the PCF.
  • the PCF may be applied to each profile mounted in the eUICC 300 or to sub-items (eg, Files, Applications, etc.) existing in each profile.
  • sub-items eg, Files, Applications, etc.
  • PCF Policy Control Function, 310
  • Policy Control Function 310
  • the PCF Policy Control Function 310 described in this specification may mean a function such as defining, updating, or deleting a policy rule for implementing a policy.
  • PCF Policy Control Function
  • Policy Control Function 310 not only means defining / update / delete function of a policy rule, but also executes a policy rule for implementing a policy. It may be a concept including a policy enforcement function (PEF), which means a function of).
  • PEF policy enforcement function
  • PCF rule 311 described in the present specification may be referred to as a policy rule meaning an operation required for implementing a policy, a condition for implementing the policy, and the like.
  • FIG. 6 is a diagram illustrating an example of a PCF operation process according to a PCF providing method according to an embodiment of the present invention.
  • the eUICC external entity 30 performs a specific action on the eUICC 300, such as an MNO, a manufacturer, a service provider, and a subscription manager (SM).
  • SM subscription manager
  • the objects that need to be is assumed that a specific PCF 310 (PCF rule 311 + PCF engine 312) is associated with each other in the eUICC resource 320 to be described instead of the term PCF application target 320.
  • the eUICC platform may be a platform such as a Java Card Platform or a Global Platform including a COS (Chip OS) in the eUICC 300, and implements functions for providing general operations and services of the eUICC 300. It is.
  • the PCUI providing method of the eUICC 300 attempts to access the eUICC resource 320 of the eUICC external entity 30 (S600).
  • the eUICC external entity 30 may not know how the PCF is set in the eUICC resource 320 to which the eUICC external entity 30 wishes to access. In this case, it may initially attempt to access the eUICC resource 320 without prior knowledge of the PCF. (Optionally, it is not recommended that a DoS attack on the eUICC 300 can be attempted.)
  • the PCF engine 312 refers to the PCF rule 311 to be applied by the PCF 310 internally as described above, and if necessary, the PCF rule 311 in real time. ).
  • step S602 the PCF engine 312 (in the case where step S600 is preceded), the PCF rule (311) excluding the credential among the PCF rules inquired and inquired the PCF rule (311) Can be delivered to the eUICC external entity 30 (arrows shown by dashed lines) to reveal and carry out future procedures.
  • the PCF engine 312 receives a PCF Enforcement request from the eUICC external entity 30 and performs a response to perform a security operation required for applying the PCF rule.
  • step (S604) calculating the PCF application result based on the PCF application request received from the eUICC external entity (30) by the PCF engine (312), and applying the PCF calculated by the PCF engine (312) And transmitting the result to the eUICC external entity 30 (S608).
  • step S604 described above the eUICC external entity 30 performs a PCF Enforcement request based on the PCF rule 311 received from the PCF rule 311 or the PCF engine 312 that it knows, and accordingly In response to the PCF application request, the PCF engine 312 performs a security operation necessary for applying the PCF rule.
  • the PCF engine 312 is based on the PCF rule application request (eg MAC (Message Authentication Code), PIN, security key, digital signature, etc.) delivered by the eUICC external entity 30 based on the result of applying the PCF rule.
  • PCF rule application request eg MAC (Message Authentication Code), PIN, security key, digital signature, etc.
  • step S608 the PCF engine 312 transmits the PCF rule application result (eg, Access Granted / Denied, Operation Permitted / Denied, etc.) to the eUICC external entity 30.
  • the PCF rule application result eg, Access Granted / Denied, Operation Permitted / Denied, etc.
  • step S608 the eUICC external entity 30 that has received the PCF rule application result may perform actions that are intended to be performed, based on the PCF rule application result of the PCF engine 311.
  • PCF Policy Control Function
  • the present invention may provide a method for providing a policy control function of the eUICC 300 according to a defined function and structure.
  • the present invention can provide a detailed structure of the policy control function of the eUICC (300) and a PCF operation method through the same.
  • Extensive PCF rule provision method provides flexibility in responding to necessary actions, targets, and confidential information as the eUICC (eSIM) environment changes in the future. It may provide a basic structure of the PCF rule 311 does not exist.
  • eUICC resources (eSIM resources) 320 such as files, profiles, and PCF rules to which PCF rules are applied may be safely managed and utilized.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method for providing a policy control function (PCF), and more specifically, to a method for providing a PCF and an eUICC for same which define the function and structure for the PCF of an eUICC, and, with regard to same, which define the detailed structure of the PCF of the eUICC.

Description

정책 제어 기능 제공 방법 및 eUICCHow to provide policy control and eUICC

본 발명은 내장 UICC(eUICC: Embedded Universal Integrated Circuit Card, 이하, "eUICC"라 함)의 정책 제어 기능(PCF: Policy Control Function, 이하, "PCF"라 함)을 제공하는 방법과 이를 위한 eUICC에 관한 것이다.The present invention provides a method for providing a policy control function (PCF: Policy Control Function, hereinafter "PCF") of the embedded UICC (eUICC), and eUICC for the same It is about.

UICC(Universal Integrated Circuit Card)는 단말기 내에 삽입되어 사용자 인증을 위한 모듈로서 사용될 수 있는 스마트 카드이다. UICC는 사용자의 개인 정보 및 사용자가 가입한 이동 통신 사업자에 대한 사업자 정보를 저장할 수 있다. 예를 들면, UICC는 사용자를 식별하기 위한 IMSI(International Mobile Subscriber Identity)를 포함할 수 있다. UICC는 GSM(Global System for Mobile communications) 방식의 경우 SIM(Subscriber Identity Module) 카드, WCDMA(Wideband Code Division Multiple Access) 방식의 경우 USIM(Universal Subscriber Identity Module) 카드로 불리기도 한다. A UICC (Universal Integrated Circuit Card) is a smart card that can be inserted into a terminal and used as a module for user authentication. The UICC may store the personal information of the user and the operator information on the mobile communication provider to which the user subscribes. For example, the UICC may include an International Mobile Subscriber Identity (IMSI) for identifying a user. The UICC is also called a Subscriber Identity Module (SIM) card in the case of the Global System for Mobile communications (GSM) scheme, and a Universal Subscriber Identity Module (USIM) card in the case of the Wideband Code Division Multiple Access (WCDMA) scheme.

사용자가 UICC를 사용자의 단말에 장착하면, UICC에 저장된 정보들을 이용하여 자동으로 사용자 인증이 이루어져 사용자가 편리하게 단말을 사용할 수 있다. 또한, 사용자가 단말을 교체할 때, 사용자는 기존의 단말에서 탈거한 UICC를 새로운 단말에 장착하여 용이하게 단말을 교체할 수 있다.When the user mounts the UICC on the user's terminal, the user is automatically authenticated using the information stored in the UICC so that the user can conveniently use the terminal. In addition, when the user replaces the terminal, the user can easily replace the terminal by mounting the UICC removed from the existing terminal to a new terminal.

소형화가 요구되는 단말, 예를 들면 기계 대 기계(Machine to Machine, M2M) 통신을 위한 단말은 UICC를 착탈할 수 있는 구조로 제조할 경우 단말의 소형화가 어려워진다. 그리하여, 착탈할 수 없는 UICC인 eUICC 구조가 제안되었다. eUICC는 해당 UICC를 사용하는 사용자 정보가 IMSI 형태로 수록되어야 한다. Terminals requiring miniaturization, for example, terminals for machine-to-machine (M2M) communication, have difficulty in miniaturization of terminals when manufactured in a structure capable of detachable UICC. Thus, an eUICC structure has been proposed which is a removable UICC. The eUICC should contain user information using the UICC in IMSI format.

기존의 UICC는 단말에 착탈이 가능하여, 단말의 종류나 이동 통신 사업자에 구애받지 않고 사용자는 단말을 개통할 수 있다. 그러나, 단말을 제조할 때부터 제조된 단말은 특정 이동 통신 사업자에 대해서만 사용된다는 전제가 성립되어야 eUICC 내의 IMSI를 할당할 수 있다. 단말을 발주하는 이동 통신 사업자 및 단말 제조사는 모두 제품 재고에 신경을 쓸 수밖에 없고 제품 가격이 상승하는 문제가 발생하게 된다. 사용자는 단말에 대해 이동 통신 사업자를 바꿀 수 없는 불편이 있다. 그러므로, eUICC의 경우에도 이동 통신 사업자에 구애받지 않고 사용자가 단말을 개통할 수 있는 방법이 요구된다.The existing UICC can be attached to or detached from the terminal, and the user can open the terminal regardless of the type of terminal or the mobile communication provider. However, from the manufacture of the terminal, the manufactured terminal can be assigned IMSI in the eUICC only when the premise that the terminal is used only for a specific mobile communication provider is satisfied. Both the mobile operator and the terminal manufacturer ordering the terminal have to pay attention to the product inventory and there is a problem that the product price increases. The user is inconvenient to change the mobile operator for the terminal. Therefore, even in the case of eUICC, there is a need for a method for allowing a user to open a terminal regardless of a mobile communication provider.

한편, 최근 eUICC의 도입으로 인하여 여러 이통통신 사업자의 가입자 정보를 원격에서 UICC로 업데이트 할 필요가 생기게 되었고, 그에 따라 가입자 정보 관리를 위한 가입 관리 장치(Subscription Manager; 이하 "SM"이라 함) 또는 프로파일 관리장치(Profile Manager; 이하 "PM"이라 함)가 논의되고 있다.Meanwhile, the recent introduction of eUICC has made it necessary to update subscriber information of various mobile communication providers to UICC remotely. Accordingly, a subscription management device (subscription manager) or profile for managing subscriber information is therefore required. A Profile Manager (hereinafter referred to as "PM") is under discussion.

이러한 SM은 주로 eUICC에 대한 정보 관리와, 여러 이동 통신 사업자에 대한 정보 관리와, 이동통신 사업자 변경시 그에 대한 인증 및 원격 정보 변경 등의 기능을 담당하는 것으로 논의되고 있으나, 정확한 기능이나 역할에 대해서는 아직 결정된 바가 없는 실정이다.These SMs are mainly discussed as being responsible for information management for eUICC, information management for various mobile operators, and authentication and remote information changes for mobile operators. It has not been decided yet.

또한, eUICC를 둘러싼 여러 개체 또는 엔티티(Entity)의 eUICC 관련 정책을 정의하기 위하여 PCF가 논의되고 있으나, 그 기능이나 구조 등에 대해서 정해진 바가 없는 실정이다. 따라서, eUICC에 대한 정보 관리, 여러 이동 통신 사업자에 대한 정보 관리, 이동통신 사업자 변경시 그에 대한 인증 및 원격 정보 변경 등의 기능과 관련된 eUICC 관련 정책(Policy)이 제대로 이루어지지 못하는 문제점이 있다. In addition, although the PCF has been discussed to define eUICC related policies of various entities or entities surrounding the eUICC, the function or structure thereof has not been determined. Therefore, there is a problem that an eUICC related policy related to functions such as information management for eUICC, information management for various mobile communication providers, authentication and remote information change when changing the mobile communication service provider is not properly performed.

본 발명의 목적은, eUICC의 정책 제어 기능(PCF: Policy Control Function)에 대한 기능 및 구조를 정의하는 데 있다. An object of the present invention is to define the function and structure of the Policy Control Function (PCF) of the eUICC.

본 발명의 다른 목적은, eUICC의 정책 제어 기능(PCF: Policy Control Function)을 제공하는 방법을 제공하는 데 있다.Another object of the present invention is to provide a method for providing a Policy Control Function (PCF) of an eUICC.

본 발명의 또 다른 목적은, eUICC의 정책 제어 기능(PCF: Policy Control Function)의 세부 구조 및 그를 통한 PCF 동작 방법을 제공하는 데 있다. Another object of the present invention is to provide a detailed structure of the Policy Control Function (PCF) of the eUICC and a method of operating the PCF through the same.

일 측면에서, 본 발명은, 정책 제어 기능(PCF: Policy Control Function)을 제공하기 위한 내장 UICC(eUICC: embedded Universal Integrated Circuit Card)로서, 정책 정보를 수록하는 PCF 규칙(PCF Rule); 및 eUICC 외부 개체의 PCF 적용 대상에 대한 접근 시도 시, 상기 PCF 규칙을 기반으로 정책을 수행하는 PCF 엔진을 포함하는 eUICC를 제공한다. In one aspect, the present invention is an embedded Universal Integrated Circuit Card (eUICC) for providing a policy control function (PCF), PCF Rule (PCF Rule) for containing the policy information; And an PCUI engine that performs a policy based on the PCF rule when an eUICC external entity attempts to access a PCF application target.

다른 측면에서, 본 발명은, 내장 UICC(eUICC: embedded Universal Integrated Circuit Card)의 정책 제어 기능(PCF: Policy Control Function) 제공 방법으로서, 상기 eUICC 내 PCF 엔진이, eUICC 외부 개체의 eUICC 자원에 대한 접근이 시도되면(S600), 적용해야 할 PCF 규칙을 조회하는 단계(S602); 및 상기 PCF 엔진이 상기 PCF 규칙을 토대로 PCF 적용(Enforcement)을 수행하는 단계(S602~S608)를 포함하는 eUICC의 정책 제어 기능 제공 방법을 제공한다. In another aspect, the present invention provides a method for providing a Policy Control Function (PCF) of an embedded Universal Integrated Circuit Card (eUICC), wherein the PCF engine in the eUICC accesses an eUICC resource of an external entity. If this is attempted (S600), querying the PCF rule to be applied (S602); And (S602 ˜ S608) performing the PCF Enforcement on the basis of the PCF rule by the PCF engine.

도 1은 본 발명이 적용되는 eUICC를 포함한 전체 서비스 아키텍처를 도시한다. Figure 1 shows the overall service architecture including the eUICC to which the present invention is applied.

도 2는 본 발명이 적용될 수 있는 SM 분리 환경의 시스템 아키텍처를 도시한다.2 shows a system architecture of an SM separation environment to which the present invention may be applied.

도 3은 본 발명의 일 실시예에 의한 PCF 기본 구조 및 동작과 이를 위한 eUICC를 나타낸 도면이다. 3 is a diagram illustrating a basic structure and operation of a PCF and an eUICC for the same according to an embodiment of the present invention.

도 4는 본 발명의 일 실시예에 의한 PCF 규칙(PCF Rule) 구조의 일 예를 나타낸 도면이다.4 is a diagram illustrating an example of a PCF rule structure according to an embodiment of the present invention.

도 5는 본 발명의 일 실시예에 의한 PCF 적용 대상의 일 예를 나타낸 도면이다.5 is a diagram illustrating an example of a PCF application target according to an embodiment of the present invention.

도 6은 본 발명의 일 실시예에 의한 PCF 제공 방법에 따른 PCF 동작 프로세스의 일 예를 나타낸 도면이다. 6 is a diagram illustrating an example of a PCF operation process according to a PCF providing method according to an embodiment of the present invention.

이하, 본 발명의 일부 실시예들을 예시적인 도면을 통해 상세하게 설명한다. 각 도면의 구성요소들에 참조부호를 부가함에 있어서, 동일한 구성요소들에 대해서는 비록 다른 도면상에 표시되더라도 가능한 한 동일한 부호를 가지도록 하고 있음에 유의해야 한다. 또한, 본 발명을 설명함에 있어, 관련된 공지 구성 또는 기능에 대한 구체적인 설명이 본 발명의 요지를 흐릴 수 있다고 판단되는 경우에는 그 상세한 설명은 생략한다.Hereinafter, some embodiments of the present invention will be described in detail through exemplary drawings. In adding reference numerals to the components of each drawing, it should be noted that the same reference numerals are assigned to the same components as much as possible even though they are shown in different drawings. In addition, in describing the present invention, when it is determined that the detailed description of the related well-known configuration or function may obscure the gist of the present invention, the detailed description thereof will be omitted.

현재 GSMA에서 활발하게 논의되는 M2M(Machine-to-Machine) 단말은 특성상 크기가 작아야 하는데, 기존 UICC를 사용하는 경우에는, M2M 단말에 UICC를 장착하는 모듈을 별도 삽입해야 하므로, UICC를 탈착가능한 구조로 M2M단말을 제조하게 되면, M2M 단말의 소형화가 힘들게 된다.M2M (Machine-to-Machine) terminal, which is actively discussed in the current GSMA, should be small in size. In the case of using the existing UICC, a module for attaching the UICC to the M2M terminal must be separately inserted. If the M2M terminal is manufactured, it is difficult to miniaturize the M2M terminal.

따라서, UICC 착탈이 불가능한 내장(Embedded) UICC 구조가 논의되고 있는데, 이때 M2M 단말에 장착되는 eUICC에는 해당 UICC를 사용하는 이동통신 사업자(Mobile Network Operator; 이하 "MNO"라 함)정보가 국제 모바일 가입자 식별자(International Mobile Subscriber Identity, IMSI) 형태로 UICC에 저장되어 있어야 한다.Therefore, an embedded UICC structure that is not detachable from the UICC is being discussed. In this case, the eUICC mounted on the M2M terminal includes information on a mobile network operator (hereinafter referred to as “MNO”) that uses the UICC. It must be stored in the UICC in the form of an identifier (International Mobile Subscriber Identity, IMSI).

그러나, M2M 단말을 제조할 때부터 제조된 단말은 특정 MNO에서만 사용한다는 전제가 성립되어야 eUICC내의 IMSI를 할당할 수 있으므로, M2M 단말 또는 UICC를 발주하는 MNO나 제조하는 M2M 제조사 모두 제품 재고에 많은 신경을 할당할 수 밖에 없고 제품 가격이 상승하게 되는 문제가 있어, M2M 단말 확대에 큰 걸림돌이 되고 있는 상황이다.However, since the terminal manufactured from the time of manufacturing the M2M terminal can be assigned IMSI in the eUICC only if the premise that the terminal is used only in a specific MNO is established, both the M2M terminal or the MNO ordering the UICC or the M2M manufacturer manufacturing the M2M terminal have a lot of attention to the product inventory. There is a problem that can not only be assigned to the product price will rise, which is a big obstacle to the expansion of M2M terminal.

이와 같이, 기존의 착탈식 형태의 SIM과는 달리 단말에 일체형으로 탑재되는 eUICC 또는 eSIM은 그 물리적 구조 차이로 인해 개통 권한, 부가 서비스 사업 주도권, 가입자 정보 보안 등에 대한 많은 이슈들이 존재한다. 이를 위해 GSMA 및 ETSI의 국제 표준화 기관에서는 사업자, 제조사, SIM 제조사 등의 유관 회사들과 최상위 구조를 포함한 필요한 요소에 대해 표준화 활동을 전개하고 있다. eSIM이 표준화 단체들을 통해 논의되면서 이슈의 중심에 있는 것은 Subscription Manager라고 불리는 SM으로 사업자 정보 (Operator Credential, MNO Credential, Profile, eUICC Profile, Profile Package 등 다른 표현으로 사용될 수 있음)를 eSIM에 발급하고 가입(Subscription) 변경 또는 MNO 변경에 대한 프로세스를 처리하는 등 eSIM에 대한 전반적인 관리 역할을 수행하는 개체 또는 그 기능/역할을 의미한다. As such, unlike the conventional removable type SIM, the eUICC or eSIM that is integrally mounted on the terminal has many issues regarding the authority to open, additional service business initiative, and subscriber information security due to the physical structure difference. To this end, the international standardization bodies of GSMA and ETSI are conducting standardization activities on relevant elements such as carriers, manufacturers and SIM manufacturers, as well as necessary elements including top-level structures. As eSIM is discussed through standardization organizations, the central point of the issue is SM, called Subscription Manager, which issues and subscribes operator information (which can be used in other expressions such as Operator Credential, MNO Credential, Profile, eUICC Profile, Profile Package, etc.) to eSIM. (Subscription) Refers to an entity or its function / role that plays an overall administrative role for eSIM, such as handling a process for a change or MNO change.

최근 GSMA에서는 SM의 역할을 사업자 정보를 생성하는 역할을 수행하는 SM-DP (Data Preparation)과 eSIM에 사업자 정보의 직접적 운반을 수행하는 SM-SR (Secure Routing)로 분류한 구조와, 프로파일을 암호화하여 전송하는 방안을 제안하였으나 세부적인 내용이 부족하다.Recently, in GSMA, SM has been classified into SM-DP (Data Preparation), which plays a role in generating operator information, and SM-SR (Secure Routing), which directly carries operator information on eSIM. Proposed a scheme to transmit the data, but the details are insufficient.

본 명세서에서는 eSIM과 eUICC를 동등한 개념으로 사용한다.In this specification, eSIM and eUICC are used as equivalent concepts.

eSIM은 단말 제조 단계에서 IC칩을 단말 회로판 상에 부착시킨 후, 소프트웨어 형태의 SIM 데이터 (개통 정보, 부가 서비스 정보 등)를 OTA (Over The Air) 또는 오프라인 (PC와의 USB 등의 기술 기반 연결)을 통해 발급하는 방식의 새로운 개념의 SIM 기술이다. eSIM에서 사용되는 IC칩은 일반적으로 하드웨어 기반의 CCP (Crypto Co-Processor)를 지원하여 하드웨어 기반의 공개키 생성을 제공하며, 이를 어플리케이션 (예, 애플릿) 기반에서 활용할 수 있는 API를 SIM 플랫폼 (예, Java Card Platform 등)에서 제공한다. 자바 카드 플랫폼(Java Card Platform)은 스마트카드 등에서 멀티 어플리케이션을 탑재하고 서비스를 제공할 수 있는 플랫폼 중 하나이다.eSIM attaches the IC chip on the terminal circuit board at the terminal manufacturing stage, and then attaches the SIM data (open information, additional service information, etc.) in software form to OTA (Over The Air) or offline (technology-based connection such as USB to PC). Is a new concept of SIM technology in the manner of issuing through. IC chips used in eSIM generally support hardware-based Crypto Co-Processor (CCP) to provide hardware-based public key generation, and APIs that can be utilized in application (eg applet) based SIM platform (eg , Java Card Platform, etc.). Java Card Platform (Java Card Platform) is one of the platforms that can provide services and load multiple applications, such as smart cards.

SIM은 제한된 메모리 공간과 보안상의 이유로 누구나 SIM 내에 어플리케이션을 탑재해서는 안 되며, 이로 인해 어플리케이션 탑재를 위한 플랫폼 이외에 SIM을 어플리케이션 탑재 및 관리를 담당하는 SIM 서비스 관리 플랫폼을 필요로 한다. SIM 서비스 관리 플랫폼은 관리키를 통한 인증 및 보안을 통해 SIM 메모리 영역에 데이터를 발급하며, 글로벌 플랫폼(GlobalPlatform)과 ETSI TS 102.226의 RFM (Remote File Management) 및 RAM (Remote Application Management)은 이와 같은 SIM 서비스 관리 플랫폼의 표준 기술이다. Because of limited memory space and security, anyone should not load applications in SIM. Therefore, SIM requires a SIM service management platform that is responsible for loading and managing applications. The SIM service management platform issues data to the SIM memory area through authentication and security with management keys.The Global Platform and Remote File Management (RFM) and RAM (Remote Application Management) of ETSI TS 102.226 It is a standard technology of the service management platform.

eSIM 환경에서 중요한 요소 중의 하나인 SM은 eSIM은 원격으로 관리키(UICC OTA Key, GP ISD Key 등)를 통해 통신 및 부가 서비스 데이터를 발급하는 역할을 수행한다. SM, one of the important elements in the eSIM environment, eSIM is responsible for issuing communication and additional service data remotely through management keys (UICC OTA Key, GP ISD Key, etc.).

GSMA에서는 SM의 역할을 SM-DP와 SM-SR로 분류하였다. SM-DP는 오퍼레이션 프로파일(또는 사업자 정보) 이외에 IMSI, K, OPc, 부가 서비스 어플리케이션, 부가 서비스 데이터 등을 안전하게 빌드(Build)하여 크레덴셜 패키지(Credential Package) 형태로 만드는 역할을 수행하며, SM-SR은 SM-DP가 생성한 크레덴셜 패키지를 OTA(Over-The-Air) 또는 GP SCP (Secure Communication Protocol)과 같은 SIM 원격 관리 기술을 통해 eSIM에 안전하게 다운로드하는 역할을 수행한다. In the GSMA, the roles of SM are classified into SM-DP and SM-SR. SM-DP securely builds IMSI, K, OPc, additional service applications, additional service data, etc. in addition to the operation profile (or operator information) to make a credential package. SM-DP SR is responsible for securely downloading the credential package generated by SM-DP to eSIM through SIM remote management technology such as Over-The-Air (OTA) or GP Secure Communication Protocol (GP SCP).

그리고 아래 도 1의 신뢰 서클(Circle of Trust)”이라는 구조를 제안하여 각 유사 개체 또는 엔터티 들간에 신뢰 관계의 중첩을 통해 MNO와 eSIM 간의 엔드-투-엔드(End-to-End) 신뢰 관계를 구축한다는 개념을 제안하였다. 즉, MNO1는 SM1과, SM1은 SM4, SM4는 eSIM과 신뢰관계를 형성하여, 이를 통해 MNO와 eSIM 간의 신뢰관계를 형성한다는 개념이다. In addition, we propose a structure called “Circle of Trust” in FIG. 1 below to establish an end-to-end trust relationship between an MNO and an eSIM by overlapping trust relationships between similar entities or entities. We proposed the concept of building. In other words, MNO1 is SM1, SM1 is SM4, SM4 forms a trust relationship with the eSIM, thereby forming a trust relationship between the MNO and eSIM.

본 발명을 설명하기 전에 우선 본 명세서에서 사용할 용어에 대하여 설명한다.Before describing the present invention, terms first used in the present specification will be described.

MNO(Mobile Network Operator)는 이동통신 사업자를 의미하며, 모바일 네트워크를 통해 고객에게 통신 서비스를 제공하는 엔터티를 의미한다.A mobile network operator (MNO) refers to a mobile communication operator, and refers to an entity that provides a communication service to a customer through a mobile network.

eUICC 공급자(eUICC Supplier)는 eUICC 모듈과 내장 소프트웨어(펌웨어와 오퍼레이팅 시스템 등)를 공급하는 자를 의미한다.eUICC Supplier means a person who supplies eUICC module and embedded software (firmware and operating system, etc.).

장치 공급자(Device Vendor)는 장치의 공급자, 특히 MNO에 의해서 구동되는 모바일 네트워크를 통한 무선 모뎀 기능을 포함하며, 따라서 결과적으로 UICC(또는 eUICC) 형태가 필요한 장치의 공급자를 의미한다.Device Vendor includes a device's provider, in particular a wireless modem function via a mobile network driven by the MNO, and consequently means a supplier of a device requiring a UICC (or eUICC) form.

프로비저닝(Provisioning)은 eUICC 내부로 프로파일을 로딩하는 과정을 의미하며, 프로비저닝 프로파일은 다른 프로비저닝 프로파일 및 오퍼레이션 프로파일을 프로비저닝할 목적으로 장치가 통신 네트워크에 접속하는데 사용되는 프로파일을 의미한다.Provisioning refers to a process of loading a profile into an eUICC, and a provisioning profile refers to a profile used by a device to connect to a communication network for the purpose of provisioning another provisioning profile and an operation profile.

가입(Subscription)은 가입자와 무선통신 서비스 제공자 사이의 서비스 제공을 위한 상업적인 관계를 의미한다.Subscription means a commercial relationship for providing a service between a subscriber and a wireless communication service provider.

eUICC 접근 크레덴셜(eUICC access credentials)은 eUICC 상의 프로파일을 관리하기 위하여 eUICC 및 외부 엔터티 사이에 보안 통신이 셋업 될 수 있도록 하는 eUICC 내의 데이터를 의미한다.eUICC access credentials refer to data in the eUICC that allows secure communication between the eUICC and external entities to be set up to manage profiles on the eUICC.

프로파일 엑세스 크레덴셜(Profile access credentials)은 프로파일 내부 또는 eUICC 내부에 존재하는 데이터로서, 프로파일 구조 및 그 데이터를 보호 또는 관리하기 위하여 eUICC 및 외부 엔터티 사이에 보안 통신이 셋업 될 수 있도록 하는 데이터를 의미한다.Profile access credentials are data that resides within a profile or within an eUICC, and means data that allows secure communications to be set up between the eUICC and external entities to protect or manage the profile structure and its data. .

프로파일(Profile)은 eUICC로 프로비저닝 되거나 eUICC 내에서 관리될 수 있는 파일 구조, 데이터 및 애플리케이션의 조합으로서, 사업자 정보인 오퍼레이션 프로파일, 프로비저닝을 위한 프로비저닝 프로파일, 기타 정책 제어 기능(PCF; Policy Control Function)을 위한 프로파일 등 eUICC 내에 존재할 수 있는 모든 정보를 의미한다.A profile is a combination of file structures, data, and applications that can be provisioned or managed within an eUICC. It is a combination of operator information, operation profiles, provisioning profiles for provisioning, and other policy control functions (PCFs). It means all information that can exist in eUICC such as profile.

오퍼레이션 프로파일(Operation Profile) 또는 사업자 정보는 사업자 가입(Operational Subcription)과 관련된 모든 종류의 프로파일을 의미한다.Operation Profile or operator information refers to all kinds of profiles related to Operational Subcription.

활성화 프로파일(Active Profile)은 파일 혹은 애플리케이션이 MNO와 연관된 PCF의 통제 하에 UICC-Terminal interface에 의해 선택 가능 할 때 액티브 프로파일이라고 부른다.An Active Profile is called an Active Profile when a file or application is selectable by the UICC-Terminal interface under the control of the PCF associated with the MNO.

PCF Rule (Policy Control Function Rule)은 eUICC안의 Provisioning 혹은 Operational profile의 관리를 control하는 MNO에 의해 정의된 rule이다. Policy Control Function Rules은 network, eUICC platform , 혹은 Provisioning 혹은 Operational profile안에 존재 할 수 있다.A PCF Rule (Policy Control Function Rule) is a rule defined by the MNO that controls the management of provisioning or operational profiles in the eUICC. Policy Control Function Rules can be in the network, the eUICC platform, or in a provisioning or operational profile.

PCF (Policy Control Function)는 Policy Control Function Rules 강제할 수 있는 application/service를 말한다. Policy Control Function Rules은 eUICC platform안에 혹은/그리고 Subscription Manager 레벨 혹은 MNO 레벨에서 수행 될 수 있다.PCF (Policy Control Function) refers to application / service that can enforce Policy Control Function Rules. Policy Control Function Rules can be executed in the eUICC platform and / or at the Subscription Manager level or the MNO level.

CA (Controlling Authority)는 Operational or Provisioning Profile의 Swap하는 과정에서 원격에서 update/delete/activate/deactivate의 MNO에 의 신뢰(trust)에 의해 권한이 있는 entity를 의미한다.The Control Authority (CA) refers to an entity authorized by the MNO of update / delete / activate / deactivate remotely during the swap of an Operational or Provisioning Profile.

SM(Subscription manager)는 가입 관리 장치로서, eUICC의 관리 기능을 수행하는 엔터티로서, Operational or Provisioning Profile의 Swap하는 과정에서 원격에서 update/delete/activate/deactivate의 MNO에 의 신뢰(trust)에 의해 권한이 있는 entity를 의미한다.The SM (Subscription Manager) is a subscription management device, an entity that performs management functions of the eUICC, and is authorized by the MNO of update / delete / activate / deactivate remotely during the swap of Operational or Provisioning Profiles. This means entity.

도 1은 본 발명이 적용되는 eSIM(eUICC)을 포함한 전체 서비스 아키텍처를 도시한다.Figure 1 shows the overall service architecture including the eSIM (eUICC) to which the present invention is applied.

전체 시스템에 대해서 설명하면 다음과 같다.The overall system is described as follows.

본 발명이 적용될 수 있는 eUICC 시스템 아키텍처는 다수의 MNO 시스템과, 1 이상의 SM 시스템, eUICC 제조사 시스템, eUICC를 포함하는 장치(Device) 제조사 시스템 및 eUICC 등을 포함할 수 있으며, 각 엔터티 또는 주체에 대한 설명은 다음과 같다.The eUICC system architecture to which the present invention can be applied may include a plurality of MNO systems, one or more SM systems, an eUICC manufacturer system, a device manufacturer system including an eUICC, an eUICC, and the like for each entity or subject. The explanation is as follows.

도 1에서 점선은 신뢰 서클을 도시하고, 2개 실선은 안전한 링크를 의미한다.The dashed line in FIG. 1 shows the trust circle, and the two solid lines represent the secure link.

가입정보가 저장되어 전달되는 시나리오가 필요하면, MNO의 승인과 MNO의 컨트롤 하에서 이루어져야 한다. 특정 시각에 단일의 eUICC 상에는 1개만의 액티브 프로파일이 있어야 하며, 이때 액티브 프로파일은 특정 시간에 단일 HLR에 부가되는 것을 의미한다. If a scenario is required where subscription information is stored and communicated, it should be done under the approval of the MNO and under the control of the MNO. There must be only one active profile on a single eUICC at a particular time, meaning that the active profile is added to a single HLR at a specific time.

MNO와 eUICC는 MNO 크레덴셜(Credentials) 정보, 즉 프로파일(오퍼레이션 프로파일, 프로비저닝 프로파일 등)를 복호할 수 있어야 한다. 이에 대한 유일한 예외는 예를 들면 SIM 벤더와 같이 특정 MNO으로부터 위임받은 제3 기관이 될 수 있다. 하지만, 이를 수행하기 위한 제3 기관의 일반적인 기능은 아니다.The MNO and eUICC must be able to decode the MNO Credentials information, that is, the profile (operation profile, provisioning profile, etc.). The only exception to this could be a third party authorized by a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.

가입(Subscription)은 오퍼레이터 정책 제어의 외부에서는 eUICC 내에서 스위칭될 수 없다. 사용자는 MNO 컨텐스트와 그의 활성화 가입의 어떠한 변경도 알고 있어야 하며, 시큐리티 위험을 피할 수 있어야 하고, 현재의 UICC 모델과 대적할 수 있을 정도의 시큐리티 레벨이 필요하다.Subscriptions cannot be switched within the eUICC outside of operator policy control. The user must be aware of any changes in the MNO content and its active subscription, must be able to avoid security risks, and have a level of security that is compatible with the current UICC model.

MNO 크레덴셜 또는 프로파일은 K, 알고리즘, 알고리즘 파라미터, 부가 서비스 어플리케이션, 부가 서비스 데이터 등을 포함하는 가입 크레덴셜을 의미할 수 있다.The MNO credential or profile may mean a subscription credential including K, algorithm, algorithm parameters, supplementary service application, supplementary service data, and the like.

MNO 크레덴셜 또는 프로파일의 전달은 종단에서 종단까지 안전한 방식으로 이루어져야 한다. 전송은 시큐리티 체인을 깨지 않는 연속적인 단계로 이루어질 수 있으며, 전송 체인의 모든 단계는 MNO의 인식 및 승인 하에서 이루어져야 한다. 전송 체인 내의 어떠한 엔터티도 MNO 크레덴셜을 명확하게 볼 수 없어야 하지만, 유일한 예외는 예를 들면 SIM 벤더와 같이 특정 MNO으로부터 위임받은 제3 기관이 될 수 있다. 하지만, 이를 수행하기 위한 제3 기관의 일반적인 기능은 아니다.The transfer of MNO credentials or profiles must be done in a secure manner from end to end. The transmission can be made in successive steps without breaking the security chain, and all steps in the transmission chain must be made under the recognition and approval of the MNO. No entity in the transport chain should be able to clearly see the MNO credential, but the only exception may be a third party authorized by a particular MNO, for example a SIM vendor. However, it is not a general function of a third party to do this.

오퍼레이터는 자신의 크레덴셜에 대해서 완전한 제어권을 가져야 하며, 오퍼레이터는 SM 오퍼레이션에 대해서 강한 감독권과 제어권한을 가져야 한다.The operator must have complete control over his credentials and the operator must have strong supervision and control over the SM operation.

SM 기능은 MNO 또는 제3 기관에 의하여 제공되어야 하며, 만약 제3 기관에 의하여 제공된다면 SM과 MNO 사이에는 상업적인 관계가 설정되어 있는 경우 등일 것이다.SM functions must be provided by the MNO or a third party, if provided by the third party, there may be a commercial relationship established between the SM and the MNO.

SM은 가입 관리를 위해서 MNO 가입자와 어떠한 직접적인 관련도 없다. MNO가 가입자와 관계를 가지며 고객 가입을 위한 진입 포인트가 되어야 하지만, 이는 M2M 서비스 제공자(M2M 서비스 제공자는 MNO 가입자 임)가 자신의 고객과 가질 수 있는 계약 관계에 편승할 의도는 아니다.The SM has no direct relationship with the MNO subscriber for subscription management. Although the MNO has a relationship with the subscriber and should be the entry point for the customer subscription, it is not intended to piggyback on the contractual relationship an M2M service provider (the M2M service provider is an MNO subscriber) may have with its customers.

MNO가 스왑(swap)되는 동안, 도너(Donor) 및 리시빙 MNO는 서로 사전 계약이 있을 수도 있고 없을 수도 있다. 사전 계약을 승인할 수 있는 메커니즘이 있어야 한다. 도너 오퍼레이터의 정책 제어(Policy Control) 기능은 자신의 크레덴셜의 제거 조건에 대하여 정의할 수 있으며, 정책 제어 기능(Policy Control Function; PCF)이 이러한 기능을 구현할 수 있다.While the MNOs are swapped, the donor and receiving MNOs may or may not have a prior agreement with each other. There must be a mechanism to approve pre-contracts. The donor operator's policy control function can be defined for the condition of removing his / her credential, and the policy control function (PCF) can implement this function.

아키텍처는 SM이라고 정의되는 기능을 도입하며, SM의 주요한 역할은 MNO 크레덴셜을 포함하는 패키지 또는 프로파일을 준비해서 eUICC로 전달하는 것이다. SM 기능은 MNO에 의하여 직접적으로 제공될 수도 있고, MNO가 SM 서비스를 획득하기 위하여 제3 기관과 계약할 수도 있을 것이다.The architecture introduces a feature defined as SM, and SM's primary role is to prepare and deliver a package or profile containing the MNO credentials to the eUICC. The SM function may be provided directly by the MNO, or the MNO may contract with a third party to obtain the SM service.

SM의 역할은 SM-SR, SM-DP와 같은 2개의 서브 기능으로 나뉘어 질 수 있다.The role of SM can be divided into two sub-functions such as SM-SR and SM-DP.

실제로, 이러한 SM-SR, SM-DP 기능들은 다른 엔터티에 의하여 제공될 수도 있고, 동일한 엔터티에 의해서 제공될 수도 있다. 따라서, SM-DP와 SM-SR의 기능을 명확하게 경계지을 필요가 있고, 이들 엔터티들 사이의 인터페이스를 정의할 필요가 있다.Indeed, such SM-SR and SM-DP functions may be provided by other entities or may be provided by the same entity. Therefore, it is necessary to clearly demarcate the functions of SM-DP and SM-SR, and to define an interface between these entities.

SM-DP는 eUICC로 전달될 패키지 또는 프로파일의 안전한 준비를 담당하며, 실제 전송을 위하여 SM-SR과 함께 동작한다. SM-DP의 핵심 기능은 1) eUICC의 기능적 특성 및 인증 레벨(Certification Level)을 관리하는 것과, 2) MNO 크레덴셜 또는 프로파일(예를 들면, IMSI, K, 부가 서비스 어플리케이션, 부가 서비스 데이터 중 하나 이상이며, 이들 중 일부는 잠재적으로 MNO에 의하여 암호화(Enciphered)되어 있을 수 있음)을 관리하는 것과, 3) SM-SR에 의한 다운로드를 위하여 OTA 패키지를 계산하는 기능 등이며, 추후 부가적인 기능이 추가될 수 있을 것이다.SM-DP is responsible for secure preparation of package or profile to be delivered to eUICC, and works with SM-SR for actual transmission. The key functions of the SM-DP are 1) managing the functional characteristics and certification levels of the eUICC, and 2) one of the MNO credentials or profiles (e.g., IMSI, K, supplementary service applications, supplementary service data). Some of these are potentially managed by the MNO, and 3) the ability to calculate the OTA package for download by the SM-SR. Could be added.

만일, SM-DP 기능이 제3주체(Third party)에 의하여 제공되는 경우에는 보안과 신뢰 관계가 아주 중요해진다. SM-DP는 실시간 프로비저닝(Provisioning) 기능 이외에도 상당한 정도의 백그라운드 프로세싱 기능을 보유할 수 있으며, 퍼포먼스, 스캐러빌러티(Scalability) 및 신뢰도에 대한 요구사항이 중요할 것으로 예상된다. If the SM-DP function is provided by a third party, security and trust relationships become very important. In addition to real-time provisioning, SM-DP can have a significant amount of background processing, and the requirements for performance, scalability and reliability are expected to be important.

SM-SR은 크레덴셜 패키지를 해당되는 eUICC로 안전하게 라우팅하고 전달하는 역할을 담당한다. SM-SR의 핵심 기능은 1) 사이퍼(Ciphered)된 VPN을 통한 eUICC와의 OTA 통신을 관리하는 것과, 2) eUICC까지 엔드-투-엔드(end-to-end)를 형성하기 위하여 다른 SM-SR과의 통신을 관리하는 기능과, 3) eUICC 공급자에 의하여 제공되는 SM-SR OTA 통신을 위해 사용되는 eUICC 데이터를 관리하는 기능과, 4) 오직 허용된 엔터티만을 필터링함으로써 eUICC와의 통신을 보호하는 기능(방화벽 기능) 등이다.SM-SR is responsible for securely routing and delivering the credential package to the corresponding eUICC. The key features of the SM-SR are 1) managing OTA communication with the eUICC via a ciphered VPN, and 2) other SM-SR to form an end-to-end up to the eUICC. To manage communication with eUICC, 3) to manage eUICC data used for SM-SR OTA communication provided by eUICC provider, and 4) to protect communication with eUICC by filtering only allowed entities. (Firewall function).

SM-SR 데이터베이스는 eUICC 벤더와 장치(M2M 단말 등) 벤더 및 잠재적으로 MNO에 의하여 제공되며, SM-SR 메시 네트워크를 통해서 MNO에 의하여 사용될 수 있다. The SM-SR database is provided by eUICC vendors, device (such as M2M terminal) vendors, and potentially MNOs, and can be used by MNOs through the SM-SR mesh network.

신뢰 서클(Circle of trust)은 프로비저닝 프로파일 전달 동안 엔드-투-엔드 시큐리티 링크를 가능하게 하며, SM-SR은 프로비저닝 프로파일의 안전한 라우팅 및 eUICC 디스커버리를 위하여 신뢰 서클을 공유한다. MNO는 신뢰 써클내의 SM-SR 및 SM-DP 엔터티와 링크될 수 있으며, 자체적으로 이런 기능을 제공할 수도 있을 것이다. 고객과 관련된 MNO의 계약상 및 법률상 의무를 어기지 않고, eUICC의 불법적인 사용(클로닝, 크레덴셜의 불법 사용, 서비스 거부, 불법적인 MNO 컨텍스트 변경 등)을 방지하기 위하여, eUICC와 MNO 크레덴셜 사이의 안전한 엔드-투-엔드 링크가 필요하다. The circle of trust enables end-to-end security links during provisioning profile delivery, while the SM-SR shares the trust circle for secure routing of the provisioning profile and eUICC discovery. MNOs can be linked with SM-SR and SM-DP entities in a trusted circle, or they can provide this functionality themselves. EUICC and MNO Credentials to prevent illegal use of eUICC (cloning, illegal use of credentials, denial of service, illegal MNO context changes, etc.) without violating MNO's contractual and legal obligations with respect to its customers. There is a need for a secure end-to-end link between.

즉, 도 1에서 110은 SM들끼리, 더 구체적으로는 SM-SR 멤버 사이에 형성되는 신뢰 서클을 나타내고, 120은 MNO 파트너들의 신뢰 서클이며, 130은 엔드투엔드 신뢰 링크를 도시한다.That is, in FIG. 1, 110 represents a trust circle formed between SMs, more specifically, between SM-SR members, 120 represents a trust circle of MNO partners, and 130 represents an end-to-end trust link.

도 2는 SM 분리 환경에서 SM-SR 및 SM-DP가 시스템에 위치하는 구성을 도시한다.2 illustrates a configuration in which an SM-SR and an SM-DP are located in a system in an SM separation environment.

도 2와 같이, SM은 eUICC와 관련된 여러 프로파일(MNO의 오퍼레이션 프로파일, 프로비저닝 프로파일 등)을 안전하게 준비하는 SM-DP와, 그를 라우팅하기 위한 SM-SR로 구분되며, SM-SR은 다른 여러 SM-SR과 신뢰관계로 연동될 수 있고, SM-DP는 MNO 시스템에 연동되어 있다.As shown in FIG. 2, the SM is divided into an SM-DP for safely preparing various profiles (operation profile, provisioning profile, etc.) related to the eUICC, and an SM-SR for routing the SM-SR. It can be linked with the SR in a trust relationship, SM-DP is linked to the MNO system.

물론, SM-DP와 MNO 시스템의 배치는 도 2와 다르게 구현될 수 있다. (즉, SM-DP가 SM-SR과 연동되고, MNO 시스템이 SM-DP와 연동될 수 있다.Of course, the arrangement of the SM-DP and the MNO system may be implemented differently from FIG. 2. (Ie, the SM-DP may be linked with the SM-SR, and the MNO system may be linked with the SM-DP.

eSIM은 프로파일이 소프트웨어적으로 eSIM 외부 개체들(MNO, 제조사, 서비스 제공자 등)에서 eSIM 내부로 발급되고 관리되며, 기존 SIM과는 달리 복수 개의 프로파일이 동시에 탑재될 수 있는 등 기존과 다른 SIM 기반 서비스 환경을 제공한다. 이에 따라 eSIM에 프로파일을 발급하고 관리하는 개체는 eSIM 자체 또는 자신이 발급하고 관리하는 프로파일에 대한 보안 정책을 관리하고, 필요 시 적용 (Enforcement)하고자 한다. 현재 eSIM 환경에서는 이와 같은 역할을 수행하는 개념을 PCF, Policy Control Function으로 지칭하고 있으나, PCF에 대한 세부적인 형상과 동작 방법 등에 대해서는 정의되어 있지 않다.eSIM is a different SIM-based service, such as profiles are issued and managed internally by eSIM from eSIM external entities (MNOs, manufacturers, service providers, etc.), and unlike multiple SIMs, multiple profiles can be loaded simultaneously. Provide an environment. Accordingly, the entity that issues and manages the profile to the eSIM manages the security policy for the eSIM itself or the profile that is issued and managed by the eSIM. In the current eSIM environment, the concept of performing such a role is referred to as PCF and Policy Control Function, but the detailed shape and operation method of the PCF are not defined.

이에, 본 발명에서는 eSIM 환경에서의 확장성이 높은 PCF 제공 방안을 제안한다. 본 발명에서 제안하는 eSIM 환경에서의 확장성이 높은 PCF 제공 방안에 대하여 아래에서 더욱 상세하게 설명한다. 단, 아래에서는, eSIM을 eUICC으로 기재하여 설명한다. Accordingly, the present invention proposes a highly scalable PCF providing method in an eSIM environment. The highly scalable PCF providing method in the eSIM environment proposed by the present invention will be described in more detail below. However, below, eSIM is described and described as eUICC.

도 3은 본 발명의 일 실시예에 의한 PCF(310) 기본 구조 및 동작과 이를 위한 eUICC(300)를 나타낸 도면이다.3 is a diagram illustrating the basic structure and operation of the PCF 310 and the eUICC 300 for the same according to an embodiment of the present invention.

본 발명의 일 실시예에 의한 정책 제어 기능(PCF: Policy Control Function, 310)은, 도 3에 도시된 바와 같이, PCF 규칙(PCF Rule, 311) 및 PCF 엔진(PCF Engine, 312)으로 구성된다. As shown in FIG. 3, a policy control function (PCF) 310 according to an embodiment of the present invention includes a PCF rule 311 and a PCF engine 312. .

본 발명의 일 실시예에 의한 PCF(310) 기본 동작은 다음과 같이 이루어진다.PCF 310 basic operation according to an embodiment of the present invention is performed as follows.

도 3을 참조하면, eUICC(300)의 외부, 즉, eUICC 외부 개체(30)에서 PCF 적용 대상(320)으로 접근하고자 할 경우, eUICC 외부 개체(30)는 PCF 엔진(320)과의 연동을 통해 PCF 적용을 한 후(S300), 이를 토대로 PCF 적용 대상(320)으로의 접근이 인가되면, eUICC 외부 개체(30)는 PCF 적용 대상(320)에 접근할 수 있다(S302). Referring to FIG. 3, when the user wants to approach the PCF application object 320 from the eUICC 300, that is, the eUICC external object 30, the eUICC external object 30 may interwork with the PCF engine 320. After applying the PCF through (S300), if the access to the PCF application object 320 is authorized based on this, the eUICC external entity 30 may access the PCF application object 320 (S302).

본 명세서에서 기재된 eUICC 외부 개체(30)는, eUICC(300)에 대한 동작을 수행하는 개체로서, MNO(Mobile Network Operator), 제조사, 서비스 제공자, SM(Subscription Manager) 등 중에서 하나 이상을 포함할 수 있으며, eUICC(300)를 탑재한 기기(Device)일 수도 있다. The eUICC external entity 30 described herein is an entity performing an operation on the eUICC 300, and may include one or more of a mobile network operator (MNO), a manufacturer, a service provider, a subscription manager (SM), and the like. It may also be a device equipped with the eUICC 300.

이러한 PCF 제공을 위한 eUICC(300)는, 정책 정보를 수록하는 PCF 규칙(311)과, eUICC 외부 개체(30)의 PCF 적용 대상(320)에 대한 접근 시도 시, PCF 규칙(311)을 기반으로 정책을 수행하는 PCF 엔진(312) 등을 포함한다. The eUICC 300 for providing the PCF is based on the PCF rule 311 and the PCF rule 311 that records the policy information, and when the eUICC external entity 30 attempts to access the PCF application target 320. PCF engine 312, etc. that perform the policy.

위에서 언급한 PCF 규칙(311)은, PCF 엔진(3120)에 의해 적용되어야 할 정책 정보를 수록한 확장 가능한 TLV(Type Length Value) 및 XML(eXtensible Markup Language) 등 중 하나 이상의 형태로 된 파일이다. The PCF rule 311 mentioned above is a file in one or more forms of an extensible type length value (TLV) and an eXtensible Markup Language (XML) including policy information to be applied by the PCF engine 3120.

아래에서, 전술한 PCF 규칙(311) 및 PCF 엔진(312)에 대한 세부 구조를 설명한다. In the following, detailed structures of the PCF rule 311 and the PCF engine 312 described above will be described.

먼저, PCF 규칙(311)의 세부 구조를 도 4를 참조하여 더욱 상세하게 설명한다. First, the detailed structure of the PCF rule 311 is described in more detail with reference to FIG.

도 4는 본 발명의 일 실시예에 의한 PCF 규칙(311) 구조의 일 예를 나타낸 도면이다.4 is a diagram illustrating an example of a PCF rule 311 structure according to an embodiment of the present invention.

도 4를 참조하면, PCF 규칙(311)은 확장 가능한 형태의 파일 형태들로, 보호 대상(Target), 보호 대상에 적용될 동작(Action), 해당 동작을 위해 필요한 비밀 정보(Crendential), 비밀 정보 기반의 보안 방식(Security) 등 중에서 하나 이상을 정의할 수 있다. Referring to FIG. 4, the PCF rule 311 is an extensible file type, and includes a target, an action to be applied to the protected object, secret information necessary for the action, and a secret information base. You can define one or more of the security methods of.

위에서 언급한 보호 대상(Target)은, 일 예로, 파일(File), 애플리케이션(Application) 및 프로파일(Profile) 중 하나이거나, 또는 PCF 규칙 그 자체일 수도 있다.The target mentioned above may be, for example, one of a file, an application, a profile, or the PCF rule itself.

위에서 언급한 보호 대상(Target)에 적용될 동작(Action)은, 일 예로, 리드(Read), 라이트(Write), 업데이트(Update), 락(Lock), 언락(Unlock), 딜리트(Delete), 백업(Backup) 및 셀렉트(Select) 중 하나 이상을 포함할 수 있다. Actions to be applied to the above-mentioned targets include, for example, Read, Write, Update, Lock, Unlock, Delete, Delete, It may include one or more of Backup and Select.

위에서 언급한 비밀 정보(Credential)는, 일 예로, 사용자 PIN(Personal Identification Number) 및 eUICC 환경에서 정의되는 각종 크레덴셜(Credential)을 포함할 수 있다. 여기서, 각종 크레덴셜(Credential)은, 일 예로, eUICC 액세스 크레덴셜(eUICC Access Credential), 프로파일 액세스 크레덴셜(Profile Access Credential), 프로파일 보호 크레덴셜(Profile Protection Credential), 인가된 OEM 크레덴셜(Authorized OEM Credential), 서비스 프로바이더 크레덴셜(Service Provider Credential), 애플리케이션 액세스 크레덴셜(Application Access Credential) 등 중 하나 이상을 포함할 수 있다.The above-mentioned confidential information may include, for example, a user PIN (Personal Identification Number) and various credentials defined in the eUICC environment. Here, the various credentials are, for example, eUICC Access Credential, Profile Access Credential, Profile Protection Credential, Authorized OEM Credential It may include one or more of an OEM Credential, a Service Provider Credential, an Application Access Credential, and the like.

위에서 언급한 보안 방식(Security)은, 비밀 정보(Credential)를 활용한 보안 방식에 대한 정보를 저장하고 있으며, 일 예로, 암호(Encryption) 여부, 인증(Authentication) 여부, 무결성(Integrity) 여부 등 중 하나 이상의 제공 가능한 보안 기능과, 해당 보안 기능을 제공하기 위해 적용되는 보안 알고리즘 정보를 저장할 수 있다. 여기서, 보안 알고리즘 정보는, 일 예로, 3DES CBC Mode, PKCS#1, SHA-1 등에 대한 정보를 포함할 수 있다.The above-mentioned security method stores information about the security method utilizing the confidential information. For example, whether it is encryption, authentication, integrity, etc. One or more provisionable security functions and security algorithm information applied to provide the security function may be stored. Here, the security algorithm information may include, for example, information about 3DES CBC Mode, PKCS # 1, SHA-1, and the like.

또한, 전술한 정보 이외에도, PCF 적용에 필요한 필드(들)가 추가될 수 있다.In addition to the above-described information, field (s) necessary for PCF application may be added.

다음으로, PCF 엔진(312)의 세부 구조를 더욱 상세하게 설명한다. Next, the detailed structure of the PCF engine 312 will be described in more detail.

전술한 PCF 엔진(312)은, PCF 규칙(311)을 기반으로 정책을 수행하는 애플릿 등과 같은 소프트웨어 모듈일 수 있다. The PCF engine 312 described above may be a software module such as an applet that performs a policy based on the PCF rule 311.

이러한 PCF 엔진(312)은, eUICC 외부 개체(30)의 PCF 적용 대상(320), 즉 eUICC 자원에 대한 접근 시도 시, eUICC 외부 개체(30)의 동작에 대한 권한이 획득되도록 하여 eUICC 외부 개체(30)가 동작을 수행하도록 해줄 수 있다. The PCF engine 312, when attempting to access the PCF application target 320, that is, eUICC resources of the eUICC external object 30, the authority for the operation of the eUICC external object 30 is obtained so that the eUICC external object ( 30) can be performed to perform the operation.

이러한 PCF 엔진(312)은, eUICC 외부 개체(30)의 PCF 적용 대상(320)에 대한 접근 시도 시, PCF 규칙(311)을 기반으로 암호화, 인증 및 무결성 검증 등 중 하나 이상의 보안 연상을 수행할 수 있다. When the PCF engine 312 attempts to access the PCF application target 320 of the eUICC external object 30, the PCF engine 312 may perform one or more security associations among encryption, authentication, and integrity verification based on the PCF rule 311. Can be.

상기 내용을 eUICC 외부 개체(30)의 입장에서 설명하면, eUICC 외부 개체(30)는, PCF 적용 대상(320)에 대한 접근 시도 시, PCF 엔진(320)과의 연동을 통해, 동작(Action)에 대한 권한을 획득하고, 이후, 해당 동작(Action)을 수행한다. 이때, eUICC(300)의 외부에 있는 eUICC 외부 개체(30)가 특정 파일, 프로파일 등에 접근 시도 시, eUICC 외부 개체(30)는 PCF 엔진(312)과 연동하여, PCF 규칙(311)을 기반으로 암호화, 인증 및 무결성 검증 등 중 하나 이상의 보안 연상을 수행할 수 있다. When the above content is described from the standpoint of the eUICC external entity 30, the eUICC external entity 30 operates in conjunction with the PCF engine 320 when attempting to access the PCF application object 320. After obtaining the authority for, and performing the corresponding action. At this time, when the eUICC external object 30 outside the eUICC 300 attempts to access a specific file, profile, etc., the eUICC external object 30 works with the PCF engine 312 based on the PCF rule 311. One or more security associations may be performed, such as encryption, authentication, and integrity verification.

예를 들어, eUICC 외부 개체(30)가 eUICC(300) 내의 특정 파일을 업데이트(Update)하고자 할 때, 해당 파일을 관리하는 PCF 엔진(312)은, eUICC(300)의 외부에 해당 파일의 업데이트 동작에 필요한 보안 연산 (예: 인증 등)을 수행하며, 이에 성공했을 때만 해당 파일의 업데이트를 수행할 수 있다. For example, when the eUICC external object 30 wants to update a specific file in the eUICC 300, the PCF engine 312 managing the file updates the file outside of the eUICC 300. It performs security operation (eg authentication) necessary for operation and can update the file only when it is successful.

다른 예로써, eUICC(300)의 외부에서 eUICC(300) 내의 프로파일(Profile)을 백업(backup)하고자 할 경우, 해당 프로파일을 관리하는 PCF 엔진(312)은 eUICC(300)의 외부와 해당 프로파일에 관련된 크레데셜(Credential)을 기반으로 한 보안 연산을 수행하며, 이에 성공했을 경우에만 백업 연산을 수행할 수 있다.As another example, when the user wants to back up a profile in the eUICC 300 outside of the eUICC 300, the PCF engine 312 managing the profile is external to the eUICC 300 and the corresponding profile. It performs a security operation based on the associated credential, and can only perform a backup operation if it succeeds.

위에서 언급한 PCF 적용 대상(320)은, 일 예로, eUICC(300) 내의 각종 관리 목적의 공용 파일, eUICC(300)에 탑재된 프로파일 및 각 프로파일 내에 존재하는 세부 항목(예: 파일, 애플리케이션 등) 등 중 하나 이상을 포함할 수 있다. The PCF application object 320 mentioned above may be, for example, a common file for various management purposes in the eUICC 300, a profile mounted in the eUICC 300, and details (eg, a file, an application, etc.) present in each profile. And the like.

이러한 PCF 적용 대상(320)을 도 5를 참조하여 더욱 상세하게 설명한다. This PCF application target 320 will be described in more detail with reference to FIG. 5.

도 5는 본 발명의 일 실시예에 의한 PCF 적용 대상(320)의 일 예를 나타낸 도면이다.5 is a diagram illustrating an example of a PCF application target 320 according to an embodiment of the present invention.

도 5에 도시된 바와 같이, PCF는 eUICC(300) 전체에 적용될 수 있다. 이와 같이, PCF가 eUICC(300) 전체에 적용될 때에는, eUICC(300) 내의 각종 관리 목적의 공용 파일들(예: eUICC 식별자, 프로파일 리스트, 현재 활성화된 프로파일 리스트, eUICC(300) 내 탑재된 프로파일 정보(예:식별자, 종류, 설명 등) 등)과, eUICC(300)에 탑재된 프로파일 전체에 대해 PCF를 적용할 수 있다. As shown in FIG. 5, the PCF may be applied to the entire eUICC 300. As such, when the PCF is applied to the entire eUICC 300, the common files for various management purposes in the eUICC 300 (eg, the eUICC identifier, profile list, currently active profile list, and profile information mounted in the eUICC 300). (Eg, identifier, type, description, etc.) and the entire profile mounted on the eUICC 300 can be applied to the PCF.

또한, PCF가 eUICC(300) 전체에 적용되는 것 이외에도, eUICC(300) 내 탑재된 각 프로파일 또는 각 프로파일 내에 존재하는 세부 항목(예: Files, Applications 등)에도 PCF가 적용될 수 있다.In addition to the PCF being applied to the entire eUICC 300, the PCF may be applied to each profile mounted in the eUICC 300 or to sub-items (eg, Files, Applications, etc.) existing in each profile.

한편, 본 명세서에서 기재된 PCF(Policy Control Function, 310)는, 정책(Policy)을 이행(Implement)하기 위한 정책 규칙(Policy Rule)을 정의하거나 업데이트하거나 삭제하는 등의 기능을 의미할 수 있다. On the other hand, the PCF (Policy Control Function, 310) described in this specification may mean a function such as defining, updating, or deleting a policy rule for implementing a policy.

또한, 본 명세서에서 기재된 PCF(Policy Control Function, 310)는, 정책 규칙(Policy Rule)의 정의/업데이트/삭제 기능을 의미하는 것뿐만 아니라, 정책을 이행(Implement)하기 위한 정책 규칙을 실행(Execution)하는 기능을 의미하는 정책 적용 기능(PEF: Policy Enforcement Function)를 포함하는 개념일 수 있다. In addition, the PCF (Policy Control Function) 310 described in the present specification not only means defining / update / delete function of a policy rule, but also executes a policy rule for implementing a policy. It may be a concept including a policy enforcement function (PEF), which means a function of).

또한, 본 명세서에서 기재된 PCF 규칙(PCF Rule, 311)은, 정책을 이행하기 위해 요구되는 동작과 정책이 이행되기 위한 조건 등을 의미하는 정책 규칙(Policy Rule)이라고 할 수 있다. In addition, the PCF rule 311 described in the present specification may be referred to as a policy rule meaning an operation required for implementing a policy, a condition for implementing the policy, and the like.

아래에서는, 이상에서 설명한 PCF 제공 방법을 도 6의 흐름도를 참조하여 다시 설명한다. In the following, the PCF providing method described above will be described again with reference to the flowchart of FIG. 6.

도 6은 본 발명의 일 실시예에 의한 PCF 제공 방법에 따른 PCF 동작 프로세스의 일 예를 나타낸 도면이다. 6 is a diagram illustrating an example of a PCF operation process according to a PCF providing method according to an embodiment of the present invention.

도 6을 참조한 설명에서 앞서, eUICC 외부 개체(30)는, 앞에서 언급한 바와 같이, MNO, 제조사, 서비스 제공자, SM(Subscription Manager) 등과 같이, eUICC(300)에 대한 특정 동작(Action)을 수행해야 하는 개체들이다. PCF 적용 대상(320)이라는 용어 대신 기재할 eUICC 자원(320)에 특정 PCF(310, PCF 규칙(311)+PCF 엔진(312))이 서로 연관되어 있음을 가정한다. 그리고, eUICC 플랫폼(Platform)은, eUICC(300) 내의 COS(Chip OS)를 포함하는 Java Card Platform, Global Platform 등의 플랫폼일 수 있으며, eUICC(300)의 일반적인 동작 및 서비스 제공을 위한 기능들을 구현한 것이다.In the description with reference to FIG. 6, as described above, the eUICC external entity 30 performs a specific action on the eUICC 300, such as an MNO, a manufacturer, a service provider, and a subscription manager (SM). The objects that need to be It is assumed that a specific PCF 310 (PCF rule 311 + PCF engine 312) is associated with each other in the eUICC resource 320 to be described instead of the term PCF application target 320. The eUICC platform may be a platform such as a Java Card Platform or a Global Platform including a COS (Chip OS) in the eUICC 300, and implements functions for providing general operations and services of the eUICC 300. It is.

도 6을 참조하면, 본 발명의 일 실시예에 의한 PCF 제공 방법은, eUICC(300)의 PCF 제공 방법은, eUICC 외부 개체(30)의 eUICC 자원(320)에 대한 접근이 시도되면(S600), eUICC(300) 내 PCF 엔진(312)이 적용해야 할 PCF 규칙(311)을 조회하는 단계(S602)와, PCF 엔진(312)이 조회한 PCF 규칙(311)을 토대로 PCF 적용(Enforcement)을 수행하는 단계(S604~S608) 등을 포함할 수 있다. Referring to FIG. 6, in the PCF providing method according to an embodiment of the present invention, when the PCUI providing method of the eUICC 300 attempts to access the eUICC resource 320 of the eUICC external entity 30 (S600). Inquiring the PCF rule 311 to be applied by the PCF engine 312 in the eUICC (300) (S602) and the PCF application (Enforcement) based on the PCF rule 311 inquired by the PCF engine (312) It may include a step (S604 ~ S608) to perform.

전술한 S600 단계에서, eUICC 외부 개체(30)는 자신이 접근하고자 하는 eUICC 자원(320)에 PCF가 어떤 형태로 설정되어 있는지 알지 못할 수 있다. 이 경우, 최초에 PCF에 대한 사전 지식 없이 eUICC 자원(320)에 접근을 시도할 수 있다.(선택적으로, eUICC(300)에 대한 DoS 공격을 시도할 수 있음으로 권고하지 않음)In step S600 described above, the eUICC external entity 30 may not know how the PCF is set in the eUICC resource 320 to which the eUICC external entity 30 wishes to access. In this case, it may initially attempt to access the eUICC resource 320 without prior knowledge of the PCF. (Optionally, it is not recommended that a DoS attack on the eUICC 300 can be attempted.)

전술한 S602 단계에서, PCF 엔진(312)은, 전술한 바와 같이, PCF(310) 내부적으로 자신이 적용해야 할 PCF 규칙(311)을 참조(조회)하고 있으며, 필요 시 실시간으로 PCF 규칙(311)을 참조할 수 있다. In the above-described step S602, the PCF engine 312 refers to the PCF rule 311 to be applied by the PCF 310 internally as described above, and if necessary, the PCF rule 311 in real time. ).

한편, 전술한 S602 단계에서, PCF 엔진(312)은, (S600 단계가 선행된 경우) PCF 규칙(311)을 조회하여 조회한 PCF 규칙 중에서 크레덴셜(Credential)을 제외한 공개 가능한 PCF 규칙(311)을 eUICC 외부 개체(30)에 전달(점선으로 표시된 화살표)하여 공개하고 향후 절차를 수행할 수 있다. On the other hand, in the above-described step S602, the PCF engine 312 (in the case where step S600 is preceded), the PCF rule (311) excluding the credential among the PCF rules inquired and inquired the PCF rule (311) Can be delivered to the eUICC external entity 30 (arrows shown by dashed lines) to reveal and carry out future procedures.

전술한 S602 단계 이후 수행되는 "PCF 적용 수행 단계"는, PCF 엔진(312)이 eUICC 외부 개체(30)로부터 PCF 적용(PCF Enforcement) 요청을 수신하여 응답을 수행함으로써 PCF 규칙 적용에 필요한 보안 연산을 수행하는 단계(S604)와, PCF 엔진(312)이 eUICC 외부 개체(30)로부터 수신한 PCF 적용 요청을 토대로 PCF 적용 결과를 연산하는 단계(S606)와, PCF 엔진(312)이 연산한 PCF 적용 결과를 eUICC 외부 개체(30)에 전달하는 단계(S608) 등을 포함할 수 있다.In the "PCF application execution step" performed after the above-described step S602, the PCF engine 312 receives a PCF Enforcement request from the eUICC external entity 30 and performs a response to perform a security operation required for applying the PCF rule. Performing step (S604), calculating the PCF application result based on the PCF application request received from the eUICC external entity (30) by the PCF engine (312), and applying the PCF calculated by the PCF engine (312) And transmitting the result to the eUICC external entity 30 (S608).

전술한 S604 단계에서, eUICC 외부 개체(30)는 자신이 알고 있는 PCF 규칙(311) 또는 PCF 엔진(312)으로부터 응답받은 PCF 규칙(311)을 토대로 PCF 적용(Enforcement) 요청을 수행하며, 이에 따라, PCF 엔진(312)은 PCF 적용 요청에 대한 응답을 수행함으로써, PCF 규칙 적용에 필요한 보안 연산을 수행하게 된다.In step S604 described above, the eUICC external entity 30 performs a PCF Enforcement request based on the PCF rule 311 received from the PCF rule 311 or the PCF engine 312 that it knows, and accordingly In response to the PCF application request, the PCF engine 312 performs a security operation necessary for applying the PCF rule.

전술한 S606 단계에서, PCF 엔진(312)은 eUICC 외부 개체(30)가 전달한 PCF Rule 적용 요청(예: MAC(Message Authentication Code), PIN, 보안키, 전자서명 등)를 토대로 PCF 규칙 적용 결과를 연산한다.In the above-described step S606, the PCF engine 312 is based on the PCF rule application request (eg MAC (Message Authentication Code), PIN, security key, digital signature, etc.) delivered by the eUICC external entity 30 based on the result of applying the PCF rule. Calculate

전술한 S608 단계에서, PCF 엔진(312)은, PCF 규칙 적용 결과(예: Access Granted/Denied, Operation Permitted/Denied 등)를 eUICC 외부 개체(30)에 전달한다.In step S608, the PCF engine 312 transmits the PCF rule application result (eg, Access Granted / Denied, Operation Permitted / Denied, etc.) to the eUICC external entity 30.

전술한 S608 단계에서, PCF 규칙 적용 결과를 전달받은 eUICC 외부 개체(30)는, PCF 엔진(311)의 PCF 규칙 적용 결과를 토대로, 하고자 했던 동작(Action)들을 수행할 수 있게 된다. In step S608, the eUICC external entity 30 that has received the PCF rule application result may perform actions that are intended to be performed, based on the PCF rule application result of the PCF engine 311.

이상에서 설명한 바에 따르면, 본 발명은 eUICC(300)의 정책 제어 기능(PCF: Policy Control Function)에 대한 기능 및 구조를 명확하게 정의해준다. As described above, the present invention clearly defines the function and structure of the Policy Control Function (PCF) of the eUICC 300.

또한, 본 발명은, 정의된 기능 및 구조에 따라, eUICC(300)의 정책 제어 기능을 제공하는 방법을 제공할 수 있다. In addition, the present invention may provide a method for providing a policy control function of the eUICC 300 according to a defined function and structure.

또한, 본 발명은, eUICC(300)의 정책 제어 기능의 세부 구조 및 그를 통한 PCF 동작 방법을 제공할 수 있다. In addition, the present invention can provide a detailed structure of the policy control function of the eUICC (300) and a PCF operation method through the same.

이상과 같은 본 발명을 이용하면, eUICC(300) 내의 프로파일, 각종 공용 파일 등에 대한 정책 수립 및 적용이 가능해진다. 확장성이 있는 PCF 규칙 제공 방안은, 향후 eUICC(eSIM) 환경 변화에 따라 필요한 동작(Action), 보호 대상(Target), 비밀 정보(Credential) 등이 추가될 경우, 유연하게 대응할 수 있도록 하며, 현재 존재하지 않는 PCF 규칙(311)의 기본 구조를 제공할 수 있다. PCF 엔진(312)의 동작 방식으로 PCF 규칙이 적용되는 파일, 프로파일, PCF 규칙 자체 등의 eUICC 자원(eSIM 자원, 320)은 안전하게 관리되고 활용될 수 있게 된다. Using the present invention as described above, it is possible to establish and apply a policy for the profile, various common files, and the like in the eUICC (300). Extensive PCF rule provision method provides flexibility in responding to necessary actions, targets, and confidential information as the eUICC (eSIM) environment changes in the future. It may provide a basic structure of the PCF rule 311 does not exist. As an operation of the PCF engine 312, eUICC resources (eSIM resources) 320 such as files, profiles, and PCF rules to which PCF rules are applied may be safely managed and utilized.

이상의 설명은 본 발명의 기술 사상을 예시적으로 설명한 것에 불과한 것으로서, 본 발명이 속하는 기술 분야에서 통상의 지식을 가진 자라면 본 발명의 본질적인 특성에서 벗어나지 않는 범위에서 다양한 수정 및 변형이 가능할 것이다. 따라서, 본 발명에 개시된 실시 예들은 본 발명의 기술 사상을 한정하기 위한 것이 아니라 설명하기 위한 것이고, 이러한 실시 예에 의하여 본 발명의 기술 사상의 범위가 한정되는 것은 아니다. 본 발명의 보호 범위는 아래의 청구범위에 의하여 해석되어야 하며, 그와 동등한 범위 내에 있는 모든 기술 사상은 본 발명의 권리범위에 포함되는 것으로 해석되어야 할 것이다.The above description is merely illustrative of the technical idea of the present invention, and those skilled in the art to which the present invention pertains may make various modifications and changes without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are not intended to limit the technical idea of the present invention but to describe the present invention, and the scope of the technical idea of the present invention is not limited thereto. The protection scope of the present invention should be interpreted by the following claims, and all technical ideas within the equivalent scope should be interpreted as being included in the scope of the present invention.

CROSS-REFERENCE TO RELATED APPLICATIONCROSS-REFERENCE TO RELATED APPLICATION

본 특허출원은 2011년 11월 2일 한국에 출원한 특허출원번호 제 10-2011-0113374 호 및 2012년 10월 23일 한국에 출원한 특허출원번호 제 10-2012-0117969 호에 대해 미국 특허법 119(a)조 (35 U.S.C § 119(a))에 따라 우선권을 주장하며, 그 모든 내용은 참고문헌으로 본 특허출원에 병합된다. 아울러, 본 특허출원은 미국 이외에 국가에 대해서도 위와 동일한 이유로 우선권을 주장하면 그 모든 내용은 참고문헌으로 본 특허출원에 병합된다.This patent application is related to the patent application No. 10-2011-0113374 filed in Korea on November 2, 2011 and the patent application No. 10-2012-0117969 filed in Korea on October 23, 2012. Priority is claimed under section (a) (35 USC § 119 (a)), all of which is incorporated by reference in this patent application. In addition, if this patent application claims priority for the same reason for countries other than the United States, all its contents are incorporated into this patent application by reference.

Claims (15)

정책 제어 기능(PCF: Policy Control Function)을 제공하기 위한 내장 UICC(eUICC: embedded Universal Integrated Circuit Card)로서, Embedded UICC (eUICC) for providing Policy Control Function (PCF), 정책 정보를 수록하는 PCF 규칙(PCF Rule); 및 PCF Rule containing the policy information (PCF Rule); And eUICC 외부 개체의 PCF 적용 대상에 대한 접근 시도 시, 상기 PCF 규칙을 기반으로 정책을 수행하는 PCF 엔진을 포함하는 eUICC.eUICC eUICC including a PCF engine to perform a policy based on the PCF rules when attempting to access the PCF application target of the external object. 제1항에 있어서, The method of claim 1, 상기 PCF 규칙은, 상기 PCF 엔진에 의해 적용되어야 할 정책 정보를 수록한 확장 가능한 TLV(Type Length Value) 및 XML(eXtensible Markup Language) 중 하나 이상의 형태로 된 파일인 것을 특징으로 하는 eUICC.The PCF rule is an eUICC, characterized in that the file in the form of one or more of extensible type length value (TLV) and XML (eXtensible Markup Language) containing the policy information to be applied by the PCF engine. 제1항에 있어서, The method of claim 1, 상기 PCF 규칙은, 보호 대상, 상기 보호 대상에 적용될 동작, 해당 동작을 위해 필요한 비밀 정보, 상기 비밀 정보 기반의 보안 방식 중 하나 이상을 정의하는 것을 특징으로 하는 eUICC. The PCF rule is eUICC, characterized in that for defining at least one of the object to be protected, the operation to be applied to the object, the secret information required for the operation, the secret-based security method. 제3항에 있어서, The method of claim 3, 상기 보호 대상은, 파일, 애플리케이션 및 프로파일 중 하나인 것을 특징으로 하는 eUICC. The protected object is eUICC, characterized in that one of a file, an application and a profile. 제3항에 있어서, The method of claim 3, 상기 보호 대상은, PCF 규칙 그 자체인 것을 특징으로 하는 eUICC. The protection target is eUICC, characterized in that the PCF rule itself. 제3항에 있어서, The method of claim 3, 상기 보호 대상에 적용될 동작은, 리드(Read), 라이트(Write), 업데이트(Update), 락(Lock), 언락(Unlock), 딜리트(Delete), 백업(Backup) 및 셀렉트(Select) 중 하나 이상을 포함하는 것을 특징으로 하는 eUICC. The operation to be applied to the protection target is one of Read, Write, Update, Lock, Unlock, Delete, Backup, and Select. EUICC characterized by including the above. 제3항에 있어서, The method of claim 3, 상기 비밀 정보는, 사용자 PIN(Personal Identification Number) 및 eUICC 환경에서 정의되는 크레덴셜(Credential)을 포함하는 것을 특징으로 하는 eUICC. The secret information includes a user identification number (PIN) and a credential defined in an eUICC environment. 제3항에 있어서, The method of claim 3, 상기 보안 방식은, 암호(Encryption) 여부, 인증(Authentication) 여부, 무결성(Integrity) 여부 중 하나 이상의 제공 가능한 보안 기능과, 해당 보안 기능을 제공하기 위해 적용되는 보안 알고리즘 정보를 저장하는 것을 특징으로 하는 eUICC. The security method may include one or more security functions that can be provided among encryption, authentication, and integrity, and security algorithm information applied to provide the security function. eUICC. 제1항에 있어서, The method of claim 1, 상기 PCF 엔진은, 상기 eUICC 외부 개체의 PCF 적용 대상에 대한 접근 시도 시, 상기 eUICC 외부 개체의 동작에 대한 권한이 획득되도록 하여 상기 eUICC 외부 개체가 동작을 수행하도록 해주는 것을 특징을 하는 eUICC. The PCF engine, eUICC, characterized in that when the eUICC external object attempts to access the PCF application target, the rights for the operation of the eUICC external object is obtained so that the eUICC external object performs the operation. 제1항에 있어서, The method of claim 1, 상기 PCF 엔진은, 상기 eUICC 외부 개체의 PCF 적용 대상에 대한 접근 시도 시, 상기 PCF 규칙을 기반으로 암호화, 인증 및 무결성 검증 중 하나 이상의 보안 연상을 수행하는 것을 특징으로 하는 eUICC. And the PCF engine performs one or more security associations of encryption, authentication, and integrity verification based on the PCF rule when the eUICC external entity attempts to access a PCF application target. 제1항에 있어서, The method of claim 1, 상기 PCF 적용 대상은, 상기 eUICC 내의 각종 관리 목적의 공용 파일, 상기 eUICC에 탑재된 프로파일 및 각 프로파일 내에 존재하는 세부 항목 중 하나 이상을 포함하는 것을 특징으로 하는 eUICC. The PCF application object is eUICC, characterized in that it comprises one or more of a common file for various management purposes in the eUICC, a profile mounted in the eUICC, and a detailed item present in each profile. 제1항에 있어서, The method of claim 1, 상기 eUICC 외부 개체는, 상기 eUICC에 대한 동작을 수행하는 개체로서, MNO(Mobile Network Operator), 제조사, 서비스 제공자, SM(Subscription Manager) 중 하나 이상을 포함하는 것을 특징으로 하는 eUICC. The eUICC external entity is an entity that performs an operation on the eUICC, eUICC, characterized in that it comprises one or more of a mobile network operator (MNO), a manufacturer, a service provider, a subscription manager (SM). 내장 UICC(eUICC: embedded Universal Integrated Circuit Card)의 정책 제어 기능(PCF: Policy Control Function) 제공 방법으로서, As a method of providing a Policy Control Function (PCF) of an embedded UICC (eUICC), 상기 eUICC 내 PCF 엔진이, eUICC 외부 개체의 eUICC 자원에 대한 접근이 시도되면(S600), 적용해야 할 PCF 규칙을 조회하는 단계; 및 When the PCF engine in the eUICC attempts to access an eUICC resource of an eUICC external entity (S600), inquiring a PCF rule to be applied; And 상기 PCF 엔진이 상기 PCF 규칙을 토대로 PCF 적용(Enforcement)을 수행하는 단계를 포함하는 eUICC의 정책 제어 기능 제공 방법. And the PCF engine performing the PCF enforcement based on the PCF rule. 제13항에 있어서, The method of claim 13, 상기 PCF 적용을 수행하는 단계는, Performing the PCF application, 상기 PCF 엔진이, 상기 eUICC 외부 개체로부터 PCF 적용(PCF Enforcement) 요청을 수신하여 응답을 수행함으로써 PCF 규칙 적용에 필요한 보안 연산을 수행하는 단계; Receiving, by the PCF engine, a PCF Enforcement request from the eUICC external entity and performing a response to perform a security operation necessary for applying a PCF rule; 상기 PCF 엔진이, 상기 eUICC 외부 개체로부터 수신한 PCF 적용 요청을 토대로 PCF 적용 결과를 연산하는 단계; 및 Calculating, by the PCF engine, a PCF application result based on a PCF application request received from the eUICC external entity; And 상기 PCF 엔진이 상기 연산한 PCF 적용 결과를 상기 eUICC 외부 개체에 전달하는 단계를 포함하는 것을 특징으로 하는 eUICC의 정책 제어 기능 제공 방법. And delivering, by the PCF engine, the calculated PCF application result to the eUICC external entity. 제13항에 있어서, The method of claim 13, 상기 조회하는 단계에서, 상기 PCF 엔진은, In the querying step, the PCF engine, 상기 조회한 PCF 규칙 중에서 크레덴셜(Credential)을 제외한 공개 가능한 PCF 규칙을 상기 eUICC 외부 개체에 전달하여 공개하는 것을 특징으로 하는 eUICC의 정책 제어 기능 제공 방법. Method of providing a policy control function of the eUICC characterized in that the publicly available PCF rules, except for the credential among the inquired PCF rules are delivered to the eUICC external entity.
PCT/KR2012/008759 2011-11-02 2012-10-24 Method and euicc for providing a policy control function Ceased WO2013065991A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR20110113374 2011-11-02
KR10-2011-0113374 2011-11-02
KR1020120117969A KR102012340B1 (en) 2011-11-02 2012-10-23 Method and Enbedded UICC for Providing Policy Control Function
KR10-2012-0117969 2012-10-23

Publications (1)

Publication Number Publication Date
WO2013065991A1 true WO2013065991A1 (en) 2013-05-10

Family

ID=48192296

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2012/008759 Ceased WO2013065991A1 (en) 2011-11-02 2012-10-24 Method and euicc for providing a policy control function

Country Status (1)

Country Link
WO (1) WO2013065991A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10075840B2 (en) 2014-01-10 2018-09-11 Samsung Electronics Co., Ltd. Device and operation method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005128746A (en) * 2003-10-23 2005-05-19 Sony Corp Portable wireless communication device.
KR20050053920A (en) * 2003-12-03 2005-06-10 한국전자통신연구원 Method of loading successive usim card applications
KR20090046607A (en) * 2007-11-06 2009-05-11 삼성전자주식회사 Information storage device, mobile communication device and operator system for automatic backup of user information
KR20090085319A (en) * 2008-02-04 2009-08-07 주식회사 케이티테크 How to control lock of mobile terminal
KR20100072112A (en) * 2008-12-05 2010-06-30 주식회사 케이티 Method and apparatus for automatically updating change of preferred business network to mobile station

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005128746A (en) * 2003-10-23 2005-05-19 Sony Corp Portable wireless communication device.
KR20050053920A (en) * 2003-12-03 2005-06-10 한국전자통신연구원 Method of loading successive usim card applications
KR20090046607A (en) * 2007-11-06 2009-05-11 삼성전자주식회사 Information storage device, mobile communication device and operator system for automatic backup of user information
KR20090085319A (en) * 2008-02-04 2009-08-07 주식회사 케이티테크 How to control lock of mobile terminal
KR20100072112A (en) * 2008-12-05 2010-06-30 주식회사 케이티 Method and apparatus for automatically updating change of preferred business network to mobile station

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GSM ASSOCIATION: "Embedded SIM Task Force Requirements and Use Cases", EMBEDDED SIM TASK FORCE: REQUIREMENTS & USE CASES, VER 1.0, 21 February 2011 (2011-02-21), pages 4 - 5, 8, 29-31 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10075840B2 (en) 2014-01-10 2018-09-11 Samsung Electronics Co., Ltd. Device and operation method thereof

Similar Documents

Publication Publication Date Title
KR102026612B1 (en) Method for Creating Trust Relationship and Embedded UICC
WO2013048084A2 (en) Profile management method, embedded uicc, and device provided with the embedded uicc
WO2013036009A1 (en) Method for managing embedded uicc and embedded uicc, mno system, provision method, and method for changing mno using same
KR101891326B1 (en) Subscription Changing Method for Embedded UICC using Trusted Subscription Manager and Embedded UICC Architecture therefor
KR101885483B1 (en) Method and Apparatus for managing key information of Embedded UICC, MNO System, Provisioning Method and MNO-Changing Method using the same
KR102001869B1 (en) Method and Apparatus for managing Profile of Embedded UICC, Provisioning Method and MNO-Changing Method using the same
CN102204299B (en) Method for securely changing mobile device from old owner to new owner
US10826945B1 (en) Apparatuses, methods and systems of network connectivity management for secure access
WO2020050701A1 (en) Apparatus and method for ssp device and server to negotiate digital certificates
WO2013036010A1 (en) Certification method using an embedded uicc certificate, provisioning and mno changing methods using the certification method, embedded uicc therefor, mno system, and recording medium
WO2016010312A1 (en) Method and device for installing profile of euicc
WO2021045573A1 (en) Apparatus and method for providing subscription data to non-subscriber registered terminal in wireless communication system
WO2013066077A1 (en) Method for managing multiple profiles in an embedded uicc, and embedded uicc and terminal therefor
KR20130026958A (en) Method for verification of embedded uicc using euicc certificate, method for provisioning and mno switching, euicc, mno system and recording medium for the same
KR101891330B1 (en) Subscription Method for Embedded UICC using Trusted Subscription Manager and Embedded UICC Architecture therefor
WO2013036011A2 (en) Method for managing profile of embedded uicc, and embedded uicc, embedded uicc-equipped terminal, provision method, and method for changing mno using same
WO2014171707A1 (en) Security method and system for supporting re-subscription or additional subscription restriction policy mobile communications
US20100151822A1 (en) Security Protocols for Mobile Operator Networks
WO2013065983A1 (en) Method for modifying rights to security domain for smartcard, and server, smartcard, and terminal for same
US20240349032A1 (en) Delegated eUICC Profile Management
WO2022240144A1 (en) Method and apparatus for identifying profile deletion when euicc terminal is changed
WO2013066016A1 (en) Method for forming a trust relationship, and embedded uicc therefor
KR102012340B1 (en) Method and Enbedded UICC for Providing Policy Control Function
WO2013065991A1 (en) Method and euicc for providing a policy control function
WO2019229188A1 (en) Subscriber access to wireless networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12845910

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12845910

Country of ref document: EP

Kind code of ref document: A1